Answer:
2 is the ans
Explanation:
bye bye, gonna go to studyy
what is it when called when businesses produce goods and services that consumers do not want
Consider an array inarr containing atleast two non-zero unique positive integers. Identify and print, outnum, the number of unique pairs that can be identified from inarr such that the two integers in the pair when concatenated, results in a palindrome. If no such pairs can be identified, print -1.Input format:Read the array inarr with the elements separated by ,Read the input from the standard input streamOutput format;Print outnum or -1 accordinglyPrint the output to the standard output stream
Answer:
Program.java
import java.util.Scanner;
public class Program {
public static boolean isPalindrome(String str){
int start = 0, end = str.length()-1;
while (start < end){
if(str.charAt(start) != str.charAt(end)){
return false;
}
start++;
end--;
}
return true;
}
public static int countPalindromePairs(String[] inarr){
int count = 0;
for(int i=0; i<inarr.length; i++){
for(int j=i+1; j<inarr.length; j++){
StringBuilder sb = new StringBuilder();
sb.append(inarr[i]).append(inarr[j]);
if(isPalindrome(sb.toString())){
count++;
}
}
}
return count == 0 ? -1 : count;
}
public static void main(String[] args) {
Scanner sc = new Scanner(System.in);
String line = sc.next();
String[] inarr = line.split(",");
int count = countPalindromePairs(inarr);
System.out.println("RESULT: "+count);
}
}
Explanation:
OUTPUT:
A company manufactures televisions. The average weight of the televisions is 5 pounds with a standard deviation of 0.1 pound. Assuming that the weights are normally distributed, what is the weight that represents the 75th percentile?
Answer:
5.0674
Explanation:
Given that :
Mean, μ = 5 pounds
Standard deviation, σ = 0.1
Given that weight are normally distributed ;
From the Z table, the Zscore or value for 75th percentile weight is :
P(Z < z) = 0.75
z = 0.674
Using the relation :
Zscore = (x - μ) / σ
x = weight
0.674 = (x - 5) / 0.1
0.674 * 0.1 = x - 5
0.0674 = x - 5
0.0674 + 5 = x - 5 + 5
5.0674 = x
The weight which corresponds to the 75th percentile is 5.0674
An infographic displays the relative frequencies of the 100 most common emojis used in text messaging for each of the last 12 months. Which of the following conclusions cannot be drawn from such a representation of emoji usage?
a. You can determine the growth or decline in popularity of a particular emoji.
b. You can determine what percentage of text messages contains a particular emoji.
c. You can determine how long the most popular emoji has held the #1 position.
d. You can determine the average age of emoji users based on emoji use.
Answer:
d. you can determine the average age of emoji users based on emoji use.
Explanation:
The infographic displays 100 most common emoji used in text messaging. This information can be used to determine percentages of text message which contains particular emoji. This details can not determine the age of emoji user based in emoji use.
what's the difference between pseudo code and natural language
Answer:
The pseudo-code describes steps in an algorithm or another system in plain language. Pseudo-Code is often designed for human reading rather than machine reading with structural conventions of a normal language of programming.
Natural languages consist of phrases, usually declarative phrases, with a sequence of information.
Explanation:
Pseudo-Code is often designed for human reading rather than machine reading with structural conventions of a normal language of programming. It usually omits information that is essential to the understanding of the algorithm by the machine, for example, variable declarations and language code.Easily human, but not machines, use the natural languages (like English).Natural languages also are creative. Poetry, metaphor, and other interpretations are permitted. Programming permits certain style differences, but the significance is not flexible.The aim of using pseudo-code is to make it easier for people to comprehensibly than standard programming language code and to describe the key principles of an algorithm efficiently and environmentally independently. It is usually used for documenting software and other algorithms in textbooks and scientific publications.what is the difference of expository and reflexive documentary
What do application in productivity suites have in common
Answer:
The function of the suites application is to create presentations and perform numerical calculations.
Explanation:
Explain in details:
(i) Deadlock
(ii) File manager
(iii) Process
(iv) Multiprogramming
(v) Software Classification
(vi) Virtual memory
Answer and Explanation:
Deadlock occurs when two operating systems on the same computer are hindering each other's execution, getting blocked, waiting for each one to run first. This can happen when a preemption has not occurred, when a mutual exclusion has occurred, or when one of the systems causes the other to not execute.
