Answer:
Here is the function PrintSongsShorterThan() which prints all the songs from the album shorter than the value of the parameter songDuration.
void Album::PrintSongsShorterThan(int songDuration) const {
unsigned int i;
Song currSong;
cout << "Songs shorter than " << songDuration << " seconds:" << endl;
for(int i=0; i<albumSongs.size(); i++){
currSong = albumSongs.at(i);
if(currSong.GetDuration()<songDuration){
currSong.PrintSong(); } } }
Explanation:
I will explain the working of the for loop in the above function.
The loop has a variable i that is initialized to 0. The loop continues to execute until the value of i exceeds the albumSongs vector size. The albumSongs is a Song type vector and vector works just like a dynamic array to store sequences.
At each iteration the for loop checks if the value of i is less than the size of albumSongs. If it is true then the statement inside the loop body execute. The at() is a vector function that is used to return a reference to the element at i-th position in the albumSongs. So the album song at the i-th index of albumSongs is assigned to the currSong. This currSong works as an instance. Next the if condition checks if that album song's duration is less than the specified value of songDuration. Here the method GetDuration() is used to return the value of duration of the song. If this condition evaluates to true then the printSong method is called using currSong object. The printSong() method has a statement cout << name << " - " << duration << endl; which prints/displays the name of the song with its duration.
If you see the main() function statement: musicAlbum.PrintSongsShorterThan(210);
The musicAlbum is the Album object to access the PrintSongsShorterThan(210) The value passed to this method is 210 which means this is the value of the songDuration.
As we know that the parameter of PrintSongsShorterThan method is songDuration. So the duration of each song in albumSongs vector is checked by this function and if the song duration is less than 210 then the name of the song along with its duration is displayed on the output screen.
For example if the album name is Anonymous and the songs name along with their duration are:
ABC 400
XYZ 123
CDE 300
GHI 200
KLM 100
Then the above program displays the following output when the user types "quit" after entering the above information.
Anonymous
Songs shorter than 210 seconds:
XYZ - 123
GHI - 200
KLM - 100
Notice that the song name ABC and CDE are not displayed because they exceed the songDuration i.e. 210.
The output is attached.
Write a small program that asks the user how many asterisks it should print out. The user responds with a number, then the program prints that number of asterisks.
Answer:
I am writing a C++ program. Let me know if you want the program in some other programming language.
#include <iostream> //to use input output functions
using namespace std; // to identify objects like cin cout
int main(){ //start of main() function body
int n; // number of asterisks
cout<<"how many asterisks do you want to print? "; //asks user how many asterisks it should print
cin>>n; // reads the value of number of asterisks that user want to print
for( int i=0; i< n; i++) { //loop to display the number of asterisks in output
printf("*"); } } // print * asterisks
Explanation:
I will explain how the for loop works.
Suppose the user entered 3 as number of asterisks that user wants to print.
So n=3
Now for loop has a variable i that is initialized to 0. For loop checks if the value of i is less than that of n. It is true because i=0 and n=3 and 0<3. So the body of the loop executes. This prints the first asterisk *
Then the value of i is incremented to 1 and becomes i=1
At next iteration loop again checks if value of i is less than n. It is true because i=1 and n=3 and 1<3. So the body of the loop executes. This prints the second asterisk **
Then the value of i is incremented to 1 and becomes i=2
At next iteration loop again checks if value of i is less than n. It is true because i=2 and n=3 and 2<3. So the body of the loop executes. This prints the third asterisk ***
Then the value of i is incremented to 1 and becomes i=3
At next iteration loop again checks if value of i is less than n. This time it evaluates to false because i=3 and n=3 so 3=3. So the loop ends and the output is
***
The output screenshot is attached.
An organization is struggling to differentiate threats from normal traffic and access to systems. A security engineer has been asked to recommend a system that will aggregate data and provide metrics that will assist in identifying malicious actors or other anomalous activity throughout the environment. Which of the following solutions should the engineer recommend?a. Web application firewall b. SIEM c. IPS d. UTM e. File integrity monitor
Answer:
b. SIEM.
Explanation:
In this scenario, an organization is struggling to differentiate threats from normal traffic and access to systems. A security engineer has been asked to recommend a system that will aggregate data and provide metrics that will assist in identifying malicious actors or other anomalous activity throughout the environment. The solution the engineer should recommend is the Security information and event management (SIEM).
