The uses the DeamHome Database which can be found here:
Write query that returns all the data from Staff table.
Write a query

Answers

Answer 1

The query that returns all the data from Staff table and retrieve propertyNo, street, staffNo etc. is in the explanation part below.

To retrieve all the data from the Staff table in the DreamHome Database, you can use the following SQL query:

SELECT *

FROM Staff;

To retrieve the propertyNo, street, and staffNo from the PropertyForRent table where staffNo is not null, you can use the following SQL query:

SELECT propertyNo, street, staffNo

FROM PropertyForRent

WHERE staffNo IS NOT NULL;

Thus, this query pulls the columns provided (propertyNo, street, and staffNo) from the PropertyForRent database.

For more details regarding SQL query, visit:

https://brainly.com/question/31663284

#SPJ4

Your question seems incomplete, the probable complete question is:

The uses the DeamHome Database which can be found here:

Write query that returns all the data from Staff table.

Write a query to retrieve propertyNo, street, staffNo from PropertyForRent where staffNo is not null from PropertyForRent.


Related Questions

How can Microsoft PowerPoint help me in my studies?

Answers

Answer:

It can be used by teachers and students as a way of creating slideshows. PowerPoint allows users to share the presentations live, in the room, as well as digitally online via a video conference interface. Students can also work through a presentation in their own time, making this a versatile way to communicate.

Explanation:

HOPE IT HELPS!!!!!!!!!!!

A(n) ____________________ is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process.

Answers

Answer: "Scanner"

Explanation: brainliest please

One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all that apply. If it is easy to understand, no one will dispute what is included in the algorithm. It will give everyone else an opportunity to comment on the process described in the algorithm. It will serve as the starting point for all future activity. It communicates the consecutive instructions of the solution.

Answers

Answer: B,C,D

Explanation:

Answer:

the answer is B,C,D

Explanation:

CORRECT ANSWER GETS BRAINLIEST!!!
Which area of engineering focuses on the study of materials, products, and structures that may cause injury or damage?
forensic engineering
mechanical engineering
biomedical engineering
materials engineering

Answers

Answer:

Forensic engineering

Explanation:

Forensic engineering matches the definition of "a area of engineering that focuses on the study of materials, products, and structures that may cause injury or damage"

Question 1 (5 points) When you are at a job interview, you should use effective communication strategies, like formal language. What is formal language and why do we use it? Formal language helps create the impression that the speaker is an expert on the topic. It suggests to audience members that the speaker's points deserve respectful consideration, and it presents the ideas of the speech in the most polished possible way.. Formal language is archaic and derived from Shakespeare to help us sound fancy in order to ensure that an employer can see that we are versatile Formal language is our ability to speak more than just one language. If we are bilingual, we have a better chance at being hired.​

Answers

This prompt is about formal oanguage and styles of communication. See the explanation below.

What is formal language and why do we use it ?

Formal language refers to a style of communication that follows specific grammatical and linguistic conventions, typically associated with academic, professional, or formal settings. It is characterized by the use of proper grammar, syntax, and vocabulary, and avoids slang or colloquial expressions.

We use formal language in job interviews to convey professionalism, competence, and respect for the setting and the interviewer. It also helps to convey our ideas in a clear and concise manner, without the distractions of informal language.

Contrary to the notion that formal language is archaic or derived from Shakespeare, it is a contemporary and widely used mode of communication in formal settings. It is not related to bilingualism, which refers to the ability to speak two languages fluently.

Learn more about formal language:
https://brainly.com/question/24222916
#SPJ1

What is the process of ensuring anti-malware software and data is up to date. mandate daily updates.

Answers

Assuring by checking

Consumers get the impression that everyone loves a product when they:

Consumers get the impression that everyone loves a product when they:

Answers

Answer:

C. read positive user reviews grouped together on a company's website.

Explanation:

A product can be defined as any physical object or material that typically satisfy and meets the demands, needs or wants of customers. Some examples of a product are mobile phones, television, microphone, microwave oven, bread, pencil, freezer, beverages, soft drinks etc.

