Explanation:
jwjajahabauiqjqjwjajjwwjnwaj
It is common for people to name directories as dir1, dir2, and so on. When there are ten or more directories, the operating system displays them in dictionary order, as dir1, dir10, dir11, dir12, dir2, dir3, and so on. That is irritating, and it is easy to fix. Provide a comparator that compares strings that end in digit sequences in a way that makes sense to a human. First compare the part before the digit as strings, and then compare the numeric values of the digits.
Your program should work with the provided test program
DirectorySortDemo.java.
Call the class you write DirectoryComparator.java.
Submit the two files in your submission.
DirectoryComparator.java
DirectorySortDemo.java
import java.util.ArrayList;
import java.util.Arrays;
import java.util.collections;
public class DirectorySortDemo
{
public static void main (String [] args)
{
String dirNames ("dir12", "dir5", "dir9", "dirl", "dir4",
"lab10", "1ab2", "lab7", "lab17", "lab8",
"quiz8", "quiz10", "quiz11", "quiz12",
"dirll", "dir8", "dir7", "dir15", "dir3");
ArrayList directories = new
ArrayList<> (Arrays.asList (dirNames));
System.out.println ("Unsorted List:");
System.out.println (directories);
Collections.sort (directories, new DirectoryComparator ());
System.out.println ():
System.out-println ("Sorted List: ");
System.out.-println (directories);
Answer:
Here the code is given as follows,
Explanation:
A blogger writes that the new "U-Phone" is superior to any other on the market. Before buying the U-Phone based on this review, a savvy consumer should (5 points)
consider if the blogger has been paid by U-Phone
assume the blogger probably knows a lot about U-Phones
examine multiple U-Phone advertisements
speak to a U-Phone representative for an unbiased opinion
Answer:
Speak to a U-Phone representative.
Explanation:
A representative will tell you the necessary details about the U-phone without any biases whatsoever, as they´re the closest to the company when it comes to detail about their products.
Cardinality ratios often dictate the detailed design of a database. The cardinality ratio depends on the real-world meaning of the entity types involved and is defined by the specific application. For the binary relationships below, suggest cardinality ratios based on the common-sense meaning of the entity types. Clearly state any assumptions you make.
Entity 1 Cardinality Ratio Entity 2
1. Student SocialSecurityCard
2. Student Teacher
3. ClassRoom Wall
4. Country CurrentPresident
5. Course TextBook
6. Item (that can
be found in an
order) Order
7. Student Class
8. Class Instructor
9. Instructor Office
10. E-bay Auction item E-bay bid
Solution :
ENTITY 1 CARDINALITY RATIO ENTITY 2
1. Student 1 to many Social security card
A student may have more than one
social security card (legally with the
same unique social security number),
and every social security number belongs
to a unique.
2. Student Many to Many Teacher
Generally students are taught by many
teachers and a teacher teaches many students.
3.ClassRoom Many to Many Wall
Do not forget that the wall is usually
shared by adjacent rooms.
4. Country 1 to 1 Current President
Assuming a normal country under normal
circumstances having one president at a
time.
5. Course Many to Many TextBook
A course may have many textbooks and
text book may be prescribed for different
courses.
6. Item Many to Many Order
Assuming the same item can appear
in different orders.
7. Student Many to Many Class
One student may take several classes.
Every class usually has several students.
8. Class Many to 1 Instructor
Assuming that every class has a unique
instructor. In case instructors were allowed
to team teach, this will be many-many.
9. Instructor 1 to 1 Office
Assuming every instructor has only one
office and it is not shared. In case of offices
shared by 2 instructors, the relationship
will be 2-1. Conversely, if any instructor has a joint
appointment and offices in both departments,
then the relationship will be 1-2. In a very general
case, it may be many-many.
10. E-bay Auction item 1-Many E-bay bid
1 item has many bids and a bid is unique
to an item.
Write a program using integers user_num and x as input, and output user_num divided by x three times.Ex: If the input is:20002Then the output is:1000 500 250Note: In Python 3, integer division discards fractions. Ex: 6 // 4 is 1 (the 0.5 is discarded).LAB ACTIVITY2.29.1: LAB: Divide by x0 / 10main.pyLoad default template...12''' Type your code here. '''
Answer:
Following are the code to the given question:
user_num = int(input())#defining a variable user_num that takes input from user-end
x = int(input())#defining a variable x that takes input from user-end
for j in range(3):#defining for loop that divides the value three times
user_num = user_num // x#dividing the value and store integer part
print(user_num)#print value
Output:
2000
2
1000
500
250
Explanation:
In the above-given program code two-variable "user_num and x" is declared that inputs the value from the user-end and define a for loop that uses the "j" variable with the range method.
