Answer:
Linus Tech Tips is a great place to learn building a PC. All PC parts are available via NewEgg and or other places such as Micro Center though there are more places those two are the best.
Explanation:
^^^
I really need help with CSC 137 ASAP!!! but it's Due: Wednesday, April 12, 2023, 12:00 AM
Questions for chapter 8: EX8.1, EX8.4, EX8.6, EX8.7, EX8.8
The response to the following prompts on programming in relation to array objects and codes are given below.
What is the solution to the above prompts?A)
Valid declarations that instantiate an array object are:
boolean completed[J] = {true, true, false, false};
This declaration creates a boolean array named "completed" of length 4 with initial values {true, true, false, false}.
int powersOfTwo[] = {1, 2, 4, 8, 16, 32, 64, 128};
This declaration creates an integer array named "powersOfTwo" of length 8 with initial values {1, 2, 4, 8, 16, 32, 64, 128}.
char[] vowels = new char[5];
This declaration creates a character array named "vowels" of length 5 with default initial values (null for char).
float[] tLength = new float[100];
This declaration creates a float array named "tLength" of length 100 with default initial values (0.0f for float).
String[] names = new String[]{"Sam", "Frodo", "Merry"};
This declaration creates a String array named "names" of length 3 with initial values {"Sam", "Frodo", "Merry"}.
char[] vowels = {'a', 'e', 'i', 'o', 'u'};
This declaration creates a character array named "vowels" of length 5 with initial values {'a', 'e', 'i', 'o', 'u'}.
double[] standardDeviation = new double[1];
This declaration creates a double array named "standardDeviation" of length 1 with default initial value (0.0 for double).
In summary, arrays are objects in Java that store a fixed-size sequential collection of elements of the same type. The syntax for creating an array includes the type of the elements, the name of the array, and the number of elements to be stored in the array. An array can be initialized using curly braces ({}) to specify the initial values of the elements.
B) The problem with the code is that the loop condition in the for loop is incorrect. The index should start from 0 instead of 1, and the loop should run until index < masses.length instead of masses.length + 1. Also, the totalMass should be incremented by masses[index], not assigned to it.
Corrected code:
double[] masses = {123.6, 34.2, 765.87, 987.43, 90, 321, 5};
double totalMass = 0;
for (int index = 0; index < masses.length; index++) {
totalMass += masses[index];
}
The modifications made here are to correct the starting index of the loop, fix the loop condition, and increment the totalMass variable correctly.
C)
1)
Code to set each element of an array called nums to the value of the constant INITIAL:
const int INITIAL = 10; // or any other desired initial value
int nums[5]; // assuming nums is an array of size 5
for (int i = 0; i < 5; i++) {
nums[i] = INITIAL;
}
2) Code to print the values stored in an array called names backwards:
string names[4] = {"John", "Jane", "Bob", "Alice"}; // assuming names is an array of size 4
for (int i = 3; i >= 0; i--) {
cout << names[i] << " ".
}
3) Code to set each element of a boolean array called flags to alternating values (true at index 0, false at index 1, true at index 2, etc.):
bool flags[6]; // assuming flags is an array of size 6
for (int i = 0; i < 6; i++) {
flags[i] = (i % 2 == 0);
}
Learn more about array objects at:
https://brainly.com/question/16968729
#SPJ1
By using your own data, search engines and other sites try to make your web experience more personalized. However, by doing this, certain information is being hidden from you. Which of the following terms is used to describe the virtual environment a person ends up in when sites choose to show them only certain, customized information?
A filter bubble
A clustered circle
A relational table
An indexed environment
Answer:
A filter bubble
Explanation:
true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.
Answer:
False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.
1. When you write HTML code, you use ______ to describe the structure of information on a webpage. a. a web address b. tags c. styles d. links
Answer:
b. tags
Explanation:
When you write HTML code, you use tags to describe the structure of information on a webpage. These tags are represented by the following symbols <>. All of HTML is written using different types of tags such as <body>, <main>, <div>, <nav>, etc. Each of these serves a different purpose but are all used for structuring the specific information on a website so that the information is well organized and is not all on top of each other. This also allows for specific sections to be easily targeted and styles separately from the other sections.
