Answer:
The correct answer to the following question will be "Pseudocode".
Explanation:
Pseudocode is indeed an unofficial high-level definition of a software program or other algorithm's operating theory.This uses a standard programming language's formal rules but is designed for individual interpretation instead of computer reading.Therefore, It's the right answer.
Final answer:
Pseudocode is a tool used to develop programs before coding, offering a readable and language-independent way to organize and plan an algorithm. It bridges the gap between human thought and machine code, enabling the logical construction of programs.
Explanation:
A way to develop a program before actually writing the code in a specific programming language is to use a general form, written in natural English, called pseudocode. Pseudocode helps tremendously in organizing thoughts and is particularly useful for complex programs.
It provides a bridge between human logic and machine instructions, enabling developers to outline their algorithms in a readable format before converting them into actual code. This method captures the essence of programming logic without getting bogged down by the syntax of a specific programming language.
Which of the following is required for counter-controlled repetition?
A. a boolean
B. a method
C. a condition
D. All of the above
Counter-controlled repetition requires a condition to determine when the loop should stop, involving initializing a counter, setting a condition for it, and updating the counter within the loop. No boolean or method is strictly required, just the condition.
Explanation:The question asks which of the following is required for counter-controlled repetition. The correct answer is C. a condition. In computer programming, counter-controlled repetition requires a condition to determine when the repetition should stop. This involves initializing a counter to a starting value, setting a condition for the counter (such as counter < 10), and updating the counter within the loop (often incrementing or decrementing). This loop continues to execute as long as the condition evaluates to true.
For example, in a for loop, you might see something like for(int i = 0; i < 10; i++), where i is the counter, i < 10 is the condition that must be true for the loop to continue, and i++ updates the counter. No boolean or method is strictly required for this process, just the condition that guides the repetition.
The cardinality of a relationship is the maximum number of entity occurrences that can be involved in it. (T/F)
Answer:
False
Explanation:
In an entity relationship (ER) model, which is the conceptual illustration of certain entities and the relationships that exist between them, the cardinality of a relationship is the possible (minimum and maximum) number of entity occurrences that can be associated or involved in it.
Note: An entity is a real world object that is being modeled.
For example, a school has many staff members. The school and the staff members are the objects while the relationship between the school and the staff members is one-to-many.
One, many, zero are all values of cardinality.
Row array userGuess contains a sequence of user guesses. Assign correctGuess with true when myNumber is equal to the user guess.
Answer:
The MATLAB code is given below with appropriate comments
Explanation:
%Define the function.
function correctGuess = EvaluateGuesses(myNumber,userGuess)
%Compute the length.
l = length(userGuess);
%Create an array.
correctGuess = zeros(1, l);
%Begin the loop.
for k = 1: l
%Check the condition.
if myNumber == userGuess(k)
%Update the array correctGuess.
correctGuess(k) = 1;
%End of if.
end
%End of the function.
end
%Call the function.
EvaluateGuesses(3, [3, 4, 5])
Answer:
correctGuess = (myNumber == userGuess);
Explanation:
All you have to do is use the logical operator "==" to signify a relationship between myNumber and userGuess. Whenever the value of myNumber is equal to userGuess, MATLAB will input a "1" into the logical array. It will input a "0" when myNumber does NOT equal userGuess.
Example problem for EvaluateGuesses(3, [3, 4, 5])
correctGuess = (myNumber == userGuess);
The program checks for when 3 is equal to any number in the array userGuess. 3 only equals the first value, so the result is [1, 0, 0].
Therefore, the answer is correctGuess = (myNumber == userGuess);
(This is much simpler than what the other user said... this is most likely what your homework expects you to answer with.)
Opportunities in nanotechnology apply broadly to many fields. Identify TWO areas of IT that may be impacted by its further development. Select one: a. quantum computing and telecommunications b. photolithography and genetics c. photolithography and alternative energy d. telecommunications and genetics
Answer:
a. quantum computing and telecommunications
Explanation:
Both quantum computing and telecommunications need materials with specific optical, electrical, and magnetic properties to advance, and nanotechnologies open the opportunity for nanomaterial with incredible properties. From antennas with special magnetic properties to faster optical fiber from more stable material to store qubits to super thermal insulators, nanotechnologies will change the way we build and design telecommunication systems, and it will allow us to build stable and reliable quantum computers.
