Write a series of conditional tests. Print a statement describing each test and your prediction for the results of each test. For example, your code may look something like this:car = 'subaru'print("Is car == 'subaru'? I predict True.")print(car == 'subaru')print("\nIs car == 'audi'? I predict False.")print(car == 'audi')Create at least 4 tests. Have at least 2 tests evaluate to True and another 2 tests evaluate to False.

Answers

Answer 1

Answer:

this:name = 'John'

print("Is name == 'John'? I predict True.")

print(name == 'John')

print("\nIs name == 'Joy'? I predict False.")

print(car == 'Joy')

this:age = '28'

print("Is age == '28'? I predict True.")

print(age == '28')

print("\nIs age == '27'? I predict False.")

print(age == '27')

this:sex = 'Male'

print("Is sex == 'Female'? I predict True.")

print(sex == 'Female')

print("\nIs sex == 'Female'? I predict False.")

print(sex == 'Joy')

this:level = 'College'

print("Is level == 'High School'? I predict True.")

print(level == 'High School')

print("\nIs level == 'College'? I predict False.")

print(age == 'College')

Conditions 1 and 2 test for name and age

Both conditions are true

Hence, true values are returned

Conditions 3 and 4 tests for sex and level

Both conditions are false

Hence, false values are returned.

Answer 2
Final answer:

Conditional tests in Python allow you to check if a certain condition is True or False. Here are four examples of conditional tests with predictions and code outputs.

Explanation:Conditional Tests in Python

Conditional tests in Python allow you to check if a certain condition is True or False. They are often used in decision-making structures like if statements. Here are four examples of conditional tests:

age = 16

print('Is age greater than 18? I predict False.')

print(age > 18)

temperature = 25

print('Is temperature between 20 and 30? I predict True.')

print(20 < temperature < 30)

is_raining = False

print('Is it not raining? I predict True.')

print(not is_raining)

name = 'John'

print('Does name start with J? I predict True.')

print(name.startswith('J'))

These examples demonstrate how to use conditional statements in Python to check if certain conditions are True or False, and then execute different code based on the results.

Learn more about Conditional Tests here:

https://brainly.com/question/34742710

#SPJ3


Related Questions

Here are the steps. (1) Create a Student class containing an ID, a last name, and a list of course names such as "COP2210" or "COP2250". This should not be a string of multiple courses. The ID should be an integer which is printed with leading zeros. (2) Create a class named StudentTest that contains a List of students. Do not use the list provided here. In the class constructor, create 15 students and add them to the list. Each student's ID must be different. Each student you add to the list must contain 2-4 different course names. At least one should have two course names and at least one should have four course names. Make sure the students do not all have the same courses, although there should be some overlap (see the sample below). The student names must be inserted into the list in random order (not sorted). (3) Sort the list in ascending order by student last name and display the list. For each student, display the ID with leading zeros, last name, and list of courses on a single line. Here is sample output. Note how the tab character is inserted after the name to line up the next column containing courses. Be sure there is no trailing comma at the end of the list of courses.

Answers

Answer:

Java code is given below with appropriate comments

Explanation:

import java.util.*;

public class Student

{

String ID, lastName;

//Arraylist to store courses

ArrayList courses = new ArrayList();

public Student()

{

//Default constructor

ID = "";

lastName = "";

}

public Student(String I, String l)

{

//Parameterized Constructor to initialize

ID = I;

lastName = l;

int i, n;

String temp;

Scanner sc = new Scanner(System.in);

System.out.print("\nHow many courses you want to add: ");

n = Integer.parseInt(sc.nextLine());

if(n < 3){ //Cannot choose less than 3 courses

System.out.println("\nNumber of courses must be at least 3.");

return;

}

for(i = 1; i <= n; i++)

{

System.out.print("\nEnter course name: ");

temp = sc.nextLine();

if(courses.contains(temp))//If course already present

{

System.out.println("\nCourse already present. Try another.");

i--;

}

else

{

courses.add(temp); //Adding course

}

}

}

//Accessors

public String getID()

{

return ID;

}

public String getName()

{

return lastName;

}

public ArrayList getCourses()

{

return courses;

}

//Mutators

public void setID(String i)

{

ID = i;

}

public void setName(String n)

{

lastName = n;

}

public void setCourses(ArrayList c)

{

courses.clear();

courses.addAll(c);

}

}

class StudentTest

{

//To store 10 students

Student[] list = new Student[10];

public StudentTest(){

int i, j, flag;

Scanner sc = new Scanner(System.in);

for(i = 0; i < 10; i++)

{

String temp, l;

System.out.print("\nEnter student ID: ");

temp = sc.nextLine();

flag = 1;

for(j = 0; j < i; j++)

{

if(list[j].getID().equals(temp))//If ID already exists

{

System.out.println("\nID already exists. Try another.");

flag = 0;

i--;

break;

}

}

if(flag == 1)

{

System.out.print("\nEnter student Last name: ");

l = sc.nextLine();

list[i] = new Student(temp, l); //Initializing student

}

}

}

public void sort()

{

//To sort and display

int i, j;

String temp;

ArrayList t = new ArrayList();

for(i = 0; i < 9; i++)

{

for(j = 0; j < 9 - i; j++)

{

if(list[j].getName().compareTo(list[j + 1].getName()) > 0)//If list[j + 1].lastName needs to come before list[j].lastName

