Answer:
Number of configurations does the device allow = 1
Explanation:
Given:
Number of parameters = 3
setting to choose for parameters = 3
Order does not matter
To find:
Number of configurations the device allows
Solution:
We will use Combinations here. This cannot be achieved through permutations because we have to choose settings 1,2,3 (3 settings) for three parameters 4,3,5 and the order does not matter but in permutation order does matter. So here we use Combinations. The formula for combination is:
C(n,r) = n! / r! (n-r)!
Here the number of parameters is 3 i.e. 1,2,3 and settings are also 3 i.e. 4,3,5 So,
n = 3
r = 3
Putting these values in the above formula we get:
nCr = n! / r! (n-r)! = 3! / 3! (3-3)!
= 3*2*1 /3*2*1 (0)!
= 3*2*1 /3*2*1 (1) Since 0! = 1
= 6 / 6
nCr = 1
So when order of settings 4,3,5 does not matter the number of configurations that device can allow is 1.
If the repetition is allowed and order does not matter then we can use the following formula:
(r + n - 1)! / r!(n-1)! = (3 + 3 - 1)! / 3! (3-1)!
= 5! / 3! 2!
= 5*4*3*2*1 / (3*2*1)(2*1)
= 120 / 12
(r + n - 1)! / r!(n-1)! = 10
For example if we have same setting for more than 1 parameters the combinations can be:
333, 444, 555, 445, 443, 554, 553, 334, 335, 345
But it is unlikely that a setting can be repeated for more than 1 parameter a a time.
list and the deference between MS access objects
Answer:
MS access objects help the user list , information and designed reports .
Explanation:
MS access objects are create a forms, data base, tables,queries, and modules. There are many objects are following:-Tables, Forms,Reports, Queries.
Table:- These are objects used into a define and store the data,tables are contain the columns and the store of different data.
Form:- Form is the object that designed by the data input and control application queries or tables, forms are used in viewing records.
Reports:- Reports are the designed to the printing and calculating data,reports are used because data in read to easy format.
Queries:- Queries are provides that data from one or more table,you can define the update ,delete, insert, select data.
On a system with paging, a process cannot access memory that it does not own. Why? How could the operating system allow access to other memory?
Answer:
Because the page is not in its page tableThe operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page tableExplanation:
On a system with paging, a process cannot access memory that it does not own because the page is not in its page table also the operating system controls the contents of the table,therefore it limits a process of accessing to only the physical pages allocated to the process.
The operating system could allow access to other memory by allowing entries for non-process memory to be added to the process page table.that way two processes that needs to exchange data can efficiently do that . i.e creating a very efficient inter-process communication
An F-1 ____________ may be authorized by the DSO to participate in a curricular practical training program that is an__________ part of an established curriculum. Curricular practical training is defined to be alternative work/study, internship, cooperative education, or any other type of required internship or practicum that is offered by sponsoring employers through cooperative _____________ with the school. Students who have received one year or more of full time curricular practical training are ineligible for post-completion academic training. Exceptions to the one academic year requirement are provided for students enrolled in _____________ studies that require immediate participation in curricular practical training. A request for authorization for curricular practical training must be made to the DSO. A student may begin curricular practical training only after receiving his or her Form I-20 with the __________ endorsement.
Answer:
1. Student.
2. Integral.
3. Agreements.
4. Graduate program.
5. DSO.
Explanation:
An F-1 student may be authorized by the DSO to participate in a curricular practical training program that is an integral part of an established curriculum. Curricular practical training is defined to be alternative work/study, internship, cooperative education, or any other type of required internship or practicum that is offered by sponsoring employers through cooperative agreement with the school. Students who have received one year or more of full time curricular practical training are ineligible for post-completion academic training. Exceptions to the one academic year requirement are provided for students enrolled in graduate program studies that require immediate participation in curricular practical training. A request for authorization for curricular practical training must be made to the DSO. A student may begin curricular practical training only after receiving his or her Form I-20 with the DSO endorsement.
Please note, DSO is an acronym for Designated School Official and they are employed to officially represent colleges or universities in the United States of America. They are saddled with the responsibility of dealing with F-1 matters (a visa category for foreign students seeking admission into schools such as universities or colleges in the United States of America).
