You are to design class called Employee whose members are as given below:

Data members:
char *name
long int ID
A constructor:
// initialize data members to the values passed to the constructor
Methods:
get Person (name, id) //allows user to set information for each person
A function called Print () that prints the data attributes of the class.

Show the working of class in a driver program (one with main).

Answers

Answer 1

Answer:

//The Employee Class

public class Employee {

   char name;

   long  ID;

//The constructor  

public Employee(char name, long ID) {

       this.name = name;

       this.ID = ID;

   }

//Method Get Person

   public void getPerson (char newName, long newId){

       this.ID = newName;

       this.ID = newId;

   }

//Method Print

   public void print(){

       System.out.println("The class attributes are: EmpName "+name+" EmpId "+ID);

   }

}

The working of the class is shown below in another class EmployeeTest

Explanation:

public class EmployeeTest {

   public static void main(String[] args) {

       Employee employee1 = new Employee('a', 121);

       Employee employee2 = new Employee('b', 122);

       Employee employee3 = new Employee('c', 123);

       employee1.print();

       employee2.print();

       employee3.print();

   }

}

In the EmployeeTest class, Three objects of the Employee class are created.

The method print() is then called on each instance of the class.


Related Questions

What is ISP? What is peering? Understand that carriers usually don’t charge one another for peering. Instead, "the money is made" in the ISP business by charging the end-points in a network—the customer organizations and end users that an ISP connects to the Internet.

Answers

Answer:

ISP: internet service provider the company that is able to provide you with access to the Internet services. Example: AT & T.

Peering: a telecommunication method that allows two networks to connect and exchange traffic directly without having to pay a third party to carry traffic across.

Explanation:

Final answer:

An Internet Service Provider (ISP) facilitates access to the Internet for its customers, varying in services and size. Peering between ISPs allows direct data interchange without costs, contrasting with ISP revenue generated from charging end-users and organizations for Internet access. The concept of net neutrality emphasizes equal treatment of all Internet data to prevent service disparities.

Explanation:

An Internet Service Provider (ISP) is a company that provides customers with access to the Internet. ISPs can vary in size from small community providers to large multinational companies, and they offer different types of Internet connections such as broadband, DSL, and fiber optics. A critical aspect of the ISP business is the practice of peering, which is a direct interconnection between the networks of two ISPs, allowing them to exchange traffic without the involvement of a third party. Peering is typically done without the exchange of money between ISPs; instead, they benefit mutually from the direct flow of data between their networks. This practice contrasts with the way ISPs earn revenue, which is primarily through charging end-users and customer organizations for Internet access. The fees for Internet access can vary depending on the speed and reliability of the connection provided. As the Internet's infrastructure continues to evolve, debates such as those surrounding net neutrality have emerged, stressing the importance of treating all Internet traffic equally to avoid creating disparities between users based on their ability to pay for faster services.

Bob received a message from Alice which she signed using a digital signature. Which key does Bob use to verify the signature?Group of answer choicesAlice's private keyBob's public keyAlice's public keyBob's private key

Answers

Answer:

Alice's public key

Explanation:A Public key is a key that can be used for verifying digital signatures generated using a corresponding private key which must have been sent to the user by the owner of the digital signature.

Public keys are made available to everyone required and they made up of long random numbers.

A digital signature signed with a person's private key can only be verified using the person's private key.

Which of the following statements regarding the current electronic waste scenario is true? Electronic waste increases with the rise of living standards worldwide. The content of gold in a pound of electronic waste is lesser than that in a pound of mined ore. The process of separating densely packed materials inside tech products to effectively harvest the value in e-waste is skill intensive. Sending e-waste abroad can be much more expensive than dealing with it at home. E-waste trade is mostly transparent, and stringent guidelines ensure that all e-waste is accounted for.

Answers

Answer:

Electronic waste increases with the rise of living standards worldwide.

Explanation:

Electronic waste are electronic product nearing the end of their usefulness or discard ones, it include computers, phones ,oven, scanners, keyboard,circuit board,clock, lamp etc

Their amount increases every year with the rise of living standards worldwide which constitute to million of tonnes in circulation or these waste end up in landfill which at time contaminate the soil and water by it lead and cadmium content .The amount of electronic waste is expected to increase to about 52.2 million metric tonnes by 2021

Final answer:

True statements regarding the e-waste scenario include the increase of e-waste with higher living standards, the skill-intensive process of recycling, and the high content of gold in e-waste compared to mined ore. However, the e-waste trade is not transparent and is often improperly managed.

Explanation:

Among the current statements about the electronic waste (e-waste) scenario, several are true. The statement that e-waste increases with the rise of living standards worldwide is true. As technological advancements continue and consumerism grows, the amount of e-waste generated increases.

Also true is the fact that the process of separating densely packed materials inside tech products to effectively harvest the value in e-waste is skill-intensive, often leading to unsafe and unregulated labor practices in developing countries. It is indeed accurate that the content of gold in a pound of electronic waste is often greater than that in a pound of mined ore, making it a highly valuable resource.

However, contrary to one of the statements, the e-waste trade is not mostly transparent, and stringent guidelines do not ensure that all e-waste is accounted for; in fact, there is a significant amount of e-waste that is illegally traded or improperly handled.

Which layer of the OSI reference model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time? Group of answer choices

Answers

Answer: The Transport Layer of the OSI reference model is responsible for ensuring flow control so that destination station does not receive more packets that it can process at any given time.

Explanation: This is because;

The transport layer is the fourth layer in the OSI layered architecture which builds on the network layer to provide data transport that moves from a process on a source machine to a process on a destination machine. It is hosted using single or multiple networks, and very responsible for reliable data delivery ensuring packets are delivered in sequence, error-free and with little or no duplication or losses.

Since Transport layer helps one to control the reliability of a link through flow control, error control, and segmentation or desegmentation, It determines how much data should be sent where and at what rate.  

The transport layer also offers an acknowledgment of the successful data transmission and sends the next data in case no errors occurred. TCP (Transmission Control Protocol )is the best-known example of the transport layer. Transport layers also retransmit messages if they arrive with errors.

