The operating system cannot communicate with a mouse. What is a solution?
Choose the answer.
Update the mouse device driver.
Run an antimalware program.
Delete temporary files.
Run the task manager utility.

Answers

Answer 1

Answer:

Update the mouse device driver

Explanation:

In a situation where the operating system cannot communicate with a mouse the solution will be to Update the mouse device driver reason been that Mouse Driver is often and always needed to help the motherboard to interact with the device and It is also a software that works between the Operating System and the Mouse because It can effectively and efficiently translates the signals to the motherboard in an appropriate manner or ways which is why Microsoft’s generic drivers are enough and efficient for proper interaction between the Mouse and the Operating System.


Related Questions

Because Java byte code is the same on all computers, compiled Java programs Group of answer choices Cannot run on Linux systems Must be re-compiled for each different machine it is run on Are highly portable Are non-existent

Answers

Answer:

Are highly portable.

Explanation:

Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995.

Java was designed by a software engineer called James Gosling and it is originally owned by Oracle. Also, worthy of mention is the fact that Java was originally known as Oak.

Generally, Java as a software application usually are developed having a ".jar", ".class" or ".java" filename extensions.

Because Java byte code is the same on all computers, compiled Java programs are highly portable. This simply means that, the Java byte code was designed such that it has very few implementation dependency, thus, once the code is written, it can run on all computer platforms that supports the Java programming language.

Hence, the Java byte code is a write once, run anywhere software program.

The Java byte code instructions are read and executed by a computer program known as a Java Virtual Machine (JVM).

Additionally, Java program is used for developing varieties of applications such as, mobile, desktop, games, web and application servers etc.

More than one component in a particular automotive electric circuit is not working. Technician A starts testing the circuit at the power source. Technician B starts testing the circuit at its load. Who is right?

Answers

Hi there! Hopefully this helps!

--------------------------------------------------------------------------------------------------

The answer is A, testing the circuit at the power source.

Write a program that asks the user to input a positive integer and then calculates and displays the factorial of the number. The program should call a function named getN

Answers

Answer:

The program is written in python and it doesn't make use of any comment;

(See explanation section for line by line explanation)

def getN(num):

     fact = 1

     for i in range(1, 1 + num):

           fact = fact * i

     print("Factorial: ",fact)

num = int(input("Number: "))

if num < 0:

     print("Invalid")

else:

     getN(num)

Explanation:

The function getNum is defined here

def getN(num):

Initialize the result of the factorial to 1

     fact = 1

Get an iteration from 1 to the user input number

     for i in range(1, 1 + num):

Multiply each number that makes the iteration

           fact = fact * i

Print result

     print("Factorial: ",fact)

Ths line prompts user to input number

num = int(input("Number: "))

This line checks if user input is less than 0; If yes, the program prints "Invalid"

if num < 0:

     print("Invalid")

If otherwise, the program calls the getN function

else:

     getN(num)

It is always possible and feasible for a programmer to come up with test cases that run through every possible path in a program.
A. True
B. False

Answers

Answer:

True

Explanation:

It is always possible and feasible for a programmer to come up with test cases that run through every possible path in a program is a "true statement" or the first option. It is very natural for a programmer/developer to come up with test that will run through every possible outcome in a program. Doing so will help the developer find things that might cause problems with the program in later time.

Hope this helps.

The answer to the question about the feasibility of a programmer to always come up with test cases that run through every possible path in a program is:

No

What is a Test Case?

This refers to the set of actions which a programmer performs to find out if his software or program passes the system requirements in order to work properly.

With this in mind, we can see that while in some cases, it is possible for the programmer to come up with test cases, but it is not feasible in all cases as there can be hardware error which a virtual machine cannot solve.

Read more about test cases here:
https://brainly.com/question/26108146

The following code uses a nested if statement.

if (employed == 'Y')
cout << "Employed!" << endl;

else if (employed == 'N')
cout << "Not Employed!" << endl;

else
cout << "Error!" << endl;

a. True
b. False

Answers

Answer:

true

Explanation:

else if used so I think it's true

A network technician is designing a network for a small company. The network technician needs to implement an email server and web server that will be accessed by both internal employees and external customers. Which of the following would best secure the internal network and allow access to the needed servers?
A. Implementing a site-to-site VPN for server access.B. Implementing a DMZ segment for the server.C. Implementing NAT addressing for the servers.D. Implementing a sandbox to contain the servers.

Answers

Answer:

Option A (Implementing a site-to-site VPN for server access) seems to be the correct choice.

Explanation:

A site-to-site configuration is something that a single Open VPN network links several more separate networks linked. Technologies through one network will access machines in all the other computer systems in that connection model, including conversely. Implementing this would be extremely straightforward, for as much further even though Access Server was indeed implicated.The much more challenging aspect happens when interacting regarding firewalls including privacy filtering methods, as well as modifying the forwarding table in internet gateways, as several of them from different manufacturers but instead prototypes which they may not be able to log many of these.This rather gateway device uses an Open VPN with a Linux VPN client, to create a connection between various channels. If someone's server hardware is also measured accurately then perhaps a site-to-site configuration could be accomplished which works straightforwardly throughout all systems in both cable systems.

