Answer:
Explanation:
import java.io.*;
class Triangle
{
private double side1, side2, side3; // the length of the sides of
// the triangle.
//---------------------------------------------------------------
// constructor
//
// input : the length of the three sides of the triangle.
//---------------------------------------------------------------
public Triangle(double side1, double side2, double side3)
{
this.side1 = side1;
this.side2 = side2;
this.side3 = side3;
}
//---------------------------------------------------------------
// isRight
//
// returns : true if and only if this triangle is a right triangle.
//---------------------------------------------------------------
boolean isRight()
{
double square1 = side1*side1;
double square2 = side2*side2;
double square3 = side3*side3;
if ((square1 == square2 + square3) ||
(square2 == square1 + square3) ||
(square3 == square1 + square2))
return true;
else
return false;
}
// isValid
// returns : true if and only if this triangle is a valid triangle.
boolean isValid()
{
if ((side1 + side2 < side3) ||
(side1 + side3 < side2) ||
(side2 + side3 < side1))
return false;
else
return true;
}
// isEquilateral
//
// returns : true if and only if all three sides of this triangle
// are of the same length.
boolean isEquilateral()
{
if (side1 == side2 && side2 == side3)
return true;
else
return false;
}
// isIsosceles
//
// returns : true if and only if exactly two sides of this triangle
// has the same length.
boolean isIsosceles()
{
if ((side1 == side2 && side2 != side3) ||
(side1 == side3 && side2 != side3) ||
(side2 == side3 && side1 != side3))
return true;
else
return false;
}
// isIsosceles
// returns : true if and only if exactly no two sides of this
// triangle has the same length.
boolean isScalene()
{
if (side1 == side2 || side2 == side3 || side1 == side3)
return false;
else
return true;
}
}
//-------------------------------------------------------------------
// class Application
//
// This class is the main class of this application. It prompts
// the user for input to construct a triangle, then prints out
// the special properties of the triangle.
//-------------------------------------------------------------------
public class Application
{
//---------------------------------------------------------------
// getInput
//
// input : stdin - BufferedReader to read input from
// msg - message to prompt the user with
// returns : a double value input by user, guranteed to be
// greater than zero.
//---------------------------------------------------------------
private static double getInput(BufferedReader stdin, String msg)
throws IOException
{
System.out.print(msg);
double input = Double.valueOf(stdin.readLine()).doubleValue();
while (input <= 0) {
System.out.println("ERROR : length of the side of triangle must " +
"be a positive number.");
System.out.print(msg);
input = Double.valueOf(stdin.readLine()).doubleValue();
}
return input;
}
//---------------------------------------------------------------
// printProperties
//
// input : triangle - a Triangle object
// print out the properties of this triangle.
//---------------------------------------------------------------
private static void printProperties(Triangle triangle)
{
// We first check if this is a valid triangle. If not
// we simply returns.
if (!triangle.isValid()) {
System.out.println("This is not a valid triangle.");
return;
}
// Check for right/equilateral/isosceles/scalene triangles
// Note that a triangle can be both right triangle and isosceles
// or both right triangle and scalene.
if (triangle.isRight())
System.out.println("This is a right triangle.");
if (triangle.isEquilateral())
System.out.println("This is an equilateral triangle.");
else if (triangle.isIsosceles())
System.out.println("This is an isosceles triangle.");
else
// we do not need to call isScalene here because a triangle
// is either equilateral/isosceles or scalene.
System.out.println("This is an scalene triangle.");
}
// main
// Get the length of the sides of a triangle from user, then
// print out the properties of the triangle.
public static void main(String args[]) throws IOException
{
BufferedReader stdin = new BufferedReader
(new InputStreamReader(System.in));
double side1 = getInput(stdin,
"What is the length of the first side of your triangle? ");
double side2 = getInput(stdin,
"What is the length of the second side of your triangle? ");
double side3 = getInput(stdin,
"What is the length of the third side of your triangle? ");
System.out.print("Pondering...\n");
printProperties(new Triangle(side1, side2, side3));
}
}
Write a program that accepts any number of homework scores ranging in value from 0 through 10. Prompt the user for a new value if they enter an alphabetic character. Store the values in array. Calculate the average excluding the lowest and highest scores. Display the average as well as the highest and lowest score that were discarded.
