What are advantages of lookup fields?

Answers

Answer 1

Answer:

Easier data entry, acceptable values, fewer misspellings

Explanation:

Edge 2021

Answer 2

A column in a table that looks up data from another table or query is known as a lookup field.

What is Lookup filed?

The Lookup Wizard should always be used to create a lookup field. The Lookup Wizard streamlines the procedure by automating the required field attributes' automatic insertion and the creation of the proper table associations.

A lookup field is used to display something more meaningful, such a name, instead of a number like an ID. For instance, Access can show a contact name rather than a contact ID number.

The bound value is the contact ID number. It is automatically replaced with the contact name after being looked up in a source database or query.

Therefore, A column in a table that looks up data from another table or query is known as a lookup field.

To learn more about lookup field, refer to the link:

https://brainly.com/question/31923038

#SPJ2


Related Questions

Priscilla is providing the junior analysts in her firm with some real-world illustrations to explain some of the recommendations that they must be prepared to make to clients, based on what they have studied in their coursework, in order to solidify their understanding. Which is a reason Priscilla will share with the new analysts for recommending that a client purchase a software package?

Answers

Options:

a) The client wants to develop internal resources and capabilities

b) The client is looking for the lowest possible costs

c) The client has unique business requirement that must be satisfied by this software application

d) The client has some existing technology in place whose requirements must be met by the new software

Answer:

d) The client has some existing technology in place whose requirements must be met by the new software

Explanation:

For a client to purchase a software, the client has an already existing technology that requires that software for adequate functioning. The analyst will recommend the new software to the client based on the technology he/she previously has and the requirements he wants to meet.

The other options are not impossible, but they are not the primary reason why the software will be purchased, the overall aim for all the company's activities may be to develop internal resources and capabilities or to meet some unique business requirements, but these are secondary. The primary purpose is that the client has a technology that cannot function properly without the recommended software.

Define a JavaScript function named thanos which has a single parameter. This function will be called so that the parameter will be an array. Your function should return a NEW array which contains only the entries at even indices. (Hint: you can tell an index is even if that index mod 2 is equivalent to 0).. Examples: thanos([ ]) would evaluate to [ ] thanos(['0', 2, 4]) would evaluate to ['0', 4]

Answers

Answer:

See explaination

Explanation:

function thanos(lst) {

var result = [];

for (var i = 0; i < lst.length; i += 2) {

result.push(lst[i]);

}

return result;

}

// Testing the function here. ignore/remove the code below if not required

console.log(thanos([]));

console.log(thanos(['0', 2, 4]));

Your friends’ preschool-age daughter Madison has recently learned to spell some simple words. To help encourage this, her parents got her a colorful set of refrigerator magnets featuring the letters of the alphabet (some number of copies of the letter A, some number of copies of the letter B, and so on), and the last time you saw her the two of you spent a while arranging the magnets to spell out words that she knows. Somehow with you and Madison, things always end up getting more elaborate than originally planned, and soon the two of you were trying to spell out words so as to use up all the magnets in the full set – that is, picking words that she knows how to spell, so that once they were all spelled out, each magnet was participating in the spelling of exactly one of the words. (Multiple copies of words are okay here; so for example, if the set of refrigerator magnets includes two copies of each of ‘C,’ ‘A,’ and ‘T,’ it would be okay to spell out "CAT" twice.) This turned out to be pretty difficult, and it was only later that you realized a plausible reason for this. Suppose we consider a general version of the problem of Using Up All the Refrigerator Magnets, where we replace the English alphabet by an arbitrary collection of symbols, and we model Madison’s vocabulary as an arbitrary set of strings over this collection of symbols.

Answers

Answer:

See explaination

Explanation:

Given a set U which is the set of magnets where each magnet representing a symbol, but are accepted more copies of the same symbol which we number arbitrarily 1,2,3,. ... For example if we had two copies of the symbol A, we would have elements A 1 ,A 2 ) and subsets S 1 ,...S n which represent words formed from the magnets that Madison knows how to spell. Note that if ‘’CAT” was a word in Madison’s vocabulary, then both of the sets C,A 1 ,T and C,A 2 ,T would appear among the S i . We are interested in the maximum number of disjoint sets (which correspond to words in Madison’s vocabulary that can be simultaneously spelled out by the magnet pieces).

We reduce Independent Set (IS) to Set Packing. Given an instance of IS ( G,k ), we set U to be the set of edges of G . For each vertex v i , we introduce a set S i = { e : e = ( v i ,x ) } which has one element for each edge incident to v i . We claim that G has an independent set of size k iff there are k disjoint sets among the S i . Indeed, if I is an independent set of size k then the k sets S v for v ∈ I have no common elements. Also, if { S i 1 ,...,S i k } are k disjoint sets then the vertices v i 1 ,...,v i k have no edges between them thus they form an independent set of size.

For credit card processing, stock exchanges, and airline reservations, data availability must be continuous. There are many other examples of mission-critical applications. Research the Internet to find four additional mission-critical applications and explain why data availability must be continuous for these applications. If you use information from the Web, use reputable sites. Do not plagiarize or copy from the Web. Be sure to cite your references.

Answers

Answer:

The answer to this question can be described as follows:

Explanation:

The mission-critical System-

A vital mission program is necessary for an organization's life. If a critical task program disrupted, industrial control should be severely affected.  The essential support device is often referred to as critical task equipment.

