Answer:
The java program for the given scenario is as follows.
import java.util.*;
//interface with method area
interface ObjectWithTwoParameters
{
double area (double d1, double d2);
}
class RectangleClass implements ObjectWithTwoParameters
{
//overriding area()
public double area (double d1, double d2)
{
return d1*d2;
}
}
class TriangleClass implements ObjectWithTwoParameters
{
//overriding area()
public double area (double d1, double d2)
{
return (d1*d2)/2;
}
}
class CylinderClass implements ObjectWithTwoParameters
{
public double area (double d1, double d2)
{
return ( 2*3.14*d1*d1 + d2*(2*3.14*d1) );
}
}
public class Test
{
public static void main(String[] args)
{
//area displayed for all three shapes
ObjectWithTwoParameters r = new RectangleClass();
double arear = r.area(2, 3);
System.out.println("Area of rectangle: "+arear);
ObjectWithTwoParameters t = new TriangleClass();
double areat = t.area(4,5);
System.out.println("Area of triangle: "+areat);
ObjectWithTwoParameters c = new CylinderClass();
double areac = c.area(6,7);
System.out.println("Area of cylinder: "+areac);
}
}
OUTPUT
Area of rectangle: 6.0
Area of triangle: 10.0
Area of cylinder: 489.84
Explanation:
1. The program fulfils all the mentioned requirements.
2. The program contains one interface, ObjectWithTwoParameters, three classes which implement that interface, RectangleClass, TriangleClass and CylinderClass, and one demo class, Test, containing the main method.
3. The method in the interface has no access specifier.
4. The overridden methods in the three classes have public access specifier.
5. No additional variables have been declared.
6. The test class having the main() method is declared public.
7. The area of the rectangle, triangle and the cylinder have been computed as per the respective formulae.
8. The interface is similar to a class which can have only declarations of both, variables and methods. No method can be defined inside an interface.
9. The other classes use the methods of the interface by implementing the interface using the keyword, implements.
10. The object is created using the name of the interface as shown.
ObjectWithTwoParameters r = new RectangleClass();
Double any element's value that is less than minValue. Ex: If minValue = 10, then dataPoints = {2, 12, 9, 20} becomes {4, 12, 18, 20}.
import java.util.Scanner;
public class StudentScores {
public static void main (String [] args) {
Scanner scnr = new Scanner(System.in);
final int NUM_Points = 4;
int[] dataPoints = new int[NUM_POINTS];
int minValue;
int i;
minValue = scnr.nextInt();
for (i = 0; i < dataPoints.length; ++i) {
dataPoints[i] = scnr.nextInt();
}
/* Your solution goes here */
for (i = 0; i < dataPoints.length; ++i) {
System.out.print(dataPoints[i] + " ");
}
System.out.println();
}
}
Answer:
Following are the code to this question:
for(i=0;i<dataPoints.length;++i) //define loop to count array element
{
if(dataPoints[i]<minValue) // define condition that checks array element is less then minValue
{
dataPoints[i] = dataPoints[i]*2; //double the value
}
}
Explanation:
Description of the code as follows:
In the given code, a for loop is declared, that uses a variable "i", which counts all array element, that is input by the user. Inside the loop and if block statement is used, that check array element value is less then "minValue", if this condition is true. So, inside the loop, we multiply the value by 2.Suppose that a program's data and executable code require 1,024 bytes of memory. A new section of code must be added; it will be used with various values 70 times during the execution of a program. When implemented as a macro, the macro code requires 73 bytes of memory. When implemented as a procedure, the procedure code requires 132 bytes (including parameter-passing, etc.), and each procedure call requires 7 bytes. How many bytes of memory will the entire program require if the new code is added as a procedure? 1,646
Answer:
The answer is 1646
Explanation:
The original code requires 1024 bytes and is called 70 times ,it requires 7 byte and its size is 132 bytes
1024 + (70*7) + 132 = 1024 + 490 +132
= 1646
write the steps to insert picture water mark
Answer:
Is there a picture of the question?
Explanation:
Evaluati urmatoarele expresii
5+2*(x+4)/3, unde x are valoare 18
7/ 2*2+4*(5+7*3)>18
2<=x AND x<=7 , unde x are valoare 23
50 %10*5=
31250/ 5/5*2=
Answer:
A) 22 ⅓
B) 111>18
C) There is an error in the expression
D) 25
E) 62500
Question:
Evaluate the following expressions
A) 5 + 2 * (x + 4) / 3, where x has a value of 18
B) 7/2 * 2 + 4 * (5 + 7 * 3) & gt; 18
C) 2 <= x AND x<= 7, where x has value 23
D) 50% 10 * 5 =
F) 31250/5/5 * 2 =
Explanation:
A) 5 + 2 * (x + 4) / 3
x = 18
First we would insert the value of x
5 + 2 * (x + 4) / 3
5 + 2(18 + 8) / 3
Then we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.