Security information and event management is an enterprise software that provides a holistic view and analyzes activity from various resources across an entire information technology (IT) infrastructure.
The SIEM is used to aggregate important data from multiple source such as servers, routers, firewall, switches, domain controllers, antivirus software and analyzes the data to detect any threat, deviation from the norm, as well as investigate in order to take appropriate actions. Some examples of the SIEM system are IBM QRadar, Splunk, LogRhythm etc.
Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file (directory.txt) that contains the numbers in random order. Handle lookups by name and also reverse lookups by phone number. Use a binary search for both lookups. A driver program and templates have been created for you.
Answer:
Here is the JAVA program:
Items.java
public class Item { // Item class
private String name, ph_num; // class data members name to hold the name and ph_num stores the telephone numbers
public Item(String fullName, String PhoneNo){ //constructor of Item class , so fields full name and ph_num can be initialized when the object is created
name = fullName; // holds the name field
ph_num = PhoneNo;} //holds the telephone number
public String getFullName(){ // accessor method to get access to the name field
return name;} //returns the name from directory
public String getPhoneNo(){ //accessor method to get access to the ph_nujm field
return ph_num; } } //returns the telephone number
Explanation:
LookupTable.java
public class LookupTable{ //class name
private ArrayList<Item> data; // dynamic array list named data of Item class. This array list stores the names and telephone numbers from file
public LookupTable(){ //default constructor
data = new ArrayList<Item>();} // creates an array list of Item type which holds the names and phone numbers
public void read(Scanner in){ // Scanner class object is created and this class is used to read input and the method reads the names and phone numbers
while(in.hasNext()){ // the loop moves through each line of the file. scanner class method hasNext checks for the tokens in the input
String name = in.nextLine(); // scans for the name in the input
String ph_num = in.nextLine(); //scans for the phone numbers in the input
data.add(new Item(name, ph_num));}} // adds the names and phone number in to the Array list
public String lookup(String k){ //method looks up for an item in the table. param k is the key to find . returns the value with the given key, or null if no such item was found
String result = null; //result initialized to to null
for(Item item: data){ //creates Item object and traverses the array list for each item i.e. name or phone numbers
if(k.equals(item.getFullName())){ //access the getFullName method through object item and checks if that name matches the key to find.
result = item.getPhoneNo();}} //gets the corresponding phone number and assigns it to result variable
return result;} //returns the result containing the phone number
public String reverseLookup(String v){ //Looks up an item in the table. param v is the value to find . returns the key with the given value, or null if no such item was found. This method performs the lookup through phone number
String result = null; //result is set to null to start
for(Item item: data){ //Traversing list through the for each item in data
if(v.equals(item.getPhoneNo())){ //if the value of v is equal to the phone number accessed by using accessor method and object item
result = item.getFullName();}} //accesses the corresponding name of that phone number and assigns it to the result
return result;}} //returns the result
The data from directory file which contains the number and names. The LookupTable class has a method lookup which handles the lookups by names and the method reverseLookup that handles the lookups by phone number.
A systems administrator wants to replace the process of using a CRL to verify certificate validity. Frequent downloads are becoming problematic. Which of the following would BEST suit the administrators needs?
A. OCSP
B. CSR
C. Key escrow
D. CA
Answer:
A. OCSP
Explanation:
Online Certificate Status Protocol (OCSP) is an Internet Protocol that is used as an alternative for CRL and is used to obtain the revocation status of a digital certificate.
A certificate revocation list (CRL) is a set of digital certificates that have been rendered invalid/revoked by the Certificate Authority (CA) because they can no longer be trusted.
Because an OCSP response uses less data than a CRL, it would be best suited to the administrator's needs.
Write a C function check(x, y, n) that returns 1 if both x and y fall between 0 and n-1 inclusive. The function should return 0 otherwise. Assume that x, y and n are all of type int.
Answer:
See comments for line by line explanation (Lines that begins with // are comments)
The function written in C, is as follows:
//The function starts here
int check(x,y,n)
{
//This if condition checks if x and y are within range of 0 to n - 1
if((x>=0 && x<=n-1) && (y>=0 && y<=n-1))
{
//If the if conditional statement is true, the function returns 1
return 1;
}
else
{
//If the if conditional statement is false, the function returns 0
return 0;
}
//The if condition ends here
}
//The function ends here
Explanation:
a) five benefits of having
an operating system over not having one.
