Given the class 'ReadOnly' with the following behavior: A (protected) integer instance variable named 'val'. A constructor that accepts an integer and assigns the value of the parameter to the instance variable 'val'. A method name 'getVal' that returns the value of 'val'. Write a subclass named 'ReadWrite' with the following additional behavior: Any necessary constructors. a method named 'setVal' that accepts an integer parameter and assigns it the the 'val' instance variable. a method 'isDirty' that returns true if the setVal method was used to override the value of the 'val' variable.

Answers

Answer 1

Answer:

I believe you want a subclass so here it is!

public class ReadWrite extends ReadOnly {

public ReadWrite(int initialValue){

super(initialValue);

}

private boolean modified = false;

public void setVal(int x) {

val = x;

modified = true;

}

public boolean isDirty() {

return modified;

}

}

Explanation:

I might be wrong, just check through it in case

Hope this helped

:)


Related Questions

Write a SELECT statement that joins the Customers table to the Addresses table and returns these columns: FirstName, LastName, Line1, City, State, ZipCode. Return one row for each customer, but only return addresses that are the shipping address for a customer.

Answers

Answer:

SELECT [FirstName], LastName,

Line1, City, [State], ZipCode

FROM Customers JOIN Addresses ON

Customers.CustomerID = Addresses.CustomerID

AND

Customers.ShippingAddressID = Addresses.AddressID

Explanation:

The SELECT statement allows us to list the names of columns we wish to choose or select from the table. The customer and address tables are joined based on the common column which harbors unique ID and Address for each customer, CustomerID present in both tables (customers and addresses) and Shipping Address present as ShippingAddressID in Customers and AddressID in Addresses.

What is top down design? a. Top down design is a way of designing your program by starting with the biggest problem and breaking it down into smaller and smaller pieces that are easier to solve. b. Top down design is a way that you can create designs on a computer to put on a web page c. Top down design is a way of designing your programs starting with the individual commands first d. Top down design is a way to use loops and classes to decompose the problem

Answers

Answer:

The answer is "Option a".

Explanation:

This design is the breakdown for a structure to smaller components to recognize the textural functionalities. This system analysis the built-in the top-down style, that defines and it does not describe some first-level components, which is often known as a staggered layout, and wrong choices can be described as follows:

In option b, It is wrong because it is not used in web pages. In option c, It does not start with individual commands, that's why it is incorrect. In option d, It is wrong because it uses loops and classes, but it can't decompose the problem.

Final answer:

Top down design is a method used in software design where a problem is decomputed into smaller, manageable parts. The programmer starts with the large,main goal of the software then breaks it down into smaller components. Each of these components can then be broken down further if needed.

Explanation:

Top down design, sometimes referred to as stepwise refinement, is essentially a method that is used in the designing of software. This design approach is majorly rooted in the principle of decomposition, where a problem is broken down into smaller, more manageable parts. With the top down design approach, the programmer starts with the largest, overall objective of the software being created.

For instance, if you were designing a calculator software, you'd begin with the overall concept, which is a calculator. Then, you'd decompose this broad concept into smaller parts such as addition, subtraction, multiplication, division, square roots, etc. Each of these sub-problems can further be broken down if necessary. This approach allows you to focus on solving small, specific problems instead of feeling overwhelmed by the complexity of the larger challenge.

Learn more about Top down design here:

https://brainly.com/question/32498450

Which examples demonstrate appropriate use of media for a school project? Check all that apply. showing cartoons to teach about acting playing a how-to video to introduce a new skill providing a recent movie clip to discuss the topic of old movies using a movie segment to compare it to the novel it is based on presenting an interview clip to make a point about a discussion topic

Answers

The examples that demonstrate the appropriate use of media for a school project are as follows:

Playing a how-to video to introduce a new skill.Using a movie segment to compare it to the novel it is based on.Presenting an interview clip to make a point about a discussion topic.

Thus, the correct options for this question are B, D, and E.

What are the uses of Media?

The uses of the media are as follows:

It is a fundamental source of mass communication.It eventually plays the most informative role in society. It provides the services of the internet.It governs the basic platform of entertainment in the modern era of science and technology. It delivers the services like television, movies, video games, music, cell phones, kinds of software, etc.

The appropriate use of media is demonstrated by playing a how-to video to introduce a new skill, providing a recent movie clip to discuss the topic of old movies, using a movie segment to compare it to the novel it is based on, and presenting an interview clip to make a point about a discussion topic.

Therefore, the correct options for this question are B, D, and E.