Which type of attack modifies the fields that contain the different characteristics of the data that is being transmitted?
Answer:
An HTTP Header attack
Explanation:
In web applications an HTTP refers to Hypertext Transfer Protocol and an HTTP Header is the value that is displayed in a request or response message, the header has a name and a value separated by a colon.
An HTTP header attack called an header injection is a vulnerability that is present when users' inputs are required for the dynamic generation of HTTP headers. This vulneraility allows several security threats to be carried out, some examples are:
Malicious site redirection Cross-site scripting, and Session fixation through the set-cookie headerWhat type of analysis should be used to respond to the statement, "Let's cut advertising by $1000 repeatedly so we can see its relationship to sales"?
Answer:
Sensitivity analysis.
Explanation:
Data analytics is a method of interpreting a large group of data, that predicts future outcomes or describe current situation of the company, for appropriate decision to be made. Analyzing data creates a flexible environment to change data to observe the resultant output.
Sensitivity analysis is used to analyse uncertain output by changing the input. It is used to ascertain if an output generated by a determined input can be desirable or considered.
When disabling inherited permissions on an object, what happens if you select Remove all inherited permissions from this object?
Answer:
Answer explained below
Explanation:
When disabling inherited permissions on an object, if you select Remove all inherited permissions from this object then you lose every user or group assigned to the folder.
This will delete all existing permissions, including administrator accounts, leaving you a blank slate to apply your own permissions to the folder.
State three reasons that Visual Basic is one of the most widely used programming languages in the world.
Visual Basic is widely used for three reasons: it is easy to learn, provides rapid application development, and integrates well with Microsoft products.
Explanation:Three Reasons Visual Basic is Widely UsedEasy to Learn: Visual Basic is known for its simplicity and beginner-friendly nature. The language uses a graphical user interface (GUI) and provides drag-and-drop functionality, making it easier for new programmers to understand and create applications.Rapid Application Development (RAD): Visual Basic offers a wide range of pre-built components and controls that simplify the development process. Developers can quickly prototype and create applications, reducing the time and effort required to build software.Integration with Microsoft Products: Visual Basic is developed and supported by Microsoft, which provides extensive documentation, resources, and integration with other Microsoft technologies like Excel, Word, and Access. This makes it a popular choice for building Windows-based applications.Learn more about Reasons for Visual Basic's popularity here:https://brainly.com/question/36344044
#SPJ3
Consider a program to accept and tabulate votes in an election. Who might want to attack the program? What types of harm might they want to cause? What kinds of vulnerabilities might they exploit to cause harm?
Answer:
Who might want to attack the program to accept and tabulate votes in an election?
The political opponents.
What types of harm might they want to cause?
A silent interception; an interruption a modification and a fabrication
What kinds of vulnerabilities might they exploit to cause harm?
The assets vulnerablities.
Explanation:
Political opponents might want to attack the program to accept and tabulate votes in an election to modify factual results to show them as the winners.
The harm they might want to cause is cheating the elections by copying the program, data files or wiretapping; to get the system lost, or get it unavailable or unusable with the factual data in the large dams and disable the power grids and modify the values accordingly adding the forged results.
When information is modified by individuals not authorized to change it you have suffered a:_____a. Loss of confidentiality b. Loss of integrity c. Loss of functionality d. Loss of availability
Answer:
b. Loss of integrity
Explanation:
Integrity: It is the information protection technique which ensures that the information is not modified by the unintended individuals.
Explain why it might be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type.
Final answer:
It may be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type because character data types allow for greater flexibility and can handle other non-numeric characters.
Explanation:
In certain cases, it may be more appropriate to declare an attribute that contains only digits as a character data type instead of a numeric data type. This is because character data types allow for greater flexibility and can handle not only numerical values but also other non-numeric characters.
For example, if you're working with a student ID that consists of digits but also includes special characters like dashes or periods, storing it as a character data type would be more suitable. This way, you can accurately capture and manipulate the entire ID without losing any important characters.
Character data types also allow for better error handling and handling of leading zeros, which can be important in certain scenarios, such as when dealing with bank account numbers or zip codes.
The following data segment starts at memory address 0x3600 (hexadecimal)
.data
printString BYTE "Do not add decimal to hex",0
someBytes WORD 19 DUP(0)
moreBytes BYTE 10, 20, 30, 40, 50, 60, 70, 80, 90
questionAddr DWORD ?
ignoreMe WORD ?
