__ is used to provide visual clues that the text is hypertext links rather than normal text.

Rollover Effect

Absolute Path

Pullover Effect

White-space Blank

Answers

Answer 1

Hyperlinks are words, phrases or images that you can click on to go to a new web page. In this way, hyperlinks connect different pages or content together.

If you want to add a hyperlink to your text, you can use a tool or button in your program that will format the text for you. Hyperlinks can be created by using the HTML  tag.

These tags are added to the text, image, or other object that is going to be the link. The tag includes an href attribute that is the address that the link is going to, or the URL.The underline is used to provide visual clues that the text is hypertext links rather than normal text.

By default, hyperlinks are underlined on most websites and browsers. In some cases, designers choose to remove the underline from hyperlinks for aesthetic reasons. To indicate that text is a hyperlink without underlining, designers may use a change in color, font style, or size. Therefore, we can say that the correct answer is Underline.

To know more about Hyperlinks visit:

https://brainly.com/question/1856020

#SPJ11


Related Questions

Which operation will leave the originally selected information
unchanged?
Raste
O Move
O Cut
O Copy

Answers

Answer:

copy

Explanation:

okay you will copy something and and is that thing will stay like the first thing

Examples of the many different ways an app can be used are called use

Answers

Answer:

Different Types of Application Software

Explanation:

Word Processing Software. This software enables users to create and edit documents. The most popular examples of this type of software are MS-Word, WordPad and Notepad among other text editors.

Database Software. Database is a structured collection of data. A computer database relies on database software to organize data and enable database users to perform database operations.

Spreadsheet Software. Excel, Lotus 1-2-3 and Apple Numbers are some examples of spreadsheet software. These software allow users to perform calculations using spreadsheets.

Hope this helped

Answer:

Different Types of Application Software

Explanation:

I hope this helps

plssssssssssssssssssssssssssssssssssss help!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

John is the yearbook president and is searching for computer storage that will have the most memory to save articles and pictures for the yearbook. What form of storage should John use?

Cloud storage
External hard drive
Floppy disk
USB flash drive

Answers

Answer:

flash drive, protects data

Answer:

USB flash drive

Explanation:

A USB flash drive would be used since most flash drives that are used nowadays can use up to 2 Terabytes. That's as of dates back in 2018, and Terabytes are the fourth largest " Byte " in the virtual world. USB flash drives are also commonly used to save projects and having the ability to plug it into one computer, save it, unplug it, and bring it to another computer to download the files and work on it at home. As a Graphic Designer, we use these all the times, hopefully this helps! :)

*URGENT*
Which of the following statements is FALSE?

Random words can be generated as well as random numbers.

The random module is a group of functions that are used to deal with random numbers.

To randomly choose an integer from a range, use the randint function.

A decimal number can be generated by using the randint function.

Answers

The false statement among the options provided is: "A decimal number can be generated by using the randint function."

The randint function from the random module in Python is specifically designed to generate random integers within a given range. It takes two arguments: the lower bound (inclusive) and the upper bound (inclusive). The function randomly selects an integer from that range, and it always returns an integer value.

In contrast, if we want to generate a random decimal number, we need to use a different function or approach. One commonly used function for generating random decimal numbers is the uniform function, also available in the random module.

The uniform function takes two arguments: the lower bound and the upper bound. It returns a random floating-point number within that range, allowing for decimal values.

So, the statement "A decimal number can be generated by using the randint function" is false because the randint function is intended for generating random integers, not decimal numbers.

To generate a random decimal number, we would need to use the appropriate function like uniform or employ other techniques or libraries specifically designed for random decimal number generation, such as numpy's random module or the random.random function in Python.

For more questions on decimal

https://brainly.com/question/28393353

#SPJ11

Consider the following correct implementation of the insertion sort algorithm.
public static void insertionSort(int[] elements)
{
for (int j = 1; j < elements.length; j++)
{
int temp = elements[j];
int possibleIndex = j;
while (possibleIndex > 0 && temp < elements[possibleIndex - 1])
{
elements[possibleIndex] = elements[possibleIndex - 1];
possibleIndex--;
}
elements[possibleIndex] = temp; // line 12
}
}
The following declaration and method call appear in a method in the same class as insertionSort.
int[] nums = {8, 7, 5, 4, 2, 1};
insertionSort(nums);
How many times is the statement elements[possibleIndex] = temp; in line 12 of the method executed as a result of the call to insertionSort ?