In last week's meeting we discussed long and short term costs associated with build an buy scenarios using a house as an example. Take the same concepts and apply them to a software development project scenario. ie building a custom application for the business house versus buying that application and implementing it. Respond here and list out the criteria you would review to consider the decision.....labor costs long and short term, support costs etc.

Answers

Answer:

Custom software designs a software package that is targeted to a particular user community and that meets an organization's specific needs. A lot of these things must be taken into account whenever making a "buy vs. create" decision for a custom software.

Purchasing a wrong program may hinder the process for your business while trying to build one can be expensive and time consuming. The study of these two methods should take into account labor costs, long-term and brief-term costs, and infrastructure costs.

The most popular purpose an organization creates or gets a custom product is that it's special to their organization and if the software is designed effectively it will improve the business' productivity and create its own competitiveness edge.

Moreover, creating a custom software requires a great upfront cost and it also takes a long time to build a proper one.

Labor costs for developing a customized product are often greater than purchasing off-the-shelf solution, as the company has to employ a software developer and build an IT team to create and manage the right software.

There would be maintenance costs in the long run but it wouldn't be as enormous as it was in the building and the process of creation. But, the more significant than cost, is the long-term benefit it brings to the business.

A specific application will improve the workflow of the company, allow the company to retain space with the rate and volume expansion, all of which would help bring financial benefits and distinguish the business from other competitors.

What subnet mask or CIDR notation would be required to maximize the host counts while still meeting the following requirements: 192.168.228.0 255.255.255.128 Required Networks: 2 Required Hosts: 20

Answers

Answer:

192.168.228.0 255.255.255.224

Explanation:

192.168.228.0 255.255.255.128

subnet mask: defines the host and the network part of a ip

CIDR notation : is the shortened form for subnet mask that uses the number of host bits for defining the host and the network part of a ip

For example: 192.168.228.0 255.255.255.128 has CIDR equivalent of 192.168.228.0\25

To have atleast 20 hosts

20 ≤ (2^x) -2

x ≈5

with 5 host bits, we have 2^5-2 = 30 hosts per subnet

and 2^3 = 8 subnets

To get the subnet mask, we have 3 network bits

1110000 to base 10 = 2^7 + 2^6 +2^5= 224

192.168.228.0 255.255.255.224

Heather wants a transition effect applied to the links in the gameLinks list in which a gradient-colored bar gradually expands under each link during the hover event. To create this effect, you will use the after pseudo-element and the content property to insert the bar. Create a style rule for the nav#gameLinks a::after selector that: a) places an empty text string as the value of the content property, b) places the content with absolute positioning with a top value of 100% and a left value of 0 pixels, c) sets the width to 0% and the height to 8 pixels, d) changes the background to a linear gradient that moves to right from the color value rgb(237, 243, 71) to rgb(188, 74, 0), e) sets the border radius to 4 pixels, and f) hides the bar by setting the opacity to 0.

Answers

Answer:

Hi there Zelenky! This is a good question to practice style sheets and effects. Please find my answer below.

Explanation:

Below CSS contains the code to answer all parts of the question.

nav#gameLinks a::after {  

 content: ‘’;  

 top: 100%;  

 left: 0px;  

 width: 0%;  

 height: 8px;  

 position: absolute;  

 background: -webkit-gradient(linear, right, left, from(rgb(237, 243, 71)), to(rgb(188, 74, 0));  

 border-radius: 4px;  

 opacity: 0;

}

In the sub-module on relations, we discussed total orders. Total orders allow you to sort the elements in a list. Why is sorting such an important operation in computing?

Answers

Answer:

The correct answer to the following question will be Option "b" and "d".

Explanation:

The given question is incomplete, options are missing. The complete question is :

(a) A ordered program runs more efficiently.

(b) Queries or claims move faster.

(c) There's less risk the data will be lost.

(d) Although printing out a text is readable.

Now,

Sorting involves organizing the information or data in the sequence to have assented or descending. It's any process that involves organizing the data in such a logical addition to being able to comprehend, understand, interpret or imagine.

Usually, data is ordered in either increasing or decreasing direction which is based on objective numbers or counts but may also be categorized based on the descriptions of the component standards.

So, it's the right answer.

Suppose that a program performs an intermixed sequence of (stack) push and pop operations. The push operations put the integers 0 through 9 in order onto the stack; the pop operations print out the return values. Which of the following sequence(s) could not occur?

a. 4321098765
b. 2143658790
c. 0465381729
d. 4687532901

Answers

Answer:

c and d.

c. 0465381729

d. 4687532901

Explanation:

Once an item has been stacked on top of another item, there

is no way to pop them in a different order.

A company has a legacy application using a proprietary file system and plans to migrate the application to AWS. Which storage service should the company

use?

A. Amazon DynamoDB

B. Amazon S3

C. Amazon EBS

D. Amazon EFS

Answers

Final answer:

For a legacy application using a proprietary file system migrating to AWS, Amazon EFS (Elastic File System) is the best storage service to use. It supports NFS protocol, making it suitable for applications needing a traditional file system interface without requiring alterations to their existing file system usage.

Explanation:

If a company has a legacy application using a proprietary file system and plans to migrate the application to AWS, the best storage service to use would be Amazon EFS (Elastic File System). Amazon EFS offers a scalable file storage solution for use with AWS Cloud services and on-premises resources. It's built to provide easy, scalable, and reliable storage for applications that require a file system interface and file system semantics.

Amazon EFS is highly suitable for legacy applications being migrated to AWS because it supports NFS (Network File System) protocol, allowing those applications to work without requiring any alterations to the file system usage. Unlike options like Amazon DynamoDB, which is a NoSQL database service for applications that need consistent, single-digit millisecond latency at any scale, or Amazon S3, best for object storage with durability and scalability, EFS provides a more traditional file system interface and file system semantics, making it a more direct match for legacy applications. Lastly, while Amazon EBS (Elastic Block Store) provides block-level storage volumes for use with Amazon EC2 instances, it's not designed to be directly accessed by applications as a file system.

