High-quality documentation reportedly leads to a 60% (option D) reduction in the system maintenance effort when compared to a system without proper documentation.
Option D. 60 is correct.
This is because clear and concise documentation makes it easier for developers and maintainers to understand, modify, and troubleshoot the system, ultimately saving time and effort.
Based on the given information, we can conclude that high-quality documentation leads to a reduction in system maintenance effort.
However, the percentage of reduction is not specified in the question.
Option D. 60 is correct.
For similar question on system.
https://brainly.com/question/25976025
#SPJ11
Wendy had been searching the internet for a great deal on jewelry. While looking at one site, a pop-up was displayed that told her she had just been chosen as the winner of a nice prize. Being excited to win, Wendy clicked on the link provided to claim her prize. The next day, when Wendy tried to turn on her computer, her computer displayed the Blue Screen of Death (BSOD). After interviewing Wendy, you suspect that the pop-up she clicked on installed some malicious software that has caused her computer to lock up. Which of the following is the BEST place to begin repairing Wendy's computer?
A. Boot the computer from the Windows installation disc and run Startup Repair.
B.Boot the computer from the Windows installation disc and perform a clean installation of Windows.
C.Boot the computer from the Windows installation disc and run Reset this PC.
D.Boot the computer from the Windows installation disc and run System Restore.
Answer:
C.Boot the computer from the Windows installation disc and run Reset this PC
Hold down the shift key continuously until the Advanced Recovery Options menu appears. To troubleshoot, click. Click Reset this PC after that. Choose whether to perform a clean install and remove everything, or to keep your files. Thus, option C is correct.
What Windows installation disc and run Reset this PC?From the menu, choose Settings > Update & Security > Recovery. The title of the page should say “Reset this PC.” Next, click Get Started. Choose between removing everything or keeping my files.
In Windows 10, launch the Settings window by clicking the Start menu, then selecting the gear icon in the lower left corner. Another choice from the list of apps is the Settings app. Click Update & Security > Recovery in Settings, then decide Get started under reboot this PC.
Therefore, Boot the computer from the Windows installation disc and run Reset this PC.
Learn more about Windows installation here:
https://brainly.com/question/24282472
#SPJ5
Complete the following tasks: a. Design a class named StockTransaction that holds a stock symbol (typically one to four characters), stock name, and price per share. Include methods to set and get the values for each data field. Create the class diagram and write the pseudocode that defines the class. b. Design an application that declares two StockTransaction objects and sets and displays their values. c. Design an application that declares an array of 10 StockTransaction objects. Prompt the user for data for each object, and then display all the values. d. Design an application that declares an array of 10 StockTransaction objects. Prompt the user for data for each object, and then pass the array to a method that determines and displays the two stocks with the highest and lowest price per share.
The program based on the information illustrated is given below.
How to write the programDeclare StockTransaction[10] stocks
For i = 0 to 9:
Declare String symbol
Declare String name
Declare double price
Display "Enter stock symbol:"
Read symbol
Display "Enter stock name:"
Read name
Display "Enter price per share:"
Read price
Call stocks[i].setStockSymbol(symbol)
Call stocks[i].setStockName(name)
Call stocks[i].setPricePerShare(price)
Declare double highestPrice = -1.0
Declare int highestIndex = -1
Declare double lowestPrice = 999999.0
Declare int lowestIndex = -1
For i = 0 to 9:
If stocks[i].getPricePerShare() > highestPrice:
set highestPrice to stocks[i].getPricePerShare()
set highestIndex to i
If stocks[i].getPricePerShare() < lowestPrice:
set lowestPrice to stocks[i].getPricePerShare()
set lowestIndex to i
Display "Highest Price Stock: ", stocks[highestIndex].getStockSymbol(), stocks[highestIndex].getStockName(), stocks[highestIndex].getPricePerShare()
Display "Lowest Price Stock: ", stocks[lowestIndex].getStockSymbol(), stocks[lowestIndex].getStockName(), stocks[lowestIndex].getPricePerShare()
Learn more about program on
https://brainly.com/question/26642771
#SPJ4
Give two examples of a large databases that might be used to help members of the public
Answer:
Examples of large database that might be used to help members of the public are;
1) Apple Healthkit, Carekit and Researchkit
2) IBM Deep Thunder
Explanation:
1) The use of medical aid wearable devices that give instant data feed into the the a patients electronically stored health record has become possible and include the listed Apple technologies that enable the iPhone get instant access and feed back on individual health records
2) Large databases are used for weather forecasting by the processing of big data with the aid of very powerful computers by IBM Deep Thunder, which can also forecast natural disasters and the likelihood of wreckage in utility lines.