Safety system for nuclear reactors-

The nuclear power plant is used to control the system, and it also contains and continues reactions.  It's also usually used only for energy production, and also used experiments and clinical isotope manufacture.  

If another system of nuclear power fails, this could result in a continuous nuclear reaction in a range of aspects like irradiated leaks. These same persons across the area may experience serious radioactivity symptoms.

The main task in their personal life-  

They realize, that without power, they turn down your entire life when you've never encountered a dark off with more than 30 minutes. Essentially, people wouldn't have been allowed to do what you'll do, entirely frozen.  

Consumer survey: big financial transfer controlling business-

That company is the infrastructure and software supplier for banks, traders, distributors, and institutional investors to take out money transfers. With all the money transfers they depend on, you must establish a successful company to become the 'guy behind the button', etc.

g Given an array, the task is to design an efficient algorithm to tell whether the array has a majority element, and, if so, to find that element. The elements of the array are not necessarily from some ordered domain like the integers, and so there can be no comparisons of the form "is A[i] ≥ A[j]?". (Think of the array elements as GIF files, say.) However you can answer questions of the form: "is A[i] = A[j]?" in constant time

Answers

Answer:

If there is a majority element in the array it will be the median. Thus,

just run the linear time median finding algorithm, and compare the result with all the  elements of the array (also linear time). If [tex]\frac{n}{2}[/tex]elements are the same as the median, the  median is a ma majority element. If not, there is none.

Suppose now that the elements of the array are not from some ordered domain like the  integers, and so there can be no comparisons of the form "is the ith element of the array  greater than the jth element of the array?" However you can answer questions of the  form:

"Are the ith and jth elements of the array the same?" in constant time. Such

queries constitute the only way whereby you can access the array. (Think of the elements  of the array as GIF files, say.) Notice that your solution above cannot be used now.

Select the correct statements regarding Asynchronous Transfer Mode (ATM): a. ATM is a fixed-length cell standard that supports voice, video and data b. ATM is connection-oriented c. ATM offers predictability regarding latency; therefore ATM can offer quality-of-service (QoS) to users d. All of the above are correct

Answers

Answer:

D. All of the above are correct.

Explanation:

Asynchronous Transfer Mode is a fixed-length cell structure which allows cells to support voice, video  and data. Voice data can be converted to packets and shared with large packet data. Because voice packets, encounter queuing delays, they ought to be of the same size or length.

ATM provides a route between two end points and that is why it can be said to be connection oriented. There is an ease of switching in hardware because of the fixed structure of the ATM. It also offers predictability regarding latency which could be either high or low. So, all of the above satisfy the mode of operation of the Asynchronous Transfer Mode.

A computer company has $3840000 in research and development costs. Before accounting for these costs, the net income of the company is $2580000. What is the amount of net income or loss before taxes after these research and development costs are accounted for?

Answers

Answer:

The answer is "loss of 1,260,000"

Explanation:

Following are the important points of the question:

The cost of research and development is = $3840000

net income of the company is=  $2580000

Find: loss or profit .

According to the rate of the cost, the company cost is higher than the company rate. So, the company goes in loss stage, then  

Loss = total cost - net income

Loss = $3840000 - $2580000

Loss= $ 1,260,000

The computer company would face a net loss of $1,260,000.

The question is asking about the calculation of net income or loss for a computer company after accounting for research and development costs. To determine the net income or loss, we subtract the research and development (R&D) costs from the company's income before these costs are accounted for.

So, if the net income before R&D costs is $2,580,000 and the R&D costs are $3,840,000, we perform the following calculation:

Net Income after R&D = Net Income before R&D - R&D costs

Net Income after R&D = $2,580,000 - $3,840,000

Net Income after R&D = -$1,260,000

This result is a net loss of $1,260,000 after accounting for R&D costs.

When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. But, she does not like to remember too many passwords. She wants to keep only one password. So, she tried to change the password again to her original password. But, she cannot change the password. Why can’t she change the password

Answers

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.

Create a flowchart from start to end. 1.Initialize Z (set Z=0)2.Ask for user’s input X3.If X =1, then continue to the next statement. If X does not equal to 1, end the program.4.While Z is incrementing by 1, print Z. (Note: use WHILE symbol for the flowchart)5.Print Z until Z = 5. 6.When Z = 5, ends the program and print "HW is done".

Answers

Answer:

The flowchart to this question can be given in attachment.

Explanation:

In the given statement, a flowchart is defined, in which we use an oval shape to start the, in the next step square shape is used, that initializes the value 0 in z variable, and an input box is used for user input in x variable.

In the next step, the conditional box is used, that checks variable x value if the value is equal to 1, it will increment the value of variable z by 1. Inside this another, if block is used, that check value of z equal to 5, if the value does not match it will increment the value of z, and prints its value.

Susan was recently fired from her executive IT position. You have concerns that she has enough knowledge and expertise to sabotage company documents—and you need to delete her access. However, upon beginning, you find information that should be retained in her user directory for future company needs. Consider the process you would take to ensure that Susan no longer has access and that data is retained. In situations like this, do you think the benefits outweigh the risks enough to retain user information? Why or why not?

Answers

Answer:

A

To ensure that Susan no longer has access without erasing her files I'll take the following steps:

I'll create a new group and and name it Retired and make sure it has no user privileges at all.Next step is to move Susan's profile to the Retired group. This is ensure that she does not have rights or access to any other user groups.

B

The benefits that accrue to retaining her information will depend on the value of information that her account possesses. As the former executive IT personnel, this is most likely the case.

