Write a class called Triangle that can be used to represent a triangle. It should include the following methods that return boolean values indicating if the particular property holds: a. isRight (a right triangle) b. isScalene (no two sides are the same length) c. isIsosceles (exactly two sides are the same length) d. isEquilateral (all three sides are the same length).

Answers

Answer 1

Answer:

Explanation:

import java.io.*;

class Triangle

{

  private double side1, side2, side3; // the length of the sides of

                                       // the triangle.

  //---------------------------------------------------------------

  // constructor

  //

  // input : the length of the three sides of the triangle.

  //---------------------------------------------------------------

  public Triangle(double side1, double side2, double side3)

  {

      this.side1 = side1;

      this.side2 = side2;

      this.side3 = side3;

  }

  //---------------------------------------------------------------

  // isRight

  //

  // returns : true if and only if this triangle is a right triangle.

  //---------------------------------------------------------------

  boolean isRight()

  {

      double square1 = side1*side1;

      double square2 = side2*side2;

      double square3 = side3*side3;

      if ((square1 == square2 + square3) ||

          (square2 == square1 + square3) ||

          (square3 == square1 + square2))

          return true;

      else

          return false;

  }

  // isValid

  // returns : true if and only if this triangle is a valid triangle.

  boolean isValid()

  {

      if ((side1 + side2 < side3) ||

          (side1 + side3 < side2) ||

          (side2 + side3 < side1))

          return false;

      else

          return true;

  }

  // isEquilateral

  //

  // returns : true if and only if all three sides of this triangle

  // are of the same length.

  boolean isEquilateral()

  {

      if (side1 == side2 && side2 == side3)

          return true;

      else

          return false;

  }

  // isIsosceles

  //

  // returns : true if and only if exactly two sides of this triangle

  // has the same length.

  boolean isIsosceles()

  {

      if ((side1 == side2 && side2 != side3) ||

          (side1 == side3 && side2 != side3) ||

          (side2 == side3 && side1 != side3))

          return true;

      else

          return false;

  }

  // isIsosceles

  // returns : true if and only if exactly no two sides of this

  // triangle has the same length.

  boolean isScalene()

  {

      if (side1 == side2 || side2 == side3 || side1 == side3)

          return false;

      else

          return true;

  }

}

//-------------------------------------------------------------------

// class Application

//

// This class is the main class of this application. It prompts

// the user for input to construct a triangle, then prints out

// the special properties of the triangle.

//-------------------------------------------------------------------

public class Application

{

  //---------------------------------------------------------------

  // getInput

  //

  // input : stdin - BufferedReader to read input from

  //         msg - message to prompt the user with

  // returns : a double value input by user, guranteed to be

  //           greater than zero.

  //---------------------------------------------------------------

  private static double getInput(BufferedReader stdin, String msg)

      throws IOException

  {

      System.out.print(msg);

      double input = Double.valueOf(stdin.readLine()).doubleValue();

      while (input <= 0) {

          System.out.println("ERROR : length of the side of triangle must " +

              "be a positive number.");

          System.out.print(msg);

          input = Double.valueOf(stdin.readLine()).doubleValue();

      }

      return input;

  }

  //---------------------------------------------------------------

  // printProperties

  //

  // input : triangle - a Triangle object

  // print out the properties of this triangle.

  //---------------------------------------------------------------

  private static void printProperties(Triangle triangle)

  {

      // We first check if this is a valid triangle. If not

      // we simply returns.

      if (!triangle.isValid()) {

          System.out.println("This is not a valid triangle.");

          return;

      }

      // Check for right/equilateral/isosceles/scalene triangles

      // Note that a triangle can be both right triangle and isosceles

      // or both right triangle and scalene.

     

      if (triangle.isRight())

          System.out.println("This is a right triangle.");

      if (triangle.isEquilateral())

          System.out.println("This is an equilateral triangle.");

      else if (triangle.isIsosceles())

          System.out.println("This is an isosceles triangle.");

      else

          // we do not need to call isScalene here because a triangle

          // is either equilateral/isosceles or scalene.

          System.out.println("This is an scalene triangle.");

  }

  // main

  // Get the length of the sides of a triangle from user, then

  // print out the properties of the triangle.

  public static void main(String args[]) throws IOException

  {

      BufferedReader stdin = new BufferedReader

          (new InputStreamReader(System.in));

      double side1 = getInput(stdin,

          "What is the length of the first side of your triangle? ");

      double side2 = getInput(stdin,

          "What is the length of the second side of your triangle? ");

      double side3 = getInput(stdin,

          "What is the length of the third side of your triangle? ");

      System.out.print("Pondering...\n");

      printProperties(new Triangle(side1, side2, side3));

  }

}


Related Questions

Write a program that accepts any number of homework scores ranging in value from 0 through 10. Prompt the user for a new value if they enter an alphabetic character. Store the values in array. Calculate the average excluding the lowest and highest scores. Display the average as well as the highest and lowest score that were discarded.

