hy plzz help me friends​

Hy Plzz Help Me Friends

Answers

Answer 1

Answer:

Ok so RAM is Random-Access-Memory.

RAM can store data just like in a hard drive - hdd or solid state drive - ssd

but the thing is that ram is really fast and data is only stored when RAM chips get power. On power loss your all data will be lost too.

ROM thanslates to Read-Only-Memory - so data in ROM chips can't be modifyed computer can just read the data but not write.

Read-only memory is useful for storing software that is rarely changed during the life of the system, also known as firmware.

Have a great day.

Explanation:

Answer 2

Answer:

Ram which stands for random access memory, and Rom which stands for read only memory are both present in your computer. Ram is volatile memory that temporarily stores the files you are working on. Rom is non-volatile memory that permanently stores instructions for your computer


Related Questions

What Are the Components of a Web Address? *​

Answers

Answer:

What Are the Components of a Web Address?

1.Protocol. The first component of a web address is the protocol, which is also known as the scheme. ...

2.Domain Name. The domain name part of the web address is the unique identifier for the website on the internet. ...

3.Domain Extension. ...

4.Path & Filename.

Which of the following statements is false?


Copyright exists the moment a work is created.


Copyright protects intellectual property such as text, art, film, music, or software.


Omitting the © copyright symbol means your work is not copyrighted.


Copyright is free.


You are not required to register your copyright.

Answers

Everything is false except the third one :)

It is false that omitting the © copyright symbol means your work is not copyrighted. The correct option is C.

What is a copyright?

Original works of authorship are protected by copyright, a type of intellectual property, as soon as the author fixes the work in a tangible form of expression.

The creators of the works of expression typically control the copyrights, however there are some significant exceptions: When an employee produces a work while employed, the employer is the rightful owner of the copyright.

Some individuals think that a work isn't covered by copyright law if it doesn't display a copyright emblem. That is untrue. The copyright symbol need not be used in most situations.

Thus, the correct option is C.

For more details regarding a copyright, visit:

https://brainly.com/question/14704862

#SPJ2

In a word processing program, under which tab or menu option can you adjust the picture brightness?

Answers

Explanation:

You must have selected a picture in order the tab format to be available. you should click the picture then you want to change the brightness for and u under picture tools, on the format tab,in the adjust group, click corrections.

Use the drop-down menu to complete each statement. First, calculate the time spent doing each activity _____ . Next, multiply each category by ____ . Then, ___ the totals. Last, subtract the total from ____ .

Answers

Answer:1. Every day 2. 7 3. add 4. 168

Explanation:

I got it right on Edge

First, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.

What is the significance of the activity?

The significance of activity may be determined by the fact that it usually enhances your health and lowers the threat of developing several diseases and other abnormal conditions like type 2 diabetes, cancer, and cardiovascular disease.

According to the context of this question, if you are required to calculate the time spent doing each activity in each day. You are required to make a chart that represents all such activities followed by multiplication. Then, you are considerably required to add the totals followed by subtracting the total from the total number of days in a year.

Therefore, first, calculate the time spent doing each activity every day. Next, multiply each category by 7. Then, add the totals. Last, subtract the total from 365.

To learn more about Activities, refer to the link:

https://brainly.com/question/26654050

#SPJ3

When machining rotors, what is the reason for setting the indexing collars to zero?

A. To know how much metal was taken off of each side.

B. To make sure that no cut exceeds .010 inch

C. To determine the proper cut speed of the Brake Lathe.

D. To measure the depth of the grooves on the rotor surface.

Answers

Answer:

To determine the proper cut speed of the brake lathe

To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

What is indexing collars?

Thus, they can have a maximum of 256 colors, which is the amount of colors that 8 bits of information can specify (28 = 256). Fewer colors are produced by lower bit depths, which also result in smaller files. At the conclusion of this chapter, in Section 19.8, this is covered.

"Indexed color" refers to the fact that a color table contains the palette—the collection of colors—of the image. A reference (or "index") to a table cell containing the pixel's color is present in each pixel of the image.

