In a real pulley system, the work supplied must be the work accomplished.

Equal to
Less than
Greater than

Answers

Answer 1

sorry I was testing something


Related Questions

In order to place something into a container you must:_______.
a. double-click on the container and type a command.
b. drag the container onto the materials or instruments shelf.
c. double-click on the material or the instrument.
d. click on the material or instrument and drag it onto the container.

Answers

Answer:

Option (d) is the correct answer to this question.  

Explanation:

The container is a class, data structure, or abstract data type, the instances of which are compilations of many other particles. In several other words, they store objects in an ordered manner that meets strict rules about access. The reviewing information depends on the number of objects (elements) contained therein. To put any material or instrument in the container, it would be easy to select the material or instrument by clicking them and then dragging them onto the container. The other option won't be able to perform the required task.

Other options are incorrect because they are not related to the given scenario.

Who do you think larger or smaller clients will benefit most from MasterCard’s analytics tools? Why?

Answers

Answer:The key to analytics success is not about searching for answers, ... If you are trying to determine where to find new customers, there is a recipe for how to do that, and it ... As we work with small businesses, we help them answer their big ... Moving forward, there is going to be a lot more data of varying types.

Explanation:

3.26 LAB: Leap Year A year in the modern Gregorian Calendar consists of 365 days. In reality, the earth takes longer to rotate around the sun. To account for the difference in time, every 4 years, a leap year takes place. A leap year is when a year has 366 days: An extra day, February 29th. The requirements for a given year to be a leap year are: 1) The year must be divisible by 4 2) If the year is a century year (1700, 1800, etc.), the year must be evenly divisible by 400 Some example leap years are 1600, 1712, and 2016. Write a program that takes in a year and determines whether that year is a leap year. Ex: If the input is: 1712 the output is: 1712 - leap year

Answers

Answer:

year = int(input("Enter a year: "))

if (year % 4) == 0:

  if (year % 100) == 0:

      if (year % 400) == 0:

          print(str(year) + " - leap year")

      else:

          print(str(year) +" - not a leap year")

  else:

      print(str(year) + " - leap year")

else:

  print(str(year) + "- not a leap year")

Explanation:

*The code is in Python.

Ask the user to enter a year

Check if the year mod 4 is 0 or not. If it is not 0, then the year is not a leap year. If it is 0 and if the year mod 100 is not 0, then the year is a leap year. If the year mod 100 is 0, also check if the year mod 400 is 0 or not. If it is 0, then the year is a leap year. Otherwise, the year is not a leap year.

Using Python I need to Prompt the user to enter in a numerical score for a Math Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a English Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a PE Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for a Science Class. The numerical score should be between 0 and 100. Prompt the user to enter in a numerical score for an Art Class. The numerical score should be between 0 and 100. Call the letter grade function 5 times (once for each class). Output the numerical score and the letter grade for each class.

Answers

Answer:

The program doesn't use comments; See explanation section for detailed line by line explanation

Program starts here

def lettergrade(subject,score):

     print(subject+": "+str(score))

     if score >= 90 and score <= 100:

           print("Letter Grade: A")

     elif score >= 80 and score <= 89:

           print("Letter Grade: B")

     elif score >= 70 and score <= 79:

           print("Letter Grade: C")

     elif score >= 60 and score <= 69:

           print("Letter Grade: D")

     elif score >= 0 and score <= 59:

           print("Letter Grade: F")

     else:

           print("Invalid Score")

maths = int(input("Maths Score: "))

english = int(input("English Score: "))

pe = int(input("PE Score: "))

science = int(input("Science Score: "))

arts = int(input("Arts Score: "))

lettergrade("Maths Class: ",maths)

lettergrade("English Class: ",english)

lettergrade("PE Class: ",pe)

lettergrade("Science Class: ",science)

lettergrade("Arts Class: ",arts)

Explanation:

The program makes the following assumptions:

Scores between 90–100 has letter grade A

Scores between 80–89 has letter grade B

Scores between 70–79 has letter grade C

Scores between 60–69 has letter grade D

Scores between 0–69 has letter grade E

Line by Line explanation

This line defines the lettergrade functions; with two parameters (One for subject or class and the other for the score)

def lettergrade(subject,score):

This line prints the the score obtained by the student in a class (e.g. Maths Class)

     print(subject+": "+str(score))

The italicized determines the letter grade using if conditional statement

This checks if score is between 90 and 100 (inclusive); if yes, letter grade A is printed

     if score >= 90 and score <= 100:

           print("Letter Grade: A")

This checks if score is between 80 and 89 (inclusive); if yes, letter grade B is printed

     elif score >= 80 and score <= 89:

           print("Letter Grade: B")