Answers

Answer:

This program is written in C++

Note that the average is calculated without the highest and the least value.

Comments are used for explanatory purpose

See attachment for .cpp file.

Program starts here

#include<iostream>

using namespace std;

int main()

{

int num;

cout<<"Enter Number of Test [0-10]: ";

//cin>>num;

while(!(cin>>num) || num > 10|| num<0)

{

cout << "That was invalid. Enter a valid digit: "<<endl;

cin.clear(); // reset the failed input

cin.ignore(123,'\n');//Discard previous input

}

//Declare scores

int scores[num];

//Accept Input

for(int i =0;i<num;i++)

{

cout<<"Enter Test Score "<<(i+1)<<": ";

cin>>scores[i];

}

           //Determine highest

           int max = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] > max)

               {

                   max = scores[i];

               }

           }

           //Determine Lowest

           int least = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] < least)

               {

                   least = scores[i];

               }

           }

           int sum = 0;

           //Calculate total

           for(int i =0; i< num;i++)

           {

               sum += scores[i];

           }

           //Subtract highest and least values

           sum = sum - least - max;

           //Calculate average

           double average = sum / (num - 2);

           //Print Average

           cout<<"Average = "<<average<<endl;

           //Print Highest

           cout<<"Highest = "<<max<<endl;

           //Print Lowest

           cout<<"Lowest = "<<least;

return 0;  

}

Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, and distribute his work, but he would still like to retain his copyright on the content. What type of license should he u for his book?

Answers

Answer:

The correct answer will be "Project Gutenberg".

Explanation:

Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.

So that the above is the right answer.

In the lab, you defined the information systems security responsibility for each of the seven domains of a typical IT infrastructure. In which domain would you be most likely to secure access through the Internet and from employees’ homes?

Answers

Answer:

Remote Access Domain

Explanation:

Remote access Domain allows users to enter into system network through VPN.

A laptop computer has two internal signals: An unplugged signal, which is '1' if the laptop's power supply is connected, and '0' otherwise. A low battery signal, which is '0' if the laptop's battery has reached an almost empty state, and '1' otherwise. Suppose the laptop's power control system accepts a single hibernate signal which determines if the laptop should change its current operating state and shut down. If the laptop should shut down when the battery is low and its charger is unplugged, which gate could be used to produce the hibernate signal?

Answers

Answer:

The correct usage is a NOR gate which is indicated in the explanation.

Explanation:

The truth table for the given two signals, namely

p=unplugged signal

q=low battery signal

can  form a truth table of following form

Here p has 2 states

1 if the power supply is connected

0 otherwise

Similarly q has 2 states

0 if the battery has reached almost zero state

1 otherwise

As the condition for the Hibernate Signal is given as to only activate when the battery is low and the power supply is not connected. This indicate that the value of Hibernate signal should be 1 when both p and q are 0.

Using this condition, the truth table is formed as

unplugged signal | low battery signal |  Hibernate Signal

            0               |                 0             |             1

            0               |                 1              |             0

            1                |                 0             |             0

            1                |                 1              |             0

Now the truth table of NOR is given as

a    |     b    |  a or b   |   ~(a or b)

0    |     0    |      0      |        1

0    |     1     |      1       |        0

1     |     0    |      1       |        0

1     |     1     |      1       |        0

This indicates that the both truth tables are same thus the NOR gate is to be used for this purpose.

Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeople receive $200 per week plus 9% of their gross sales for that week. For example, a salesperson who grosses $5,000 in sales in a week receives $200 plus 9% of $5,000, or a total of $650. Write an app (using an array of counters) that determines how many of the salespeople earned salaries in each of the following ranges (assume that each salesperson's salary is an integer). a) $200–299
b) $300–399
c) $400–499
d) $500–599
e) $600–699
f) $700–799
g) $800–899
h) $900–999
i) $1000 and over
Summarize the results in tabular format.