According to the economist Philip Kotler in his book titled "Marketing management" he stated that, there are five (5) levels of a product. This includes;

1. Core benefit.

2. Generic product.

3. Expected product.

4. Augmented product.

5. Potential product.

The core benefit of a product can be defined as the basic (fundamental) wants or needs that is being satisfied, met and taken care of when a customer purchase a product.

Generally, consumers would get the impression that everyone loves a product when they are able to read positive user reviews grouped together on a company's website.

Typically, when a consumer uses a product and derives so much satisfaction from the use of such product, he or she has the opportunity to post a summary of this experience in the comment section of manufacture's or company's website.

Hence, these comments known as reviews may be used subsequently by other consumers to make an informed decision about the company's product.

C. read positive user reviews grouped together on a company's website.

which command can an administrator execute to determine what interface a router will use to reach remot netowrks

Answers

Determine the path between two connections by using the traceroute command. A connection to another device frequently needs to pass via several routers.

How do I get my Cisco router's interface status?

Use the show interface summary command to provide a summary of the system interfaces' details. There are no arguments or keywords for this command. Use the show interface command to display the system interfaces' details. information about the redundancy management interface is displayed in full.

What router command would a system administrator enter to check whether the exit interface was operational?

The show is interface short command can be used by the network administrator to check that the interface connected to the next hop address or the exit interface is operational. To check if the next hop address is reachable, use the ping command. The routing table is displayed via the show IP route command.

to know more about routers here:

brainly.com/question/29768017

#SPJ4

Using a recursion tree, show the process how to solve the following recurrence in terms of the big O representation. Use the substitution method to prove your conclusion.

T(n) = 2T(n/3) + cn

Answers

To utilize a recursion tree in solving the recurrence relation T(n) = 2T(n/3) + cn.

The Recursion Tree

Commence by initializing the topmost node that symbolizes T(n).

The initial node bifurcates into a pair of offsprings, symbolizing T(n/3).

The child nodes divide into two additional child nodes that depict T(n/9).

Carry out this procedure repeatedly until you arrive at the leaf nodes, which signify T(1).

The accumulated work completed at every stage is equivalent to cn.

The tree's height is determined by log base three of n.

To determine the overall work accomplished, the individual work executed at every level needs to be added together. This individual work is represented as cn multiplied by 2 raised to the power of log base 3 of n.

We can express it in a simpler form as cn multiplied by n raised to the power of the logarithm of 2 with a base of 3.

Let us consider the substitution method and suppose that T(n) does not exceed kn raised to the power of log base 3 of 2, where k is a constant.

By inserting this supposition into the sequence formula, we obtain T(n) ≤ 2(k(n/3)^(log₃(2))) + cn.

To make it more concise, we can write the upper bound for T(n) as (2/3)kn^(log₃(2)) + cn.

By selecting an appropriate value for k such that (2/3)kn^(log₃(2)) is less than or equal to cn for sufficiently large n, we can establish that T(n) is no greater than kn^(log₃(2)) for all values of n.

Consequently, the time complexity for T(n) can be expressed as O(n^(log₃(2))) based on this information.

Through the utilization of both the substitution method and the recursion tree, we have cleverly demonstrated that T(n)'s time complexity is bounded by O(n^(log₃(2))).

Read more about recursion tree here:

https://brainly.com/question/30425942

#SPJ4

Task intructions
in cell c4 of the q1 worksheet enter a formula using a 3d reference and the sum function to total the values in cell C4 of the january, February, and March worksheets.

Answers

According to question using 3D reference to perform the given task in worksheet, follows the steps explained in the explanation part.

The steps of the following task areas follows:

Click the cell where you wish to input your 3D formula in Step 1 to get started.

Enter the function name, the equal sign (=), and an opening parenthesis, for instance =SUM.

Step three is to choose the tab for the first worksheet you wish to use as a 3D model reference.