What is the hexadecimal address of questionAddr?
Final answer:
To find the hexadecimal address of questionAddr, one adds the sizes of variables declared before it in the data segment starting at 0x3600. After accounting for the bytes used by printString, someBytes, and moreBytes, the address of questionAddr is calculated to be 0x364B.
Explanation:
The question asks for the hexadecimal address of the identifier questionAddr within a data segment that starts at memory address 0x3600. To calculate the address of questionAddr, we must determine the size of the variables declared before it and add that to the starting address. Here is how the memory is allocated for each variable:
printString: The BYTE declaration for the string "Do not add decimal to hex", followed by a null terminator, uses 28 bytes (26 characters + 2 for the double quote and null terminator).
someBytes: The WORD declaration with 19 DUP(0) indicates that space for 19 words is reserved, and since a word is 2 bytes, this gives us 38 bytes.
moreBytes: The BYTE declaration specifies 9 individual bytes.
Adding it all up:
Start Address: 0x3600
+ printString: 28 bytes
+ someBytes: 38 bytes
+ moreBytes: 9 bytes
= Total: 75 bytes
To get the address of questionAddr, convert the total number of bytes to hexadecimal and add it to the start address:
0x3600 + 0x004B (75 in hexadecimal) = 0x364B
Therefore, the hexadecimal address of questionAddr is 0x364B.
Write a program whose input is an email address, and whose output is the username on one line and the domain on the second. Example: if the input is:
pooja@piazza.com
Then the output is
username: pooja
domain: piazza.com
The main program is written for you, and cannot be modified. Your job is to write the function parseEmailAddress defined in "util.cpp" The function is called by main() and passed an email address, and parses the email address to obtain the username and domain. These two values are returned via reference parameters. Hint: use the string functions .find() and .substr(),
main.cpp is a read only file
#include
#include
using namespace std;
// function declaration:
void parseEmailAddress(string email, string& username, string& domain);
int main()
{
string email, username, domain;
cout << "Please enter a valid email address> ";
cin >> email;
cout << endl;
parseEmailAddress(email, username, domain);
cout << "username: " << username << endl;
cout << "domain: " << domain << endl;
return 0;
}
/*util.cpp*/ is the TODO file
#include
#include
using namespace std;
//
// parseEmailAddress:
//
// parses email address into usernam and domain, which are
// returned via reference paramters.
//
void parseEmailAddress(string email, string& username, string& domain)
{
//
// TODO: use .find() and .substr()
//
username = "";
domain = "";
return;
}
Answer:
1 void parseEmailAddress(string email, string& username, string& domain)
2 {
3 int found = email.find("@")
4 if (found > 0)
5 {
6 username = email.substr(0, found);
7 domain = email.substr(found+1, -1);
8 }
9 return;
10}
Explanation line by line:
We define our function.We use an open curly bracket to tell the program that we are starting to write the function down.We apply the find method to the email variable that was passed by the main program. The find method tells us where is the "@" located within the email.We use an if statement to ensure that the value that we found is positive (The value is negative if an only if "@" is not in the email address).We use an open curly bracket to tell the program that we are starting to write inside the if statement. We apply the substr method to the email to take the username; it receives a start and an end value, this allows us to take from the beginning of the email (position 0) until the "@". We apply the substr method to the email to take the domain; it receives the position of the "@" character plus one to take the first letter after the "@" and a minus-one representing the last character on the email.We use a closing curly bracket to tell the program that the if statement has finished.We return nothing because we are using reference parameters, which means that the memory positions of username and domain are going to be filled by our parseEmailAddress function and the main function can access those values directly.We use a closing curly bracket to tell the program that the function has finished.
Write the definition of a class Telephone. The class has no constructors and one static method getFullNumber. The method accepts a String argument and returns it, adding 718- to the beginning of the argument.
