You're asked to implement classes to manage personnels at a hospital. Create a class diagram that includes classes (and some variables and methods) that manage employees and patients in a hospital management program. Use interfaces and inheritance to create a hierarchy of all employees including doctors, nurses, and patients. Then, write the code outline of these classes. You don't have to implement any of the methods or a main method. Just add a simple comment or println statement describing what the method would do.

Answers

Answer 1

Answer:

Check the explanation

Explanation:

Kindly check the attached image below to see the step by step explanation to the question above.

You're Asked To Implement Classes To Manage Personnels At A Hospital. Create A Class Diagram That Includes

Related Questions

Create a program in Python that prompts the user to enter an integer number within the range of 1 to 10 inclusive. The program should display “correct input” if the input is within the given range else it should display “wrong input”.

Answers

Python Code with Explanation:

# create a function named func to implement the required logic

def func():

# get the input from the user and store it in a variable named number

   number = int(input("Please enter an integer between 1 to 10 inclusive\n"))

# if the input number is equal or greater than 1 and equal to 10 or less then the input is correct    

   if number>=1 and number<=10:

# print correct input

       return print("Correct input")

# else the input is wrong

   else:

# print wrong input

       return print("Wrong input")

# call the function func

func()

Output:

Test 1:

Please enter an integer between 1 to 10 inclusive

4

Correct input

Test 2:

Please enter an integer between 1 to 10 inclusive

0

Wrong input

Test 3:

Please enter an integer between 1 to 10 inclusive

11

Wrong input

Answer:

dont know if it works!

Explanation:

input=(input("enter number")

if input > 1

print("correct input")

if input <10

print("correct input")

else

print("wrong input")

A user has called the company help desk to inform them that their Wi-Fi enabled mobile device has been stolen. A support ticket has been escalated to the appropriate team based on the corporate security policy. The security administrator has decided to pursue a device wipe based on corporate security policy. However, they are unable to wipe the device using the installed MDM solution. What is one reason that may cause this to happen?

Answers

Answer:

The software can't locate the device

Explanation:

The device wasn't properly setup in order for the software to locate it.

Explain the following as used in Tally Accounting Software:
Journal entry
Accounting period
Chart of accounts
Posting
Business transactions​

Answers

business transactions

An attacker compromises the Washington Post's web server and proceeds to modify the homepage slightly by inserting a 1x1 pixel iframe that directs all website visitors to a webpage of his choosing that then installs malware on the visitors' computers. The attacker did this explicitly because he knows that US policymakers frequent the website. This would be an example of a ___________ attack.

Answers

Answer:

Water holing is the correct answer to this question.

Explanation:

Waterholing:-

It is a kind of attack in which the attacker detects the sites that the targets of the group frequently access and then afflicts the sites with the ransomware. Which afflicts selected representatives of the target group.

The watering hole assault is a data breach wherein the individual attempts to infiltrate a particular demographic of end-users by harming sites reported to be visited by team members. The aim is to compromise a specific target data and gain network access at the perpetrator's place of work.

Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bits memory address references given as word addresses. 0x03, 0xb4, 0x2b, 0x02, 0xbf, 0x58, 0xbe, 0x0e, 0xb5, 0x2c, 0xba, 0xfd For each of these references identify the binary word address, the tag, and the index given a direct mapped cache with 16 one-word blocks. Also list whether each reference is a hit or a miss, assuming the cache is initially empty.

Answers

Answer:

See explaination

Explanation:

please kindly see attachment for the step by step solution of the given problem.

Create a Binary Expressions Tree Class and create a menu driven programyour program should be able to read multiple expressions from a file and create expression trees for each expression, one at a timethe expression in the file must be in "math" notation, for example x+y*a/b.display the preorder traversal of a binary tree as a sequence of strings each separated by a tabdisplay the postorder traversal of a binary tree in the same form as aboveWrite a function to display the inorder traversal of a binary tree and place a (before each subtree and a )after each subtree. Don’t display anything for an empty subtree. For example, the expression tree should would be represented as ( (x) + ( ( (y)*(a) )/(b) ) )

Answers

Answer:

Explanation:

Program:

#include<iostream>

#include <bits/stdc++.h>

using namespace std;

//check for operator

bool isOperator(char c)

{

switch(c)

{

case '+': case '-': case '/': case '*': case '^':

return true;

}

return false;

}

//Converter class

class Converter

{

private:

string str;

public:

//constructor

Converter(string s):str(s){}

//convert from infix to postfix expression

string toPostFix(string str)

{

stack <char> as;

int i, pre1, pre2;

string result="";

as.push('(');

str = str + ")";

for (i = 0; i < str.size(); i++)

{

char ch = str[i];

if(ch==' ') continue;

if (ch == '(')

as.push(ch);

else if (ch == ')')

{

while (as.size() != 0 && as.top() != '('){

result = result + as.top() + " ";

as.pop();

}

as.pop();

}

else if(isOperator(ch))

{

while (as.size() != 0 && as.top() != '(')

{

pre1 = precedence(ch);

pre2 = precedence(as.top());

if (pre2 >= pre1){

result = result + as.top() + " ";

as.pop();

}

else break;

}

as.push(ch);

}

else

{

result = result + ch;

}

}

while(as.size() != 0 && as.top() != '(') {

result += as.top() + " ";

as.pop();

}

return result;

}

//return the precedence of an operator

int precedence(char ch)

{

int choice = 0;

switch (ch) {

case '+':

choice = 0;

break;

case '-':

choice = 0;

break;

case '*':

choice = 1;

break;

case '/':

choice = 1;

break;

case '^':

choice = 2;

default:

choice = -999;

