Answer:
One of the strategies to avoid nested conditional is to use logical expressions such as the use of AND & operator.
One strategy is to use an interface class with a method. That method can be created to be used for a common functionality or purpose. This is also called strategy design pattern. You can move the chunk of conditional statement to that method. Then each class can implement that interface class and use that shared method according to their own required task by creating objects of sub classes and call that common method for any such object. This is called polymorphism.
Explanation:
Nested conditionals refers to the use of if or else if statement inside another if or else if statement or you can simply say a condition inside another condition. For example:
if( condition1) {
//executes when condition1 evaluates to true
if(condition2) {
//executes when condition1 and condition2 evaluate to true
} else if(condition3) {
//when condition1 is true and condition3 is true
} else {
//condition1 is true but neither condition2 nor conditions3 are true
} }
The deeply nested conditionals make the program difficult to understand or read if the nested conditionals are not indented properly. Also the debugging gets difficult when the program has a lot of nested conditionals.
So in order to avoid nested conditionals some strategies are used such as using a switch statement.
Here i will give an example of the strategies i have mentioned in the answer.
Using Logical Expressions:
A strategy to avoid nested conditionals is to use logical expressions with logical operators such as AND operator. The above described example of nested conditionals can be written as:
if(condition1 && condition2){ //this executes only when both condition1 and condition2 are true
} else if(condition1 && condition3) {
this executes only when both condition1 and condition3 are true
} else if(condition1 ){
//condition1 is true but neither condtion2 nor condtion3 are true }
This can further be modified to one conditional as:
if(!condition3){
// when condition1 and condition2 are true
}
else
// condition3 is true
Now lets take a simple example of deciding to go to school or not based on some conditions.
if (temperature< 40)
{
if (busArrived=="yes")
{
if (!sick)
{
if (homework=="done")
{
printf("Go to school.");
}
}
}
}
This uses nested conditionals. This can be changed to a single conditional using AND logical operator.
if ((temperature <40) && (busArrived=="yes") &&
(!sick) && (homework=="done"))
{ cout<<"Eligible for promotion."; }
The second strategy is to use an interface. For example you can
abstract class Shape{
//declare a method common to all sub classes
abstract public int area();
// same method that varies by formula of area for different shapes
}
class Triangle extends Shape{
public int area() {
// version of area code for Triangle
return (width * height / 2);
}
}
class Rectangle extends Shape{
public int area() {
// version of area code for Rectangle
return (width * height)
}
}
// Now simply create Rectangle or Triangle objects and call area() for any such object and the relevant version will be executed.
The list of lists below is meant to represent the money raised by a charity over multiple days. The inner lists represent each donation, and the outer list represents each day. Use a for loop to calculate the sum of all the numbers in this list of list of numbers, to print the total amount of money raised.
code given:hourly_donations_per_day = [[44, 33, 56, 27, 33, 25],[12, 15, 22, 19, 21],[36, 34, 32, 37, 28, 11, 35],[20, 19, 29],[22, 27, 21, 15, 26, 15]]
Answer:
Following are the code to this question:
hourly_donations_per_day = [ #declaring list of lists and assign values
[44, 33, 56, 27, 33, 25],
[12, 15, 22, 19, 21],
[36, 34, 32, 37, 28, 11, 35],
[20, 19, 29],
[22, 27, 21, 15, 26, 15]
]
total_amount_of_money_raised = 0#defining a variable and assign a values 0
for i in hourly_donations_per_day:#defining loop to count values donation
if isinstance(i,list): #using if block to add donation values
for j in i:#defining loop for add list values
total_amount_of_money_raised += j #add all values in total_amount_of_money_raised variable
print(total_amount_of_money_raised) #print value
Output:
714
Explanation:
In the above code, a list of the list is declared in which, it assigns the multiple values, in the inner lists it represents donation value and in the outer list it represents the day. In the next step, a variable "total_amount_of_money_raised" is declared that assigns a value 0, in the next step, multiple for loop is declared which is used to add list donation value and at the last print, the method is used to print its value.A lot of people call AES as an algorithm because it adopts Rijndael as a Standard. However, AES is more specific so that all implementations of AES conform to the 'standard' and are therefore inter-operable - meaning they can talk to each other. One of the things that AES takes care is how diffusion is implemented. It is implemented as a combination of shiftrows and mixcolumns. The shiftrows is simply:________
a. permutation of data at byte level.
b. using many keys.
c. same as mixcolumns.
d. using substitution box.
