Answer:
Grace Hopper.
Explanation:
Grace Hopper was a US Naval Rear Admiral and an American computer scientist who was born on the 9th of December, 1906 in New York city, United States of America. She worked on the first commercial computer known as universal automatic computer (UNIVAC), after the second World War II.
In 1953 at the Remington Rand, Grace Hopper invented the first high-level programming language for UNIVAC 1 by using words and expressions.
Additionally, the high-level programming language known as FLOW-MATIC that she invented in 1953 paved the way for the development of common business-oriented language (COBOL).
Hence, Grace Hopper developed the first compiler and conducted work that led to the development of COBOL.
Write a method that evaluates to true or false depending on whether a box completely fits inside another:
public boolean nests( Box outsideBox )
This is potentially a difficult method, since the box may fit or not fit depending on how it is rotated. To simplify the method, write it so that it returns true if the two boxes nest without considering rotations (so height is compared to height, length compared to length, and so on.)
Answer:
box outside box
Explanation:
It is used to display a window with many options, or buttons, in Easy GUI. It can be used in situations when it is necessary to determine which option is the first selection because it returns 1 for buttons with index 0 and 0 for buttons with other indexes.
What public boolean nests contain box outside box?One of the built-in data types in Python is the Boolean type. It serves as a representation of an expression's truth value. For instance, the statement 0 == 1 is False while the statement 1 = 2 is True.
To write effective Python code, one must have a solid understanding of how Python's Boolean values operate.
A boolean value describes the checked attribute. Whenever it is present, it indicates that a checkbox next to an input> element should be selected (checked) before the page loads.
Therefore, The checked attribute can be applied to both checkbox and radio input types. Additionally, JavaScript can be used to modify the checked attribute after the page has loaded.
Learn more about boolean nests here:
https://brainly.com/question/28660200
#SPJ5
What are the two basic functions (methods) used in classical encryption algorithms?
substitution and transport
You've created a new programming language, and now you've decided to add hashmap support to it. Actually you are quite disappointed that in common programming languages it's impossible to add a number to all hashmap keys, or all its values. So you've decided to take matters into your own hands and implement your own hashmap in your new language that has the following operations:
insert x y - insert an object with key x and value y.
get x - return the value of an object with key x.
addToKey x - add x to all keys in map.
addToValue y - add y to all values in map.
To test out your new hashmap, you have a list of queries in the form of two arrays: queryTypes contains the names of the methods to be called (eg: insert, get, etc), and queries contains the arguments for those methods (the x and y values).
Your task is to implement this hashmap, apply the given queries, and to find the sum of all the results for get operations.
Example
For queryType = ["insert", "insert", "addToValue", "addToKey", "get"] and query = [[1, 2], [2, 3], [2], [1], [3]], the output should be hashMap(queryType, query) = 5.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 2, 2: 3}
3 query: {1: 4, 2: 5}
4 query: {2: 4, 3: 5}
5 query: answer is 5
The result of the last get query for 3 is 5 in the resulting hashmap.
For queryType = ["insert", "addToValue", "get", "insert", "addToKey", "addToValue", "get"] and query = [[1, 2], [2], [1], [2, 3], [1], [-1], [3]], the output should be hashMap(queryType, query) = 6.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 4}
3 query: answer is 4
4 query: {1: 4, 2: 3}
5 query: {2: 4, 3: 3}
6 query: {2: 3, 3: 2}
7 query: answer is 2
The sum of the results for all the get queries is equal to 4 + 2 = 6.
Input/Output
[execution time limit] 4 seconds (py3)
[input] array.string queryType
Array of query types. It is guaranteed that each queryType[i] is either "addToKey", "addToValue", "get", or "insert".
Guaranteed constraints:
1 ≤ queryType.length ≤ 105.
[input] array.array.integer query
Array of queries, where each query is represented either by two numbers for insert query or by one number for other queries. It is guaranteed that during all queries all keys and values are in the range [-109, 109].
Guaranteed constraints:
query.length = queryType.length,
1 ≤ query[i].length ≤ 2.
[output] integer64
The sum of the results for all get queries.
