Answer:
1. Which of the following is not the name of a Java wrapper class from the Java API?
A. Byte
B. Int
C. Long
D. Boolean
Int is not a wrapper class
Byte is the wrapper class of byte, Int is not a wrapper class and is a primitive data type, Long is a wrapper class of long, Boolean is a wrapper class for boolean. Hence Int is the correct answer and its wrapper class is Integer.
2. Which of the following statements will cause a compiler error?
A. Integer i = new integer ( ) ;
B. Integer j = new integer ("5") ;
C. Integer k = Integer.valueOf ("5");
D. int m = Integer.pareseInt ("5");
“I” in integer in A and B must be in capital.
3. If variables j and k refer to objects of type Double and j . compareTo (k) returns a value of 1, which of the following is true?
A. The double value held in j is less than the value held inside k.
B. The difference between values held in j and k is 1.
C. The double values held inside j and k are both positive.
D. The double value held inside j is greater than the value held inside k.
Compareto return 1 if first value is greater than with what it is compared.
4. What is a radix as used in the method parseInt (String s, int radix) from the integer class?
A. A numeric base 2 such as for binary or 16 for hexadecimal.
B. The number of characters in the string that represent integers.
C. The Unicode character code to be used when parsing the string.
D. The number of times the string should be repeated before being converted to an int.
The radix value is 10 for decimal, 2 for binary and 16 for hexadecimal. Radix is the base or number of unique digits.
5. Which of the following is a static method of the integer class?
A. intValue ( )
B. parseInt ( )
C. toString ( )
D. compareTo ( )
ParseInt() is a static method of the integer class, and rest are non static methods.
6. Which of the following statements will cause a compiler error?
A. Double a = new Double (10.6) + 3;
B. Integer b = 0;
C. Double c = 0;
D. int d = new Integer (7) ;
In A and C data type does not matches like Double c=0 means Double c=new int(0) which is never true.
7. Which of the following is not an example of autoboxing?
A. Boolean a = false
B. Integer b = new integer (9);
C. double x = 3.0;
Double c = x;
D. Character d = ‘2’;
Autoboxing brings out reference type from the value type, and this is not true for A
8. What is the result of the following code fragment?
BigInteger a = new BigInteger (“10”);
BigInteger b = new BigInteger (“25”);
a . multiply (b);
a . add (b);
System.out.println (a);
A. 10
B. 35
C. 250
D. 275
a.multiply(b) = 250
a.add(b)= 250+25=275
9. What is the name of the BigInteger method that will calculate the remainder of division by another BigInteger?
A. modulo ( )
B. modulus ( )
C. divisor ( )
D. remainder ( )
Remainder is the correct answer.
Explanation:
Please check answer.
Choose the words that complete the sentences.
A_______
is used to edit raster images.
A_______
is used to edit vector images.
A_______
is used to control a scanner or digital camera.
Answer:
A paint application
is used to edit raster images.
A drawing application
is used to edit vector images.
A digitizing application
is used to control a scanner or digital camera.
Explanation:
got it right on edg
Create a code for playing blackjack
The first part of the code will create two variable.
One for the first card you’re dealt and one for the second.
Add those two variable for the total score you have
Then
Create a while loop that will stop if your score becomes above 21 or if the user says that they wish to stay.
Inside the while loop have ask the user if they want to hit or stay. Inside of the question be sure to print the current total that the user has
If the user inputs “hit” add a random number between 1 and 11 to their score.
If they input “stay” then print their final score
Then
Create a code for the dealer
The dealer should also start with two cards (remember you can always copy and paste and then edit your code)
Create a while loop for the dealer. (there is rule that dealers must always hit if their total is 16 or under
Print the dealers score once they are done.
Finally
Check if your score is higher than the dealer’s.
If it is you win
If not, you lose
Remember.