In the long run, the safest thing to do might be to just back up all information she created and had access to to a remote storage or data warehouse.

Cheers!

Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N : Lather and rinse." num_cycles times, where N is the cycle number, followed by "Done.". Sample output with input: 2 1 : Lather and rinse. 2 : Lather and rinse. Done. Hint: Define and use a loop variable.

Answers

Answer:

def print_shampoo_instructions(num_cycles):

   if num_cycles < 1:

       print("Too few.")

   elif num_cycles >4:

       print("Too many.")

   else:

       N = 1

       for N in range (N,num_cycles+1):

           print(N,": Lather and rinse.")

       print("Done.")

Explanation:

Final answer:

The function shampoo_instructions() controls repetitions based on input, preventing infinite loops, akin to the shampoo instructions' issue. It emphasizes the importance of iteration control in programming loops to avoid endless execution. Understanding how to manage loop cycles prevents program malfunction due to infinite loops.

Explanation:

shampoo_instructions() is a function that takes a parameter num_cycles and prints instructions based on the input. If num_cycles is less than 1, it prints 'Too few.'; if more than 4, it prints 'Too many.'; otherwise, it prints the cycle number followed by 'Lather and rinse.' num_cycles times.The directions on shampoo create an infinite loop since they lack an iteration variable to specify the number of repetitions. In programming, developers must include a mechanism to control loops' execution, preventing infinite iterations.

In a loop, each iteration represents a cycle, akin to the instructions in shampoo; therefore, the concept of controlling the number of repetitions is fundamental to avoid infinite loops and ensure proper program execution.

what is linux? what is it good for. And why do people use it?

Answers

Answer:

Linux is Unix-based and Unix was originally designed to provide an environment that's powerful, stable and reliable yet easy to use. Linux systems are widely known for their stability and reliability, many Linux servers on the Internet have been running for years without failure or even being restarted

Explanation:

Linux is used for commercial networking

Write a class named Employee that has the following fields: • name: The name field is a String object that holds the employee's name. • idNumber: The idNumber is an int variable that holds the employee's ID number. • department: The department field is a String object that holds the name of the department where the employee works. • position: the position field is a string object that holds the employee's job title.

Answers

Answer:

See attachment please

You are in the middle of restarting your computer when the power goes out in the building. When the power is restored, your computer will not restart. When you push the button to turn on the computer, nothing happens. You do not have video on your monitor, but the monitor will turn on. You also notice that you don't hear fans spinning and no indicator lights show on your computer. The monitor is on the same power strip as your computer. What might be the problem?

Answers

Answer:

The Power supply has been damaged.

Explanation:

There is no video on the monitor, but the monitor is tamed on. Also, there is no fan spinning sound. What this means is that the Power supply is not working, because fan is unable to work. The light of monitor is on because the direct power supply from the building is fate.

Note: In case of CMOS RAM is damaged, or processor is damaged, CPU fan will run properly until and unless the power supply is not enough.

Create a public non-final class called InsertionSorter. It should provide one public class method called sort. Sort should accept an array of Comparable Java objects and sort them in ascending order. However, it should sort the array in place, meaning that you modify the original array, and return the number of swaps required to sort the array. That’s how we’ll know you’ve correctly implemented insertion sort. If the array is null or empty you should return 0. You can assume that the array does not contain any null values.

Answers

Answer:

See explaination

Explanation:

public class InsertionSorter {

/* Function to sort array using insertion sort */

int sort(Comparable arr[]) {

int count = 0;

if (arr == null || arr.length == 0)

return 0;

int n = arr.length;

for (int i = 1; i < n; ++i) {

Comparable key = arr[i];

int j = i - 1;

while (j >= 0 && arr[j].compareTo(key) > 0) {

count++;

arr[j + 1] = arr[j];

j = j - 1;

}

arr[j + 1] = key;

}

return count;

}

// Driver method

public static void main(String args[]) {

Integer arr[] = { 50,21,34,26, 18, 31, 37, 54 };

InsertionSorter ob = new InsertionSorter();

int comp = ob.sort(arr);

System.out.println("Comparisons required : "+comp);

for(int i:arr)

System.out.print(i+" ");

}

}

What is SDLC? Explain different phases of SDLC in detail.

Answers

Answer:

systems engineering

Explanation:

In systems engineering, information systems and software engineering, the systems development life cycle, also referred to as the application development life-cycle, is a process for planning, creating, testing, and deploying an information system.

Tom has just started working as an intern for a local radio station. He is responsible for managing the request line and presenting request trends to management each month. Tom uses Microsoft PowerPoint 2016 to create his presentations. As he hovers over each choice, Tom sees his slide change automatically. What Tom is experiencing is called ____.

Answers

Answer:

Live Preview.

Explanation:

This is a feature specifically found in the microsoft power point in detailing or slides showing in a preliminary stage of its previews.

By default, when you select the composing email content and change its text format, such as text font, size, color and so on, the live preview will be displayed when you put your cursor on different text format.

Actually the live preview function can be enabled or disabled manually in Outlook. In this tutorial, we will show you how to enable or disable live preview in Outlook in details.

Write a Java program which reads a text file and writes the content into a new file. During the read-write process, convert all the upper case letters into lower case ones. In other words, your programming task is to create a new file with the same content of the original file, only that all the upper case letters are converted into lower case ones in the new file.

Answers

Answer:

Kindly go to the explanation part for the code you seek.

