Answer:
Certification
Explanation:
Certification verifies that a person has appropriate experience and skills to carry out their task or job.
This is achieved through some test or examination, through some professional training or by gaining some work experience.
This provides with the credentials required to perform their jobs efficiently with proficient skills that can be trusted by companies and customers.
For example having an IT certification means having necessary skills to perform IT related tasks. IT field is a vast field which keeps evolving with time so being an IT certified refers to having updated knowledge about dynamic computer and information technologies.
Design a class named Car that has the following fields:
yearModel: an int instance variable that holds the car’s year model.
make: a string instance variable that holds the make of the car.
speed: an int instance variable that holds the car’s current speed.
In addition, the class should have the following methods.
Constructor 1: no-arg constructor set the yearModel, make and speed to 2000, Nissan and 4, respectively.
Constructor 2: this is an overloaded constructor. This constructor should accept the car’s year model, speed, and make as arguments. These values should be assigned to the object’s yearModel, speed and make fields.
Accessor (getters): appropriate accessor methods to get the values stored in an object’s yearModel, make, and speed fields.
Mutator (setters): appropriate mutator methods to store values in an object’s yearModel, make, and speed fields.
toString: returns a string describing the object’s yearModel, make and speed.
Answer:
// The class car is defined
public class Car {
// instance variable yearModel
private int yearModel;
// instance variable make
private String make;
// instance variable speed
private int speed;
// empty constructor
// with instances inside it
// the instances are from the question
public Car(){
yearModel = 2000;
make = "Nissan";
speed = 4;
}
// overloaded constructor
// constructor defined with three arguments
public Car(int yearModel, String make, int speed) {
// the arguments are assigned to the object's variable
this.yearModel = yearModel;
this.make = make;
this.speed =speed;
}
// setter(mutator) method
public void setYearModel(int yearModel){
this.yearModel = yearModel;
}
// setter(mutator) method
public void setMake(String make){
this.make = make;
}
// setter(mutator) method
public void setSpeed(int speed){
this.speed = speed;
}
// getter(accessor) method
public int getYearModel(){
return yearModel;
}
// getter(accessor) method
public String getMake(){
return make;
}
// getter(accessor) method
public int getSpeed(){
return speed;
}
// toString is override to display the car object properties
public String toString(){
return "Car's year model: " + getYearModel() + ", make: " + getMake() + ", speed: " + getSpeed();
}
}
Explanation:
The code is well commented.
Discuss whether the redundant data should be addressed prior to beginning the wireless network architecture project, in coordination with the network architecture project, or after the project has been completed.
Answer:
Before the project
Explanation:
We must o administrate and elaborate a prioritization about this redundant data, if we started after, we're going to lose a general view about the data, and when we're talking about redundant data always must be prevention and not monitoring, because any network must have redundant data, if we try to fix a network or database with this problem, we could delete delicate data.
Discuss how a router knows where to send a message and then any experience you might have setting one up. In your opinion what are the challenges in establishing a network connection between two points over a large distance? Describe your own knowledge of this network configuration.
Answer:
Routing table and routing table population.
Explanation:
A router is an intermediate network device used to determine a good path for routing packets. It is a layer 3 device. Each interface of the router is a broadcast domain, that is, it represents a network.
It uses its routing table to find paths to a network. The router's routing table can populated (to add more routes) statically and dynamically.
To populate a routing table statically, use the format, "IP rout 'network address' 'subnet mask' 'next hop address'".
To populate dynamically, the protocols like RIP, OSPF, BGP, EIGRP etc, are used. The static routing is good for small networks because routing table population is manual while dynamic routing is good for large networks because it's routing table population is automatic.
Given a 3 Gbps link with TCP applications A, B, and C. Application A has 25 TCP connections to a remote web server Application B has 4 TCP connection to a mail server Application C has 3 TCP connections to a remote web server. According to TCP "fairness", during times when all connections are transmitting, how much bandwidth should Application C have?
(The answer is 281.3 Mbps, but please show me how.)
Answer:
Application C has 281.3 Mbps.
Explanation:
The TCP A, B and C connections all share a 3Gbps link.
