Answer:
Answered below
Explanation:
# Program is written in Java
class WeekHours{
double school;
double fun;
double sleep;
double sports;
WeekHours( ){
school = 0.0;
fun = 0.0;
sleep = 0.0;
sports = 0.0;
}
public void setSchool ( double x){
school = x;
}
public void setFun( double y){
fun = y;
}
public void setSleep( double w){
sleep = w;
}
public void setSports( double z){
sports = z;
}
public void totalHours(){
double tHours = school + fun + sleep + sports;
System.out.print(tHours);
}
}
Create a program which takes two integers as input from the command line. In your code, allocate space for a 2D array dependent on user input. For example, if they enter 30 40 then your program should allocate space using double **. Once the memory is allocated, initialize the data by setting the value at index (i, j) equal to its position a
Answer:
In C:
#include <stdio.h>
#include <stdlib.h>
int main() {
int r,c;
printf("Row: "); scanf("%d", &r);
printf("Cols: "); scanf("%d", &c);
double *myarr = (int *)malloc(r * c * sizeof(int));
double inputs = 0.0;
for (int rww = 0; rww < r; rww++){
for (int ccl = 0; ccl < c; ccl++){
inputs= inputs+1.0;
*(myarr + rww*ccl + ccl) = inputs; }}
return 0;}
Explanation:
This declares the rows and columns as integers
int r,c;
This gets the number of rows
printf("Row: "); scanf("%d", &r);
This gets the number of columns
printf("Cols: "); scanf("%d", &c);
This dynamically allocate space for array myart
double *myarr = (int *)malloc(r * c * sizeof(int));
This initializes the inputs to the array to 0.0
double inputs = 0.0;
This iterates through the array and initializes each element of the array by its index
for (int rww = 0; rww < r; rww++){
for (int ccl = 0; ccl < c; ccl++){
inputs= inputs+1.0;
*(myarr + rww*ccl + ccl) = inputs; }}
Write a program whose input is two integers. Output the first integer and subsequent increments of 10 as long as the value is less than or equal to the second integer. Ex: If the input is: -15 30 the output is: -15 -5 5 15 25
Answer:
Explanation:
The following program is written in Python. It asks the user for two number inputs. Then it creates a loop that prints the first number and continues incrementing it by 10 until it is no longer less than the second number that was passed as an input by the user.
number1 = int(input("Enter number 1: "))
number2 = int(input("Enter number 2: "))
while number1 < number2:
print(number1)
number1 += 10
Infringement Less than 13km/h over the speed limit At least 13km/h but not more than 20km/h over the speed limit More than 20km/h but not more than 30km/h over the speed limit More than 30km/h but not more than 40km/h over the speed limit More than 40km/h over the speed limit Penalty amount $177 $266 $444 $622 $1.245 Demerit points 1 3 4 6 8 Note: the way the government website has written this (and we've copied it) is NOT efficient in terms of decision structures. This written for each condition to stand alone (if, if, if) but we can tell its mutually exclusive and so know a better tool for the job don Avoid a 6-month suspension by writing a program to ask for the user's: • speed and the • speed limit
program in python?
The example of the program in Python to help one to calculate the penalty amount as well as the demerit points based on the speed and speed limit provided by the user is given in the code below
What is the program?python
def calculate_penalty(speed, speed_limit):
penalty_amount = 0
demerit_points = 0
if speed <= speed_limit:
return penalty_amount, demerit_points
overspeed = speed - speed_limit
if overspeed <= 13:
penalty_amount = 177
demerit_points = 1
elif overspeed <= 20:
penalty_amount = 266
demerit_points = 3
elif overspeed <= 30:
penalty_amount = 444
demerit_points = 4
elif overspeed <= 40:
penalty_amount = 622
demerit_points = 6
else:
penalty_amount = 1245
demerit_points = 8
return penalty_amount, demerit_points
# Get user input
speed = int(input("Enter the recorded speed (in km/h): "))
speed_limit = int(input("Enter the speed limit (in km/h): "))
# Calculate penalty and demerit points
penalty, points = calculate_penalty(speed, speed_limit)
# Display the results
print("Penalty amount: $", penalty)
print("Demerit points: ", points)
Read more about python here:
https://brainly.com/question/30113981
#SPJ1
ers. ADOMS TRONSK To Find the sum, differnce, multiplication, division and modular division of given two numbers.
Answer:
Adam trunks
Explanation:
You just bought a new router to replace your old one.