Explanation:

This is the Code to Copy:

package file;

import java.io.BufferedReader;

import java.io.BufferedWriter;

import java.io.DataInputStream;

import java.io.FileInputStream;

import java.io.FileWriter;

import java.io.InputStreamReader;

import java.util.Scanner;

public class file

{

public static void main(String []args)

{

try

{

System.out.print("Type a file name: ");

//declare scanner for keyboard input

Scanner reader = new Scanner(System.in);

//scan the input file name

String infilename=reader.nextLine();

//define file stream

FileInputStream fstream = new FileInputStream(infilename);

DataInputStream in = new DataInputStream(fstream);

//define the buffer reader

BufferedReader br = new BufferedReader(new InputStreamReader(in));

String outfilename = "output.txt";

FileWriter fileWriter = new FileWriter(outfilename);

//declare buffer writer for file write

BufferedWriter bufferedWriter = new BufferedWriter(fileWriter);

String strLine,filename;

int status = 0;

int i=0;

//read lines one by one from input file

while ((strLine = br.readLine()) != null)

{

String temp="";

//for each character in a line

for(int k=0;k<strLine.length();k++)

{

char c;

c=strLine.charAt(k);

//if the character is uppercase

if(Character.isUpperCase(c))

//make the character lowercase and append it to the output line

temp +=Character.toLowerCase(c);

else

//character is not lowercase. append to the output line without changing it

temp += c;

}

//write the line to the file

bufferedWriter.write(temp+"\n");

}

//close the input file

in.close();

//close the output file

bufferedWriter.close();

}

catch (Exception e)

{

//System.err.println("Error: " + e.getMessage());

}

}

}

Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file that contains the numbers in random order. Handle lookups by name and also reverse lookups by phone number. Use a binary search for both lookups.

Answers

Answer:

See explaination

Explanation:

PhoneLookup.java

import java.io.FileReader;

import java.io.IOException;

import java.util.Scanner;

public class PhoneLookup

{

public static void main(String[] args) throws IOException

{

Scanner in = new Scanner(System.in);

System.out.println("Enter the name of the phonebook file: ");

String fileName = in.nextLine();

LookupTable table = new LookupTable();

FileReader reader = new FileReader(fileName);

table.read(new Scanner(reader));

boolean more = true;

while (more)

{

System.out.println("Lookup N)ame, P)hone number, Q)uit?");

String cmd = in.nextLine();

if (cmd.equalsIgnoreCase("Q"))

more = false;

else if (cmd.equalsIgnoreCase("N"))

{

System.out.println("Enter name:");

String n = in.nextLine();

System.out.println("Phone number: " + table.lookup(n));

}

else if (cmd.equalsIgnoreCase("P"))

{

System.out.println("Enter phone number:");

String n = in.nextLine();

System.out.println("Name: " + table.reverseLookup(n));

}

}

}

}

LookupTable.java

import java.util.ArrayList;

import java.util.Collections;

import java.util.Scanner;

/**

A table for lookups and reverse lookups

*/

public class LookupTable

{

private ArrayList<Item> people;

/**

Constructs a LookupTable object.

*/

public LookupTable()

{

people = new ArrayList<Item>();

}

/**

Reads key/value pairs.

atparam in the scanner for reading the input

*/

public void read(Scanner in)

{

while(in.hasNext()){

String name = in.nextLine();

String number = in.nextLine();

people.add(new Item(name, number));

}

}

/**

Looks up an item in the table.

atparam k the key to find

atreturn the value with the given key, or null if no

such item was found.

*/

public String lookup(String k)

{

String output = null;

for(Item item: people){

if(k.equals(item.getName())){

output = item.getNumber();

}

}

return output;

}

/**

Looks up an item in the table.

atparam v the value to find

atreturn the key with the given value, or null if no

such item was found.

*/

public String reverseLookup(String v)

{

String output = null;

for(Item item: people){

if(v.equals(item.getNumber())){

output = item.getName();

}

}

return output;

}

}

Item.java

public class Item {

private String name, number;

public Item(String aName, String aNumber){

name = aName;

number = aNumber;

}

public String getName(){

return name;

}

public String getNumber(){

return number;

}

}

input.txt

Abbott, Amy

408-924-1669

Abeyta, Ric

408-924-2185

Abrams, Arthur

408-924-6120

Abriam-Yago, Kathy

408-924-3159

Accardo, Dan

408-924-2236

Acevedo, Elvira

408-924-5200

Acevedo, Gloria

408-924-6556

Achtenhagen, Stephen

408-924-3522

Note: Replace all the "at" with at symbol

Write a program that uses nested loop or for statements to display Pattern A below, followed by an empty line and then another set of loops that displays Pattern B. Once again no setw implementation is allowed here but you must use nested loop or for statements with proper indentation to generate these patterns. Use meaningful variable identifier names, good prompting messages and appropriate comments for each loop segment as well as other sections in the body of your program.

Note: Each triangle has exactly seven rows and the width of each row is an odd number. The triangles have appropriate labels displayed.


