Answer:
And user documentation consists of instructions and information to users who will interact with the system
Explanation:
user documentation will not allow user to prepare overall documentation because it is already prepared so not A.
user documentation does not need implementation, So not B.
user documentation may not be a printed one . So not C
And user documentation consists of instructions and information to users who will interact with the system, so D is the right option
Who is your favorite smite god in Hi-Rez’s “Smite”
Answer:
Variety
Explanation:
How we can earn from an app
Answer:
Hewo, Here are some ways in which apps earn money :-
AdvertisementSubscriptionsIn-App purchasesMerchandisePhysical purchasesSponsorshiphope it helps!
Reggie receives a phone call from a computer user at his company who says that his computer would not turn on this morning. After asking questions, Reggie realizes that the computer seems to turn on because the user can hear fans spinning and the indicator light comes on and flashes during the boot. The Num Lock key is on, but there is no video on the monitor. Reggie also learns that the computer has a new video card. The night before the computer was working fine, according to the user. Reggie tests the video cord and the monitor. When Reggie reattaches the video cable to the video card port, the computer appears to be working. What might be the problem?
Answer:
The Integrated video may not be working properly well or functioning well.
Explanation:
Solution:
In this case, it is known that the computer was working fine a night before the problem.
If the video cable is connected to a wrong video port, then the computer was unable to work previous night.the integrated video cord has not seated because most times it occurs, due to the heat sink in the card. after restoring the video cable to the video card port, it works.
If the video was disabled in BIOS/UEFI, it does not show video, even after restoring the cable.
Select the correct navigational path to create the function syntax to use the IF function.
Click the Formula tab on the ribbon and look in the ???
'gallery
Select the range of cells.
Then, begin the formula with the ????? click ?????. and click OK.
Add the arguments into the boxes for Logical Test, Value_if_True, and Value_if_False.
Answer:
1. Logical
2.=
3.IF
Explanation:
just did the assignment
What should the timing of transition slides be per minute?
Maintain the flow of the presentation to
slides per minute
Answer:
15 seconds
Explanation:
A presentation slide is supposed to be on for 15 seconds and stop to ask if anyone has any questions, if you are explaining something or reading alond with the slide it could be as long as you want it to be.
Answer:
4 slides per minute
Explanation:
What is the best thing to do if you only want your close friends to be able to see your posts?
A
Avoid posting details about your life.
B
Check your privacy settings.
C
Choose your posts carefully.
D
Only post photos instead of comments.
Answer:
check privacy settings. There will be a filter i am pretty sure :)
The cord of a bow string drill was used for
a. holding the cutting tool.
b. providing power for rotation.
c. transportation of the drill.
d. finding the center of the hole.
Answer:
I don't remember much on this stuff but I think it was B
Define a function CoordTransform() that transforms the function's first two input parameters xVal and yVal into two output parameters xValNew and yValNew. The function returns void. The transformation is new = (old + 1) * 2. Ex: If xVal = 3 and yVal = 4, then xValNew is 8 and yValNew is 10.
Answer:
Check the explanation
Explanation:
#include <iostream>
using namespace std;
void CoordTransform(int x, int y, int& xValNew,int& yValNew){
xValNew = (x+1)*2;
yValNew = (y+1)*2;
}
int main() {
int xValNew = 0;
int yValNew = 0;
CoordTransform(3, 4, xValNew, yValNew);
cout << "(3, 4) becomes " << "(" << xValNew << ", " << yValNew << ")" << endl;
return 0;
}
3. Write a project named Money that prompts for and reads a double value representing a monetary amount. Then determine the fewest number of each bill and coin needed to represent that amount, starting with the highest (assume that a ten-dollar bill is the maximum size need). For example, if the value entered is 47.63 (forty-seven dollars and sixty-three cents), then the program should print the equivalent amount as:
Answer: Provided in the explanation segment
Explanation:
The following code provides answers to the given problem.