In the loop, it divides the "user_num" value with the "x" value and holds the integer part in the "user_num" variable, and prints its value.
Briefly explain what an array is. As part of your answer make use of a labelled example to show the declaration and components of an array
Answer:
Explanation:
In programming an array is simply a grouping of various pieces of data. Various data elements are grouped together into a single set and saved into a variable. This variable can be called which would return the entire set which includes all of the elements. The variable can also be used to access individual elements within the set. In Java an example would be the following...
int[] myArray = {33, 64, 73, 11, 13};
In Java, int[] indicates that the variable will hold an array of integers. myArray is the name of the variable which can be called to access the array elements. The elements themselves (various pieces of data) are located within the brackets {}
Write a simple nested loop example that sums the even and odd numbers between 5 and 15 and prints out the computation.
Answer:
for e in range(6, 15, 2):
for o in range(5, 15, 2):
calc = e+o
print(e, "+", o, "=", calc)
Explanation:
Base conversion. Perform the following conversion (you must have to show the steps to get any credit.
3DF16 = ?
Base to be converted to was not included but we would assume conversion to base 10(decimal)
Answer and Explanation:
The 3DF in base 16 is a hex number so we need to convert to its equivalent binary/base 2 form:
We therefore each digit of given hex number 3DF in base 16 to equivalent binary, 4 digits each.
3 = 0011
D = 1101
F = 1111
We then arrange the binary numbers in order
3DF base 16 = 1111011111 in base 2
We then convert to base 10 =
= 1x2^9+1x2^8+1x2^7+1x2^6+0x2^5+1x2^4+1x2^3+1x2^2+1×2^1+1×2^0
= 991 in base 10
Which information can you apply to every page of your document with the page layout options?
header
conclusion
body
footer
introduction
Answer:
Header and footer
Explanation:
The page layout tab usually found in document programs such as Microsoft Word hold options used to configure several page options which is to be applied to a document. The page layout option gives users options to set page margins, orientation, page numbering, indentation and the other page layout options which is primarily how we would like our document to look like when printed. The page layout option also allows the insertion of a header and footer which is a note which can be written at the topmost and bottomost part of the document. Once, a header and footer option is selected, it is applied to every page of the document being worked on at the moment.
Complete the implementation of the following methods:__init__hasNext()next()getFirstToken()getNextToken()nextChar()skipWhiteSpace()getInteger()
From method names, I am compelled to believe you are creating some sort of a Lexer object. Generally you implement Lexer with stratified design. First consumption of characters, then tokens (made out of characters), then optionally constructs made out of tokens.
Hope this helps.
How does OOP keep both code and data safe from outside interference and
incuse?
Answer:
it is the process that binds together the data and code into a single unit and keeps both from being safe from outside interference and misuse. In this process, the data is hidden from other classes and can be accessed only through the current class's methods
The next few questions will be based on interpretations of a topographic map from East Brownsville, TX. To answer these questions you will have to access the topographic map of East Brownsville attached below:
What stage of fluvial landscape development is shown across the region displayed here?
a. Youthful
b. Mature
c. Old age
Answer:
a. Youthful
Explanation:
The river gets its water from youth stage fluvial water. The river meanders from side to side. East Brownsville will be less stable in international boundary in terms of physical position on the landscape because its base level drops.
1. What is memory mapped I/O?
Answer:
Memory-mapped I/O and port-mapped I/O are two complementary methods of performing input/output between the central processing unit and peripheral devices in a computer. An alternative approach is using dedicated I/O processors, commonly known as channels on mainframe computers, which execute their own instructions.
Assume that an O(log2N) algorithm runs for 10 milliseconds when the input size (N) is 32. What input size makes the algorithm run for 14 milliseconds
Answer:
An input size of N = 128 makes the algorithm run for 14 milliseconds
Explanation:
O(log2N)
This means that the running time for an algorithm of length N is given by:
[tex]F(N) = c\log_{2}{N}[/tex]
In which C is a constant.
Runs for 10 milliseconds when the input size (N) is 32.
