State the Common Ratio of the sequence 1/6, 1,
6, 36​

Answers

Answer 1

Answer:

6

Explanation:

The common ratio can be found by dividing terms with previous terms.

1 ÷ 1/6 = 6

6 ÷ 1 = 6

36 ÷ 6 = 6

Answer 2
6, you divide the terms

Related Questions

Define a function ComputeGasVolume that returns the volume of a gas given parameters pressure, temperature, and moles. Use the gas equation PV = nRT, where P is pressure in Pascals, V is volume in cubic meters, n is number of moles, R is the gas constant 8.3144621 ( J / (mol*K)), and T is temperature in Kelvin.Sample program:#include const double GAS_CONST = 8.3144621;int main(void) { double gasPressure = 0.0; double gasMoles = 0.0; double gasTemperature = 0.0; double gasVolume = 0.0; gasPressure = 100; gasMoles = 1 ; gasTemperature = 273; gasVolume = ComputeGasVolume(gasPressure, gasTemperature, gasMoles); printf("Gas volume: %lf m^3\n", gasVolume); return 0;}

Answers

Answer:

double ComputeGasVolume(double pressure, double temperature, double moles){

   double volume = moles*GAS_CONST*temperature/pressure;

    return volume;        

}

Explanation:

You may insert this function just before your main function.

Create a function called ComputeGasVolume that takes three parameters, pressure, temperature, and moles

Using the given formula, PV = nRT, calculate the volume (V = nRT/P), and return it.

4. Discuss the advantages and disadvantages of using the same system call interface for both files and devices. Why do you think operating system designers would use the same interface for both

Answers

Answer:

According to the principles of design, Repetition refers to the recurrence of elements of the design

One of the advantages of this is that it affords uniformity. Another is that it keeps the user of such a system familiar or with the interface of the operating system.

One major drawback of this principle especially as used in the question is that it creates a familiar route for hackers.

Another drawback is that creates what is called "repetition blindness". This normally occurs with perceptual identification tasks.

The  phenomenon may be  due to a failure in sensory analysis to process the same shape, figures or objects.

Cheers!

opearating system protection refers to a mechanism for controling access by programs, processes, or users to both system and user resources. briefly explain what must be done by the operating system protection mechanism in order to provide the required system protection

Answers

Answer:

The operating system must by the use of policies define access to and the use of all computer resources.

Policies are usually defined during the design of the system. These are usually default in settings. Others are defined and or modified during installation of the addon and or third-party software.

Computer Security Policies are used to exact the nature and use of an organisations computers systems. IT Policies are divided into 5 classes namely:

General PoliciesServer PoliciesVPN PoliciesBack-Up PoliciesFirewall Access and Configuration Policies

Cheers!

24. Which of the following statements about Emergency Support Functions (ESFs) is correct?
O A. ESFs are not exclusively federal coordinating mechanism
O B. ESFs are only a state or local coordinating mechanism
O C. ESFs are exclusively a federal coordinating mechanism
O D. ESFs are exclusively a state coordinating mechanism

Answers

(ESFs) is correct: ESFs are not exclusively federal coordinating mechanism.

When discussing the behavior of vulnerability assessments which choice will exploit a weakness?
a) Penetration test
b) Vulnerability scan
c) Intrusive
d) Gray box
e) Credentialed vulnerability scan
f) Non-credentialed vulnerability scan

Answers

Answer:

a) Penetration test

Explanation:

A penetration test, often referred to as a pen test, is part of important process in the development of internet facing service. It is a process of determining if vulnerabilities are actually exploitable in a particular environment.

In other words, it is a process that involves a simulated cyber attack against computer system to check for exploitable vulnerabilities or attempts to actively exploit weaknesses in an environment.

Hence, when discussing the behavior of vulnerability assessments the choice that will exploit a weakness is PENETRATION TEST.

When discussing the behavior of vulnerability assessments, the choice which will exploit a weakness is: A) Penetration test.

Cyber security can be defined as a preventive practice to systematically protect computers, software applications (programs), networks, electronic devices, servers and user data from potential attack, damage, theft or an unauthorized access, especially through the use of technologies, frameworks, integrity principles, processes, penetration test and network engineers.

A vulnerability can be defined as a weakness in an automated internal control system and security procedures, which may be exploited by an attacker (hacker) to gain unauthorized access to the data stored on a computer system or disrupt the information system.

Basically, vulnerability assessments can be used in the following ways:

Identify loopholes, risks and security threats. Prioritize and enhance an information system.Mitigate potential security threats.

A penetration test is also referred to as pen test or ethical hacking and it can be defined as a cybersecurity technique that simulates a cyber attack against a user's computer system, so as to identify, test an check for exploitable vulnerabilities in a web software, network, etc.

This ultimately implies that, a penetration test avails an end user the ability to exploit a weakness and potential security threats during vulnerability assessments.

All of the following are examples of being computer literate, EXCEPT ________. knowing how to use the web efficiently knowing how to build and program computers knowing how to avoid hackers and viruses knowing how to maintain and troubleshoot your computer

Answers

Answer:knowing how to build and program computers.

