In an earlier assignment you modeled an inheritance hierarchy for dog and cat pets. You can reuse the code for that hierarchy in this assignment. Write a program that prompts the user to enter data (name, weight, age) for several Dog and Cat objects and stores the objects in an array list. The program should display the attributes for each object in the list, and then calculate and display the average age of all pets in the list using a method as indicated below:
public static double calculateAverage( ArrayList list )
{
... provide missing code ...
}
previous code
chihuahua
public class Chihuahua extends Dog
{
public void bark()
{
System.out.println("Bow wow");
}
}
dog
public class Dog
{
private String name;
private double weight;
private int age;
public String getname(String n)
{
name = n;
return n;
}
public double getweight(double w)
{
weight = w;
return w;
}
public int getage(int a)
{
age = a;
return a;
}
public void bark()
{
}
}
import java.util.Scanner;
public class DogCatTest
{
public static void main( String [] args)
{
Scanner scan = new Scanner(System.in);
System.out.println("Enter name");
String name = scan.nextLine();
System.out.println("Enter weight");
double weight = scan.nextDouble();
System.out.println("Enter age");
int age = scan.nextInt();
Dog [] dogCollection = { new Chihuahua(), new GoldenRetriever()};
for( int i = 0; i < dogCollection.length; i++ )
dogCollection[ i ].getname(name);
System.out.println(name);
for( int i = 0; i < dogCollection.length; i++ )
dogCollection[ i ].getweight(weight);
System.out.println(weight);
for( int i = 0; i < dogCollection.length; i++ )
dogCollection[ i ].getage(age);
System.out.println(age);
for( int i = 0; i < dogCollection.length; i++ )
dogCollection[ i ].bark();
System.out.println("Enter name");
String cname = scan.nextLine();
System.out.println("Enter weight");
double cweight = scan.nextDouble();
System.out.println("Enter age");
int cage = scan.nextInt();
Cat1 [] catCollection = { new SiameseCat(), new SiberianCat() };
for( int i = 0; i < catCollection.length; i++ )
catCollection[ i ].getname(cname);
System.out.println(cname);
for( int i = 0; i < catCollection.length; i++ )
catCollection[ i ].getweight(cweight);
System.out.println(cweight);
for( int i = 0; i < catCollection.length; i++ )
catCollection[ i ].getage(cage);
System.out.println(cage);
for( int i = 0; i < catCollection.length; i++ )
catCollection[ i ].meow();
}
}
public class GoldenRetriever extends Dog
{
public void bark()
{
System.out.println("Bow wow");
}
}
public class SiameseCat extends Cat1
{
public void meow()
{
System.out.println("Meow");
}
}
public class SiberianCat extends Cat1
{
public void meow()
{
System.out.println("Meow");
}
}
public class Cat1
{
private String name;
private double weight;
private int age;
public String getname(String n)
{
name = n;
return n;
}
public double getweight(double w)
{
weight = w;
return w;
}
public int getage(int a)
{
age = a;
return a;
}
public void meow()
{
}
}

Answers

Answer 1

Java program that shows the use of inheritance hierarchy, the code reuses the attributes of the class objects.

Importance of applying inheritance:

In this case of pets (dogs and cats), applying inheritance allows a much shorter and more structured code. Also, reusable since we can add classes of other pets such as birds, rabbits, etc., all of them also belonging to the Pet superclass.

Reserved words in a java code that enforces inheritance:

extendsprotectedSuper

Here is an example:

Java code

import java. io.*;

import java.util.ArrayList;

import java.io.BufferedReader;

public class Main

{

// ArrayList of Pet objets

 public static ArrayList < Pets > arraypets = new ArrayList < Pets > ();

 public static void main (String args[]) throws IOException

 {

   BufferedReader data =

     new BufferedReader (new InputStreamReader (System. in));

   //Define variables

   String aws;

   String str;

   double w;

   String n;

   int a;

   double average;

   do

     {

//Data entry System.out.println ("Pet species? ");

System.out.println ("(1) Cat ");

System.out.println ("(2) Dog ");

aws = data.readLine ();

System.out.print ("Enter name: ");

n = data.readLine ();

System.out.print ("Enter weight: ");

str = data.readLine ();

w = Double.valueOf (str);

System.out.print ("Enter age: ");

str = data.readLine ();

a = Integer.valueOf (str);

if (aws.equals ("1"))

  {

    Cat cat = new Cat (n, w, a);

      arraypets.add (cat);

      average = cat.averageAges (a);

  }

else

  {

    Dog dog = new Dog (n, w, a);

      arraypets.add (dog);

      average = dog.averageAges (a);

  }

System.out.print ("Enter more data? (y/n)");

aws = data.readLine ();

aws = aws.toLowerCase ();