This checks if score is between 70 and 79 (inclusive); if yes, letter grade C is printed

     elif score >= 70 and score <= 79:

           print("Letter Grade: C")

This checks if score is between 60 and 69 (inclusive); if yes, letter grade D is printed

     elif score >= 60 and score <= 69:

           print("Letter Grade: D")

This checks if score is between 0 and 59 (inclusive); if yes, letter grade F is printed

     elif score >= 0 and score <= 59:

           print("Letter Grade: F")

If input score is less than 0 or greater than 100, "Invalid Score" is printed

     else:

           print("Invalid Score")

This line prompts the user for score in Maths class

maths = int(input("Maths Score: "))

This line prompts the user for score in English class

english = int(input("English Score: "))

This line prompts the user for score in PE class

pe = int(input("PE Score: "))

This line prompts the user for score in Science class

science = int(input("Science Score: "))

This line prompts the user for score in Arts class

arts = int(input("Arts Score: "))

The next five statements is used to call the letter grade function for each class

lettergrade("Maths Class: ",maths)

lettergrade("English Class: ",english)

lettergrade("PE Class: ",pe)

lettergrade("Science Class: ",science)

lettergrade("Arts Class: ",arts)

What feature in the Windows file system allows users to see only files and folders in a File Explorer window or in a list of files from the dir command to which they have been given at least read permission?

Answers

Answer:

Access based enumeration

Explanation:

The access based enumeration is the feature which helps the file system to allow users for seeing the files and folders for which they have read access from the direct command.

Access based enumeration: This feature displays or shows only the folders and files that a user has permissions for.

If a user do not have permissions (Read) for a folder,Windows will then hide the folder from the user's view.

This feature only function when viewing files and folders are in a shared folder. it is not active  when viewing folders and files in a local system.

A security analyst is investigating a call from a user regarding one of the websites receiving a 503: Service unavailable error. The analyst runs a netstat -an command to discover if the webserver is up and listening. The analyst receives the following output:
TCP 10.1.5.2:80 192.168.2.112:60973 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60974 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60975 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60976 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60977 TIME_WAIT
TCP 10.1.5.2:80 192.168.2.112:60978 TIME_WAIT
Which of the following types of attack is the analyst seeing?
A. Buffer overflow
B. Domain hijacking
C. Denial of service
D. Arp poisoning

Answers

Answer:

C. Denial of Service

Explanation:

Denial of service error occurs when the legitimate users are unable to access the system. They are then unable to access the information contained in the system. This can also be a cyber attack on the system in which user are stopped from accessing their personal and important information and then ransom is claimed to retrieve the attack. In such case system resources and information are temporarily unavailable to the users which disrupts the services.

Define the following terms, as they pertain to website planning: goals, objectives, target audience, and purpose statement. Explain the influence on society of inexpensive Internet access and access to the web.

Answers

Answer:

Please see explanations below

Explanation:

Goals; These are the outcomes that a website planning intends to achieve within a stipulated time, i.e weeks, months or years.

Objectives; These are the methods taken, through which the website planning goals will be achieved.

Target audience; These are the specific group of people that are intended to be reached for the website planning. The targeted audience could be identified based on age range, academic background or qualification, gender or marital status.

Purpose statement; This refers to an explanation of the website's planning goals, which is formally written and also shows the main objectives identified with the goals.

The Influence on society of inexpensive internet access and access to the web are numerous; yet it provide information that are not readily accessible by individuals before using the internet. For information to be accessed through internet access by all and sundry, it must come at little or no cost, which is what is currently obtainable in most part of the world.

Moreover, inexpensive access to the internet and web also improve quality of knowledge in addition to the existing ones through research, which is mostly done through the internet.

However, there are also downside of inexpensive access to the internet and web which now depends on whichever individuals want. For instance not every information on the website are true or correct. The right thing to be done is to further search and compare several ones until the right one is found.

A software company assesses its developers more on their client support skills rather than their development skills. Which of the following terms would best describe the software company's performance management process?


A. Deficient
B. Contaminated
C. Unreliable
D. Inconsistent
E. Unspecified

Answers

Answer:

B. Contaminated

Explanation:

Based on the information provided regarding the scenario it seems that the software company's performance management process can be best described as contaminated. This occurs when the criterion of measurement for the employee performance includes aspects of performance that are not part of the job. Which in this case the main role of the employees is to apply their development skills in order to improve the software and not focus on their client support skills, but instead the "client support skills" is what the company is basing their performance review on.

The fill command try’s to fill or generate content for cells based on a ________.

Answers

Answer: Ctrl + R

Explanation:

Ctrl+ R is the shortcut for filling right, you will first highlight cells.

