Answer:
provides an overview of class's data and methods
Explanation:
Class Diagram is used in software engineering to represent:
- classes
- attributes
- methods
- relationship between classes
It provides a representation of the static layout of the application in object oriented design. It does not provide method implementation details. In fact code skeleton can be automatically generated from class diagram using appropriate UML tools.
Which ofthe following is not a guided medium?
1 TwistedPair
2 Fiber OpticCable
3 CoaxialCable
4Atmosphere
Answer: 4. Atmosphere.
Explanation:
All the other 3 options Twisted pair, Fiber Optic Cable,Coaxial Cable comes under guided media also known as bounded media.While Atmosphere doesn't come under this category.It is an unbounded media.The signal is not bounded in atmosphere while in other 3 options the signal is being transmitted through a wire.
What is the fastest way to locate a record for updating?
A. Review the data in Form view.
B. Use the Report view.
C. Review the data in Table view.
D. Use the search box.
Answer:
B. Use the Report view.
Explanation:
The fastest way to locate a record for updating is to use the report view.
Answer:
This is the correct answer!!! D. Use the search box.
Explanation:
Draw an FA over {0, 1}which represent binaries of Integers only divisible by 3. Allleading 0’s are permissible. [10]
Answer:
As we need to design the FA for the numbers divisible by 3, so we have to take the states as the remainders when we divide the numbers by 3.
Any number when divided by 3, gives remainder either 0 or 1 or 2. And the number gives remainder 0 is divisible by 3.
Let’s take
state 0 for remainder 0. state 1 for remainder 1. state 2 for remainder 2.So now lets count from 0:
Binary 0 = decimal 0 %3 = 0, so goes to state 0.
Binary 1 =decimal 1 %3 = 1, goes to state 1.
Binary 10 = decimal 2 %3 =2, goes to state 2.
Bianary 11 = decimal 3 %3 =0, goes to state 0.
Bianary 100 = decimal 4 %3 =1, goes to state 1.
Bianary 101 = decimal 5 %3 =2, goes to state 2.
And so on.
So here the state 0 will be the start state and also the final state.
Explanation:
So the FA is {{0,1,2}, {0,1}, δ, 0, {0}}
where δ(0, 0) = 0
δ(0, 1) = 1
δ(1, 0) = 2
δ(1, 1) = 0
δ(2, 0) = 1
δ(2, 1) = 2
Servlet session and JSP session have different abilities.TrueFalse
Answer:
The answer to this question is False.
Explanation:
According to life cycle of a JSP it has to becomes a servlet in the end.So there is no difference between their session handling capacities because in the end they are same.So we conclude that answer to this question is False.
Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N: Lather and rinse." numCycles times, where N is the cycle number, followed by "Done.". End with a newline. Example output with input 2: 1: Lather and rinse. 2: Lather and rinse. Done. Hint: Declare and use a loop variable.
// Writing a C++ function
void PrintShampooInstructions(int numCycles){
if(numCycles < 1) // if condition stands
cout<< "To few";
else if(numCycles >4)
cour<<"Too Many";
else{
// looping the variable for desired out put
for(int i=0;i<numCycles;i++)
cout<<i<<":"<<" Lather and rinse."<<endl;
}
}
Answer:
public static void printShampooInstructions(int numOfCycles){
if(numOfCycles < 1){
System.out.println("Too few.");
}
else if(numOfCycles > 4){
System.out.println("Too many.");
}
else {
for(int index = 0; index < numOfCycles; ++index){
System.out.println((index + 1) + ": Lather and rinse.");
}
System.out.println("Done.");
}
}
Explanation:
When an object of one class is a data field within another class, they are related by ____.
a.
composition
b.
extension
c.
is-a
d.
scope
Answer:
a. composition
Explanation:
When an object of one class is a data field in another class, the two classes are related by composition. In particular the containing class is composed using the contained class. For example:
class container {
contained c;
int a;
}
class contained {
int b;
}
Here the container class is containing an instance of contained class creating a composition relation.