Where 3Gbps is the bandwidth ( the number of bits or bytes the link can transmit in one second) and is equivalent to 3,000,000,000 bytes.
Connection on TCP A = 25,
Connection on TCP B = 4,
Connection on TCP C = 3,
The total number of connections are = 25 + 4 + 3 = 32.
When all connections are using the link,
The TCP C bandwidth is = (3/32) x 3,000,000,000 bytes.
= 0.09375 x 3,000,000,000
= 281250000 bytes.
= 281.25 Mbps or 281.3 Mbps.
A startup company is using an excel spreadsheet to keep track of the billable hours that each employee spends on a project. As you can see, they are not data modelers. They would like to convert the spreadsheet into a database that they can use as a back end for a time keeping application. The column names of the spreadsheet are shown below:
Project ID Project Name Project Manager Project Manager Location Employee ID
Employee Name Employee Location Title Hourly Rate Billable Hours
Draw a dependency diagram for the schema and identify all dependencies, including all partial and transitive dependencies. You can assume that the table does not contain repeating groups. Here are the field descriptions:
Project ID – the identifier for the project
Project Name – the name of the project
Project Manager – the name of the project manager for a project, projects can have more than one project manager
Project Manager Location – location of the project manager
Employee ID – the identification number for an employee
Employee Name – the name of an employee
Employee Location – the location of an employee
Title – the position title for the employee
Hourly Rate – the rate that is charged to the project sponsor based on the position of the employee
Hours worked – the number of billable hours that an employee has charged to a project
2. Remove all partial and transitive dependencies and draw a new set of relations in third normal form. Put your thinking cap on because there are some obvious data management pitfalls associated with the above relation.
3. Draw the entity relationship diagram.
4. Based on your ERD, draw the physical data model including tables, attributes, data types, primary keys, and foreign keys.
Answer:
Hello there! There are 4 parts to this question, all regarding relational database concepts.
Explanation:
Parts 1, 2, 3, 4 are drawn in attachments. For Part 4, the "foreign keys" would be the id fields of the joining table, and the "primary keys" are the IDs of the table itself. Data types are "integer" for ID, "string" for text columns like Name and Location, and "Decimal" for Hourly rate in the Timesheet table. Note that we can further simplify the erd from the one constructed earlier in part 3 to remove the Project Manager model and instead add a Project Manager "boolean" flag in the Employee table since a Project Manager is also an Employee.
Discuss the type of noise that is the most difficult to remove from an analog and a digital signal? Give reasons for your answer. How does error detection and correction work with wireless signals? Is data compressed when being transmitted? Describe the process.
Answer:
Explanation: One of the noise difficult to remove is "Flicker noise". This noise is a 1/f power spectral density that occurs in almost all electronic devices, which increases the overall noise level. It also shows up with variety of other effects, such impurities in conductive channels of electronic components.
Error detection and correction in wireless signals work by modulating the carrier signals of a waveform through radio transmission.
Data is not compressed when transmitted, rather data is broken into fragments known as packets and transmitted by method of packet switched networking and applying a protocol called "Transmission control protocol".
Final answer:
The answer discusses the challenges of removing noise from analog and digital signals, error detection and correction with wireless signals, and the data compression process.
Explanation:
Analog vs. Digital Signal Noise
Most Difficult Noise to Remove: The most challenging noise to remove from an analog signal is cumulative noise that builds up with each copy due to continuous variability. In digital signals, noise is less problematic as it can be regenerated and removed.
Error Detection and Correction with Wireless Signals: Error detection and correction in wireless signals involve adding redundant data to check for errors and correct them if detected.
Data Compression Process: Data is compressed before transmission by reducing redundant information, utilizing encoding schemes like lossless or lossy compression.
Within a Microsoft Windows environment, who has access rights to the Encrypting File System (EFS) features and functions?
Answer:
creator of EFS file and domain of administration.
Explanation:EFS stands for encrypting file system, as the name suggests this system is used to encrypt files. It is easy to handle and it is not function-able on window 7 home, windows 7 premium. Though it is easy to installed, deployment in large environment needed careful planning
Though all the users have access to EFS features, only members with authority has the right to decrypt.