     }

   while (!aws.equals ("n"));

//Calculate average of pets age

   average = average / arraypets.size ();

   average = Math.round (average * 100.0) / 100.0;

// Output

   System.out.println ("Attributes for each object in the list: ");

 for (Pets arraypet:arraypets)

     {

System.out.println (arraypet);

     }

   System.out.println ("Number of pets: " + arraypets.size ());

   System.out.println ("Average age of all pets in the list: " + average);

 }

}

class Pets

{

 protected String Name;

 protected double Weight;

 protected int Age;

 public Pets ()

 {

 }

 public Pets (String name, double weight, int age)

 {

   this.Name = name;

   this.Weight = weight;

   this.Age = age;

 }

 //Returning values formatted by tostring method

 public String toString ()

 {

   return "Nombre: " + this.Name + ", Peso: " + this.Weight + ", Edad: " +

     this.Age;

 }

 public void CalculateAverage ()

 {

 }

}

class Dog extends Pets

{

 public Dog ()

 {

   super ();

 }

 public Dog (String name, double weight, int age)

 {

   super (name, weight, age);

 }

//Adding the ages of the pets  double averageAges (double a)

 {

   a += a;

   return a;

 }

}

class Cat extends Pets

{

 public Cat ()

 {

   super ();

 }

 public Cat (String name, double weight, int age)

 {

   super (name, weight, age);

 }

//Adding the ages of the pets

 double averageAges (double a)

 {

   a += a;

   return a;

 }

}

To learn more about inheritance hierarchy in java see: https://brainly.com/question/15700365

#SPJ4

In An Earlier Assignment You Modeled An Inheritance Hierarchy For Dog And Cat Pets. You Can Reuse The
In An Earlier Assignment You Modeled An Inheritance Hierarchy For Dog And Cat Pets. You Can Reuse The
In An Earlier Assignment You Modeled An Inheritance Hierarchy For Dog And Cat Pets. You Can Reuse The

Related Questions

Assume string1 is a character array. Which of the following operations does not produce a string?
a. string1[] = ""; b. string1[] = "test": c. string1[] = {'t', 'e', 's', 't, '\0'; d. string1[] = {'t', 'e', 's', 't');

Answers

None of the procedures listed below result in a string for String1[] = "t," "e," "s," "t."

How may a string be declared in an array in Java?

The size of the array can be specified in the array declaration, or it can be declared without a size. The declaration of a string array looks like this: String[] stringArray1 /String Array is declared without a size.

How do you access the items of an array?

Within square [] brackets following the array name, one can access an array's elements by supplying the index (offset) of the requested element. Integer type subscripts are required for arrays.

To know more about string visit :-

https://brainly.com/question/30099412

#SPJ4

Tanya is a student. She is planning to connect with three of her teachers on a professional networking website. In what three ways will this benefit her?

getting feedback on social media
applying for an internship in a company
learning about a company’s work culture
looking for a summer project or job
getting recommendations for her profile

Answers

Answer:

applying for an internship in a company

looking for a summer project or job

getting recommendations for her profile

applying for an internship in a company

getting recommendations for her profile

looking for a summer project or job

Hope this helped

-scav

What is the purpose of using variables in programming?
O To calculate equations
O To define functions
O To print statements
O To store string values

Answers

Variables are used to store information to be referenced and manipulated in a computer program. ... It is helpful to think of variables as containers that hold information. Their sole purpose is to label and store data in memory. This data can then be used throughout your program.

The purpose of using variables in programming is to store and manipulate data, so the correct option is the last one, to store strings and values.

What is the purpose of using variables in programming?

Variables are used to hold values that can be accessed and modified throughout a program's execution. They provide a way to store different types of data, such as numbers, text, Boolean values, or more complex data structures, like arrays or objects.

By using variables, programmers can perform calculations, make decisions based on conditions, store user input, and manipulate data in various ways. Variables allow for the storage of intermediate results, keeping track of state, and facilitating data processing and manipulation within a program.

While variables can be used in conjunction with other programming constructs, such as equations, functions, or printing statements, the primary purpose of variables is to store and manage data values during program execution. Variables provide flexibility, reusability, and dynamic behavior within programs, enabling developers to write more efficient and adaptable code.

Learn more about programming at:

https://brainly.com/question/23275071

#SPJ2

Given the set of element {a, b, c, d, e, f} stored in a list, show the final state g of the list, assuming we use the move-to-front heuristic and

Answers

Self-Organizing list according to a certain sequence applying move-to-Front algorithm. Output of the different states of the list including the final state is shown.

