How is kerning used in Word?

Answers

Answer 1

Answer:

Following are the uses of kerning in the word is given below .

Explanation:

The keening in the Microsoft word is the method of pushing the characters nearer in by removing the unnecessary space between the character Following are the steps of using the kerning in the Microsoft word .

Choose the text that the user wanted kerning in the word .Pressing the Ctrl+D it showing the dialog box.After that there are number of option are seen then tap the check box of the  Kerning of fonts.Fedding the option of spacing as per the user need .Finally click on the "ok" option. It will make apply the kerning  in the Microsoft word
Answer 2

Answer:

to adjust the spacing between characters that make up a word

Explanation:


Related Questions

Many treadmills output the speed of the treadmill in miles per hour (mph) on the console, but most runners think of speed in terms of a pace. A common pace is the number of minutes and seconds per mile instead of mph. Write a program that starts with a quantity in mph and converts the quantity into minutes and seconds per mile. As an example, the proper output for an input of 6.5 mph should be 9 minutes and 13.8 seconds per mile. If you need to convert a double to an int, which will discard any value after the decimal point, then you may use intValue

Answers

Answer:

This question is answered using C++ programming language.

This program does not make use of comments; However, see explanation section for detailed line by line explanation.

The program starts here

#include <iostream>

using namespace std;

int main()

{

 double quantity,seconds;

 int minutes;

 cout<<"Quantity (mph): ";

 cin>>quantity;

 minutes = int(60/quantity);

 cout<<minutes<<" minutes and ";

 seconds = (60/quantity - int(60/quantity))*60;

 printf("%.1f", seconds);

 cout<<" seconds per mile";

 return 0;

}

Explanation:

The following line declares quantity, seconds as double datatype

 double quantity,seconds;

The following line declares minutes as integer datatype

 int minutes;

The following line prompts user for input in miles per hour

 cout<<"Quantity (mph): ";

User input is obtained using the next line

 cin>>quantity;

 

The next line gets the minute equivalent of user input by getting the integer division of 60 by quantity

minutes = int(60/quantity);

The next statement prints the calculated minute equivalent followed by the string " minuted and " without the quotes

 cout<<minutes<<" minutes and ";

After the minutes has been calculated; the following statement gets the remainder part; which is the seconds

 seconds = (60/quantity - int(60/quantity))*60;

The following statements rounds up seconds to 1 decimal place and prints its rounded value

 printf("%.1f", seconds);

The following statement prints "seconds per mile" without the quotes

 cout<<" seconds per mile";

Following are the program to the given question:

Program Explanation:

Defining the header file.Defining the main method.Inside the method, three double variables "mph, sec, and min_per_mile", and one integer variable "min" is defined. After defining a variable "mph" is defined that inputs value by user-end.After input value, "sec, min_per_mile, and min" is defined that calculates the value and prints its calculated value.  

Program:

#include<iostream>//header file

using namespace std;

int main()//defining main method

{

   double mph,sec,min_per_mile;//defining a double variable  

int min;//defining integer variable

cout<<"Enter the speed of the treadmill in mph:";//print message

cin>>mph;//input double value

min_per_mile=(1/mph)*60;//defining a double variable that calculates minutes per mile

min=static_cast<int>(min_per_mile);//defining int variable that converts min_per_mile value into integer

sec=(min_per_mile-min)*60;//defining double variable that calculates seconds per mile value  

cout<<"A common pace is the "<<min<<" minutes and "<<sec<<" seconds per mile"<<endl;//print calculated value with message  

return 0;

}

Output:

Please find the attached file.

Learn more:

brainly.com/question/21278031

Using Python I need to Prompt the user to enter in a numerical score for a Math Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a English Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a PE Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a Science Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for an Art Class. The numerical score should be between 0 and 100. Call the letter grade function 5 times (once for each class). Output the numerical score and the letter grade for each class.

Answers

Answer:

The program doesn't use comments; See explanation section for detailed line by line explanation

Program starts here

def lettergrade(subject,score):

     print(subject+": "+str(score))

     if score >= 90 and score <= 100:

           print("Letter Grade: A")

     elif score >= 80 and score <= 89:

           print("Letter Grade: B")

     elif score >= 70 and score <= 79:

           print("Letter Grade: C")

     elif score >= 60 and score <= 69:

           print("Letter Grade: D")

     elif score >= 0 and score <= 59:

           print("Letter Grade: F")

     else:

           print("Invalid Score")

maths = int(input("Maths Score: "))

english = int(input("English Score: "))

pe = int(input("PE Score: "))

science = int(input("Science Score: "))

arts = int(input("Arts Score: "))

lettergrade("Maths Class: ",maths)

lettergrade("English Class: ",english)

lettergrade("PE Class: ",pe)

lettergrade("Science Class: ",science)

lettergrade("Arts Class: ",arts)

Explanation:

The program makes the following assumptions:

Scores between 90–100 has letter grade A

Scores between 80–89 has letter grade B

Scores between 70–79 has letter grade C

Scores between 60–69 has letter grade D

Scores between 0–69 has letter grade E

Line by Line explanation

This line defines the lettergrade functions; with two parameters (One for subject or class and the other for the score)

def lettergrade(subject,score):

This line prints the the score obtained by the student in a class (e.g. Maths Class)

     print(subject+": "+str(score))