4. Why do animals move from one place to another?
Answer:
Animal move from one place to another in search of food and protect themselves from their enemies.They also move to escape from the harsh climate. Animal move from one place to another in search of food,water and shelter.
Answer:
Animals move one place to another because he search food and shelter
When the Credit Card Number box and the CSC box receive the focus, a transition effect should appear that slowly adds a glowing brown shadow around the boxes. The glowing brown shadow appears but without a transition effect. Return to the code8-4_debug.css file and study the code that applies a transition effect to both the input#cardBox and input#CSC objects, and the input#csc:invalid style. Correct any mistakes you find in the code. Verify that when the Credit Card Number and CSC boxes receive the focus a transition effect appears that adds the glowing brown shadow to the boxes.
Answer:
dire ako maaram hito because dire ako baltok
medyo la
The top left corner of the Excel UI contains commands that are frequently used and is customizable. What is the name
of this area?
O window controls
O status bar
O ribbon
O Quick Access toolbar
Answer:
Explanation:
The "Office" button is located in the upper left corner of the window. Clicking the button displays a menu of basic commands for working with files, a list of recent documents, and a command for configuring application settings (for example, Excel Options).
You are a network technician for a small corporate network. The network is connected to the internet and uses DHCP for address assignment. The owner of the company in the executive office and a temporary employee in IT Administrator office both report that their workstations can communicate with some computers on the network, but cannot communicate with the internet. You need to diagnose and fix the problem.
In this lab, your task is to complete the following:
-Use the following troubleshooting tools to diagnose the problem in the network:
-the ping, ipconfig, or tracert command utility
-the network and sharing center in the windows 10 or windows server 2016 operating system
-the DHCP server console in the windows server 2016 operating system
Answer:
Explanation:
The first thing that you should do would be to ping the computer in the Networking Closet, if this fails then the next step would be to ping the service provider. If both of these pings fail it is most likely because the configuration of the IP addresses are configured wrong. In this case use the command prompt to type in the following
ipconfig /all
this will open up the entire configuration info. If the problem is truly the configuration then your DNS address should show up as not configured. This can happen when a DHCP is enabled. Check if DHCP is enabled, if so then you would need to type the following into the command prompt
ipconfig /renew
This will renew the ip address information from the DHCP server and should create the proper DNS configuration as well and solve the issue.
Following are the solution to the given question:
Initiate troubleshooting in the Executive by exploring the scope of the connectivity issue. Ping the laptop in the network closet from your workstation. A ping to a location failed.Ping your internet service provider. The ping to the address fails.Verify any connection issues here between workstations, the Network Closet computer, and also the ISP in the IT Administrator's office. (Pings to both locations failed.) The issue is now almost definitely due to the channel's IP setup.To examine the Local Area Connection setup, open the cmd in the Executive Office and type ipconfig /all. Some of the following issues must be noted: The workstation's default route and DNS server addresses have still not been configured.It implies that connectivity is confined to computers just on the local network.Its DHCP Enabled option has been enabled. Yes, a DHCP server is configured just on the workstation. Its line with the DHCP Server address wasn't shown. This means the workstation was unable to communicate with the DHCP server. This IP address corresponds to an APIPA domain (169.254.0.1 to 169.254.255.254). It shows that the computer assigns an IP address to it only. The workstation would be capable of communicating with the other hosts on the local network who have given their unique IP via APIPA.Verify that its DHCP service for the local area network is active and active in the Network Closet.CORPSERVER should be the first option in Hyper-V Manager. To see all the virtual machines, open the window. Join by correcting CorpDHCP (maximize the window for easier viewing if desired). For launch, the DHCP console in Server Manager, go to Tools > DHCP. CorpDHCP.CorpNet.com must be extended. IPv4 enlargement.Scope [192.168.0.1] Subnet1 has a dropdown, suggesting that this is not operational. Select Activate from the menu bar of Scope [192.168.0.1] Subnet1. The scope's "dislike" button has gone, and the DHCP service for the local network is now operational.Launch the command prompt inside the Executive and type ipconfig /renew. This will obtain the new Ip from the DHCP server and change the Ethernet connection settings.To check the Internet setup, type ipconfig /all. You should now see lines for the default gateway, DNS server, and DHCP server, and a new IP address in the DHCP scope for the local network.Ping the ISP in the Executive Office to confirm that the problem has been resolved. Your ping to the ISP is good.Rep step 6 in the IT Administrator Office to fix the dispute with the workstations.Learn more:
brainly.com/question/14728944
Explain Strategies for determining information requirements
Explanation:
Structured Analysis is a set of techniques and graphical tools such as ER Model, Data Flow Diagrams, Flowchart, Data Dictionary, Decision Trees, Decision Tables, Structured English and Pseudocode that allow the analyst to develop a new kind of system specification that are easily understandable to the developer.
