Answer:
D. Iterative design
Explanation:
An iterative design can be defined as a cyclic process which typically involves prototyping, testing, evaluating or analyzing and refining of a product, so as to continually improve the product.
In an iterative design process, the following steps are adopted;
1. A prototype of the product is first created and tested by the manufacturer.
2. The product is then evaluated to check for any defect or flaw.
3. The defect or flaw is fixed through a refining process.
4. The previous steps are repeated incrementally until an improved version of the product is created.
Hence, cycling through the design process to create several models that incrementally improve a solution is called iterative design.
Answer:
Iterative Design
Explanation:
A. It seeks to figure what it defective
B. It reaffirms if all requirements are met to solve a problem
C. It's main goal was to avoid excess products that might not end up making sales in the near future
D. Making several revision on problems to take out an efficient solution
D makes the most sense here.
When performing the ipconfig command, what does the following output line depict if found in the tunnel adapter settings?
IPv6 Address: 2001:db8:0:10:0:efe:192.168.0.4
a. IPv6 is disabled.
b. The addresses will use the same subnet mask.
c. The network is not setup to use both IPv4 and IPv6.
d. IPv4 Address 192.168.0.4 is associated with the global IPv6 address 2001:db8:0:10:0:efe
Answer:
d. IPv4 Address 192.168.0.4 is associated with the globe IPv6 address 2001:db8:0:10:0:efe
Explanation:
The adapter setting will be associated with the global IP address. When Ipconfig command is operate the IP address finds the relevant domain and then address will use a different subnet. The network will use both IPv4 and IPv6 subnets in order to execute the command.
In the tunnel adapter settings, when performing the ipconfig command, the given output line depicts: D. IPv4 Address 192.168.0.4 is associated with the global IPv6 address 2001:db8:0:10:0:efe.
What is a tunnel adapter?A tunnel adapter can be defined as a virtual interface which is designed and developed to encapsulate packets as a form of tunnel or virtual private network (VPN) protocol while sending them over another network interface.
In Computer networking, an output line of "IPv6 Address: 2001:db8:0:10:0:efe:192.168.0.4" in the tunnel adapter settings simply means that an IPv4 Address 192.168.0.4 is associated with the global IPv6 address 2001:db8:0:10:0:efe.
Read more on IP address here: https://brainly.com/question/24812743
management is as old as human civilization. justify this statement
Answer:
Indeed, management is as old as the human species, as human nature is itself dependent on the natural resources that it needs for its subsistence, therefore needing to exercise a correct administration of said resources in such a way as to guarantee that those resources can satisfy the greatest number of individuals. That is, the human, through the correct management of resources, seeks to avoid the scarcity of them.
A Key Factor in Controlling Your Anger Is Using Passive behaviour.T/F
Answer:
The answer is "True".
Explanation:
Assertiveness means that others are encouraged to be open, honest about their thoughts, wishes and feelings so how they can act properly. Assertive behavior: be open and communicate wishes, ideas and feelings, as well as encourage others to do likewise. Please visit our Emotional Regulation page. A major aspect is the ability to control your anger. Once you are quiet or aggressive, work very hard.