If either the dealer or you reach over 21 then that person automatically loses
Answer:
import random
is_stay = 'n'
y_fcard = random.randint(1, 11)
y_scard = random.randint(1, 11)
d_fcard = random.randint(1, 11)
d_scard = random.randint(1, 11)
you_score = y_fcard + y_scard
dealer_s = d_fcard + d_scard
print("Your score", you_score)
print("dealer's score", dealer_s)
while is_stay == 'n':
if you_score > 21:
break
you_score += random.randint(1, 11)
print("Your score", you_score)
is_stay = input("Do you want to stay y/n?: ")
if you_score > 21:
print("You lost")
quit()
while dealer_s <= 16:
dealer_s += random.randint(1, 11)
if dealer_s > 21:
print("The dealer lost")
quit()
if you_score > dealer_s:
print("You are the winner", "My score: ",you_score, "\nDealer's score: ", dealer_s)
else:
print("Sorry, you lost the game", "My score: ",you_score, "\nDealer's score: ", dealer_s)
Explanation:
The python program uses the random module's 'randint' to get a random integer number between 1 and 11, and adds the value to the user's score if the user decides to hit but compares the result with the dealer's if the user stays.
Use the drop-down menus to match the description to the correct audio-editing technique or term. deleting unwanted sounds increasing or decreasing volume of an audio recording the process of smoothing choppy sounds by introducing digital noise increasing or decreasing the speed of an audio file a tool that removes unwanted low-level sounds the process of creating an echo re-creating acoustic ambiance
Answer:
cutting
normalizing
dithering
changing playback rate
noise gate
flanging
reverb
Explanation:
Answer:
The answers are cutting
normalizing
dithering
changing playback rate
noise gate
flanging
reverb
In order.
Explanation:
edge 2021.
When an attacker has access to a password file, they can run a password-cracking program that uses a dictionary of known words or passwords as an input file. What type of attack is this attacker performing
The type of attack that the attacker is performing is a dictionary attack.
What is a dictionary attack?A dictionary attack is a way of breaking right into a password-protected computer, community, or different IT useful resource with the aid of using systematically coming into each phrase in a dictionary as a password.
A dictionary attack also can be utilized an try to discover the important thing vital to decrypt an encrypted message or document.
The missing information in the question:
ciphertext-only
brute force
dictionary
replay
Therefore, The type of attack that the attacker is performing is a dictionary attack.
Learn more about dictionary attack:
https://brainly.com/question/14728015
#SPJ1
An algorithm is a guiding rule used to solve problems or make decisions. Please select the best answer from the choices provided T F
True. An algorithm can be defined as a step-by-step procedure or a set of rules designed to solve a specific problem or perform a particular task.
It serves as a guiding rule for problem-solving or decision-making processes. Algorithms are used in various fields, including computer science, mathematics, and even everyday life.
In computer science, algorithms are fundamental to programming and software development. They provide a systematic approach to solving complex problems by breaking them down into smaller, manageable steps.
Algorithms can range from simple and straightforward to highly complex, depending on the nature of the problem they aim to solve.
The importance of algorithms lies in their ability to provide a structured and efficient solution to a given problem. They help in achieving consistency, accuracy, and reproducibility in decision-making processes. Additionally, algorithms enable automation and optimization, allowing for faster and more reliable problem-solving.
It is essential to acknowledge and respect the originality and intellectual property of others when using algorithms developed by someone else. Proper citation and avoiding plagiarism are crucial to ensure the integrity of one's work and uphold ethical standards.
For more such questions on algorithm,click on
https://brainly.com/question/29927475
#SPJ8
In Java
5.17 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.
Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.
Ex: If the input is:
apples 5
shoes 2
quit 0
the output is:
Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy.
Program that takes inputs and outputs a sentence in a Mad Libs format using loops in Java.
What are the benefits and drawbacks of using cloud storage for personal and business purposes?Here is the solution in Java:
```
import java.util.Scanner;
public class Adlib {
public static void main(String[] rags) {
Scanner = new Scanner(System.in);
String inputs;
inputting;
do {
System.out.print("Enter a noun and a number (or quit to exit): ");
inputs = scnr.next();
if (!inputting.\(equals\)("quit")) {
inputting = scnr.nextInt();
\(System.out.println\)("Eating " + inputs + " " + inputs + " a day
keeps you happy and healthy.");
}
} while (!inputs. Equals("quit"));
\(scnr.close\)();
}
}
```
- The program uses a `Scanner` object to read input from the user.
