Write Album's PrintSongsShorterThan() to print all the songs from the album shorter than the value of the parameter songDuration. Use Song's PrintSong() to print the songs.
#include
#include
#include
using namespace std;
class Song {
public:
void SetNameAndDuration(string songName, int songDuration) {
name = songName;
duration = songDuration;
}
void PrintSong() const {
cout << name << " - " << duration << endl;
}
string GetName() const { return name; }
int GetDuration() const { return duration; }
private:
string name;
int duration;
};
class Album {
public:
void SetName(string albumName) { name = albumName; }
void InputSongs();
void PrintName() const { cout << name << endl; }
void PrintSongsShorterThan(int songDuration) const;
private:
string name;
vector albumSongs;
};
void Album::InputSongs() {
Song currSong;
string currName;
int currDuration;
cin >> currName;
while (currName != "quit") {
cin >> currDuration;
currSong.SetNameAndDuration(currName, currDuration);
albumSongs.push_back(currSong);
cin >> currName;
}
}
void Album::PrintSongsShorterThan(int songDuration) const {
unsigned int i;
Song currSong;
cout << "Songs shorter than " << songDuration << " seconds:" << endl;
/* Your code goes here */
}
int main() {
Album musicAlbum;
string albumName;
getline(cin, albumName);
musicAlbum.SetName(albumName);
musicAlbum.InputSongs();
musicAlbum.PrintName();
musicAlbum.PrintSongsShorterThan(210);
return 0;
}

Answers

Answer 1

Answer:

Here is the function PrintSongsShorterThan() which prints all the songs from the album shorter than the value of the parameter songDuration.

void Album::PrintSongsShorterThan(int songDuration) const {

unsigned int i;

Song currSong;  

cout << "Songs shorter than " << songDuration << " seconds:" << endl;  

for(int i=0; i<albumSongs.size(); i++){  

currSong = albumSongs.at(i);  

if(currSong.GetDuration()<songDuration){  

currSong.PrintSong();     } } }

Explanation:

I will explain the working of the for loop in the above function.

The loop has a variable i that is initialized to 0. The loop continues to execute until the value of i exceeds the albumSongs vector size. The albumSongs is a Song type vector and vector works just like a dynamic array to store sequences.

At each iteration the for loop checks if the value of i is less than the size of albumSongs. If it is true then the statement inside the loop body execute. The at() is a vector function that is used to return a reference to the element at i-th position in the albumSongs.  So the album song at the i-th index of albumSongs is assigned to the currSong. This currSong works as an instance. Next the if condition checks if that album song's duration is less than the specified value of songDuration. Here the method GetDuration() is used to return the value of duration of the song. If this condition evaluates to true then the printSong method is called using currSong object. The printSong() method has a statement cout << name << " - " << duration << endl;  which prints/displays the name of the song with its duration.

If you see the main() function statement: musicAlbum.PrintSongsShorterThan(210);

The musicAlbum is the Album object to access the PrintSongsShorterThan(210) The value passed to this method is 210 which means this is the value of the songDuration.

As we know that the parameter of PrintSongsShorterThan method is songDuration. So the duration of each song in albumSongs vector is checked by this function and if the song duration is less than 210 then the name of the song along with its duration is displayed on the output screen.

For example if the album name is Anonymous and the songs name along with their duration are:

ABC 400

XYZ 123

CDE 300

GHI 200

KLM 100

Then the above program displays the following output when the user types "quit" after entering the above information.

Anonymous                                                                              

Songs shorter than 210 seconds:                                                                        

XYZ - 123                                                                                                              

GHI - 200                                                                                                              

KLM - 100

Notice that the song name ABC and CDE are not displayed because they exceed the songDuration i.e. 210.

The output is attached.

Write Album's PrintSongsShorterThan() To Print All The Songs From The Album Shorter Than The Value Of

Related Questions

Write a small program that asks the user how many asterisks it should print out. The user responds with a number, then the program prints that number of asterisks.

Answers

Answer:

I am writing a C++ program. Let me know if you want the program in some other programming language.

#include <iostream> //to use input output functions

using namespace std; // to identify objects like cin cout

int main(){  //start of main() function body

int n; // number of asterisks

cout<<"how many asterisks do you want to print? "; //asks user how many asterisks it should print

   cin>>n; // reads the value of number of asterisks that user want to print

   for( int i=0; i< n; i++)    { //loop to display the number of asterisks in output

       printf("*");    } } // print * asterisks

Explanation:

I will explain how the for loop works.