The average American has 10 devices, ask for users average number of devices. Any number between 7 and 12 will print “you have an average number of devices” but if it beyond the range it will print “you’re beyond the average range”
This is for Python
device_num = int(input('How many devices do you have: '))
if device_num >= 7 and device_num <= 12:
print('You have an average number of devices')
if device_num > 12:
print("You're beyond the average range")
what percent of records are temporary, if you are not in the OSD?
Answer:
Headed by the OSD Records Administrator, the OSD Records and Information Management (RIM) Program is responsible for oversight, implementation of the Federal Records Act within the Offices of the Secretary of Defense and the WHS supported Defense Agencies and Field Activities.
Explanation:
You install antimalware software on your computer. What is the major attack you are trying to prevent the users from executing?(1 point)
installing software
compromising password
phishing
accessing the USB port
Backup software must be capable of proving which of the following functions to ensure the backup tapes are safe if they are stolen?(1 point)
multiple copies
cloud backup
encryption
inventory
Using media access control (MAC) on your Wi-Fi requires the devices to which of the following?(1 point)
see the SSID
have strong password
connect secured
be on an approved list
What is the best action that a company should take when a mobile device is lost with an active network connection, and a copy of unencrypted confidential data on the device?(1 point)
encrypt the data
lock the phone
locate the phone
wipe the data
Policies are the foundation of devising an effective security solution. What is the best way to implement the policies with employees to be the most effective?(1 point)
present it at a meeting
training the employee
post in a public area
mailing the policies
Answer:b,c,a,c,b
Explanation:
Define what is rusty's wired series.what does it do to your life?
Pls help I really don’t know
Answer:
Routine decisions are nothing complicated. They are simply decisions that you make everyday, sometimes without thinking, because you've been making them for a long time.
Just relax and think of decisions you made today that you've been making for a long time.
For instance:
Waking up and checking to see if someone texted you. Brushing your teethWhat footwear to wear. What breakfast to have.What time to sleep.What’s the main purpose of a personality test?
Answer:
Which of following is not anelectroyte
Think about the ways new communication technologies can make certain tasks easier for
users with disabilities. For two categories of individuals with disabilities (e.g., the blind,
deaf, restricted mobility, etc.), explain one way that everyday technology helps them.
Describe the specific way the technology improves their lives.
You just figured out the root cause of an application error. You changed some configurations on the affected machines and verified that the users have full functionality. What should you do next?
After resolving the application error and verifying that users have full functionality,the next step is to document the changes made and the steps taken to resolve the issue.
How is this so?This documentation is crucial for future reference, troubleshooting, and knowledge sharing within the team.
Also, it is important tocommunicate the resolution to the relevant stakeholders,such as users or supervisors, to ensure they are aware of the resolution and can provide f eedback if necessary.
