Answer:
Time plot.
Explanation:
A time plot, also known as a time series can be defined as a graphical representation of a pre-defined value (data) against time.
If we recorded the average U.S. Housing Price every month for the next year, the graphical display which is most appropriate to display the data is a time plot.
Generally, when representing data that changes with respect to time or that are random in nature; a time plot is considered to be the most effective graphical display to use.
In this scenario, the average U.S. Housing Price that is observed should be plotted against the time of occurrence (months) over a year.
The line chart is a type of chart showing data as a succession of data sets linked by line segments. It demonstrates the price graph of an object using a single, solid path.
You should use a line chart to represent the graph because we are computing the average housing price in the United States every month for a year. This data is time-series data, and a line chart is the best graphical display for displaying time-series data.Then we'd have to record the average US housing price every month for the following year. A line chart graphical display would be the best way to display the data.Therefore, the final answer is "Line chart".
Learn more:
brainly.com/question/1639884
what is the use of painting tools name any 5 tools
Answer:
1. Brush
2. Bucket
3. Pencil
4. Color Picker
5. Air Brush
Oh man, that's all i think.
What AI technology is commonly used to describe Input A to Output B mappings?
Answer:
Supervised learning
Explanation:
Supervised learning is a term widely used in computer engineering that describes a form of the machine learning process, which is based on understanding a task that maps an input to an output based on illustration input A to output B pairs.
Hence, in this case, AI technology that is commonly used to describe Input A to Output B mappings is called SUPERVISED LEARNING
Write a simple command-line calculator with an exception handler that deals with nonnumeric operands. Your program should display a message that informs the user of the wrong operand type before exiting. It should also ask the user to re-input the number to finish the calculation.
Answer:
Here is the JAVA program:
import java.util.InputMismatchException; // exception that is thrown when input does not match the expected type
import java.util.Scanner; //used to take input from user
public class Main {
public static void main(String[] args) { //start of main function
Scanner input = new Scanner(System.in); // creates Scanner class object
double num1=0.0; // double type operand 1
double num2=0.0; // double type operand 2
System.out.println("Please enter 2 operands"); //prompts user to enter two operands
try { //defines a chunk of code to be tested for non numeric operand error
num1 = input.nextDouble(); //reads operand 1 value
num2 = input.nextDouble(); //reads operand 2 value
} catch (InputMismatchException ex) { //code chunk executed when exception occurs in program
System.out.println("wrong operand type, re-input " + input.next() + " to finish the calculation."); //displays wrong operand type if user enters non numeric operands
System.exit(1); }//exits the program
System.out.print("Enter an operator (+, -, *, /): "); //prompts user to enter an operator
char operator = input.next().charAt(0); //reads the input operator
double result; // to store the result of the operation
switch(operator) { //decided operation on basis of input operator
case '+': // if user enters + operator
result = num1 + num2; //adds two operands
break;
case '-': // if user enters - operator
result = num1 - num2; //subtracts two operands
break;
case '*': // if user enters * operator
result = num1 * num2; //multiplies two operands
break;
case '/': // if user enters / operator
result = num1 / num2; //divided two operands
break;
default: //if user enters wrong operator
System.out.printf("wrong operator!"); //displays wrong operator
return; }
System.out.printf("%.1f %c %.1f = %.1f", num1, operator, num2, result); }} //displays the result of the operation
Explanation:
The program is well explained in the comments mentioned with each line of program. The user is prompted to enter the values of two operands num1 and num2. The try block is used to test for non numeric operand error and throws InputMismatchException when any of the input operands (num1 or num2) is non numeric. InputMismatchException is thrown by Scanner class. This informs that the token retrieved (which is the num1 or num2 operand) does not match the expected type (which is type numeric). When this error occurs in the program, catch block is used to execute a code chunk, which is the print statement in this program. The print statement informs the user of the wrong operand type before exiting. It also asks the user to re-input the number to finish the calculation and the wrong input type is also mentioned in the output that is to be re-input.