While pressing the Shift key, click the tab of the final worksheet you want to use as a 3D reference.

The cell or range of cells for which you wish to do the computation should be selected in step 5.

To complete the remainder of the formula as usual.

Press the Enter key to complete your Excel 3-D formula.

Learn more about 3D reference, here:

https://brainly.com/question/32573658

#SPJ12

A computer essentially takes input, processes it, and produces output. Which person developed a machine in the mid-1880s that accomplished this?

John William Mauchly
Charles Babbage
Sir John Ambrose Fleming
Herman Hollerith

Answers

Answer:

The answer to this question is given below in the explanation section. the correct answer is Herman Hollerith.

Explanation:

Charles Babbage (incorrect)

Charles Babbage considers the father of the digital computer. He was a mathematician, philosopher, inventor, and mechanical engineer, Babbage originated the concept of a digital programmable computer. But he died on 18 1, 1871. so, this option is not correct.

John William Mauchly (Incorrect)

John William Mauchly was an American physicist who, along with J. Presper Eckert, designed ENIAC, the first general purpose electronic digital computer, as well as EDVAC, BINAC and UNIVAC I, the first commercial computer made in the United States. But John William Mauchy born on August 30, 1907 and died on January 8, 1980. So, this option is not correct.

Sir John Ambrose Fleming (Incorrect)

Sir John Ambrose Fleming was an English electrical engineer and physicist who invented the first thermionic valve or vacuum tube, designed the radio transmitter with which the first transatlantic radio transmission was made, and also established the right-hand rule used in physics.

Herman Hollerith (correct)      

Herman Hollerith was an American businessman, inventor, and statistician who developed an electromechanical tabulating machine for punched cards to assist in summarizing information and, later, in accounting. This machine is patented in 1884.

HELP!!!
I, not so smartly, probably deleted an important file and then restarted my computer, in an attempt to free up computer space. This is what happened when I tried to turn it back on. :')

HELP!!! I, not so smartly, probably deleted an important file and then restarted my computer, in an attempt

Answers

Answer:

From the GRUB command line, type exit. This should take you to the computer's bootloader. From there, select to boot from the Windows partition (probably marked C:).

If the method described in the first paragraph doesn't work, restart your computer and press F12 many times while the computer boots up. This should take you to the computer's BIOS, where you then need to navigate to the bootloader from and select to boot from the Windows partition (probably marked C:).

Describe each of the principal factors risk factors in
information systems projects (20 marks)

Answers

The principal risk factors in information systems projects encompass various aspects such as project complexity, technology challenges, organizational factors, and external influences.

These factors contribute to the potential risks and uncertainties associated with the successful implementation of information systems projects.

Project Complexity: Information systems projects can be inherently complex due to factors such as scope, scale, and the integration of multiple components. The complexity may arise from intricate business processes, diverse stakeholder requirements, or the need for extensive data management. Complex projects pose risks in terms of project management, resource allocation, and potential delays or cost overruns.

Technology Challenges: Information systems projects often involve implementing new technologies, software systems, or infrastructure. Technological risks include compatibility issues, scalability limitations, security vulnerabilities, and the need for specialized expertise. These challenges may impact the project timeline, functionality, and long-term viability of the system.

Organizational Factors: The success of an information systems project depends on organizational factors such as leadership, communication, and stakeholder engagement. Risks in this domain include lack of management support, insufficient user involvement, resistance to change, inadequate training, and poor project governance. Failure to address these factors can lead to user dissatisfaction, low adoption rates, and project failure.

External Influences: External factors, such as changes in regulatory requirements, market dynamics, or economic conditions, can introduce risks to information systems projects. These factors may necessitate modifications to project scope, increased compliance efforts, or adjustments to business strategies. Failure to anticipate and adapt to external influences can disrupt project timelines and impact the project's overall success.