Learn more about application error at:
https://brainly.com/question/30062195
#SPJ1
Major stress in your life can cause:
O a. headaches and Insomnia
O b. Fatigue and dry mouth
O c. Muscular and abdominal pain
O d. All of the above
Several users on the second floor of your company's building are reporting that the network is down. You go to the second floor to investigate and find that you are able to access the network. What troubleshooting step should you take next?
The troubleshooting step that you should take next is to Question User.
What is Troubleshooting?This refers to the diagnostics that is run on a computer program or system in order to find the problem that is causing it to malfunction or misbehave.
Hence, we can see that based on the fact that several users on the second floor of your company's building are reporting that the network is down and go to the second floor to investigate and find that you are able to access the network, the troubleshooting step that you should take next is to Question User.
Read more about troubleshooting here:
https://brainly.com/question/13818690
#SPJ1
In an ancient land, the beautiful princess Eve (or handsome prince Val) had many suitors. Being royalty, it was decided that a special process must be used to determine which suitor would win the hand of the prince/princess. First, all of the suitors would be lined up one after the other and assigned numbers. The first suitor would be number 1, the second number 2, and so on up to the last suitor, number n. Starting at 4 the suitor in the first position, she/he would then count three suitors down the line (because of the three letters in his/her name) and that suitor would be eliminated and removed from the line. The prince/princess would then continue, counting three more suitors, and eliminate every third suitor. When the end of the line is reached, counting would continue from the beginning. For example, if there were 6 suitors, the elimination process would proceed as follows:_____.
12456 Suitor 3 eliminated; continue counting from 4.
1245 Suitor 6 eliminated; continue counting from 1.
125 Suitor 4 eliminated; continue counting from 5.
15 Suitor 2 eliminated; continue counting from 5.
1 Suitor 5 eliminated; 1 is the lucky winner.
Write a program that creates a circular linked list of nodes to determine which position you should stand in to marry the princess if there are n suitors. Your program should simulate the elimination process by deleting the node that corresponds to the suitor that is eliminated for each step in the process.
Explanation:
public class CircularLinkedListTest
{
private Node head;
private int size;
private class Node
{
private int num;
private Node next;
public Node(int n)
{
num = n;
next = null;
}
public int getNum()
{
return num;
}
public void setNext(Node n)
{
this.next = n;
}
public Node getNext()
{
return next;
}
}
public CircularLinkedListTest ()
{
head = null;
int numNodes = 0;
}
public void add(int num)
{
int numNodes = 0;
if(head == null)
{
head = new Node(num);
head.setNext(head);
numNodes++;
}
else
{
Node temp = head;
while(temp.getNext() != head)
temp = temp.getNext();
temp.setNext(new Node(num));
temp.getNext().setNext(head);
numNodes++;
}
}
public int size()
{
int numNodes = 0;
return numNodes;
}
public int get(int index)
{
Node t = head;
for(int i = 0; i < index; i++)
t= t.getNext();
return t.getNum();
}
public int remove(int index)
{
if(index < 0 || index >= size)
{
System.out.println("Error, index out of Qbounds.");
System.exit(0);
}
Node temp = head;
if(index == 0)
{
while(temp.getNext() != head)
temp = temp.getNext();
int value = head.getNum();
if(size > 1)
{
head = head.getNext();
temp.setNext(head);
}
else
head = null;
size--;
return value;
}
else
{
for(int i = 0; i < index - 1; i++)
temp = temp.getNext();
int answer = temp.getNext().getNum();
temp.setNext(temp.getNext().getNext());
size--;
return answer;
}
}
public static void main(String args[])
{
CircularLinkedListTest suitors = new CircularLinkedListTest ();
for(int i = 1; i <= 6; i++)
suitors.add(i);
int currentIndex = 0;
while(suitors.size() != 1)
{
for(int i = 1; i <= 2; i++)
{
currentIndex++;
if(currentIndex == suitors.size())
currentIndex = 0;
}
suitors.remove(currentIndex);
if(currentIndex == suitors.size())
currentIndex = 0;
for(int i = 0; i < suitors.size(); i++)
System.out.print(suitors.get(i) + " ");
System.out.println();
}
}
}
Medical assistant, Jackie, was downloading some patient information on cerebral palsy from the Internet. While downloading, Jackie noticed the computer was working slower than usual. When Jackie clicked on a web site that she needed to review, the computer would not take her to the designated website. Instead, the computer took her to an alternative site. Jackie soon noticed that even when she was working offline using a word processing software program, the computer was acting up. When she went to
the medical software, she could not bring up patient account information.
