By using ____, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names.

Answers

Answer 1

Answer:

Polymorphism

Explanation:

Answer 2

If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

The information regarding the polymorphism is as follows:

The person has various attributes at the same timeFor example,  a man could be a father, a husband, an entrepreneur at the same time.In this, the similar person has different types of behavior in different situations.

Therefore we can conclude that If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.

Learn more about the behavior here: brainly.com/question/9152289


Related Questions

CHALLENGE ACTIVITY 3.1.2: Type casting: Computing average owls per zoo.
Assign avg_owls with the average owls per zoo. Print avg_owls as an integer. Sample output for inputs: 1 2 4
Average owls per zoo: 2
1. num owls zooA= 1
2. num owls zooB = 2
3. numowlszooC = 4 -
4. num-zoos = 3
5. avg-owls 0.0
6.
7. Your solution goes here" Run
8.

Answers

Answer:

num_owls_zooA = 1

num_owls_zooB = 2

num_owls_zooC = 4

num_zoos = 3

avg_owls = 0.0

avg_owls = (num_owls_zooA + num_owls_zooB + num_owls_zooC) / num_zoos

print("Average owls per zoo: " + str(int(avg_owls)))

Explanation:

Initialize the num_owls_zooA, num_owls_zooB, num_owls_zooC as 1, 2, 4 respectively

Initialize the num_zoos as 3 and avg_owls as 0

Calculate the avg_owls, sum num_owls_zooA, num_owls_zooB, num_owls_zooC and divide the result by num_zoos

Print the avg_owls as an integer (Type cast the avg_owls to integer, int(avg_owls))

what privacy risks do new technologies present,
and how do we decide if they're worth it?

Answers

Answer:

Los riesgos de las nuevas tecnologías se multiplican a medida que nos hacemos dependientes de ellas. También lo hacen a medida que sustituyen a otras formas de contacto social más cercanas

Los riesgos de las nuevas tecnologías son grandes desconocidos. El mal uso de las redes sociales y de Internet en los ordenadores y en el teléfono móvil, entre otros factores, supone un peligro real para todos los estratos de población, pero en especial para los más jóvenes. Pensemos, ¿realmente somos conscientes de los riesgos que suponen las nuevas tecnologías? ¿Sabemos cómo utilizarlas para no ponernos en riesgo?

Cabe destacar que las denominadas nuevas tecnologías de la información y de la comunicación (TICs) son un distintivo de la época actual y se han convertido en herramientas esenciales en las diferentes áreas de la vida. Esto es, para el área académica, laboral, social, de ocio…

En la mayoría de los ámbitos están presentes las TICS, pues incluyen las diferentes herramientas con las que nos manejamos hoy en día: servicios de contacto electrónico (e-mails, servicios de mensajería instantánea, chats), los teléfonos móviles, tablets y ordenadores, las plataformas online de difusión de contenidos, las redes sociales, entre otros..

Explanation:

Given an integer n and an array a of length n, your task is to apply the following mutation to a:
Array a mutates into a new array b of length n.
For each i from 0 to n - 1, b[i] = a[i - 1] + a[i] + a[i + 1].
If some element in the sum a[i - 1] + a[i] + a[i + 1] does not exist, it should be set to 0. For example, b[0] should be equal to 0 + a[0] + a[1].
Example
For n = 5 and a = [4, 0, 1, -2, 3], the output should be mutateTheArray(n, a) = [4, 5, -1, 2, 1].
b[0] = 0 + a[0] + a[1] = 0 + 4 + 0 = 4
b[1] = a[0] + a[1] + a[2] = 4 + 0 + 1 = 5
b[2] = a[1] + a[2] + a[3] = 0 + 1 + (-2) = -1
b[3] = a[2] + a[3] + a[4] = 1 + (-2) + 3 = 2
b[4] = a[3] + a[4] + 0 = (-2) + 3 + 0 = 1
So, the resulting array after the mutation will be [4, 5, -1, 2, 1].
Input/Output
[execution time limit] 3 seconds (java)
[input] integer n
An integer representing the length of the given array.
Guaranteed constraints:
1 ≤ n ≤ 103.
[input] array.integer a
An array of integers that needs to be mutated.
Guaranteed constraints:
a.length = n,
-103 ≤ a[i] ≤ 103.
[output] array.integer
The resulting array after the mutation.