Answers

Answer: Provided in the explanation section

Explanation:

import java.util.Scanner;

public class commission

{

   public static void main(String[] args) {

      Scanner input = new Scanner(System.in);

        int totals[]={0,0,0,0,0,0,0,0,0};          

      int n,sales,i,index;

       double salary;

        System.out.print("how many salesmen do you have? ");                          

      n=input.nextInt();

        for(i=1;i<=n;i++)

           {System.out.print("Salesman "+i+" enter sales: ");

            sales=input.nextInt();

            salary=200+(int)(.09*sales);

               System.out.printf("Salary=$%.2f\n",salary);

            index=(int)salary/100-2;

            if(index>8)

                index=8;

            totals[index]++;

            }

        System.out.println("SUMMARY\nSALES\t\tCOUNT");

        for(i=0;i<8;i++)

           System.out.println("$"+(i*100+200)+"-"+(i*100+299)+"\t"+totals[i]);

        System.out.println("$1000 and over\t"+totals[i]);

       }                                

   }

 

cheers i  hope this helped !!      

Write a program that asks the user to enter either an "African" or a "European" swallow. The programâs behaviour should mimic the program below. If the user enters something øther than "African" or "European", the program shøuld insult the user like the example below.

Sample Output #1:

What kind of swallow?
African
Yes, it could grip it by the husk.

Sample Output #2:

What kind of swallow?
European
A five-ounce bird could not carry a one-pound coconut.

Sample Output #3:

What kind of swallow?
Spanish
You really are not fit to be a king.

Answers

Answer:

The programming language is not stater; However, I'll answer this question using C++.

This program does not use comments (See explanation)

See Attachment for program file

Program starts here

#include <iostream>

using namespace std;

int main()

{

string response;

cout<<"What kind of swallow?\n";

cin>>response;

for(int i =0; i<response.length();i++)

{

 response[i]=toupper(response[i]);

}

   if(response == "AFRICAN")

   {

    cout<<"Yes, it could grip it by the husk.";

}

else if(response == "EUROPEAN")

   {

    cout<<"A five-ounce bird could not carry a one-pound coconut.";

}

else

{

 cout<<"You really are not fit to be a king.";

}

   return 0;

}

Explanation:

string response; -> A string variable to hold user input is declared

cout<<"What kind of swallow?\n"; -> prompts user for input

cin>>response; -> user input is stored here

The following iteration converts user input to uppercase; so that the program will work for inputs like African, AFRICAN, AFriCAN, etc.

for(int i =0; i<response.length();i++)

{

 response[i]=toupper(response[i]);

}

The following if statement prints "Yes, it could grip it by the husk." if user input is AFRICAN

   if(response == "AFRICAN")

   {

    cout<<"Yes, it could grip it by the husk.";

}

Otherwise, if user input is EUROPEAN, it prints; "A five-ounce bird could not carry a one-pound coconut."

else if(response == "EUROPEAN")

   {

    cout<<"A five-ounce bird could not carry a one-pound coconut.";

}

Lastly; for every inputs different from AFRICAN and EUROPEAN, the program displays "You really are not fit to be a king."

else

{

 cout<<"You really are not fit to be a king.";

}

Convert 2910 to binary, hexadecimal and octal. Convert 5810 to binary, hexadecimal and octal. Convert E316 to binary, decimal and octal. Convert 5916 to binary, decimal and octal. Convert 010010102 to decimal, octal and hexadecimal. Convert 001010102 to decimal, octal and hexadecimal. Convert 438 to binary, decimal and hexadecimal. Convert 618 to binary, decimal and hexadecimal.

Answers

Answer:

2910 to binary = 101101011110

2910 to hexadecimal = B5E

2910 to octal = 5536

E316 to binary = 1110001100010110

E316 to octal = 161426

E316 to decimal = 58134

5916 to binary = 101100100010110

5916 to decimal = 22806

5916 to octal = 54426

010010102 to decimal = 149

010010102 to octal = 225

010010102 to hexadecimal = 95

FOR 438 and 618, 8 is not a valid digit for octal..

Universal Containers (UC) is currently live with Sales Cloud and in the process of implementing Service Cloud. UC wants to create a sandbox to test its Service Cloud implementation with real Sales Cloud data. Which three Sandbox types can be used to accomplish this? Choose 3 answersA. Administrator SandboxB. Partial Copy SandboxC. Full SandboxD. Developer k Pro SandboxE. Test Sandbox

Answers

Answer:

B. Partial Copy Sandbox

C. Full Sandbox

D. Developer k Pro Sandbox

Explanation:

In this scenario Universal containers wants to implement a service cloud and test with real Sales Cloud data.

Service cloud is defined a system that allows automation of various customer service functions. It can listen to customers via different social media platforms and direct customers to agents that can solve their problems.

Sandbox is a testing environment that is isolated and allows for running of programs without affecting the application.

To test service cloud implementation with real data we use the following 3 sandboxes:

- Partial copy sandbox: copies only relevant data to test configurations with real data.

- Full Sandbox: makes a replica of data by copying all data such as attachments, metadata, and object records.