[Python3] Syntax Tips
# Prints help message to the console
# Returns a string
def helloWorld(name):
print("This prints to the console when you Run Tests")
return "Hello, " + name
Answer:
Attached please find my solution in JAVA
Explanation:
long hashMap(String[] queryType, int[][] query) {
long sum = 0;
Integer currKey = 0;
Integer currValue = 0;
Map<Integer, Integer> values = new HashMap<>();
for (int i = 0; i < queryType.length; i++) {
String currQuery = queryType[i];
switch (currQuery) {
case "insert":
HashMap<Integer, Integer> copiedValues = new HashMap<>();
if (currKey != 0 || currValue != 0) {
Set<Integer> keys = values.keySet();
for (Integer key : keys) {
copiedValues.put(key + currKey, values.get(key) + currValue);
}
values.clear();
values.putAll(copiedValues);
currValue = 0;
currKey = 0;
}
values.put(query[i][0], query[i][1]);
break;
case "addToValue":
currValue += values.isEmpty() ? 0 : query[i][0];
break;
case "addToKey":
currKey += values.isEmpty() ? 0 : query[i][0];
break;
case "get":
copiedValues = new HashMap<>();
if (currKey != 0 || currValue != 0) {
Set<Integer> keys = values.keySet();
for (Integer key : keys) {
copiedValues.put(key + currKey, values.get(key) + currValue);
}
values.clear();
values.putAll(copiedValues);
currValue = 0;
currKey = 0;
}
sum += values.get(query[i][0]);
}
}
return sum;
}
The Clean Air Act Amendments of 1990 prohibit service-related releases of all ____________. A) GasB) OzoneC) MercuryD) Refrigerants
Answer:
D. Refrigerants
Explanation:
In the United States of America, the agency which was established by US Congress and saddled with the responsibility of overseeing all aspects of pollution, environmental clean up, pesticide use, contamination, and hazardous waste spills is the Environmental Protection Agency (EPA). Also, EPA research solutions, policy development, and enforcement of regulations through the resource Conservation and Recovery Act .
The Clean Air Act Amendments of 1990 prohibit service-related releases of all refrigerants such as R-12 and R-134a. This ban became effective on the 1st of January, 1993.
Refrigerants refers to any chemical substance that undergoes a phase change (liquid and gas) so as to enable the cooling and freezing of materials. They are typically used in air conditioners, refrigerators, water dispensers, etc.
Answer:
D
Explanation:
Write a program that accepts two numbers R and H, from Command Argument List (feed to the main method). R is the radius of the well casing in inches and H is the depth of the well in feet (assume water will fill this entire depth). The program should output the number of gallons stored in the well casing. For your reference: The volume of a cylinder is pi;r2h, where r is the radius and h is the height. 1 cubic foot
Answer:
Answered below.
Explanation:
#Answer is written in Python programming language
#Get inputs
radius = float(input("Enter radius in inches: "))
height = float(input("Enter height in feet: "))
#Convert height in feet to height in inches
height_in_inches = height * 12
#calculate volume in cubic inches
volume = 3.14 * (radius**2) * height_to_inches
#convert volume in cubic inches to volume in gallons
volume_in_gallons = volume * 0.00433
#output result
print (volume_in_gallons)
what if an html code became cracked and formed a bug how can i repair that
Draw TOUT Uw Use the space below to draw your own image with the shapes. Then see if you can communicate it to your partner to draw using the shape drawing tool in Game Lab. You can also give your drawing to another group to use as a challenge 0 50 100 150 200 250 300 350 400 Shape Size These shapes are the correct size 50 100 Pattern Reference If you don't have red, green, or blue to draw with fill in the patterns or colors you'll use instead 150 200 Red 250 Green 300
Answer:
um
Explanation:
magine that you are designing an application where you need to perform the operations Insert, DeleteMaximum, and Delete Minimum. For this application, the cost of inserting is not important, because itcan be done off-line prior to startup of the time-critical section, but the performance of the two deletionoperations are critical. Repeated deletions of either kind must work as fast as possible. Suggest a datastructure that can support this application, and justify your suggestion. What is the time complexity foreach of the three key operations
Answer:
Use the stack data structure with both best-case and worst-case time complexity of O(1) for insertion and deletion of elements.