{

//Swapping IDs

temp = list[j].getID();

list[j].setID(list[j + 1].getID());

list[j + 1].setID(temp);

//Swapping last names

temp = list[j].getName();

list[j].setName(list[j + 1].getName());

list[j + 1].setName(temp);

//Swapping courses

t.clear();

t.addAll(list[j].getCourses());

list[j].setCourses(list[j + 1].getCourses());

list[j + 1].setCourses(t);

}

}

}

//Display

System.out.println();

for(i = 0; i < 10; i++)

{

System.out.print(list[i].getID() + ", " + list[i].getName());

//Using fencepost loop to print with comma before

System.out.print(" " + list[i].getCourses().get(0));

for(j = 1; j < list[i].getCourses().size(); j++)

System.out.print(", " + list[i].getCourses().get(j));

System.out.println();

}

}

public static void main(String args[])

{

StudentTest S = new StudentTest();

S.sort();

}

}

A sysadmin is looking to use Pre Booth Execution over a network by keeping operating system installation files on a server. Which type of server is this most likely to be?

SFTP server

TFTP server

FTP server

DNS server

Answers

Answer:

The correct answer is letter "B": TFTP server.

Explanation:

A TFTP server allows the system administrator to install programs on other computers from the same network and keeping a registry. This is mainly done to prevent loss of information in the case the network is corrupted or if one of the computers is infected with malicious software.

Which of the following attack is a threat to confidentiality?

a. snooping
b. masquerading
c. repudiation

Answers

Answer:

The correct answer is letter "B": masquerading.

Explanation:

The attack referred to as masquerading simply consists of impersonating the identity of an authorized user of an information system. The impersonation could take place electronically -the user has a login and password that does not belong to him to access a server- or personally -employees accessing restricted areas of a company.

b. masquerading attack is a threat to confidentiality.

Masquerade terms can be as follows:

The term "masquerade" refers to the act of pretending to be someone else.Masquerading is a simple attack that involves faking the identity of an authorized user of an information system.Impersonation can occur either electronically (e.g., when a user uses a login and password which does not belong to him to access a server) or personally (e.g., when workers get access to restricted sections of a firm).

Learn more: https://brainly.com/question/17085630

Which of the following commands would you use to start the program Main with four strings? a. java Main arg0 arg1 arg2 arg3 b. java Main argo arg1 arg 2 arg3 arg4c. java Main argo arg1d. java Main argo arg1 arg 2

Answers

Answer:

A  java Main arg0 arg1 arg2 arg3

Explanation:

The bee may travel to a different species of plant, so the pollen may not fertilize another flower. The wind can blow the dandelion seeds into an area where they can’t sprout. The squirrel might come back for the seeds it buried in the ground

With the rapid advance in information technologies, people around the world can access information quickly. Information takes the form of text, still pictures, video, sound, graphics, or animations, which are stored and transferred electronically through these computational technologies.

Answers

Answer: Word-for-word plagiarism

Explanation:

The student uses 7 straight words from the original text without applying quotations.

Final answer:

The Information Age is characterized by revolutionary technological advancements that have shifted economies from industrial to information-based. Information technology has facilitated the production, analysis, and dissemination of data, transforming it into valuable information. This era is marked by computer miniaturization and the growth of the Internet, which heavily influences daily life and potential ecological benefits.

Explanation:

In the Information Age, we have witnessed a monumental shift in how information is processed and disseminated, thanks to the rapid advancement of information technologies. This epoch is highlighted by the transition from the industrial economy to an information economy, greatly influenced by the advent of the personal computer in the late 1970s and the proliferation of the Internet in the early 1990s. The revolution in information technology has led to the miniaturization of electronics, integrating circuits and processing units, which are foundational to modern computing devices. These technological advancements have streamlined data collection, processing, and analysis, allowing vast amounts of data to be transformed into valuable information with applications spanning various fields and industries.

Data can be utilized repeatedly to generate new information when placed in context, answering questions, or providing insights, making it a significant commodity in today's world. The continuous evolution of computers and communications networks is a testament to how deeply embedded technology has become in daily life. Importantly, information and communications technology (ICT) not only encompasses traditional devices such as computers and smartphones but also potential future technologies like augmented reality glasses and virtual reality headgear.

The ecological benefits of these technological changes are also noteworthy. The Information Age may contribute to reduced natural resource consumption as societal functions such as shopping and working becomes increasingly digitized, potentially decreasing human energy consumption even as the economy grows. Overall, information technology continues to shape and redefine how we live, communicate, and interact with the world, marking a lasting impact on modern society.

Print person1's kids, call the incNumKids() method, and print again, outputting text as below. End each line with a newline.Sample output for below program with input 3:Kids: 3New baby, kids now: 4// ===== Code from file PersonInfo.java =====public class PersonInfo { private int numKids; public void setNumKids(int setPersonsKids) { numKids = setPersonsKids; } public void incNumKids() { numKids = numKids + 1; } public int getNumKids() { return numKids; }}// ===== end =====// ===== Code from file CallPersonInfo.java =====import java.util.Scanner;public class CallPersonInfo { public static void main (String [] args) { Scanner scnr = new Scanner(System.in); PersonInfo person1 = new PersonInfo(); int personsKid; personsKid = scnr.nextInt(); person1.setNumKids(personsKid); /* Your solution goes here */ }}// ===== end =====

Answers

Answer:

System.out.println("Kids: " + person1.getNumKids());

person1.incNumKids();

System.out.println("New baby, kids now: " + person1.getNumKids());

Explanation:

Reminder: To be able to call a function that is inside a class, we need to use an object of that class. In this case, person1 is our object. If we would like to access any function, we need to type person1.functionName().