Answers

Answer:

The program written in Java is as follows

import java.util.Scanner;

public class mutilate {

public static void main(String [] args) {

Scanner input = new Scanner(System.in);

int n;

System.out.print("Array Length: ");

n = input.nextInt();

while(n<1 || n > 103)  {

    System.out.print("Array Length: ");

n = input.nextInt();

}

int a []= new int [n];

int b []= new int [n];

System.out.print("Enter Elements of the Array: ");

for(int i =0;i<n;i++)  {

 a[i] = input.nextInt();

}

System.out.print("Output: ");

for(int i =0;i<n;i++)  {

 if(i == 0)   {

     b[i] = 0+a[i]+a[i+1];

 }

 else if(i == n-1)   {

     b[i] = a[i - 1]+a[i]+0;

 }

 else   {

 b[i] = a[i - 1]+a[i]+a[i+1];    

 }

 System.out.print(b[i]+" ");

}

}

}

Explanation:

This line allows the program accepts user input

Scanner input = new Scanner(System.in);

This line declares integer n

int n;

The next two line prompts user for length of the array and also accepts input

System.out.print("Array Length: ");

n = input.nextInt();

The following while iteration ensures that the user input is between 1 and 103

while(n<1 || n > 103)  {

    System.out.print("Array Length: ");

n = input.nextInt();

}

The next two lines declares array a and b

int a []= new int [n];

int b []= new int [n];

The next for iteration allows user enter values for array a

System.out.print("Enter Elements of the Array: ");

for(int i =0;i<n;i++)  {

 a[i] = input.nextInt();

}

The next for iteration calculates and prints the values for array b based on the instruction in the question

System.out.print("Output: ");

for(int i =0;i<n;i++)  {

 if(i == 0)   {

     b[i] = 0+a[i]+a[i+1];

 }

 else if(i == n-1)   {

     b[i] = a[i - 1]+a[i]+0;

 }

 else   {

 b[i] = a[i - 1]+a[i]+a[i+1];    

 }

 System.out.print(b[i]+" ");

}

Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20

Answers

Why MUST you request your DSO signed I-20 ship as soon as it is ready and who is responsible to request the I-20?

a. It is required you have an endorsed/signed I-20 when Customs and Border Patrol or police ask for it

b. We only keep an unsigned digital copy and cannot sign an I-20 after the fact

c. It is against U.S. regulations to send digital (signed or not) DS-2019s and must treat I-20s the same

d. You will need all signed original I-20s to make copies to apply for OPT, STEM and H-1B in the future, so get them now!

e. It is the student’s choice to request each term, however, we cannot go back retroactively to provide past copies

f. We can only provide a signed copy of current I-20 and if changes occur from previous semesters that information will not show

g. The original endorsed I-20 signed by a DSO will be destroyed after 30 days of issuance if not picked up, and it cannot be replicated

h. The cost to have I-20 shipped may go up at any time

i. All the above

Answer:

i. All the above

Explanation:

DSO means designated school officials and they have to do with Student and Exchange Visitor Program (SEVP)-certified schools where students have to get a Form I-20, “Certificate of Eligibility for Nonimmigrant Student Status which provides information about the student's F or M status.

What a student must request for from his DSO signed I-20 ship are all the above options.

Define a function readList with one parameter, the (string) name of a file to be read from. The file consists of integers, one per line. The function should return a list of the integers in the file.

Answers

Answer:

Here is the Python function readList:

def readList(filename):  #function definition of readList that takes a filename as a parameter and returns a list of integers in the file

   list = []  # declares an empty list

   with open(filename, 'r') as infile:  # opens the file in read mode by an object infile

       lines = infile.readlines()  # returns a list with each line in file as a list item

       for line in lines:   #loops through the list of each line

           i = line[:-1]  # removes new line break which is the last character of the list of line

           list.append(i)  # add each list item i.e. integers in the list

       return list  #returns the list of integers

#in order to check the working of the above function use the following function call and print statement to print the result on output screen

print(readList("file.txt")) #calls readList function by passing a file name to it

Explanation:

The program is well explained in the comments mentioned with each line of the code.

The program declares an empty list.

Then it opens the input file in read mode using the object infile.

Next it uses readLines method which returns a list with each line of the file as a list item.

Next the for loop iterates through each item of the file which is basically integer one per line

It adds each item of list i.e. each integers in a line to a list using append() method.

Then the function returns the list which is the list of integers in the file.

The program along with it output is attached. The file "file.txt" contains integers 1 to 8 one per line.

Which of the following peripheral devices can be used for both input and output? mouse touch screen on a tablet computer printer CPU

Answers

Answer:

mouse printer CPU touch screen

Explanation:

on a tablet computer hope this helps you :)

Determine the median paycheck from the following set:

{$100, $250, $300, $400, $600, $650}

$300

$350

$450

$600

Answers

Answer:

My answer to the question is $350.

The middle numbers are $300&$400.

300+400=700/2=350.

