Answer: Form
Explanation:
Answer:
A on edge
Explanation:
Write Inheritance program for the following scenario. Employee is super class where as Manager and Regular are the sub class. Partial Employee class is created, you have to complete the Employee class and implement Manager and Regular class. The main is class is given that creates objects of all classes and displays the output.
• The subclasses uses super keyword in the constructor to assigned the data.
• All the classes implements toString() method.
Answer:
Explanation:
public class Employee{
//Existing employee code
public String getName(){
return Name;
}
public double getSalary(){
return salary;
}
public int getId(){
return id;
}
public void setName(String name){
this.name = name;
}
//Manager Class
public class Manager extends Employee{
private double bonus;
public Manager(int id,String name,double salary,double bonus){
super(id,name,salary);
this.bonus = bonus;
}
public void setBonus(double bonus){
this.bonus = bonus;
}
public double getBonus(){
return bonus;
}
}
//Regular Class
public class Regular extends Employee{
private double overtime;
public Manager(int id,String name,double salary,double overtime){
super(id,name,salary);
this.overtime = overtime;
}
public void setOvertime(double overtime){
this.overtime = overtime;
}
public double getOvertime(){
return overtime;
}
}
how can you stretch or skew an object in paint
Answer:
Press Ctrl + Shift + Z (Rotate/Zoom). Rotate the roller-ball control about a bit. The outer ring rotates the layer.
Explanation:
Do you think renewable energy can power the world?
Answer: think that the author chose to tell these two stories because they contrast each other perfectly. They show the two sides of Chicago during the time and reinstate the idea of the White City and the Black City. A common theme in the book is good vs. evil and the telling these two stories is almost a perfect depiction of it during the time period. I believe that both of these stories must have been told in order for the author to get his message across. On one side, the Fair represents the growing prosperity and magnificence of all of its wonders it beholds. On the other side, the author shows the crime, poverty, and darkness of Chicago. These two stories symbolize the truth behind the world. If the fair was told, we would be missing the fact that not everything was as great as what people thought it would be. Behind all the extravagance of the fair lies its complete opposite. If the author just told the Holmes’s story, we would lose the other point. Not everything was terrible in Chicago. Although there was crime and poverty, this was an era of innovation and technology and a feeling of growth and prosperity as well. I believe that the author chose to use these two stories to show that in reality, there are both good and bad things. Nothing can be perfect, and this is shown in the construction of the fair and the crime that happened on the side. However, the opposite cannot be said as well. This is the beauty of the world as there is always hope and room for improvement. I think that the author wanted to show us the balance between good and evil using these two instances in history. Although I found the Holmes plot slightly more interesting, I believe that both stories must have been there in order for the author to have gotten his true meaning across.
Explanation:
Suppose users share a 25 Mbps link. Also suppose each user transmits continuously at 5 Mbps when transmitting, and each user transmits only 20 percent of the time. When circuit switching is used, how many users can be supported
Answer:
Two users have been supported as each user has half of the link bandwidth.
Explanation:
Two users require 1Mbps when transmitting, and fewer users transfer a maximum of 2 Mbps, and the available bandwidth of the shared link is 2 Mbps; there will be no queuing delay before connection. If three users, transmit, then bandwidth will be 3Mbps, and there will be queuing delay before the link. Link size = 2Mpbs, i.e. two users ,transmit, then a maximum of 2Mbps will require and does not exceed 2Mbps of bandwidth.
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (currentPrice * 0.051) / 12 (Note: Output directly. Do not store in a variable.). Ex: If the input is: 200000 210000 the output is: This house is $200000. The change is $-10000 since last month. The estimated monthly mortgage is $850.0. Note: Getting the precise spacing, punctuation, and newlines exactly right is a key point of this assignment. Such precision is an important part of programming.
