This problem description outlines a programming task to create methods that interact with bank account objects in Java. The provided BankAccount class has three attributes:
What is the programming task outlined in the problem description?This problem description outlines a programming task to create methods that interact with bank account objects in Java. The provided BankAccount class has three attributes:
accountholdername, accountnumber, and accountbalance, and two operations: deposit and withdraw.
In Part 1, the task is to write a public static method called makebankaccount that instantiates a new BankAccount object, stores the given account holder name and account number as attributes, initializes the account balance to zero, and returns the new object.
In Part 2, the task is to write a public static method called displayAccountInfo that takes a BankAccount object as an argument and prints out its account holder name, account number, and account balance.
The code should be tested and submitted to an auto-grader for feedback, passing structure and logic tests for each part before moving on to the next.
Learn more about programming task
brainly.com/question/30132463
#SPJ11
You need a 65% alcohol solution. On hand, you have a 450
mL of a 40% alcohol mixture. You also have 95% alcohol
mixture. How much of the 95% mixture will you need to
add to obtain the desired solution?
Answer:
375 ml of 95% is what we need to obtain the desired solution
Explanation:
Solution
Now
450 ml of 40% alcohol mixture +95% mix of x = 65% (450 +x)
Thus
0.40 * 450 +0.95 x = 0.65 (450 + x)
180 + 0.95 x =0.65 (450 +x)
180 +0.95 x = 292.5 + 0.65 x
So,
0.95 x - 0.65 x = 292.5 - 180
= 0.3 x = 112.5
x =112.5/0.3
x= 375 ml
Therefore, we will need 375 ml of 95% solution
how to apply the accounting number format in excel 2013
The method to apply the accounting number format in Excel 2013 is mentioned.
The steps on how to apply the accounting number format in Excel 2013 are as follows:
Step 1: Choose the cells you want to format
Step 2: On the Home tab, click the Accounting Number Format button.
Step 3: If you want to customize the accounting format, click the more options button in the Number group of the Home tab.
The Accounting Number Format button is located in the Number group on the Home tab of the ribbon.
The button is symbolized by a currency sign.
Accounting format is a widely used format that includes the dollar sign and a digit separator on the left, and the cents on the right.
The digits are also separated in groups of three to make it easy to read.
Know more about the Excel 2013
https://brainly.com/question/32220877
#SPJ11
Choose the response that best completes the following statement.
Comparison operators compare values and return
1 or 0
good or bad
true or false
yes or no
Answer:
true or false
Explanation:
True or False
Explanation:I Did The Test
WHAT DOES THE SCRATCH CODE BELOW DO?
Objectives • Research best practices for dashboard presentation • Create a dashboard to monitor key performance indicators
• Prepare a memo explaining the dashboard and implementation plan for the dashboard to present to the chief clinical officer Instructions Read the scenario that follows, perform research as indicated and create a dashboard and memo to present to the chief clinical officer. Scenario Karen White, RHIA, was recently hired as the new HIM director at a 450-bed suburban teaching hospital. Karen has been in the HIM field for approximately three years. Her past experience includes being a data quality specialist for the registration department of a large teaching facility. She is familiar with the functions of data reporting, but not as familiar with the other functions within the HIM department. Her boss, the chief clinical officer, wants her to create a department dashboard for monitoring key performance indicators within the department. He would like the dashboard sent to him on the first day of each month. The HIM department is comprised of the following functions and staff to support the functions: • Coding: Inpatient, outpatient, emergency department, and physician hospital-based coding Staff: 1 coding manager, 1 data quality coder, 15 remote-based coders • Electronic Record Management (ERM): Document imaging and file retrieval Staff: 1 ERM lead, 2 document imaging technicians, 3 file retrieval clerks • Record Processing (RP): ROI, electronic chart completion, and transcription (all outsourced) Staff: 1 RP lead, 2 ROI coordinators, 1 chart analyst, 1 transcription coordinator • Administrative Support: Phone support for ROI and file retrieval, administrative support for director Staff: 1 lead support specialist (director support position), 2 support specialists • Technical Support: Maintain hardware and software, computer upgrades, interface issues, workflow errors, perform duplicate master patient index clean up and health record merges Staff: 1 