Answers

In this specific implementation of the insertion sort algorithm, the statement elements[possibleIndex] = temp; in line 12 is executed a total of 5 times when the method insertionSort is called with the array nums = {8, 7, 5, 4, 2, 1}.

The insertion sort algorithm iterates through the array starting from the second element (index 1) up to the last element (index elements.length - 1). For each iteration, it compares the current element with the elements before it and shifts them to the right if necessary to make space for the current element.In the given array nums, the first element is already in its correct position, so the loop starts from the second element. In this case, there are five elements (7, 5, 4, 2, and 1) that need to be inserted at their correct positions by shifting the elements to the right. Hence, the statement elements[possibleIndex] = temp; in line 12 is executed five times during the insertion sort process.

To learn more about algorithm  click on the link below:

brainly.com/question/22384006

#SPJ11

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

Which is an example of artificial intelligence in computers? A. multimedia software B. encryption software C. voice recognition software D. security software

Answers

Answer:

its option b encryption software

Explanation:

Artificial intelligence (AI) is intelligence demonstrated by machines, unlike the natural intelligence displayed by humans and animals, which involves consciousness and emotionality. The distinction between the former and the latter categories is often revealed by the acronym chosen. 'Strong' AI is usually labelled as AGI (Artificial General Intelligence) while attempts to emulate 'natural' intelligence have been called ABI (Artificial Biological Intelligence). Leading AI textbooks define the field as the study of "intelligent agents": any device that perceives its environment and takes actions that maximize its chance of successfully achieving its goals.[3] Colloquially, the term "artificial intelligence" is often used to describe machines (or computers) that mimic "cognitive" functions that humans associate with the human mind, such as "learning" and "problem solving".

Define superimposing

Answers

Answer:

I gots you my g!

Definition of Superimposing is... place or lay over another, usually so that both are still evident. ..

Explanation:

"The number will appear on the screen, superimposed on a flashing button"

Remember, I'm there for you

a coworker detects a potential social engineering attack because the return email address is a domain associated with scammers. what kind of threat indicator is this? choose the best response.

Answers

The reply email address is from a site linked to fraudsters, a coworker recognizes a possible social engineering assault. This affects reputation.

A domain example is what?

A web page is a website's address. You type it into a web page to go to that particular website. For instance, free Code Camp's website address is freecodecamp.org. While they make it simple for users to remember your website's address, domain names are significant.

What three sorts of domains are there?

The Archaea, Bacteria, and Eukarya are the three domains. Organisms with prokaryotic cells fall under the domains Archaea or Bacteria, whereas those with eukaryotic cells fall under the category Eukarya.

To know more about Domain visit :

https://brainly.com/question/218832

#SPJ4

Web browsers save website information in their _________, which helps the site load faster on future visits. memory repository storage cache.

Answers

Web browsers are designed and developed to save website information in their cache, which helps the website load faster on future visits.

What is a web browser?

A web browser can be defined as a type of software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.

What is a website?

A website can be defined as a collective name which connotes a series of webpages that are interconnected and linked together with the same domain name, so as to provide certain information to end users.

In Computer technology, web browsers are typically designed and developed to save website information in their cache, which helps the website load faster on future visits.

Read more on web browsers here: https://brainly.com/question/28088182

#SPJ1

Imagine a machine that produces an output force that is five times larger
than an input force. What is the mechanical advantage of the machine?

