Person-name: String+setName(String name): void+getName(): String^Student-studentID: long+Student(String sname, long sid)+setID(): longWhich of these fields or methods are inherited (and accessible) by the Student class?
1. getName(), setName(), name
2. name, getName(), setName(), getID()
3. studentID, name, getName(), setName(), getID()
4. getName(), setName(), toString()
5. None of them
6. getName(), setName(), studentID, getID()

Answers

Answer 1

Answer and Explanation:

Basically its answer is option 4 where getName(), setName().to String()

let us explained it through  a program where get and set method has been used.

Create  Student class that has marks and grade. Two parameters initialize data member using constructors .Each data member gives values and member function .Show the values of data member.

You can code it in turbo and Dev C++ tool .

# include<iostream.h>

#include<conio.h>

class Student

{

private:

int marks;

String name;

char grade;

public:

Student ( int m , char g)  //get method where it get student marks and grade                                      

{ marks = m ;

grade = g;

}

public void set Name(String a) {

       name = a;

   }

 public String getName() {

       return name;

   }

void set()

{

cout <<"Marks = " <<marks <<endl;

cout<<"Name=" <<name<<endl;

cout <<"Grade = "<< grade <<endl;

}

};

void main ()

{

clrscr();

Student s1(730,'A','ali') s2(621,'B','haider')

cout <<"Recording of student 1 "<<endl;

s1.set();

cout <<"Recording of Student 2:"<<endl;

s2.set();

getch();        

}

for the above program you can see from

//{

cout <<"Marks = " <<marks <<endl;

cout<<"Name=" <<name<<endl;

cout <<"Grade = "<< grade <<endl;

}//

where name marks and grade are inherited from the class Student with get and set methods.But name is take into data type of string because string hold zero ,more letters , space and commas.So it is used to represent the text data.


Related Questions

Importance of the need for workstation policies and LAN Domain policies.

Answers

Workstation and LAN Domain policies are crucial for defining rules around account security, including password creation, account reactivation, and secure internal communication. These policies protect digital systems from unauthorized access and misuse while preparing the organization for future technological advancements. They create an ethical framework for users to interact with the organization's technological resources.

The importance of having workstation policies and LAN Domain policies lies in maintaining a secure and efficient technological environment within an organization. Account policies can be defined for a domain to enforce rules on user accounts, which include Password Policies, Account lockout policies, and Kerberos Policies. These policies help in regulating access, enhancing security, and setting user expectations through acceptable use policies (AUPs).

For instance, password policies ensure users create strong passwords, which need to be changed after a certain period, increasing the security of organizational systems. Account lockout policies, on the other hand, define the process of regaining access to an account, minimizing the risk of unauthorized access. The Kerberos policy, which is part of a domain's security policy, facilitates secure communication within networks.

Additionally, the use of technology policies needs to accommodate for future innovation and the impact of technology on the workplace and families. Organizations, including school districts, should have clear Technology Use Policies that outline the appropriate use of their systems and the potential consequences of misuse to ensure that all users are aware of the ethical use of computational system.

Write a SELECT statement that returns an XML document that contains all of the invoices in the Invoices table that have more than one line item. This document should include one element for each of the following columns:InvoiceNumberInvoiceDateInvoiceTotalInvoiceLineItemDescriptionInvoiceLineItemAmountHint: Below is the SQL part of the query that you should use so that all you have to add is the XML partSELECT InvoiceNumber, InvoiceDate, InvoiceTotal, InvoiceLineItemDescription AS ItemDescription, InvoiceLineItemAmount AS ItemAmountFROM Invoices AS Invoice JOIN InvoiceLineItems AS LineItemON Invoice.InvoiceID = LineItem.InvoiceIDWHERE Invoice.InvoiceID IN (SELECT InvoiceIDFROM InvoiceLineItemsGROUP BY InvoiceID HAVING COUNT(*) > 1)ORDER BY InvoiceDateSave the XML document that is returned in a file named MultipleLineItems.xmlGenerate an XML schema for the file and save it in a file named MultipleLineItems.xsd

Answers

Answer:

The code is given, paying attention to every column details

Explanation:

columns:

InvoiceNumber

InvoiceDate

InvoiceTotal

InvoiceLineItemDescription

InvoiceLineItemAmount

SELECT InvoiceNumber, InvoiceDate, InvoiceTotal, InvoiceLineItemDescription AS ItemDescription, InvoiceLineItemAmount AS ItemAmount

FROM Invoices AS Invoice JOIN InvoiceLineItems AS LineItem

ON Invoice.InvoiceID = LineItem.InvoiceID

WHERE Invoice.InvoiceID IN (

SELECT InvoiceID

FROM InvoiceLineItems

GROUP BY InvoiceID

HAVING COUNT(*) > 1)

ORDER BY InvoiceDate

FOR XML RAW, ELEMENTS;

Universal containers wants to rollout new product bundles with several pricing options. Pricing options include product-price bundles, account specific pricing and more. Which product satisfies the needs:

A. Custom AppExchange-app for product-pricingB. Workflow on Opportunity/Opportunity ProductC. Formula fields on Opportunity/Opportunity ProductD. Lightning process builder

Answers

Answer:

a) Custom AppExchange-app for product-pricing

Explanation:

We can find a solution in AppExchange for this product-pricing, surfing in the option, we could get solutions like BoonPlus, and easy pricing Opportunity, this App has a free trial.

