Answer:
The output file is given below.
Explanation:
Please visit gotit-pro.com to get complete working code.
what is the build in libary function to compare two strings?
Answer:
strcmp() is a built-in library function and is declared in <string. h> header file. This function takes two strings as arguments and compare these two strings lexicographically.
Explanation:
Hope it helps
g Add a throw statement to the processNumbers function that throws the message "An element in the list is not a number." if one of the elements in toProcess is not a number. Hint: The function isNaN() returns true if the parameter is not a number.
Answer and Explanation:
function processNumbers(alist){
var Ourarray= new array(alist);
Ourarray.foreach(
if(isNaN()){
Console.log( "An element in the list is not a number."};
break;
}
}
processNumbers(alist)
From the above, we have defined a function that takes an array parameter(the following array variable will make sure of that). We test each element in the array using foreach array function. The for each function runs the if statement and if isNan is true for each of the elements in the array.
Which option is used in order to configure switchboards for a complex database?
Switchboard Manager
Global Options
Quick Search
Database Formatter
worth 100 points
Answer:
switch board manager
Explanation:
a. Download the attached �Greetings.java� file.
b. Implement the �getGreetings� method, so that the code prompts the user to enter the first name, the last name, and year of birth, then it returns a greetings message in proper format (see the example below). The �main� method will then print it out. Here is an example dialogue with the user:
Please enter your first name: tom
Please enter your last name: cruise
Please enter your year of birth: 1962
Greetings, T. Cruise! You are about 50 years old.
Note that the greetings message need to be in the exact format as shown above (for example, use the initial of the first name and the first letter of the last name with capitalization).
c. Submit the final �Greetings.java� file (DO NOT change the file name) online.
Answer:
Code:
import java.util.*;
public class Greetings
{
public static void main(String[] args)
{
Scanner s = new Scanner(System.in);
System.out.println(getGreetings(s));
}
private static String getGreetings(Scanner console)
{
System.out.print("Please enter your first name: ");
String firstName=console.next();
char firstChar=firstName.toUpperCase().charAt(0);
System.out.print("Please enter your last name: ");
String lastName=console.next();
lastName=lastName.toUpperCase().charAt(0)+lastName.substring(1, lastName.length());
System.out.print("Please enter your year of birth: ");
int year=console.nextInt();
int age=getCurrentYear()-year;
return "Greetings, "+firstChar+". "+lastName+"! You are about "+age+" years old.";
}
private static int getCurrentYear()
{
return Calendar.getInstance().get(Calendar.YEAR);
}
}
Output:-
what is programming language?
Answer:
A programming language is a formal language comprising a set of strings that produce various kinds of machine code output. Programming languages are one kind of computer language, and are used in computer programming to implement algorithms. Most programming languages consist of instructions for computers
Answer:
The artificial languages that are used to develop computer programs are called programming language . hope this help!
write a programmimg code in c++ for school based grading system, the program should accept the subject in the number of students from a user and store their details in the array of type student(class) the student class you have:
1. number student name, index number remarks as variables of type string, marks as integer and grade as char.
2. avoid function called getData which is used to get student details
3. avoid function called calculate which will work on the marks and give the corresponding great and remarks as given below on
Marks 70-100 grade A remarks excellent Mark 60-69 Grade B remarks very good marks 50-59 grade C remarks pass maths 0-49 grade F remarks fail
Answer:
The program is as follows:
#include <iostream>
#include <string>
using namespace std;
class Student{
string studName, indexNo, remarks; int marks; char grade;
public:
void getData(){
cin.ignore();
cout<<"ID: "; getline(cin,indexNo);
cout<<"Name:"; getline(cin,studName);
cout<<"Marks: ";cin>>marks; }
void calculate(){
if(marks>=70 && marks<=100){
remarks ="Excellent"; grade = 'A'; }
else if(marks>=60 && marks<=69){
remarks ="Very Good"; grade = 'B'; }
else if(marks>=50 && marks<=59){
remarks ="Pass"; grade = 'D'; }
else{
remarks ="Fail"; grade = 'F'; }
cout << "Grade : " << grade << endl;
cout << "Remark : " << remarks << endl; }
};
int main(){
int numStudents;
cout<<"Number of students: "; cin>>numStudents;
Student students[numStudents];
for( int i=0; i<numStudents; i++ ) {
cout << "Student " << i + 1 << endl;
students[i].getData();
students[i].calculate(); }