Answer:

$350

Explanation:

Enum fruit_tag {
BLUEBERRY,
BANANA,
PINEAPPLE,
WATERMELON
};
typedef enum fruit_tag fruit_t;
void printFruit(fruit_t myFruit) {
switch(myFruit) {
case BLUEBERRY:
printf("a blueberry");
break;
case BANANA:
printf("a banana");
break;
case PINEAPPLE:
printf("a pineapple");
break;
case WATERMELON:
printf("a watermelon");
break;
}
}
void compareFruit(fruit_t fruit1, fruit_t fruit2) {
if (fruit1 > fruit2) {
printFruit(fruit1);
printf(" is larger than ");
printFruit(fruit2);
}
else {
printFruit(fruit1);
printf(" is smaller than ");
printFruit(fruit2);
}
}
int main(void) {
fruit_t myFruit = PINEAPPLE;
fruit_t otherFruit = BLUEBERRY;
compareFruit(myFruit, otherFruit);
return 0;
What is the output?

Answers

Answer:

The output is "a pineapple is larger than a blueberry ".

Explanation:

In the given  C language code Enum, typedef, and two methods "printfruit and compareFruit" is declared, that can be defined as follows:

In the enum "fruit_tag" there are multiple fruit name is declared that use as the datatypes. In the next line, the typedef is defined, that enum to define another datatype that is "fruit_t". In the next step, the printFruit method is defined that accepts "myFruit" variable in its parameter and use the switch case to to check value. In the "compareFruit" method, it accepts two parameters and uses the if-else block to check its parameters value and print its value. In the main method,  two variable "myFruit and otherFruit" variable is declared that stores the values and pass into the "compareFruit" method and call the method.

Define a function group-by-nondecreasing, which takes in a stream of numbers and outputs a stream of lists, which overall has the same numbers in the same order, but grouped into segments that are non-decreasing.

Answers

Answer:

def group_by_nondecreasing( *args ) :

     num_list = [arg for arg in args]

     sorted_numlist = sorted( num_list )

     list_stream = [ sorted_numlist, sorted_numlist, sorted_numlist ]

     return list_stream

Explanation:

This python function has the ability to accept multiple and varying amount of arguments. the list comprehension shorten the logical for statement to generate a list of numbers, sorts the list in ascending order by default and duplicates the list in another list.

When a user runs a program in a text-based environment, such as the command line, what determines the order in which things happen?

Answers

Explanation:

In general, when a program runs in text-based environment like command line interface, the program is used for determining the order in which things happen.

As the program runs, the user will not have any choice and he or she can enter the required data.

If the user enters the data in required format then, he/she can get the result or output in desired format.

The first electric, general-purpose computer, ENIAC, was programmed by calculating algorithms on paper entering code directly into the computer flipping switches by hand using MS-DOS as the operating system

Answers

Complete Question:

The first electric, general-purpose computer, ENIAC, was programmed by?

Group of answer choices.

A. Calculating algorithms on paper.

B. Entering code directly into the computer.

C. Flipping switches by hand.

D. Using MS-DOS as the operating system.

Answer:

C. Flipping switches by hand.

Explanation:

The first electric, general-purpose computer, ENIAC, was programmed by flipping switches by hand.

ENIAC is an acronym for Electronic Numerical Integrator and Computer, it was developed in 1945 by John Mauchly and J. Presber Eckert. ENIAC was used for solving numerical problems or calculation-related tasks by the process of reprogramming.

In order to give the ENIAC a series of machine instructions to follow in the execution of a task, the programmers had to undergo the cumbersome procedure of connecting, removing, reconnecting cables and flipping switches by hand because data couldn't be stored in memory.

Briefly describe the importance of thoroughly testing a macro before deployment. What precautions might you take to ensure consistency across platforms for end users?

Answers

Answer:

Answered below

Explanation:

A macro or macroinstruction is a programmable pattern which translates a sequence of inputs into output. It is a rule that specifies how a certain input sequence is mapped to a replacement output sequence. Macros makes tasks less repetitive by representing complicated keystrokes, mouse clicks and commands.

By thoroughly testing a macro before deployment, you are able to observe the flow of the macro and also see the result of each action that occurs. This helps to isolate any action that causes an error or produces unwanted results and enable it to be consistent across end user platforms.

All of the following are extra precautions you can take to secure a wireless network EXCEPT ________. change your network name (SSID) enable SSID broadcast turn on security protocols create a passphrase

Answers

Answer:

Enable SSID broadcast

Explanation:

All of the following are extra precautions you can take to secure a wireless network except enable SSID broadcast. The correct option is B.

What is SSID broadcast?

When people in the area try to join their wireless devices, the name of your network is listed in the list of available networks thanks to broadcasting the SSID.

You can stop SSID broadcasting if you don't want arbitrary wireless devices attempting to connect to your network.