Craig wants to create a computing infrastructure that will allow developers within his company to build applications on a primarily internally hosted platform rather than outsourcing the infrastructure to a third party provider. However, he wants the ability to easily interact with AWS products. Which of the following could Craig use to do so?
a. Patchouli
b. Lavender
c. Eucalyptus
d. Basil
Eucalyptus is the correct choice for creating a privately hosted computing infrastructure with easy interaction with AWS products, offering compatibility through AWS APIs.
Craig is looking for a solution to create a computing infrastructure that allows for internal hosting but also provides ease of interaction with AWS services. The correct answer to this question is c. Eucalyptus. Eucalyptus is an open-source software platform that enables organizations to implement on-premises Infrastructure as a Service (IaaS) clouds with strong compatibility with AWS products.
It allows businesses to create private clouds that are interoperable with AWS, using AWS APIs to manage resources within the Eucalyptus private cloud. This means developers can use the same tools and skills they would for AWS, providing a seamless transition between the private cloud and AWS services when needed for scalability or additional services.
While multiple objects of the same class can exist, in a given program there can be only one version of each class. Group of answer choices True False
Answer:
True
Explanation:
OOP or object oriented programming is a structured programming process that relates or classify data into fields. It is based on creating objects with available data.
OOP deals with classes and objects. Classes are containers or a defined collection of objects. Objects are collections of data that identifies that object.
An example of class and object is man and John, where man is the class and John, the object.
There can only be one version of the class "man" in the program.
Your Community Supported Agriculture (CSA) farm delivers a box of fresh fruits and vegetables to your house once a week. For this Programming Project, define the class Box Of Produce that contains exactly three bundles of fruits or vegetables. You can represent the fruits or vegetables as an array of type string. Add accessor and mutator functions to get or set the fruits or vegetables stored in the array. Also write an output function that displays the complete contents of the box on the console.
Next, write a main function that creates a Box Of Produce with three items randomly selected from this list:
Broccoli Tomato Kiwi Kale Tomatillo.
This list should be stored in a text file that is read in by your program. For now you can assume that the list contains exactly five types of fruits or vegetables. Do not worry if your program randomly selects duplicate produce for the three items.
Next, the main function should display the contents of the box and allow the user to substitute any one of the five possible fruits or vegetables for any of the fruits or vegetables selected for the box.
After the user is done with substitutions output the final contents of the box to be delivered.
Answer:
C++.
Explanation:
class BoxOfProduce {
private:
string fruit_bundles[3][5];
////////////////////////////////////////////////////////////////////////
public:
// Methods 1, 2 and 3
void setFruit(string fruit, int bundle, location) {
self.fruit_bundles[bundle][location] = fruit;
}
string getFruit(int bundle, int location) {
return self.fruit_bundles[bundle][location];
}
void printBundle(int bundle) {
cout<<"Bundle "<<i<<endl;
for (int j = 0; j < 5; j++) {
cout<<fruit_bundles[bundle][j]<<", ";
}
cout<<endl;
}
};
////////////////////////////////////////////////////////////////////////
// Main
int main() {
BoxofProduce box_of_produce1;
// Get fruit names from file and add to box_of_produce1
ifstream myfile("fruitList.text");
int line_number = rand() % 5 + 1;
string fruit;
if (myfile.is_open()) {
for (int i = 1; i <= line_number; i++) {
getline(myfile, fruit);
}
}
box_of_produce1.setFruit(fruit, 1);
// Print contents of bundle 1
box_of_produce.printBundle1(1);
// Left one - Allow the user to substitute any one of the five possible fruits or vegetables for any of the fruits or vegetables selected for the box.
return 0;
}
During the system investigation stage, __________ studies are done to determine if the hardware, software, and communications components can be developed and/or acquired to solve the business problem.
Answer:
The correct answer is "Technical Feasibility".
Explanation:
System investigation is used to Review that whether the system is feasible or not for the proposal that they will design or creating.in the system investigation stage, we do the technical feasibility. The technical feasibility is used to check technical resources like hardware, software, etc in the organization.
