constructor is a special method that's also called once memory is allocated for a freshly constructed object to initialize it, and further discussion can be defined as follows:
It has the same identity as the class or struct, so it normally sets up the new object's data members.In the Rectangle class if it calculates the area. so, it takes two parameters that are "length, width", that is equal to "Rectangle(int len, int wid)".Therefore, the final answer "Option D".
Learn more:
brainly.com/question/14239397
Find the maximum value and minimum value in milestracker. Assign the maximum value to maxmiles, and the minimum value to minmiles.
#TODO: Update the milestracker as you wish.
milestracker = [3,4,5,6,7,8,9,10,11]
#Find max and min and then print those values.
maxmiles = max(milestracker)
minmiles = min(milestracker)
print("The maximum:",maxmiles,"\nThe minimum:",minmiles)
C++:#include <bits/stdc++.h>
int main(int argc, char* argv[]) {
//TODO: Update the milestracker as you wish.
std::vector<int> milestracker{2,3,4,5,6,7,8,91,10,11};
//Compare and then print.
int maxmiles = *std::max_element(milestracker.begin(),milestracker.end());
int minmiles = *std::min_element(milestracker.begin(),milestracker.end());
std::cout << "The maximum: " << maxmiles << "\nThe minimum: " << minmiles << std::endl;
return 0;
}
Name two sensors which would be used in a burglar alarm system
1. Passive Infrared Sensor
This sensors type is passive in a way that it doesn't radiate its own energy. Instead, it detects the infrared light radiating from objects. This way, it can detect whenever there's a human or another living being in its field of view.
2. Photoelectric Beams
This is also another type of motion detector, but it doesn't work similarly to the others. For one, it doesn't have a coverage area. It only forms a fence, which triggers the alarm if broken.
It consists of two separate parts that form a sort of a fence made of IR beams. When someone steps into the beams, between the two parts, they trigger the alarm.
If David wishes to digitally sign the message that he is sending Mike, what key would he use to create the digital signature
The key would he use to create the digital signature is Mike public key.
Which key is used to sign messages?Digital signatures are known to be used via public key. Here, the person is said to be one who is said to produce or creates the digital signature that uses a private key to encrypt signature-linked data.
The only way to decrypt a data is only with the signer's public key, the key David would use to create the digital signature is Mike public key.
Learn more about public key from
https://brainly.com/question/17486027
how to sum all the odd or even numbers in an arraylist in java?
like the program asks for user input and adds the input to an arraylist and then the user can click a button (sum odd or sum even) and then the value of all odd or even numbers should be returned based on what button the user clicks, so how do i do that ?
A program exists as a detailed set of ordered operations for a computer to execute. Generally, the program exists placed into a storage area available to the computer.
What is java?Java exists as a class-based, object-oriented programming language that exists designed to contain as rare implementation dependencies as possible.
For even sum:
BtnSumE.addActionListener(new ActionListener()
{
public void actionPerformed(ActionEvent e)
{
int sumE = 0;
for (int counter = 0; counter < aryNums.size(); counter++)
{
if (aryNums.get(counter) % 2 == 0)
{
sumE += aryNums.get(counter);
TxtArea.setText(String.valueOf(aryNums.get(counter)));
TxtArea2.setText("The sum of the even integers is " + valueOf(sumE));
}
For odd sum:
BtnSumO.addActionListener(new ActionListener()
{
public void actionPerformed(ActionEvent e)
{
int sumO = 0;
for (int counter = 0; counter < aryNums.size(); counter++)
{
if (aryNums.get(counter) % 2!= 0)
{
sumO += aryNums.get(counter);
TxtArea.setText(String.valueOf(aryNums.get(counter)));
TxtArea2.setText("The sum of the odd integers is " + valueOf(sumO));
}
When running the program for an even sum we get "74" and for the odd sum, we get "263".
Array list (aryNums) contain these numbers [0, 2, 23, 74, 263].
To learn more about computer programs refer to:
https://brainly.com/question/23275071
#SPJ9
A vertical series of cells in a spreadsheet that can be formatted and used to make calculation is a _______________.
Question 1 options:
cell
column
row
column header
Answer:
Column
Explanation:
I found the word list that has all the jive words
A vertical series of cells in a spreadsheet that can be formatted and used to make calculation is a column. The correct option is B.
What is spreadsheet?A spreadsheet is a computer program for organizing, calculating, and storing data in tabular form.
Spreadsheets were created as digital counterparts to traditional paper accounting spreadsheets. The data entered into a table's cells is what the programme uses to run.