1) We need to call getNumKids() to get how many kids they have (It is 3 because user inputs 3 and it is set to the this value using setNumKids() function). To call this function, we need to use person1 object that is created earlier in the main function. To be able to print the result, we call the function inside the System.out.println().

2) To increase the number of kids, we need to call incNumKids() method with person1 object again. This way number of kids are increased by one, meaning they have 4 kids now.

3) To get the current number of kids, we need to call getNumKids() function using person1 object. To be able to print the result, we call the function inside the System.out.println().

Answer:

System.out.println("Kids: " + person1.getNumKids());

person1.incNumKids();

System.out.println("New baby, kids now: " + person1.getNumKids());

Explanation:

A __________ watches for attacks and sounds an alert only when one occurs.a. network intrusion prevention system (NIPS)b. proxy intrusion devicec network intrusion detection system (NIDS)d. firewall

Answers

Answer:

The correct answer is letter "C": network intrusion detection system (NIDS).

Explanation:

A Network Intrusion Detection System (NIDS) is a network protection system configured to spot threats in any server connected to it. The NIDS has a history of common threats that is used to filter all the data flowing through the network. If malware is identified, an alert pops up with the suggested actions to follow in front of that case.

how to hold numeric ranges and corresponding letter grade will be stored in a file java

Answers

Answer:

Print the grades on this Logic , this is logic for program and code is written under explanation.

If the average of marks is >= 80 then prints Grade ‘A’

If the average is <80 and >=70 then prints Grade ‘B’

If the average is <70 and >=60 then prints Grade ‘C’

else prints Grade ‘D’

Explanation

import java.util.Scanner;

public class JavaGradeProgram

{

   public static void main(String args[])

   {

/* This program assumes that the student has 6 subjects that's why I have created the array of size 6. You can change this as per the requirement.  */

       int marks[] = new int[6];

       int i;

       float total=0, avg;

       Scanner scanner = new Scanner(System.in);

        for(i=0; i<6; i++) {  

          System.out.print("Enter Marks of Subject"+(i+1)+":");

          marks[i] = scanner.nextInt();

          total = total + marks[i];

       }

       scanner.close();

Calculate Average Here:

avg = total /6 ;

if(avg >=80)

{

system.out.print("A");

}

else if(avg>=70 && avg <=80)

{

system.out.print("B");

}

else if(avg>=60 && avg <=70)

{

system.out.print("C");

}

else

{

system.out.print("D");

}

}

}

Which type of security policy is intended to provide a common understandingof the purposes for which an employee can and cannot use a resource?a.issue-specificb.system-specificc.enterprise informationd.user-specific

Answers

Answer:A. ISSUE-SPECIFIC

Explanation:Security policy is a set of actions an organization,Country , State or local governments put in place on order to guarantee the security of life and properties. It can also be described as the restrictions on behavior or actions of members of a society, community or an organization as well as restrictions imposed on adversaries by processes such as doors, locks, keys and walls.

Issue specific policy are policies directed to treat or handle particular factors known to aid or abate a crime. It can also be used to outline or reach at an understanding of what to used or what not to use in order to ensure effective security in an organization.

secops focuses on integrating the need for the development team to provide iterative and rapid improvement to system functionality and the need for the operation team to improve and security and minimize the disruption from software release cyces_____________.

A. True.B. False.

Answers

Answer:

A. True.

Explanation:

Secops or security- operation is a mechanism that focus on merging and collaborating the security team and the development operation team. It is made to prevent, sacrificing one for the other like the security of an application for the functionality and development of the application.

It tries to create communication between both teams, for every decision made to equally and positively affect both teams operation and result.

What technology would you like to use or see developed that would help you be a "citizen of the world"?

Answers

Answer and explanation:

While traveling abroad the main barrier to be considered is language. Entrepreneurs should focus special attention on developing mobile apps that interpret people's segments accurately so regardless of the country and language they can communicate through the app and make them feel they are "citizens of the world".

Write a statement that outputs variable userNum. End with a newline.

Answers

Answer:

System.out.println(userNum);

Explanation:

Using Java programming language, lets assume the variable userNum is entered by a user. The code snippet below will prompt the user to enter a number and output the the variable:

import java.util.Scanner;

public class TestClass {

   public static void main(String[] args) {

   System.out.println("Enter a number");

   Scanner input = new Scanner(System.in);

   int userNum = input.nextInt();

       System.out.println(userNum);

   }

}

A large organization with a large block address (12.44.184.0/21) is split into one medium size company using the block address (12.44.184.0/22) and two small organizations. If the first small company uses the block (12.44.188.0/23), what is the remaining block that can be used by the second small company? Explain how the datagrams destined for the two small companies can be correctly routed to these companies if their address blocks still are part of the original company.