File manager is software that allows a computer user to create directories and organize files inside and outside of them.
Process is the term used to determine the functioning of computer software. When a software is started, it uses its own programming code to perform a specific activity.
Multiprogramming is the term used for the moment when an operating system allows the user to run more than one software at the same time. For this to happen, the computer needs to have a high processing capacity, to handle the effort of running several software simultaneously.
Software Classification is the process that determines the composition and different aspects that make up a software. In this way, it is possible to understand the usefulness and programming of this software.
Virtual memory is the use of secondary memory for caching. This allows the user to share files more securely and quickly, in addition to alleviating the problems that limited memory presents.
After reading all L02 content pages in Lesson 02: Inheritance and Interfaces, you will complete this assignment according to the information below.Do not use the scanner class or any other user input request. You application should be self-contained and run without user input.Assignment ObjectivesPractice on implementing interfaces in JavaFootballPlayer will implement the interface TableMemberOverriding methodswhen FootballPlayer implements TableMember, FootballPlayer will have to write the real Java code for all the interface abstract methodsDeliverablesA zipped Java project according to the How to submit Labs and Assignments guide.O.O. Requirements (these items will be part of your grade)One class, one file. Don't create multiple classes in the same .java fileDon't use static variables and methodsEncapsulation: make sure you protect your class variables and provide access to them through get and set methodsAll the classes are required to have a constructor that receives all the attributes as parameters and update the attributes accordinglyAll the classes are required to have an "empty" constructor that receives no parameters but updates all the attributes as neededFollow Horstmann's Java Language Coding GuidelinesOrganized in packages (MVC - Model - View Controller)Contents
Solution :
App.java:
import Controller.Controller;
import Model.Model;
import View.View;
public class App
{
public static void main(String[] args) // Main method
{
Model model = new Model(); // Creates model object.
View view = new View(); // Creates view object.
Controller controller = new Controller(view, model); // Creates controller object that accepts view and model objects.
}
}
[tex]\text{Controller.java:}[/tex]
package Controller;
[tex]\text{impor}t \text{ Model.Model;}[/tex]
import View.View;
[tex]\text{public class Controller}[/tex]
{
Model model; // Model object
View view; // View object
public Controller(View v, Model m) // Method that imports both model and view classes as objects.
{
model = m;
view = v;
//view.basicDisplay(model.getData()); // basicDisplay method from View class prints FootballPlayer objects as Strings from Model class.
view.basicDisplay(model.getMembers().get(1).getAttributeName(3));
view.basicDisplay(model.getMembers().get(1).getAttribute(3));
view.basicDisplay(model.getMembers().get(1).getAttributeNames());
view.basicDisplay(model.getMembers().get(1).getAttributes());
view.basicDisplay("size of names=" + model.getMembers().get(1).getAttributeNames().size());
view.basicDisplay("size of attributes=" + model.getMembers().get(1).getAttributes().size());
}
}
FootballPlayer.java:
package Model;
import java.util.ArrayList;
public class FootballPlayer extends Person implements TableMember { // Used "extends" keyword to inherit attributes from superclass Person, while using "implements" to implement methods from TableMember interface.
private int number; // Creating private attribute for int number.
private String position; // Creating private attribute for String position.
public FootballPlayer(String name, int feet, int inches, int weight, String hometown, String highSchool, int number, String position) // Full parameter constructor for FootballPlayer object (using "super" keyword to incorporate attributes from superclass).
{
super(name, feet, inches, weight, hometown, highSchool); // Used super keyword to include attributes from superclass.
this.number = number; // Value assigned from getNumber method to private number instance variable for FootballPlayer object.
this.position = position; // Value assigned from getPosition method to private position instance variable for FootballPlayer object.
}
public FootballPlayer() // No parameter constructor for FootballPlayer object.
{
this.number = 0; // Default value assigned to private number instance variable under no parameter constructor for FootballPlayer object.
this.position = "N/A"; // Default value assigned to private position instance variable under no parameter constructor for FootballPlayer object.