By choosing Image Mode Color Table in Photoshop, you can view the table for an indexed color image.

Therefore, To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.

To learn more about indexing collars, refer to the link:

https://brainly.com/question/12608731

#SPJ2

What Is the Purpose of a Web Browser? *

Answers

A web browser takes you anywhere on the internet. It retrieves information from other parts of the web and displays it on your desktop or mobile device. The information is transferred using the Hypertext Transfer Protocol, which defines how text, images and video are transmitted on the web.

Answer:

This is your answer. If I'm right so,

Please mark me as brainliest. thanks!!!


The process of saving information to a secondary storage device is called...

Answers

Answer:

The process of saving information to a secondary storage device is referred to as embedding.

Explanation:

The process of saving information to a secondary storage device is called embedding.

What is embedding?

One technique a writer or speaker could use to lengthen a sentence is embedding. When two clauses fall into the same category, they can frequently be nested inside of one another. For illustration: The baked product was presented by Norman. My sister didn't know about it.

Her thumb had the thorn embedded in the surface there, locked onto something. A person or thing is said to be embedded when it is a highly important or powerful part of that person, item, etc. Guilt was deeply engrained in my conscience.

The embedding strategy modifies each video frame slightly in an attempt to try covert or undetectable data concealing.

Thus, it is embedding.

For more information about embedding, click here:

https://brainly.com/question/16911950

#SPJ6

How does computer hardware and software work together?

Answers

Answer:

Computer software controls computer hardware which in order for a computer to effectively manipulate data and produce useful output I think.

Explanation:

Very large storage system that protects data by constantly making backup copies of files moving across an organization's network is known as ...

Answers

Answer:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

Explanation:

RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

What is File system failure?

File system failure refers to disk-related errors that may be due to corrupt files,  disk integrity corruption, file execution policies, bad sectors, etc. These errors may prevent be causing users from accessing or opening files. The first line of defense against a file system failure is a well-defined set of proper system backup and file maintenance procedures.

These errors can be encountered in files such as images, documents, PDFs, movies, etc. In order to protect and provide defense against file system failure, it is important to manage proper backup and file maintenance procedures.

Therefore, RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.

You can learn more about file system at:

brainly.com/question/14312784

#SPJ2

Is there an alternative website of https://phantomtutors.com/ to get guidance in online classes?

Answers

Answer:

The website is

classroom

Explanation:

Write a program that asks for the number of units sold and computes the total cost of the purchase. Input validation: Make sure the number of units is greater than 0. Use output (stream) manipulators: 2 digits after the decimal point g

Answers

Answer:

Explanation:

The following code is written in C++, it asks the user for input on number of units sold and places it in a variable called units_sold. Then it asks for the package price and places that value in a variable called package_price. Finally it multiplies both values together into a variable called final_price and adjusts the decimals.

#include <iostream>

#include <iomanip>

using namespace std;

       int main()

       {

       // Variables

       int units_sold,

       final_price;

       // ask user for number of units sold

       cout << "\nEnter number of units sold: ";

       cin >> units_sold;

       

       //ask for Package price

       cout << "\nEnter Package Price: ";

       cin >> package_price;

       // Total amount before discount

       final_price = units_sold * package_price;

       cout << setprecision(2) << fixed;

       cout << endl;

       return 0;

       }

9. Which of the following is the
leading use of computer?​

Answers

Complete Question:

What is the leading use of computers?

Group of answer choices.

a. web surfing.

b. email, texting, and social networking.

c. e-shopping.

d. word processing.

e. management of finances.

Answer:

b. email, texting, and social networking.

Explanation:

Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties. One of the most widely used communication channel or medium is an e-mail (electronic mail).

An e-mail is an acronym for electronic mail and it is a software application or program designed to let users send texts and multimedia messages over the internet.

Also, social media platforms (social network) serves as an effective communication channel for the dissemination of information in real-time from one person to another person within or in a different location. Both email and social networking involves texting and are mainly done on computer.