import java.util.*;
public class untitled{
public static void main(String[] args)
{int tens,fives,ones,quarters,dimes,nickles,pennies,amt;
double amount;
Scanner in = new Scanner(System.in);
System.out.println("What do you need to find the change for?");
amount=in.nextDouble();
System.out.println("Your change is");
amt=(int)(amount*100);
tens=amt/1000;
amt%=1000;
fives=amt/500;
amt%=500;
ones=amt/100;
amt%=100;
quarters=amt/25;
amt%=25;
dimes=amt/10;
amt%=10;
nickles=amt/5;
pennies=amt%5;
System.out.println(tens +" ten dollar bills");
System.out.println(fives +" five dollar bills");
System.out.println(ones +" one dollar bills");
System.out.println(quarters +" quarters");
System.out.println(dimes +" dimes");
System.out.println(nickles +" nickles");
System.out.println(pennies +" pennies");
}
}
cheers i hope this helped !!
Let A be an array of n numbers. Recall that a pair of indices i, j is said to be under an inversion if A[i] > A[j] and i < j. Design a divide-and-conquer based algorithm to count the number of inversions in an array of n numbers. You can start by splitting into two subproblems. Answer clearly how you do the merge step, then obtain a recurrence relation that captures the run time of the algorithm. Solve the recurrence relation. Write the complete pseudocode.
Answer:
Check the explanation
Explanation:
#include <stdio.h>
int inversions(int a[], int low, int high)
{
int mid= (high+low)/2;
if(low>=high)return 0 ;
else
{
int l= inversions(a,low,mid);
int r=inversions(a,mid+1,high);
int total= 0 ;
for(int i = low;i<=mid;i++)
{
for(int j=mid+1;j<=high;j++)
if(a[i]>a[j])total++;
}
return total+ l+r ;
}
}
int main() {
int a[]={5,4,3,2,1};
printf("%d",inversions(a,0,4));
return 0;
}
Check the output in the below attached image.
Implement the function get_stats The function get_stats calculates statistics on a sample of values. It does the following: its input parameter is a csv string a csv (comma separated values) string contains a list of numbers (the sample) return a tuple that has 3 values: (n, stdev, mean) tuple[0] is the number of items in the sample tuple[1] is the standard deviation of the sample tuple[2] is the mean of the sample
Answer:
Check the explanation
Explanation:
PYTHON CODE: (lesson.py)
import statistics
# function to find standard deviation, mean
def get_stats(csv_string):
# calling the function to clean the data
sample=clean(csv_string)
# finding deviation, mean
std_dev=statistics.stdev(sample)
mean=statistics.mean(sample)
# counting the element in sample
count=len(sample)
# return the results in a tuple
return (count, std_dev, mean)
# function to clean the csv string
def clean(csv_string):
# temporary list
t=[]
# splitting the string by comma
data=csv_string.split(',')
# looping item in data list
for item in data:
# removing space,single quote, double quote
item=item.strip()
item= item.replace("'",'')
item= item.replace('"','')
# if the item is valid
if item:
# converting into float
try:
t.append(float(item))
except:
continue
# returning the list of float
return t
if __name__=='__main__':
csv = "a, 1, '-2', 2.35, None,, 4, True"
print(clean(csv))
print(get_stats('1.0,2.0,3.0'))
Which of the following should be the first page of a report?
O Title page
Introduction
O Table of contents
Terms of reference
Answer:
Title page should be the first page of a report.
hope it helps!
Rewrite this if/else if code segment into a switch statement int num = 0; int a = 10, b = 20, c = 20, d = 30, x = 40; if (num > 101 && num <= 105) { a += 1; } else if (num == 208) { b += 1; x = 8; } else if (num > 208 && num < 210) { c = c * 3; } else { d += 1004; }
Answer:
public class SwitchCase {
public static void main(String[] args) {
int num = 0;
int a = 10, b = 20, c = 20, d = 30, x = 40;
switch (num){
case 102: a += 1;
case 103: a += 1;
case 104: a += 1;
case 105: a += 1;
break;
case 208: b += 1; x = 8;
break;
case 209: c = c * 3;
case 210: c = c * 3;
break;
default: d += 1004;
}
}
}
Explanation:
Given above is the equivalent code using Switch case in JavaThe switch case test multiple levels of conditions and can easily replace the uses of several if....elseif.....else statements.When using a switch, each condition is treated as a separate case followed by a full colon and the the statement to execute if the case is true.The default statement handles the final else when all the other coditions are falseWhich of the following is an example of the rewards & consequences characteristic of an organization?