Overview In this assignment, you will gain more practice with designing a program. Specifically, you will create pseudocode for a higher/lower game. This will give you practice designing a more complex program and allow you to see more of the benefits that designing before coding can offer. The higher/lower game will combine different programming constructs that you have been learning about, such as input and output, decision branching, and a loop. IT 140 Higher/Lower Game Sample Output Overview Maria has asked you to create a program that prompts the user to enter the lower bound and the upper hound. You have decided to write pseudocode to design the program before actually developing the code. When run, the program should ask the user to guess a number. If the number guessed is lower than the random number, the program should print out a message like "Nope, too low." if the number guessed is higher than the random number, print out a message like "Nope, too high." If the number guessed is the same as the random number, print out a message like "You got it!" Higher/Lower Game Description Your friend Maria has come to you and said that she has been playing the higher/lower game with her three-year-old daughter Bella. Maria tells Bella that she is thinking of a number between 1 and 10, and then Bella tries to guess the number. When Bella guesses a number, Maria tells her whether the number she is thinking of is higher or lower or if Bella guessed it. The game continues until Bella guesses the right number. As much as Maria likes playing the game with Bella, Bella is very excited to play the game all the time, Maria thought it would be great if you could create a program that allows Bella to play the game as much as she wants. Note: The output messages you include in your pseudocode may differ slightly from these samples. Sample Output Below is one sample output of the program, with the user input demonstrated by bold font. Prompt For this assignment, you will be designing pseudocode for a higher/lower game program. The higher/lower game program uses similar constructs to the game you will design and develop in Projects One and TWO. Welcome to the higher/lower game, Bella! Enter the lower bound: 10 Enter the upper bound: 30 Great, now guess a number between 10 and 30: 20 Nope, too low Guess another number: 25 Nope, too high Guess another number: 23 You got it! Below is another sample output of your program, with the user input demonstrated by bold font 1. Review the Higher/Lower Game Sample Output for more detailed examples of this game. As you read, consider the following questions: What are the different steps needed in this program? How can you break them down in a way that a computer can understand? What information would you need from the user at each point (inputs)? What information would you output to the user at each point? When might it be a good idea to use 'F' and "IF ELSE' statements? When might it be a good idea to use loop? 2. Create pseudocode that logically outlines each step of the game program so that it meets the following functionality: Prompts the user to input the lower bound and upper bound. Include input validation to ensure that the lower bound is less than the upper bound. - Generates a random number between the lower and upper bounds Prompts the user to input a guess between the lower and upper bounds. Include input validation to ensure that the user only enters values between the lower and upper bound. Prints an output statement based on the puessed number. Be sure to account for each of the following situations through the use of decision branching . What should the computer output if the user guesses a number that is too low? . What should the computer output if the user guesses a number that is too high? - What should the computer output if the user guesses the right number? Loops so that the game continues prompting the user for a new number until the user guesses the correct number. Welcome to the higher/lower game, Bella! Enter the lower bound: 10 Enter the upper bound: 5 The lower bound must be less than the upper bound. Enter the lower bound: 10 Enter the upper bound: 20 Great, now guess a number between 10 and 20: 25 Nope, too high Guess another number: 15 Nope, too low. Guess another number: 17 You got it! Sutrnil your completed pseudocode as a Word document of approximately 1 to 2 pages in length.
Answer:
Pseudocode
lower = upper = 0
while lower > upper
input lower
input upper
if lower > upper
print "Lower bound is greater than upper bound"
randNum = generate_a_random_number
print "Guess a number between",lower,"and",upper
input num
while num <> randNum
if num > randNum:
print "Nope, too high"
else:
print "Nope, too low"
input num
print "Great; you got it!"
Program in Python
import random
lower = upper = 0
while True:
lower = int(input("Lower Bound: "))
upper = int(input("Upper Bound: "))
if lower < upper:
break
else:
print("Lower bound is greater than upper bound")
randNum = random.randint(lower, upper)
print("Great; now guess a number between",lower,"and",upper)
num = int(input("Take a guess: "))
while num != randNum:
if num > randNum:
print("Nope, too high")
else:
print("Nope, too low")
num = int(input("Take another guess: "))
print("Great; you got it!")
Explanation:
Required
Write a pseudocode and a program to design a higher/lower game
See answer section for the pseudocode and the program (written in Python)
The pseudocode and the program follow the same pattern; so, I will only explain the program.
See attachment for complete program file where comments are used to explain each line.
An entertainment application would most likely do which of the following?
A. allow users to watch popular movies and TV shows
B. connect users with social and business contacts
C. confirm users' travel plans
D. teach users a new language
Answer:
A is the answer to this question
Answer:
A. allow users to watch popular movies and TV shows
Explanation:
what are Manuscript signs
Answer: See explanation
Explanation:
Manuscript signs, refers to the marks or the symbols that are used within a manuscript in order to show the necessary corrections which should be made during the preparation of a document.
Manuscript formatting is vital as it makes the manuscript easier to assess. In a situation whereby manuscripts are poorly formatted, it can be turned down by agents and publishers.
NO LINKS
Write a C++ program to accept a 5 digit integer and to validate the input based on the following rules.
