Answer:
public static void classSplit(Scanner file){
int studentsOf21 = 0, studentsOf22 = 0,studentsOf23 = 0, studentsOf24 = 0;
while (file.hasNext() == true){
String studentName = file.next();
int year = file.nextInt();
switch (year){
case 2021:
studentsOf21++;
break;
case 2022:
studentsOf22++;
break;
case 2023:
studentsOf23++;
break;
case 2024:
studentsOf24++;
break;
}
}
int totalGraduate = studentsOf21+studentsOf22+studentsOf23+studentsOf24;
System.out.printf("students in class of 2021: %.2f%n", students2021*100.0/totalGraduate);
System.out.printf("students in class of 2022: %.2f%n", students2022*100.0/totalGraduate);
System.out.printf("students in class of 2023: %.2f%n", students2023*100.0/totalGraduate);
System.out.printf("students in class of 2024: %.2f%n", students2024*100.0/totalGraduate);
}
Explanation:
The classSplit method of the java class accepts a scanner object, split the object by iterating over it to get the text (for names of students) and integer numbers (for graduation year). It does not need a return statement to ask it prints out the percentage of graduates from 2021 to 2024.
Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets put into a TCP packet (using a standard header with no options) and that the TCP packet gets put into an IP packets. What is the % of overhead that is added in because of TCP and IP combines?
1) 40%
2) 10%
3) 20%
4) 70%
Answer:
1) 40%
Explanation:
Given the data size = 60 byte
data traversed through TSP then IP
Header size of TCP = 20 bytes to 60 bytes
Header size of IP = 20 bytes to 60 bytes
Calculating overhead:
By default minimum header size is taken into consideration hence TCP header size = 20 bytes and IP header size = 20 bytes
Hence, the correct answer is option 1 = 40%
Research the significance of the UNIX core of macOS and write a few sentences describing your findings.
Answer:
The Unix core used in Apple's macOS is called Darwin which is similar to the BSD Unix operating system. The Darwin in macOS has evolved, providing a slick aqua-graphical user interface for users to interact with the application by clicking rather than writing Unix commands in terminals.
Explanation:
The macOS is the operating system used by Apple computer brands. The operating system is a subset of the Unix's BSD operating system. It still makes use of the traditional Unix terminal and scripts but with a few alterations.
The significance of the UNIX core of macOS can be briefly described as:
It makes use of an aqua-graphical user interface to easily communicate with the application for seamless use.What is UNIX core?This refers to the different kernel subsystems which are a part of the process management and memory allocation of a device.
Hence, the significance of the UNIX core of macOS has made it very easy for Apple users to communicate with their device in real time and also to power the phone.
Read more about UNIX here:
https://brainly.com/question/26338728
Write the code for the method getNewBox. The method getNewBox will return a GiftBox that has dimensions that are m times the dimensions of its GiftBox parameter, where m is a double parameter of the method.
For example, given the following code segment:
GiftBox gift = new Gift Box (3.0, 4.0, 5.0):
The call
getNewBox , 0, 5).
would return a GiftBox whose dimensions are: length = 1.5, width = 2.0, and height = 2.5 .
Answer:
public class GiftBox{
private int length;
private int width;
private int height;
public GiftBox(double length, double width, double height) {
this.length = length;
this.width = width;
this.height = height;
}
public static GiftBox getNewBox(GiftBox giftBox, double m) {
return new GiftBox(m * giftBox.length, m * giftBox.width, m * giftBox.height);
}
private boolean fitsInside(GiftBox giftBox) {
if(giftBox.length < this.length && giftBox.width <this.width
&& giftBox.height < this.height) {
return true;
}
return false;
}
public static void main(String []args){
GiftBox giftBox = new GiftBox(3.0 , 4.0, 5.0);
GiftBox newGiftBox = getNewBox(giftBox, 0.5);
System.out.println("New Box length: " + newGiftBox.length);
System.out.println("New Box width: " + newGiftBox.width);
System.out.println("New Box height: " + newGiftBox.height);
GiftBox gift = new GiftBox(3.0 , 4.0, 5.0);
GiftBox other = new GiftBox(2.1 , 3.2, 4.3);
GiftBox yetAnother = new GiftBox(2.0 , 5.0, 4.0);
System.out.println(gift.fitsInside(other));
System.out.println(gift.fitsInside(yetAnother));
}
}
Explanation:
The getNewBox is a public method in the GiftBox class in the Java source code above. It returns the GiftBox object instance increasing or multiplying the dimensions by the value of m of type double.