Design a database to keep data about college students, their academic advisors, the clubs they belong to, the moderators of the clubs, and the activities that the clubs sponsor. Assume each student is assigned to one academic advisor, but an advisor counsels many students. Advisors do not have to be faculty members. Each student can belong to any number of clubs, and the clubs can sponsor any number of activities. The club must have some student members in order to exist. Each activity is sponsored by exactly one club, but there might be several activities scheduled for one day. Each club has one moderator, who might or might not be a faculty member. Draw a complete E-R diagram for this Database.

(a) All entities with their attributes must be represented, indicating all candidate keys. You must indicate and justify all assumptions you have made.

(b) Describe non-trivial domains for attributes where needed.

(c) Make a decision about the cardinality and participation constraints of all relationships, and add appropriate symbols to the E-R diagram.

Answers

Answer:

Complete design is attached below.please have a look.

Explanation:

Answer:

This is a typical example of a constraint max/min. The method used to solve this problem is called

the method of Lagrange multipliers. Let’s generalize the situation:

Given: A function: f(x, y, z) and a constraint that we can write as g(x, y, z) = 0.

Goal: Find min or max of f(x, y, z) for (x, y, z) satisfying g(x, y, z) = 0.

To have a “visual grasp” for the concept of Lagrange multipliers one can think about the following

problem:

Take a balloon (here approximated by a perfect sphere centered at the origin) and a box (think of

a cube for example). We want to find the maximum radius of the balloon (this is the function to

maximize) that can fit inside the box (this is the constraint). We start inflating the balloon and we

realize that the maximum radius is obtained when the balloon touches the box. At the touching

point(s) the surface of the balloon and the one of the box are tangent to each other!

This simple experiment is not a special case. In fact in general1

if P0 = (x0, y0, z0) is a point sitting

on the level surface given by the constraint where max/min for f occur, then at this point the level

surface of the constraint is tangent to the level surface of f passing through P0:

If the two surfaces are tangent, then all normal vectors to the two surfaces are parallel to each other.

In particular their gradients at P0 are parallel, that is

O~ f(P0) = λO~ g(P0) (3.1)

for some parameter λ. This parameter is called the Lagrange multiplier.

We discovered that the max/min points for a function f(x, y, z) constraint by g(x, y, z) = 0 are

found among the solutions (x, y, z, λ) for the system

O~ f(x, y, z) − λO~ g(x, y, z) = 0

g(x, y, z) = 0.

Notice that this system contains four equations and four unknowns:

∂x

f(x, y, z) − λ

∂x

g(x, y, z) = 0

∂y

f(x, y, z) − λ

∂y

g(x, y, z) = 0

∂z

f(x, y, z) − λ

∂z

g(x, y, z) = 0

g(x, y, z) = 0.

(3.2)

but in general it is not a linear system!

One can present the method of Lagrange Multipliers in a more efficient (but less illuminating) way.

Define in fact the new function

L(x, y, z, λ) = f(x, y, z) − λg(x, y, z).

The critical points of L solve the vector equation

O~ L(x, y, z, λ) = 0.

But remember that now the variables are (x, y, z, λ) so we need to take four partial derivatives for

L. If one does so then again (3.2) is obtained!

The purpose of this programming project is to demonstrate a significant culmination of most constructs learned thus far in the course. This includes Lists, Classes, accessors, mutators, constructors, implementation of Comparable, Comparator, use of Collections sort, iterators, properly accessing fields of complex objects, and fundamental File I/O.

You will create a LinkedList of Word objects using all the words found in the input file words.txt. A Word object contains 2 String fields; 1 to store a word in its normal form and the other to store a word in its canonical form. The canonical form stores a word with its letters in alphabetical order, e.g. bob would be bbo, cat would be act, program would be agmoprr, and so on. The class Word constructor has the responsibility of storing the normal form of the word in the normal form field and converting the normal form into the canonical form which is stored in the canonical form field (you should call a separate method for this conversion purpose).

Once all the words from the input file have been properly stored in a LinkedList of Word, you should use Collections to sort this list ascending alphabetically based on the canonical words by making the Word class Comparable.

Using an Iterator on the LinkedList of Word, create a 2nd list (new LinkedList) consisting of objects of a new class named AnagramFamily. AnagramFamily should contain at least 2 fields; 1 to hold a list of "Word" words that are all anagrams of each other (these should all be grouped together in the original canonical sorted list), and the 2nd field to store an integer value of how many items are in the current list. (Keep in mind, because the original list contains both the normal and canonical forms, as the AnagramFamily List will also have, a family of anagrams will all have the same canonical form with different normal forms stored in the normalForm field of the Word class). Each AnagramFamily List of Word should be sorted Descending by normal form using a Comparator of Word (if you insert Word(s) into a family one at a time, this presents an issue on how to get this list sorted as each Word insertion will require a new sort to be performed to guarantee the list is always sorted. For this reason it is best to form a list, sort it, and then create an AnagramFamily by passing the sorted list to it).

Sort the AnagramFamily LinkedList in descending order based on family size by use of a Comparator to be passed to the Collections sort method.

Next, output the top five largest families then, all families of length 8, and lastly, the very last family stored in the list to a file named "out6.txt." Be sure to format the output to be very clear and meaningful.

Finally, the first 4 people to complete the assignment should post their output results to the Canvas discussion forum for the remaining students to see the correct answer.

Be sure to instantiate new objects whenever transferring data from one object to another. Also, be sure to include various methods for manipulation and access of fields as well as helper methods to reduce code in main, such as the input/output of file data (like all other assignments, you will be graded on decomposition, i.e. main should not contain too many lines of code).

Part of your grade will depend on time. If written correctly (use of iterators and care taken when creating the anagram families), the running time should be less than 3 seconds. Programs that take longer will lose points based on the time. As encouragement to consider all options for speed, programs taking 1 minute will receive a 40 point deduction. Any longer than 3 minutes will receive only minimal points (10) for effort.

Though the basic algorithms involved are straight forward enough, there is a great deal of complexity involved with various levels of access to specific data. As mentioned before and never so importantly as with this assignment, start early and set a goal for completion by this weekend. Trust me, this is sound advice.

