Suppose we have a super class named pet, which is extended into various pet classes such as cat, dog, fish, hamster, rabbit, etc. We may create an array to hold all the different pet objects, regardless of the type of pet class object (dog or cat, for instance.) This ability for the same code to be used with different types of objects and behave differently with each, is known as what principle

Answers

Answer 1

If we have a super class named pet, which is extended into various pet classes such as cat, dog, fish, hamster, rabbit, etc. and we may create an array to hold all the different pet objects, regardless of the type of pet class object, then the ability of the same code to be used with different types of objects and behave differently with each is known as polymorphism.

Polymorphism is an object-oriented programming language principle that refers to the ability of the same code to be used with different types of objects and behave differently with each. It takes advantage of inheritance to achieve this, allowing subclasses to implement their unique behavior while also maintaining the behavior of the superclass. Polymorphism can be applied to different classes, interfaces, and objects.

Hence, if we have a super class named pet, which is extended into various pet classes such as cat, dog, fish, hamster, rabbit, etc. and we may create an array to hold all the different pet objects, regardless of the type of pet class object, then the ability of the same code to be used with different types of objects and behave differently with each is known as polymorphism.

Learn more about polymorphism:

brainly.com/question/20317264

#SPJ11


Related Questions

Remy is setting up a cooking blog and is deciding whether to use lossy compression algorithms on her photos of yummy meals. what's a good explanation of the benefits and drawbacks to lossy compression algorithms

Answers

Lossy compression technologies shrink the file size, but because the compression is permanent, the original photographs must be stored if you ever want to see the photos at a higher resolution.

What do you mean by lossy compression algorithms ?

Lossy compression algorithms are methods for shrinking files by removing unnecessary data. Nobody loves to lose data, but some file formats are so big that there simply isn't enough room to store the original data, plus we didn't actually need all that data. JPEG and MPEG are two popular lossy compression-based image formats. Lossy compression is a technique that removes inconspicuous data. Lossless compression, however, does not get rid of inconspicuous data. 2. A file is not restored or reconstructed in its original form while using lossy compression. A file's native format can be recovered while using lossless compression.

To know more about lossy compression algorithms , visit

https://brainly.com/question/17266589

#SPJ4

____________ detection methods for SQL Injection attacks are based on verifying distinct patterns. This approach must be routinely updated and may be unsuccessful against self-modifying attacks.

Answers

SQL Injection (Structured Query Language Injection) attacks are one of the most frequently used methods for data theft and corruption. Attackers may use SQL Injection attacks to access confidential information and execute unauthorized commands.

SQL Injection attacks can be detected in a variety of ways. One of the most widely used SQL Injection detection methods is pattern recognition. This method is based on looking for specific patterns or keywords in user input that could be used to compromise the database. A pattern recognition approach is highly vulnerable to attack and may be ineffective against self-modifying attacks.

Because the SQL Injection attacker may change the attack string or use different approaches to avoid detection, this is the case. As a result, using pattern recognition as the sole defense against SQL Injection attacks is insufficient. As a result, it's critical to include other defensive layers like user input sanitization, firewalls, and intrusion detection systems (IDS) that may alert you if an attack is detected.

To know more about SQL Injection visit:

https://brainly.com/question/15685996

#SPJ11

Select all the correct answers.
Which TWO of the following are recommended practices to protect users' privacy while using email services?
Avoid forwarding a personal emails to others.
Avoid forwarding jokes and trivia using email.
Avoid using webmail if you have an email client on your computer.
Avoid opening emails from unrecognized senders.
Avoid using webmail in the workplace:

Answers

Answer: Avoid forwarding a personal email to others and most likely Avoid forwarding jokes and trivia using email.

The recommended practices to protect users' privacy while using email services are options A and C: avoid forwarding a personal emails to others and avoid using webmail if you have an email client on your computer.

What do you mean by term E-mail?

An E-mail is refers to as the communication source. It is a specialized computer network that stores, processes, and send the material from one person to another within seconds..

E-mail is considered as the computer equivalent but it has many advantages like timeliness and flexibility.

