Describe the differences between program development and program execution, including the installed software required for developing and executing Java programs.

Answers

Answer 1

Answer:

Program development is basically a step wise process to solve a particular problem. It basically refers to the coding of a program. This initial steps involves defining the problem statement, specifying the requirements and specifying what the output of the program should be. Program development also includes visually presenting what of the program for example in the form of flowchart. It also involves coding, the set of instructions, procedures, functions, sub routines that a computer should carry out to get the desired output. Also the bugs and errors are removed by debugging the program. Program execution refers to execute or run the set of instructions of a program. The program or machine code is loaded to the memory prior to execution and then executed. For example in JAVA the source code if first converted to bytecode and then in machine code in order to be executed.

Developing and Executing JAVA programs involves typing program using some editor (editing), compiling the program (converting to bytecode), loading program to memory prior to execution, verifying bytecode and executing the program.

In JAVA,  Java Development Kit (JDK) is used for JAVA program development and JAVA applications development. It involves an Integrated Development Environment (IDE) which serves as a platform for writing the JAVA code.

Java Runtime Environment JRE is used to JAVA program execution and provides a platform or environment to run the JAVA applications. JRE consists of class libraries, user interface toolkit, class loader and JAVA Virtual Machine JVM .

The class loader loads the required class libraries. JVM works as an interpreter for running the JAVA program line-by-line. This interpreter executes the Byte Code .


Related Questions

"There are 1.6093 kilometers in a mile. Create a variable to store a number of miles. Convert this to kilometers, and store in another variable."

Answers

MATLAB CODE:

%%%%

clc

dist_mile=input('enter the distance in miles') %%%dist_mile stores given distance in miles

dist_km=dist_mile*1.6093 %%coversion of dist_mile into km and storing in dist_km

%%%%

OOUTPUT:

enter the distance in miles

2

dist_km

3.2186

Using encryption, a sender can encrypt a message by translating it to which of the following?
a. public key
b. private key
c. cipher text
d. sniffer

Answers

Answer:

Option C is the correct answer for the above question.

Explanation:

The ciphertext is a text which is formed from an original text and can be called a duplicate text which has no meaning for the other user. This can be formed with the help of encryption technology. Encryption technology is a technology that uses some mythology to convert the original data into other text data (which is also called a ciphertext) because no one can able to hack the data.

The above question asked about the term which is called for the text when it is converted from original data. That text is known as ciphertext which is described above and it is stated from option c. Hence option c is the correct answer while the other is not because--

Option 'a' refers to the public key which is used to encrypt the data.Option b refers to the private key which is also used for encryption. Option d refers to the sniffer which is not the correct answer.

Which namespace should be imported in order to work with a microsoft access database?a. System.Data.SqlClient b. System.Data.OleDb c. System.IO d. System.Data.Access

Answers

Answer:

b. System.Data.OleDb

Explanation:

OLE DB: It describes a collection of classes used to access an OLE DB data source in the managed space.

Which Internet of Things (IoT) challenge involves the difficulty of developing and implementing protocols that allow devices to communicate in a standard fashion?

Answers

Answer: Interoperability

Explanation:

Interoperability is the skill in system that helps in communicating and exchanging information and services with each other.It can be used in various industries and platform as the task is performed without considering specification and technical build.

IoT(Internet of things) interoperability faces various challenges like standardization, incompatibility etc.Several steps are taken to for IoT equipment to deal with servers, platforms,applications, network etc.Interoperability provides appropriate measure for enhancement of IoT devices .

Initialize the list short_names with strings 'Gus', 'Bob', and 'Zoe'. Sample output for the givenprogram:Gus Bob Zoeshort_names = ''' Your solution goes here '''print(short_names[0])print(short_names[1])print(short_names[2])12345

Answers

Answer:

short_names = ['Gus', 'Bob','Zoe']

Explanation:

A list is a type of data structure in python that allows us to store variables  of different types. Each item in a list has an index value which must be a integer value, and the items can be assessed by stating the index position. The syntax for creating and initializing a list is:

list_name = [item1, item2,item3]

The name of the list (must follow variable naming rules)a pair of square bracketsitems in the list separated by commas.

The python code below shows the implementation of the solution of the problem in the question:

short_names = ['Gus', 'Bob','Zoe']

print(short_names[0])

print(short_names[1])

print(short_names[2])

The output is:

Gus

Bob

Zoe

To initialize the `short_names` list with 'Gus', 'Bob', and 'Zoe', assign these names to the list variable and use the `print()` function to print each name individually. This is how the program achieves the required output.

To initialize a list in Python with specific strings, you can simply assign the list elements directly to a variable. Here is how you do it:

short_names = ['Gus', 'Bob', 'Zoe']

Next, to print each element individually as specified in your program, you can use the print() function:

print(short_names[0])print(short_names[1])print(short_names[2])

When you run this code, you will get the following output:

Gus
Bob
Zoe

Here is the complete code for clarity:

short_names = ['Gus', 'Bob', 'Zoe']
print(short_names[0])
print(short_names[1])
print(short_names[2])

The birthday paradox says that the probability that two people in a room will have the same birthday is more than half, provided n, the number of people in the room, is more than 23. This property is not really a paradox, but many people find it surprising. Design a Java program that can test this paradox by a series of experiments on randomly generated birthdays, which test this paradox for n = 5, 10, 15, 20, ..., 100.