return 0;}
Explanation:
This defines the student class
class Student{
This declares all variables
string studName, indexNo, remarks; int marks; char grade;
This declares function getData()
public:
void getData(){
cin.ignore();
Prompt and get input for indexNo
cout<<"ID: "; getline(cin,indexNo);
Prompt and get input for studName
cout<<"Name:"; getline(cin,studName);
Prompt and get input for marks
cout<<"Marks: ";cin>>marks; }
This declares funcion calculate()
void calculate(){
The following if conditions determine the remark and grade, respectively
if(marks>=70 && marks<=100){
remarks ="Excellent"; grade = 'A'; }
else if(marks>=60 && marks<=69){
remarks ="Very Good"; grade = 'B'; }
else if(marks>=50 && marks<=59){
remarks ="Pass"; grade = 'D'; }
else{
remarks ="Fail"; grade = 'F'; }
This prints the grade
cout << "Grade : " << grade << endl;
This prints the remark
cout << "Remark : " << remarks << endl; }
};
The main begins here
int main(){
This declares number of students as integer
int numStudents;
Prompt and get input for number of students
cout<<"Number of students: "; cin>>numStudents;
This calls the student object to declare array students
Student students[numStudents];
This is repeated for all students
for( int i=0; i<numStudents; i++ ) {
Print number
cout << "Student " << i + 1 << endl;
Call function to get data
students[i].getData();
Call function to calculate
students[i].calculate(); }
return 0;}
Which statement is trueBlockchain is often associated with Bitcoin and the financial services industry. However, it is applicable to almost every industry. The term Multi-party Systems better describes how the blockchain system is used.
What is a benefit of a Multi-party System? about blockchain?
Blockchain is sometimes refers to original Bitcoin blockchain.
Answer :
Blockchain is defined as the database system which maintains and also records the data in various ways which allows the multiple organizations.
Blockchain and multiparty systems specializes in the supply chain or digital identity and also financial services.
A multi-party system prevents leadership of the single party from the controlling a single legislative chamber without any challenge.
Learn more :
https://brainly.in/question/43683479
How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will grow by a constant 2 spaces each time a new item is added to an already full dynamic array
Answer:
Explanation:
260 cost units, Big O(n) complexity for a push
In a file called amortizedAnalysis.pdf, please provide answers to the following questions: How many cost units are spent in the entire process of performing 40 consecutive append operations on an empty array which starts out at capacity 5, assuming that the array will double in capacity each time a new item is added to an already full dynamic array
Answer:
a
Explanation:
sdfghj
Uses of a computer load speaker
Answer:
A computer speaker is an output hardware device that connects to a computer to generate sound. The signal used to produce the sound that comes from a computer speaker is created by the computer's sound card.
I hope this will help you if not then sorry have a great day :)Give three reasons to use a hard drive as mass storage.
Answer:
Every computer – whether it's a tower desktop or laptop – is equipped with an internal hard drive. The hard drive is where all your permanent computer data is stored. Whenever you save a file, photo, or software to your computer, it's stored in your hard drive
Explanation:
Backups and Archives. ...
Media Libraries. ...
Large Capacity Storage. ...
NAS Drives and Security. ...
RAID Arrays. ...
Other Uses.
Explain how data structures and algorithms
are useful to the use of computers in
data management (10 marks)
Explain how data structure and uses of computer in data management
Answer:
Data management is a important tool for data handling.
Explanation:
A good knowledge about the data stricture and data management is a prerequisite for working with codes and algorithms. It helps to identify the techniques for designing the algorithms and data storage in the system. It helps to find out the data hierarchy. Thereby allowing the data management in an efficient and effective way. It can increase the skills in computer programmingd. Which of the following computer has complex system? i. Hybrid computer ii. IBM computer iii. Mainframe computer iv. Analog computer
Answer:
Hybrid computer has complex system
how did hitles rules in nazi germany exemplify totiltarian rule?
Answer:
hope this helps if not srry
Please draw the dynamic array stack structure (you must mention the size and capacity at each step) after the following lines of code are executed. You should assume that the initial capacity is 2 and a resize doubles the capacity.
values = Stack()
for i in range( 16 ) :
if i % 3 == 0 :
values.push( i )
else if i % 4 == 0 :
values.pop()
Answer:
Explanation:
dxfcgvhb
Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message.