The weekly pay for an employee is determined based on the following parameters:
Standard work hours by week is 40 hours.
Hourly pay rate is $10.00 per hour
Overtime hours are paid at time and a half the rate (that is $15.00 per hour).
Design and implement a program (name it WeeklyPay) that read number of hours worked per week (as integer value), prints out the entered hours, and then prints out the gross earning. Organized your output following these sample runs.
Sample run 1:
You entered 20 hours.
Gross earning is $200.0
Sample run 2:
You entered 40 hours.
Gross earning is $400.0
Sample run 3:
You entered 50 hours.
Gross earning is $550.0

Answers

394484845848585858484

Write a method that finds the cheapest name of apples, and returns back a String stating what the apple name is and how much it costs. The method should take two arrays as two parameters (you do not need to make a two dimensional array out of these arrays).

Answers

The question is incomplete! Complete question along with answer and step by step explanation is provided below.

Question:

Two arrays are given:  

String apples[] = {"HoneyCrisp", "DeliciousRed", "Gala", "McIntosh",  "GrannySmith"};

double prices[] = {4.50, 3.10, 2.45, 1.50, 1.20};

Write a method that finds the cheapest name of apples, and returns back a String stating what the apple name is and how much it costs. The method should take two arrays as two parameters (you do not need to make a two dimensional array out of these arrays).

Answer:

The complete java code along with the output is prrovided below.

Java Code:

public class ApplesCheap

{

   public static String Cheapest(String apples[], double prices[])

 {

       int temp = 0;

       for (int i = 0; i < apples.length; i++)

    {

         if (prices[i] < prices[temp])

          {

               temp = i;

           }

       }

       return apples[temp];

   }

public static void main(String[] args)

{

// define the array of apple names and their prices

  String apples[] = {"HoneyCrisp", "DeliciousRed", "Gala", "McIntosh", "GrannySmith"};

  double prices[] = {4.50, 3.10, 2.45, 1.50, 1.20};

// print the cheapest apple by calling the function Cheapest

  System.out.println("The cheapest apple is: " + Cheapest(apples, prices));

   }

}

Output:

The cheapest apple is: GrannySmith

A system developer needs to provide machine-to-machine interface between an application and a database server in the production enviroment. This interface will exchange data once per day. Which of the following access controll account practices would BESt be used in this situation?

a. Establish a privileged interface group and apply read -write permission.to the members of that group.
b. Submit a request for account privilege escalation when the data needs to be transferred
c. Install the application and database on the same server and add the interface to the local administrator group.
d. Use a service account and prohibit users from accessing this account for development work

Answers

Answer:

The correct option is (d) Use a service account and prohibit users from accessing this account for development work

Explanation:

Solution

As regards to the above requirement where the application and database server in the production environment will need to exchange the data once ever day, the following access control account practices would be used in this situation:

By making use of a service account and forbids users from having this account for development work.

The service account can be useful to explicitly issue a security context for services and thus the service can also access the local and the other resources and also prohibiting the other users to access the account for the development work.

Submitting an adhoc request daily is not a choice as this is required daily. Also, the servers can be different and cannot be put in one place. and, we cannot make use of the read-write permission to the members of that group.

A list based on a simple array (standard array implementation) is preferable to a dynamically allocated list for the following reasons.
A. Insertions and deletions require less work.
B. You are guaranteed a space to insert because it is already allocated.
C. You can take advantage of random-access typically.
D You can mix and match the types of the items on the list. E. (b) and (c).
F. All of the above.

Answers

Answer:

A. Insertions and deletions require less work.

C. You can take advantage of random access typically

D. You can mix and match the types of the items on the list.

Explanation:

Standard array implementation is a process in which number of items are of same type and index is restricted at a certain range. This is preferable to dynamic allocated list because it requires less work in insertion and deletions. A dynamically allocated array does not use the fixed array size declaration.

1. (1 point) Which flag is set when the result of an unsigned arithmetic operation is too large to fit into the destination? 2. (1 point) Which flag is set when the result of a signed arithmetic operation is either too large or too small to fit into the destination? 3. (1 point) Which flag is set when an arithmetic or logical operation generates a negative result?

Answers

Answer:

(1) Carry flag (2) Overflow flag (3) Sign or negative Flag

Explanation:

Solution

(1) The carry flag : It refers to the adding or subtracting. a two registers has a borrow or carry bit

(2) The over flow flag: This flag specify that a sign bit has been modified during subtracting or adding of operations

(3) The sign flag: This is also called a negative sign flag is a single bit status in a register that specify whether the last mathematical operations  generated a value to know if the most significant bit was set.

Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then convert the temperature to Fahrenheit and display it to the screen. Finally, it should convert the Fahrenheit temperature to Kelvin and display that to the screen.