This means that [tex]F(32) = 10[/tex]
So
[tex]F(N) = c\log_{2}{N}[/tex]
[tex]10 = c\log_{2}{32}[/tex]
Since [tex]2^5 = 32, \log_{2}{32} = 5[/tex]
Then
[tex]5c = 10[/tex]
[tex]c = \frac{10}{5}[/tex]
[tex]c = 2[/tex]
Thus:
[tex]F(N) = 2\log_{2}{N}[/tex]
What input size makes the algorithm run for 14 milliseconds
N for which [tex]F(N) = 14[/tex]. So
[tex]F(N) = 2\log_{2}{N}[/tex]
[tex]14 = 2\log_{2}{N}[/tex]
[tex]\log_{2}{N} = 7[/tex]
[tex]2^{\log_{2}{N}} = 2^7[/tex]
[tex]N = 128[/tex]
An input size of N = 128 makes the algorithm run for 14 milliseconds
CPT (Current Procedural Terminology) codes consist of 3-4 numbers representing a unique service. True False
Define a class named Point with two data fields x and y to represent a point's x- and y-coordinates. Implement the Comparable interface for the comparing the points on x-coordinates. If two points have the same x-coordinates, compare their y-coordinates. Define a class named CompareY that implements Comparator. Implement the compare method to compare two points on their y-coordinates. If two points have the same y-coordinates, compare their x-coordinates. Randomly create 100 points and apply the Arrays.sort method to display the points in increasing order of their x-coordinates, and increasing order of their y-coordinates, respectively.
Answer:
Here the code is given in java as follows,
While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?
Answer:
Bro this is my area the answer is WPA2 and AES
Explanation:
its because AES is a more secure encryption protocol introduced with WPA2. AES isn't some creaky standard developed specifically for Wi-Fi networks, either. It's a serious worldwide encryption standard that's even been adopted by the US government.
There are many possible variations in wireless network design depending on the surroundings.
What is wireless network?Even in a complicated single site, different wireless networks running on the same hardware as part of the broader wireless LAN environment can have different network configuration fundamentals needed for a successful deployment.
At the same time, a number of essential network configuration activities are part of any successful wireless project's typical chores. Let's look at the broad and specific procedures that wireless experts should take while setting up enterprise-grade Wi-Fi networks.
Therefore, There are many possible variations in wireless network design depending on the surroundings.
To learn more about wifi, refer to the link:
https://brainly.com/question/6145118
#SPJ5
Given an array of n distinct integers sorted in ascending order, write a function that returns a Fixed Point in the array, if there is any Fixed Point present in array, else returns -1. Fixed Point in an array is an index i such that arr[i] is equal to i. Note that integers in array can be negative. Examples: #include using namespace std; void removeDivByFive(int *arr,int& size) { int index=0; for(int i=0;i
Answer:
The function is as follows:
int returnsFixed(int arr [],int n){
int retVal = -1;
for(int i = 0; i<n;i++){
if(i == arr[i]){
retVal = i;
break;
}
}
return retVal;
}
Explanation:
This defines the functionl it receives the array and the length of the array
int returnsFixed(int arr [],int n){
This initializes the return value to -1
int retVal = -1;
This iterates through the array
for(int i = 0; i<n;i++){
This checks if i equals arr[i]
if(i == arr[i]){
If yes, the return value (i.e. the fixed point) is set to i
retVal = i;
And the code is exited
break;
} This ends the if condition
} This ends the iteration
This returns the calculated fixed point
return retVal;
}
Analyze the following code:
// Enter an integer Scanner input = new Scanner(System.in);
int number = input.nextInt(); if (number <= 0) System.out.println(number);
1) The if statement is wrong, because it does not have the else clause;
2) System.out.println(number); must be placed inside braces;
3) If number is zero, number is displayed;
4) If number is positive, number is displayed.
5) number entered from the input cannot be negative.
Answer:
3) If number is zero, number is displayed;
Explanation:
The code snippet created is supposed to take any input number from the user (positive or negative) and print it to the console if it is less than 0. In this code the IF statement does not need an else clause and will work regardless. The System.out.println() statement does not need to be inside braces since it is a simple one line statement. Therefore, the only statement in the question that is actually true would be ...
3) If number is zero, number is displayed;
Answer:
If number is zero, number is displayed
Explanation:
Given
The above code segment
Required
What is true about the code segment
Analyzing the options, we have:
(1) Wrong statement because there is no else clause
The above statement is not a requirement for an if statement to be valid; i.e. an if statement can stand alone in a program
Hence, (1) is false
(2) The print statement must be in { }
There is only one statement (i.e. the print statement) after the if clause. Since the statement is just one, then the print statement does not have to be in {} to be valid.