Python code

from __future__ import print_function

#Define variables

inpt = 'abcdefacfbde'

seq = list('abcdef')

sq, p = [], seq[::]

ss = 0

if __name__ == '__main__':

   print("Self-Organizing Lists applying move-to-Front algorithm")

   print("Define sequence pattern: ", seq[:])

   print("")

   print("Access sequence")

   for s in inpt:

       ss+=1

       for x in seq:

 #applying move-to-Front algorithm

           idx = p.index(x)

           sq.append(idx)

           p = [p.pop(idx)] + p

           if p[0] == s:

 #output sequence

               print("seq:",ss, ": ", p)

               lst = (p[len(p)-1])

               sp = p

   sp.append(lst)

   print("Final state of the list: ", sp )

   

To learn more about Self-Organizing list see: https://brainly.com/question/6362941

#SPJ4

 

Plz I need the answer!!!:(

Select the correct items from the list.

You can classify some languages into multiple categories. Pick the categories in which the C++ programming language can be classified.

Procedural

Declarative

Imperative

Functional

Logic - Based

Object Oriented

Visual

4G

Choose all that apply

Answers

Answer:

Procedural, Visual, Logic - Based

Explanation:

Answer:

Procedural

Imperative

Object-Oriented

Which of the following correctly initializes an array arr to contain four elements each with value 0 ? int[] arr = (, 0, 0, 0); 11 int[] arr = new int[4]; III int[] arr = new int[4]: for (int i = 0; i < arr.length; i++) arr[i] = 0 (A) I only (B) III only (C) I and III only (D) II and Ill only (E) I, II, and III 2 Consider the following code segment. int total 3; inte) values - {8. 6. 4, -2); total + values[totall: total + values[total]; System.out.println(total); What is printed as a result of executing the code segment? (A) 0 (B) 1 (C) 3 (D) 7 (E) 16 3 Consider the following code segment. int[] arr=(-6,2,-5,3,8,10,-12,9); for (int k=0: k arr.length; k++) if (arr[k] > O&G arr[k]2= 0) System.out.print (arx[k] + " "); What will be printed as a result of executing the code segment? (A) 2389 (B) -6 2 8 10-12 (C) 28 10-12 (D) 2810 (E) 23 8 10 9

Answers

The following correctly initializes an array to contain four elements each each with value 0 is I, II and III. 2) Output is 7 and 3) code segment will be printed as a result will be 2, 8, 10, optionD is correct.

The array can be initialized as

1-  An array can also be initialized during declaration. ( as in I )

2- In Initializing an array without assigning values, the default value of each element is zero. ( as in II )

3- An array can be initialized by setting each value of an element to zero by looping the length of the array. ( as in III)

I. It creates an array of 4 elements. The default value of int in java is Zero.

II. It also creates an array of 4 elements and manually initialized all the values to 0.

III. It creates an array of 4 elements. and uses a loop to manually initialized all the values to 0.

2) Output is 7 i.e Option(D).

total =total+values[total]; => total = 3+values[3];

=> total=3+(-2) => total=3-2 =>total=1.

total =total+values[total] =>total =1+values[1]

=>total= 1+6 =>total =7.

3)Option(D) i.e 2 8 10.

In If condition it is checking whether the element in the array is Positive and also it is divided by 2 with 0 reminder.

So from array positive numbers are 2,3,8,10,9. from these positive numbers Number dived by 2 or Multiples of is 2,8,10.

So output is 2,8,10.

To learn more about code segment

https://brainly.com/question/20063766

#SPJ4

u
Question 3
1 pts
"Hello, world" is what kind of data?
O communicative
O integer
O decimal
O string
HELP

Answers

“Hello, world” is a string kind of data

what do you need help on could you example it to me

explain how yo could use your expression to determine the value that would appear in the 25th ro of the second column

Answers

A sign for a number is called a variable. The variable in the equation 8x + 17 is called x. Y is the variable in the equation = 25. Variables don't have to be letters; for instance, the formula 6 + 2 has a variable.

What does "variable" actually mean?

A variable is a sum that can change based on the underlying mathematical problem. Mathematical expressions and equations frequently use the generic letters x, y, and z. rather,

just what is a variable?

A variable is any property, quantity, or number that can be measured or counted. A variable may also be referred to as a data item. Age, gender, company profits and costs, and location of birth

To know more about variables visit:

https://brainly.com/question/17344045

#SPJ4

You would like to implement the rule of thirds to present high-resolution images in an IT scrapbook. The scrapbook includes images of computer and other IT devices. How can you do this for the scrapbook

Answers

To exhibit high-resolution images, photographers can apply the rule of thirds by positioning the image's component parts along the intersecting lines.

How is the rule of thirds applied?

In order to create a nice composition, the Rule of Thirds positions your topic in the left- or right-third of the frame. Align your main subject and other frame components along these points to produce a balanced, or aesthetically engaging, image. Each intersection point represents a possible focus of interest.