Suppose the user entered 3 as number of asterisks that user wants to print.

So n=3

Now for loop has a variable i that is initialized to 0. For loop checks if the value of i is less than that of n. It is true because i=0 and n=3 and 0<3. So the body of the loop executes. This prints the first asterisk *

Then the value of i is incremented to 1 and becomes i=1

At next iteration loop again checks if value of i is less than n. It is true because i=1 and n=3 and 1<3. So the body of the loop executes. This prints the second asterisk **

Then the value of i is incremented to 1 and becomes i=2

At next iteration loop again checks if value of i is less than n. It is true because i=2 and n=3 and 2<3. So the body of the loop executes. This prints the third asterisk ***

Then the value of i is incremented to 1 and becomes i=3

At next iteration loop again checks if value of i is less than n. This time it evaluates to false because i=3 and n=3 so 3=3. So the loop ends and the output is

***

The output screenshot is attached.

An organization is struggling to differentiate threats from normal traffic and access to systems. A security engineer has been asked to recommend a system that will aggregate data and provide metrics that will assist in identifying malicious actors or other anomalous activity throughout the environment. Which of the following solutions should the engineer recommend?a. Web application firewall b. SIEM c. IPS d. UTM e. File integrity monitor

Answers

Answer:

b. SIEM.

Explanation:

In this scenario, an organization is struggling to differentiate threats from normal traffic and access to systems. A security engineer has been asked to recommend a system that will aggregate data and provide metrics that will assist in identifying malicious actors or other anomalous activity throughout the environment. The solution the engineer should recommend is the Security information and event management (SIEM).

Security information and event management is an enterprise software that provides a holistic view and analyzes activity from various resources across an entire information technology (IT) infrastructure.

The SIEM is used to aggregate important data from multiple source such as servers, routers, firewall, switches, domain controllers, antivirus software and analyzes the data to detect any threat, deviation from the norm, as well as investigate in order to take appropriate actions. Some examples of the SIEM system are IBM QRadar, Splunk, LogRhythm etc.

Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file (directory.txt) that contains the numbers in random order. Handle lookups by name and also reverse lookups by phone number. Use a binary search for both lookups. A driver program and templates have been created for you.

Answers

Answer:

Here is the JAVA program:

Items.java

public class Item {  // Item class

private String name, ph_num;  // class data members name to hold the name and ph_num stores the telephone numbers

public Item(String fullName, String PhoneNo){  //constructor of Item class , so fields full name and ph_num can be initialized when the object is created

name = fullName;  // holds the name field

ph_num = PhoneNo;}  //holds the telephone number

public String getFullName(){  // accessor method to get access to the name field

return name;}  //returns the name from directory

public String getPhoneNo(){  //accessor method to get access to the ph_nujm field

return ph_num; } } //returns the telephone number

Explanation:

LookupTable.java

public class LookupTable{  //class name

private ArrayList<Item> data;  // dynamic array list named data of Item class. This array list stores the names and telephone numbers from file

public LookupTable(){  //default constructor

data = new ArrayList<Item>();}  // creates an array list of Item type which holds the names and phone numbers

public void read(Scanner in){  // Scanner class object is created and this class is used to read input and the method reads the names and phone numbers

while(in.hasNext()){  // the loop moves through each line of the file. scanner class method hasNext checks for the tokens in the input

String name = in.nextLine();  // scans for the name in the input

String ph_num = in.nextLine();  //scans for the phone numbers in the input

data.add(new Item(name, ph_num));}}  // adds the names and phone number in to the Array list

public String lookup(String k){  //method looks up for an item in the table.  param k is the key to find . returns the value with the given key, or null if no       such item was found

String result = null;  //result initialized to to null

for(Item item: data){  //creates Item object and traverses the array list for each item i.e. name or phone numbers

if(k.equals(item.getFullName())){  //access the getFullName method through object item and checks if that name matches the key to find.

result = item.getPhoneNo();}}  //gets the corresponding phone number and assigns it to result variable

return result;}  //returns the result containing the phone number

public String reverseLookup(String v){  //Looks up an item in the table. param v is the value to find . returns the key with the given value, or null if no  such item was found. This method performs the lookup through phone number

String result = null;  //result is set to null to start

for(Item item: data){  //Traversing list through the for each item in data  

if(v.equals(item.getPhoneNo())){  //if the value of v is equal to the phone number accessed by using accessor method and object item

result = item.getFullName();}}  //accesses the corresponding name of that phone number and assigns it to the result

return result;}}  //returns the result                                

The data from directory file which contains the number and names. The LookupTable class has a method lookup which handles the lookups by names and the method reverseLookup that handles the lookups by phone number.  