Pattern A

+

+++

+++++

+++++++

+++++++++

+++++++++++

+++++++++++++

Pattern B

+++++++++++++

+++++++++++

+++++++++

+++++++

+++++

+++

+

Answers

Answer:

public class Pyramid {

   public static void main(String[] args) {

             int h = 7;

       System.out.println("Pattern A");

               for(int i = 1; i <= h; ++i)

               {

                   for(int j = 1; j <= i; ++j) {

                       System.out.print("+");

                   }

                   System.out.println();

               }

       System.out.println();

       System.out.println("Pattern B");

               for (int i = 1; i<=h; ++i)

               {

                 for(int j = h; j >=i; --j){

                     System.out.print("+");

                 }

                   System.out.println();

               }

           }

       }

Explanation:

The trick in this code is using a nested for loopThe outer for loop runs from i = 0 to the heigth of the triangle (in this case 7)The inner for loop which prints the (+) sign runs from j = 0 to j<=iIt prints the + using the print() function and not println()In the pattern B the loop is reversed to start from  i = height

Consider the following two code segments, which are both intended to determine the longest of the three strings "pea", "pear", and "pearl" that occur in String str. For example, if str has the value "the pear in the bowl", the code segments should both print "pear" and if str has the value "the pea and the pearl", the code segments should both print "pearl". Assume that str contains at least one instance of "pea".

I.

if (str.indexOf("pea") >= 0)

{

System.out.println("pea");

}

else if (str.indexOf("pear") >= 0)

{

System.out.println("pear");

}

else if (str.indexOf("pearl") >= 0)

{

System.out.println("pearl");

}

II.

if (str.indexOf("pearl") >= 0)

{

System.out.println("pearl");

}

else if (str.indexOf("pear") >= 0)

{

System.out.println("pear");

}

else if (str.indexOf("pea") >= 0)

{

System.out.println("pea");

}

Which of the following best describes the output produced by code segment I and code segment II?

Both code segment I and code segment II produce correct output for all values of str.

Neither code segment I nor code segment II produce correct output for all values of str.

Code segment II produces correct output for all values of str, but code segment I produces correct output only for values of str that contain "pear" but not "pearl".

Code segment II produces correct output for all values of str, but code segment I produces correct output only for values of str that contain "pearl".

Code segment II produces correct output for all values of str, but code segment I produces correct output only for values of str that contain "pea" but not "pear".

Answers

Answer:

Code segment II produces correct output for all values of str, but code segment I produces correct output only for values of str that contain "pea" but not "pear".

Explanation:

The main issue with the first code segment is the way how the if else if condition are arranged. The "pea" is checked at the earliest time in the first code segment and therefore so long as there is the "pea" exist in the string (regardless there is pear or pearl exist in the string as well), the if condition will become true and display "pea" to terminal. This is the reason why the code segment 1 only work for the values of str that contain "pea".

g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a large datagram is fragmented into multiple smaller datagrams, where are these smaller datagrams reassembled into a single larger datagram? Do routers have IP addresses? If so, how many? How many bits do we have in an IPv6 address? We use hexadecimal digits (each with 4 bits) to represent an IPv6 address. How many hexadecimal digits do we need to represent an IPv6 address?

Answers

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

The TCP/IP concepts of packet forwarding, fragmentation, and reassembly along with IPv4 and IPv6 addressing schemes are explained.

TTL (Time To Live) field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers. When a large datagram is fragmented into multiple smaller datagrams, these smaller datagrams are reassembled into a single larger datagram at the destination host. Routers do have IP addresses, typically one per interface, so the number varies. IPv6 addresses consist of 128 bits; represented using hexadecimal digits (each 4 bits), hence we need 32 hexadecimal digits to represent an IPv6 address.

Create a winform application that lets the user enter a temperature. With a ComboBox object offer the user three choices for input type: Farenheit, Celsius, and Kelvin. Offer the same three choices for the output type. Now when the user clicks the Calculate button, convert them temp and show the user the results.

Answers

Answer:

See explaination

Explanation:

//namespace

using System;

using System.Windows.Forms;

//application namespace

namespace TemperatureConversionApp

{

public partial class Form1 : Form

{

public Form1()

{

InitializeComponent();

}

//calculate button click

private void btnCalculate_Click(object sender, EventArgs e)

{

//taking temperature type

string temperatureType = cmbTemperatureType.SelectedItem.ToString();

//taking temperature entered by user

double temperature = double.Parse(txtTemperature.Text);

//taking conversion temperature type

string conversionType = cmbConversionType.SelectedItem.ToString();

//checking temperature type and conversion type

if(temperatureType == "Farenheit" && conversionType == "Celsius")

{

//if Farenheit to Celsius temperature then

double temp = (temperature - 32) * 5 / 9;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Farenheit is " + temp.ToString("0.00") + " Celsius";

}

else if (temperatureType == "Farenheit" && conversionType == "Kelvin")

{

//if Farenheit to Kelvin temperature then

double temp = (temperature - 32) * 5 / 9+273.15;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Farenheit is " + temp.ToString("0.00") + " Kelvin";

}

else if (temperatureType == "Celsius" && conversionType == "Kelvin")

{

//if Celsius to Kelvin temperature then

double temp = temperature + 273.15;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Celsius is " + temp.ToString("0.00") + " Kelvin";

}

else if (temperatureType == "Celsius" && conversionType == "Farenheit")

{

//if Celsius to Farenheit temperature then

double temp = (temperature*9/5) +32;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Celsius is " + temp.ToString("0.00") + " Farenheit";

}

else if (temperatureType == "Kelvin" && conversionType == "Farenheit")

{

//if Kelvin to Farenheit temperature then

double temp = (temperature-273.15) * 9 / 5 + 32;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Kelvin is " + temp.ToString("0.00") + " Farenheit";

}

else if (temperatureType == "Kelvin" && conversionType == "Celsius")