Understanding and managing these principal risk factors is crucial for effective project planning, risk mitigation, and successful implementation of information systems projects. Proper risk assessment, contingency planning, stakeholder involvement, and ongoing monitoring are essential to minimize the impact of these risks and ensure project success.

Learn more about  information systems here:

https://brainly.com/question/13081794

#SPJ11

plug and play is a software and hardware standard that

Answers

With the help of Plug and Play (PnP), a computer system can adapt to changes in hardware with a minimum of user intervention.

What are the advantages of plug-and-play technology in general?

The total cost of service (TCS) is decreased with a real plug-and-play solution that eliminates hassles during installation and lowers cybersecurity worries. This provides integrators more flexibility to make better use of their resources and increase their revenue. Customers are expected to feel safe and protected by security solutions.

Describe the plug-and-play network.

In order for devices like PCs, peripherals, smart appliances, and wireless devices to be plugged into a network and instantly recognize one another, a standard called Universal Plug and Play (UPnP) must be used.

to know more about software and hardware standard here:

brainly.com/question/29981687

#SPJ1

which of the following methods of obtaining desert lysed images can recognize and preserve text and formatting
A: a Digital camera
B: an OCR scanneR
C: clip art
D: online graphics

Answers

Answer:

B

Explanation:

A network administrator was told by the Chief Information Officer (CIO) to set up a new office with a network that has redundancy. What topology would BEST meet the CIO's requirement?

Answers

Answer:

"Mesh topology" is the correct answer.

Explanation:

A mesh topology seems to be a network configuration where there has been an interconnection between each hardware and communications system. This topology configuration allows the distribution of many of these signals, although one of the connexons starts going down.This topology needs to connect each destination to any other end destination, thus creating a completely pointless channel.

how can we protect ourselves from exploits

Answers

Answer:Stay up-to-date. Do you regularly update your operating system and all the various applications you have installed? ...

Upgrade your software. In some cases, a software application becomes so old and unwieldy the software maker stops supporting it ( abandonware ), which means any additional bugs that are discovered will not be fixed. ...

Stay safe online. ...

Use it or lose it. ...

Install authorized apps. ...

Explanation:

write a findsubset function that takes an int and a list of ints. it will return a subset of the list that adds up to the first argument. if no such subset can be found, it will return the empty list.

Answers

Here's a Python function called `findSubset` that takes an integer `target_sum` and a list of integers `nums`. It returns a subset of the list that adds up to the target sum, or an empty list if no such subset can be found.



```python
def findSubset(target_sum, nums):
   def helper(subset, remaining, start):
       if sum(subset) == target_sum:
           return subset
       if start == len(remaining):
           return []
       subset_with_num = helper(subset + [remaining[start]], remaining, start + 1)
       if subset_with_num:
           return subset_with_num
       return helper(subset, remaining, start + 1)

   return helper([], nums, 0)
```

You can use this function by calling it with the desired sum and list of integers:

```python
result = findSubset(10, [3, 4, 5, 2, 1])
print(result)  # Output: [3, 4, 2, 1]
```

To know more about python please refer:

https://brainly.com/question/19045688

#SPJ11

T/F: query by example uses a graphical user interface that assists users with retrieving data.

Answers

Answer:  True

Explanation:

Query by Example (QBE) is a technique that uses a graphical user interface (GUI) to assist users in retrieving data from a database. Instead of writing complex queries in a programming language like SQL, users can interact with the GUI and specify their search criteria by providing examples or patterns of the desired data.

With QBE, users typically utilize forms or grids where they can input values, select options, or define conditions using logical operators. The GUI then translates these user inputs into underlying query operations, simplifying the process of constructing queries.

By providing a visual and intuitive interface, QBE allows users with varying levels of technical expertise to interact with databases and retrieve data without the need for extensive knowledge of query languages or complex syntax.

Learn more about  graphical user here:

https://brainly.com/question/16956142

#SPJ11

Can someone give me an example of previous experiences you've had that involved a model. These can be school related or from your personal life. explanation should include the context of the model (what was the setting and real-world use) and what the basic components of the model are. What assumptions are built into the model and what are the limits of the model, or what can the model fail to explain?