Patrick Stafford's article argues that the growth of mobile phone usage "has given developers the ability to great robust and engaged communities" that help a game's chance of success.
a. true
b. false
Answer:
The statement is False.
Explanation:
In his article published on the 31st Aug 2010, Patrick suggests that a 100% penetration rate for any market is now possible due to the growth of the use of mobile phones.
The strategy of accessing the market using mobile ads, according to Patrick, is called Mobile Marketing.
In his article, Patrick provides statistics which help buttress his position that a good number of mobile phone users are ready to respond positively to mobile ads.
While it is implied that this concept has increased the chances of mobile games as a product being successful, nowhere in the article did Patric mention "games".
Cheers!
Instead of typing an individual name into a letter that you plan to reuse with multiple people, you should use a _______ to automate the process.
A. mail merge
B. data source
C. mailing list
D. form letter
ONLY ANSWER IF YOU'RE 100% SURE.
Answer:
A. Mail Merge
Explanation:
I had this question last year
When Adobe Photoshop was released for the first time? A: 1984 B: 1990 C: 1991 D: 1992
Answer:
B
Explanation:
reate a class called Plane, to implement the functionality of the Airline Reservation System. Write an application that uses the Plane class and test its functionality. Write a method called CheckIn() as part of the Plane class to handle the check in process Prompts the user to enter 1 to select First Class Seat (Choice: 1) Prompts the user to enter 2 to select Economy Seat (Choice: 2) Assume there are only 5-seats for each First Class and Economy When all the seats are taken, display no more seats available for you selection Otherwise it displays the seat that was selected. Repeat until seats are filled in both sections Selections can be made from each class at any time.
If you face an investigation where dangerous substances might be around, you may need to obtain which of the following?
A. DANMAT certificate
B. DANSUB certificate
C. HAZMAT certificate
D. CHEMMAT certificate
Answer:
HAZMAT certificate
Explanation:
If you face an investigation where dangerous substances might be around, you may need to obtain a HAZMAT certificate.
Hazmat is the shortened form of the word "hazardous materials," which the United State Department of Transportation recognized as materials that could adversely affect people and also the environment. Hazmat certification is required to be obtained by workers who remove, handle, or transport hazardous materials. This comprises careers in transportation and shipping, firefighting and emergency rescue, construction and mining, as well as waste treatment and disposal. Workers who are also in manufacturing and warehouse storage may also come across hazardous substance or materials risks while on their jobs. Certification involves having the knowledge of the risks and safety measures for handling these materials.
Answer:
(C) HAZMAT certificate
Explanation:
HAZMAT stands for Hazardous Materials. These are materials that could adversely affect people and the environment. Examples are synthetic organic chemicals, heavy metals and radioactive materials. People who work in certain industries such as construction and mining, firefighting, waste treatment and disposal e.t.c, are required to have this certificate.
The certification involves training workers in these industries in the use of, risk involved, and way of handling of these materials when they are encountered at work.
________ platforms automate tasks such as setting up a newly composed application such as a web service or linking to other applications.
Answer:
Cloud-based
Explanation:
Cloud based platforms are the various platforms that leverage on the power of cloud computing. With these platforms, users or businesses can access some or all features and files of a system without having to store these files and features on their own computers. Some of these platforms also automate tasks such as setting up various applications (such as a web service, a web application, database systems e.t.c) and/or linking them to other applications. Some of these platforms are;
i. Google Drive
ii. Amazon Web Services (AWS)
What is output?
public abstract class Vehicle {
public abstract void move(int miles);
public void printInfo({
System.out.print("Vehicle ");
public class Car extends Vehicle {
private int distance;
public void move(int miles) {
distance = distance + miles;
public void printInfo() {
System.out.print("Car ");
}
public static void main(String args[]) {
Vehicle myVehicle;
Car myCar;
myVehicle = new Vehicle();
myCar = new Car();
myVehicle.printInfo();
myCar.printInfo();
}
}
Error: Car is not abstract and does not override abstract method move()
Vehicle
Vehicle Car
Error: Vehicle is abstract and cannot be instantiated
Answer:
The output is:
Error: Vehicle is abstract and cannot be instantiated
Explanation:
The following statement is causing this error:
myVehicle = new Vehicle();
Here an instance of Vehicle is being created. The name of the instance is myVehicle. new keyword is used to create an object or instance of class like here the instance myVehicle of class Vehicle is being created.