Answer:
This program is written in C++
Note that the average is calculated without the highest and the least value.
Comments are used for explanatory purpose
See attachment for .cpp file.
Program starts here
#include<iostream>
using namespace std;
int main()
{
int num;
cout<<"Enter Number of Test [0-10]: ";
//cin>>num;
while(!(cin>>num) || num > 10|| num<0)
{
cout << "That was invalid. Enter a valid digit: "<<endl;
cin.clear(); // reset the failed input
cin.ignore(123,'\n');//Discard previous input
}
//Declare scores
int scores[num];
//Accept Input
for(int i =0;i<num;i++)
{
cout<<"Enter Test Score "<<(i+1)<<": ";
cin>>scores[i];
}
//Determine highest
int max = scores[0];
for (int i = 1; i < num; i++)
{
if (scores[i] > max)
{
max = scores[i];
}
}
//Determine Lowest
int least = scores[0];
for (int i = 1; i < num; i++)
{
if (scores[i] < least)
{
least = scores[i];
}
}
int sum = 0;
//Calculate total
for(int i =0; i< num;i++)
{
sum += scores[i];
}
//Subtract highest and least values
sum = sum - least - max;
//Calculate average
double average = sum / (num - 2);
//Print Average
cout<<"Average = "<<average<<endl;
//Print Highest
cout<<"Highest = "<<max<<endl;
//Print Lowest
cout<<"Lowest = "<<least;
return 0;
}
Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, and distribute his work, but he would still like to retain his copyright on the content. What type of license should he u for his book?
Answer:
The correct answer will be "Project Gutenberg".
Explanation:
Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.So that the above is the right answer.
In the lab, you defined the information systems security responsibility for each of the seven domains of a typical IT infrastructure. In which domain would you be most likely to secure access through the Internet and from employees’ homes?
Answer:
Remote Access Domain
Explanation:
Remote access Domain allows users to enter into system network through VPN.
A laptop computer has two internal signals: An unplugged signal, which is '1' if the laptop's power supply is connected, and '0' otherwise. A low battery signal, which is '0' if the laptop's battery has reached an almost empty state, and '1' otherwise. Suppose the laptop's power control system accepts a single hibernate signal which determines if the laptop should change its current operating state and shut down. If the laptop should shut down when the battery is low and its charger is unplugged, which gate could be used to produce the hibernate signal?
Answer:
The correct usage is a NOR gate which is indicated in the explanation.
Explanation:
The truth table for the given two signals, namely
p=unplugged signal
q=low battery signal
can form a truth table of following form
Here p has 2 states
1 if the power supply is connected
0 otherwise
Similarly q has 2 states
0 if the battery has reached almost zero state
1 otherwise
As the condition for the Hibernate Signal is given as to only activate when the battery is low and the power supply is not connected. This indicate that the value of Hibernate signal should be 1 when both p and q are 0.
Using this condition, the truth table is formed as
unplugged signal | low battery signal | Hibernate Signal
0 | 0 | 1
0 | 1 | 0
1 | 0 | 0
1 | 1 | 0
Now the truth table of NOR is given as
a | b | a or b | ~(a or b)
0 | 0 | 0 | 1
0 | 1 | 1 | 0
1 | 0 | 1 | 0
1 | 1 | 1 | 0
This indicates that the both truth tables are same thus the NOR gate is to be used for this purpose.
Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeople receive $200 per week plus 9% of their gross sales for that week. For example, a salesperson who grosses $5,000 in sales in a week receives $200 plus 9% of $5,000, or a total of $650. Write an app (using an array of counters) that determines how many of the salespeople earned salaries in each of the following ranges (assume that each salesperson's salary is an integer). a) $200–299
b) $300–399
c) $400–499
d) $500–599
e) $600–699
f) $700–799
g) $800–899
h) $900–999
i) $1000 and over
Summarize the results in tabular format.