The Technical Feasibility in the System investigation is used to solve the problem of business
n the case of the sentinel-controlled while loop, the first item is read before the while loop is entered. True False
Answer:
True
Explanation:
Sentinel-controlled repetition is often called indefinite repetition because the number of repetitions is not known before the loop begins executing. A sentinel value must be chosen that cannot be confused with an acceptable input value.
The pseudocode for a sentinel-controlled while loop look like this:
Prompt the user to enter the first inputInput the first value (possibly the sentinel)While the user has not yet entered the sentinel Execute some statement block Prompt the user to enter the next grade Input the next grade (possibly the sentinel)Section 1.10 cites as a pitfall the utilization of a subset of the performance equation as a performance metric. To illustrate this, consider the following two processors. P1 has a clock rate of 4 GHz, average CPI of 0.9, and requires the execution of 5.0E9 instructions. P2 has a clock rate of 3 GHz, an average CPI of 0.75, and requires the execution of 1.0E9 instructions(a)One usual fallacy is to consider the computer with the largest clock rate as having the largest performance. Check if this is true for P1 and P2. (5pts)
(b)Another fallacy is to consider that the processor executing the largest number of instructions will need a larger CPU time. Considering that processor P1 is executing a sequence of 1.0E9 instructions and that the CPI of processors P1 and P2 do not change, determine the number of instructions that P2 can execute in the same time that P1 needs to execute 1.0E9 instructions. (5pts)
(c)A common fallacy is to use MIPS (millions of instructions per second) to compare the performance of two different processors, and consider that the processor with the largest MIPS has the largest performance. Check if this is true for P1 and P2. (5pts)
(d)Another common performance figure is MFLOPS (millions of floating-point operations per second), defined as
MFLOPS = No. FP operations / (execution time X IE6)
But this figure has the same problems as MIPS. Assume that 40% of instructions executed on both P1 and P2 are floating-point instructions. Find the MFLOPS figures for the processors.
Answer:
Following is given the detailed solution of each part. I hope it will help you!
Explanation:
How is prior video game experience related to Top Gun scores? Select the correct conlcusion. a. Surgeons who have played some video games, but not intensely, do better at the Top Gun program. b. Surgeons who have never played video games do better at the Top Gun program. c. Surgeons who have done a lot of video gaming do better at the Top Gun program. d. Surgeons who have played video games for any amount of time perform the same at the Top Gun program e. as the surgeons who have never played video games.
Answer:
c. Surgeons who have done a lot of video gaming do better at the Top Gun program.
Explanation:
Video gaming is digital entertainment system that mimics real life or fiction action and sport events, controlled digitally by a user or player.
It gaming experience can be brain teasing and procedural. An individual with a prior knowledge of one game, can easily adapt to another and play better as long as the controls has being mastered. A surgeon with no prior knowledge in video gaming, would find it hard to play and would take a reasonable period of time to learn the game.
True or false? (a) Main memory is volatile. (b) Main memory is accessed sequentially. (c) Disk memory is volatile. (d) Disk memory is accessed sequentially. (e) Main memory has greater storage capacity than disk memory. (f) Main memory has faster access time than disk memory.
Answer:
The answer to your question is true
What is the primary method used by system administrators to apply policy settings in Active Directory? Microsoft Assessment and Planning (MAP) toolkit Domain Name Services (DNS) Lightweight Directory Access Protocol (LDAP) Group Policy Objects (GPO)
Answer:
Group Policy Object (GPO)
Explanation:
A Group Policy Object is simply known as a collection of setting that are created by system administrators using the Microsoft Management Console Group Policy Editor. This method is usually associated with one or sometimes more than one Active Directory containers, which includes organizational units, domains, and sites.
Write a program that converts grams to pounds. (One pound equals 453.592 grams.) Read the grams value from the user as a floating point value.