{

//if Kelvin to Celsius temperature then

double temp = temperature - 273.15;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Kelvin is " + temp.ToString("0.00") + " Celsius";

}

else

{

lblDetails.Text = "Select valid temperature conversion unit";

}

}

//Exit button click

private void btnExit_Click(object sender, EventArgs e)

{

this.Close();//close application

}

}

}

check attachment for the windows application

You're helping Professor Joy to calculate the grades for his course. The way his course is organised, students take two exams and their final grade is the weighted average of the two scores, where their lowest score weights 70% and their highest score 30%. To accomplish this, you are going to need to do the following: (1) Build the Student named tuple with the following attributes: name (string) exam1 (float) exam2 (float) (2) Write a function create_student, which will ask the user to input a single student's name, exam 1 score, and exam 2 score. The function will then create a named tuple with this information and return it. (3) Write a function create_class, which an integer n as a parameter, and calls create_student n times and returns a list with the n students created. (4) Write a function calculate_score, which takes a single Student named tuple as a parameter, and returns the final score, where their lowest grade is weighted 70% and their highest grade is weighted 30%.

Answers

Answer:

see explaination

Explanation:

# importing "collections" for namedtuple()

from collections import namedtuple

# function creates student records and return the named tuple

def create_student():

Student = namedtuple('Student',['name','exam1','exam2']) # creating the object Student

# taking input the name and scores of the students

name = input()

exam1 = float(input())

exam2 = float(input())

return Student(name, exam1, exam2) # return the named tuple

# function creates list of student records and return it

def create_class(n):

student_list = []

# creating student data for n students

for i in range(n):

student_list.append(create_student()) # storing data in the student_list

return student_list # return the student data i.e. student_list

# function calculates the final score of each student and returns it

def calculate_score(S):

final_score = 0

if S[1] > S[2]: # if exam1 score is greater than exam2

final_score = S[1] * 0.3 + S[2] * 0.7 # final score is sum of 30% of exam1 and 70% exam2

elif S[1] < S[2]: # if exam2 score is greater than exam1

final_score = S[1] * 0.7 + S[2] * 0.3 # final score is sum of 30% of exam2 and 70% exam1

elif S[1] == S[2]: # if both scores are equal

final_score = S[1] # final score is sum if 30% of exam1 and 70% exam2, but here both scores are equal so final score is equal to any one of the score

else: # if scores are invalid

print('Invalid entries')

return final_score # return final score

# driver function

def main():

n = int(input()) # enter the no. of students in class

if n < 1: # if n is less than 1 return nothing and stop execution

return

student_list = create_class(n) # call create_class to create class of n students

for i in student_list:

print(round(calculate_score(i), 2)) # calculate the final score for each student and print it

if __name__ == "__main__": main()

Jim is a forensic specialist. He seized a suspect computer from a crime scene, removed the hard drive and bagged it, documented and labeled the equipment, took photographs, completed a chain of custody form, and locked the computer in his car. On the way to the lab, he stopped to purchase supplies to use at the next crime scene. What did Jim do wrong

Answers

Answer: Jim left the computer unattended while shopping for supplies to be used at the next crime scene.

Explanation: While transporting the evidence to a secure location (lab), he left the computer unattended in his car and goes shopping for supplies that will be used in his next crime scenes. This act will give the criminals or their accomplice the opportunity to break into his car and tamper with what ever evidence he might have left behind in his car.

Write a class named Employee that holds the following data about an employee in attributes: name, ID number, department, and job title. Don't include a constructor or any other methods. Once you have written the class, write a program that creates three Employee objects to hold the following data: Name ID Number Department Job Title Susan Meyers 47899 Accounting Vice President Mark Jones 39119 IT Programmer Joy Rogers 81774 Manufacturing Engineering The program should store this data in three Employee objects and then print the data for each employee.

Answers

Answer:

Check the explanation

Explanation:

#Define the class Employee.

class Employee:

   #Declare and initialize the required member variables.

   emp_name = ''

   Id_num = ''

   emp_dept = ''

   emp_job_title = ''

#Create an object of the class Employee.

emp_obj1 = Employee()

#Assign required values to the members of the class for a

#particular object.

emp_obj1.emp_name = 'Susan Meyers'

emp_obj1.Id_num = '47899'

emp_obj1.emp_dept = 'Accounting'

emp_obj1.emp_job_title = 'Vice President'

#Create another object of the class Employee.

emp_obj2 = Employee()

#Assign required values to the members of the class for the

#current object.

emp_obj2.emp_name = 'Marke Jones'

emp_obj2.Id_num = '39119'

emp_obj2.emp_dept = 'IT'

emp_obj2.emp_job_title = 'programming'

#Create another object of the class Employee.

emp_obj3 = Employee()

#Assign required values to the members of the class for the

#current object.

emp_obj3.emp_name = 'Joy Rogers'

emp_obj3.Id_num = '81774'

emp_obj3.emp_dept = 'Manufacturing'

emp_obj3.emp_job_title = 'Engineering'

#Display the details of each employee objects.

print('Employee 1 details:')

print('Employee Name:', emp_obj1.emp_name)

print('Employee ID Number:', emp_obj1.Id_num)

print('Employee Department:', emp_obj1.emp_dept)

print('Employee Job Title:', emp_obj1.emp_job_title)

print()

print('Employee 2 details:')

print('Employee Name:', emp_obj2.emp_name)

print('Employee ID Number:', emp_obj2.Id_num)

print('Employee Department:', emp_obj2.emp_dept)

print('Employee Job Title:', emp_obj2.emp_job_title)

print()

print('Employee 3 details:')

print('Employee Name:', emp_obj3.emp_name)

print('Employee ID Number:', emp_obj3.Id_num)

print('Employee Department:', emp_obj3.emp_dept)

print('Employee Job Title:', emp_obj3.emp_job_title)

Kindly check the attached image below for the code output.