The italicized determines the letter grade using if conditional statement

This checks if score is between 90 and 100 (inclusive); if yes, letter grade A is printed

     if score >= 90 and score <= 100:

           print("Letter Grade: A")

This checks if score is between 80 and 89 (inclusive); if yes, letter grade B is printed

     elif score >= 80 and score <= 89:

           print("Letter Grade: B")

This checks if score is between 70 and 79 (inclusive); if yes, letter grade C is printed

     elif score >= 70 and score <= 79:

           print("Letter Grade: C")

This checks if score is between 60 and 69 (inclusive); if yes, letter grade D is printed

     elif score >= 60 and score <= 69:

           print("Letter Grade: D")

This checks if score is between 0 and 59 (inclusive); if yes, letter grade F is printed

     elif score >= 0 and score <= 59:

           print("Letter Grade: F")

If input score is less than 0 or greater than 100, "Invalid Score" is printed

     else:

           print("Invalid Score")

This line prompts the user for score in Maths class

maths = int(input("Maths Score: "))

This line prompts the user for score in English class

english = int(input("English Score: "))

This line prompts the user for score in PE class

pe = int(input("PE Score: "))

This line prompts the user for score in Science class

science = int(input("Science Score: "))

This line prompts the user for score in Arts class

arts = int(input("Arts Score: "))

The next five statements is used to call the letter grade function for each class

lettergrade("Maths Class: ",maths)

lettergrade("English Class: ",english)

lettergrade("PE Class: ",pe)

lettergrade("Science Class: ",science)

lettergrade("Arts Class: ",arts)

Given positive integer numInsects, write a while loop that prints that number doubled without reaching 100. Follow each number with a space. After the loop, print a newline. Ex: If numInsects = 8, print:

8 16 32 64

#include

using namespace std;

int main() {

int numInsects = 0;

numInsects = 8; // Must be >= 1

while (numInsects < 100) {

numInsects = numInsects * 2;



cout << numInsects << " ";

}

cout << endl;

return 0;

}

So my question is what am I doing wrong?

Answers

Answer:

The cout<<numInsects<<""; statement should be placed before numInsects = numInsects * 2;  in the while loop.

Explanation:

Your program gives the following output:

16  32  64  128

However it should give the following output:

8  16  32  64

Lets see while loop to check what you did wrong in your program:

The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100.

So the body of while loop executes. numInsects = numInsects * 2;  statement in the body multiplies the value of numInsects i.e 8 with 2 and then cout << numInsects << " ";  prints the value of numInsects  AFTER the multiplication with 2 is performed. So 8 is not printed in output but instead 16 (the result of 8*2=16) is printed as the result of first iteration.

So lets change the while loop as follows:

while (numInsects < 100) {

cout << numInsects << " ";

numInsects = numInsects * 2;

Now lets see how it works.

The while loop checks if numInsects is less than 100. It is true as numInsects =8 which is less than 100

So the body of while loop executes. cout << numInsects << " "; first prints the value of numInsects i.e. 8. Next numInsects = numInsects * 2;  multiplies the value of numInsects i.e 8 with 2. So first 8 is printed on the output screen. Then the multiplication i.e. 8*2=16 is performed as the result of first iteration. So now value of numInsects becomes 16.

Next the while loop condition numInsects < 100 is again checked. It is true again as 16<100. Now cout << numInsects << " "; is executed which prints 16. After this, the multiplication is again performed and new value of numInsects becomes 32 at second iteration. This is how while loops continues to execute.

So this while loop stops when the value of numInsects exceeds 100.

Define a function is_prime that receives an integer argument and returns true if the argument is a prime number and otherwise returns false. (An integer is prime if it is greater than 1 and cannot be divided evenly [with no remainder] other than by itself and one. For example, 15 is not prime because it can be divided by 3 or 5 with no remainder. 13 is prime because only 1 and 13 divide it with no remainder.) This function may be written with a for loop, a while loop or using recursion. Use the up or down arrow keys to change the height.

Answers

Answer:

This function (along with the main)is written using python progrmming language.

The function is written using for loop;

This program does not make use comments (See explanation section for detailed line by line explanation)

def is_prime(num):

    if num == 1:

         print(str(num)+" is not prime")

    else:

         for i in range(2 , num):

              if num % i == 0:

                   print(str(num)+" is not prime because it can b divided by "+str(i)+" and "+str(int(num/i))+" with no remainder")

                   break;

         else:

              print(str(num) + " is prime because only 1 and "+str(num)+" divide it with no remainder")

num = int(input("Number: "))

is_prime(num)

Explanation:

This line defines the function is_prime

def is_prime(num):

The italicize line checks if the user input is 1; If yes it prints 1 is not prime

    if num == 1:

         print(str(num)+" is not prime")

If the above conditional statement is not true (i.e. if user input is greater than 1), the following is executed

    else:

The italicized checks if user input is primer (by using for loop iteration which starts from 2 and ends at the input number)

         for i in range(2 , num):

              if num % i == 0:

This line prints if the number is not a prime number and why it's not a prime number

                   print(str(num)+" is not prime because it can b divided by "+str(i)+" and "+str(int(num/i))+" with no remainder")

                   break;

If otherwise; i.e if user input is prime, the following italicized statements are executed

         else:

              print(str(num) + " is prime because only 1 and "+str(num)+" divide it with no remainder")

The function ends here

The main begins here

num = int(input("Number: "))  This line prompts user for input

is_prime(num) This line calls the defined function

1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2. (1 point) Which flag is set when the result of a signed arithmetic operation is either too large or too small to fit into the destination? 3. (1 point) Which flag is set when an arithmetic or logical operation generates a negative result?