If you want the program to take the input again from user after throwing this exception then you can alter the above program by using two try catch blocks separately for the two operands:
//for operand 1 i.e. num1
System.out.println("Please enter operand 1: ");
try {
num1 = input.nextDouble();
} catch (InputMismatchException ex) {
System.out.println("wrong operand type, re-input " + input.next() + " to finish the calculation.");
num1 = input.nextDouble(); } //reads input of operand 1 again from user
//for operand 2 i.e. num2
System.out.println("Please enter operand 2: ");
try {
num2 = input.nextDouble();
} catch (InputMismatchException ex) {
System.out.println("wrong operand type, re-input " + input.next() + " to finish the calculation.");
num2 = input.nextDouble(); } //reads input of operand 1 again from user
The program and its output is attached.
An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turned on is called ____________.
Answer:
Time machine.
Explanation:
An OS X backup utility that automatically backs up files to a dedicated drive that is always available when the computer is turned on is called a time machine.
OS X was released in 2001 and it's Apple's version ten (10) of the operating system that runs on its Macintosh computers.
A time machine is a software tool built into the Mac operating system and it is primarily designed to automatically backup user files or data onto a dedicated drive such as an external hard drive disk through a wired connection, by using a Thunderbolt or universal serial bus (USB) cable. The automatic backup can as well be done wirelessly through a network connection.
A keyboard would be considered____. Select 2 options.
Answer:
hardware
an input device
Explanation:
the ohter options are not applicable
Discuss some of the examples of poor quality in IT projects presented in the "What Went Wrong?" section. Could most of these problems have been avoided? Why do you think there are so many examples of poor quality in IT projects?
Answer:
Explanation:
One of the biggest problems in IT projects is that software and hardware are rushed to market, in order for the sellers to beat their competition and make large profits. This causes large problems in regards to the consumer's safety and wellbeing. Most of these problems can be easily avoided by performing better quality management and performing the necessary tests before releasing a product to the market. Overall most of these poor quality IT projects are a result of greed and money.
In QlikView, ________ are used to search information anywhere in the document.
Answer:
Search Object
Explanation:
Qlikview is a form of computer software application that is basically used in analytics explanation. In order to search for information anywhere in the document inside the Qlikview application, a form of sheet object referred to as SEARCH OBJECT is utilized.
Hence, in this case, In QlikView, SEARCH OBJECT is used to search for information anywhere in the document.
Which key or keys do you press to indent a first-level item in a list so it becomes a second-level item
This would be the Tab key
A customer complains that her desktop computer will not power on. What initial actions should you take?
Answer:
Test The Components and the motherboard
Explanation:
Well, im going to assume that she turned on the pc and the screen is completely black, nothing being displayed but the fans are spinning. The first thing i would do is test the components to see if its working or not. What i would do first is test the components. I would start from the RAM, Video Card (If it has one) CPU, PSU, and motherboard. I would also take out the CMOS battery and put it back in after a while to clear the bios settings if the customer messed with the bios settings. Make sure to test the motherboard and check for physical damage (Fried Areas, blown capacitors, water Damage etc.) And if you cant find any physical damage try testing the motherboard and see if its dead or not. Also try checking if all of the cables are plugged in all the way, like a loose HDMI cable, loose psu cable etc. Also make sure the psu is connected to power
Also, this is my first brainly answer. Yay :)
Initials action we should take are as follows,
Check that all of the cables are fully plugged in.Ensure that power supply is turned on.After that, i will check for faulty power cable.Now open CPU and check parts and devices one by one such as RAM, SMPS etc.These are the initial actions we should take when computer is not powering on.
Learn more https://brainly.com/question/24504878
Write an application that asks a user to enter an integer. Display a statement that indicates whether the integer is even or odd.
Answer:
in C++:
#include <iostream>
int main(){
int input;
std::cout<<"Enter a number: "<<std::endl;
std::cin>>input;
if(input%2==0){
std::cout<<" The number is even"<<std::endl;
}else{
std::cout<<"The number is odd"<<std::endl;
}
}
Explanation:
Getting user input as integer, and check if NUMBER÷2 have remainder=0 or no, if remainder==0 then number is even else number is odd
in java how do i Write a program that reads a set of integers, and then prints the sum of the even and odd integers.