}

return choice;

}

};

//Node class

class Node

{

public:

string element;

Node *leftChild;

Node *rightChild;

//constructors

Node (string s):element(s),leftChild(nullptr),rightChild(nullptr) {}

Node (string s, Node* l, Node* r):element(s),leftChild(l),rightChild(r) {}

};

//ExpressionTree class

class ExpressionTree

{

public:

//expression tree construction

Node* covert(string postfix)

{

stack <Node*> stk;

Node *t = nullptr;

for(int i=0; i<postfix.size(); i++)

{

if(postfix[i]==' ') continue;

string s(1, postfix[i]);

t = new Node(s);

if(!isOperator(postfix[i]))

{

stk.push(t);

}

else

{

Node *r = nullptr, *l = nullptr;

if(!stk.empty()){

r = stk.top();

stk.pop();

}

if(!stk.empty()){

l = stk.top();

stk.pop();

}

t->leftChild = l;

t->rightChild = r;

stk.push(t);

}

}

return stk.top();

}

//inorder traversal

void infix(Node *root)

{

if(root!=nullptr)

{

cout<< "(";

infix(root->leftChild);

cout<<root->element;

infix(root->rightChild);

cout<<")";

}

}

//postorder traversal

void postfix(Node *root)

{

if(root!=nullptr)

{

postfix(root->leftChild);

postfix(root->rightChild);

cout << root->element << " ";

}

}

//preorder traversal

void prefix(Node *root)

{

if(root!=nullptr)

{

cout<< root->element << " ";

prefix(root->leftChild);

prefix(root->rightChild);

}

}

};

//main method

int main()

{

string infix;

cout<<"Enter the expression: ";

cin >> infix;

Converter conv(infix);

string postfix = conv.toPostFix(infix);

cout<<"Postfix Expression: " << postfix<<endl;

if(postfix == "")

{

cout<<"Invalid expression";

return 1;

}

ExpressionTree etree;

Node *root = etree.covert(postfix);

cout<<"Infix: ";

etree.infix(root);

cout<<endl;

cout<<"Prefix: ";

etree.prefix(root);

cout<<endl;

cout<< "Postfix: ";

etree.postfix(root);

cout<<endl;

return 0;

}

Evaluati urmatoarele expresii


5+2*(x+4)/3, unde x are valoare 18


7/ 2*2+4*(5+7*3)>18


2<=x AND x<=7 , unde x are valoare 23


50 %10*5=


31250/ 5/5*2=

Answers

Answer:

A) 22 ⅓

B) 111>18

C) There is an error in the expression

D) 25

E) 62500

Question:

Evaluate the following expressions

A) 5 + 2 * (x + 4) / 3, where x has a value of 18

B) 7/2 * 2 + 4 * (5 + 7 * 3) & gt; 18

C) 2 <= x AND x<= 7, where x has value 23

D) 50% 10 * 5 =

F) 31250/5/5 * 2 =

Explanation:

A) 5 + 2 * (x + 4) / 3

x = 18

First we would insert the value of x

5 + 2 * (x + 4) / 3

5 + 2(18 + 8) / 3

Then we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.

= 5 + 2(26) / 3

= 5 + 52/3

= 5 + 17 ⅓

= 22 ⅓

B) 7/2 * 2 + 4 * (5 + 7 * 3) > 18

we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.

7/2 * 2 + 4 * (5 + 7 * 3) >18

= 7/2 × 2 + 4× (5 + 7 × 3)>18

= (7×2)/2 + 4× (5+21) >18

= 14/2 + 4(26) >18

= 7 + 104 >18

= 111>18

C) 2 <= x AND x<= 7, where x has value 23

There is an error in the expression

D) 50% of 10 * 5

we would evaluate the expression by applying BODMAS : This stands for Bracket, Of, Division, Multiplication, addition and subtraction.

The 'of' expression means multiplication

= 50% × 10×5

= 50% × 50

50% = 50/100

=50/100 × 50

= 1/2 × 50

= 25

F) 31250/5/5 * 2

The expression has no demarcation. Depending on how it is broken up, we would arrive at different answers. Let's consider:

31250/(5/5 × 2)

Apply BODMAS

= 31250/[5/(5 × 2)]

= 31250/(5/10)

= 31250/(1/2)

Multiply by the inverse of 1/2 = 2/1

= 31250 × (2/1)

= 62500

4. What are the ethical issues of using password cracker and recovery tools? Are there any limitations, policies, or regulations in their use on local machines, home networks, or small business networks? Where might customer data be stored? Discuss any legal issues in using these tools on home networks in the United States, which has anti-wiretap communications regulations. Who must know about the tools being used in your household?

Answers

Answer:

There are no limitation, policies or regulations that limit these tools for use on privately owned machines or home networks. In most businesses networks, intranets or internets the use of them is illegal if used for malicious intent. Penetration testing teams sign rules of engagement before using these tools.

Explanation:

There are no limitation, limitations, policies, or regulations in their use on local machines, privately owned machines or home networks, or small business networks.

In most businesses networks, intranets or internets the use of them is often and mostly illegal especially in a situation where they are been used for malicious intent.

Penetration testing teams would often or always make sure that they sign rules of engagement before using these tools.