Explanation:

15. The primitive data types in JavaScript are:​

Answers

Answer:

The three primitive data types in JavaScript are:

1. Numbers

2. Strings of text(known as "strings")

3. Boolean Truth Values (known as "booleans")

Write a sentinel-controlled while loop that accumulates a set of integer test scores input by the user until negative 99 is entered.

Answers

Answer:

Here is the sentinel-controlled while loop:

#include <iostream> //to use input output functions

using namespace std; // to identify objects like cin cout

int main(){ // start of main() function body

int test_score; // declare an integer variable for test scores

//prompts user to enter test scores and type-99 to stop entering scores

cout << "Enter the test scores (enter -99 to stop): ";

cin >> test_score; // reads test scores from user

while (test_score != -99){ // while loop keeps executing until user enters -99

cin >> test_score; } } // keeps taking and reading test scores from user

Explanation:

while loop in the above chunk of code keeps taking input scores from user until -99 is entered. Sentinel-controlled loops keep repeating until a sentinel value is entered. This sentinel value indicates the end of the data entry such as here the sentinel value is -99 which stops the while loop from iterating and taking the test score input from user.

The complete question is that the code should then report how many scores were  entered and the average of these scores. Do not count the end sentinel -99 as a score.

So the program that takes input scores and computes the number of scores entered and average of these scores is given below.

#include <iostream>  // to use input output functions

using namespace std;  // to identify objects like cin cout

int main(){  //start of main function body

double sum = 0.0;  // declares sum variable to hold the sum of test scores

int test_score,count =0;  

/* declares test_scores variable to hold the test scores entered by user and count variable to count how many test scores input by user */

cout << "Enter the test scores (or -99 to stop: ";

//prompts user to enter test scores and type-99 to stop entering scores

cin >> test_score;  // reads test scores from user

while (test_score != -99){  // while loop keeps executing until user enters -99

count++;  /* increments count variable each time a test cores is input by user to count the number of times user entered test scores */

sum = sum + test_score;  // adds the test scores

cin >> test_score;}  // reads test scores from user

if (count == 0)  // if user enters no test score displays the following message

cout << "No score entered by the user" << endl;

else  //if user enters test scores

//displays the numbers of times test scores are entered by user

cout<<"The number of test scores entered: "<<count;

/* displays average of test scores by dividing the sum of input test scores with the total number of input test scores */

cout << "\n The average of " << count << " test scores: " <<sum / count << endl;}

The program along with its output is attached.

#Write a function called align_right. align_right should #take two parameters: a string (a_string) and an integer #(string_length), in that order. # #The function should return the same string with spaces #added to the left so that the text is "right aligned" in a #string. The number of spaces added should make the total #string length equal string_length. # #For example: align_right("CS1301", 10) would return the #string " CS1301". Four spaces are added to the left so #"CS1301" is right-aligned and the total string length is #10. # #HINT: Remember, len(a_string) will give you the number of #characters currently in a_string.

Answers

Answer:

This program is written using Python Programming Language;

Comments are not used; however, see explanation section for detailed line by line explanation

See Attachment

Program starts here

def align_right(a_string,string_length):

     if len(a_string) > string_length:

           print(a_string)

     else:

           aligned=a_string.rjust(string_length)

           print(aligned)

   

a_string = input("Enter a string: ")

string_length = int(input("Enter string length: "))

align_right(a_string,string_length)

Explanation:

Function align_right is declared using on line

def align_right(a_string,string_length):

This line checks if the length of the current string is greater than the input length

     if len(a_string) > string_length:

If the above condition is true, the input string is printed as inputted

           print(a_string)

If otherwise,

     else:

The string is right justified using the next line

           aligned=a_string.rjust(string_length)

The aligned string is printed using the next line

           print(aligned)

   

The main function starts here

This line prompts user for a string

a_string = input("Enter a string: ")

This line prompts user for total string length

string_length = int(input("Enter string length: "))

This line calls the defined function

align_right(a_string,string_length)

Distinguish among packet filtering firewalls, stateful inspection firewalls, and proxy firewalls. A thorough answer will require at least a paragraph for each type of firewall.
Acme Corporation wants to be sure employees surfing the web aren't victimized through drive-by downloads. Which type of firewall should Acme use? Explain why your answer is correct.

Answers

Answer:

packet filtering

Explanation:

We can use a packet filtering firewall, for something like this, reasons because when visiting a site these types of firewalls should block all incoming traffic and analyze each packet, before sending it to the user. So if the packet is coming from a malicious origin, we can then drop that packet and be on our day ;D

A school has 100 lockers and 100 students. All lockers are closed on the first day of school. As the students enter, the first student, denoted S1, opens every locker. Then the second student, S2, begins with the second locker, denoted L2, and closes every other locker (i.e. every even numbered locker). Student S3 begins with the third locker and changes every third locker (closes it if it was open, and opens it if it was closed). Student S4 begins with locker L4 and changes every fourth locker. Student
S5 starts with L5 and changes every fifth locker, and so on, until student S100 changes L100.
After all the students have passed through the building and changed the lockers, which lockers areopen? Write a program to find your answer.
(Hint: Use an array of 100 boolean elements. each of which indicates whether a locker is open (true) or closed (false). Initially, all lockers are closed.)