Other choices are not related to the given instance. So that Option A would be the right one.

Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline. Example output for ounces = 7:42 seconds#include void PrintPopcornTime(int bagOunces) {}int main(void) {int userOunces;scanf("%d", &userOunces);PrintPopcornTime(userOunces);return 0;}2. Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N: Lather and rinse." numCycles times, where N is the cycle number, followed by "Done.". End with a newline. Example output with input 2:1: Lather and rinse.2: Lather and rinse.Done. Hint: Declare and use a loop variable.#include /* Your solution goes here */int main(void) {int userCycles;scanf("%d", &userCycles);PrintShampooInstructions(userCycles);return 0;}

Answers

Answer:

Function 1:

#include <stdio.h> //for using input output functions

// start of the function PrintPopcornTime body having integer variable //bagOunces as parameter

void PrintPopcornTime(int bagOunces){

if (bagOunces < 3){ //if value of bagOunces is less than 3

 printf("Too small"); //displays Too small message in output

 printf("\n"); } //prints a new line

//the following else if part will execute when the above IF condition evaluates to //false and the value of bagOunces is greater than 10

else if (bagOunces > 10){

    printf("Too large"); //displays the message:  Too large in output

    printf("\n"); //prints a new line }

/*the following else  part will execute when the above If and else if conditions evaluate to false and the value of bagOunces is neither less than 3 nor greater than 10 */

else {

/* The following three commented statements can be used to store the value of bagOunces * 6 into result variable and then print statement to print the value of result. The other option is to use one print statement printf("%d",bagOunces * 6) instead */

    //int result;

    //result = bagOunces * 6;

    //printf("%d",result);

 printf("%d",bagOunces * 6);  /multiplies value of bagOunces  to 6

 printf(" seconds");

// seconds is followed with the value of bagOunces * 6

 printf("\n"); }} //prints a new line

int main(){ //start of main() function body

int userOunces; //declares integer variable userOunces

scanf("%d", &userOunces); //reads input value of userOunces

PrintPopcornTime(userOunces);

//calls PrintPopcornTime function passing the value in userOunces

return 0; }

Explanation:

Function 2:  

#include <stdio.h> //header file to use input output functions

// start of the function PrintShampooInstructions body having integer variable numCycles as parameter

void PrintShampooInstructions(int numCycles){

if(numCycles < 1){

//if conditions checks value of numCycles is less than 1 or not

printf("Too few."); //prints Too few in output if the above condition is true

printf("\n"); } //prints a new line

//else if part is executed when the if condition is false and else if  checks //value of numCycles is greater than 4 or not

else if(numCycles > 4){

//prints Too many in output if the above condition is true

printf("Too many.");

printf("\n"); } //prints a new line

//else part is executed when the if and else if conditions are false

else{

//prints "N: Lather and rinse." numCycles times, where N is the cycle //number, followed by Done

for(int N = 1; N <= numCycles; N++){

printf("%d",N);

printf(": Lather and rinse. \n");}

printf("Done.");

printf("\n");} }

int main() //start of the main() function body

{    int userCycles; //declares integer variable userCycles

   scanf("%d", &userCycles); //reads the input value into userCycles

   PrintShampooInstructions(userCycles);

//calls PrintShampooInstructions function passing the value in userCycles

   return 0;}

I will explain the for loop used in PrintShampooInstructions() function. The loop has a variableN  which is initialized to 1. The loop checks if the value of N is less than or equal to the value of numCycles. Lets say the value of numCycles = 2. So the condition evaluates to true as N<numCycles  which means 1<2. So the program control enters the body of loop. The loop body has following statements. printf("%d",N); prints the value of N followed by

printf(": Lather and rinse. \n"); which is followed by printf("Done.");

So at first iteration:

printf("%d",N); prints 1 as the value of N is 1

printf(": Lather and rinse. \n");  prints : Lather and rinse and prints a new line \n.

As a whole this line is printed on the screen:

1: Lather and rinse.

Then the value of N is incremented by 1. So N becomes 2 i.e. N = 2.

Now at second iteration:

The loop checks if the value of N is less than or equal to the value of numCycles. We know that the value of numCycles = 2. So the condition evaluates to true as N<numCycles  which means 2=2. So the program control enters the body of loop.

printf("Done."); prints Done after the above two lines.

printf("%d",N); prints 2 as the value of N is 2

printf(": Lather and rinse. \n");  prints : Lather and rinse and prints a new line \n.

As a whole this line is printed on the screen:

2: Lather and rinse.

Then the value of N is incremented by 1. So N becomes 2 i.e. N = 3.

The loop again checks if the value of N is less than or equal to the value of numCycles. We know that the value of numCycles = 2. So the condition evaluates to false as N<numCycles  which means 3>2. So the loop breaks.

Now the next statement is:

printf("Done."); which prints Done on the screen.

So as a whole the following output is displayed on the screen:

1: Lather and rinse.

2: Lather and rinse.

Done.

The programs along with their outputs are attached.

What is computer engineering in your own words?

