Answer:
True
Explanation:
Infinite sequential ordered stream return values as the first element are at position 0 in the stream and provided seed. The n > 0 is the element at the position and will result for applying functions f at position n.
Infinite Instream is creating a stream of even numbers that start from 0.
Such as
List<Integer> ints = InStream. iterate(0,i-> i +2)
.mapToObj(Integer:: valueOf)
.limit(10)
.collect(Collectors.tolist());
system.out.printin(ints);
It returns an infinite unordered stream, and the Supplier generates each. The limit() method can be called in the stream to stop the series after several elements.
I bring my _____ computer to work
a. in box
b. ebook
c. attachment
d.blog.
e. delete
f. document
g. download
h. ebook
I. email address
j. file
k. inbox
l. keyboard
m. laptop
n. link
o. online
p. password
q. sign in
Answer:
I think it's laptop or sign in
hope this helps
have a good day :)
Explanation:
Pick which one you think is the best choice
Assume that Student, Employee and Retired are all extended classes of Person, and all four classes have different implementations of the method getMoney. Consider the following code where_______ indicates the required parameters for the constructors:
Person p = new Person(...);
int m1 = p.getMoney(); // assignment 1
p = new Student(...);
int m2 = p.getMoney(); // assignment 2
if (m2 < 100000)
p = new Employee(...);
else if (m1 > 50000)
p = new Retired(...);
int m3 = p.getMoney(); // assignment 3
Refer to above code The reference to getMoney() in assignment 1 is to the class:________
a. Person
b. Student
c. Employee
d. Retired
e. This cannot be determined by examining the code
Answer:
a. Person
Explanation:
The reference getMoney() is a method that is part of the Person class. This can be proven with the code since subclasses can access methods from the parent class but a parent class cannot access methods from the child classes. Since Student, Employee, and Retired are all child classes that extend to the Person parent class then they can access getMoney(), but unless getMoney() is in the Person class, then a Person object shouldn't be able to access it. Since the first object created is a Person object and it is accessing the getMoney() method, then we can assume that the getMoney() method is within the Person class.
which one of the following can be used in a Document name,when saving?
1.Numbers
2.Semi-colon
3.Forward dash
4.Question mark
Answer:
3. forward dash would you like an explanation?
Only number can be used in a Document name.
File names are shown in alphabetical order in the folder structure. It is critical to also include the zero for numbers 0-9. This helps to maintain the numerical order when file names contain numbers.
Most software packages are case sensitive, so use lowercase wherever possible. Instead of using commas and underscores, use a hyphen.
So, Option "1" is the correct answer to the following question.
Learn more:
https://brainly.com/question/17429689?referrer=searchResults
How can getchar function be used to read multicharacter strings?
69696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V6969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V6969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696VVVV696969696969699696969696969669696969696966969696969696996969696969696696969696969669696969696969969696969696966969696969696V69696969696969969696969696966969696969696V69696969696969969696969696966969696969696
The program below converts US Dollars to Euros, British Pounds, and Japanese Yen # Complete the functions USD2EUR, USD2GBP, USD2JPY so they all return the correct value def USD2EUR(amount): """ Convert amount from US Dollars to Euros. Use 1 USD = 0.831467 EUR args: amount: US dollar amount (float) returns: value: the equivalent of amount in Euros (float) """ #TODO: Your code goes here value = amount * 0.831467 return value
Answer:
The program in Python is as follows:
def USD2EUR(amount):
EUR = 0.831467 * amount
return EUR
def USD2GBP(amount):
GBP = 0.71 * amount
return GBP
def USD2JPY(amount):
JPY = 109.26 * amount
return JPY
USD = float(input("USD: "))
print("Euro: ",USD2EUR(USD))
print("GBP: ",USD2GBP(USD))
print("JPY: ",USD2JPY(USD))
Explanation:
This defines the USD2EUR function
def USD2EUR(amount):
This converts USD to Euros
EUR = 0.831467 * amount
This returns the equivalent amount in EUR
return EUR
This defines the USD2GBP function
def USD2GBP(amount):
This converts USD to GBP
GBP = 0.71 * amount
This returns the equivalent amount in GBP
return GBP
This defines the USD2JPY function
def USD2JPY(amount):
This converts USD to JPY
JPY = 109.26 * amount
This returns the equivalent amount in JPY
return JPY
The main begins here
This gets input for USD
USD = float(input("USD: "))
The following passes USD to each of the defined functions
print("Euro: ",USD2EUR(USD))
print("GBP: ",USD2GBP(USD))
print("JPY: ",USD2JPY(USD))
Note the program used current exchange rates for GBP and JPY, as the rates were not provided in the question
The following code does sum of the triples of even integersfrom 1 through 10
int total = 0;
for (int x = 1; x <= 10; x++){
if (x % 2 == 0)
{ // if x is even
total += x * 3;
}
}// end of for
Please rewrite the above code using InStream
Answer:
Explanation:
Using Java, I have recreated that same code using intStream as requested. The code can be seen below and the output can be seen in the attached picture where it is highlighted in red.