With this option is easy to choose a book price, add new products, select pricing rule, we can get an order's product, and calculate pricing, just we must download the app and install it.

1. The________  member function moves the read position of a file.


2. Files that will be used for both input and output should be defined as______ data type.


3. The ________member function returns the write position of a file.


4. The ios:: _______file access flag indicates that output to the file will be written to the end of the file.


5. _______ files are files that do not store data as ASCII characters.


6. The ______ member function moves the write position of a file.


7. The __________function can be used to send an entire record or array to a binary file with one statement.


8. The______>> operator_______any leading whitespace.


9. The ________ function "looks ahead" to determine the next data value in an input file.


10.The ________ and __________ functions do not skip leading whitespace characters.

Answers

Answer:

Answers explained with appropriate comments

Explanation:

1. seekp()   //the seekp sets the position where the next character is to be   //inserted into the output stream.

2. fstream  //fstream is used for input and output for files

//just like iostream for input and output data

3. tellp();  //tellp returns the "put" or write position of the file.

4. ios::ate  //ate meaning at the end, sets the file output at the file end

5. binary files  //binary files only store 0s and 1s

6. seekg()  //seekg is used to move write position of the file

7. put  //this is used to "put" or set records or arrays to a single file

8. std::ws , skips //the std::ws is used to discard leading whitespace from an //input stream

9. peek //this looks at the next character in the input sequence

10. get, peak //get and peek do not skip leading whitespace characters

To print the last element in the array named ar, you can write :A. System.out.println(ar.length);
B. System.out.println(ar[length]);
C. System.out.println(ar[ar.length]);
D. None of these

Answers

Answer:

Option (d) is the correct answer.

Explanation:

An Array is used to store multiple variables in the memory in the continuous memory allocation on which starting index value is starting from 0 and the last index value location is size-1.

In java programming language the array.length is used to tells the size of the array so when the user wants to get the value of the last element, he needs to print the value of (array.length-1) location so the correct statement for the java programming language is to print the last element in the array named ar is--

System.out.println(ar[ar.length-1]);

No option provides the above statement, so option d (None of these) is correct while the reason behind the other option is not correct is as follows--

Option a will prints the size of the array.Option b also gives the error because length is an undeclared variable. Option c will give the error of array bound of an exception because it begs the value of the size+1 element of the array.

Describe how your leadership and service has made a positive difference in your school, inyour community, in your family and/or on the job, and how it will continue to make adifference in college and beyond.

Answers

I could describe my leadership and service as being motivational and more a credit-giver.  

I do not own the credit for every successful task that my team has accomplished. In fact, I am giving them all the recognitions they deserved. In times of struggling and great pressure, I would motivate them. Most of their complaints about my leadership method is I do not give importance to time. I normally tend to finish everything before deadlines. With these attitudes, my family learn to adapt to this behavior. They value ideas and teamworks in their respective workplace and like me, they would also hate to submit their works late. They would sometimes get positive feedback from clients for finishing their assigned tasks on time.

When admitting digital evidence at trial, the issue of ________ comes up when the evidence involves computer-generated records.

Answers

Answer:

When admitting digital evidence at trial, the issue of Authenticity comes up when the evidence involves computer-generated records.

Explanation:

The digital evidence such as video, audio or some pictures have been presented before court as evidence. The first question that may arise is related to "authenticity of the material". To authenticate that evidence court may order the forensic audit of that particular evidence.

So, the issue of authenticity of evidence will arise, in case of digital evidence.

Given an input array of strings (characters) s, pick out the second column of data and convert it into a column vector of data. Missing data will be indicated by the number 9999. If you encounter missing data, you should set it to the average of the immediately neighboring values. (This is a bit simpler than using `interp1`.)
If the input array is s = [ 'A' '0096' ; 'B' '0114' ; 'C' '9999' ; 'D' '0105' ; 'E' '0112' ]; then the output variable `t` is the following column vector. t = [96 114 109.5 105 112]';
Compose a function read_and_interp which accepts an array in the above format and returns the data converted as specified. You may find the conversion function `str2num` to be useful.
(Using MATLAB Syntax only)

Answers

Answer:

Consider the following code.

Explanation:

save the following code in read_and_interp.m

 

function X = read_and_interp(s)

[m, n] = size(s);

X = zeros(m, 1);

for i = 1:m

if(str2num(s(i, 2:5)) == 9999)

% compute value based on previous and next entries in s array

% s(i, 2:5) retrieves columns 2-5 in ith row

X(i,1) = (str2num(s(i-1 ,2:5)) + str2num(s(i+1,2:5)))/2;

else

X(i,1) = str2num(s(i,2:5));

end

end

end

======================

Now you can use teh function as shown below

s = [ 'A' '0096' ; 'B' '0114' ; 'C' '9999' ; 'D' '0105' ; 'E' '0112' ];

read_and_interp(s)

output

ans =

96.000

114.000

109.500

105.000

112.000

UC is importing 1000 records and want to avoid duplicate, how can they do it?