Answer:
public class Telephone {
public static String getFullNumber(String a) {
return ("718-" + a);
}
}
In the explanation section we show the method in use with some displayed output
Explanation:
The code to create an object of the class and use its method getFullNumber(String a) is given below:
public class TestClass {
public static void main(String[] args) {
Telephone TelephoneOne = new Telephone();
String newNumber=TelephoneOne.getFullNumber("080657288");
System.out.println(newNumber);
}
}
a. Using this Playfair matrix: J/K C D E F U N P Q S Z V W X Y R A L G O B I T H M Encrypt this message: I only regret that I have but one life to give for my country. quizzlet
Answer:
MAPAZOQHGKHWHMLITMIAKHPBASDGMCDHROCAFKRAFOFANPBLZY
Explanation:
To make it create a matrix with the letters provided without using the letter J. Then organize the message to be encrypted in pairs omitting the spaces and using a letter X if two letters are the same or if you have and an odd number of letters. Select each pair of letters to encrypt them one pair at a time, using the matrix paint a rectangular box around the letters to code them select the opposite letter in the rectangular box.
What are the first two models, e.g. diagrams that affect the entire system, that are built during the CoreProcess to discover and understand the details?
a. Workflow diagram
b. Work sequence diagram
c. Use case diagram
d. Class diagram.
e. Package diagram
f. Screen layouts
Answer:
The answer is "Option c and Option d".
Explanation:
A diagram for a case use is a UML dynamic or computational diagram, that is used in the case diagram model. It consists of a set of actions, services, and functions to be carried out by the system. and The class diagram refers to relationships between the UML classes and the source code that dependence, that is two diagrams that affect the system and others are wrong, which can be explained as follows:
In option a, It is used for business process, that's is not correct.In option b, It is used for both professionals industry like software and business, that's why it is wrong.In option e, It is used in only high-level language, that's why it is wrong.In option f, It is used to adjust its layout that's why it is wrong.
Describe the differences in meaning between the terms relation and relation schema.
Answer:
Relational Schema refers to meta-data elements which are used to describe structures and constraints of data representing a particular domain. A relation abide of a heading and a body. A heading is a set of attributes. A body is a set of n-tuples. The heading of the relation is also the heading of each of its tuples.
Explanation:
Defination of relation:
A relation is a property or predicate that ranges over more than one argument
A relation is defined as a set of n-tuples. In both mathematics and the relational database model, a set is an unordered collection of items. In mathematics, a tuple has an order, and allows for duplication.
Relation schema
A relation schema is a collection of meta-data that describes the relations in a database. Which is also called data base schema. This schema can be described as the “layout” of a database or the blueprint that outlines the way data is organized into table.
A "relation" is a table storing data, while a "relation schema" defines its structure, attributes, and constraints without containing data.
The terms "relation" and "relation schema" are both used in the context of relational databases, but they refer to different concepts:
1. Relation:
- In the context of databases, a relation refers to a table that stores data in rows and columns.
- Each row in a relation represents a record, and each column represents an attribute or field.
- Relations are the fundamental structures in a relational database, and they adhere to certain principles such as each cell containing a single value and rows being unique (no duplicate rows).
- Informally, a relation is often referred to as a table.
2. Relation Schema:
- A relation schema, on the other hand, defines the structure or blueprint of a relation.
- It specifies the name of the relation (table) and the attributes (columns) it contains, along with any constraints or properties associated with those attributes.
- The schema defines the data types of each attribute, any constraints on their values (such as primary keys, foreign keys, or uniqueness constraints), and other properties like nullability.
- The relation schema provides the framework for creating instances of relations (tables) within a database.
- It does not contain any actual data but rather describes the structure and properties of the data that can be stored in a relation.
In summary, while a relation represents the actual data stored in a table, a relation schema defines the structure, attributes, and constraints of that table without containing any data itself. The relation schema serves as a blueprint for creating and understanding relations within a relational database.
What does this method do?
public static int foo(String [][] a)
{
int b = 0;
for (int I = 0; i
{
b++;
}
return b;
}
COMPLETE QUESTION:
What does this method do?
public static int foo(String [][] a)
{
int b = 0;
for (int i = 0; i<a.length; i++)
{
b++;
}
return b;
}
Answer:
Returns the value of b which is the dimension of the array
Explanation:
The method foo accepts a multi dimension array and returns the dimension of the array. A complete code implementation and call to the method is given below:
public class TestClass {
public static void main(String[] args) {
String [ ] [ ] arr = {{"gh","hj","fg", "re","tr"},{"","er","df","fgt", "tr"}};
System.out.println(foo(arr));
}
public static int foo(String [ ][ ] a)
{
int b = 0;
for (int i = 0; i<a.length; i++)
{
b++;
}
return b;
}
}
The output from the code snippet is the value of b which is 2
What would be the output of the following program?