Hence, (2) is false
(3) number is displayed, if input is 0
In the analysis of the program, we have: number <=0
i.e. the if statement is true for only inputs less than 0 or 0.
Hence, number will be printed and (3) is false
(4) number is displayed for positive inputs
The valid inputs have been explained in (3) above;
Hence, (4) is false.
(5) is also false
Batter boards (if properly offset) will allow for the end user to continually re-string the layout to double check accuracy without having to continually set up an instrument True False
Answer:
The given statement is "True".
Explanation:
Batter panels seem to be platform frames that are used to temporarily suspend foundations plan threads. These same batter board members look like barriers once built.Its positioning is important for creating a foundation precisely as the plans state since some components of their development would have to be accurate. Placed correctly batter panels guarantee that the boundaries seem to be at the appropriate temperatures as well as positions.In python,
Here's some fake data.
df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],
'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],
'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],
'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],
'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],
'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],
'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],
'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],
'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],
'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],
'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}
I have a list of happiness and six explanatory vars.
exp_vars = ['Happiness', 'LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']
1. Define a variable called explanatory_vars that contains the list of the 6 key explanatory variables
2. Define a variable called plot_vars that contains Happiness and each of the explanatory variables. (Hint: recall that you can concatenate Python lists using the addition (+) operator.)
3. Using sns.pairplot, make a pairwise scatterplot for the WHR data frame over the variables of interest, namely the plot_vars. To add additional information, set the hue option to reflect the year of each data point, so that trends over time might become apparent. It will also be useful to include the options dropna=True and palette='Blues'.
Answer:
Here the answer is given as follows,
Explanation:
import seaborn as sns
import pandas as pd
df = {'country': ['US', 'US', 'US', 'US', 'UK', 'UK', 'UK'],
'year': [2008, 2009, 2010, 2011, 2008, 2009, 2010],
'Happiness': [4.64, 4.42, 3.25, 3.08, 3.66, 4.08, 4.09],
'Positive': [0.85, 0.7, 0.54, 0.07, 0.1, 0.92, 0.94],
'Negative': [0.49, 0.09, 0.12, 0.32, 0.43, 0.21, 0.31],
'LogGDP': [8.66, 8.23, 7.29, 8.3, 8.27, 6.38, 6.09],
'Support': [0.24, 0.92, 0.54, 0.55, 0.6, 0.38, 0.63],
'Life': [51.95, 55.54, 52.48, 53.71, 50.18, 49.12, 55.84],
'Freedom': [0.65, 0.44, 0.06, 0.5, 0.52, 0.79, 0.63, ],
'Generosity': [0.07, 0.01, 0.06, 0.28, 0.36, 0.33, 0.26],
'Corruption': [0.97, 0.23, 0.66, 0.12, 0.06, 0.87, 0.53]}
dataFrame = pd.DataFrame.from_dict(df)
explanatory_vars = ['LogGDP', 'Support', 'Life', 'Freedom', 'Generosity', 'Corruption']
plot_vars = ['Happiness'] + explanatory_vars
sns.pairplot(dataFrame,
x_vars = explanatory_vars,
dropna=True,
palette="Blues")
Program to calculate series 10+9+8+...+n" in java with output
Answer:
import java.util.Scanner;
class Main {
public static int calcSeries(int n) {
int sum = 0;
for(int i=10; i>=n; i--) {
sum += i;
}
return sum;
}
public static void main(String[] args) {
Scanner reader = new Scanner(System.in);
int n = 0;
do {
System.out.print("Enter n: ");
n = reader.nextInt();
if (n >= 10) {
System.out.println("Please enter a value lower than 10.");
}
} while (n >= 10);
reader.close();
System.out.printf("sum: %d\n", calcSeries(n));
}
}
write a loop that reads positive integers from stands input and that terinated when it reads an interger that is not positive after the loop termpinates
Loop takes only positive numbers and terminates once it encounters a negative numbers.
Answer and Explanation:
Using javascript:
Var positiveInt= window.prompt("insert positive integer");
While(positiveInt>=0){
Alert("a positive integer");
Var positiveInt= window.prompt("insert positive integer");
}
Or we use the do...while loop
Var positiveInt= window.prompt("insert positive integer");
do{
Var positiveInt= window.prompt("insert positive integer");
}
While (positiveInt>=0);
The above program in javascript checks to see if the input number is negative or positive using the while loop condition and keeps executing with each input until it gets a negative input
Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?
Answer:
Denial of service attack.
Explanation:
In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.