Answer:
import java.util.Scanner;
public class TestClock {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter Value in grams");
double grams = in.nextDouble();
double pounds = 453.592*grams;
System.out.println(grams+" grams is equal to "+pounds+" pounds");
}
}
Explanation:
Import the Scanner Class to receive user inputSave the user input in a variableUse the conversion 1 pound = 453.592 grams to calculate the equivalent gramsOutput the the value of pounds calculatedThe program that converts grams to pounds is as follows;
def grams_to_pounds(x):
weight_in_pounds = x / 453.592
return weight_in_pounds
w1 = grams_to_pounds(500)
w2 = grams_to_pounds(1000)
w3 = grams_to_pounds(2000)
print(w1)
print(w2)
print(w3)
Code explanationA function grams_to_pounds is declared with an argument x . The argument x is the mass in grams.The variable weight_in_pounds is use to store the value of when the mass in grams is divided by 453.592Finally, we call our function with it parameter, using the variables w1, w2 and w3 to store it.The print statement is use to print the variables.learn more on python code here: https://brainly.com/question/1620423?referrer=searchResults
You are given a class named Clock that has one int instance variable called hours.
Write a constructor for the class Clock that takes one parameter, an int, and gives its value to hours.
The question involves writing a constructor for a Clock class in computer programming. A constructor initializes the hours instance variable with the provided integer parameter, allowing the Clock object to represent time accurately in hours.
Explanation:The student's question pertains to writing a constructor for a class named Clock in computer programming. When designing a class in object-oriented programming (OOP), a constructor is used to initialize the class's fields. For the Clock class with an hours instance variable, the constructor will set the initial value of hours based on the integer parameter provided when a new Clock object is created.
public class Clock {The variable hours represents the number of hours, which can be related to time where '1 hour X 60 minutes' indicates that one hour consists of 60 minutes. The constructor ensures that hours are correctly assigned from the parameter to the instance variable when a Clock object is instantiated.
Write a function call it isEvenPositiveInt which takes an integer x and return true if x is positive and also even. Note isinstance(x, int) will return True if x is an integer
So
>>> isinstance (23, int)
True
>>> isinstance (12.34, int)
False
>>> isinstance (12.34, float)
True
Answer:
The program to this question as follows:
Program:
def isEvenPositiveInt(x): #defining method isEvenPositiveInt
if x>0: #checking number is positive or not
if x%2==0: #check true condition
return True #return value True
else:
return False #return value False
return False #return value False
print(isEvenPositiveInt(24)) #calling method and print return value
print(isEvenPositiveInt(-24)) #calling method and print return value
print(isEvenPositiveInt(23)) #calling method and print return value
Output:
True
False
False
Explanation:
In the above Python program, a method "isEvenPositiveInt" is defined, that accepts a variable "x" as its parameter, inside the method a conditional statement is used, which can be described as follows:
In the if block the condition "x>0" is passed, that check value is positive, if this condition is true, it will go to another if block. In another, if block is defined, that checks the inserted value is even or not, if the value is even it will return "true", otherwise it will go to the else part, that returns "false".Compute the sum of the values in data_array, instead of using the sum() function. To do this, you must "accumulate" a result, which means that you first create a variable, called data_array_sum, to hold the accumulating result and initialize it to 0. Then loop through your array, updating the accumulating data_array_sum by adding each data_array value as you go: data_array_sum = data_array_sum + data_array(i);
Answer:
public class TestClock {
public static void main(String[] args) {
int [] data_array = {1,2,3,5,3,1,2,4,5,6,7,5,4,3};
int data_array_sum =0;
for(int i=0; i<data_array.length; i++){
data_array_sum = data_array_sum + data_array[i];
System.out.println("Acumulating sum is "+data_array_sum);
}
System.out.println("Total sum is: "+data_array_sum);
}
}
Explanation:
Using Java programming language for this problem, we declare and initialize the array with this statement:
int [] data_array = {1,2,3,5,3,1,2,4,5,6,7,5,4,3};
Then created a variable to hold the sum values and initialize to zero:
int data_array_sum =0;
Using a For Loop statement we iterate through the array and sum up the values.
A pair of single quotes ' will prevent the shell from interpreting any special character. True or False
Answer:
The answer is "True".
Explanation:
A single quote is a punching mark also known as an apostrophe located on the US Standard keyboard near the Enter button.