}
Override
public String getAttribute(int n) // getAttribute method that is implemented from interface.
{
switch (n) { // Switch statement for each attribute from each FootballPlayer object. Including two local attributes, denoted by this. While the others are denoted by "super".
case 0:
return String.valueOf(this.number); // Use of the dot operator allowed me to discover String.valueOf method to output int attributes as a string.
case 1:
return this.position;
case 2:
return super.getName();
case 3:
return super.getHeight().toString();
case 4:
return String.valueOf(super.getWeight());
case 5:
return super.getHometown();
case 6:
return super.getHighSchool();
default:
return ("invalid input parameter");
}
}
Override
public ArrayList<String> getAttributes() // getAttributes ArrayList method that is implemented from interface.
{
ArrayList<String> getAttributes = new ArrayList<>();
for(int i = 0; i <= 6; i++){ // For loop to add each attribute to the getAttributes ArrayList from getAttributes method.
getAttributes.add(getAttribute(i));
}
return getAttributes;
}
Override
public String getAttributeName(int n) // getAttributeName method implemented from interface.
{
switch (n) { // Switch statement for the name of each attribute from each FootballPlayer object.
case 0:
return "number";
case 1:
return "position";
case 2:
return "name";
case 3:
return "height";
case 4:
return "weight";
case 5:
return "hometown";
case 6:
return "highSchool";
default:
return ("invalid input parameter");
}
}
Which of the following CALL instructions writes the contents of EAX to standard output as a signed decimal integer?
a. call WriteInteger
b. call WriteDec
c. call WriteHex
d. call WriteInt
Answer:
d. call WriteInt
Explanation:
Required
Instruction to write to decimal integer
Of the 4 instructions, the call WriteInt instruction is used write to a decimal integer.
This is so, because the WriteInt instruction writes a signed decimal integer to standard output.
This implies that the output will have a sign (positive or negative) and the output will start from a digit other than 0 (i.e. no leading zero)
LAB: Winning team (classes)
Complete the Team class implementation. For the class method get_win_percentage(), the formula is:
team_wins / (team_wins + team_losses)
Note: Use floating-point division.
Ex: If the input is:
Ravens
13
3
where Ravens is the team's name, 13 is the number of team wins, and 3 is the number of team losses, the output is:
Congratulations, Team Ravens has a winning average!
If the input is Angels 80 82, the output is:
Team Angels has a losing average.
------------------------------------------------------------------------------------------------------------------------------------
We are given:
class Team:
def __init__(self):
self.team_name = 'none'
self.team_wins = 0
self.team_losses = 0
# TODO: Define get_win_percentage()
if __name__ == "__main__":
team = Team()
team_name = input()
team_wins = int(input())
team_losses = int(input())
team.set_team_name(team_name)
team.set_team_wins(team_wins)
team.set_team_losses(team_losses)
if team.get_win_percentage() >= 0.5:
print('Congratulations, Team', team.team_name,'has a winning average!')
else:
print('Team', team.team_name, 'has a losing average.')
Please help, in Python!
Answer:
The function is as follows:
def get_win_percentage(self):
return self.team_wins / (self.team_wins + self.team_losses)
Explanation:
This defines the function
def get_win_percentage(self):
This calculates the win percentage and returns it to main
return self.team_wins / (self.team_wins + self.team_losses)
See attachment for complete (and modified) program.
Answer: def get_win_percentage(self):
Explanation: got it right on edgen
Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data backups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will automatically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, BackBlaze, and others you might find in your research. Recommend a service that you consider the best solution for Heinrich. Discuss your reviews and mention speed, security, and features in your recommendation.
Answer:
Acronis True Image is the one I would recommend out of these mentioned online backup services.
Explanation:
The evaluations and reviews of each of the online backup services are as follows:
a. iDrive
For this, we have:
Speed = 60% - fair
Security = 100% - excellent
Privacy = 88% - very good
Features = 95% - excellent
Pricing = 85% - Very good
Because of its various features, pricing, and usability, IDrive reviews suggest that it is a very efficient online backup solution. However, there have been complaints concerning its speed and the fact that there are no monthly plans available.
b. Carbonite
For this, we have:
Speed = 60% - fair
Security = 100% - excellent
Privacy = 87% - very good
Pricing = 85% - very good
File backup and restoration = 75% - good
Carbonite reviews reveal that it is simple to use and provides limitless backup for one device. The main drawback is that it has extremely poor backup speeds.
c. Acronis True Image
This is fast, simple and intuitive
It has complete control over the backup updates, including how and when they occur.