How should the rule of thirds be used when capturing pictures?

According to the rule of thirds, your subject should be in the left or right third of your image, leaving the other two thirds more open. Although there are alternative compositional methods, the rule of thirds usually results in interesting and well-composed pictures.

To know more about resolution visit:-

https://brainly.com/question/12724719

#SPJ4

Question:

Select the correct answer from each drop-down menu.

You would like to implement the rule of thirds to present high-resolution images in an IT scrapbook. The scrapbook includes images of computer

and other IT devices. How can you do this for the scrapbook?

You can implement the rule of thirds by placing the

part of the image along the

lines.

Reset

Next

central

intersecting

margin

pseudocode uses the end-structure statement ____ to clearly show where the structure ends.

Answers

Due to the fact that it spares the user from having to install anything, this kind of email account is more popular.

The following are email's characteristics: It entails an automatic response to messages. It makes it easier for messages to be automatically forwarded and redirected. It entails the facility sending copies of a message to a large number of individuals. self-filing and message retrieval. Webmail’s are email accounts with a web interface. These accounts are frequently free email accounts that can be used on a variety of websites. Yahoo Mail is one of them, among others. As a result, web-based email accounts are more popular since they eliminate the need for users to install and maintain email clients on each computer.

Learn more about Webmail’s here:

https://brainly.com/question/28604285

#SPJ4

Match the different stages of the boot sequence with the order in which they occur. 1 . Second The computer performs a power-on self-test (POST). 2 . Fifth The boot loader takes control of the computer, loads the operating system into memory, and launches it. 3 . Sixth BIOS confirms that it found the boot loader and loads the program into the RAM on the motherboard. 4 . First The computer displays the details of the process. 5 . Third BIOS accesses the first sector of the boot disk. 6 . Fourth The power button turns on the power and sends it to the motherboard and other components.

Answers

The computer performs a power-on self-test (POST) is the second step.

What are the the different stages of the boot sequence ? The operating system is loaded into memory by the bootstrap loader, also known as the boot loader, allowing it to start working. The bootstrap loader configures the tiny driver programmes that communicate with and manage the different hardware components of the computer in their most basic form.The sixth stage is when the boot loader takes over the computer, puts the operating system into memory, and starts it.First, the electricity is turned on and sent to the motherboard and other components by pressing the power button.The third phase is when the computer shows the process's specifics.The fourth step involves BIOS accessing the boot disk's first sector.

To learn more about  boot loader refer to:

https://brainly.com/question/13258563

#SPJ4

The Windows _________ feature allows you to install patches to maintain the security of your computer.

Answers

The answer is automatic updates

A) Here is an array with exactly 15 elements: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Suppose that we are doing a binary search for an element. Circle any elements that will be found by examining two or fewer numbers from the array.

Answers

Answer:

4, 8 and 12

Explanation:

Given

[tex]Array: 1\ 2\ 3\ 4\ 5\ 6\ 7\ 8\ 9\ 10\ 11\ 12\ 13\ 14\ 15[/tex]

[tex]n = 15[/tex]

Required

Elements that would be found by examining 2 or fewer numbers

To do this, we apply the following binary search algorithm

[tex]head = 1[/tex] at 0-index

[tex]tail = 15[/tex] at 14-index

Calculate the mid-index

[tex]Mid = \frac{0 + 14}{2}[/tex]

[tex]Mid = \frac{14}{2}[/tex]

[tex]Mid = 7th[/tex]

The mid-element (at 7th index) is:

[tex]Mid = 8[/tex]

The element at the mid-index is found by just 1 comparison

For 2 comparisons, we search in either directions

For the lower half, the new head and tail are:

[tex]head = 1[/tex] ---- at 0-index

[tex]tail = 7[/tex] at 6-index

Calculate the mid-index

[tex]Mid = \frac{0 + 6}{2}[/tex]

[tex]Mid = \frac{6}{2}[/tex]

[tex]Mid = 3rd[/tex]

The mid-element (at 3rd index) is:

[tex]Mid = 4[/tex]

For the upper half, the new head and tail are:

[tex]head = 9[/tex] ---- at 8-index

[tex]tail = 15[/tex] at 14-index

Calculate the mid-index

[tex]Mid = \frac{8 + 14}{2}[/tex]

[tex]Mid = \frac{22}{2}[/tex]

[tex]Mid = 11th[/tex]

The mid-element (at 11th index) is:

[tex]Mid = 12[/tex]

The elements at the mid-index of both halves is found by 2 comparisons

Hence, the numbers are: [tex]4, 8, 12[/tex]

You are the security administrator for an enterprise that follows the bring your own device (BYOD) deployment model. What is the first action that you should take to protect sensitive enterprise data from exposure if an employee device is stolen and can't be located

Answers

You should perform a remote wipe to protect sensitive enterprise data from exposure if an employee device is stolen and can't be located.