Answers

Answer:

The Java code is given below with appropriate comments for explanation

Explanation:

// java code to contradict birth day paradox

import java.util.Random;

public class BirthDayParadox

{

public static void main(String[] args)

{

   Random randNum = new Random();

   int people = 5;

   int[] birth_Day = new int[365+1];

   // setting up birthsdays

   for (int i = 0; i < birth_Day.length; i++)

       birth_Day[i] = i + 1;

 

   int iteration;

   // varying number n

   while (people <= 100)

   {

       System.out.println("Number of people: " + people);

       // creating new birth day array

       int[] newbirth_Day = new int[people];

       int count = 0;

       iteration = 100000;

       while(iteration != 0)

       {

           count = 0;

           for (int i = 0; i < newbirth_Day.length; i++)

           {

               // generating random birth day

               int day = randNum.nextInt(365);

               newbirth_Day[i] = birth_Day[day];

           }

           // check for same birthdays

           for (int i = 0; i < newbirth_Day.length; i++)

           {

               int bday = newbirth_Day[i];

               for (int j = i+1; j < newbirth_Day.length; j++)

               {

                   if (bday == newbirth_Day[j])

                   {

                       count++;

                       break;

                   }

               }

           }

           iteration = iteration - 1;

       }

       System.out.println("Probability: " + count + "/" + 100000);

       System.out.println();

       people += 5;

   }

}

}

Open "Wireshark", then use the "File" menu and the "Open" command to open the file "Exercise One.pcap". You should see 26 packets listed. This set of packets describes a ‘conversation’ between a user’s client and a central server. This entire conversation happens automatically, after a user types something and hits enter. Look at the packets to answer the following questions in relation to this conversation. In answering the following questions, use brief descriptions. For example, "In frame X, the client requests a web page, and in frame Y, the server delivers the content of the page." Hint: See the accompanying document titled the "QuickStart Guide" – Look under the appendix describing "Hits Versus Page Views". Hint: a favicon.ico is a small graphic that can be used as an icon to identify a web page. In the following graphic the colorful "G" to the left is a favicon.ico.? What is the IP address of the client that initiates the conversation? Use the first two packets to identify the server that is going to be contacted. List the common name, and three IP addresses that can be used for the server. What is happening in frames 3, 4, and 5? What is happening in frames 6 and 7? Ignore frame eight. However, for your information, frame eight is used to manage flow control. What is happening in frames nine and ten? How are these two frames related? What happens in packet 11? After the initial set of packets is received, the client sends out a new request in packet 12. This occurs automatically without any action by the user. Why does this occur? See the first "hint" to the left. What is occurring in packets 13 through 22? Explain what happens in packets 23 through 26. See the second "hint" to the left. In one sentence describe what the user was doing (Reading email? Accessing a web page? FTP? Other?).

Answers

Final answer:

The IP address of the client, the server communication flow, and the user accessing a web page.

Explanation:

The IP address of the client that initiates the conversation can be found in the first two packets of the file. In frames 3, 4, and 5, the client sends a request to the server, and in frames 6 and 7, the server responds with the requested information. Frames 9 and 10 are related as they capture the transmission of an acknowledgment from the client to the server for the data received in frame 8. Packet 11 contains a retransmission of data from the server to the client. The client sends out a new request in packet 12 because the requested content references additional resources, such as images, that need to be fetched. Packets 13 to 22 represent the transmission of data between the client and server. In packets 23 to 26, the server sends the final response to the client, completing the conversation.

In this conversation, the user was accessing a web page.

You are contacted by a project organizer for a university computer science fair. The project organizer asks you to hold a forum that discusses the origins of the Linux operating system, including how it has evolved and continued to develop. The main focus of this forum is to encourage university students toward participating in the open source community; therefore, it should detail the philosophy, major features, and methods of the hacker culture. Prepare a bulleted list of the major topics that you will discuss, and write down some sample questions that you anticipate from the participants as well as your responses. reddit

Answers

Final answer:

Linux changed the economics of high tech by providing a free and easily configurable operating system. It replaced expensive proprietary systems and broke Microsoft's monopoly. The hacker culture contributed to the development of Linux through active participation and a collaborative approach.

Explanation:

Major Topics:

Origins of the Linux operating system

Evolution and development of Linux

Philosophy of the open source community

Major features of Linux

Hacker culture and methods

Sample Questions:

How did Linux change the economics of high tech?

What are some major features of Linux?

How has the hacker culture contributed to the development of Linux?

Responses:

How did Linux change the economics of high tech? Linux revolutionized the high tech industry by providing a free and easily configurable operating system. This led to a reduction in the cost of systems by PC manufacturers like IBM and Dell, breaking Microsoft's monopoly. Linux also replaced expensive proprietary systems, such as IRIX and Microsoft NT, in organizations like NASA.