OOO
pay raise
time sheets
pay check
pay scale
Answer:
Pay raise is an example of the rewards & consequences characteristic of an organization.
the smallest unit of time in music called?
Answer:
Ready to help ☺️
Explanation:
A tatum is a feature of music that has been defined as the smallest time interval between notes in a rhythmic phrase.
Answer:
A tatum bc is a feature of music that has been variously defined as the smallest time interval between successive notes in a rhythmic phrase "the shortest durational value
Design a program for the Hollywood Movie Rating Guide, which can be installed in a kiosk in theaters. Each theater patron enters a value from 0 to 4 indicating the number of stars that the patron awards to the Rating Guide's featured movie of the week. If a user enters a star value that does not fall in the correct range, prompt the user continuously until a correct value is entered. The program executes continuously until the theater manager enters a negative number to quit. At the end of the program, display the average star rating for the movie.
Answer:
The program in cpp is given below.
#include <iostream>
using namespace std;
int main()
{
//variables declared to hold sum, count and average of movie ratings
int sum=0;
int count=0;
int rating;
double avg;
//audience is prompted to enter ratings
do{
std::cout << "Enter the rating (0 to 4): ";
cin>>rating;
if(rating>4)
std::cout << "Invalid rating. Please enter correct rating again." << std::endl;
if(rating>=0 && rating<=4)
{
sum=sum+rating;
count++;
}
if(rating<0)
break;
}while(rating>=0);
//average rating is computed
avg=sum/count;
std::cout << "The average rating for the movie is " << avg << std::endl;
return 0;
}
OUTPUT
Enter the rating (0 to 4): 1
Enter the rating (0 to 4): 2
Enter the rating (0 to 4): 0
Enter the rating (0 to 4): 5
Invalid rating. Please enter correct rating again.
Enter the rating (0 to 4): 1
Enter the rating (0 to 4): -1
The average rating for the movie is 1
Explanation:
1. Variables are declared to hold the rating, count of rating, sum of all ratings and average of all the user entered ratings.
2. The variables for sum and count are initialized to 0.
3. Inside do-while loop, user is prompted to enter the rating for the movie.
4. In case the user enters a rating which is out of range, the user is prompted again to enter a rating anywhere from 0 to 4.
5. The loop executes until a negative number is entered.
6. Inside the loop, the running total sum of all the valid ratings is computed and the count variable is incremented by 1 for each valid rating.
7. Outside the loop, the average is computed by dividing the total rating by count of ratings.
8. The average rating is then displayed to the console.
9. The program is written in cpp due to simplicity since all the code is written inside main().
In this lab, you use the flowchart and pseudocode found in the figures below to add code to a partially created C++ program. When completed, college admissions officers should be able to use the C++ program to determine whether to accept or reject a student, based on his or her test score and class rank.
// HouseSign.cpp - This program calculates prices for custom made signs.
#include
#include
using namespace std;
int main()
{
// This is the work done in the housekeeping() function
// Declare and initialize variables here
// Charge for this sign
// Color of characters in sign
// Number of characters in sign
// Type of wood
// This is the work done in the detailLoop() function
// Write assignment and if statements here
// This is the work done in the endOfJob() function
// Output charge for this sign
cout << "The charge for this sign is $" << charge << endl;
return(0);
}
Here is the complete question.