Answer:
The answer is option (a) permutation of data at byte level.
Explanation:
Solution
During the process of AES (Advanced encryption Standard) algorithm, these two steps shift rows and mix columns are two sub-steps of process, in which, shift row works on rows and basically shifts nth row by n-1 bytes to left side, that is, the first row will not shift at all, the second row by one place shift left, and apart from it mix columns works on columns. in this each column is transformed with a particular function, so these two steps are very different.
All the protocol layers of the internet (Application, Transport. Network) were originally without any security. TLS is one of the security architectures added later. In the Internet protocol stack. TLS is located:________. 1. right above the application layer 2. right below the application layer 3. right below the transport layer 4. right above the IP layer
Answer:
2. right below the application layer
Explanation:
TLS (Transport Layer Security) is an improved and more secured version of the SSL (Secure Socket Layer) used as cryptographic protocol for providing authentication and encryption over a network. It is initialized at the transport layer of the IP stack and finalized at the application layer. In other words, it is located between the transport and application layer of the Internet protocol stack. And this is necessary so that data received in the application layer from the transport layer are protected from start to end between these two layers.
Therefore, it is safe to say that the TLS is located right below the application layer.
Rijndael, AES, CCMP are same as well as different. They are same in terms of how encryption is done and different in terms of whether each one is a protocol, algorithm or a standard.CCMP is both, a protocol and a standard, Rijndael is:_________ a) standard only b) an algorithm c) a communications protocol. d) patented by US Government
Answer:
Option (b) is the correct answer to this question.
Explanation:
AES is based on Rijndael Algorithm.
The Rijndael algorithm enables a choice of block sizes and key sizes. The choices are for each of 128, 192, or 256 bits. Once NIST implemented Rijndael for AES, it only specified one block size,128 bits, but maintained three major lengths of selection. IEEE 802.11I go a step and further limits when both the main size and length of the block for 128 bits. It simplifies deployment and relieves users during development from having to make yet again another decision.
Other options are incorrect because they are not related to the given scenario.
A developer and tester were jointly interpreting a user story and studying the acceptance criteria. The tester wrote a test scenario that the developer felt was invalid. The tester was adamant that it was a valid test scenario and needed to be addressed. How can the dispute be resolved
Answer:
Discuss with product owner and ask if it is a valid scenario.
Explanation:
To resolove this, a discussion should be made with the product owner and the question on if it is a valid scenario should be asked.
Normally when there are issues like this, the product owner should be able to help sort out the issues. This should be the number one option to pick in cases like this where there are different opinions on what to do.
Implement the function:
string get_ap_terms(int a, int d, size_t n);
which returns a string containing the first n terms of the arithmetic progression (AP) as a sequence of comma-separated values.
Answer:
This is written in C++
Check comments for explanations
Program starts here
#include<iostream>
#include<string>
using namespace std;
//The function get_ap_terms begins here
string get_ap_terms(int a, int d, int size_tn)
{
// This line initializes the expected string to empty string
string result = "";
//The for iteration loops through the number of terms the function is expected to return
for(int i = 1; i<= size_tn;i++)
{
//This line checks if the loop is less than the number of terms
if(i < size_tn)
{
//This string gets the current term of the progression
result+=to_string(a)+ ", ";
//This line calculates the next term
a+=d;
}
else
{
//This line calculates the last term
result+=to_string(a);
}
}
//This line returns the string containing the first n terms of the arithmetic progression
return result;
}
//The main function starts here
int main()
{
//This line declares the first term (a), the common difference (d) and the number of terms (size_tn)
int a,d,size_tn;
//This line prompts the user for the first term
cout<<"First Term: ";
//This line gets the first term
cin>>a;
//This line prompts the user for the common difference
cout<<"Common Difference: ";
//This line gets the common difference
cin>>d;
//This line prompts the user for number of terms
cout<<"Number of Terms: ";
//This line gets the number of terms
cin>>size_tn;
//This line calls the function to print the string containing the first n terms
cout<<get_ap_terms(a, d, size_tn);
return 0;
}
//Program ends here
Two stations running TCP/IP are engaged in transferring a file. This file is 1000MB long, the payload size is 100 bytes, and the negotiated window size is 1000 bytes. The sender receives an ACK 1200 from the receiver.