Answers

Answer:

\(M.A = \frac{output}{input} \\ let \: input \: force \: be \: x \\ hence \: output \: force \: = 5x \\ M.A = \frac{5x}{x} \\ = 5\)

Class 4 Draw to Learn: Water Due Monday by 11:59pm Points 5 Submitting a file upload File Types pdf, jpg, tiff, and png Available after Sep 1 at 12pm Watch the video in the class 4 Water: post-class page and practice drawing water molecules. Part A. Draw water vs methane molecules showing the electron configurations. (Use flat Bohr atoms showing the sharing of electrons in molecules, see figure 2.6) Electronegativity values are O=3.44,C=2.5, and H=2.1. For each molecule: 1) indicate any full or partial charges, 2) label molecules as symmetrical or asymmetrical (bent), and 3) as nonpolar or polar. Note that with symmetrical molecules any partial charges will cancel out and molecule is nonpolar. Part B. Draw 4 water molecules and how they interact with each other. Use the structural formula not space filling model (see figure 2.7) so you can indicate the covalent bonds. Denote bonds as shown in class and in your book (covalent are solid lines and hydrogen bonds are dotted). Label the atoms, hydrogen bonds and the covalent bonds. Part C. Draw three water molecules interacting with a Na (sodium) ion and then three water molecules interacting with a Cl (chloride) ion. Be sure to include partial and full charges and label the atoms, hydrogen bonds, and the covalent bonds. Upload an upright pdf/tiff/jpg/png image of your drawing to the assignment.

Answers

To complete the assignment, you need to draw water and methane molecules indicating their electron configurations, charges, symmetry, and polarity. Additionally, you need to depict the interaction of water molecules with each other and with sodium and chloride ions, including partial and full charges, hydrogen bonds, and covalent bonds.

How do you draw water and methane molecules and indicate their electron configurations, charges, symmetry, and polarity?

To draw water and methane molecules, start with the electron configurations. Water (H2O) consists of one oxygen atom and two hydrogen atoms, while methane (CH4) consists of one carbon atom and four hydrogen atoms.

For water, the oxygen atom (O) has 6 valence electrons, and each hydrogen atom (H) has 1 valence electron. Following the Bohr atom model, draw the atoms as circles and indicate the sharing of electrons with lines. Oxygen should have 6 electrons (2 in the inner shell and 4 in the outer shell), while each hydrogen atom should have 2 electrons (1 in the inner shell and 1 in the outer shell).

Next, indicate any full or partial charges. In water, the oxygen atom is more electronegative than hydrogen, leading to a partial negative charge on the oxygen atom and partial positive charges on the hydrogen atoms.

Now, label the molecules as symmetrical or asymmetrical (bent). Water molecules are asymmetrical or bent due to the arrangement of the atoms.

Finally, determine the polarity of the molecules. Water is a polar molecule because of the unequal distribution of electrons and the presence of partial charges.

Learn more about: methane molecules

brainly.com/question/30217912

#SPJ11

most wireless lans use licensed frequencies that require applying to the fcc for permission.
T/F

Answers

False. Most wireless LANs (Local Area Networks) use unlicensed frequency bands that do not require applying to the FCC (Federal Communications Commission) for permission. The unlicensed frequency bands are designed for use by low-power devices such as Wi-Fi routers, Bluetooth devices, and wireless phones.

The most common unlicensed bands used for wireless LANs are the 2.4 GHz and 5 GHz frequency bands.

These unlicensed frequency bands are open for public use, but they are regulated to avoid interference and ensure efficient operation of wireless devices. The FCC establishes technical standards and rules for the operation of devices in these bands, which manufacturers must adhere to when designing and producing wireless equipment.

By using unlicensed frequency bands, wireless LANs can be set up without the need for an expensive and time-consuming application process with the FCC. This accessibility promotes innovation and the widespread adoption of wireless technology. However, unlicensed bands can also experience interference from other devices operating in the same frequency range, which can affect the performance of wireless LANs.

In summary, most wireless LANs do not use licensed frequencies that require FCC permission but instead operate in unlicensed frequency bands, which are regulated by the FCC to ensure efficient and interference-free operation.

Learn more about Bluetooth devices here:-

https://brainly.com/question/28778467

#SPJ11

your local bank uses a complex database management system to keep track of all its clients, their accounts and daily transactions. if you were an analyst working for the bank, what application would you use to question the bank's database about the transactions made by one client in new jersey?