int main() {
struct message
{ int num;
char mess1[50];
char msg2[50] ;
} m ;
m. num = 1;
strcpy (m.msg1, "We had lot of homework." );
strcpy(m.msg2," Hope it is the last one);
/* assume that the strucure is located at address 2004*/
printf ("\n%u%u%u\n", &m.num, m.msgi, m3 m2 m.msg2 );
printf ("\n%d %s %s", m.num,m.msgi, m.msg2);
return 0;
}
Answer:
Output: 2004 2008 2058
Explanation:
In the first printf command it will print the address of the variables num, msg1, msg2. And in the second printf command it will print the values of the variables num, msg1, msg2. As the address of the structure is 2004 And the size of the integer is 4 byte so size will increase with 4 bytes and the size of character is 1 byte so it will increase by 1*50= 50 bytes.
Hence, the output is 2004 2008 2058
Security awareness training can include special all-hands meetings called __________ meetings that are held between team or departmental leaders, with those leaders then sharing the information they've gained from those meetings with employees.
Town Hall
Task Force
Awareness
Security Reminders
Answer:
Task Force
Explanation:
Task Force is a special unit formed to address or handle a specific task. A task force team can consist of several selected key persons such as team or departmental leaders. In this context, the task force meeting are held between the team leaders who gain information of security awareness training and then pass down the training information to the rest of their respective department employees.
A pair of single quotes ( ‘ ) will prevent the shell from interpreting any metacharacter.
True or False?
Answer: True
Explanation:
In Linux, a single quote around a string will prevent the shell from interpreting any metacharacter.
The packets used to transmit voice on the Internet are similar to the packets that are used to send email. What are some of the advantages of this approach ?
Answer:
Quality of service (QOS).
Explanation:
In recent computer networking, the convergence of voice, video and text data packet has been made possible. There is no need for a dedicated network for a particular type of packet.
QOS or quality of set is a service rendered to voice or audio packets in VoIP phones to enhance communication.
The email is a digital mailing system that can be used to send all three packets. It enjoys the QOS as voice packets. It is given high preference for transmission and uses the TCP protocol to transmit data reliably.
Assuming we are using the Hamming algorithm presented in your text and even parity to design an error-correcting code, find the code word to represent the 8-bit information word 10011011
Answer:
Before redundancy :100101011100
After checking parity redundancy: 100101010011
Explanation:
First calculate redundant bits ,
We know that the number of redundant bits can be calculated using the following formula:
2^r ≥ m + r + 1
r = redundant bit, m = data bit
total data bits = 8
so ,
2^4 ≥ 8 + 4 + 1
16 ≥ 13
so, redundant bits is 4
Now let they denoted by r1, r2, r4, and r8, as the redundant bits are placed at positions corresponding to power of 2: 1, 2, 4, and 8.
All the redundant bits are initialized by zero.
For the data word 10011011, we can let the bits of the data word as w8,w7, w6, w5, w4, w3, w2, w1
Now , put data bits and redundancy bits as follows.
d12 d11 d10 d9 d8 d7 d6 d5 d4 d3 d2 d1
w8 w7 w6 w5 r8 w4 w3 w2 r4 w1 r2 r1
1 0 0 1 0 1 0 1 0 0 0 0
r1 = d1 xor d3 xor d5 xor d7 xor d9 xor d11
r1 = 0 xor 0 xor 1 xor 1 xor 1 xor 0
r1 = 1
r2 = d2 xor d3 xor d6 xor d7 xor d10 xor d11
r2 = 0 xor 0 xor 0 xor 1 xor 0 xor 0
r2 = 1
r4 = d4 xor d5 xor d6 xor d7
r4 = 0 xor 1 xor 0 xor 1
r4 = 0
r8 = d8 xor d9 xor d10 xor d11 xor d12
r8 = 0 xor 1 xor 0 xor 0 xor 1
r8 = 0
So, the data transferred is
d12 d11 d10 d9 d8 d7 d6 d5 d4 d3 d2 d1
w8 w7 w6 w5 r8 w4 w3 w2 r4 w1 r2 r1
1 0 0 1 0 1 0 1 0 0 1 1
The bits give the binary number as 0011 whose decimal representation is 3. Thus, the bit 3 contains an error. To correct the error the 3th bit is changed from 1 to 0.