It is not expensive.
Acrnonis True image is a powerful backup storage service. It enables data and file backup and restoration from USB drives.
Many reviewers of Acrnonis True image have stated that they have had no issues with its service, that it is worth purchasing, and that there are no concerns.
d. Backblaze
For this, we have:
Speed = 75% - good
Security = 75% - good
Privacy = 70% - decent
Pricing = 100% - excellent
Support = 95% - excellent
Features = 65% - decent
File back-up and restoration = 70% - decent
Backblaze is one of the most popular internet backup services. This storage service, however, does not allow for ustomization.
Recommendation
Acronis True Image is the one I would recommend out of these mentioned online backup services. This is due to the fact that it delivers a large amount of accurate and high-quality data storage. It is quick, simple and intuitive, which is what most people care about. Furthermore, reviewers have stated that this service is quite effective and that there have been very few issues with it. The other services demonstrate that their services have flaws, such as lack of customization and slowness.
The number of host addresses are available on the network 172.16.128.0 with a subnet mask of 255.255.252.0. Show the calculations.
Answer:
adress: 10101100.00010000.1 0000000.00000000
netmask: 11111111.11111111.1 0000000.00000000
Network: 172.16.128.0/17 10101100.00010000.1 0000000.00000000 (Class B)
Explanation:
ex: 10 -> 00001010
200 ->11001000
Ten examples of an interpreter
Answer:
Some popular examples of today's interpreters are:
Interpreter of PythonInterpreter for RubyPerl performerInterpreter for PHPMATLAB UCSD PascalExplanation:
An interpreter executes the commands directly in an object code or a machine code, written in a program or a scripting language.
The Interpreter can be referred to as system software that can read and execute the programme instead of interpreting programmes. This interpretation includes high-level source code, pre-compiled programmes and scripts.
It is important to note that the interpreter translates programme by programme line, meaning that one statement is translated on one go. This feature makes it easy for programmers to check any line on debugging but slows the whole programme running time.
Design a class named Employee. The class should keep the following information in member variables:
Employee name
Employee number
Hire Date
Write one or more constructors and the appropriate accessor and mutator functions for the class.
Next, write a class named ProductionWorker that is derived from the Employee class. The ProductionWorker class should have member variables to hold the following information:
Shift (an integer)
Hourly pay rate (a double)
The workday is divided into two shifts: day and night. The shift variable will hold an integer value representing the shift that the employee works. The day shift is shift 1 and the night shift is shift 2. Write one or more constructors and the appropriate accessor and mutator functions for the class. Demonstrate the classes by writing a program that uses a ProductionWorker object."
Now I have written out the program, it compiles without errors. However, when I run it It asks the first question "Employees name" after input it errors and closes itself down. Can anyone find where in my code it is causing it to do this please? To be clear, I am not asking for someone to write the program, I have already done this, just need to know why it compiles but does not run all the way through. Thank You!
#include
#include
#include
using namespace std;
class Employee
{
private:
string employeeName;
int employeeNumber;
int hireDate;
public:
void setemployeeName(string employeeName);
void setemployeeNumber(int);
void sethireDate(int);
string getemployeeName() const;
int getemployeeNumber() const;
int gethireDate() const;
Employee();
{
Answer:
Here is the code.