Answer:
Here is the JAVA program:
import java.util.Scanner; //to take input from user
public class Main{
public static void main(String[] args) { //start of main function
Scanner input = new Scanner(System.in); // creates Scanner class object
int num, integer, odd = 0, even = 0; //declare variables
System.out.print("Enter the number of integers: "); //prompts user to enter number of integers
num = input.nextInt(); //reads value of num from user
System.out.print("Enter the integers:\n"); //prompts user to enter the integers
for (int i = 0; i < num; i++) { //iterates through each input integer
integer = input.nextInt(); // reads each integer value
if (integer % 2 == 0) //if integer value is completely divisible by 2
even += integer; //adds even integers
else //if integer value is not completely divisible by 2
odd += integer; } //adds odd integers
System.out.print("Sum of Even Numbers: " + even); //prints the sum of even integers
System.out.print("\nSum of Odd Numbers: " + odd);//prints the sum of odd integers
}}
Explanation:
The program is explained in the comments mentioned with each line of the code. I will explain the logic of the program with the help of an example.
Suppose user wants to input 5 integers. So,
num = 5
Suppose the input integers are:
1, 2 , 3, 4, 5
for (int i = 0; i < num; i++) is a for loop that has a variable i initialized to 0. The condition i<num is true because i=0 and num=5 so 0<5. Hence the statements inside body of loop execute.
At first iteration:
integer = input.nextInt(); statement reads the value of input integer. The first integer is 1
if (integer % 2 == 0) checks if integer is completely divisible by 2. The modulo operator is used which returns the remainder of the division and if this remainder is equal to 0 then it means that the integer is completely divisible by 2 and if the integer is completely divisible by 2 then this means the integer is even. 1%2 returns 1 so this means this condition evaluates to false and the integer is not even. So the else part executes:
odd += integer; this becomes:
odd = odd + integer
odd = 1
Now the value of i is incremented to 1 so i=1
At second iteration:
integer = input.nextInt(); statement reads the value of input integer. The first integer is 2
if (integer % 2 == 0) checks if integer is completely divisible by 2. 2%2 returns 0 so this means this condition evaluates to true and the integer is even. So
even += integer; this becomes:
even= even+ integer
even = 2
Now the value of i is incremented to 1 so i=2
At third iteration:
integer = input.nextInt(); statement reads the value of input integer. The first integer is 3
if (integer % 2 == 0) checks if integer is completely divisible by 2. 3%2 returns 1 so this means this condition evaluates to false and the integer is odd. So
odd += integer; this becomes:
odd= odd + integer
odd= 1 + 3
odd = 4
Now the value of i is incremented to 1 so i=3
At fourth iteration:
integer = input.nextInt(); statement reads the value of input integer. The first integer is 4
if (integer % 2 == 0) checks if integer is completely divisible by 2. 4%2 returns 0 so this means this condition evaluates to true and the integer is even. So
even+= integer; this becomes:
even = even + integer
even = 2 + 4
even = 6
Now the value of i is incremented to 1 so i=4
At fifth iteration:
integer = input.nextInt(); statement reads the value of input integer. The first integer is 5
if (integer % 2 == 0) checks if integer is completely divisible by 2. 5%2 returns 1 so this means this condition evaluates to false and the integer is odd. So
odd+= integer; this becomes:
odd= odd+ integer
odd= 4 + 5
odd = 9
Now the value of i is incremented to 1 so i=5
When i=5 then i<num condition evaluate to false so the loop breaks. The next two print statement prints the values of even and odd. So
even = 6
odd = 9
Hence the output is:
Sum of Even Numbers: 6 Sum of Odd Numbers: 9
Recall that within our BinarySearchTree class the root variable is of type BSTNode. A BSTNode object has three attributes: info of class T, left of class BSTNode, and right of class BSTNode, Following is the implementation of the isEmpty method: public boolean isEmpty() // Returns true if this BST is empty; otherwise, returns false.
{
return (root == null);
}
A. True
B. False
Answer:
False ( A )
Explanation:
The implementation is incorrect hence the return would be false and this is because : root.left is supposed to be NULL, root.right is supposed to be NULL and when these conditions are met then the Binary tree would be empty.