A substring of some character string is a contiguous sequence of characters in that string (which is different than a subsequence, of course). Suppose you are given two character strings, X and Y , with respective lengths n and m. Describe an efficient algorithm for finding a longest common substring of X and Y .For each algorithm:i. Explain the main idea and approach.Write appropriate pseudo-code.Trace it on at least three different examples, including at least a canonical case and two corner cases.
iv. Give a proof of correctness.v. Give a worst-case asymptotic running time analysis.
Answer:
create a 2-dimensional array, let both rows represent the strings X and Y.
check for the common characters within a string and compare them with the other string value.
If there is a match, append it to the array rows.
After iterating over both strings for the substring, get the longest common substring for both strings and print.
Explanation:
The algorithm should create an array that holds the substrings, then use the max function to get the largest or longest substring in the array.
What dd command would you use to copy the contents of a partition named /dev/drive1 to another partition, called /dev/backup?
Answer:
dd if=/dev/drive1 of=/dev/backup
Explanation:
Linux operating system is an open-source computer application readily available to system operators. The terminal is a platform in the operating system used to write scripts like bash and directly communicate with the system kernel.
There are two commands used in bash to copy files, the "cp" and "dd". The dd is mostly used to copy files from one storage or partition to another. The syntax of dd is;
dd if= (source partition/directory) of= (target partition/directory)
Why is a bedroom considered a poor study environment?
Bedrooms are dimly lit.
Bedrooms are too small.
Bedrooms are too comfortable.
Bedrooms are messy and cluttered.
Answer:
It would basically be based on how you study and what your room is like. But my opinion would be
Bedrooms are Too Comfortable- which causes you to want to sleep or not due your work
Bedrooms are dimly lit- Which makes it hard for you to see your work and see anything
Bedrooms are too small- You will fell crushed and hard to focus (I would most likely choose this answer)
Bedrooms are messy and cluttered- You will not be able to concentrate and make it hard to study or do school work. ( I would choose this because I have experienced with this and I score higher in a cleaner environment and able to focus more)
Explanation: This would all depend on how you best work.
Hope this Helps!!
Which of the following are downlink transport channels?
a. BCH.
b. PCH.
C. RACH.
d. UL-SCH.
e. DL-SCH.
Generally speaking, digital marketing targets any digital device and uses it to advertise and sell a(n) _____.
religion
product or service
governmental policy
idea
Answer:
product or service
Explanation:
Digital marketing is a type of marketing that uses the internet and digital media for the promotional purposes. It is a new form of marketing where the products are not physically present. The products and services are digitally advertised and are used for the popularity and promotion. Internet and digital space are involved in the promotion. Social media, mobile applications and websites are used for the purpose.
Answer:
A.) Product or service
Explanation:
Digital marketing is the practice of promoting products or services through digital channels, such as websites, search engines, social media, email, and mobile apps. The goal of digital marketing is to reach and engage with potential customers and ultimately to drive sales of a product or service. It can target any digital device that can access the internet, and it can use a variety of techniques such as search engine optimization, pay-per-click advertising, social media marketing, content marketing, and email marketing to achieve its objectives.
Which heading function is the biggest?
1. h1
2. h2
3. h3
Answer:
h3
Explanation:
sub to Thicc Panda on YT
Which interpersonal skill is the most important for a telecom technician to develop?
teamwork
active listening
conflict resolution
social awareness
Answer: Interpersonal communication is the process of face-to-face exchange of thoughts, ideas, feelings and emotions between two or more people. This includes both verbal and nonverbal elements of personal interaction.
Explanation:
i think plz dont be mad
Pointers are addresses and have a numerical value. You can print out the value of a pointer as cout << (unsigned)(p). Write a program to compare p, p + 1, q, and q + 1, where p is an int* and q is a double*. Explain the results.
Answer:
#include <iostream>
using namespace std;
int main() {
int i = 2;
double j = 3;
int *p = &i;
double *q = &j;
cout << "p = " << p << ", p+1 = " << p+1 << endl;
cout << "q = " << q << ", q+1 = " << q+1 << endl;
return 0;
}
Explanation:
In C++, pointers are variables or data types that hold the location of another variable in memory. It is denoted by asterisks in between the data type and pointer name during declaration.
The C++ source code above defines two pointers, "p" which is an integer pointer and "q", a double. The reference of the variables i and j are assigned to p and q respectively and the out of the pointers are the location of the i and j values in memory.
How did NAT help resolve the shortage of IPV4 addresses after the increase in SOHO, Small Office Home Office, sites requiring connections to the Internet?