Answers

Answer: Computer engineering refers to the study that integrates digital engineering with computer sciences to design and develop computer structures and different technological gadgets.

Explanation:

Answer:

Computer engineering is the branch of engineering that integrates electronic engineering with computer sciences. Computer engineers design and develop computer systems and other technological devices.

A script sets up user accounts and installs software for a machine. Which stage of the hardware lifecycle does this scenario belong to?

Answers

Answer:

deployment phase

Explanation:

This specific scenario belongs to the deployment phase of the hardware lifecycle. This phase is described as when the purchased hardware and software devices are deployed to the end-user, and systems implemented to define asset relationships. Meaning that everything is installed and set up for the end-user to be able to use it correctly.

The technology environment would include studies of family changes. social engineering. information technology. minimum wage laws. customer service.

Answers

Question:

The technology environment would include studies of:

A) family changes

B) social engineering

C) information technology

D) minimum wage laws

E) customer service

Answer:

The correct answer is Information Technology (C)

Explanation:

Information and communications technology (ICT) or Information Technology. Whenever the technology environment is under discourse, these are usually the predominant subject matter.

It doesn't come as a surprise given that we live in an information age. An era of the internet of things. If we are tending towards an era where every equipment and even most biological species will give off and receive data, then a technology environment is really predominantly IT.

Cheers!

Letm1, m2,···mnbe distinct numbers on the number line, in the increasing order. Your goalis to color all of them blue. You have magical blue pens with the following property: Whenyou place the pen at co-ordinate x, all the points in the range [x - 5, x + 5] turn blue. Apen can be used only once. Give an algorithm to color all the points using as few pens aspossible. Prove the correctness of the algorithm and derive the runtime.

Answers

Answer:

Following are the algorithm to this question:

y = 0 //  initialize variable y that assigns the value  0

p = 1 // initialize value 1 in the variable p which also known as starting position

init num = 1//define variable num that assign value 1

for j = 1 to n: //defining loop

y = m[j] - m[p]

if (y > 10) //defining if block

num++;  //increment num variable

p=i; //holding loop value in p variable

y= 0//assign value 0 in y variable

Explanation:

Following are the runtime analysis of the above-given algorithm:

The above-provided algorithm is greedy, but if it doesn't exceed the scope, it operates by greedily choosing its next object. Therefore the algorithm selects the fewest number of pens.

Running time:

This algorithm merely iterates once over all the points. The run-time is therefore O(n).

In the Programming Process which of the following is not involved in defining what the program is to do:_____________ Group of answer choices

a. Compile code
b. Purpose
c. Output
d. Input
e. Process

Answers

Answer:

a. Compile code

Explanation:

In programming process, the following are important in defining what a program is to do;

i. Purpose: The first step in writing a program is describing the purpose of the program. This includes the aim, objective and the scope of the program.  The purpose of a program should be defined in the program.

ii. Input: It is also important to specify inputs for your program. Inputs are basically data supplied to the program in order to perform a task. Valid inputs are defined in the program.

iii. Output: Many times, when inputs are supplied to a program the resulting effects are shown in the outputs. The way the output will be is defined in the program.

iv. Process: This involves the method by which inputs are being mapped into outputs. The process implements the functionality of the program by converting inputs into their corresponding outputs. The process is defined in the program.

Compile code is not a requirement in defining what a program is to do. It just allows the source code of the program to be converted into a language that the machine understands.

Write a method called listSearch() that takes in a target string and a list of other strings. This method returns a (possibly shorter) list containing all of the strings from the original list that themselves contain the target string you are searching for. Check for the target string as a case-sensitive substring of every member of the list. You can either modify the provided list or create a new one.

Answers

Answer:

public static List<String> listSearch(String searchFor, List<String> list){

    List<String> foundList = new ArrayList<String>();

   

    for(String s:list){

        if(s.contains(searchFor)){

            foundList.add(s);

        }

    }

    return foundList;

}

Explanation:

Create a method named listSearch that takes two parameters, a String named searchFor and a String list named list

Inside the method, initialize a new String list named foundList, this will be used to hold the strings that contains the target string. Create a for loop that iterates through the list. Check if a string in the list contains the searchFor using the contains method. If it does, add the string to the foundList. When the loop is done, return the foundList.

Between Handshake protocol, change cipher suite, alert and appplication data protocols, the first one to use is:

a. Handshake protocol.
b. Appplication data protocol.
c. Alert protocol.
d. Change cipher suite protocol.

Answers

Answer:

c is the answer I'm pretty sure but wait for more

The best way to avoid driving impaired is to...
A. avoid drinking.
B. stay under the legal BAC limit.
C. keep a taxi fare on hand.

Answers

Answer:

the answer is A avoid drinking 10 Tips to Avoid Driving Drunk

Explanation:

Give someone your keys. Find someone trustworthy who isn't drinking and hand over your keys for the night. ...

Don't drink on an empty stomach. ...

Know your body and pace yourself. ...

Take public transit. ...

Spend the night. ...

Wait an hour or two. ...

Stop drinking 90 minutes before you plan to leave. ...