Moreover, the content of email include text, files, images or other kind of attachments send by the specified person to the one or more than one groups.

In order to protect the personal data of the user, it is recommend that people should note share their personal information with other and specially the young generation do not use webmail if the another party already utilize your computer.

Nowadays more frauds are happen due to the fact that people are more indulge in these communications for their better advancements. So, we have to take every step very carefully.

Therefore, correct options are A and C.

Learn more about E-mail, refer to the link:

https://brainly.com/question/13313275

#SPJ2

How to paste picture in word without moving table.

Answers

You should Double Click then hit add

when a predictive model is made overly complex to fit in the quirks of given sample data, it is called ______.

Answers

ROM or RAM you chose what ever you like

Actuators drive everything that moves on a competition robot. The most
common type of actuator in this application is a motor; in particular, VEX
Robots utilize____Motors. *

A)Direct Speed

B)Direct Current

C)Free Current

D)Direct Circulating

Answers

Answer:

c

Explanation:

In which of the following ways which will the words between the HTML tags appear on the screen for the following source code of a webpage: Welcome to the Colombian Coffee Store! graphical user interfaceAs a heading in the browser windowwill allow user interaction

Answers

The words between the HTML tags will appear on the screen for the following source code of a webpage as: As a heading in the browser window.

How will the words appear?

The words between the HTML tags will likely appear as a heading on the webpage. When a person visits a website, the welcome information is often a heading that is well-highlighted and possibly colored to portray an inviting atmosphere.

When the visitor sees this tag, they get the idea that they are welcome and can explore the page for more service offerings and functionalities.

Learn more about HTML here:

https://brainly.com/question/4056554

#SPJ1

Ask the user to input a country name. Display the output the message "I would love to go to [country]"

Answers

Answer:

import java.util.Scanner;

public class Country{

public static void main (String[] args){

Scanner input = new Scanner(System.in);

System.out.print("Input a country name: ");

String country = input.nextLine();

System.out.println("I would love to go to " + country);

}

}

Explanation:

which web browser feature lets you save shortcuts to webpages?

Answers

The web browser feature that lets you save shortcuts to webpages is known as bookmarks.

A bookmark, sometimes known as a “favorite,” is a URL that has been saved for quick access later. It is frequently represented by an icon in the browser’s toolbar or in a separate “Bookmarks” or “Favorites” menu or tab. Bookmarks let users to save and quickly access web pages they’ve visited before without having to manually type in the URL each time they want to visit the page.

They can be used to keep track of websites that are frequently visited, as well as to save frequently used websites. A bookmark may be created by selecting “Bookmark this page” from the browser’s settings or by clicking a button in the toolbar. The user can then rename and add tags to the bookmark, making it easier to find later on. Bookmarks may also be organised into folders to keep them organised and make them simpler to find.

Learn more about bookmark: https://brainly.com/question/23955986

#SPJ11

Implement the PrintMenu() function. PrintMenu() takes the playlist title as a parameter and outputs a menu of options to manipulate the playlist. Each option is represented by a single character. Build and output the menu within the function.

Answers

Create a printMenu() method that returns the user's selected menu option and displays a menu of user options for analyzing and editing the string.

How does printMenu() work?

Create a printMenu() method that returns the user's selected menu option and displays a menu of user options for analyzing and editing the string. A single character stands in for each choice. Continue to prompt for a valid selection in the event that an invalid character is entered.

import java.util.Scanner;

public class Playlist

{

   public static void main(String[] args)

   {

       Scanner input = new Scanner(System.in);

       String title = "";

       System.out.println("Enter playlist's title: ");

       title = input.nextLine();        

       printMenu(title);

   }

   // Implement the printMenu() method.

   // printMenu() takes the playlist title as a parameter and outputs a menu of options to manipulate the playlist.