Requried:
a. Which bytes will be sent next?
b. What is the last byte number that can be sent without an ACK being sent by the receiver?
Answer:
a. 2100
b. 2199
Explanation:
GIven that:
The file size = 1000 MB
The payload size is = 100 bytes
The negotiated window size is = 1000 bytes.
This implies that the sliding window can accommodate maximum number of 10 packets
The sender receives an ACK 1200 from the receiver.
Total byte of the file is :
1000 MB = 1024000000 bytes
a.
Sender receives an ACK 1200 from the receiver but still two packets are still unacknowledged
=1200 + 9 * 100
= 1200 + 900
= 2100
b. What is the last byte number that can be sent without an ACK being sent by the receiver?
b. Usually byte number starts from zero, in the first packet, the last byte will be 99 because it is in 1000th place.
Thus; the last byte number send is :
= 1200 + 10 *100 -1
= 1200 + 1000-1
= 1200 + 999
= 2199
For vulnerable road users, the areas where roadways transition from one environment to another are...
A. the safest areas.
B. the most clearly marked areas.
C. the most dangerous areas.
For vulnerable road users, the areas where roadways transition from one environment to another are the most dangerous areas. Thus the correct answer is C.
What is the environment?An environment is refers to surroundings in which all the living and nonliving objects exist to survive life. This includes humans, animals, plants, and other resources.
the areas where roadways transition from one environment to another are the most dangerous areas because here drivers first recognize an approaching change in the nature of the roadway and then reduce their speed as appropriate.
Therefore, option C is appropriate.
Learn more about the environment, here:
brainly.com/question/518189?
#SPJ2
Write a program BandMatrix.java that takes two integer command-line arguments n and width and prints an n-by-n pattern like the ones below, with a zero (0) for each element whose distance from the main diagonal is strictly more than width, and an asterisk (*) for each entry that is not, and two spaces between each 0 or *.
Answer:
import java.util.Scanner; //Scanner class to take input from user
public class BandMatrix{ // start of the BandMatrix class
public static void main(String[] args) {// start of main() function body
Scanner scanner = new Scanner( System.in );
//creates Scanner class object scanner
int n = scanner.nextInt(); //reads the value of n from user
int width = scanner.nextInt(); //reads input value of width
//the outer and inner loops to form a n by n pattern
for (int i=0; i<n; i++) {
for (int j=0; j<n; j++) {
if (j==i || Math.abs(i-j) <= width) {
/*if the value of j become equal to the value of i OR if the difference between i and j is less than or equal to the value of width input by user then asterisks are printed in the pattern otherwise 0 is printed. This simply moves through each element of and calculates its distance from main diagonal */
System.out.print(" * "); } //displays asterisks when above if condition is true
else { //when the above IF condition evaluates to false
System.out.print(" 0 "); } } //displays 0 in pattern when if condition is false
System.out.println(); } } }
Explanation:
The program is well explained in the comments mentioned with each statement of the program. The program first takes two integer arguments from user i.e. n and width and uses for loops if (j==i || Math.abs(i-j) <= width) condition to print n-by-n pattern with a zero 0 for each element whose distance from the main diagonal is strictly more than width, and an asterisk * for each entry that is not. I will explain the working of loops.
Suppose n=8 and width=0
The first outer for loop has an i variable that is initialized to 0. This loop executes until the value of i exceeds the value of n. So at first iteration i=0. The loop checks if i<n. Its true because n=8 and i=0 So 8>0. Now the program enters the body of outer loop.
There is an inner loop which has a j variable that is initialized to 0. This loop executes until the value of j exceeds the value of n. So at first iteration j=0. The loop checks if j<n. Its true because n=8 and j=0 So 8>0. Now the program enters the body of inner loop.