Answers

Answer:

(1) Carry flag (2) Overflow flag (3) Sign or negative Flag

Explanation:

Solution

(1) The carry flag : It refers to the adding or subtracting. a two registers has a borrow or carry bit

(2) The over flow flag: This flag specify that a sign bit has been modified during subtracting or adding of operations

(3) The sign flag: This is also called a negative sign flag is a single bit status in a register that specify whether the last mathematical operations  generated a value to know if the most significant bit was set.

discuss 5 ways in which computer has influence typography and lettering​

Answers

Answer:

Five ways in which computer has affected typography and lettering are discussed below;

1. Introduction of unconventional typeface: Computers have introduced unconventional typeface texts to typography and lettering by offering a wide range of typeface and fonts that the user can choose from, depending on the type of typing job at hand. Some of these fonts are suitable for aesthetic purpose, and some have official rating. These fonts and type faces range from the Times New Roman, Gothic, Serif, etc.

2. Size and legibility: Computers now allows different sizes of character sizes in typography. These sizes can be chosen easily to suite the degree of readability of the intended message.

3. Specialization: Computer has opened up typography and lettering to lay users and people not specialized in typography. Prior to the digital age, typing jobs were limited to specialist typists who have been trained in typography. Nowadays, anybody with access to a computer can easily learn solo, and be employed as a typist.

4. General layout: The arrangement and layout of text and lettering in typing can now be easily manipulated with a computer, by just selecting from a wide choice of arrangement available on the typing platform.

5. Minimization of errors: The use of computer in typography and lettering has greatly reduced the incidence and occurrence of error in typing. Most computers have built in prediction tools, and auto-correcting software that reduces and sometimes prevent grammatical and spelling errors.

(Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds using the following header: def convertMillis(millis): The function returns a string as hours:minutes:seconds. For example, convertMillis(5500) returns the string 0:0:5, convertMillis(100000) returns the string 0:1:40, and convertMillis(555550000) returns the string 154:19:10. Write a test program that prompts the user to enter a value for milliseconds and displays a string in the format of hours:minutes:seconds. Sample Run Enter time in milliseconds: 555550000 154:19:10

Answers

Answer:

I am writing the Python program. Let me know if you want the program in some other programming language.

def convertMillis(millis):  #function to convert milliseconds to hrs,mins,secs

   remaining = millis  # stores the value of millis to convert

   hrs = 3600000  # milliseconds in hour

   mins = 60000  # milliseconds in a minute

   secs = 1000  #milliseconds in a second

   hours =remaining / hrs  #value of millis input by user divided by 360000

   remaining %= hrs  #mod of remaining by 3600000

   minutes = remaining / mins  # the value of remaining divided by 60000

   remaining %= mins  #mod of remaining by 60000

   seconds = remaining / secs  

#the value left in remaining variable is divided by 1000

   remaining %= secs  #mod of remaining by 1000

   print ("%d:%d:%d" % (hours, minutes, seconds))

#displays hours mins and seconds with colons in between

   

def main():  #main function to get input from user and call convertMillis() to #convert the input to hours minutes and seconds

   millis=input("Enter time in milliseconds ")  #prompts user to enter time

   millis = int(millis)  #converts user input value to integer

   convertMillis(millis)   #calls function to convert input to hrs mins secs

main() #calls main() function

Explanation:

The program is well explained in the comments mentioned with each line of code. The program has two functions convertMillis(millis) which converts an input value in milliseconds to hours, minutes and seconds using the formula given in the program, and main() function that takes input value from user and calls convertMillis(millis) for the conversion of that input. The program along with its output is attached in screenshot.

A security analyst is interested in setting up an IDS to monitor the company network. The analyst has been told there can be no network downtime to implement the solution, but the IDS must capyure all of the network traffic. Which of the following should be used for the IDS implementation?

a. Network tap
b. Honeypot
c. Aggregation
d. Port mirror

Answers

Answer:

d. Port mirror

Explanation:

Port mirroring is a method to monitor network traffic and it is used in the Intrusion Detection Systems. It is also called Switched Port Analyzer and is used to analyse the network errors. This technique basically copies the network packets and sends or transmits these copied packed from one port to another in a network device such as a switch. This means that this technique is used to copy the network packets from one switch port and send the copy of these packets to another port where these packets are monitored. This is how it analyses the network errors and incoming traffic for irregular behavior and also this can be done without affecting the normal operation of the switch and other network processes. It is simple, inexpensive and easy to establish and use. The most important advantage of using mirrored ports is that it catches the traffic on several ports at once or can capture all of the network traffic.