What are some major features of Linux? Some major features of Linux include its free distribution, easy configurability, and the ability to customize the kernel with desired features. It is also known for its stability, security, and support for a wide range of hardware architectures. Linux is highly scalable and can be used in various environments, from embedded systems to supercomputers.

How has the hacker culture contributed to the development of Linux? The hacker culture played a crucial role in the development of Linux. Hackers embraced Linux due to its open-source nature and actively contributed to its improvement. Their collaborative and innovative approach allowed Linux to evolve rapidly and gain popularity. The hacker culture emphasized freedom, sharing, and tinkering, which aligned with the open-source philosophy of the Linux community.

Final answer:

The forum will cover the origins and philosophy of Linux, its development, and its impact on the technology sector, encouraging university students to participate in the open source community. Topics will include the history of Linux, the role of the FSF, key features of Linux, diverse distributions, and its economic impact. Problems with open-source software and educational packages will also be discussed.

Explanation:

Introduction to Linux and Open Source

Origins of Linux by Linus Torvalds in the early 1990s, as an alternative to UNIX.

The philosophy of open source and its impact on software development and hacker culture.

Evolution of Linux and its widespread adoption in various domains, including servers and supercomputers.

Contribution of the Free Software Foundation (FSF) and Richard Stallman to the open source movement.

Key features of Linux that fostered its popularity: configurability, stability, and performance.

The variety of Linux distributions such as Ubuntu and Red Hat, and their individual characteristics.

Effects of Linux on the economics of the technology sector and competition with proprietary software.

Community-driven development and contribution: how individuals can participate.

Anticipated Questions and Responses

How did the development of open source operating systems like Linux change the tech industry's economics?

Linux disrupted the proprietary market by providing a free, customizable, and reliable alternative to costly UNIX systems. Companies like IBM and Dell integrated Linux to reduce their products' costs and offer choice to consumers.

It changed the competitive landscape, leading to the decline of proprietary workstations and a rise in the use of cost-effective, Linux-powered servers and supercomputers.

What are some problems associated with open-source software?

While open-source software promotes community collaboration and development, it can face issues like fragmented support, varying quality of contributions, and security concerns due to exposed code. Additionally, open-source projects rely heavily on community engagement, which can fluctuate, affecting the continuity and maintenance of the software.

Can you recommend some educational open-source software packages?

Yes, there are many educational open-source software packages available. Examples include Moodle for learning management, R for statistical computing, and SciPy for scientific and technical computing. These tools are freely available and can be modified to suit specific educational needs.

What is the unsigned decimal representation of each hexadecimal integer?
a. 3A
b. 1BF
c. 4096

Answers

Answer:

(a) 58

(b) 447

(c) 16534

Explanation:

Since these integers are in hexadecimal format, it is worthy to know or note that;

A => 10

B => 11

C => 12

D => 13

E => 14

F => 15

Therefore, using these, let's convert the following to decimal:

(a) 3A = 3 x [tex]16^{1}[/tex] + 10 x [tex]16^{0}[/tex]

=> 3A = 48 + 10

=> 3A = 58 (in decimal)

(b) 1BF = 1 x [tex]16^{2}[/tex] + 11 x [tex]16^{1}[/tex] + 15 x [tex]16^{0}[/tex]

=> 1BF = 256 + 176 + 15

=> 1BF = 447 (in decimal)

(c) 4096 = 4 x [tex]16^{3}[/tex] + 0 x [tex]16^{2}[/tex] + 9 x [tex]16^{1}[/tex] + 6 x [tex]16^{0}[/tex]

=> 4096 = 4 x 4096 + 0 + 144 + 6

=> 4096 = 16534 (in decimal)

Note:

Do not forget that any number greater than zero, when raised to the power of zero gives 1.

For example,

[tex]4^{0}[/tex] = 1

[tex]59^{0}[/tex] = 1

When responding to an incident in which explosive materials are suspected, is it safe to use wireless communication devices?

Answers

Answer:

No

Explanation:

Wireless communication devices like the cell phones transmits signals using radio or electromagnetic wave, which would trigger a bomb. An example of this kind of bomb is the home-made bomb also known as IED (improved explosive device).

The most common type of this IED is the radio controlled IED, which uses electromagnetic wave from a cell phone or a radio controlled type firing circuit. Insurgents, criminals etc, make use of such devices, since the materials are easy to get and are affordable.

The Domain Name Service is what translates human-readable domain names into IP addresses that computers and routers understandA. TrueB. False

Answers

Answer:

True

Explanation:

A Domain Name Service comprises of computer servers that carries a database of public IP addresses and their related human-readable domain names/hostnames, it receives query as hostnames and helps to translates those human-readable domain names/hostnames into IP addresses that computers and routers understand.

Write a program that reads an integer (greater than 0) from the console and flips the digits of the number, using the arithmetic operators // and %, while only printing out the even digits in the flipped order. Make sure that your program works for any number of digits and that the output does not have a newline character at the end.