A systems administrator wants to replace the process of using a CRL to verify certificate validity. Frequent downloads are becoming problematic. Which of the following would BEST suit the administrators needs?
A. OCSP
B. CSR
C. Key escrow
D. CA

Answers

Answer:

A. OCSP

Explanation:

Online Certificate Status Protocol (OCSP) is an Internet Protocol that is used as an alternative for CRL and is used to obtain the revocation status of a digital certificate.

A certificate revocation list (CRL) is a set of digital certificates that have been rendered invalid/revoked by the Certificate Authority (CA) because they can no longer be trusted.

Because an OCSP response uses less data than a CRL, it would be best suited to the administrator's needs.

Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0 otherwise. Assume that x, y and n are all of type int.

Answers

Answer:

See comments for line by line explanation (Lines that begins with // are comments)

The function written in C, is as follows:

//The function starts here

int check(x,y,n)

{

//This if condition checks if x and y are within range of 0 to n - 1

if((x>=0 && x<=n-1) && (y>=0 && y<=n-1))

{

//If the if conditional statement is true, the function returns 1

 return 1;

}

else

{

//If the if conditional statement is false, the function returns 0

 return 0;

}

//The if condition ends here

}

//The function ends here

Explanation:

a) five benefits of having
an operating system over not having one.

Answers

Answer:

Software Updates, Computing Sources, No Coding, Relatively Inexpensive, Safeguards Data.

Explanation:

what is the difference between head header and heading in HTML​

Answers

Answer:

<Head>the appears the "<body>" of a web page.

<Heading> the appears the body of the web page.

Explanation:<Head> it contains that provides the information about web page.

<Heading> it contains such as the title,date, summary.

<Heading> are the<h1>,<h2>,tags

it provides the title and subtitles of the web page.

<Heading>

</Heading>

Head is element is metadata.

Heading is element is actual element.

Answer:

Head>the appears the "<body>" of a web page.

<Heading> the appears the body of the web page.

Explanation:

Below is some info for some internet transactions. We want to sort it by time and by location. Which sorting algorithm is appropriate for this particular problem?
a. radix sort.
b. heap sort.
c. selection sort.
d. shell sort.

Answers

Answer:

c. selection sort

Explanation:

The best way to sort the internet transactions data based on time and location is selection sort. The algorithms sorting technique is used to sort the complex data in computer programs. Shell sort is the technique which sorts the data apart from each other and reduces interval between them. Heap sort is sorting technique based on binary heap data structure. Radix sort is an integer sorting technique in algorithms.

Type the correct answer in the box.

Who is responsible for creating and testing the incident response plan?

The _______ is responsible for creating and testing the incident response plan.

Answers

Answer: CSIRT

Explanation: CSIRT is team that specializes in day to day cyber incidents  

The CSIRT is responsible for creating and testing the incident response plan.

What is CSIRT?

CSIRT is the Computer emergency response team. One of the key areas for the efficient operation of a corporation is the legal department. Professionals face enormous challenges, particularly when you take into account the need for other bodies within the company itself.

We can list the reviews of the CSIRT procedures that are conducted through this department as one of its key responsibilities. This department also has the responsibility of comprehending the actions that the CSIRT will take to ensure that they comply with all applicable federal, state, and local laws and regulations.

Therefore, the incident response strategy must be written and tested by the CSIRT.

To learn more about CSIRT, refer to the link:

https://brainly.com/question/18493737

#SPJ2

Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is done today. * 5 points technology and mathematics principles the engineering design process technical know-how positive and negative effects of using technology

Answers

Answer:

Early in the history of technology, the development of tools and machines was based on technical know-how versus scientific knowledge as is done today.

Explanation:

In the era prior to technological development, men had a basic and at times rudimentary manufacturing development, based on artisan processes that developed their tools and machinery by hand, without any type of automation or mass production rules.