- Developer K pro sandbox: is used by developers to test software in an isolated environment and can use large data sets. It includes configuration data (metadata)

Which of the following meanings of the plus sign, +, are built-in to the language (and/or standard libraries or classes that we have been using with the language)?
A. Numeric subtraction
B. Numeric addition
C. string concatenation
D. The logical "or" operation

Answers

Answer:

Numeric Addition

Explanation:

Literally, the + sign is an arithmetic operator used to perform addition operation between numeric datatypes (integer, float, decimal, double, long integer, etc...)

Its default built in function of the plus is sign is to add variables, constants and/or expressions.

The plus sign is used as follows;

a = 5;

b = 3;

c = a + b

-------------

a + b = 5 + 3 = 8

8 will be saved in variable c. This is only possible using the plus sign.

The plus sign also has other function such as string concatenation but this function is language dependent (i.e. some programming languages do not use + for string concatenation).

Conclusively, the built in function of the plus sign is for numeric addition

Which of the following is true about operating system.

a. acts as an intermediary between the computer user and the computer hardware.
b. program that manages the computer hardware.
c. provides a basis for application progra

Answers

Answer:

google kis kam ka hai us se puch lo

Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not following that format is incorrect and should be ignored. Use the substring() method to parse the string and extract the date. The input ends with -1 on a line alone. Output each correct date as: 3/1/1990.
Ex: If the input is:
March 1, 1990
April 2 1995
7/15/20
December 13, 2003
-1
then the output is:
3/1/1990
12/13/2003
Given Code:
import java.util.Scanner;
public class DateParser {
public static int getMonthAsInt(String monthString) {
int monthInt;
// Java switch/case statement
switch (monthString) {
case "January":
monthInt = 01;
break;
case "February":
monthInt = 02;
break;
case "March":
monthInt = 03;
break;
case "April":
monthInt = 04;
break;
case "May":
monthInt = 05;
break;
case "June":
monthInt = 06;
break;
case "July":
monthInt = 07;
break;
case "August":
monthInt = 8;
break;
case "September":
monthInt = 9;
break;
case "October":
monthInt = 10;
break;
case "November":
monthInt = 11;
break;
case "December":
monthInt = 12;
break;
default:
monthInt = 00;
}
return monthInt;
}
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
// TODO: Read dates from input, parse the dates to find the one
// in the correct format, and output in mm/dd/yyyy format

}
}

Answers

Using the knowledge in computational language in C++ it is possible to write a code that complete main() to read dates from input, one date per line

Writting the code:

#include <iostream>

#include <string>

using namespace std;

int DateParser(string month) {

  int monthInt = 0;

 

  if (month == "January")

      monthInt = 1;

  else if (month == "February")

      monthInt = 2;

  else if (month == "March")

      monthInt = 3;

  else if (month == "April")

      monthInt = 4;

  else if (month == "May")

      monthInt = 5;

  else if (month == "June")

      monthInt = 6;

  else if (month == "July")

      monthInt = 7;

  else if (month == "August")

      monthInt = 8;

  else if (month == "September")

      monthInt = 9;

  else if (month == "October")

      monthInt = 10;

  else if (month == "November")

      monthInt = 11;

  else if (month == "December")

      monthInt = 12;

  return monthInt;

}

int main ()

{

 

  // TODO: Read dates from input, parse the dates to find the one

  // in the correct format, and output in m/d/yyyy format

  while(1)

  {

   //declaring the required variables

  int monthInt,dayInt,yearInt;string input;

  //receive the input string frim the user

  getline(cin,input);

  //if the input is -1 then quit

  if(input=="-1")

    break;

  //else try to process the input

  try

  {

  //find and extract the month name and parse it to monthInt

  monthInt=DateParser(input.substr(0,input.find(' ')));

  //find and extract the day and parse it to dayInt

  dayInt=stoi(input.substr(input.find(' '),input.find(", ")));

  //find and extract the year and parse it to yearInt

  yearInt=stoi(input.substr(input.find(", ")+1,input.length()));

  //display the output

  cout<<monthInt<<"/"<<dayInt<<"/"<<yearInt<<endl;

  }

  //catch if any of the exceptions happens

  catch(exception& e){}

  }

}

See more about C++ at brainly.com/question/19705654

#SPJ1

Given: The following if statement uses an overloaded > operator to determine whether the price of a Car object is more than $5000. Car is a struct and myCar is an object of Car. Each Car object has two variables: id (int) and price (float). As you can see in the following code, the ID of myCar is 12345 and the price is $6,000.
Car myCar = {12345, 6000.};
float price = 5000;
if (myCar > price)
cout << "My car price is more than $5,000.\n";
Which one of the following function prototypes is correct syntax to overload the > operator based on the if statement above.
a. void operator>(float price);
b. bool operator>(Car& car, float price);
c. bool operator >(float amt);
d. bool operator>(Car& yourCar);
e. none of the above

Answers

Answer:

Option(c) is the correct answer to the given question.