There is an if statement inside the body of inner loop. It checks each entry whose distance from the main diagonal is strictly less than or equal width and prints asterisks * when the statement evaluates to true otherwise prints a 0. Lets see how it works.
i=0 j=0 So j==i is True. If we check the second part of this if statement then
i - j = 0 - 0 = 0. Math.abs() method is used to return the absolute value of this subtraction in case the result comes out to be a negative number. So the result is 0. As the value of width is 0 so this part is true because i-j=0 and width is also 0. So one asterisk is printed when this condition evaluates to true.
This way the loops keeps executing and printing the asterisks or 0 according to the if statement at each iteration. The program along with its output is attached.
print_pattern() prints 5 characters. Call print_pattern() twice to print 10 characters. Example output: ***** ***** in python
Answer:
def print_pattern():
print("*****",end=" ")
print_pattern()
print_pattern()
When planning a backup strategy, ideally one needs to prioritize important data and only back up what is absolutely necessary for operations. Assuming storage limitations, which of these is LEAST important to back up?
The available options are:
Emails
Financial spreadsheets
User downloads
Databases
Answer:
User downloads
Explanation:
The correct answer is User downloads, this is because, the downloaded files are in cloud or another website memory or database, which serves as an alternative backup already. Thus, those downloaded files can still be recovered at later time when one needs to get the files back.
However, Emails, Financial spreadsheets and Databases, do not have any other place to retrieve them, because they are originally created and are yet to be uploaded to cloud or another website memory space to serves as alternative back up.
Assuming storage limitations, which of these is LEAST important to back up is; User downloads
The missing options are;
Emails
Financial spreadsheets
User downloads
Databases
The correct option is User downloads. The reason for that is because files under user downloads can still be located on the website from which it was downloaded or if it was stored in cloud storage or some other online platform. This means that it is already a backup even if you delete it as you can always re-download. However, the other options were created by you and not downloaded and as such if deleted could never be recovered again.Thus, user downloads is the LEAST important to back up.
Read more on computer backup at; https://brainly.com/question/17506968
Internally, a bin heap is typically implemented as a BST that has the additional ordering property that the minimum value is at the root (or the maximum value is at the root, if we chose to make the bin heap to be a max heap).
a) True
b) False
Answer:
True is the correct answer to the given question .
Explanation:
Heap is the complete binary tree that meets the property of organizing the heap There are two types heap max heap and min heap .The value in the heap of every node is greater than or equal to its parent 's value or less then equal to the parent with there dimension of the minimum value or the maximum value just at the root.
So the binary heap is configured as a Binary Search Tree with the external organizing attribute that perhaps the mean price is in the root with maximum value .Therefore the given statement is true .
write the algorithm, flowchart and BASIC program to calculate the area of the rectangle length 50m and width 30m.
Answer:
The Basic Program is as follows:
10 LENGTH = 50
15 WIDTH = 30
20 AREA = WIDTH * LENGTH
25 PRINT AREA
30 END
The Algorithm is as follows:
1. Start
2. Let Length = 50
3. Let Width = 30
4. Compute Area = Length * Width
5. Display Area
6. Stop
See Attachment for flowchart (flowchart is designed using draw io tools)
Explanation:
The flowchart, algorithm and basic program all follow the same sequence and explanation
Using the basic program as a case study;
Line number 10: The program starts by initializing LENGTH to 50
Line number 15: It then initializes WIDTH to 30
Line number 20: The AREA is calculated by LENGTH * WIDTH
Line number 25: The value of AREA is printed afterwards
Line number 30: Lastly, the program stops execution
Write a python function absDiff(...) that takes two integers as parameters, gets the absolute value of both, subtracts the second from the first, and returns the difference.
Explanation:
Remember, an absolute value is the non-negative value of a number in this case the integer.
First, using the abs() function. Here's an example:
# Some random integers
variableA = -308
variableB = 301
Second, # Get the absolute values of those integers
absA = abs(variableA)
absB = abs(variableB)
Next,
# Output the results
print("Absolute values of integers with `abs()`:")
print("|", variableA, "| = ", absA, sep="")
Finally,
Use abs(variableA-variableB):
In [1]: abs(-308-301)
Out[1]: 307
php Exercise 3: Function Write a function named word_count that accepts a string as its parameter and returns the number of words in the string. A word is a sequence of one or more non-space characters (any character other than ' '). For example, the call of word_count("hello, how are you?") should return 4. Constraints: • Do not use any data structures such as arrays to help you solve this problem. • Do not use the String function explode on this problem. • But you can declare as many simple variables like Integer, String, etc. as you like. Keep it simple.