This instance cannot be created because the Vehicle is an abstract class. As you can see this statement public abstract class Vehicle.
So Vehicle class is declared with abstract keyword which means that this is an abstract class and cannot be instantiated. So Vehicle class is an abstract class and abstract class can only be used as a base class for its derived classes. Vehicle just provides with the basic functionality that its sub or derived class like Car can implement.
This class can be extended or inherited but no instance can be created of this class, as the Car class is used to extend the functionality of Vehicle class. Now you can create instance of Car class but NOT of a Vehicle class because it is an abstract class.
A network technician sets up an internal dns server for his local network. When he types in a url which is checked first
Answer:
The first thing that the browser checks is the cache for the DNS record to find the corresponding IP address.
Explanation:
After the technician sets up the internal DNS server for his local network, the first thing that is checked when he types a website into the url of a browser is the cache to look for corresponding IP addresses.
DNS which means Domain Name System is a database that maintains the website name (URL) and the IP address that it is linked to. There is a unique IP address for every URL (universal resource locator).
Internal DNS servers store names and IP addresses for internal or private servers
CHALLENGE ACTIVITY 2.15.1: Reading and outputting strings. Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, first name. End with newline. Example output if the input is: Maya Jones Jones, Maya.
Answer:
Following are the program in Java language
import java.util.*; // import package
public class Main // main function
{
public static void main(String[] args) // main class
{
String l_name,f_name; // variable declaration
Scanner sc6=new Scanner(System.in); // scanner class
f_name= sc6.next(); // Read input
l_name=sc6.next(); // Read input
System.out.print(l_name); // display last name
System.out.print(","); // display comma
System.out.println(f_name); // display first name
}
}
Output:
Maya Jones
Jones, Maya
Explanation:
Following are the description of program
Declared a variable 'l_name","f_name" as the string type .Create the instance of scanner class i.e "sc6".Read the user input by using the instance "sc6" of the scanner class in the variable "l_name" and "f_name ".Finally by system.print() method we will display the value according to the format in the given question .The operating system cannot communicate with a mouse. What is a solution?
Choose the answer.
Update the mouse device driver.
Run an antimalware program.
Delete temporary files.
Run the task manager utility.
Answer:
Update the mouse device driver
Explanation:
In a situation where the operating system cannot communicate with a mouse the solution will be to Update the mouse device driver reason been that Mouse Driver is often and always needed to help the motherboard to interact with the device and It is also a software that works between the Operating System and the Mouse because It can effectively and efficiently translates the signals to the motherboard in an appropriate manner or ways which is why Microsoft’s generic drivers are enough and efficient for proper interaction between the Mouse and the Operating System.
TLS is not generally compatible with SSL because:__________. 1. SSL is proprietary while TLS is open 2. SSL can interact with its earlier versions which is a vulnerability 3. TLS is for securing applications while SSL is for securing 4. TCP SSL is version 3.3 and TLS is version 1.3
Answer:
2. SSL can interact with its earlier versions which is a vulnerability
Explanation:
TLS (Transport Layer Security) and SSL (Secure Sockets Layer) are both used for providing data authentication and encryption between networking devices (such as servers, PCs and applications) operating over a network. The iterations of SSL were versions 1.0, 2.0 and 3.0. But then, all these iterations had security issues and so TLS 1.0 was released to improve on those security flaws. And seeing that SSL can interact with its earlier versions which are all vulnerable, downgrading TLS to SSL for compatibility sake will abuse the essence of TLS in the first place.
Front wheel drive vehicles typically use
Answer:
Front wheel drive vehicles usually use positive offset wheel
Explanation:
Drug addiction occurs in
age groups, from a
variety of backgrounds.