 

   public static void printMenu(String playlistTitle)

   {

       Scanner input = new Scanner(System.in);

       boolean menu = true;

       String option;

       SongEntry songentry = new SongEntry();

       System.out.println(playlistTitle + " PLAYLIST MENU");

       System.out.println("a - Add song");

       System.out.println("d - Remove song");

       System.out.println("c - Change position of song");

       System.out.println("s - Output songs by specific artist");

       System.out.println("t - Output total time of playlist (in seconds)");

       System.out.println("o - Output full playlist");

       System.out.println("q - Quit");

       System.out.println("");        

       while(menu == true)

       {

           System.out.println("Choose an option: ");

               switch(option = input.next())

               {

                   case "q":

                       menu = false;

                       break;

                   case "o":

                       System.out.println(playlistTitle + " - OUTPUT FULL PLAYLIST");

                       break;

                   case "a":

                       System.out.println("ADD SONG");

                       System.out.println("Enter song's unique ID: ");

                       System.out.println("Enter song's name: ");

                       System.out.println("Enter artist's name: ");

                       System.out.println("Enter song's length: ");

                       break;

                   case "d":

                       System.out.println("REMOVE SONG");

                       System.out.println("Enter a song's unique ID: ");

                       System.out.println(" removed");

                       break;

                   case "c":

                       System.out.println("CHANGE POSITION OF SONG");

                       System.out.println("Enter a song's current position: ");

                      System.out.println(" moved to position ");

                       break;

                   case "s":

                       System.out.println("OUTPUT SONGS BY SPECIFIC ARTIST");

                       System.out.println("Enter artist's name: ");

                       break;

                   case "t":      

                       System.out.println("Total time: seconds");

                       break;

               }

           }

       }  

}

To learn more about PrintMenu() function visit :

https://brainly.com/question/16238497

#SPJ4

Which of the following will add to the end of a deque?

popleft
pop
appendleft
append

Answers

Answer:

append

Explanation:

Assuming the right side is the end of the queue.

Answer:

append

Explanation:

just got it right on edge 2021

Which of the following terms defines a small, single-user computer used in homes and businesses?

Personal computer

Work station

Mini computer

Supercomputer

Answers

Answer:

Mini Computer

Explanation:

Person Computer. small, single-user computer; used in homes and businesses; based on a microprocessor. Microprocessor. chip which is the master control circuit of a computer. Minicomputer.

Pa brainliest po thank you

The correct option is A. Personal computer is defined as a small, single-user computer used in homes and businesses.

What is a personal computer?

A personal computer (PC) is a multifunctional microcomputer that can be used for a variety of tasks and is affordable enough for home use. Instead of being operated by a computer specialist or technician, personal computers are designed to be used directly by end users.

Personal computer (PC): compact, single-user computer with a microprocessor that is used in homes and businesses.

A personal computer (PC) is a compact computer made for solitary usage. A single-chip microprocessor serves as the central processing unit in a PC or microcomputer (CPU).

The right answer is A. Small, single-user computers used in homes and companies are referred to as personal computers.

Learn more about personal computers here:

https://brainly.com/question/14406548

#SPJ2

Which network device uses asic to handle packet switching for inter-vlan communication?

Answers

L3 switch is a type of network device which is designed and developed to use ASICs to handle packet switching for inter-VLAN communication on an active network.

What is a network component?

A network component can be defined as a set of hardware and software resources that makes up a computer network such as:

RouterBridgeGatewayServerSwitch

What is a switch?

A switch can be defined as a network device which is designed and developed for the programmatic redirection of request traffic of a client from one server.

In Computer networking, L3 switch is a type of network device which is designed and developed to use ASICs to handle packet switching for inter-VLAN communication on an active network.

Read more on switches here: brainly.com/question/14850209

#SPJ4

1 point


If F = 4.0 N and m = 2.0 kg, what is the magnitude a of the acceleration for


the block shown below? The surface is frictionless. *


a.


F


F


40°


5.3 m/s^2


4.4 m/s^2


3.5 m/s^2


6.2 m/s^2


8.4 m/s^2

Answers

Answer:

2.0 m/sec^2

Explanation:

I don't see a block, but will assume the force is oriented in a horizonal direction and there is no friction.