Answers

Answer:

const stdin = process.openStdin();

const stdout = process.stdout;

const reverse = input => {         //checks if input is number

 if (isNaN(parseInt(input))) {

   stdout.write("Input is not a number");

 }

 if (parseInt(input) <= 0) {.                       // checks if no. is positive

   stdout.write("Input is not a positive number");

 }

 let arr = [];                                  // pushing no. in array

 input.split("").map(number => {

   if (number % 2 == 0) {

     arr.push(number);

   }

 });

 console.log(arr.reverse().join(""));              // reversing the array

};

stdout.write("Enter a number: ");

let input = null;

stdin.addListener("data", text => {

 reverse(text.toString().trim());             //reversing

 stdin.pause();

});

Explanation:

In this program, we are taking input from the user and checking if it is a number and if it is positive. We will only push even numbers in the array and then reversing the array and showing it on the console.

Discuss why a failure in a database environment is more serious than an error in a nondatabase environment.

Answers

Answer: a database system is complex to build and understand, and apart from that, a database systems contains many different tables and fields which a lot of computers are connected to. A failure will lead to information loss

Explanation:

In computer security what do the rows and columns correspond to in an 'Access Control Matrix'. What does each cell in the matrix contain

Answers

Answer:

Explanation:

An Access Control Matrix ACM can be defined as a table that maps the permissions of a set of subjects to act upon a set of objects within a system. The matrix is a two-dimensional table with subjects down the columns and objects across the rows. The permissions of the subject to act upon a particular object are found in the cell that maps the subject to that object.

Summary

The rows correspond to the subject

The columns correspond to the object

What does each cell in the matrix contain? Answer: Each cell is the set of access rights for that subject to that object.

To assign the contents of one array to another, you must use ________.

a. the assignment operator with the array names
b. the equality operator with the array names
c. a loop to assign the elements of one array to the other array
d. Any of these
e. None of these

Answers

Answer:

Option c is the correct answer for the above question.

Explanation:

The array is used to holds multiple variables and the assignment operator can assign only a single variable at a time. So if a user wants to assign the whole array value into other array value then he needs to follow the loop.The loop iteration moves on equal to the size of the array. It is because the array value moves into another array in one by one. It means the single value can move in a single time. So the moving processor from one array to another array takes n times if the first array size is n.The above question asked about the processor to move the element from one array to another and the processor is a loop because the loop can execute a single statement into n times. So the C option is correct while the other is not because--Option 'a' states about one assignment operator which is used for the one value only.Option b states about the equality operator which is used to compare two values at a time.Option d states any of these but only option c is the correct answer.Option 'e' states none of these but option c is the correct.

Applications that programmers use to create, modify, and test software are referred to as ________.

Answers

Answer:

The correct answer to the following question will be "Software Development Tools".

Explanation:

The software development tool seems to be a computer simulation used by software developers to build, modify, manage, and otherwise help other programs and apps.Most basic equipments are the code editor as well as the compiler or interpreter that will be used everywhere and constantly.

Therefore, the Software development tool is the right answer.

Final answer:

Programmers use Integrated Development Environments (IDEs) to develop, modify, and test software. These environments include tools for version control, like GitHub, and practices such as unit testing to ensure software quality.

Explanation:

Applications that programmers use to create, modify, and test software are referred to as Integrated Development Environments (IDEs). An IDE is a powerful suite of software development tools in one single application. It enables programmers to write code, debug errors, and test their applications before deployment. Features like versioning allow developers to manage different stages of their software builds, and tools like GitHub facilitate collaboration and source code management among teams. Unit testing is a crucial process in an IDE that allows developers to validate each part of the code individually to ensure correct behavior.

Other types of applications, often referred to simply as apps, include software like word processors, media players, and accounting software, designed to perform specific tasks for end-users. However, it's the development apps like IDEs where software creation and modification occur.

What Linux services can pose a problem when attempting to reach remote host on a network?

Answers

Answer:

NFS configuration

Explanation:

The Linux server runs the Linus open source operating system that provides a stable, secure and more flexible environment to carry out more challenging jobs like network and system administration, database management and web hosting.

The NFS or Network file system configured on the Linux server only supports Linux servers communication. It mounts the storage of the server on the network for central access.

Answer:

NFS Configuration

Explanation:

The Network File System (NFS) is a way of mounting Linux discs/directories over a network. An NFS server can export one or more directories that can then be mounted on a remote Linux machine. Note, that if you need to mount a Linux filesystem on a Windows machine, you need to use Samba/CIFS instead.

The NFS enables a UNIX workstation to mount an exported share from the server into its own filesystem, thus giving the user and the client the appearance that the sub filesystem belongs to the client; it provides a seamless network mount point.

Consider two communication technologies that use the same bandwidth, but Technology B has twice the SNR of technology A. If technology A has an SNR of about 1,000 and a data rate of about 50kbps, technology B has a data rate of_________.

Answers

Answer:

55kbps

Explanation:

The Luther Post Office closes the customer service window promptly at noon for their lunch break and opens again at one, perhaps a little after if the town's Sonic is busy. The Jones Post Office workers are aghast at this policy, preferring to stagger their lunch breaks so that the customer service window is always attended. It would appear that this difference in culture is primarily driven by_____________.

a. Key organizational members.
b. Reward systems.
c. Geographical location.
d. Critical incidents.