What exactly are remote lock and wipe?

Terms like "remote wipe" and "remote lock" are frequently used in the business to describe managing mobile devices like laptops, desktop computers, tablets, smartphones, and more (MDM).

A stolen laptop can it be remotely erased?

Your Windows laptop can also be remotely erased. Prior to this occurring, confirm that the Find My Device feature is turned on: Authenticate using your Microsoft account. In Windows 10, make sure the feature is turned on by going to Settings > Update & Security > Find my device.

To know more about remote wipe visit

brainly.com/question/10316119

#SPJ4

Quetion 10 of 10 Which action take place in the Deploy tep of the game development cycle?

Answers

The most likely course of action during the Define stage of the game development cycle is to play the game and complete each level to check for flaws. Option B is correct.

What exactly does game development entail?

The art of creating games is known as "game development," which includes the design, creation, and release of a game. The components could include concept generation, design, construction, testing, and release. When creating the game, you should take into account the rules, rewards, player interaction, and level design.

Do you develop games in C++?

In today's game development ecosystem, C++ is crucial. The usage of C++ in the source code of numerous popular game engines, like Unreal and Unity, enables developers to create more high-performing games. Let's examine the benefits of using C++ as a game development language.

To know more about game development visit

brainly.com/question/19837091

#SPJ4

The options are;

A. Creating a mood board in order to plan the overall feel and color

scheme of the game

B. Playing the game and going through every level to make sure that

no errors occur

C. Determining whether the outside material needed in the game has

special licenses

D. Building a minimum viable product (MVP) and presenting it to an

audience for testing

to store a date value without storing a time value, you can use the

Answers

Utilize the date data type if you only want to record a date value without a time value.

What of the following data types is used to hold full numbers?

INVERT data type, The INTEGER data type can hold whole values with a precision of 9 or 10 digits that fall between -2,147,483,647 and 2,147,483,647.

Which of the following data types resembles numeric but only contains whole numbers?

With or without a decimal mark, integer data types can store full values. Integer (which means whole in Latin) As integer data types, ANSI SQL specifies SMALLINT, INTEGER, and BIGINT. The size of the number that each type can store makes a distinction between them.

To know more about time value visit :-

https://brainly.com/question/28465900

#SPJ4

an arithmetic checksum _______ the individual characters to be transmitted.

Answers

The various characters to be transmitted are added together in an algebraic checksum.

What form of arithmetic is employed in the calculation of checksums?

Binary arithmetic with one's complement One's complement binary arithmetic is probably used to calculate the checksum of a data set in the most used checksum scheme. When adding one's complement, the carry bit is first included back into the result after computing a standard two's complement sum of two values.

Checksum example: What is it?

IT specialists use checksums to identify serious problems in data transmissions. A checksum is a number that indicates the number of bits in a transmission message. After performing a cryptographic hash function, each piece of data or file can be given a checksum value before transmission.

To know more about algebraic checksum visit :-

https://brainly.com/question/28454591

#SPJ4

Which of the following is not one of the primary principles an organization should follow for successful agile software development

Answers

Option E. Rigid Scheduling is not a principle that should be followed for successful agile software development as it goes against the spirit of agility.

Agile development is all about adapting to change and embracing the unknown.

Successful Agile Software Development: The Primary Principles

The primary principles that should be followed for successful agile software development are adaptive planning, comprehensive documentation, self-organizing teams, and fast feedback loops.

Adaptive planning involves creating a plan that is flexible and can adapt to changes in scope or requirements. Comprehensive documentation ensures that all stakeholders are on the same page and that the project’s progress is easily tracked. Self-organizing teams are teams that are composed of individuals that can work together to solve complex problems and create innovative solutions.

Since the question is not complete, here's the full task:

Which of the following is not one of the primary principles an organization should follow for successful agile software development?

Choose the right option:

A. Adaptive Planning B. Comprehensive Documentation C. Self-Organizing TeamsD. Fast Feedback LoopsE. Rigid Scheduling

Learn more about Software: https://brainly.com/question/26872062

#SPJ4

Which of the following examples are using an exploration strategy? Check all that apply. Mozilla (creators of Web browser Firefox and e-mail client Thunder bird) have an online store selling crowd sourced T-shirts. These shirts, designed by people who don't work for Mozilla, advertise Mozilla products in new and creative ways. Stamen Design is a design and technology studio that uses mapping and data visualization tools to present information in fresh and exciting ways. Creativity is a way of life for its designers, and the company is willing to pay what it takes to hire only the most innovative designers on the market. Apple solicits iPhone applications from hundreds of different organizations. Some of the more unusual apps include one from a Massachusetts police department that identifies offenders via photos and another from that turns an iPhone into a

Answers

There is an online store for crowdsourced T-shirts run by Mozilla, the company that produced the Web browser Firefox and the email program Thunderbird. These shirts, which weren't created by Mozilla employees, innovatively and creatively promote their goods.