F = ma

1 Newton is 1 kg*m*s^2

4.0 kg*m*s^2 = (2.0kg)(a)

2.0 m/sec^2

The options don't match, so I will assume the force is not parallel to the block.  Since all off the options are higher than 2.0 m/sec^2, it appears that the block is moving downward, and the force of gravity needs to be considered, and added.  The two vectors are the 4.0N force (at an angle) and the force of gravity (directed down).  The resultant vector, the combination of these two forces, will provide the correct answer.

which three (3) factors make cybersecurity far more difficult now that it was in the past when you only needed to protect the computer?

Answers

Increased Connectivity: The rise of the Internet of Things (IoT) means that the number of connected devices and networks that need to be secured has grown exponentially.

What is networks ?

Networks is a group of two or more computer systems linked together. Networks allow computers to communicate with each other and share resources, like software applications and files. They can also be used to access the internet. Networks can be local, such as computers linked together in a single building or campus, or wide area, such as computers that are connected through the internet.

Businesses and organizations use networks to share data, connect remote employees, and collaborate on projects. Networks can be wired or wireless. Wired networks use cables to connect computers and other devices, while wireless networks use radio waves to connect devices without having to plug them in. Networks provide many benefits, such as increased productivity and access to more data and information. They also provide more opportunities for collaboration and communication.

To learn more about Networks

https://brainly.com/question/1637942

#SPJ1

I’ll give Brainly if u answer all please
ASAP

Ill give Brainly if u answer all please ASAP

Answers

Answer:

Answers are: 38, 135, 23, 209, 53 & 181 respectively

Explanation:

A document intended for World Wide Web distribution is commonly referred to as
A. optical
B. magnetic
C. volume
D. pages

Answers

correct option is D. Web page. A document or resource on a Web site, transported over the Internet, created using the established standards, and made viewable to a user through a program called a browser.

A document intended for World Wide Web distribution is commonly referred to as a page. Thus, the correct option for this question is D.

What is a document on a world wide web called?

A web page (also written as a webpage) is a document that is suitable for the World Wide Web and web browsers. It is a type of document which can be displayed in a web browser such as Firefox, Chrome, Opera, Microsoft Internet Explorer or Edge, or Apple's Safari.

According to the context of this question, a web browser takes you anywhere on the internet. It significantly retrieves information from other parts of the web and displays it on your desktop or mobile device. The information is transferred using the Hypertext Transfer Protocol, which defines how text, images, and video are transmitted on the web.

Therefore, a document intended for World Wide Web distribution is commonly referred to as a page. Thus, the correct option for this question is D.

To learn more about Web pages, refer to the link;

https://brainly.com/question/28431103

#SPJ2

What is 540 to the nearest TENTH?​

Answers

Answer:

500

Explanation:

no explanation, sorry

what is the result of the nohup gedit & command

Answers

The result of the "nohup gedit &" command is that it will launch the gedit text editor in the background without being affected by hangups or terminal closures.

Here's a breakdown of the command:

1. "nohup": This part of the command ensures that the process will continue running even if the terminal is closed or the user logs out.
2. "gedit": This is the text editor being launched.
3. "&": This symbol indicates that the process should run in the background, allowing you to continue using the terminal for other tasks.

So, the result of the "nohup gedit &" command is a background instance of the gedit text editor that is not affected by hangups or terminal closures.

Learn more about LINUX Commands: https://brainly.com/question/30389482

#SPJ11

B. State True or False: 1. 'Date within' option allows you to search an email within a specified date range.​

Answers

Answer + Explanation:

his topic describes the email and document properties that you can search for in email items in Exchange Online and documents stored on SharePoint and OneDrive for Business sites by using the Content Search feature in the Security & Compliance Center. You can also use the *-Compliance Search cmdlets in Security & Compliance Center PowerShell to search for these properties

Please have a great day <3

Identify whether each assessment tool is a value inventory or an interest inventory.
Strong Intert Inventory
Kuder Occupational
Interest Survey
Self-Directed Search
Value Inventory
Reset
Minnesota Importance
Questionnaire
Interest Inventory
Next

Answers

The assessment tools that fall into the category of interest inventories are the Strong Interest Inventory, Self-Directed Search, and Kuder Occupational Interest Survey.