Answers

Answer:

The correct answer is letter "C": Geographical location.

Explanation:

Within an organization, different employees possess different experiences. Those experiences are also influenced by the organizational culture of the previous companies where they used to work. Different geographical locations imply businesses are managed differently according to what the customers request and what the firm wants to promote among the employees. When workers leave those environments to others where they will be playing similar roles but the company's culture is different, conflict takes place.

The correct answer is option a. It would appear that this difference in culture is primarily driven by key organizational members.

The difference in culture between the Luther Post Office and the Jones Post Office regarding their lunch break policy is likely driven by key organizational members. These individuals can influence policies and practices based on their preferences and management styles. The decision to close the window entirely for lunch at the Luther Post Office versus staggering breaks at the Jones Post Office reflects the choices and leadership styles of the key organizational members at each location.

JavaScript and HTML

#1 part 1

Use the writeln method of the document object to display the user agent in a

tag in the webpage. Hint: The userAgent property of the window.navigator object contains the user agent.

code-

Demo


-------------------------------------------------------------------------------

#1 part 2

Assign textNode with the first h2 element, and assign listNodes with all elements with a class name of 'language-item'.

code-

Answers

Answer:

See the explanation

Explanation:

#1 part 1

See the attached Image 1

#1 part 2

See the attached Image 2

To display the user agent in a webpage, use the writeln method of the document object with window.navigator.userAgent. Use document.querySelector to assign the first h2 element and document.getElementsByClassName for all elements with the class 'language-item'. The correct syntax to write 'Hello World' in JavaScript is document.write('Hello World').

To display the user agent using JavaScript, you can use the writeln method of the document object. Here's a sample code:

<script>
 document.writeln('<p>' + window.navigator.userAgent + '</p>');
</script>

DOM Manipulation

To assign the first h2 element and all elements with a class name of 'language-item', you can use the following code:

<script>
 var textNode = document.querySelector('h2');
 var listNodes = document.getElementsByClassName('language-item');
</script>

Output in JavaScript

The correct JavaScript syntax to write 'Hello World' is:

<script>
 document.write("Hello World");
</script>

This method allows you to place text directly into the DOM, making it visible on the webpage.

Generally, regardless of threat or vulnerability, there will ____ be a chance a threat can exploit a vulnerability.

a. never

b. occasionally

c. always

d. seldom

Answers

Answer:

The correct answer is letter "C": always.

Explanation:

Vulnerability management is in charge of preventing, identifying, and eliminating threats that could exploit vulnerabilities in a software system. The threat can damage or destroy the software after the threat gained unauthorized access and it does not matter how large the vulnerability of the software is, a threat will exploit it.

High quality pages in a task should all get the same Needs Met rating. For example, a high quality page for a common interpretation of the query should get the same Needs Met rating as a high quality page for a minor interpretation of the query.A. TrueB. False

Answers

High quality pages in a task should all get the same Needs Met rating. For example, a high quality page for a common interpretation of the query should get the same Needs Met rating as a high quality page for a minor interpretation of the query - False

The Needs Met rating for a high-quality page should correspond to the relevance and usefulness of the content concerning the user's query, which can vary even among high-quality pages. When considering a page's relevance, it is important to evaluate if the content directly relates to the research topic or question at hand. We must also consider precision and recall, where precision is the correctness of the information in context, and recall is the completeness of the information provided.

Assessing report quality goes beyond just ensuring high-quality content; it involves meeting the intention of the assignment and the specific requests of the task. It also includes identifying any opportunities and threats that arise during the research process. Moreover, conclusions and recommendations should be supported with data and logic to ensure that the decision based on the report is sound.

please tell me if I'm doing it right?
design a 4-bit even up-counter using D flip flop by converting combinational circuit to sequential circuit. The counter will only consider even inputs and the sequence of inputs will be 0-2-4-6-8-10-0.
1. Draw the State diagram.
2. Generate State & Transition Table.
3. Generate simplified Boolean Expression.
4. Design the final Circuit diagram.

Answers

Answer:

Below is a possible implementation using D-flip-flops.

Explanation:

Creating a counter that only counts even numbers is easy, just add a dummy bit-0 that is always 0. Creating a counter with D-flip-flops is also quite straightforward. The clock should be connected to the clock of the least significant bit, and the !Q output of the D flip flop should be fed back to the D input. Also, !Q should be used as a clock for the next bit.

Now, letting the counter wrap around to zero at 10 is tricky because of switching hazards. I created an NAND gate that compares the outputs to be 101, and the clock to be 0. Only this way you can guarantee that the outputs are stable. Now the resulting signal has to be delayed for one clock pulse. This can be achieved with an additional flip flop. The Q output of that flip flop operates the async resets of the counter flipflops.