Answers

Answer:

By unchecking the 'allow duplicate' box and checking the 'Block duplicate' box  in the SalesForce user interface. More also, including  a column in the import file that has other record name(SF ID)  will ensure no duplicate during import.

Explanation:

importing 1000 records is quiet lengthy and to avoid duplicate  it is important to include in the import file that has other record name(SF ID). By including a column that has another file ID every record will be referenced uniquely thereby easily identifying any duplicate.

It is also important to  check the ''Block duplicate' box in the salesForce user interface to ensure that records are imported without duplicate.

A radiologist’s computer monitor has higher resolution than most computer screens. Resolution refers to the:______

Answers

A radiologist’s computer monitor has higher resolution than most computer screens. Resolution refers to the: number of horizontal and vertical pixels on the screen.

Explanation:

The resolution of a screen refers to the size and number of pixels that are displayed on a screen. The more pixels a screen has, the more information is displayed on it without the user having to scroll for it.

More pixels also define and enhance the clarity of the pictures and content displayed on the screen. Pixels combine in different ratios to provide different viewing experiences for users.

Answer:

              .

Explanation:

File Letter Counter

Write a program that asks the user to enter the name of a file, and then asks the user to enter a character. The program should count and display the number of times that the specified character appears in the file. Use Notepad or another text editor to create a sample file that can be used to test the program.

Answers

The C++ program prompts the user for a file name and a character, counts the occurrences of the character in the file, and displays the result. Error handling is included.

Below is a simple C++ program that accomplishes the task described:

```cpp

#include <iostream>

#include <fstream>

using namespace std;

int main() {

   string fileName;

   char targetChar;

   cout << "Enter the name of the file: ";

   cin >> fileName;

   cout << "Enter the character to count: ";

   cin >> targetChar;

   ifstream inputFile(fileName);    

   if (!inputFile) {

       cerr << "Error opening file. Make sure the file exists." << endl;

       return 1;

   }

   int charCount = 0;

   char currentChar;

   while (inputFile.get(currentChar)) {

       if (currentChar == targetChar) {

           charCount++;

       }

   }

   cout << "The character '" << targetChar << "' appears in the file " << charCount << " times." << endl;

   inputFile.close();

   return 0;

}

```

This program prompts the user to enter a file name and a character. It then opens the specified file, counts the occurrences of the specified character, and displays the result. If the file is not found, it provides an error message.

Which of the following class definitions is correct in Java?(i)public class Student{private String name;private double gpa;private int id;public void Student(){name = "";gpa = 0;id = 0;}public void Student(String s, double g, int i){set(s, g, i);}public void set(String s, double g, int i){name = s;gpa = g;id = i;}public void print(){System.out.println(name + " " + id + " " + gpa);}}(ii)public class Student{private String name;private double gpa;private int id;public Student(){name = "";gpa = 0;id = 0;}public Student(String s, double g, int i){set(s, g, i);}public void set(String s, double g, int i){name = s;gpa = g;id = i;}public void print(){System.out.println(name + " " + id + " " + gpa);}}1. Both (i) and (ii)2. None of these3. Only (ii)4. Only (i)

Answers

Answer:

The answer is "Option 3".

Explanation:

In the given question the code (ii) is correct because in the class definition class "Student" defines a constructor that does not use any return type. and code (i) class definition the class "Student" defines a constructor that uses return type void which is not allowed in the constructor. and other options are not correct that can be described as follows:

In option 1, only code (ii) is correct.In option 2, code (ii) is correct that's why it is not correct. In option 4, it is not correct, because it uses void return type.

An over-target baseline (OTB) is a comprehensive rebaselining effort that is best categorized as an internal replanning effort.

A. True
B. False

Answers

Answer:

The answer is "option B".

Explanation:

An OTB stands for an over-target baseline, it is a new management benchmark when an original target can't have coincided and new goals for management purposes are required.

It is also known as a reference to the foundation for calculating or constructing. It is an understanding between the client and the contractor that the cost base, which is not part of the original contract budget, should include an extra budget

Trainers at Tom’s Athletic Club are encouraged to enroll new members. Write an application that allows Tom to enter the names of each of his 25 trainers and the number of new members each trainer has enrolled this year. Output is the number of trainers who have enrolled 0 to 5 members, 6 to 12 members, 13 to 20 members, and more than 20 members.

Answers

Answer:

The applicatiion and its program output are given below

Explanation:

start

    declaration:

  int numberOfMember,totalNumber,j=0

string array05[totalNumber],array612[totalNumber],array1320[totalNumber],arrayMore20[totalNumber]

string trainerName;

Loop start:

           for i=0-totalNumber

                    totalNumber=number of trainers

                    trainerName=name of trainer

                   numberOfMember=number of memberas added

                    if numberOfMember=0-5

                                  array05[j]=trainerName;

                       elseif numberOfMember=6-12

                                      array612[j]=trainerName;

                       elseif numberOfMember=13-20

                                      array1320[j]=trainerName;

                        else

                                 arrayMore20[j]=trainerName;      

                   j+=1;

end loop

Output:

for i=0-j

print    array05[i]    array612[i]    array1320[i]      arrayMore20[i]

End

Final answer:

The subject at hand revolves around the creation of a computer program for Tom's Athletic Club to register trainers and their new member enrollments. The application would collect trainer names and the count of their respective enrollments, then divide them into categories based on membership numbers. Ultimately, the application would output the number of trainers in every group.