What do you mean by strong Interest Inventory?

Strong Interest Inventory refers to a self-assessment tool to measure a person’s interest, which would lead them into finding out which college major or career is most suitable for them.

Self-Directed Search measures a person’s fit with certain occupations based on their skills and interests while the Kuder Occupational Interest Survey measures a person’s vocational interest based on the person’s area of interest.

Hence, The assessment tools that fall into the category of interest inventories are the Strong Interest Inventory, Self-Directed Search, and Kuder Occupational Interest Survey.

learn more about Strong Interest Inventory:

https://brainly.com/question/1180423

#SPJ1

Why error occurs during transmission? Explain different types of errors with suitable examples. 5 (b) How do you detect error using CRC? Generate the CRC code for the data word 1101011011 The divisor is x4+x+1. 7

Answers

During transmission, errors occur due to a variety of factors such as atmospheric conditions, system malfunction, or network errors.

Different types of errors include Single Bit Error, Burst Error, and Burst Error Correction. Here are the different types of errors with suitable examples: Single Bit Error: It occurs when one bit of data is changed from 1 to 0 or from 0 to 1 in data transfer. This type of error is mainly caused by a small amount of interference or noise in the transmission medium. For instance, a parity bit error.Burst Error: It occurs when two or more bits are incorrect during data transmission. A Burst Error occurs when bits of data are lost or changed in groups, which can affect multiple data bits at once. It can be caused by signal loss or attenuation in fiber-optic cables. Burst Error Correction: To overcome the issue of Burst Error, Burst Error Correction is used. This method divides data into blocks to detect and fix errors. Reed-Solomon coding and Viterbi decoding are two types of burst error correction techniques. There are different techniques for error detection, and the Cyclic Redundancy Check (CRC) is one of them. CRC checks the checksum at the receiver's end to ensure that the data was not corrupted during transmission. To detect errors using CRC, follow these steps: Divide the data word by the generator polynomial. Generator polynomial: x4 + x + 1 Divide 1101011011 by x4 + x + 1 and find the remainder by using the modulo 2 division method.1101011011 10011- 10011000- 10011000- 10010100- 10010100- 10000001- 10000001- 1111100- 1111100- 1001The remainder of the above step is the CRC code of the data word, which is 1001. Therefore, the CRC code for the data word 1101011011 is 1001.

know more about type of error.

https://brainly.com/question/31751999

#SPJ11

you have installed an 802.11ac wireless access point for a company. to cut costs, the company wanted only one central access point in the building, which is about 150 feet long. users at both ends of the building report intermittent wireless connectivity drops and slow access. what is most likely the cause of the problem?

Answers

Low radio frequency signal is the cause of the problem. Keep the only one central access point in the building it makes your connection slower because there is much of the computer connect but the signal that is provided is less.

Radio frequency (RF) refers to a measurement showing the oscillation rate of electromagnetic radiation spectrum, or electromagnetic radio waves, from frequencies ranging from 300 gigahertz (GHz) to as low as 9 kilohertz (kHz). RF is used in many kind of electronics and appliances, which consist radio and television broadcasting, cellular telephones, satellite communications, microwave ovens, radars, and industrial heaters and sealers.

Learn more about radio frequency, here https://brainly.com/question/14400059

#SPJ4

based upon the labs and research from this topic, research the automation capabilities of the linux server platform.

Answers

The automation capabilities of the Linux server platform are extensive and versatile. Here are some key features and examples:

1. Shell scripting: Linux provides a powerful command-line interface that allows users to write scripts to automate various tasks. Shell scripts are written using programming languages like Bash and can be used to perform a wide range of automation tasks, such as file management, software installation, and system configuration.

2. Cron jobs: Linux has a built-in scheduling system called cron that allows users to automate the execution of scripts or commands at specific times or intervals. Cron jobs can be used to schedule routine maintenance tasks, generate reports, or perform backups at regular intervals.

