Answer:
Strategy
Explanation:
The strategic design pattern is defined as the behavioral design pattern that enables the selecting of a algorithm for the runtime. Here the code receives a run-time instructions regarding the family of the algorithms to be used.
In the context, the strategic pattern is used for the application for implementing OverdraftCheckingAccount class. And the main aspect of this strategic pattern is the reusability of the code. It is behavioral pattern.
# 1) Complete the function to return the result of the conversion
def convert_distance(miles):
km = miles * 1.6 # approximately 1.6 km in 1 mile
my_trip_miles = 55
# 2) Convert my_trip_miles to kilometers by calling the function above
my_trip_km = ___
# 3) Fill in the blank to print the result of the conversion
print("The distance in kilometers is " + ___)
# 4) Calculate the round-trip in kilometers by doubling the result,
# and fill in the blank to print the result
print("The round-trip in kilometers is " + ___)
Answer:
See explanation
Explanation:
Replace the ____ with the expressions in bold and italics
1) return km
return km returns the result of the computation
2) = convert_distance(my_trip_miles)
convert_distance(my_trip_miles) calls the function and passes my_trip_miles to the function
3) + str(my_trip_km)
The above statement prints the returned value
4) +str(my_trip_km * 2)
The above statement prints the returned value multiplied by 2
8) What is the address of the first SFR (1/O Register)?
Answer:
The Register A is located at the address E0H in the SFR memory space. The Accumulator is used to hold the data for almost all the ALU Operations. Some of the operations where the Accumulator is used are: Arithmetic Operations like Addition, Subtraction, Multiplication etc.
By using your own data, search engines and other sites try to make your web experience more personalized. However, by doing this, certain information is being hidden from you. Which of the following terms is used to describe the virtual environment a person ends up in when sites choose to show them only certain, customized information?
A filter bubble
A clustered circle
A relational table
An indexed environment
Answer:
A filter bubble
Explanation:
internet is an interconnected networks
o true
o false
Answer:
True.
Internet is an interconnected network.
1. P=O START: PRINT PP = P + 5 IFP
<=20 THEN GOTO START: * what is output
Answer:
0
5
10
15
20
Explanation:
P=O should be P=0, but even with this error this is the output.
When P reaches 20 it will execute the loop once more, so 20 gets printed, before getting increased to 25, which will not be printed because then the loop ends.
helpppp me please..
........
Answer:
The employer's monthly salary (X)
How are BGP neighbor relationships formed
Automatically through BGP
Automatically through EIGRP
Automatically through OSPF
They are setup manually
Answer:
They are set up manually
Explanation:
BGP neighbor relationships formed "They are set up manually."
This is explained between when the BGP developed a close to a neighbor with other BGP routers, the BGP neighbor is then fully made manually with the help of TCP port 179 to connect and form the relationship between the BGP neighbor, this is then followed up through the interaction of any routing data between them.
For BGP neighbors relationship to become established it succeeds through various phases, which are:
1. Idle
2. Connect
3. Active
4. OpenSent
5. OpenConfirm
6. Established
2. Write a Python regular expression to replace all white space with # in given string “Python is very simple programming language.”
Dear Parent, Please note that for your convenience, the School Fee counter would remain open on Saturday,27th March 2021 from 8am to 2 pm. Kindly clear the outstanding amount on account of fee of your ward immediately either by paying online through parent portal or by depositing the cheque at the fee counter to avoid late fee charges.For payment of fee the following link can also be used Pay.balbharati.org
Overheating of a computer can be easily prevented. Explain how
Which of the following cannot be used in MS Office.
Joystick
Scanner
Light Pen
Mouse
Answer:
A.
Explanation:
A Joystick is a control device that is connected to the computer to play games. A joystick is similar in structure to a control stick used by pilots in airplanes and got its name from the same. A joystick contains a stick, base, extra buttons, auto switch fire, trigger, throttle, POV hat, and a suction cup. A joystick also serves the purpose of assistive technology.
The device which can not be used in MS Office is a joystick. Therefore, option A is correct.
Which functions do you use to complete Step 3e? Check all that apply.