A. young, narrow
B. all, narrow
C. all, wide
Answer:
ig the answer is C :) sorry if isn't correct
C# Create a program named DemoSquares that instantiates an array of 10 Square objects with sides that have values of 1 through 10 and that displays the values for each Square. The Square class contains fields for area and the length of a side, and a constructor that requires a parameter for the length of one side of a Square. The constructor assigns its parameter to the length of the Square’s side field and calls a private method that computes the area field. Also include read-only properties to get a Square’s side and area.
Answer:
Here is the C# program.
using System; //namespace for organizing classes
public class Square //Square class
//private fields/variables side and area of Square class
{ private double side;
private double area;
//Side has read only property to get Square side
public double Side {
get { return this.side; }
}
//Area has read only property to get Square area
public double Area {
get { return this.area; } }
/*constructor Square(double length) that requires a parameter for the length of one side of a Square. The constructor assigns its parameter to the length of the Square’s side field and calls a private method SquareArea() that computes the area field */
public Square(double length) {
this.side = length;
this.area = SquareArea(); }
//method to calcuate area of a square
private double SquareArea() {
//Pow method is used to compute square the side i.e. side^2
return Math.Pow(this.side, 2); } }
public class DemoSquares {
public static void Main() { //start of main() function body
//displays the side and area on output screen
Console.WriteLine("{0}\t{1}\t{2}", "No.", "Side Length ", "Area");
//instantiates an array to input values 1 through 10 into Side
Square[] squares = new Square[10]; //squares is the instance
for (int i = 1; i < squares.Length; i++) {
//traverses through the squares array until the i exceeds the length of the //array
squares[i] = new Square(i);
//parameter is passed in the constructor
//new object is created as arrray is populated with null members
Square sq = squares[i];
/*display the no, side of square in area after setting the alignment to display the output in aligned way and with tab spaces between no side and area */
Console.WriteLine("{0}\t{1,11}\t{2,4}", i, sq.Side, sq.Area); }
//ReadKey method is used to make the program wait for a key press from //the keyboard
Console.ReadKey(); } }
Explanation:
The program is well explained in the comments mentioned with each statement of the program. The program simply has Square class which contains area and length of side as fields and a constructor Square which has length of one side of Square as parameter and assigns its parameter to length of Square side. The a private method SquareArea() is called that computes the area field. get methods are used to include read-only properties to get a Square’s side and area. The program along with its output is attached in the screenshot.
Define a function begins_with_line that consumes a string and returns a boolean indicating whether the string begins with a dash ('-') or a underscore '_'. For example, the string "-Yes" would return True but the string "Nope" would return False. Note: Your function will be unit tested against multiple strings. It is not enough to get the right output for your own test cases, you will need to be able to handle any kind of non-empty string. Note: You are not allowed to use an if statement.
Answer:
The program written in python is as follows:
def begins_with_line(userinut):
while userinut[0] == '-' or userinut[0] == '_':
print(bool(True))
break;
else:
print(bool(not True))
userinput = input("Enter a string: ")
begins_with_line(userinput)
Explanation:
The program makes use of no comments; However, the line by line explanation is as follows
This line defines the function begins_with_line with parameter userinut
def begins_with_line(userinut):
The following italicized lines checks if the first character of user input is dash (-) or underscore ( _)
while userinut[0] == '-' or userinut[0] == '_':
print(bool(True)) ->The function returns True
break;
However, the following italicized lines is executed if the first character of user input is neither dash (-) nor underscore ( _)
else:
print(bool(not True)) -> This returns false
The main starts here
The first line prompts user for input
userinput = input("Enter a string: ")
The next line calls the defined function
begins_with_line(userinput)
NB: The program does not make use of if statement
What is the target audience of an ad?
All ages
Explanation:
It is a toothpaste advert which most people use. It will also appeal to people who want to get whiter teeth
Answer:
A community of people advertisers want to reach.
Explanation:
You are designing an internet router that will need to save it's settings between reboots. Which type of memory should be used to save these settings
Answer:
Flash memory is the correct answer to the given question .