In this lab, you use the flowchart and pseudocode found in the figures below to add code to a partially created C++ program. When completed, college admissions officers should be able to use the C++ program to determine whether to accept or reject a student, based on his or her test score and class rank.
start input testScore,
classRank if testScore >= 90 then if classRank >= 25 then output "Accept"
else output "Reject" endif else if testScore >= 80
then if classRank >= 50 then output "Accept" else output "Reject" endif
else if testScore >= 70
then if classRank >= 75 then output "Accept"
else output "Reject"
endif else output "Reject"
endif
endif
endif
stop
Study the pseudocode in picture above. Write the interactive input statements to retrieve: A student’s test score (testScore) A student's class rank (classRank) The rest of the program is written for you. Execute the program by clicking "Run Code." Enter 87 for the test score and 60 for the class rank. Execute the program by entering 60 for the test score and 87 for the class rank.
[comment]: <> (3. Write the statements to convert the string representation of a student’s test score and class rank to the integer data type (testScore and classRank, respectively).)
Function: This program determines if a student will be admitted or rejected. Input: Interactive Output: Accept or Reject
*/ #include using namespace std; int main() { // Declare variables
// Prompt for and get user input
// Test using admission requirements and print Accept or Reject
if(testScore >= 90)
{ if(classRank >= 25)
{ cout << "Accept" << endl; }
else
cout << "Reject" << endl; }
else { if(testScore >= 80)
{ if(classRank >= 50)
cout << "Accept" << endl;
else cout << "Reject" << endl; }
else { if(testScore >= 70)
{ if(classRank >=75) cout << "Accept" << endl;
else cout << "Reject" << endl; }
else cout << "Reject" << endl; } } } //End of main() function
Answer:
Explanation:
The objective here is to use the flowchart and pseudocode found in the figures below to add code to a partially created C++ program. When completed, college admissions officers should be able to use the C++ program to determine whether to accept or reject a student, based on his or her test score and class rank.
PROGRAM:
#include<iostream>
using namespace std;
int main(){
// Declare variables
int testScore, classRank;
// Prompt for and get user input
cout<<"Enter test score: ";
cin>>testScore;
cout<<"Enter class rank: ";
cin>>classRank;
// Test using admission requirements and print Accept or Reject
if(testScore >= 90)
{ if(classRank >= 25)
{ cout << "Accept" << endl; }
else
cout << "Reject" << endl;
}
else { if(testScore >= 80)
{ if(classRank >= 50)
cout << "Accept" << endl;
else cout << "Reject" << endl; }
else { if(testScore >= 70)
{ if(classRank >=75) cout << "Accept" << endl;
else cout << "Reject" << endl;
}
else cout << "Reject" << endl; }
}
return 0;
} //End of main() function
OUTPUT:
See the attached file below:
What do we call data that's broken down into bits and sent through a network?
Answer:
Bits
Explanation:
Your job as a researcher for a college is going well. You have gained confidence and skill at pulling data and you are not making as many rookie mistakes. The college executives are begging to take notice of your skills. The college has had serious problems with reporting in the past for several reasons. One problem is there was no centralized department for numbers. Human Resources did some reporting, financial aid another, and the rest was covered by the registrar’s office. It was difficult to determine simple things like number of students enrolled in the fall semester because different departments would generate different. The higher ups want one consistent number they can rely on and they think your department should be in charge of generating that number.
As the first report as the official office numbers they want you to generate a report that tracks student demographics over time (a longitudinal study). Your college has a large percentage of its student body who are affiliated with the military (active duty military, retired military, military spouse, military dependent). For this study the college executives want to see how they stack up to other colleges that have a large percentage of military students.
After doing some research you find a field in the database that named mil_status. The documentation you have on the field says this is the field you are looking for. Since you need to determine when the student was in the military to generate this report you look for a start and end date associated with mil_status. Sure enough the table also has a mil_status_start and a mil_status_end field. These fields when combined with enrollment data allow you to determine if a student was in the military when they were a student. You query the data to check for bad dates and discover a serious issue. Most of the start dates and end dates are NULL. You once again make some quick phone calls to find out what’s going on. It seems this field is not populated unless the college receives official paperwork from the military listing the soldier’s enlistment date. In addition to this you find out that students are not required to update their information ever semester. This means once their mil status is set it is unlikely to ever change. Based on this information prepare a post that addresses the following:
1) What recommendation(s) would you make to the college’s executives to address this issue?