Hence, the leading use of computer is email, texting, and social networking.

how to check if serial interface is dte ot DCE?

Answers

If you can see the DTE/DCE cable, you can tell by looking which router has the DCE interface connected to it - the letters "DTE" or "DCE" will either be molded into the connector itself, or if it's an older cable there should be a little piece of tape on the cable that tells you what the interface type is.

What is the New York Times doing to try to keep up with digital technology?

Answers

Answer:

Clover Food Labs: Using Technology to Bring The “Real Food” Movement to Cambridge, ... The New York Times is one of the many companies that has had its existence ... That monthly limit has since been reduced to 10 articles in an attempt to ... which has at least kept pace with the limited expectations for the industry

Bugs always seem to creep into programs and code. What strategies have you learned to find bugs more easily and crush them with a fix?

Answers

The process involves in  finding bugs as well as crushing them in a debugging process is extensive and this can consist of following process;

Examination of the error symptoms

 identifying the cause of it

 fixing of the error.

 This process is usually required a large amount of work, Although no precise procedure that is set in  for fixing all error, but some  useful strategies that use in reducing the debugging effort.

One of the significant part of this process is  localizing of  the error, which is figuring out the cause as well as the symptoms. Strategies that I have learnt in finding and fixing the error in the process of debugging includes;Incremental as well as  bottom-up program development; development of the program incrementally remains one of the most effective ways that can be used in localizing the error, often testing as the piece of code is added, so with this it will be easier to find the error since any error is from the last piece of code added.And also since the last fragment of the code will be small then searching for bugs won't take much time to find and debug.Bottom-up development helps in  maximizing  the benefits that comes from incremental development. With bottom-up development, after successful testing of a code, it's behavior will not change once another piece is added to it, since existing code will never replied on new part so it will be easier to trace error in the new code and fix it.Instrument program can be used to log information and there can be insertion of print statements.Instrument program using assertions; Assertions  can be used in checking if the program actually maintains the properties or  those invariant that the code relies on,     Because the program will definitely stops once the  assertion fails, and there is actuality that the point where the program reached and  stops is closer to the cause, as well as  good indicator of how the problem looks like , then the bug can then be fixed.breakpoints can be set in the program as well as stepping and over functions, then watching program expressions, as well as  inspection of  the memory contents at a particular point during the execution can give the needed run-time information.Backtracking: this option works in a way whereby one will need to start from the point that the problem occurred then go back through the code to to detect the issue, then the bug can then be fixed.Binary search: this is exploration of the code by using divide and conquer approach, so that the  the bug be pin down quickly.

Therefore, Bugs are treat to programs and they can be dealt with using discussed methods.

Learn more at: https://brainly.com/question/15289374?referrer=searchResults

Your co-worker who went to UCLA tells you that DHCP is not enabled at your new job, so you should just use the same IP address that you have at home to connect to the internet. He told you it should work because your computer is communicating with a unique public IP address at home, so no other computer in the world would have it. When you try this, your computer does not have internet access. Give two reasons why?

Answers

Answer:

1. internet connection is not enabled on the computer.

2. The DHCP server in the company is not enabled as well.

Explanation:

For a user to access the internet, the computer must have a public IP address that is either assigned to it by a service provider or dynamically from the DHCP server in the computer. In the case of the former, the user just needs to enable the internet connection to obtain the unique IP address.

If the DHCP server or the internet connection is not enabled, the user would not have access to the internet.

What is Mobile Edge Computing? Explain in tagalog.​

Answers

Answer:

English: Multi-access edge computing, formerly mobile edge computing, is an ETSI-defined network architecture concept that enables cloud computing capabilities and an IT service environment at the edge of the cellular network and, more in general at the edge of any network.

Very very rough Tagalog: Ang multi-access edge computing, dating mobile edge computing, ay isang konsepto ng network architecture na tinukoy ng ETSI na nagbibigay-daan sa mga kakayahan sa cloud computing at isang IT service environment sa gilid ng cellular network at, higit sa pangkalahatan sa gilid ng anumang network.