A spreadsheet is a piece of software that can store, display, and edit data that has been organized into rows and columns.
One of the most used tools for personal computers is the spreadsheet. In general, a spreadsheet is made to store numerical data and short text strings.
A column in a spreadsheet is a row of cells that can be styled and used for calculations.
Thus, the correct option is B.
For more details regarding spreadsheet, visit:
https://brainly.com/question/8284022
#SPJ2
When you are on a friendly basis with your colleagues, employer, or customers, you should communicate ____
When you are on a friendly basis with your colleagues, employer, or clients, you have to communicate in a friendly and respectful manner. Building and retaining nice relationships inside the workplace or commercial enterprise surroundings is vital for effective verbal exchange.
When speaking on a pleasant foundation, it is essential to use a warm and alluring tone, be attentive and considerate, and show true hobby in the different person's thoughts and evaluations. Clear and open communication, along side energetic listening, can help foster a friendly and collaborative ecosystem.
Additionally, being respectful and aware of cultural variations, personal obstacles, and expert etiquette is essential. Avoiding confrontational or offensive language and preserving a effective and supportive mindset contributes to maintaining right relationships with colleagues, employers, or clients on a friendly foundation.
Read more about friendly communication at :
https://brainly.com/question/3853228
True or
false?
1) The CRT is the most common display screen. True or false
Answer:
True
Explanation:
we use it often like on electronics
Answer:
False
Explanation:
CRT is now old technology my friend
one of the key skills of a good data scientist is the ability to construct and implement a good data structure that allows for manipulation of the data. true or false
The given statement ''one of the key skills of a good data scientist is the ability to construct and implement a good data structure that allows for manipulation of the data'' is true.
We have to give that,
Statement is,
One of the key skills of a good data scientist is the ability to construct and implement a good data structure that allows for the manipulation of the data.
Now, Constructing and implementing a good data structure is a crucial skill for data scientists as it allows them to effectively organize and manipulate large amounts of data.
By creating a well-designed data structure, data scientists can quickly and efficiently extract insights from the data and make informed decisions based on their analysis.
Hence, the statement is true.
To learn more about data visit:
brainly.com/question/30308987
#SPJ4
1Jeremiah searches his computer for movie files that he recently shot duringhis vacation in Belize.Select the set of file types that Jeremiah should look for..avi and .wmv.mov and .ods.wma and .mpg.mpg and .key
Jeremiah should be looking for .avi, .wmv, .mov, and .ods file types when searching for his movie files on his computer. Other file types such as .wma and .mpg, as well as .key, are not relevant to this search.
In order to assist Jeremiah in finding his vacation movie files, we will identify the appropriate file types that are commonly associated with video recordings. Among the given sets of file types, we can determine which ones are specifically related to movie files:
- .avi and .wmv: Both of these are video file formats, with .avi being a common format for Windows-based systems and .wmv being a Windows Media Video format.
- .mov and .ods: While .mov is a video file format commonly used by Apple's QuickTime, .ods is an OpenDocument Spreadsheet format, unrelated to video files.
- .wma and .mpg: .wma is a Windows Media Audio format, which is an audio file type, while .mpg is a video file format.
- .mpg and .key: As previously mentioned, .mpg is a video file format, but .key is a Keynote presentation file format, not a video file.
Based on the information provided, Jeremiah should look for the set of file types ".avi and .wmv" as well as ".mpg," since these formats are commonly associated with video recordings.
To learn more about file types, visit:
https://brainly.com/question/18241798
#SPJ11
What are the missing parts to produce the following output?
Answer:
1.for
2.2
Explanation:
the entry to record an issuance of an installment notes payable would include a
The entry to record an issuance of an installment notes payable would include a credit to notes payable account and a debit to cash account.
Installment notes payable is a type of loan or debt that a company has to pay back in multiple installments over time.
Installment notes payable are different from term notes payable, which are usually due in one lump sum at the end of a certain time frame.
A company may issue installment notes payable to finance the purchase of an asset or to pay for other business expenses.
The entry to record the issuance of installment notes payable involves a debit to cash or bank account and a credit to notes payable account.
The cash received from the installment notes payable is recorded as a debit to the cash or bank account, while the notes payable account is credited for the face value of the loan.
A note payable is a type of financial instrument that is issued by a borrower to a lender. It is a written promise to repay a specified amount of money, typically with interest, at a future date or on demand.
A note payable is a liability for the borrower and an asset for the lender, and it is used by businesses to borrow money to finance their operations.
