Answer:
D. The object in a program is called a class.
Explanation:
Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995. Java was designed by a software engineer called James Gosling and it is originally owned by Oracle.
In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.
Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.
Hence, the relationship between an object and class in an OOP program is that the object in a program is called a class.
For example, if you declare a class named dog, the objects would include barking, color, size, breed, age, etc. because they are an instance of a class and as such would execute a method defined in the class.
Work out and List the Big-Oh notation that corresponds to each of the following examples. Afterwards, list them by the order of complexity from LEAST to MOST.
(1.1) A bacteria that doubles itself every generation N.
(1.2) Following a single path along a branching story with N choices that change the story until you reach an ending.
(1.3) Pulling a single ball out of a pit filled with N balls.
(1.4) Searching the N rooms in a house for your keys.
(1.5) Trying to route a band’s world tour through N cities with the shortest mileage possible.
(1.6) Breaking an equation with N pieces down into smaller, simpler pieces, then solving those pieces to solve the entire equation.
An example of an O(2n) function is the recursive calculation of Fibonacci numbers. O(2n) denotes an algorithm whose growth doubles with each addition to the input data set. The growth curve of an O(2n) function is exponential - starting off very shallow, then rising meteorically.This function runs in O(n) time (or "linear time"), where n is the number of items in the array.
If the array has 10 items, we have to print 10 times. If it has 1000 items, we have to print 1000 timesHere we're nesting two loops. If our array has n items, our outer loop runs n times and our inner loop runs n times for each iteration of the outer loop, giving us n2 total prints.
Thus this function runs in O(n2) time (or "quadratic time"). If the array has 10 items, we have to print 100 times. If it has 1000 items, we have to print 1000000 times.An example of an O(2n) function is the recursive calculation of Fibonacci numbers. O(2n) denotes an algorithm whose growth doubles with each addition to the input data set.
The growth curve of an O(2n) function is exponential - starting off very shallow, then rising meteorically.When you're calculating the big O complexity of something, you just throw out the constantsThis is O(1 + n/2 + 100), which we just call O(n).
Why can we get away with this? Remember, for big O notation we're looking at what happens as n gets arbitrarily large. As n gets really big, adding 100 or dividing by 2 has a decreasingly significant effect.
O(n3 + 50n2 + 10000) is O(n3)O((n + 30) * (n + 5)) is O(n2)
Again, we can get away with this because the less significant terms quickly become, well, less significant as n gets big.
hope it helps you.....*_*
Cardinality ratios often dictate the detailed design of a database. The cardinality ratio depends on the real-world meaning of the entity types involved and is defined by the specific application. For the binary relationships below, suggest cardinality ratios based on the common-sense meaning of the entity types. Clearly state any assumptions you make.
Entity 1 Cardinality Ratio Entity 2
1. Student SocialSecurityCard
2. Student Teacher
3. ClassRoom Wall
4. Country CurrentPresident
5. Course TextBook
6. Item (that can
be found in an
order) Order
7. Student Class
8. Class Instructor
9. Instructor Office
10. E-bay Auction item E-bay bid
Solution :
ENTITY 1 CARDINALITY RATIO ENTITY 2
1. Student 1 to many Social security card
A student may have more than one
social security card (legally with the
same unique social security number),
and every social security number belongs
to a unique.
2. Student Many to Many Teacher
Generally students are taught by many
teachers and a teacher teaches many students.
3.ClassRoom Many to Many Wall
Do not forget that the wall is usually
shared by adjacent rooms.
4. Country 1 to 1 Current President
Assuming a normal country under normal
circumstances having one president at a
time.
5. Course Many to Many TextBook
A course may have many textbooks and
text book may be prescribed for different
courses.
6. Item Many to Many Order
Assuming the same item can appear
in different orders.
7. Student Many to Many Class
One student may take several classes.
Every class usually has several students.
8. Class Many to 1 Instructor
Assuming that every class has a unique
instructor. In case instructors were allowed
to team teach, this will be many-many.
9. Instructor 1 to 1 Office
Assuming every instructor has only one
office and it is not shared. In case of offices
shared by 2 instructors, the relationship
will be 2-1. Conversely, if any instructor has a joint
appointment and offices in both departments,
then the relationship will be 1-2. In a very general
case, it may be many-many.