Answers

One example of a previous experience involving a model is building a solar system model for a school project.

The context of the model was an educational setting, specifically a science class where students were required to create a physical representation of the solar system. The main purpose was to help visualize the relative positions and sizes of the celestial bodies within the solar system and gain a better understanding of their distances from one another.

The solar system model, while a helpful educational tool, was not able to account for various factors such as the ongoing movement and rotation of the planets, the effects of gravity, or the complexities of each planet's atmosphere and geological features. Additionally, the model did not represent the numerous dwarf planets, minor planets, and other celestial objects that make up our solar system.

To know more about project visit;-

https://brainly.com/question/7953972

#SPJ11

command provides three lists of vlan ids. which items would limit the vlans that appear in the first of the three lists of vlans?

Answers

The command provides three lists of vlan ids. A switch port trunk allowed vlan interface subcommand would limit the vlans that appear in the first of the three lists of vlans.

What is a VLAN?

Any broadcast domain in a computer network that is divided and isolated at the data connection layer is referred to as a virtual local area network(VLAN). In this sense, a physical item that has been replicated and changed by additional logic within a local area network is referred to be virtual.

By separating workstations into various separate LAN segments using VLANs, network managers can automatically restrict access to a certain group of users. Administrators do not have to reconfigure the network or switch VLAN groups when users move their workstations.

To learn more about a VLAN, use the link given
https://brainly.com/question/28635096
#SPJ4

write the necessary preprocessor directive to enable the use of the stream manipulators like setw and setprecision.

Answers

setw C++ is an iomaip library method found in C++. setw is a C++ manipulator that stands for set width. The manipulator provides the minimum amount of character places a variable will require or sets the ios library field width.

In layman's terms, the setw C++ function assists in determining the field width needed for output operations. The function accepts as an input member width and requires a stream where this field must be edited or added. The function also precisely n times sets the width parameter of the stream in or stream out. The parameter it accepts will be the new width value that must be set.

setw C++

Section I: Table of Contents

In C++, what is the setw function?

setw Function Parameters in C++

setw Function Examples

Conclusion

C++, also known as CPP, is a popular general-purpose programming language that was created as an improved version of the C language since it contains an object-oriented paradigm. It is an imperative and compiled language. C++ functions come in a variety of kinds. In this post, we'll look at one such function: setw C++.

From the fundamentals to the advanced, learn it all!

PGP Full Stack Development at Caltech

EXPLORE THE PROGRAM

From the fundamentals to the advanced, learn it all!

In C++, what is the setw function?

setw C++ is a technique.

Learn more about Full Stack Development from here;

https://brainly.com/question/15582081

#SPJ4

1. How do we know if the information in a websites is fake or not?


2. How important is respect for truth?

Answers

Answer: 1)Ingrese la URL del sitio web y podrá ver detalles como el nombre de la organización del propietario, el país de registro y la antigüedad del dominio
2)Como individuos, ser veraces significa que podemos crecer y madurar, aprendiendo de nuestros errores

Explanation:

given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a vending machine object that performs the following operations: purchases input number of drinks restocks input number of bottles reports inventory

Answers

A vending machine object that performs the following operations: purchases input number of drinks restocks input number of bottles reports inventory is given below

The Program

public boolean removeItemType(int index)

 {

   if (index < 0)

   {

     return false;

 }

   else

   itemCount = index;

   index--;

  return true;

 }

 public boolean reStock(int which, int qty)

{

   if (index < 0)

   {

     return false;

 }

   else

     

  return true;

 }

public class ItemType

{

private String name;

 private double price;

 private int quantity;

 public ItemType(String n, int p)

 {

   this.quantity = 0;

   this.name = n;

   if (p <= 0){

     this.price = 5;

   }

   else{

     this.price = p;

   }

 }

 public String getName()

 {

   return this.name;      

 }

 public int getPrice()

 {

   return (int) this.price;      

 }

 public int getQuantity()

 {

   return this.quantity;

 }  

public int addQuantity(int n)

 {

   if (quantity <0) {

   return -9999;  

   }

   else{

     if (quantity + n <= 10)

       quantity += n;

    return quantity;

 }

 }

 public int getItem()

 {

   if (quantity < 1){

     return -9999;

   }

   else

     this.quantity --;

   return quantity;

   

 }

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

what is a possible method for ensuring that the correct rows are deleted from the databse before thedelte statement is run?