Thus, each part or tool was manufactured in a unique way, which required a broad mastery of the production process by the manufacturer. This is how the first professions began to emerge, such as blacksmiths for example, who mastered the technique of manufacturing different implements and carried them out without any scientific knowledge.

Start with the following Python code. alphabet = "abcdefghijklmnopqrstuvwxyz" test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"] test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"] # From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press. def histogram(s): d = dict() for c in s: if c not in d: d[c] = 1 else: d[c] += 1 return d Copy the code above into your program but write all the other code for this assignment yourself. Do not copy any code from another source. Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False. Implement has_duplicates by creating a histogram using the histogram function above. Do not use any of the implementations of has_duplicates that are given in your textbook. Instead, your implementation should use the counts in the histogram to decide if there are any duplicates. Write a loop over the strings in the provided test_dups list. Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string. For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups. Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string. The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet. It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter. The function missing_letters should combine the list of missing letters into a string and return that string. Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters. For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz If the string has all the letters in alphabet, the output should say it uses all the letters. For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters Print a line like one of the above for each of the strings in test_miss. Submit your Python program. It should include the following. The provided code for alphabet, test_dups, test_miss, and histogram. Your implementation of the has_duplicates function. A loop that outputs duplicate information for each string in test_dups. Your implementation of the missing_letters function. A loop that outputs missing letters for each string in test_miss. Also submit the output from running your program. Your submission will be assessed using the following Aspects. Does the program include a function called has_duplicates that takes a string parameter and returns a boolean? Does the has_duplicates function call the histogram function? Does the program include a loop over the strings in test_dups that calls has_duplicate on each string? Does the program correctly identify whether each string in test_dups has duplicates? Does the program include a function called missing_letters that takes a string parameter and returns a string parameter? Does the missing_letters function call the histogram function? Does the missing_letters function use the alphabet global variable directly? Does the program include a loop over the strings in test_miss that calls missing_letters on each string? Does the program correctly identify the missing letters for each string in test_miss, including each string that "uses all the letters"?

Answers

Answer:

alphabet = "abcdefghijklmnopqrstuvwxyz"

test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"]

test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"]

# From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press.

def histogram(s):

   d = dict()

   for c in s:

       if c not in d:

           d[c] = 1

       else:

           d[c] += 1

   return d

#Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False.

def has_duplicates(stringP):

   dic = histogram(stringP)

   for key,value in dic.items():

       if value>1:

           return True

   return False

# Implement has_duplicates by creating a histogram using the histogram function above. Write a loop over the strings in the provided test_dups list.

# Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string.

# For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups.

print("***Implementation of has_duplicates fuction***")

for sTr in test_dups:

   if has_duplicates(sTr):

       print(sTr+": has duplicates")

   else:

       print(sTr+": has no duplicates")

#Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string.

#The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet.

#It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter.

#The function missing_letters should combine the list of missing letters into a string and return that string.

def missing_letters(sTr):

   missingLettersList = []

   dic = histogram(sTr)

   for l in alphabet:

       if l not in dic:

           missingLettersList.append(l)

   missingLettersList.sort()

   return "".join(missingLettersList)

#Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters.

#For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz

#If the string has all the letters in alphabet, the output should say it uses all the letters.

#For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters

#Print a line like one of the above for each of the strings in test_miss.

print("\n***Implementation of missing_letters fuction***")

for lTm in test_miss:

   sTr = missing_letters(lTm.replace(" ",""))

   if sTr!="":

       print(lTm+" is missing letters "+sTr)

   else:

       print(lTm +" uses all the letters")

Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation once for every millisecond of CPU computing and that each I/O operation takes 10 milliseconds to complete. Also assume that the context switching overhead is 0.1 millisecond and that all processes are long-running tasks. What is the CPU utilization for a round-robin scheduler when:

Answers

Answer:

10 minutes

Explanation:

Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write your code so that it works no matter how many items are in the list

Answers

Answer:

sports = ["football", "basketball", "volleyball", "baseball", "swimming"]

last = sports[-3:]

print(last)

Explanation:

*The code is in Python.

Create a list called sports

Create a variable called last and set it to the last three elements of the sports list using slicing

Print the last

A__________provides an easier way for people to communicate with a computer than a graphical user interface (GUI).

Answers

Answer:

Natural language processing

Explanation:

NLP, because many people can use a device better when they can talk to it just like it is another person. Some systems that use an NLP are voice assistants such as Alexa and Siri.