Answer:
Sample output:
Enter the number: 25
The square root of 25 is: 5
Enter the number: -25
The square root of 25 is: Nan
Explanation:
Here the code is given as follows,
The Federal Financial Institutions Examination Council (FFIEC) developed the Cybersecurity Assessment Tool, which can be used as a self-assessment tool for identifying a bank or financial institution's cybersecurity maturity.
a. True
b. False
Answer:
a. True
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
The Federal Financial Institutions Examination Council (FFIEC) is an interagency of government that was established on the 10th of March, 1979. FFIEC is saddled with the responsibility of developing the Cybersecurity Assessment Tool, which is then used as a self-assessment tool for identifying the maturity of a bank's or financial institution's cybersecurity.
Programming languages categorize data into different types. Identify the characteristics that match each of the following data types.
a. Can store fractions and numbers with decimal positions
b. Is limited to values that are either true or false (represented internally as one and zero).
c. Is limited to whole numbers (counting numbers 1, 2, 3, ...)
Answer:
a) Integer data type.
b) Real data type.
c) Boolean data type.
Explanation:
a) Integer data type is limited to whole numbers (counting numbers 1, 2, 3…….).
b) Real data type can store fractions and numbers with decimal positions (such as dollar values like $10.95).
c) Boolean data type is limited to values that are either true or false (represented internally as 1 and 0 respectively).
Write a program that produces the following output:CCCCCCCCC CC CC CC CC CCCCCCCCC Note: The letter C in the output must be uppercas
Answer:
CCCCCCCCC ++ ++ CC ++ ++ CC ++++++++++++++ +++++++++++++++ CC ++++++++++++++ +++++++++++++++ CC ++ ++ CCCCCCCCC ++ ++
Note: The letter C in the output must be uppercase.
#include <iostream>
using namespace std;
int main()
{
cout<<"CCCCCCCCC ++ ++ CC ++ ++ CC ++++++++++++++ +++++++++++++++ CC +++++++++++++\n";
cout<<"+++++++++++++++ CC ++ ++ CCCCCCCCC ++ ++";
return 0;
}
Help Pls
I need about 5 advantages of E-learning
Answer:
Explanation:
E-learning saves time and money. With online learning, your learners can access content anywhere and anytime. ...
E-learning leads to better retention. ...
E-learning is consistent. ...
E-learning is scalable. ...
E-learning offers personalization.
Answer:
E- learning saves time and money
E-learning makes work easier and faster
E- learning is convenient
E- learning is consistent
E- learning is scalable
Explanation:
when you learn using the internet, you save a lot of time by just typing and not searching through books
2.
The force of impact is
Answer:
lực ( Tiếng Anh : force ) là bất kỳ ảnh hưởng nào làm một vật thể chịu sự thay đổi, hoặc là ảnh hưởng đến chuyển động, hướng của nó hay cấu trúc hình học của nó.
Explanation:
Define a class named Payment that contains an instance variable of type double that stores the amount of the payment and appropriate get and set methods. Also, create a method named paymentDetails that outputs an English sentence to describe the payment amount. Next, define a class named CashPayment that is derived from Payment. This class should redefine the paymentDetails method to indicate that the payment is in cash. Include appropriate constructor(s). Define a class named CreditCardPayment that is derived from Payment. This class should contain instance variables for the name on the card, expiration date, and credit card number. Include appropriate constructor(s). Finally, redefine the paymentDetails method to include all credit card information. Define a class named PaymentTest class that contains the main() method that creates two CashPayment and two CreditCardPayment objects with different values and calls paymentDetails for each. (5 pts)
Answer:
The code is given below:
class Payment
{
private double amount;
public Payment( )
{
amount = 0;
}
public Payment(double amount)
{
this.amount = amount;
}
public void setPayment(double amount)
{
this.amount = amount;
}
public double getPayment( )
{
return amount;
}
public void paymentDetails( )
{
System.out.println("The payment amount is " + amount);
}
}
class CashPayment extends Payment
{
public CashPayment( )
{
super( );
}
public CashPayment(double amt)
{
super(amt);
}
public void paymentDetails( )
{
System.out.println("The cash payment amount is "+ getPayment( ));
}
}
class CreditCardPayment extends Payment
{
private String name;
private String expiration;
private String creditcard;
public CreditCardPayment()
{
super( );
name = " ";
expiration = " ";
creditcard = "";
}
public CreditCardPayment(double amt, String name, String expiration, String creditcard)
{
super(amt);
this.name = name;
this.expiration = expiration;
this.creditcard = creditcard;
}
public void paymentDetails( )
{
System.out.println("The credit card payment amount is " + getPayment( ));
System.out.println("The name on the card is: " + name);
System.out.println("The expiration date is: " + expiration);
System.out.println("The credit card number is: " + creditcard);
}
}
class Question1Payment
{
public static void main(String[ ] args)
{
CashPayment cash1 = new CashPayment(50.5), cash2 = new CashPayment(20.45);
CreditCardPayment credit1 = new CreditCardPayment(10.5, "Fred", "10/5/2010",
"123456789");
CreditCardPayment credit2 = new CreditCardPayment(100, "Barney", "11/15/2009",
"987654321");
System.out.println("Cash 1 details:");
cash1.paymentDetails( );
System.out.println( );
System.out.println("Cash 2 details:");
cash2.paymentDetails( );
System.out.println( );
System.out.println("Credit 1 details:");
credit1.paymentDetails( );
System.out.println( );
System.out.println("Credit 2 details:");
credit2.paymentDetails( );
System.out.println( );
}
}
Output:
What is the definition of: a computer network? data communications? telecommunications? a local area network? a personal area network? a metropolitan area network a wide area network? network management? convergence? g
Answer:
The answer is below
Explanation:
1. Computer Network: this is a system of interconnection of computers and computing devices that utilizes wires or radio waves over certain reachable locations.