Write an iterative C function that inputs a nonnegative integer n and returns the nth Fibonacci number. 2. Write a recursive C function that inputs a nonnegative integer n and returns the nth Fibonacci number. 3. Compare the number of operations and time taken to compute Fibonacci numbers recursively versus that needed to compute them iteratively. 4. Use the above functions to write a C program for solving each of the following computational problems. I. Find the exact value of f100, f500, and f1000, where fn is the nth Fibonacci number. What are times taken to find out the exact values
Please conduct some research and find an article on Security Threats and please provide link of the article.
Answer:
There are Security Threats happening every other day in the world. Some are minor while others can catastrophic.
Explanation:
There are also many types of Security Threats, Breaches, and Hacks in the world of IT. Each with their own Security Measures. Below are two links about this topic. The first link is an article about 5 of the worst corporate Security Breaches/Hacks to have taken place. While the second link is an article about the Top 10 Network Security Threats.
https://abcnews.go.com/Technology/marriotts-data-breach-large-largest-worst-corporate-hacks/story?id=59520391
https://securitytrails.com/blog/top-10-common-network-security-threats-explained
I hope this answered your question. If you have any more questions feel free to ask away at Brainly.
There are a variety of common user interfaces. How would you decide which interface to use and on what should this decision be based?
Answer: There are many different types of user interfaces. To decide on the user interface depends entirely on the requirement of the client.
Explanation:
There are different types of interfaces such as command line user interface, graphical user interface, menu based, form based. Therefore to choose among them it depend on the requirement specified by a client. Mostly nowadays GUI is used. to maintain records form based is preferred. For system software CUI is better due to decrease its pressure on the processor. Networking is also both GUI and CUI. So it depend mainly on the type of application developed , client requirements, power consumption based on its dependence on processor power.
When displaying fonts, what%u2019s the difference between pixels, points and ems?
Answer:
All 3 are CSS unit sizes which we can use for margins, fonts, borders etc.
Explanation:
CSS has four different unit sizes. These are:
Pixels (px)
Points (pt)
Ems (em)
Percentages(%)
These units are divided into two different groups. They are fixed and relative.
Pixels and points are fixed , whereas em and percentages are relative unit sizes. Relative unit sizes are good when creating scalable layouts.
Ems (em):
An em is a CSS unit that measures the size of a font. Originally, the em was equal to the width of the capital letter M, which is where its name originated.
It stands for "emphemeral unit" which is relative to the current font size.
The "em" is a scalable unit that is used in web document media. Ems have mobile-device-friendly nature.
Pixels (px):
Pixels are fixed-size units that are used in screen media. One pixel is equal to one dot in computer. The problem with pixel unit is that it is not relative .
Points (pt):
Point values are only for print. A point is a unit of measurement use for real-life ink on paper. Generally, 72pts= 1 inch which is one real-life inch like on a ruler. Point is not recommended to use in web pages.
Generally, 1em=16px=12pt=100% if the body size is 100%.
Relative unit sized fonts change and fixed unit sized fonts remain the same.
For example,
body { font-size: 100%}
p{font-size: 16px}
what is daemontools pakage in qmail?
Answer: Daemon-tools package is a group of tools which are present for the observation of the UNIX service in qmail. The services and saving of the error messages to logs are monitored by these tools. It helps in simplification of the management and makes the process easy.It has data or information of the errors which occur when setting up or execution of daemon-tools on a particular system.
What will be the value of “sumtotal” when this code is executed?
int n1 = 3, n2 = 6, n3 = 2, sumtotal = 4;
if (n1 ! = 4)
sumtotal -= n3;
else if (n3 <= 5)
sumtotal = ++n2;
else sumtotal += n1;
Answer:
2
Explanation:
if-else is the statement that is used for checking the condition and if the condition is True, then execute the statement otherwise not executed.
initially, the value of n1 = 3, n2 = 6, n3 = 2, sumtotal = 4.
after that, if statement checks for the condition.
3 != 4
condition is TRUE, then the statement sumtotal -= n3; will be executed.
write the statement in simple form:
sumtotal = sumtotal - n3;
so, sumtotal = 4-2 = 2.
after that, the program does not check the further and exit the if-else statement.