Answers

Answer:

Following are the code to this question:

public class Locker //defining a class Locker

{

public static void main(String[] ax)//defining main method  

{

boolean[] locker = new boolean[101]; //defining boolean array locker that's size is 100.

int j,s1,k1,x;

x=locker.length;

for (j=1;j<x; j++)//defining loop to assigns value false in locker array

{

locker[j] = false;// assign value false

}

for (j=1;j<x; j++)//defining loop loop to assign value true in array  

{

locker[j] = true;//assign value true

}

for(s1=2; s1<x; s1++)//defining loop to count locker from 2nd place

{

for(k1=s1; k1<x; k1=k1+s1)// defining inner loop to assign value  

{

if(locker[k1]==false) //defining if block for check false value  

{

   locker[k1] = true;// if condition is true it assign value true

}

else //defining else block

{

   locker[k1] = false;//assign value false in locker array

}

}

}

for(s1=1; s1<x; s1++)//defining loop to print locker value

{

if (locker[s1] == true) //defining if block that check Locker array value is equal to true

{

System.out.println("Locker " + s1 + " Open");//print Locker value with message  

}  

}

}

}

Output:

Locker 1 Open

Locker 4 Open

Locker 9 Open

Locker 16 Open

Locker 25 Open

Locker 36 Open

Locker 49 Open

Locker 64 Open

Locker 81 Open

Locker 100 Open

Explanation:

In the above code, a class "Locker" is declared, inside the class main method is declared, in which a boolean array "locker" is declared that's size is 100, in the next line fouth integer variable " j,s1,k1, and x" is declared, in which variable x is used to hold the boolean array length value, and other variable used in the loop.

In the next step, two for loop is declared, in the first loop assign value "false" in locker array and in seconde loop it assigns the value "true".In the next step, multiple for loop it uses if block uses to check locker value equal to false then assign value true otherwise assign value false. At the last another loop is declared, that uses if block to check locker value is equal to true and print its value with the message.

A simple operating system supports only a single directory but allows it to have arbitrarily many files with arbitrarily long file names. Can something approximating a hierarchical file system be simulated? How?

Answers

Answer:

Yes

Explanation:

Yes, something approximating a hierarchical file system be simulated. This is done by assigning to each file name the name of the directory it is located in.

For example if the directory is UserStudentsLindaPublic, the name of the file can be UserStudentsLindaPublicFileY.

Also the file name can be assigned to look like the file path in the hierarchical file system. Example is /user/document/filename

When you are creating a certificate, which process does the certificate authority use to guarantee the authenticity of the certificate

Answers

Answer:

Verifying digital signature

Explanation:

In order to guarantee authenticity of digital messages an documents, the certificate authority will perform the verification of the digital signature. A valid digital signature indicates that data is coming from the proper server and it has not been altered in its course.

differentiate between web site and web application?

Answers

Explanation:

A website is a group of globally accessible into linked pages which have a single domain name. A web application is a software or program is is accessible using any web browser.

Answer:

Explanation:

A website shows static or dynamic data that is predominantly sent from the server to the user only, whereas a web application serves dynamic data with full two way interaction.

12. Kelly would like to know the average bonus multiplier for the employees. In cell C11, create a formula using the AVERAGE function to find the average bonus multiplier (C7:C10).

Answers

Answer:

1. Divide each bonus by regular bonus apply this to all the data

2. In cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

Explanation:

The average bonus multiplier can be found by dividing each bonus with the regular bonus applying this to all the data and then putting the average formula and applying it to the cells C7:C10.  

After dividing the bonus with regular bonus, in cell C11 write, "Average" press tab key on the keyboard and then select the range of the cells either by typing "C7:C10" or by selecting it through the mouse.

ICMP
(a) is required to solve the NAT traversal problem
(b) is used in Traceroute
(c) has a new version for IPv6
(d) is used by Ping

Answers

Answer:

(b) is used in Traceroute

(d) is used by Ping

Explanation:

ICMP is the short form of Internet Control Message Protocol. It is a protocol used by networking devices such as routers to perform network diagnostics and management. Since it is a messaging protocol, it is used for sending network error messages and operations information. A typical message could be;

i. Requested service is not available

ii. Host could not be reached

ICMP does not use ports. Rather it uses types and codes. Some of the most common types are echo request and echo reply.

Traceroute - which is a diagnostic tool - uses some messages available in ICMP (such as Time Exceeded) to trace a network route.

Ping - which is an administrative tool for identifying whether a host is reachable or not - also uses ICMP. The ping sends ICMP echo request packets to the host and then waits for an ICMP echo reply from the host.

ICMP is not required to solve NAT traversal problem neither does it have a new version in IPV6.

A ______________ deals with the potential for weaknesses within the existing infrastructure to be exploited.

Answers

Answer:

Threat assessment

Explanation:

A threat assessment deals with the potential for weaknesses within the existing infrastructure to be exploited.

Threat Assessment is further explained as the practice of determining or ascertaining the credibility and seriousness of a potential threat, and also the probability or chases of the threat will becoming a reality.

Threat assessment is separate to the more established procedure of violence-risk assessment, which seek to forcast an individual's general capacity and tendency to respond to situations violently. Instead, threat assessment aims to interrupt people on a route to commit "predatory or instrumental violence, the type of behavior connected with targeted attacks".