2) Collecting this data will have tangible and intangible costs associated with it. For example requiring official paper work adds an extra burden on registration and on the student. Students may decide to go elsewhere instead of supplying the paperwork or may stop identifying themselves as military. The executives want the data but they don’t want its collection to impact enrollment or place an undue burden on registration (the line is long enough already). How would you respond to these concerns?
3) You noticed something odd in the mil_Status field. The possible values are "Active Duty Military", "Military spouse", "Retired military", "Military Reserves", and "Military dependent". In what way is this field problematic? How could you fix it?
Answer:
Check the explanation
Explanation:
Following are the things to be implemented immediately
Database should be maintained centralized manner so that any one can access data. Number should be given at the time of admission it should contain year of admission,course of admission …etc in the form of code eg. 2015FW1001 means year 2015 Fashion studies Winter admission no 1001. At the time of admission only they have to give the details of military status. Department which taking care of this issue should only have the permission to modify and delete the data. All the departments should be connected to the server by internet/intranet/network. Students should be given user id and password
Same database should be connected and given access through internet also with limited privileges so that user can update their status of military by submitting proof. By these information uploaded centralized administrative department update the status if they satisfied with the documents uploaded.
We can overcome the problem of mil status by giving the freedom to the student update their military status by uploading the documents.
6. Why did he choose to install the window not totally plumb?
Answer:
Because then it would break
Explanation:
You achieve this by obtaining correct measurements. When measuring a window, plumb refers to the vertical planes, and level refers to the horizontal planes. So he did not install the window totally plumb
An organization’s SOC analyst, through examination of the company’s SIEM, discovers what she believes is Chinese-state sponsored espionage activity on the company’s network. Management agrees with her initial findings given the forensic artifacts she presents are characteristics of malware, but management is unclear on why the analyst thought it was Chinese-state sponsored. You have been brought in as a consultant to help determine 1) whether the systems have been compromised and 2) whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored. What steps would you take to answer these questions given that you have been provided a MD5 hashes, two call back domains, and an email that is believed to have been used to conduct a spearphishing attack associated with the corresponding MD5 hash. What other threat intelligence can be generated from this information and how would that help shape your assessment?
Answer: Provided in the explanation segment
Explanation:
Below is a detailed explanation to make this problem more clearer to understand.
(1). We are asked to determine whether the systems have been compromised;
Ans: (YES) From the question given, We can see that the System is compromised. This is so because the plan of communication has different details of scenarios where incidents occur. This communication plan has a well read table of contents that lists specific type of incidents, where each incident has a brief description of the event.
(2). Whether the analyst’s assertion has valid grounds to believe it is Chinese state-sponsored.
Ans: I can say that the analyst uses several different internet protocol address located in so as to conduct its operations, in one instance, a log file recovered form an open indexed server revealed tham an IP address located is used to administer the command control node that was communicating with the malware.
(3). What other threat intelligence can be generated from this information?
Ans: The threat that can be generated from this include; Custom backdoors, Strategic web compromises, and also Web Server exploitation.
(4). How would that help shape your assessment?
Ans: This helps in such a way where information is gathered and transferred out of the target network which involve movement of files through multiple systems.
Files also gotten from networks as well as using tools (archival) to compress and also encrypt data with effectiveness of their data theft.
cheers i hope this helped!!!
To encrypt messages I propose the formula C = (3P + 1) mod 27, where P is the "plain text" (the original letter value) and C is the "cipher text" (the encrypted letter value). For example, if P = 2 (the letter 'c' ), C would be 7 (the letter 'h') since (3(2) + 1) mod 27 = 7. There is a problem though: When I send the message 'c' to my friend, encrypted as 'h', they don't know whether the original message was 'c' or another letter that also encrypts to 'h'. What other letter(s) would also encrypt to 'h' besides 'c' in this system?