10. E-bay Auction item 1-Many E-bay bid
1 item has many bids and a bid is unique
to an item.
HELP PLEASE ASAP! I don't know what is wrong with my code, it's suppose to output the same given output. C++ program.
#include //Input/Output Library
#include //Srand
#include //Time to set random number seed
#include //Math Library
#include //Format Library
using namespace std;
//User Libraries
//Global Constants, no Global Variables are allowed
//Math/Physics/Conversions/Higher Dimensions - i.e. PI, e, etc...
//Function Prototypes
void init(int [],int);//Initialize the array
void print(int [],int,int);//Print the array
void revrse(int [],int);;//Reverse the array
//Execution Begins Here!
int main(int argc, char** argv) {
//Set the random number seed
srand(static_cast (time(0)));
//Declare Variables
const int SIZE=50;
int test[SIZE];
//Initialize or input i.e. set variable values
init(test,SIZE);
//Display the outputs
print(test,SIZE,10);
//Reverse the Values
revrse(test,SIZE);
//Display the outputs
print(test,SIZE,10);
//Exit stage right or left!
return 0;
}
void init (int test[],const int x) {
for (int i=0; i >test[i];
}
}
void revrse(int test[],int SIZE){//Reverse the array
int test1[SIZE];
for(int i=0; i
test1[i] = test[SIZE-i-1];
}
for(int i=0; i
test[i]=test1[i];
}
}
void print (int test[] , int SIZE, int perlin) {
for(int i=0; i
cout<
if(i%perlin==(perlin-1))
cout<
}
}
The code that is written above is one that lacks the "iomanip" statement for inclusion. Incorporating it is good in using the setw function for arranging the output.
Once you have rectified the print function, make sure to include the statement cout << endl; after completing the loop so that a fresh line is printed after every line of output.
What is the code about?The loop condition within the init function should be modified to i < x instead of i > test[i]. To start the array elements, the loop needs to iterate starting from 0 and lastly at x-1.
Note that you neglected to return the inverted elements to their initial arrangement in the source test array. To double the data, place test[i] = test1[i]; within the loop.
Learn more about code from
https://brainly.com/question/26134656
#SPJ1
If you had to make a choice between studies and games during a holiday, you would use the _______ control structure. If you had to fill in your name and address on ten assignment books, you would use the ______ control structure.
The answers for the blanks are Selection and looping. Saw that this hasn't been answered before and so just wanted to share.
The missing words are "if-else" and "looping".
What is the completed sentence?If you had to make a choice between studies and games during a holiday, you would use the if-else control structure. If you had to fill in your name and address on ten assignment books, you would use the looping control structure.
A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.
Learn more about looping:
https://brainly.com/question/30706582
#SPJ1
Plzzzzzzz help good answers only and best answer gets brainly
Answer:
Desmos (colab w/h math antics) , Calendar, Quizlet (colab w/h google) , Quizizz (colab w/h quizlet) , Kahoot (colab w/h google) , or Google Translate
differentiate between web site and web application?
Explanation:
A website is a group of globally accessible into linked pages which have a single domain name. A web application is a software or program is is accessible using any web browser.
Answer:
Explanation:
A website shows static or dynamic data that is predominantly sent from the server to the user only, whereas a web application serves dynamic data with full two way interaction.
What tips do you have for learning at home???
Answer:
nothing
Explanation:
Answer:
listen to music stay in a quiet space in your house and always have a snack with you
NEED HELP
In a worksheet with the ages of 20 people listed in a column, what could you do to easily identify the oldest person?
A.
format the numbers as text
B.
filter the data in that column
C.
paste that column of data in a new worksheet
D.
sort the data in that column
Answer: the correct answer is D) sort the data in that column
Explanation: got the question right
why we choose abattis consulting service ?
People may choose abattis consulting service due to their excellent quality and timely service delivery.
Why we choose abattis consulting service ?When selecting a consulting service, it is main to consider determinants such as the experience and knowledge of the consultants, the opinion of the company, the quality and purview of the services presented, the cost and value of the services, and the rapport and alignment of the advisory service with the needs and aims of your organization.