You have been handed a mysterious piece of data by an unknown person. Judging by his shifty eyes and maniacal laughter you don't think he can be trusted. Complete the below method to tell you the type for this unknown data. The example already implemented can be adapted for other wrapper classes as well. Complete the method to analyze String, Character, and Double. Examples: whatAmI(1) -> "Integer" 1 public String whatAmI(E e) { 3 //.getClass() returns the runtime class of an object //.equals() determines whether two objects are equivalent //by calling a new static instance of a wrapper object we can analyze //it's class type and compare it to the variable passed in if(e.getClass().equals(new Integer(1).getClass()) { return "Integer"; }else{ return "Who knows!"; Given a word, use a stack to reverse the word and return a new string with the original word in reverse order. You cannot use the reverse string methods in the String class. Examples: reverseword("hello") -> "olleh" reverseword("hallo") -> "ollah" i public String reverseWord(String word) Stack character> stack = new Stack ;

Answers

Answer:

Java Code given below with appropriate comments for better understanding

Explanation:

1.

public String whatAmI(E e) {

//.getClass() returns the runtime class of an object

//.equals() determines whether two objects are equivalent

//by calling a new static instance of a wrapper object we can analyze

//it's class type and compare it to the variable passed in

if(e.getClass().equals(new Integer(1).getClass())) {

return "Integer";

}

else if(e.getClass().equals(new String("1").getClass())) {

return "String";

}

else if(e.getClass().equals(new Double(1.0).getClass())) {

return "Double";

}

else {

return "Who knows!";

}

}

2.

public String reverseWord(String word) {

   Stack<Character> stack = new Stack<Character>();

   for (int i = 0; i < word.length(); i++) {

       stack.push(word.charAt(i));

   }

   String result = "";

   while (!stack.isEmpty()) {

       result += stack.pop();

   }

   return result;

}

Creating a Graphical User Interface in Java
1. Write the Java statement that creates a JPanel named payroll Panel.
2. Write the Java statement that creates a JButton named saveButton.

Answers

Answer:

JPanel PayrollPanel=new JPanel();

JButton saveButton=new JButton("Save");

A full code snippet and screen shot is provided in the explanation section

Explanation:

import java.awt.*;

import javax.swing.*;

public class TestClass {

   TestClass()  {

       JFrame f= new JFrame("Payroll Panel");

       JPanel payrollPanel=new JPanel();

       payrollPanel.setBounds(10,20,200,200);

       payrollPanel.setBackground(Color.gray);

       JButton saveButton=new JButton("Save");

       saveButton.setBounds(50,100,80,30);

       saveButton.setBackground(Color.yellow);

       payrollPanel.add(saveButton);

       f.add(payrollPanel);

       f.setSize(400,400);

       f.setLayout(null);

       f.setVisible(true);

   }

   public static void main(String args[]) {

       new TestClass();

   }

}

Answer:

JPanel PayrollPanel=new JPanel();

JButton saveButton=new JButton("Save");

A full code snippet and screen shot is provided in the explanation section

Explanation:

import java.awt.*;

import javax.swing.*;

public class TestClass {

  TestClass()  {

      JFrame f= new JFrame("Payroll Panel");

      JPanel payrollPanel=new JPanel();

      payrollPanel.setBounds(10,20,200,200);

      payrollPanel.setBackground(Color.gray);

      JButton saveButton=new JButton("Save");

      saveButton.setBounds(50,100,80,30);

      saveButton.setBackground(Color.yellow);

      payrollPanel.add(saveButton);

      f.add(payrollPanel);

      f.setSize(400,400);

      f.setLayout(null);

      f.setVisible(true);

  }

  public static void main(String args[]) {

      new TestClass();

  }

}

Using your favorite imperative language, give an example of each of the following. (a) A lexical error, detected by the scanner (b) A syntax error, detected by the parser (c) A static semantic error, detected by semantic analysis (d) A dynamic semantic error, detected by code generated by the compiler

Answers

Explanation:

a. int foo+; (foo+ is an invalid identifier because + is not a valid char in identifiers)

b. foo int; (Syntax error is any error where the syntax is invalid - either due to misplacement of words, bad spelling, missing semicolons etc.)

c. Static semantic error are logical errors. for e.g passing float as index of an array - arr[1.5] should be a SSE.

d. I think exceptions like NullReferenceException might be an example of DME. Not completely sure but in covariant returns that raise an exception at compile time (in some languages) might also come in this category. Also, passing the wrong type of object in another object (like passing a Cat in a Person object at runtime might qualify for DME.) Simplest example would be trying to access an index that is out of bounds of the array.

If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fall within?

Answers

Answer:

LAN

Explanation:

A LAN ( local area network) is network that is installed with a small area like a building. It can be connected to a WAN or wide area network. The connection between the devices in a LAN network could be with cable (Ethernet protocol) or wireless using WiFi protocol.

The traditional connection in a LAN is with cable, but sometimes, a wireless connection can be used, this is called a WLAN (wireless local area network). Both form of connections are still under the LAN domain.

Which of the following is the binary translation of signed decimal -33 ?
a. 11011111
b. 10101011
c. 11001100
d. 11100011

Answers

Answer:

A. 11011111

Explanation:

To convert -33 to a signed binary number, a 2's complement representation of the number is used. Signed numbers are stored on the computer using 2's complement notation.