Answer: Provided in the explanation section
Explanation:
import java.util.Scanner;
public class commission
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int totals[]={0,0,0,0,0,0,0,0,0};
int n,sales,i,index;
double salary;
System.out.print("how many salesmen do you have? ");
n=input.nextInt();
for(i=1;i<=n;i++)
{System.out.print("Salesman "+i+" enter sales: ");
sales=input.nextInt();
salary=200+(int)(.09*sales);
System.out.printf("Salary=$%.2f\n",salary);
index=(int)salary/100-2;
if(index>8)
index=8;
totals[index]++;
}
System.out.println("SUMMARY\nSALES\t\tCOUNT");
for(i=0;i<8;i++)
System.out.println("$"+(i*100+200)+"-"+(i*100+299)+"\t"+totals[i]);
System.out.println("$1000 and over\t"+totals[i]);
}
}
cheers i hope this helped !!
Write a program that asks the user to enter either an "African" or a "European" swallow. The programâs behaviour should mimic the program below. If the user enters something øther than "African" or "European", the program shøuld insult the user like the example below.
Sample Output #1:
What kind of swallow?
African
Yes, it could grip it by the husk.
Sample Output #2:
What kind of swallow?
European
A five-ounce bird could not carry a one-pound coconut.
Sample Output #3:
What kind of swallow?
Spanish
You really are not fit to be a king.
Answer:
The programming language is not stater; However, I'll answer this question using C++.
This program does not use comments (See explanation)
See Attachment for program file
Program starts here
#include <iostream>
using namespace std;
int main()
{
string response;
cout<<"What kind of swallow?\n";
cin>>response;
for(int i =0; i<response.length();i++)
{
response[i]=toupper(response[i]);
}
if(response == "AFRICAN")
{
cout<<"Yes, it could grip it by the husk.";
}
else if(response == "EUROPEAN")
{
cout<<"A five-ounce bird could not carry a one-pound coconut.";
}
else
{
cout<<"You really are not fit to be a king.";
}
return 0;
}
Explanation:
string response; -> A string variable to hold user input is declared
cout<<"What kind of swallow?\n"; -> prompts user for input
cin>>response; -> user input is stored here
The following iteration converts user input to uppercase; so that the program will work for inputs like African, AFRICAN, AFriCAN, etc.
for(int i =0; i<response.length();i++)
{
response[i]=toupper(response[i]);
}
The following if statement prints "Yes, it could grip it by the husk." if user input is AFRICAN
if(response == "AFRICAN")
{
cout<<"Yes, it could grip it by the husk.";
}
Otherwise, if user input is EUROPEAN, it prints; "A five-ounce bird could not carry a one-pound coconut."
else if(response == "EUROPEAN")
{
cout<<"A five-ounce bird could not carry a one-pound coconut.";
}
Lastly; for every inputs different from AFRICAN and EUROPEAN, the program displays "You really are not fit to be a king."
else
{
cout<<"You really are not fit to be a king.";
}
Convert 2910 to binary, hexadecimal and octal. Convert 5810 to binary, hexadecimal and octal. Convert E316 to binary, decimal and octal. Convert 5916 to binary, decimal and octal. Convert 010010102 to decimal, octal and hexadecimal. Convert 001010102 to decimal, octal and hexadecimal. Convert 438 to binary, decimal and hexadecimal. Convert 618 to binary, decimal and hexadecimal.
Answer:
2910 to binary = 101101011110
2910 to hexadecimal = B5E
2910 to octal = 5536
E316 to binary = 1110001100010110
E316 to octal = 161426
E316 to decimal = 58134
5916 to binary = 101100100010110
5916 to decimal = 22806
5916 to octal = 54426
010010102 to decimal = 149
010010102 to octal = 225
010010102 to hexadecimal = 95
FOR 438 and 618, 8 is not a valid digit for octal..
Universal Containers (UC) is currently live with Sales Cloud and in the process of implementing Service Cloud. UC wants to create a sandbox to test its Service Cloud implementation with real Sales Cloud data. Which three Sandbox types can be used to accomplish this? Choose 3 answersA. Administrator SandboxB. Partial Copy SandboxC. Full SandboxD. Developer k Pro SandboxE. Test Sandbox
Answer:
B. Partial Copy Sandbox
C. Full Sandbox
D. Developer k Pro Sandbox
Explanation:
In this scenario Universal containers wants to implement a service cloud and test with real Sales Cloud data.