Examine the following declarations:
int area;
Point pt;
Which of the following is true?
a. both are primitive variables
b. area is a primitive variable, and pt is an object reference variable.
c. both are reference variables
d. area is an object reference variable, and pt is a primitive variable.
Within the creditcard selection list add the following options and values: Credit Card Type (leave the value as an empty text string), American Express (value="amex"), Discover (value="disc"), MasterCard (value="master"), and Visa (value="visa").
Make the selection list and cardname field required.
Make the cardnumber field required and add the regular expression pattern indicated in the comment section of the HTML file to help ensure that a valid card number is used.
Within the cardmonth selection list add options for each month starting with the text Month and a value of a blank text string followed by the option text January (01) through December (12) with the corresponding values 01 through 12. Make the selection list required.
Within the cardyear selection list add options for each year starting with the text Year and a value of a blank text string followed by the option text 2020 through 2024 with the corresponding values 2020 through 2024.
Make the cardcsc field required with a maximum character length of 3 characters following the regular expression pattern: ^\d{3}$ .
Open the code7-3_valid.css file and add the following style rules to the file:
Display any input or select element that has the focus with a yellow background color.
Display any input element with invalid data in a red font, surrounded by a red border, and red box shadows that are offset 0 pixels horizontally and vertically with a shadow blur of 5 pixels.
Answer:
input:focus {
background-color: yellow;
}
input:invalid {
color: red;
border: 1px solid red;
box-shadow: 0 0 5px red;
}
Which jobs are most likely to be replaced by robots and what effect will this have
Answer:
Here we go. Generally the robots are designed in order to do the work which has very much risk and Humans find it too laborious or hard to do. The robots will be used for the army, or as laborers. In my country Nepal, there's a restaurant where robots are used as waiters. They take order from you and provide you the food. The robots can be used for various purposes but I don't think they will be appointed for the job of higher authority. The use of robots will have massive effect in human life. The use of robots and appointing them in various jobs will cause the problem of unemployment. The poor will be affected and their existence may get into problem. This is one effect but there can be many effects from the use of robots. Using robot in army can reduce human deaths but also people get unemployed. There is both advantage and disadvantage from their use.
An OTS is commonly used in dialogue scenes. What does OTS stand for
The Object Transaction Service (OTS) is a cinema and television camera angle that positions the camera above the back of a subject's shoulder and head. An OTS is widely used in dialogue scenes.
What is OTS?The Object Transaction Service (OTS) is a service that is part of the Common Object Request Broker Architecture (CORBA), which is a set of standards maintained by the Object Management Group to aid with cross-platform activities. In general, OTS aids in the standardization of routine communications between network components. Object Transaction Service configurations include the use of a transaction manager as well as certain common library code used by both client and server applications. Special interfaces can be used to route data from a database through a certain type of CORBA-compliant process. APIs of various forms are frequently used to bridge cross-platform gaps in transaction handling.To learn more about Transaction, refer to:
https://brainly.com/question/28538721
#SPJ4
if you were 'looking inside' your computer and saw a bit pattern that looked like: 0010 what would that bit pattern be representing? pick the best answer below. some answers may be close, but only one is the best answer.
One and zero only make up a bit pattern. Any variable just is what it is. And a reference or pointer is. Put that explanation aside and consider it to be stating the obvious.
What amount of bit patterns are there?N bits have a total of 2N possible patterns. This is important. You will lose a lot of time in this and subsequent courses if you let yourself become confused on it. Computer science frequently uses this number.
What purposes do bit patterns serve?Number representation is one of the most popular uses of a bit-pattern. Arabic notation in base 10 is how we typically write numbers. We use the ten distinct symbols (0, 1, 2, 3, 4, 5, 6, 7, 8, and 9) in this system.