Rules
1) The input number is divisible by 2. 2) The sum of the first two digits is less than last two digits. if the input number satisfies all the rules, the system prints valid and invalid, otherwise,
Example 1:
Enter a value: 11222
Output: Input number is valid
Example 2:
Enter a value: 1234
Output: Input number is invalid
Answer:
#include <iostream>
#include <string>
#include <regex>
using namespace std;
int main()
{
cout << "Enter a 5-digit number: ";
string number;
cin >> number;
bool valid = regex_search(number, regex("^\\d{4}[02468]$"));
if (valid) {
valid = stoi(number.substr(0, 1)) + stoi(number.substr(1, 1))
< stoi(number.substr(3, 1)) + stoi(number.substr(4, 1));
}
cout << number << (valid ? " is valid" : " is invalid");
}
Explanation:
Regular expressions can do all of your checking except for the sum of digits check. The checks are i.m.o. easiest if you don't treat the input as a number, but as a string with digits in it.
The regex means:
^ start of string
\d{4} exactly 4 digits
[02468] one of 0, 2, 4, 6 or 8 (this is what makes it even)
$ end of string
The following method is intended to return true if and only if the parameter val is a multiple of 4 but is not a multiple of 100 unless it is also a multiple of 400. The method does not always work correctly public boolean isLeapYear(int val) if ((val 4) == 0) return true; else return (val & 400) == 0; Which of the following method calls will return an incorrect response?
A .isLeapYear (1900)
B. isLeapYear (1984)
C. isLeapYear (2000)
D. isLeapYear (2001)
E. isLeapYear (2010)
Answer:
.isLeapYear (1900) will return an incorrect response
Explanation:
Given
The above method
Required
Which method call will give an incorrect response
(a) will return an incorrect response because 1900 is not a leap year.
When a year is divisible by 4, there are further checks to do before such year can be confirmed to be a leap year or not.
Since the method only checks for divisibility of 4, then it will return an incorrect response for years (e.g. 1900) that will pass the first check but will eventually fail further checks.
Hence, (a) answers the question;
When computer boots which I pont program starts first? O Operating System O Metaphor System O Basic System O Computer System
A reflective cross-site scripting attack (like the one in this lab) is a __________ attack in which all input shows output on the user’s/attacker’s screen and does not modify data stored on the server.
Answer:
" Non-persistent" is the right response.
Explanation:
A cross-site category of screenplay whereby harmful material would have to include a transaction to have been transmitted to that same web application or user's device is a Non-persistent attack.Developers can upload profiles with publicly available information via social media platforms or virtual communication or interaction.Compare and contrast the older multiplexing techniques such as frequency division and time division multiplexing with the newer techniques such as discrete multitone and orthogonal frequency division multiplexing. What appears to be the trend in these newer protocols?
Answer:
As compared to new multiplexing techniques, older techniques like FDM frequency-division multiplexing (FDM) may be a technique by which the entire bandwidth available during a communication medium is split into a series of non-overlapping frequency sub-bands, each of which is employed to hold a separate signal.
Explanation:
Especially used for Radio and tv Broadcasting and TDM ( Time-division multiplexing (TDM) may be a method of transmitting and receiving independent signals over a standard signal path by means of synchronized switches at each end of the cable in order that each signal appears on the road only a fraction of your time in an alternating pattern, especially used for telegraphy) are simple; they'll be suffering from noise and their transmission speeds are high. New techniques are far more complex, they will be suffering from more noise and transmission speeds are very high as compared to older techniques.
space bar in computer
Answer: Its the one in the middle the really long thingy it looks like a rectangle
Explanation:
ITS IN THE MIDDLE
Write a static method named lowestPrice that accepts as its parameter a Scanner for an input file. The data in the Scanner represents changes in the value of a stock over time. Your method should compute the lowest price of that stock during the reporting period. This value should be both printed and returned as described below.
Answer:
Explanation:
The following code is written in Java. It creates the method as requested which takes in a parameter of type Scanner and opens the passed file, reads all the elements, and prints the lowest-priced element in the file. A test case was done and the output can be seen in the attached picture below.