(i) First convert 33 to binary

2  |   33

2  |    16 r 1

2  |    8 r 0

2  |    4 r 0

2  |    2 r 0

2  |     1 r 0

2  |     0 r 1

Therefore writing the remainders from bottom to top, we have that

33 in binary is 100001

(ii) Since the options are all in 8 bits, convert the binary to its 8-bit representation by padding it with zeros(0s) at the left.

=> 100001 = 00100001

(iii) Now, convert to 2's complement by

(a) flipping all the bits in the binary number. i.e change all 1s to 0s and all 0s to 1s

=> 00100001 => 11011110

(b) and then adding 1 to the result as follows;

1 1 0 1 1 1 1 0

+                1

1 1 0 1 1 1 1 1

Therefore, -33 to binary is 11011111

Hope this helps!

Final answer:

The binary translation of signed decimal -33 in two's complement representation is 11011111, which corresponds to option (a).

Explanation:

To find the binary translation of the signed decimal -33, we use the two's complement method which is a way of encoding negative numbers in binary. First, we find the binary representation of the positive number, then invert all the bits (change 0s to 1s and 1s to 0s), and finally, add 1 to that inverted number.

The binary representation of 33 is 00100001. Inverting the bits gives us 11011110. Adding 1 to that gives us 11011111, which is option (a).

For a wire with a circular cross section and a diameter = 3.00mm calculate the following: (m means meter. mm means millimeter. cm means centimeter.) Calculate the cross sectional area in mm2. Calculate the cross sectional area in cm2

Answers

Answer:

The cross sectional area in mm2 is 7.07[tex]mm^{2}[/tex]

The cross sectional area in cm2 is 0.0707[tex]cm^{2}[/tex]

Explanation:

The cross-sectional area (a) of the wire is given by;

a = [tex]\pi[/tex] x [tex]\frac{d^{2} }{4}[/tex]

where d is the diameter of the cross section = 3.00mm

1 => To find the cross-sectional area in [tex]mm^{2}[/tex], substitute the value of d = 3.00mm into the equation above as follows;

a = [tex]\pi[/tex] x [tex]\frac{3.00^{2} }{4}[/tex]

Taking [tex]\pi[/tex] to be [tex]\frac{22}{7}[/tex] we have;

a = [tex]\frac{22}{7}[/tex] x [tex]\frac{3.00^{2} }{4}[/tex]

a = 7.07[tex]mm^{2}[/tex]

2 => To find the cross-sectional area in [tex]cm^{2}[/tex], first convert the diameter in mm to cm as follows;

3.00mm = 0.3cm

Now, substitute the value of d = 0.3cm into the equation above as follows;

a = [tex]\pi[/tex] x [tex]\frac{0.3^{2} }{4}[/tex]

Taking [tex]\pi[/tex] to be [tex]\frac{22}{7}[/tex] we have;

a = [tex]\frac{22}{7}[/tex] x [tex]\frac{0.3^{2} }{4}[/tex]

a = 0.0707[tex]cm^{2}[/tex]

Final answer:

The cross-sectional area of the wire is approximately 0.07069 mm² in mm² and 0.0007069 cm² in cm².

Explanation:

To calculate the cross-sectional area of the wire in mm2, we can use the formula for the area of a circle:

A = πr2

Since the diameter of the wire is given as 3.00mm, the radius is half of that, which is 1.50mm. Converting mm to cm, the radius becomes 0.15cm. Plugging this value into the area formula, we get:

A = π(0.15cm)2

A ≈ 0.07069 cm2

To calculate the cross-sectional area of the wire in cm2, we can simply convert the area in mm2 to cm2. Since 1 cm is equal to 10 mm, we divide the area in mm2 by 100:

A in cm2 ≈ 0.07069 cm2 ÷ 100

A ≈ 0.0007069 cm2

a. Use the Euclidean algorithm to compute the GCDs of the following pairs of integers State how many iterations each one takes to compute, and the value of the potential s at each stage. Verify that indeed si+1≤2/3si. i. (77,143) ii. (90, 504) ii. (376, 475) iv. (987, 1597)b. Try to find pairs of inputs (x, y such that the number of iterations of Euclid(x, y) is "large", that is, as close as possible to the upper bound of loga3/2(x+y) that we derived in lecture. Can you come up with a hypothesis about what kinds of inputs yield the worst-case running time?

Answers

Answer:

Explanation:

(a). given GCD (77,143)

143 = 77.1 + 66

77 = 66.1 + 11

66 = 11.6 + 0

∴ the gcd (77,143) = 11

the number of iterations = 3

(ii). GCD(90,504)

504 = 90.5 + 54

90 = 54.1 + 36

54 = 36.1 + 18

36 = 18.2 + 0

∴ the gcd(90,504) = 18

the number of iterations = 4

(iii). GCD(376,475)

475 = 376.1 + 99

376 = 99.3 + 79

99 = 79.1 + 20

79 = 20.3 + 19

20 = 19.1 + 1

19 = 1.19 + 0

∴ the gcd(376,475) = 1

the number of iterations = 6

(iv). GCD(987,1597)