Service cloud is defined a system that allows automation of various customer service functions. It can listen to customers via different social media platforms and direct customers to agents that can solve their problems.
Sandbox is a testing environment that is isolated and allows for running of programs without affecting the application.
To test service cloud implementation with real data we use the following 3 sandboxes:
- Partial copy sandbox: copies only relevant data to test configurations with real data.
- Full Sandbox: makes a replica of data by copying all data such as attachments, metadata, and object records.
- Developer K pro sandbox: is used by developers to test software in an isolated environment and can use large data sets. It includes configuration data (metadata)
Which of the following meanings of the plus sign, +, are built-in to the language (and/or standard libraries or classes that we have been using with the language)?
A. Numeric subtraction
B. Numeric addition
C. string concatenation
D. The logical "or" operation
Answer:
Numeric Addition
Explanation:
Literally, the + sign is an arithmetic operator used to perform addition operation between numeric datatypes (integer, float, decimal, double, long integer, etc...)
Its default built in function of the plus is sign is to add variables, constants and/or expressions.
The plus sign is used as follows;
a = 5;
b = 3;
c = a + b
-------------
a + b = 5 + 3 = 8
8 will be saved in variable c. This is only possible using the plus sign.
The plus sign also has other function such as string concatenation but this function is language dependent (i.e. some programming languages do not use + for string concatenation).
Conclusively, the built in function of the plus sign is for numeric addition
Which of the following is true about operating system.
a. acts as an intermediary between the computer user and the computer hardware.
b. program that manages the computer hardware.
c. provides a basis for application progra
Answer:
google kis kam ka hai us se puch lo
Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not following that format is incorrect and should be ignored. Use the substring() method to parse the string and extract the date. The input ends with -1 on a line alone. Output each correct date as: 3/1/1990.
Ex: If the input is:
March 1, 1990
April 2 1995
7/15/20
December 13, 2003
-1
then the output is:
3/1/1990
12/13/2003
Given Code:
import java.util.Scanner;
public class DateParser {
public static int getMonthAsInt(String monthString) {
int monthInt;
// Java switch/case statement
switch (monthString) {
case "January":
monthInt = 01;
break;
case "February":
monthInt = 02;
break;
case "March":
monthInt = 03;
break;
case "April":
monthInt = 04;
break;
case "May":
monthInt = 05;
break;
case "June":
monthInt = 06;
break;
case "July":
monthInt = 07;
break;
case "August":
monthInt = 8;
break;
case "September":
monthInt = 9;
break;
case "October":
monthInt = 10;
break;
case "November":
monthInt = 11;
break;
case "December":
monthInt = 12;
break;
default:
monthInt = 00;
}
return monthInt;
}
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
// TODO: Read dates from input, parse the dates to find the one
// in the correct format, and output in mm/dd/yyyy format
}
}
Using the knowledge in computational language in C++ it is possible to write a code that complete main() to read dates from input, one date per line
Writting the code:#include <iostream>
#include <string>
using namespace std;
int DateParser(string month) {
int monthInt = 0;
if (month == "January")
monthInt = 1;
else if (month == "February")
monthInt = 2;
else if (month == "March")
monthInt = 3;
else if (month == "April")
monthInt = 4;
else if (month == "May")
monthInt = 5;
else if (month == "June")
monthInt = 6;
else if (month == "July")
monthInt = 7;
else if (month == "August")
monthInt = 8;
else if (month == "September")
monthInt = 9;
else if (month == "October")
monthInt = 10;
else if (month == "November")
monthInt = 11;
else if (month == "December")
monthInt = 12;
return monthInt;
}
int main ()
{
// TODO: Read dates from input, parse the dates to find the one
// in the correct format, and output in m/d/yyyy format
while(1)
{
//declaring the required variables
int monthInt,dayInt,yearInt;string input;
//receive the input string frim the user
getline(cin,input);
//if the input is -1 then quit
if(input=="-1")
break;
//else try to process the input
try
{
//find and extract the month name and parse it to monthInt
monthInt=DateParser(input.substr(0,input.find(' ')));
//find and extract the day and parse it to dayInt
dayInt=stoi(input.substr(input.find(' '),input.find(", ")));
//find and extract the year and parse it to yearInt
yearInt=stoi(input.substr(input.find(", ")+1,input.length()));
//display the output
cout<<monthInt<<"/"<<dayInt<<"/"<<yearInt<<endl;
}
//catch if any of the exceptions happens
catch(exception& e){}
}
}
See more about C++ at brainly.com/question/19705654
#SPJ1
Given: The following if statement uses an overloaded > operator to determine whether the price of a Car object is more than $5000. Car is a struct and myCar is an object of Car. Each Car object has two variables: id (int) and price (float). As you can see in the following code, the ID of myCar is 12345 and the price is $6,000.