import java.io.File;
import java.io.FileNotFoundException;
import java.util.Scanner;
class Brainly{
public static void main(String[] args) throws FileNotFoundException {
Scanner console = new Scanner(System.in);
System.out.print("file location: ");
String inputLocation = console.next();
File inputFile = new File(inputLocation);
Scanner in = new Scanner(inputFile);
lowestPrice(in);
}
public static void lowestPrice(Scanner in) {
double smallest = in.nextDouble();
while(in.hasNextDouble()){
double number = in.nextDouble();
if (number < smallest) {
smallest = number;
}
}
System.out.println(smallest);
in.close();
}
}
(CO 4 and 5) Create a program that will read in a list of test scores from the user and add them to a list. Ask the user in between each score if they want to continue (y/n). Display all of the scores entered and the total score at the end. Using the code below, put the code in the proper order Sample output: Welcome to the Test Score Program Add score: 88.45 Do you want to continue
Answer and Explanation:
Using Javascript:
function AddScores(){
Window.alert("Welcome to the Test Score Program");
var ScoreList= new Array();
ScoreList.push(Prompt("Add Score"));
var WhatNext= Confirm("do you want to continue?");
If(WhatNext===true) {
do{
ScoreList.push(Prompt("Add Score"));
}
While(
Confirm("do you want to continue?")===true;);
}
Alert(ScoreList);
Alert(ScoreList.reduce(function(a,b){return a +b};,0);)
}
AddScores();
From the above code in javascript programming language, we have created a list ScoreList and added elements to it using push method of the array object and a do...while loop that checks the condition and then adds the user's input to the array. We then alerted the array to the screen and then summed up the array elements and also alerted to the screen.
4. All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent
through visual and auditory channels.
Communication includes both the verbal and nonverbal messages sent and received.
The goal of effective communication is mutual understanding.
You can improve your communication by improving your understanding of yourself, others,
and the context of the communication.
When you are listening to another person speak, you can avoid sending any messages by not
speaking and not making eye contact.
Answer:
D
Explanation:
Communication are happen when 2 people are response each other
It is not true that when you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact. The correct option is 4.
What is communication?The process of communicating information, concepts, ideas, or sentiments between two or more people through a variety of means and channels, including verbal and nonverbal communication, is referred to as communication.
It is a myth that you may avoid transmitting any messages when you are listening to someone else speak by remaining silent and avoiding eye contact.
Your body language and nonverbal communication, such as your facial expressions and eye contact, can still convey information to the speaker even if you are not replying verbally or establishing eye contact.
Hence, even if a message is unintended or nonverbal, all types of communication entail sending and receiving messages.
Thus, the correct option is 4.
For more details regarding communication, visit:
https://brainly.com/question/22558440
#SPJ2
Your question seems incomplete, the probable complete question is:
All of the following statements are true EXCEPT one. Which
statement is NOT true?
Select the best option.
Communication occurs between senders and receivers within a context by messages sent through visual and auditory channels.Communication includes both the verbal and nonverbal messages sent and received. The goal of effective communication is mutual understanding.You can improve your communication by improving your understanding of yourself, others, and the context of the communication.When you are listening to another person speak, you can avoid sending any messages by not speaking and not making eye contact.Select all that apply to Enums: Group of answer choices While mainly a readability feature, we can technically use Enum to do things like spoof a boolean type in C allowing us some level of functionality Enums let us build a series of any kind of constant Enums allow us to print names for integers instead of numbers Enums are great for representing states and other common constants like colors Enums let us specifically value each constant we create Flag question: Question 59 Question 59
Answer:
-- While mainly a readability feature, we can technically use Enum to do things like spoof a Boolean type in C allowing us some level of functionality.
-- Enums are great for representing states and other common constants like colors.
-- Enums let us specifically value each constant we create.
Explanation:
Enums is a part of a programming language which helps a developer or a programmer to defined a set of the named constants. Using the enums will help in making it easier to document the intent and also to create set of distinct cases.
Option 1 is applicable as in the Boolean there are only TRUE and FALSE values. By using enum one can add more state like that of being difficult or normal or easy.
Option 4 is applicable because enums are used to represent various states and also other constants.
Option 5 is also applicable they allow the developer to create each value constant.
Which of the following statements about the relationship between hardware and software is true? a) Hardware can be present in intangible form. b) A flash drive is an example of software. c) Software and hardware can act independently of each other. d) Software consists of instructions that tell the hardware what to do.
Answer:
C
Explanation:
The statements about the relationship between hardware and software that is true is: D. Software consists of instructions that tell the hardware what to do.