Answers

Answer:

c = float(input("Enter the temperature in Celsius: "))

f = c * 1.8 + 32

print("The temperature in Fahrenheit: " + str(f))

k = (f - 32) / 1.8 + 273.15

print("The temperature in Kelvin: " + str(k))

Explanation:

*The code is in Python.

Ask the user to enter the temperature in Celsius

Convert the Celsius to Fahrenheit using the conversion formula and print it

Convert the Fahrenheit to Kelvin using the conversion formula and print it

Imagine you are building an ATM system; list at least 6 application domains for the system. That is, in which context is the system going to be used? How is it going to be used? Who are all the users of the ATM?

Answers

Answer:

Six applications domains for the ATM was listed below in the explanation section below

The main aim of the ATM is cash collection, user information update.

The users of the ATM are people, staff, customers/clients.

Explanation:

Solution

Given that

The Application domain for the system is given below:

The System is going to verify the details enteredUpdate the database on the server sideCalculation of cash AvailableCount the Cash and Identify the note in the MachineTroubleshooting of the ATM machine (system)Backup of the system and Operating system /Software installed on the ATM machine.

The ATM is going to be used for the purpose of collecting cash, updating user information, cashing cheques etc and is used by all the Bank customers.

Who are the users of ATM:

Customers at the bankIndividuals /peopleStaff of the Bank

NAT ________. allows a firm to have more internal IP addresses provides some security both allows a firm to have more internal IP addresses and provides some security neither allows a firm to have more internal IP addresses nor provides some security

Answers

Answer:

NAT provides some security but allows a firm to have more internal IP addresses

Explanation:

NAT ( network address translation) this is a process where a  network system usually a firewall  assigns a public IP address to an internal computer used in a private network. it limits the number of public IP address a company operating a private network for its computer can have and this is very economical also limits the exposure of the company's private network of computers. the computers can access information within the private network using multiple IP addresses but it is safer to access external information using one public IP address

Write a loop that reads strings from standard input where the string is either "land", "air", or "water". The loop terminates when "xxxxx" (five x characters) is read in. Other strings are ignored. After the loop, your code should print out 3 lines: the first consisting of the string "land:" followed by the number of "land" strings read in, the second consisting of the string "air:" followed by the number of "air" strings read in, and the third consisting of the string "water:" followed by the number of "water" strings read in. Each of these should be printed on a separate line. Use the up or down arrow keys to change the height.

Answers

Answer:

count_land = count_air = count_water = 0

while True:

   s = input("Enter a string: ")

   if s == "xxxxx":

       break

   else:

       if s == "land":

           count_land += 1

       elif s == "air":

           count_air += 1

       elif s == "water":

           count_water += 1

print("land: " + str(count_land))

print("air: " + str(count_air))

print("water: " + str(count_water))

Explanation:

*The code is in Python

Initialize the variables

Create a while loop that iterates until a specific condition is met. Inside the loop, ask the user to enter the string. If it is "xxxxx", stop the loop. Otherwise, check if it is "land", "air", or "water". If it is one of the given strings, increment its counter by 1

When the loop is done, print the number of strings entered in the required format

Write a program that prompts the user to enter a hex digit and displays its corresponding binary number. Sample Run 1 Enter a hex digit: B The binary value is 1011 Sample Run 2 Enter a hex digit: b The binary value is 1011 Sample Run 3 Enter a hex digit: T Invalid input

Answers

Answer:

I am writing a JAVA program. Let me know if you want the program in some other programming language.

import java.util.Scanner; //to take input from user

public class HexaToBinary{ //class to convert hexa to binary number

public static void main(String[] args) {// start of main() function body

//creates instance of Scanner class

      Scanner input = new Scanner(System.in);

//prompts user to enter a hexadecimal number

System.out.print("Enter a hex digit: ");

char hexadecimal = input.nextLine().charAt(0);//reads input from user

 String binary = ""; //variable to hold corresponding binary number

/*switch statement is used to convert hexadecimal input to corresponding binary number. the switch statement has cases. Each case has a hexa decimal number. The user's input is stored in hexadecimal variable which is given as a choice parameter to switch statement. If the input matches any of the cases in switch statement, the body of that case is executed which prints the corresponding binary number otherwise invalid input message is displayed in output */

  switch (hexadecimal) {

      case '0': binary = "0"; break;

      case '1': binary = "1"; break;

      case '2': binary = "10"; break;

      case '3': binary = "11"; break;

      case '4': binary = "100"; break;

      case '5': binary = "101"; break;

      case '6': binary = "110"; break;

      case '7': binary = "111"; break;

      case '8': binary = "1000"; break;

      case '9': binary = "1001"; break;