Explanation:
The Flash memory is the a non-volatile memory memory that removes the information in the components known as blocks as well as it redesigns the information at the byte level.The main objective of flash memory is used for the distribute of the information.
We can used the flash memory for preserving the information for the longer period of time, irrespective of if the flash-equipped machine is enabled or the disabled.The flash memory is constructing the internet router that required to save the settings among the rewrites by erasing the data electronic and feeding the new data .Observe the things at Home in which you are using binary
conditions (ON/OFF) and Draw these things (any five).
Explanation:
All five things i can come up with her
1. Doors (we either open or close them)
2. Tap (we either open or close the valve)
3. Electric stove/cooker
4. The lid of containers
5. Shoes/ foot wears(we put them ON or OFF)
Which statement is false?If a value should not change in the body of a function to which it is passed, the value should be defined const to ensure that it is not ac-cidentally modified.Attempts to modify the value of a variable defined const are caught at execution time.One way to pass a pointer to a function is to use a non-constant pointer to non-constant data.It is dangerous to pass a non-pointer into a pointer argument.
Answer:
Attempts to modify the value of a variable defined const are caught at execution time
Explanation:
The false statement among the options is Attempts to edit the value of a variable defined const are caught at execution time while other options are true.
A const variable should not be modify because the main reason of having a const variable is not to make modifying it possible. If you prefer a variable which you may likely want to modify at some point, then don't just add a const qualifier on it. Furthermore, Any code which modify's a const by force via (pointer) hackery invokes Undefined Behavior
A security administrator is implementing a SIEM and needs to ensure events can be compared against each other based on when the events occurred and were collected. Which of the following does the administrator need to implement to ensure this can be accomplished?
a. TOTP
b. TKIP
c. NTP
d. HOTP
Answer:
The correct answer is option (a) TOTP
Explanation:
Solution
The correct answer is TOTP Because we need randomness and minor probability also change that's why TOTP (Time based One Time Password).
TOTP: A time-based one-time password (TOTP) refers a temporary pass code produced by an algorithm that utilizes the present time of day as one of its authentication factors.
Time-based one-time passwords are normally used for two-factor authentication and have seen growing assumption by cloud application providers.
Write a function wordcount() that takes the name of a text file as input and prints the number of occurrences of every word in the file. You function should be case-insensitive so 'Hello' and 'hello' are treated as the same word. You should ignore words of length 2 or less. Test your implementation on file great_expectations.txt¶
Answer:
I am writing a Python program:
import string # here is this is used in removing punctuation from file
def wordcount(filename): #definition of wordcount method that takes file name as argument
file = open(filename, "r") #open method opens the file whose name is specified and r is for read mode. Object "file" is used to open a file in read mode
count = dict() #creates a dictionary
for strings in file: # iterates through every line of the text file
strings = strings.strip() #strip() method removes the white spaces from every line of the text file
strings = strings.lower() #converts all the characters of the text file to lower case to make function case insensitive
strings = strings.translate(strings.maketrans("", "", string.punctuation)) # deletes punctuation each line of the text file
words = strings.split(" ") #split the lines of file to a list of words
for word in words: #iterates through each words of the list of words
if len(word)>2: #ignores words of length 2 or less
if word in count: #if word is present in dictionary count already
count[word] = count[word] + 1 #then add 1 to the existing word count
else: #if the word is not present already in the dictionary
count[word] = 1 # set the count of the word that is not already present to 1 in order to add that word to dictionary
for key in list(count.keys()): # iterates through each key (words) in the list of words and print the contents of dict counts i.e. words along with their no. of occurrences
print(key, ":", count[key]) # print the words and their occurences in word:occurence format for example hello:1 means hello exists once in text file
file.close() #closes the file
#two statements first ask the user to enter the name of the file and then call the function wordcount() by passing the name of that file in order to print the number of occurrences of every word in the file.