Explanation:
#include <iostream>
#include <cstdlib>
#include <string>
#include <iomanip>
using namespace std;
class Employee
{
private:
string employeeName;
int employeeNumber;
int hireDate;
public:
void setemployeeName(string employeeName);
void setemployeeNumber(int);
void sethireDate(int);
string getemployeeName() const;
int getemployeeNumber() const;
int gethireDate() const;
Employee();
};
void Employee::setemployeeName(string employeeName)
{
employeeName = employeeName;
}
void Employee::setemployeeNumber(int b)
{
employeeNumber = b;
}
void Employee::sethireDate(int d)
{
hireDate = d;
}
string Employee::getemployeeName() const
{
return employeeName;
}
int Employee::getemployeeNumber() const
{
return employeeNumber;
}
int Employee::gethireDate() const
{
return hireDate;
}
Employee::Employee()
{
cout << "Please answer some questions about your employees, ";
}
class ProductionWorker :public Employee
{
private:
int Shift;
double hourlyPay;
public:
void setShift(int);
void sethourlyPay(double);
int getShift() const;
double gethourlyPay() const;
ProductionWorker();
};
void ProductionWorker::setShift(int s)
{
Shift = s;
}
void ProductionWorker::sethourlyPay(double p)
{
hourlyPay = p;
}
int ProductionWorker::getShift() const
{
return Shift;
}
double ProductionWorker::gethourlyPay() const
{
return hourlyPay;
}
ProductionWorker::ProductionWorker()
{
cout << "Your responses will be displayed after all data has been received. "<<endl;
}
int main()
{
ProductionWorker info;
string name;
int num;
int date;
int shift;
double pay;
cout << "Please enter employee name: ";
cin >> name;
cout << "Please enter employee number: ";
cin >> num;
cout << "Please enter employee hire date using the format \n";
cout << "2 digit month, 2 digit day, 4 digit year as one number: \n";
cout << "(Example August 12 1981 = 08121981)";
cin >> date;
cout << "Which shift does the employee work: \n";
cout << "Enter 1, 2, or 3";
cin >> shift;
cout << "Please enter the employee's rate of pay: ";
cin >> pay;
info.setemployeeName(name);
info.setemployeeNumber(num);
info.sethireDate(date);
info.setShift(shift);
info.sethourlyPay(pay);
cout << "The data you entered for this employee is as follows: \n";
cout << "Name: " << info.getemployeeName() << endl;
cout << "Number: " << info.getemployeeNumber() << endl;
cout << "Hire Date: " << info.gethireDate() << endl;
cout << "Shift: " << info.getShift() << endl;
cout << setprecision(2) << fixed;
cout << "Pay Rate: " << info.gethourlyPay() << endl;
system("pause");
return 0;
}
Tạo thủ tục có tên _Pro04 để trả về số lượng tổng thời gian tham gia dự án Y của nhân viên có mã số X, với X là tham số đầu vào, Y là tham số đầu ra
Answer:
nigro
Explanation:
In a relational database, the three basic operations used to develop useful sets of data are:_________.
a. select, project, and join.
b. select, project, and where.
c. select, from, and join.
d. select, join, and where.
In a relational database, the three basic operations used to develop useful sets of data are:
[tex]\sf\purple{a.\: Select, \:project,\: and\: join. }[/tex]
[tex]\large\mathfrak{{\pmb{\underline{\orange{Mystique35 }}{\orange{❦}}}}}[/tex]
The basic operations used to develop useful sets of data in relational database are Select, Project and Join.
The Select and Project are of important use in selecting columns or attributes which we want to display or include in a table. The join function allows the merging of data tables to form a more complete and all round dataset useful for different purposes.Hence, the basic operations are select, project, and join.
Learn more : https://brainly.com/question/14760328
Viết chương trình kiểm tra số nguyên dương N có phải là số nguyên tố không?
Several families are planning a shared car trip on scenic drives in New Hampshire's White Mountains. To minimize the possibility of any quarrels, they want to assign individuals to cars so that no two members of a family are in the same car. Explain how to formulate this problem as a network flow problem.
Answer:
Following are the response to the given question:
Explanation:
Build a spring, sink, vertices, and vertices for each car for a household. Every unit in the stream is a human. Attach the source from each vertical of a family with such a capacity line equivalent to the family size; this sets the number of members in each household. Attach every car vertices to the sink with the edge of the car's passenger belt; this assures the correct number of people for every vehicle. Connecting every vertex in your household to any vertex in your vehicle with a capacity 1 border guarantees that one family member joins a single car. The link between both the acceptable allocation of people to vehicles as well as the maximum flow inside the graph seems clear to notice.