Answer:
In Python:
cprice= int(input("Current price: "))
lmonth= int(input("Last month's price: "))
print("This house is $"+str(cprice))
print("The change is $"+str(cprice-lmonth)+" since last month")
print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")
Explanation:
Get current price
cprice= int(input("Current price: "))
Get last month's price
lmonth= int(input("Last month's price: "))
Print the current price
print("This house is $"+str(cprice))
Print the change
print("The change is $"+str(cprice-lmonth)+" since last month")
Print the mortgage
print("The current mortage $"+str((cprice * 0.051) / 12)+" since last month")
Write a method that reverses the sequence of elements in an array. For example, if you call the method with the array g
Use the provided MS-Excel template to note entries for each .pcap file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, man-in-the-middle attacks, exploitation of commands/user accounts/passwords, or capture and replay of the data packets later to control devices or access remote connections.
Answer:You should note entries for each PCAP file in Wireshark that are of interest as from ENCM 369 at ... file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, ...
Explanation:
What programming language does the LMC 'understand'?
Answer:
The LMC is generally used to teach students, because it models a simple von Neumann architecture computer—which has all of the basic features of a modern computer. It can be programmed in machine code (albeit in decimal rather than binary) or assembly code.
Deidre is studying for a history exam. She reads the chapter in her textbook that covers the material, then realizes she needs to learn the names, dates, and places mentioned in the reading.
Which note-taking tool will help Deidre quickly find the names, dates, and places later when it is time to review?
a sticky note
a highlighter
electronic notes
flash cards
Answer:
B: Highlighter
Explanation:
Just answered on edge, hope this helps
Answer: B) A Highlighter
Explanation:
Define a function named sum_values with two parameters. The first parameter will be a list of dictionaries (the data). The second parameter will be a string (a key). Return the sum of the dictionaries' values associated with the second parameter. You SHOULD NOT assume that all of the dictionaries in the first parameter will have the second parameter as a key. If none of the dictionaries have the second parameter as a key, your function should return 0. Sample function call: sum_values(data, 'estimated_annual_kwh_savings') sum_values_by_year
Answer:
Answered below
Explanation:
//Program is written in Python
sum = 0
def sum_of_values(dict_data, number_of_boys):
for dict in dict_data:
for key in dict.keys():
if key == number_of_boys:
sum += dict[key]
//After looping check the sum variable and //return the appropriate value.
if sum != 0:
return sum
elif sum == 0:
//There was no key of such so no addition.
return 0
Why each of the six problem-solving steps is important in developing the best solution for a problem
Answer:
The Answer is below
Explanation:
Each of the six problem-solving steps is important in developing the best solution for a problem because "each of these steps guarantees consistency, as every member of the project team understands the steps, methods, and techniques to be used."
For illustration, step one defines the problem to be solved.
Step two seek to find the main or underlying issue that is causing the problem
Step three: assist in drawing the alternative ways to solve the problem.
Step four: this is where to choose the most perfect solution to the problem
Step five is crucial as it involves carrying out the actual solution selected.
Step six is the step in which one check if the solution works fine or meets the intended plan.
Hence, all the steps are vital
Emanuel studies hard for hours on end until bedtime, yet his grades could be better. What can he do to improve his academic performance?
sleep less
take breaks
eat more
work longer
Answer:
Its B! I know I'm late but for the other people that might get the same question like me.
Question 12 of 30
In Alienware systems, errors are indicated via the tricolor Power Button LED.
True
False
Answer:
False.
Explanation:
Bought the latest Alienware 15 r3 with i7 7th gen, 1060gtx, etc. Next day laptop wont post, turns on, reboots, then does the same thing, meanwhile the power led button blinks 6 times. So making a little research and its seems like a video card is kaput, dont know if its the intel or the nvidia. Aynway, I bought this laptop from a company in Canada, and it seems it was alredy registered so I cand procced with a transfership ownership.
Answer:
I think the answer
is true.