Answers

Answer:

The answer is explained below

Explanation:

The Organization mask is 21 so number of addresses granted to organization are 32 - 21 = 2048 addresses

Now, medium-size company has mask as 22 so number of addresses to medium-size organization are 32 - 22 = 1024 addresses

Each small organization has 32 - 23 = 512 addresses as mask is 23

That implies the range of addresses for each organization

Large Organization = 12.44.184.0/21 - 12.44.191.255/21

Medium organization = 12.44.184.0/22 - 12.44.187.255/22

small Organization 1: 12.44.188.0/23 - 12.44.189.255/23

small Organization 2: 12.44.190.0/23 - 12.44.181.255/23

so now if we have a router then we need to configure it so that when an address is routed correctly.

So router should be installed or configured for forward lookup which are defined in forwarding table

The forwarding table is configured o bases of longest prefix match

So Forward table will be:

00001100 00101100 10111110           small organization1

00001100 00101100 10111111           small organization2

00001100 00101100 1011110           medium-size organization

For each of them we can take an example in the range of its IP address and check this forwarding table  will correctly identify the other inner organizations

A(n) ___________ is one of the most common examples of redundancy built into a network to helpreduce the impact of disruption.

a.network cloaking device
b.backup punch card reader
c.uninterruptible power supply
d.service level agreemente.help desk

Answers

Answer:

C. Uninterrupted power supply.

Explanation:

Uninterrupted power supply or UPS is device that is connected to the main power supply of a system or a network of computer systems to provide power, when the main power supply is down. It promotes power redundancy for a reliable network.

Network cloaking device is used to hide a networks domain name, while it is being broadcast across.

The backup punch card is an outdated technology used for recording digital data.

Service level agreement is a documented agreement between the services providers and companies, on the method or form of service to be rendered.

Answer:

c.uninterruptible power supply

Explanation:

Disruption means disturbance or problems which interrupt an event, activity, or process.

Uninterrupted power supply helps to prevent our system from being interrupted while functioning.

Assign to maxSum the max of (numA, numB) PLUS the max of (numY, numZ). Use just one statement. Hint: Call findMax() twice in an expression.

import java.util.Scanner;

public class SumOfMax {

public static double findMax(double num1, double num2) {

double maxVal = 0.0;

// Note: if-else statements need not be understood to

// complete this activity

if (num1 > num2) { // if num1 is greater than num2,

maxVal = num1; // then num1 is the maxVal.

}

else { // Otherwise,

maxVal = num2; // num2 is the maxVal.

}

return maxVal;

}

public static void main(String [] args) {

double numA = 5.0;

double numB = 10.0;

double numY = 3.0;

double numZ = 7.0;

double maxSum = 0.0;

/* Your solution goes here */

System.out.print("maxSum is: " + maxSum);

return;

}

}

Answers

Answer:

maxSum=findMax(numA,numB)+findMax(numY,numZ);

Explanation:

In the above statement, a function is used twice to calculate the maximum of 2 numbers passed as parameters of type double and returns the maximum value of type double as well. As the function is static, so, there is no need to make an object of the class in which the function is made. After finding the largest of both the pairs, the values are added and printed to console.

Answer:

maxSum = findMax(numA, numB); // first call of findMax

     

maxSum = maxSum + findMax(numY, numZ); // second call

Explanation:

A(n) ____________________ is the collection of individuals responsible for the overall planning and development of the contingency planning process.

Answers

Answer:

Contingency Planning Management Team (CPMT)

Explanation:

:)

rrayList Mystery Consider the following method:

public static void mystery(ArrayList list) {

for (int i = 1; i < list.size(); i += 2) {

if (list.get(i - 1) >= list.get(i)) {

list.remove(i);

list.add(0, 0);

}

}

System.out.println(list);

} Write the output produced by the method when passed each of the following ArrayLists: List Output

a) [10, 20, 10, 5]

b) [8, 2, 9, 7, -1, 55]

c) [0, 16, 9, 1, 64, 25, 25, 14

Answers

Answer:

a)

int: [10, 20, 10, 5]

out: [0, 10, 20, 10]

b)

int: [8, 2, 9, 7, -1, 55]

out: [0, 0, 8, 9, -1, 55]

c)

int: [0, 16, 9, 1, 64, 25, 25, 14]

out: [0, 0, 0, 0, 16, 9, 64, 25]

Explanation:

What the code is doing is changing the list if and only if the item number i, where i is an odd position on the list, is greater than the item number i-1. If the condition mentioned is satisfied, the element number i is removed, and a zero is added to the beginning of the list; this is why the dimension of the input is equal to the output (for every element removed a zero is added).

Note:

The first item of a list is the item 0.add method can receive two parameters the first indicating the position where the element will be added and the second the element to be added. .get method allows you to select any element on the list by its index..size method gives you the size of the listIn the for loop i += 2 indicates an increment of two, since we start with i = 1 we are going to iterate through odd numbers i = 1,3,5,7...

 

Evaluate the expression. Be sure to list a value of appropriate type (e.g., 7.0 rather than 7 for a double, Strings in quotes). 19 / 2 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4

Answers

Answer:

14.0

Explanation:

Using the level of precedence in Java,

From left to right;

(i) the first division operation will be done.

(ii)followed by the second division operation.

(iii)followed by the first multiplication operation.

(iv)followed by the third division operation.

(v)followed by the second multiplication operation.

(vi) followed by the first addition operation.

(vii)lastly followed by the second addition operation.

=================================================

Taking the steps above one after the other;

(i) the first division operation will be done (i.e 19 / 2)

=> Integer division in Java gives an integer result. Therefore, 19 / 2 = 9.5 will give 9.