import java.util.stream.IntStream;
class Brainly
{
static int total = 0;
public static void main(String[] args)
{
IntStream.range(0, 10).forEach(
element -> {
if (element % 2 == 0) {
total += 3;
}
}
);
System.out.println("Total: " + total);
}
}
¿sharpness or unbreaking people?
Really hard decision, but ultimately, it depends on your personal prefrence. I would choose un breakin, however, for some people if you want to kill mobs quicker, than sharpness would be the way to go.
how computer user interact with an application programs
Answer:
computer users interact with their programs and applications through external devices called hardware, which allow the user to issue commands to computer programs, while also allowing these programs to issue responses to those commands. Thus, for example, the user interacts with the computer through the keyboard, by means of which he sends commands to certain programs that in turn respond, for example, through the monitor or the speakers.
Does anyone have any tips on what to buy and sell to make quick profits?
Answer:
lemonaid stand
Explanation:
Answer:
Or you can work in a store like a movie theater or smth
Explanation:
How do I find error corrections in an EAN-8 barcode?
Answer: I am not sure if I remember but I believe if the single digit matches the last digit on the barcode then the barcode is correct or valid.
But, If the digit is different from the one on your computer then their is an error. I recommend In order to check for error is to remove the received check digit and recalculate it based on the 12-digit identification code. (This I use for EAN-13 but since Ean-8 is basically short version of 13 try it)
How do you write a poem on the topic 'I am good at singing'? answer and get 100 points
Answer:
ur mom
Explanation:
Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably data related to health care. Describe the incidents and explain what could have been done to prevent or mitigate them.
Answer:
Question: Find two examples of data/security breaches that resulted in theft/loss/exposure of confidential data, preferably data related to health care.
Answer:
1. TRICARE United States, in 2011:
2. University of Washington Medicine, in 2018
Question: Describe the incidents
Answer:
1. TRICARE:
As a health care program of the United States Department of Defense Military Health System, TRICARE being overseen by Science Applications International Corporation (SAIC), the defense break also came through an employee of SAIC, the tapes that stores vital information of personnel were physically stolen, and these tapes contain vital information such as the Social Security numbers, phone numbers, prescriptions, of millions of active and retired military personnel.
2. University of Washington Medicine:
Database which contains important data of over hundred thounsands patients were exposed as a internal files were able to be accessed to the public when searched on the internet as those files appeared saved in search results on search engine.
Question: explain what could have been done to prevent or mitigate them
Answer:
The following would prevented or mitigated the attack:
1. For security breach on TRICARE:
i. The security software should be updated.
ii. Data should be encrypted to further protect it.
iii. The data protection security policies should be reviewed to prevent future attacks.
2. For security breach on University of Washington Medicine:
i. There should be effective risk assessment that would data vulnerabilities.
ii. There should be a limit on internal human error, and sharing of data without adequate protection, encryption should be stoped.
Communication protocols, sets of rules agreed to by all parties, are designed in order to:
Group of answer choices.
A. Ensure that cell phones and laptops cannot communicate.
B. Give each country its own internet language.
C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.
D. Assure that computers and other devices don't pollute the environment.
Answer:
C. Ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.
Explanation:
OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Each layer has its unique functionality which is responsible for the proper functioning of the communication services.
Additionally, a standard framework for the transmission of informations on the internet, it is known as the internet protocol suite or Transmission Control Protocol and Internet Protocol (TCP/IP) model. One of the very basic rule of the TCP/IP protocol for the transmission of information is that, informations are subdivided or broken down at the transport layer, into small chunks called packets rather than as a whole.
Hence, communication protocols, sets of rules agreed to by all parties, are designed in order to ensure that new technologies and devices that haven't been invented yet can all use the same methods of communication.
This ultimately implies, there exist standard frameworks and protocols that are designed and developed to serve pre-existing technologies and devices, as well as those that would be invented in the future.
For example, SMTP is an acronym for Simple Mail Transfer Protocol and it uses the standard port number of 25 to provide clients with requested services on an internet-enabled device.
Which of the following was most likely used to apply red background and font to some of the cells in column D?