application specialist, 2 application analysts Assumptions • Each functional area within the HIM department maintains productivity and quality performance data for the activities performed but none of the data is aggregated or shared on a regular basis, and there are no benchmarks in place for the activities. • The dashboard will be basic: two indicators from each of the five functional areas (coding, ERM, RP, administrative support, technical support), and two indicators for the overall HIM department. • The hospital does not offer a specific dashboard product. • Additional research is needed in order to create a dashboard. • The chief clinical officer requested a draft and implementation plan for the dashboard. • Actual numbers for each key performance indicator should not be included on the dashboard; it should be a representation of what the dashboard will look like. Students will identify the metric/indicator - but do not have to provide actual figures. Deliverables Create a user-friendly dashboard including key performance indicators from each functional area and the HIM department. Make sure a benchmark is included for each key performance indicator. Create a memo to the chief clinical officer to accompany the dashboard using these parameters: 1. There is no template provided. Part of the assignment requires the student to perform research on effective dashboards and create their own dashboard. 2. The dashboard should be created in Excel. 3. The memo to the chief clinical officer should include at least the following regarding implementation: data collection method, communication plan for the managers and leads, and the HIM department timeline. 4. An APA-formatted reference must be provided to support the dashboard research. This should not be part of the memo, but be provided following the memo.
The objective is to create a department dashboard to monitor key performance indicators (KPIs) within the HIM department and prepare a memo with an implementation plan to present to the chief clinical officer.
What is th objective of the scenario described?In this scenario, Karen White, the new HIM director at a teaching hospital, is tasked with creating a department dashboard to monitor key performance indicators (KPIs) within the HIM department.
The department consists of coding, electronic record management, record processing, administrative support, and technical support functions. The assumption is that each functional area has its own productivity and quality data, but it is not aggregated or shared regularly.
The dashboard is expected to include two indicators from each functional area and two indicators for the overall HIM department, with benchmarks for each indicator. The hospital does not have a specific dashboard product, so additional research is needed to create the dashboard. The chief clinical officer requested a draft and implementation plan for the dashboard.
The deliverables for this project include a user-friendly dashboard created in Excel, along with a memo to the chief clinical officer explaining the implementation plan, including data collection methods, communication plan, and the HIM department timeline. An APA-formatted reference should be provided to support the dashboard research.
Learn more about objective
brainly.com/question/31018199
#SPJ11
1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze
The tool that you can use to find duplicates in Excel is c. Conditional Formatting
b. the first real row of datac. analyze, data, and programsWhat is Conditional Formatting?Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.
Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.
Read more about Conditional Formatting here:
https://brainly.com/question/30652094
#SPJ4
Find the inverse of the following matrices:
1.
3 -6 -1 4
2.
[1 2 3 7 6 5 ] 8 1 0
Answer:
Multiply by the unit squared
The matrices a) and c) are invertible and their inverses are [-2.5 0.5 3; 1.5 -1 -3; -0.5 0.5 1] and [0.5 1.5 5.5; 2.5 6.5 14.5; -2 -5 -11], respectively. The matrix b) is not invertible and we cannot find its inverse.
What is determinant?In order to determine whether a matrix is invertible, we need to calculate its determinant. If the determinant is not equal to 0, then the matrix is invertible and we can find its inverse. b then the matrix is not invertible and we cannot find its inverse.
The determinant of the matrix [2 1 2; 0 5 3; -1 1 0] is (2)(5)(0) + (1)(3)(-1) + (2)(0)(1) - (2)(1)(3) - (1)(5)(-1) - (2)(0)(0) = -3 + 5 = 2. Since the determinant is not equal to 0, the matrix is invertible. The inverse of the matrix can be found using the formula:
[2 1 2; 0 5 3; -1 1 0]^-1 = (1/2) * [5 -1 -6; -3 2 6; 1 -1 -2] = [-2.5 0.5 3; 1.5 -1 -3; -0.5 0.5 1]
The determinant of the matrix [3 -6; -4 8] is (3)(8) - (-6)(-4) = 24 - 24 = 0. Since the determinant is equal to 0, the matrix is not invertible and we cannot find its inverse.