Explanation:

In the given question car is the structure and mycar is the instance or the object of the class also the object mycar holds two variables of type integer and the one float variable .

Following are the syntax of operator overload in C++ programming language

return -type operator operator-symbol(datatype variable name )

Now according to the question the option(c) follows the correct syntax of operator overload

All the other option do not follow the correct prototype that's why these are incorrect option .

Mikayla wants to create a slide with a photograph of a car and the car horn sounding when a user clicks on the car. Which
feature should she use, and why?
a. She should use the Action feature because it allows a user to embed a hyperlink for an Internet video on the car.
b. She should use the Video from Website feature because it allows a user to embed a hyperlink for an Internet video on the car.
c. She should use the Action feature because it allows a user to place an image map with a hotspot on the car.
d. She should use the Video from Website feature because it allows a user to place an image map with a hotspot on the car.

Answers

Answer: A

Explanation: edge :)

Answer:

C

Explanation:

Computers in a LAN are configured to use a symmetric key cipher within the LAN to avoid hardware address spoofing. This means that each computer share a different key with every other computer in the LAN. If there are 100 computers in this LAN, each computer must have at least:

a. 100 cipher keys
b. 99 cipher keys
c. 4950 cipher keys
d. 100000 cipher keys

Answers

Answer:

The correct answer is option (c) 4950 cipher keys

Explanation:

Solution

Given that:

From the given question we have that if there are 100 computers in a LAN, then each computer should have how many keys.

Now,

The number of computers available = 100

The number of keys used in  symmetric key cipher for N parties is given as follows:

= N(N-1)/2

= 100 * (100 -1)/2

= 50 * 99

= 4950 cipher keys

is brainly down? Cant search anything

Answers

You need to have WIFI

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

Answers

Answer: provided in the explanation section

Explanation:

The question says:

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

The Answer:

multi-segment executable file template. data segment ; add your data here! pkey db "press any key...$" ends stack segment dw 128 dup(0) ends code segment start: ; set segment registers: mov ax, data mov ds, ax mov es, ax ; add your code here mov cx,4 input: mov ah,1 int 21h push ax loop input mov dx,13d mov ah,2 int 21h mov dx,10d mov ah,2 int 21h mov cx,4 output: pop bx mov dl,bl mov ah,2 int 21h loop output exit: lea dx, pkey mov ah, 9 int 21h ; output string at ds:dx ; wait for any key....

mov ah, 1 int 21h mov ax, 4c00h ; exit to operating system. int 21h ends end start ;

set entry point and stop the assembler.

Cheers I hope this helps!!!

Managers can use __ software to discuss financial performance with the help of slides and charts

Answers

Answer:

presentation

Explanation:

Software like Google Slides and Microsoft Powerpoint can be utilized to present financial performances through the use of slides and charts.

Which of the following does Google use to display the characters of the page’s meta title?

Answers

Explanation:

search engine because it helps to search find what you are expecting to search in the google.

Anyone help pls ? Complete the code below to add css to make the background of the web page orange.
< html>

Answers

Answer:

In HTML file

<body style="background-color:orange;">

Or

In CSS file

body {

background-color: orange;

}

Which of the following is NOT a type of software?
O a database system
O Skype
O Microsoft PowerPoint
O an output device
Previous
Noyt

Answers

Answer:

Output device

Explanation:

Im pretty sure that correct

CASE II AziTech is considering the design of a new CPU for its new model of computer systems for 2021. It is considering choosing between two (2) CPU (CPUA and CPUB) implementations based on their performance. Both CPU are expected to have the same instruction set architecture. CPUA has a clock cycle time of 60 ns and CPUB has a clock cycle time of 75 ns. The same number of a particular instruction type is expected to be executed on both CPUs in order to determine which CPU would executes more instructions. CPUA is able to execute 2MB of instructions in 5*106 clock cycles. CPUB executes the same number of instructions in 3*106 clock cycles. a) Using the MIPS performance metric, which of the two (2) CPU should be selected to be implemented in the new computer system. Justify your choice. b) Compute the execution time for both CPUs. Which CPU is faster?

Answers

Answer:

(a)The CPU B should be  selected for the new computer as it has a low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A.

(b) The CPU B is faster because it executes the same number of instruction in a lesser time than the CPU A .