3. Write a project named Money that prompts for and reads a double value representing a monetary amount. Then determine the fewest number of each bill and coin needed to represent that amount, starting with the highest (assume that a ten-dollar bill is the maximum size need). For example, if the value entered is 47.63 (forty-seven dollars and sixty-three cents), then the program should print the equivalent amount as:

Answers

Answer: Provided in the explanation segment

Explanation:

The following code provides answers to the given problem.

import java.util.*;

public class untitled{

public static void main(String[] args)

{int tens,fives,ones,quarters,dimes,nickles,pennies,amt;

double amount;

Scanner in = new Scanner(System.in);

System.out.println("What do you need to find the change for?");

amount=in.nextDouble();

System.out.println("Your change is");

amt=(int)(amount*100);

tens=amt/1000;

amt%=1000;

fives=amt/500;

amt%=500;

ones=amt/100;

amt%=100;

quarters=amt/25;

amt%=25;

dimes=amt/10;

amt%=10;

nickles=amt/5;

pennies=amt%5;

System.out.println(tens +" ten dollar bills");

System.out.println(fives +" five dollar bills");

System.out.println(ones +" one dollar bills");

System.out.println(quarters +" quarters");

System.out.println(dimes +" dimes");

System.out.println(nickles +" nickles");

System.out.println(pennies +" pennies");

}

}

cheers i hope this helped !!

what should i name my slideshow if its about intellectual property, fair use, and copyright

Answers

Answer:

You should name it honest and sincere intention

Explanation:

That is a good name for what you are going to talk about in your slideshow.

The relationship between the temperature of a fluid (t, in seconds), temperature (T, in degrees Celsius), is dependent upon the initial temperature of the liquid (T0, in degrees Celsius), the ambient temperature of the surroundings (TA, in degrees Celsius) and the cooling constant (k, in hertz); the relationship is given by: ???? ???? ???????? ???? ???????????? ???? ???????????? ???????????????? Ask the user the following questions:  From a menu, choose fluid ABC, FGH, or MNO.  Enter the initial fluid temperature, in units of degrees Celsius.  Enter the time, in units of minutes.  Enter the ambient air temperature, in units of degrees Celsius. Enter the following data into the program. The vector contains the cooling constant (k, units of hertz) corresponding to the menu entries. K Values = [0.01, 0.03, 0.02] Create a formatted output statement for the user in the Command Window similar to the following. The decimal places must match. ABC has temp 83.2 degrees Celsius after 3 minutes. In

Answers

Answer:

See explaination

Explanation:

clc;

clear all;

close all;

x=input(' choose abc or fgh or mno:','s');

to=input('enter intial fluid temperature in celcius:');

t1=input('enter time in minutes:');

ta=input('enter ambient temperature in celcius:');

abc=1;

fgh=2;

mno=3;

if x==1

k=0.01;

elseif x==2

k=0.03;

else

k=0.02;

end

t=ta+((to-ta)*exp((-k)*t1));

X = sprintf('%s has temp %f degrees celcius after %d minutes.',x,t,t1);

disp(X);

For dinner, a restaurant allows you to choose either Menu Option A: five appetizers and three main dishes or Menu Option B: three appetizers and four main dishes. There are six kinds of appetizer on the menu and five kinds of main dish.

How many ways are there to select your menu, if...

a. You may not select the same kind of appetizer or main dish more than once.
b. You may select the same kind of appetizer and/or main dish more than once.
c. You may select the same kind of appetizer or main dish more than once, but not for all your choices, For example in Menu Option A, it would be OK to select four portions of 'oysters' and one portion of 'pot stickers', but not to select all five portions of 'oysters'.)

In each case show which formula or method you used to derive the result.

Answers

Answer:

The formula used in this question is called the probability of combinations or combination formula.

Explanation:

Solution

Given that:

Formula applied is stated as follows:

nCr = no of ways to choose r objects from n objects

  = n!/(r!*(n-r)!)

The Data given :

Menu A : 5 appetizers and 3 main dishes

Menu B : 3 appetizers and 4 main dishes

Total appetizers - 6

Total main dishes - 5

Now,

Part A :

Total ways = No of ways to select menu A + no of ways to select menu B

          = (no of ways to select appetizers in A)*(no of ways to select main dish in A) + (no of ways to select appetizers in B)*(no of ways to select main dish in B)

          = 6C5*5C3 + 6C3*5C4

          = 6*10 + 20*5

          = 160

Part B :

Since, we can select the same number of appetizers/main dish again so the number of ways to select appetizers/main dishes will be = (total appetizers/main dishes)^(no of appetizers/main dishes to be selected)

Total ways = No of ways to select menu A + no of ways to select menu B  

          = (no of ways to select appetizers in A)*(no of ways to select main dish in A) + (no of ways to select appetizers in B)*(no of ways to select main dish in B)

          = (6^5)*(5^3) + (6^3)*(5^4)

          = 7776*125 + 216*625

          = 1107000

Part C :

No of ways to select same appetizers and main dish for all the options

= No of ways to select menu A + no of ways to select menu B  

= (no of ways to select appetizers in A)*(no of ways to select main dish in A) + (no of ways to select appetizers in B)*(no of ways to select main dish in B)

=(6*5) + (6*5)

= 60

Total ways = Part B - (same appetizers and main dish selected)      

= 1107000 - 60

= 1106940

write the steps to insert picture water mark​

Answers

Answer:

Is there a picture of the question?

Explanation:

"Write pseudocode that outputs the contents of parallel arrays. You do NOT have to write the entire program. The first array will hold phone numbers The second array will hold company names You do NOT need to load the arrays. Your code can assume they are already loaded with data. The arrays are named phone[ ] and company[ ] Output the phone number and associated company name for every entry in the array."

Answers

Answer:

Check the explanation

Explanation:

PSEUDO CODE:

for(int i=0,j=0;i<phone.length,j<company.length;i++,j++)

{

print(phone[i]," - ",company[j]);

}

this for loop will print each phone number associated with the company names.