So,

=> 19 / 2 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4

=> 9 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4

(ii)followed by the second division operation. (i.e 9 / 2.0)

=> From the result from step (i), the second division operation is now 9 / 2.0.

=> 9 / 2.0 = 4.5

So,

=> 9 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4

=> 4.5 + 2.5 * 6 / 2 + 0.5 * 4

(iii)followed by the first multiplication operation. (i.e 2.5 * 6)

=> The first multiplication operation is given by 2.5 * 6

=> 2.5 * 6 = 15.0

So,

=> 4.5 + 2.5 * 6 / 2 + 0.5 * 4

=> 4.5 + 15.0 / 2 + 0.5 * 4

(iv)followed by the third division operation. (i.e 15.0 / 2)

=> The third division operation is given by 15.0 / 2

=> 15.0 / 2 = 7.5

So,

=> 4.5 + 15.0 / 2 + 0.5 * 4

=> 4.5 + 7.5 + 0.5 * 4

(v)followed by the second multiplication operation. (i.e 0.5 * 4)

=> The second multiplication operation is given by 0.5 * 4

=> 0.5 * 4 = 2.0

So,

=> 4.5 + 7.5 + 0.5 * 4

=> 4.5 + 7.5 + 2.0

(vi) followed by the first addition operation. (i.e 4.5 + 7.5)

=> The first addition operation is given by 4.5 + 7.5

=> 4.5 + 7.5 = 12.0

So,

=> 4.5 + 7.5 + 2.0

=> 12.0 + 2.0

(vii) lastly followed by the second addition operation. (i.e 12.0 + 2.0)

=> The second addition operation is given by 12.0 + 2.0

=> 12.0 + 2.0 = 14.0

So,

=> 12.0 + 2.0

=> 14.0

Therefore, 19 / 2 / 2.0 + 2.5 * 6 / 2 + 0.5 * 4 = 14.0

Note:

In Java, the order of precedence for arithmetic operators is;

=> /, * and %

=> followed by + and -

A firm has a huge amount of individual customer data saved in different databases. Which of the following can be used to integrate, analyze, and apply the available information effectively?
a. online market research tools
b. integrated marketing systems
c. CRM systems
d. internal survey methods
e. quality assurance tools

Answers

Answer:

C. CMR systems

Explanation:

CMR or customer relationship management is a strategy that uses data analysis of customers to manage the interaction between a company and current and potential customers.

It analyses the data of client from different channels like wesites, email, social media,telephone log etc, describing and predicting potential decisions to be made to enhance customer service and acquisition.

Software licensing is a major problem in cloud computing. Discuss several ideas to prevent an administrator from hijacking the authorization to use a software license.

Answers

Answer:

Yes, the software license is a major problem in cloud computing.

Explanation:

The ad network administrator or system administrator he or she has to buy hardware appliance such server, firewall protection and operating system and their licenses. Each purchase is addon cost to and depends on the organization decided on the investment process.

Moreover, the system administrator should do daily routine check the patches of the operating system and firewall and schedule checking has to be made and update the firewall. In case if any hijacking taking place he has to contact immediately the hardware firewall supplier or service provider for help

In clouds, all threats are taken care and the network administrator only has to check any new supporting software that has to update in the client pc or workstation and laptop.

As an investor of organizations has to compare cloud licenses cost and local hardware appliance and software licenses and has to make a decision.

Workspace Remember for a moment a recent trip you have made to the grocery store to pick up a few items. What pieces of data did the Point of Sale (POS) terminal and cashier collect from you and what pieces of data about the transaction did the POS terminal pull from a database to complete the sale? In addition to the data collected and retrieved what information was generated by the POS terminal at the end of the order, as it is being completed?

Answers

Answer:

ATM card and the pin number, the status of the bank account and the total of the purchase and the account and method of payment.

Explanation:

The POS or point of service is a device that allows the purchase of product from a commercial store to be done wirelessly and cashless.

It promotes The cashless policy to reduce the circulating physical currency. The POS electromagnetic wave to wirelessly access bank database to retrieve bank account information.

It takes in the smart card, and with the command, retrieves the bank account information addressed on the card. The cashier types the total price of purchased product and it is automatically minus and updated on the account database. Then the invoice of the transaction is issued to the customer.

Suppose you are a project manager who typically has been using a waterfall development-based methodology on a large and complex project. Your manager has just read the latest article in Computerworld that advocates replacing this methodology with the Unified Process and comes to you requesting you to switch. What do you say?

Answers

Answer:

Answer explained below

Explanation:

Depending upon the current situation we can switch. That means suppose the entire project is mid way that means we already implemented the project by Waterfall methodology then it would take lot of time to switch to Prototype model. Again if we see the efficiency I mean if we complete the project using prototype model and the outcome would be very well and robust then we should definitely switch to prototype model. So depending on the scenario we need to decide whether it would be beneficial to switch or not.

Further, we have the differences between Waterfall and Prototype :

I) In case of Waterfall model requirements should be very well known. On the other hand in case of prototype model if the user requirements are not complete then we can choose prototype model.

II) Technical issues should be cleared in case of Waterfall model, on the other hand technical requirements need not be clear.

Advantages of Waterfall:

I) Easy to understand this model and easy to use.