Answer:
d. conditional formatting
Explanation:
The option that would most likely be used to accomplish this would be conditional formatting. This is an option in which, if a condition is met, the cell is given certain format changes. In this scenario, the condition would be if a cell is located in column D, then apply a red background and specific font. This would be automatic throughout the entire document so that if any new cell is created in column D it would automatically be formatted according to the conditional formatting that was used.
what are the events?
Answer:
a thing that happens or takes place, especially one of importance.
Which of the following is not a way to build customer loyalty
Answer: are there option choices? If not I would say
1. not giving back enough change
2. Being rude
3. not giving the right prices
4. Not answering questions
Explanation: hope this helps, have a great day!!
Code in Python
Write a while loop that prints user_num divided by 2 until user_num is less than 1. The value of user_num changes inside of the loop.
Sample output with input: 20
10.0
5.0
2.5
1.25
0.625
Note: If the submitted code has an infinite loop, the system will stop running the code after a few seconds and report "Program end never reached." The system doesn't print the test case that caused the reported message.
My code, it only passes one test with correct outputs
what am I forgetting?
You're setting the value of user_num to 20. Doing this won't allow the other test cases to run. Simply delete that line and your code should work. This is the code I wrote:
user_num = int(input())
while user_num>=1:
user_num/=2
print(user_num)
I wrote my code in python 3.8. I hope this helps.
In this exercise, you are asking the user to set a alpha numeric password for any website. Put some conditions.
Password must be 8 characters long.
There must be at-least one uppercase letter.
There must be at least one number.
Then show the user, you have set the correct password or not.
Sample output (Ex 6 and 7): Top 2 are for Ex-6 and bottom 2 are for Ex-7
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: Nidhi123
You have set the correct password.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: Nidhi12!
You have set the correct password.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: nidhi123
Your password doesn't meet the criteria.
Uppercase is missing.
Create your password which must have these.
Must be 8 characters long.
At least one uppercase letter.
At least one number.
Enter your password: nidhi 234
Your password doesn't meet the criteria.
Uppercase is missing.
It's not 8 characters long correct size.
Answer:
The program in Python is as follows:
print("Create your password which must have these.\nMust be 8 characters long.\nAt least one uppercase letter.\nAt least one number.")
pwd = input("Enter your password: ")
chkLength = 0; chkUpper = 0; chkLower = 0; chkDigit = 0
if len(pwd) == 8:
chkLength = 1
if (any(x.isupper() for x in pwd)):
chkUpper = 1
if any(y.islower() for y in pwd):
chkLower = 1
if any(z.isdigit() for z in pwd):
chkDigit = 1
if chkLength == 1 and chkUpper == 1 and chkLower == 1 and chkDigit == 1:
print("You have set the correct password.")
else:
print("Your password doesn't meet the criteria.")
if chkLength == 0:
print("It's not 8 characters long correct size.")
if chkDigit == 0:
print("Digit is missing.")
if chkLower == 0:
print("Lowercase is missing.")
if chkUpper == 0:
print("Uppercase is missing.")
Explanation:
This prints the instruction
print("Create your password which must have these.\nMust be 8 characters long.\nAt least one uppercase letter.\nAt least one number.")
This prompts the user for password
pwd = input("Enter your password: ")
This initializes check variables to 0 (0 - false)
chkLength = 0; chkUpper = 0; chkLower = 0; chkDigit = 0
If password length is 8
if len(pwd) == 8:
Set check variable of length to 1 (1 - true)
chkLength = 1
If password has uppercase
if (any(x.isupper() for x in pwd)):
Set check variable of uppercase to 1
chkUpper = 1
If password has lowercase
if any(y.islower() for y in pwd):
Set check variable of lowercase to 1
chkLower = 1
If password has digit
if any(z.isdigit() for z in pwd):
Set check variable of digits to 1
chkDigit = 1
If all check variables is 1, then the password is correct
if chkLength == 1 and chkUpper == 1 and chkLower == 1 and chkDigit == 1:
print("You have set the correct password.")
If otherwise,
else:
The password is incorrect
print("Your password doesn't meet the criteria.")
The following prints the corresponding criteria that is not met, depending on the value of its check variable
if chkLength == 0:
print("It's not 8 characters long correct size.")
if chkDigit == 0:
print("Digit is missing.")
if chkLower == 0:
print("Lowercase is missing.")
if chkUpper == 0:
print("Uppercase is missing.")
Therese would now like to preview her slide show to make sure everything is working. She should___.