Car myCar = {12345, 6000.};
float price = 5000;
if (myCar > price)
cout << "My car price is more than $5,000.\n";
Which one of the following function prototypes is correct syntax to overload the > operator based on the if statement above.
a. void operator>(float price);
b. bool operator>(Car& car, float price);
c. bool operator >(float amt);
d. bool operator>(Car& yourCar);
e. none of the above
Answer:
Option(c) is the correct answer to the given question.
Explanation:
In the given question car is the structure and mycar is the instance or the object of the class also the object mycar holds two variables of type integer and the one float variable .
Following are the syntax of operator overload in C++ programming language
return -type operator operator-symbol(datatype variable name )Now according to the question the option(c) follows the correct syntax of operator overload
All the other option do not follow the correct prototype that's why these are incorrect option .
Mikayla wants to create a slide with a photograph of a car and the car horn sounding when a user clicks on the car. Which
feature should she use, and why?
a. She should use the Action feature because it allows a user to embed a hyperlink for an Internet video on the car.
b. She should use the Video from Website feature because it allows a user to embed a hyperlink for an Internet video on the car.
c. She should use the Action feature because it allows a user to place an image map with a hotspot on the car.
d. She should use the Video from Website feature because it allows a user to place an image map with a hotspot on the car.
Answer: A
Explanation: edge :)
Answer:
C
Explanation:
Computers in a LAN are configured to use a symmetric key cipher within the LAN to avoid hardware address spoofing. This means that each computer share a different key with every other computer in the LAN. If there are 100 computers in this LAN, each computer must have at least:
a. 100 cipher keys
b. 99 cipher keys
c. 4950 cipher keys
d. 100000 cipher keys
Answer:
The correct answer is option (c) 4950 cipher keys
Explanation:
Solution
Given that:
From the given question we have that if there are 100 computers in a LAN, then each computer should have how many keys.
Now,
The number of computers available = 100
The number of keys used in symmetric key cipher for N parties is given as follows:
= N(N-1)/2
= 100 * (100 -1)/2
= 50 * 99
= 4950 cipher keys
is brainly down? Cant search anything
Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.
Answer: provided in the explanation section
Explanation:
The question says:
Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.
The Answer:
multi-segment executable file template. data segment ; add your data here! pkey db "press any key...$" ends stack segment dw 128 dup(0) ends code segment start: ; set segment registers: mov ax, data mov ds, ax mov es, ax ; add your code here mov cx,4 input: mov ah,1 int 21h push ax loop input mov dx,13d mov ah,2 int 21h mov dx,10d mov ah,2 int 21h mov cx,4 output: pop bx mov dl,bl mov ah,2 int 21h loop output exit: lea dx, pkey mov ah, 9 int 21h ; output string at ds:dx ; wait for any key....
mov ah, 1 int 21h mov ax, 4c00h ; exit to operating system. int 21h ends end start ;
set entry point and stop the assembler.
Cheers I hope this helps!!!
Managers can use __ software to discuss financial performance with the help of slides and charts
Answer:
presentation
Explanation:
Software like Google Slides and Microsoft Powerpoint can be utilized to present financial performances through the use of slides and charts.