Answer:
<?php
function word_count($string){ // function that takes a string a parameter and returns the number of words in that string
$space = 0; // this variable is used in order to detect space, new line and tab spaces in a string
$words = 1; // this variable is used to identify word presence in string
$include = $space; //used to maintain the state of $words and $space
$counter = 0; // this counts the number of words in the string
$i = 0; //this moves through each character of the string
while ($i < strlen($string)){ // iterates through every character of string until the last character of string is reached
if ($string[$i] == " "||$string[$i] == "\n" || $string[$i] == "\t") //if the space or new line or tab space is identified in the string
$include = $space; //set the state of include as space if the next character is a space newline or a tab space
else if ($include == $space) { //if next character is a word and current state i.e. $include holds $space
$include = $words; // then set the state i.e. $include as $words
++$counter; } //increments i to move to next character at each iteration
++$i; } //returns the number of words in a string
return $counter; }
$str = "Hello, how are you "; //sample string
echo "Words: " . word_count($str); // calls word_count function to return number of words in str.
?>
Explanation:
The program has a function word_count that accepts a string as its parameter and returns the number of words in the string. In the function there are three variables $space and $words and $include used as state variables. For instance $space identifies space, new line and tab spaces in the $string so it specifies that a space has occurred. $words identifies words in the $string so it specifies that a word has occurred. $include holds this state information. $i moves through every character of the $string and when a space occurs in the $string then the state $include is set to $space. When a word occurs then state $include is set to $words. $counter variable, which is used to count the number of words is incremented to 1 when previous state is $space and next character is a word character. Every time a word is seen in the string, this variable is incremented to 1 to keep track of number of words in the string. When $i reaches the end of the string then this loop stops and counter returns the number of words in the $string.
If you have taken any drugs, it's not safe to drive.
A. True
B. False
Answer:
True
Explanation:
It is risky to drive while you are on drugs!
Which one of the following is a functional requirement? Select one: a. None of the mentioned b. Robustness c. Maintainability d. Portability
Answer:
The correct answer to the question is option A "None of the mentioned"
Explanation:
Functional requirements describe the component of a system by verifying the functionality of the software, defines what function a system is likely to perform. It simply dictates to the system/software on how it must behave. For example, it commands software to display, for instance, User name, total orders placed, and a lot of other commands. It puts the computer/software to describe what the product has to do.
Nonfunctional requirements describe the general quality of a system describing how it works.
In the options above, Maintainability allows modification of applications, robustness allows a system to function well even after an interruption with an error command, and Portability allows easy running and the ability for software to be transferred easily, are all examples of non-functional requirements.
.
all HTML tags are case sensitive, case insensitive and have to be written in capitals only
Answer:
Html tags are not case sensitive
It's in JavaScript that the tags are case sensitive
The is_positive function should return True if the number received is positive, otherwise it returns None. Can you fill in the gaps to make that happen?
The is_positive function should return True if the number received is positive, otherwise it returns None. Can you fill in the gaps to make that happen?
def is_positive(number):
if _____ :
return _____
Answer:
def is_positive(number):
if (number > 0):
return True
else:
return "None"
---------------------------------------------------------------------------------
Code Test and Sample Output:print(is_positive(6))
>> True
print(is_positive(-7))
>> None
----------------------------------------------------------------------------------
Explanation:The code above has been written in Python.
Now, let's explain each of the lines of the code;
Line 1: defines a function called is_positive which takes in a parameter number. i.e
def is_positive(number):
Line 2: checks if the number, supplied as parameter to the function, is positive. A number is positive if it is greater than zero. i.e
if (number > 0):
Line 3: returns a boolean value True if the number is positive. i.e
return True
Line 4: defines the beginning of the else block that is executed if the number is not positive. i.e
else:
Line 5: returns a string value "None" if the number is not positive. i.e
return "None"
All of these put together gives;
===============================
def is_positive(number):
if (number > 0):
return True
else:
return "None"
================================
An example test of the code has also been given where the function was been called with an argument value of 6 and -7. The results were True and None respectively. i.e
print(is_positive(6)) = True
print(is_positive(-7)) = None
Following are the python program to check input number is positive or negative:
Program:def is_positive(n):#defining the method is_positive that takes one variable in parameter
if (n > 0):#defining if block that check input number is positive
return True#return boolean value that is True
else:#else block
return "None"#return string value
n=int(input("Enter number: "))#defining n variable that input a number
print(is_positive(n))#using print method that calls and prints method return value
Output:
please find the attached file.