Answer:
Software Updates, Computing Sources, No Coding, Relatively Inexpensive, Safeguards Data.
Explanation:
what is the difference between head header and heading in HTML
Answer:
<Head>the appears the "<body>" of a web page.
<Heading> the appears the body of the web page.
Explanation:<Head> it contains that provides the information about web page.
<Heading> it contains such as the title,date, summary.
<Heading> are the<h1>,<h2>,tags
it provides the title and subtitles of the web page.
<Heading>
</Heading>
Head is element is metadata.
Heading is element is actual element.
Answer:
Head>the appears the "<body>" of a web page.
<Heading> the appears the body of the web page.
Explanation:
Below is some info for some internet transactions. We want to sort it by time and by location. Which sorting algorithm is appropriate for this particular problem?
a. radix sort.
b. heap sort.
c. selection sort.
d. shell sort.
Answer:
c. selection sort
Explanation:
The best way to sort the internet transactions data based on time and location is selection sort. The algorithms sorting technique is used to sort the complex data in computer programs. Shell sort is the technique which sorts the data apart from each other and reduces interval between them. Heap sort is sorting technique based on binary heap data structure. Radix sort is an integer sorting technique in algorithms.
Type the correct answer in the box.
Who is responsible for creating and testing the incident response plan?
The _______ is responsible for creating and testing the incident response plan.
Answer: CSIRT
Explanation: CSIRT is team that specializes in day to day cyber incidents
The CSIRT is responsible for creating and testing the incident response plan.
What is CSIRT?CSIRT is the Computer emergency response team. One of the key areas for the efficient operation of a corporation is the legal department. Professionals face enormous challenges, particularly when you take into account the need for other bodies within the company itself.
We can list the reviews of the CSIRT procedures that are conducted through this department as one of its key responsibilities. This department also has the responsibility of comprehending the actions that the CSIRT will take to ensure that they comply with all applicable federal, state, and local laws and regulations.
Therefore, the incident response strategy must be written and tested by the CSIRT.
To learn more about CSIRT, refer to the link:
https://brainly.com/question/18493737
#SPJ2
Early in the history of technology, the development of tools and machines was based on _____ versus scientific knowledge as is done today. * 5 points technology and mathematics principles the engineering design process technical know-how positive and negative effects of using technology
Answer:
Early in the history of technology, the development of tools and machines was based on technical know-how versus scientific knowledge as is done today.
Explanation:
In the era prior to technological development, men had a basic and at times rudimentary manufacturing development, based on artisan processes that developed their tools and machinery by hand, without any type of automation or mass production rules.
Thus, each part or tool was manufactured in a unique way, which required a broad mastery of the production process by the manufacturer. This is how the first professions began to emerge, such as blacksmiths for example, who mastered the technique of manufacturing different implements and carried them out without any scientific knowledge.
Start with the following Python code. alphabet = "abcdefghijklmnopqrstuvwxyz" test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"] test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"] # From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press. def histogram(s): d = dict() for c in s: if c not in d: d[c] = 1 else: d[c] += 1 return d Copy the code above into your program but write all the other code for this assignment yourself. Do not copy any code from another source. Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False. Implement has_duplicates by creating a histogram using the histogram function above. Do not use any of the implementations of has_duplicates that are given in your textbook. Instead, your implementation should use the counts in the histogram to decide if there are any duplicates. Write a loop over the strings in the provided test_dups list. Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string. For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups. Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string. The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet. It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter. The function missing_letters should combine the list of missing letters into a string and return that string. Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters. For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz If the string has all the letters in alphabet, the output should say it uses all the letters. For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters Print a line like one of the above for each of the strings in test_miss. Submit your Python program. It should include the following. The provided code for alphabet, test_dups, test_miss, and histogram. Your implementation of the has_duplicates function. A loop that outputs duplicate information for each string in test_dups. Your implementation of the missing_letters function. A loop that outputs missing letters for each string in test_miss. Also submit the output from running your program. Your submission will be assessed using the following Aspects. Does the program include a function called has_duplicates that takes a string parameter and returns a boolean? Does the has_duplicates function call the histogram function? Does the program include a loop over the strings in test_dups that calls has_duplicate on each string? Does the program correctly identify whether each string in test_dups has duplicates? Does the program include a function called missing_letters that takes a string parameter and returns a string parameter? Does the missing_letters function call the histogram function? Does the missing_letters function use the alphabet global variable directly? Does the program include a loop over the strings in test_miss that calls missing_letters on each string? Does the program correctly identify the missing letters for each string in test_miss, including each string that "uses all the letters"?