As a reminder, you will create at least 5 files: the driver, Word class, AnagramFamily class, and 2 comparators: 1 to compare Word objects for sorting descending based on the normal form of Word objects and 1 to compare AnagramFamily sizes for a descending sort.

Answers

Answer:

Java program explained below

Explanation:

here is your files : ----------------------

Word.java : --------------

import java.util.*;

public class Word implements Comparable<Word>{

private String normal;

private String canonical;

public Word(){

 normal = "";

 canonical = "";

}

public Word(String norm){

 setNormal(norm);

}

public void setNormal(String norm){

 normal = norm;

 char[] arr = norm.toCharArray();

 Arrays.sort(arr);

 canonical = new String(arr);

}

public String getNormal(){

 return normal;

}

public String getCanonical(){

 return canonical;

}

public int compareTo(Word word){

 return canonical.compareTo(word.getCanonical());

}

public String toString(){

 return "("+normal+", "+canonical+")";

}

}

AnagramFamily.java : ------------------------------

import java.util.*;

public class AnagramFamily implements Comparable<AnagramFamily>{

private LinkedList<Word> words;

private int size;

private class WordComp implements Comparator{

 public int compare(Object o1,Object o2){

  Word w1 = (Word)o1;

  Word w2 = (Word)o2;

  return w2.getNormal().compareTo(w1.getNormal());

 }

}

public AnagramFamily(){

 words = new LinkedList<>();

 size = 0;

}

public LinkedList<Word> getAnagrams(){

 return words;

}

public void addAnagram(Word word){

 words.add(word);

 size++;

}

public void sort(){

 Collections.sort(words,new WordComp());

}

public int getSize(){

 return size;

}

public int compareTo(AnagramFamily anag){

 Integer i1 = new Integer(size);

 Integer i2 = new Integer(anag.getSize());

 return i2.compareTo(i1);

}

public String toString(){

 return "{ Anagrams Family Size : "+size+" "+words.toString()+"}";

}

}

WordMain.java : ------------------------------

import java.util.*;

import java.io.File;

import java.io.PrintWriter;

public class WordMain{

public static void readFile(LinkedList<Word> words){

 try{

  Scanner sc = new Scanner(new File("words.txt"));

  while(sc.hasNext()){

   words.add(new Word(sc.next()));

  }

  sc.close();

 }catch(Exception e){

  e.printStackTrace();

  System.exit(-1);

 }

}

public static void findAnagrams(LinkedList<AnagramFamily> anagrams,LinkedList<Word> words){

 Iterator<Word> itr = words.iterator();

 while(itr.hasNext()){

  Iterator<AnagramFamily> aitr = anagrams.iterator();

  Word temp = itr.next();

  System.out.println(temp);

  boolean st = true;

  while(aitr.hasNext()){

   AnagramFamily anag = aitr.next();

   Iterator<Word> anags = anag.getAnagrams().iterator();

   while(anags.hasNext()){

    Word t1 = anags.next();

    if(t1.compareTo(temp) == 0 && !t1.getNormal().equals(temp.getNormal())){

     anag.addAnagram(temp);

     st = false;

     break;

    }

   }

   anag.sort();

  }

  if(st){

   AnagramFamily anag = new AnagramFamily();

   anag.addAnagram(temp);

   anagrams.add(anag);

   System.out.println(anag);

  }

 }

}

public static void writeOutput(LinkedList<AnagramFamily> anagrams){

 try{

  PrintWriter pw = new PrintWriter(new File("out6.txt"));

  Collections.sort(anagrams);

  int i = 0;

  Iterator<AnagramFamily> aitr = anagrams.iterator();

  while(i < 5 && aitr.hasNext()){

   AnagramFamily anag = aitr.next();

   anag.sort();

   pw.println(anag);

   i++;

  }

  aitr = anagrams.iterator();

  pw.println("\n\nAnagramsFamily size 8 datas : ");

  while(aitr.hasNext()){

   AnagramFamily anag = aitr.next();

   anag.sort();

   if(anag.getSize() == 8){

    pw.println(anag);

   }

  }

  pw.close();

 }catch(Exception e){

  e.printStackTrace();

  System.exit(-1);

 }

}

public static void main(String[] args) {

 LinkedList<Word> words = new LinkedList<>();

 readFile(words);

 Collections.sort(words);

 //System.out.println(words.toString());

 LinkedList<AnagramFamily> anagrams = new LinkedList<>();

 findAnagrams(anagrams,words);

 //System.out.println(anagrams.toString());

 writeOutput(anagrams);

}

}

Create an array w with values 0, 0.1, 0.2, . . . , 3. Write out w[:], w[:-2], w[::5], w[2:-2:6]. Convince yourself in each case that you understand which elements of the array that are printed.

Answers

Answer:

w = [i/10.0 for i in range(0,31,1)]

w[:]  = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0]

w[:-2] = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8]

w[::5]= [0.0, 0.5, 1.0, 1.5, 2.0, 2.5, 3.0]

w[2:-2:6] = [0.2, 0.8, 1.4, 2.0, 2.6]

Explanation:

List slicing (as it is called in python programming language ) is the creation of list by defining  start, stop, and step parameters.

w = [i/10.0 for i in range(0,31,1)]

The line of code above create the list w with values 0, 0.1, 0.2, . . . , 3.

w[:]  = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 2.9, 3.0]

since start, stop, and step parameters are not defined, the output returns all the list elements.

w[:-2] = [0.0, 0.1, 0.2, 0.3, 0.4, 0.5, 0.6, 0.7, 0.8, 0.9, 1.0, 1.1, 1.2, 1.3, 1.4, 1.5, 1.6, 1.7, 1.8, 1.9, 2.0, 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8]

w[:-2] since  stop is -2, the output returns all the list elements from the beginning to just before the second to the last element.

w[::5]= [0.0, 0.5, 1.0, 1.5, 2.0, 2.5, 3.0]

w[::5] since  step is -2, the output returns  the list elements at index 0, 5, 10, 15, 20, 25,30

w[2:-2:6] = [0.2, 0.8, 1.4, 2.0, 2.6]

the output returns the list elements from the element at index 2  to just before the second to the last element, using step size of 6.