01110100 01101000 01101001 01110011 00100000 01110011 01110101 01100011 01101011 01110011 00100000 01100010 01100001 01101100 01101100 01110011 00100000 01110101 00100000 01100010 01101001 01110100 01100011 01101000 01100101 01110011
Answer:
01110101 01101110 01101111 00100000 01110010 01100101 01110110 01100101 01110010 01110011 01100101 00100000 01100011 01100001 01110010 01100100 00100000 01000010 01000101 01010100 01000011 01001000
Create two functions (with appropriate names) that produce the output below. Both functions must use a prototype. All that should be present in main() is the call to these two functions and a blank line of output between the function calls. This is a very easy exercise. Focus on the fundamentals. Make sure you review my solution file to make sure your syntax and name choice is good. Output: This is the first part of my program. It was created with a function. <-- These two lines are output by the first function This is the second part of my program. It was created with a different function. <-- These two lines are output by the second function
Answer:
In C++:
#include <iostream>
using namespace std;
void function1(); void function2();
int main(){
function1(); function2();
return 0;}
void function1(){
cout<<"This is the first part of my program."<<endl<<"It was created with a function"<<endl;}
void function2(){
cout<<"This is the second part of my program."<<endl<<"It was created with a different function.";}
Explanation:
This defines the function prototypes
void function1(); void function2();
The main begins here
int main(){
This calls the two functions from main
function1(); function2();
return 0;}
This calls function1()
void function1(){
cout<<"This is the first part of my program."<<endl<<"It was created with a function"<<endl;}
This calls function2()
void function2(){
cout<<"This is the second part of my program."<<endl<<"It was created with a different function.";}
The method removeDupes is intended to remove duplicates from array a, returning n, the number of elements in a after duplicates have been removed. For example, if array a has the values {4, 7, 11, 4, 9, 5, 11, 7, 3, 5} before removeDupes is called, then after duplicates are removed, a will be {4, 7, 11, 5, 9, 3} and 6 will be returned.Consider the following three implementations of RemoveDupes. I. public static int removeDupes (int [ 1 a) int n-a.length; for (int i-0, icn; i+M int current- a [il: int j i+1; while (jcn)K if (currentaulK alil aln-1) return n; Il. public static int removeDupes (int [] a)t int n-a.length; for (int i-0; ikn; i++ int current a [il for (int j-0; j
Answer:
public int removeDupes(int[]a){
int n =0;
for(int x =0;x<a.length;x++){
for(int y=0;y<a.length;y++){
if(a[x]==a[y]){
n++;
}
}
int left = a.length-n;
return left;
}
}
Explanation:
Please help meeee , you will get 20 points
Answer:
true
Explanation:
true trueee 3uehehehdgeyeyehhehehegegegrhrtggrevegrgrhehehru
I THINK IT FALSE
#Carry on learningWrite a program that has the user input how many classes they are taking this semester and then output how many hours they will need to study each week. Assume that they need to study five hours per week for each class that they take.
This is for Python
class_amt = int(input('Amount of Classes: '))
hours = class_amt * 5
print(f'You need to study for {hours} hours every week')
The program that has the user input on how many classes they are taking this semester is written in python.
What is programming?Writing code to support certain activities in a computer, application, or software program and giving them instructions on how to do is known as computer programming.
It is well known that one of the hardest subjects to master is programming. It is not difficult to understand why some people find it challenging to learn how to code given how different it is from conventional educational methods, including college degrees in computer science. In general, programming is a calm profession.
class_amt = int(input('Amount of Classes: '))
hours = class_amt * 5
print(f'You need to study for {hours} hours every week')
Therefore, the codes are written above.
To learn more about programming, refer to the link:
https://brainly.com/question/16850850
#SPJ2
Consider we have n pointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we swizzle all pointers automatically, we can perform the swizzling in half the time it would take to swizzle each separately. If the probability that a pointer in main memory will be followed at least once is p, for what values of p is it more efficient to swizzle automatically than on demand?
Answer:Considerwehavenpointers that need to be swizzled, and swizzling one point will take time t on average. Suppose that if we swizzle all pointers automatically, we can perform the swizzling in half the time it would take to swizzle each separately. If the probability that a pointer in main memory will be followed at least once is p, for what values of p is it more efficient to swizzle automatically than on demand?