Answer:

Threat assessment

Explanation:

In an IT system, threat assessment is the analysis, evaluation and prevention of actions, events and operations that can greatly affect the system. It explores the potential for weaknesses within existing infrastructure to be exploited.

The threat assessment is a very important assessment that needs to be taken in virtually all domains. Here are a few reasons why it is important in an IT system;

i. Prevention of data loss

ii. Prevention of system or network of systems downtime

In carrying out threat assessment, one might need to do the following;

i. identification and prioritization of infrastructure including the software and hardware applications in the system.

ii. identification of potential threats such as system failure, natural disaster, unwanted access.

iii. identification of vulnerabilities in the system.

iv. analysing controls by determining who has access and who doesn't.

v. analysing the impact of a threat occurrence.

vi. documentation of analysis and evaluation results.

(Convert letter grade to number) Write a program that prompts the user to enter a letter grade A/a, B/b, C/c, D/d, or F/f and displays its corresponding numeric value 4, 3, 2, 1, or 0.

Sample Run 1 Enter a letter grade: B The numeric value for grade B is 3

Sample Run 2 Enter a letter grade: b The numeric value for grade b is 3

Sample Run 3 Enter a letter grade: T T is an invalid grade

Answers

Answer:

This program is written in Python Programming Language

Program doesn't make use of comments (See Explanation Section for detailed explanation)

letterg = ['A','B','C','D','F']

inp = input("Enter a Letter Grade: ")

for i in range(len(letterg)):

if inp.upper() == letterg[i]:

print('The numeric value for grade ', inp, ' is ',4 - i)

break;

else:

print(inp, "is an invalid grade")

Explanation:

This line initializes all letter grade from A to F

letterg = ['A','B','C','D','F']

This line prompts user for letter grade

inp = input("Enter a Letter Grade: ")

This line iterates through the initialized letter grades

for i in range(len(letterg)):

This line checks if the user input is present in the initialized letter grades (it also takes care of lowercase letters)

if inp.upper() == letterg[i]:

This line is executed if tge about condition is true; the line calculates the number grade and prints it

print('The numeric value for grade ', inp, ' is ',4 - i)

This line terminates the iteration

break;

If the condition above is not true

else:

This line is executed

print(inp, "is an invalid grade")

Write, compile and test (show your test runs!) program that calculates and returns the fourth root of the number 81, which is 3. Your program should make use of the sqrt() method. Math.sqrt(number).

Answers

Answer:

I am writing a JAVA program. Let me know if you want the program in some other programming language.

public class FourthRoot{ //class to calculate fourth root of 81

public static void main(String[] args) { //start of main() function body

   double square_root; //declares to hold the fourth root of 81

   double number=81; // number is assigned the value 81

/* calculates the fourth root of number using sqrt() method twice which means sqrt() of sqrt(). This is equivalent to pow(number,(0.25)) where pow is power function that computes the fourth root by raising the number 81 to the power of 0.25 which is 1/4 */

   square_root=Math.sqrt(Math.sqrt(number));

//displays the fourth root of 81 i.e. 3

     System.out.println("Fourth Root of 81 is "+ square_root); } }

Explanation:

The program is well explained in the comments given along with each statement of the program . Since it was the requirement of the program to user Math.sqrt() method so the fourth root of number= 81 is computed by taking the sqrt() of 81 twice which results in the fourth root of 81 which is 3.

So the first sqrt(81) is 9 and then the sqrt() of the result is taken again to get the fourth root of 81. So sqrt(9) gives 3. So the result of these two computations is stored in square_root variable and the last print statement displays this value of square_root i.e. the fourth root of number=81 which is 3.

Another way to implement the program is to first take sqrt(81) and store the result in a variable i.e. square_root. After this, again take the sqrt() of the result previously computed and display the final result.

public class FourthRoot{

   public static void main(String[] args) {

   double square_root;

   double number=81;

   square_root=Math.sqrt(number);

  System.out.println("Fourth Root of 81 is: "+ Math.sqrt(square_root)); } }

The program along with its output is attached in a screenshot.

SONET is the standard describing optical signals over SMF, while SDH is the standard that describes optical signals over MMF fiber.
A. True
B. False

Answers

Answer:

False.

Explanation:

SONET is an acronym for synchronous optical networking while SDH is an acronym for synchronous digital hierarchy. They are both standard protocols used for the transmission of multiple digital bit streams (multiplex) synchronously through an optical fiber by using lasers.

Hence, both SONET and SDH are interoperable and typically the same standard protocols in telecommunication networks. Also, the SONET is a standardized protocol that is being used in the United States of America and Canada while SDH is an international standard protocols used in countries such as Japan, UK, Germany, Belgium etc.

The synchronous optical networking was developed in 1985 by Bellcore and it was standardized by the American National Standards Institute (ANSI). SDH was developed as a replacement for the plesiochronous digital hierarchy (PDH).