Answer:
alphabet = "abcdefghijklmnopqrstuvwxyz"
test_dups = ["zzz","dog","bookkeeper","subdermatoglyphic","subdermatoglyphics"]
test_miss = ["zzz","subdermatoglyphic","the quick brown fox jumps over the lazy dog"]
# From Section 11.2 of: # Downey, A. (2015). Think Python: How to think like a computer scientist. Needham, Massachusetts: Green Tree Press.
def histogram(s):
d = dict()
for c in s:
if c not in d:
d[c] = 1
else:
d[c] += 1
return d
#Part 1 Write a function called has_duplicates that takes a string parameter and returns True if the string has any repeated characters. Otherwise, it should return False.
def has_duplicates(stringP):
dic = histogram(stringP)
for key,value in dic.items():
if value>1:
return True
return False
# Implement has_duplicates by creating a histogram using the histogram function above. Write a loop over the strings in the provided test_dups list.
# Print each string in the list and whether or not it has any duplicates based on the return value of has_duplicates for that string.
# For example, the output for "aaa" and "abc" would be the following. aaa has duplicates abc has no duplicates Print a line like one of the above for each of the strings in test_dups.
print("***Implementation of has_duplicates fuction***")
for sTr in test_dups:
if has_duplicates(sTr):
print(sTr+": has duplicates")
else:
print(sTr+": has no duplicates")
#Part 2 Write a function called missing_letters that takes a string parameter and returns a new string with all the letters of the alphabet that are not in the argument string.
#The letters in the returned string should be in alphabetical order. Your implementation should use a histogram from the histogram function. It should also use the global variable alphabet.
#It should use this global variable directly, not through an argument or a local copy. It should loop over the letters in alphabet to determine which are missing from the input parameter.
#The function missing_letters should combine the list of missing letters into a string and return that string.
def missing_letters(sTr):
missingLettersList = []
dic = histogram(sTr)
for l in alphabet:
if l not in dic:
missingLettersList.append(l)
missingLettersList.sort()
return "".join(missingLettersList)
#Write a loop over the strings in list test_miss and call missing_letters with each string. Print a line for each string listing the missing letters.
#For example, for the string "aaa", the output should be the following. aaa is missing letters bcdefghijklmnopqrstuvwxyz
#If the string has all the letters in alphabet, the output should say it uses all the letters.
#For example, the output for the string alphabet itself would be the following. abcdefghijklmnopqrstuvwxyz uses all the letters
#Print a line like one of the above for each of the strings in test_miss.
print("\n***Implementation of missing_letters fuction***")
for lTm in test_miss:
sTr = missing_letters(lTm.replace(" ",""))
if sTr!="":
print(lTm+" is missing letters "+sTr)
else:
print(lTm +" uses all the letters")
Consider a system running ten I/O-bound tasks and one CPU-bound task. Assume that the I/O-bound tasks issue an I/O operation once for every millisecond of CPU computing and that each I/O operation takes 10 milliseconds to complete. Also assume that the context switching overhead is 0.1 millisecond and that all processes are long-running tasks. What is the CPU utilization for a round-robin scheduler when:
Answer:
10 minutes
Explanation:
Write a program that extracts the last three items in the list sports and assigns it to the variable last. Make sure to write your code so that it works no matter how many items are in the list
Answer:
sports = ["football", "basketball", "volleyball", "baseball", "swimming"]
last = sports[-3:]
print(last)
Explanation:
*The code is in Python.
Create a list called sports
Create a variable called last and set it to the last three elements of the sports list using slicing
Print the last
A__________provides an easier way for people to communicate with a computer than a graphical user interface (GUI).
Answer:
Natural language processing
Explanation:
NLP, because many people can use a device better when they can talk to it just like it is another person. Some systems that use an NLP are voice assistants such as Alexa and Siri.
Implement function easyCrypto() that takes as input a string and prints its encryption
defined as follows: Every character at an odd position i in the alphabet will be
encrypted with the character at position i+1, and every character at an even position i
will be encrypted with the character at position i 1. In other words, ‘a’ is encrypted with
‘b’, ‘b’ with ‘a’, ‘c’ with ‘d’, ‘d’ with ‘c’, and so on. Lowercase characters should remain
lowercase, and uppercase characters should remain uppercase.