Your Laptop is able to connect to your router
wirelessly BUT you're not able to browse the internet,
download or even send email.
In what order would you arrange these steps for a
sequential reboot?
1. Connect the laptop wirelessly and try
browsing again
2. Power up the router
3. Turn off both modem and the router
4. Reset the Network cable between the router
and the modem; check for other loosecables
5. Power up the modem
The orders that you would you to arrange these steps for a sequential reboot are;
Power up the router.Power up the modem.Reset the Network cable between the router and the modem; check for other loose cables. Turn off both modem and the router.Connect the laptop wirelessly and try browsing again.What does a router work for?A router is known to function by putting communication in place between computer networks.
Note that a router often takes data packets from devices and moves them to the right place and the steps above is the right steps.
Learn more about router from
https://brainly.com/question/14449935
Answer: 3, 5, 2, 4, 1
Explanation:
First, you turn both router and modem off.
The modem gets turned on first followed by the router. Reset the network cables to establish successful routing, next you turn on the router. and lastly, you connect laptop and try browsing again.
Use the drop-down menus to complete statements about how to use the database documenter
options for 2: Home crate external data database tools
options for 3: reports analyze relationships documentation
options for 5: end finish ok run
To use the database documenter, follow these steps -
2: Select "Database Tools" from the dropdown menu.3: Choose "Analyze" from the dropdown menu.5: Click on "OK" to run the documenter and generate the desired reports and documentation.How is this so?This is the suggested sequence of steps to use the database documenter based on the given options.
By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.
Learn more about database documenter at:
https://brainly.com/question/31450253
#SPJ1
I don't know who to do this assignment
An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Overtime pay equals the total overtime hours multiplied by 1.5 times the hourly wage. Write a program that takes as inputs the hourly wage, total regular hours, and total overtime hours and displays an employee’s total weekly pay.
wage=int(input("What the hourly wage?: "))
total_reg_hours=int(input("Enter total regular hours: "))
total_over_hours=int(input("Enter total overtime hours: "))
#Calculate the weekly pay.
print("The weekly pay of this employee is ",(total_reg_hours*wage)+(total_over_hours*(1.5*wage)))
C++:#include <iostream>
int main(int argc, char* argv[]) {
int wage,t_reg,t_over;
std::cout << "Enter wage: "; std::cin>>wage;
std::cout << "\nEnter total regular hours: "; std::cin>>t_reg;
std::cout << "\nEnter total overtime hours: "; std::cin>>t_over;
//Calculate the weekly pay.
std::cout << "The weekly pay of this employee is " << (t_reg*wage)+(t_over*1.5*wage) << std::endl;
return 0;
}
by identifying the fields within a bin by identifying the fields with a tooltip incorrect tooltips are text boxes that appear when hovering over a mark on a sheet, to provide more information. by identifying the fields that each sheet has in common by identifying the fields within a crosstab
To access the Tooltip Editor in the source sheet, click the Tooltip button in the Marks card. In the Tooltip Editor, select Insert from the menu. Choose Sheets from the Insert menu, then pick a target sheet.
In Tableau, which of the following approaches is appropriate for bolding the tooltip content?Right-click, select Format, and then, beneath the worksheet's normal formatting, select Tooltip and Bold. Choose bold under Analysis, Tooltip choices.
In Tableau, how do I add a tooltip to a text box?By choosing the Tooltip option from the Marks shelf, you may add a tooltip. Place the visual you made for this blog post above the relevant textbox on the dashboard where you want the tooltip to appear. You should now have a textbox with a tooltip that appears when you hover over it.
To know more about Tooltip visit:-
https://brainly.com/question/9409585
#SPJ4
Qa Defind Networking and its importance to an organization.
Networking is crucial for an organization as it enables effective communication, collaboration and resource sharing among employees and external stakeholders.
Why is networking important for organizational success?Networking plays a vital role in organizational success by fostering connections and facilitating the flow of information and resources. It allows employees to collaborate, share knowledge, and leverage each other's expertise leading to increased productivity and innovation.
But networking extends beyond the organization, enabling partnerships, customer acquisition, and business opportunities. By establishing a robust network, organizations can tap into a diverse pool of talents, stay updated with industry trends and build a strong reputation within their respective sectors.