The condition for the above statement would be represented as
if( root.left = = null && root.right == null &&root.info == null)
return true;
else
return false;
Which one of the following statements is false? A. As storage is now cheap and plentiful, modern code management systems are less concerned with optimizing storage. B. Sub-version is the best-known, open-source code management product that is based around a centralized repository. C. In the open-source software development model, many different people can work independently on the code without any knowledge of what others are doing. D. The oldest and perhaps best-known system building tool is "Ant", which was originally developed in the 1970s for Unix.
Answer:
D. The oldest and perhaps best-known system building tool is "Ant", which was originally developed in the 1970s for Unix.
Explanation:
Ant often referred to Apache Ant is a computer software tool, though popularly considered oldest, was originally first built in the year 2000 by Unix, on Java platform, which is utilized as a component of plug-in development.
Hence, given the available options, the correct answer is Option D, because, Ant originally built in the year 2000 and not the year 1970, while the other statements are definitely correct.
The process of writing in-memory objects to a file so that the object can later be read back into memory ___.
Answer:
serialization
Explanation:
Serialization is basically the process of converting an object state to a stream of bytes that object can be read back into memory later, can be stored in (in a file etc), or can be transferred over a network or transmitted to memory, file etc. So the object state is saved in order to restart it later when needed.
In what section of the MSDS would you find information that may help if you use this substance in a lab with a Bunsen burner?
Answer:
The answer is "Fire-fighting measures".
Explanation:
This section is used to includes instructions to combat a chemicals flame. It is also known as the identify sources, which include the instructions for effective detonating devices and details for removing devices only appropriate for just a specific situation. It is the initiatives list, that is necessary destruction technology, materials; flaming inferno dangers.
The system board contains the logic circuitry that performs the instructions of a computer's applications.a. Trueb. False
Answer:
TRUE
Explanation:
As computer programs can be complex and difficult to write, they, A Web browser is an example of applications software. process, as well as programs, or instructions specifying the steps necessary to complete.
The statement "The system board contains the logic circuitry that performs the instructions of a computer's applications" is true.
What is a logical symbol?In Boolean algebra, the conjunction between two propositions is denoted by the logical AND symbol.
It is given that:
The statement is:
The system board contains the logic circuitry that performs the instructions of a computer's applications.
As we know,
An idealized or actual device called a logic gate implements a Boolean function, which is a logical operation on one or more binary inputs that results in a single binary output.
Because writing computer programs can be challenging and complex, An illustration of applications software is a web browser. programs or instructions that outline the steps required to perform a process
Thus, the statement "The system board contains the logic circuitry that performs the instructions of a computer's applications" is true.
Learn more about the logical symbol here:
brainly.com/question/11359207
#SPJ2
Write code to complete PrintFactorial()'s recursive case. Sample output if userVal is 5:5! = 5 * 4 * 3 * 2 * 1 = 120
Answer:
Here is the C++ program:
#include <iostream> //to use input output functions
using namespace std; //to access objects like cin cout
void PrintFactorial(int factCounter, int factValue){ // method definition
int nextCounter = 0; // initialize value of nextCounter by 0
int nextValue = 0; // initialize value of nextValue by 0
if (factCounter == 0) { //base case 1: 0! = 1
cout << "1" << endl; } //displays 1 in the output
else if (factCounter == 1) { //base case 2: 1! = 1
cout << factCounter << " = " << factValue << endl; } //displays 1 in result
else { //recursive case
cout << factCounter << " * ";
nextCounter = factCounter - 1; //decrements factCounter by 1
nextValue = nextCounter * factValue; // multiplies values of nextCounter and factValue and assigns the result to nextValue
PrintFactorial( nextCounter, nextValue); } } //recursively calls PrintFactorial method to compute the factorial
int main() { //start of main function
int userVal = 0; //initialize the userVal variable to 0
userVal = 5; //assigns 5 to the userVal variable
cout << userVal << "! = "; //prints the userVal with ! =
PrintFactorial(userVal, userVal); } //calls PrintFactorial method to compute the factorial of userVal i.e. 5
Explanation:
I will explain the logic of the program with an example.