>>> easyCrypto('abc')
bad
>>> easyCrypto('Z00')
YPP
Answer:
The program written in python is as follows;
import string
def easyCrypto(inputstring):
for i in range(len(inputstring)):
try:
ind = string.ascii_lowercase.index(inputstring[i])
pos = ind+1
if pos%2 == 0:
print(string.ascii_lowercase[ind-1],end="")
else:
print(string.ascii_lowercase[ind+1],end="")
except:
ind = string.ascii_uppercase.index(inputstring[i])
pos = ind+1
if pos%2 == 0:
print(string.ascii_uppercase[ind-1],end="")
else:
print(string.ascii_uppercase[ind+1],end="")
anystring = input("Enter a string: ")
easyCrypto(anystring)
Explanation:
The first line imports the string module into the program
import string
The functipn easyCrypto() starts here
def easyCrypto(inputstring):
This line iterates through each character in the input string
for i in range(len(inputstring)):
The try except handles the error in the program
try:
This line gets the index of the current character (lower case)
ind = string.ascii_lowercase.index(inputstring[i])
This line adds 1 to the index
pos = ind+1
This line checks if the character is at even position
if pos%2 == 0:
If yes, it returns the alphabet before it
print(string.ascii_lowercase[ind-1],end="")
else:
It returns the alphabet after it, if otherwise
print(string.ascii_lowercase[ind+1],end="")
The except block does the same thing as the try block, but it handles uppercase letters
except:
ind = string.ascii_uppercase.index(inputstring[i])
pos = ind+1
if pos%2 == 0:
print(string.ascii_uppercase[ind-1],end="")
else:
print(string.ascii_uppercase[ind+1],end="")
The main starts here
This line prompts user for input
anystring = input("Enter a string: ")
This line calls the easyCrypto() function
easyCrypto(anystring)
We will pass in a value N. Write a program that outputs the complete Fibonacci sequence for N iterations. Important: If N is 0, then we expect to get an output of 0. If N=1 then we expect 0, 1 etc.
Answer:
The program written in Python is as follows
def fibonac(N):
series = ""
for i in range(0,N+1):
series = series + str(i) + ","
return series[:-1]
N = int(input("Number: "))
print(fibonac(N))
Explanation:
This line defines the function fibonac
def fibonac(N):
This line initializes variable "series" to an empty string
series = ""
This line iterates through the passed argument, N
for i in range(0,N+1):
This line determines the Fibonacci sequence
series = series + str(i) + ","
Lastly, this line returns the Fibonacci sequence
return series[:-1]
The main starts here
The firs line prompts user for input
N = int(input("Number: "))
This line prints the Fibonacci sequence
print(fibonac(N))
You should see an error. Let's examine why this error occured by looking at the values in the "Total Pay" column. Use the type function and set total_pay_type to the type of the first item from the "Total Pay" column.
Answer:
See below
Explanation:
Under this topic of functions, this question has been precisely answered in a word file and attached as an image herewith (in proper format). Visualizations and CEO incomes are some of the applications of this concept.
The response to this part shows the relation between total pay and raw compensation.
Hope that answers the question, have a great day!
why does study state that unless you were sleeping it is almost impossible not to be communicating?
Answer:
Because your movements, expressions, and posture are also a type of communication
Explanation:
Would you expect all the devices listed in BIOS/UEFI setup to also be listed in Device Manager? Would you expect all devices listed in Device Manager to also be listed in BIOS/UEFI setup?
Answer:
1. Yes
2. No
Explanation:
1 Note that the term BIOS (Basic input and Output System) refers to instructions that controls a computer device operations. Thus, devices that shows up in BIOS should be in device manager.
2. Not all devices listed in devcie manager of a computer system will be listed in BIOS.
what is the difference between ram and rom
Answer:
RAM is used to store programs and data the CPU needs. ROM has prerecorded data and is used to boot the computer
Explanation:
Open up your database administraton GUI, and use the appropriate SQL Query Tool to write the SQL CREATE statement for your BOOK_TAGS table. You can either write the script manually and execute it through pgAdmin or you can create the table by using pgAdmin's wizard.
Afterwards, insert one row of dummy data that adds a tag to the sample book in the BOOKS table.