What purposes does Mozilla Firefox serve?

The Mozilla Corporation is in charge of developing Mozilla Firefox, a free open-source browser. Windows, OS X, Linux, and Android all support Firefox. Firefox, which was first made available in November 2004, may be completely customized with themes, plug-ins, and add-ons.

Does Firefox remain free?

The Mozilla Firefox, or simply Firefox, web browser was developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to show online pages, which incorporates current and upcoming web standards.

To know more about Mozilla visit:-

https://brainly.com/question/27983090

#SPJ4

What logical security concept ensures that all computers in a Windows Server environment adhere to the same policies

Answers

Portable electronics like laptops should be properly secured with a lock because they are particularly susceptible to theft, loss, and resale. A cable lock can be used to connect to the majority of laptops and desktop computers' built-in slots.

present in order for this to succeed?

A Windows operating system is often deployed using an unattended installation. Unattend. xml is the answer file used by unattended instals, and it stores user input for the different GUI dialogue boxes that pop up during the installation process.

What aspect of security is host- or network-based?

IDS may be host-based or network-based. In order to detect suspicious behaviour, a network-based IDS monitors network traffic for specific network segments or devices and analyses network, transport, and application protocols.

To know more about IDS visit:-

https://brainly.com/question/29038449

#SPJ4

what features of Windows 10 available in Linux and OS X allow you to organize your open apps with in workspaces

Answers

Virtual Desktop is the features of Windows 10 available in Linux and OS X allow you to organize your open apps with in workspaces.

What exactly is a virtual desktop?

The desktop experience is segregated from the physical device used to access it in virtual desktops, which are preset images of operating systems and software. Remote users can use a network to access their virtual desktops.

What in Windows 10 is a virtual desktop?

A cloud-based desktop and app virtualization service is called Azure Virtual Desktop. What you can do when running Azure Virtual Desktop on Azure is as follows: Create a multi-session deployment of Windows 11 or Windows 10 that offers a complete Windows experience and scalability.

To know more about Linux visit

brainly.com/question/15122141

#SPJ4

What is the value of scores[2][3] in the following array?
int [] [] scores = { { {88, 80, 79, 92}, {75, 84, 93, 80},
{98, 95, 92, 94}, {91, 84, 88, 96} };
i know the answer is 94 i just have no clue how.....
a. 94
b. 84
c. 93
d. 95

Answers

The correct Option is (A), Array is formed like matrix 4 X 4 scores[2][3] indicates index 2 for the row and index 3 for the column is 94.

What is the definition of array?

An arrays is indeed a collection of closely related datasets kept in close proximity to one another in memory. The sole way to retrieve each database file directly is by using its index number, making it the most basic data structure.

Why do we employ an array?

In order to prevent confusion that can arise when utilizing multiple variables, arrays help in maintaining vast sets of data below a single variable name. arranging the data components: Diverse array algorithms, including bubble sort, selection sort, and insertion sort, can aid in the efficient and effective organization of various data items.

To know more about array visit :

https://brainly.com/question/29761562

#SPJ4

What process helps a developer to prevent future issues and helps to give the client solutions?

Answers

The process which helps a web developer to prevent mistakes while helping provide solutions to a customer is proper communication to the customer.

Who is a web developer?

Websites are created and maintained by web developers. They are also in charge of the site's technical components, such as performance and capacity, which are measures of a website's speed and capacity to handle the traffic.

Web developers may also contribute material for the site. You will face several problems as a web developer. Some will be simple to repair, while others will be quite difficult."

Therefore, proper communication with the customer is the procedure that enables a web developer to avoid mistakes while assisting in the provision of solutions to customers.

To learn more about web development, refer to the link:

brainly.com/question/9297287

#SPJ1

12. What is the most suitable MS Azure Information Protection (AIP) label while sharing a

presentation with client names and future project details with your Manager?

Oa. Use AIP ( Azure Information Protection) label 'Confidential' and select appropriate

permissions by opting for a suitable sub level

Ob. Use AIP ( Azure Information Protection) label 'ifternal' and select appropriate permissions by

opting for a suitable sub level

Oc. Use AIP ( Azure Information Protection) label 'Critical and select appropriate permissions by

opting for a suitable sub level

Od. Use AIP (Azure Information Protection) label 'Restricted' and select appropriate permissions

by opting for a suitable sub level

Answers

Option D. Use AIP (Azure Information Protection) label 'Restricted' and select appropriate permissions by opting for a suitable sub level.