Final answer:
To encode the 8-bit information word 10011011 using the Hamming code and even parity, we would need to insert parity bits into specific positions, resulting in a 12-bit code word composed of the original data and additional parity bits.
Explanation:
The Hamming code is a data protection algorithm used for error detection and correction. To find the Hamming code for the 8-bit information word 10011011 using even parity, you would need to insert parity bits at positions that are powers of 2 (i.e., positions 1, 2, 4, 8,...).
For each parity bit, you would determine whether the number of bits in positions it checks (including itself) is even or odd. In this case, if the number is odd, you would set the parity bit to 1 to achieve even parity, otherwise, set it to 0.
Without working through a specific example, the resulting codeword would be a 12-bit word consisting of the original 8 information bits and an additional 4 parity bits (since 8-bit data would require 4 parity bits for the Hamming encoding).
What will be the result of running the following code fragment? int year = 0; double rate = 5; double principal = 10000; double interest = 0; while (year < 10) { interest = (principal * year * rate) / 100; System.out.println("Interest " + interest); }
Answer:
This code fragment will run an infinite loop
Explanation:
This output: Interest 0.0 Will be displayed infinitely. The reason is because the variable year which is initially set to 0 is never updated and as such remains true because the condition is while(year<10). So at the first iteration the statement interest = (principal * year * rate) / 100; evaluates to 0 and this line of code System.out.println("Interest " + interest); prints Interest 0.0. At the next iteration the same evaluation and output takes place and on and on and on....... since the control variable is not changing.
Create an application for a library and name it FineForOverdueBooks. TheMain() method asks the user to input the number of books checked out and the number of days they are overdue. Pass those values to a method named DisplayFine that displays the library fine, which is 10 cents per book per day for the first seven days a book is overdue, then 20 cents per book per day for each additional day.
The library fine should be displayed in the following format:
The fine for 2 book(s) for 3 day(s) is $0.60
(The numbers will vary based on the input.)
Answer:
//The Scanner class is imported which allow the program to receive user input
import java.util.Scanner;
//Class Solution is defined to hold problem solution
public class Solution {
// The main method which signify the begining of program execution
public static void main(String args[]) {
// Scanner object 'scan' is defined to receive input from user keyboard
Scanner scan = new Scanner(System.in);
// A prompt is display asking the user to enter number of books
System.out.println("Please enter number of books: ");
// the user response is assigned to numberOfBook
int numberOfBook = scan.nextInt();
// A prompt is displayed asking the user to enter the number of days over due
System.out.println("Please enter number of days over due: ");
// the user response is assigned to numberOfDaysOverDue
int numberOfDaysOverDue = scan.nextInt();
//displayFine method is called with numberOfBook and numberOfDaysOverDue as arguments
displayFine(numberOfBook, numberOfDaysOverDue);
}
//displayFine method is declared having two parameters
public static void displayFine(int bookNumber, int daysOverDue){
// fine for first seven days is 10cent which is converted to $0.10
double firstSevenDay = 0.10;
// fine for more than seven days is 20cent which is converted to $0.20
double moreThanSevenDay = 0.20;
// the fine to be paid is declared
double fine = 0;
// fine is calculated in the following block
if(daysOverDue <= 7){
//the fine if the over due days is less than or equal 7
fine = bookNumber * daysOverDue * firstSevenDay;
} else{
// the extra days on top of the first seven days is calculated and assigned to extraDays
int extraDays = daysOverDue - 7;
//fine for first seven days is calculated
double fineFirstSevenDays = bookNumber * 7 * firstSevenDay;
// fine for the extradays is calculated
double fineMoreThanSevenDays = bookNumber * extraDays * moreThanSevenDay;
// the total fine is calculated by adding fine for first seven days and the extra days
fine = fineFirstSevenDays + fineMoreThanSevenDays;
}
// The total fine is displayed to the user in a nice format.
System.out.printf("The fine for " + bookNumber + " book(s) for " + daysOverDue + " day(s) is: $%.02f", fine);
}
}
Explanation:
The program first import Scanner class to allow the program receive user input. Then the class Solution was defined and the main method was declared. In the main method, user is asked for number of books and days over due which are assigned to numberOfBook and numberOfDaysOverDue. The two variable are passed as arguments to the displayFine method.