Answers

MySql. Oracle Corporation created, distributed, and provided support for MySQL, the most well-known Open Source SQL database management system.

It might be anything, such as a straightforward grocery list, a photo gallery, or the enormous amount of data in a business network. A database management system, such as MySQL Server, is required to add, access, and process data contained in a computer database.

The three primary data types in MySQL are textual, numeric, and date/time. The relational database management system MySQL is built on SQL (Structured Query Language) language.

Data warehousing, e-commerce, and logging applications are just a few of the many uses for the application. MySQL, however, is most frequently utilized as an online database.

To know more about MySQL:

brainly.com/question/20626226

#SPJ4

Choose the best answer to complete the sentence.

A transferable skill can be applied:

in a variety of situations and roles.

in only one setting or situation.

in every situation.​

Answers

Answer:

First is A

Explanation:

Second is B,C,F

a database system has three components consisting of database application, database management system (dbms), and database true false

Answers

The given statement "A database system consists of three components: a database application, a database management system (DBMS), and a database" is true. This is a software which interacts with database.

What is DBMS?

A database system is software that interacts with a database to provide the user with the necessary data. The database system includes three components: the database itself, the Database Management System (DBMS), and the database application.  

The DBMS is a software package that controls access to the database and processes operations on it. In addition to these three elements, a database system can include other components that assist with its management.

Learn more about SQL here:

https://brainly.com/question/20264930

#SPJ11

Which of the following statements is valid?SELECT InvoiceNumber, VendorNameFROM Invoices JOIN Vendors ON Invoices.VendorID = Vendors.VendorIDWHERE InvoiceTotal = MAX(InvoiceTotal)SELECT InvoiceNumber, VendorNameFROM Invoices JOIN Vendors ON Invoices.VendorID = Vendors.VendorIDWHERE InvoiceTotal = (SELECT MAX(InvoiceTotal))SELECT InvoiceNumber, VendorNameFROM Invoices JOIN Vendors ON Invoices.VendorID = Vendors.VendorIDWHERE InvoiceTotal IN (SELECT MAX(InvoiceTotal) FROM Invoices)All of the above

Answers

Correct Answer:

c.

SELECT InvoiceNumber, VendorName

FROM Invoices JOIN Vendors ON Invoices.VendorID = Vendors.VendorID

WHERE InvoiceTotal IN (SELECT MAX(InvoiceTotal) FROM Invoices)

Explanation:

All options only differ on the WHERE clause:

a: WHERE InvoiceTotal = MAX(InvoiceTotal)

Fails because aggregate functions (like MAX, COUNT, etc) have to be used on the SELECT clause.

b: WHERE InvoiceTotal = (SELECT MAX(InvoiceTotal))

Fails because the SELECT clause is incomplete.

c: WHERE InvoiceTotal IN (SELECT MAX(InvoiceTotal) FROM Invoices)

This one is correct, and returns the InvoiceNumber and VendorName register with the largest value on the InvoiceTotal field.

Under which accounting method are most income statement accounts translated at the average exchange rate for the period ?
A) current/concurrent method
B) monetary/nonmonetary methode
C)temporal method
D)All of the options

Answers

Under the accounting method where most income statement accounts are translated at the average exchange rate for the period, the correct option is D) All of the options.

The current/concurrent method considers both monetary and nonmonetary balance sheet items and translates income statement accounts at the average exchange rate for the period. This method takes into account the fluctuations in exchange rates throughout the period and provides a more accurate representation of the financial results in the reporting currency.

By using the average exchange rate, the impact of exchange rate fluctuations on income statement accounts is spread out over the period, reducing the impact of currency volatility on reported earnings.

Learn more about accounting method here: brainly.com/question/30512760

#SPJ11

True or False: The first computers only took a couple of hours to reconfigure

Answers

Explanation:

I think it is FALSE but not completely sure

The version number of a particular application is 8.5.12. If the vendor follows the conventions described in this lesson, what is the correct
interpretation of this version number?
major release 8.5, patch 12
major release 8.5, minor release 12
major release 8, minor release 5.12, patch unknown
major release 8, minor release 5, patch 12

Answers

Answer: Major release 8, minor release 5, patch 12

Explanation:
I don’t know what you learned in your lesson, but standard convention is (major.minor.patch) for software versioning.