Write code that prints: Ready! numVal ... 2 1 Start! Your code should contain a for loop. Print a newline after each number and after each line of text Ex: numVal = 3 outputs: Ready! 3 2 1 Start!

Answers

Answer:

Code to this question can be described as follows:

Program:

#include <iostream> //defining header file

using namespace std;

int main() //defining main method

{

int n1,j,x1=0; //defining integer variable

cout<<"Enter a number: "; //print message

cin>>n1; //input value from the user

cout<<n1<<endl; //print input value

for(j=1;j<n1;j++)  //loop to count reverse number

{

x1=n1-j; //calculate value

cout<<x1<<endl;  //print value

}

return 0;

}

Output:

Enter a number: 3

3

2

1

Explanation:

In the above C++ language program, three integer variable "n1,j and x1" is declared, in which variable n1 take input from the user end and the variable j and x1 are used in the loop to calculate the value in the reverse order. In the next step, a for loop is declared, in which the variable x1 calculates the value in reverse order and uses a print method to print its value.  

You can view the existing Access Control Lists for a set of folders on a Windows system by right-clicking the folder you want to view, selecting Properties, and clicking the:

Answers

Answer:

And clicking the security tab option.

Explanation:

Lets explain what an object's ACL is. I will use an example to best explain this. Let's suppose that user Bob would want to access a folder in a Windows environment. What supposedly will happen is that Windows will need to determine whether Bob has rights to access the folder or not. In order to do this, an ACE with the security identity of John will be created. These ACEs are the ones that grant John access to the folder and the ACLs of this particular folder that John is trying to access is a list of permissions of everyone who is allowed to access this folder. What this folder will do is the to compare the security identity of John with the folders ACL and determine whether John has Full control of the folder or not.

By right clicking the folder and selecting the security tab, John will be in a position to see a list of the permissions (ACLs) granted to him by the folder.

In this lab, you add nested loops to a Java program provided.
The program should print the letter E. The letter E is printed using asterisks, three across and five down. Note that this program uses System.out.print("*"); to print an asterisk without a new line.
Instructions:
Write the nested loops to control the number of rows and the number of columns that make up the letter E.
In the loop body, use a nested if statement to decide when to print an asterisk and when to print a space. The output statements have been written, but you must decide when and where to use them.
Execute the program. Observe your output.
Modify the program to change the number of rows from five to seven and the number of columns from three to five.
What does the letter E look like now?

Answers

Answer:

/Create a class LetterE.

public class LetterE

{

//Define the main() function.

public static void main(String args[])

{

//Declare the variables.

final int NUM_ACROSS = 3;

final int NUM_DOWN = 5;

int row;

int column;

//Begin the for loop.

for(int k=1; k<=NUM_DOWN; k++)

{

//Begin the for loop.

for(int l=1; l<=NUM_ACROSS; l++)

{

//Check the condition.

if(k == 1 || k==5 || k == 3)

//Display the asterisk.

System.out.print("*");

// Decide when to print asterisk in column 1.

else if(l==1)

//Display the asterisk.

System.out.print("*");

//Else part of above if .

else

//Display the space.

System.out.print(" ");

}//End of for loop.

//Statement for the next line.

System.out.println();

}//End of for loop.

//End of the workdone.

System.exit(0);

}//End of the main() function.

}//End of the LetterE class.

Explanation:

Final answer:

To create the letter E using asterisks, use nested loops in your Java program. Modify the program by changing the number of rows and columns for a different representation of the letter E.

Explanation:

To create the letter E using asterisks, you will need to use nested loops in your Java program. The outer loop will control the number of rows, and the inner loop will control the number of columns. Within the loop body, you can use a nested if statement to decide when to print an asterisk and when to print a space. Here's an example of how the nested loops can be implemented:

for (int row = 1; row <= 5; row++) {
 for (int col = 1; col <= 3; col++) {
   if (col == 1 || (row == 1 || row == 3 || row == 5)) {
     System.out.print("*");
   } else {
     System.out.print(" ");
   }
 }
 System.out.println();
}

When you modify the program to change the number of rows to seven and the number of columns to five, the letter E will look different. It will have seven rows and five columns, resulting in a larger representation of the letter E.

write a program that reads an integer and displays, using asterisks a filled and hollow square, placed next to each other. for example if side length is 5 the program should display like so.



This program prints a filled and hollow square.
Enter the length of a side: 5
***** *****
***** * *
***** * *
***** * *
***** *****

Answers

Final answer:

A Python program can be written to read an integer that is then used to print out two squares of that side length with asterisks, one filled and one hollow. The provided Python code uses nested loops and conditionals to generate the squares accurately.

Explanation:

To complete your request, we would need to write a program to read an integer input and utilize this integer value to generate two squares with asterisks, one filled and one hollow. Here is a simple Python program:

def print_squares(n):
# Full square
for i in range(n):
 for j in range(n):
  print('*', end=' ')
 print()

# New line between squares
print()

# Hollow square
for i in range(n):
 for j in range(n):
  if i==0 or i==n-1 or j==0 or j==n-1:
   print('*', end=' ')
  else:
   print(' ', end=' ')
 print()

# Run the function
print_squares(int(input('Enter the length of a side: ')))

This program first prints a filled square and a hollow square using conditionals to distinguish between the edge and inner positions of the squares.

Learn more about Python programming here:

https://brainly.com/question/33469770

#SPJ3

Personal Web Page Generator Write a program that asks the user for his or her name, then asks the user to enter a sentence that describes himself or herself. Here is an example of the program's screens: Enter your name: Describe yourself: Once the user has entered the requested input, the program should create an HTML file, containing the input, for a simple Web page.

Answers

Answer:

// Python code

username=input("Type your name: ")

desc=input("Describe yourself: ")

f=open('profile.html','w')

html="<html>\n"+\

     "<head>\n"+\

     "</head>\n"+\

     "<body>\n"+\

     "<center>\n"+\

     "<h1>"+username+"</h1>\n"+\

     "</center>\n"+\

     "<hr/>\n"+\

     desc+"\n"\

     "<hr/>\n"+\

     "</body>\n"+\

     "</html>\n"

f.write(html)

f.close()

Code for profile.html file

<html>

<head>

</head>

<body>

<center>

<h1>Jon Doe</h1>

</center>

<hr/>

A software engineer working at a startup.