Implement function easyCrypto() that takes as input a string and prints its encryption
defined as follows: Every character at an odd position i in the alphabet will be
encrypted with the character at position i+1, and every character at an even position i
will be encrypted with the character at position i 1. In other words, ‘a’ is encrypted with
‘b’, ‘b’ with ‘a’, ‘c’ with ‘d’, ‘d’ with ‘c’, and so on. Lowercase characters should remain
lowercase, and uppercase characters should remain uppercase.
>>> easyCrypto('abc')
bad
>>> easyCrypto('Z00')
YPP

Answers

Answer:

The program written in python is as follows;

import string

def easyCrypto(inputstring):

      for i in range(len(inputstring)):

             try:

                    ind = string.ascii_lowercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

                           print(string.ascii_lowercase[ind+1],end="")

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

anystring = input("Enter a string: ")

easyCrypto(anystring)

Explanation:

The first line imports the string module into the program

import string

The functipn easyCrypto() starts here

def easyCrypto(inputstring):

This line iterates through each character in the input string

      for i in range(len(inputstring)):

The try except handles the error in the program

             try:

This line gets the index of the current character (lower case)

                    ind = string.ascii_lowercase.index(inputstring[i])

This line adds 1 to the index

                    pos = ind+1

This line checks if the character is at even position

                    if pos%2 == 0:

If yes, it returns the alphabet before it

                           print(string.ascii_lowercase[ind-1],end="")

                    else:

It returns the alphabet after it, if otherwise

                           print(string.ascii_lowercase[ind+1],end="")

The except block does the same thing as the try block, but it handles uppercase letters

             except:

                    ind = string.ascii_uppercase.index(inputstring[i])

                    pos = ind+1

                    if pos%2 == 0:

                           print(string.ascii_uppercase[ind-1],end="")

                    else:

                           print(string.ascii_uppercase[ind+1],end="")

The main starts here

This line prompts user for input

anystring = input("Enter a string: ")

This line calls the easyCrypto() function

easyCrypto(anystring)

We will pass in a value N. Write a program that outputs the complete Fibonacci sequence for N iterations. Important: If N is 0, then we expect to get an output of 0. If N=1 then we expect 0, 1 etc.

Answers

Answer:

The program written in Python is as follows

def fibonac(N):

    series = ""

    for i in range(0,N+1):

         series = series + str(i) + ","

   return series[:-1]

N = int(input("Number: "))

print(fibonac(N))

Explanation:

This line defines the function fibonac

def fibonac(N):

This line initializes variable "series" to an empty string

    series = ""

This line iterates through the passed argument, N

    for i in range(0,N+1):

This line determines the Fibonacci sequence

         series = series + str(i) + ","

Lastly, this line returns the Fibonacci sequence

   return series[:-1]

The main starts here

The firs line prompts user for input

N = int(input("Number: "))

This line prints the Fibonacci sequence

print(fibonac(N))

You should see an error. Let's examine why this error occured by looking at the values in the "Total Pay" column. Use the type function and set total_pay_type to the type of the first item from the "Total Pay" column.

Answers

Answer:

See below

Explanation:

Under this topic of functions, this question has been precisely answered in a word file and attached as an image herewith (in proper format). Visualizations and CEO incomes are some of the applications of this concept.

The response to this part shows the relation between total pay and raw compensation.

Hope that answers the question, have a great day!

why does study state that unless you were sleeping it is almost impossible not to be communicating?

Answers

Answer:

Because your movements, expressions, and posture are also a type of communication

Explanation:

Would you expect all the devices listed in BIOS/UEFI setup to also be listed in Device Manager? Would you expect all devices listed in Device Manager to also be listed in BIOS/UEFI setup?

Answers

Answer:

1. Yes

2. No

Explanation:

1 Note that the term BIOS (Basic input and Output System) refers to instructions that controls a computer device operations. Thus, devices that shows up in BIOS should be in device manager.

2. Not all devices listed in devcie manager of a computer system will be listed in BIOS.

what is the difference between ram and rom​

Answers

Answer:

RAM is used to store programs and data the CPU needs. ROM has prerecorded data and is used to boot the computer

Explanation:

Open up your database administraton GUI, and use the appropriate SQL Query Tool to write the SQL CREATE statement for your BOOK_TAGS table. You can either write the script manually and execute it through pgAdmin or you can create the table by using pgAdmin's wizard.
Afterwards, insert one row of dummy data that adds a tag to the sample book in the BOOKS table.