Abattis Consulting, in particular, offers advisory services in the extents of cybersecurity, risk management, compliance, and solitude. They provide a range of aids, including cybersecurity assessments, etc.
Learn more about consulting service from
https://brainly.com/question/26417203
#SPJ1
factor that affects the evolution of technology
Answer:
perceived attributes of change, social influence, facilitating conditions and individual characteristics.
How does Python recognize a tuple?
O You use tuple when you create it, as in "my Tuple = tuple(3, 5)".
You declare myTuple to be a tuple, as in "myTuple = new tuple".
You use brackets around the data values.
You use parentheses around the data values.
Answer:
You use parentheses around the data values.
Explanation:
j took the test on edge
what precautions should be taken to make a computer more secure
Answer:
To make a computer more secure
Explanation:
we have following ways :
1)we should have anti virus to protect our computer.
2)we should not play or look computer for a long time because it destroy our files
What types of "top" filters can you create in Tableau?
The type of "top" filters that you can create in Tableau is option
Top N filters: These filters allow you to display only the top N values in a field, based on some criterion. For example, you could create a top 10 filter to display only the top 10 values in a field based on some measure.What is the filter about?In Tableau, you can create the following types of "top" filters:
Top Percent filters: These filters allow you to display only the top percentage of values in a field, based on some criterion. For example, you could create a top 10% filter to display only the top 10% of values in a field based on some measure.Lastly, the Top Sum filters: These filters allow you to display only the top values in a field, based on the sum of some measure. For example, you could create a top sum filter to display only the top values in a field based on the sum of sales.
Learn more about filters from
https://brainly.com/question/3198358
#SPJ1
Having data in a column formatted differently based on value is known as
What is the output from the following code? MapInterface m; m = new ArrayListMap(); m.put('D', "dog"); m.put('P', "pig"); m.put('C', "cat"); m.put('P', "pet"); System.out.println(m.get('D')); System.out.println(m.get('E')); System.out.println(m.get('P'));
Answer: dog
null
pet
Explanation:
taking into condiserations the various animals and their tag given to them;
OUTPUT :
dog
null
pet
PROOF:
Where the Initially map : {}
after map.put('D', "dog"), map : {'D':"dog"}
after map.put('P', "pig"), map : {'D':"dog", 'P':"pig"}
after map.put('C', "cat"), map : {'D':"dog", 'P':"pig", 'C':"cat"}
after map.put('P', "pet"), map : {'D':"dog", 'P':"pet", 'C':"cat"}, what this does is replace the value of P with "pet"
map.get('D') prints dog.
map.get('E') prints null, key is not present
map.get('P') prints pet
cheers I hope this helped !!
Hundreds of endpoints were not updated with the latest OS and patches. Identify an administrative control to remediate outdated operating systems and patches.
Implementing a regular patch management policy, with a schedule for updating all endpoints and enforcing compliance through configuration management or other tools.
What is patch management policy?Patch management rules are a set of standards that guarantee patching is managed, efficient, and secure. These instructions outline the actions and procedures to be followed when fixing bugs and vulnerabilities. There are several sorts of patches, such as security patches, hotfixes, and service packs.
Patch management is the process of updating software, drivers, and firmware to prevent vulnerabilities. Effective patch management also ensures that systems run at peak performance, increasing productivity.
Learn more about Path Management:
https://brainly.com/question/29744046
#SPJ1
convert 1/32 GB into MB
Answer:
31.25 megabytes.
31.25 megabytes
4.14 LAB: Countdown until matching digits In C++ Write a program that takes in an integer in the range 20-98 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical. Ex: If the input is: 93 the output is: 93 92 91 90 89 88 Ex: If the input is: 77 the output is: 77 Ex: If the input is: 15 or any value not between 20 and 98 (inclusive), the output is: Input must be 20-98 For coding simplicity, follow each output number by a space, even the last one. Use a while loop. Compare the digits; do not write a large if-else for all possible same-digit numbers (11, 22, 33, …, 88), as that approach would be cumbersome for larger ranges.