II) It provides structure to inexperienced staff

III) Milestones are well understood

IV) Set requirements stability

Disadvantages of Waterfall Model:

I) All requirements must be known upfront

II) Inhibits flexibility

III) Can give a false impression of progree

Advantage of Prototype Model:

I) Even if user requirements are not complete we can use

II) Even if technical issues are not clear we can use

Disadvantage of Prototype:

I) The Model is complex

II) Risk Assessment expertise is required

III)Time spent for evaluating risks too large for small projects.

Get three int values from the keyboard. Using the conditional operator determine if the numbers are in ascending order. If they are in ascending order store the character ‘A’ in a char variable otherwise store a ‘D’ character in the char variable. Do not duplicate assignment operations.

Answers

Answer:

Program:

First_number = int(input("Enter first number")) # The first number is entered by the user.

second_number = int(input("Enter second number")) # The second number is entered by the user.

third_number = int(input("Enter Third number")) # The Third number is entered by the user.

if(First_number<second_number)and(second_number<third_number):# compare the first number with second number and the second number with the third number.

   store ='A' # assign the 'A' value on store variable.

else:

   store= 'D' # Assign the D value on store variable.

Output:

If the user inputs 4,5,6 then store variable holds 'A'.If the user inputs 6,5,4 then store variable holds 'D'.

Explanation:

The above program is written in python language in which the first, second and the third line of the program is used to rendering the message to the user and take the inputs from the user and stored the value on First_number, second_number, and third_number after converting the value on int.Then the fourth line of the program is used to compare that the first number and second number are in ascending order or not and it also checks that the second number and third number are in ascending order or not. Then assign the 'A' character for the store variable if both the condition is true because it is separated by 'and' operator which gives true if both the condition is true.Otherwise, assign the 'D' character on the store variable.

Final answer:

To check if three int values are in ascending order and assign 'A' or 'D' to a char variable accordingly, use the conditional operator in a single line of code after obtaining the int values from the user.

Explanation:

To determine if three integer values are in ascending order using the conditional operator, you can perform a comparison between them. If you have three variables, let's call them num1, num2, and num3, the ascending order condition would be num1 < num2 and num2 < num3. If this condition is true, the character 'A' is assigned to a character variable; otherwise, the character 'D' is assigned. With the conditional operator, it would look something like this:

char order = (num1 < num2 && num2 < num3) ? 'A' : 'D';

This single line checks the condition and assigns 'A' to order if the numbers are in ascending order, or 'D' if they are not. It's important to ensure that you retrieve the integer values from the keyboard correctly and store them in the variables num1, num2, num3 before evaluating the conditional expression.

a user reports that his dot matrix printer is printing dark and clear on the left of the paper but that the print is very light on the right side of the paper. what should you do to correct this problem with the printer

Answers

Answer:

Correctly position the platen of the printer to hold the paper in place.

Explanation:

Since the dot matrix printer is printing dark and clear on the left of the paper but very light on the right side of the paper, it is possible that the paper is not being held properly. So adjusting the platen will hold the paper properly and hence uniform prints on the paper.

Note: Dot matrix printers are printers that print closely related dots to form require texts (shapes) by striking some pins against an ink ribbon.

Some of the parts of these printers are; power supply, carriage assembly, Paper sensor, ribbon, platen and pins.

Given the multiplication 65535 x 32768, will the result cause overflow on a 32-bit system? Will the result need more than 32 bits to be stored in?

Answers

Answer:

65535 x 32768 =214 7450880

which is in the range of 32 bit unsigned integers, so there will be no overflow and we wont be in a need of more bits than 32 bit.

Explanation:

An overflow error indicates that software attempted to write down data beyond the bounds of memory.

Each program features a section of memory allocated for a stack. The stack is employed to store internal data for the program and is extremely fast and keep track of return addressing. A program may jump to a neighborhood that reads some data from the disk drive, then it returns from that routine to continue processing the info. The stack keeps track of the originating address, and therefore the program uses that for the return. Kind of like leaving breadcrumbs to seek out your way back. The stack features a limited amount of space for storing. If software attempts to access a neighborhood of the stack beyond its limits, an overflow error occurs.

• signed 32-bit integers support the range [-2147483648,2147483647]

• unsigned 32-bit integers support the range [0,4294967295]

And if you go outside this range, even temporarily, you would like to be very careful. Most cases handle the overflow technically and provide you "wraparound" or "modulo" behavior where carry bits outside the range just disappear and you're left with the low-order bits like the precise result.

In computer architecture of 32 bit, memory addresses, or other data units are those who are 32 bits (4 octets) wide. Also, 32-bit CPU and ALU architectures are those who have supported registers, address buses, or data buses of that size. 32-bit microcomputers are computers during which 32-bit microprocessors are the norm.

Which of the following instructions should be allowed only in kernel mode? (a) Disable all interrupts. (b) Read the time-of-day clock. (c) Set the time-of-day clock. (d) Change the memory map.

Answers

Answer:

A, B and D

Explanation:

The kernel is the central core of the computer's operating system, that has total control of all the activities of the computer. The kernel is a very small program in memory and runs first during the boot of the system. It is the interactive link between the hardware and operating system and other system softwares.

The uses a command line to receive and execute command for various system configurations like storage and memory mapping, enable and disable interrupts, set timers or allocate time slice to run programs etc.

Write a program that prompts the user to enter seven test scores and then prints the average test score. (Assume that the test scores are decimal numbers.)

Answers

Answer:

The cpp program for the scenario is given below.