Animations tab
Animation styles
Design
Lines
Motion Paths
Reordering of animations
Answer: Animations tab
Animation styles
Lines
Motion paths
Explanation: Edg2021
Which of the following is step two of the Five-Step Worksheet Creation Process?
Answer:
Add Labels.
As far as i remember.
Explanation:
Hope i helped, brainliest would be appreciated.
Have a great day!
~Aadi x
Add Labels is step two of the Five-Step Worksheet Creation Process. It helps in inserting the data and values in the worksheet.
What is label worksheet in Excel?A label in a spreadsheet application like Microsoft Excel is text that offers information in the rows or columns around it. 3. Any writing placed above a part of a chart that provides extra details about the value of the chart is referred to as a label.
Thus, it is Add Labels
For more details about label worksheet in Excel, click here:
https://brainly.com/question/14719484
#SPJ2
Create an array of doubles to contain 5 values Prompt the user to enter 5 values that will be stored in the array. These values represent hours worked. Each element represents one day of work. Create 3 c-strings: full[40], first[20], last[20] Create a function parse_name(char full[], char first[], char last[]). This function will take a full name such as "Noah Zark" and separate "Noah" into the first c-string, and "Zark" into the last c-string. Create a function void create_timecard(double hours[], char first[], char last[]). This function will create (write to) a file called "timecard.txt". The file will contain the parsed first and last name, the hours, and a total of the hours. See the final file below. First Name: Noah
Solution :
[tex]$\#$[/tex]include [tex]$<stdio.h>$[/tex]
[tex]$\#$[/tex]include [tex]$<string.h>$[/tex]
void parse[tex]$\_$[/tex]name([tex]$char \ full[]$[/tex], char first[tex]$[],$[/tex] char last[tex]$[])$[/tex]
{
// to_get_this_function_working_immediately, _irst
// stub_it_out_as_below._When_you_have_everything_else
// working,_come_back_and_really_parse_full_name
// this always sets first name to "Noah"
int i, j = 0;
for(i = 0; full[i] != ' '; i++)
first[j++] = full[i];
first[j] = '\0';
// this always sets last name to "Zark"
j = 0;
strcpy(last, full+i+1);
// replace the above calls with the actual logic to separate
// full into two distinct pieces
}
int main()
{
char full[40], first[20], last[20];
double hours[5];
// ask the user to enter full name
printf("What is your name? ");
gets(full);
// parse the full name into first and last
parse_name(full, first, last);
// load the hours
for(int i = 0; i < 5; i++)
{
printf("Enter hours for day %d: ", i+1);
scanf("%lf", &hours[i]);
}
// create the time card
FILE* fp = fopen("timecard.txt", "w");
fprintf(fp, "First Name: %s\n", first);
fprintf(fp, "Last Name: %s\n", last);
double sum = 0.0;
for(int i = 0; i < 5; i++)
{
fprintf(fp, "Day %i: %.1lf\n", i+1, hours[i]);
sum += hours[i];
}
fprintf(fp, "Total: %.1f\n", sum);
printf("Timecard is ready. See timecard.txt\n");
return 0;
}
What may make it easy for cybercriminals to commit cybercrimes? Select 2 options.
Cybercrimes are not classified as real crimes, only as virtual crimes.
They operate from countries that do not have strict laws against cybercrime.
They are not physically present when the crime is committed.
The United States has no law enforcement that acts against them.
Law enforcement agencies lack the expertise to investigate them.
Answer: They operate from countries that do not have strict laws against cybercrime.
They are not physically present when the crime is committed.
Explanation:
edg
Answer:
They operate from countries that do not have strict laws against cybercrime.
They are not physically present when the crime is committed.