Answers

Creating a select statement and then transferring the where clause to the delete statement? Hope this helps!!!

Jeff wants to create a website with interactive and dynamic content. Which programming language will he use?
A.
DHTML
B.
HTML
C.
CSS
D.
JavaScript

Answers

Answer:

b.HTML

Explanation:

HTML (Hyper-Text Markup Language) and it was the primary language for developing the websites those days. With the evolution of internet market, the transformation of simple, static HTML websites to dynamic websites was the first thing to come up.

There is an extensive range of accounting/bookkeeping software available within Australia. In this instance you are to select th scurrently available within Australia and compare and evaluate them to determine their suitability for accounting client/s. Explain and justify your recommendation.

Answers

There are various accounting/bookkeeping software available within Australia, such as Xero, MYOB, QuickBooks, and Reckon One. Among these, Xero is the most popular accounting software in Australia due to its user-friendly interface, advanced features, and affordable pricing.

Xero has many features, including automated bank feeds, inventory management, fixed asset management, and multiple currency support. The software also provides real-time financial data to help business owners monitor their cash flow. Its cloud-based nature means that data is accessible from anywhere with internet access.MYOB is also a popular accounting software in Australia.

It offers many features, including automated bank feeds, payroll, inventory management, and time tracking. MYOB is easy to use, with a simple user interface. However, it is not as advanced as Xero, and it is more expensive. QuickBooks is a cloud-based accounting software that offers various features, including invoicing, payments, payroll, and inventory management. The software is user-friendly, with a simple interface. However, QuickBooks is not as advanced as Xero, and its pricing can be expensive. Reckon One is a cloud-based accounting software that offers many features, including invoicing, payments, and payroll. The software is easy to use and has a simple interface. However, Reckon One is not as advanced as Xero, and it lacks some features such as inventory management. In conclusion, Xero is the best accounting software in Australia due to its advanced features, affordable pricing, and user-friendly interface. It is suitable for small businesses, medium-sized businesses, and accountants.

Know  more about accounting/bookkeeping software here:

https://brainly.com/question/911682

#SPJ11

Hi, can someone please help me with this? I've been having a lot of trouble with it.

The assignment

Your job in this assignment is to write a program that takes a message as a string and reduces the number of characters it uses in two different set ways. The first thing your program will do is ask the user to type a message which will be stored as a String. The String entered should be immediately converted to lowercase as this will make processing much easier. You will then apply two different algorithms to shorten the data contained within the String.

Algorithm 1

This algorithm creates a string from the message in which every vowel (a, e, i, o, and u) is removed unless the vowel is at the very start of a word (i.e., it is preceded by a space or is the first letter of the message). Every repeated non-vowel character is also removed from the new string (i.e., if a character appears several times in a row it should only appear once at that location). So for example the string "I will arrive in Mississippi really soon" becomes "i wl arv in mssp rly sn".

After applying this algorithm, your program should output the shortened message, the number of vowels removed, the number of repeated non-vowel characters removed, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.

Algorithm 2

This algorithm creates a string by taking each unique character in the message in the order they first appear and putting that letter and the number of times it appears in the original message into the shortened string. Your algorithm should ignore any spaces in the message, and any characters which it has already put into the shortened string. For example, the string "I will arrive in Mississippi really soon" becomes "8i1w4l2a3r1v2e2n1m5s2p1y2o".