Explanation:
convert 128 GB into KB
Answer:
1,073,741,274 KB
Explanation:
Use an unit convertor or an calculator.
When it comes to paying bills at restaurants, Wallace always leaves a 15% tip based on the pretax price. However, Wallace is tired of computing tips every time, please construct a function total_bill, which takes a numerical argument pretax and returns the total bill by 1) calculating the tip, 2) the after-tax price, and 3) adding the tip to the after-tax price. Assume the sale tax is 9%. Below is how the function would be used:
pretax = 15
print('The total bill is ${}'.format(total_bill(pretax)))
The output should be:
The total bill is $18.6
Answer:
where are the answers.
Explanation:
Select all the correct answers.
Mark is unable to connect to the internet or to any of the computers on his network, while nearby computers don’t have this problem. Which three issues could be causing the problem?
slow transmission of data
improper cable installation
faulty software configuration
interference between the signals on cables close to each other
improper connection of a network cable to the jack
Answer:
I. Improper cable installation.
II. Interference between the signals on cables close to each other.
III. Improper connection of a network cable to the jack
Explanation:
The standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. Thus, the standard Internet communications protocols which allow digital computers to transfer (prepare and forward) data over long distances is the TCP/IP suite.
In this scenario, Mark is unable to connect to the internet or to any of the computers on his network, while nearby computers don’t have this problem. Therefore, the three issues which could be causing the problem are;
I. Improper cable installation: this involves not installing the ethernet cable in the correct destination port.
II. Interference between the signals on cables close to each other: interference usually results in the disruption in network signals.
III. Improper connection of a network cable to the jack: the right connectors such as RJ45 should be used.
What are the characteristics of a good text-based adventure game? In other words, what are some features that should be in the game to make it appealing to players?
Answer:
spelling and good format
Explanation:thats all i know
The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a comma-separated collection of integers: ‘111, 22,3333,4’. Complete the function to return the indexth value (counting from zero) from the comma-separated values as an integer. For example, your code should return 3333 (not ‘3333 *) if the example string is provided with an index value of 2. Hints you should consider using the split() method and the int() function. print.py 1 – def get_nth_int_from_CSV(CSV_string, index): Show transcribed image text The function below takes two parameters: a string parameter: csv_string and an integer index. This string parameter will hold a comma-separated collection of integers: ‘111, 22,3333,4’. Complete the function to return the indexth value (counting from zero) from the comma-separated values as an integer. For example, your code should return 3333 (not ‘3333 *) if the example string is provided with an index value of 2. Hints you should consider using the split() method and the int() function. print.py 1 – def get_nth_int_from_CSV(CSV_string, index):
Answer:
The complete function is as follows:
def get_nth_int_from_CSV(CSV_string, index):
splitstring = CSV_string.split(",")
print(int(splitstring[index]))
Explanation:
This defines the function
def get_nth_int_from_CSV(CSV_string, index):
This splits the string by comma (,)
splitstring = CSV_string.split(",")
This gets the string at the index position, converts it to an integer and print the converted integer
print(int(splitstring[index]))
In JavaScript what is the resulting value of answer for answer = 5 + 3 * 2? Explain why the answer is not 16.
Answer:
with this type of math , you actually multiply first before you add
Explanation:
2×3 =6.
6+5=11.
JavaScript is the resulting in the value are the of answer for answer = 5 + 3 × 2 = 11. It was not the 16.
What is JavaScript?
The word JavaScript refers to a text-based programming language, and the server-side is what allows users to make web pages interactive. HTML and CSS are two programming languages that are used to make web pages dynamic.
According to the JavaScript, are the resulting the values, and they define are the answer.
As per the rule of the bod mas rule.
5 + 3 × 2 = ?
3 × 2 = 6
5 + 6 = 11
As a result, the JavaScript are the based on the resulting in the value 5 + 3 × 2 = 11.