Write Scheme functions to do the following. You are only allowed to use the functions introduced in our lecture notes and the helper functions written by yourself. (a) Return all rotations of a given list. For example, (rotate ’(a b c d e)) should return ((a b c d e) (b c d e a) (c d e a b) (d e a b c) (e a b c d)) (in some order). (b) Return a list containing all elements of a given list that satisfy a given predicate. For example, (filter (lambda (x) (< x 5)) ’(3 9 5 8 2 4 7)) should return (3 2 4).

Answers

Answer:

Check the explanation

Explanation:

solution a:

def Rotate(string) :

n = len(string)

temp = string + string

for i in range(n) :

for j in range(n) :

print(temp[i + j], end = "")

print()

string = ("abcde")

Rotate(string)

solution b:

nums = [3,9,5,8,2,4,7]

res = list(filter(lambda n : n < 5, nums))

print(res)

Suppose that a program's data and executable code require 1,024 bytes of memory. A new section of code must be added; it will be used with various values 70 times during the execution of a program. When implemented as a macro, the macro code requires 73 bytes of memory. When implemented as a procedure, the procedure code requires 132 bytes (including parameter-passing, etc.), and each procedure call requires 7 bytes. How many bytes of memory will the entire program require if the new code is added as a procedure? 1,646

Answers

Answer:

The answer is 1646

Explanation:

The original code requires 1024 bytes and is called 70 times ,it requires 7 byte and its size is 132 bytes

1024 + (70*7) + 132 = 1024 + 490 +132

= 1646

A company that wants to send data over the Internet has asked you to write a program that will encrypt it so that it may be transmitted more securely. All the data is transmitted as four-digit integers. Your app should read a four-digit integer entered by the user and encrypt it as follows: Replace each digit with the result of adding 7 to the digit and getting the remainder after dividing the new value by 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then display the encrypted integer. Write a separate app that inputs an encrypted four-digit integer and decrypts it (by reversing the encryption scheme) to form the original number. Use the format specifier D4 to display the encrypted value in case the number starts with a 0

Answers

Answer:

The output of the code:

Enter a 4 digit integer : 1 2 3 4

The decrypted number is : 0 1 8 9

The original number is : 1 2 3 4

Explanation:

Okay, the code will be written in Java(programming language) and the file must be saved as "Encryption.java."

Here is the code, you can just copy and paste the code;

import java.util.Scanner;

public class Encryption {

public static String encrypt(String number) {

int arr[] = new int[4];

for(int i=0;i<4;i++) {

char ch = number.charAt(i);

arr[i] = Character.getNumericValue(ch);

}

for(int i=0;i<4;i++) {

int temp = arr[i] ;

temp += 7 ;

temp = temp % 10 ;

arr[i] = temp ;

}

int temp = arr[0];

arr[0] = arr[2];

arr[2]= temp ;

temp = arr[1];

arr[1] =arr[3];

arr[3] = temp ;

int newNumber = 0 ;

for(int i=0;i<4;i++)

newNumber = newNumber * 10 + arr[i];

String output = Integer.toString(newNumber);

if(arr[0]==0)

output = "0"+output;

return output;

}

public static String decrypt(String number) {

int arr[] = new int[4];

for(int i=0;i<4;i++) {

char ch = number.charAt(i);

arr[i] = Character.getNumericValue(ch);

}

int temp = arr[0];

arr[0]=arr[2];

arr[2]=temp;

temp = arr[1];

arr[1]=arr[3];

arr[3]=temp;

for(int i=0;i<4;i++) {

int digit = arr[i];

switch(digit) {

case 0:

arr[i] = 3;

break;

case 1:

arr[i] = 4;

break;

case 2:

arr[i] = 5;

break;

case 3:

arr[i] = 6;

break;

case 4:

arr[i] = 7;

break;

case 5:

arr[i] = 8;

break;

case 6:

arr[i] = 9;

break;

case 7:

arr[i] = 0;

break;

case 8:

arr[i] = 1;

break;

case 9:

arr[i] = 2;

break;

}

}

int newNumber = 0 ;

for(int i=0;i<4;i++)

newNumber = newNumber * 10 + arr[i];

String output = Integer.toString(newNumber);

if(arr[0]==0)

output = "0"+output;

return output;

}

public static void main(String[] args) {

Scanner sc = new Scanner(System.in);

System.out.print("Enter a 4 digit integer:");

String number = sc.nextLine();

String encryptedNumber = encrypt(number);

System.out.println("The decrypted number is:"+encryptedNumber);

System.out.println("The original number is:"+decrypt(encryptedNumber));

}

}

Write a program named RectangleArea to calculate the area of a rectangle with a length of 15.8 and a width of 7.9. The program should have two classes, one is the RectangleArea holding the Main(), and the other one is Rectangle. The Rectangle class has three members: a property of length, a property of width, and a method with a name of CalArea() to calculate the area. You can invoke the auto-provided constructor or write a self-defined constructor to initialize the rectangle. Calculate and display the area of the rectangle by first initialize an object named myRectangle and then calculate its area using the CalArea() method.

Answers

Answer:

public class RectangleArea {

   public static void main(String[] args) {

       Rectangle myRectangle = new Rectangle(15.8, 7.9);

       double calArea = myRectangle.calcArea(15.8, 7.9);

       System.out.println("The area is "+ calArea);

   }

}

class Rectangle{

   private double length;

   private double width;

   //Defined Constructor

   public Rectangle(double length, double width) {

       this.length = length;

       this.width = width;

   }

   public double calcArea(double len, double wi){

       return len* wi;

   }

}

Explanation:

This is solved with Java programming languageStart by creating both classes RectangleArea and and RectangleSInce both classes are in the same file, only one can be publicClass Rectangle contains the three members are decribed by the questionprivate double length, private double width and the method calcArea(). It also has a sefl-declared constructor.In the class RectangleArea, an object of Rectangle is created and initialized.The method calcArea is called using the created object and the value is printed.