Therefore, the answer is 2.
A noted computer security expert has said that without integrity, no system can provide confidentiality.
a. Do you agree? Justify your answer
Answer: Yes, without the integrity factor there would be no possibility of confidentiality
Explanation: Integrity is the factor that determines that there has been no manipulation or unauthorized access being done int the data . It is a sort of assurance factor that helps us to know the data present is the actual correct data. So, if there is no integrity then confidentiality factor will be a waste . Confidentiality of data is maintained when there is chances of unauthorized access which can only be know id there is integrity present .
a. No we don't agree with the given statement.
Integrity without confidentiality:The system can't provide integrity without confidentiality. Here confidentiality means it should be concerned with the assets. In the case when confidentiality should be comprised so here we permit non-authorized access to the resource which might result in the modification of the document. And, if this can be done so the motive of integrity should be lost.
Learn more about security here: https://brainly.com/question/12840405
The _________ function causes a program to terminate.
Answer: exit
Explanation:
exit function terminates the calling process without executing the rest of the code.exit function do some cleaning before termination like buffer flushes etc.
exit(0) exits the program without any error message.
syntax:- void exit(int return code)
You have to include stdlib.h header file in c if you want to use exit function.
How many base cases are in the functionabove?
a. 0
b. 1
c. 2
d. 3
int func2(int m, int n) {
if (n == 0)
return 0;
else
return m + func2(m, n-1);
}
Answer:
The answer is (b). 1.
Explanation:
In the code there is only 1 base case .
the base case is as following:-
if(n==0)
return 0;
this is the base case.
Base case is the most important statement in the function that uses recursion because without base case the recursion calls will keep on going and we will get a run time error.
If you're doing a relational comparison, which filter would be available?
A. Date
B. Text
C. Number
D. Currency
Answer:
C. Number
Explanation:
If you're doing a relational comparison, a number filter would be available.
When trying to identify the sorted column in a table, you would look for the column where
A. an arrow is displayed in the field name.
B. data is in alphabetical order.
C. only a few records appear.
D. data is presented from low to high.
Answer:
d
Explanation:
provides guidelines for planning a desktop database. You will learn how to decide what information you need, how to divide that information into the appropriate tables and columns, and how those tables relate to each other. You should read this article before you create your first desktop database.
Is recursion ever required to solve a problem? What other approach can you use to solve a problem that is repetitive in nature?
Answer:
No you can not tell that recursion is ever required to solve a problem.
Recursion is required when in the problem, the solution of the input depends on the solution of the subsets of the input.
Iteration is also another form of repetitive approach we follow to solve that kind of problems.
But the difference between recursion and iteration is :
In recursion we call the function repeatedly to return the result to next level.In iteration certain bunch of instructions in a loop are executed until certain conditions met.Explanation:
For example in the Fibonacci sequence problem, to find [tex]f_{n}[/tex], we need to compute [tex]f_{n-1}[/tex] and [tex]f_{n-2}[/tex] before that.
In case of recursion we just call the method Fibonacci(n) repeatedly only changing the parameter Fibonacci(n-1), that calculates the value and return it.Fibonacci(n)
1. if(n==0 or n==1)
2. return 1.
3.else
4. return( Fibonacci(n-1)+Fibonacci(n-1) )
But in case of iteration we run a loop for i=2 to n, within which we add the value of current [tex]f_{i-1}[/tex] and [tex]f_{i-2}[/tex] to find the value of [tex]f_{i}[/tex]Fibonacci(n)
1. if(n<=2)
2. result = 1
3. else
4. result1 =1 and result2=1.
5. { result = result1 +result2.
6. result1= result2.
7. result2 = result.
8. }
9. output result.
Group Policy Objects enable a system administrator to manage multiple users and computers all at once by setting and enforcing key security policies at the __________ level. individual department Active Directory Forest, Domain, and Organizational Unit executive
Answer:
Group policy object can be applied on the OU level.