Read more about Networking
brainly.com/question/1326000
#SPJ1
Pseudocode finding the sum of the number 12, 14, 16
Answer:
Pseudocode:
1. Initialize a variable named 'sum' and set it to 0.
2. Create an array named 'numbers' containing the numbers 12, 14, and 16.
3. Iterate over each number in the 'numbers' array.
3.1 Add the current number to the 'sum' variable.
4. Print the value of 'sum'.
Alternatively, here's an example of pseudocode using a loop:
1. Initialize a variable named 'sum' and set it to 0.
2. Create an array named 'numbers' containing the numbers 12, 14, and 16.
3. Initialize a variable named 'index' and set it to 0.
4. Repeat the following steps while 'index' is less than the length of the 'numbers' array:
4.1 Add the value at the 'index' position in the 'numbers' array to the 'sum' variable.
4.2 Increment 'index' by 1.
5. Print the value of 'sum'.
Explanation:
1st Pseudocode:
1. In the first step, we initialize a variable called 'sum' and set it to 0. This variable will be used to store the sum of the numbers.
2. We create an array named 'numbers' that contains the numbers 12, 14, and 16. This array holds the numbers you want to sum.
3. We iterate over each number in the 'numbers' array. This means we go through each element of the array one by one.
3.1 In each iteration, we add the current number to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.
4. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.
2nd Pseudocode using a loop:
1. We start by initializing a variable called 'sum' and set it to 0. This variable will store the sum of the numbers.
2. Similar to the first pseudocode, we create an array named 'numbers' containing the numbers 12, 14, and 16.
3. We initialize a variable called 'index' and set it to 0. This variable will be used to keep track of the current index in the 'numbers' array.
4. We enter a loop that will repeat the following steps as long as the 'index' is less than the length of the 'numbers' array:
4.1: In each iteration, we add the value at the 'index' position in the 'numbers' array to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.
4.2: We increment the 'index' by 1 to move to the next position in the array.
5. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.
Write an application that combines several classes and interfaces.
Answer:
Explanation:
The following program is written in Java and it combines several classes and an interface in order to save different pet objects and their needed methods and specifications.
import java.util.Scanner;
interface Animal {
void animalSound(String sound);
void sleep(int time);
}
public class PetInformation {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
String petName, dogName;
String dogBreed = "null";
int petAge, dogAge;
Pet myPet = new Pet();
System.out.println("Enter Pet Name:");
petName = scnr.nextLine();
System.out.println("Enter Pet Age:");
petAge = scnr.nextInt();
Dog myDog = new Dog();
System.out.println("Enter Dog Name:");
dogName = scnr.next();
System.out.println("Enter Dog Age:");
dogAge = scnr.nextInt();
scnr.nextLine();
System.out.println("Enter Dog Breed:");
dogBreed = scnr.nextLine();
System.out.println(" ");
myPet.setName(petName);
myPet.setAge(petAge);
myPet.printInfo();
myDog.setName(dogName);
myDog.setAge(dogAge);
myDog.setBreed(dogBreed);
myDog.printInfo();
System.out.println(" Breed: " + myDog.getBreed());
}
}
class Pet implements Animal{
protected String petName;
protected int petAge;
public void setName(String userName) {
petName = userName;
}
public String getName() {
return petName;
}
public void setAge(int userAge) {
petAge = userAge;
}
public int getAge() {
return petAge;
}
public void printInfo() {
System.out.println("Pet Information: ");
System.out.println(" Name: " + petName);
System.out.println(" Age: " + petAge);
}
//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it
Override
public void animalSound(String sound) {
System.out.println(this.petName + " says: " + sound);
}
//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it
Override
public void sleep(int time) {
System.out.println(this.petName + " sleeps for " + time + "minutes");
}
}
class Dog extends Pet {
private String dogBreed;
public void setBreed(String userBreed) {
dogBreed = userBreed;
}
public String getBreed() {
return dogBreed;
}
}
1. Which tab on the ribbon includes tools for customizing pages in your document.
A. HOME
B. INSERT
C. LAYOUT
D. DESIGN
Answer:
the Font group on the Home tab contains commands for formatting text in your document
Explanation:
list down four ways to start word 2010
Citi bike is an example of which arena of technology
Citi bike is an example of the arena of technology called Lyft.
What is Citi Bike?Citi Bike is a privately owned public bicycle-sharing system that operates in the Bronx, Brooklyn, Manhattan, and Queens boroughs of New York City, as well as Jersey City and Hoboken, New Jersey.
It was managed by Motivate (previously Alta Bicycle Share), with former Metropolitan Transportation Authority CEO Jay Walder as CEO, until September 30, 2018, when the firm was bought by Lyft. Lyft technology is used in the system's bikes and stations.