Explanation:

hy please help me do this​

Answers

Answer:

1 True

2 False

3 False

4 True

5 True

6 True

7 True

8 False

Explanation:

8 robot's are not perfect they make mistakes too

What is a key consideration when evaluating platforms?

Answers

Answer:

The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.

Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later
date?
O Waiting on someone else
O In Progress
O Not started
O Deferred

Answers

I think it’s in progress

Answer: D: Deferred

Explanation:

took test

Creative Commons material often costs money to use.

True
False

Answers

Answer:

true

Explanation:

Write a program that would determine the day number in a non-leap year. For example, in a non-leap year, the day number for Dec 31 is 365; for Jan 1 is 1, and for February 1 is 32. This program will ask the user to input day and month values. Then it will display the day number day number corresponding to the day and month values entered assuming a non-leap year. (See part II to this exercise below).

Answers

Answer:

In Python:

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

day = int(input("Day: "))

month = input("Month: ")

ind = months.index(month)

   

numday = 0

for i in range(ind):

   numday+=daymonths[i]

numday+=day

print(numday)    

Explanation:

This initializes the months to a list

months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]

This initializes the corresponding days of each month to a list

daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]

This gets the day from the user

day = int(input("Day: "))

This gets the month from the user

month = input("Month: ")

This gets the index of the month entered by the user

ind = months.index(month)

This initializes the sum of days to 0

numday = 0

This adds up the days of the months before the month entered by the user

for i in range(ind):

   numday+=daymonths[i]

This adds the day number to the sum of the months

numday+=day

This prints  the required number of days

print(numday)    

Note that: Error checking is not done in this program

Develop a C program that calculates the final score and the average score for a student from his/her (1)class participation, (2) test, (3) assignment, (4) exam, and (5) practice scores. The program should use variables, cout, cin, getline(), type casting, and output manipulators. The user should enter the name of the student and scores ranging from 0 to 100 (integer) for each grading item. The final score is the sum of all grading items. The average score is the average of all grading items. Here is a sample output of the program: Enter the Student's name: John Smith Enter Class Participation Score ranging from 0 to 100: 89 Enter Test Score ranging from 0 to 100: 87 Enter Assignment Score ranging from 0 to 100: 67 Enter Exam Score ranging from 0 to 100: 99 Enter Practice Score ranging from 0 to 100: 80 John Smith: Final Score: 422 Average Score: 84.4 Submit: a flowchart . source file Hw3.cpp The screenshot of output

Answers

Answer:

Following are the code to the given question:

#include<iostream>//defining header file

using namespace std;

int main()//defining main method

{

float clspat,test,asst,exam,practice,total,average;//defining floating variable

char name[100];//defining char variable to input value

cout<<"Enter Name of Student: ";//print message

cin>>name; //input value

cout<<"Enter scores in following scoring items between 0 and 100:"<<"\n";//print message

cout<<"Enter class participation score: ";//print message

cin>>clspat;//input value

cout<<"Enter test score: ";//print message

cin>>test;//input value

cout<<"Enter assignment score: ";//print message

cin>>asst;//input value

cout<<"Enter exam score: ";//print message

cin>>exam;//input value

cout<<"Enter practice score: ";//print message

cin>>practice;//input value

total=clspat+test+asst+exam+practice;//calculating total value

average=total/5;//calculating average value

cout<<endl<<"SCORE CARD OF "<<name<<"\n"<<"-----------------------"<<"\n";//print value with message

cout<<"Total score: "<<total<<"\n";//print message with value

cout<<"Average score: "<<average; //print message with value

}

Output:

please find the attached file.

Explanation:

In this code, the floating-point variable is declared, which is used for input value from the user-end and after input the floating-point value it uses the "total, average" variable to calculate its respective values and store its value with init, after storing the value into the variable it uses the print method to print its values.