Cheers.

a. unsigned int length(char str[]);
Returns the length of the string
(length("") should return 0
length("fifteen symbols") should return 15)
b. unsigned int find(char str[], char character);
Returns the index of the first occurrence of character in the string
Returns the size if the character is not found
(find("the rain in spain", ‘a’) should return 5
find("abcdefghijklmnoqrstuvwxyz", ‘p’) should return 25)
c. bool equalStr(char str1[], char str2[]);
Returns true if the two strings are equal
Returns false if the two strings are not equal
(equalStr("apple", "apple") should return true
equalStr("apple", "orange") should return false)
start code:
#include
#include "cstring.h"
unsigned int length(char str[]) {
// returns the length of the string including zero (0)
return 0;
}
unsigned int find(char str[], char character) {
// returns
// - the index of the first occurence of character in str
// - the size if the character is not found
return 0;
}
bool equalStr(char str1[], char str2[]) {
// returns true if they are equal and false if they are not
return true;
}

Answers

The functions you have provided in your question can be implemented using the standard string library functions in C++.

Here is the modified code for the functions with their implementation:

#include
#include
#include "cstring.h"

// Function to return the length of the string
unsigned int length(char str[]) {
 // Use the strlen function to get the length of the string
 return strlen(str);
}

// Function to find the first occurrence of a character in the string
unsigned int find(char str[], char character) {
 // Use the strchr function to get the pointer to the first occurrence of the character
 char *ptr = strchr(str, character);

 // If the character is not found, return the size of the string
 if (ptr == NULL) {
   return strlen(str);
 }

 // Otherwise, return the index of the first occurrence of the character
 return ptr - str;
}

// Function to check if two strings are equal
bool equalStr(char str1[], char str2[]) {
 // Use the strcmp function to compare the two strings
 if (strcmp(str1, str2) == 0) {
   return true;
 } else {
   return false;
 }
}

int main() {
 // Test the functions
 std::cout << length("") << std::endl; // should return 0
 std::cout << length("fifteen symbols") << std::endl; // should return 15
 std::cout << find("the rain in spain", 'a') << std::endl; // should return 5
 std::cout << find("abcdefghijklmnoqrstuvwxyz", 'p') << std::endl; // should return 25
 std::cout << equalStr("apple", "apple") << std::endl; // should return true
 std::cout << equalStr("apple", "orange") << std::endl; // should return false

 return 0;
}

Learn more about programming:

https://brainly.com/question/26134656

#SPJ11

What is an accessor in Java?

A
It's how Java accesses databases.

B
It's what Java classes use to get access to disk files.

C
It's a method that retrieves information from private class attributes.

D
It's a means of accessing the names of attributes in a class.

Answers

A because I know this I hade this in my class too

A train traveled at a constant speed for six hours and traveled a distance of 408 miles. What is the best estimate of the number of miles the train could travel in 2.5 hours? *

Answers

Answer:

this is math but htthe answer is 163.2 but you can just put 163

Expla

according to new york law, who must wear a uscg-approved personal flotation device?

Answers

As per New York law, all individuals on board a pleasure vessel that is underway must wear a USCG-approved personal flotation device, unless they are in an enclosed cabin or below deck.

Wearing a personal flotation device (PFD) is a safety requirement aimed at ensuring the well-being and protection of individuals in case of emergencies or accidents on the water.

Additionally, any passenger under the age of 12 must also wear a PFD while aboard the vessel. It is important to note that the PFD must be properly sized and fitted for each individual and must be in good condition and readily accessible.

All individuals participating in water activities such as water skiing, wakeboarding, or using other towable devices must also wear a USCG-approved PFD. Failure to comply with these laws may result in fines or other penalties.

To learn more about device: https://brainly.com/question/28498043

#SPJ11

Is the GPU shortage over? What do you think this means for other
chip-using industries? Why else do you think the prices are falling
on chip based products?
Respond to the question in full sentences.