D-H public key exchange Please calculate the key for both Alice and Bob.
Alice Public area Bob
Alice and Bob publicly agree to make
N = 50, P = 41
Alice chooses her Bob
picks his
Private # A = 19 private #
B= ?
------------------------------------------------------------------------------------------------------------------------------------------
I am on Alice site, I choose my private # A = 19.
You are on Bob site, you pick up the private B, B and N should have no common factor, except 1.
(Suggest to choose B as a prime #) Please calculate all the steps, and find the key made by Alice and Bob.
The ppt file of D-H cryptography is uploaded. You can follow the steps listed in the ppt file.
Show all steps.

Answers

Answer:

See explaination

Explanation:

Please kindly check attachment for the step by step solution of the given problem.

#define DIRECTN 100
#define INDIRECT1 20
#define INDIRECT2 5
#define PTRBLOCKS 200

typedef struct {
filename[MAXFILELEN];
attributesType attributes; // file attributes
uint32 reference_count; // Number of hard links
uint64 size; // size of file
uint64 direct[DIRECTN]; // direct data blocks
uint64 indirect[INDIRECT1]; // single indirect blocks
uint64 indirect2[INDIRECT2]; // double indirect

} InodeType;

Single and double indirect inodes have the following structure:

typedef struct
{
uint64 block_ptr[PTRBLOCKS];
}
IndirectNodeType;

Required:
Assuming a block size of 0x1000 bytes, write pseudocode to return the block number associated with an offset of N bytes into the file.

Answers

Answer:

WOW! that does not look easy!

Explanation:

I wish i could help but i have no idea how to do that lol

A cloud provider is deploying a new SaaS product comprised of a cloud service. As part of the deployment, the cloud provider wants to publish a service level agreement (SLA) that provides an availability rating based on its estimated availability over the next 12 months. First, the cloud provider estimates that, based on historical data of the cloud environment, there is a 25% chance that the physical server hosting the cloud service will crash and that such a crash would take 2 days before the cloud service could be restored. It is further estimated that, over the course of a 12 month period, there will be various attacks on the cloud service, resulting in a total of 24 hours of downtime. Based on these estimates, what is the availability rating of the cloud service that should be published in the SLA?

Answers

Answer:

99.6

Explanation:

The cloud provider  provides the certain modules of the cloud service like infrastructure as a service , software as a service ,etc to other companies .The cloud provider implements a new SaaS service that includes a cloud platform also the cloud provider intends to disclose the Service Level Agreement that is score based on its approximate accessibility during the next 12 months.

The Cloud providers predict that, depending on past cloud system data, it is a 25 % risk that a physical server holding the cloud platform will fail therefore such a failure will require 2 days to recover the cloud service so 99.6 is the Cloud storage accessibility ranking, to be released in the SLA.

​User documentation _____. Group of answer choices ​allows users to prepare overall documentation, such as process descriptions and report layouts, early in the software development life cycle (SDLC) ​describes a system’s functions and how they are implemented ​contains all the information needed for users to process and distribute online and printed output ​consists of instructions and information to users who will interact with the system

Answers

Answer:

And user documentation consists of instructions and information to users who will interact with the system

Explanation:

user documentation will not allow user to prepare overall documentation because it is already prepared so not A.

user documentation does not need implementation, So not B.

user documentation may not be a printed one . So not C

And user documentation consists of instructions and information to users who will interact with the system, so D is the right option

Use a vector to solve the following problem. Read in 20 numbers, each of which is between 10 and 100, inclusive. As each number is read, validate it and store it in the vector only if it isn't a duplicate of a number already read. After reading all the values, display only the unique values that the user entered. Begin with an empty vector and use its push_back function to add each unique value to the vector.

Answers

Answer:

The following are the program in the C++ Programming Language.

//header files

#include <iostream>

#include <vector>

//using namespace

using namespace std;

//define a function

int find(vector<int> &vec, int n)  

{

   //set the for loop

   for(int i = 0; i < vec.size(); ++i)  

   {

       //check the elements of v is in the num

       if(vec[i] == n)  

       {

           //then, return the values of i

          return i;

       }

   }

  return -1;

}

//define the main method

int main()  

{

   //declare a integer vector type variable

   vector<int> vec;

   //print message

   cout << "Enter numbers: ";

   //declare integer type variable

   int n;

   //set the for loop

   for(int i = 0; i < 20; ++i)  

   {

       //get input in the 'num' from the user

       cin >> n;

       //check the following conditions

       if(n >= 10 && n <= 100 && find(vec, n) == -1)  

       {

           //then, assign the values of 'num' in the vector

          vec.push_back(n);

       }

   }

   //print the message

   cout << "User entered: ";

   //set the for loop

   for(int i = 0; i < vec.size(); ++i)  

   {

       //print the output

       cout << vec[i] << " ";

  }

  cout << "\n";

  return 0;  

}

Output:

Enter numbers: 14 18 96 75 23 65 47 12 58 74 76 92 34 32 65 48 46 28 75 56

User entered: 14 18 96 75 23 65 47 12 58 74 76 92 34 32 48 46 28 56

Explanation:

The following are the description of the program:

Firstly, set the required header files and required namespace.Define an integer data type function 'find()' and pass two arguments that is integer vector type argument 'vec' and integer data type argument 'n'.Then, set the for loop that iterates according to the size of the vector variable 'vec' inside the function, after that set the if conditional statement to check the following condition and return the variable 'i'.Define the main method that gets the input from the user then, check that the following inputs are greater than 10 and smaller than 100 then assign these variables in the vector type variable 'vec' and print all the elements.