Explanation:

The problem describes setting up an application for the needs of a company, specifically Tom's Athletic Club. It implies around a computer program that collects data from user input, in this case, the names of 25 trainers and the number of new members they have enlisted for the year. The output that the application must produce is a segmentation of the number of trainers based upon the class of members they've registered - 0 to 5, 6 to 12, 13 to 20, or more than 20.

In this scenario, we would write the application in a way that captures and calculates this information. For instance, in Python, we would create lists to store the names of trainers and the respective new members. Further on, using conditional statements, we could sort the trainers into the required groups based on the number of new members enrolled. The result would be the quantity of trainers in each category, which could then be displayed as the result.

This problem combines aspects of data collection, data analysis, and program construction, which are integral components of computer programming and software development processes.

Learn more about Computer Programming here:

https://brainly.com/question/34482855

#SPJ3

Modern operating systems support multitasking by doing what?A) Keeping pending jobs available in memory as processesB) Sharing input and output devices between usersC) Distributing tasks as threadsD) Using hard disk space as an extension of memory

Answers

Answer:

Option A is the correct answer to the following question.

Explanation:

Because multitasking is the process of an operating system in which provides users to accomplish more than one jobs at the same time, for example, we can listen music with creating documents in word such as we can do multiple jobs at a time by which we can save much more time to do other works. So, that's why the following option is correct.

Modify the function to return true if the given decimal is even when it is rounded to the nearest integer, and false otherwise 1 function isRoundedNumberEven(decimal) t 5 * Do not modify code below this line 6 7 console.log(İsRoundedNumberEven(2.2),'<-- console.logCisRoundedNumberEven(2.8), should should be be true'); false;

Answers

Answer:

The function solution is in JavaScript

Explanation:

function isRoundedNumberEven(decimal) {

   return Math.round(decimal) % 2 === 0;

/* the modulus 2 operation is used for numbers divisible by 2 */

/* This indicates even numbers */

}

console.log(isRoundedNumberEven(2.2));

console.log(isRoundedNumberEven(2.8));

Suppose there is a class Roster. Roster has one variable, roster, which is a List of tuples containing the names of students and their number grades--for example, [('Richard', 90), ('Bella', 67), ('Christine', 85), ('Francine', 97)]. Roster has a function findValedictorian that returns the name of the student with the highest grade. Find the valedictorian of the Roster object englishClass and store it in the variable valedictorian.

Answers

Answer:

class Roster:

   def __init__(self,student):

       self.student = student

   def findValedictoian(self):

       

       highscore = 0

       studentList=[]

       bStudent = []

       valedictorian =''

       for pupil in self.student:

           if pupil[1] > highscore:

               highscore = pupil[1]

              valedictorian = pupil[0]

       return valedictorian

   

student = [('rich', 90), ('Bella', 67),('philip', 56)]

englishClass= Roster(student)

print(englishClass.findValedictoian())

Explanation:

we define the roster class using the class keyword, within the class we have our __init__ constructor and we initialize the variable student.

A class method findValedictoian is defined and it compares the grades of each student and returns the name of the student with the highest grade.

An instance is created for English class and the findValedictorian method is called and the valedictorian is printed to the screen.

Discuss in 500 words, why institutions might be reluctant to move there IT to the cloud. Consider specific industries like education, medicine, military, etc.

Answers

Answer:

1. Performance and uptime: In mission critical IT systems like those in the military performance and uptime are so important that the institutions might be reluctant to surrender their local infrastructure for cloud based systems, even if the cloud systems advertise better performance than what the institution's deployment can boast of. Even many corporates are still worried about this aspect of cloud computing. It’s no secret that a fraction of a second on load time can lead to loss of customers.

2. Security: Along with loss of control, security is arguably the biggest concern many large organizations like the military, academic institutions and hospitals have. Can other customers access our data? Have all the security patches been kept up to date? These question create a reluctance to migrate to the cloud among executives and IT directors in these institutions.

3. Data Protection: Closely tied in with security, institutions are concerned about data protection. Many governments place strict data protection requirements on large companies and standards audit schemes such as ISO-9001 place additional restrictions on firms.

For example, the UK’s Data Protection Act requires that personal data not to be transferred to any country outside the EU, unless that country “ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.” Practically, that means it’s often easier for servers to be physically located in the EU for many European institutions.

4. Losing control: When systems go down, it’s invariably the IT Director who takes the blame, so it’s no surprise that they are nervous about handing over responsibility for infrastructure to somebody they don’t even know.

Traditionally, if a hard drive fails or a CPU overheats, it’s the IT department who get the 3am call to fix it. It’s up to them to order the replacement hardware, power down the machine and get it back into production as soon as possible.

Even if you’re renting space in a hosting centre and paying for support, chances are you are physically allowed into the building and have the peace of mind that comes from knowing that, if all else fails, you can go in and fix the hardware yourself.