Write a program that prompts the user to enter integers in the range 1 to 50 and counts the occurrences of each integer. The program should also prompt the user for the number of integers that will be entered. As an example, if the user enters 10 integers (10, 20, 10, 30, 40, 49, 20, 10, 25, 10), the program output would be:

Answers

Answer:

import java.util.Scanner; public class Main {    public static void main(String[] args) {        int num[] = new int[51];        Scanner input = new Scanner(System.in);        System.out.print("Number of input: ");        int limit = input.nextInt();        for(int i=0; i < limit; i++){            System.out.print("Input a number (1-50): ");            int k = input.nextInt();            num[k]++;        }        for(int j=1; j < 51; j++){            if(num[j] > 0){                System.out.println("Number of occurrence of " + j + ": " + num[j]);            }        }    } }

Explanation:

The solution is written in Java.

Firstly, create an integer array with size 51. The array will have 51 items with initial value 0 each (Line 5).

Create a Scanner object and get user entry the number of input (Line 6-7).

Use the input number as the limit to control the number of the for loop iteration to repeatedly get integer input from user (Line 9-13). Whenever user input an integer, use that integer, k, as the index to address the corresponding items in the array and increment it by one (LINE 11-12).

At last, create another for loop to iterate through each item in the array and check if there is any item with value above zero (this means with occurrence at least one). If so, print the item value as number of occurrence (Line 14-17).

Give an example of a function from N to N that is: Hint: try using absolute value, floor, or ceiling for part (b). (a) one-to-one but not onto (b) onto but not one-to-one (c) neither one-to-one nor onto

Answers

Answer:

Let f be a function  

a) f(n) = n²  

b) f(n) = n/2  

c) f(n) = 0  

Explanation:  

a) f(n) = n²  

This function is one-to-one function because the square of two different or distinct natural numbers cannot be equal.  

Let a and b are two elements both belong to N i.e. a ∈ N and b ∈ N. Then:

                               f(a) = f(b) ⇒ a² = b² ⇒ a = b  

The function f(n)= n² is not an onto function because not every natural number is a square of a natural number. This means that there is no other natural number that can be squared to result in that natural number.  For example 2 is a natural numbers but not a perfect square and also 24 is a natural number but not a perfect square.  

b) f(n) = n/2  

The above function example is an onto function because every natural number, let’s say n is a natural number that belongs to N, is the image of 2n. For example:

                               f(2n) = [2n/2] = n  

The above function is not one-to-one function because there are certain different natural numbers that have the same value or image. For example:  

When the value of n=1, then

                                  n/2 = [1/2] = [0.5] = 1  

When the value of n=2 then  

                                   n/2 = [2/2] = [1] = 1  

c) f(n) = 0

The above function is neither one-to-one nor onto. In order to depict that a function is not one-to-one there should be two elements in N having same image and the above example is not one to one because every integer has the same image.  The above function example is also not an onto function because every positive integer is not an image of any natural number.

Who do you think larger or smaller clients will benefit most from MasterCard’s analytics tools? Why?

Answers

Answer:The key to analytics success is not about searching for answers, ... If you are trying to determine where to find new customers, there is a recipe for how to do that, and it ... As we work with small businesses, we help them answer their big ... Moving forward, there is going to be a lot more data of varying types.

Explanation:

You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on your validation set, but good performance on your training set. Your implementation has no bugs. Define various reasons that could be causing the problem?

Answers

Answer:

The various reasons that could be a major problem for the implementation are it involves a large number of parameters also, having a noisy data

Explanation:

Solution

The various reasons that could be causing the problem is given as follows :

1. A wide number of parameters :

In the ensemble tree method, the number of parameters which are needed to be trained is very large in numbers. When the training is performed in this tree, then the model files the data too well. When the model has tested against the new data point form the validation set, then this causes a large error because the model is trained completely according to the training data.

2. Noisy Data:

The data used to train the model is taken from the real world . The real world's data set is often noisy i.e. contains the missing filed or the wrong values. When the tree is trained on this noisy data, then it sets its parameters according to the training data. As regards to testing the model by applying the validate set, the model gives a large error of high in accuracy y.

In a real pulley system, the work supplied must be the work accomplished.

Equal to
Less than
Greater than

Answers

sorry I was testing something

Write code for iterative merge sort algorithm. It is also known as bottom-up merge sort. There should not be any recursive call for this approach. Include your code and screenshot of output with the answer. You can choose any programming language for this problem.

Answers

Answer:

Here is the C++ program:

#include <iostream> // for using input output functions

using namespace std; // to identify objects as cin cout

void merge(int array[], int left, int mid, int right);  

// to merge the  array into two parts i.e. from left to mid and mid+1 to right

int minimum(int a, int b) { return (a<b)? a :b; }

//to find the minimum of the 2 values

void IterativeMergeSort(int array[], int num) { //function to sort the array

  int size; //determines current size of subarrays

  int left;  //to determine the start position of left subarray

//to merge the sub arrays using bottom up approach          

  for (size=1; size<=num-1; size = 2*size)    {

      //to select start position of different subarrays of current size  

      for (left=0; left<num-1; left += 2*size)   {    

// To determine the end point of left sub array and start position of right //which is mid+1    

          int mid = minimum(left + size - 1, num-1);  

          int right = minimum(left + 2*size - 1, num-1);  

// Merge the sub arrays from left to mid and mid+1 to right

         merge(array, left, mid, right);        }    } }

 // function to merge the  array into two parts i.e. from left to mid and mid+1 //to right

void merge(int array[], int left, int mid, int right){

   int i, j, k; // variables to point to different indices of the array

   int number1 = mid - left + 1;

   int number2 =  right - mid;  