//here both the upper and lower case letters are defined in case, so the user //can enter a hexadecimal in lowercase or uppercase

             case 'a':

             case 'A': binary = "1010"; break;

      case 'b':

             case 'B':binary = "1011"; break;

      case 'c':

             case 'C': binary = "1100"; break;

      case 'd':

             case 'D': binary = "1101"; break;

      case 'e':

             case 'E': binary = "1110"; break;

      case 'f':

             case 'F': binary = "1111"; break;

      default: System.out.println(hexadecimal + " is invalid input"); System.exit(1);   } //displays this message if user enters invalid input e.g T

    System.out.println("The binary value is " + binary); } }

//prints the corresponding binary number of the hexadecimal input

Explanation:

The program is well explained in the comments mentioned with each line of the program. Lets take an example of user input.

For example if user enters b in input then the cases of the switch statement are searched for by the program to select the corresponding binary number of the input hexadecimal. So b is present in case 'b': case 'B':binary = "1011"; break; So the value of binary is 1011 and this value is displayed on the screen with this statement System.out.println("The binary value is " + binary); So the output is: The binary value is 1011

The screenshot of output and program are attached.

You’ve just finished training an ensemble tree method for spam classification, and it is getting abnormally bad performance on your validation set, but good performance on your training set. Your implementation has no bugs. Define various reasons that could be causing the problem?

Answers

Answer:

The various reasons that could be a major problem for the implementation are it involves a large number of parameters also, having a noisy data

Explanation:

Solution

The various reasons that could be causing the problem is given as follows :

1. A wide number of parameters :

In the ensemble tree method, the number of parameters which are needed to be trained is very large in numbers. When the training is performed in this tree, then the model files the data too well. When the model has tested against the new data point form the validation set, then this causes a large error because the model is trained completely according to the training data.

2. Noisy Data:

The data used to train the model is taken from the real world . The real world's data set is often noisy i.e. contains the missing filed or the wrong values. When the tree is trained on this noisy data, then it sets its parameters according to the training data. As regards to testing the model by applying the validate set, the model gives a large error of high in accuracy y.

(Convert milliseconds to hours, minutes, and seconds) Write a function that converts milliseconds to hours, minutes, and seconds using the following header: def convertMillis(millis): The function returns a string as hours:minutes:seconds. For example, convertMillis(5500) returns the string 0:0:5, convertMillis(100000) returns the string 0:1:40, and convertMillis(555550000) returns the string 154:19:10. Write a test program that prompts the user to enter a value for milliseconds and displays a string in the format of hours:minutes:seconds. Sample Run Enter time in milliseconds: 555550000 154:19:10

Answers

Answer:

I am writing the Python program. Let me know if you want the program in some other programming language.

def convertMillis(millis):  #function to convert milliseconds to hrs,mins,secs

   remaining = millis  # stores the value of millis to convert

   hrs = 3600000  # milliseconds in hour

   mins = 60000  # milliseconds in a minute

   secs = 1000  #milliseconds in a second

   hours =remaining / hrs  #value of millis input by user divided by 360000

   remaining %= hrs  #mod of remaining by 3600000

   minutes = remaining / mins  # the value of remaining divided by 60000

   remaining %= mins  #mod of remaining by 60000

   seconds = remaining / secs  

#the value left in remaining variable is divided by 1000

   remaining %= secs  #mod of remaining by 1000

   print ("%d:%d:%d" % (hours, minutes, seconds))

#displays hours mins and seconds with colons in between

   

def main():  #main function to get input from user and call convertMillis() to #convert the input to hours minutes and seconds

   millis=input("Enter time in milliseconds ")  #prompts user to enter time

   millis = int(millis)  #converts user input value to integer

   convertMillis(millis)   #calls function to convert input to hrs mins secs

main() #calls main() function

Explanation:

The program is well explained in the comments mentioned with each line of code. The program has two functions convertMillis(millis) which converts an input value in milliseconds to hours, minutes and seconds using the formula given in the program, and main() function that takes input value from user and calls convertMillis(millis) for the conversion of that input. The program along with its output is attached in screenshot.

2 Consider the sequence of keys (5,16,22,45,2,10,18,30,50,12,1). Draw the result of inserting entries with these keys (in the given order) into a. An initially empty (2,4) tree. b. An initially empty red-black tree.

Answers

Answer:

A) (2,4) tree

Insertion of  key 45 makes key unbalanced and this is because it violates the 2,4 tree so we split the nodeinsertion of key 10 makes key unbalanced and this is because it violates the 2,4 tree so we split the node

B) Red-black tree

Explanation:

The diagrams for the solutions are attached showing the results of inserting entries

The term digital divide refers to "the gap between people with effective access to digital and information technology and those with very limited or no access at all." Could you imagine a life without computers and readily-available internet access? The influence of the Internet can be seen as many of our churches now spread the word using high-tech media productions and sophisticated video presentations. Discuss some of factors that influence unequal Internet access for some members of society.