• switch to Normal slide view
•click on the first slide in the slide pane
• switch to Slide Show view
• click on Slide Show layout in the side pane
Answer:
c
Explanation:
Suppose that you are asked to modify the Stack class to add a new operation max() that returns the current maximum of the stack comparable objects. Assume that pop and push operations are currently implemented using array a as follows, where item is a String and n is the size of the stack. Note: if x andy are objects of the same type, use x.compareTo(y) to compare the objects x and y public void push String item ) { [n++] = iten; } public String pop { return al--n]; } Implement the max operation in two ways, by writing a new method using array a (in 8.1), or updating push and pop methods to track max as the stack is changed (in 8.2). Q8.1 Implement method maxi 5 Points Write a method max() using Out) space and Oin) running time. public String max() {...} Enter your answer here Q8.2 Update push() and popo 5 Points Write a method max() using On) space and 011) run time. You may update the push and pop methods as needed public void push {...} public String pop() {...} public String max() {...}
Answer:
Following are the code to the given points:
Explanation:
For point 8.1:
public String max()//defining a method max
{
String maxVal=null;//defining a string variable that holds a value
for(int x=0;x<n;x++)
{
if(maxVal==null || a[i].compareTo(maxVal)>0)//defining if blok to comare the value
{
maxVal=a[i];//holding value in maxVal variable
}
}
return maxVal;//return maxVal variable value
}
For point 8.2:
public void push(String item)//defining a method push that accepts item value in a parameter
{
a[n]=item;//defining an array to hold item value
if(n==0 || item.compareTo(maxVals[n-1])>0)//use if to comare item value
{
maxVals[n]=item;//holding item value in maxVals variable
}
else
{
maxVals[n]=maxVals[n-1];//decreasing the maxVals value
}
n++;//incrementing n value
}
public String pop()//defining a method pop
{
return a[--n];//use return value
}
public String max()//defining a method max
{
return maxVals[n-1];//return max value
}
In the first point, the max method is declared that compares the string and returns its max value.In the second point, the push, pop, and max method are declared that works with their respective names like insert, remove and find max and after that, they return its value.The probability that the price of a commodity is increasing is 0.62 and the probability that the price is decreasing is 0.18 . What is the probability that the price of the commodity remains constant. Solved numerically
bahug ka itlog hduxuwlowv heusuowjdd
Assert statements are a tool programmers employ to help them debug their code more efficiently.
a. True
b. False
Answer: True
Explanation:
The statement that assert statements are a tool programmers employ in order to help them debug their code more efficiently is true.
They help in debugging as they evaluate whether a statement is either true or false. When it's false, the assert statement will indicate an error which shows that there is a bug that need to be fixed.
2. List the differences between personal
computer operating systems and mainframe
operating systems.
Explanation:
Mainframes typically run on large boxes with many processors and tons of storage, as well as high-bandwidth busses. PCs are desktop or mobile devices with a single multi-core processor and typically less than 32GB of memory and a few TBs of disk space. Second, a mainframe OS usually supports many simultaneous users.
What does the following code print?
public class { public static void main(String[] args) { int x=5 ,y = 10; if (x>5 && y>=2) System.out.println("Class 1"); else if (x<14 || y>5) System.out.println(" Class 2"); else System.out.println(" Class 3"); }// end of main } // end of class.
Answer:
It throws an error.
the public class needs a name.
like this:
public class G{ public static void main(String[] args) {
int x=5 , y = 10;
if (x>5 && y>=2) System.out.println("Class 1");
else if (x<14 || y>5) System.out.println(" Class 2");
else System.out.println(" Class 3"); }// end of main
}
if you give the class a name and format it, you get:
Class 2
Explanation:
10 POINTS!!!!
Which is a virtual meeting place for developers?
O an online help site
O a user manual
O a developer conference
O a developer forum
Answer:
A Developer Conference
Explanation:
Due to it being a meeting place, a conference has a high probability whereas a forum is not really a "live" meet but whereas a conference is live and virtual in many cases. Cannot guarantee tho.
Create a program that calculates the total for a purchase at a bookstore. Put the lines of code in order to create the following program.
Sample output:
Bookstore Calculator
Price of Book 29.99
Tax percent 8.75
Tax amount 2.63
Total amount 32.61
1. tax_amount = round(book_price *
(tax_percent / 100), 2)
2.print("Bookstore Calculator")
3. print("Tax amount: ", tax_amount)
4. tax_percent = float(input("Tax percent: "))
5. # get input from the user
6. # display a welcome message
7. total = round(book_price + tax_amount, 2)
8. print("Total amount:", total)
9. # display the results
10. book_price = float(input("Price of book: "))
11. # calculate tip and total amount
Answer:
The correct order is:
# display a welcome message
print("Bookstore Calculator")
# get input from the user
book_price = float(input("Price of book: "))
tax_percent = float(input("Tax percent: "))
# calculate tip and total amount
tax_amount = round(book_price *(tax_percent / 100), 2)
total = round(book_price + tax_amount, 2)
# display the results
print("Tax amount: ", tax_amount)
print("Total amount:", total)
Explanation:
Given
The above code segment
Required
Place the code in correct order
Using the sample output as a guide:
The first output is a welcome message.