By moving to cloud computing, the IT Director or CIO can feel like they’re handing over control to a 3rd-party. What happens if one of the drives goes or there’s a networking issue? Who decides what hardware to buy?

The ________ allowed banks, investment firms, and insurance companies to consolidate. It also introduced some consumer protections, such as requiring creditagencies to provide consumers with one free credit report per year.

a. Sarbanes-Oxley Act(SOX)
b. Gramm-Leach-Bliley Act (GLBA)
c. 21 CFR Part 11
d. Homeland Security
e. Presidential Directive 12 (HSPD 12)

Answers

Answer: Graam-Leach Bliley Act(GLBA).

Explanation: This Act was passed by the United States of America Congress,it failed to the the SEC(security and exchange commission) the authority to regulate large investment firms.

This act allowed Financial services firms such as Insurance,Banks and investment firms to consolidate making them more viable and able to withstand market forces. It made some rules called the safeguard rules which enabled financial firms to protect their clients from various risks.

Recall the problem of finding the number of inversions. As in the text, we are given a sequence of numbers a1, . . . , an, which we assume are all distinct, and we define an inversion to be a pair i < j such that aj < ai . We motivated the problem of counting inversions as a good measure of how different two orderings are. However, one might feel that this measure is too sensitive. Lets call a pair a significant inversion if i < j and 2aj < ai .

(a) Describe a O(n log n) algorithm to count the number of significant inversions between two orderings. Make clear how is it that your algorithm would achieve the given O(n log n) execution time bound.

Answers

Answer:

The algorithm is very similar to that of counting inversions. The only change is that here we separate the counting of significant inversions from the merge-sort process.

Explanation:

Algorithm:

Let A = (a1, a2, . . . , an).

Function CountSigInv(A[1...n])

if n = 1 return 0; //base case

Let L := A[1...floor(n/2)]; // Get the first half of A

Let R := A[floor(n/2)+1...n]; // Get the second half of A

//Recurse on L. Return B, the sorted L,

//and x, the number of significant inversions in $L$

Let B, x := CountSigInv(L);

Let C, y := CountSigInv(R); //Do the counting of significant split inversions

Let i := 1;

Let j := 1;

Let z := 0;

// to count the number of significant split inversions while(i <= length(B) and j <= length(C)) if(B[i] > 2*C[j]) z += length(B)-i+1; j += 1; else i += 1;

//the normal merge-sort process i := 1; j := 1;

//the sorted A to be output Let D[1...n] be an array of length n, and every entry is initialized with 0; for k = 1 to n if B[i] < C[j] D[k] = B[i]; i += 1; else D[k] = C[j]; j += 1; return D, (x + y + z);

Runtime Analysis: At each level, both the counting of significant split inversions and the normal merge-sort process take O(n) time, because we take a linear scan in both cases. Also, at each level, we break the problem into two subproblems and the size of each subproblem is n/2. Hence, the recurrence relation is T(n) = 2T(n/2) + O(n). So in total, the time complexity is O(n log n).

Correctness Proof: We will prove a stronger statement that on any input A our algorithm produces correctly the sorted version of A and the number of significant inversions in A. And, we will prove it by induction. Base Case: When n = 1, the algorithm returns 0, which is obviously correct.

Inductive Case: Suppose that the algorithm works correctly for 1, 2, . . . , n − 1. We have to show that the algorithm also works for n. By the induction hypothesis, B, x, C, y are correct. We need to show that the counting of significant split inversions and the normal merge-sort process are both correct. In other words, we are to show that z is the correct number of significant split inversions, and that D is correctly sorted.

First, we prove that z is correct. Due to the fact that B and C are both sorted by the induction hypothesis, for every C[j], where j = 1, . . . , length(C), we can always find the smallest i such that B[i] > 2C[j]. Therefore, B[1], B[2], . . . , B[i − 1] are all smaller than or equal to 2C[j], and B[i], B[i + 1], . . . , B[length(B)] are all greater than 2C[j]. Thus, length(B) − i + 1 is the correct significant split inversion count for pairs involving C[j]. After counting the number of correct significant split inversions for all C[j], where j = 1, . . . , length(C), z is the correct number of significant split inversions. Second, we show that D is the sorted version of A.

This is actually the proof of merge-sort. Each time, we append one element from B or C to D. At each iteration k, since B and C are both sorted by the induction hypothesis, min(B[i], C[j]), the one to be appended to D, is also the smallest number among all the numbers that have not been added to D yet.

As a result, every time we append the smallest remaining element (of B and C) to D, which makes D a sorted array

As the network engineer, you are asks to design an IP subnet plan that calls for 5 subnets, with the largest subnet needing a minimum of 5000 hosts. Management requires that a single mask must be used throughout the Class B network. Which of the following is a public IP network and mask that would meet the requirements?a. 152.77.0.0/21b. 152.77.0.0/17c. 152.77.0.0/18d. 152.77.0.0/19

Answers

Answer:

d) 152.77.0.0/19 (255.255.224.0)

Explanation:

If it is required to use a single mask throughout a Class B network, this means that by default, we have 16 bits as network ID, and the remaining 16 bits as host ID.