Answers

Answer:

Factors Influencing Unequal Internet Access:

1. Age: Children under 10 and adults over 60 do not enjoy the same level of access to the internet.  For children 10, their parents restrict their use of the internet.  Most adults over 60 lack the interest and competence to utilize access to the internet.

2. Sex: Men usually enjoy better access to the internet than women.  While men explore many sources of internet information, women usually restrict themselves to social media, which is usually their favorites, giving the high-level chatting that is involved in social media.

3. Nationality:  Access to the internet is not available equally in all the nations of the world.  In communist China, there are government-mandated restrictions placed on citizens.  In some sub-Saharan African countries, access to the internet is a luxury that many cannot afford and it is not easily available due to lack of basic internet infrastructure.

4. Education is another factor that influences access to the internet.  The level of education dictates whether somebody has access or not.  Many illiterate men and women who do not value the internet.  What you do not value, you do not use.  What you do not use is not accessible to you.

5. Income:  This is another important factor that influences access to the internet.  In some countries, the availability of high-speed network remains unaffordable to the majority of the population.  They only have telephone networks to use their internet access, due to the high cost of high-speed digital satellite-based networks.  Many people can only access the internet on public WiFis.

Explanation:

According to wikipedia.com, "Internet access is the ability of individuals and organizations to connect to the Internet using computer terminals, computers, and other devices; and to access services such as email and the World Wide Web."

Write a program consisting of: a. A function named right Triangle() that accepts the lengths of two sides of a right triangle as arguments. The function should determine and return the hypotenuse of the triangle. b. A main() function that should call right Triangle() correctly and display the value the function returns.

Answers

Answer:

The java program is as follows.

import java.lang.*;

public class Triangle

{

   //variables to hold sides of a triangle

   static double height;

   static double base;

   static double hypo;

   //method to compute hypotenuse

   static double rightTriangle(double h, double b)

   {

       return Math.sqrt(h*h + b*b);

   }

public static void main(String[] args) {

    height = 4;

    base = 3;

    hypo = rightTriangle(height, base);

 System.out.printf("The hypotenuse of the right-angled triangle is %.4f", hypo);

}

}

OUTPUT

The hypotenuse of the right-angled triangle is 5.0000

Explanation:

1. The variables to hold all the three sides of a triangle are declared as double. The variables are declared at class level and hence, declared with keyword static.

2. The method, rightTriangle() takes the height and base of a triangle and computes and returns the value of the hypotenuse. The square root of the sum of both the sides is obtained using Math.sqrt() method.

3. The method, rightTriangle(), is also declared static since it is called inside the main() method which is a static method.

4. Inside main(), the method, rightTriangle() is called and takes the height and base variables are parameters. These variables are initialized inside main().

5. The value returned by the method, rightTriangle(), is assigned to the variable, hypo.

6. The value of the hypotenuse of the triangle which is stored in the variable, hypo, is displayed to the user.

7. The value of the hypotenuse is displayed with 4 decimal places which is done using printf() method and %.4f format specifier. The number 4 can be changed to any number, depending upon the decimal places required.

8. In java, all the code is written inside a class.

9. The name of the program is same as the name of the class having the main() method.

10. The class having the main() method is declared public.

11. All the variables declared outside main() and inside another method, are local to that particular method. While the variables declared outside main() and inside class are always declared static in java.

1. Write a program that asks the user to enter a string. The program should then print the following: (a) The total number of characters in the string (b) The string repeated 10 times (c) The first character of the string (remember that string indices start at 0) (d) The first three characters of the string (e) The last three characters of the string (f) The string backwards (g) The seventh character of the string if the string is long enough and a message otherwise (h) The string with its first and last characters removed (i) The string in all caps (j) The string with every a replaced with an e

Answers

Answer:

s = input("Enter a string: ")

print(len(s))

print(s*10)

print(s[0])

print(s[:3])

print(s[len(s)-3:])

print(s[::-1])

if len(s) >= 7:

   print(s[6])

else:

   print("The string is not long enough")

print(s[1:len(s)-1])

print(s.upper())

print(s.replace("a", "e"))

Explanation:

*The code is in Python.

Ask the user to enter a string

Use len method to get the total number of characters

Use "*" to repeat 10 times

Use index, 0,  to get first character

Use slicing to get first three characters

Use slicing to get last three characters

Use slicing to get it in backwards

Check if the length is greater than or equal to 7. If it is, use index, 6. Otherwise, print a message.