(a) What is the difference between a compare validator and a range validator?

(b) When would you choose to use one versus the other?

Answers

Answer:

Check the explanation

Explanation:

a) A compare validator: A compare validator can be described as a particular method that is utilized to control and also enabled to perform different types of validation tasks. It is being used to carry out as well as to execute a correct data type that determines the entered value is proper value into a form field or not. For instance when in an application registration it makes use of the confirm password after the first-password.

(b) Whenever it is compulsory to determine if the value that has been entered is the correct value into the form field then the usage of compare validator will be needed whereas a range validator is used to confirm the entered value is in a specific range.

Explanation:

a) A compare validator: A compare validator can be described as a particular method that is utilized to control and also enabled to perform different types of validation tasks. It is being used to carry out as well as to execute a correct data type that determines the entered value is proper value into a form field or not. For instance when in an application registration it makes use of the confirm password after the first-password.

(b) Whenever it is compulsory to determine if the value that has been entered is the correct value into the form field then the usage of compare validator will be needed whereas a range validator is used to confirm the entered value is in a specific range.

In this question, we give two implementations for the function: def intersection_list(lst1, lst2) This function is given two lists of integers lst1 and lst2. When called, it will create and return a list containing all the elements that appear in both lists. For example, the call: intersection_list([3, 9, 2, 7, 1], [4, 1, 8, 2])could create and return the list [2, 1]. Note: You may assume that each list does not contain duplicate items. a) Give an implementation for intersection_list with the best worst-case runtime. b) Give an implementation for intersection_list with the best average-case runtime.

Answers

Answer:

see explaination

Explanation:

a)Worst Case-time complexity=O(n)

def intersection_list(lst1, lst2):

lst3 = [value for value in lst1 if value in lst2]

return lst3

lst1 = []

lst2 = []

n1 = int(input("Enter number of elements for list1 : "))

for i in range(0, n1):

ele = int(input())

lst1.append(ele) # adding the element

n2 = int(input("Enter number of elements for list2 : "))

for i in range(0, n2):

ele = int(input())

lst2.append(ele) # adding the element

print(intersection_list(lst1, lst2))

b)Average case-time complexity=O(min(len(lst1), len(lst2))

def intersection_list(lst1, lst2):

return list(set(lst1) & set(lst2))

lst1 = []

lst2 = []

n1 = int(input("Enter number of elements for list1 : "))

for i in range(0, n1):

ele = int(input())

lst1.append(ele)

n2 = int(input("Enter number of elements for list2 : "))

for i in range(0, n2):

ele = int(input())

lst2.append(ele)

print(intersection_list(lst1, lst2))

4. Write an interface ObjectWithTwoParameters which has a method specification: double area (double d1, double d2) which returns the area of a particular object. Write three classes RectangleClass, TriangleClass, and CylinderClass which implement the interface you created. Also, write a demo class which creates objects of RectangleClass, TriangleClass, and CylinderClass and call the corresponding methods

Answers

Answer:

The java program for the given scenario is as follows.

import java.util.*;

//interface with method area

interface ObjectWithTwoParameters

{

double area (double d1, double d2);

}

class RectangleClass implements ObjectWithTwoParameters

{

//overriding area()

public double area (double d1, double d2)

{

return d1*d2;

}

}

class TriangleClass implements ObjectWithTwoParameters

{

//overriding area()

public double area (double d1, double d2)

{

return (d1*d2)/2;

}  

}

class CylinderClass implements ObjectWithTwoParameters

{

public double area (double d1, double d2)

{

return ( 2*3.14*d1*d1 + d2*(2*3.14*d1) );

}

}

public class Test

{

public static void main(String[] args)

{

//area displayed for all three shapes

ObjectWithTwoParameters r = new RectangleClass();

double arear = r.area(2, 3);

System.out.println("Area of rectangle: "+arear);

ObjectWithTwoParameters t = new TriangleClass();

double areat = t.area(4,5);

System.out.println("Area of triangle: "+areat);

ObjectWithTwoParameters c = new CylinderClass();

double areac = c.area(6,7);

System.out.println("Area of cylinder: "+areac);

}

}

OUTPUT

Area of rectangle: 6.0

Area of triangle: 10.0

Area of cylinder: 489.84

Explanation:

1. The program fulfils all the mentioned requirements.

2. The program contains one interface, ObjectWithTwoParameters, three classes which implement that interface, RectangleClass, TriangleClass and CylinderClass, and one demo class, Test, containing the main method.

3. The method in the interface has no access specifier.

4. The overridden methods in the three classes have public access specifier.

5. No additional variables have been declared.

6. The test class having the main() method is declared public.

7. The area of the rectangle, triangle and the cylinder have been computed as per the respective formulae.

8. The interface is similar to a class which can have only declarations of both, variables and methods. No method can be defined inside an interface.

9. The other classes use the methods of the interface by implementing the interface using the keyword, implements.

10. The object is created using the name of the interface as shown.

ObjectWithTwoParameters r = new RectangleClass();

Write a class called DisArray with methods to convert a 1-dimensional array to a 2-dimensional array. The methods' name should be convert2D. You should create methods to convert int[] and String[], that can be tested against the following class. Your convert2D methods should choose the closest possible square-ish size for the 2D array. For example, if your input array is [10], its 2D conversion should be [3][4] or [4][3] -- you decide if you want to favor rows over columns. Your method should place the elements of the one-dimensional array into the two-dimensional array in row-major order, and fill the remaining elements with 0 (for integer arrays) or null (for String arrays). The process of filling unused elements with 0 or null is called padding. If the input array's length is a perfect square, e.g., [16], then your output should a square array, i.e., [4][4]. For any other size, your objective is to minimize the number of padded elements. For example, if your input is [10] you should opt for a [3][4] array instead of a [4][4]. The former will have only 2 padded elements; the latter 6.