Question:
What happened and what should Jackie do?
The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious app obstructing her.
What is a system hack?System hacking is known to be when one's computer is said to be compromise in regards to computer systems and software.
Note that The thing that happened is that she has been a victim of system attack and the right thing for Jackie to do is to have an antivirus that can block the malicious app obstructing her.
Learn more about system hack from
https://brainly.com/question/13068599
#SPJ1
Sam and you work together in an IT firm. One day you overhear Sam bragging how he investigated a complex network issue at a client site and solved it to the client's satisfaction. You later come to know he was chatting with a friend who works in another IT company but smaller than yours. He also at times visits a few clients of his friend, and offers them professional services. Which professional work standards Sam may have violated?
Answer:
Based on the scenario you have described, Sam may have violated several professional work standards, including:
1. Confidentiality: By discussing the details of a client's network issue with someone outside the company, Sam may have breached the client's trust and violated the confidentiality of their information.
2. Conflict of Interest: Sam's work for his friend's clients could create a conflict of interest with his job at your company. He may be in a situation where he could potentially prioritize his friend's clients over his own, which is unethical.
3. Professional Competence: If Sam is providing professional services to clients outside of his area of expertise, he may be violating the professional competence standard. It is important for IT professionals to only provide services within their area of expertise.
4. Professional Conduct: Sam's bragging about his work to someone outside of the company may also be seen as unprofessional conduct. It may reflect poorly on the company and damage its reputation.
Overall, Sam's actions could potentially harm the company's reputation, violate ethical standards, and jeopardize client relationships. It is important for IT professionals to uphold high ethical standards in their work.
Hope this helps!
Variance for accumulator. Validate that the following code, which adds the
methods var() and stddev() to Accumulator, computes both the mean and variance
of the numbers presented as arguments to addDataValue():
public class Accumulator
{
private double m;
private double s;
private int N;
public void addDataValue(double x)
{
N++;
s = s + 1.0 * (N-1) / N * (x - m) * (x - m);
m = m + (x - m) / N;
}
public double mean(
Using the knowledge of computational language in JAVA it is possible to write a code that Validate that the following code, which adds the methods var() and stddev() to Accumulator, computes both the mean and variance of the numbers presented as arguments to addDataValue()
Writting the code:import java.util.*;
public class Accumulator {
private static double m;
private static double v;
private static double st;
private static double s[]=new double[5];
private static int N;
private static int count =0;
public static void main(String[] args) {
// TODO Auto-generated method stub
Random r = new Random();
System.out.println("hello world");
for(int i=0;i<5;i++) {
double randomvalue = r.nextDouble();
addDataValue(randomvalue);
}
for(int i=0;i<s.length;i++) {
System.out.println("dataValue:"+s[i]);
}
mean();
System.out.println("mean:"+m);
var();
System.out.println("variance:"+v);
stddev();
System.out.println("standard deviation:"+st);
}
public static void addDataValue(double value) { // addes data values to array
s[count]=value;
count++;
}
public static double mean() { // returns mean
double sum=0.0;
for(int i=0;i<s.length;i++) {
sum+=s[i];
}
m = sum/s.length;
return m;
}
public static double var() { //returns variance
double mm = mean();
double t = 0;
for(int i=0;i<s.length;i++) {
t+= (s[i]-mm)*(s[i]-mm);
}
v= t/(s.length-1);
return v;
}
public static double stddev() { // returnsn the stardard deviation
st= Math.sqrt(var());
return st;
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
10+2 is 12 but it said 13 im very confused can u please help mee
Mathematically, 10+2 is 12. So your answer is correct. However, if you are trying to write a code that adds 10 + 2, you may need to troubleshoot the code to find where the bug is.