Use slicing to remove first and last characters

Use upper method to get it in all caps

Use replace method to replace the "a" with the "e"

The program that ask the user to enter a string and print the  (a) The total number of characters in the string (b) The string repeated 10 times (c) The first character of the string (remember that string indices start at 0) (d) The first three characters of the string (e) The last three characters of the string (f) The string backwards (g) The seventh character of the string if the string is long enough and a message otherwise (h) The string with its first and last characters removed (i) The string in all caps (j) The string with every a replaced with an e

is as follows:

x = str(input("please enter a string: "))

print(len(x))

print(x*10)

print(x[0])

print(x[0:3])

print(x[-3:])

print(x[::-1])

if len(x) >= 7:

  print(x[6])

else:

  print("The string is not up to length 7")

print(x[1:-1])

print(x.upper())

print(x.replace('a', 'e'))

The first line ask the user for a string input.

Print length of the user input

Print the user input ten times.

Print the first value of the user input

print the first three string

Print the last three string

Print the reverse of the string

if the length of the user input is greater than or equals to zero, then print the 7th term of the user input.

else it will print that the string length is not up to seven.

Remove the first and the last term of the user input and print the remaining user input.

print the uppercase of the user input.

Replace a with e in the user input.

learn more on python here: https://brainly.com/question/20202506?referrer=searchResults

Going to Grad School! In the College of Computing and Software Engineering, we have an option for students to "FastTrack" their way into their master’s degree directly from undergraduate. If you have a 3.5 GPA and graduate from one of our majors, you can continue on and get your masters without having to do a lot of the paperwork. For simplification, we have four undergraduate degrees: CS, SWE, IT, and CGDD – and three masters programs: MSCS, MSSWE and MSIT. For this assignment, you’re going to ask the user a few questions and determine if they qualify for the FastTrack option.
Sample Output:
Major: Frogmongering
GPA: 3.9
Great GPA, but apply using the regular application.
Sample Output #2:
Major: SWE
GPA: 3.3
Correct major, but GPA needs to be higher.
Sample Output #3:
Major: IT
GPA: 3.5
You can FastTrack.
Sample Output #4:
Major: Study Studies
GPA: 0.4
Talk to one of our advisors about whether grad school is for you.

Answers

Answer:

The programming language is not stated. However, I'll answer this question using Python programming language.

The program uses no comments; find explanation below

i = 0

while not (i == 4):

     print("Sample Run: #"+str(i+1))

     Major = input("Major: ")

     GPA = float(input("GPA: "))

     if not (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):

           if GPA >= 3.50:

                 print("Great GPA, but apply using the regular application")

           else:

                 print("Talk to one of our advisors about whether grad school is for you")

     if (Major.upper() == "SWE" or Major.upper() == "IT" or Major.upper() == "CGDD" or Major.upper() == "CS"):

           if GPA >= 3.50:

                 print("You can FastTrack.")

           else:

                 print("Correct major, but GPA needs to be higher.")

     i = i + 1

Explanation:

Line 1 of the program initializes the sample run to 0

Line 2 checks if sample run is up to 4;

If yes, the program stops execution else, it's continues execution on the next line

Line 3 displays the current sample run

Line 4 and 5 prompts user for Major and GPA respectively

Line 6 to 10 checks is major is not one of CS, SWE, IT, and CGDD.

If major is not one of those 4 and GPA is at least 3.5, the system displays "Great GPA, but apply using the regular application"

If major is not one of those 4 and GPA is less than 3.5, the system displays "Talk to one of our advisors about whether grad school is for you"

Line 11 to 15 checks is major is one of CS, SWE, IT, and CGDD.

If major is one of those 4 and GPA is at least 3.5, the system displays "You can Fastrack"

If major is one of those 4 and GPA is less than 3.5, the system displays "Correct major, but GPA needs to be higher."

The last line of the program iterates to the next sample run

Use an Excel function to find: Note: No need to use Excel TABLES to answer these questions! 6. The average viewer rating of all shows watched. 7. Out of all of the shows watched, what is the earliest airing year

Answers

Answer:

Use the average function for viewer ratings

Use the min function for the earliest airing year

Explanation:

The average function gives the minimum value in a set of data

The min function gives the lowest value in a set of data

Which feature should a system administrator use to meet this requirement?
Sales management at universal Containers needs to display the information listed below on each account record- Amount of all closed won opportunities- Amount of all open opportunities.
A. Roll-up summary fields
B. Calculated columns in the related list
C. Workflow rules with fields updates
D. Cross-object formula fields

Answers

Answer:

The correct answer is option (A) Roll-up summary fields

Explanation:

Solution

The feature the administrator needs to use to meet this requirement is by applying Roll-up summary fields.