If we need to set up 5 subnets and we need that the largest subnet can support a minimum of 5000 hosts, we need to divide these 16 bits from the Host ID part, as follows:

Number of hosts = 5000

We need to find the minimum power of 2 that meet this requirement:

2ˣ - 2 = 5,000 ⇒ x = 13

We have left only 3 bits from the original 16, and repeating the process, we find that we need to use the 3 bits in order to accommodate the 5 subnets,

due to with 2 bits we could only support 4.

So, we need that the address mask be, using the CIDR notation, /19, as we need that the first three bits from the third byte to be part of the network ID.

In decimal notation, it would be as follows:

255.255.224.0

Final answer:

The correct IP subnet plan that can support at least 5000 hosts in the largest subnet while using a Class B network and a single mask throughout is 152.77.0.0/19.

Explanation:

You are asked to provide an IP subnet plan for a scenario that requires 5 subnets, with the largest subnet supporting at least 5000 hosts, while using a single mask throughout a Class B network. To determine the correct subnet mask, you need to consider the number of hosts required for the largest subnet. Given that each subnet needs to accommodate at least 5000 hosts, the subnet must allow for more than 5000 host addresses. Calculating the number of bits for the host part, 2n - 2 must be greater than 5000 (where n is the number of host bits). This calculation gives us at least 13 bits for the host part (213 - 2 = 8190). Therefore, considering a Class B address starts with 16 network bits, adding 13 bits for the host part totals 29 bits for the network and host. Therefore, the subnet mask should be /19 (32 - 13 = 19) to meet the requirements.

With this in mind, among the given options, 152.77.0.0/19 is the correct network and mask that would meet the requirements as it provides up to 8190 possible host addresses in each subnet, which is more than sufficient for the largest subnet that requires 5000 hosts.

A source A producing fixed-length cells is required to use a Token Bucket Traffic Shaper (TBTS) of bucket capacity b=20 cell tokens and token feed rate r=40 tokens/sec, followed by a FIFO buffer with output read rate (peak rate) limited to q=120 cells/sec. The output is A’s flow into the network. What is the long-term average cell rate for this flow?

Answers

Answer:

Please find the detailed answer as follows:

Explanation:

Long-term average cell rate is also called as sustained cell rate(SCR). It can be defined as the maximum average cell rate in a log time period(T).

The relation among the SCR, Average cell rate and Peak cell rate is as follows:

Avg.cell rate ≤ SCR ≤ PCR

If the source producing fixed-length cells at constant rate, then the long-term average cell rate will be same as peak cell rate(PCR).

John is runnig his Database application on a single server with 24 Gigabytes of memory and 4 processors. The system is running slow during peak hours and the diagnostic logs indicated that the system is running low on memory. John requested for additional memory of 8 Gigabytes to be added to the server to address the problem. What is the resultant type of scaling that John is expecting?

Answers

Answer:

Vertical Scaling

Explanation:

Vertical scaling means the ability to increase the capacity of existing hardware or software by adding resources. In this case, more GB is added (8GB) to the server to address the problem. So vertical scaling is the resultant type john is expecting.

In one to two sentences, describe how to change your home page.

Answers

Answer:

The main page of a website a visitor see while navigating, known as Home page.

Explanation:

The steps by which we can easily change our home page of Google Chrome, are as follows:

Step 1 :- Open Google Chrome.

Step 2 :- Click on the three vertical dots which appears next to the icon (profile).

Step 3 :- Click on settings, turn 'Show home button' to ON.

Step 4 :- Choose the new tab page you had like to use.

Answer:

First you would want to search in the bottom left search bar "settings", once you're there you would want to go to the top of the settings search bar and search up home page. Once you're there you can do whatever you want to do with your homepage.

Explanation:

got it right on edg.

_____________ accepts a table to read data from and optionally a selection predicate to indicate which partitions to scan.
a) HCatOutputFormatb) HCatInputFormatc) OutputFormatd) InputFormat

Answers

Answer:

The answer is "Option b"

Explanation:

In the given question the answer is "HCatInputFormat" because it is used to read data from HCatalog controlled table, it also used in MapReduce work and scan the partitions. and other options are incorrect that can be described as follows:

In option a, It is an output format, that is used to show the data, that's why it is not correct.In option c and option, It does not use full name that is HCatalog, that's why it is not correct.

To direct a style rule to specific elements, __________ can be used to match only those page elements that correspond to a specified pattern.

Question 2 options:



a)

web fonts



b)

pseudo-classes



c)

descendant elements



d)

selector patterns

Answers

Answer:

d) selector patterns

Explanation:

To apply and create rules to elements in the same class, selector patterns are a simple solution to make the task easier.

Selector patterns allow you to have a set of rules, tools already tested, which allow you to solve most problems directly.

To direct a style rule to specific elements, selector patterns are used. Selectors can be a tag, class, or ID and are specified at the start of a CSS rule followed by curly braces containing the style declarations.

Using Selectors in CSS

To direct a style rule to specific elements, selector patterns can be used to match only those page elements that correspond to a specified pattern. The selector is the first part of a CSS rule that identifies the HTML elements the subsequent styles will apply. It can reference an HTML tag directly, or it can be a custom class, ID or even a combination of selectors for more specificity. Once you specify a selector, you can define styles inside the curly braces {} that follow.