Know more about installment notes payable here:
https://brainly.com/question/31951150
#SPJ11
Which of the following is normally included in the criteria of a design?
The one that is normally included in the criteria of a design is budget. The correct option is 3.
What is budget?A budget is an estimate of revenue and expenses for a given period of time that is usually compiled and re-evaluated on a regular basis.
Budgets can be created for an individual, a group of people, a company, a government, or almost anything else that makes and spends money.
Criteria are requirements that the design must meet in order to be successful. Constraints are design limitations.
These may include the materials available, the cost of the materials, the amount of time available to develop the solution, and so on.
Thus, the correct option is 3.
For more details regarding budget, visit:
https://brainly.com/question/15683430
#SPJ1
1. Materials
2. Time
3. Budget
4. Efficiency
Write a function that returns the average `petalLength` for each of the flower species. The returned type should be a dictionary.
The function given below takes a list of dictionaries `flowers` as its argument. Each dictionary in the list contains the attributes `species` and `petalLength`.
The function returns the average `petalLength` for each species in the form of a dictionary with the species as the key and the average petal length as the value.```def average_petal_length(flowers): # Create an empty dictionary to store average petal length for each species avg_petal_length_dict = {} # Create an empty dictionary to store the total petal length and count of each species petal_length_count_dict = {} for flower in flowers: # Check if species already exists in the petal_length_count_dict if flower['species'] in petal_length_count_dict: # Add the petal length to the total petal length for the species petal_length_count_dict[flower['species']]['total_petal_length'] += flower['petalLength'] .
# Increment the count of the species by 1 petal_length_count_dict[flower['species']]['count'] += 1 The function first creates an empty dictionary to store the average petal length for each species. It then creates another empty dictionary to store the total petal length and count of each species.
To know more about attributes visit:
brainly.com/question/32473118
#SPJ11
Do any of you guys know what the main problem in E.T is?
Answer:
At its glowing red heart, E.T. is a film about friendship. Elliott and E.T. are a tightknit pair from wildly different backgrounds, and their bond is grounded in love, loyalty, compassion, teamwork, and even a mysterious cosmic connection.
ok so I have two accounts and like, the other account has -20 points??? what happened
Help Please!!! Will give brainliest!!!!!
The code for the class named Retail Item that holds data about an item in a retail store is given below.
What is the class about?In the attached code, we have characterized a course called RetailItem. This code has three qualities such as depiction, units, and cost, which speak to the item's portrayal, the number of units of the thing in stock, etc.
Hence, the program makes three RetailItem objects, utilizing the RetailItem course constructor, and allots them to factors item1, item2, and item3. These objects speak to a coat, architect pants, and a shirt individually.
Lastly, the program prints out the string representation of each RetailItem protest utilizing the print() work.
Learn more about class from
https://brainly.com/question/29330362
#SPJ1
See text below
Item Class
Write a class named Retail Item that holds data about an item in a retail store. The class should store the following data in attributes: item description, units in inventory, and price. Once you have written the class, write a program that creates three Retail Item objects and stores the following data in them:
Description
Units in Inventory
Price
Item #1 Jacket 12 59.95
Item #2 Designer Jeans 40 34.95
Item #3 Shirt 20 24.95
a vulnerability is a weakness or flaw that allows a threat to bypass security. (ch-1) question 3 options: true false
Answer:
TRUE
Explanation:
True. A vulnerability is a weakness or flaw in a system, process, or organization that can be exploited by a threat to gain unauthorized access, disrupt operations, steal information, or cause damage. Identifying and addressing vulnerabilities is an important part of maintaining security.
What would be used by a business to assess how the business is working within its organization goals? O A. Information systems B. Interactivity C. Management plan D. Business analysis
Answer:
Management plan
Explanation:
PLEASEEEE HELPPPP
Which key navigates a user out of Read View to the previous view?
Which can be used to view a web page?
File viewer
Text editor
Web browser
WYSIWYG
The answer is C: web browser
so we use web browsers to look at web pages
hope this helped
-scav
write a program with a car's gas mileage (miles/gallon) and the cost of gas (dollars/gallon) as floating-point input, and output the gas cost for 20 miles, 75 miles, and 500 miles.