3. State whether the given statements are true or false. a. The computer is called a data processor because it can store, process, and retrieve data whenever needed. b. Modern processors run so fast in term of megahertz (MHz). c. If millions of calculations are to be performed, a computer will perform every calculation with the same accuracy. d. It is very safe to store data and information on the computer independently. e. If some electrical or electronic damages occur, there are no any chances of data loss or damage f. The output devices of the computer like monitor, printer, speaker, etc. can store meaningful information, g. The input devices can display the output after processing. h. Students can also use computer as their learning tools.
Answer:
a,b,c,d,f,g are true only e is false
Use ordinary pipes to implement an inter-process communication scheme for message passing between processes. Assume that there are two directories, d1 and d2, and there are different files in each one of them. Also, each file contains a short-length string of characters. You have to use a parent process that forks two children processes, and have each child process check one of the directories.
Answer:
Yup
Explanation:
x-1; while x ==1 disp(x) end, then the result a. infinity or b. (1)
Answer:
1 is the answer because ur trying to trick us
Explanation:
The following program generates an error. Why? #include #include using namespace std; class Arcade { public: Arcade(); Arcade(string name, int r); void Print(); private: string arcName; int rating; }; Arcade:: Arcade() { arcName = "New"; rating = 1; } Arcade:: Arcade(string name, int r) { arcName = name; rating = r; } void Arcade:: Print() { cout << "Name is: " << arcName << endl; cout << "Rating is: " << rating << " stars" << endl; } int main() { Arcade myArc(Games Ablaze, 5); myArc.Print(); }
Answer:
The object creation should be Arcade myArc("Games Ablaze",5);
Explanation:
Required
Why does the program generate an error?
The class definition is correctly defined and implemented;
The methods in the class are also correctly defined and implemented.
The error in the program is from the main method i.e.
int main() {
Arcade myArc('ames Ablaze, 5);
myArc.Print();
}
In the class definition;
Variable name was declared as string and variable rating was declared as integer
This means that, a string variable or value must be passed to name and an integer value or variable to rating.
Having said that:
Arcade myArc(Games Ablaze, 5); passes Games Ablaze as a variable to th function.
Game Ablaze is an incorrect string declaration in C++ because of the space in between Game and Ablaze
Also, no value has been assigned to the variable (assume the variable definition is correct).
This will definitely raise an error.
To correct the error, rewrite the object creation as:
Arcade myArc("Games Ablaze",5); where "Game Ablaze" is passed as string
Telecommunications and software development are examples of information technology careers.
True
False
Answer:
True
Explanation:
Information technology may be described as the use of systems to aid application designs capable of sending and receiving information and building a communication pathway for individuals and companies. It also involves retrieving, storing large chunks of information and organizational data usually in databases to fast track the seamless functioning of the organization's system. The information technology ecosystem is very broad from those charged with ensuring effective communication such as telecommunications platforms and those who build and develop technologies for effective communication and data storage. Hence, both Telecommunications and software development are examples of information technology careers.
What does Falstaff do to protect himself in battle?
A network technician is planning to update the firmware on a router on the network. The technician has downloaded the file from the vendor's website. Before installing the firmware update, which of the following steps should the technician perform to ensure file integrity?
a. Perform antivirus and anti-malware scans of the file.
b. Perform a hash on the file for comparison with the vendor’s hash.
c. Download the file a second time and compare the version numbers.
d. Compare the hash of the file to the previous firmware update.
Answer: B. Perform a hash on the file for comparison with the vendor’s hash.
Explanation:
Before installing the firmware update, the step that the technician should perform to ensure file integrity is to perform a hash on the file for comparison with the vendor’s hash.
Hashing refers to the algorithm that is used for the calculation of a string value from a file. Hashes are helpful in the identification of a threat on a machine and when a user wants to query the network for the existence of a certain file.
Think about that the C, B and S parameters of a Cache. Think about what happens to compulsory, capacity, conflict misses, if only each of the following parameter changed (the other two are kept the same)?
(i) C is increased (S, B same)
(ii) S is increased (C, B Same)
(iii) B is increased (C, S Same)
Answer:
(i) C is increased (S, B same)
Explanation:
Cache are items which are stored in the computer at a hidden place. These are sometimes unwanted and they may hinder the speed and performance of the device. They exist to bridge speed gap.