A hardware can be defined as the physical components of an information technology (IT) system that can be seen and touched such as:
RouterSwitchKeyboardMonitorMouseConversely, a software refer to a set of executable codes (instructions) that is primarily used to instruct a computer hardware on how it should process data, perform a specific task or solve a particular problem.
In conclusion, a software consist of a set of executable codes (instructions) that tell a computer hardware what to do.
Read more on hardware here: https://brainly.com/question/959479
Design a class named largeIntegers such that an object of this class can store an integer of any number of digits. Add operations to add, subtract, multiply, and compare integers stored in two objects. Also add constructors to properly initialize objects and functions to set, retrieve, and print the values of objects. Write a program to test your class. g
Answer:
Here the code is given as follows,
Explanation:
Code:
import java.util.Scanner;
//created class named largeintegers
class largeintegers{
//class can hold a long number
long number;
//constructor to set number
largeintegers(long number){
this.number=number;
}
//getNumber method to get number
long getNumber(){
return number;
}
//below are some basic operations
long addition(long num1,long num2){
return num1+num2;
}
long subtract(long num1,long num2){
return num1-num2;
}
long multiply(long num1,long num2){
return num1*num2;
}
boolean compare(long num1,long num2)
{
return num1>num2;
}
public static void main(String[] args) {
//declared to long numbers
long number1,number2;
//scanner class to take user input
Scanner sc= new Scanner(System.in);
//taking input numbers
System.out.println("Enter a Number ");
number1=sc.nextLong();
System.out.println("Enter 2nd Number :");
number2=sc.nextLong();
//created two objects
largeintegers object=new largeintegers(number1);
largeintegers object2=new largeintegers(number2);
//displaying two numbers
System.out.println("Entered Numbers ");
System.out.println(object.getNumber());
System.out.println(object2.getNumber());
//calling basic methods using created objects
System.out.println("Some Operations on Given two Numbers ");
System.out.println("Addition:"+object.addition(object.getNumber(), object2.getNumber()));
System.out.println("Subtraction:"+object.subtract(object.getNumber(), object2.getNumber()));
System.out.println("Multiplication:"+object.multiply(object.getNumber(), object2.getNumber()));
System.out.println("Comparison:");
if(object.compare(object.getNumber(), object2.getNumber())==true)
{
System.out.println("First Number is Greater than Second Number ");
}
else
{
System.out.println("Second Number is Greater than First Number ");
}
sc.close();
}
}
Output:-
In the tiger exhibit at the zoo each of 24 tigers eat 26 lb of food each day how much pounds of food do tigers consume in a week?? answer this as fast as you can!!
Answer:
182 pounds of food
Explanation:
You trained a binary classifier model which gives very high accuracy on thetraining data, but much lower accuracy on validation data. The following maybe true:
a. This is an instance of overfitting.
b. This is an instance of underfitting.
c. The training was not well regularized.
d. The training and testing examples are sampled from different distributions.
Answer:
a. This is an instance of overfitting.
Explanation:
In data modeling and machine learning practice, data modeling begins with model training whereby the training data is used to train and fit a prediction model. When a trained model performs well on training data and has low accuracy on the test data, then we say say the model is overfitting. This means that the model is memorizing rather Than learning and hence, model fits the data too well, hence, making the model unable to perform well on the test or validation set. A model which underfits will fail to perform well on both the training and validation set.
Write a C class, Flower, that has three member variables of type string, int, and float, which respectively represent the name of the flower, its number of pedals, and price. Your class must include a constructor method that initializes each variable to an appropriate value, and your class should include functions for setting the value of each type, and getting the value of each type.
Answer and Explanation:
C is a low level language and does not have classes. The language isn't based on object oriented programming(OOP) but is actually a foundation for higher level languages that adopt OOP like c++. Using c++ programming language we can implement the class, flower, with its three variables/properties and functions/methods since it is an object oriented programming language.
List the four workplace trends discussed in the lecture.
Answer:
The global economy, teamwork, technology, and diversity
Answer:
Trends in the workplace are constantly evolving and the latest trends are tough to maintain. Ten years ago, employers did not care about open businesses, advantages like ping pong tables and lunches on Fridays, or standing desks and unbounded time off. As times change, however, companies have to adopt trends to increase productivity and employee involvement in the workplace.