Take the night off from drinking. hope this helps you :)

a. A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2, 048 sectors and there are 131, 072 (2^17) tracks per surface. A block holds 512 bytes. The disk is not "zoned." What is the total capacity of this disk?

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (That, is, what is the capacity of one cylinder?)

Answers

Answer:

Explanation:

Given that:

number of surfaces on a hard disk = 4

number of sectors = 2048 sectors

number of tracks per surface = 131, 072 (2^17)

a block holds 512 bytes.

Since, 'The disk is not "zoned.".....

then, Number of bytes / sector = 512

a) What is the total capacity of this disk?

The total capacity of the disk is:[tex]= 4 \ surfaces \times 131072 \dfrac{tracks}{surfaces} \times 2048 \dfrac{sector}{tracks} \times 512 \dfrac{bytes}{sector}[/tex]

[tex]= 5.49755814\times 10^{11} \ bytes[/tex]

= 549755814 KB ( kilobytes)

= 549755.814 MB (megabytes)

=549.755814  GB (gigabytes)

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (i.e what is the capacity of one cylinder?)

The capacity of one cylinder can be estimated by determining the capacity of one surface and the capacity of one track.

The capacity of one surface = [tex]131072\dfrac{tracks}{surface} \times 2048 \dfrac{sector}{tracks} \times 512\dfrac{bytes}{sector}[/tex]

The capacity of one surface = [tex]1.37438953 \times 10^{11[/tex] byte = 137.44 GB

Capacity of one track = 2048 sectors/track × 512 bytes/sector

Capacity of one track = 1048576 Bytes/track

Capacity of one track =1048 KB/track

Capacity of one track ≅ 1 MB/track

Since the hard disk contains four surfaces

capacity of one cylinder = 1 MB/track × 4 track/cylinder

capacity of one cylinder  = 4 MB

A bank in your town updates its customers’ accounts at the end of each month. The bank offers two types of accounts: savings and checking. Every customer must maintain a minimum balance. If a customer’s balance falls below the minimum balance, there is a service charge of $10.00 for savings accounts and $25.00 for checking accounts. If the balance at the end of the month is at least the minimum balance, the account receives interest as follows:
a. Savings accounts receive 4% interest.
b. Checking accounts with balances of up to $5000 more than the minimum balance receive 3% interest; otherwise, the interest is 5%.
This Java program using Eclipse Indigo reads a customer’s account number ( int type ), account type ( char type; s or S for savings, c or C for checking), minimum balance that the account should maintain, and current balance. The program should then output the account number, account type, current balance, and new balance or an appropriate error message. Test program by running it five times, using the following data:
46728 S 1000 2700
87324 C 1500 7689
79873 S 1000 800
89832 C 2000 3000
98322 C 1000 750
[code]
import java.util.*;
public class bank
{
public static void main (String [] args)
{int num,error=1,itype=0;
char type =0;
double min,cur =0,balanc =0,rate=0;
Scanner in=new Scanner(System.in);
System.out.println("Enter account number: ");
num=in.nextInt();
while(error==1)
{
System.out.println("Enter account type(s-savings or c-checking):");
type=in.next().charAt(0);
if(type=='c'||type=='C')
{itype=1;
error=0;
rate=3/100.;
}
else if(type=='s'||type=='S')
{itype=0;
error=0;
rate=4/100.;
}
if(error==1)
System.out.println("Invalid type-re enter");
}
System.out.println("Enter minimum balance: ");
min=in.nextDouble();
System.out.println("Enter current balance: ");
cur=in.nextDouble();
balance = cur;
if(itype==1)
{ if(cur>min+5000)
rate=5/100.;
else if(cur cur-=25;
}
else
if(cur cur-=10;
cur=cur+rate*cur;
System.out.printf("After interest and fees your balance is = $%.2f\n",cur);
System.out.println("Your account number: " + num);
System.out.println("Your account type: " + type);
System.out.printf("Your starting balance: $%.2f\n ", balanc);
System.out.printf("Your new balance: $%.2f\n", cur);
}
}
[/code]

Answers

Answer:

This is your corrected code and the output of each test example. I have also added comments with the provided code to make the code understandable. I have also changed itype variable to from int to String in order to print the account type (Savings or Checking) in output.

import java.util.*;

public class bank{  //class name

public static void main (String [] args)  //start of main function body

{int num,error=1; //declare variables

String itype=" "; //stores Checking or Savings account type

char type =0;  //type variable which is one of savings S or checking C

double min,cur =0,balance =0,rate=0;

//declare variables for minimum balance, current balance, interest rate

Scanner in=new Scanner(System.in);

System.out.println("Enter account number: ");  //prompts user to enter acc no

num=in.nextInt();  //reads input account number

while(error==1) {  

//asks user to enter account type C or S

System.out.println("Enter account type(s-savings or c-checking):");

type=in.next().charAt(0);  //reads the input character of account type

if(type=='c'||type=='C')  //if user inputs c or C

{itype= "Checking";  //set itype to Checking when user input c or C

error=0;  //set value of error to 0 means user entered valid type input

rate=3/100.; }  // Savings accounts receives  3% interest

else if(type=='s'||type=='S')  //if user enters S or s that shows Savings account