Answer:
C = (3P+1) % 27
so when P will be max 26,when P is 26 the (3P+1) = 79. And 79/27 = 2 so let's give name n = 2.
Now doing reverse process
We get ,
P = ((27*n)+C-1)/3
Where n can be 0,1,2
So substituting value of n one by one and the C=7(corresponding index of h)
For n= 0,we get P=2, corresponding char is 'c'
For n=1,we get P=11, corresponding char is 'l'
For n=2,we get P= 20, corresponding cahr is 'u'.
So beside 'c',the system will generate 'h' for 'l' and 'u' also.
Design and implement the Heap.h header using the given Heap class below:
template
class Heap
public:
Heap();
Heap(const T elements[], int arraySize); //
Remove the root from the heap and maintain the heap property
T remove() throw (runtime_error);
// Insert element into the heap and maintain the heap property
void add(const T& element);
// Get the number of element in the heap
int getSize() const;
private:
vector v;
Removing the root in a heap - after the root is removed, the tree must be rebuilt to maintain the heap property:
Move the last node to replace the root;
Let the root be the current node;
While (the current node has children and the current node is smaller than one of its children) Swap the current node with the larger of its children; The current node now is one level down;}
Adding a new node - to add a new node to the heap, first add it to the end of the heap and then rebuild the tree as follows:
Let the last node be the current node;
While (the current node is greater than its parent)
{Swap the current node with its parent; The current node now is one level up:}
To test the header file, write the heapSort function and use the following main program:
#include
#include "Heap.h"
using namespace std;
template
void heapSort(T list[], int arraySize) 1/
your code here .. p
int main()
const int SIZE = 9;
int list[] = { 1, 2, 3, 4, 9, 11, 3, 1, 2 }; heapSort(list, SIZE);
cout << "Sorted elements using heap: \n";
for (int i = 0; i < SIZE; i++) cout << list[i] << " ";
cout << endl;
system("pause");
return;
Sample output:
Sorted elements using heap:
1 1 2 3 3 4 7 9 11
Answer:
See explaination
Explanation:
/* Heap.h */
#ifndef HEAP_H
#define HEAP_H
#include<iostream>
using namespace std;
template<class T>
class Heap
{
public:
//constructor
Heap()
{
arr = nullptr;
size = maxsize = 0;
}
//parameterized constructor
Heap(const T elements[], int arraySize)
{
maxsize = arraySize;
size = 0;
arr = new T[maxsize];
for(int i=0; i<maxsize; i++)
{
add(elements[i]);
}
}
//Remove the root from the heap and maintain the heap property
T remove() //code is altered
{
T item = arr[0];
arr[0] = arr[size-1];
size--;
T x = arr[0];
int parent = 0;
while(1)
{
int child = 2*parent + 1;
if(child>=size) break;
if(child+1 < size &&arr[child+1]>arr[child])
child++;
if(x>=arr[child]) break;
arr[parent] = arr[child];
parent = child;
}
arr[parent] = x;
return item;
}
//Insert element into the heap and maintain the heap property
void add(const T&element)
{
if(size==0)
{
arr[size] = element;
size++;
return;
}
T x = element;
int child = size;
int parent = (child-1)/2;
while(child>0 && x>arr[parent])
{
arr[child] = arr[parent];
child = parent;
parent = (child-1)/2;
}
arr[child] = x;
size++;
}
//Get the number of element in the heap
int getSize() const
{
return size;
}
private:
T *arr; //code is altered
int size, maxsize;
};
#endif // HEAP_H
///////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
/* main.cpp */
#include<iostream>
#include "Heap.h"
using namespace std;
template <typename T>
void heapSort(T list[], int arraySize)
{
Heap<T> heap(list, arraySize);
int n = heap.getSize();
for(int i=n-1; i>0; i--)
{
list[i] = heap.remove();
}
}
int main()
{
const int SIZE = 9;
int list[] = {1, 7, 3, 4, 9, 11, 3, 1, 2};
heapSort<int>(list, SIZE);
cout << "Sorted elements using heap: \n";
for (int i = 0; i < SIZE; i++)
cout << list[i] << " ";
cout <<endl;
system("pause");
return 0;
}
2. (8 points) When creating the Academic Database, there were several instances of data
validation. Data types were assigned to each field in the table to stop undesirable values from
being placed into certain fields. A presence check was used on fields that were listed as NOT
NULL, requiring some data to be input. Uniqueness validation was automatically assigned for
fields that were primary keys. Describe at least one field in the Academic Database a table
where range validation could have been used and describe at least one field in the Academic
Database where choice validation could have been used. Your answer should be addressed in
100 to 150 words.