<hr/>

</body>

</html>

Explanation:

Get the name and description of user  as an input.Write HTML content by opening the file. Create and develop the essential HTML syntax. Write the information into the HTML file and finally close the file. Write the HTML code in the profile.html file.

Data driven processes: Select one: a. are heavily based on intuition b. rely heavily on the experience of the process owners c. are based on statistical data, measurement and metrics d. do NOT rely on mathematical models

Answers

Answer:

c. are based on statistical data, measurement and metrics

Explanation:

Data driven process are process that are not based on intuition but rather are based on data. This data serves as evidence to back a decision that is to be taken. It therefore means that, whatever decision that will be taken, such a decision will be based on the data presented.

Data driven processes: c. are based on statistical data, measurement and metrics .

Data-driven processes emphasize making decisions and formulating strategies based on empirical evidence and statistical data rather than relying on intuition or personal experience. Such processes incorporate rigorous measurement and metrics to objectively evaluate performance and outcomes, effectively minimizing bias.

Therefore, the correct answer is:

c. are based on statistical data, measurement and metrics

Write code that prints: Ready! countNum ... 2 1 Blastoff! Your code should contain a for loop. Print a newline after each number and after each line of text Ex: countNum = 3 outputs: Ready! 3 2 1 Blastoff!

Answers

Final answer:

The question involves writing a Python code that uses a for loop to print a countdown from a specified number to 1 followed by "Blastoff!". The code utilizes the range function to generate the countdown sequence for the loop.

Explanation:

To create a Python program that counts down from a given number to one and then prints "Blastoff!", you can use a for loop. Here is an example code snippet that accomplishes this task:

countNum = 3
print("Ready!")
for i in range(countNum, 0, -1):
   print(i)
print("Blastoff!")

The range function generates a sequence of numbers starting from countNum down to 1, and the for loop iterates over this sequence. After the loop finishes, it prints "Blastoff!" ensuring a newline is printed after each iteration and after the last line of text.

UNIX treats file directories in the same fashion as files; that is, both are defined by the same type of data structure, called an inode. As with files, directories include a nine-bit protection string. If care is not taken, this can create access control problems. For example, consider a file with protection mode 644 (octal) contained in a directory with protection mode 730. How might the file be compromised in this case? What are the limitations? Hint: This is a relatively famous exploit. Give specific commands that will accomplish the exploit.

Answers

Answer:

The explanation is listed in the Explanation section below.

Explanation:

All the UNIX directories or files have their summary contained in such an' inode ' format. The inode includes data regarding the current location and size of a file, final release duration, last change time, authorization, etc. Directories are always shown as files and also have an inode connected to them.Unless the folder is big, a list of references to existing data points is implicitly pointed to by inode.

It is composed of the relevant areas:

Type of file.Connect number.Position of data throughout the file.Admin privileges to access files.

The system or device command is mkdir and rm (mode) to build directory.

Which features would work well for text entered into cells? Check all that apply.
thesaurus
spelling
autosum
average
find
replace​

Answers

Answer:

A B E F

Explanation:

Answer:

The correct answer is A,B,E,F

Explanation:

but u should give top guy brainliest

Write a Python function that takes as input parameters base_cost (a float) and customer_type and prints a message with information about the total amount owed and how much the tip was. You may recognize this program from HW1. We'll write a very similar program, just modifying it and using string formatting. Feel free to copy/paste code from before and modify it. As a reminder, the tip amounts are 10%, 15% and 20% for stingy, regular, and generous customers. And the tax amount should be 7%. The total amount is calculated as the sum of two amounts: check_amount = base_cost*1.07 tip_amount = tip_percentage*check_amount To receive full credit, you must use string formatting to print out the result from your function, and your amounts owed should display only 2 decimal places (as in the examples below). To "pretty print" the float to a desired precision, you will need to use this format operator (refer back to class slides for more explanation): %.2f Print the results to the console like in the example below, including the base cost of the meal, tax, three tip levels, and total for regular customers. Test cases: inputs: check_amount = 20, customer_type = "regular" --> output: Total owed by regular customer = $24.61 (with $3.21 tip) inputs: check_amount = 26.99, customer_type = "generous" --> output: Total owed by generous customer = $34.66 (with $5.78 tip) inputs: check_amount = 26.99, customer_type = "generous" --> output: Total owed by stingy customer = $16.83 (with $1.53 tip)

Answers

Answer:

Explanation:

Thanks for the question, here is the code in python

The 3rd example given in question is incorrect

inputs: check_amount = 26.99, customer_type = "generous" --> output: Total owed by stingy customer = $16.83 (with $1.53 tip)

the customer type in the above passed is generous but why the output is showing for stingy, I think this is incorrect

Here is the function, I have given explanatory names so that you can follow the code precisely and also used pretty formatting.

thank you !

===================================================================

def print_tip(base_cost, customer_type):

   TAX_PERCENTAGE = 1.07

   STINGY_PERCENTAGE = 0.1

   REGULAR_PERCENTAGE = 0.15

   GENEROUS_PERCENTAGE = 0.20

   check_amount = base_cost * TAX_PERCENTAGE

   tip_amount = 0.0

   if customer_type == 'regular':

       tip_amount = check_amount * REGULAR_PERCENTAGE

   elif customer_type == 'generous':

       tip_amount = check_amount * GENEROUS_PERCENTAGE

   elif customer_type == 'stingy':

       tip_amount = base_cost * STINGY_PERCENTAGE

   total_amount = tip_amount + check_amount

   print('Total owed by {} customer = ${} (with ${} tip)'.format(customer_type, '%.2f' % total_amount,'%.2f' % tip_amount))

print_tip(20, 'regular')

print_tip(26.99, 'generous')

print_tip(14.99, 'stingy')

Write a loop that sets each array element to the sum of itself and the next element, except for the last element which stays the same. Be careful not to index beyond the last element. Ex: Initial scores: 10, 20, 30, 40 Scores after the loop: 30, 50, 70, 40 The first element is 30 or 10 20, the second element is 50 or 20 30, and the third element is 70 or 30 40. The last element remains the same.