2. How has the internet changed the way that people get news?

Answers

Answer:

Explanation:

you can access news from anywhere and know what is going on

Answer:

Most of the news is fact due to the ablilty of anybody can make it

Explanation:

differentiate between a university and a TVET college in terms of what each offers and explain the stigma associated with TVET colleges​

Answers

Answer: See explanation

Explanation:

The main focus of a Technical Vocational Education and Training (TVET) college is to prepare the students and train them so that they'll be functional in a skilled trade. It focuses on vocational training and education. University isn't really concerned about transfer of skills but rather more concerned with the transfer of knowledge to the students

The Technical Vocational Education and Training (TVET) qualification is also faster, cheaper and easier to get than the university certificate which is costlier and takes longer period to get.

The stigma associated with TVET colleges has been created by both the society and the government. Firstly, people believed that only those from poor backgrounds or those that couldn't gain university admisson go to TVET colleges.

Also, the government isn't helping matters as public funding for education are allocated more to universities and not really allocated to TVET colleges. These has brought about the stigma to the TVET.

The difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.

University and TVET college

The major difference is University provide students with knowledge the need based on the course they are studying while TVET colleges is more of practical as they provide the students with practical skills they need because they render technical and vocational education and training.

The stigma associated with TVET colleges​ is because people think that University student has higher opportunities when in labor market than TVET colleges student.

Inconclusion the difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.

Learn more about University and TVET college here:https://brainly.com/question/26696444

grade 11 essay about the year 2020​

Answers

Answer:

This 2020 have a new normal class because of CO VID-19 Disease have more students and teachers patient the teachers is preparing a module to her/his student and the student is answering are not learning lesson because of the COV ID-19 the whole word enduring to that pandemic and all fronliners is the hero in this pandemic because all frontliners is helping the people to we heal and to healed that virus.

Explanation:

X274: Recursion Programming Exercise: Cannonballs Spherical objects, such as cannonballs, can be stacked to form a pyramid with one cannonball at the top, sitting on top of a square composed of four cannonballs, sitting on top of a square composed of nine cannonballs, and so forth.

RequireD:
Write a recursive function that takes as its argument the height of a pyramid of cannonballs and returns the number of cannonballs it contains.

Answers

Answer:

The function in C is as follows:

#include <stdio.h>

int C_ball(int height){

if(height == 1) {

       return 1;}

   return (height * height) + C_ball(height - 1);}      

int main(){

   int n;

   printf("Height: ");

   scanf("%d",&n);

   printf("Balls: %d",C_ball(n));

   return 0;

}

Explanation:

The function begins here

#include <stdio.h>

This defines the function

int C_ball(int height){

If height is 1, return 1

if(height == 1) {

       return 1;}  

This calls the function recursively

   return (height * height) + C_ball(height - 1);}

The main begins here

int main(){

This declares the height as integer

   int n;

This prompts the user for the height

   printf("Height: ");

   scanf("%d",&n);

This calls the function

   printf("Balls: %d",C_ball(n));

   return 0;

}

Consider the regular expressions:

R1 = (01)* (0*1*) (10)
R2 = (101)* (01)*
R3 = (10) (01*)*(01)
R4 = 10(R2*)|R3

Recall that, for a list of regular expressions, the function getToken() returns the next token from the input that matches one of the regular expressions. If there is more than one match, the longest match is returned. If there is more than one longest match, the token with the longest match that appears first in the list is returned. If there is no match, ERROR is returned. If the function getToken() is called once on input 1000101, it will return:

a. R1
b. R2
c. R3
d. R4
e. ERROR

Answers

Answer:

c. R3

Explanation:

For R1;

there are 10 matches, after these 10 no matches occur again

for R2;

this also does not match more than 10 as we have in R1

for r3;

R3 has the longest match. Its matching can be done 1000101 times.

for r4;

The whole of r4 can be matched.

Error;

we cannot have an error because matches exist.

so in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first. R3 came first

In this exercise we have to use computer knowledge to identify which is the correct sequence of code that best corresponds to the given question, in this way we have that the correct alternative is:

[tex]c. R3[/tex]

So analyzing the first alternative, we find;  

For R1, there are 10 matches, after these 10 no matches occur again.