Home networks don't need to have a visible SSID unless they have many access points that devices can switch between.

If your network just has a single router, disabling this function means giving up the ease of adding new home network customers in exchange for certain security gains.

Apart from enabling SSID broadcast, there are other security measures you may take to protect a wireless network.

Thus, the correct option is B.

For more details regarding SSID broadcast, visit:

https://brainly.com/question/13191413

#SPJ6

Assume the existence of a Phone class. Define a derived class, CameraPhone that contains two data members: an integer named, imageSize, representing the size in megabytes of each picture, and an integer named memorySize, representing the number of megabytes in the camera's memory. There is a constructor that accepts two integer parameters corresponding to the above two data members and which are used to initialize the respective data members. There is also a function named numPictures that returns (as an integer) the number of pictures the camera's memory can hold.

Answers

#include <iostream>

using namespace std;

class CameraPhone:Phone{

int imageSize,memorySize;

public:

CameraPhone(int image_size,int memory_size):imageSize(image_size),memorySize(memory_size){}

int numPictures(){

return memorySize-imageSize;

}

}

int main(){}

Here is the code for the derived class, CameraPhone:

class Phone:

 def __init__(self, brand, model, price):    self.brand = brand    self.model = model    self.price = price

class CameraPhone(Phone):

 def __init__(self, brand, model, price, imageSize, memorySize):    super().__init__(brand, model, price)    self.imageSize = imageSize    self.memorySize = memorySize

 def numPictures(self):

   return self.memorySize // self.imageSize

What are the derived class?

This code defines a derived class, CameraPhone, that inherits from the Phone class. The CameraPhone class has two additional data members: imageSize and memorySize. The constructor for the CameraPhone class takes two additional parameters corresponding to these data members. The numPictures() function returns the number of pictures that the camera's memory can hold.

Here is an example of how to use the CameraPhone class:

phone = CameraPhone("Apple", "iPhone 13 Pro", 1000, 10, 100)

print(phone.numPictures())

# Output: 10

This code will print the number of pictures that the camera's memory can hold, which is 10 in this case.

Find out more on derived class here: https://brainly.com/question/31942927

#SPJ2

Which octet of the subnet mask 255.255.255.0 will tell the router the corresponding host ID?The last octetThe first octetThe first and last octetThe middle two octets

Answers

Answer:

The last octet

Explanation:

Here in the question, given the sub net mask, we want to know which octet of the subnet mask will tell the router the corresponding host ID.

The correct answer to this is the last octet. It is the last octet that will tell the router the corresponding host ID

why you think Operating System is pivotal in teaching and learning.

Answers

Answer:

An Operating System is pivotal in teaching and learning because:

1. It enables computer users to communicate with the hardware.

2. To run any computer programme successfully, the Operating System is basic.

3. It provides a smooth interface for teachers to use video conferencing or other conferencing systems in teaching their students.

4. The OS enables the launching of other learning packages on a computer system.

5. Students can install learning apps on their systems with the help of the OS.

Explanation:

An Operating System is a software which brings about easy communication with the hardware and enablea other programs to run on the computer easily. It provides basic functionality in systems were they are installed.

If our HMap implementation is used (load factor of 75% and an initial capacity of 1,000), how many times is the enlarge method called if the number of unique entries put into the map is:_______

a. 100
b. 750
c. 2,000
d. 10,000
e. 100,000

Answers

Answer:

A) for 100 : < 1 times

b) for 750 : < 1 times

c) For 2000 = 1 time

D) for  10000 = 4 times

E) for  100000 = 7 times

Explanation:

Given data:

load factor = 75%

initial capacity = 1000

The number of times the enlarge method will be called for a unique number of entries  would be 2 times the initial capacity ( 1000 ) because the load factor = 75% = 0.75

A) for 100 : < 1 times

b) for 750 : < 1 times

C) For 2000

= initial capacity * 2  = 2000   ( 1 time )

D) for 10000

= 1000 * 2 *2 *2*2 = 16000 ( 4 times )

to make it 10000 we have to add another 2000 which will make the number of times = 4 times

E)for  100000

= 1000*2*2*2*2*2*2*2= 128000 ( 7 times )

unique entry of 100000 is contained in 7 times

A member of the human resources department received the following email message after sending an email containing benefit and tax information to a candidate: Your message has been quarantined for the following policy violation external potential PII.Pls contact the IT security admin for further details. Which of the following BEST describes why this message was received?a. The DLP system flagged the message. b. The mail gateway prevented the message from being sent to personal email addresses c. The company firewall blocked the recipient's IP address. d. The file integrity check failed for the attached files.

Answers

Answer:

a. The DLP system flagged the message.