{itype= "Savings";  //set itype to Savings when user input s or S

error=0;  //set error to 0 means there is no error

rate=4/100.; }  //Savings accounts receives 4% interest

if(error==1)  //in case of error in giving input

System.out.println("Invalid type-re enter"); }  //asks user to input again

System.out.println("Enter minimum balance: ");  //asks user to enter min bal

min=in.nextDouble();  //reads value of input minimum balance

System.out.println("Enter current balance: ");

// reads value of input current balance

cur=in.nextDouble();

balance = cur;  

if(itype=="Checking") //if the account type is checking

{ if(cur>min+5000) //Checking accounts interest is 5%

{rate=5/100.;

cur=cur+rate*cur; //computes new balance

System.out.printf("New balance: $%.2f\n", cur);} //returns new balance value

/*If a customer’s balance falls below the minimum balance, there is a service charge of $25.00 for checking accounts */

else if(cur<min)

{cur-=25;

System.out.printf("New balance: $%.2f\n", cur);} returns the value of new

}

if(itype=="Savings"){ //if account type is Savings

/*If a customer’s balance falls below the minimum balance, there is a service charge of $10.00 for savings accounts */

if(cur<min)

{cur-=10;

System.out.printf("New balance: $%.2f\n", cur);}

else

//Savings accounts receive 4% interest

{cur=cur+rate*cur;

System.out.printf("New balance: $%.2f\n", cur);}}

/* as the program should output account number, account type, current balance, and new balance so i have commented out the extra print statements below */

//System.out.printf("After interest and fees your balance is = $%.2f\n",cur);

System.out.println("Account Number: " + num);

System.out.println("Account type: " + itype);

System.out.printf("Current balance: $%.2f\n ", balance);  //the result is //displayed up to 2 decimal place .2f   } }

Explanation:

Following is the output of each test example:

46728 S 1000 2700

Account Number: 46728                                            

Account type: Savings                                                                                          

Current balance: $2700.00                                                                                

New balance: $2808.00

87324 C 1500 7689

Account Number: 87324                                                                                      

Account type: Checking                                                                                        

Current balance: $7689.00                                                                                  

New balance: $8073.45

79873 S 1000 800

Account Number: 79873                                                                                    

Account type: Savings                                                                                        

Current balance: $800.00  

New balance: $790

89832 C 2000 3000

Account Number: 89832                                                                                      

Account type: Checking                                                                                        

Current balance: $3000.00                                                                                  

New balance: $3090.00

98322 C 1000 750  

Account Number: 98322

Account Type: Checking  

Current balance: $1000.00

New Balance: $725.00

A network technician is designing a network for a small company. The network technician needs to implement an email server and web server that will be accessed by both internal employees and external customers. Which of the following would BEST secure the internal network and allow access to the needed servers?
A. Implementing a site-to-site VPN for server access.
B. Implementing a DMZ segment for the server
C. Implementing NAT addressing for the servers
D. Implementing a sandbox to contain the servers

Answers

Answer:

(B) Implementing a DMZ segment for the servers

Explanation:

DMZ is the short form for Demilitarized Zone. It is the temporary storage between an internal or private LAN and the public Internet. The main purpose of the DMZ is to give additional layer of security to a company's LAN (Local Area Network).

Once there are services to be provided to users on the public Internet, such services should be added to the DMZ. A few services that are worth implementing a DMZ segment for are;

i. Email servers

ii. Web servers

iii. Proxy servers

iv. FTP servers

What is the output of the following Python statements? def recurse(a): if (a == 0): print(a) else: recurse(a) recurse(0)

Answers

Answer:

d) 0 1 1 2

The above piece of code prints the Fibonacci series.

Explanation:

def a(n):

   if n == 0:

       return 0

   elif n == 1:

       return 1

   else:

       return a(n-1)+a(n-2)

for i in range(0,4):

   print(a(i),end=" ")

Write a function SwapArrayEnds() that swaps the first and last elements of the function's array parameter. Ex: sortArray = {10, 20, 30, 40} becomes {40, 20, 30, 10)
#include
/* Your solution goes here
*/ int main(void) {
const int SORT_ARR_SIZE = 4;
int sortArray[SORT_ARR_SIZE];
int i;
int userNum;
for (i = 0; i < SORT_ARR_SIZE; ++i) {
scanf("%d", &sortArray[i]);
}
SwapArrayEnds(sortArray, SORT_ARR_SIZE);
for (i = 0; i < SORT_ARR_SIZE; ++i) {
printf("%d ", sortArray[i]);
}

Answers

Answer:

Here is the SwapArrayEnds()

//function with two parameters; the array and array size

void SwapArrayEnds(int sortArray[],int SORT_ARR_SIZE){  

int temp;   //temporary variable to hold the first element of sortArray

if(SORT_ARR_SIZE > 1){   //if sortArray size is greater than 1

temp = sortArray[0];   // set value of temp to the first element of sortArrray

sortArray[0] = sortArray[SORT_ARR_SIZE-1];   // set the value of first element of sortArray to the last element of sortArray

sortArray[SORT_ARR_SIZE-1] = temp;  }  } // set last element  value to temp

Explanation:

Lets understand the working of the above function with the help of an example. Suppose the sortArray has the following elements: {10,20,30,40}. So the size of this array is 4.

if(SORT_ARR_SIZE > 1) has an if statement which checks if the array size is greater than 1. This condition evaluates to true as 4 > 1. So the body of if condition executes.