Answers

The GPU shortage is not entirely over, but there have been some improvements in recent months. The GPU shortage has primarily been driven by a combination of factors, including the global semiconductor supply chain constraints, increased demand due to the growth of gaming and remote work, and the high demand for GPUs in cryptocurrency mining.

As for the impact on other chip-based products, the semiconductor shortage has affected various industries such as automotive, consumer electronics, and telecommunications. Manufacturers of these products have faced challenges in meeting the high demand, leading to delays and increased costs. However, as production capacity for semiconductors gradually ramps up and various governments invest in domestic chip production, the situation may improve in the coming months.

In summary, the GPU shortage is still ongoing but showing signs of improvement. The consequences of this shortage extend to other chip-based products, leading to production delays and increased costs across different industries. As semiconductor production increases and global efforts to resolve the issue continue, we can hope to see more stable supply chains and reduced shortages in the near future.

Learn more about GPU here:

https://brainly.com/question/27139687

#SPJ11

In three to four sentences, describe how you can reduce the amount of spam that you receive.

Answers

We ought to activate DND Mode ( Do Not Disturb mode ). ii. We should remove or report the programme from the Playstore (Android) or Appstore from which we received spam messages (Android ).

What makes spam illegal?

Spam is a crime against all Internet users since it squanders ISPs' storage and network resources and is frequently just plain rude.

What does spam look like?

Spammers send emails with the false claim that the receiver has won a contest or prize. The email's link must be clicked by the receiver in order to claim the prize. The malicious link usually seeks to steal the user's personal data.

To know more about Android visit:-

https://brainly.com/question/27936032

#SPJ1

A Python keyword ______________.

can be user defined

cannot be used outside of its intended purpose

can only be used in the comments section

can be used anywhere in a Python program

Answers

Answer:

cannot be used outside of its intended purpose.

Explanation:

In many programming languages, keywords are special and reserved words that are used for specific and specified purposes. They have special meanings and cannot be used outside their intended purposes.

Keywords cannot be used as variable names, identifiers or functions.

In Python, some of such keywords include;

i. True

ii. False

iii. for

iv. while

v. break

vi. continue

vii. if

viii. else

ix. def

x. pass

n a pipelined multiplication architecture with 6 stages and each stage requiring 10 nanoseconds, what is the processing time (in nanoseconds) to compute 3000 multiplications?

Answers

The processing time for computing 3000 multiplications in a pipelined multiplication architecture with 6 stages, where each stage requires 10 nanoseconds, is 60,010 nanoseconds.

What is the total time required to perform 3000 multiplications consisting of 6 stages?

In a pipelined multiplication architecture with 6 stages, each multiplication operation is divided into six smaller sub-tasks, and each sub-task is performed by a different stage. Once a stage completes its task, it passes the result to the next stage, which immediately starts working on it. This allows the pipeline to perform multiple multiplication operations simultaneously, resulting in faster processing time.

In this scenario, each multiplication operation takes 6 stages to complete, and each stage takes 10 nanoseconds. Therefore, the total processing time required to compute 3000 multiplications can be calculated as follows:

Total processing time = (6 stages * 10 nanoseconds per stage) * 3000 multiplications

= 60,000 nanoseconds + 10 nanoseconds

= 60,010 nanoseconds

Thus, the processing time required to compute 3000 multiplications in a pipelined multiplication architecture with 6 stages and each stage requiring 10 nanoseconds is 60,010 nanoseconds.

Learn more about Pipelined multiplication architecture

brainly.com/question/31490049

#SPJ11

The systems such as computers and telecommunications, used for storing, retrieving, and exchanging information is information technology.
true or false

Answers

The systems such as computers and telecommunications, used for storing, retrieving, and exchanging information is information technology is a true statement.

What is information technology meaning?

Information technology (IT) is known to be a broad professional form or group that tend to cover some areas of  functions such as:

Building communications networkssafeguarding data and informationTroubleshooting computer problems, etc.

Therefore, The systems such as computers and telecommunications, used for storing, retrieving, and exchanging information is information technology is a true statement.