To know more about bit pattern visit :-
https://brainly.com/question/13014227
#SPJ4
In designing the interior of a physical fitness center, Sybil pays attention to sight lines and the arrangement of rooms and equipment to avoid the fishbowl effect common to such structures. She wants to give people working out a sense of privacy and isolation. Accordingly, she designs the center’s workout areas to have lots of short walls and angles to reduce the number of people visible in any given direction. In reviewing her plans, the client is dismayed. What do you predict are potential problems with Sybil’s design? (Select all that apply.)
The complicated nature of Sybil’s design means that she is probably in violation of numerous codes governing the construction of such structures.
It would be impossible to have fitness classes because the trainer and the class members wouldn’t be able to see each other as they work out.
The lack of sight lines that can encompass entire areas means lots of hidden corners that can create safety and security concerns.
The labyrinth effect of so many short walls and angles likely means that the facility doesn’t make effective use of natural light coming in from outside.
Answer:
The potential problems with Sybil's design are;
1) Due to the complicated nature of Sybil's design means that she is probably in violation of numerous codes governing the construction of such structures
2) It would be impossible to have fitness classes because the trainer and the class members wouldn't be able to see each other as they work out
3) The lack of sight lines that can encompass entire areas means lots of hidden corners that can create safety and security concerns
4) The labyrinth of so many short walls and angles likely means that the facility doesn't make effective use of natural light coming in from outside
Explanation:
The design considerations for a fitness center includes
1) Provision of adequate space for circulation
2) The sizes of the interior should be varied to avoid the feeling of being inside a big box
3) Allow ample access to natural light
4) Visibility of activity areas to increase interest
5) Ensure that likely dangerous spaces are visible
6) Avoid the creation of dark or hidden corners
Therefore
1) There are likely probabilities that Sybil's design could be in violation of federal and state codes for building similar structures
2) There will be reduced visibility of the trainer
3) Hidden areas formed, due to lack of visibility can be a source of concern for safety
4) There could be limited access for natural light within the facility
What would the range(3, 9) function generate?
A.
3, 6, 9
B.
3, 4, 5, 6, 7, 8
C.
4, 5, 6, 7, 8, 9
D.
3, 9
Answer:
A, 3,6,9
is the answer
Explanation:
bc it count by
Identify the correct method of insertion and removal followed by a queue. A. FILO B. FIFO C. LIFO D. LIFO and FILO
The correct method for insertion and removal followed by a queue is FIFO. The correct option is B.
What is FIFO?FIFO is an acronym for first in, first out, a method for organizing the manipulation of a data structure in which the oldest entry, or "head" of the queue, is processed first.
The primary distinction between Stack and Queue Data Structures is that Stack uses LIFO while Queue uses FIFO. LIFO stands for Last In First Out. It means that when we put data in a Stack, the last entry is processed first.
Thus, the correct option is B.
For more details regarding FIFO, visit:
https://brainly.com/question/17236535
#SPJ1
Discuss in not less than five sentences, one way the internet has been benificial to persens around the word.
binary into decimal
100101
Answer:
100101= 37....
Explanation:
Hope it helps you.....
Answer:
37
I believe it will help you maybe, hope it helps you
plz help im timed
An artist posted a picture of a painting on his website in order to sell it. Another business copied the picture and used it as a background on a website without giving credit to the artist. This action is most strongly related to which aspect of life?
culture
society
ethics
economy
Answer:
i believe C. Ethic
Explanation:
Ethics or moral philosophy is a branch of philosophy that "involves systematizing, defending, and recommending concepts of correct and wrong behavior". The field of ethics, along with aesthetics, concerns matters of value, and thus comprises the branch of philosophy called axiology.
What is the value of z after the following statements have been executed? int x = 4, y = 33; double z; z = (double) (y / x); group of answer choices
The value of z after the below statements have been executed: int x = 4, y = 33; double z; z = (double) (y / x) is 8.0
What is coding?The term Coding is known to be often called called computer programming, and it is said to be the ways that people do talk or communicate with computers.
Note that Code tells a computer the right actions to take, and based on the above, the value of x is doubled and so it will be 8.
Therefore, The value of z after the below statements have been executed: int x = 4, y = 33; double z; z = (double) (y / x) is 8.0
Learn more about coding from
https://brainly.com/question/22654163
#SPJ1
List three public interest and benefit activities for which the disclosure of protected health information is allowed without authorization.