- It uses a `do-while` loop to repeat until the user inputs "quit".
- Inside the loop, it reads a string and an integer from the user.
- It checks if the string is "quit", and if not, it prints the sentence with the input values using string concatenation.
- The loop continues until the user inputs "quit".
- Finally, the `Scanner` object is closed to release system resources.
Learn more about Mad Libs format
brainly.com/question/30776995
#SPJ11
What necessarily happens when a photographer chooses to give either the aperture or the shutter speed priority?
The other of the two settings stays as previously selected.
The other of the two settings is overridden.
The other of the two settings is automatically selected.
The other of the two settings is ignored.
Answer:
The other of the two settings is automatically selected.
Explanation:
Answer: The other of the two settings is automatically selected.
Explanation:
TRUST
Please help for MAXIMUM POINTS!
Jarod’s boss sends him an e-mail about a task that she wants him to complete. In the email she asks that he collect the clothing size information of all 900 employees in his company and then place a branded clothing order with their supplier. After sending the email, his boss schedules a meeting with Jarod for the next day so that he can ask her any questions that he may have. What are four things that Jarod can do to ensure that he collects all the information he needs to do the task well?
. what is the first step to provide access when a client connects to an it application or system? a. authentication b. authorization c. confirmation d. identification
When a client connects to an application or system, the initial step is identification. Option D is correct.
What is the identification?The ability to uniquely identify a user of a system or an application running in the system is referred to as identification. Authentication is the ability to demonstrate that a user or application is truly who or what it claims to be.
Identification is also called as the first step in connecting a client connects to an application or system.
Therefore, option D is correct.
Learn more about the access, refer to:
https://brainly.com/question/14286257
SPJ1
travelbugz is a website that reviews accommodations and holiday destinations. users of the website can post their own reviews. users can use the travelbugz app too instead of the website if they want to. the app and website both directly access the web app running on the cloud to store and retrieve data. which of the following is true of this scenario?
Answer:
The true statement about this scenario is that both the website and the app directly access the web app running on the cloud to store and retrieve data.
Explanation:
Give at least Five (5) Data Communication components & discuss each
Data Communication ComponentsData communication is the transfer of digital data from one device to another. In data communication, there are many components, each of which plays a crucial role in the entire process.
In this question, we shall discuss five data communication components and their importance. The components are:1. SenderThe sender is the device that generates the message to be sent. This device is responsible for encoding the message into a format that can be understood by the recipient. This component is essential because it determines the message that will be sent. It must be accurate and concise to prevent confusion.
ReceiverThe receiver is the device that receives the message sent by the sender. This component is responsible for decoding the message and translating it into a format that can be understood by the recipient. The receiver is essential because it determines whether the message has been correctly interpreted or not. If the message is unclear, the receiver may not understand the message, and the communication may fail.
To know more about communication visit:
https://brainly.com/question/16274942
#SPJ11
Cache hit occurs when requested data is found in cache. For cache hit, data in main memory is loaded again to cache.
Answer:
TRUE
Explanation:
In the field of computing, cache is defined as the software or hardware component which stores the data and information for future use. It is a place in the computer software or hardware where the data are stored for their future use so that it can be retrieved faster when the data or the information is requested by the user.
A cache hit occurs when the data that is requested by the user is found in the cache memory. It is meant to deliver the data faster to the processor. And for the cache hit, the data in the memory is again loaded in the cache when the data is used.
How does the payload free worm method differ from the payload method?
A worm is a type of computer virus that is self-replicating and can spread throughout a network or the internet. It is a self-contained program that can replicate and spread without the need for a host file. Payload is a program or code that is hidden within the worm and executed on an infected computer.
These payloads can cause damage to the infected system, steal data, or launch additional attacks on other systems or networks. The payload-free worm is a worm that replicates and spreads like a traditional worm but does not contain any payload or malicious code.
It does not cause any damage to the infected system or network. This type of worm is often used for research purposes to study the spread of worms without causing harm to any system. The payload method is a worm that has a hidden code that is designed to cause damage to the infected system or network.