After applying this algorithm, your program should output the shortened message, the number of different characters appearing, and how much shorter the shortened message is than the original message. The exact format in which the program should print this information is shown in the sample runs.

Sample Run 1
Type the message to be shortened
This message could be a little shorter

Algorithm 1
Vowels removed: 11
Repeats removed: 2
Algorithm 1 message: ths msg cld b a ltl shrtr
Algorithm 1 characters saved: 13

Algorithm 2
Unique characters found: 15
Algorithm 2 message: 4t2h2i4s1m5e2a1g1c2o1u3l1d1b2r
Algorithm 2 characters saved: 8
Sample Run 2
Type the message to be shortened
I will arrive in Mississippi really soon

Algorithm 1
Vowels removed: 11
Repeats removed: 6
Algorithm 1 message: i wl arv in mssp rly sn
Algorithm 1 characters saved: 17

Algorithm 2
Unique characters found: 13
Algorithm 2 message: 8i1w4l2a3r1v2e2n1m5s2p1y2o
Algorithm 2 characters saved: 14
Milestones
As you work on this assignment, you can use the milestones below to inform your development process:

Milestone 1: Set up a program that takes a string input and converts all the letters to lowercase. Start implementing algorithm 1: create a counter variable and iterate through the characters of the String, incrementing this each time a vowel is encountered which is not preceded by a space or is at the start of the String. So at the end of the loop this counts the number of vowels that are not at the start of a word.

Milestone 2: Add further conditions (using else if) in your loop to count any non-vowel characters which appear immediately after the same character. Make a new empty String to hold the shortened message at the start of the code, then add a final else condition in the loop to add all characters which were not vowels or repeated letters to this String. Then print the statements for algorithm 1 using your counts and shortened message.

Milestone 3: Start implementing algorithm 2 by writing code that iterates through the String and checks that each character is not a space and has not already appeared in the word before that point. You will need to use nested loops - an outer loop to iterate through the String characters and an inner loop that looks through the previous characters up to that point - and a flag variable to record if a letter was found in the inner loop. Use a counter variable to count all such "unique" characters in the String.

Milestone 4: Add a second inner loop inside the outer loop from the previous which counts all appearances of a character that passes the tests from milestone 3. Add the character and the number of times it appears to another shortened message String (which should start as blank String). Finally, print the statements for algorithm 2 using your unique character count and shortened message.

Answers

Answer:

Scanner scan = new Scanner(System.in);

System.out.println("Type the message to be shortened");

String msg = scan.nextLine();

System.out.println();

msg = msg.toLowerCase();

String newStr = "";

System.out.println("Algorithm 1");

int vowels = 0;

int repeats = 0;

for(int i = 0; i < msg.length(); i++)

{

if((msg.substring(i, i +1).equals("a") || msg.substring(i, i+1).equals("e") || msg.substring(i, i +1).equals("i") || msg.substring(i, i+1).equals("o") || msg.substring(i, i +1).equals("u")))

{

if(i != 0 && !msg.substring(i -1, i).equals(" "))

{

vowels++;

}

else

newStr += msg.substring(i, i +1);

}

else if(i != 0 && msg.substring(i, i +1).equals(msg.substring(i -1, i)))

{

repeats++;

}

else

{

newStr += msg.substring(i, i +1);

}

}

System.out.println("\nAlgorithm 1");

System.out.println("Vowels removed: " + vowels);

System.out.println("Repeats removed: " + repeats);

System.out.println("Algorithm 1 message: " + newStr);

System.out.println("Algorithm 1 characters saved: " + (vowels + repeats));

algorithm2(msg);

}

public static void algorithm2(String msg)

{

String alg2Msg = "";

int uniqueLetters = 0;

// Iterate through each letter in msg

for(int i=0; i < msg.length(); i++)

{

String ltr = msg.substring(i,i+1);

// Only process if this character is not a space

if(!ltr.equals(" "))

{

/* Check whether this character has already appeared by

* iterating through characters from start up to the current

* letter and using a boolean flag variable.