Learn more about information technology  from

https://brainly.com/question/14688347
#SPJ1

write a java application that models a crime wave in which two criminals commit 100 crimes each while two detectives solve them. the criminals place the crimes in a regular queue and the detectives remove them from the queue.

Answers

Here a simple java application that models a crime wave using netbeans 15. First you have to make form based on picture attached. Add sql connector ODBC connector library on your project and create MySQL database without password name "crime" with table "progress" and "solved". '"progress" table contains column "casecode","CriminalName", "crime" and "solved" table contains column "casefinish","CriminalNameSolved" and "CrimeSolved" . Here the code:

On package:

import java.sql.*;

import javax.swing.*;

import javax.swing.table.*;

import javax.swing.JOptionPane;

public Connection conn;

public Statement cn;

public void connection(){

   try{

       Class.forName("com.mysql.jdbc.Driver");

       conn = DriverManager.getConnection("jdbc:mysql://localhost:3306/crime","root","");

       cn = conn.createStatement();

   }catch(Exception e){

       JOptionPane.showMessageDialog(null,"connection failed...");

       System.out.print(e.getMessage());

   }

}

public void CrimeRecord(){

       try{

           conn=connection();

           stt=conn.createStatement();

           String sql = "select * from progress where casecode='"+casecod.getText()+"'";

           ResultSet rs= stt.executeQuery(sql);

           if(rs.next()){

               criminalsname.setText(rs.getString("CriminalName"));

               crimecommit.setText(rs.getString("crime"));

                  }catch(Exception e){

                      JOptionPane.showMessageDialog(null,"error" +e);

       }

   }

public void showingtable()

{

   DefaultTableModel tabelModel = new DefaultTableModel();

   tabelModel.addColumn("Case code");

   tabelModel.addColumn("Criminal name");

   tabelModel.addColumn("Crime");

   try{

   conn = connection();

   stt = conn.createStatement();

   String sql = " select casecode,CriminalName,crime from progress";

   ResultSet rs = stt.executeQuery(sql);

   while (rs.next()){

       tabelModel.addRow(new Object[]{

       rs.getString("casecode"),

       rs.getString("CriminalName"),

       rs.getString("crime")

       });

   }

   }catch (Exception e){

      JOptionPane.showMessageDialog(null,"terjadi kesalahan..." + e);

       }

  CrimeListTable.setModel(tabelModel);

On public class "formYourMakeName"

public Connection conn;

public Statement cn;

showingtable();

On add crime button:

try{

   connection();

   String sql="insert into servis values('"+ casecod.getText()+"','"+ criminalsname.getText()+"' , '"+ crimecommit.getText()+"')";

}catch(Exception e){

       JOptionPane.showMessageDialog(null,"please fill all the blank");

   }

showingtable();

On end case button

try{

   connection();

   String sql="insert into solved values('"+ casecod.getText()+"','"+ criminalsname.getText()+"' , '"+ crimecommit.getText()+"')";

}catch(Exception e){

       JOptionPane.showMessageDialog(null,"please click one of the data on table");

   }

try{

   connection();

   String sql="Delete  from progress where casecode='"+casecod.getText()+"'";

}catch(Exception e){

       JOptionPane.showMessageDialog(null,"please click data on table");

   }

showingtable();

What this code do?

The code that written above will insert the crime data that you input in the three available textbox where textbox on case code, criminal name and crime are named by order "casecod", "criminalsname", "crimecommit". you can add criminal record by click "ADD CRIME" button after filling all the data. When you click a data on table on the left, the data will be written on the three textbox then you can click "END CASE" button to remove them from the crime list table and move it to solved case finish table on SQL database.