Answer:
See explaination
Explanation:
An Academic Database deals with the information pertaining to the records of students of an institute. The various fields which can be associated with a student are Name, Unique Identification Number, Marks in various subjects, Grades, Courses Taken and so on. Most of the fields mentioned above have some or other form of validation that is required for the DB to be consistent and follow the basic properties of a database.
One field where range validation can be used is MARKS. In the marks field, the range of marks will be say 0 to 100 and anything below 0 or above 100 must be reported to the database administrator. Another field where we can apply a range validation is AGE in which the range of age allowed could greater than say 10, if it is a college and maximum age could be say 60. Thus, the range check on the AGE field is 10 to 60.
One field where choice validation can be used is GENDER. In the gender field, there could be multiple choices like Male, Female and Others. Thus, out of the available choices we have to select only the available choice and only one choice must be selected where we can apply choice validation. Another field is COURSE, where we can have a list of courses a student can opt for and out of the available courses can select one.
Thus, there are multiple fields where we can apply various types of validation and it is important to explore the area for which the DB has been created understanding all the scenarios and attributes of the problems that are associated with that area.
Write a program that maintains a database containing data, such as name and birthday, about your friends and relatives. You should be able to enter, remove, modify, or search this data. Initially, you can assume that the names are unique. The program should be able to save the data in a fi le for use later. Design a class to represent the database and another class to represent the people. Use a binary search tree of people as a data member of the database class. You can enhance this problem by adding an operation that lists everyone who satisfi es a given criterion. For example, you could list people born in a given month. You should also be able to list everyone in the database.
Answer:
[tex]5909? \times \frac{?}{?} 10100010 {?}^{?} 00010.222 {?}^{2} [/tex]
What does the following code do?
package shop.ui;
import javax.swing.JOptionPane;
//import java.io.IOException;
final class PopupUI implements UI {
PopupUI() {}
public void displayMessage(String message) {
JOptionPane.showMessageDialog(null,message);
}
public void displayError(String message) {
JOptionPane.showMessageDialog(null,message,"Error",JOptionPane.ERROR_MESSAGE);
}
public void processMenu(UIMenu menu) {
StringBuffer b = new StringBuffer();
b.append(menu.getHeading());
b.append("\n");
b.append("Enter choice by number:");
b.append("\n");
for (int i = 1; i < menu.size(); i++) {
b.append(" " + i + ". " + menu.getPrompt(i));
b.append("\n");
}
String response = JOptionPane.showInputDialog(b.toString());
int selection;
try {
selection = Integer.parseInt(response, 10);
if ((selection < 0) || (selection >= menu.size()))
selection = 0;
} catch (NumberFormatException e) {
selection = 0;
}
menu.runAction(selection);
}
public String[] processForm(UIForm form) {
// TODO
String[]formArray = new String[form.size()];
for(int i=0;i
{
String message = JOptionPane.showInputDialog(form.getPrompt(i));
formArray[i] = message;
}
return formArray;
}
}
Answer: what is this?
Explanation:
customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practicing presentation skills. As a salesperson what size hard disc would you recommend and why?
Answer:
A 512 GB Solid State Drive (SSD) will be recommended
Explanation:
Recommended hard disk for the installation of Microsoft PowerPoint application is 3 GB and since the computer is a new one it will be best to buy a hard disc with enough room for expansion, performance speed, durability and reliability
Therefore, a 512 GB Solid State Drive (SSD) is recommended as the price difference is small compared to the spinning hard drive and also there is ample space to store PowerPoint training presentation items locally.