Explanation:
The stack data structure is used in programs to hold data for which the last data in the stack is always popped out first when retrieving the data sequentially, that it, first-in, last-out.
The elements in the stack are located in an index location, which means that they can be retrieved directly by choice with constant time complexity of 1 or O(1) for best and worst-case.
So inserting, and deleting the minimum and maximum elements in the stack data structure executes at a speed of the constant 1 (big-O notation, O(1) ).
We have looked at several basic design tools, such as hierarchy charts, flowcharts, and pseudocode. Each of these tools provide a different view of the design as they work together to define the program. Explain the unique role that each design tool provides (concepts and/or information) to the design of the program.
Answer:
Answered below
Explanation:
Pseudocode is a language that program designers use to write the logic of the program or algorithms, which can later be implemented using any programming language of choice. It helps programmers focus on the logic of the program and not syntax.
Flowcharts are used to represent the flow of an algorithm, diagrammatically. It shows the sequence and steps an algorithm takes.
Hierarchy charts give a bird-eye view of the components of a program, from its modules, to classes to methods etc.
PLEASE HELP
This graph shows the efficiencies of two different algorithms that solve the same problem. Which of the following is most efficient?
Answer:
D is correct
Explanation:
Think of it by plugging in values. Clearly the exponential version, according the graph, is more efficient with lower values. But then it can be seen that eventually, the linear will become more efficient as the exponential equation skyrockets. D is the answer.
Implement the function charCnt. charCnt is passed in a name of a file and a single character (type char). This function should open the file, count the number of times the character is found within the file, close the file, and then return the count. If the file does not exist, this function should output an error message and then call the exit function to exit the program with an error value of 1.
Answer:
Answered below
Explanation:
//Program is written in Python programming language
def charCnt( fileName, char){
if not fileName.exists( ):
return sys.exit(1)
else:
openFile = open("$fileName.txt", "r")
readFile = openFile.read( )
fileLength = len (readFile)
count = 0
for character in range(fileLength):
if readFile[character] == char:
count++
openFile.close( )
return count
}
Python (and most programming languages) start counting with 0.
True
False
Answer:
yes its true :)
Explanation:
Write a program, named NumDaysLastNameFirstName.java, which prompts the user to enter a number for the month and a number for the year. Using the information entered by the user and selection statements, display how many days are in the month. Note: In the name of the file, LastName should be replaced with your last name and FirstName should be replaced with your first name. When you run your program, it should look similar to this:
Answer:
Explanation:
The following code is written in Java and uses Switch statements to connect the month to the correct number of days. It uses the year value to calculate the number of days only for February since it is the only month that actually changes. Finally, the number of days is printed to the screen.
import java.util.Scanner;
public class NumDaysPerezGabriel {
public static void main(String args[]) {
int totalDays = 0;
Scanner in = new Scanner(System.in);
System.out.println("Enter number for month (Ex: 01 for January or 02 for February): ");
int month = in.nextInt();
System.out.println("Enter 4 digit number for year: ");
int year = in.nextInt();
switch (month) {
case 1:
totalDays = 31;
break;
case 2:
if ((year % 400 == 0) || ((year % 4 == 0) && (year % 100 != 0))) {
totalDays = 29;
} else {
totalDays = 28;
}
break;
case 3:
totalDays = 31;
break;
case 4:
totalDays = 30;
break;
case 5:
totalDays = 31;
break;
case 6:
totalDays = 30;
break;
case 7:
totalDays = 31;
break;
case 8:
totalDays = 31;
break;
case 9:
totalDays = 30;
break;
case 10:
totalDays = 31;
break;
case 11:
totalDays = 30;
break;
case 12:
totalDays = 31;
}
System.out.println("There are a total of " + totalDays + " in that month for the year " + year);
}
}
A mom is planning a theme park trip for her husband, herself, and their three children. The family has a budget of $500. Adult tickets cost $25 each, and child tickets cost $25 each. Which Excel formula should be entered in cell B5
Complete question :
Sue is planning a theme park trip for her husband, herself, and her three children. She has a budget of $500. Adult tickets cost $55 each, and child tickets cost $25 each. Which formula should go in cell B4?