Generally, SONET comprises of four functional layers and these are;

1. Path layer

2. Line layer.

3. Section layer.

4. Physical or Photonic layer.

The SDH comprises of four synchronous transport modules and these are;

1. STM-1: having a basic data rate of 155.52Mbps.

2. STM-4: having a basic data rate of 622.08Mbps.

3. STM-16: having a basic data rate of 2488.32Mbps.

4. STM-64: it has a basic data rate of 9953.28Mbps.

These two standard telecommunications protocols are used to transmit large amounts of network data over a wide range through the use of an optical fiber.

How to set up a simple peer-to-peer network using a star topology?

Answers

Answer:

The description including its scenario is listed throughout the explanation section below.

Explanation:

Star topology seems to be a LAN system under which all points are connected to a single cable link location, such as with a switch as well as a hub. Put it another way, Star topology is among the most commonly used network configurations.

Throughout this configuration or setup:

Each common network setups network unit, such as a firewall, switch, as well as computer. The main network computer serves as either a server as well as the peripheral system serves as just a client.

The user can set their own computer hostname and username. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

Deployment

Explanation:

Hardware lifecycle management is geared at making optimum use of the computer hardware so as to maximize all the possible benefits. During the deployment stage of the hardware lifecycle, the user is prompted by the computer to input their own computer hostname and username. In doing this, it is important that the user takes note of possible flaws in security. Passwords are set at this stage too. The four stages in the hardware lifecycle are procurement, deployment, maintenance, and retirement. At the deployment stage, the hardware is set up and allocated to employees so that they can discharge their duties effectively.

So, for organizations, it is important that strong passwords are used to prevent security breaches in the event that an employee leaves the organization.

Answer:

Deployment

Explanation:

The famous Fibonacci sequence, 1, 1, 2, 3, 5, 8, 13, . . . , begins with two 1s. After that, each number is the sum of the preceding two numbers. Write a program using a recursive function that requests an integer n as input and then displays the nth number of the Fibonacci sequence.

Answers

Yo bro I just need help with you

Answer:

int recursiveFunction(int n) {

 

if (n == 0 || n == 1) {

 

 return n;

}

else {

 

 return recursiveFunction(n - 2) + recursiveFunction(n - 1);

}

Explanation:

It is acceptable to create two TCP connections on the same server/port doublet from the same client with different port numbers.
A. True
B. False

Answers

the answer is a. true
I think the answer is A

Modify the DemoSalesperson application so each Salesperson has a successive ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive Salesperson. Save the file as DemoSalesperson2.java.

Answers

Answer:

Here is the modified DemoSalesperson2

public class DemoSalesperson2{ // class DemoSalesperson2

public static void main(String[] args) { //start of main() function body

SalesPerson[] sp = new SalesPerson[10]; // creates an array of SalesPerson object named sp

int start_id =111; // assign 111 to starting id number

double start_sal=25000; //assign 25000 to starting salary means salary will start from amount 25000

 for (int i =0; i<sp.length; i++) { //loop iterates until the value of loop variable i remains less then length of the array object sp

  sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i)); /*at each iteration  ID number from 111 through 120 and a sales value that ranges from $25,000 to $70,000, increasing by $5,000 for each successive is displayed using object array sp[] which calls the SalesPerson constructor to access id and sales */

 System.out.println(sp[i].getId()+"   "+sp[i].getAnnualSales() );  } } } /*uses object sp of class SalesPerson to access the methods getId which returns the id and getAnnualSales method which returns the annual sales, to display id and annual sales */

Explanation:

The question first requires a SalesPerson class with these requisites:

Class name: Salesperson.

Data fields for Salesperson: int ID number , double annual sales amount.

Methods: constructor SalesPerson() that requires values for both data fields, as well as get and set methods for each of the data fields.

So according to the complete question's requirement, I have implemented SalesPerson class:

public class SalesPerson {   // class name

//data members: integer type id variable and double type sales variable

   private int id;  

   private double sales;  

   public SalesPerson(int id_no, double annual_sales) {   //constructor that requires values for id and sales

       id = id_no;  

       sales = annual_sales;     }  

   public int getId() {   //accessor getId() method to get or access the value of id data field

       return id;     }  

   public void setId(int id_no) {   //mutator setId to set the value of id data field

       id = id_no;     }  

   public double getAnnualSales() {   //accessor getAnnualSales() method to get or access the value of sales data field

       return sales;     }  

   public void setAnnualSales(double annual_sales) { //mutator setAnnualSales to set the value of sales data field

       sales = annual_sales;     }  }

However you can use my DemoSalesperson2 application for your own SalesPerson class.

Now I will explain the working of for loop used in DemoSalesperson2

Iteration 1:

i=0

i<sp.length is true because length of sp[] is 10 so i<10

This means the body of for loop will execute.

The statement inside the body of for loop is :

 sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));

class SalesPerson constructor is used to access the data members of SalesPerson class

start_id = 111

start_sal=25000

start_id+i = 111 + 0 = 111

start_sal+5000*(i) = 25000 + 5000 (0) = 25000

The values 111 and 25000 are stored to sp[0] means at the first index of the sp array.

System.out.println(sp[i].getId()+"   "+sp[i].getAnnualSales() );  

This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.

So the output at 1st iteration is:

111   25000.0

Iteration 1:

The value of i is incremented to 1 so now i = 1

i<sp.length is true because length of sp[] is 10 so i<10

This means the body of for loop will execute.