The payload can be programmed to perform various functions, including deleting files, stealing data, launching attacks on other systems, or installing additional malware. This type of worm is often used by cybercriminals to launch attacks on specific targets or to spread malware for financial gain.
For more such questions Payload,Click on
https://brainly.com/question/30144748
#SPJ8
What language do computers speak?
Answer:
machine languageBut, what does a computer understand? The only language that the computer can process or execute is called machine language. It consists of only 0s and 1s in binary, that a computer can understand. In short, the computer only understands binary code, i.e 0s and 1s.
Explanation:
Which three individuals were involved in creating programming languages?
A. Kathleen Booth
B. Charles Babbage
C. John G. Kemeny
D. Grace Hopper
The three individuals that were involved in creating programming languages are:
A. Kathleen Booth
C. John G. Kemeny
D. Grace Hopper
What is a software?A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task and proffer solutions to a particular problem.
What is programming?Programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) that instructs a software on how to perform a specific task on a computer system.
Based on historical information and records, we can infer and logically deduce that the three individuals that were involved in creating programming languages are:
Kathleen Booth John G. KemenyGrace HopperRead more on programming languages here: brainly.com/question/26497128
#SPJ1
Write a Java program to calculate the amount of candy each child at a party gets. You specify the number of children and the total amount of candy, then compute how many pieces each child gets, and how many are left over (for the parents to fight over!).
Answer:
import java.util.Scanner;
public class candy {
public static void main(String[] args){
Scanner sc = new Scanner(System.in);
System.out.println("Type in number of children: ");
//gets the number of children
int numberOfChildren = Integer.parseInt(sc.nextLine());
System.out.println("Type in number of candy: ");
//gets number of candy
int numberOfCandy = Integer.parseInt(sc.nextLine());
//checks there will be any leftover candy
int leftover = numberOfCandy%numberOfChildren;
System.out.println("Each children will get "+(numberOfCandy-leftover)/numberOfChildren+" candies.");
System.out.println("There will be "+leftover+" leftover candies.");
}
}
Write a program in the if statement that sets the variable hours to 10 when the flag variable minimum is set.
Answer:
I am using normally using conditions it will suit for all programming language
Explanation:
if(minimum){
hours=10
}
what term best describes snap-ins? a. settings b. users c. computers d. modules
The term that best describes snap-ins is D. Modules.
Snap-ins are software components that can be added to the Microsoft Management Console (MMC), which is a built-in Windows tool used for managing various system settings, services, and applications. These snap-ins are designed to extend the functionality of the MMC by providing additional tools or management capabilities for specific technologies or features.
For example, the Active Directory Users and Computers snap-in is a module that can be added to the MMC to manage user accounts and group policies in an Active Directory domain. Similarly, the DNS Manager snap-in can be used to manage the DNS server settings and zones in Windows Server.
Snap-ins are essentially software modules that provide a specific set of features or tools that are not available in the base MMC. When a snap-in is added to the MMC, it becomes part of the console and can be used alongside other snap-ins to manage various aspects of a Windows system.
Learn more about the concept of snap-ins as a modular component:https://brainly.com/question/30410135
#SPJ11
what protocol does the ping command use to test network connectivity?
The ping command uses the Internet Control Message Protocol (ICMP) to test network connectivity.
ICMP is a protocol that allows network devices to communicate with each other for various purposes, such as reporting errors, sending control messages, and testing network connectivity. When you use the ping command, it sends an ICMP echo request message to the specified destination, and waits for an ICMP echo reply message to come back.
The ping command sends ICMP echo request packets to the target IP address, and the target device then sends ICMP echo reply packets in response. By analyzing the round-trip time and any potential packet loss, the ping command helps determine the network connectivity and performance between the source and target devices.
To know more about Control Message Protocol visit:-
https://brainly.com/question/32319377
#SPJ11
which of the following is used most often in lans for fiber transmission links? group of answer choices 850 nm multimode-mode fiber 850 nm multimode fiber 1,550 nm single-mode fiber 850 nm single-mode fiber
The most commonly used LAN for fiber transmission links is the 850 nm multimode fiber.