Explanation:

Data Leaked Prevention System is the software that detects potential data breaches that may result in the future. It detects the possible data breach, then monitors it and immediately blocks any sensitive data. DLP system is widely used by businesses. The human resource team received a message because sensitive information about the business benefits and tax is shared with a candidate.

Karl from Accounting is in a panic. He is convinced that he has identified malware on the servers—a type of man-in-the-middle attack in which a Trojan horse manipulates calls between the browser and yet still displays back the user's intended transaction. What type of attack could he have stumbled on?

Answers

Answer:

The correct answer will be "Man-in-the-browser".

Explanation:

Man-in-the-browser seems to be a category of person-in-the-middle attack where a certain Trojan horse tries to misrepresent calls between some of the web pages and therefore it is prevention systems while still demonstrating the intentional transfer of funds back to the customer.High-tech as well as high-amount technology for starting a man throughout the internet explorer assaults.

Although slow start with congestion avoidance is an effective technique for coping with congestion, it can result in long recovery times in high-speed networks, as this problem demonstrates.

A) Assume a round-trip delay of 60 msec (about what might occur across the continent) and a link with an available bandwidth of 1 Gbps and a segment size of 576 octets. Determine the window size needed to keep the pipeline full and the a worst case estimate of the time it will take to reach that window size after a timeout occurs on a new connection using Jacobson’s slow start with congestion avoidance approach.

B) Repeat part (a) for a segment size of 16 kbytes.

Answers

Answer:

The answer to this question can be defined as follows:

In option A: The answer is "13020".

In option B: The answer is "468 Segments".

Explanation:

Given:

The value of round-trip delay= 60 m-second

The value of Bandwidth= 1Gbps

The value of Segment size = 576 octets

window size =?

Formula:

[tex]\text{Window size =} \frac{(\text{Bandwidth} \times \text{round} - \text{trip time})}{(\text{segment size window })}[/tex]

                     [tex]=\frac{10^9 \times 0.06}{576 \times 8}\\\\=\frac{10^9 \times6}{576 \times 8\times 100}\\\\=\frac{10^7 \times 1}{96 \times 8}\\\\=\frac{10^7 \times 1}{768}\\\\=13020.83[/tex]

So, the value of the segments is =13020.833 or equal to 13020

Calculating segments in the size of 16 k-bytes:

[tex]\text{Window size} = \frac{10^9 \times 0.06}{16,000 \times 8}[/tex]

                    [tex]= \frac{10^9 \times 0.06}{16,000 \times 8}\\\\ = \frac{10^9 \times 6}{16,000 \times 8 \times 100}\\\\ = \frac{10^4 \times 3}{16 \times 4}\\\\ = \frac{30000}{64 }\\\\=468.75[/tex]

The size of 16 k-bytes segments is 468.75 which is equal to 468.

Write Album's PrintSongsShorterThan() to print all the songs from the album shorter than the value of the parameter songDuration. Use Song's PrintSong() to print the songs.

Answers

Answer:

Here is the function PrintSongsShorterThan() which prints all the songs from the album shorter than the value of the parameter songDuration.

void Album::PrintSongsShorterThan(int songDuration) const {   //function that takes the songDuration as parameter

unsigned int i;  

Song currSong;    //object of Song

cout << "Songs shorter than " << songDuration << " seconds:" << endl;  

for(int i=0; i<albumSongs.size(); i++){    

currSong = albumSongs.at(i);    

if(currSong.GetDuration()<songDuration){    //checks if the song duration of the song from album is less than the value of songDuration

currSong.PrintSong();     } } }  //calls PrintSong method to print all the songs with less than the songDuration

Explanation:  

I will explain the working of the for loop in the above function.

The loop has a variable i that is initialized to 0. The loop continues to execute until the value of i exceeds the albumSongs vector size. The albumSongs is a Song type vector and vector works just like a dynamic array to store sequences.

At each iteration the for loop checks if the value of i is less than the size of albumSongs. If it is true then the statement inside the loop body execute. The at() is a vector function that is used to return a reference to the element at i-th position in the albumSongs.  

So the album song at the i-th index of albumSongs is assigned to the currSong. This currSong works as an instance. Next the if condition checks if that album song's duration is less than the specified value of songDuration. Here the method GetDuration() is used to return the value of duration of the song. If this condition evaluates to true then the printSong method is called using currSong object. The printSong() method has a statement cout << name << " - " << duration << endl; which prints/displays the name of the song with its duration.

If you see the main() function statement:

musicAlbum.PrintSongsShorterThan(210);  

The musicAlbum is the Album object to access the PrintSongsShorterThan(210) The value passed to this method is 210 which means this is the value of the songDuration.