The most suitable AIP label for sharing presentation with client names and future project details with the Manager is 'Restricted'. This label ensures the data is protected with appropriate permissions and access control.

Securely Sharing Presentation with Client Names and Future Project Details with the Manager using Azure Information Protection

The 'Restricted' label is the most suitable AIP label for sharing presentation with client names and future project details with the Manager. This label ensures the data is securely protected and access to it is restricted to authorized personnel only. The label also provides an additional layer of security by allowing the user to choose a suitable sublevel of permissions. This ensures that the data is not accessed by anyone who is not supposed to have access to it. This label also allows the user to monitor and audit the access to the data, thereby providing an additional layer of security.

Learn more about Security Management: brainly.com/question/14364696

#SPJ4

A user is experiencing issues synchronizing a smartphone. The user is able to connect to individual services, but each requires a different password. Which of the following needs to be configured to allow the user to access web services securely with a unique password?
A. SIM
B. SMB
C. SSL
D. SSO

Answers

SSO must be configured to allow users to securely access web services using a unique password.

What is SSO?SSO is a technology that combines multiple application login screens into a single one. SSO allows a user to access all of their SaaS applications by entering their login credentials (username, password, etc.) once on a single page.Single sign-on is an authentication scheme that allows a user to log in to multiple related but independent software systems using a single ID. True single sign-on enables users to log in once and access services without having to re-enter authentication credentials.Single sign-on (SSO) is becoming an increasingly useful tool for businesses all over the world. It enables all of their employees, partners, and customers to gain access to the applications and services they require using a single set of credentials.

To learn more about SSO refer to :

https://brainly.com/question/13741908

#SPJ4

During which stage of sleep does the body experience increased heart rate, rapid breathing, and genital arousal?
a. NREM-2
b. NREM-3
c. NREM-1
d. REM sleep

Answers

Your heart rate, breathing rate, and blood pressure all rise during REM sleep as your eyes move quickly under your eyelids.

What is the case with REM sleep?

Sleep is not as deep when you enter REM sleep because brain activity picks back up. Similar to when you are awake, there is a lot of activity. Because of this, REM sleep is when you'll have vivid dreams. Major muscles that you usually control are used simultaneously.

Which wave does Stage 1 sleep have as a characteristic?

Stage 1 sleep is connected to both alpha and theta waves in terms of brain wave activity. Alpha waves are coordinated patterns of electrical activity (waves) that are relatively low frequency (8–13Hz) and high amplitude during the early stages of stage 1 sleep.

To know more about REM sleep visit :-

https://brainly.com/question/14664351

#SPJ4

Which cloud computing concept allows users to store files on a cloud-based server when necessary, but can also copy that data from the cloud and put it back on the device when space once again becomes available on the device

Answers

Infrastructure as a Service (IaaS) is a cloud computing service that allows a provider to give users access to computer resources such servers, networking, and storage (IaaS). Within the architecture of a service provider, organizations utilize their own platforms and applications.

Which cloud architecture enables customers to utilize both on-premises infrastructure and the advantages of the public cloud?

The hybrid cloud IaaS IBM Cloud Satellite enables businesses to more effectively deploy and run programs across on-premises, edge computing, and public cloud environments from any cloud vendor.

What function does cloud computing have that enables users to proactively request more storage?

Rapid elasticity refers to a service that enables customers to automatically request more cloud storage.

To know more about servers visit:-

https://brainly.com/question/7007432

#SPJ4

What's your opinion on Brainly?

Answers

Answer:

great it helped me a lot at tests

Explanation:

Answer:

amazing thank you so much your a life saver

How can perfection be attained on sync?​

Answers

Perfection can be attained by practicing anything. Perfection on sync can be attained by using and knowing its every function.

What is sync?

In computers, synchronization (or syncing, sync) is the process of constantly guaranteeing that data in one location is an identical clone of data in another location.

When you press the "sync" button, the device transfers data from your phone to the service's servers. If you swap phones and your new phone has Syncing capabilities, you can restore your contacts and documents to the phone.

Therefore, anything can be practiced to achieve perfection. Perfection on sync can be obtained by using and understanding all of its functions.