Answers

Answer:

=======================================================

//Class header definition

public class DisArray {

   //First method with int array as parameter

   public static void convert2D(int[] oneD) {

       //1. First calculate the number of columns

       //a. get the length of the one dimensional array

       int arraylength = oneD.length;

       //b. find the square root of the length and typecast it into a float

       float squareroot = (float) Math.sqrt(arraylength);

       //c. round off the result and save in a variable called row

       int row = Math.round(squareroot);

       //2. Secondly, calculate the number of columns

       //a. if the square of the number of rows is greater than or equal to the

       //length of  the one dimensional array,

       //then to minimize padding, the number of

       //columns  is the same as the number of rows.

       //b. otherwise, the number of columns in one more than the

       // number of rows

       int col = ((row * row) >= arraylength) ? row : row + 1;

       //3. Create a 2D int array with the number of rows and cols

       int [ ][ ] twoD = new int [row][col];

       //4. Place the elements in the one dimensional array into

       //the two dimensional array.

       //a. First create a variable counter to control the cycle through the one

       // dimensional array.

       int counter = 0;

       //b. Create two for loops to loop through the rows and columns of the

       // two  dimensional array.

       for (int i = 0; i < row; i++) {

           for (int j = 0; j < col; j++) {

               //if counter is less then the length of the one dimensional array,

               //then  copy the element at that position into the two dimensional

               //array.  And also increment counter by one.

               if (counter < oneD.length) {

                   twoD[i][j] = oneD[counter];

                   counter++;

              }

              //Otherwise, just pad the array with zeros

               else {

                   twoD[i][j] = 0;

               }

           }

       }

       //You might want to create another pair of loop to print the elements

       //in the  populated two dimensional array as follows

       for (int i = 0; i < twoD.length; i++) {

           for (int j = 0; j < twoD[i].length; j++) {

               System.out.print(twoD[i][j] + " ");

           }

           System.out.println("");

       }

   }     //End of first method

   //Second method with String array as parameter

   public static void convert2D(String[] oneD) {

       //1. First calculate the number of columns

       //a. get the length of the one dimensional array

       int arraylength = oneD.length;

       //b. find the square root of the length and typecast it into a float

       float squareroot = (float) Math.sqrt(arraylength);

       //c. round off the result and save in a variable called row

       int row = Math.round(squareroot);

       //2. Secondly, calculate the number of columns

       //a. if the square of the number of rows is greater than or equal to the length of  

       //the one dimensional array, then to minimize padding, the number of

       //columns  is the same as the number of rows.

       //b. otherwise, the number of columns in one more than the

       //number of rows.

       int col = (row * row >= arraylength) ? row : row + 1;

       //3. Create a 2D String array with the number of rows and cols

       String[][] twoD = new String[row][col];

       //4. Place the elements in the one dimensional array into the two

       // dimensional array.

       //a. First create a variable counter to control the cycle through the one

       // dimensional array.

       int counter = 0;

       //b. Create two for loops to loop through the rows and columns of the

       //two  dimensional array.

       for (int i = 0; i < row; i++) {

           for (int j = 0; j < col; j++) {

               //if counter is less then the length of the one dimensional array,

               //then  copy the element at that position into the two dimensional

               //array.  And also increment counter by one.

               if (counter < oneD.length) {

                   twoD[i][j] = oneD[counter];

                   counter++;

               }

               //Otherwise, just pad the array with null values

               else {

                   twoD[i][j] = null;

               }

           }

       }

       //You might want to create another pair of loop to print the elements  

       //in the populated two dimensional array as follows:

       for (int i = 0; i < twoD.length; i++) {

           for (int j = 0; j < twoD[i].length; j++) {

               System.out.print(twoD[i][j] + " ");

           }

           System.out.println("");

       }

   }    // End of the second method

   //Create the main method

   public static void main(String[] args) {

       //1. Create an arbitrary one dimensional int array

       int[] x = {23, 3, 4, 3, 2, 4, 3, 3, 5, 6, 5, 3, 5, 5, 6, 3};

       //2. Create an arbitrary two dimensional String array

       String[] names = {"abc", "john", "dow", "doe", "xyz"};

       

       //Call the respective methods

       convert2D(x);

       System.out.println("");

       convert2D(names);

   }         // End of the main method

}            // End of class definition

=========================================================

==========================================================

Sample Output

23 3 4 3  

2 4 3 3  

5 6 5 3  

5 5 6 3  

abc john dow  

doe xyz null

==========================================================

Explanation:

The above code has been written in Java and it contains comments explaining each line of the code. Please go through the comments. The actual executable lines of code are written in bold-face to distinguish them from the comments.

Suppose you are given a text file. Design a Python3 program to encrypt/decrypt that text file as follows:
If the character is an upper case character then shift that character forward, s characters forward in the alphabet.
If the character is a lower case character then shift that character backwards, s characters backwards in the alphabet.
If the character is a numeric character then shift that character also backwards, s characters backwards in the 1-digit numbers set {0,1,2,3,4,5,6,7,8,9}.
You must design two functions; one to encrypt. The other one is to decrypt. All white space and punctuation marks must be ignored(cannot be changed). If you reach Z, or A, the shifting may continue as a cycle(A comes after Z, Z comes before A). Both files (original text file and the encrypted text file) must be stored in the working directory of Python.
An example;
Let s=1 and the text file:
11300Hello World
Then encoded text file;
002991dkkn Xnqke

Answers

Answer:

Explanation:

Please find attachment for the Python program

Perform a Google search, using the Google hacking keywords to locate a page that has the word passwd (note the spelling) on the page but has the phrase "Index of" in the title. First, what was your search term. Second, what is the first URL in your list of results. Third, what exactly would you use this search to find?