#include <iostream>

using namespace std;

int main() {

   // array to store seven test scores

   double scores[7];

   // variable to store sum of all test scores

   double sum=0;

 

   // variable to store average of all test scores

   double avg_score;

   

   // user is prompted to enter seven test scores

   cout<<"Enter the test scores ";

   

// user input is taken inside for loop

// for loop executes seven times to take input for seven test scores

   for(int j=0; j<7; j++)

   {

       cin>>scores[j];

       sum = sum + scores[j];

   }

   

// average of test scores is calculated and assigned

   avg_score = sum/7;

   

   cout<<"The average of all entered test scores are "<< avg_score <<endl;

   

   return 0;

}

OUTPUT

Enter the test scores 90

88

76

65

56.89

77.11

68

The average of all entered test scores are 74.4286

Explanation:

The program execution is explained below.

1. An array, scores, is declared of size seven to store seven user-entered test scores.

2. Variables, sum and avg_score, are declared to store the sum and average of all the seven test score values. The variable sum is initialized to 0.

3. User is prompted to enter the test scores using cout keyword.

4. Inside for loop, all seven test scores are stored inside array, scores, using cin keyword.

5. Inside the same for loop, the values in the array, scores, are added and assigned to the variable sum.

6. Outside the for loop, the average score is calculated and assigned to the variable avg_score.

7. At the end, the average score is displayed. New line is inserted using endl after the average score is displayed.

8. In order to store decimal values, all variables and the array are declared with double datatype.

9. The main() has return type of integer and thus, ends with a return statement.

10. The iostream is included to enable the use of keywords like cin, cout, endl and others.

Write a complete C program to run on the MSP432 platform to do the following:
Declare an array of size 3 x 7 of type uint8_t. Use loops to initialize each array element to contain the value of the sum of its indices (e.g., for element arr[2][5], write a value of 7 to arr[2][5], write a value of 7 to arr[1][6], etc.). Use additional loops to go through the array and test each value – if a value is not a multiple of 5, add that value to a cumulative sum and write a zero to the array element. If it is a multiple of 5, leave it untouched. Print the final result as a 16-bit integer value (the sum of the array elements not multiples of 5). Be sure to compile it in CCS to catch any syntax errors.

Answers

Answer:

The C code is given below with appropriate comments

Explanation:

#include <stdio.h>

int main()

{

//array declaration

int arr[3][7], cumulativeSum = 0;

 

//initialize the array

for(int i=0; i<3; i++)

{

for(int j=0; j<7; j++)

{

arr[i][j] = i+j;

}

}

//calculate the cumulative sum

for(int i=0; i<3; i++)

{

for(int j=0; j<7; j++)

{

if((arr[i][j] % 5) != 0)

{

cumulativeSum += arr[i][j];

arr[i][j] = 0;

}

}

}

 

//display the final array

printf("The final array is: \n\n");

for(int i=0; i<3; i++)

{

for(int j=0; j<7; j++)

{

printf("%d ", arr[i][j]);

}

printf("\n");

}

 

//display the cumulative sum

printf("\nCumulative Sum = %d", cumulativeSum);

return 0;

}

Open Comments.java and write a class that uses the command window to display the following statement about comments:

Program comments are nonexecuting statements you add to a file for the purpose of documentation.

Also include the same statement in three different comments in the class; each comment should use one of the three different methods of including comments in a Java class.

Answers

Answer:

Answers to the code are given below with appropriate guidelines on definitions and how to properly run the code

Explanation:

//3 ways to comment are as follows:

//1. This is a one line comment.

/**

* 2. This is a documentation comment.

* @author Your name here

*

*/

/*

*3. This is a multiple line comment

* */

public class Comments {

//Driver method

public static void main(String[]args) {

/*

* All the text written inside the

* sysout method will be displayed on

* to the command prompt/console*/

System.out.println("Program comments are nonexecuting statements you add to a file for the purpose of documentation.\n");

System.out.println("3 ways to add comments in JAVA are as follows: \n");

System.out.println("1. One line comment can be written as:\n//Program comments are nonexecuting statements you add to a file for the purpose of documentation.\n");

System.out.println("2. MultiLine comment can be written as:\n/* Program comments are nonexecuting \n * statements you add to a file for the \n * purpose of documentation.\n */\n");

System.out.println("3. Documentation comment can be written as follows:\n/**\n * Program comments are nonexecuting statements you add to a file for the purpose of documentation.\n **/");

}

}

Steps to Run:

1. Make file named Comments.java, and copy paste the above code.

2. Open command prompt and then go to the directory where you have saved the above created file.

3. The before running compile the code by using command

javac Comments.java

4. Now, run the code by the below command

java Comments.

Congrats your assignment is done!!

How do you freeze the total cell so that it doesn't change when copied?

a) put a # in front of the letter and number that represents the cell position.
b) put a $ behind the letter and number that represents the cell position.
c) put a $ in front of the letter and number that represents the cell position.
d) you don't do anything, they are already frozen in Excel"

Answers

Answer:

c) put a $ in front of the letter and number that represents the cell position.

Explanation:

Dollar sign ($) is used to lock the formula in the cell. This is called absolute reference. In this type of referencing, A dollar sign is place in front of the letter and number to lock that cell. Whenever we copy that cell, the formula will be copied in other cell without changing its reference number.