As we know that the parameter of PrintSongsShorterThan method is songDuration. So the duration of each song in albumSongs vector is checked by this function and if the song duration is less than 210 then the name of the song along with its duration is displayed on the output screen.

For example if the album name is Anonymous and the songs name along with their duration are:

ABC 400  

XYZ 123  

CDE 300  

GHI 200  

KLM 100  

Then the above program displays the following output when the user types "quit" after entering the above information.

Anonymous                                                              

Songs shorter than 210 seconds:                                                                         XYZ - 123                                                                                                              

GHI - 200                                                                                                              

KLM - 100  

Notice that the song name ABC and CDE are not displayed because they exceed the songDuration i.e. 210.

Draw the binary search tree that results from starting with an empty tree and
a. adding 50 72 96 94 26 12 11 9 2 10 25 51 16 17 95
b. adding 95 17 16 51 25 10 2 9 11 12 26 94 96 72 50
c. adding 10 72 96 94 85 78 80 9 5 3 1 15 18 37 47
d. adding 50 72 96 94 26 12 11 9 2 10, then removing 2 and 94
e. adding 50 72 96 94 26 12 11 9 2 10, then removing 50 and 26
f. adding 50 72 96 94 26 12 11 9 2 10, then removing 12 and 72

Answers

Answer:

See the attached document for answer.

Explanation:

See the attached document for the explanation.  

                 

           

               

Suppose that a class named ClassA contains a private nonstatic integer named b, a public nonstatic integer named c, and a public static integer named d. Which of the following are legal statements in a class named ClassB that has instantiated an object as ClassA obA =new ClassA();?

a. obA.b 12;
b. obA.c 5;
c. obA.d 23;
d. ClassA.b=23;
e. ClassA.c= 33;
f. ClassA.d= 99;

Answers

Answer:

b. obA.c 5;

d. ClassA.b=23;

f. ClassA.d = 99;

Explanation:

Java is a programming language for object oriented programs. It is high level programming language developed by Sun Microsystems. Java is used to create applications that can run on single computer. Static variable act as global variable in Java and can be shared among all objects. The non static variable is specific to instance object in which it is created.

Implement the generator function scale(s, k), which yields elements of the given iterable s, scaled by k. As an extra challenge, try writing this function using a yield from statement!


def scale(s, k):


"""Yield elements of the iterable s scaled by a number k.


>>> s = scale([1, 5, 2], 5)


>>> type(s)



>>> list(s)


[5, 25, 10]


>>> m = scale(naturals(), 2)


>>> [next(m) for _ in range(5)]


[2, 4, 6, 8, 10]


"""

Answers

Answer:

The generator function using yield from:

def scale(s, k):

   yield from map(lambda x: x * k, s)

Another way to implement generator function that works same as above using only yield:

def scale(s, k):

  for i in s:

       yield i * k

Explanation:

The complete program is:

def scale(s, k):

   """Yield elements of the iterable s scaled by a number k.  

   >>> s = scale([1, 5, 2], 5)

   >>> type(s)

   <class 'generator'>

   >>> list(s)

   [5, 25, 10]  

   >>> m = scale(naturals(), 2)

   >>> [next(m) for _ in range(5)]

   [2, 4, 6, 8, 10]

   """

   yield from map(lambda x: x * k, s)

If you want to see the working of the above generator function scale() as per mentioned in the above comments, use the following statements :

s = scale([1, 5, 2], 5)  

print(type(s))  

#The above print statement outputs:

#<class 'generator'>

print(list(s))

#The above print statement outputs a list s with following items:

#[5, 25, 10]                                                                                                                    

The function def scale(s, k): is

def scale(s, k):

   yield from map(lambda x: x * k, s)    

This function takes two parameters i.e. s and k and this function yields elements of the given iterable s, scaled by k.

In this statement:    yield from map(lambda x: x * k, s)    

yield from is used which allows to refactor a generator in a simple way by splitting up generator into multiple generators.

The yield from is used inside the body of a generator function.

The lambda function is a function that has any number of arguments but can only have one expression. This expression is evaluated to an iterable from which an iterator will be extracted. This iterator yields and receives values to or from the caller of the generator. Here the expression is x: x * k and iterable is s. This expression multiplies each item to k.

map() method applies the defined function for each time in an iterable.