For example, using a descendant selector like .completed ul, you can target all <ul> elements within an element with the class .completed, and apply a specific style such as text-decoration: line-through; to them. This type of specificity ensures that styles are applied precisely to the elements intended. The colon (:) is used in CSS to assign values rather than an equal sign, which is typical in many programming languages.

When defining classes in our CSS file, we precede the name with a period to indicate it is a class and use the class attribute within the HTML document to apply it to elements. Classes allow us to apply different styles to the same type of elements, enhancing the page's design and user experience.

Which one of the following characteristics or skills of a ScrumMaster are closelyaligned with coaching?Select one:

a. Questioning
b. Protective
c. Transparent
d. Knowledgable

Answers

Answer:

A. Questioning

Explanation:

Questioning is the skill of a scrummaster that is most closely alligned with coaching, inspite of others.

Final answer:

The correct answer is "Questioning". The ScrumMaster's skill of questioning is closely aligned with coaching, as it encourages discussion, reflection, and problem-solving within the team.

Explanation:

The role of a ScrumMaster in the Scrum methodology of Agile software development includes various responsibilities that contribute to the success of the project. When considering which characteristics or skills are closely aligned with coaching within the ScrumMaster's role, the most relevant option among those provided would be questioning. A ScrumMaster utilizes questioning to facilitate discussion, encourage team reflection, and promote problem-solving abilities, all of which are essential coaching techniques. This helps the team find solutions to their impediments and continuously improve their processes, aligning with the ScrumMaster's goal of coaching the team towards self-organization and leveraging their full potential.

1. True/False:
Mark either T (true) or F (false) for each statement in below. Write in one short sentence why you chose that answer, if necessary. You may lose points if your answer is very long.
a. Adjacency lists are more space efficient than adjacency matrices for sparse graphs. A sparse graph G = (V,E) has |E| = O(|V|).
b. The maximum number of edges in a graph with n vertices is n (n +1) / 2 .
c. A spanning tree of a graph with n vertices contains n edges.
d. Dijkstra’s algorithm does not work on directed graphs.
e. A dynamic programming algorithm makes short-sighted choices that are locally optimal.
f. Dynamic programming is an appropriate choice to solve merge sort.
g. Prim’s and Kruskal’s algorithms are examples of greedy algorithms.
h. In a flow network, the capacity of an edge must be less than or equal to the flow on the edge.
i. Dynamic programming uses memoization to avoid solving the same subproblem more than once.
j. Choice of data structures do not impact the time complexity of graph algorithms.

Answers

Answer:

(a) - True

(b)- False

(c)-  False

(d) - False

(e) - False

(f) - False

(g)- True

(h)-  False

(i) - False

(j) - False

Explanation:

(a)-  In an adjacency list the usage of space depends upon the number of edges and vertices in the graph while in the case of the matrix efficiency depends upon the square of the vertices.

(b) The maximum number of edges is n*(n-1).

(c) The number of edges with a spanning tree of n vertices contains n-1 edges.

(d) Dijkstra's Theorem simply refers the adjacent vertices of a vertex and is independent of the fact that a graph is directed or in directed.

(e)  Greedy Algorithm makes short sighted choices

(f) Consider the term overlapping sub-problems which is the technique used in Dynamic programming it uses previous calculations to find optimal solutions however in case of merge sort the idea is to break down array into smaller pieces that don't overlap unlike dynamic programming.

(g) Prim and Kruskal's algorithm are examples of greedy algorithm because the use the idea to pick the minimum weight edges at every step which is the approach of a greedy algorithm.

(h) the amount of flow on an edge cannot exceed its capacity.

(i) Dynamic Programming can be implemented using tabulation too.

(j) Different data structures have different time complexity.

Define a function below called nested_list_string. The function should take a single argument, a list of lists of numbers. Complete the function so that it returns a string representation of the 2D grid of numbers. The representation should put each nested list on its own row. For example, given the input [[1,2,3], [4,5,6]] your function should produce the following string: "1 2 3 \n4 5 6 \n" Hint: You will likely need two for loops.

Answers

Answer:

The solution code is written in Python:

def nested_list_string(list2D):    output = ""    for i in range(0, len(list2D)):        for j in range(0, len(list2D[i])):            output += str(list2D[i][j]) + " "        return output  

Explanation:

Let's create a function and name it as nested_list_string() with one input parameter, list2D (Line 1).

Since our expected final output is a string of number and therefore we define a variable, output, to hold the string (Line 2).

Next use two for loops to traverse every number in the list and convert each of the number to string using str() method. Join each of individual string number to the output (Line 3-5).

At the end, we return the output (Line 7)

The 'nested_list_string' function converts a list of lists of numbers into a string that visually represents a 2D grid, with each sublist converted to a row of numbers separated by spaces, and rows separated by newlines.

The function called nested_list_string should be defined to take a list of lists of numbers as its argument and return a string representation of the 2D grid. To achieve this, you will need to use a nested for loop. The outer loop will iterate over each sublist (which represents a row of the grid), and the inner loop will iterate over each number in the sublist, converting it to a string and appending it to a string variable along with spaces. The \n character is used to move to the next line after each sublist is processed, thus simulating rows.