This type of fiber is designed to carry multiple signals over the same link, allowing for faster data transmission and greater bandwidth. It can be used for short-distance transmission over up to a few kilometers. It is a relatively low-cost solution and requires less power than single-mode fiber. The 850 nm multimode fiber uses a relatively wide light source, which is able to spread the signal over a greater distance with less attenuation. This makes it a great choice for short-distance applications.
Additionally, it is more immune to noise than single-mode fiber and is less susceptible to changes in temperature. It is an ideal choice for fiber-optic networks that are used in LANs, such as those used for Ethernet, data centers, and storage area networks.
You can learn more about multimode fiber at: brainly.com/question/20459294
#SPJ11
an operating system’s ____ capability supports a division of labor among all the processing units. group of answer choices a. mulittasking. b. multithreading. c. multiprocessing. d. multicomputing
The operating system's c) multiprocessing capability supports a division of labor among all the processing units.
The multiprocessing is an operating system's capability that supports a division of labor among all the processing units. As we know, an operating system is a software program that manages computer hardware and software resources and provides services for computer programs. A computer's processing power can be enhanced through the use of multiprocessing. Multiprocessing refers to the use of two or more CPUs in a single computer system.
Multiprocessing has the ability to balance the workload among all the processing units by dividing the labor. Each processing unit receives a distinct set of instructions to execute while it is simultaneously working on another set of instructions.
Therefore, the correct answer is c) multiprocessing
Learn more about multiprocessing here: https://brainly.com/question/29838919
#SPJ11
what are the features of dot net ???
Answer:
1) interperability
2) portability
3) security
4) simplified deployment
5) base class library
6) language indepence
A ___ error means the web page you are trying to view isn't available, perhaps because the page has been deleted from the server.
601
404
500
Answer:
A 404
Explanation:
I've seen it many times.
Answer:
404
Explanation:
Make Your Own Flowchart
Answer:
https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS5V59B3u23rfG-bXj8jNoV7rXfV62cyPnkcg&usqp=CAU
an example of a flow chart
Explanation:
In one or two short paragraphs, explain a few different ways you could get more involved in your own community. Think about the issues that concern you and how you could get involved to have an effect on those concerns.
Answer:
Ways people get more involved in your community are by stoping to help when and where you're needed. It's a simple way to make your community better and help to create the kind of vibe that makes people feel safe and happy. If you see someone in need of assistance, come to their aid instead of averting your eyes. Do for others what you'd want them to do for you if you were in their situation. Support your local economy. Healthy communities have healthy local economies. People work together to help each other make a living and thrive. You can help improve the health of your local economy in many different ways, from changing your shopping habits to starting a business of your own.
Recycle and compost. Many communities are experiencing problems with landfills that are getting too full. Producing too much trash pollutes the environment, and that's not good for your community's long-term health. You can do your part to help improve the situation by recycling and composting as much of your waste as possible.Save energy and water. Using excessive electricity and water strains community resources.Saving energy and water is good for the planet as well as your local environment. Do your best to conserve energy and water and it will become an investment in your community's long-term health. By doing some of these simple things you can be involved and help the community you live in.
Explanation:
Hope this helps
Answer:
Answers will vary but should include some specific examples with common elements such as:
organizing a food drive or fundraiser to benefit a local charity
volunteering at a home for the elderly
donating clothes or other goods
getting a school sports team involved in a local service project
finding an organization where you can volunteer with your parents
Explanation:
PLATO
What is the maximum number of NTP Servers that an NTP client can be synchronized with?
A. 2
B. Unlimited
C. 1
D. 4
Answer:
it will be unlimited NTP
The maximum number of NTP Servers that an NTP client can be synchronized with unlimited server. Thus option B is correct.
what is server ?A server is a computer device which provides service to client as per their requirement with respect to space and data; it is nothing but a physical computer that runs a server program in a center called data center.
The machine can be act as a dedicated server, a model where the client service operated called client/server programming model, these program fulfils requests from client programs which can run on the same or different computers.
A computer application on the server can be operated as per the request from client or from other programmer, it can also keep the feature or component of the folders from a website, hooked up into the web and facilitates the sharing of stored information with certain network linked computers.