//creates two auxiliary arrays LEFT and RIGHT

   int LEFT[number1], RIGHT[number2];  

//copies this mid - left + 1 portion to LEFT array

   for (i = 0; i < number1; i++)

       LEFT[i] = array[left + i];

//copies this right - mid portion to RIGHT array

   for (j = 0; j < number2; j++)

       RIGHT[j] = array[mid + 1+ j];  

   i = 0;

   j = 0;

   k = left;

//merge the RIGHT and LEFT arrays back to array from left to right i.e //arr[left...right]

   while (i < number1 && j < number2)     {

       if (LEFT[i] <= RIGHT[j])    

/*checks if the element at i-th index of LEFT array is less than or equals to that of j-th index of RIGHT array */

{             array[k] = LEFT[i];

//if above condition is true then copies the k-th part of array[] to LEFT //temporary array

           i++;         }

       else //when the above if condition is false

       {  array[k] = RIGHT[j];

//moves k-th part of array[] to j-th position of RIGHT temporary array

           j++;         }

       k++;     }  

   while (i < number1)     {  //copies remaining elements of LEFT array

       array[k] = LEFT[i];

       i++;

       k++;     }  

   while (j < number2)     { //copies remaining elements of RIGHT array

       array[k] = RIGHT[j];

       j++;

       k++;     } }  

int main() {

   int Array[] = {9, 18, 15, 6, 8, 3}; // an array to be sorted

   int s = sizeof(Array)/sizeof(Array[0]);

//sizeof() is used to return size of array

   cout<<"Input array:  ";

   int i;

   for (i=0; i < s; i++) //to print the elements of given array

       cout<<Array[i]<<" ";

       cout<<endl;

   IterativeMergeSort(Array, s);   //calls IterativeMergeSort() function

   cout<<"Sorted array after applying Iterative Merge Sort:"<<endl;

  for (i=0; i < s; i++) //to print the elements of the sorted array

      cout<<Array[i]<<" "; }

Explanation:

The program is well explained in the comments mentioned above with each line of the code. The screenshot of the program along with its output is attached.

A software company assesses its developers more on their client support skills rather than their development skills. Which of the following terms would best describe the software company's performance management process?


A. Deficient
B. Contaminated
C. Unreliable
D. Inconsistent
E. Unspecified

Answers

Answer:

B. Contaminated

Explanation:

Based on the information provided regarding the scenario it seems that the software company's performance management process can be best described as contaminated. This occurs when the criterion of measurement for the employee performance includes aspects of performance that are not part of the job. Which in this case the main role of the employees is to apply their development skills in order to improve the software and not focus on their client support skills, but instead the "client support skills" is what the company is basing their performance review on.

Use an Excel function to find: Note: No need to use Excel TABLES to answer these questions! 6. The average viewer rating of all shows watched. 7. Out of all of the shows watched, what is the earliest airing year

Answers

Answer:

Use the average function for viewer ratings

Use the min function for the earliest airing year

Explanation:

The average function gives the minimum value in a set of data

The min function gives the lowest value in a set of data

Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as arguments. The function should determine and return the hypotenuse of the triangle. b. A main() function that should call right Triangle() correctly and display the value the function returns.

Answers

Answer:

The java program is as follows.

import java.lang.*;

public class Triangle

{

   //variables to hold sides of a triangle

   static double height;

   static double base;

   static double hypo;

   //method to compute hypotenuse

   static double rightTriangle(double h, double b)

   {

       return Math.sqrt(h*h + b*b);

   }

public static void main(String[] args) {

    height = 4;

    base = 3;

    hypo = rightTriangle(height, base);

 System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);

}

}

OUTPUT

The hypotenuse of the right-angled triangle is 5.0000

Explanation:

1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.

2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.

3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.

4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().

5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.

6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.

7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.

8. In java, all the code is written inside a class.

9. The name of the program is same as the name of the class having the main() method.

10. The class having the main() method is declared public.

11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.

1. Suppose you purchase a wireless router and connect it to your cable modem. Also suppose that your ISP dynamically assigns your connected device (that is, your wireless router) one IP address. In addition, suppose that you have five PCs at home that use 802.11 to wirelessly connect to your wireless router. How are IP addresses assigned to the five PCs

Answers

Answer:

In this example, the wireless router uses NAT to allocate private IP addresses to five PC's and router interface, since only one IP address is assigned or given to the wireless router by the ISP.

Explanation:

Solution

The Dynamic Host Configuration Protocol server provides the IP addresses to clients, dynamically.

Generally a wireless router contains DHCP server. a wireless router can also  assign IP addresses dynamically to its clients.

So, the wireless router assigns IP addresses to five PC's and the router interface dynamically using the DHCP.

It is stated that the Internet Service Provider (ISP) assigns only one IP address to the wireless router. Here there are five PC's and one router interface need to be allocated IP addresses.

In such cases the NAT (Network Address Translation)protocol is important and allows all the clients of the home network to sue a single internet connection (IP address) assigned or given by the ISP.

NAT permits the router to allocate the private IP addresses to client from the private IP address space reserved for the private networks. these private IP addresses are valid only in the home or local network .