Answer:
=E1B1+E2B2
Explanation:
Cost of adult ticket = $55
Child ticket = $25
Number of adult = 2
Number of children = 3
Assume :
Cost of adult ticket = $55 = E1
Child ticket = $25 = E2
Number of adult = 2 = B1
Number of children = 3 = B2
The formula that should go into cell B5 in other to calculate total amount :
Total should be :
($55*2) + ($25*3)
=E1B1+E2B2
Online privacy and data security are a growing concern. Cybercrime is rampant despite the various security measures taken.
-Mention five tools to safeguard users against cybercrime. How do these tools help decrease crime?
-Provide the details of how each of these tools work.
-Describe how these tools are helping to restrict cybercrime.
Answer:
The SANS Top 20 Critical Security Controls For Effective Cyber Defense
Explanation:
Password/PIN Policy
Developing a password and personal identification number policy helps ensure employees are creating their login or access credentials in a secure manner. Common guidance is to not use birthdays, names, or other information that is easily attainable.
Device Controls
Proper methods of access to computers, tablets, and smartphones should be established to control access to information. Methods can include access card readers, passwords, and PINs.
Devices should be locked when the user steps away. Access cards should be removed, and passwords and PINs should not be written down or stored where they might be accessed.
Assess whether employees should be allowed to bring and access their own devices in the workplace or during business hours. Personal devices have the potential to distract employees from their duties, as well as create accidental breaches of information security.
As you design policies for personal device use, take employee welfare into consideration. Families and loved ones need contact with employees if there is a situation at home that requires their attention. This may mean providing a way for families to get messages to their loved ones.
Procedures for reporting loss and damage of business-related devices should be developed. You may want to include investigation methods to determine fault and the extent of information loss.
Internet/Web Usage
Internet access in the workplace should be restricted to business needs only. Not only does personal web use tie up resources, but it also introduces the risks of viruses and can give hackers access to information.
Email should be conducted through business email servers and clients only unless your business is built around a model that doesn't allow for it.
Many scams and attempts to infiltrate businesses are initiated through email. Guidance for dealing with links, apparent phishing attempts, or emails from unknown sources is recommended.
Develop agreements with employees that will minimize the risk of workplace information exposure through social media or other personal networking sites, unless it is business-related.
Encryption and Physical Security
You may want to develop encryption procedures for your information. If your business has information such as client credit card numbers stored in a database, encrypting the files adds an extra measure of protection.
Key and key card control procedures such as key issue logs or separate keys for different areas can help control access to information storage areas.
If identification is needed, develop a method of issuing, logging, displaying, and periodically inspecting identification.
Establish a visitor procedure. Visitor check-in, access badges, and logs will keep unnecessary visitations in check.
Security Policy Reporting Requirements
Employees need to understand what they need to report, how they need to report it, and who to report it to. Clear instructions should be published. Training should be implemented into the policy and be conducted to ensure all employees understand reporting procedures.
Empower Your Team
One key to creating effective policies is to make sure that the policies are clear, easy to comply with, and realistic. Policies that are overly complicated or controlling will encourage people to bypass the system. If you communicate the need for information security and empower your employees to act if they discover a security issue, you will develop a secure environment where information is safe.
Answer:
anyone know if the other answer in right?
Explanation:
Write a program named BinaryToDecimal.java that reads a 4-bit binary number from the keyboard as a string and then converts it into decimal. For example, if the input is 1100, the output should be 12. (Hint: break the string into substrings and then convert each substring to a value for a single bit. If the bits are b0, b1, b2, b3, then decimal equivalent is 8b0 4b1 2b2 b3)
Answer:
import java.util.*;
public class BinaryToDecimal
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
String binaryNumber;
int decimalNumber = 0;
System.out.print("Enter the binary number: ");
binaryNumber = input.nextLine();
for(int i=0; i<binaryNumber.length(); i++){
char c = binaryNumber.charAt(binaryNumber.length()-1-i);
int digit = Character.getNumericValue(c);
decimalNumber += (digit * Math.pow(2, i));
}
System.out.println(decimalNumber);
}
}
Explanation:
Create a Scanner object to be able to get input from the user
Declare the variables
Ask the user to enter the binaryNumber as a String
Create a for loop that iterates through the binaryNumber. Get each character using charAt() method. Convert that character to an integer value using Character.getNumericValue(). Add the multiplication of integer value and 2 to the power of i to the decimalNumber variable (cumulative sum)
When the loop is done, print the decimalNumber variable
Write a function called is_present that takes in two parameters: an integer and a list of integers (NOTE that the first parameter should be the integer and the second parameter should be the list) and returns True if the integer is present in the list and returns False if the integer is not present in the list. You can pick everything about the parameter name and how you write the body of the function, but it must be called is_present. The code challenge will call your is_present function with many inputs and check that it behaves correctly on all of them. The code to read in the inputs from the user and to print the output is already written in the backend. Your task is to only write the is_present function.