To learn more about sync, refer to the link:

https://brainly.com/question/19501147

#SPJ1

Codewriting Python 3 main.py3 Saved def solution (blocks, height): You are given array of integers called blocks . Each of the values in this array represents the width of a block - the ith block has a height of 1 and a width of blocks[i] (i.e. it's a 1 x blocks (1) block). You want to pack all the given blocks into a rectangular container of dimensions height x width , according to the following rules: . Place blocks into the container row by row, starting with block . For each row, place the blocks into the container one by one, in the order they are given in the blocks array. • If there is not enough space to put the current block in the current row, start filling the next row. You are given the value height of the rectangular container. Your task is to find the minimal possible width of a rectangular container in which all blocks can fit. Find and return this minimal possible width value. TESTS CUSTOM TESTS RESULTS O RUN TESTS NOTE: The blocks cannot be rotated. A Tests passed: 0/26. Syntax error. Example Test 1 . For blocks - [1, 3, 1, 3, 3] and height - 2. the output should be solution (blocks, height) - 6 Input: blocks: [1, 3, 1, 3, 3] height: Here's how the blocks should be packed in a container size 2 X6 6 Expected Output: LILL-HD-T.

Answers

The minimal possible width of a rectangular container in which all blocks can fit is print(solution([1, 3, 1, 3, 3], 2))     #test case

def solution(blocks, height):       #function definition

   width = max(blocks)         #at first width is initialzied with max width of block in blocks list

   while(1):       #loop repeats until correct width is found

       temp = []   #list to store the blocks that are placed succesfully

       x = []  #a list of size height is declared to store the blocks of each row

       for i in range(height):

           x.append(0)     #fill the list x with zeroes

       j = 0               #j is initialzied to zero

       for i in range(len(blocks)):    #for each block present in blocks list

           if(x[j] + blocks[i] <= width):  #if current block can be placed in jth index

               x[j] += blocks[i]       #then it is added

               temp.append(blocks[i])  #and as it is added to x, we can add that to temp also

           else:       #else

               j += 1  #go for next index i.e., increment j by 1

               if(j < len(x) and (x[j] + blocks[i] <= width)): #check if current block can be placed

                   x[j] += blocks[i]       #adds that to x

                   temp.append(blocks[i])  #and to temp also

               else:       #else if the capacity of rectangle exceeds

                   width += 1  #we increase the width by 1 and continue the above process again

                   break       #break from this for loop

       if(len(temp) == len(blocks)):   #whenver temp and blocks are same, all blocks are placed succesfully

           break   #then we break from the while loop

   return width    #width is returned

print(solution([1, 3, 1, 3, 3], 2))     #test case

To learn more about Python

https://brainly.com/question/18502436

#SPJ4

Other Questions
Among all artists, who do you find most interesting? Why?60 points ( need ASAP ) What is credit history and why is it important? Sarah is a recent u. S. College graduate who is interested in starting an import tea business. If she follows through with her plans, she will be a pioneer, because only a handful of women choose to start businesses in the u. S a stationer sells 17 magazines for 2.70 each, 28 newspapers for 1.50 each and postcards for 0.30 each. If he collected 97.20 how many postcards did he sell?It needs to be an expression The molar solubility of calcium sulfide in a 0.222 M sodium sulfide solution is:________- Which layer of the OSI model should you check first if a computer can't connect to the company network the ratio of boys to girls in the sixth grade is 3 to 5 if there are 45 girls how many students are there in the 6th grade what are the moon phases. but be more detailed and don't put in "the phases of the moon" in your own words. What is the mean absolute deviation (MAD) of the set[10, 15, 18, 8, 4] What are the zeroes of the function? 1. what are three possible effects of a point mutation.2. what is a frameshift mutation, and how do they affect the protein being coded for? Plz help too hard answer plz answer 1 or 2 plz1+1=?the 37 digits of pi 3. 4 926 35 9793238 6 83 2 79 Fill the rest Geometry questionnn! Please help :) What event caused the US to enter World War 2 ? maz changes 30 dollars back into pounds how many pounds will he get Jasmine wants to build a 2 5/6 meter long garden path paved with square stones that measure 1/4 meter on each side. There will be no spaces between the stones. How many stones will be needed to complete the garden path? please help i suck at math In which of these episodes from the excerptfrom The Odyssey, Part 1 does Odysseus lose allhis men?A The Lotus-Eaters"B The Cattle of the Sun God"C'The Sirens"D "The Cyclops"please no links Teal Mountain Corporation recorded a right-of-use asset for $312,900 as a result of a finance lease on December 31, 2019. Teal Mountains incremental borrowing rate is 10%, and the implicit rate of the lessor was not known at the commencement of the lease. Teal Mountain made the first lease payment of $58,429 on on December 31, 2019. The lease requires 7 annual payments. The equipment has a useful life of 7 years with no residual value.Prepare Teal Mountain's December 31, 2017, entries. (Credit account titles are automatically indented when amount is entered. Do not indent manually. Round answers to O decimal places e.g. 5,275.) Date Account Titles and Explanation Debit Credit December 31, 2017 What are the 6 parent functions?