It's also known as a direct quote, such markings are also used in a news article for marking a statement. If a paragraph is a capital letter within the next quote, it is a function of a single quote. It refers to verbal marks. A couple of quotes will avoid a unique character becoming interpreted by only the shell, that's why the given statement is true.In the twentieth century, Xerox’s ____ had outstanding research personnel—at the time almost half of the world’s top 100 computer scientists. Select one: a. SPARK b. PARC c. INTC d. AMD
In the twentieth century, Xerox’s PARC had outstanding research personnel—at the time almost half of the world’s top 100 computer scientists
Explanation:
PARC is the part of XEROX, whereas, SPARK is owned by Adobe. INTC is owned by Intel Corporation.and AMD's major share is hold by the Intel Corporation.Hence Xerox had the PARC, which enabled an outstanding research in the world, in the twentieth century.Recent interest of the PARC is on wireless technology in the year 2017.Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Quit", "quit", or "q" for the line of text python
To create a program that reverses text and repeats this process, a Python script uses a while loop and input function to read and reverse user input, finishing when 'Quit', 'quit', or 'q' is entered.
Creating a Text Reverse Program in Python
To create a program that reverses a line of text and repeats until the user decides to quit, we need to write a Python script that continuously reads user input and reverses it. The script will terminate when the user enters 'Quit', 'quit', or 'q'. Here is a simple Python program to accomplish this task:
while True:
user_input = input("Enter a line of text (type 'Quit', 'quit', or 'q' to exit): ")
if user_input in ['Quit', 'quit', 'q']:
break
print(user_input[::-1])
This program utilizes a while loop along with an input function to read text from the user. It then checks if the user wants to quit the program. If not, the program uses string slicing to reverse the text and print it out.
Suppose two hosts, A and B, are connected by a 10 Mbps link. The length of a packet is 12 Kb (Kilobits, i.e., 12 × 103 bits). The length of the link is 40 km. Assume that signals propagate at the speed of light (i.e., the ideal speed of 3 × 108 m/s (meters per second)).
Answer:
Answer is provided in the explanation section
Explanation:
Given data:
Bandwidth of link = 10* 106 bps
Length of packet = 12* 103 bits
Distance of link = 40 * 103m
Transmission Speed = 3 * 108 meters per second
Formulas:
Transmission Delay = data size / bandwidth = (L /B) second
Propagation Delay = distance/transmission speed = d/s
Solution:
Transmission Delay = (12* 103 bits) / (10* 106 bps) = 0.0012 s = 1.2 millisecond
Propagation Delay = (40 * 103 meters)/ (3 * 108mps) = 0.000133 = 0.13 millisecond
Create a java program that has a code file with main() in it and another code file with a separate class. You will be creating objects of the class in the running program, just as the chapter example creates objects of the Account class. Your system creates a registration bills for the billing part of a college. Create a class called Registration that holds the following information: first name, last name, number of credits, additional fees. The class should have all the gets and sets and also have a method to show the bill (with their name and the total which is 70 per credit + the additional fees) to the student. (You cannot have spaces in variable names. So you might call the first one firstName, first_name, fname or any other appropriate and legal variable name. The write up above is telling you the information to be stored in English, not java). Create 2 objects of Registration in your main code class and display the bills to the user with the method that shows the bill. Then add 3 credit hours to the first one, and subtract 3 credit hours from the second one and show the bills for both to the user again. (Hint: use the get) to read it out to a variable, add 3 (or subtract 3 for the second on), then use the set0 to store it back in replacing the old number of credit hours in the object.) (You can hard code the names, credit hours, and additional hours you are storing in the 2 Registration objects or ask the used for them with a Scanner. Either way is fine. It is perfectly all right from a grading standpoint to just give it test values like the chapter example does).