The determinant of the matrix [1 3 2; -1 1 3; 2 2 -1] is (1)(1)(-1) + (3)(3)(2) + (2)(-1)(2) - (1)(3)(2) - (3)(1)(-1) - (2)(2)(3) = -1 + 18 - 4 - 6 + 3 - 12 = -2. Since the determinant is not equal to 0, the matrix is invertible. The inverse of the matrix can be found using the formula:
Therefore, the matrices a) and c) are invertible and their inverses are [-2.5 0.5 3; 1.5 -1 -3; -0.5 0.5 1] and [0.5 1.5 5.5; 2.5 6.5 14.5; -2 -5 -11], respectively. The matrix b) is not invertible and we cannot find its inverse.
To know more about inverse of a matrix refer here:
brainly.com/question/4017205
#SPJ7
Richard wants to share his handwritten class notes with Nick via email. In this scenario, which of the following can help Richard convert the notes into digital images so that he can share them via email? a. Bar coding device b. Digital printing software c. Document scanner d. Radio frequency identification tag
Answer: Document Scanner
Explanation: Cos then he can easily add the paper notes to his computer and email the client.
Which of the following are examples of stakeholders?
a
Business Owners
b
Investors/Shareholders
c
Employees
d
All of the above
*
Which of the following variable names are invalid?
123LookAtMe
Look_at_me
LookAtMe123
All of these are valid
Answer:
I think they're all valid but the validility depends on the website your using the usernames on.
Explanation:
HELP 15 POINTS
When collaborating in a group, it is appropriate to:
A:state the role each member played in the project
B:submit answers in your own interpretation and wording
C:Name all of the group members who worked together
D:Pre-approve the group members with the instructor
Answer:
A I think I might be wrong
When collaborating in a group, it is appropriate to state the role each member played in the project.
What is Collaboration in a workplace?This is known to be a form that entails when a group of people are said to share their ideas and skills so that they can to achieve the same goal.
Here they wok collaboratively, instead of individually and with this, they can improve the productivity of the firm. It is appropriate to state the role each member played in the project for ease.
Learn more about collaborating from
https://brainly.com/question/24345164
Linked lists are collections of data items "lined up in a row"-- insertions and deletions can be made anywhere in:________
a. linked list.
b. Insertions and deletions are made only at one end of a stack, its top.
c. Insertions and deletions are made only at one end of a queue, its tail.
d. Binary trees facilitate high-speed searching and sorting of data.
Answer:
a. linked list
Explanation:
a b c are all correct statements..... but
insertions and deletions can happen anywhere in a linked list. Not Stack, Not Queue.
which of the following best describes ""compilation"" in reference to computer science?
Answer:
Compilation is a computer's process of turning high-level programming languages into easily-processable computer languages.
Explanation:
One example is of HTML. If you type
<div class="col card rounded-0 m-1 text-muted tooltipster" title="Primary #FF6C6C" style="background-color: #FF6C6C"></div>
This will create a light-red block that will show it's hex code when a user hovers their cursor over that block. However for this to work the computer must take that line of code and squish it down and then stretch it out until it's just 1's and 0's so it's easier for the computer to "digest".
Should the government—and schools—be able to access your social media and cellphone information? If so, under what circumstances?
Write your response below. Make sure to clearly state your position on the topic and support it with strong reasons and specific examples. Must write at least six complete sentences here.
while maintaining an individual's right to privacy is crucial, there may be specific circumstances where accessing Social media and cellphone information becomes necessary.
It's an important topic to discuss, and I'm happy to help you with your question. My position is that the government and schools should only be able to access an individual's social media and cellphone information under specific circumstances, with proper legal authorization and a legitimate purpose.
Firstly, privacy is a fundamental right, and unauthorized access to personal information can lead to an invasion of privacy. However, there may be certain situations, such as a criminal investigation or threats to public safety, where accessing this information becomes necessary for the greater good.
In these cases, proper legal procedures must be followed, and a court warrant should be obtained to ensure that the rights of the individual are respected.
Secondly, schools may require access to a student's social media or cellphone information in cases of cyberbullying, harassment, or other violations of the school's code of conduct. This access should be limited to the specific information required to address the issue and not involve a blanket invasion of privacy.