The system surpassed 50 million rides in October 2017 and will reach 100 million rides in July 2020.
Learn more about Lyft:
https://brainly.com/question/28547867
#SPJ1
please note, my working hours may be different than yours. please don't feel obligated to respond outside of your normal business hours unless necessary.
A statement "please note, my working hours may be different than yours. please don't feel obligated to respond outside of your normal business hours unless necessary." this means that more benefit to change to flexible work.
What is flexible work?Individual behavior describes the behaviors, responses, reactions, and ways in which a person behaves when they are in a certain situation. It consists of a variety of reactions to both internal and external stimuli. Individual habits and actions are frequently linked, either because of time restraints, resource accessibility, social connections, or biological inclinations. For instance, drinkers are more likely to smoke than non-drinkers, and physically unfit people are also less likely to make an effort to prepare meals at home.
Learn more about flexible work: https://brainly.com/question/29316477
#SPJ4
The following do-while loop is suppose to ask for the price for a gallon of gas. The price must a positive number. The price can be an integer value or a double value. for example the price can be 3 or 3.0 or 3.5.
To create a robust program, we must do the data validation and as long as the user is entering a negative value or a String, the program must keep asking the user to enter a valid input.
in this program you need to use some of the scanner methods listed here, make sure to use the proper ones: hasNextInt(), hasNextDouble(), hasNextLine(), hasNext(), nextInt(), nextDouble(), nextLine()
Must flush the buffer at the proper locations in the code
Answer:
import java.util.Scanner;
public class qs {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
double price;
do {
System.out.print("Enter the price for a gallon of gas: ");
while (!input.hasNextDouble()) {
System.out.println("That's not a number!");
input.next(); // this is important!
}
price = input.nextDouble();
} while (price < 0);
System.out.println("The price is " + price);
}
}
The main issues covered by IT law are: Hardware licensing Data privacy Department security True False
The main issues covered by IT law are: Hardware licensing, Data privacy, Department security is a true statement.
What topics are addressed by cyber law?There are three main types of cyberlaw:
Human-targeted crimes (e.g.: harassment, stalking, identity theft) Vandalism of property (e.g.: DDOS attacks, hacking, copyright infringement) The theft from the govt (e.g.: hacking, cyber terrorism)Cyber law includes provisions for intellectual property, contracts, jurisdiction, data protection regulations, privacy, and freedom of expression. It regulates the online dissemination of software, knowledge, online safety, and e-commerce.
Note that some Internet security issues that must be considered are:
Ransomware Attacks. IoT Attacks. Cloud Attacks. Phishing Attacks.Software Vulnerabilities, etc.Learn more about IT law from
https://brainly.com/question/9928756
#SPJ1
Ranjan have received an email saying that he won a free gift project to climb the gift voucher Ranjana give some personal details suggest Bank account number Bank name exact graph which type of security threat is indicated in the mail? should he answer the mail?
The company is especially concerned about the following:
Account management. Where will accounts be created and managed?
How will user authentication be impacted? Will users still be able to use their current Active Directory credentials to sign into their devices and still access resources on the local Active Directory network?
Securing authentication in the cloud.
Address the following based on the given information:
Explain how you can implement a Microsoft Intune device management solution and still allow Tetra Shillings employees to use their existing on premises Active Directory credentials to log onto the local network.
What controls and methods are available Azure Active Directory and Intune for controlling access to resources?
What Methods are available in Intune to detect when user accounts get compromised.
What actions can be taken to prevent compromised credentials from being used to access the network.
Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
A. IDS
B. AES
C. TPM
D. EFS
Answer:
Option A (IDS) is the correct choice.
Explanation:
Whenever questionable or unusual behavior seems to be detected, another alarm is sent out by network security equipment, which would be considered as Intrusion Detection System.SOC analysts as well as occurrence responders can address the nature but instead, develop a plan or take steps that are necessary to resolve it predicated on such notifications.All other three alternatives are not related to the given query. So the above option is correct.