The statement inside the body of for loop is :

 sp[i] =new SalesPerson(start_id+i,start_sal+5000*(i));

class SalesPerson constructor is used to access the data members of SalesPerson class

start_id = 111

start_sal=25000

start_id+i = 111 + 1 = 112

start_sal+5000*(i) = 25000 + 5000 (1) = 25000 + 5000 = 30000

The values 111 and 25000 are stored to sp[1] means at the first index of the sp array.

System.out.println(sp[i].getId()+"   "+sp[i].getAnnualSales() );  

This statement uses sp object to get access to the getId and getAnnualSales methods to print the id number and sales amount.

So the output at 1st iteration is:

112   30000.0

The loop keeps iterating and the value of id is incremented by 1 and value of sales is increased by 5000 at every iteration.

This loop continues to execute until the value of i exceeds the length of sp array i.e. 10.

The values from iteration 1 to 8 following the above explanation are:

Iteration 1:

111    25000.0

Iteration 2:

112    30000.0

Iteration 3:

113    35000.0

Iteration 4:

114   40000.0  

Iteration 5:

115   45000.0  

Iteration 6:

116   50000.0                                                          

Iteration 7:

117   55000.0                                                                                                      

Iteration 8:                                                                                      

118   60000.0      

Iteration 9:                                                                                    

119   65000.0

Iteration 10:                                                                                    

120   70000.0

At iteration 11 the for loop body will not execute as value of i at 11th iteration is i = 10 and i<sp.length evaluates to false as i = sp.length because length of sp array is 10 and now the value of i is also 10. So the loop ends. Screenshot of the program and its output is attached.

QUESTION 22 Select the correct statement(s) regarding Carrier Ethernet (CE). a. the Metro Ethernet Forum (MEF) created a CE framework to ensure the interoperability of service provider CE offerings b. MEF certified CE network providers, manufacturers and network professionals to ensure interoperability and service competencies c. MEF certified services include E-Line, E-LAN, E-Tree, E-Access, and E-Transit d. all are correct statements

Answers

Answer:

d. all are correct statements

Explanation:

CARRIER ETHERNET can be defined as the Ethernet which is a telecommunications network providers that provides and enables all Ethernet services to their customers and as well to help them utilize the Ethernet technology in their networks which is why the word “Carrier” in Carrier Ethernet networks is tend to refers to a large communications services providers that has a very wide reach through all their global networks. Example of the carriers are:

They help to provide audio, video, as well as data services to residential and to all business as well as enterprise customers.

CARRIER ETHERNET also make use of high-bandwidth Ethernet technology for easy Internet access and as well as for communication among the end users.

Therefore all the statement about CARRIER ETHERNET NETWORK are correct

a. Metro Ethernet Forum (MEF) is a type of ethernet which created a Carrier Ethernet framework in order to ensure the interoperability of service provider that the Carrier Ethernet is offerings.

b. The MEF also help to certifies CE network providers, as well as the manufacturers and network professionals in order to ensure interoperability as well as a great service competencies.

c. MEF certified services also include E-Line, E-LAN, E-Tree, E-Access, and E-Transit

Hence, MEF is an important part of Carrier Ethernet because they act as the defining body for them, reason been that they are as well telecommunications service providers, cable MSOs, as well as network equipment and software manufacturers among others.

Write a program that read two numbers from user input. Then, print the sum of those numbers.

Answers

Answer:

#This is in Python

number1 = raw_input("Enter a number: ")

number2 = raw_input("Enter another number: ")

sum = float(number1) + float(number2)

print(sum)

Explanation:

k- Add the code to define a variable of type 'double', with the name 'cuboidVolume'. Calculate the volume of the cuboid and set this variable value.

Answers

Answer:

Here is the JAVA program to calculate volume of cuboid:

import java.util.Scanner; // Scanner class is used to take input from user

public class CuboidVol { // class to calculate volume of cuboid

public static void main(String[] args) { // start of main() function body

Scanner input= new Scanner(System.in); //create Scanner class object

// prompts user to enter length of cuboid

System.out.println("Enter the cuboid length:");

double length=input.nextDouble(); //reads the input length value from user

// prompts user to enter width of cuboid

System.out.println("Enter the cuboid width:");

double width=input.nextDouble(); //reads the input width from user

// prompts user to enter height of cuboid

System.out.println("Enter the cuboid height:");

double height=input.nextDouble(); //reads the input height from user

/* the following formula is to calculate volume of a cuboid by multiplying its length width and height and a double type variable cuboidVolume is defined to store the value of the resultant volume to it */

double  cuboidVolume= length*width*height; //calculates cuboid volume

//displays volume of cuboid and result is displayed up to 2 decimal places

System.out.printf("Volume of the cuboid (length " + length + "/ height " + height + "/ width" +width +" is: " + "%.2f",cuboidVolume);   } }

Explanation:

The formula for the volume of a cuboid is as following:

Volume = Length × Width ×  Height

So in order to calculate the volume of cuboid three variable are required for length, width and height and one more variable cuboidVolume to hold the resultant volume of the cuboid.