A roll-up summary field :A roll-up summary field computes or determine values from associated records, for example those in a linked list. one can develop a roll-up summary field to d a value in a master record  by building the values of fields in a detail record.

what are the point achieved on brainly used for i wants answers​

Answers

They are use to ask questions so you can get awnsers to the problem you ask

Answer:

They basiclly are used like a level up in other words they cause you to level up.

Explanation:

Want free points mark as brainiest

2.3 Write a program to prompt the user for hours and rate per hour using input to compute gross pay. Use 35 hours and a rate of 2.75 per hour to test the program (the pay should be 96.25). You should use input to read a string and float() to convert the string to a number. Do not worry about error checking or bad user data.

Answers

Answer:

The programming language is not stated; However this program will be written using Python programming language

Comments are not used; See Explanation Section for line by line explanation of the code

hours = float(input("Hours: "))

rate = float(input("Rate per hour: "))

pay = hours * rate

print(pay)

Explanation:

The first line of the code prompts the user for hour.

The input is converted from string to float

hours = float(input("Hours: "))

The next line prompts the user for hour.

It also converts input from string to float

rate = float(input("Rate per hour: "))

Pay is calculated by multiplying hours by rate; This is implemented using the next line

pay = hours * rate

The calculated value of pay is displayed using the next line

print(pay)

When the program is tested by the given parameters in the question

hours = 35

rate = 2.75

The printed value of pay is 96.25

Other Questions
In The Notorious Jumping Frog of Calaveras County by Mark Twain, which quote is an example of hyperbole? Smiley stood scratching his head and looking down. The feller took the money and started away. . . . he couldnt no more stir than if he was anchored out. Wheeler said Smiley was lucky. Look at this information.[tex]x \leqslant 0[/tex]1)Give an example of what the value of x could be.2) Give a different example of what the value of x could be. Look at figure D . Explain what will happen if a larger mass it put on the force meter Corrector guarantees its snowmobiles for three years. Company experience indicates that warranty costs will be approximately 5 % of sales. Assume that the Sierra dealer in Colorado Springs made sales totaling $ 800,000 during 2016. The company received cash for 30% of the sales and notes receivable for the remainder. Warranty payments totaled $12,000 during 2016.Required: a. Record the sales, warranty expense, and warranty payments for the company. Ignore cost of goods sold. b. Post to the Estimated Warranty Payable T-account. At the end of 2014, how much in Estimated Warranty Payable does the company owe? Assume the Estimated Warranty Payable is SO on January 1, 2014. what is odontoid process in bones/ Ture or false proofs of the Resurrection are few Question 11 pts2B+6HCI --| --> 2BCl3 + 3H2How many moles of boron chloride will be produced if you start with 8.752 moles of HCI(hydrochloric acid)? (Round to 3 sig figs. Enter the number only do not include units.) When using an alternative method of sizing with two vent connectors for draft hood-equipped water heaters, the effective area of the common vent connector or vent manifold and all junction fittings shall not be less than the area of the larger vent connector plus _____ percent of the areas of smaller flue collar outlets Find the equation of the line. Use exact numbers. y=___x+___ 41. Which pair of compounds could combine to produce an ester?I. CH3- CH2 - CH2 - CH3 II. CH3- CH2 - CH2-CH2-OHIII. CH3- CH2 - CH2-COOHIV. CH3- CH2- CH2- COHa. I and IIb. II and IIIc. II and IVd. III and IV Why did people begin to demand an end to property requirements for voting in 1819?The number of citizens voting in elections had grown too small,They wanted to elect politicians who could help them out of an economic crisis.The value of property had dropped considerably due to an economic crisis.They realized the government was ignoring the rules in the Constitution. Your aunt is about to retire, and she wants to sell some of her stock and buy an annuity that will provide her with income of $50,000 per year for 30 years, beginning a year from today. The going rate on such annuities is 7.25%. How much would it cost her to buy such an annuity today Evaluate e4 to one decimal place. Which system of inequalities is shown in the graph are all integers rational numbers? What is the 8th term in the binomial expansion of (2x+1)^9? Write a converter program for temperatures. This program should prompt the user for a temperature in Celsius. It should then convert the temperature to Fahrenheit and display it to the screen. Finally, it should convert the Fahrenheit temperature to Kelvin and display that to the screen. what is a function of a protein macromolecule Which statement gives one reason that watershed protection programs are needed in Virginia Ecosystems need to be controlled Foods must be prevented Dams can be damaged and may require repair Wildlife can ruin water source when building habitats (LC)Which of these was an effort by the Soviet Union to push the rest of the Allies out of East Germany? the Warsaw Pact the Berlin Blockade the Dumbarton Oaks Conference the Strategic Arms Limitation Treaty