Answers

Answer:

Following are the step to this question:

i) search "intitle passwd" in google search engine.

ii) Open first link of the page.

iii) use commands to access data.  

Explanation:

Google Hacking operates as follows of web engines like google and yahoo to find web pages and sensitive information, that are insecure. It builds on the idea that web pages index a large number of public pages and files and make their discovery easy to create the correct query.

In which, we search the above-given keyword, that will provide many links. In these links we select the first one and open it, it will provide an index, and search in this we use the search command in the database.

customer seeks to buy a new computer for private use at home. The customer primarily needs the computer to use the Microsoft PowerPoint application for the purpose of practicing presentation skills. As a salesperson what size hard disc would you recommend and why?

Answers

Explanation:

The most reliable hard drives are those whose most common size is 3.5 inches, their advantages are their storage capacity and their speed and a disadvantage is that they usually make more noise.

For greater speed, it is ideal to opt for two smaller hard disks, since large disks are slower, but are partitioned so that there are no problems with file loss.

For a person who needs to use content creation programs, it is ideal to opt for a hard drive that has reliability.

Other Questions
Eighteen men take 15 daysto dig 6 hectares of landFind the number of menrequired to dig 8 hectaresin 12 days? Which of the expressions are equivalent to the one below? Check all thatapply.6*(2+8)A. 6(8+2)B. 62+68C. (8+2) 6D. (62) + 8 A tuxedo rental service charges 150$ flat fee for a suit plus 50$ Per additional day. Which equation correctly models the total cost of renting a tuxedo for x number of days 1-y=50x+1502-y=50x-1503-y=150x+504-y=50x Who is Abby Donelly? First one to answer gets a thanks In French, write a short story about two imaginary friends. What are their names? What do they do? What are their personalities like? What are some other interesting things about them? examine the relationships that exist in the diagram below. find the measures of angles a, b, c, and d. remember that you can find the angles in any order, depending on the angle relationships you use. Suma inverselor a dou numere raionale este , iar diferena inverselor numerelor este . Calculai suma i produsul numerelor. DO THIS SPANISH ASSIGNMENT! Correct Response Gets Brainliest .--. .-.. . .- ... . ..-. ..- -.-. -.- .. -. --. .- -. ... .-- . .-. Isabela wants to add an image to her presentation. Which tab should she use? How does Henry Wadsworth Longfellows use of language in Paul Reveres Ride set the tone for the events described in the poem? How does the poet use connotation and denotation to create visual images that add to the meaning of the poem? what are porous rocks also called 25 POINTS Wine goes bad soon after opening because the ethanol CH3CH2OH dissolved in it reacts with oxygen O2 gas to form water and aqueous acetic acid CH3COOH, the main ingredient in vinegar. Calculate the moles of ethanol needed to produce 0.095mol of water. Be sure your answer has a unit symbol, if necessary, and round it to 2 significant digits. WHAT COULD BE THE AREA OF THE BASE OF THE TRIANGULAR PRISM? Length 5ftOther height5ft Length 4ft Height 3ft What is one of the Miskitos' main characteristics? they eat people they have their own travel agency they do not leave their village they have a exclusive parachute club How Do I type a fraction on my computer and NOT the / sign What event allowed a large ,centralized empire to form on the Indian subcontinent 25) Which BEST describes a common human experience as a theme of thisreading selection?The main character feels jealous of someone else'sshoes.The main character feels pride in performing menialtasks.The main character feels jealous of someone whoperforms a task well.The main character hopes that the team will be leftwithout its star player. Gradually you notice that the large chamber walls seem to be closing in. You hear a thundering boom, and the whole chamber vibrates as the valve slams shut above you. The cords, now rigid and strained, form a cage about you, and you feel extreme pressure. Obviously, the lower chambers of the heart are in a full-fledged _____5______. Then, high above on the right, the "roof" opens, and you are forced through another valve which has led you into a very large artery. As you are swept along in a huge artery(the largest artery in the body), the____6_____, you pass several branch-off points, but continue to careen (fall) along, straight down at a dizzying speed until you approach the artery feeding the small intestine. After entering this artery and passing through successively smaller and smaller subdivisions of it, you finally reach the smallest blood vessels the_____7_______. You watch with fascination as nutrient molecules move into the blood through the single layer of ______8______(look at power point notes) cells forming the capillary (blood vessel) wall. As you move forward and you begin to move superiorly (up) once again, you enter the huge_______9______, which returns blood from the lower part of the body to the_______10_______of the heart. From here, you move consecutively through the right chambers of the heart into the_______11______artery, which carries you to the _____12_____to get ______13______and then back to the left side of the heart again where you started Carbon is an organic element found in all life forms. Which of the followingoccurs through the process of breaking down carbon-based molecules?Water molecules are transferred through the body.Elimination of waste products occurs.Energy needed for life functions is releasedAbsorbing of oxygen through pore occurs. Book 8 of odyssey is titled A day for song and contest, why does homer include this section as part of the epic? A. To show the reader that homer is a good storyteller B. To allow the reader to understand Odysseus full experience C. To show the reader the talents Odysseus possesses D.To make the tale long enough to be considered an epic