Answer:
public class Registration {
private String fname;
private String lname;
private int noCredits;
private double additionalFee;
public Registration(String fname, String lname, int noCredits, double additionalFee) {
this.fname = fname;
this.lname = lname;
this.noCredits = noCredits;
this.additionalFee = additionalFee;
}
public String getFname() {
return fname;
}
public void setFname(String fname) {
this.fname = fname;
}
public String getLname() {
return lname;
}
public void setLname(String lname) {
this.lname = lname;
}
public int getNoCredits() {
return noCredits;
}
public void setNoCredits(int noCredits) {
this.noCredits = noCredits;
}
public double getAdditionalFee() {
return additionalFee;
}
public void setAdditionalFee(double additionalFee) {
this.additionalFee = additionalFee;
}
public void showBill(){
System.out.println("The bill for "+fname+ " "+lname+ " is "+(70*noCredits+additionalFee));
}
}
THE CLASS WITH MAIN METHOD
public class RegistrationTest {
public static void main(String[] args) {
Registration student1 = new Registration("John","James", 10,
5);
Registration student2 = new Registration("Peter","David", 9,
13);
System.out.println("Initial bill for the two students: ");
student1.showBill();
student2.showBill();
int newCreditStudent1 = student1.getNoCredits()+3;
int newCreditStudent2 = student2.getNoCredits()-3;
student1.setNoCredits(newCreditStudent1);
student2.setNoCredits(newCreditStudent2);
System.out.println("Bill for the two students after adjustments of credits:");
student1.showBill();
student2.showBill();
}
}
Explanation:
Two Java classes are created Registration and RegistrationTest The fields and all methods (getters, setters, constructor) as well as a custom method showBill() as created in the Registration class as required by the questionIn the registrationTest, two objects of the class are created and initialized student1 and student2.The method showBill is called and prints their initial bill.Then adjustments are carried out on the credit units using getCredit ()and setCredit()The new Bill is then printedSearch engine optimization (SEO) techniques play a minor role in a Web site's search ranking because only well-written content matters. True False
Answer:
The correct answer to the following question will be "False".
Explanation:
Optimization of search engines or SEO is the process of increasing the efficiency and intensity of web traffic by increasing the accessibility of a web page or a web site to online search engine users.SEO applies to enhance unpaid performance which includes direct traffic/users and pay location transactions.Therefore, the given statement is false.
Answer:
False
Explanation:
Find a quote that you like. Store the quote in a variable, with an appropriate introduction such as "Ken Thompson once said, 'One of my most productive days was throwing away 1000 lines of code'". Print the quote.
Answer:
The program to this question as follows:
Program:
quote="You can always edit a bad page. You can’t edit a blank page."
name="Jodi Picoult"
print("Quote:\n",quote)
print ('\t\t\t\t\t\t\t',"Author name-", name)
Output:
Quote:
You can always edit a bad page. You can’t edit a blank page.
Author name- Jodi Picoult
Explanation:
In the above python code, two variable "quote and name" is defined, in which variable both variable holds some string value.
In the next line, the print function is defined, that first print "Quote" as a message, and for line breaking "\n" is used, then print quote variable value. In the last step, first, we use "\t" for line spacing then message "Author name-", and then name variable value.A ____ object is used to hold data that is retrieved from a database via the OleDbDataAdapter connection. a. DataRecord b. DataSource c. DataFile d. DataTable
Answer:
datatable
Explanation:
Answer:
the answer is
data table
Explanation:
i think so
Write an application that prompts a user for a month, day, and year. Display a message that specifies whether the entered date is (1) not this year, (2) in an earlier month this year, (3) in a later month this year, or (4) this month. Save the file as PastPresentFuture.jav
Answer:
Following is given the code with all necessary description given as comments in it. I hope it will help you!
Explanation:
Create a script that asks for the visitor's weight in pounds and his/her height in inches. The program should then calculate the body mass of the visitor. Display the weight, height, and body mass on the screen.
Answer:
weightPound = float(input("Enter your weight in pounds "))
heightInches = float(input("Enter your height in inches "))
weightKg = weightPound*0.453592
heightMeter = heightInches*0.0254
BodyMassIndex = weightKg/(heightMeter*heightMeter)
print("")
print("Your Weight in kilograms is: ")
print(weightKg)
print("Your Height in meters is: ")
print(heightMeter)
print("Your Body Mass Index is: ")
print(BodyMassIndex)
Explanation:
Above is a Python Script to accomplish the taskSee attached image for the program output.Observe that we used the formula weight/height*height to calculate the Body Mass IndexObserve also the conversion from pounds to Kilogram and inches to meters