3. Package managers: Linux distributions come with package managers that simplify the installation, update, and removal of software packages. Tools like apt (used in Debian-based distributions) and yum (used in Red Hat-based distributions) can be used to automate the installation and management of software packages across multiple servers.

4. Configuration management tools: Linux server automation often involves managing the configuration of multiple servers in a consistent and scalable way. Tools like Ansible, Puppet, and Chef provide infrastructure-as-code solutions that allow administrators to define and deploy server configurations automatically. For example, you can use Ansible playbooks to specify desired server states and ensure that all servers are configured accordingly.

5. Monitoring and alerting: Linux servers can be monitored using various tools like Nagios, Zabbix, and Prometheus. These tools can automatically detect and alert administrators about issues such as high CPU usage, low disk space, or network connectivity problems. By setting up automated alerts, administrators can proactively address server issues and ensure smooth operation.

6. Virtualization and containers: Linux server platforms support virtualization technologies like KVM and containerization platforms like Docker. These technologies enable the creation and management of isolated environments, making it easier to deploy and scale applications. Automation can be applied to provision and manage virtual machines or containers, allowing for rapid deployment and scalability.

Overall, the Linux server platform offers a rich set of automation capabilities that can streamline administrative tasks, improve efficiency, and ensure consistency across multiple servers. By leveraging shell scripting, scheduling, package managers, configuration management tools, monitoring, and virtualization technologies, administrators can automate various aspects of server management, ultimately saving time and effort.

To know more about Linux server visit:

https://brainly.com/question/32197199

#SPJ11

Based on the labs and research from this topic, research the automation capabilities of the Linux server platform. Is it possible to automate account creation? How? Are there User or System login scripts within Linux? Workstation cloning services/applications? What other automation features does Linux have that Windows does not? What features does Windows support that are not covered in Linux?

1. What is material science?

Answers

Answer:

Explanation:

The study of the properties of solid materials and how those properties are determined by a material’s composition and structure is material science.

Answer:

The scientific study of properties and applications of materials of construction or manufacture.

Explanation:

Information below:

1. What is material science?

ANYONE AHHH HELP ME 50 Points

ANYONE AHHH HELP ME 50 Points
ANYONE AHHH HELP ME 50 Points
ANYONE AHHH HELP ME 50 Points
ANYONE AHHH HELP ME 50 Points
ANYONE AHHH HELP ME 50 Points

Answers

Answer:

1, tilt 2, zoom

Explanation:

I'm not sure I have a camera but I don't take pictures like prof

ASAP!
Use the drop-down menus to complete the statements about Contacts and the Contacts View.

A ( Task, calendar, or contact ) is an object stored in Outlook that contains information about individual people you want to communicate with.

Use the ( Mail, people, or calendar ) icon in the Navigation pane to see the Contacts View page.

Answers

Answer:

Contact

People

Explanation:

12 / 4 * 3 div 2 tin học

Answers

Answer:

9/2 is the answers for the question

Explanation:

please mark me as brainlest

Which step needs to be done before changing the font type, size, and color of a particular set of text

Answers

Answer:

You need to select the text that needs changing.

Explanation:

I hope this helps!

seth, a zoologist, has a spreadsheet containing data on all the animals in a zoo. he wants to sort the column that contains the weights of all of the animals. which sort tool could he use to reorganize the numbers so they are listed from smallest to largest?

Answers

Seth, the zoologist, can use the "Sort" tool in spreadsheet software to reorganize the numbers in the column from smallest to largest.

To use the "Sort" tool, Seth can follow these general steps:

Open the spreadsheet containing the animal data.

Select the entire column that contains the weights of the animals.

Look for the "Sort" or "Sort Ascending" option in the menu bar or toolbar of the spreadsheet software. It is typically represented by an icon with ascending or descending arrows.

Click on the "Sort" option, and the software will rearrange the numbers in the selected column from smallest to largest.

By using the "Sort" tool, Seth will be able to organize the weights of the animals in ascending order, making it easier to analyze and compare the data.