The value of variable userVal is 5
This is passed to the method PrintFactorial()
1st step:
void PrintFactorial(int factCounter, int factValue) becomes:
PrintFactorial(5, 5)
PrintFactorial method has two base conditions which do not hold because the factCounter is 5 here which is neither 1 nor 0 so the program control moves to the recursive part.
cout << factCounter << " * ";
In recursive part, the above statement prints the value of factCounter followed by an asterisk on the output screen. So this prints:
5 *
nextCounter = factCounter - 1;
This statement decrements the value of factCounter by 1 and assigns it to nextCounter as:
nextCounter = 5 - 1;
nextCounter = 4
nextValue = nextCounter * factValue; multiplies the value of nextCounter by factValue and stores result in nextValue . So
nextValue = 4 * 5
nextValue = 20
PrintFactorial( nextCounter, nextValue); this statement calls the PrintFactorial() recursively to perform the above steps again until the base condition is reached. This statement becomes:
PrintFactorial(4,20)
2nd step:
PrintFactorial method has two base conditions which do not hold because the factCounter is 4 here which is neither 1 nor 0 so the program control moves to the recursive part.
cout << factCounter << " * ";
In recursive part, the above statement prints the value of factCounter followed by an asterisk on the output screen. So this prints:
5* 4 *
nextCounter = factCounter - 1;
This statement decrements the value of factCounter by 1 and assigns it to nextCounter as:
nextCounter = 4 - 1;
nextCounter = 3
nextValue = nextCounter * factValue; multiplies the value of nextCounter by factValue and stores result in nextValue . So
nextValue = 3 * 20
nextValue = 60
PrintFactorial( nextCounter, nextValue); This statement becomes:
PrintFactorial(3,60)
3rd step:
PrintFactorial method has two base conditions which do not hold because the factCounter is 3 here which is neither 1 nor 0 so the program control moves to the recursive part.
cout << factCounter << " * ";
In recursive part, the above statement prints the value of factCounter followed by an asterisk on the output screen. So this prints:
5* 4 * 3 *
nextCounter = factCounter - 1;
This statement decrements the value of factCounter by 1 and assigns it to nextCounter as:
nextCounter = 3 - 1;
nextCounter = 2
nextValue = nextCounter * factValue; multiplies the value of nextCounter by factValue and stores result in nextValue . So
nextValue = 2 * 60
nextValue = 120
PrintFactorial( nextCounter, nextValue); This statement becomes:
PrintFactorial(2,120)
4th step:
PrintFactorial method has two base conditions which do not hold because the factCounter is 2 here which is neither 1 nor 0 so the program control moves to the recursive part.
cout << factCounter << " * ";
In recursive part, the above statement prints the value of factCounter followed by an asterisk on the output screen. So this prints:
5* 4 * 3 * 2 *
nextCounter = factCounter - 1;
This statement decrements the value of factCounter by 1 and assigns it to nextCounter as:
nextCounter = 2 - 1;
nextCounter = 1
nextValue = nextCounter * factValue; multiplies the value of nextCounter by factValue and stores result in nextValue . So
nextValue = 1 * 120
nextValue = 120
PrintFactorial( nextCounter, nextValue); This statement becomes:
PrintFactorial(1,120)
Now the base case 2 evaluates to true because nextCounter is 1
cout << factCounter << " = " << factValue statement prints the value of factCounter i.e. 1 followed by an equal sign = followed by value of factValue i..e 120
So the output of the above program with userVal = 5 is:
5! = 5 * 4 * 3 * 2 * 1 = 120
Recursion functions are functions whose execution is controlled from within the function
The PrintFactorial()'s recursive caseThe code segment written in Python, where comments are used to explain each action is as follows:
#This defines the function
def PrintFactorial(n):
#if n is 1, this returns the value of n
if n == 1:
return n
#If otherwise
else:
#This calculates the factorial, recursively
return n*PrintFactorial(n-1)
Read more about python programs at:
https://brainly.com/question/16397886
The current standard for RFID is based off of Group of answer choices MIT standards IEEE standards ISO standards there is no agreement on a universal standard that’s accepted by all parties
Answer:
ISO standards
Explanation:
ISO / IEC 14443 is the ISO standard that covers RFID usage by devices.