name = input('Enter a filename: ')
wordcount(name)
Explanation:
The program is well explained in the comments above. The program has a function wordcount() that takes a text file name as its parameter. First it opens that file in read mode. Then the first for loop moves through each line of the text file and removes the white spaces from every line of the text file using split() method, converts all the characters of the text file to lower case to make function case insensitive using lower() method, deletes punctuation each line of the text file using maketras() method and translate methods. maketrans() method specify the list of punctuation that need to be remove from the each line of the file. This method then returns this list in the form of a table which is passed to translate() method. Then translate() method uses this table to modify lines in order to remove the punctuation from lines. Next the lines are split into list of words using split() method. Then the second for loop moves through each word and counts the number of occurrences of each word in the text file. len(word)>2: len function returns the length of the word and if the length of the word is less than 2 than that word is ignored. count is set to 1, every time a new word is added to dictionary and if the word is already present in the dictionary then the count of word is incremented by 1. At the end the contents of dictionary are displayed in key: count[key] format in which key is each word and value is the number of occurrences of that word. Since the great_explectations.txt file is not attached so i have used my own file. You can use this code for you file.
draw the flowchart to calculate the area of the rectangle 50m length and width 30m.
Answer:
---- ----
Explanation:
1) Start
2) Rectangle: Read Length and Width.
3) Calculate
4) Print (Calculate)
Although the term podcasting has caught on, a more accurate term when it applies to video content is ________. a. tubecasting b. webcasting c. vcasting d. viewcasting
Answer:
The answer is option (c) vcasting
Explanation:
Solution
Vcasting for video content are more exact terms to use in place of podcast and podcasting.
Video content or vcasting: It refers any content format that attribute or contains video. common forms of video content are vlogs, animated GIFs, customer testimonials, live videos, recorded presentations and webinar.
the typing area is bordered on the right side by bars in ms word
Answer:
Explanation:
PTA NHI
Use function GetUserInfo to get a user's information. If user enters 20 and Holly, sample program output is:Holly is 20 years old. #include #include void GetUserInfo(int* userAge, char userName[]) { printf("Enter your age: \n"); scanf("%d", userAge); printf("Enter your name: \n"); scanf("%s", userName); return;}int main(void) { int userAge = 0; char userName[30] = ""; /* Your solution goes here */ printf("%s is %d years old.\n", userName, userAge); return 0;}
Answer:
Replace
/*Your solution goes here*/
with
GetUserInfo(&userAge, userName);
And Modify:
printf("%s is %d years old.\n", userName, userAge)
to
printf("%s is %d years old.", &userName, userAge);
Explanation:
The written program declares userAge as pointer;
This means that the variable will be passed and returned as a pointer.
To pass the values, we make use of the following line:
GetUserInfo(&userAge, userName);
And to return the value back to main, we make use of the following line
printf("%s is %d years old.", &userName, userAge);
The & in front of &userAge shows that the variable is declared, passed and returned as pointer.
The full program is as follows:
#include <stdio.h>
#include <string.h>
void GetUserInfo(int* userAge, char userName[]) {
printf("Enter your age: ");
scanf("%d", userAge);
printf("Enter your name: ");
scanf("%s", userName);
return;
}
int main(void) {
int* userAge = 0;
char userName[30] = "";
GetUserInfo(&userAge, userName);
printf("%s is %d years old.", &userName, userAge);
return 0;
}
Draw a flowchart or write pseudocode to represent the logic of a program that allows the user to enter a value. The program multiplies the value by 10 and outputs the result
Answer:
Here is your pseudocode:
Declare number and result
Get number
Set result = number * 10
Print result
Explanation:
Declare two variables, number and result
Ask the user to enter the number
Multiply the number by 10 and set it to the result
Print the result
In programming, flowcharts and pseudocodes are used as types of algorithms used as models of actual programs.
The pseudocode is as follows:
Input num
Display num * 10
The flow of the above pseudocode is as follows
The first line of the pseudocode gets input for num The second line prints the product of the user input and 10
The above explanation is also applicable to the flowchart (see attachment)
Read more about flowcharts and pseudocodes at:
https://brainly.com/question/24735155
A project manager is responsible for (check all that apply)
A. addressing and seeking help on ethical issues
B. his/her client's company stock price
C. solving project technical issues and team conflicts
D. knowing and following rules and procedures related to the project
Answer:
The answers that are right are options A, C, and D.
Explanation:
Hope this helps!