1597 = 987.1 + 610

987 = 610.1 + 377

610 = 377.1 +233

377 = 233.1 +144

233 = 144.1 + 89

144 = 89.1 + 55

89 = 55.1 + 34

55 = 34.1 + 21

34 = 21.1 + 13

21 = 13.1 = 8

13 = 8.1 9+ 5

8 = 5.1 + 3

5 = 3.1 + 2

3 = 2.1 + 1

2 = 1.2 + 0

∴ the gcd(987,1597) = 1

the number of iterations = 15

(b). the pairs of inputs for which the number of iterations is large is given thus;

1. gcd(8,5)

8 = 5.1 + 3

5 = 3.1 + 2

3 = 2.1 + 1

2 = 1.2 + 0

the number of iterations from this is 4

2. also gcd(8,13)

13 = 8.1 + 5

8 = 5.1 + 3

5 = 3.1 + 2

3 = 2.1 + 1

2 =1.2 + 0

the number of iteration from this is 5

→ from the examples given, the worst case scenario occurs when the inputs are conservative Fibonacci numbers.

cheers, i hope this helps.

Other Questions
PLs help 50 PTS!!!!! PLEASE ILL GIVE BRAINLIEST!!!!! In the field of science, there are still many scientists that question the process of Darwinian evolution a. True b. False The volume of the box is cubic feet.The solution is There are 25 white cars, 15 blue cars, 21 red cars, and 30 black cars on a dealership lot. What is the probability of selecting a red car off the lot? Round to three decimals. President Johnson's plan for Reconstruction was opposed in Congress by a group known as _________________, who advocated full civil rights for blacks. One year ago, you purchased 300 shares of Southern Cotton at $32.60 a share. During the past year, you received a total of $280 in dividends. Today, you sold your shares for $35.80 a share. What is your total return on this investment? According to Montaigne, why is he writing his essays? A sphere completely submerged in water is tethered to the bottom with a string. The tension in the string is one-fourth the weight of the sphere.What is the density of the sphere? .Can competitors imitate FedExs approach in international markets and take market share away from the company? Why or why not? Identify the true statements about colloids. a.) Emulsions are a type of colloid b.) The particals of a colloid are larger than the particles of a solution c.) The particles of a colloid will settle over time d.) Many colloids scatter light (tyndal effect) Both mitosis and meiosis are forms of cell division that produce daughter cells containing genetic information from the parent cell. (a) Describe TWO events that are common to both mitosis and meiosis that ensure the resulting daughter cells inherit the appropriate number of chromosomes. (b) The genetic composition of daughter cells produce by mitosis differs from that of the daughter cells produced by meiosis. Describe TWO features of the cell division processes that lead to these differences. Some people believe that ________ are messages that can be sent to consumers, prompting them to buy a product without their being aware of receiving such messages Which of the following hormones is released by the corpus luteum after ovulation and causes a negative feedback loop with the hypothalamus and the anterior pituitary?A) progesteroneB) luteinizing hormoneC) gonadotropin releasing hormoneD) estrogenE) gonadotropin i ule Tollowing questions:1)"Something there is that doesn't love a wall"e a wall,der it,What effect is achieved by the author's choice to begin the poem withthis line?tast.A)It makes the reader wonder what the 'something' is.It sets up the characters to which we will soon beintroducedstone,ding,mean,themIt lets us know that this will be a poem written in theblank verse style.n there.D)It gives us crucial facts about the setting of the poem.atatament? The process by which an individual seeks out environments that correspond to their genotypic characteristics is described as the ______ effect:_____________. Keisha bought cups of coffee and bagels for the people in her office. Each bagel cost $2 and each cup of coffee cost $1.50. Keisha spent a total of $40 to buy 23 items. Let x represent the number of bagels and y represent the number of cups of coffee. A negative linear relationship implies that larger values of one variable will result in smaller values in the second variable. T/F During the middle of a test, your instructor announces that there's a typographical error on one of the questions. As you listen, the auditory information is being processed in your _____ lobe. Between 1916 and 1917 Question 3 (2 points) The following passage is from page 32 of the book Timeless Classics by Fiona Pagona: The Pulitzer Prize-winning novel To Kill a Mockingbird is Harper Lees first and only published book. But as the saying goes, If you do something right the first time, you need to do it only once. The 1960 tale has become a timeless classic. To Kill a Mockingbird was made into a film. It won several Academy Awards. The novel was even adapted to play form. Lee was awarded the Presidential Medal of Freedom, the highest honor a U.S. civilian can receive. Other recipients include Csar Chvez and Walt Disney.Which of these plagiarizes the passage shown above?Question 3 options:Lee joined award winners like Csar Chvez and Walt Disney in receiving the Presidential Medal of Freedom (Pagona 32).Harper Lee has published only one novel, To Kill a Mockingbird, but the book has become widely popular (Pagona 32).Lee was awarded the Presidential Medal of Freedom, the highest honor a U.S. civilian can receive (Pagona 32).The story of To Kill a Mockingbird can be experienced in a variety of different ways, such as in movie form or play form (Pagona 32). Steam Workshop Downloader