Explanation:

Solution

(a)With regards to  the MIPS performance metric the CPU B should be chosen for the new computer as it low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A and when we look at the amount of process done by the system , the CPU B is faster when compared to other CPU and carries out same number of instruction in time.

The metric of response time for CPU B is lower than the CPU A and it has advantage over the other CPU and it has better amount as compared to CPU A, as CPU B is carrying out more execution is particular amount of time.

(b) The execution can be computed as follows:

Clock cycles taken for a program to finish * increased by the clock cycle time = the Clock cycles for a program * Clock cycle time

Thus

CPU A= 5*10^6 * 60*10^-9 →300*10^-3 →0.3 second (1 nano seconds =10^-9 second)

CPU B= 3 *10^6 * 75*10^-9 → 225*10^-3 → 0.225 second

Therefore,The CPU B is faster as it is executing the same number of instruction in a lesser time than the CPU A

The common field cricket chirps in direct proportion to the current tem­perature. Adding 40 to the number of times a cricket chirps in a minute, then dividing by 4, gives us the temperature (in Fahrenheit degrees). Write a program that accepts as input the number of cricket chirps in fifteen seconds, then outputs the current temperature

Answers

Answer:

This program is written in Java programming language;

First, you should understand that:

The formula given in the question implies that the current temperature can only be calculated using measurement of time in minutes;

Given that the number of chirps is directly proportional to the temperature.

If the cricket made n chirps in 15 seconds, it will make n * (60/15) chirps in 1 minutes;

n * (60/15) = n * 4

Base on this analysis, the program is as follows

import java.util.*;

public class cricket

{

public static void main(String []args)

{

 //Declare number of chips in 1 minutes

 int num;

 Scanner input = new Scanner(System.in);

 //Prompt user for input

 System.out.print("Number of chirps (in 15 seconds): ");

 num = input.nextInt();

 //Calculate temperature  (multiply temperature by 4 to get number of chirps in minutes

 double temp = (num * 4+ 40)/4;

 //Print temperature

 System.out.print("Current Temperature = "+temp+" F");

}

}

Write a calling statement for the following code segment in Java: public static int sum(int num1, int num2, String name) { int result = num1 + num2; System.out.println("Hi " + name + ", the two numbers you gave me are: " + num1 + " " + num2); return result; } Function Integer sum(Integer num1, Integer num2, String name) Integer result = num1 + num2 Display "Hi " + name + ", the two numbers you gave me are: ", num1, " ", num2 Return result End Function Write a calling statement to the function in Java or Pseudocode. You may use any value of appropriate data samples to demonstrate your understanding.

Answers

Answer:

Following are the calling of the given question

public static void main(String[] args) // main function

{

int store; // variable declaration

store = sum(32,15,"san"); // Calling of sum()

System.out.println(" TheValue returned by sum() : "+store); // display

}

Explanation:

Following are the description of the above statement

Here is the name of function is sum() In the sum() function definition there are 3 parameter in there signature i.e  two "int" type and 1 is "string" type .In the main function we declared the variable store i,e is used for storing the result of sum() it means it storing the result of value that is returning from the definition of sum() function .After that calling the function by there name and passing three parameter under it  sum(32,15,"san"); and store in the "store" variable.Finally print the value by using system.out.println ().

Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a pre-ventive control. a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. ( The user subsequently codes this information onto a magnetic coding device and places this strip on a piece of cardboard.) b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled. c. Because of occasional noise on a transmission line, data being transferred is lost or garbled. d. An intruder is temporarily delaying important strategic messages over the telecommunications lines. e. An intruder is altering electronic messages before the user receives them.

Answers

Answer: seen below

Explanation:

There are various solution or ways to go about this actually. In the end, curtailing this is what matters in the end.

Below i have briefly highlighted a few precise way some of this problems can be solved, other options are open for deliberation.

A. Digital encoding of information with the calculation being changed occasionally, particularly after the frameworks advisors have finished their employments, and the framework is being used.

Which can also mean; The money could be withdrawn form the ATM. preventive Control is password to be changed periodically and regularly.

B. Noise on the line might be causing line blunders, which can bring about information misfortune. Reverberation checks and equality checks can assist with recognizing and right such mistakes.

C. If information is being lost, reverberation checks and equality checks ought to likewise help; notwithstanding, the issue might be that an intruder is blocking messages and altering them. Message arrangement numbering will assist with deciding whether messages are being lost, and in the event that they are maybe a solicitation reaction strategy ought to be executed that makes it hard for gatecrashers to dodge.

D. In the event that messages are being postponed, a significant client request or other data could be missed. As in thing c, message arrangement numbering and solicitation reaction methods ought to be utilized.