Next, the displayFine method was defined and the fine for the first seven days is calculated first if the due days is less than or equal seven. Else, the fine is calculated for the first seven days and then the extra days.
The fine is finally displayed to the user.
Select a data definition statement that creates an array of 500 signed doublewords named myList and initializes each array element to the value ?1.
a. SDWORD myList 500 DUP (-1)
b. myList 500 SDWORD DUP (-1)
c. myList 500 SDWORD (-1)
d. myList SDWORD 500 DUP (-1)
Answer:
The answer is "Option b".
Explanation:
In the given question there is a miss typing problem, in this question at the last line there we use "value -1 ?"
In the question, it is defined that an array "myList" declares that includes 500 signed double words. To define this type of data first array name is used than the size of the array then the function that is "SDWORD and DUP" which defines its values, in this question except option b all are wrong that can be described as follows:
In option a, It is correct because for define any array firstly we use array name. In option c, It is not correct because this does not use both functions. In option d, In this code after array name, the function is used first that's incorrect.In python
Type two statements. The first reads user input into person_name. The second reads user input into person_age. Use the int() function to convert person_age into an integer. Note: Do not write a prompt for the input values. Below is a sample output for the given program if the user's input is: Amy 4
In 5 years Amy will be 9
Answer:
program:
person_name = input() #input for the name of the person.
person_age = int(input()) #input for the age of the person and convert it into int.
print("In 5 years "+ person_name+" will be "+str(person_age+5)+".") # print the string.
Output:
If the user input is Go and 4 then the output is "In 5 years Go will be 9."Explanation:
The above program is in python language.The first line of the program is used to take the inputs from the user in string format by the help of input function and store it on the variable of person_name.The second line of the program is used to take the input from the user by the help of input function in the form of a string and convert it into an integer by the help of int function and store the value on the person_age.The third line of the program prints the string after adding 5 into person_age because after 5 years the age will be added into 5.The program is meant to be completed in Python. The complete program where comments are used to explain each line is as follows:
#This gets input for first name
person_name = input()
#This gets input for whole number
person_age = int(input())
#This prints the string generated
print('In 5 years,', person_name,'will be',(5+person_age))
The last line of the code uses string concatenation to join the strings before printing the output string
Learn more about python programs at:
https://brainly.com/question/22841107
The byte-ordering scheme used by computers to store large integers in memory with the high-order byte at the lowest address is called:
a. big endian
b. byte-major
c. little endian
d. byte-minor
Answer:
a. big endian
Explanation:
Endianness determines the order of how the multiple bytes of information are stored in the memory.Big-endian is a byte ordering scheme in which the most significant byte also called the big end of data is stored at the the lowest address. First byte is the biggest so Big-endian order puts most significant byte first and least significant byte in the last. For example: A hexadecimal number 1D23 required two bytes to be represented so in big endian order this hexadecimal number will be represented as 1D 23.Your program Assignment Write a program that reads a sentence as input and converts each word to "Pig Latin". In one version of Pig Latin, you convert a word by removing the first letter, placing that letter at the end of the word, and then appending "ay" to the word. Here is an Example: English: I SLEPT MOST OF THE NIGHT Pig Latin: IAY LEPTSAY OSTMAY FOAY HETAY IGHTNAY
Answer:
theSentence = input('Enter sentence: ')
theSentence = theSentence.split()
sentence_split_list =[]
for word in theSentence:
sentence_split_list.append(word[1:]+word[0]+'ay')
sentence_split_list = ' '.join(sentence_split_list)
print(sentence_split_list)
Explanation:
Using the input function in python Programming language, the user is prompted to enter a sentence. The sentence is splited and and a new list is created with this statements;
theSentence = theSentence.split()
sentence_split_list =[ ]
In this way every word in the sentence becomes an element in this list and individual operations can be carried out on them
Using the append method and list slicing in the for loop, every word in the sentence is converted to a PIG LATIN
The attached screenshot shows the code and output.
Which technology can be used to protect the privacy rights of individuals and simultaneously allow organizations to analyze data in aggregate?
Answer:
De-identification or data anonymization.
Explanation:
Privacy rights are fundamental right of individuals to privatise all personal information, when creating an account.
The de-identification and data anonymization technology is provided by the organisation to user, to prevent their information to be viewed by others. It commonly used in cloud computing, communication, internet, multimedia etc. Reidentification is the reversing of the de-identification effect on personal data.