Program Explanation:
Defining the method "is_positive" that takes one variable "n" in the parameter.Inside the method, if conditional block is defined that checks the input number is positive, if it's true, it will return a boolean value that is "True". Otherwise, it will go to the else block, where it will return a string value that is "None".Outside the method, the "n" variable is declared to be an input number.After the input value, a print method is used that calls the "is_positive" method and prints its return value.Find out more about the method here:
brainly.com/question/5082157
A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply
Complete Question:
A network security analyst received an alert about a potential malware threat on a user’s computer. What can the analyst review to get detailed information about this compromise? Check all that apply.
A. Logs.
B. Full Disk Encryption (FDE).
C. Binary whitelisting software.
D. Security Information and Event Management (SIEM) system.
Answer:
A. Logs.
D. Security Information and Event Management (SIEM) system.
Explanation:
If a network security analyst received an alert about a potential malware threat on a user’s computer. In order to get a detailed information about this compromise, the analyst should review both the logs and Security Information and Event Management (SIEM) system.
In Computer science, logs can be defined as records of events triggered by a user, operating system and other software applications running on a computer. Log files are used to gather information stored on a computer such as user activities, system performance and software program.
Security Information and Event Management (SIEM) system is the process of gathering and integration of all the logs generated by a computer from various software application, service, process, or security tool.
These logs collected through the SIEM are shown in a format that is readable by the security analyst and this help in real-time detection of threats.
Hence, logs and SIEM systems are important tools for network security analyst for detection of threats in real-time and event management functions.
If you know the audience for your website is diverse, what should you do? A. Avoid creating a list of frequently asked questions (FAQs). B. Use a high-tech, complex page design to impress site visitors. C. Provide more than one way to find specific content. D. Incorporate graphics of sports and use sports-related metaphors.
Answer:
C. Provide more than one way to find specific content.
Explanation:
The website should be made in an innovative and in an attractive way so that the audience, customers, the general public could see your products easily and reach you out in an easy manner.
As you know that your audience for a website is diverse that for that you should need to provide them one more way to determine the specific content as it is easy for them to understand and easily they can access to their website
Hence, the correct option is C.
Those with good motor skills are often described as having ...
A. good coordination.
B. poor coordination.
C. athletic coordination,
In the above case, those with good motor skills are often described as having good coordination.
What is good coordination?A coordination skill is known to bee the ability of a person to look at many moving pieces and derive a plan for all the pieces to be put together.
Therefore, In the above case, those with good motor skills are often described as having good coordination.
Learn more about good coordination from
https://brainly.com/question/1476231
#SPJ9
The birthday attacks are called so because we can only have 365 birthdays (oh well, excluding 2/29). So, if there are 366 people in a place at least two of them have the same birthday - thus causing collision(s). Same things happens in hash algorithm. The people in birthday attack is the same thing as:___________. 1. hash in the hash algorithm. 2. input in the hash algorithm. 3. the algorithm in hash algorithm. 4. the key
2. input in the hash algorithm
Explanation:In a hash algorithm, a function called hash function (say H) is chosen to transform a variable sized input n, and return a fixed size string called the hash value (say h). i.e
H(n) => h
Comparing this to the birthday attacks;
i. the hash function is getting the people's birthdays - H,
ii. the input is each person in the group of people - n,
iii. the hash is the value of the birthday of each person - H(n).
If I have an Animal superclass with a Mammal subclass, both concrete and both having a method called eat() with identical signatures and return types, polymorphism means:________.
a. the Animal version of eat() will be called, regardless of the static/dynamic type.
b. the Mammal version of eatſ) will be called, regardless of static/dynamic.
c. the dynamic type of the reference will determine which of the methods to call.
d. the static type of the reference will determine which of the methods to call.
Answer:
(c) the dynamic type of reference will determine which of the methods to call.