Question Completion:
Choose the best answer below:
A. It provides a migration path to IPV6.
B. It permits routing the private IPV4 subnet 10.0.0.0 over the Internet.
C. NAT adds one more bit to the IP address, thus providing more IP addresses to use on the Internet.
D. It allowed SOHO sites to appear as a single IP address, (and single device), to the Internet even though there may be many devices that use IP addresses on the LAN at the SOHO site.
Answer:
NAT helped resolve the shortage of IPV$ addresses after the increase in SOHO, Small Office Home Office sites requiring connections to the internet by:
D. It allowed SOHO sites to appear as a single IP address, (and single device), to the Internet even though there may be many devices that use IP addresses on the LAN at the SOHO site.
Explanation:
Network Address Translation (NAT) gives a router the ability to translate a public IP address to a private IP address and vice versa. With the added security that it provides to the network, it keeps the private IP addresses hidden (private) from the outside world. By so doing, NAT permits routers (single devices) to act as agents between the Internet (public networks) and local (private) networks. With this facilitation, a single unique IP address is required to represent an entire group of computers to anything outside their networks.
The Bellman-Ford algorithm for the shortest path problem with negative edge weights will report that there exists a negative cycle if at least one edge can still be relaxed after performing nm times of relaxations. The algorithm, however, does not specify which cycle is a negative cycle. Design an algorithm to report one such cycle if it exists. You should make your algorithm runs as fast as possible.
Answer:
- Iterate over the Bellman-Ford algorithm n-1 time while tracking the parent vertex and store in an array.
- Do another iteration and if no relaxation of the edges occurs in the nth iteration then print of return "There are no negative cycle".
- Else, store the vertex of the relaxed edge at the nth iteration with a variable name.
- Then iterate over the vertexes starting from the store vertex until a cycle is found then print it out as the cycle of negative weight.
Explanation:
The Bellman-Ford algorithm can be used to detect a negative cycle in a graph. The program should iterate over the algorithm, in search of a relaxed edge. If any, the vertex of the specified edge is used as a starting point to get the target negative cycle.
I really need help on this if you get it right I will say thank you my friend
Answer:
A
Explanation:
A. Makes the the most sense
B. Not exactly
C. Doesn't make any sense
D. Complete Garbage
What line of code makes the character pointer studentPointer point to the character variable userStudent?char userStudent = 'S';char* studentPointer;
Answer:
char* studentPointer = &userStudent;
Explanation:
Pointers in C are variables used to point to the location of another variable. To declare pointer, the data type must be specified (same as the variable it is pointing to), followed by an asterisk and then the name of the pointer. The reference of the target variable is also assigned to the pointer to allow direct changes from the pointer variable.
Answer for 3 and 4 please
Answer:
3. D: px
4. B: web page
Explanation:
All font sizes are measured in px unless specified otherwise (in em's for example).
The correct answer is a web page because itself is a unique file that displays multimedia components.
Answer:
Q3: Font size is measured in pt (point) which can be converted into centimeter(cm)
Q4: The answer is webpage
Explanation:
Q3: Font size is measured in pt (point) which can be converted into centimeter(cm)
Q4: A unique file with unique name and address is a webpage.
because webserver and browser are software while website is collection of webpages.
What is the main reason for assigning roles to members of a group?
So that people with strengths in different areas can work on what they do best, plus it divides the workload.
What is meant by the term visual communication?
Answer:
eye contact
Explanation:
The purpose of __________________ is to isolate the behavior of a given component of software. It is an excellent tool for software validation testing.a. white box testingb. special box testingc. class box testingd. black-box testing
Answer:
d.) black-box testing
Explanation:
Software testing can be regarded as procedures/process engage in the verification of a system, it helps in detection of failure in the software, then after knowing the defect , then it can be corrected. Black Box Testing can be regarded as a type of software testing method whereby internal structure as well as design of the item under test is not known by one testing it. In this testing internal structure of code/ program is unknown when testing the software, it is very useful in checking functionality of a particular application. Some of the black box testing techniques commonly used are; Equivalence Partitioning, Cause effect graphing as well as Boundary value analysis. It should be noted that the purpose of black-box testing is to isolate the behavior of a given component of software.
Write a Python program to keep track of data for the following information in a medical clinic: doctors, patients, and patient_visits
Patients and Doctors have an ID, first name, and last name as common attributes. Doctors have these additional attributes: specialty (e.g. heart surgeon, ear-nose-throat specialist, or dermatologist), total hours worked, and hourly pay. Further, doctors keep track of the patient_visits. A patient_visit has the following attributes, number_of_visits to the clinic, the patient who is visiting, the doctor requested to be visited, and the number of hours needed for consultation. Based on the number of consultation hours, the doctor will get paid.