= 5 + 2(26) / 3
= 5 + 52/3
= 5 + 17 ⅓
= 22 ⅓
B) 7/2 * 2 + 4 * (5 + 7 * 3) > 18
we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.
7/2 * 2 + 4 * (5 + 7 * 3) >18
= 7/2 × 2 + 4× (5 + 7 × 3)>18
= (7×2)/2 + 4× (5+21) >18
= 14/2 + 4(26) >18
= 7 + 104 >18
= 111>18
C) 2 <= x AND x<= 7, where x has value 23
There is an error in the expression
D) 50% of 10 * 5
we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.
The 'of' expression means multiplication
= 50% × 10×5
= 50% × 50
50% = 50/100
=50/100 × 50
= 1/2 × 50
= 25
F) 31250/5/5 * 2
The expression has no demarcation. Depending on how it is broken up, we would arrive at different answers. Let's consider:
31250/(5/5 × 2)
Apply BODMAS
= 31250/[5/(5 × 2)]
= 31250/(5/10)
= 31250/(1/2)
Multiply by the inverse of 1/2 = 2/1
= 31250 × (2/1)
= 62500
An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel iframe that directs all website visitors to a webpage of his choosing that then installs malware on the visitors' computers. The attacker did this explicitly because he knows that US policymakers frequent the website. This would be an example of a ___________ attack.
Answer:
Water holing is the correct answer to this question.
Explanation:
Waterholing:-
It is a kind of attack in which the attacker detects the sites that the targets of the group frequently access and then afflicts the sites with the ransomware. Which afflicts selected representatives of the target group.
The watering hole assault is a data breach wherein the individual attempts to infiltrate a particular demographic of end-users by harming sites reported to be visited by team members. The aim is to compromise a specific target data and gain network access at the perpetrator's place of work.
what should i name my slideshow if its about intellectual property, fair use, and copyright
Answer:
You should name it honest and sincere intention
Explanation:
That is a good name for what you are going to talk about in your slideshow.
Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bits memory address references given as word addresses. 0x03, 0xb4, 0x2b, 0x02, 0xbf, 0x58, 0xbe, 0x0e, 0xb5, 0x2c, 0xba, 0xfd For each of these references identify the binary word address, the tag, and the index given a direct mapped cache with 16 one-word blocks. Also list whether each reference is a hit or a miss, assuming the cache is initially empty.
Answer:
See explaination
Explanation:
please kindly see attachment for the step by step solution of the given problem.
Trace the complete execution of the MergeSort algorithm when called on the array of integers, numbers, below. Show the resulting sub-arrays formed after each call to merge by enclosing them in { }. For example, if you originally had an array of 5 elements, a = {5,2,8,3,7}, the first call to merge would result with: {2, 5} 8, 3, 7 ← Note after the first call to merge, two arrays of size 1 have been merged into the sorted subarray {2,5} and the values 2 and 5 are sorted in array a You are to do this trace for the array, numbers, below. Be sure to show the resulting sub-arrays after each call to MergeSort. int[] numbers = {23, 14, 3, 56, 17, 8, 42, 18, 5};
Answer:
public class Main {
public static void merge(int[] arr, int l, int m, int r) {
int n1 = m - l + 1;
int n2 = r - m;
int[] L = new int[n1];
int[] R = new int[n2];
for (int i = 0; i < n1; ++i)
L[i] = arr[l + i];
for (int j = 0; j < n2; ++j)
R[j] = arr[m + 1 + j];
int i = 0, j = 0;
int k = l;
while (i < n1 && j < n2) {
if (L[i] <= R[j]) {
arr[k] = L[i];
i++;
} else {
arr[k] = R[j];
j++;
}
k++;
}
while (i < n1) {
arr[k] = L[i];
i++;
k++;
}
while (j < n2) {
arr[k] = R[j];
j++;
k++;
}
printArray(arr, l, r);
}
public static void sort(int[] arr, int l, int r) {
if (l < r) {
int m = (l + r) / 2;
sort(arr, l, m);
sort(arr, m + 1, r);
merge(arr, l, m, r);
}
}
static void printArray(int[] arr, int l, int r) {
System.out.print("{");
for (int i = l; i <= r; ++i)
System.out.print(arr[i] + " ");
System.out.println("}");
}
public static void main(String[] args) {
int[] arr = {23, 14, 3, 56, 17, 8, 42, 18, 5};
sort(arr, 0, arr.length - 1);
}
}
Explanation:
See answer