The generator function can also be defined as:

def scale(s, k):

  for i in s:

       yield i * k

For the above example

s = scale([1, 5, 2], 5)  

def scale(s,k): works as follows:

s = [1, 5, 2]

k = 5

for loop iterates for each item i in iterable s and yields i*k

i*k multiplies each element i.e 1,5 and 2 to k=5 and returns a list

At first iteration, for example, i*k = 1 * 5 = 5, next iteration i*k = 5*5 = 25 and last iteration i*k = 2*5 = 10. So the output. So

s = scale([1, 5, 2], 5)  In this statement now s contains 5, 25 and 10

print(list(s))  prints the values of s in a list as: [5, 25, 10] So output is:

[5, 25, 10]

On the Excel Ribbon, click the Data tab in the Sort & Filter Group, and then click the Sort button to conduct a _____ sort. a. table range b. pivot table c. auto sum d. multiple column

Answers

Answer:

a. Table range

Explanation:

Excel is used for maintaining the data of the company. It contains various formulas, features like pivot table, macros, sort & filter group so the firm could able to present its data in an effective and efficient way

Here the sort button is used to ascending or descending the table based on the name, values, etc

So in the given situation, the first option is correct

Answer:

Datasheet, aecending, home

Explanation:

a reason for giving a Page Quality (PQ) rating of Highest, is it the page has no Ads?

Answers

Answer:

quality of highest giving page hash no adds

What is the quick key to highlighting a column?
Ctrl + down arrow
Ctrl + Shift + down arrow
Right-click + down arrow
Ctrl + Windows + down arrow

Answers

The quick key to highlighting a column is the Ctrl + Shift + down arrow. Thus, option (b) is correct.

What is column?

The term column refers to how data is organized vertically from top to bottom. Columns are groups of cells that are arranged vertically and run from top to bottom. A column is a group of cells in a table that are vertically aligned. The column is the used in the excel worksheet.

The quick key for highlighting a column is Ctrl + Shift + down arrow. To select downward, press Ctrl-Shift-Down Arrow. To pick anything, use Ctrl-Shift-Right Arrow, then Ctrl-Shift-Down Arrow. In the Move/Highlight Cells, the was employed. The majority of the time, the excel worksheet was used.

As a result, the quick key to highlighting a column is the Ctrl + Shift + down arrow. Therefore, option (b) is correct.

Learn more about the column, here:

https://brainly.com/question/3642260

#SPJ6

Answer:

its (B) ctrl+shift+down arrow

hope this helps <3

Explanation:

A computer uses a programmable clock in square-wav e mode. If a 500 MHz crystal is used, what should be the value of the holding register to achieve a clock resolution of (a) a millisecond (a clock tick once every millisecond)

Answers

Answer:

500,000

Explanation:

A computer uses a programmable clock in square-wave mode. If a 500 MHz crystal is used, what should be the value of the holding register to achieve a clock resolution of (a) a millisecond (a clock tick once every millisecond)

1 millisecond = 1 million second = 1,000,000

For a 500 MHz crystal, Counter decrement = 2

Therefore value of the holding register to a clock resolution of 1,000,000 seconds :

1,000,000/2 = 500,000

var tax = .07;

var getCost = function(itemCost, numItems) {

var subtotal = itemCost * numItems;

var tax = 0.06;

var total = subtotal + subtotal * tax;

return (total);

}

var totalCost = getCost(25.00, 3);

alert("Your cost is $" + totalCost.toFixed(2) + " including a tax of " +

tax.toFixed(2));


Which variable represents the function expression?


a. totalCost

b. getCost

c. itemCost

d. total

Answers

Answer:

b. getCost

Explanation:

Javascript is a multi-purpose programming language, used in applications like web development, software development and embedded system programming, data visualization and analysis, etc.

Its regular syntax defines variables with the "var" keyword and with additional ecmascript rules, the "let" and "const" keywords as well. function definition uses the keyword "function" with parenthesis for holding arguments. The code block of a function is written between two curly braces and returns a value stored in a variable with the return keyword.

The variable can now be called with the parenthesis and required arguments. Note that only anonymous functions can assigned to a variable.

Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot. Sample output with inputs: 58 Total inches: 68 def print_total_inches (num_feet, hum_inches): 2 str1=12 str2=num_inches 4 print("Total inches:',(num_feet*strl+str2)) 5 print_total_inches (5,8) 6 feet = int(input) 7 inches = int(input) 8 print_total_inches (feet, inches)

Answers

I'll pick up your question from here:

Define a function print_total_inches, with parameters num_feet and num_inches, that prints the total number of inches. Note: There are 12 inches in a foot.