Which of the following does Google use to display the characters of the page’s meta title?
Explanation:
search engine because it helps to search find what you are expecting to search in the google.
Anyone help pls ? Complete the code below to add css to make the background of the web page orange.
< html>
Answer:
In HTML file
<body style="background-color:orange;">
Or
In CSS file
body {
background-color: orange;
}
Which of the following is NOT a type of software?
O a database system
O Skype
O Microsoft PowerPoint
O an output device
Previous
Noyt
Answer:
Output device
Explanation:
Im pretty sure that correct
CASE II AziTech is considering the design of a new CPU for its new model of computer systems for 2021. It is considering choosing between two (2) CPU (CPUA and CPUB) implementations based on their performance. Both CPU are expected to have the same instruction set architecture. CPUA has a clock cycle time of 60 ns and CPUB has a clock cycle time of 75 ns. The same number of a particular instruction type is expected to be executed on both CPUs in order to determine which CPU would executes more instructions. CPUA is able to execute 2MB of instructions in 5*106 clock cycles. CPUB executes the same number of instructions in 3*106 clock cycles. a) Using the MIPS performance metric, which of the two (2) CPU should be selected to be implemented in the new computer system. Justify your choice. b) Compute the execution time for both CPUs. Which CPU is faster?
Answer:
(a)The CPU B should be selected for the new computer as it has a low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A.
(b) The CPU B is faster because it executes the same number of instruction in a lesser time than the CPU A .
Explanation:
Solution
(a)With regards to the MIPS performance metric the CPU B should be chosen for the new computer as it low clock cycle time which implies that it will implement the process or quicker when compared to the CPU A and when we look at the amount of process done by the system , the CPU B is faster when compared to other CPU and carries out same number of instruction in time.
The metric of response time for CPU B is lower than the CPU A and it has advantage over the other CPU and it has better amount as compared to CPU A, as CPU B is carrying out more execution is particular amount of time.
(b) The execution can be computed as follows:
Clock cycles taken for a program to finish * increased by the clock cycle time = the Clock cycles for a program * Clock cycle time
Thus
CPU A= 5*10^6 * 60*10^-9 →300*10^-3 →0.3 second (1 nano seconds =10^-9 second)
CPU B= 3 *10^6 * 75*10^-9 → 225*10^-3 → 0.225 second
Therefore,The CPU B is faster as it is executing the same number of instruction in a lesser time than the CPU A
The common field cricket chirps in direct proportion to the current temperature. Adding 40 to the number of times a cricket chirps in a minute, then dividing by 4, gives us the temperature (in Fahrenheit degrees). Write a program that accepts as input the number of cricket chirps in fifteen seconds, then outputs the current temperature
Answer:
This program is written in Java programming language;
First, you should understand that:
The formula given in the question implies that the current temperature can only be calculated using measurement of time in minutes;
Given that the number of chirps is directly proportional to the temperature.
If the cricket made n chirps in 15 seconds, it will make n * (60/15) chirps in 1 minutes;
n * (60/15) = n * 4
Base on this analysis, the program is as follows
import java.util.*;
public class cricket
{
public static void main(String []args)
{
//Declare number of chips in 1 minutes
int num;
Scanner input = new Scanner(System.in);
//Prompt user for input
System.out.print("Number of chirps (in 15 seconds): ");
num = input.nextInt();
//Calculate temperature (multiply temperature by 4 to get number of chirps in minutes
double temp = (num * 4+ 40)/4;
//Print temperature
System.out.print("Current Temperature = "+temp+" F");
}
}
Write a calling statement for the following code segment in Java: public static int sum(int num1, int num2, String name) { int result = num1 + num2; System.out.println("Hi " + name + ", the two numbers you gave me are: " + num1 + " " + num2); return result; } Function Integer sum(Integer num1, Integer num2, String name) Integer result = num1 + num2 Display "Hi " + name + ", the two numbers you gave me are: ", num1, " ", num2 Return result End Function Write a calling statement to the function in Java or Pseudocode. You may use any value of appropriate data samples to demonstrate your understanding.