Explanation:
Polymorphism in Object Oriented Programming typically means the same method name can cause different actions depending on which object it is invoked on. Polymorphism allows for dynamic binding in that method invocation is not bound to the method definition until the program executes.
So in the case of Animal superclass and Mammal subclass, both having a method called eat() with identical signatures and return types, depending on which reference, the correct method eat() will be called dynamically upon execution.
For example, if we have the following;
================================
Mammal mammal = new Animal();
mammal.eat()
================================
The eat() method that will be called is the one in the Mammal subclass.
However, if we have;
================================
Animal animal = new Animal();
animal.eat()
================================
The eat() method of the Animal superclass will be called.
James has a USB flash drive that he has used at work. The drive needs to be thrown away, but James wants to make sure that the data is no longer on the drive before he throws it away. What can James use to wipe the data clean?
a. Zero-fill utility
b. Format the drive
c. ATA Secure Erase
d. Smash the USB drive
Answer:
C. ATA Secure Erase
D. Smash the USB drive
Explanation:
Zero fill utility is a specialized way of formatting a storage device particularly secondary storage such as hard disk, flash drive e.t.c. In this process, the disk contents are overwritten with zeros. Once this has been done, undoing is essentially hard but possible. In most cases, this might just mean that the data content is corrupt and as such might still be recovered, maybe not in its pure entirety.
Formatting the drive on another hand does not essentially mean cleaning the drive and wiping off data. It just means that operating systems cannot see those data contents anymore. They are still present in the drive and can be recovered.
ATA Secure Erase is actually a way of completely and permanently erasing the content in a drive. Once the function has been done, undoing is not possible. Both the data content and even the data management table will be completely gone.
Smashing the USB drive is the surest way of cleaning data as that will permanently destroy the working components of the drive such as the memory chip. And once that happens then there's no drive let alone its contents.
How many searches should you complete when looking up information using online references?
Answer:
c
Explanation:
What are entity-relationship diagrams and how are they used? What symbol is used for a relationship? What is an associative entity? Provide an example.
Answer:
The definition including its given problem is outlined in the following segment on the clarification.
Explanation:
Entity-relationship (ER) diagram describes how mechanical stored procedures are constructed and demonstrate the overarching representation of the situation. It also describes the connections between some of the entities of the framework and even the comparison with standard measurements.For something like an individual relationship structure, the normal representation of connections seems to be a diamond. Associative institutions have several to many partnerships to communicate with. It's indeed the verb throughout a diamond-shaped form that holds two organizations around each other. This verb is in fact an entity on its own, therefore it must be termed an associative entity.An illustration of such might be if a participant were to register for a class. Multiple individuals will be registered for several courses, and there have been many to several relationships; thus, the associative object will indeed register.A Solutions Architect needs to build a resilient data warehouse using Amazon Redshift. The Architect needs to rebuild the Redshift cluster in another region. Which approach can the Architect take to address this requirement
Answer:
Explanation:
An Amazon Redshift data warehouse refers to a collection of computing resources that are known as nodes. These nodes are organized into a group called a cluster. In order to correctly replicate/rebuild this cluster in another region, the Architect needs to modify the Redshift cluster to take snapshots of the Amazon EBS volumes each day, sharing those snapshots with the other region. These snapshots will provide accurate and up-to-date information allowing for a correct rebuild of the Redshift cluster.
A relative path name defines a path from_________________________ Select one: a. from the UFD (user file directory) b. the current directory c. the root directory d. from the MFD (master file directory)
Answer:
(b) the current directory
Explanation:
A path is the location or route to a particular file or folder in an operating system. This path is always unique and can either be relative or absolute.
A relative path name of a file defines the path to the file from the current or present working directory.
An absolute path name of a file defines the path to the file from the root directory. This path gives a complete descriptive path to a file from the start of the actual file system of the operating system.
DOLLAR GENERAL
x
Knowledge Check
Non-employees are allowed in the store before the store opens and after
closing time.
True
False
SUBMIT
Answer:
False
Explanation:
Unless authorized by a manager. Only staff members are allowed in the store before and after normal store hours.
Answer:
The correct answer is
False
If you are not an employee you are not allowed in stores before opening hours or after closing time. The only times non-staff are allowed in the store is for purchasing of products during hours of operation.h
Hope this helps!