Answer:
Here is the C++ program:
#include <iostream> // to use input output functions
using namespace std; // to identify objects like cin cout
int main() { //start of main function
int number; //an integer value
cout<<"Enter an integer: "; //prompts user to enter a number
cin >> number; // reads integer value from user
if (number > 98 || number < 20) { //if number is not between 20 and 98
cout<<"Input must be 20-98"; } //display this message if number is not between 20 and 98
else { // if number is in range 20-98
while(number%11){ // loop keeps taking mod of input number with 11 until matching digits found
cout<<number<<" "; //displays the numbers
number--; } // decrements the value of number by 1
cout<<number<<" "; } } // displays the matching digits
Explanation:
I will explain the program with an example:
Let suppose the number = 90
The if condition evaluate to false because 90 is in the range of 20-98 so the else part executes which has a while loop that works as following:
while(number % 11)
At first iteration:
This while(number % 11) is basically equivalent to :
while(number % 11 != 0)
while(90 % 11)
The % operator is the modulo operator which returns the remainder of the division. So when 90 is divided by 11 the remainder is 2. This is not equal to 0. So the statement under while condition executes:
cout<<number<<" "; This statement displays the number on output screen. Since number = 90 so 90 is printed. " " adds a space with the number
90
Next the value of number is decremented to 1 so number = 89
At second iteration:
while(number % 11) becomes:
while(89 % 11)
When 89 is divided by 11 the remainder is 1. This is not equal to 0. So the statement under while condition executes:
cout<<number<<" "; This statement displays the number on output screen. Since number = 89 so 89 is printed. " " adds a space with the number
90 89
Next the value of number is decremented to 1 so number = 88
At third iteration:
while(number % 11) becomes:
while(88 % 11)
When 89 is divided by 11 the remainder is 0. So the while loop breaks because the condition while(number % 11 != 0) evaluates to false. So the statement in while loop does not execute and program control moves to the following statement:
cout<<number<<" "; This statement displays that number whose digits match on the output screen with a space. So the output of the entire program is:
90 89 88
The program along with the output using example given in the question i.e. input is 93 is attached in a screenshot.
WHICH OF THE FOLLOWING TASKS ARE PART OF THE SOFTWARE EVALUATION PROCESS?
TESTERS...
With regard to software evaulation, note that the correct options are -
Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.How is this so?The tasks that are part of the software evaluation process include -
Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.Tasks not directly related to the software evaluation process are -
Software developers writing code line by line.Creating a design for the software program.Learn more about software evaluation at:
https://brainly.com/question/28271917
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Choose all that apply: Which of the following tasks are part of the software evaluation process?
testers check that the code is implemented according to the specification document
an specification document is created
software developers write code line by line
any issues with the software are logged as bugs
bugs are resolved by developers
a design for the software program is created
The following table represents the addresses and contents (using hexadecimal notation) of some cells in a machine's main memory.Starting with this memory arrangement , follow the sequence of instructions and record the final contents of each of these memory cells: Address Contents 00 AB 01 53 02 D6 03 02 Step 1. Move the contents of the cell whose address is 03 to the cell at address 00. Step 2. Move the value 01 into the cell at address 02. Step 3. Move the value stored at address 01 into the cell at address 03.
Answer:
I DON'T KNOW THE ANSWER SO SORRY
Explanation:
BUT THANKS FOR THE POINTS
Describe the basic internal operation of magnetic hard disc
Explanation:
Magnetic hard disks (HDDs) are a type of storage device used in computers to store data persistently. Here are the basic internal operations of magnetic hard disks:
Platters: The hard disk consists of several circular disks called platters that are made of a rigid material like aluminum or glass. These platters are coated with a thin layer of magnetic material.
Read/Write Heads: Read/Write Heads are small electromagnets that are positioned above and below each platter. The heads move in unison and are attached to a mechanical arm called the actuator. The actuator positions the heads over the appropriate tracks on the platters.
Spindle Motor: The spindle motor rotates the platters at high speed, typically between 5400 and 15000 revolutions per minute (RPM). The faster the RPM, the faster the hard disk can read and write data.