*/

boolean alreadyUsed = false;

for(int j=0; j<i; j++)

{

if(msg.substring(j,j+1).equals(ltr))

{

alreadyUsed = true;

}

}

/* If this character hasn't already appeared,

* iterate through the rest of the characters

* and count how many times it appears.

*/

if(!alreadyUsed)

{

uniqueLetters++;

int count = 0;

for(int j=i; j<msg.length(); j++)

{

if(msg.substring(j,j+1).equals(ltr))

{

count++;

}

}

alg2Msg += count + ltr;

}

}

} //end for loop

System.out.println("\nAlgorithm 2");

System.out.println("Unique characters found: " + uniqueLetters);

System.out.println("Algorithm 2 message: " + alg2Msg);

System.out.println("Algorithm 2 characters saved: " + (msg.length() - alg2Msg.length()));

} //end algorithm2

}

Explanation:

Here you go!

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

What are practical things people can do to protect their privacy and security online? What can we do, and what can we avoid doing?

Please help this is due today and I really need help.

Answers

there are multiple ways people can protect there privacy like you don’t even have to get online just block yourself away from the world or you can make sure that your always connected to a vpn with hides you from being online or you can avoid putting in your real information if it’s not needed
Other Questions
Which dialogue is punctuatedcorrectly?A. "Good," snarled Georg, "good! We fightthis quarrel out to the death, you and I."B. "I'm caught in my own forest-land",retorted Ulrich!C. "Let's shout for help", he said, "In this lullour voices may carry a little way." which pair of windows socket calls would be executed by a server allow an incoming tcp connection request from a client to be serviced? The sentence "we arent welcome here said Jenny so we had better go dont you think"does not have any punctuation, punctuate the sentence correctly Answer Helpppppppp Arrange the following amines in order of decreasing water solubility, putting the most soluble amine first. NH2 B) II> III> I you have installed a second hard drive in a windows workstation. in disk management, what type of partition can you create that will allow you to create an unlimited number of logical partitions in it? Exercise 2 Draw one line under each simple subject and two lines under each compound predicate in the following sentences. Audiences appreciate new shows but often buy more tickets for familiar works. Which expression is equivalent to (6x3+3x2+8)+(2x29x+10)? Is escrow used for recurring or nonrecurring fees? What is the synonym of sclerosis? each of the following has been shown to sometimes cause deaf-blindness except 20 students in total. 10play sports and 12 play music. 2 of themdon't play anything and some are playboth. What's the percentage for studentsplay both? The length of a rectangle is three more than twice the width. Express the length of the rectangle in terms of its width W. 1) How does Intermountain Healthcare Communication use communication to improve transparency and medical outcomes?2) How does Intermountain Healthcare communicate effectively with patients?3) What innovations are taking place in digital communications at Intermountain Healthcare? In the Middle East most people have settled near A quality schools Cimportant religious D the most favorable climateshelpppppp fast A 55-year-old patient had a stroke with left-sided paralysis, requires long-term care, but has no insurance and lives paycheck to paycheck on a single-person income which will no longer exist. The patient would be eligible for which of the following types of payment options for the long-term care Summarizing Activities and IdeasHow did the lab activities help you answer the lessonquestion, "How do atmospheric conditions influenceweather patterns?" What did you learn from conductingthis lab? Richard drives at a speed of 70 miles per hour.How long will it take to drive 315 miles? Elephants tend to have few offspring and will tend their young very carefully for an extended period of time before having additional young. Elephants display characteristics suggesting that they _____. 8. At the system study phase of ..............., the design team attempts to assess whether theanticipated benefits of the system exceed its projectedcosts,which one is correct ?!CHOICE OPTIONS A. Data mining B. EXTRACT C. Bolt-ons D. Hadoop E. Virtual private network (VPN) F. Data encryption G. Variety H. Operational feasibility 1. Enterprise application integration (EAI) J.