Learn more about java programming https://brainly.com/question/26642771

#SPJ4

write a java application that models a crime wave in which two criminals commit 100 crimes each while
Other Questions
in northern crete, mixed deposits of volcanic ash, cultural material, and marine fossils near the beach are very similar to those found in coastal regions after: Find \( x \) such that the point \( (x, 20) \) is 13 units from \( (2,8) \). \( x= \) (Type an integer. Use a comma to separate answers as needed.) Drag each title to the correct box. The flag stood proudly as the soldiers returned home from overseas. is...a. Alliterationb. Hyperbolec. Idiomd. Metaphore. Onomatopoeiaf. Personificationg. Simile Enter the coordinates of the point on the unit circle at the given angle 360 You have a large dataset that will print on several pages. You want to ensure that related records print on the same page with column and row labels visible and that confidential information is not printed. You should apply all of the following page setup options except which one to accomplish this?. If you have 12 donuts for $5.40, what is the cost of one donut how do you say good midnight in French Which factor does not affect species richness on islands?Age of islandGeographical locationHabitat sizeIsland shapeQuestion 2(Multiple Choice Worth 3 points)(02.02 MC) Which combination of factors will result in an island community with the lowest ecological tolerance?Upwelling of colder ocean water, increased sunlightIntroduction of invasive species, increased freshwater sourcesIncreased human population, increased agricultural expansionIncreased colonization, decreased extinction rateQuestion 3(Multiple Choice Worth 3 points)(02.02 MC) The table depicts characteristics of five amphibian species (AE). Use the information in the table to answer the following question:Ecological Parameter Species A Species B Species C Species D Species ETemperature Range 1530 C 1040 C 1520 C 1030 C 1525 CFreshwater or Brackish Water Fresh/brackish Brackish Brackish Fresh Fresh/brackishFood Sources Varied Two mainland species of grasshopper Only island arthropods Varied VariedHabitat Lakes Estuaries/ponds Estuaries/ponds Lakes LakesWhich individual(s) of the species listed in the table would likely die if moved to a new island habitat?Species C and ESpecies A and CSpecies A onlySpecies B onlyQuestion 4(Multiple Choice Worth 3 points)(02.02 LC) Island biogeography studies the ________ on islands.mountain topographynatural disastersdistribution of speciesclimate changeQuestion 5(Multiple Choice Worth 3 points)(02.02 MC) Increased deforestation reduces the habitat for an arthropod species preferred by an island reptile. Which of the following descriptions predicts the most likely outcome for these two species?The reptile population increases as arthropods are confined to smaller sections of the island.The reptile population decreases as arthropods decrease with their habitat.Island arthropods decrease as the reptile population increases.Island arthropods and reptiles both increase in the island habitat.Question 6(Multiple Choice Worth 3 points)(02.02 MC) Which statement describes a factor in the island biogeographical model?Dispersing species are more likely to find smaller secluded habitatsSmaller populations are less likely to go extinctLarge islands have less available niches for immigrating speciesIslands closer to the mainland have greater colonizationQuestion 7(Multiple Choice Worth 3 points)(02.02 LC) Which of the following ideas helps explain the factors that affect island colonization of and species richness for a region?Species-area effectRescue effectTarget effectTime/stability hypothesisI and IIII and IIII, II, IVI, II, III, IV The quotient of a number and three is sixWhat is the number? One foot equals 12 inches. The following program converts a length in inches to feet and then outputs the length in feet. The code contains one or more errors. Find and fix the error(s). Ex: if the input is 2. 0, then the output should be: 0. 167 feet Why do state and Federal governments have three branches?O approve fair lawsO provide a system of checks and balancesO maintain equitable representation What is the true solution to 3 l n 2 l n 8 = 2 l n (4 x). lymphocytes reside temporarily in lymphoid tissue, then move to other parts of the body. true or false? The standardized approach for calculating operational risk capital requirements uses beta factorsfor a given business line and annual gross income for business lines over a 3-year period. Which ofthe following business units has the highest beta factor? prime factorization 6 and 18 The definition of what a rite of passage is as described in the PowerPoint: Rites of Passage is: when a person goes through a ______ and changes from one social ________ to another. Please answer! No links!!!Picture is included What type of fault is shown in the image below?In this fault, the hanging wall and footwall are side by side and moving in opposite directions.Public Domain Lateral fault Normal fault Reverse fault Thrust fault Thomas Co. sold $1,000 worth of merchandise on a bank credit card with a 3% fee. The entry to record the sales transaction would include a debit to Cash in the amount of $