The program is well explained in the comments added to each statement of the program. The program prompts the user to enter the value of height width and length of cuboid and the nextDouble() method is used to take the double type input values of height length and width. Then the program declares a double type variable cuboidVolume to hold the result of the volume of cuboid. Then the last printf statement is used to display the volume of cuboid in the format format "Volume of the cuboid (length  / height  / width ) is" and the result is displayed up to 2 decimal places.

The screenshot of the program along with its output is attached.

Step1: This file contains just a program shell in which you will write all the programming statements needed to complete the program described below. Here is a sample of the current contents of areas.cpp 1 // Assignment 5 is to compute the area (s) WRITE A COMMENT BRIEFLY DESCRIBING THE PROGRAM PUT YOUR NAME HERE. 2 3 4 // INCLUDE ANY NEEDED HEADER FILES HERE 5 using namespace std;l 7 int main) 9// DEFINE THE NAMED CONSTANT PI HERE AND SET ITS VALUE TO 3.14159 10 11 // DECLARE ALL NEEDED VARIABLES HERE. GIVE EACH ONE A DESCRIPTIVE 12// NAME AND AN APPROPRIATE DATA TYPE 13 14// WRITE STATEMENTS HERE TO DISPLAY THE 4 MENU CHOICES 15 16// WRITE A STATEMENT HERE TO INPUT THE USERS MENU CHOICE 17 18// WRITE STATEMENTS TO OBTAIN ANY NEEDED INPUT INFORMATION 19// AND COMPUTE AND DISPLAY THE AREA FOR EACH VALID MENU CHOICE 20 / IF AN INVALID MENU CHOICE WAS ENTERED, AN ERROR MESSAGE SHOULD 21 /BE DISPLAYED 23 return 0 24 )
Step 2: Design and implement the areas.cpp program so that it correctly meets the program specifications given below Specifications: Sample Run Program to calculate areas of objects Create a menu-driven program that finds and displays areas of 3 different objects. The menu should have the following 4 choices 1 -- square 2 circle 3 - right triangle 4 - quit 1square 2 -- circle 3 -- right triangle 4quit Radius of the circle: 3.0 Area 28.2743 . If the user selects choice 1, the program should find the area of a square . If the user selects choice 2, the program should . If the user selects choice 3, the program should . If the user selects choice 4, the program should . If the user selects anything else (i.e., an invalid find the area of a circle find the area of a right triangle quit without doing anything choice) an appropriate error message should be printed

Answers

Answer & Explanation:

This program is written in C++ and it combines the step 1 and step 2 to create a menu driven program

Each line makes use of comments (as explanation)

Also, see attachment for program file

Program Starts Here

//Put Your Name Here; e.g. MrRoyal

//This program calculates the area of circle, triangle and square; depending on the user selection

//The next line include necessary header file

#include<iostream>

using namespace std;

int main()

{

//The next line defines variable pi as a constant with float datatype

const float pi = 3.14159;

// The next two lines declares all variables that'll be needed in the program

string choice;

float length, base, height, radius, area;

// The next four lines gives an instruction to the user on how to make selection

cout<<"Press 1 to calculate area of a square: "<<endl;

cout<<"Press 2 to calculate area of a circle: "<<endl;

cout<<"Press 3 to calculate area of a triangle: "<<endl;

cout<<"Press 4 to quit: "<<endl;

//This  next line prompts user for input

cout<<"Your choice: ";

//This next line gets user input and uses it to determine the next point of execution

cin>>choice;

if(choice == "1")  //If user input is 1, then the choice is area of square

{

 cout<<"Length: ";  //This line prompts user for length of the square

 cin>>length;  // This line gets the length of the square

 area = length * length;  //This line calculates the area

 cout<<"Area: "<<area;  //This line prints the calculated area

}

else if(choice == "2") //If user input is 2, then the choice is area of circle

{

 cout<<"Radius: ";  //This line prompts user for radius

 cin>>radius;  //This line gets radius of the circle

 area = pi * radius * radius;  // This line calculates the area

 cout<<"Area: "<<area;  //This line prints the calculated area

}

else if(choice == "3") //If user input is 2, then the choice is area of triangle

{

 cout<<"Base: "; //This line prompts user for base

 cin>>base;  //This line gets the base

 cout<<"Height: ";  //This line prompts user for height

 cin>>height;  //This line gets the height

 area = 0.5 * base * height;  //This line calculates the area

 cout<<"Area: "<<area;  //This line prints the calculated area

}

else if(choice == "4")  //If user input is 4, then the choice is to quit

{

 //Do nothing and quit

}

else  //Any other input is invalid

{

 cout<<"Invalid Option Selected";

}

return 0;

}

How many times will the while loop that follows be executed? var months = 5; var i = 1; while (i < months) { futureValue = futureValue * (1 + monthlyInterestRate); i = i+1; }
a. 5
b. 4
c. 6
d. 0

Answers

Answer:

I believe it is A

Explanation:

Other Questions
True or False: It is okay to just paste the URLs of the items you used for references at the end of a paper. Select one: True False Which of the following is the equation of a line perpendicular to the line y =- 10x + 1. passing through the point (5.7)? Brainliest for the correct answer!! Choose the best definition of an active verb.A.With an active verb, the subject receives the action.B.Active verbs are those used for sports writing.C.With an active verb, the subject performs the action.D.Active verbs indicate reaction. 1Select the correct answer.The edges of a cube are 5 centimeters each and the diagonal of a face is approximately 7 centimeters. What is the approximate area of the crosssection passing through the diagonals of opposite faces of this cube?OA. 12 square centimetersOB.25 square centimetersO C. 35 square centimetersOD49 square centimeters X^4+9 which pattern can we use to factor the expression? You have to merge the first three columns of a table in a file prepared in the wordprocessor and type a title in it. Which of the following tools can be used for thispurpose?a) Delete Cellsb) Merge Cellsc) Insert Columnsd) Delete Columns explain the link between scarcity and opportunity cost. 1.The atomic number of an element is 23 and its mass number is 56.a.How many protons and electrons does an atom of this element have?b.How many neutrons does this atom have? please asap thanks :D Each of the following scenarios is independent. Assume that all cash flows are after-tax cash flows. Cuenca Company is considering the purchase of new equipment that will speed up the process for producing flash drives. The equipment will cost $7,200,000 and have a life of 5 years with no expected salvage value. The expected cash flows associated with the project follow: Year Cash Revenues Cash Expenses 1 $8,000,000 $6,000,000 2 8,000,000 6,000,000 3 8,000,000 6,000,000 4 8,000,000 6,000,000 5 8,000,000 6,000,000 Kathy Shorts is evaluating an investment in an information system that will save $240,000 per year. She estimates that the system will last 10 years. The system will cost $1,248,000. Her company's cost of capital is 10%. Elmo Enterprises just announced that a new plant would be built in Helper, Utah. Elmo told its stockholders that the plant has an expected life of 15 years and an expected IRR equal to 25%. The cost of building the plant is expected to be $2,880,000. Required: 1. Calculate the IRR for Cuenca Company. The company's cost of capital is 16%. Round your answer to the nearest percent The vertex of this parabola is at (2, -4). When the y-value is -1, the x-value is 3. What is the coefficient of the squared term in the parabola's equation? 1.Which one lived in Antarctica earlier, the labyrinthodont, the lystrosaurus, or the duck-billed dinosaur? Explain Joe was moving from California to Michigan to attend college. Joe answered an advertisement on the web and signed a lease for an apartment without ever seeing the apartment. Joe found the premises filled with an abundance of debris, rats and insects. Also, the plumbing in the apartment was inoperable. These conditions:________ Select True/False for each of the following statements regarding aluminum / aluminum alloys: (a) Aluminum alloys are generally not viable as lightweight structural materials in humid environments because they are highly susceptible to corrosion by water vapor. (b) Aluminum alloys are generally superior to pure aluminum, in terms of yield strength, because their microstructures often contain precipitate phases that strain the lattice, thereby hardening the alloy relative to pure aluminum. (c) Aluminum is not very workable at high temperatures in air, in terms of extrusion and rolling, because a non-protective oxide grows and consumes the metal, converting it to a hard and brittle ceramic. (d) Compared to most other metals, like steel, pure aluminum is very resistant to creep deformation. (e) The relatively low melting point of aluminum is often considered a significant limitation for high-temperature structural applications. Need ASAPOne of the leaders of the Reformation, John Calvin, was particularly influenced by the Renaissance philosophy of humanism. Why were so many Europeans willing to accept this new way of looking at life during 15th and 16th centuries? A) The Catholic Church decided to place more emphasis on the rights and authority of the individual, rather than Church authorities.B) After the Black Death, which killed so many people in Europe, each individual human life was seen as more precious than ever before.C) The philosophy of humanism suggested a way of life that allowed humans to do whatever they wanted, regardless of the consequences.D) Humanism was seen as a way to escape poverty since each person could focus on finding money and resources for himself. Hunter is 9 years older than 3 times the age of his nephew. Hunter is 33 years old. How old is his nephew? Select the correct answer from each drop-down menu. Gino is buying wood screws at the corner hardware store. The table shows different numbers of bags of screws and their corresponding prices. Bags of Screws Price ($) 2 10 4 20 7 35 According to the table, the relationship between the number of bags and the price is proportional or not proportional The coil of wire in the center of the screen encompasses an area through which magnetic field lines pass, so there is a magnetic flux through those coils. With the magnet stationary, is this magnetic flux producing any flow of current or potential difference? Consider the following SQL code to generate a table for storing data about a music library. CREATE TABLE playlists ( id INTEGER PRIMARY KEY AUTOINCREMENT, name TEXT ); CREATE TABLE songs ( id INTEGER PRIMARY KEY AUTOINCREMENT, title TEXT, artist TEXT, album TEXT, year NUMERIC, playlist_id INTEGER, FOREIGN KEY(playlist_id) REFERENCES playlists(id) ); Critique the design of this database, as by proposing and explaining at least two ways in which its design could be improved. Hint: Might songs end up with (lots of!) duplicate values in some columns? Given that y is directly proportional tox, and when y = 8 when x=10.(a) Write down the equation of y in terms of x.(b) Find the value of y when x = 25.8(c) Find the value of x when y==25