So analyzing the second alternative, we find;

For R2, this also does not match more than 10 as we have in R1

So analyzing the third alternative, we find;

R3 has the longest match. Its matching can be done 1000101 times.

So analyzing the fourth alternative, we find;

For R4, the whole of r4 can be matched.

So analyzing the fifth alternative, we find;

Error; we cannot have an error because matches exist.

So in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first.

See more about computer at brainly.com/question/950632

Def locate_substring(dna_snippet, dna): This function takes in two strings, dna_snippet and dna, where dna_snippet is a substring of dna, and returns all locations of the substring as a list of integers. In other words, dna_snippet may exist in multiple locations within dna; you should return the beginning index position of each occurrence of dna_snippet inside of dna. Example: * Sample DNA snippet (substring): "ATAT" * Sample DNA string: "GATATATGCATATACTT" * The returned position list: [1, 3, 9]

Answers

Answer:

In Python. The function is as follows:

def locate_substring(dna_snippet, dna):

   res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]  

   print("The returned position list : " + str(res))

Explanation:

This iterates defines the function

def locate_substring(dna_snippet, dna):

Check for all occurrence

   res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]  

print all occrrence

   print("The returned all position list : " + str(res))

Following is the Python program to the given question.

Python

According to the question,

DNA Series: GATATATGCATATACTTDNA

Snippet: ATAT

Program: def locate_substring (dna_snippet, dna):

start = 0 while True: start = dna.

find(dna_snippet, start) #finding the first occurrence of dna_snippet in dna.

if start == -1: return # if dna.find() returns -1 yield start #Resumes next execution start += 1dna=input ("Enter the DNA sequence: ") dna_snippet=input

("Enter the DNA snippet: ") print(list(locate_substring(dna_snippet,dna )))

Program Explanation: Defining a function.

An infinite loop is being utilized just to produce the indexes from which dna snippet begins.

Determining the initial occurrence of dna snippet inside dna. storing the new occurrences of dna snippet throughout the starting point.

Whenever dna.find() returns minus one, it means there was no occurrence identified and the method should be exited.

Find out more information about Python here:

https://brainly.com/question/26497128

Write a program that implements a class called Dog that contains instance data that represent the dog's name and age. • define the Dog constructor to accept and initialize instance data. • create a method to compute and return the age of the dog in "person-years" (note: dog age in person-years is seven times a dog's age). • Include a toString method that returns a one-line description of the dog • Write a driver class called Kennel, whose main method instantiated and updates several Dog objects

Answers

Answer:

Dog.java:

Dog{

   //Declare instance variables

   private String name;

   private int age;

   

   //Create the constructor with two parameters, and initialize the instance variables

   public Dog(String name, int age){

       this.name = name;

       this.age = age;

   }

   

   //get methods

   public String getName(){

       return name;

   }

   

   public int getAge(){

       return age;

   }

   

   //set methods

   public void setName(String name){

       this.name = name;

   }

   

   public void setAge(int age){

       this.age = age;

   }

   

   //calculateAgeInPersonYears() method to calculate the age in person years by multiplying the age by 7

   public int calculateAgeInPersonYears(){

       return 7 * getAge();

   }

   

   //toString method to return the description of the dog

   public String toString(){

       return "Name: " + getName() + ", Age: " + getAge() + ", Age in Person Years: " + calculateAgeInPersonYears();

   }

}

Kennel.java:

public class Kennel

{

public static void main(String[] args) {

          //Create two dog objects using the constructor

          Dog dog1 = new Dog("Dog1", 2);

          Dog dog2 = new Dog("Dog2", 5);

          //Print their information using the toString method

          System.out.println(dog1.toString());

          System.out.println(dog2.toString());

          //Update the first dog's name using setName method

          dog1.setName("Doggy");

          System.out.println(dog1.toString());

          //Update the second dog's age using setAge method

          dog2.setAge(1);

          System.out.println(dog2.toString());

}

}

Explanation:

*The code is in Java.