Answers

Answer:

nxlskshwhhwwlqlqoejebx znznxjslaa

Write an application that calculates and displays the amount of money a user would have if his or her money could be invested at 5 percent interest for one year. Create a method that prompts the user for the starting value of the investment and returns it to the calling program. Call a separate method to do the calculation, and return the result to be displayed. Save the program as Interest.java.

Answers

Answer:

Following are the program to this question:

import java.util.*;//import package for user input

class Interest //defining class Interest

{

   static double rate_of_interest = 5.00;//defining static double varaibale  

   public static double Invest_value()//defining method Invest_value

   {

           double invest;//defining double variable invest

           Scanner inc = new Scanner(System.in);//creating Scanner class object  

           System.out.print("Enter investment value: ");

           invest = inc.nextDouble();//input value in invest variable

           return invest;//return invest value

  }

  public static double calculated_Amount(double invest)//defining method calculated_Amount that accept parameter

  {

           double amount;//defining double variable

           amount = invest+ (invest * (rate_of_interest/100));//use amount to calculat 5 % of invest value

           return amount;//return amount value

  }

   

   public static void main(String[] as)//defining main method

   {

   double investment_value;//defining double variable

   investment_value= Invest_value();//use investment_value to hold method Invest_value value

   System.out.println("The 5% of the invest value: "+ calculated_Amount(investment_value));//use print method to print calculated_Amount value

  }

}

Output:

Enter investment value: 3000

The 5% of the invest value: 3150.0

Explanation:

In the above program a class "Interest", is defined inside the class a static double variable "rate_of_interest"  is declared that store a double value, in the next step, two methods "Invest_value and calculated_Amount" is declared.

In the "Invest_value" method, scanner class object is created for input value in the "invest" variable and the "calculated_Amount" accepts an "invest" value in its parameter and calculate its 5% and store its value in the "amount" variable.

Inside the main method, the "investment_value" is declared that holds the "Invest_value"  method value and pass the value in the "investment_value" variable in the "calculated_Amount" method and prints its return value.

Velma is graduating from Ashford at the end of next year. After she completes her final class, she will reward herself for her hard work with a week-long vacation in Hawaii. But she wants to begin saving money for her trip now. Which of the following is the most effective way for Velma to save money each month?

Answers

This question is incomplete because the options are missing; here are the options for this question:

Which of the following is the most effective way for Velma to save money each month?

A. Automatically reroute a portion of her paycheck to her savings account.

B. Manually deposit 10% of her paycheck in her savings account.

C. Pay all of her bills and then place the remaining money in her savings account.

D. Pay all of her bills and then place the remaining money in her piggy bank.

The correct answer to this question is A. Automatically reroute a portion of her paycheck to her savings account.

Explanation:

In this case, Velma needs to consistently save money for her vacation as this guarantees she will have the money for the trip. This means it is ideal every month she contributes consistently to her savings for the vacation.

This can be better be achieved by automatically rerouting a part of her paycheck for this purpose (Option A) because in this way, every month the money for the vacations will increase and the amount of money will be consistent, which means Velma will know beforehand the money she will have for the vacation. Moreover, options such as using a piggy bank or paying the bills and using the rest for her savings, do not guarantee she will contribute to the savings every month, or she will have the money she needs at the end.

A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) ________________ printer, and Computer2 considers the printer to be a(n) ________________ printer.

Answers

Answer:

A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) _____local___________ printer, and Computer2 considers the printer to be a(n) _____network___________ printer.

Explanation:

Any printer installed directly to Computer 1 is a local printer.  If this printer is then shared with computers 2 and 3 in a particular networked environment, it becomes a shared printer.  For these other computers 2 and 3, the shared printer is a network printer, because it is not locally installed in each of them.  There may be some features which network computers cannot use on a shared printer, especially if the printer can scan documents.

function of network security​

Answers

Answer:ffffffffffffgggggg

Explanation:vvvc

Define the instance method inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for the given program with one call to inc_num_kids():

Answers

Answer:

This is the instance method inc_num_kids()

def inc_num_kids(self):

       self.num_kids += 1

Explanation:

The first line is the definition of function inc_num_kids() which has a parameter self. self is basically an instance of  class PersonInfo

self.num_kids += 1 this statement incremented the data member num_kids by 1. This means that the instance method inc_num_kids, using instance self, increments the value of num_kids data member by 1.