E. Messages modified by intruders can have an extremely negative effect on client provider relations if orders are being changed. For this situation, information encryption is important to keep the gatecrasher from perusing and changing the information. Additionally, a message succession numbering strategy is important to ensure the message isn't erased.

cheers i hope this was helpful !!

Assume passwords are selected from four character combinations of 26 lower case alphabetic characters. Assume an adversary is able to attempt passwords at a rate of 1 per second. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password

Answers

Answer:

Given:

Passwords are selected from 4 characters.

Character combinations are 26 lower case alphabetic characters.

Passwords attempts by adversary is at rate of 1 second.

To find:

Expected time to discover the correct password

Explanation:

Solution:

4 character combinations of 26 alphabetic characters at the rate of one attempt at every 1 second = 26 * 4 = 104

So 104 seconds is the time to discover the correct password. However this is the worst case scenario when adversary has to go through every possible combination. An average time or expected time to discover the correct password is:

13 * 4 = 52

You can also write it as 104 / 2 = 52 to discover the correct password. This is when at least half of the password attempts seem to be correct.

The degree of a point in a triangulation is the number of edges incident to it. Give an example of a set of n points in the plane such that, no matter how the set is triangulated, there is always a point whose degree is n−1.

Answers

Answer:

squarepentagon

Explanation:

The vertices of a square is one such set of points. Either diagonal will bring the degree of the points involved to 3 = 4-1.

The vertices of a regular pentagon is another such set of points. After joining the points in a convex hull, any interior connection will create a triangle and a quadrilateral. The diagonal of the quadrilateral will bring the degree of at least one of the points to 4 = 5-1.

In this challenge you will use the file regex_replace_challenge_student.py to:
Write a regular expression that will replace all occurrences of:
regular-expression
regular:expression
regular&expression
In the string: This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression
Assign the regular expression to a variable named pattern
Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results
Regular Expression Replace Challenge
The Python statement containing the string to search for the regular expression occurrence is below. search_string=’’’This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression’’’
Write a regular expression that will find all occurrences of:
a. regular expression
b. regular-expression
c. regular:expression
d. regular&expression in search_string
Assign the regular expression to a variable named pattern
The Python string below is used for substitution substitution="regular expression"
Using the sub() method from the re package substitute all occurrences of the ‘pattern’ with ‘substitution’
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results
import re
#The string to search for the regular expression occurrence (This is provided to the student)
search_string='''This is a string to search for a regular expression like regular expression or
regular-expression or regular:expression or regular&expression'''
#1. Write a regular expression that will find all occurrances of:
# a. regular expression
# b. regular-expression
# c. regular:expression
# d. regular&expression
# in search_string
#2. Assign the regular expression to a variable named pattern
#The string to use for subsitution (This is provided to the student)
substitution="regular expression"
#3. Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
#4. Assign the outcome of the sub() method to a variable called replace_result
#5. Output to the console replace_results

Answers

Answer:

Please follow the code indentation for the python program.

Explanation:

Write a program that reads integers start and stop from the user, then calculates and prints the sum of the cubes (=> **3) of each integer ranging from start to stop, inclusive. "Inclusive" means that both the values start and stop are included.

Answers

Answer:

This program is written in python programming language

Comments are used for explanatory purpose;

Take note of indentations(See Attachment)

Program starts here

#Initialize Sum to 0

sum = 0

#Prompt user for start value

start= int(input("Start Value: "))

#Prompt user for stop value

stop= int(input("Stop Value: "))

#Check if start is less than stop

if(start<=stop):

       #Iterate from start to stop

       for i in range(start, stop+1, 1):

              sum+=i**3

else:

print("Start must be less than or equal to Stop")

#Display Result

print("Expected Output: ",sum)

#End of Program

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) _________.
A. Risk
B. Attack
C. Asset
D. Vulnerability

Answers

Answer:

Option B: Attack

Explanation:

A security attack is an act to access to a system without a legit authorization. Usually the aim is to steal confidential info from the system or control the system by manipulating the data stored in the system. Some attacks are also aimed to disable the operation of the hacked system. Nowadays, there are several common types of security attacks which include

phishingransomwaredenial of servicemain in the middleSQL injectionmalware

Suppose that the following two classes have been declared public class Car f public void m1) System.out.println("car 1"; public void m2) System.out.println("car 2"); public String toString) f return "vroom"; public class Truck extends Car public void m1) t System.out.println("truck 1"); public void m2) t super.m1); public String toString) t return super.toString) super.toString ); Write a class MonsterTruck whose methods have the behavior below. Don't just print/return the output; whenever possible, use inheritance to reuse behavior from the superclass Methog Output/Return monster 1 truck1 car 1 m2 toString "monster vroomvroom'" Type your solution here:

Answers

Answer: provided in the explanation section

Explanation:

// code to copy

Car.java

public class Car {

 

  public void m1()

  {

  System.out.println("car 1");

}

 

  public void m2() {

      System.out.println("car 2");

}

 

  public String toString()

  {

  return "vroom";

}

 

}

Truck.java

public class Truck extends Car{

 

  public void m1()

  {

  System.out.println("truck 1");

  }

 

  public void m2()

  {

  super.m1();

  }

 

  public String toString()

  {

      return super.toString() + super.toString();

  }

}

MonsterTruck​​​​​​​.java

public class MonsterTruck extends Truck

{

  public void m1() {

System.out.println("monster 1");

}

 

public void m2() {

super.m1();

super.m2();

}

 

public String toString() {

return "monster " + super.toString();

}

public static void main(String[] args) {

  MonsterTruck mt=new MonsterTruck();

  mt.m1();

  mt.m2();

  System.out.println(mt);

}

}

cheers i hope this helped !!!

Other Questions
HELP ME PLEASEEEEEEEEE Journal entry worksheet The company has 15 employees, who earn a total of $1,600 in salaries each working day. They are paid each Monday for their work in the five-day workweek ending on the previous Friday. Assume that December 31, 2019, is a Tuesday, and all 15 employees worked the first two days of that week. Because New Years Day is a paid holiday, they will be paid salaries for five full days on Monday, January 6, 2020.Transaction General Journal Debit Credit The Office Supplies account started the year with a $3,500 balance. During 2019, the company purchased supplies for $14,455, which was added to the Office Supplies account. The inventory of supplies available at December 31, 2019, totaled $3,080. Transaction General Journal Debit Credit Record the adjusting entry related to the company's insurance.Transaction General Journal Debit Credit Hallie can use the equation p = 4l + 4w + 4h to determine the sum of the lengths of the edges of a rectangular prism. She begins to solve the equation for h but runs out of time. Her partial work is shown below:p = 4l + 4w + 4h = l + w + hh = Which expression should follow the subtraction in Hallies equation? Multiply 6.7 x 104 times 4.8 x 106 by using scientific notation. Round your answer to one decimal place in scientific notation with no spaces. Identify the state(s) of matter that each property describes. Why are states called "laboratories of democracy"? The term comes from the nineteenth century, when state politics were more scientific than the machine politics of cities. Most new social policy ideas are tried by one or two states before being adopted by other states or by the federal government. The federal government experiments with policies by ordering the states to try them first. States are not bound by constitutions to a particular way of doing things, so they experiment. How would I learn English in the most efficient way? Where should I start? angles M and N are supplementary find angle M if angle N=27 Dry chemical hand warmers utilize the oxidation of iron to form iron oxide according to the following reaction: 4Fe(s)+3O2(g)2Fe2O3(s) Standard thermodynamic quantities for selected substances at 25 C Reactant or product Hf(kJ/mol) Fe(s) 0.0 O2(g) 0.0 Fe2O3(s) 824.2 Calculate Hrxn for this reaction. g A two-tailed test is one where: Select one: a. results in only one direction can lead to rejection of the null hypothesis b. negative sample means lead to rejection of the null hypothesis c. results in either of two directions can lead to rejection of the null hypothesis d. no results lead to the rejection of the null hypothesis which of the speakers words provide clues to the tone ? Charlemagne first came to power using which of the following tactics?1-He allied with his brother to defeat a rival leader.2-He asked the Pope to name him the Emperor of the West.3- He named himself Emperor of the West.4-He allied with the Lombards to overtake his brother. A rectangular frame has a diagonal with a length of 20 inches and a longer side with a length of 15 inchesWhich of the following is closest to the length of its shorter side?(1) 9.7 inches(3) 13.2 inches(2) 11.9 inches(4) 14.8 inches PLSS HELP ME FIND THE SURFACE AREA OF THE TRIANGULAR PRISM THXXSSSS AND HURRY PLS What are the limitations of the ski slope scenario as a real-life example? A 950.0 mL solution of potassium permanganate was made by dissolving 45.0 g KMnO4 in 750.0 mL of water. Assume water has a density of 1.00 g/mL. (Molar Mass for H = 1 , O = 16 , K= 39 , Mn= 55 ) The mole fraction of the solute = What is a participle? hi answer for this please [Please help]~granola bite contains 27 calories. Most of the calories come from c grams of carbohydrates. The rest come from other ingredients. One gram of carbohydrate contains 4 calories. The equation 4c + 5 = 27 represents the relationship between these quantities. What could the 5 represent in this situation? If there are a boys pulling a rubber with the same amount of force what will happen?