Explanation:
Global economy: The global economy refers to the worldwide interconnected economic activities between several countries. These economic activities could impact the countries concerned either positively or negatively.There are several features in the global economy, for example:
Globalization.International trade.International finance.Global investment.TEAMWORK: "To work together with a group of people to achieve an objective. Teamwork is often an important part of a company, as colleagues often have to work together well and to try their best in all circumstances. Work in a team means that, despite any personal conflicts between people, people will try to cooperate, use their individual abilities, and provide constructive feedback."It is selfless teamwork. It concentrates on the ultimate objective. Teamwork is based on the idea that the whole exceeds the sum of its components. It's the traditional idea of "one plus one is equal to three." Personalities and the ability to create personal conflicts are different. However, the differences between the members of the team become strengths and goals, if the whole team focuses on doing great work.
TECHNOLOGY: The skills, methods, and processes used to achieve objectives are technology. The technology to use is:
Manufacture products and servicesachieve objectives such as scientific research or sending a moon spaceshipSolve issues like sickness or starvationWe already do things, but easier.Knowledge of how to do things maybe technology. Embedding machines are examples. This enables others to use the machines without knowing how they function. By taking something, changing it, and producing results, the technological system uses the technology. They are also known as systems of technology.
Developing and using fundamental tools is the simplest form of technology. The discovery of fire and the Revolution made food more readily available. Additional inventions such as the ship and the wheel have helped people and themselves to transport goods. IT, like the printer, the phone, and the internet, has led to Globalization.
DIVERSITY:Diversity is a range of differences in the human race, ethnicity, sexuality, age, social class, physical capacity or attributes, religious or ethical values systems, nationality, and political faith.
Inclusion is participation and empowerment, which recognize everybody's inherent worth and dignity. An included university supports and promotes the sense of belonging; respects its members' talents, beliefs, backgrounds, and livelihoods. They respect and practice them.
Answer:
The global economy, teamwork, technology, and diversity
Explanation:
A palindrome is a string that reads the same from left to right and from right to left. Design an algorithm to find the minimum number of characters required to make a given string to a palindrome if you are allowed to insert characters at any position
Answer:
Explanation:
The following code is written in Python. It is a recursive function that tests the first and last character of the word and keeps checking to see if each change would create the palindrome. Finally, printing out the minimum number needed to create the palindrome.
import sys
def numOfSwitches(word, start, end):
if (start > end):
return sys.maxsize
if (start == end):
return 0
if (start == end - 1):
if (word[start] == word[end]):
return 0
else:
return 1
if (word[start] == word[end]):
return numOfSwitches(word, start + 1, end - 1)
else:
return (min(numOfSwitches(word, start, end - 1),
numOfSwitches(word, start + 1, end)) + 1)
word = input("Enter a Word: ")
start = 0
end = len(word)-1
print("Number of switches required for palindrome: " + str(numOfSwitches(word, start, end)))
in order to switch from paper to digital medical records the hospital bought in several individuals to introduce and implement the tools needed to organize the files . These individuals would best be described as
Available options are:
A. Technical champions
B. Engaged filmmakers
C. Business partners
D. Compliance champions
Answer:
Technical champions
Explanation:
Given that a "Technical Champion" is someone whose responsibility is to introduce and perform the role of enabling the use of technology, development of skills across the organization, and strengthen communication between Information Technology and the staff or employees.
Hence, in this case, considering the job descriptions described in the question above, these individuals would best be described as TECHNICAL CHAMPIONS
Create a method called nicknames that passes an array as a parameter. Inside the method initialize it to hold 5 names of your choice. Use the for each enhanced loop to print the elements of the array.
//======METHOD DECLARATION=========//
//method name: nicknames
//method return type: void
//method parameter: an array reference
public static void nicknames(String [] names){
//initialize the array with 5 random names
names = new String[] {"John", "Doe", "Brian", "Loveth", "Chris"};
//using an enhanced for loop, print out the elements in the array
for(String n: names){
System.out.print(n + " ");
}
}
Explanation:
The program is written in Java. It contains comments explaining important parts of the code. Kindly go through these comments.