Given class Triangle (in file Triangle.java), complete main() to read and set the base and height of triangle1 and of triangle2, determine which triangle's area is larger, and output that triangle's info, making use of Triangle's relevant methods. Ex: If the input is: 3.0 4.0 4.0 5.0 where 3.0 is triangle1's base, 4.0 is triangle1's height, 4.0 is triangle2's base, and 5.0 is triangle2's height, the output is: Triangle with larger area: Base: 4.00 Height: 5.00 Area: 10.00
Answer:
The Triangle.java file is not provided; However, the program is as follows;
Comments are used for explanatory purpose
Also see attachment for Triangle.java program file
import java.util.*;
public class triangle
{
public static void main(String [] args)
{
Scanner input = new Scanner(System.in);
//Declare variables
double base1, height1, base2, height2;
//Prompt user for inputs
System.out.println("Provide values for the base and height of the two triangles");
System.out.print("Base of Triangle 1: ");
base1 = input.nextDouble();
System.out.print("Height of Triangle 1: ");
height1 = input.nextDouble();
System.out.print("Base of Triangle 2: ");
base2 = input.nextDouble();
System.out.print("Height of Triangle 2: ");
height2 = input.nextDouble();
//Compare and Print Results
if(0.5 *base1 * height1 > 0.5 * base2 * height2)
{
System.out.print("Triangle with larger area: Base: "+base1+" Height: "+height1+" Area: "+(0.5 * base1 * height1));
}
else
{
System.out.print("Triangle with larger area: Base: "+base2+" Height: "+height2+" Area: "+(0.5 * base2 * height2));
}
}
}
which refers to the sets of rules that outline specification of dimensions design of operation materials and performance or describe quality of materials products or systems?
Answer:
Standards
Explanation:
STANDARDS can simply be defined as a set of guideline, rules or laydown rules to follow either during a manufacturing process or production process among others.
For Example A company or an organization that want to produce a quality goods or products has to have a laydown STANDARDS which will serve as a guideline during the production process such as the quality and quantity of materials they are to use , specification of the materials to use, the type and description of materials to use which will inturn enable them to produce quality goods due to the already lay down STANDARDS or rules which the company or organization followed.
2. How can recovery handle transaction operations that do not affect the database, such as the printing of reports by a transaction?
Answer:
Explanation:
great question but dont know
What is the concept of Object Oriented Programming?
Answer:
concept of "objects", which can contain data and code
Explanation:
Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which can contain data and code: data in the form of fields (often known as attributes or properties), and code, in the form of procedures (often known as methods).
Which of the following is a predefined procedure that returns a value?
A. Clipboard
B. mode indicator
C. Function
A predefined procedure that returns a value is called a: C. Function
A function can be defined as a set of commands (instructions) which can be run on a computer by calling it by its name. Thus, you can run series of command (instruction) as a function by calling its name.
In Computer programming, a group of organized, reusable series of command (instruction) that are written to instruct a computer for the performance of a particular task is generally referred to as a function.
Generally, a function is characterized by the following;
A function accepts data as an input.A function processes data.It returns a single output or a set of results depending on the code.In conclusion, a function is a predefined procedure that returns a value or series of value and it can be used to perform a single but related action.
Read more: brainly.com/question/23838498
A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose.
The physical topology which is best suited for this network connection is a star topology.
What is a topology?A topology can be defined as the graphical representation of the various networking devices that are used to create and manage a network connection.
The types of topology.
In Computer networking, there are six main types of topology and these include the following:
Bus topologyTree topologyHybrid topologyRing topologyMesh topologyStar topologyA star topology refers to a type of topology in which each networking device is physically connected to a central node such as a hub, router, or switch, which are typically acting as connecting nodes.
Read more on topology here: https://brainly.com/question/17036446
a place where people study space
Answer:
a place where people study space is a Spacey agent
Explain IoT Protocol stack?
Explanation:
IoT stands for the Internet Of Things. We are very good at many communication technologies, such as WIFI, BLUETOOTH, 3G/2G/4 G, and now 5 G is coming in the market, but there are several fresh waves networking choices on the market. The IoT system can only operate and transfer data online if the two devices are linked securely from the communication network. What makes it possible for such a link? IoT standards and protocols consist of an unseen language that allows physical objects to “speak” among themselves. General protocols used for computers, smartphones or tablets may not meet IOT-based solutions ‘ specific conditions.
What is the name of a coding sequence that is executed multiple times in a program?
Answer:
Loop, or Iterator
Explanation:
For example, a "for" loop or a "while" loop to create a block of code that will execute a certain number of times.
Answer:
C - a loop
Explanation:
on edge pls mark brainiest
A LinkedIn profile is required to be able to share your work experience and qualifications with potential employers.
True
False
Answer:
False
Explanation:
A LinkedIn profile is not required.