11.19 (Constructor Failure) Write a program that shows a constructor passing information about constructor failure to an exception handler. Define class SomeClass, which throws an Exception in the constructor. Your program should try to create an object of type SomeClass and catch the exception that’s thrown from the constructor

Answers

Answer:

You absolutely should throw an exception from a constructor if you're unable to create a valid object. This allows you to provide proper invariants in your class. ... Throw an exception if you're unable to initialize the object in the constructor, one example are illegal arguments.

Explanation:

Error codes cannot be used in constructors since they lack a return type. Therefore, throwing an exception is the most effective technique to indicate constructor failure. Here is a workaround if you don't have or are unwilling to use exceptions.

What constructor passing information, constructor failure?

When an exception is thrown in a constructor, memory for the actual object has already been set aside before the constructor is even invoked. Therefore, after the exception is thrown, the compiler will immediately deallocate the memory the object was using.

There are two solutions to that: Simple and conventional approach: Use arrows. To make use of a two-stage construction, use a custom “construct” function after a default constructor that cannot throw exceptions.

Therefore, The constructor has the ability to “zombie” an object if it fails.

Learn more about Constructors here:

https://brainly.com/question/18914381

#SPJ5

Eddie creates one-of-a-kind brochures for his customers, and he wants to be able to customize the look of some of the headings in a given brochure. This special type of heading will be used throughout a given document, but it won't be reused in other documents. What type of construct should he create

Answers

Answer:

A template

Explanation:

The type of construct he should create is a Template.

Template: A template is a file that serves as a beginning point for a document that is new.

When you open a template, it is pre-formatted in a way. for instance you might make use of a template in Microsoft Word that is arranged as a business letter, the template would mostly have a space for your address also a name in the left (upper)corner, which is an area for the receivers's address.

Now a little below that on the left site, is an area for the message (body) and after that, is a spot for your signature at the bottom.

Write a program that calculates and prints the average of several integers. Assume the last value read with scanf is the sentinel 9999. A typical input sequence might be 10 8 11 7 9 9999

Answers

Answer:

Following are the program in C programming language

#include<stdio.h> // header file

int main() // main function  

{

int n1;// variable declaration

int c=0; // variable declaration

float sum=0; // variable declaration

float avg1;

printf("Enter Numbers :\n");

while(1) // iterating the loop

{

scanf("%d",&n1); // Read the value by user

if(n1==9999) // check condition  

break; // break the loop

else

sum=sum+n1; // calculating sum

c++; // increment the value of c

}

avg1=sum/c;

printf("Average= %f",avg1);

return 0;

}

Output:

Enter Numbers:

10  

8  

11

7  

9  

9999

Average= 9.000000

Explanation:

Following are the description of program

Declared a variable "n1" as int type Read the value by the user in the "n1" variable by using scanf statement in the while loop .The while loop is iterated infinite time until user not entered the 9999 number .if user enter 9999 it break the loop otherwise it taking the input from the user .We calculating the sum in the "sum " variable .avg1 variable is used for calculating the average .Finally we print the value of average .

The program takes in several value numeric values until 9999 is inputed, the program calculates the average of these values. The program is written in python 3 thus :

n = 0

#initialize the value of n to 0

cnt = 0

#initialize number of counts to 0

sum = 0

#initialize sum of values to 0

while n < 9999 :

#set a condition which breaks the program when 9999 is inputed

n = eval(input('Enter a value : '))

#accepts user inputs

cnt += 1

#increases the number of counts

sum+=n

#takes the Cummulative sum

print(sum/cnt)

#display the average.

A sample run of the program is attached.

Learn more : https://brainly.com/question/14506469

The topic sentence states a: thesis statement,
paragraphs main idea,
supporting idea,
papers conclusion

Answers

The topic sentence states paragraphs main idea. Check more about sentence below.

What is the a topic sentence?

A topic sentence is known to be one that tells the main point of any given paragraph.

It is said to be a supporting sentences that has the details and gives proof of one's point.

Therefore, The topic sentence states paragraphs main idea.

Learn more about  topic sentence  from

https://brainly.com/question/5526170

#SPJ1

Answer:

paragraph's main idea

Explanation:

What feature in the Windows file system allows users to see only files and folders in a File Explorer window or in a list of files from the dir command to which they have been given at least read permission?

Answers

Answer:

Access based enumeration

Explanation:

The access based enumeration is the feature which helps the file system to allow users for seeing the files and folders for which they have read access from the direct command.

Access based enumeration: This feature displays or shows only the folders and files that a user has permissions for.

If a user do not have permissions (Read) for a folder,Windows will then hide the folder from the user's view.

This feature only function when viewing files and folders are in a shared folder. it is not active  when viewing folders and files in a local system.

All of the following are true about hacksaws except: a. A hacksaw only cuts on the forward stroke. b. A coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. c. A fine hacksaw blade (one with many teeth) is better for cutting sheet metal. d. A hacksaw blade is hardened in the center, so it is best to saw only with the center portion of the blade.

Answers

B is INCORRECT good sir. The Hope this helps, brainiest please.

All of the following are true about hacksaws, except a coarse hacksaw blade (one with fewer teeth) is better for cutting thick steel than a fine blade. The correct option is b.

What is a hacksaw?

A hacksaw is a saw with fine teeth that were originally and primarily used to cut metal. Typically, a bow saw is used to cut wood and is the corresponding saw.