Explanation:
Computer programming
5. In an array-based implementation of the ADT list, the getEntry method locates the entry by a. going directly to the appropriate array element b. searching for the entry starting at the beginning of the array working to the end c. searching for the entry starting at the end of the array working to the beginning d. none of the above
Expert Answer for this question-
Explanation:
Answer- C
what does the
command do
importance of information
literay to the society
Explanation:
Information literacy is important for today's learners, it promotes problem solving approaches and thinking skills – asking questions and seeking answers, finding information, forming opinions, evaluateing sources, and making decisions fostering successful learners, effective contributors, and confident individuals.37) Which of the following statements is true
A) None of the above
B) Compilers translate high-level language programs into machine
programs Compilers translate high-level language programs inton
programs
C) Interpreter programs typically use machine language as input
D) Interpreted programs run faster than compiled programs
Answer:
B
Explanation:
its b
Answer:
A C E
Explanation:
I got the question right.
describe the major elements and issues with agile development
Answer:
water
Explanation:
progresses through overtime
Create a Department object which contains a name (String), budget (double), and an ArrayList of Employee objects. Each Employee object contains a FirstName (String). LastName(String), and an Address object. Each Address object contains a Street (String), Apartment (int), City (String), and State as a char array of length 2. The Apartment parameter is optional but the other three are mandatory! Ensure no Address object can be created that does not have them. Finally, create a test program that allows users to Add, Delete, Print, and Search the Employees of a Department.
Answer:
Explanation:
The following code is very long and is split into the 4 classes that were requested/mentioned in the question: Department, Employee, Address, and Test. Each one is its own object with its own constructor. Getters and Setters were not created since they were not requested and the constructor handles all of the variable creation. Address makes apartment variable optional by overloading the constructor with a new one if no argument is passed upon creation.
package sample;
import sample.Employee;
import java.util.ArrayList;
class Department {
String name = "";
double budget = 0;
ArrayList<Employee> employees = new ArrayList<>();
void Department(String name, double budget, ArrayList<Employee> employees) {
this.name = name;
this.budget = budget;
this.employees = employees;
}
}
------------------------------------------------------------------------------------------------------------
package sample;
public class Employee {
String FirstName, LastName;
Address address = new Address();
public void Employee(String FirstName, String LastName, Address address) {
this.FirstName = FirstName;
this.LastName = LastName;
this.address = address;
}
}
-------------------------------------------------------------------------------------------------------------
package sample;
class Address {
String Street, City;
int apartment;
char[] state;
public void Address(String street, String city, char[] state, int apartment) {
this.Street = street;
this.City = city;
this.state = state;
this.apartment = apartment;
}
public void Address(String street, String city, char[] state) {
this.Street = street;
this.City = city;
this.state = state;
this.apartment = 0;
}
}
-------------------------------------------------------------------------------------------------------------
package sample;
public class Test extends Department {
public void add(Department department, Employee employee) {
department.employees.add(employee);
}
public void delete(Department department, Employee employee) {
for (int x = 0; x < department.employees.size(); x++) {
if (department.employees.get(x) == employee) {
department.employees.remove(x);
}
}
}
public void Print(Department department, Employee employee) {
for (int x = 0; x < department.employees.size(); x++) {
if (department.employees.get(x) == employee) {
System.out.println(employee);
}
}
}
public void Search (Department department, Employee employee) {
for (int x = 0; x < department.employees.size(); x++) {
if (department.employees.get(x) == employee) {
System.out.println("Employee is located in index: " + x);
}
}
}
}
Suppose you decide to use the number of times you see any of the area codes of the places Yanay has been to in 50 spam calls as your test statistic. Question 7. Write a function called simulate_visited_area_codes that generates exactly one simulated value of your test statistic under the null hypothesis. It should take no arguments and simulate 50 area codes under the assumption that the result of each area is sampled from the range 200-999 inclusive with equal probability. Your function should return the number of times you saw any of the area codes of the places Yanay has been to in those 50 spam calls. Hint: You may find the textbook section on the sample_proportions function to be useful. For model_proportions, under the null hypothesis, what's the chance of drawing one of the area codes Yanay has recently been to
Answer:
In Python:
import random
def simulate_visited_area_codes():
area_codes = []
for i in range(51):
num = random.randint(200,1000)
area_codes.append(num)
visited_codes = [289, 657, 786, 540]
count = 0
for i in range(51):
for j in range(len(visited_codes)):
if area_codes[i] == visited_codes[j]:
count+=1
return count
print("Visited Areas: "+str(simulate_visited_area_codes()))
Explanation:
So many incomplete details in your question, so I will fill in the gap (i.e. make assumptions)
The assumptions are:
The 50 area codes is stored in area_codes list; the codes are randomly generatedThe visited area codes is stored in visited_codes list, the list is initializes with [289, 657, 786, 540]The program and explanation is as follows: (comments are written in bold)
#This imports the random module
import random
#This defines the function
def simulate_visited_area_codes():
#Thie initializes area_codes to an empty list
area_codes = []
#This iterates from 1 to 50 and generate 50 random numbers to the area_codes list
for i in range(51):
num = random.randint(200,1000)
area_codes.append(num)
#This initializes the visited_code
visited_codes = [289, 657, 786, 540]
#This initializes count variable to 0
count = 0
#This iterates through the list and looks for matching code between the area_code and the visited_code lists
for i in range(51):
for j in range(len(visited_codes)):
if area_codes[i] == visited_codes[j]:
#The count variable is incremented by 1 for matching codes
count+=1
#This returns the count
return count
#The main begins here and prints the number of area code visited
print("Visited Areas: "+str(simulate_visited_area_codes()))
Simulate one or more responses from the distribution corresponding to a fitted model object.