Answer:
Following are the calling of the given question
public static void main(String[] args) // main function
{
int store; // variable declaration
store = sum(32,15,"san"); // Calling of sum()
System.out.println(" TheValue returned by sum() : "+store); // display
}
Explanation:
Following are the description of the above statement
Here is the name of function is sum() In the sum() function definition there are 3 parameter in there signature i.e two "int" type and 1 is "string" type .In the main function we declared the variable store i,e is used for storing the result of sum() it means it storing the result of value that is returning from the definition of sum() function .After that calling the function by there name and passing three parameter under it sum(32,15,"san"); and store in the "store" variable.Finally print the value by using system.out.println ().Chapter 15 Problem 6 PREVENTIVE CONTROLS Listed here are five scenarios. For each scenario, discuss the possible damages that can occur. Suggest a pre-ventive control. a. An intruder taps into a telecommunications device and retrieves the identifying codes and personal identification numbers for ATM cardholders. ( The user subsequently codes this information onto a magnetic coding device and places this strip on a piece of cardboard.) b. Because of occasional noise on a transmission line, electronic messages received are extremely garbled. c. Because of occasional noise on a transmission line, data being transferred is lost or garbled. d. An intruder is temporarily delaying important strategic messages over the telecommunications lines. e. An intruder is altering electronic messages before the user receives them.
Answer: seen below
Explanation:
There are various solution or ways to go about this actually. In the end, curtailing this is what matters in the end.
Below i have briefly highlighted a few precise way some of this problems can be solved, other options are open for deliberation.
A. Digital encoding of information with the calculation being changed occasionally, particularly after the frameworks advisors have finished their employments, and the framework is being used.
Which can also mean; The money could be withdrawn form the ATM. preventive Control is password to be changed periodically and regularly.
B. Noise on the line might be causing line blunders, which can bring about information misfortune. Reverberation checks and equality checks can assist with recognizing and right such mistakes.
C. If information is being lost, reverberation checks and equality checks ought to likewise help; notwithstanding, the issue might be that an intruder is blocking messages and altering them. Message arrangement numbering will assist with deciding whether messages are being lost, and in the event that they are maybe a solicitation reaction strategy ought to be executed that makes it hard for gatecrashers to dodge.
D. In the event that messages are being postponed, a significant client request or other data could be missed. As in thing c, message arrangement numbering and solicitation reaction methods ought to be utilized.
E. Messages modified by intruders can have an extremely negative effect on client provider relations if orders are being changed. For this situation, information encryption is important to keep the gatecrasher from perusing and changing the information. Additionally, a message succession numbering strategy is important to ensure the message isn't erased.
cheers i hope this was helpful !!
Assume passwords are selected from four character combinations of 26 lower case alphabetic characters. Assume an adversary is able to attempt passwords at a rate of 1 per second. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password
Answer:
Given:
Passwords are selected from 4 characters.
Character combinations are 26 lower case alphabetic characters.
Passwords attempts by adversary is at rate of 1 second.
To find:
Expected time to discover the correct password
Explanation:
Solution:
4 character combinations of 26 alphabetic characters at the rate of one attempt at every 1 second = 26 * 4 = 104
So 104 seconds is the time to discover the correct password. However this is the worst case scenario when adversary has to go through every possible combination. An average time or expected time to discover the correct password is:
13 * 4 = 52
You can also write it as 104 / 2 = 52 to discover the correct password. This is when at least half of the password attempts seem to be correct.
The degree of a point in a triangulation is the number of edges incident to it. Give an example of a set of n points in the plane such that, no matter how the set is triangulated, there is always a point whose degree is n−1.
Answer:
squarepentagonExplanation:
The vertices of a square is one such set of points. Either diagonal will bring the degree of the points involved to 3 = 4-1.
The vertices of a regular pentagon is another such set of points. After joining the points in a convex hull, any interior connection will create a triangle and a quadrilateral. The diagonal of the quadrilateral will bring the degree of at least one of the points to 4 = 5-1.