As

Example 1

C1 = A1 + B1

if we copy this formula in C2 then it becomes

C2= A2 + B2

there both reference of A and B has been changed.

Example 2

If we put $ sign as

C1= $A$1 + $B$1

now of we copy C1 and into C2

C2= $A$1 + $B$1

There reference of cell is not changed.

Final answer:

To freeze a cell in Excel, use the dollar sign ($) in front of the letter and number of the cell position. For example, if the total cell is A1, change it to $A$1. This technique ensures Excel maintains the cell reference when copying the formula.

Explanation:

To freeze a total cell in Excel so that it doesn't change when copied, you should use the dollar sign ($) in front of the letter and number that represent the cell position. This operation is commonly referred to as cell referencing. For instance, if your total cell is A1, you would change it to $A$1 to freeze it.

The dollar sign instructs Excel to maintain the reference to the specific cell when you copy the formula to other cells. Without the dollar sign, Excel will adjust the formula to refer to relative cells. Therefore, option (c) is the correct technique for freezing the total cell in Excel.

Learn more about Cell Referencing here:

https://brainly.com/question/35910076

#SPJ3

Other Questions
WhAt does invocation mean Q5. The table below shows the melting points and boiling points of four elementsMelting Point (C) Boiling Point (C)357-39ElementMercuryCopperNitrogenCalcium10852562-210-1968421484Answer the following using the table above. Which element in the table is:(i) a liquid at 0C?(ii) a solid at 1000C?(iii) a gas at 500C?(iv) What state is Nitrogen at -200C? What is technology?APEX a. an understanding of something new. b. a method that is used to solve problemsc. something created for using science for use by societyd. the steps that engineers go through to create a product Pursuant to plan of reorganization adopted in the curren year, newman corporation exchanged property with an adjusted basis of 80,000 for 5,000 shares of jabot corporation stock. The Jabot shares had a fair market value of 95,000 on the date of the exchange. Newman Corporation was liquidated shortly after the exchange with its sole shareholder. Victor, receiving the jabot shares. Victor had a dollar 90,000 basis in the Newman shares surrendered. 1. As a result of the exchange, what are Victor's recognized gain and his basis in the jabot stock? A chemist added an excess of sodium sulfate to a solution of a soluble barium compound to precipitate all of the barium ions as barium sulfate, BaSO4. How many grams of barium ions are in a 441-mg sample of the barium compound if a solution of the sample gave 403 mg BaSO4 precipitate? What is the mass percentage of barium compound? Which of the following terms refers to a position of the foot and ankle resulting from a combination of ankle plantar flexion, subtalar inversion, and forefoot adduction? Contrast the genetic content and the origin of sister versus nonsister chromatids during their earliest appearance in prophase I of meiosis. A text message plan coasts $7 per month pluse $0.46 per text. Find the monthly cost for x text messages. A company has a share price of $24.50 and 118 million shares outstanding. Its book equity is $688 million, its book debt-equity ratio is 3.2, and it has cash of $890 million.How much would it cost to take over this business assuming you pay its enterprise value? What is 40percent of 50 while swimming in the pool, you attempt to swim the whole length of the pool without getting a breath. you are able to do it 3 out 5 times you attempt. if you attempted to do it 10 times, how many did you make it? How big is the moon? 1) Find an equation of the line that passes through the point and has the indicated slope m. (Let x be the independent variable and y be the dependent variable.) (1, 8); m = -1/22) Find an equation of the line that passes through the points. (2, 4) and (3, 7)3) Find an equation of the line that has slope m and y-intercept b. (Let x be the independent variable and y be the dependent variable.) m = 2; b = 14) Write the equation in the slope-intercept form.y 7 = 0 _____________ Then find the slope of the corresponding line _______ then find the y-intrcept of the corresponding line (x,y)= ( ______ ) how do you represent x In a partnership liquidation, a.the last journal entry credits the partners' capital accounts for the remaining cash. b.gains and losses on the sale of assets are allocated to the partners on the basis of their current capital accounts. c.creditors should be paid before partners. d.the partners' accounts are settled on the basis of their stated ratios. What happens to the bases when an insertion mutation occurs An on-duty lifeguard who runs into the ocean to rescue a drowning child, risking his or her own life to do so, has performed a(n) ____________________. Two blocks of masses M and 2M are initially traveling at the same speed v but in the opposite directions. They collide and stick together. How much mechanical energy is lost to other forms of energy during the collision These models show the electron structures of two different nonmetal elements. Element 1 at left has a purple circle at center with 2 concentric black lines around it. The first line has 2 small green balls on it. The second line has 8 small green balls on it. Element 2 at right has a purple center with 5 concentric circles around it, with the first circle innermost. The first circle has 2 small green balls on it, and the second circle has 8 small green balls on it. The third circle has 18 small green balls on it, and the fourth circle has 18 small green balls on it. The fifth circle has 6 small green balls on it. Which element is likely more reactive, and why? Element 1 is more reactive because it has fewer electron shells and is toward the top of its group on the periodic table. Element 1 is more reactive because it has more electrons in its valence shell and is farther to the right on the periodic table. Element 2 is more reactive because it does not have a valence shell close to the nucleus, so it will attract electrons. Element 2 is more reactive because it does not have a full valence shell, so it will attract electrons. The formation of ATP in a muscle cell is an _______________ reaction, whereas using ATP for contraction is an _____________ reaction Steam Workshop Downloader