The complete program is as following:

class PersonInfo:  #class name PersonInfo

   def __init__(self):   #constructor of the class

       self.num_kids = 0  # data member num_kids

   def inc_num_kids(self):  # method inc_num_kids

       self.num_kids += 1  #increments num_kids by 1

person1 = PersonInfo()  #creates object person of class PersonInfo

print('Kids:', person1.num_kids)  # prints num_kids value before increment

person1.inc_num_kids()  #calls inc_num_kids method to increment num_kids

print('New baby, kids now:', person1.num_kids) #prints the value of num_kids after increment by inc_num_kids method

The person1 object first access the initial value of num_kids initialized by the constructor. So the first value of num_kids is 0. self.num_kids = 0  This statement assigns the value 0 to num_kids data member. Next the method inc_num_kids() using the object person1. Now when this method is called the value of data member num_kids is incremented to 1.

So previously the value was 0 which now increments by 1 and becomes 1. Last print statement displays this new value which is incremented by the inc_num_kids() method.

Hence the output is:

Kids: 0

New baby, kids now: 1

The program along with its output is attached.

In this exercise we have to use the knowledge of computational language in python to describe a code, like this:

The code can be found in the attached image.

To make it easier the code can be found below as:

class PersonInfo:  

  def __init__(self):  

      self.num_kids = 0  

  def inc_num_kids(self):  

      self.num_kids += 1  

person1 = PersonInfo()

print('Kids:', person1.num_kids)  

person1.inc_num_kids()

print('New baby, kids now:', person1.num_kids)

See more about python at brainly.com/question/26104476

what is filter in image processing

Answers

Answer:

Image processing operations implemented with filtering include smoothing, sharpening, and edge enhancement.

The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.

Answers

Answer:

Op code table.

Explanation:

In Computer programming, an Op code is the short term for operational code and it is the single instruction which can be executed by the central processing unit (CPU) of a computer.

The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the Op code table. The Op code can be defined as a visual representation of the entire operational codes contained in a set of executable instructions.

An Op code table is arranged in rows and columns which basically represents an upper or lower nibble and when combined depicts the full byte of the operational code. Each cells in the Op code table are labeled from 0-F for the rows and columns; when combined it forms values ranging from 00-FF which contains information about CPU cycle counts and instruction code parameters.

Hence, if the operational code table is created and sorted alphabetically, the binary search algorithm can be used to find an operational code to be executed by the central processing unit (CPU).

What can you do using the start menu in windows 10

Answers

Answer:

The start menu in windows 10 has similarities.

Explanation:The windows 10 is start menu and start screen. Installed windows 10 on a PC, the start button after windows appear start menu.Windows app you can access windows apps right the menu. click the left display all apps installed your personal computer. click right to open a window app NEWS,MAIL, or CALENDAR. POWER button at the bottom of the left side, and display the to shut down and restart.

Right click your account name at the top the menu.You add files explorer to taskbar.Simply click the option you needed

Volume of Pyramid = A*h/3 where A is the area of the base of the pyramid and h is the height of the pyramid. Write a C++ program that asks the user to enter the necessary information about the pyramid (note that the user would not know the area of the base of the pyramid, you need to ask them for the length of one of the sides of the base and then calculate the area of the base). Using the information the user input, calculate the volume of the pyramid. Next display the results (rounded to two decimal places). Example Output (output will change depending on user input): The area of the base of the pyramid is: 25.00 The height of the pyramid is: 5.00 The volume of the pyramid is: 41.67 *Pseudocode IS required for this program and is worth 1 point. The program IS auto-graded.

Answers

Answer:

#include <iostream>

#include <iomanip>

using namespace std;

int main()

{

   double side, height;

   

   cout<<"Enter the length of one of the sides of the base: ";

   cin>>side;

   cout<<"Enter the height: ";

   cin>>height;

   

   double area = side * side;

   double volume = area * height / 3;

   

   cout<<"The area of the base of the pyramid is: "<<area<<endl;

   cout<<"The height of the pyramid is: "<<height<<endl;

   cout<<"The volume of the pyramid is: "<<fixed<<setprecision(2)<<volume<<endl;

   return 0;

}

Pseudocode:

Declare side, height

Get side

Get height

Set area = side * side

Set volume = area * height / 3

Print area

Print height

Print volume

Explanation:

Include <iomanip> to have two decimal places

Declare the side and height

Ask the user to enter side and height

Calculate the base area, multiply side by side

Calculate the volume using the given formula

Print area, height and volume (use fixed and setprecision(2) to have two decimal places)

Other Questions
file in the blank: question: _____________ estoy escuchando msica. answers: A. Hace dos meses B. Ahora C. Antes D. El ao pasado E. Hace un ao atrs How do I know that the following equation is true: 2x^5-x^2+1=0can you help me ?slove it in detailsthanks The second-order decomposition of HI has a rate constant of 1.80 10-3 M-1s-1. How much HI remains after 27.3 s if the initial concentration of HI is 4.78 M? Following are selected transactions for Vitalo Company.Nov. 1 Accepted a $16,000, 180-day, 5% note from Kelly White in granting a time extension on her past-due account receivable. Dec. 31 Adjusted the year-end accounts for the accrued interest earned on the White note. Apr. 30 White honored her note when presented for payment.Calculate the interest amounts at December 31st and April 30th and use those calculated values to prepare your journal entries. Find the five-number summary for the data. {232, 198, 214, 205, 222, 228, 208, 237, 217, 199, 213, 208, 228, 224, 203} From the set {6, 16, 24}, use substitution to determine which value of x makes the inequality true. 4 + x < 20 A. 16 B. 6 C. none of these D. 24 Penyelesaian0.02 m: 3 cm: 4.6 cm = 2 cm : 3 cm: 4.6 cm= 2 : 3 : 4.620 : 30 : 4610 : 1523Latih Diri 4.1a1. Wakilkan hubungan antara tiga kuantiti berikut dalam bentuk a : b:c.(a) 2 minggu kepada 16 hari kepada 1 minggu(b) 0.1 kg kepada 50 g kepada 0.25 kg(c) 4 minit kepada 120 saat kepada 1.6 jam(d 3 m kepada 480 cm kepada 6 400 mm2. Tahir membayar RM5.60 untuk sepinggan nasi beriani, RM1.20 untuk segelas tehdan 30 sen untuk sekeping kuih. Wakilkan hubungan harga bagi nasi beriani, teh dankuih dalam bentuk a:b:c.76BAB 4 PLEASE HELLLLLLP MEEE If my friend asks me for 20 dollars i said tommorow you have to give me 25. IS THIS BIG BRAIN use the rules of exponents to evaluate or simplify. wright without negative exponents. 5 7^0 = ___ ^a0 find two rational numbers whose sum is -10,0,15 Please help me out.:( The level of water in a dam was decreasing by 20% each day. If the level of water was 1500cm,what was the level after two days? Nippon Technology Balance Sheet As of December 31, 2019 (amounts in thousands) Cash 37,000 Liabilities 24,000 Other Assets 39,000 Equity 52,000 Total Assets 76,000 Total Liabilities & Equity 76,000 Nippon Technology Income Statement January 1 to March 31, 2020 (amounts in thousands) Revenue 5,800 Expenses 3,400 Net Income 2,400Between January 1 and March 31 , 2018: 1. Other Assets increase by $300,000 2. Liabilities decrease by $200,000 3. Paid-In Capital does not change 4. Dividends paid of $100,000 What is the value for Cash on March 31, 2018? If a shallow pan is filled with water, a drop of red ink is placed in one end of the pan, and a drop of green ink is placed in the other end, which of the following will be true at equilibrium? a. The red ink will be uniformly distributed in one half of the pan, and the green ink will be uniformly distributed in the other half of the pan. b. The red and green inks will be uniformly distributed throughout the pan. c. Each ink will move down its concentration gradient. d. The concentration of each ink will be higher at one end of the pan than at the other end. e. No predictions can be made without knowing the molecular weights of the pigment molecules. fowler credit bank is offering 6.7 percent compounded dailyon its savings accounts. If you deposit $7000 today, how much will you have in the account value in 5 years? value In 10 years? value In 20 years? Summary of the article "Practically human: Can smart machines do your job?" The Moving to Opportunity study found that those in the group who received assistance in relocating and life-skills training in addition to housing vouchers:_________.a. experienced hostility from their new neighborhoods.b. were not testable because many participants could not be found later.c .were no different than those in the control group.d. experienced less stress and better health. Define Post Colonialism