Answer:

The previous andwers needed a few tweaks to be correct.

Explanation:

class Employee:

  #Declare and initialize the required member variables.

  emp_name = ''

  Id_num = ''

  emp_dept = ''

  emp_job_title = ''

#Create an object of the class Employee.

emp_obj1 = Employee()

#Assign required values to the members of the class for a

#particular object.

emp_obj1.emp_name = 'Susan Meyers'

emp_obj1.Id_num = '47899'

emp_obj1.emp_dept = 'Accounting'

emp_obj1.emp_job_title = 'Vice President'

#Create another object of the class Employee.

emp_obj2 = Employee()

#Assign required values to the members of the class for the

#current object.

emp_obj2.emp_name = 'Mark Jones'

emp_obj2.Id_num = '39119'

emp_obj2.emp_dept = 'IT'

emp_obj2.emp_job_title = 'Programmer'

#Create another object of the class Employee.

emp_obj3 = Employee()

#Assign required values to the members of the class for the

#current object.

emp_obj3.emp_name = 'Joy Rogers'

emp_obj3.Id_num = '81774'

emp_obj3.emp_dept = 'Manufacturing'

emp_obj3.emp_job_title = 'Engineer'

#Display the details of each employee objects.

print('Name:', emp_obj1.emp_name)

print('ID Number:', emp_obj1.Id_num)

print('Department:', emp_obj1.emp_dept)

print('Job Title:', emp_obj1.emp_job_title)

print()

print('Name:', emp_obj2.emp_name)

print('ID Number:', emp_obj2.Id_num)

print('Department:', emp_obj2.emp_dept)

print('Job Title:', emp_obj2.emp_job_title)

print()

print('Name:', emp_obj3.emp_name)

print('ID Number:', emp_obj3.Id_num)

print('Department:', emp_obj3.emp_dept)

print('Job Title:', emp_obj3.emp_job_title)

1)Write a class called Time that represents time in the form of hour minute and second where (35) hour takes values between 0 and 23, minute is between 0 and 59 and second is between 0 and 59. The constructor public Time(int hour, int minute, int second ) constructs a new time whose hour, month and second are taken from the parameter. The addSec(int sec), addMinute(int minute) and addHour(int hour) add seconds, minutes and hours respectively to the current hour, minute and second. They work exactly as if seconds, minutes and hours were added to the real like 24 hour clock. For a current time of 23:59:59 addSec(1) would result in 00:00:00. Addsec(6) to current time of 05:45:55 would give 05:46:01. AddSec(65) to current time of 05:45:55 would give 05:47:00. AddSec(910) to current time of 05:45:55 would give 06:01:10. The parameters of addHour, addMinute and addSec can be any number >=0. Values less < 0 should be invalidated and no change made. You cannot "go back in time".

Answers

Answer:

See attached image for the source code and output

Write a program to determine all pairs of positive integers, (a, b), such that a < b < n and (a 2 b 2 1)/(ab) is an integer. Here n is an integer and n > 1. Note: Your method should take n as a parameter and return nothing. You should print inside the method.c

Answers

Answer:

following are the code to this question:

#include <iostream> //defining header file  

using namespace std;  

void me(int n) //defining a method me, that accept an integer value  

{  

int a,b,t1,t2; //defining integer variable  

for(a = 1; a<n; a++) //defining loop to calculates a variable value  

{

for(b=a+1; b<n; b++) //defining loop to calculates a variable value  

{

t1=(a*a)+(b*b)+1; //hold value in t1 value

t2=a*b; // calculates multiplication value and hold in t2 variable          

if(t1%t2==0) //defining condition that check calculated value is equal to 0

{

cout<<"("<<a<<","<<b<<")"; //print a and b value.

}

}

}

}

int main() //defining main method

{

int n; // defining integer variable

cout<< "Enter a number: "; //print message

cin>> n; // input value  

if(n>1) //defining condition that check value is greater then 1

{

me(n); //call method and pass the value

}

else

{

cout<<"Enter a number, which is greater then 1";  //print message  

}

   return 0;

}

Output:

Enter a number: 3

(1,2)

Explanation:

In the given C++ language code, a method "me" is defined, that accepts an integer value "n" as its parameter and this method does not return any value because its return type is void, inside the method two for loop is declared, that calculates a and b value and hold in t1 and t2 variable.

In the next step, if the condition is used, that checks module of t1 and t2 is equal to 0, then it will print a, b value. Inside the main method an integer variable n is declared, that accepts a value from the user end, and use if block that checks user input is greater then 1, then we call method otherwise, print a message.  

Write an application that inputs a telephone number as a string in the form (555) 555-5555. The application should use String method split to extract the area code as a token, the first three digits of the phone number as a token and the last four digits of the phone number as a token. The seven digits of the phone number should be concatenated into one string. Both the area code and the phone number should be printed. Remember that you will have to change deliminator characters during the tokenization process.