The following functions are required:
1. addVisit: this function adds a patient_visit to the doctor. A new visit will NOT be added if the doctor has already completed 40 hours or more of consultation. If this happens, an error is thrown mentioning that the doctor cannot have more visits this week.
2. calculatePay: this function calculates the payment for the doctor using the following logic: Each hour is worth AED 150 for the first two visits of the patient and all further visits are billed at AED 50.
3. calculateBill: this function calculates the bill for the patient, which displays the doctor's details, patient details, and payment details. An additional 5% of the total is added as VAT.
The student is required to identify classes, related attributes, and behaviors. Students are free to add as many attributes as required. The appropriate access modifiers (private, public, or protected) must be used while implementing class relationships. Proper documentation of code is mandatory. The student must also test the code, by creating at-least three objects. All classes must have a display function, and the program must have the functionality to print the current state of the objects.
What is the best use of network in homes
Answer:
Spectrem
Explanation:
A video game character can face one of four directions
Create a function copy() that reads one file line by line and copies each line to another file. You should use try-except statements and use either open and close file statements or a with file statement.>>>def copy(filename1, filename2) :
Answer:
See attachment for answer
Explanation:
I could not add the answer; So, I made use of an attachment
The program is written on 9 lines and the line by line explanation is as follows:
Line 1:
This defines the function
Line 2:
This begins a try except exception that returns an exception if an error is encountered
Line 3:
This open the source file using open and with statement
Line 4:
This open the destination file using open and with statement and also makes it writable
Line 5:
This iterates through the content of the source file; line by line
Line 6:
This writes the content to the destination file
Line 7 & 8:
This is returned if an error is encountered
Line 9:
This prints that the file has been successfully copied
To call the function from main; use
copy(filename1, filename2)
Where filename1 and filename2 are names of source and destination files.
Take for instance:
filename1 = "test1.txt"
filename1 = "test2.txt"
copy(filename1, filename2)
The above will copy from test1.txt to test2.txt
The function copies text from one file to another. The program written in python 3 goes thus
def copy(filename1, filename2):
#initialize a function names copy and takes two arguments which are two files
try:
#initiate exception to prevent program throwing an error
with open(filename1, "r") as file1 :
#open file1 in the read mode with an alias
with open(filename2, "w") as file2:
#open file 2 in write mode with an alias
for line in file1:
#loop through each line in file 1
file2.write(line)
#copy / write the line in file2
except:
print("Error copying file")
#display if an error is encountered
print("File Copied")
#if no error, display file copied
Learn more : https://brainly.com/question/22392664
A series of gentle often open-ended inquiries that allow the client to progressively examine the assumptions and interpretations here she is made about the victimization experience is called:_____.
Answer:
Trauma Narrative
Explanation:
Given that Trauma narrative is a form of narrative or carefully designed strategy often used by psychologists to assists the survivors of trauma to understand the meaning or realization of their experiences. It is at the same time serves as a form of openness to recollections or memories considered to be painful.
Hence, A series of gentle often open-ended inquiries that allow the client to progressively examine the assumptions and interpretations he or she is made about the victimization experience is called TRAUMA NARRATIVE
Select the correct answer from each drop-down menu.
Complete the sentence listing the basic parts of a computer.
All computers have these four basic parts: an input device, a
Answer:
all computers have an input device, storage, proccesing,and output
hope it helped
Explanation:
Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
Write a program that asks the user for a word. Next, open up the movie reviews.txt file and examine every review one at a time. If a review contains the desired word you should make a note of the review score in an accumulator variable. Finally, produce some output that tells your user how that word was used across all reviews as well as the classification for this word (any score of 2.0 or higher can be considered
Answer:
import numpy as np
word = input("Enter a word: ")
acc = []
with open("Downloads/record-collection.txt", "r") as file:
lines = file.readlines()
for line in lines:
if word in line:
line = line.strip()
acc.append(int(line[0]))
if np.mean(acc) >= 2:
print(f"The word {word} is a positive word")
print(f"{word} appeared {len(acc)} times")
print(f"the review of the word {word} is {round(np.mean(acc), 2)}")
else:
print(f"the word {word} is a negative word with review\
{round(np.mean(acc), 2)}")
Explanation:
The python program gets the text from the review file, using the user input word to get the definition of reviews based on the word, whether positive or negative.