In conclusion, while maintaining an individual's right to privacy is crucial, there may be specific circumstances where accessing social media and cellphone information becomes necessary. In these cases, proper legal authorization and a legitimate purpose must be established to protect the rights and interests of all parties involved.
To Learn More About Social media
https://brainly.com/question/29229064
#SPJ11
Based on the film we watched in class today (see below) and the
slides we reviewed in class, write a short half page essay that
discusses why intellectual property (IP) is so critical to
international
Intellectual property is a crucial aspect of international trade, ensuring that the people who develop innovative concepts and ideas receive compensation for their work and are protected from theft or unauthorized use.
The protection of intellectual property rights is essential to promoting innovation and economic growth. Intellectual property can be categorized into several types, including patents, trademarks, copyrights, and trade secrets.
Patents: A patent is a legal right that gives the owner the exclusive right to prevent others from making, using, or selling an invention for a specific period, typically 20 years from the filing date. Patents protect new and useful inventions that provide a technical solution to a particular problem.
Trademarks: Trademarks are unique symbols, logos, or names that distinguish one brand from another. Trademarks help protect brand identity and prevent others from using similar marks that might confuse consumers.
Copyrights: Copyrights protect original creative works, such as music, art, literature, software, and other intellectual creations. Copyrights give the owner exclusive rights to reproduce, distribute, and perform the work for a certain period.
Trade Secrets: A trade secret is confidential information that provides a competitive advantage to the owner, such as formulas, recipes, designs, or processes. Trade secrets protect valuable proprietary information from being used by competitors without authorization.Protecting intellectual property is vital to promoting economic growth and innovation worldwide. Strong intellectual property laws encourage creativity and innovation by protecting the rights of innovators and creators, which in turn promotes investment and economic development. It ensures that companies are rewarded for their investment in research and development, which encourages them to continue to innovate and create new products and services. By encouraging innovation and creativity, intellectual property laws have a positive impact on society as a whole, promoting the development of new technologies, medicines, and products that improve our lives.
know more about Intellectual property.
https://brainly.com/question/30554069
#SPJ11
Katrina wants to get a random number and assign it to a variable called force. Which line of code should be used?
orce = random.randint(1,10)
force = random(1,10)
force = randint(1,10)
force == random.randint(1,10)
Since Katrina wants to get a random number and assign it to a variable called force the code to be used is
force = random.randint(1, 10)
How will the above code work?This line uses the randint function from the random module to generate a random integer between 1 and 10 (inclusive) and assigns it to the variable force
Computer code is a set of instructions or a set of rules written in a specific programming language (i.e., the source code) in computer programming.
Learn more about code at:
https://brainly.com/question/26134656
#SPJ1
The Cloe button reduce a window o that it only appear a a button on the takbar. A. True
b. Fale
The statement "The Close button reduces a window o that it only appears as a button on the taskbar" is true. The correct option is A.
What is a taskbar?The Close button minimizes a window so that all that is left of it on the taskbar is a button. The file's name, location, and size are determined by the operating system.
One of the functions that your operating system performs when you add information to a word processing document is saving your unsaved work to temporary storage.
Therefore, the statement is true. The correct option is A.
To learn more about the taskbar, refer to the below link:
https://brainly.com/question/13029467
#SPJ4
consider the situation that there are two processes waiting in the ready queue, p1 and p2. the current process is p0. p0 calls fork() and creates a child process p0c and p0 continue to run without giving up the cpu. what does the ready queue look like at this time?
When a process calls fork() to create a child process, the child process is an exact copy of the parent process. This means that both the parent and child processes have their own copies of the same code and data.
However, the child process has its own unique process ID, and any changes made to the data by the child process do not affect the data in the parent process.
In terms of the ready queue, when fork() is called, the child process is added to the end of the queue, just like any other process waiting to run. The parent process continues to run on the CPU without giving it up, and the child process is in the ready state, waiting for its turn to run.
So in the scenario described, the ready queue would have three processes: p1, p2, and p0c (the child process created by p0). The order of these processes in the queue would depend on the scheduling algorithm being used by the operating system.