In this challenge you will use the file regex_replace_challenge_student.py to:
Write a regular expression that will replace all occurrences of:
regular-expression
regular:expression
regular&expression
In the string: This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression
Assign the regular expression to a variable named pattern
Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results
Regular Expression Replace Challenge
The Python statement containing the string to search for the regular expression occurrence is below. search_string=’’’This is a string to search for a regular expression like regular expression or regular-expression or regular:expression or regular&expression’’’
Write a regular expression that will find all occurrences of:
a. regular expression
b. regular-expression
c. regular:expression
d. regular&expression in search_string
Assign the regular expression to a variable named pattern
The Python string below is used for substitution substitution="regular expression"
Using the sub() method from the re package substitute all occurrences of the ‘pattern’ with ‘substitution’
Assign the outcome of the sub() method to a variable called replace_result
Output to the console replace_results
import re
#The string to search for the regular expression occurrence (This is provided to the student)
search_string='''This is a string to search for a regular expression like regular expression or
regular-expression or regular:expression or regular&expression'''
#1. Write a regular expression that will find all occurrances of:
# a. regular expression
# b. regular-expression
# c. regular:expression
# d. regular&expression
# in search_string
#2. Assign the regular expression to a variable named pattern
#The string to use for subsitution (This is provided to the student)
substitution="regular expression"
#3. Using the sub() method from the re package substitute all occurrences of the 'pattern' with 'substitution'
#4. Assign the outcome of the sub() method to a variable called replace_result
#5. Output to the console replace_results
Answer:
Please follow the code indentation for the python program.
Explanation:
Write a program that reads integers start and stop from the user, then calculates and prints the sum of the cubes (=> **3) of each integer ranging from start to stop, inclusive. "Inclusive" means that both the values start and stop are included.
Answer:
This program is written in python programming language
Comments are used for explanatory purpose;
Take note of indentations(See Attachment)
Program starts here
#Initialize Sum to 0
sum = 0
#Prompt user for start value
start= int(input("Start Value: "))
#Prompt user for stop value
stop= int(input("Stop Value: "))
#Check if start is less than stop
if(start<=stop):
#Iterate from start to stop
for i in range(start, stop+1, 1):
sum+=i**3
else:
print("Start must be less than or equal to Stop")
#Display Result
print("Expected Output: ",sum)
#End of Program
An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) _________.
A. Risk
B. Attack
C. Asset
D. Vulnerability
Answer:
Option B: Attack
Explanation:
A security attack is an act to access to a system without a legit authorization. Usually the aim is to steal confidential info from the system or control the system by manipulating the data stored in the system. Some attacks are also aimed to disable the operation of the hacked system. Nowadays, there are several common types of security attacks which include
phishingransomwaredenial of servicemain in the middleSQL injectionmalwareSuppose that the following two classes have been declared public class Car f public void m1) System.out.println("car 1"; public void m2) System.out.println("car 2"); public String toString) f return "vroom"; public class Truck extends Car public void m1) t System.out.println("truck 1"); public void m2) t super.m1); public String toString) t return super.toString) super.toString ); Write a class MonsterTruck whose methods have the behavior below. Don't just print/return the output; whenever possible, use inheritance to reuse behavior from the superclass Methog Output/Return monster 1 truck1 car 1 m2 toString "monster vroomvroom'" Type your solution here:
Answer: provided in the explanation section
Explanation:
// code to copy
Car.java
public class Car {
public void m1()
{
System.out.println("car 1");
}
public void m2() {
System.out.println("car 2");
}
public String toString()
{
return "vroom";
}
}
Truck.java
public class Truck extends Car{
public void m1()
{
System.out.println("truck 1");
}
public void m2()
{
super.m1();
}
public String toString()
{
return super.toString() + super.toString();
}
}
MonsterTruck.java
public class MonsterTruck extends Truck
{
public void m1() {
System.out.println("monster 1");
}
public void m2() {
super.m1();
super.m2();
}
public String toString() {
return "monster " + super.toString();
}
public static void main(String[] args) {
MonsterTruck mt=new MonsterTruck();
mt.m1();
mt.m2();
System.out.println(mt);
}
}
cheers i hope this helped !!!