EPCglobal - Electronics Product Code Global Incorporated is also another international standard that covers RFID. These two standards work together to standardize RFID products produced by manufacturers so that these products can be the same across different markets and manufacturers. Example I can purchase a tag from one manufacturer and a transceiver from another and they would function well together. There are also other standards for RFID but the above two are the biggest and most popular with ISO being the oldest.
Use the _____ and _____ features to prevent field columns from showing or to view two nonadjacent field columns for comparison.
Answer:
1. hide
2. freeze
Explanation:
In database management, a lot of functions can be carried out, among which is the HIDE and FREEZE functions.
Hence, a user can use the HIDE and FREEZE features to prevent field columns from showing or to view two nonadjacent field columns for comparison in database management.
Hence, in this case, the correct answer to the statement presented is HIDE and FREEZE
Which of the following encryption methods does PKI typically use to securely protect keys? a. Elliptic curve b. Digital signatures c. Asymmetric d. Obfuscation
Answer:
B. Digital Signature
Explanation:
Digital signature is an electronic signatures. They are used to authenticate the identity of a person sending the message. It ensures that the original content of the document or message remains unchanged. Digital signatures cannot be imitated. There are three types of digital signature certificates:
Sign Digital Signature Certificate
Encrypt Digital Signature Certificate
Sign & Encrypt Digital Signature Certificate
Identify the most common level of education for a programmer or software developer.
a bachelor's degree
a PhD
a high school diploma
a certificate
Answer:
A. a bachelor's degree
Explanation:
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms.a) trueb) false
Answer:
A. True.
Explanation:
E-mail is an acronym for electronic mail and it can be defined as an exchange or transmission of computer-based data (messages) from one user to another over a communications network system.
Also, a distributed application refers to a software program that is capable of running on several computer systems and can communicate effectively through a network.
E-mail is the most common distributed application that is widely used across all architectures and vendor platforms because it primarily operates on a client-server model, by providing users with the requested services through the Simple Mail Transfer Protocol (SMTP) using the standard port number of 25.
11. To select Access database entries, you should be in
O A. Datasheet view.
O B. Design view.
O C. Query wizard.
O D. Form Design.
Answer: A
Explanation:
Answer:
Design view
Explanation:
did it on edge
What three conditions must be satisfied in order to solve the critical section problem?
Answer:
Explanation:
The critical section problem revolves around trying to ensure that at most one process is executing its critical section at a given time. In order to do so, the three following conditions must be met.
First, no thread may be executing in its critical section if there is already a current thread executing in its critical section.
Second, only the specific threads that are not currently occupied executing in their critical sections are allowed to participate in deciding which process will enter its critical section next.
Third, a preset limit must exist on the number of times that other threads are allowed to enter their critical state after a thread has made a request to enter its critical state.
7.1 Describe the six clauses in the syntax of an SQL retrieval query. Show what type of constructs can be specified in each of the six clauses. Which of the six clauses are required and which are optional
Answer:
Answered below
Explanation:
The syntax of an SQL retrieval query is made up of six clauses. In the order in which they are used, they consist of: SELECT, FROM, WHERE, GROUP BY, HAVING and order by.
Of all these clauses, the SELECT clause and the FROM clause are required and must be included. They are the first two used to begin the retrieval query. The others are optional.
The SELECT clause allows you to choose the columns you want to get information or data, from.
The FROM clause identifies the table where the information is being retrieved.
The WHERE clause specifies a condition for the retrieval of information.
You use the GROUP BY clause to group your data in a meaningful way.
You use the HAVING clause to specify a condition on the group.
The ORDER BY clause is used to order results rows in descending or ascending order.