Explanation:
This whole question is ambiguous to say the least. Group Policies can be applied the the OU (Lowest level - if you create the OU or group), the Domain and the AD Forest as long as you link the ou to the root of the AD Forest. In other words, if you wish to create a Group Policy, you also need to create an OU that you can lik it to. i.e, you want all managers to bypass the proxy settings, you create the OU, drop all the Managers in there and create the GP and apply it to the OU or group.
Group Policy Objects enable a system administrator to manage multiple users and computers all at once by setting and enforcing key security policies at the Active Directory Forest, Domain, and Organizational Unit level.
Explanation:Group Policy Objects enable a system administrator to manage multiple users and computers all at once by setting and enforcing key security policies at the Active Directory Forest, Domain, and Organizational Unit level. Active Directory is a directory service provided by Microsoft that allows administrators to manage and organize their network resources, including user accounts and computer systems. Group Policy Objects (GPOs) are used to define and configure various settings and restrictions that apply to users or computers within a specific Active Directory container, such as a domain or organizational unit.
What is the output of the following code? (Please indent thestatement correctly first.)
int x = 9;
int y = 8;
int z = 7;
if (x > 9)
if (y > 8)
System.out.println("x > 9 and y > 8");
else if (z > = 7)
System.out.println("x < = 9 and z > = 7");
else
System.out.println("x < = 9 and z < 7");
Answer:
no output, it does not print any thing
Explanation:
if-else statement is used to execute the statement after checking the condition if the condition is true, it allows the program to execute the statement otherwise not.
in the code, define the variable with values x = 9, y = 8 and z = 7.
Then, if the statement checks the condition 9 > 9, the condition is false.
So, the program terminates the if statement and executes the next statement but there is no next statement.
the other if-else statement is within the if condition which already terminates.
Therefore, there is no output.
What are the advantages and disadvantages of the various collision resolution strategies for hashes?
Linear probing
It does a linear search for an empty slot when a collision is identified
Advantages
Easy to implement
It always finds a location if there is one
Disadvantages
When clusters and keys fill most of the array after forming in adjacent slots of the table, the performance deteriorates
Double probing/hashing
The idea here is to make the offset to the next position probed depending on the key value. This is so it can be different for different keys.
Advantages
Good for double number generation
Smaller hash tables can be used.
Disadvantages
As the table fills up, the performance degrades.
Quadratic probing
It is used to resolve collisions in hash tables. It is an open addressing scheme in computer programming.
Advantage
It is more efficient for a closed hash table.
Disadvantage
Has secondary clustering. Two keys have same probe sequence when they hash to the same location.
Answer:
Vector: each vector position holds one
information. If the hashing function applied to a
set of elements determine the information I1,
I2, ..., In, so the vector V [1 ... n] is used to
represent the hash table.
! Vector + Chain List: Vector contains
pointers to lists that represent the
information.
Hashing Function
! The Hashing Function is responsible for generating a
index from a given key.
! Ideally, the function should provide unique indexes for the
set of possible input keys.
! Hashing function is extremely important,
because she is responsible for distributing the information through
Hash table.
Explanation:
Hope this helps :) -Mark Brainiest Please :)
Which of the following is NOT foundwithin the content pane?labelstitlebartextareasbuttons
Answer: Title bar
Explanation: Content pane is like a content box with certain features containing the object and knowledge about it. It is usually referred with several factors like labels , text, buttons etc to load the data in the dynamic way. These features are present within the content pane. The only feature outside the content pane is title bar and thus is not found in content pane.
Which function grows faster: N log N or N1+ε/ log N, ε > 0?
Answer:
N logN grows faster.
Explanation:
In N1+∈/N logN logN is the denominator. So this term is constantly getting divided by logN while in N logN there is no term in the division and for N > 2 log N will be > 1. So N logN will gorw faster. Since ∈ is greater than 0 So the numerator will be greater than N but it will not grow as fast as N logN.
Final answer:
N[tex]^(1+ε)[/tex] / log N grows faster than N log N because exponential growth surpasses logarithmic growth as N increases.