Answers

Answer:

The solution code is written in Python

numList = [10, 20, 30, 40] for i in range(0, len(numList) - 1):    numList[i] = numList[i] + numList[i + 1] print(numList)

Explanation:

Firstly, create a sample number list, numList (Line 1)

Create a for-loop that will traverse through the array element from 0 till the second last of the element (len(numList) - 1) (Line 3)

Set the current element, numList[i], to the sum of the current element, numList[i] and the next element, numList[i+1]

Print the modified numList (Line 6) and we can see the output as follows:

[30, 50, 70, 40]

Print "Censored" if userInput contains the word "darn", else print userInput. End with newline. Ex: If userInput is "That darn cat.", then output is:CensoredEx: If userInput is "Dang, that was scary!", then output is:Dang, that was scary!Note: If the submitted code has an out-of-range access, the system will stop running the code after a few seconds, and report "Program end never reached." The system doesn't print the test case that caused the reported message.#include #include using namespace std;int main() {string userInput;getline(cin, userInput);int isPresent = userInput.find("darn");if (isPresent > 0){cout << "Censored" << endl; /* Your solution goes here */return 0;}

Answers

Answer:

#include <string>

#include <iostream>

using namespace std;

int main() {

string userInput;

getline(cin, userInput);

// Here, an integer variable is declared to find that the user entered string consist of word darn or not

int isPresent = userInput.find("darn");

if (isPresent > 0){

cout << "Censored" << endl;

// Solution starts here

else

{

cout << userInput << endl;

}

// End of solution

return 0;

}

// End of Program

The proposed solution added an else statement to the code

This will enable the program to print the userInput if userInput doesn't contain the word darn

Which of the following statement is true for Service Request Floods A. An attacker or group of zombies attempts to exhaust server resources by setting up and tearing down TCP connections B. It attacks the servers with a high rate of connections from a valid source C. It initiates a request for a single connection

Answers

Answer:

The answer is "Option A and Option B"

Explanation:

This is a type of attack, which is mainly used to bring down a network or service by flooding large amounts of traffic. It is a high-rate server from legitimate sources, where an attacker or group of zombies is attempting to drain server resources by creating and disconnecting the TCP link, and wrong choices can be described as follows:

In option C, It can't initiate a single request because when the servers were overloaded with legitimate source links, the hacker may then set up and uninstall TCP links.

What moderation capabilities does Salesforce communities provide to automate the process ofidentifying and replacing words that are offensive or inappropriate for the Community?
A. Enable Moderation for the Community to block offensive or inappropriate content.
B. Use moderation rules in the Community to block offensive or inappropriate content.
C. Create Process flows to identify posts with the offensive or inappropriate words and replace withother content.
D. Write a trigger to identify posts with the offensive or inappropriate words and replace with othercontent.

Answers

Answer:

a is the answer

Explanation:

Answer:

D. Is the correct answer i think

Explanation:

. Identify an emerging crime issue in your community using data available from sources such as local newspapers, online police reporting, and so forth. Frame the situation, and then identify the restraining and driving forces that may be impacting the issue. 2. Using your force field analysis, develop a cause and effect diagram for the situation.

Answers

A crime problem in my community is related to cell phone theft. According to the local newspaper, it is estimated that in my city about 10 cell phones are stolen per week. Still according to the local newspaper, most of these robberies occur in the city center and in the periphery, with women being the biggest victims.

Although the police have shown themselves to be a restraining force on this type of crime, few arrests have been made successfully, mainly for the negligence of the victims in providing a complaints.

The main driving force behind this crime is drug trafficking. Most burglars steal cell phones to sell them and have money to buy drugs. This is totally related to the government's neglect to promote quality education in the city, allowing several children and young people to stay on the street and run the risk of becoming involved in the traffic.

A cause and effect diagram for this situation is:

Irresponsible government ---> poor quality education ---> children and adolescents on the streets ---> involvement in drug trafficking ---> theft of cell phones ----> frightened population --->  lack of complaints ----> criminals on the street.

Suppose there are two ISPs providing WiFi service in a café. Each ISP operates its own AP and has its own IP address block. If by chance both ISPs configure their APs to operate over the same channel, e.g channel 5, how will users who attempt to connect to either of the APs be affected?

Answers

Users trying to connect to APs set on the same Wi-Fi channel will likely face interference, resulting in connection instability and reduced performance. Such channel overlap can mimic a Denial of Service, slowing down or disrupting network access.

If two Internet Service Providers (ISPs) configure their Access Points (APs) to operate on the same Wi-Fi channel, such as channel 5, the users trying to connect to either AP may experience interference and degradation in Wi-Fi quality. This interference can cause a Denial of Service (DoS) effect, where users may face difficulty establishing a stable connection due to heavy traffic on the same channel. Signals may overlap, which leads to signal contention, slower speeds, increased latency, and potentially dropped connections. It is similar to when a microwave oven causes interference with a Wi-Fi system, as both are emitting signals in a similar frequency range.

If the channel congestion is severe, it can feel akin to a DoS attack in which the AP is overwhelmed, preventing legitimate users from gaining or maintaining a smooth connection. To mitigate such issues, APs should be set to operate on different channels, or technologies like connection manager software and mobile Virtual Private Networks (VPNs) can be leveraged for a more stable experience.

Digital subscriber lines: are very-high-speed data lines typically leased from long-distance telephone companies. are assigned to every computer on the Internet. operate over existing telephone lines to carry voice, data, and video. have up to twenty-four 64-Kbps channels. operate over coaxial cable lines to deliver Internet access.

Answers

Answer: Operate over existing telephone lines to carry voice, data, and video.

Explanation:

Digital subscriber line is a means of transferring high bandwidth data over a telephone line. Such data could be a voice call, graphics or video conferencing. DSL uses a user's existing land lines in a subscriber's home, allowing users to talk on a telephone line while also being connected to the Internet. In most cases, the DSL speed is a function of the distance between a user and a central station. The closer the station, the better its connectivity.