A few things to note.
i. Since the method does not return any value, its return type is void
ii. The method is made public so that it can be accessible anywhere in and out of the class the uses it.
iii. The method is made static since it will most probably be called in the static main method (at least for testing in this case)
iv. The method receives an array of type String as parameter since the names to be stored are of type String.
v. The format of initializing an array manually should follow as shown on line 7. The new keyword followed by the array type (String), followed by the square brackets ([]) are all important.
vi. An enhanced for loop (lines 9 - 11) is a shorthand way of writing a for loop. The format is as follows;
=> The keyword for
=> followed by an opening parenthesis
=> followed by the type of each of the elements in the array. Type String in this case.
=> followed by a variable name. This holds an element per cycle of the loop.
=> followed by a column
=> followed by the array
=> followed by the closing parenthesis.
=> followed by a pair of curly parentheses serving as a block containing the code to be executed in every cycle of the loop. In this case, the array elements, each held in turn by variable n, will be printed followed by a space.
A complete code and sample output for testing purposes are shown as follows:
==================================================
public class Tester{
//The main method
public static void main(String []args){
String [] names = new String[5];
nicknames(names);
}
//The nicknames method
public static void nicknames(String [] names){
names = new String[] {"John", "Doe", "Brian", "Loveth", "Chris"};
for(String n: names){
System.out.print(n + " ");
}
}
}
==================================================
Output:John Doe Brian Loveth Chris
NB: To run this program, copy the complete code, paste in an IDE or editor and save as Tester.java
1) It is possible to email a document
directly from the Word application.
O FALSE
O TRUE
Answer:
True
Explanation:
As a basic user of SAP Business One, which feature of the application do you like most?
Answer:
I like the software most because it is completely for the sales department. I am very satisfied with what this software provides since I work as a sales specialist.
Explanation:
As an internal auditor, I first have to check and make sure the business is going through all reports and operations and that SAP Business One has helped me a lot with reporting features. I'm a huge fan of SAP Business One. And how this software is incredibly fully integrated when an accountancy provider creates a new customer name or adds a new item in every module, and the non-duplicate data feature secures the master data from any duplicate item.
Intuitive sales quotation and sales order functions help salespeople to develop deals that they can conclude. The mobile app adds to the software's usefulness fantastically.
In general, the system has a good monetary value. I would recommend it to everyone involved in the decision-making process and it is my favorite.
Which of the following statement is true? Single choice. (2 Points) Views are virtual tables that are compiled at run time All of the Mentioned Views could be looked as an additional layer on the table which enables us to protect intricate or sensitive data based upon our needs Creating views can improve query response time
Answer:
All of the mentioned views could be looked as an additional layer in the table which enables us to protect intricate or sensitive data based upon our needs.
Explanation:
View is a virtual table which executed a pre compiled query. It is a table in which selective portion of the data can be seen from one or more tables. Queries are not allowed in indexed views and adding column is not possible. Views can be looked as an additional layer in the virtual table which protects sensitive data.
calculateAverageSalary(filename): Returns the average salary of all employees rounded down to 2 decimal points highestHireMonth(filename): Returns the month (integer) during which most hires were made over the years getMonth(date): Helper function to extract and return the month number from a date given as a string input of format MM/DD/YY. Return type should be an int.
Answer:
An extract from the answer is as follows:
for i in salary:
total_salary+=float(i)
count+=1
return round(total_salary/count,2)
def getMonth(date):
ddate = []
for i in date:
ddate.append(i.split('/')[0])
mode = int(max(set(ddate), key=ddate.count))
return mode
def highestHireMonth(filename):
month = []
See explanation for further details
Explanation:
Given
Attachment 1 completes the question
The complete answer could not be submitted. So, I've added it as an attachment.
See attachment 2 for program source file which includes the main method.
Comments are used to explain difficult lines
In C complete the following:
void printValues ( unsigned char *ptr, int count) // count is no of cells
{
print all values pointed by ptr. //complete this part
}
int main ( )
{
unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;
call the printValues function passing the array data //complete this part
}
Answer:
#include <stdio.h>
void printValues ( unsigned char *ptr, int count) // count is no of cells
{
for(int i=0; i<count; i++) {
printf("%d ", ptr[i]);
}
}
int main ( )
{
unsigned char data[ ] = { 9, 8, 7, 5, 3, 2, 1} ;
printValues( data, sizeof(data)/sizeof(data[0]) );
}
Explanation:
Remember that the sizeof() mechanism fails if a pointer to the data is passed to a function. That's why the count variable is needed in the first place.