Explanation:
The question asks which function grows faster: N log N or N1+ε / log N, where ε > 0. To determine this, we need to analyze the growth rate of both functions as N becomes very large. In general, any function that includes a term with N raised to a power (in this case N1+ε) will grow faster than a function that involves N multiplied by a logarithmic function (in this case N log N). The reason is that exponential growth (which includes polynomials) surpasses logarithmic growth as N increases. Therefore, N1+ε / log N grows faster than N log N for any ε > 0.
Is bit stuffing necessary in the control or address field in theHDLC protocol? why?
Answer:
Many network and communication protocols require bit stuffing for the following purposes: to avoid the interpretation of data as control information. For example, with six consecutive 1 bits, X.25 uses the bit stuffing,signal the beginning and end of a frame.
High-level Data link control (HDLC) is a bit-oriented protocol for point-to-point and multi-point communication.P/F bits are present in HDLC control field.
So,Yes bit stuffing is necessary in control field.
When applying strict “Private access” level to a component. Which services should the designer provide in its class to allow the object to communicate with the outside world? What should be the access level of these services?
Answer:
public accessor methods
Explanation:
When applying strict “Private access” level to a component the designer should provide public accessor methods in its class to allow the object to communicate with the outside world. The access level of these services must be public so that they can be accessed by other classes and objects of the outside world.
Below is an example of such a class design in java :-
class MyClass {
private int num; //private class component
public int getNum(){ //public accessor method to allow the object to communicate with the outside world
return num;
}
}
In Java an abstract class cannot be sub-classed
?? True
?? False
Answer:
False
Explanation:
An abstract class is a class declared abstract — it may or may not include abstract techniques. It is not possible to instantiate abstract classes, but they can be sub-classed.
Abstract method declaration
abstract void moveTo(double X, double Y);
Usually the subclass offers solutions for all of the abstract techniques in its parent class when an abstract class is sub-classed. If not, however, the subclass must be declared abstract as well.
Example
public abstract class GraphicObject {
// declaring fields
// declaring non-abstract methods
abstract void draw();
}
2.Use loops to create a 4X6 matrix in which the value of each element is two times its row number minus three times its column number. For example, the value of element (2,5) is 2x2-3x5=-11.
Answer:
for(i=0; i<4; i++)
{
for(j=0;j<6;j++)
{
A[ i ][ j ] = 2* i - 3*j;
}
}
Explanation:
In this loop for each i = 0,1,2,3 we fill the the corresponding column values. and then move to next i value i.e. row.
TRUE/FALSE
The Interrupt Vectors stored in the Interrupt Vector table are really just the addresses of the interrupt service routines
Answer:
TRUE
Explanation:
Interrupt Vectors in the Interrupt Vector table represent the address of the Interrupt Service Routine.
Lets consider an example. When we press a key on the keyboard, a hardware interrupt is raised corresponding to keypress event. The control passes to the corresponding Interrupt Vector in the Interrupt Vector table which in turn directs the execution flow to the keyboard interrupt handler.
What is the command to display the user name with which youhave logged in?
Answer:
echo %username%
whoami
Explanation:
In windows the command used to display user name which you have logged in is echo %username%.Note that it is only for windows platform only .It works on all released windows platforms.
There is another command whoami it tells the domain name also along with the username.
You have to write all these commands on the command prompt.
Create a static method called negToZero, which takes an integer array, and returns a new integer array in which all negative entries in the input array have been changed to zero. The non-negative entries should remain unchanged. Example: theArray:{0,4,-6,-5,3} ==> {0,4,0,0,3} public static int [ ] negToZero (int [ ] theArray) {
Answer:
public static int[] negToZero(int [] theArray){
int[] newArray = new int[theArray.length];
for(int i=0;i<theArray.length;i++){
if(theArray[i]>=0){
newArray[i]=theArray[i];
}else{
newArray[i]=0;
}
}
return newArray;
}
Explanation:
The function is a block of the statement which performs the special task.
To return the array from the function, you have to define the function with return type array.
like, int[] name(parameter){
}
Then declare the new array with the same size.
Take the for loop for traversing in the array and check the condition for positive numbers by using if-else statement, if the value is positive store in the new array as it is. Otherwise, store the zero in the new array with the same position.
This process repeated until the condition in the for loop is true.
and finally, return the array.