You may see the explanations as comments in the code

Other Questions
who's Annabelle doll. What is the value of x in the matrix equation below? PLEEASE HELP I AM FAILING Fill in the blanks with suitable pronoun. (5 marks)1. She is Aminah. Aminah is _________ name.2. Nobody took her there. _______ went there by __________.3. I can go to work by ________ every day.4. She give a pen to you. The pen is _________.5. They hid _______ under the bed yesterday.Write the correct adjective for each sentence in the blank space given. (5 marks)1.Dont go near the dog. It is ____________ (dangerous/ dangerouser/ most dangerous).2.Samy always wakes up __________ (early/ earlier/ more early) than his brother, Rama.3.Swee Boon young; but he is ________ (stronger/ strongest/ strong) than his father.4.Lisa was the ____________ (successful/ more successful/ most successful) student in her class.5.The sky is __________ (cloudier/ cloudy/ more cloudy). It is going to rain.Fill in the blanks with the correct tense form (simple present/simple past/simple future) of the verbs in brackets. (10 marks)1.I __________ (not,be) here next week.2.___________ (be) he here yesterday?3.My father ___________ (pay) the bills tomorrow.4.Mrs. Sufiah ___________ (have) a lot of friends when she was a teenager.5.Cooking oil ___________ (be) a must for frying.6.I always ___________ (close) the window at night because it is cold.7.The athletes ____does_______ (do) their best to win the games tomorrow.8.Last night, Linda ___________ (arrive) home very late.9.___________ she ___________ (have) any class today?10.___________ the small boy ___________ (understand) what you are going to say? Which Century Maked The Begenning Of Medival Period In India ? Why ? pls help pls pls psl pls pls A Manuel le encanta el chocolate. En su pas, Manuel paga diez bolvares por un chocolate. Manuel compra tres chocolates. Manuel no tiene dinero para comprar refrescos. La mam de Manuel paga cinco bolvares por la limonada.Based on the dialogue, where is Manuel? En Chile En Mxico En Honduras En Venezuela A 90 ounce bag of nuts has cashews and peanuts in it. The peanuts weight is 10 more than 3times the weight of the cashews. Find the weight of the cashews and peanuts. 50 points. Can someone draw me the diagram. If someone can draw it for me I'll be able to finish the rest myself. I'm just confused about what it is I'm supposed to draw. The directions are in the picture. Please answer the questions attached below Hi could can you please tell me the answer and tell me how you got it so I can understand this? Both 6 A and B Una pelota recorre 20 m hacia la derecha y luego 10 m hacia la izquierda, todo en un lapso de tiempo de 10 s , cual es si velocidad y rapidez? Select the most reactive metal from the options belowIronCopperZincGold Help math plzshnsndnfjc To 3 significant digits, what is the period of the pendulum using the equation for the period of a simple pendulum? Hint, the information you need is on the right side of the screen. The equation for the period of a pendulum is: T = 24 V 1. If someone intentionally insults you, he or she would be guilty of committing this Which of the following is one reason that unions play a decreased role in the US economy today?A.Many large US factories have closed as companies seek lower-priced labor elsewhere.B.Over time, the collective bargaining process has helped define acceptable actions for management and labor.C.Long-time union efforts have led to higher wages and improved working conditions.D.Regulations established by the US government have limited the effectiveness of unions. The graphs below have the same shape. What is the equation of the bluegraph?F(X) = x2G(X) = ?A. G(X) = x2 + 4B. G(X) = x2-4C. G(X) = (x+4)2D. G(x) = (x-4)2 . Balance is an important element of photography. Does this mean that every part of the image must have the same amount of objects in it? A. No, it is one factor to consider. B. Yes, that is what makes it balanced. C. Yes, but only when the objects are large. D. No, objects can be anywhere in the image. Anaphylactic shock is not serious like regular shock? true or false