The three public interest and benefit activities for which the disclosure of protected health information is allowed without authorization are Public Health Activities, Law Enforcement Purposes, and Research Purposes.
1. Public Health Activities: Disclosure of PHI is allowed for purposes related to public health, such as preventing or controlling disease, injury, or disability. This may involve reporting to public health authorities or authorized entities.
2. Law Enforcement Purposes: PHI can be disclosed without authorization to law enforcement officials for specific purposes, such as to comply with a court order, identify or locate a suspect, or prevent a serious threat to public safety.
3. Research Purposes: In some instances, PHI can be disclosed without authorization for research purposes, provided that the research has been approved by an institutional review board or privacy board and necessary safeguards are in place to protect individuals' privacy.
know more about protected health information here:
https://brainly.com/question/1380622
#SPJ11
Finish the code for this bubble sort. Length = len(mylist) for n in range(length - 1): for test in range(n + 1, length): if mylist[n] mylist[test]: temp = mylist[n] mylist[n] = mylist [test] mylist[test] = temp print(mylist).
Note that the missing character is ">". This is to be inserted in the fourth line as follows: "if myList[n] > myList[test]:" With this, the code for the bubble sort is complete.
What is a bubble sort?Bubble sort, commonly referred to as sinking sort, is a basic sorting algorithm that continually moves through the input list element by element, comparing the current element with the one following it, exchanging their values if needed.
The term "responsibility" refers to the act of determining whether or not a person is responsible for his or her own actions. Just to the movement of air bubbles in the water that rise up to the surface, each element of the array migrate to the end in each iteration. As a result, it is known as a bubble sort.
One of the primary benefits of a bubble sort is that it is a simple algorithm to describe to a computer. There is just one duty to do (compare two values and, if needed, swap them). This results in a very tiny and straightforward computer application.
Learn more about bubble sort:
https://brainly.com/question/18686944
#SPJ1
what considerations and specific approaches would you take to determine how much storage is needed and how to manage storage for your client’s application, draw it or lose it?
Understand app, assess data, classify, determine performance, evaluate storage, consider growth, redundancy, cost, manage, monitor, optimize.
What are the main storage considerations?When determining the storage requirements and management approach for a client's application, several considerations and specific approaches need to be taken into account. Here are the key steps involved in this process:
Understand the Application: Gain a comprehensive understanding of the client's application, its purpose, and the types of data it deals with. Identify the data sources, data types (structured, unstructured, multimedia), and the expected growth rate of data over time.Data Assessment: Conduct a thorough assessment of the data to determine its size, volume, and characteristics. This includes analyzing the average and peak data load, frequency of data updates, and the anticipated retention period for different data types.Data Classification: Classify the data based on its importance, criticality, and accessibility requirements. Categorize data into hot (frequently accessed), warm (moderately accessed), and cold (rarely accessed) tiers.Performance Requirements: Determine the performance requirements for data access and storage. This involves analyzing factors such as response time, throughput, latency, and input/output operations per second (IOPS) expected by the application.Scalability and Growth: Consider the anticipated growth of the application and data over time. Account for factors like new users, increased data volume, feature enhancements, and potential business expansion.Storage Technologies: Evaluate various storage technologies and options available, such as local disk storage, network-attached storage (NAS), storage area network (SAN), cloud storage, object storage, or a combination of these. Consider the pros and cons of each technology in relation to the client's requirements, budget, and future scalability needs.Redundancy and Data Protection: Assess the need for data redundancy and protection mechanisms, such as backups, replication, snapshots, and disaster recovery. Determine the appropriate level of data redundancy based on the criticality and importance of the application.Cost Considerations: Balance the storage requirements with the available budget. Compare the costs of different storage solutions and identify the most cost-effective options that meet the client's needs.Storage Management: Develop a storage management strategy that includes data lifecycle management, data archiving, data retention policies, and data purging mechanisms. Define storage allocation, provisioning, and monitoring processes to ensure efficient utilization of storage resources.Monitoring and Optimization: Implement monitoring and analytics tools to continuously monitor storage performance, capacity utilization, and data growth patterns. Use these insights to optimize storage utilization, identify bottlenecks, and proactively address any issues.It's not feasible to draw a visual representation here, but this approach provides a logical framework for determining storage requirements and managing storage effectively for your client's application.