Next the statement temp = sortArray[0];   sets the value of temp variable to the value of first element of sortArray. As sortArray[0] means the element at 0-th index position of the sortArray. So using the above example the first element of the array is 10. So temp = 10.

Next the statement sortArray[0] = sortArray[SORT_ARR_SIZE-1];   sets the last element of the sortArray to the position of first element of the sortArray.

SORT_ARR_SIZE-1 is the position of last element of the array. As the size of sortArray is 4, so 4-1 = 3 which points to the last element. Now this element is moved to the first position of the array. This means that the value of first element of array becomes 40 as the element at 3-th index of the sortArray is 40.

Next the statement sortArray[SORT_ARR_SIZE-1] = temp moves the value in temp variable to the last position of the sortArray. As we know that the value of temp= 10. So this element 10 of the sortArray is positioned at SORT_ARR_SIZE-1 position of sortArray which is 4-1 = 3-th index of sortArray. This simply means that 10 is moved to the last position of sortArray.

So now the final sortArray becomes: 40,20,30,10 as the first and last element of the array are swapped using above function SwapArrayEnds().

The program along with the output is attached in screenshot.

Functions are collection of codes or instructions merged together to act as one.

The function, where comments are used to explain each line is as follows:

//This defines the function

void SwapArrayEnds(int sortArray[],int SORT_ARR_SIZE){  

//This increments the array element at index 0

       sortArray[0] += sortArray[SORT_ARR_SIZE-1];

//This replaces the last element with the first

       sortArray[SORT_ARR_SIZE-1]= sortArray[0]- sortArray[SORT_ARR_SIZE-1];

//This replaces the first element with the last

       sortArray[0]= sortArray[0]- sortArray[SORT_ARR_SIZE-1];

   

}

At the end of the function, the first and the last elements of the array are swapped.

Read more about similar programs at:

https://brainly.com/question/15582117

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Write down an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.

Answers

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

What happens to weather patterns when a cold front approaches? What happens to
weather patterns when a warm front approaches?

Answers

Answer:

The overview including its problem is listed in the explanation segment following.

Explanation:

The cool, unobstructed front develops whenever the cool front overwhelms the warm side or front. The warm front increases over its colder, then gradually move towards the surface of the earth.

The subsequent weather system seems to be close to something like a moving warmer front.

So that the above seems to be the right answer.

You are tasked with leading a project to build a custom software testing tool for client. You have been provided with a set of project requirements, the project boundaries and a set of deliverables. Before you can begin developing the work breakdown structure for the project, which other item will you need.
A set of assumptions related to the project
A competitive analysis for the tool
A list of personnel available to work on the projects and their skills
A collection of software vulnerabilities that the tool must identify

Answers

sorry i would help if i knew

.

Write a method named isPalindrome that accepts a string parameter and returns true if that string is a palindrome, or false if it is not a palindrome. For this problem, a palindrome is defined as a string that contains exactly the same sequence of characters forwards as backwards, case-insensitively. For example, "madam" or "racecar" are palindromes, so the call of isPalindrome("racecar") would return true. Spaces, punctuation, and any other characters should be treated the same as letters; so a multi-word string such as "dog god" could be a palindrome, as could a gibberish string such as "123 $$ 321". The empty string and all one-character strings are palindromes by our definition. Your code should ignore case, so a string like "Madam" or "RACEcar" would also count as palindromes.

Answers

Answer:

The programming language is not stated;

However, I'll answer this question using Java Programming Language;

The method is as follows;

   public static void isPalindrome(String userinput)

    {

       String reverse = "";

       int lent = userinput.length();

int j = lent - 1;

while(j >= 0)

       {

           reverse = reverse + userinput.charAt(j);

           j--;

       }

       if(reverse.equalsIgnoreCase(userinput))

       {

           System.out.println("True");

       }

       else

       {

           System.out.println("False");

       }    

    }

Explanation:

This line defines the method isPalindrome with a string parameter userinput

public static void isPalindrome(String userinput) {

This line initializes a string variable

       String reverse = "";

This line gets the length of the userinput

       int len = userinput.length();

The following while-loop gets the reverse of userinput and saved the reversed string in reverse

int j = lent - 1;

while(j >= 0)

       {

           reverse = reverse + userinput.charAt(j);

           j--;

       }

The following if statement checks if userinput and reverse are equal (cases are ignored)

       if(reverse.equalsIgnoreCase(userinput))

       {

           System.out.println("True"); This line is executed if the if condition is true

       }

       else

       {

           System.out.println("False"); This line is executed if otherwise

       }  

    } The method ends here

When a higher-priority thread enters the ready state, the operating system generally preempts the currently running thread (an operation known as preemptive scheduling). Depending on the operating system, a steady influx of higher-priority threads could postponeâ possibly indefinitelyâ the execution of lower-priority threads. such indefinite postponement is sometimes referred to more colorfully as________.