Answers

Answer:

See explaination

Explanation:

// File: TelephoneNumber.java

import java.util.Scanner;

public class TelephoneNumber

{

public static void main(String[] args)

{

Scanner input = new Scanner(System.in);

String inputNumber;

String tokens1[];

String tokens2[];

String areaCode;

String firstThree;

String lastFour;

String allSeven;

String fullNumber;

/* input a telephone number as a string in the form (555) 555-5555BsAt4ube4GblQIAAAAASUVORK5CYII= */

System.out.print("Enter a telephone number as '(XXX) XXX-XXXX': ");

inputNumber = input.nextLine();

System.out.println();

/* use String method split */

tokens1 = inputNumber.split(" ");

/* extract the area code as a token */

areaCode = tokens1[0].substring(1, 4);

/* use String method split */

tokens2 = tokens1[1].split("-");

/* extract the first three digits of the phone number as a token */

firstThree = tokens2[0];

/* extract the last four digits of the phone number as a token */

lastFour = tokens2[1];

/* concatenate the seven digits of the phone number into one string */

allSeven = firstThree + lastFour;

/* concatenate both the area code and the seven digits of the phone number into one full string separated by one space */

fullNumber = areaCode + " " + allSeven;

/* print both the area code and the phone number */

System.out.println("Area code: " + areaCode);

System.out.println("Phone number: " + allSeven);

System.out.println("Full Phone number: " + fullNumber);

}

}

Which of the following can be considered beta testing? A programmer at Linus Systems checks the integration of multiple modules of an information system. System users at URP feed data into a new information system to test its capability. MNP Inc. checks the system to ensure that it meets all the necessary design requirements. Taro Inc. checks the correctness of the modules in its new information system. Software testers compare the finished system against user requirements to see if it satisfies all necessary criteria.

Answers

Final answer:

System users at URP feeding data into a new information system to test its capability represents beta testing, where real users assess the software in real-world conditions.

Explanation:

The scenario that can be considered beta testing is when system users at URP feed data into a new information system to test its capability. Beta testing involves real users testing the software in a production environment to identify any unresolved bugs or issues before the official release. It is typically the last type of testing done after in-house tests such as unit testing and integration testing have been completed.

In beta testing, the goal is to assess how well the software performs under real-world conditions and to gather feedback from users that can be used to further improve the product's design. This is consistent with the cycle of prototyping, testing, and refinement discussed in the provided references, where testing and evaluation reveal weaknesses or potential improvements, and the design may be adjusted accordingly.

Other scenarios described may represent different levels and types of testing such as integration testing, system testing, or validation testing, which occur before beta testing in the software development lifecycle.

Other Questions
Common difference between 31,26,21,16 Please help. Question is below. you flip a coin and what is p (not tails What is the positive slope of the asymptote of the hyperbola? The positive slope of the asymptote is . The communications monitoring company Postini has reported that 91% of email messagesare spam. Suppose your inbox contains 25 messages.What is the mean of the number of real messages you should expect to find in your inbox? What best describes an impulse acting on an object Find the exact value of cos 15 what is another name for a document which decides how things are run in the country? How does the final sentence, on page 5, supportthe narrator's development throughout thepassage?by revealing his dedication to the academic study ofdiseaseby illustrating his bravery in the face of recenthealth challengesby dramatically summarizing the imagined declinein his healthby carefully describing his need for immediatemedical attention 20 pointsMany of the most-visited national parks, such as Yosemite and Zion, now restrict the number of cars that can enter the park. * ( please I need it fast) O TrueO False What is a major difference between the fundamental beliefs of communists and the fundamental beliefs of capitalists? how can i change your name in your porfile. i dont like the name 85878 10. The philosopher who did not believe in democracy wasa. Alexanderb. Hippocratesc. Platod. Socrates What is the correct meaning of the word liable?The contract stated that the homeowner is liable for any damages caused from the weather.responsiblepunishedprotectedguilty Place the following events in sequence: A) The PopulationRegistration Act is passed; B) Nelson Mandela is electedPresident; C) P.W. Botha is elected President Throughout the Earth's history, there have been long periods of time when glaciers and ice sheets cover large parts of the Earth. What are these periods called? how do you say: today I will be informing you about a range of useful french phases, tips on pronunciation and what to see in France when you go on your school trip.in french 8. A polyhedron has 15 edges and 10 vertices. How many faces does ithave? * Nielson Corp. sells its product for $6,600 per unit. Variable costs per unit are: manufacturing, $3,600, and selling and administrative, $75. Fixed costs are: $18,000 manufacturing overhead, and $24,000 selling and administrative. There was no beginning inventory at 1/1/15. Production was 20 units per year in 20152017. Sales were 20 units in 2015, 16 units in 2016, and 24 units in 2017. Income under absorption costing for 2017 isA) $4,800. B) $8,400. C) $9,600. D) $13,200. A one-dimensional particle-in-a-box may be used to illustrate the import kinetic energy quantization in covalent bond formation. For example, the electronic energy change associated with the reaction H+H H2 may be modeled by treating each reactant H atom as an electron in a one-dimensional box of length LH 5a0 (the 99% electron density diameter of hydrogen), and treating he diatomic H2 as a one-dimensional box of length LH2 RB+5ao (where ao is the Bohr radius of hydrogen and Re 0.74 is the experimental bond length of H2). (a) Use the above particle-in-a-box model to model ance of predict the bond formation energy of H2, and compare your result with the experi- mental value of -436 kJ/mol. (b) What interactions have been neglected in the above calculation and what does your result imply with regard to the importance of kinetic energy quantization in covalent bond formation? Steam Workshop Downloader