Answer:
nxlskshwhhwwlqlqoejebx znznxjslaa
Write an application that calculates and displays the amount of money a user would have if his or her money could be invested at 5 percent interest for one year. Create a method that prompts the user for the starting value of the investment and returns it to the calling program. Call a separate method to do the calculation, and return the result to be displayed. Save the program as Interest.java.
Answer:
Following are the program to this question:
import java.util.*;//import package for user input
class Interest //defining class Interest
{
static double rate_of_interest = 5.00;//defining static double varaibale
public static double Invest_value()//defining method Invest_value
{
double invest;//defining double variable invest
Scanner inc = new Scanner(System.in);//creating Scanner class object
System.out.print("Enter investment value: ");
invest = inc.nextDouble();//input value in invest variable
return invest;//return invest value
}
public static double calculated_Amount(double invest)//defining method calculated_Amount that accept parameter
{
double amount;//defining double variable
amount = invest+ (invest * (rate_of_interest/100));//use amount to calculat 5 % of invest value
return amount;//return amount value
}
public static void main(String[] as)//defining main method
{
double investment_value;//defining double variable
investment_value= Invest_value();//use investment_value to hold method Invest_value value
System.out.println("The 5% of the invest value: "+ calculated_Amount(investment_value));//use print method to print calculated_Amount value
}
}
Output:
Enter investment value: 3000
The 5% of the invest value: 3150.0
Explanation:
In the above program a class "Interest", is defined inside the class a static double variable "rate_of_interest" is declared that store a double value, in the next step, two methods "Invest_value and calculated_Amount" is declared.
In the "Invest_value" method, scanner class object is created for input value in the "invest" variable and the "calculated_Amount" accepts an "invest" value in its parameter and calculate its 5% and store its value in the "amount" variable.
Inside the main method, the "investment_value" is declared that holds the "Invest_value" method value and pass the value in the "investment_value" variable in the "calculated_Amount" method and prints its return value.
Velma is graduating from Ashford at the end of next year. After she completes her final class, she will reward herself for her hard work with a week-long vacation in Hawaii. But she wants to begin saving money for her trip now. Which of the following is the most effective way for Velma to save money each month?
This question is incomplete because the options are missing; here are the options for this question:
Which of the following is the most effective way for Velma to save money each month?
A. Automatically reroute a portion of her paycheck to her savings account.
B. Manually deposit 10% of her paycheck in her savings account.
C. Pay all of her bills and then place the remaining money in her savings account.
D. Pay all of her bills and then place the remaining money in her piggy bank.
The correct answer to this question is A. Automatically reroute a portion of her paycheck to her savings account.
Explanation:
In this case, Velma needs to consistently save money for her vacation as this guarantees she will have the money for the trip. This means it is ideal every month she contributes consistently to her savings for the vacation.
This can be better be achieved by automatically rerouting a part of her paycheck for this purpose (Option A) because in this way, every month the money for the vacations will increase and the amount of money will be consistent, which means Velma will know beforehand the money she will have for the vacation. Moreover, options such as using a piggy bank or paying the bills and using the rest for her savings, do not guarantee she will contribute to the savings every month, or she will have the money she needs at the end.
A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) ________________ printer, and Computer2 considers the printer to be a(n) ________________ printer.
Answer:
A printer is connected locally on Computer1 and is shared on the network. Computer2 installs the shared printer and connects to it. Computer1 considers the printer to be a(n) _____local___________ printer, and Computer2 considers the printer to be a(n) _____network___________ printer.
Explanation:
Any printer installed directly to Computer 1 is a local printer. If this printer is then shared with computers 2 and 3 in a particular networked environment, it becomes a shared printer. For these other computers 2 and 3, the shared printer is a network printer, because it is not locally installed in each of them. There may be some features which network computers cannot use on a shared printer, especially if the printer can scan documents.
function of network security
Answer:ffffffffffffgggggg
Explanation:vvvc
Define the instance method inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for the given program with one call to inc_num_kids():
Answer:
This is the instance method inc_num_kids()
def inc_num_kids(self):
self.num_kids += 1
Explanation:
The first line is the definition of function inc_num_kids() which has a parameter self. self is basically an instance of class PersonInfo
self.num_kids += 1 this statement incremented the data member num_kids by 1. This means that the instance method inc_num_kids, using instance self, increments the value of num_kids data member by 1.