Answers

Answer:

starvation

Explanation:

An indefinite postponement is sometimes make reference to as more colorfully as starvation when a stable influx of preferential or higher-priority threads could postponeâ possibly indefinitelyâ the execution of lower-priority threads though depending on operation system

Operating systems employ a technique called aging to curb against or avoid starvation, when a thread waits in the ready state, the operating system moderately grow the thread’s priority to ensure that the thread will eventually run.

Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph'

Answers

Answer:  

I am writing a Python program:

For taking input from user:

user_input = input() # takes input from user

short_names = user_input.split() #splits user_input into list of strings

short_names.pop(0) # removes the first element of the list i.e. Gertrude

short_names[-1] = "Joe" #sets the last element to Joe

print(short_names)    #prints modified list of Sam Ann Joe

If you do not want to take input from user:  

short_names=['Gertrude', 'Sam', 'Ann', 'Joseph']  #list of 4 elements

short_names=short_names[1:]  # removes the first element Gertrude

short_names.pop()  # removes last element i.e. Joseph from list

short_names.append('Joe')  #adds Joe to the end of the list

print(short_names) #prints modified list Sam Ann Joe

If you do not want to use pop() and append() methods:

short_names = ['Gertrude', 'Sam', 'Ann', 'Joseph']  #creates list of 4 values

short_names = short_names[1:]  # removes first value i.e. Gertrude from list

short_names[-1] = "Joe"  #set the last element to Joe

print(short_names) #prints modified list Sam Ann Joe

Explanation:

The first program takes the names from the user, splits them into list of strings, then pop(0) has given index value 0 which means 1st value in the list. So it removes and returns first value from the list. Next statement sets the last value of list to Joe.

The second program has a hard coded list ['Gertrude', 'Sam', 'Ann', 'Joseph']  

short_names = short_names[1:] removes the first value of the short_names list i.e. Gertrude. Next pop() removes and returns last value in the list i.e. Joseph from list. Last statement append('Joe') adds Joe to the end of the list.

The third program has a list of 4 elements. short_names = short_names[1:]   removes first value i.e. Gertrude from list and short_names[-1] = "Joe"  sets the last element to Joe.

The function was implemented using the JavaScript language, the shift, pop and push function was used to get the desired output

Array and String Operations

The function bellow is written in JavaScript

function shortName (short_names){

short_names.shift() // The first element "Gertrude" was removed

short_names.pop() //The last element "Joseph" was removes

short_names.push("joe") //"Joe" is added to the new list

return short_names //The new list is returned as output

}

Learn more about array operation here:

https://brainly.com/question/26104158

What is the value of the totalsString variable after the following code is executed? var totals = [141.95, 212.95, 411, 10.95]; totals[2] = 312.95; var totalsString = ""; for (var i = 0; i < totals.length; i++) { totalsString += totals[i] + "|"; }

Answers

Answer:

141.95|212.95|312.95|10.95|

Explanation:

Reformatting the code snippet and giving it line numbers;

1.       var totals = [141.95, 212.95, 411, 10.95];

2.      totals[2] = 312.95;

3.      var totalsString = "";

4.      for (var i = 0; i < totals.length; i++) {

5.          totalsString += totals[i] + "|";

6.      }

Line 1 creates an array called totals with four elements.

     First element = totals[0] =141.95

     Second element = totals[1] = 212.95

     Third element = totals[2] = 411

     Fourth element = totals[3] = 10.95

Line 2 replaces the value of the third element totals[2] = 411 with 312.95.

     Therefore the array totals = [141.95, 212.95, 312.95, 10.95]

Line 3 creates an empty string called totalsString

Lines 4 - 6 create a for loop that cycles from i=0 to i<totals.length

       totals.length = 4 (which is the number of items in the array totals)

       This means that the loop cycles from i=0 to i<4

       During cycle 1 when i = 0, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[0] + "|"   //substitute the values

            totalsString = "" + 141.95 + "|"

            totalsString = 141.95|

       During cycle 2 when i = 1, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[1] + "|"   //substitute the values

            totalsString = "141.95|" + 212.95 + "|"

            totalsString = 141.95|212.95|

       During cycle 3 when i = 2, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[2] + "|"   //substitute the values

            totalsString = "141.95|212.95|" + 312.95 + "|"

            totalsString = 141.95|212.95|312.95|

       During cycle 4 when i = 3, the expression inside the for loop executes as follows;

            totalsString = totalsString + totals[3] + "|"   //substitute the values

            totalsString = "141.95|212.95|312.95|" + 10.95 + "|"

            totalsString = 141.95|212.95|312.95|10.95|

At the end of the execution, totalsString = 141.95|212.95|312.95|10.95|

Select the option that is not true. 1. Timestamp and Validation schedulers are both optimistic schedulers. 2. Timestamp and Validation schedulers can be used to remove physically unrealizable behaviour. 3. Timestamp and Validation schedulers guarantee serializability. 4. Timestamp and Validation schedulers perform most effectively on transactions that perform writes.