This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.
Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, DOS attack, etc.
A denial of service (DOS) attack is a form of cyber attack that involves either the exploitation of a software flaw or overwhelmingly floods a computer system in a network with traffic in order to prevent authorized users from performing legitimate activities or transactions.
Some of the ways to prevent vulnerability or cyber attacks in a network are;
1. Ensure you use a very strong password with complexity through the use of alphanumerics.
2. You should use a two-way authentication service.
3. You should use encrypting software applications or services.
(Count the occurrences of words in a text file) Rewrite Listing 21.9 to read the text from a text file. The text file is passed as a command-line argument. Words are delimited by whitespace characters, punctuation marks (, ; . : ?), quotation marks (' "), and parentheses. Count the words in a case-sensitive fashion (e.g., consider Good and good to be the same word). The words must start with a letter. Display the output of words in alphabetical order, with each word preceded by the number of times it occurs.
I ran my version of the program solution on its own Java source file to produce the following sample output:
C:\Users\......\Desktop>java CountOccurrenceOfWords CountOccurrenceOfWords.java
Display words and their count in ascending order of the words
1 a
1 alphabetical
1 an
2 and
3 args
2 as
1 ascending
1 catch
1 class
4 count
2 countoccurrenceofwords
1 create
1 display
1 else
3 entry
3 entryset
2 ex
1 exception
1 exit
1 file
2 filename
3 for
1 fullfilename
3 get
1 getkey
1 getvalue
1 hasnext
1 hold
5 i
3 if
2 import
2 in
3 input
2 int
1 io
3 java
6 key
3 length
2 line
1 main
3 map
1 matches
3 new
1 nextline
1 null
1 of
2 order
3 out
3 println
1 printstacktrace
2 public
2 put
2 scanner
1 set
1 split
1 static
5 string
4 system
2 the
1 their
1 to
1 tolowercase
2 tree
6 treemap
2 trim
1 try
1 util
1 value
1 void
1 while
9 words
C:\Users\......\Desktop>
Answer:
Explanation:
The following is written in Java. It uses File input, to get the file and read every line in the file. It adds all the lines into a variable called fullString. Then it uses regex to split the string into separate words. Finally, it maps the words into an array that counts all the words and how many times they appear. A test case has been created and the output can be seen in the attached image below. Due to technical difficulties I have added the code as a txt file below.
what type of slab and beam used in construction of space neddle
Answer:
Pyramidal Space Frame Glamorizes Swimming Pool 15. News Briefs 16 ... to use every pound of steel with no sacrifice in safety or ... form of steel trusses in an inverted coni- ... be embedded in the concrete slab when.
Explanation:
I HOPE THIS HELPS
Write a program in Cto define a structure Patient that has the following members
Answer:
Explanation:
The answer should be 1.16 or 61.1
A network has the ability to direct traffic toward all of the receiving service. what provides this ability in the transport layer?
Answer:
Multiplexing is the correct answer
Explanation:
End-to-end communication over a network is done by transport layer.
Provides a logical communication between various application processes running on different hosts and this layer is set in OSI(open system interconnection) model.
Transport layer also manages error and correction and also it provides reliability to users.
Multiplexing gets allowed by the transport layer which enables to transfer messages over a network and also the error and corrected data.
what is an RTF file?
Answer:
The Rich Text Format is a proprietary document file format with published specification developed by Microsoft Corporation from 1987 until 2008 for cross-platform document interchange with Microsoft products.
You have a shared folder named Reports. Members of the Managers group have been given Write access to the shared folder. Mark Mangum is a member of the Managers group. He needs access to the files in the Reports folder, but he should not have any access to the Confidential.xls file. What should you do
Answer:
Following are the solution to the given question:
Explanation:
The common folder called Report has also been shared. Writing access to a shared folder was given to management group members. Mark is a member of a group of managers. We can access the files within your reporting directory, but you really should not access the Confidential.xls file. We want to add Mark Mangum to our ACL files using Deny permissions on Confidential.xls.
Create and configure databases in oracle database management system operation administration
Answer:
You typically create a database during Oracle Database software installation. However, you can also create a database after installation.
Reasons to create a database after installation are as follows:
You used Oracle Universal Installer (OUI) to install software only, and did not create a database. You want to create another database (and database instance) on the same host computer as an existing Oracle database. In this case, this chapter assumes that the new database uses the same Oracle home as the existing database. You can also create the database in a new Oracle home by running OUI again. You want to make a copy of (clone) a database.