It's worth noting that the parent and child processes may not necessarily be scheduled in a predictable order, as the operating system may use various scheduling algorithms to determine which process should run next. Therefore, it's important for the code to handle the possibility of the child process running before the parent process has completed its execution.
Learn more about process here:
https://brainly.com/question/29487063
#SPJ11
Given a string, if the string begins with "red" or "blue" return that color string, otherwise return the empty string.
seeColor("redxx") → "red"
seeColor("xxred") → ""
seeColor("blueTimes") → "blue"
public String seeColor(String str) {
}
The goal of this problem is to write a method that takes a string as input and checks whether it starts with "red" or "blue". If the string starts with "red" or "blue", the method should return the corresponding color string.
Explanation:
The following Java code can be used to implement the seeColor method:
rust
Copy code
public String seeColor(String str) {
if (str.startsWith("red")) {
return "red";
} else if (str.startsWith("blue")) {
return "blue";
} else {
return "";
}
}
This method uses the startsWith method of the String class to check whether the input string starts with "red" or "blue". If the input string starts with "red", the method returns the string "red". If the input string starts with "blue", the method returns the string "blue". If the input string does not start with either "red" or "blue", the method returns an empty string.
Note that the startsWith method is case sensitive, so the input string must start with "red" or "blue" in lowercase letters to be recognized by this method.
To learn more about implement click here, brainly.com/question/30004067
#SPJ11
¿como la imagen organiza la realidad?
Answer:
Las imágenes son las percepciones visuales que las personas tienen respecto de la realidad que los rodea. Así, a través de la visión, las personas pueden interpretar el contexto en el cual se encuentran inmersos, organizando los distintos componentes de la realidad en la cual desarrollan sus vidas, para poder comprender entonces de qué modo proceder ante las diferentes eventualidades de la vida.
Es decir que, a través de las imágenes, y en conjunto con las demás percepciones sensoriales, los seres humanos pueden contextualizarse en un entorno en el cual se desenvuelven, organizando su vida y su realidad a futuro.
Which object is a storage container that contains data in rows and columns and is the primary element of Access databases? procedures queries forms tables
Answer:
tables
Explanation:
For accessing the database there are four objects namely tables, queries, forms, and reports.
As the name suggests, the table is treated as an object in which the data is stored in a row and column format plus is the main element for accessing the database
Therefore in the given case, the last option is correct
Answer:
D. tables
Explanation:
took the test, theyre right too
3. How are you able to create photographs differently than 100 years ago?
Answer:
it willbe black and white
Explanation:
Answer:
Yes, of course!
Explanation:
Digital Cameras can create photographs very different than 100 years ago, which means the answer is yes.
how would one declare a variable err that can appropriately receive returned value of a cuda api call?
A person can declare a variable err that can appropriately receive returned value of a CUDA API call by the use of cudaError t_err;
What is Proper CUDA Error Checking?Proper CUDA error checking is known to be very vital for creating the CUDA program development to be very smooth as well as to be successful.
Note that Missing or incorrectly found CUDA errors could lead to problems in the making as well as waste a lot of time of one trying to debug.
Therefore, A person can declare a variable err that can appropriately receive returned value of a CUDA API call by the use of cudaError t_err;
Learn more about programming from
https://brainly.com/question/16936315
See full question below
How would one declare a variable err that can appropriately receive returned value of a CUDA API call?
int err;
cudaError err;
cudaError t_err;
cudaSuccess t_err;
How to creatte a react app without a git hub repository
Answer:
You needn't be on Github. You just need to have the software, like visual code installed on your computer.
If you've got all these things sorted, then you'll be able to make apps without github.
Check all of the file types that a Slides presentation can be downloaded as.
.JPEG
.doc
.xls
.PDF
.pptx
.bmp
Answer:
.JPEG
.pptx
General Concepts:
Explanation:
If we go into File, and then under Download, we should be able to see which file types that a Slides presentation can be downloaded as.
Attached below is an image of the options.
b. Differentiate Operation System from other software. give me 4-5 sentences pls.