To learn more about "Sort" tool here brainly.com/question/29084714

#SPJ11

Other Questions
What was Thomas Paine trying to achieve with common sense? mov ebx, 0 what type of addressing mode is used in this instruction? a. indirect memory addressing b. immediate addressing c. register addressing d. direct memory addressing Write 116 as a decimal.A) 0.00625 B) 0.0625 C) 0.625 D) 6.25 if the sun suddenly turned off, we would not know it until its light stopped coming. how long would that be, given that the sun is m away? use for the speed of light. If D = Z + 6 and C = -2 + Z - Z^2, find an expression that equals 3D + C in standard form which global facility type is set up in an area with an abundance of advance suppliers, competitors, and research facilities? which global facility type is set up in an area with an abundance of advance suppliers, competitors, and research facilities? outpost factory. contributor factory. server factory. offshore factory. In this homework, you will write a complete program to do the following: Given a quadratic equation, solve it, or tell the user than no real solutions exist. Some background information for review: A quadratic equation can be written as ax? + bx+c= 0, where a0 and a,b,c are real numbers. Based on Brahmagupta's quadratic formula, we can directly solve for x. We will have 2 solutions in the form: x1 = -b + sqrt(b2 - 4ac) X2 = -b - sqrt (b-4ac) and 2a 2a These roots are real if and only if b2 - 4ac 20. (Because the square root of a negative number is imaginary). Here are the steps you will have to follow: 1. Write a comment at the top of the program telling me your name and describing in your own words what the program is supposed to do. 2. Print a message explaining to the user what this program does. 3. Ask the user for their first name and last name, and store it in a variable or variables. (It's up to you how you want to do this). 4. Print a message welcoming them to running your program. 5. Ask the user to enter 3 integers called a, b, and c. If a=0, then print out an error message to the user telling them that they need to input a value for a that is not 0, and then exit the program. 6. Your program should print out the 3 numbers together with an appropriate message. 7. The program should then compute b2 - 4ac. If it is less than 0, print out an error message to the user telling them that their equation has no real solutions. 8. If b2 - 4ac = 0, then tell the user that there is only one root. 9. Otherwise, tell the user that there are 2 real roots. 10. Compute the root(s) of the equation using the formula above. Recall that Math.sqrt(x) with compute the square root of x. 4. Is there one final source of authority, or is it broken up in a few differentplaces? What would be the effect of an increase in greenhouse gas concentration in the atmosphere on Earth's average temperatures? This eyewitness excerpt describes the fierceness of a battle in Vietnam.As darkness was setting in, Captain Vargas organized and executed the withdrawal of his Company from the landing zone by foot Over 1,000 rounds of incoming [artillery and mortar fire] fell on the men that afternoon and evening.Lt. Col. William Wiese1968What does this excerpt tell you about the nature of the fighting in Vietnam?The communist forces lacked heavy weapons like artillery.American troops withdrew easily by helicopter.US troops had to move and fight the enemy on the ground.Fighting stopped during the night so each side could recover. Billy ate 5/4 pizzas and John ate 5/3 pizzas. How much more pizza did John eat than Billy? Add -ance or -ence to the following word. You may use a dictionary. interfere y=5x-4y = 5 x 4y=-x+2 Evaluate the double integral (2x - y) dA, where R is the region in the R first quadrant enclosed by the circle x + y = 36 and the lines x = 0 and y = x, by changing to polar coordinates (How do police defend our freedom?) the ion responsible for propagation of the ap across the synapse is the ethical dilemma that faces ronnie maloney is best described as group of answer choices whether the loan loss reserves of the bank were understated. whether to file a whistle-blower's complaint with the sec under dodd-frank. whether to commit fraud to cover up stealing from the company. whether to properly inform the audit committee of critical audit matters. Which of these groups is characterized by a lack of symmetry (neither radial nor bilateral)?-Sponges-Flatworms-Chordates-Arthropods-Cnidarians spreading one's assets across several types of saving and investment products to manage risk is called: why were slaves important to the colonial economy?Click to add text