Here's an example code:

def nested_list_string(list_of_lists):
   result = ''
   for sublist in list_of_lists:
       for number in sublist:
           result += str(number) + ' '
       result += '\n'
   return result

Given an input like [[1,2,3], [4,5,6]], the nested_list_string function would return '1 2 3 \n4 5 6 \n'.

What is the difference between write back and write through?
A. With write back, main memory is updated immediately, but with write through, the memory is updated only when the block is replaced.
B. With write through, main memory is updated immediately, but with write back, the memory is updated only when the block is replaced.
C. With write through, the block is replaced when it is written, but with write back, it is replaced when it is read.
D. With write through, the block is replaced when it is read, but with write back, it is replaced when it is written.
E. They are two names for the same thing.

Answers

The difference between write back and write through is With write through, the block is replaced when it is read, but with write back, it is replaced when it is written.

D. With write through, the block is replaced when it is read, but with write back, it is replaced when it is written.

Explanation:

Write back and write through difference  as follows.

Write back update the memory cache at specific intervals times with specific conditions. Memory cache is update on corresponding memory location, which makes faster to desktop or workstation or tablet.

Written through is copied caching techniques data copied to higher level caches. Basically it copy from memory cache only. In write through mode just refresh main memory.

So write back update memory cache on specific intervals whereas write through copy the cache and make memory refresh with fresh updates.

Other Questions
The energy available to consumers determined by subtracting the energy used by plants from the total energy transformed by the process of photosynthesis. True or False Which of the following approaches emphasizes the need to follow legal rules regardless of unfavorable consequences?a. Virtue ethicsb. Utilitarianismc. Principle-basedd. Egoism A prisoner on trial for a felony is presumed innocent until proven guilty. (That is, innocent is the null hypothesis.) Which of the following represents the risk involved in making a Type II error?a. The prisoner is actually guilty and the jury sends him to jail.b. The prisoner is actually innocent and the jury sends him to jail.c. The prisoner is actually innocent and the jury sets him free.d. The prisoner is actually guilty and the jury sets him free.e. The prisoner is sent to jail. Do the new data support the hypothesis that the parasite switched surface glycoproteins once the host immune system responded to the original glycoprotein? What name is given to the rate at which velocity changes? Recent work suggests that problems with the endogenous opioid system are as-sociated with which personality disorder? As chief justice of the Supreme Court, John Marshall a. promoted the growth of state sovereignty. b. supported the attainment of political and social equality. c. emphasized the primacy of property and property rights. d. abandoned his Federalist sympathies. Which number line best shows how to solve 8 (6)? A number line from negative 10 to 10 is shown with numbers labeled at intervals of 2. An arrow is shown from point 0 to negative 8. Another arrow points from negative 8 to negative 6. A number line from negative 10 to 10 is shown with numbers labeled at intervals of 2. An arrow is shown from point 0 to negative 6. Another arrow points from negative 6 to negative 8. A number line from negative 10 to 10 is shown with numbers labeled at intervals of 2. An arrow is shown from point 0 to negative 6. Another arrow points from negative 6 to 2. A number line from negative 10 to 10 is shown with numbers labeled at intervals of 2. An arrow is shown from point 0 to negative 8. Another arrow points from negative 8 to negative 2. Linda owns 4 shares of a certain stock. Yesterday the total value of her shares went down by 32 dollars. What was the change in value for each share? Coordinates of centroid of a triangle with vertices of (0,1) (2,6) (7,2) Most new immigrants who arrived during the early years of the twentieth century: Select one: a. learned English immediately. b. planned to remain in the United States temporarily. c. generally earned lower wages in America than in their former homelands."" PLEASE HELP! 20 POINTS! What is the apparent solution to the system of equations? y=1/2x+2y=2x1 Graph the system of equations using the Line tool. Plot a point at the apparent solution to the system using the Point tool. Technology can have good and bad effects.what is a bad effect of spraying pesticides on crops How do the question headings affect the tone of the passage?A)The question headings create a lighthearted tone.B)The question headings create a informational tone.C)The question headings create a confrontational tone.D)The question headings do not have any effect on the tone. the rate of watering is Rs. 4 per ll.6) Find the area of the cardboard required to make a closed box of length25cm, 5m and height 15cm.dim deep is to be made. It is open at the WILL GIVE LARGE REWARD!Given: Sector BAC with r=8 Radius of inscribed circle O is 2 Find the area of the sector BAC Draw the product of the following reaction between a ketone and an alcohol. The view of development that sees motor skills developing as a solution to an infant's problems is known as _____ systems theory.a) dynamicb) maturationalc) staticd) environmental Membrane-enclosed organelles, such as nuclei, lysosomes, endoplasmic reticulum, mitochondria, and chloroplasts, A) form specialized compartments within eukaryotic cells for specific functions to occur. B) increase the structural complexity of eukaryotic cells. C) help large eukaryotic cells overcome the limitations of diffusion imposed by their large cell size. D) increase structural complexity, help eukaryotes overcome diffusion limitation due to their size, and form specialized environments for specific functions to occur. Comparison of Photosynthesis and Cellular Respiration Steam Workshop Downloader