Other Questions
What geological feature can be created by a transform boundary 1.What were the differences between the West German economy and the East Germaneconomy? (6x-3y - 12- (2x+2y=10 Which sentence uses a gerund as the subject of a sentence?A) The running water from the faucet never got any warmer B The laughing children cheered up the nursing home residents C My grandfathers business flourishing in this new economyD Writing essays for college can be a very stressful experience 4.5(328)+12please help me steps por favor The enzyme acetylcholinesterase, located in the synaptic cleft and on the postsynaptic membrane, breaks ACh down into acetate and choline, thereby stopping the stimulation of a postsynaptic cell.True / False. In the lectures for this module, Dr. Brekka argues that one characteristic of Renaissance art is to show sacred figures in the earthly, rather heavenly, realm--as associated with the natural world Group of answer choices No, she doesn't say anything like this Yes, she does say this Which former U.S. Senator lends his name to a term that describes the politically motivated practice of making accusations of disloyalty, subversion, or treason without proper regard for evidence? Today a father's age is five times his son's age. Exactly three years ago, the sum of their ages was 30. How old is the son today? Match each description with the item below. Group of answer choices Andrew Carnegie Eugene V. Debs Henry Clay Frick Reverend Josiah Strong Joe Hill Denis Kearney J. Pierpont Morgan Terence V. Powderly John D. Rockefeller Alvah Roebuck Barkoff Enterprises, which uses the high-low method to analyze cost behavior, has determined that machine-hours best explain the company's utilities cost. The company's relevant range of activity varies from a low of 600 machine hours to a high of 1,200 machine-hours, with the following data being available for the first six months of the year:Month Utilities Machine HoursJanuary $8,700 800February $8,360 720March $8,950 810April $9,360 920May $9,625 950June $9,150 900 Using the high-low method, the utilities cost associated with 1,110 machine hours would be _____. What were farmers protesting at the Whiskey Rebellion?OA. A search conducted by federal investigatorsOB. The results of a federal electionOC. A tax levied by the federal governmentOD. A ruling by federal courts Which of the following statements about the geography and history of the industrial revolution in North America is most accurate? Which of the following statements about the geography and history of the industrial revolution in North America is most accurate? The Mohawk Valley was the most important cotton textile center in the early nineteenth century. The largest U.S. market is in southern California; therefore many industries choose to locate there. Much of the manufacturing has relocated to the Midwest. Pittsburgh was the leading steel-producing area in the region due to its proximity to Appalachian iron ore and coal. Industrial growth did not really accelerate in North America until the early twentieth century. A city park employee collected 1,850 cents in nickels, dimes, and quarters at the bottom of a wishing well. There were 30 nickels, and a combined total of 110 dimes and quarters. How many dimes and quarters were at the bottom of the wishing well?dimes??quarters ???can someone tell me how to solve this problem, ive been getting it wrong. I think I've missed a step maybe. Identify the theme that Frost is portraying in Nothing Gold Can Stay. Explain how it contributes to the development of the central idea? Use RAQEQEC format. Which of the following statements is true? Multiple Choice If the outcome is good, then the behavior must be ethical. Direct blindness occurs when we hold others less accountable for unethical behavior because its carried out through third parties. Motivated blindness occurs when we overlook the unethical behavior of another because its in our interest to remain ignorant. The slippery slope refers to seeing the ethical actions of others as an example to follow. Ill-conceived goals occur when we set goals and incentives to promote a desired behavior, and that behavior is achieved. one serving of punch is 250 milliliters. Will ten servings fit in a 2 liter bowl ? Imagine a poison was ingested that destroyed the hypothalamic cells that produce TRH (thyroid-releasing hormone). The effects on the anterior pituitary and thyroid glands would result in Find the volume of the three-dimensional figure in terms of x. Campus Theater adjusts its accounts every month. The company's unadjusted trial balance dated August 31, current year, appears as follows. Additional information is provided for use in preparing the companys adjusting entries for the month of August. (Bear in mind that adjusting entries have already been made for the first seven months of current year, but not for August.)CAMPUS THEATERUNADJUSTED TRIAL BALANCEAUGUST 31, CURRENT YEARCash $ 24,000 Prepaid film rental 37,440 Land 144,000 Building 201,600 Accumulated depreciation: building $16,800Fixtures and equipment 43,200 Accumulated depreciation: fixtures and equipment 14,400Notes payable 216,000Accounts payable 5,280Unearned admissions revenue (YMCA) 1,200Income taxes payable 5,688Capital stock 48,000Retained earnings 55,932Dividends 18,000Administrative Revenue 366,240Concessions revenue 17,220Salaries expense 82,200 Film rental expense 113,400 Utilities expense 11,400 Depreciation expense: building 5,880 Depreciation expense: fixtures and equipment 5,040 Interest expense 12,600 Income taxes expense 48,000 $ 746,760 $746,760Other DataFilm rental expense for the month is $18,240. However, the film rental expense for several months has been paid in advance.The building is being depreciated over a period of 20 years (240 months).The fixtures and equipment are being depreciated over a period of five years (60 months).On the first of each month, the theater pays the interest that accrued in the prior month on its note payable. At August 31, accrued interest payable on this note amounts to $1,800.The theater allows the local YMCA to bring children attending summer camp to the movies on any weekday afternoon for a fixed fee of $600 per month. On June 28, the YMCA made a $1,800 advance payment covering the months of July, August, and September.The theater receives a percentage of the revenue earned by Tastie Corporation, the concessionaire operating the snack bar. For snack bar sales in August, Tastie owes Campus Theater $2,700, payable on September 10. No entry has yet been made to record this revenue. (Credit Concessions Revenue.)Salaries earned by employees, but not recorded or paid as of August 31, amount to $2,040. No entry has yet been made to record this liability and expense.Income taxes expense for August is estimated at $5,040. This amount will be paid in the September 15 installment payment.Utilities expense is recorded as monthly bills are received. No adjusting entries for utilities expense are made at month-end.Required:For each of the numbered paragraphs, prepare the necessary adjusting entry.