Answer:
The function in python is as follows
def is_present(num,list):
stat = False
if num in list:
stat = True
return bool(stat)
Explanation:
This defines the function
def is_present(num,list):
This initializes a boolean variable to false
stat = False
If the integer number is present in the list
if num in list:
This boolean variable is updated to true
stat = True
This returns true or false
return bool(stat)
What is the value of numC at the end of this loop?
numC = 12
while numC > 3:
numC = numC / 2
numC =
Answer: 3
Explanation:
What is the value of numC at the end of this loop?
numC = 12
while numC > 3:
numC = numC / 2
numC =
The initial numC value = 12
Condition : while numC is greater than 3 ; 12 > 3 (condition met)
The expression numC / 2 is evaluated
numC / 2 = 12 / 2 = 6
numC then becomes 6 ;
Condition : while numC is greater than 3 ; 6 > 3 (condition met)
numC / 2 = 6 /2 = 3
numC = 3
Condition : while numC is greater than 3 ; 3 > 3 (condition not met)
Loop terminates
numC = 3
If you set your margins to be 0.5" all around, you would say these are ____
margins.
a. wide
b. standard
c. narrow
d. custom
Answer:
Narrow
Explanation:
According to the vulnerability assessment methodology, vulnerabilities are determined by which 2 factors?
Answer:
3 and 60!
Explanation:
PHP is based on C rather than ______.
Select one:
a. PEARL
b. JAVA
c. PERL
d. COBOL
Answer:
The answer is "option b and option d"
Explanation:
In this question, both choice "b and c" is correct because Java is compiled and run on a JVM and it uses the byte code. On the other hand, PHP has interpreted language, that compiled into the bytecode after that the output engine interpreted. Similarly, the COBOL is used for enterprise, finance, and administrative systems, and PHP is used in web creation.
A LAN Uses category 6 cabling. An issue with the connection results in network link to get degeneration and Only one device can communicate at a time. What is the connection operating at?
Half duplex
Simplex
Partial
Full Duplex
Answer:
partial
Explanation:
Last one, this is fashion marketing and I need to know the answer to get the 80%
Answer:
D. It requires that each item of stock is counted and recorded to determine stock levels
Explanation:
A perpetual system of inventory can be defined as a method of financial accounting, which involves the updating informations about an inventory on a continuous basis (in real-time) as the sales or purchases are being made by the customers, through the use of enterprise management software applications and a digitized point-of-sale (POS) equipment.
Under a perpetual system of inventory, updates of the journal entry for cost of goods sold or received would include debiting accounts receivable and crediting sales immediately as it is being made or happening.
Hence, an advantage of the perpetual system of inventory over the periodic system of inventory is that, it ensures the inventory account balance is always accurate provided there are no spoilage, theft etc.
The following are the characteristic of a perpetual inventory system;
I. It is the most popular choice for modern business.
II. Inventory is updated in near real-time.
III. It provides up-to-date balance information and requires fewer physical counts.
Write a function that receives three StaticArrays where the elements are already i n sorted order and returns a new Static Array only with those elements that appear i n all three i nput arrays. Original arrays should not be modified. If there are no elements that appear i n all three i nput arrays, return a Static Array with a single None element i n i t.
Answer:
Explanation:
The following code is written in Python. It is a function that takes the three arrays as parameters. It loops over the first array comparing to see if a number exists in the other arrays. If it finds a number in all three arrays it adds it to an array called same_elements. Finally, it prints the array.
def has_same_elements(arr1, arr2, arr3):
same_elements = []
for num1 in arr1:
if (num1 in arr2) and (num1 in arr3):
same_elements.append(num1)
else:
continue
print(same_elements)
g n this program, you will prompt the user for three numbers. You need to check and make sure that all numbers are equal to or greater than 0 (can use an if or if/else statement for this). You will then multiply the last two digits together, and add the result to the first number. The program should then start over, once again asking for another three numbers. This program should loop indefinitely in this way. If the user enters a number lower than 0, remind the user that they need to enter a number greater than or equal to 0 and loop the program again.
Answer:
In Python:
loop = True
while(loop):
nm1 = float(input("Number 1: "))
nm2 = float(input("Number 2: "))
nm3 = float(input("Number 3: "))
if (nm1 >= 0 and nm2 >= 0 and nm3 >= 0):
result = nm2 * nm3 + nm1
print("Result: "+str(result))
loop = True
else:
print("All inputs must be greater than or equal to 0")
loop = True
Explanation:
First, we set the loop to True (a boolean variable)
loop = True
This while loop iterates, indefinitely
while(loop):
The next three lines prompt user for three numbers
nm1 = float(input("Number 1: "))
nm2 = float(input("Number 2: "))
nm3 = float(input("Number 3: "))
The following if condition checks if all of the numbers are greater than or equal to 0
if (nm1 >= 0 and nm2 >= 0 and nm3 >= 0):
If yes, the result is calculated
result = nm2 * nm3 + nm1
... and printed
print("Result: "+str(result))
The loop is then set to true
loop = True
else:
If otherwise, the user is prompted to enter valid inputs
print("All inputs must be greater than or equal to 0")
The loop is then set to true
loop = True
Instructions
An object's momentum is its mass multiplied by its velocity. Write a program that accepts an object's mass (in kilograms) and velocity (in meters per second) as inputs, and then outputs its momentum. Below is an example of the progam input and output:
Mass: 5
Velocity: 2.5
The object's momentum is 12.5
Answer:
mass = float(input("Mass: "))
velocity = float(input("Velocity: "))
momentum = mass * velocity
print("The object's momentum is ", momentum)
Explanation:
*The code is in Python.
Ask the user to enter the mass and velocity. Since both of the values could be decimal numbers, cast them as float
Calculate the momentum using given information, multiply mass by velocity
Print the momentum as example output
Please select the word from the list that best fits the definition Asking for review material for a test
Answer:
B
Explanation:
Answer:
B is the answer
Explanation:
b) Develop a truth table for expression AB+ C.
Consider the definition of the Person class below. The class uses the instance variable adult to indicate whether a person is an adult or not.
public class Person
{
private String name;
private int age;
private boolean adult;
public Person (String n, int a)
{
name = n;
age = a;
if (age >= 18)
{
adult = true;
}
else
{
adult = false;
}
}
}
Which of the following statements will create a Person object that represents an adult person?
a. Person p = new Person ("Homer", "adult");
b. Person p = new Person ("Homer", 23);
c. Person p = new Person ("Homer", "23");
d. Person p = new Person ("Homer", true);
e. Person p = new Person ("Homer", 17);
Answer:
b. Person p = new Person ("Homer", 23);
Explanation:
The statement that will create an object that represents an adult person would be the following
Person p = new Person ("Homer", 23);
This statement creates a Person object by called the Person class and saving it into a variable called p. The Person method is called in this object and passed a string that represents the adult's name and the age of the adult. Since the age is greater than 18, the method will return that adult = true.
The other options are either not passing the correct second argument (needs to be an int) or is passing an int that is lower than 18 meaning that the method will state that the individual is not an adult.
What is the relationship between an object and class in an OOP program?
The object contains classes.
The object and class are the same thing.
The object is used to create a class.
The object in a program is called a class.
Answer:
D. The object in a program is called a class.
Explanation:
Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995. Java was designed by a software engineer called James Gosling and it is originally owned by Oracle.
In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.
Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.
Hence, the relationship between an object and class in an OOP program is that the object in a program is called a class.
For example, if you declare a class named dog, the objects would include barking, color, size, breed, age, etc. because they are an instance of a class and as such would execute a method defined in the class.