Help me pls, thank you
Answer:
pseudocode
flowchart
Explanation:
Answer:
Pseudo code flowchart
Write a function that takes any word and applies that pattern. I.E. printer =? p5r ; *** =? v2a ; function =? f6n
Answer:
I am writing a JAVA program:
import java.util.Scanner; //used to take input from user
public class Main{
public static void function(String word){ //function that takes a word as parameter an applies a pattern
int count=0; // count the number of characters between first and last characters of the word string
char first = word.charAt(0); //gets the first character of the word
char last = word.charAt(word.length() - 1); /gets the last character
for(int i = 1; i<word.length()-1;i++) //iterates through word to count the characters between first and last characters
{ count=i; } //sets the count of characters to count variable
System.out.println(first+""+count+""+last); } //prints the first and last characters of input word with the number of characters between first and last characters of word string
public static void main(String []args){//start of main function
Scanner input= new Scanner(System.in); //creates Scanner class object
System.out.print("Enter a word: "); // prompts user to enter a word
String str= input.nextLine(); //reads word string from user
function(str); } } //calls function passing the string to it
Explanation:
I will explain the program with the help of an example:
Suppose the word is printer.
charAt(0) returns the character at the 0-th index of a string word i.e printer. This means the first character of "printer" is returned i.e. 'p'
word.charAt(word.length() - 1) returns the character at the word.length() - 1 index of a string word i.e printer. This means the last character of "printer" is returned i.e. 'r'. Here length() function is used to return the length of the string. The length of "printer" is 7 (from 0 to 6) so word.length() -1 returns 7-1 = 6. This means the character at 6th index.
for(int i = 1; i<word.length()-1;i++) loop counts the character between the first and last character of "printer" . It works as follows:
1st iteration:
i = 1
i<word.length()-1 is true because 1<6
count = i
count = 1
i = i + 1
i = 2
2nd iteration:
i = 2
i<word.length()-1 is true because 2<6
count = i
count = 2
i = i + 1
i = 3
3rd iteration:
i = 3
i<word.length()-1 is true because 3<6
count = i
count = 3
i = i + 1
i = 4
4th iteration:
i = 4
i<word.length()-1 is true because 4<6
count = i
count = 4
i = i + 1
i = 5
5th iteration:
i = 5
i<word.length()-1 is true because 5<6
count = i
count = 5
i = i + 1
i = 6
At next iteration i<word.length()-1 evaluates to false because i = 6
So final value of count is:
count = 5
System.out.println(first+""+count+""+last); statement prints the first character of "printer" i.e. 'p', followed by value of count i.e. 5 , followed by last character of "printer" i.e. 'r'
Output:
p5r
What are the similarities and differences between the binary and decimal systems?
Answer:
A binary system is a system that functions on zeros and ones (0's and 1's).
A decimal system is an Arabic numeric system that has 10 as its base and uses a dot which is also called a decimal point to show fractions.
Differences
A decimal uses ten different digits which is 0-9 while a binary system uses just two digits 0 and 1Decimal system was historically a Hindu-Arabic system while the binary system is just an Arabic systemSimilarities
They are capable of performing arithmetic operations They both can be represented in decimal formDifferences between binary and decimal systems
A binary system represents information using two digits(0 and 1) while a decimal system represents information using ten digits (0 to 9) Numbers represented using the binary system has bits as their unit while numbers represented using the decimal system has digits as their unitBinary numbers are called base two numbers while decimal numbers are called base 10 numbersThe language understood by the computer system is binary, and not decimalSimilarities between binary and decimal systems
Arithmetic operations can be carried out on numbers in both the binary ands decimal systemsValues of each bit and digit in binary and decimal numbers respectively depends on how close they are to the decimal pointInteger and fraction components are represented in both decimal and binary systemsLearn more here: https://brainly.com/question/18520134
Change the value in cell E4 to 375000
Answer:
Click cell E4. Type 375000, and then press ENTER. Keyboard (2)1. Press SHIFT+TAB (or use ARROW keys) to select cell E4.
Data_____is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
a. ubiquity.
b. quality.
c. anomaly.
d. integrity.
Answer:
d. integrity
Explanation:
Data integrity is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.
Data integrity can be used to describe a state, a process or a function – and is often used as a proxy for “data quality”. Data with “integrity” is said to have a complete or whole structure. Data integrity is imposed within a database when it is designed and is authenticated through the ongoing use of error checking and validation routines. As a simple example, to maintain data integrity numeric columns/cells should not accept alphabetic data.