The program uses the 'with' keyword to open the file and created the acc variable to hold the reviews gotten. The mean of the acc is calculated with the numpy mean method and if the mean is equal to or greater than 2 it is a positive word, else negative.
Write a SELECT statement that returns these columns from the Customers table:
Customer last name customer_last name column
City customer_city column
Zip code customer_zip Column
Return only the rows with customer_state equal to IL .
Sort the results in Descending order of customer last name
SCHEMA:
CREATE TABLE customers
(
customer_id INT NOT NULL,
customer_last_name VARCHAR(30),
customer_first_name VARCHAR(30),
customer_address VARCHAR(60),
customer_city VARCHAR(15),
customer_state VARCHAR(15),
customer_zip VARCHAR(10),
customer_phone VARCHAR(24)
);
INSERT INTO customers VALUES
(1, 'Anders', 'Maria', '345 Winchell Pl', 'Anderson', 'IN', '46014', '(765) 555-7878'),
(2, 'Trujillo', 'Ana', '1298 E Smathers St', 'Benton', 'AR', '72018', '(501) 555-7733'),
(3, 'Moreno', 'Antonio', '6925 N Parkland Ave', 'Puyallup', 'WA', '98373', '(253) 555-8332'),
(4, 'Hardy', 'Thomas', '83 d''Urberville Ln', 'Casterbridge', 'GA', '31209', '(478) 555-1139'),
(5, 'Berglund', 'Christina', '22717 E 73rd Ave', 'Dubuque', 'IA', '52004', '(319) 555-1139'),
(6, 'Moos', 'Hanna', '1778 N Bovine Ave', 'Peoria', 'IL', '61638', '(309) 555-8755'),
(7, 'Citeaux', 'Fred', '1234 Main St', 'Normal', 'IL', '61761', '(309) 555-1914'),
(8, 'Summer', 'Martin', '1877 Ete Ct', 'Frogtown', 'LA', '70563', '(337) 555-9441'),
(9, 'Lebihan', 'Laurence', '717 E Michigan Ave', 'Chicago', 'IL', '60611', '(312) 555-9441'),
(10, 'Lincoln', 'Elizabeth', '4562 Rt 78 E', 'Vancouver', 'WA', '98684', '(360) 555-2680');
Answer:
SELECT customer_last_name, customer_city, customer_zip FROM customers WHERE customer_state = 'IL' ORDER BY customer_last_name DESC;
Explanation:
Here, we are given a SCHEMA with the table name customers.
It's creation command and commands to insert values are also given.
We have to print the customer last name, city and zip code of all the customers who have their state as IL in the decreasing order of their last names.
Let us learn a few concepts first.
1. To print only a specified number of columns:
We can write the column names to be printed after the SELECT command.
2. To print results as per a condition:
We can use WHERE clause for this purpose.
3. To print in descending order:
We can use ORDER BY clause with the option DESC to fulfill the purpose.
Therefore, the answer to our problem is:
SELECT customer_last_name, customer_city, customer_zip FROM customers WHERE customer_state = 'IL' ORDER BY customer_last_name DESC;
Output of the command is also attached as screenshot in the answer area.
3. Write a function named sum_of_squares_until that takes one integer as its argument. I will call the argument no_more_than. The function will add up the squares of consecutive integers starting with 1 and stopping when adding one more would make the total go over the no_more_than number provided. The function will RETURN the sum of the squares of those first n integers so long as that sum is less than the limit given by the argument
Answer:
Following are the program to this question:
def sum_of_squares(no_more_than):#defining a method sum_of_squares that accepts a variable
i = 1#defining integer variable
t = 0#defining integer variable
while(t+i**2 <= no_more_than):#defining a while loop that checks t+i square value less than equal to parameter value
t= t+ i**2#use t variable to add value
i += 1#increment the value of i by 1
return t#return t variable value
print(sum_of_squares(12))#defining print method to call sum_of_squares method and print its return value
Output:
5
Explanation:
In the program code, a method "sum_of_squares" is declared, which accepts an integer variable "no_more_than" in its parameter, inside the method, two integer variable "i and t" are declared, in which "i" hold a value 1, and "t" hold a value that is 0.
In the next step, a while loop has defined, that square and add integer value and check its value less than equal to the parameter value, in the loop it checks the value and returns t variable value.
Which formatting option(s) can be set for conditional formatting rules?
Answer:
D
Explanation:
Any of these formatting options as well as number, border, shading, and font formatting can be set.