The complete program is as following:
class PersonInfo: #class name PersonInfo
def __init__(self): #constructor of the class
self.num_kids = 0 # data member num_kids
def inc_num_kids(self): # method inc_num_kids
self.num_kids += 1 #increments num_kids by 1
person1 = PersonInfo() #creates object person of class PersonInfo
print('Kids:', person1.num_kids) # prints num_kids value before increment
person1.inc_num_kids() #calls inc_num_kids method to increment num_kids
print('New baby, kids now:', person1.num_kids) #prints the value of num_kids after increment by inc_num_kids method
The person1 object first access the initial value of num_kids initialized by the constructor. So the first value of num_kids is 0. self.num_kids = 0 This statement assigns the value 0 to num_kids data member. Next the method inc_num_kids() using the object person1. Now when this method is called the value of data member num_kids is incremented to 1.
So previously the value was 0 which now increments by 1 and becomes 1. Last print statement displays this new value which is incremented by the inc_num_kids() method.
Hence the output is:
Kids: 0
New baby, kids now: 1
The program along with its output is attached.
In this exercise we have to use the knowledge of computational language in python to describe a code, like this:
The code can be found in the attached image.
To make it easier the code can be found below as:
class PersonInfo:
def __init__(self):
self.num_kids = 0
def inc_num_kids(self):
self.num_kids += 1
person1 = PersonInfo()
print('Kids:', person1.num_kids)
person1.inc_num_kids()
print('New baby, kids now:', person1.num_kids)
See more about python at brainly.com/question/26104476
what is filter in image processing
Answer:
Image processing operations implemented with filtering include smoothing, sharpening, and edge enhancement.
The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the ____.
Answer:
Op code table.
Explanation:
In Computer programming, an Op code is the short term for operational code and it is the single instruction which can be executed by the central processing unit (CPU) of a computer.
The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the Op code table. The Op code can be defined as a visual representation of the entire operational codes contained in a set of executable instructions.
An Op code table is arranged in rows and columns which basically represents an upper or lower nibble and when combined depicts the full byte of the operational code. Each cells in the Op code table are labeled from 0-F for the rows and columns; when combined it forms values ranging from 00-FF which contains information about CPU cycle counts and instruction code parameters.
Hence, if the operational code table is created and sorted alphabetically, the binary search algorithm can be used to find an operational code to be executed by the central processing unit (CPU).
What can you do using the start menu in windows 10
Answer:
The start menu in windows 10 has similarities.
Explanation:The windows 10 is start menu and start screen. Installed windows 10 on a PC, the start button after windows appear start menu.Windows app you can access windows apps right the menu. click the left display all apps installed your personal computer. click right to open a window app NEWS,MAIL, or CALENDAR. POWER button at the bottom of the left side, and display the to shut down and restart.
Right click your account name at the top the menu.You add files explorer to taskbar.Simply click the option you needed
Volume of Pyramid = A*h/3 where A is the area of the base of the pyramid and h is the height of the pyramid. Write a C++ program that asks the user to enter the necessary information about the pyramid (note that the user would not know the area of the base of the pyramid, you need to ask them for the length of one of the sides of the base and then calculate the area of the base). Using the information the user input, calculate the volume of the pyramid. Next display the results (rounded to two decimal places). Example Output (output will change depending on user input): The area of the base of the pyramid is: 25.00 The height of the pyramid is: 5.00 The volume of the pyramid is: 41.67 *Pseudocode IS required for this program and is worth 1 point. The program IS auto-graded.
Answer:
#include <iostream>
#include <iomanip>
using namespace std;
int main()
{
double side, height;
cout<<"Enter the length of one of the sides of the base: ";
cin>>side;
cout<<"Enter the height: ";
cin>>height;
double area = side * side;
double volume = area * height / 3;
cout<<"The area of the base of the pyramid is: "<<area<<endl;
cout<<"The height of the pyramid is: "<<height<<endl;
cout<<"The volume of the pyramid is: "<<fixed<<setprecision(2)<<volume<<endl;
return 0;
}
Pseudocode:
Declare side, height
Get side
Get height
Set area = side * side
Set volume = area * height / 3
Print area
Print height
Print volume
Explanation:
Include <iomanip> to have two decimal places
Declare the side and height
Ask the user to enter side and height
Calculate the base area, multiply side by side
Calculate the volume using the given formula
Print area, height and volume (use fixed and setprecision(2) to have two decimal places)