Hacksaw is used by hand, it is a small tool for cutting pipes rods wood etc that is very common and homes and in shops. The different types of hacksaws. The main three types of hacksaws are course-grade hacksaws, medium-grade hacksaws, and fine-grade hacks. The difference is just for the quality, and the design of the blade.

Therefore, the correct option is b. Cutting thick steel is easier with a coarse hacksaw blade (one with fewer teeth) than a fine one.

To learn more about hacksaw, refer to the below link:

https://brainly.com/question/15611752

#SPJ2

Supposethatyoubet$5oneachofasequenceof50independentfairgames. Usethecentrallimittheorem to approximate the probability that you will lose more than $75

Answers

Answer:

0.119

Explanation:

50 independent fair games

Mean will be 50/2 = 25

Standard deviation of the loosing probability is :

[tex]\sqrt{50*0.5*0.5}[/tex] * 10 = 33.536

we have to loose 33 times out of 50 games.

To find the approximate probability we use z- value table.

z value =  [tex]\frac{33-25}{3.35}[/tex]

z - value = 2.2659

Looking at the z-value table we get 0.119.

Determine the number of cache sets (S), tag bits (t), set index bits (s), and block offset bits (b) for a 1024-byte 4-way set associative cache using 32-bit memory addresses and 8-byte cache blocks.

Answers

Answer:

The answer is The Cache Sets (S) = 32, Tag bits (t)=24, Set index bits(s) = 5 and Block offset bits (b) = 3

Explanation:

Solution

Given Data:

Physical address = 32 bit (memory address)

Cache size = 1024 bytes

Block size = 8 bytes

Now

It is a 4 way set associative mapping, so the set size becomes 4 blocks.

Thus

Number of blocks = cache size/block size

=1024/8

=128

The number of blocks = 128

=2^7

The number of sets = No of blocks/set size

=128/4

= 32

Hence the number of sets = 32

←Block ←number→

Tag → Set number→Block offset

←32 bit→

Now, =

The block offset = Log₂ (block size)

=Log₂⁸ = Log₂^2^3 =3

Then

Set number pc nothing but set index number

Set number = Log₂ (sets) = log₂³² =5

The remaining bits are tag bits.

Thus

Tag bits = Memory -Address Bits- (Block offset bits + set number bits)

= 32 - (3+5)

=32-8

=24

So,

Tag bits = 24

Therefore

The Cache Sets = 32

Tag bits =24

Set index bits = 5

Block offset bits = 3

Note: ←32 bits→

Tag 24 → Set index  5→Block offset 3

What is
relation degree.

Answers

Answer:

Explanation:

The degree of relationship can be defined as the number of occurrences in one entity that is associated with the number of occurrences in another entity. There is the three degree of relationship: One-to-one (1:1) One-to-many (1:M)

public class Car {
public void m1() {
System.out.println("car 1");
}
â
public void m2() {
System.out.println("car 2");
}
â
public String toString() {
return "vroom";
}
}


public class Truck extends Car {
public void m1() {
System.out.println("truck 1");
}
}

And assuming that the following variables have been declared:

Car mycar = new Car();
Truck mytruck = new Truck();

What is the output from the following statements?

a. Sound F/X System.out.println(mycar);
b. mycar.m1();
c. mycar.m2();
d. System.out.println(mytruck);
e. mytruck.m1();
f. mytruck.m2();

Answers

Answer:

The Following are the outputs:

a. vroom

b. car 1

c. car 2

d. vroom

e. truck 1

f. car 2

Explanation:

The first statement System.out.println(mycar);  prints an instance of the Car object my car which calls the toString() method.

The second statement mycar.m1();  Calls the method m1() which prints car1

The third statement mycar.m2(); calls the method m2() which prints car2

Then another class is created Truck, and Truck inherits all the methods of Car since it extends Car. Truck has a method m1() which will override the inherited method m1() from the Car class.

The fourth statement System.out.println(mytruck); will print print vroom just as the first statement since it inherits that method toString()

The fifth statement calls m1() in the Truck class hence prints Truck 1

Finally the sixth statement will print car 2 because it also inherited that method and didnt overide it.

A system developer needs to provide machine-to-machine interface between an application and a database server in the production enviroment. This interface will exchange data once per day. Which of the following access controll account practices would BESt be used in this situation?

a. Establish a privileged interface group and apply read -write permission.to the members of that group.
b. Submit a request for account privilege escalation when the data needs to be transferred
c. Install the application and database on the same server and add the interface to the local administrator group.
d. Use a service account and prohibit users from accessing this account for development work

Answers

Answer:

The correct option is (d) Use a service account and prohibit users from accessing this account for development work

Explanation:

Solution

As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:

By making use of a service account and forbids users from having this account for development work.

The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.

Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.

Complete a prewritten C++ program for a carpenter who creates personalized house signs. The program is supposed to compute the price of any sign a customer orders, based on the following facts:

The charge for all signs is a minimum of $35.00.
The first five letters or numbers are included in the minimum charge; there is a $4 charge for each additional character.
If the sign is made of oak, add $20.00. No charge is added for pine.
Black or white characters are included in the minimum charge; there is an additional $15 charge for gold-leaf lettering.