The code is shown below:-
visited_test_statistics_under_null = make_array()
repetitions = 20000
for i in np.arange(repetitions):
new_sum_of_correct_area_code = simulate_visited_area_codes()
visited_test_statistics_under_null = np.append(visited_test_statistics_under_null, new_sum_of_correct_area_code)
visited_test_statistics_under_null( )
Learn more about the topic Simulate Function:
https://brainly.com/question/14492046
Write a SELECT statement that returns these columns from the Orders table: The CardNumber column The length of the CardNumber column The last four digits of the CardNumber columnWhen you get that working right, add the column that follows to the result set. This is more difficult because the column requires the use of functions within functions. A column that displays the last four digits of the CardNumber column in this format: XXXX-XXXX-XXXX-1234. In other words, use Xs for the first 12 digits of the card number and actual numbers for the last four digits of the number.selectCardNumber,len(CardNumber) as CardNumberLegnth,right(CardNumber, 4) as LastFourDigits,'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumberfrom Orders
Answer:
SELECT
CardNumber,
len(CardNumber) as CardNumberLength,
right(CardNumber, 4) as LastFourDigits,
'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumber
from Orders
Explanation:
The question you posted contains the answer (See answer section). So, I will only help in providing an explanation
Given
Table name: Orders
Records to select: CardNumber, length of CardNumber, last 4 digits of CardNumber
From the question, we understand that the last four digits should display the first 12 digits as X while the last 4 digits are displayed.
So, the solution is as follows:
SELECT ----> This implies that the query is to perform a select operation
CardNumber, ---> This represents a column to read
len(CardNumber) as CardNumberLength, -----> len(CardNumber) means that the length of card number is to be calculated.
as CardNumberLength implies that an CardNumberLength is used as an alias to represent the calculated length
right(CardNumber, 4) as LastFourDigits, --> This reads the 4 rightmost digit of column CardNumber
'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumber --> This concatenates the prefix XXXX-XXXX-XXXX to the 4 rightmost digit of column CardNumber
as FormattedNumber implies that an FormattedNumber is used as an alias to represent record
from Orders --> This represents the table where the record is being read.
what is a case in programming
Answer:
A case in programming is some type of selection, that control mechanics used to execute programs :3
Explanation:
:3
What techniques overcome resistance and improve the credibility of a product? Check all that apply.
Including performance tests, polls, or awards
Listing names of satisfied users
Sending unwanted merchandise
Using a celebrity name without authorization
Answer: Including performance tests, polls, or awards.
Listing names of satisfied users
Explanation:
For every business, it is important to build ones credibility as this is vital on keeping ones customers and clients. A credible organization is trusted and respected.
The techniques that can be used to overcome resistance and improve the credibility of a product include having performance tests, polls, or awards and also listing the names of satisfied users.
Sending unwanted merchandise and also using a celebrity name without authorization is bad for one's business as it will have a negative effect on the business credibility.