What intangible benefits might an organization obtain from the development of an
information system?
Answer:
The immaterial benefits stem from the development of an information system and cannot easily be measured in dollars or with confidence. Potential intangible advantages include a competitive need, timely information, improved planning and increased flexibility in organisation.
Explanation:
Intangible advantages
Take faster decisionsCompetitive needMore information timelyNew, better or more information availability.Lower productivity and the lack of 'think outside' employees and managers as well as greater sales include the intangible costs of such an operational environment. All these factors improve when employees spend less of their time in addressing current methods of operation and are concerned about whether they will have a job or an employer in six months or a year. The automation level envisaged in this new system should enhance the overall efficiency of management. The operative controls and design functions should be simplified by tight system integrations with accessible automated database sources. However, it is difficult to describe the exact form of these simplifications.
Tangible costs of the new system include costs of analysis, design and construction of the system, such as the recruitment of contractors or new employees, and the assignment of existing staff. Also consideration shall be given to hardware, software purchased and operating costs. Intangible costs include disturbances to the current activities caused by development and deployment and potential adverse effects on the morals of employees.
While the new system may feel good in the long term, short-term stress and other negative consequences will still be present. In the way that Reliable does virtually everything, the system is the focus of a major change. An organisation's monumental change has widespread negative effects on operations and employees.
Every Java statement ends with: *
Period
Colon
Double quote
Semicolon
Answer:
semicolon is the answer
Reverse Word Order: Write a program that reverses the order of the words in a given sentence. This program requires reversing the order of the words wherein the first and last words are swapped, followed by swapping the second word with the second to last word, followed by swapping the third word and the third to last words, and so on. Your program will ask the user for an input string and print out the resultant string where the order of the words is reversed. Please see the hints section for more details on an example algorithm. Assume a maximum C-string size of 1000 characters. Make sure your code works for any input number, not just the test cases. Your code will be tested on other test cases not listed here. Do Not Use Predefined Functions from the cstring Library. Please properly comment your code before submission.For this part of the assignment, name your source file as Reverse Word Order_WSUID.cpp. For example, if your user ID is A999B999 name your file as Reverse Word Order_A999B999.cpp. Sample Test Cases: Test Case 1: Input: London bridge has been abducted Output: abducted been has bridge London Test Case 2: Input: Hello World Output: World Hello Test Case 3: Input: Hello World, how are you? Output: you? Are how World, HelloTest Case 4: Input: I like toast Output: toast like l
Answer:
The program in C++ is as follows:
#include <bits/stdc++.h>
using namespace std;
int main(){
string sentence,word="";
getline (cin, sentence);
vector<string> for_reverse;
for (int i = 0; i < sentence.length(); i++){
if (sentence[i] == ' ') {
for_reverse.push_back(word);
word = ""; }
else{ word += sentence[i];} }
for_reverse.push_back(word);
sentence="";
for (int i = for_reverse.size() - 1; i > 0; i--){
sentence+=for_reverse[i]+" ";}
sentence+=for_reverse[0];
cout<<sentence<<endl;
return 0;
}
Explanation:
This declares sentence and word as strings; word is then initialized to an empty string
string sentence,word="";
This gets input for sentence
getline (cin, sentence);
This creates a string vector to reverse the input sentence
vector<string> for_reverse;
This iterates through the sentence
for (int i = 0; i < sentence.length(); i++){
This pushes each word of the sentence to the vector when space is encountered
if (sentence[i] == ' ') {
for_reverse.push_back(word);
Initialize word to empty string
word = ""; }
If the encountered character is not a blank space, the character is added to the current word
else{ word += sentence[i];} }
This pushes the last word to the vector
for_reverse.push_back(word);
This initializes sentence to an empty string
sentence="";
This iterates through the vector
for (int i = for_reverse.size() - 1; i > 0; i--){
This generates the reversed sentence
sentence+=for_reverse[i]+" ";}
This adds the first word to the end of the sentence
sentence+=for_reverse[0];
Print the sentence
cout<<sentence<<endl;