Learn more about on JavaScript, here:
https://brainly.com/question/28448181
#SPJ2
The memory hierarchy of a computer system organizes storage by using small, fast, expensive memories at the top of the hierarchy and supplementing them with larger, slower, cheaper memories at each successive level. Explain how the principle of memory locality makes such a system capable of providing efficient access to the data and instructions needed for executing programs.
Answer:
Following are the responses to this question:
Explanation:
The computer system's memory hierarchy arranges space through tiny, fast, costly stocks only at top of the pyramid and complements them through big, lighter, cheap storage facilities at every representation made. It is needed to limit the time for data access for application executes. A very design of the main memory allows a system to have easy access to the information and instructions necessary to execution time. A traditional technique of system memory works like:
[tex]Level\ 0 (Top Level) \to CPU \ Registers\\\\Level \ 1 \to Cache\ Memory \ (SRAMs)\\\\Level\ 2 \to Main \ Memory \ (DRAMs)\\\\Level \ 3 \to Magnetic \ Disk\ (Disk \ Storage)\\\\Level \ 4 \to Optical \ Disk\\\\Level \ 5 \to Magnetic\ Tape\\\\[/tex]
Because as memory cost rises below level 5 to level 0. CPU registers become costly as the cache memory, which then, in turn, is much more costly than for the memory.
Whenever the access time of CPU registries becomes reduced from level 5 to level 0, its time complexity between reading/write transactions is much more swift than Cache Memory Access period which in turn is quicker than that of the main memory Communication cost and so forth.
So, we need a memory hierarchy to analyze the information (read/write requests) efficiently, in turn for all the top-level to read the information more quickly and thoroughly. Therefore, the architecture of the computer program's Main memory enables a system to provide secure access to information and guidance for running programs.
3.5.6 Introduce Yourself, Part 2
please hellllpp it keeps saying the code is wrong
Answer:
In Python:
name = "Arthur"
age = "62"
print("Hi! My name is "+name+" and I am "+age+" years old")
Explanation:
Given
See attachment
Required
Write a code to introduce yourself
Initialize name
name = "Arthur"
Initialize age
age = "62"
Print introduction
print("Hi! My name is "+name+" and I am "+age+" years old")
How many cycles would it take to complete these multicycle instructions after pipelining assuming: Full forwarding 1 Adder that takes 2 cycles (subtraction uses the adder) 1 Multiplier that takes 10 cycles 1Divider that takes40 cycles 1 Integer ALU that takes1cycle(Loads and Stores) You can write and read from the register file in the same cycle. Begin your your cycle counting from 1 (NOT 0)
8.10 Code Practice: Question 2
Edhesive
Answer:vocab = ["Libraries", "Bandwidth", "Hierarchy", "Software", "Firewall", "Cybersecurity","Phishing", "Logic", "Productivity"]
print (vocab)
for i in range (1, len (vocab)):
count = i - 1
key = vocab[i]
while (vocab[count] > key) and (count >= 0):
vocab[count+1] = vocab[count]
count -= 1
vocab [count+1] = key
print(vocab)
Explanation: bam baby
In this exercise we have to use the knowledge of the python language to write the code, so we have to:
The code is in the attached photo.
So to make it easier the code can be found at:
vocab = ["Libraries", "Bandwidth", "Hierarchy", "Software", "Firewall", "Cybersecurity","Phishing", "Logic", "Productivity"]
print (vocab)
for i in range (1, len (vocab)):
count = i - 1
key = vocab[i]
while (vocab[count] > key) and (count >= 0):
vocab[count+1] = vocab[count]
count -= 1
vocab [count+1] = key
print(vocab)
See more about python at brainly.com/question/26104476
Amelia is home alone, and her tablet will not turn on. How can she approach solving this problem?
Throw the tablet away because it's junk.
Try plugging the tablet in to see if it needs to charge.
Call her Dad and ask him to come home early.
Watch a movie instead.
Answer:
plug it in. sjjssjjsnsjsjsjsjs
Answer:
Try plugging the tablet in to see if it needs to charge.
Explanation: it’s the most logical approach that won’t cause any unnecessary promblems. If it doesn’t turn on then she can try something else.