Answer:
An operating system or OS is system software that manages computer hardware, software resources, and provides common services for computer programs. All operating systems are system software. Every desktop computer, tablet, and smartphone includes an operating system that provides basic functionality for the device while on the other hand The System software is a type of computer program that is designed to run a computer’s hardware and application programs it controls a computer’s internal functioning, chiefly through an operating system. It also controls peripherals devices such as monitors, printers, and storage devices.
Explanation:
Consider the following my script py. What is the output when the command line argument python my script.py input it output.but is run on the terminal 1 import sys 16 points 3 print (sys.argv) 4 for i in sys.argy: 5 if len(i) > 10: 6 print(len(i)) 7 a my script.py.input txt, output 12 [my.script.py input.ba output 12 10 input it output.xt' 12 d.input txt, output 12 10
The output generated by the given Python script when run with the command line argument "python my script.py input it output" is: ['my script.py', 'input', 'it', 'output'] and 6.
Consider the following my script py. The given Python script takes command line arguments as input and prints the length of arguments with more than 10 characters. When the command line argument "python my script.py input it output" is run on the terminal, the output generated is:
['my script.py', 'input', 'it', 'output']
6
The output indicates that the script has received 3 arguments: "input", "it" and "output". The length of the argument "input" is 5, which is less than 10, so it is not printed. The length of the argument "it" is also less than 10, so it is not printed either. However, the length of the argument "output" is 6, which is greater than 10, so it is printed as the output.
It is important to note that the script is only checking the length of the arguments and printing the lengths of those arguments that have more than 10 characters. It does not perform any other operation or manipulation of the input arguments.
Learn more on python script here:
https://brainly.com/question/14532970
#SPJ11
For this writing assignment, select a bitcoin wallet provider. You may choose from the list from bitcoin.org, or find another one from your own research. Then, write a
one- to two-page paper describing and evaluating the wallet. What are the wallet's unique features? What does the wallet's website say about its security? What
platform (out of the 5 described in the module) does this wallet fit under?
You can transfer, receive, and store bitcoin through your online browser using web wallets. Although some types of web wallets offer options for you to maintain control over your private keys.
What does a wallet address look like?Between 26 to 35 characters are used for wallet addresses, and both letters and digits are used. They begin with "1," "3," or "b1," respectively. A sample address is provided. Hexadecimal addresses have 42 characters.
Is digital a provider of wallets?A provider of financial services, l primarily serves as a digital wallet and money transfer platform. Even if your business is primarily online, you can use invoice customers and accept payments. The platform is typically used for sending money to friends and family.
to know more about wallets here:
brainly.com/question/29627571
#SPJ1
Two grids are shown below. For each grid, the code below is intended to move the robot to the gray square. The program uses the procedure Arrived(), which evaluates to true if the robot is in the gray square, and false otherwise.
REPEAT UNTIL (Arrived())
{
IF (CAN_MOVE(right))
{
ROTATE_RIGHT()
}
ELSE
{
IF (CAN_MOVE(left))
{
ROTATE_LEFT()
}
}
IF (CAN_MOVE(forward))
{
MOVE_FORWARD()
}
}
Repair the code so that the robot will make it to the gray square no matter which of the two grids it choses.
Answer:
switch the IF statements
Explanation:
if you allow the robot to check for space on the left first, it will run through both mazes correctly
True or False
We can represent the pdf of a discrete random variable X with a
histogram.
False. We cannot represent the pdf of a discrete random variable X with a histogram.
The probability density function or pdf refers to the mathematical function that is used to describe the likelihood of possible values of a continuous random variable. A probability density function is represented as the derivative of a probability distribution function, and it is used to represent the area under the curve that represents the probability distribution of a continuous random variable. The probability density function (pdf) is used to estimate the probability of the random variable X by observing the probability distribution function (pdf) of X. The probability distribution function (pdf) of X is defined as P(X = x) = the probability of X taking on the value x. The probability density function is used to estimate the probability of the random variable X by observing the probability distribution function (pdf) of X. The probability distribution function (pdf) of X is defined as P(X = x) = the probability of X taking on the value x. The conclusion is that False, we cannot represent the pdf of a discrete random variable X with a histogram.
To learn more about histogram, visit:
https://brainly.com/question/16819077
#SPJ11