Answers

Answer:

3. Timestamp and Validation schedulers guarantee serializability.

Explanation:

Timestamp is a sequence of information encoded when a certain event occurs at a given time that information is decoded and message is identified. Time schedulers is optimistic scheduler and it removes physically unrealizable behavior. Timestamp cannot guarantee serializability.  It can detect unrealizable behavior.

What happens if two functions are defined with the same name, even if they are in different arguments within the same .py files?

Answers

Answer:

Following are the code to this question:

def data(a):#defining method data that accepts parameter

   print (a)#print parameter value

def data(b):#defining method data that accepts parameter

   print (b)#print parameter value

x=input("enter value: ")#defining variable x that5 input value from user

print(data(x))#call method data

Output:

enter value: hello..

hello..

None

Explanation:

As the above code, it is clear defines that python doesn't support the method overloading because More than one method can't be specified in a python class with the same name and python method arguments have no type. The single argument method may be named using an integer, a series, or a double value, that's why we can say that it is not allowed.

In the context of structured systems analysis and design (SSAD) models, a _____ is a tool that illustrates the logical steps in a process but does not show data elements and associations.

Answers

Answer:

Flowchart.

Explanation:

Structured Systems Analysis and Design (SSAD) is a methodology and a systems technique of analyzing and designing of information systems.

This system uses several tools to design various components such as dataflow diagram, conceptual data model, flowchart, etc.

In the given scenario, the tool that will be used by the system would be a flowchart.

A flowchart is a diagram that represents a systematic flow of a process. In SSAD, flowchart is used to illustrate the logical steps to be taken in a process but it does not show data elements and associations.

So, the correct answer is flowchart.

Other Questions
WEATHER Starting at 1:00 P.M., the temperature changes-4 degrees per hour. How long will it take to reach -1?comePLS HELP 10 points! Please answer within next 5 minutes! Explain how to use the distributive property to find the product (3)(4 1/ 5) The first card selected from a standard 52-card deck was a king. If it is returned to the deck, what is the probability that a king will be drawn on the second selection A ballast is dropped from a stationary hot-air balloon that is at an altitude of 576 ft. Find (a) an expression for the altitude of the ballast after t seconds, (b) the time when it strikes the ground, and (c) its velocity when it strikes the ground. (Disregard air resistance and take ft/sec2.) Many science fiction films are based off of the myth of ________ in which man trades his eternal soul for knowledge, then learns that knowledge divorced from wisdom is destructive Work out the mean for the data set below: 1003, 1005 1.- ANSWER THE FOLLOWING QUESTIONS 1.- What is this story about? 2.- Do you think the wife is overreacting to his husbands opinion? explain 3.- Why do the wife get his finger cut? 4.- Do you think Racism is such a delicate issue in our society which is capable of frictions? explain 4.- Which is the correct attitude the husband should have taken about this topic? 5.- If you were in the wifes situation what would you do? 6.- Who do you think is right in this discussion? explain 7.- Can you define racism in your own words? 8.- Is the husband correct in his point of view? explain 9.- Who is the tolerant person in this marriage? explain 10.- Are you a racist person? explain !!!!!DOY MUCHOS PUNTOS!!!!!! the bed on jeffs pick up truck is 8 feet lomg. On a scale model of his truck the bed is 10 inches long. what is the scale of the model? A current account deficit implies that A. exports of goods and services exceed imports of goods and services. B. secondary income is positive. C. the financial account is in surplus. D. the financial account is negative. Apples lose 85% of their weight while drying. How many pounds of fresh apples do you need to get 10.5 lb of dried apples ? Mary bought 10 quarts of juice at the grocery. How many gallons of juice did she buy? Please help! Prove: Ray E B bisects AEC. How do monopolies affect the price of goods?Monopolies always result in lower consumer prices.Monopolies can lower and raise their prices at will.Monopolies always result in higher consumer prices.Monopolies have no effect on the cost of goods. The average of 12 numbers is 24. The average of 24 numbers is 12. What is the average of all 36 numbers? In the model of monopolistic competition, there can be short-run:____________. a. losses or profits, but there must be profits in long-run equilibrium. b. profits, but there must be losses in long-run equilibrium.c. losses or profits, but there must be losses in long-run equilibrium. d. losses or profits, but there must be neither profits nor losses in long-run equilibrium. e. losses, but there must be profits in long-run equilibrium. Find all possible values of k so that x^2 + kx - 32 can be factored. The distance between Chicago and Cleveland is354 miles. If a person leaves Chicago at 9:50AM. Central Time and arrives in Cleveland at5:30 PM the same day Eastern Time, at whataverage speed, to the nearest mile, does hetravel?A)46MPHB)50MPHC)53MPHD)55MPH Read the sentence below.[WOL] doing my chores, I also had to type my essay.Which transitional word would best complete the sentence?O Instead ofO First of allIn addition toO Similarly With these different degrees that college students categorize plagiarism, they alsohave different levels of punishment that they feel are appropriate; the punishmentsrange from being severely punished by campus administration to the less severe of theteacher discreetly accepting a redo ("How" 4). Help me answer this PLEASE !!