So, the first and second line of the program is:
# display a welcome message
print("Bookstore Calculator")
Next, inputs for book price and tax percent.
So, the next lines are:
# get input from the user
book_price = float(input("Price of book: "))
tax_percent = float(input("Tax percent: "))
Next, outputs for tax amount and total amount.
These outputs must first be calculated.
So, the next lines are:
# calculate tip and total amount
tax_amount = round(book_price *(tax_percent / 100), 2)
total = round(book_price + tax_amount, 2)
Lastly, the results are printed
# display the results
print("Tax amount: ", tax_amount)
print("Total amount:", total)
HELP ME !!!!!!!
Consider the following website URL: http://www.briannasblog.com. What
does the "http://" represent?
A. FTP
B. Resource name
C. Protocol identifier
D. Domain name
Answer:
C. Protocol Identifier
The "http://" in a website URL represents the protocol identifier, specifically the Hypertext Transfer Protocol (HTTP). The correct option is C.
A protocol identifier is a string of characters that identifies the type of communication protocol being used to send data between network devices.
The protocol identifier, specifically the Hypertext Transfer Protocol, is represented by the "http://" in a website URL (HTTP).
HTTP is the World Wide Web's underlying protocol that defines how messages are formatted and transmitted between web servers and web browsers.
The domain name in the URL, in this case "briannasblog.com," identifies the specific website being accessed.
The "http://" in the URL is required to indicate that the browser should communicate with the web server and retrieve the website's resources using the HTTP protocol.
For more details regarding Protocol identifier, visit:
https://brainly.com/question/11763983
#SPJ7
A city planner is using simulation software to study crowd flow out of a large arena after an event has ended. The arena is located in an urban city. Which of the following best describes a limitation of using a simulation for this purpose?
a) The model used by the simulation software cannot be modified once the simulation has been used.
b) The model used by the simulation software often omits details so that it is easier to implement.
c) Running a simulation requires more time to generate data from trials than observing the crowd exiting the arena at various events.
d) Running a simulation requires a large number of observations to be collected before it can be used to explore a problem.
Answer:
d)
Explanation:
The main limitation of simulations is that running a simulation requires a large number of observations to be collected before it can be used to explore a problem. In a real life situation there are thousands of variables to take into consideration which can drastically affect the way that the situation unfolds at any given time. Therefore, in order to replicate/simulate such a scenario all of these variables need to be taken into consideration. This data can take a large amount of time to observe and collect in order to implement into the simulation so that it provides an accurate depiction of the problem.
By the 1970s, the acceleration of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics of the Middle Ages, fears that were confirmed beginning in the 1970s by the worldwide spread of:________
a. the Zika virus.
b. the HIV infection
c. severe acute respiratory syndrome (SARS)
d. the Asian flu virus
e. Ebola
Answer:
b. the HIV infection.
Explanation:
Around the 1970s, an increase in the use of airplane travel led to fears that an epidemic would leapfrog the globe much faster than the pandemics such as tuberculosis, leprosy, smallpox, trachoma, anthrax, scabies, etc., that were evident during the Middle Ages, fears that were later confirmed by the worldwide spread of the HIV infection, beginning in the 1970s in the United States of America.
STD is an acronym for sexually transmitted disease and it can be defined as diseases that are easily transmissible or contractable from another person through sexual intercourse. Thus, STD spread from an infected person to an uninfected person while engaging in unprotected sexual intercourse. Some examples of STDs are gonorrhea, chlamydia, syphilis, HIV, etc.
HIV is an acronym for human immunodeficiency virus and it refers to a type of disease that destabilizes or destroy the immune system of a person, thus, making it impossible for antigens to effectively fight pathogens.
Generally, contracting STDs has a detrimental effect to a patient because it causes an opening (break) or sore in the body of the carrier (patient) and as such making them vulnerable to diseases that are spread through bodily fluids e.g human immunodeficiency virus (HIV), Hepatitis, staphylococcus, AIDS, etc.
lasses give programmers the ability to define their own types.
a. True
b. False
Answer:
TRUE.
Explanation: