Help pls


The first class:


package assignment2;


import java.util.Random;


public class Deck {

public static String[] suitsInOrder = {"clubs", "diamonds", "hearts", "spades"};

public static Random gen = new Random();


public int numOfCards; // contains the total number of cards in the deck

public Card head; // contains a pointer to the card on the top of the deck


/*

* TODO: Initializes a Deck object using the inputs provided

*/

public Deck(int numOfCardsPerSuit, int numOfSuits) {

/**** ADD CODE HERE ****/

}


/*

* TODO: Implements a copy constructor for Deck using Card.getCopy().

* This method runs in O(n), where n is the number of cards in d.

*/

public Deck(Deck d) {

/**** ADD CODE HERE ****/

}


/*

* For testing purposes we need a default constructor.

*/

public Deck() {}


/*

* TODO: Adds the specified card at the bottom of the deck. This

* method runs in $O(1)$.

*/

public void addCard(Card c) {

/**** ADD CODE HERE ****/

}


/*

* TODO: Shuffles the deck using the algorithm described in the pdf.

* This method runs in O(n) and uses O(n) space, where n is the total

* number of cards in the deck.

*/

public void shuffle() {

/**** ADD CODE HERE ****/

}


/*

* TODO: Returns a reference to the joker with the specified color in

* the deck. This method runs in O(n), where n is the total number of

* cards in the deck.

*/

public Joker locateJoker(String color) {

/**** ADD CODE HERE ****/

return null;

}


/*

* TODO: Moved the specified Card, p positions down the deck. You can

* assume that the input Card does belong to the deck (hence the deck is

* not empty). This method runs in O(p).

*/

public void moveCard(Card c, int p) {

/**** ADD CODE HERE ****/

}


/*

* TODO: Performs a triple cut on the deck using the two input cards. You

* can assume that the input cards belong to the deck and the first one is

* nearest to the top of the deck. This method runs in O(1)

*/

public void tripleCut(Card firstCard, Card secondCard) {

/**** ADD CODE HERE ****/

}


/*

* TODO: Performs a count cut on the deck. Note that if the value of the

* bottom card is equal to a multiple of the number of cards in the deck,

* then the method should not do anything. This method runs in O(n).

*/

public void countCut() {

/**** ADD CODE HERE ****/

}


/*

* TODO: Returns the card that can be found by looking at the value of the

* card on the top of the deck, and counting down that many cards. If the

* card found is a Joker, then the method returns null, otherwise it returns

* the Card found. This method runs in O(n).

*/

public Card lookUpCard() {

/**** ADD CODE HERE ****/

return null;

}


/*

* TODO: Uses the Solitaire algorithm to generate one value for the keystream

* using this deck. This method runs in O(n).

*/

public int generateNextKeystreamValue() {

/**** ADD CODE HERE ****/

return 0;

}



public abstract class Card {

public Card next;

public Card prev;


public abstract Card getCopy();

public abstract int getValue();


}


public class PlayingCard extends Card {

public String suit;

public int rank;


public PlayingCard(String s, int r) {

this.suit = s.toLowerCase();

this.rank = r;

}


public String toString() {

String info = "";

if (this.rank == 1) {

//info += "Ace";

info += "A";

} else if (this.rank > 10) {

String[] cards = {"Jack", "Queen", "King"};

//info += cards[this.rank - 11];

info += cards[this.rank - 11].charAt(0);

} else {

info += this.rank;

}

//info += " of " + this.suit;

info = (info + this.suit.charAt(0)).toUpperCase();

return info;

}


public PlayingCard getCopy() {

return new PlayingCard(this.suit, this.rank);

}


public int getValue() {

int i;

for (i = 0; i < suitsInOrder.length; i++) {

if (this.suit.equals(suitsInOrder[i]))

break;

}


return this.rank + 13*i;

}


}


public class Joker extends Card{

public String redOrBlack;


public Joker(String c) {

if (!c.equalsIgnoreCase("red") && !c.equalsIgnoreCase("black"))

throw new IllegalArgumentException("Jokers can only be red or black");


this.redOrBlack = c.toLowerCase();

}


public String toString() {

//return this.redOrBlack + " Joker";

return (this.redOrBlack.charAt(0) + "J").toUpperCase();

}


public Joker getCopy() {

return new Joker(this.redOrBlack);

}


public int getValue() {

return numOfCards - 1;

}


public String getColor() {

return this.redOrBlack;

}

}


}


Second class:


package assignment2;



public class SolitaireCipher {

public Deck key;


public SolitaireCipher (Deck key) {

this.key = new Deck(key); // deep copy of the deck

}


/*

* TODO: Generates a keystream of the given size

*/

public int[] getKeystream(int size) {

/**** ADD CODE HERE ****/

return null;

}


/*

* TODO: Encodes the input message using the algorithm described in the pdf.

*/

public String encode(String msg) {

/**** ADD CODE HERE ****/

return null;

}


/*

* TODO: Decodes the input message using the algorithm described in the pdf.

*/

public String decode(String msg) {

/**** ADD CODE HERE ****/

return null;

}


}

Help PlsThe First Class:package Assignment2;import Java.util.Random;public Class Deck {public Static

Answers

Answer 1

Answer:

Uhh- you sure you were not putting gibberish? orr-

Explanation:


Related Questions

Which of the following are features of the HTTPS protocol?

Answers

Answer:

All traffic is encrypted. No one on your network can see what is going on (except for knowing where those packets are going to).

The identity of the remote server can be verified using certificates. So you also know that it really is your bank that you are talking to.

Optionally (and not in wide-spread use), the identity of the client can also be verified using certificates. This would allow for secure login to a site using chip cards instead of (or in addition to) password

Hyper Text Transfer Protocol (HTTP) and Secure HTTP are the same protocol from a standpoint of passing or blocking them with a firewall is false.

What are HTTP's (Hyper Text Transfer) fundamental features?

Basic HTTP (Hyper Text Transfer) is the Characteristics. It has the protocol that has enables communication in between web browsers and the servers. It has the protocol for the requests and answers. By default, it connects to the secure TCP connections on port 80.

Hypertext Transfer Protocol Secure (HTTPS) is an add-on to the Hypertext Transfer Protocol. It has been used for safe communication over a computer network and is widely used on the Internet. In HTTPS, the transmit protocol is encrypted using Transport Layer Security(TLS) or, formerly, Secure Sockets Layer(SSL).

The difference between HTTPS uses TLS (SSL) to encrypt normal HTTP requests and responses. HTTPS is the secure version of HTTP, which is the primary protocol used to send data between a web browser and a website.

Learn more about HTML files on:

https://brainly.com/question/10663873

#SPJ3

1. Create a Java program.
2. The class name for the program should be 'RandomDistributionCheck'.
3. In the main method you should perform the following:
a. You should generate 10,000,000 random numbers between 0 - 19.
b. You should use an array to hold the number of times each random number is generated.
c. When you are done, generating random numbers, you should output the random number, the number of times it occurred, and the percentage of all occurrences. The output should be displayed using one line for each random number.
d. Use named constants for the number of iterations (10,000,000) and a second named constant for the number of unique random numbers to be generated (20).

Answers

Answer:

In Java:

import java.util.*;

public class RandomDistributionCheck{

   public static void main(String[] args) {

       final int iter = 10000000;

       final int unique = 20;

       Random rd = new Random();

       int [] intArray = new int[20];

       for(int i =0;i<20;i++){    intArray[i]=0;    }

       for(int i =0; i<iter; i++){

           int rdd = rd.nextInt(20);

           intArray[rdd]++;    }

       System.out.println("Number\t\tOccurrence\tPercentage");

       for(int i =0;i<unique;i++){

           System.out.println(i+"\t\t"+intArray[i]+"\t\t"+(intArray[i]/100000)+"%");

       }    } }

Explanation:

This declares the number of iteration as constant

       final int iter = 10000000;

This declares the unique number as constant

       final int unique = 20;

This creates a random object

       Random rd = new Random();

This creates an array of 20 elements

       int [] intArray = new int[20];

This initializes all elements of the array to 0

       for(int i =0;i<20;i++){    intArray[i]=0;    }

This iterates from 1 to iter

       for(int i =0; i<iter; i++){

This generates a random number

           int rdd = rd.nextInt(20);

This increments its number of occurrence

           intArray[rdd]++;    }

This prints the header

       System.out.println("Number\t\tOccurrence\tPercentage");

This iterates through the array

       for(int i =0;i<unique;i++){

This prints the required output

           System.out.println(i+"\t\t"+intArray[i]+"\t\t"+(intArray[i]/100000)+"%");

       }  

Use the drop-down menu to complete the sentences about the benefits of flowcharts.

Flowcharts are a good choice because they -are easy-
to understand.
Flowcharts are -graphical-
representations of the solution.
Flowcharts can be used to -map out-
a solution.

Answers

Answer:

c,a,c using the drop down menus edge 2021

GOODLUCK

Explanation:

Answer:

C , A, and C

Explanation:

Which operating system user interface does not reside on the computer but rather in the cloud on a web server?

Answers

Efficiency is not a type of user interface

Select the correct answer.
David gets a new job as a manager with a multinational company. On the first day, he realizes that his team consists of several members from diverse cultural backgrounds. What strategies might David use to promote an appreciation of diversity in his team?
A.
Promote inclusion, where he can encourage members to contribute in discussions.
B.
Create task groups with members of the same culture working together.
C.
Allow members time to adjust to the primary culture of the organization.
D.
Provide training on the primary culture to minority groups only if there are complaints against them.

Answers

C because it’s the smartest thing to do and let the other people get used to each other

Answer:

A.

Explanation:

If we were to go with B, then it would exclude others from different cultures, doing what he is trying to.

If we went with C, then they wouldn't get along very well, because no one likes to be forced into a different religion.

If we went with D, he wants an appreciation, so training some people to change religions if there are complaints, is not going to cut it. Therefore, we have A. Which I do not need to explain.

Consider the following statement, which is intended to create an ArrayList named years that can be used to store elements both of type Integer and of type String. /* missing code */ = new ArrayList(); Which of the following can be used to replace /* missing code */ so that the statement compiles without error?

a. ArrayList years
b. ArrayList years()
c. ArrayList years[]
d. ArrayList years
e. ArrayList years

Answers

Answer:

a. ArrayList years

Explanation:

Required

Complete the code segment

The programming question is about Java programming language.

In java, the syntax to declare an ArrayList of no specific datatype is:

ArrayList [List-name] = new ArrayList();

From the question, the name of the ArrayList is years.

So, the syntax when implemented is:

ArrayList years = new ArrayList();

So, the comment /*missing code*/ should be replaced with: ArrayList years

The option that can be used to replace /* missing code */ so that the statement compiles without error is;

A: ArrayList years

This question deals with programming language in Java.

Now, from the question, we are dealing with an ArrayList and In java, the syntax that is used to declare an ArrayList of no specific data type is given as;

ArrayList [Lists name] = new ArrayList();

Now, in the question the list name is given as "years". Thus;

The correct statement to replace /* missing code */ so without errors is;

ArrayList years.

Read more about Java syntax at; https://brainly.com/question/18257856

Which of these are examples of how forms are
used? Check all of the boxes that apply.
to input patient information at a doctor's office
O to store thousands of records
to check out books from a library
to choose snacks to buy from a vending
machine

Answers

Answer:to input patient information at a doctors office

To check out books from a library

To choose snacks to buy from a vending machine

Explanation:

A. To input patient information at a doctor's office, C. To check out books from a library, and D. To choose snacks to buy from a vending machine are examples of how forms are used. Therefore option A, C and D is correct.

Forms are used in various settings and scenarios to collect and manage data efficiently.

In option A, forms are utilized at doctor's offices to input and record patient information, streamlining the registration and medical history process.

In option C, library check-out forms help manage book borrowing, recording details like due dates and borrower information. Option D showcases how vending machines use forms to present snack options, allowing users to make selections conveniently.

All these examples demonstrate the versatility of forms as tools for data collection, organization, and user interaction, contributing to smoother operations and improved user experiences in different domains.

Therefore options A To input patient information at a doctor's office, C To check out books from a library, and D To choose snacks to buy from a vending machine are correct.

Know more about vending machines:

https://brainly.com/question/31381219

#SPJ5

Write a function called 'game_of_eights()' that accepts a list of numbers as an argument and then returns 'True' if two consecutive eights are found in the list. For example: [2,3,8,8,9] -> True. The main() function will accept a list of numbers separated by commas from the user and send it to the game_of_eights() function. Within the game_of_eights() function, you will provide logic such that: the function returns True if consecutive eights (8) are found in the list; returns False otherwise. the function can handle the edge case where the last element of the list is an 8 without crashing. the function prints out an error message saying 'Error. Please enter only integers.' if the list is found to contain any non-numeric characters. Note that it only prints the error message in such cases, not 'True' or 'False'. Examples: Enter elements of list separated by commas: 2,3,8,8,5 True Enter elements of list separated by commas: 3,4,5,8 False Enter elements of list separated by commas: 2,3,5,8,8,u Error. Please enter only integers.

Answers

Answer:

In Python:

def main():

   n = int(input("List items: "))

   mylist = []

   for i in range(n):

       listitem = input(", ")

       if listitem.isdecimal() == True:

           mylist.append(int(listitem))

       else:

           mylist.append(listitem)

   print(game_of_eights(mylist))

def game_of_eights(mylist):

   retVal = "False"

   intOnly = True

   for i in range(len(mylist)):

       if isinstance(mylist[i],int) == False:

           intOnly=False

           retVal = "Please, enter only integers"

       if(intOnly == True):

           for i in range(len(mylist)-1):

               if mylist[i] == 8 and mylist[i+1]==8:

                   retVal = "True"

                   break

   return retVal

if __name__ == "__main__":

   main()

Explanation:

The main begins here

def main():

This gets the number of list items from the user

   n = int(input("List items: "))

This declares an empty list

   mylist = []

This iterates through the number of list items

   for i in range(n):

This gets input for each list item, separated by comma

       listitem = input(", ")

Checks for string and integer input before inserting item into the list

       if listitem.isdecimal() == True:

           mylist.append(int(listitem))

       else:

           mylist.append(listitem)

This calls the game_of_eights function

   print(game_of_eights(mylist))

The game_of_eights function begins here

def game_of_eights(mylist):

This initializes the return value to false

   retVal = "False"

This initializes a boolean variable to true

   intOnly = True

This following iteration checks if the list contains integers only

   for i in range(len(mylist)):

If no, the boolean variable is set to false and the return value is set to "integer only"

       if isinstance(mylist[i],int) == False:

           intOnly=False

           retVal = "Please, enter only integers"

This is executed if the integer contains only integers

       if(intOnly == True):

Iterate through the list

           for i in range(len(mylist)-1):

If consecutive 8's is found, update the return variable to True

               if mylist[i] == 8 and mylist[i+1]==8:

                   retVal = "True"

                   break

This returns either True, False or Integer only

   return retVal

This calls the main method

if __name__ == "__main__":

   main()

Let X and Y be two decision problems. Suppose we know that X reduces to Yin polynomial time. Which of the following statements are true?Explain
a. If Y is NP-complete then so is X.
b. If X is NP-complete then so is Y.
c. If Y is NP-complete and Xis in NP then X is NP-complete.
d. If X is NP-complete and Y is in NP then Y is NP-complete.
e. If X is in P, then Y is in P.
f. If Y is in P, then X is in P.
g. X and Y can't both be in NP

Answers

Answer:

d. If X is NP - complete and Y is in NP then Y is NP - complete.

This can be inferred

Explanation:

The statement d can be inferred, rest of the statements cannot be inferred. The X is in NP complete and it reduces to Y. Y is in NP and then it is NP complete. The Y is not in NP complete as it cannot reduce to X. The statement d is inferred.

Summary
You will write a racing report program using object-oriented programming with three classes:
ReportDriver, RaceReport, and Race. The main method of the program will be in the
class ReportDriver and will include a loop that allows you to enter in more than one race and
have reports written out for all the races you enter. (The user will enter one race then get a report for that race. After that, the user will be asked whether they want to enter in another race and get another report. This repeats until the user says they do not want to enter in any more races.)
Program Description
There are two major tasks in this assignment. Your first major task is to write a program that collects three pieces of user input about a race and provides a summary of facts about the race. Input will be via the keyboard and output (i.e., the summary of facts) will be via the display (a.k.a., console window). The three pieces of user input will be the three individual race times that correspond the first, second, and third top race finishers; your program will prompt the user to enter these in via the keyboard. Note that you cannot assume these times will be in order; putting them in order is one of the first things your program should do. Thus, your program will need to do the following:
1. Prompt the user for three ints or doubles, which represent the times for the three racers.
2. Sort the three scores into ascending order (i.e., least to greatest).
(a) Remember, to swap two variables requires a third, temporary variable.
(b) See the Math class (documented in Savitch Ch. 5; see the index for the exact location
. . . this is good practice for looking things up) for methods that might help you (e.g.,
min and max). Note that these methods produce a return value.
(c) Output the sorted race scores in order.
3. Describe the overlap in times, if any exist. The options will be:
(a) All are tied for first.
(b) Some are tied for first.
(c) None are tied for first.
4. Do step (4) for the second and third place finishes.
5. Output the range of the race scores.
6. Output the average of the race scores.
There are, of course, many different ways of writing this program. However, if you decompose
your tasks into smaller chunks, attacking a larger program becomes more manageable. If you
mentally divided up the tasks before you, you might have decided on the following list of "work
items", "chunks", or "modules":
Data Input: Ask the user for three race scores (in no particular order).
Ordering Data: Order the race scores by first, second, and third place.
Data Analysis and Output:
– Determine how many racers tied for first, second or third place (i.e., how many overlap
times) and output result to console.
– Calculate the range of the race scores (i.e., the absolute value of the slowest minus the
fastest times) and output result to console.
2 – Calculate the average of the race times and output result to console.

Answers

Answer:dddd

Explanation:

//The code is all written in Java and here are the three classes in order ReportDriver, RaceReport, and Race

class ReportDriver {

   

   public static void main(String[] args) {

       boolean continueRace = true;

       Scanner in = new Scanner(System.in);

       ArrayList<ArrayList<Integer>> races = new ArrayList<>();

       while (continueRace == true) {

           System.out.println("Would you like to enter into a race? Y or N");

           char answer = in.next().toLowerCase().charAt(0);

           if (answer == 'y') {

               Race race = new Race();

               races.add(race.Race());

           } else {

               break;

           }

       }

       for (int x = 0; x <= races.size()-1; x++) {

           RaceReport report = new RaceReport();

           report.RaceReport(races.get(x));

           report.printRange();

           report.printAverage();

       }

   }

}

//++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

package sample;

import java.util.ArrayList;

public class RaceReport {

   int range, average;

   String first, second, third;

   public void RaceReport(ArrayList<Integer> times) {

       if (times.get(2) == times.get(1)) {

           if (times.get(2) == times.get(0)) {

               System.out.println(first = "Times tied for first place are " + times.get(2) + " and " + times.get(1) + " and " + times.get(0));

           } else {

               System.out.println(first = "Times tied for first place are " + times.get(2) + " and " + times.get(1));

               System.out.println(second = "Second place time is " + times.get(0));

           }

       } else if (times.get(1) == times.get(0)) {

           System.out.println(first = "First place time is " + times.get(2));

           System.out.println(second = "Times tied for Second place are " + times.get(1) + " and " + times.get(0));

       } else {

           System.out.println(first = "First place time is " + times.get(2));

           System.out.println(second = "Second place time is " + times.get(1));

           System.out.println( third = "Third place time is " + times.get(0));

       }

       range = Math.abs(times.get(0) - times.get(2));

       average = (times.get(2) + times.get(1) + times.get(0) / 3);

   }

   public void printRange() {

       System.out.println("The range of the race was " + range);

   }

   public void printAverage() {

       System.out.println("The average of the race was " + average);

   }

}

//++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

package sample;

import java.util.ArrayList;

import java.util.Collections;

import java.util.Scanner;

public class Race {

   Scanner in = new Scanner(System.in);

   ArrayList<Integer> times = new ArrayList<>();

   public ArrayList<Integer> Race() {

       System.out.println("Input time 1:");

       times.add(in.nextInt());

       System.out.println("Input time 2:");

       times.add(in.nextInt());

       System.out.println("Input time 3:");

       times.add(in.nextInt());

       Collections.sort(times);

       return times;

   }

}

does anyone know what functions to write for the rock paper scissors app in code.org (Lesson 4: parameters and return make)?

Answers

Answer:

Explanation:

Based on the example of the app on the website there are two main functions that are needed. The first is the updatecomputer_resultbox function which creates the choice for the computer in the game whether it is rock, paper, or scissors. The second function would be the calculate_winner function which compares your choice with the computers choice and decides on who won. The rest of the needed functions are the event functions to handle the clicks on each one of the games buttons such as play, rock, paper, scissor, and end game/replay.

Interstate highway numbers Primary U.S. interstate highways are numbered 1-99. Odd numbers (like the 5 of 95) go north/south, and evens (like the 10 or 90) go east/west. Auxiliary highways are numbered 100-999, and service the primary highway indicated by the rightmost two digits. Thus, I-405 services 1-5, and I-290 services -90. Given a highway number, indicate whether it is a primary or auxiliary highway. If auxiliary, indicate what primary highway it serves. Also indicate if the (primary) highway runs north/south or east/west. Ex: If the input is 90 the output is I-90 is primary, going east/west. Ex: If the input is 290 the output is I-290 is auxiliary, serving 1-90, going cast/west. Ex: If the input is: 0 the output is O is not a valid interstate highway number. See Wikipedia for more info on highway numbering. main.py Load default templ else 1 nighway_number - int(input) 2 Type your code here. " 4 if highway_number - 0: 5 print(highway_number, 'is not a valid interstate highway number.') 6 if highway_number in range(1, 99-1): 7 if highway..number % 2 - : 8 print('I-' highway number, "is primary, going east/west.") 9 print("I-' highway_number, "is primary, going north/south." 11 else: 12 served - highway_number % 100 13 if highway number - 1000: print highway_number, 'is not a valid Interstate highway number.') 15 if highway number in range(99, 999.1): 16 if highway_number 2 - 0 print('I..highway_number, 'is auxiliary, serving I.', 'x.f.' Xserved, 'going eastwest.) 18 else: print('1', highway_number, 'is auxiliary, rving I-','%.f.' Xserved, 'going north/south.) 10 14 17 19 Develop mode Submit mode When done developing your program press the Submit for grading button below. This will submit your program for auto-grading. Submit for grading Sature of your work Input 90 Your output I- 90 is primary, going east/west. Expected output I-90 is primary, going east/west. 0 2: Auxiliary (290) Output is nearly correct; but whitespace differs. See highlights below. Special character legend Input 290 Your output 1- 290 is auxiliary, serving I- 90, going east/west. I-290 is auxiliary, serving 1-90, going east/west. Expected output 3 Invalid (0) 1/1 Input 0 Your output is not a valid interstate highway number. 4. Compare output 0/2 Output is nearly correct; but whitespace differs. See highlights below Special character legend Input Your output

Answers

Answer:

See attachment for complete solution

Explanation:

The program in your question is unreadable.

So, I started from scratch (see attachment for complete solution)

Using the attached file as a point of reference.

The program has 15 lines

Line 1: Prompt the user for highway number (as an integer)

Line 2: Convert the user input to string

Line 3: Check if highway number is outside 1-999

Line 4: If line 3 is true, print a notice that the input is outside range

Line 5: If line 3 is not true

Line 6: Check if the number of highway digits is 2.

Line 7: If true, Check if highway number is an even number

Line 8: If even, print that the highway is primary and heads east/west

Line 9: If highway number is odd number

Line 10: Print that the highway is primary and heads north/south

Line 11: If the number of highway digits is 3

Line 12: Check if highway number is an even number

Line 13: If even, print that the highway is auxiliary and heads east/west

Line 14: If highway number is odd number

Line 15: Print that the highway is auxiliary and heads north/south

See attachment for complete program

How many different values can a bit have?
16
2
4.
8

Answers

Answer:

A bit can only have 2 values

Question 21
What is the minimum sum-of-products expression for the following Kmap?
AB
00
01
11
10
CD
00
1
0
01
0
0
0
O
11
0
0
1
1
10
1
1
1
1

Answers

Answer:

1010010010001010

Explanation:

0100101010010101010

In a database table, the category of information is called ______________
Question 2 options:


Record


Tuple


Field


None of the above

Answers

Answer:

the answer is A.) A record

Explanation:

In database, the category of information is A. Record.

What is a database?

A database simply means the collection of information that can be accessed in future. This is important to safeguard the information.

In this case, in a database table, the category of information is called a record. This is vital to keep documents.

Learn more about database on:

https://brainly.com/question/26096799

Susan is a hotel receptionist and checking in a block of rooms for a sports team. All seems to go well, and she checks in the full group. Later in her shift, 2 more players arrive needing a room in the block, but all the rooms have been noted as taken. The coordinator for the group confirms the number of rooms has not changed, and thus there must be one room accidentally checked in. Unfortunately, Susan did not note down which rooms she gave keys out to, and the computer did not list which keys were currently active for each room. How did this mistake happen

Answers

Answer:

This mistake is clearly a result of human and design error

Explanation:

Design errors are those errors that cause human beings to make mistakes.

This question says that the computer did not state the keys that were available for each room. This must have given off the impression that all rooms were occupied to Susan.

On her own part, her failure to note the rooms that she gave out their keys is part of why this mistake happened. This is human error from her part.

COMPUTER STUDIES
31.
Which of the following information
ages lasted between the end of
Bronze age and the spread of Roman
Empire?
A.
B.
C.
D.
E.
Electronic
Industrial
Iron
Mechanical
Stone

Answers

Answer:

iron

Explanation:

(Giving brainliest to best answer, don't make an answer if you don't know or its jumble)
A relevant online media source best helps an audience

A) believe the presenter.
B)stay engaged in the topic.
C) understand the topic.
D) trust the material.

Answers

Answer:

B

Explanation:

Answer:

C

Explanation:

I just got it right on an Edge Quiz

Write a program that takes a list of integers as input. The input begins with an integer indicating the number of integers that follow. You can safely assume that the number of integers entered is always less than or equal to 10. The program then determines whether these integers are sorted in the ascending order (i.e., from the smallest to the largest). If these integers are sorted in the ascending order, the program will output Sorted; otherwise, it will output Unsorted

Answers

Answer:

is_sorted = True

sequence = input("")

data = sequence.split()

count = int(data[0])

for i in range(1, count):

   if int(data[i]) >= int(data[i+1]):

       is_sorted = False

       break

if is_sorted:

   print("Sorted")

else:

   print("Unsorted")

Explanation:

*The code is in Python.

Initialize a variable named is_sorted as True. This variable will be used as a flag if the values are not sorted

Ask the user to enter the input (Since it is not stated, I assumed the values will be entered in one line each having a space between)

Split the input using split method

Since the first indicates the number of integers, set it as count (Note that I converted the value to an int)

Create a for loop. Inside the loop, check if the current value is greater than or equal to the next value, update the is_sorted as False because this implies the values are not sorted (Note that again, I converted the values to an int). Also, stop the loop using break

When the loop is done, check the is_sorted. If it is True, print "Sorted". Otherwise, print "Unsorted"

Which of the following is the most appropriate first step to hardening a new Windows installation?
A. creating back-ups of the computer.
B. activating and defining rules for the Windows Firewall.
C. considering the computer's purpose and only installing the features and services needed to fill that purpose.
D. conducting penetration testing on the computer.

Answers

Answer:

C. considering the computer's purpose and only installing the features and services needed to fill that purpose.

Explanation:

Hardening is the process of finding out the vulnerabilities of a system and deploying measures to counter these issues. It is important to install only the features that are needed to fill the purpose of the computer. This is because having lots of unnecessary features will extend the attack surface of the system.

Therefore, the user needs to ensure that only the needed features are installed. Features and applications that have been in the system for a long time should also be uninstalled.

A realtor is studying housing values in the suburbs of Minneapolis and has given you a dataset with the following attributes: crime rate in the neighborhood, proximity to Mississippi river, number of rooms per dwelling, age of unit, distance to Minneapolis and Saint Paul Downtown, distance to shopping malls. The target variable is the cost of the house (with values high and low). Given this scenario, indicate the choice of classifier for each of the following questions and give a brief explanation.
a) If the realtor wants a model that not only performs well but is also easy to interpret, which one would you choose between SVM, Decision Trees and kNN?
b) If you had to choose between RIPPER and Decision Trees, which one would you prefer for a classification problem where there are missing values in the training and test data?
c) If you had to choose between RIPPER and KNN, which one would you prefer if it is known that there are very few houses that have high cost?

Answers

Answer:

a. decision trees

b. decision trees

c. rippers

Explanation:

a) I will choose Decision trees because these can be better interpreted compared to these other two KNN and SVM. using Decision tress gives us a better explanation than the other 2 models in this question.

b)  In a classification problem with missing values, Decision trees are better off rippers since Rippers avoid the missing values.

c) Ripper are when we know some are high cost houses.

Ask the user to input their grade percentage (e.g. the use will enter 98 if they had an overall grade of 98% in their course) for their Accounting, Marketing, Economics and MIS courses. Assume each course is worth 3 credit hours. Once you have all of their grades output what letter grade they earned for each course (e.g. Your letter grade for {Accounting/Marketing/whichever one you are outputting} is {A/B/C/D/F}). After you have output all of their letter grades, output their overall GPA for the semester using the formula:
Letter Grade Point Value for Grade
A 4.00
B 3.00
C 2.00
D 1.00
F 0.00
Example Student Transcript
Course Credit Hours Grade Grade Points
Biology 5 A 20
Biology Lab 1 B 3
English 5 C 10
Mathematics 5 F 033
16 Total Credits Attempted 33 Total Grade Points
Total Points Earned/Total Credits Attempted = Grade Point Average
33 Points Earned/16 Credits Attempted = 2.06 GPA
For more details on how to calculate your GPA, go to http://academicanswers.waldenu.edu/faq/73219 e
GPA - Convert MIS grade to letter grade using a conditional statement
GPA - Convert Accounting letter grade to points earned (can be done in same conditional as letter grade
GPA - Convert Marketing letter grade to points earned (can be done in same conditional as letter grade)
GPA-Convert Economics letter grade to points earned (can be done in same conditional as letter grade)
GPA-Convert MIS letter grade to points earned (can be done in same conditional as letter grade) GPA - Calculate the GPA
GPA-Output the letter grade for each course
GPA-Output the overall GPA for the semester

Answers

Answer:

In Python

def getpointValue(subject):

   if subject >= 75:        point = 4; grade = 'A'

   elif subject >= 60:        point = 3; grade ='B'

   elif point >= 50:        point = 2; grade = 'C'

   elif point >= 40:        point = 1; grade = 'D'

   else:        point = 0; grade = 'F'

   return point,grade

subjects= ["Accounting","Marketing","Economics","MIS"]

acct = int(input(subjects[0]+": "))

mkt = int(input(subjects[1]+": "))

eco = int(input(subjects[2]+": "))

mis = int(input(subjects[3]+": "))

acctgrade = getpointValue(acct)

print(subjects[0]+" Grade: "+str(acctgrade[1]))

mktgrade = getpointValue(mkt)

print(subjects[1]+" Grade: "+str(mktgrade[1]))

ecograde = getpointValue(eco)

print(subjects[2]+" Grade: "+str(ecograde[1]))

misgrade = getpointValue(mis)

print(subjects[3]+" Grade: "+str(misgrade[1]))

totalpoint = (acctgrade[0] + mktgrade[0] + ecograde[0] + misgrade[0]) * 3

gpa = totalpoint/12

print("GPA: "+str(gpa))

Explanation:

The solution I provided uses a function to return the letter grade and the point of each subject

I've added the explanation as an attachment where I used comment to explain difficult lines

Use the drop-down menu to complete the sentences about data flow.

The flow of data is indicated by
✔ arrows
.
The inputs, processes, and
✔ outputs
are included in a flowchart.

Answers

Answer:

1. Arrows

2. Outputs

Explanation:

As the network engineer, you are asked to design a plan for an IP subnet that calls for 25 subnets. The largest subnet needs a minimum of 750 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following lists a private IP network and mask that would meet the requirements?

a. 172.16.0.0 / 255.255.192.0
b. 172.16.0.0 / 255.255.224.0
c. 172.16.0.0 / 255.255.248.0
d. 172.16.0.0 / 255.255.254.0

Answers

Answer:

c. 172.16.0.0 / 255.255.248.0

Explanation:

The address will be 172.16.0.0 while the netmask will be 255.255.248.0.

Thus, option C is correct.

Consider a memory-management system based on paging. The total size of the physical memory is 2 GB, laid out over pages of size 8 KB. The logical address space of each process has been limited to 256 MB. a. Determine the total number of bits in the physical address. b. Determine the number of bits specifying page replacement and the number of bits for page frame number. c. Determine the number of page frames. d. Determine the logical address layout.

Answers

Answer:

A. 31 bits

B. 13 bits, 18 bits

C. 256k

Explanation:

A.

We have total size of physical memory as 2gb

This means that 2¹ x 2³⁰

Using the law of indices,

= 2³¹

So physical address is equal to 31 bits

B.

We get page size = 8kb = 2³

1 kb = 2¹⁰

2³ * 2¹⁰ = 2¹³

So page replacement = 13 bits

Page frame number

= physical address - replacement bits

= 31 - 13

= 18 bits

C.

The number of frames is given as

2¹⁸ = 2⁸ x 2¹⁰ = 256K

So number of frames = 256K

D

Logical add space is 256K

Page size= physical pages = 8kb

Logical address layout= 28biys

Page number = 15 bits

Displacement = 12 bits

256k/8k = 32 pages in address space process

Dr. Smith is teaching IT 102 and wants to determine the highest grade earned on her midterm exam. In Dr. Smith's class, there are 28 students. Midterm exam grades fall in the range of 0 to 100, inclusive of these values. Write a small program that will allow Dr. Smith to enter grades for all of her students, determine the highest grade, and output the highest grade.

Answers

Answer:

mysql

Explanation:

try building mysql database

Uma wants to create a cycle to describe the seasons and explain how they blend into each other. Which SmartArt diagram would work best for this?

Answers

Answer: SmartArt offers different ways of visually presenting information, using shapes arranged in different formations.

Explanation:SmartArt offers different ways of visually presenting information, using shapes arranged in different formations. The SmartArt feature also allows you to preview different SmartArt formations, making it very easy to change shapes and formations.

PLEASE HELP How have phones made us spoiled? How have phones made us unhappy?

Answers

phones have made us spoiled because we have everything at our fingertips. we get what we want when we see something online and we want to get it all we do is ask and most of us receive. phone have made us unhappy mentally and physically because we see how other people have it like richer for instance and we want that and we get sad about weird things because of what we see like other peoples body’s how skinny someone is and how fat someone is it makes us sad because we just want to be like them.

In cell 14, calculate


the profit by


subtracting the


donation from the


streaming revenues.

Answers

Answer:

See Explanation

Explanation:

The question is incomplete as the cells that contains donation and streaming revenues are not given

So, I will make the following assumption:

H4 = Donations

G4 =  Streaming Revenues

So, the profit will be:

Enter the following formula in cell I4

=(G4 - H4)

To get the actual solution in your case, replace G4 and H4 with the proper cell names

Use the drop-down menus to complete statements about audio file formats.

The most common file format for consumer storage and playback is ___
The __ audio file was originally used on Apple computers.
The main audio format used in Microsoft Windows is __

Answers

Answer: 1. .mp3 2. .aiff 3. .wav

Explanation:

I got it right

Answer:

.mp3

.aiff

.wav

Explanation:

hope this helps :)

Other Questions
Please help me on math and explain how to get the answer. -3 = 3/4r + 2find r PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!!PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! PLSSS HELPPPP I WILLL GIVE YOU BRAINLIEST!!!!!! How can a frog camouflage itself? Find the percent of decrease from $60 to $48. Round the percent to the nearest tenth if necessary. can someone help me with this please When you hear thunder from far away, does it have a high pitch or a low pitch? Explain. What types of sound waves diffract more than others? In supply and demand theory, an increase in consumer income for a normal good will: A. Shift the demand curve in and to the left, lowering the equilibrium price but raising the equilibrium quantity. B. Shift the demand curve out and to the right, raising the equilibrium price and quantity. C. Shift the supply curve out and to the right, lowering the equilibrium price but raising the equilibrium quantity. D. Shift the supply curve in and to the left, lowering the equilibrium price and quantity. E. Shift the demand curve out and to the right, lowering the equilibrium price but raising the equilibrium quantity. make all questions.......... how many miligrams are equal to 8 grams Four friends share 1/4 of a gallon of lemonade equally. What fraction of the gallon of lemonade does each friend get? True or False: The relationship is a proportional relationship. I need help ASAP plz Which list of points are solutions to the graph of y=12x2?A.(8,4),(10,5),(12,6)B.(20,8),(30,13),(40,18)C.(20,8),(30,13),(40,18)D.(8,10),(10,12),(12,14) Please answer please A right triangle has a base of 6 inches and a height of 10 inches.What is the area of the triangle Answer choices 1) 842) 1683) 1924) 88PLEASE HELP ASAP An 8 ounce mug requires 0.3 cup of hot cocoa mix. How much hot cocoa mix is needed for a 12 ounce mug? Please help and thanks in advance Add 0.65 and 0.24. How many tenths are in the sum? Umatilla Bank and Trust is considering giving Sandhill Co. a loan. Before doing so, it decides that further discussions with Sandhills accounting may be desirable. One area of particular concern is the Inventory account, which has a year-end balance of $269,380. Discussions with the accountant reveal the following. 1. Sandhill shipped goods costing $55,680 to Hemlock Company FOB shipping point on December 28. The goods are not expected to reach Hemlock until January 12. The goods were not included in the physical inventory because they were not in the warehouse. 2. The physical count of the inventory did not include goods costing $100,770 that were shipped to Sandhill FOB destination on December 27 and were still in transit at year-end. 3. Sandhill received goods costing $24,220 on January 2. The goods were shipped FOB shipping point on December 26 by Yanice Co. The goods were not included in the physical count. 4. Sandhill shipped goods costing $53,270 to Ehler of Canada FOB destination on December 30. The goods were received in Canada on January 8. They were not included in Sandhill physical inventory. 5. Sandhill received goods costing $40,510 on January 2 that were shipped FOB destination on December 29. The shipment was a rush order that was supposed to arrive December 31. This purchase was included in the ending inventory of $269,380. Determine the correct inventory amount on December 31. It was rough stuff, that tough luck. a alliteration b assonance