Learn more about Storage.
brainly.com/question/86807
#SPJ11
The salesqtr2 workbook contains links to data in the april, may, and june workbooks. Which workbook is the destination file?.
In the salesqtr2 workbook, links to data have been created from three other workbooks; April, May, and June workbooks. The answer will be determined by identifying which workbook is the destination file.
It's essential to understand how links work before trying to find the answer to the question. Links are useful when you want to use data from different sources or update the information automatically. The link's source file contains the data, while the destination file contains a link that refers to the source data. When the source data changes, the destination file updates automatically. April, May, and June workbooks contain the source data, while the salesqtr2 workbook contains links that refer to this data. As a result, the salesqtr2 workbook is the destination file since it contains the links to the data in the other workbooks. Therefore, the salesqtr2 workbook is the destination file.
To learn more about workbook, visit:
https://brainly.com/question/29993438
#SPJ11
Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process
Answer:
Your development server is experiencing heavy load conditions. Upon investigating, you discover a single program using PID 9563 consuming more resources than other programs on the server, with a nice value of 0. What command can you use to reduce the priority of the process
while you should press f3
Explanation:
CENTRE FOR ENTERTAINMENT ARTS- PROJECT The Centre for Entertainment Arts is a Vancouver-based institution that develops programs in animation, 3D, 2D, game development. They are quickly expanding into Canada, the United States of America, Colombia, and Europe. The game development and animation business is worth over 250USS billion in the United States and it is one of the important businesses of British Columbia. In every game development studio there are business managers, and business people that work on budgets, hire and fire people, work on advertising, finance projects, support company strategy, etc. - They would like to have a group do some basic research on similar institutions that also are in the business of teaching game development, animation etc. They have an opportunity to expand into other related subjects. Which institutions are leading institutions in game development? What are their price points? Where are they located? - They would like to have an assessment of how they should proceed when working with partners. Should they license their programs, should they develop and instruct their programs and if the answer is yes: then which programs? - Should CEA go for egame management? MBAs in Entertainment Industry? This would probably require a survey of companies that do game development. Outcomes: -- Students will become very knowledgeable in a area of increasing importance in North America. --Students will answer most of the questions above with support from your instructor and CEA. --There will be a 30 minute presentation to the client/ instructor PS: Please note that an NDA is required.
The Centre for Entertainment Arts (CEA) is an institution based in Vancouver that specializes in developing programs in animation, 3D, 2D, and game development.
As part of their expansion plans, they are interested in conducting research on similar institutions that offer education in game development and animation. They want to identify the leading institutions in the field, determine their price points, and explore their locations.
Additionally, CEA wants to assess their approach to working with partners. They are considering options such as licensing their programs or developing and instructing their own programs. They seek guidance on which programs to focus on and would like to gather information through surveys of companies involved in game development.
CEA is also considering offering programs in egame management and MBAs in the entertainment industry. They understand that this decision would require insights from companies in the game development sector.
The desired outcomes of this project include acquiring in-depth knowledge in an area of increasing importance in North America and providing comprehensive answers to the questions outlined above. The project will culminate in a 30-minute presentation to the client and instructor.
Learn more about programs here
https://brainly.com/question/23275071
#SPJ11
Which option should Gina click to edit the text contained in a text box on a slide in her presentation?
rotation handle
sizing handle
expansion handle
text box
!WILL GIVE BRAINLIEST!
Write a Python program that prompts the user for a word. If the word comes between the words apple
and pear alphabetically, print a message that tells the user that the word is valid, otherwise, tell
the user the word is out of range.
Answer:
word = input()
if word > "apple" and word < "pear":
print("Word is valid.")
else:
print("Word is out of range.")
mention the several parts of the computer keywords
Answer:
Accelerated Graphics Port (AGP)
A high-speed point-to-point channel for attaching a video card to a computer's motherboard, primarily to assist in the acceleration of 3D computer graphics.
accelerator
A microprocessor, ASIC, or expansion card designed to offload a specific task from the CPU, often containing fixed function hardware. A common example is a graphics processing unit.
accumulator
A register in a CPU in which intermediate arithmetic and logic results are stored.
address
The unique integer number that specifies a memory location in an address space.
address space
A mapping of logical addresses into physical memory or other memory-mapped devices.