Sample output with inputs: 5 8

Total inches: 68

Answer:

The program is as follows:

def print_total_inches(num_feet,num_inches):

     print("Total Inches: "+str(12 * num_feet + num_inches))

print_total_inches(5,8)

inches = int(input("Inches: "))

feet = int(input("Feet: "))

print_total_inches(feet,inches)

Explanation:

This line defines the function along with the two parameters

def print_total_inches(num_feet,num_inches):

This line calculates and prints the equivalent number of inches

     print("Total Inches: "+str(12 * num_feet + num_inches))

The main starts here:

This line tests with the original arguments from the question

print_total_inches(5,8)

The next two lines prompts user for input (inches and feet)

inches = int(input("Inches: "))

feet = int(input("Feet: "))

This line prints the equivalent number of inches depending on the user input

print_total_inches(feet,inches)

Answer:

Written in Python:

def print_total_inches(num_feet,num_inches):

    print("Total inches: "+str(12 * num_feet + num_inches))

feet = int(input())

inches = int(input())

print_total_inches(feet, inches)

Explanation:

Other Questions
PLEASE HELP!!!! WILL GIVE BRAINLIEST!! Find the output, h, when the input, x, is -18. h = 17 + x/6 A circular coil of wire 8.40 cm in diameter has 17.0 turns and carries a current of 3.20 A . The coil is in a region where the magnetic field is 0.610 T.Required:a. What orientation of the coil gives the maximum torque on the coil ?b. What is this maximum torque in part (A) ?c. For what orientation of the coil is the magnitude of the torque 71.0 % of the maximum found in part (B)? Why was a convention convened at Annapolis in 1786? A. to discuss Shayss Rebellion in Massachusetts B. to discuss the Spanish ban on trade along the Mississippi C. to discuss interstate commerce D. to amend the Articles of Confederation E. to discuss a settlement plan for the Northwest The mathematics teacher proposes to his students that whoever determines their years of Experience as a teacher will have an extra point, for this they will have to solve the following expression -5 + {4 * 6 + 3 + 1 + (3- (4-8) + (3-2)]} How many years of experience does the teacher have? _____is the function of coordinating the diverse activities and human resources of a company to produce a smooth-running operation.a) planning.b) directing.c) controlling.d) accounting. Calculate the nominal rate of interest convertible once every four years that is equivalent to a nominal rate of discount convertible quarterly. Let d^(4) be the nominal rate of discount convertible quarterly. MA has no unit of measurement.Why? How do you identify the development of society? write in a sentence. Trendy Coats is looking at financials to prepare end of year reports. Actual hours used were 4,000. Standard hours allowed were 5,000. Actual wage paid per hour was $13. The total labor flexible budget variance was ($23,000) Favorable. What was Trendy Coats standard price? Select one: a. $15.00 b. $12.00 c. $17.00 d. $13.50 Select the correct answer from each drop-down menu.spread their religiouswas an important driving force for the spread of Islam in Medieval Africa,beliefs as they traveled across the desert to exchange goods. Logan Corporation issued $800,000 of 8% bonds on October 1, 2006, due on October 1, 2011. The interest is to be paid twice a year on April 1 and October 1. The bonds were sold to yield 10% effective annual interest. Logan Corporation closes its books annually on December 31. Instructions (a) Prepare the amortization schedule (effective interest method) through October 1, 2007. (b) Prepare the adjusting entry for December 31, 2007. Use the effective-interest method. (c) Compute the interest expense to be reported in the income statement for the year ended December 31, 2007. A bike wheel is 26 inches in diameter. What is the bike wheel's diameter in millimeters (1 inch = 25.4 millimeters)? i. What is the author's purpose in writing the second paragraph __________ refers to difficulties in the communication process that might arise due to some type of interference or distortion that occurs during transmission of a message, resulting in disruption of the communication process. a. Feedback b. Decoding c. Noise d. Encoding e. Channel A planar electromagnetic wave is propagating in the +x direction. At a certain point P and at a given instant, the electric field of the wave is given by = (0.082 V/m) . What is the magnetic vector of the wave at the point P at that instant? (c = 3.0 108 m/s) If A and B are independent events with P( A) = 0.35 and P( B) = 0.55, then P( A| B) is:_________. a. .19 b. 1.57 c. .64 d. .91 List down the observations made by Rutherford during the gold foil experiment. Write a letter to your friend expressing your happiness on being successful in football selections for the national level championship. You are Rithesh of 202, Pilgrims Colony, Bangalore The Case of Susan B. Anthony: Which sentence from the text most strongly supports the central idea of the reading? Question 29 options: a) Through the storms and cold of a most inclement March she made her way to every town and village in Monroe County, asking, night after night, large audiences the question Is it a Crime for a United States Citizen to Vote? b) Such courage and energy as hers deserve admiration, and what is more, support. c) That is, they were ostensibly so treated; in reality, nearly all the parties concerned in the prosecution showed themselves, to their credit be it said, heartily ashamed of their part in the proceedings. d) Last Fall Miss Anthony, her sister, and several other women, voted the full State and National Republican tickets on the 5th of November. A rectangle with sides 13 cm and 7 cm has the same diagonal as a square. What is the length of the side of the square. Give your answer as a surd.