A program with a car's gas mileage (miles/gallon) and the cost of gas (dollars/gallon) as floating-point input, and output the gas cost for 20 miles, 75 miles, and 500 miles is given below:
#include <stdio.h>
int main(void) {
double milesperGallon;
double costperGallon;
double totalCost;
double totalCost2;
double totalCost3;
scanf("%lf", &milesperGallon);
scanf("%lf", &costperGallon);
totalCost = (20 / milesperGallon) * costperGallon;
totalCost2 = (75 / milesperGallon) * costperGallon;
totalCost3 = (500 / milesperGallon) * costperGallon;
printf("%0.2lf", totalCost);
printf(" %0.2lf", totalCost2);
printf(" %0.2lf\n", totalCost3);/* Type your code here. */
return 0;
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
define the term cyber space
Answer: Cyberspace, is an amorphous, supposedly virtual world created by links between computers, Internet-enabled devices, servers, routers, and other components of the Internet’s infrastructure
Wired Equivalent Privacy (WEP) is An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure.
True or False
The given statement, "Wired Equivalent Privacy (WEP) is An IEEE 802.11 security protocol designed to ensure that only authorized parties can view transmitted wireless information. WEP has significant vulnerabilities and is not considered secure" is true because wired Equivalent Privacy (WEP) is an IEEE 802.11 security protocol that was initially designed to provide security for wireless networks by encrypting data transmitted between devices.
However, over time, significant vulnerabilities were discovered in WEP, making it easily exploitable by attackers. These vulnerabilities allowed unauthorized parties to decrypt the encrypted data and gain access to the wireless network.
Due to its weaknesses and vulnerabilities, WEP is no longer considered a secure wireless security protocol. It has been widely replaced by more robust and secure protocols, such as Wi-Fi Protected Access (WPA) and WPA2, which provide stronger encryption algorithms and enhanced security features to protect wireless communications.
It is recommended to use WPA2 or the latest security standards available for securing wireless networks to ensure the confidentiality and integrity of transmitted data.
Learn more about Security protocol: https://brainly.com/question/30086911
#SPJ11
Type the correct answer in the box. Spell the word correctly.
Which programming language completes the sentence?
Translators convert code written in a high-level language to the ___
that the computer processor can execute.
Translators convert code written in a high-level language to the machine language.
Answer:
compiler
Explanation:
algorithm and flowchart and c program to display sum of 5 different number
The algorithm and flow chart and c program to sum of 5 different number is given below.
Describe C programming?C is a compiled language, which means that programs written in C must be compiled before they can be run. This compilation process produces machine code, which is the code that can be executed by a computer. Because of this, C programs can be very fast and efficient.
One of the strengths of C is its ability to work with memory directly through pointers. Pointers are variables that store memory addresses, allowing the programmer to manipulate the data at that address. This can be useful in low-level programming tasks, such as working with hardware or writing device drivers.
Here's the algorithm to display the sum of 5 different numbers:
Declare a variable sum and initialize it to zero.Prompt the user to enter the first number and store it in a variable.Add the value of the first number to the sum variable.Repeat steps 2-3 for the second, third, fourth, and fifth numbers.Output the value of the sum variable.Here's the flowchart for the same:
Start
↓
Initialize sum = 0
↓
Prompt user for first number
↓
Add first number to sum
↓
Prompt user for second number
↓
Add second number to sum
↓
Prompt user for third number
↓
Add third number to sum
↓
Prompt user for fourth number
↓
Add fourth number to sum
↓
Prompt user for fifth number
↓
Add fifth number to sum
↓
Output sum
↓
End
Here's the C program to display the sum of 5 different numbers:
#include <stdio.h>
int main() {
int num1, num2, num3, num4, num5, sum;
printf("Enter the first number: ");
scanf("%d", &num1);
printf("Enter the second number: ");
scanf("%d", &num2);
printf("Enter the third number: ");
scanf("%d", &num3);
printf("Enter the fourth number: ");
scanf("%d", &num4);
printf("Enter the fifth number: ");
scanf("%d", &num5);
sum = num1 + num2 + num3 + num4 + num5;
printf("The sum of the numbers is %d\n", sum);
return 0;
}
This program prompts the user to enter 5 different numbers, stores them in variables, calculates their sum, and outputs the result.
To know more about sum visit:
https://brainly.com/question/13437666
#SPJ9
PLS HELP
1. You can tape a movie off Showtime.
a. if you use it for educational purposes.
b. only if you have written permission from the company.
c. so that it may be archived.
d. to use as an entertainment for your great students.
2. You may photocopy parts of the encyclopedia:
a. if it is for your use only.
b. only if your copy is of the subject you are researching.
c. if you don’t have a copy at home.
d. to pass out to all your students.