Advanced Technology eXtended (ATX)
A motherboard form factor specification developed by Intel in 1995 to improve on previous DE factor standards like the AT form factor.
AI accelerator
An accelerator aimed at running artificial neural networks or other machine learning and machine vision algorithms (either training or deployment), e.g. Movidius Myriad 2, TrueNorth, tensor processing unit, etc.
Explanation:
Answer:
Below
Explanation:
AI accelerator
Advanced Technology extended
Accelerated Graphics Port
Address space
Accelerator
Accumulator
Address
---------------------------------------------------------
100% sure I'm correct
Have a nice day!
orphan record example?
Answer:
If we delete record number 15 in a primary table, but there's still a related table with the value of 15, we end up with an orphaned record. Here, the related table contains a foreign key value that doesn't exist in the primary key field of the primary table. This has resulted in an “orphaned record”.
Which of the following symbols is a part of all spreadsheet functions?
/
()
+
*
Answer:
+
Explanation:
It is because it can be used to replace the equal sign in all spreadsheet functions
in object oriented programming what is a constructor?
a. the attributes that allow a programmer to imagine a new object
b. the behaviors that allow a programmer to design a new object
c. the code that allows a programmer to create a new object
d. the template that allows a programmer to modify a new object
Answer:
The answer is A.
Answer:
A. the attributes that allow a programmer to imagine a new object
Explanation:
Got the answer right on the test!
how graphical representation of spreadsheet data can be helpful in business
Answer: Business graphs are visual aids used to analyze data. They can make comparing multiple sets of data much easier, as sometimes trends and relationships are easily identified on the chart or graph. They also help to show the audience the data in a way that is easy to understand and remember.
Explanation:
suppose that you are running ntp over a network where you were guaranteed that the one-way delay between any two hosts was identical (i.e., there are no asymmetric delays in the network) and that the processing time for ntp messages was 0. in this case, how accurate would ntp be? justify your answer.
If we suppose that NTP is being run over a network where the one-way delay between any two hosts was identical and that the processing time for NTP messages was 0, then the accuracy of NTP would be high.NTP stands for Network Time Protocol. It is a protocol that allows for the synchronization of clocks on a network.
NTP utilizes a hierarchical architecture of time servers that provide increasing levels of accuracy. Clients request time from the servers, which reply with the current time.If the one-way delay between any two hosts is the same, there are no asymmetric delays in the network, and the processing time for NTP messages is 0, NTP would be very accurate. Because the one-way delay is the same for all hosts, NTP can accurately calculate the time offset and clock drift, allowing for precise synchronization of clocks on the network.Therefore, NTP would be very accurate in this scenario.
Learn more about NTP here:
https://brainly.com/question/29667971
#SPJ11
Write a program that will compute and display the final score of two teams in a baseball game. The number of innings in a baseball game is 9.
To write a program that will compute and display the final score of two teams in a baseball game, you would need to first gather input from the user for the scores of each team at the end of each inning.
Then, you would need to calculate the total score for each team by adding up their scores for all nine innings. Finally, you would display the total scores for each team.
Here's an example program in Python:
team1_scores = []
team2_scores = []
print("Enter the scores for Team 1:")
for i in range(9):
score = int(input("Score for inning " + str(i+1) + ": "))
team1_scores.append(score)
print("Enter the scores for Team 2:")
for i in range(9):
score = int(input("Score for inning " + str(i+1) + ": "))
team2_scores.append(score)
team1_total = sum(team1_scores)
team2_total = sum(team2_scores)
print("Final score:")
print("Team 1:", team1_total)
print("Team 2:", team2_total)
This program prompts the user to enter the scores for each team at the end of each inning, calculates the total score for each team, and displays the final scores for both teams.
We must start by using the game's start time of 7:05 to determine how long it lasted. By adding 7 hours and 5 minutes, or 705 minutes, we may convert this time to a number. The end time of 9:15 must then be treated in the same manner. We have 915 minutes total after adding 9 hours and 15 minutes. The difference is 210 minutes when the start time is subtracted from the end time. The minutes must then be converted back to hours and minutes, giving us 2 hours and 10 minutes. The baseball game ended up lasting 2 hours and 10 minutes.
Learn more about baseball game here
https://brainly.com/question/31197737
#SPJ11