2. Telecommunications: this is known to be the system or combination of telephones device and networks that transmit telephone signals.
3. A local area network: often referred to as LAN, is a system of networks that covers a smaller area usually within a room, floor, building, or campus.
4. Personal area network: often referred to as PAN, this is a network that covers few distances, usually between wireless devices like PDAs, laptops, and other devices.
5. Metropolitan area network: often referred to as MAN, this is a system of the network that serves quite a larger area, usually between that serve an area of 1 to 30 miles radius. For example, a typical city.
6. Wide area network: often referred to as WAN, this is a system of a large network that covers a large area such as parts of states, many states, countries, and the world at large.
7. Network management: this is defined to be a process of designing, installing, and supporting a computer network, such as computer hardware and software
8. Convergence: this is known to be a connection, combination, and integration of two or more computer technologies in a single device or system for operation.
An integer is said to be a perfect number if the sum of its divisors, including 1 (but not the number itself), is equal to the number.
a. True
b. False
what are the services offered by web-based email?
Answer:
Web based email is a service that allows to access and use electronic mail via web browser.
It allows clients to login into the email software running on a web server to compose, send and receive, delete mails basically.
Consider an Erlang loss system. The average processing time is 3 minutes. The average inter-arrival time is 3 minutes. The number of servers is 3. What is r (sometimes referred to as the offered load)
Answer:
r = 1
Explanation:
Average processing time ( p ) = 3 minutes
Average inter-arrival time ( a ) = 3 minutes
number of servers ( m ) = 3
Determine the value of r
r ( offered load ) = p/a
= 3 / 3 = 1
∴ value of r ( offered load ) = 1
A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also be system objects such as shared memory or a linked list data structure. This principle is based in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The only way to access a resource is through the provided interface. Which security principle are we referring to
Answer:
The security principle being referred to here is:
Resource Encapsulation.
Explanation:
Resource Encapsulation is one of the cybersecurity first principles. It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity. Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.
How to create a network of relevant prospects?
Answer:
By connecting with industry-specific and relevant prospects.
Now with 760 million+ people, how can you find the most relevant people to connect with? The answer is: With the help of LinkedIn automation tools.
There are a number of best LinkedIn automation tools that come with advanced search filters to help you refine your target audience. These LinkedIn automation tools have special operators that help users find and reach even the most difficult leads.
However, there is a drawback. These LinkedIn automation tools can cause spam if you send thousands of connection requests or messages in a short time.
Moreover, if you send templated connect notes or messages, you’re likely to get a very low or almost zero acceptance and response rate.
transmits data wirelessly via infrared (IR) light waves.
As
O A. RFID
B. Ethernet
O C. Bluetooth
D. IrDA
Reset Selection
Which Windows installation method requires the use of Windows deployment services (WDS)?
1. Network Installation
2. Repair Installation
3. Bootable flash drive installation
4. Unattended installation
Answer:
1. Network Installation
Explanation:
Given
Options (1) to (4)
Required
Which requires WDS for installation
WDS are used for remote installations where users do not have to be physically present before installations can be done; in other words, it is necessary for network based installations.
Of all the given options, (a) is correct because without WDS, network installation cannot be done.