Magnetic Fields: When data is written to the hard disk, the read/write heads create a magnetic field that aligns the magnetic particles on the platters in a specific pattern, representing the data being written.
Reading Data: When data is read from the hard disk, the read/write heads detect the magnetic pattern on the platters and convert it back into digital data. The read/write heads move rapidly over the platters, reading data from multiple tracks simultaneously.
File System: To organize and manage data on the hard disk, a file system is used. A file system keeps track of the location of data on the hard disk, as well as other information such as file names, permissions, and timestamps.
leave a comment
How many discussion posts must you complete to meet the Expectations of the replies category
Answer:
I want to take this time to discuss a few expectations and helpful information about how to participate in the weekly online discussions. You can scroll down the page or use the links here to navigate to each section. All Discussions can be found by clicking on the Discussions link located on the left-hand side of the course.
Explanation:
Participation in the discussion forums is critical for maximizing student learning in this course, both because your participation is graded and because it's a chance to engage in a dialogue about course material. In this course, students are required to be a part of an online community of learners who collectively interact, through discussion, to enhance and support the professional performance of each other. Part of the assessment criteria for the course includes evaluating the quality and quantity of your participation in the discussion forum.
The TAS will facilitate student discussions, although they likely will not address every single post. In most cases, they might share a related idea, intervene when the discussion goes off-track, or tie student comments together to help deepen student learning. Remember, if you have a specific question, pose
1. List three hardware computer components? Describe each component, and what its function is.
Explanation:
I can't just describe it hope this much is fine for the....
Answer:
Three hardware components are;
input deviceoutput deviceC.P.UThe input devices are used to get data into a computer.
The output device are used to get processed data out of a computer.
The C.P.U which is known as the central processing unit, it is known as the brain of the computer, it takes the raw data and turns it into information.
What is this screen called? (I attached a picture)
A. Graph Screen
B. Y Editor Screen
C. Table Screen
D. Window Screen
Answer:
i believe it's a y editor screen
What characteristics are common among operating systems
The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.
Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.
1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).
2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.
3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.
4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.
5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.
6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.
This includes user authentication, access control mechanisms, and encryption.
7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.
These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.
For more such questions characteristics,click on
https://brainly.com/question/30995425
#SPJ8
Select the correct answer.
For her homework, Annie has added the picture of a fruit in a document. She wants to enhance it to give a cut-out look. Which feature or menu
option should she use?
ОА SmartArt
OB. Clip Art
OC Charts
OD Shapes
Reset
Next
PLEASE HELP!!
Answer: B- Clip art
Explanation:
Answer:
Clip Art
Explanation:
advantage of micro teaching over traditional way of teaching
If cell A2 contains "Today is Monday," the result of the function =LEN(A2) would be __________. Fill in the blank space.
Excel Quiz.
If cell A2 includes the phrase "Today is Monday," the result of the function =LEN(A2) would be 15, which is the number of characters in the cell.
How can I figure out how many characters there are in Excel?Type =LEN(cell) in the formula bar and hit Enter to invoke the function. In many instances, cell refers to the cell that you want to count, like B1. Enter the formula, then copy and paste it into further cells to count the characters in each cell.
What does Len have to offer?A number is returned by LEN after it counts the characters in the text, including spaces and punctuation. LEN is set to zero if text is an empty string ("") or a reference to an empty cell.
To know more about cell visit:-
https://brainly.com/question/8029562
#SPJ1
a second group of smaller network restricted by companies organizations or limited number of user is known as?
LAN- Local Area Network
Explanation:
This code is giving no error but is not printing my "goal." Which is to print a year of highschool when a number is input. Instead the code is only printing "Not in High School" every time, every number. Can someone please explain to me what I did wrong?
grade_number = input("What year of high school are you in? ")
if grade_number == 9:
print("Freshman")
elif grade_number == 10:
print("Sophomore")
elif grade_number == 11:
print("Junior")
elif grade_number == 12:
print("Senior")
else:
print("Not in High School")
Answer:
You must convert your input to an integer before the if statements.
Explanation:
input() returns a string, which should be converted to your desired type, OR you should compare against string literals.
See below for working code.