Instructions:

Ensure the file named HouseSign.cppis open in the code editor. You need to declare variables for the following, and initialize them where specified:

A variable for the cost of the sign initialized to 0.00 (charge).
A variable for the number of characters initialized to 8 (numChars).
A variable for the color of the characters initialized to "gold" (color).
A variable for the wood type initialized to "oak" (woodType).
Write the rest of the program using assignment statements and ifstatements as appropriate. The output statements are written for you.

Answers

Answer:

#include <iostream>

#include <string>

using namespace std;

int main()

{

   double charge = 0.00;

   int numChars = 8;

   string color = "gold";

   string woodType = "oak";

   

   if(numChars > 5){

       charge += (numChars - 5) * 4;

   }

   if(woodType == "oak"){

       charge += 20;

   }

   if(color == "gold"){

       charge += 15;

   }

   charge += 35;

   

   cout << "The charge is: $" << charge << endl;

   return 0;

}

Explanation:

Include the string library

Initialize the variables as specified

Check if the number of characters is greater than 5 or not. If it is, add 4 to the charge for each character that is greater than 5

Check if the sign is made of oak or not. If it is, add 20 to the charge

Check if the color is gold or not. If it is, add 35 to the charge

Add the minimum cost to the charge

Print the charge

In this exercise we have to use the knowledge of the C++ language to write the code, so we have to:

The code is in the attached photo.

So to make it easier the code can be found at:

#include <iostream>

#include <string>

using namespace std;

int main()

{

  double charge = 0.00;

  int numChars = 8;

  string color = "gold";

  string woodType = "oak";

  if(numChars > 5){

      charge += (numChars - 5) * 4;

  }

  if(woodType == "oak"){

      charge += 20;

  }

  if(color == "gold"){

      charge += 15;

  }

  charge += 35;

  cout << "The charge is: $" << charge << endl;

  return 0;

}

See more about C++ at brainly.com/question/26104476

Other Questions
Please answer this correctly The conference at Potsdam was tense because the:United States had dropped the atomic bomb.Soviet Union switched sides to the Axis powers.Allies were not sure of victory.Western Allies distrusted the Soviet Union. Find the area of the regularpentagon.5.5 cm8 cm Why did nativists dislike the new immigrants?A. They practiced religion.B. They worked in factories.C. They lived in cities.D. They supposedly took jobs from white Americans. A disk between vertebrae in the spine is subjected to a shearing force of 640 N. Find its shear deformation taking it to have the shear modulus of 1.00 109 N/m2. The disk is equivalent to a solid cylinder 0.700 cm high and 4.30 cm in diameter. If three times a number, added to 2 is divided by the number plus 5, the result is eight thirds. Please answer if you know 5y^2 - 2 = 3y i have 5 cards, the first says 2, the fifth says 18, what are the second, third and forth numbers? An animal shelter has 5 times as many cats as it has dogs. There are 75cats at the shelter Which statement about enslaved Africans in Carolina is true? PLZZZZ HELPPP FOR BRAINLIEST! COMPARING EXPONENTIAL FUNCTIONS WHICH STATEMENT CORRECTLY COMPARES FUNCTIONS F AND G Rohit visited a pumpkin patch with his family. The table shows the relationship between the weight and price of a pumpkin.Isosceles triangle LMN is graphed with vertices L(0, 1), M(3, 5), and N(6,1). What is the slope of side LN? Going to Grad School! In the College of Computing and Software Engineering, we have an option for students to "FastTrack" their way into their masters degree directly from undergraduate. If you have a 3.5 GPA and graduate from one of our majors, you can continue on and get your masters without having to do a lot of the paperwork. For simplification, we have four undergraduate degrees: CS, SWE, IT, and CGDD and three masters programs: MSCS, MSSWE and MSIT. For this assignment, youre going to ask the user a few questions and determine if they qualify for the FastTrack option.Sample Output:Major: FrogmongeringGPA: 3.9Great GPA, but apply using the regular application.Sample Output #2:Major: SWEGPA: 3.3Correct major, but GPA needs to be higher.Sample Output #3:Major: ITGPA: 3.5You can FastTrack.Sample Output #4:Major: Study StudiesGPA: 0.4Talk to one of our advisors about whether grad school is for you. choose the correct conjugated present tense sentance from marta/hablar THE DIFFERENT TYPES OF HEALTH CARESECTION ONEFor each statement state whether it is primary(p), secondary(s),or tertiary(t) healthcare1. Going to a specialistJI2.Limit or prevent future complications3.Immunization against infectious disease4. Rehabilitation programs5.Discuss treatment options6. Treatment to prevent complications7.Patient support groups. Included on the board of directors of Microsoft are Dina Dublon, former chief financial officer of JP Morgan Chase, the president of Harvey Mudd college Maria M. Klawe, and the vice chairman of Bank of America Charles H. Noski. These three board members do not have a direct management role with Microsoft and are therefore referred to as A) inside directors. B) outside directors. C) competitive directors. D) honorary directors. what age was valentina tereshkova when she became a cosmonaut ? On December 31, 2021, Caria vista inc. appropriately changed its inventory valuation method to FIFO cost from weighted average cost for financial statement and income tax purposes. The change will result in a $38,500 increase in the beginning inventory at January 1, 2021. Assume a 20% income tax rate. The cumulative effect of this accounting change on beginning retained earnings is:_______ y = 2 is a polynomial function.True or false 15r-3r+6 15r - 3r 12r + 6 12r - 6 6(2r + 1)