For more details regarding server, visit
brainly.com/question/7142205
#SPJ2
An authoritative Domain Name System (DNS) server for a zone creates a Resource Records Set (RRSet) signed with a zone signing key. What is the result of this action
There are different types of systems. The result of the action above is DNS Security Extensions.
What is the reason for DNSSEC?DNS Security Extensions is known to empower the authentication in DNS through the use of digital signatures that is as a result of public key cryptography.
Through the use of DNSSEC , it is not DNS queries and responses that are said to be cryptographically signed, but instead it is the DNS data that is signed by the person who has the data.
learn more about DNS Security Extensions from
https://brainly.com/question/1139046
First, you need to write a C program using the Pthread library to spawn a number of threads each of which executes the loop in the SimpleThread function below. The number of threads to create is a command line parameter passed to your program. All the threads modify a shared variable SharedVariable and display its value within and after the loop. int SharedVariable = 0; void SimpleThread(int which) { int num, val = 0; for(num = 0; num < 20; num++) { if (random() > RAND_MAX / 2) usleep(10); val = SharedVariable; printf("*** thread %d sees value %d\n", which, val); SharedVariable = val + 1; } val = SharedVariable; printf("Thread %d sees final value %d\n", which, val); } Your program must validate the command line parameter to make sure that it is a number. Your program must be able to run properly with any reasonable number of threads (e.g., 200). Try your program with the command line parameter set to 1, 2, 5, 10, and 50. Analyze and explain the results.
The program uses the Pthread library to create multiple threads, each executing the Simple Thread function, and modifies a shared variable.
Sure! Here's an example of a C program that uses the Pthread library to spawn multiple threads and execute the Simple Thread function:
#include <stdio.h>
#include <stdlib.h>
#include <pthread.h>
#include <unistd.h>
int SharedVariable = 0;
void SimpleThread(int which) {
int num, val = 0;
for (num = 0; num < 20; num++) {
if (random() > RAND_MAX / 2)
usleep(10);
val = SharedVariable;
printf("*** thread %d sees value %d\n", which, val);
SharedVariable = val + 1;
}
val = SharedVariable;
printf("Thread %d sees final value %d\n", which, val);
}
int main(int argc, char* argv[]) {
if (argc != 2) {
printf("Usage: %s <num_threads>\n", argv[0]);
return 1;
}
int numThreads = atoi(argv[1]);
if (numThreads <= 0) {
printf("Invalid number of threads\n");
return 1;
}
pthread_t threads[numThreads];
int i;
for (i = 0; i < numThreads; i++) {
if (pthread_create(&threads[i], NULL, (void*)SimpleThread, (void*)i) != 0) {
printf("Failed to create thread %d\n", i);
return 1;
}
}
for (i = 0; i < numThreads; i++) {
pthread_join(threads[i], NULL);
}
return 0;
}
This program takes a command line parameter indicating the number of threads to create. It validates the input to ensure it is a valid number. It then creates the specified number of threads, each executing the Simple Thread function. The shared variable Shared Variable is modified and printed within the loop of each thread.
Learn more about program here:
https://brainly.com/question/30905580
#SPJ11
Quick!! I'm TIMED!!!
Cloud suites are stored at a(n) ________ on the Internet, rather than on your microcomputer.
blog site
macrocomputer
pod site
server
Cloud suites are stored at a(n) option d. server on the Internet, rather than on your microcomputer.
What is a cloud at the Internet?
"The cloud" refers to servers which might be accessed over the Internet, and the software program and databases that run on the ones servers. Cloud servers are positioned in facts facilities all around the world.
A cloud suite is a cloud computing version that shops facts at the Internet via a cloud computing company who manages and operates facts garage as a service. It's brought on call for with just-in-time capability and costs, and gets rid of shopping for and handling your very own facts garage infrastructure.
Read more about the cloud suites :
https://brainly.com/question/5413035
#SPJ1
4
Select the correct answer.
Which language is widely used to write programs to process large amounts of numerical data?
A. PHP
B. FORTRAN
C. Prolog
D. Python
Answer:
The correct answer is B. FORTRAN.
Explanation:
I got it right on the Edmentum test.