Write a program that uses the map template class to compute a histogram of positive numbers entered by the user. The map’s key should be the number that is entered, and the value should be a counter of the number of times the key has been entered so far. Use –1 as a sentinel value to signal the end of user input.512355321-1Then the program should output the followings:The number 3 occurs 2 timesThe number 5 occurs 3 timesThe number 12 occurs 1 timesThe
Answer:
See explaination
Explanation:
#include <iostream>
#include <map>
#include <string>
#include <algorithm>
#include <cstdlib>
#include <iomanip>
using namespace std;
int main()
{
map<int, int> histogram;
int a=0;
while(a>=0)
{
cout << " enter value of a" ;
cin >>a;
histogram[a]++;
}
map<int,int>::iterator it;
for ( it=histogram.begin() ; it != histogram.end(); it++ )
{
cout << (*it).first << " occurs " << setw(3) << (*it).second << (((*it).second == 1) ? " time." : " times.") <<endl;
}
return 0;
}
Computer A has an overall CPI of 1.3 and can be run at a clock rate of 600 MHz. Computer B has a CPI of 2.5 and can be run at a clock rate of 750 MHz. We have a particular program we wish to run. When compiled for computer A, this program has exactly 100,000 instructions. How many instructions would the program need to have when compiled for Computer B, in order for the two computers to have exactly the same execution time for this program
Answer:
Check the explanation
Explanation:
CPI means Clock cycle per Instruction
given Clock rate 600 MHz then clock time is Cー 1.67nSec clockrate 600M
Execution time is given by following Formula.
Execution Time(CPU time) = CPI*Instruction Count * clock time = [tex]\frac{CPI*Instruction Count}{ClockRate}[/tex]
a)
for system A CPU time is 1.3 * 100, 000 600 106
= 216.67 micro sec.
b)
for system B CPU time is [tex]=\frac{2.5*100,000}{750*10^6}[/tex]
= 333.33 micro sec
c) Since the system B is slower than system A, So the system A executes the given program in less time
Hence take CPU execution time of system B as CPU time of System A.
therefore
216.67 micro = =[tex]\frac{2.5*Instruction}{750*10^6}[/tex]
Instructions = 216.67*750/2.5
= 65001
hence 65001 instruction are needed for executing program By system B. to complete the program as fast as system A
The number of instructions that the program would need to have when compiled for Computer B is; 65000 instructions
What is the execution time?
Formula for Execution time is;
Execution time = (CPI × Instruction Count)/Clock Time
We are given;
CPI for computer A = 1.3
Instruction Count = 100000
Clock time = 600 MHz = 600 × 10⁶ Hz
Thus;
Execution time = (1.3 * 100000)/(600 × 10⁶)
Execution time(CPU Time) = 216.67 * 10⁻⁶ second
For CPU B;
CPU Time = (2.5 * 100000)/(750 × 10⁶)
CPU Time = 333.33 * 10⁻⁶ seconds
Thus, instructions for computer B for the two computers to have same execution time is;
216.67 * 10⁻⁶ = (2.5 * I)/(750 × 10⁶)
I = (216.67 * 10⁻⁶ * 750 × 10⁶)/2.5
I = 65000 instructions
Read more about programming instructions at; https://brainly.com/question/15683939
Describe the series of connections that would be made, equipment and protocol changes, if you connected your laptop to a wireless hotspot and opened your email program and sent an email to someone. Think of all the layers and the round trip the information will likely make.
Answer:
Check Explanation.
Explanation:
Immediately there is a connection between your laptop and the wireless hotspot, data will be transferred via the Physical layer that will be used for encoding of the network and the modulation of the network and that layer is called the OSI MODEL.
Another Important layer is the APPLICATION LAYER in which its main aim and objectives is for support that is to say it is used in software supporting.
The next layer is the PRESENTATION LAYER which is used during the process of sending the e-mail. This layer is a very important layer because it helps to back up your data and it is also been used to make connections of sessions between servers of different computers