What is troubleshooting?Troubleshooting is described as the process through which programmers detect problems that arise inside a specific system. It exists at a higher level than debugging since it applies to many more aspects of the system.
As previously stated, debugging is a subset of troubleshooting. While debugging focuses on small, local instances that can be identified and fixed in a single session, troubleshooting is a holistic process that considers all of the components in a system, including team processes, and how they interact with one another.
Learn more about Math operations:
https://brainly.com/question/199119
#SPJ1
You can automate interaction with the simulator by creating a text file with one valid LC3 simulator command per line.
a. True
b. False
Answer:
true
Explanation:
hope this helps
How do I fix this do get an output counting down?
public class Main {
public static void main(String[] args) {
Main.countDownTo(5, 1);
}
public static void countDownTo(int from, int to) {
for( int counter = from; from <= to; from--) {
System.out.print(counter + ",");
}
}
}
Answer:Its C
Explanation: Because the explanation is very cool and smart
in a group ofpeople,20 like milk,30 like tea,22 like coffee,12 Like coffee only,2 like tea and coffee only and 8 lije milk and tea only
how many like at least one drink?
In the given group of people, a total of 58 individuals like at least one drink.
To determine the number of people who like at least one drink, we need to consider the different combinations mentioned in the given information.
First, we add the number of people who like each drink separately: 20 people like milk, 30 people like tea, and 22 people like coffee. Adding these values together, we get 20 + 30 + 22 = 72.
Next, we need to subtract the overlapping groups. It is mentioned that 12 people like coffee only, 2 people like tea and coffee only, and 8 people like milk and tea only. To find the overlap, we add these three values: 12 + 2 + 8 = 22.
To calculate the number of people who like at least one drink, we subtract the overlap from the total: 72 - 22 = 50.
Therefore, in the given group, 58 individuals like at least one drink. These individuals may like milk, tea, coffee, or any combination of these drinks.
For more questions on group
https://brainly.com/question/32857201
#SPJ8
3. In relationship to the four ways of knowing, explain how "authority" and "science" may simultaneously operate.
Answer:
The summary of given question is summarized in the below segment.
Explanation:
Authority was among the most prevalent means of information acquisition. It entails the development of innovative concepts that the appropriate authorities have said are correct.
Individuals prefer to trust knowledge like this one that no one has any time to investigate every deep understanding we choose to gain via authoritative autonomously.
Numerous scientists' hypotheses were affirmed to be true. But when such statements are proven to be incorrect, they merely lead to misconceptions and therefore also impede the growth of these kinds of fields.
Mbr and guid advantages and disadvantages
Answer:
GPT does not have limitations in terms of the number of partitions. While you can have only 4 primary partitions in MBR, you can have up to 128 partitions in Windows using the GPT partition layout. GPT partition and boot data are more secure than MBR. MBR stores data in one place only.
Explanation:
I took the test
When a browser is open on your computer, what browser tool is used to move the webpage to the previously viewed page on the browser?
Back Arrow Button
Refresh Button
Menu Button
Answer:
back arrow button
Explanation:
When a browser is open on your computer, back arrow button is the browser tool that is used to move the webpage to the previously viewed page on the browser. Therefore, the option A holds true.
What is the significance of browser tools?Browser tools can be referred to or considered as the tools that are designated to perform different functions while using a browser to surf the internet over computer networks. Some browser tools are dynamic, while others are stable over all the browsers.
Out of the choices provided above, refresh tool is used to refresh the current page on the website for loading the latest and updates version of the webpage. The menu button takes the user to the home page of the site. So, only back arrow button on the browser can be used for the purpose.
Therefore, the option A holds true and states regarding the significance of a browser tool.
Learn more about browser tool here:
https://brainly.com/question/11158164
#SPJ2