3. You may record a local symphony concert to share with your class:
a. as long as you don’t sell tickets to hear it.
b. as long as you use it at a listening center in your room.
c. if you relate it to your lessons.
d. you may not record a public performance of any kind.
4. You may make a copy of a computer program:
a. if you are giving it to a friend.
b. as long as you purchased it and are using it for a back-up copy.
c. as long as you downloaded it from the internet.
d. you may not copy software.
5. You may use any image from the Internet or clip art software:
a. if you know that no one will know.
b. if you save it as an “image” and give it a new name.
c. as long as it is confirmed to be “royalty free”.
d. you cannot copy any photograph, artwork, or image without permission.
Answer:
1. so that it may be archived
2.to pass out to all your students
3.if you relate it to your lessons
4.as long as you've purchased it and you are using it for back up copy
5.C
Which image file format is an uncompressed raster file which may contain different depths of color depths per pixel, or may be saved in grayscale?.
Answer:
BMP
Explanation:
The BMP file format, also known as bitmap image file, device independent bitmap (DIB) file format and bitmap, is a raster graphics image file format used to store bitmap digital images, independently of the display device (such as a graphics adapter), especially on Microsoft Windows[2] and OS/2[3] operating system
The _____ is the part of a computer that executes the instructions of a computer program.
Answer:
Central processing unit (CPU)
Hope you have a great day :)
The following is a table of activities associated with a project at Rafay Ishfaq's software firm in Chicago, their durations, what activities each must precede and the crash cost to reduce duration per week: Suppose that Rafay is only given 6 weeks (instead of 9 ) to complete the project. By how many weeks should each activity be crashed in order to meet the deadline? Assume that you can crash an activity down to 0 weeks duration.
To determine by how many weeks each activity should be crashed in order to meet the deadline, we need to calculate the total crash time required for each activity. The total crash time is the difference between the normal duration and the desired duration.
Given that the project originally had a duration of 9 weeks and now needs to be completed in 6 weeks, we can calculate the crash time as follows:
Activity A:
Normal duration = 2 weeks
Desired duration = 0 weeks (crash to the minimum)
Crash time = Normal duration - Desired duration = 2 weeks - 0 weeks = 2 weeks
Activity B:
Normal duration = 3 weeks
Desired duration = 2 weeks
Crash time = Normal duration - Desired duration = 3 weeks - 2 weeks = 1 week
Activity C:
Normal duration = 4 weeks
Desired duration = 3 weeks
Crash time = Normal duration - Desired duration = 4 weeks - 3 weeks = 1 week
Activity D:
Normal duration = 3 weeks
Desired duration = 2 weeks
Crash time = Normal duration - Desired duration = 3 weeks - 2 weeks = 1 week
Activity E:
Normal duration = 5 weeks
Desired duration = 4 weeks
Crash time = Normal duration - Desired duration = 5 weeks - 4 weeks = 1 week
Activity F:
Normal duration = 4 weeks
Desired duration = 3 weeks
Crash time = Normal duration - Desired duration = 4 weeks - 3 weeks = 1 week
Activity G:
Normal duration = 2 weeks
Desired duration = 1 week
Crash time = Normal duration - Desired duration = 2 weeks - 1 week = 1 week
Activity H:
Normal duration = 2 weeks
Desired duration = 1 week
Crash time = Normal duration - Desired duration = 2 weeks - 1 week = 1 week
Activity I:
Normal duration = 2 weeks
Desired duration = 1 week
Crash time = Normal duration - Desired duration = 2 weeks - 1 week = 1 week
Therefore, each activity should be crashed by the corresponding number of weeks mentioned above in order to meet the 6-week deadline.
Learn more about total crash time here:
https://brainly.com/question/30199703
#SPJ11
you are the network administrator for a large organization. you are in charge of developing a plan to install 200 windows 10 computers in your company's data center. you decide to use wds. you are using a windows server 2012 r2 domain and have verified that your network meets the requirements for using wds. what command-line utility should you use to configure the wds server?
You should use the wdsutil command-line utility to configure the Windows Deployment Services (WDS).
Configuring the WDS serverAs the network administrator for a large organization, you are in charge of developing a plan to install 200 Windows 10 computers in your company's data center. You decide to use Windows Deployment Services (WDS) to automate the installation process. You are using a Windows Server 2012 R2 domain and have verified that your network meets the requirements for using WDS.
To configure the WDS server, you will use the wdsutil command-line utility. This utility will allow you to manage the WDS server and images, as well as perform other tasks such as starting and stopping the server.
Learn more about Windows at: https://brainly.com/question/14531631
#SPJ4