To learn more about the Uses of media, refer to the link:

https://brainly.com/question/23976852

#SPJ5

A programmer wrote the program below. The program uses a list of numbers called numList. The program is intended to display the sum of the numbers in the list. In order to test the program, the programmer initializes numList to [0, 1, 4, 5].
The program displays 10, and the programmer concludes that the program works as intended.

set! sum = numList [1]
FOR EACH value IN numList
set! sum = sum + value
DISPLAY sum

Which of the following is true?

A) The conclusion is correct; the program works as intended.
B) The conclusion is incorrect; the program does not display the correct value for the test case [0, 1, 4, 5].
C) The conclusion is incorrect; using the test case [0, 1, 4, 5] is not sufficient to conclude the program is correct.
D) The conclusion is incorrect; using the test case [0, 1, 4, 5] only confirms that the program works for lists in increasing order.

Answers

Answer:

The conclusion is incorrect; using the test case [0, 1, 4, 5] is not sufficient to conclude the program is correct.

Explanation:

From the code snippet given, we cannot conclude that the test case is sufficient.

One of the reasons is because the test case contains only integer variables.

Tests need to be carried out for other large and floating points numerical data types such as decimal, double, float, etc. except that when it's known that the inputs will be of type integer only else, we can't rush into any conclusion about the code snippet

Another reason is that input are not gotten at runtime. Input gotten from runtime environment makes the program flexible enough.

Lastly, the array length of the array in the code segment is limited to 4. Flexible length needs to be tested before we can arrive at a reasonable conclusion.

Final answer:

The conclusion made by the programmer is incorrect because the second value in the list gets added twice, which leads to an inflated total. This means the program would not correctly calculate the sum of different numerical sequences.

Explanation:

The programmer's conclusion is incorrect; the program does not display the correct value for the test case [0, 1, 4, 5]. This is because initial value for sum is being set to the second value in the list, which is 1 in this case. Then, for each number in the list, including the second number again, it is added to the sum. So in essence, the second number in any list gets added twice, leading to a higher total. The correct sum of the list [0, 1, 4, 5] is indeed 10, but the program would produce the incorrect results if tested with a different sequence, such as [0, 2, 4, 5]

Learn more about Programming Error here:

https://brainly.com/question/34152482

#SPJ11

Which of the following phrases describes top-down processing

A. The entry level data captured by our various sensory systems
B. The effect that our experiences and expectations have on perception
C. Our tendency to scan a visual field from top to bottom
D. Our inclination to follow a predetermined set of steps, beginning with step 1, to process sound
E. The fact that information is processed by the higher regions of the brain before it reaches the lower brain.

Answers

Answer:

B. The effect that our experiences and expectations have on perception

Explanation:

Top-down processing refers to how our brains make use of information that has already been brought into the brain by one or more of the sensory systems. Top-down processing is a cognitive process that initiates with our thoughts, which flow down to lower-level functions, such as the senses.

Top-down processing is when we form our perceptions starting with a larger object, concept, or idea before working our way toward more detailed information. In other words, top-down processing happens when we work from the general to the specific—the big picture to the tiny details.

Write a program that accepts a number as input, and prints just the decimal portion. Your program must account for negative numbers.

Sample Run
Enter a number: 15.789
Sample Output
0.789

Answers

Answer:here I write code

Explanation:

#include <stdio.h>

int main(void) {

char x[]="" ;

int a,b,Flag=0;

gets(x);

b=sizeof(x);

for(a=0; a<b; a++){

if(x[a]=='.')

Flag=1;

if(Flag==1)

printf("%c",x[a]);

}

return 0;

}

A program that extracts and prints the decimal portion of any given number, including negative numbers, can be implemented using a language like Python by calculating the number modulo 1, while ensuring the remainder is positive with the absolute value function.

To write a program that prints just the decimal portion of a number, you can use the modulo operator to obtain the remainder of the division by 1, which inherently represents the decimal part. This method works for both positive and negative numbers. Here is an example in Python:

number = float(input('Enter a number: '))
decimal_part = abs(number) % 1
print('Decimal part:', decimal_part)

This script prompts the user to input a number, then calculates the absolute value of that number modulo 1 to find the decimal part, ensuring we get the positive remainder irrespective of the input number's sign. Finally, it prints out the decimal part of the provided number.

After compiling source code, which command still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem?

Answers

Answer:

Make install

Explanation:

In Computer programming, after compiling source code, make install still needs to be run in order to copy the newly compiled binaries into a directory listed in the PATH variable as well as copy supporting files (such as man pages) to the correct location on the filesystem.

In general, the commands that are executed by make install are defined in the Makefile.

Jenny, a programmer, uses Microsoft Excel 2016 to generate data required for the programs she develops. She uses various functions in Excel to perform the required calculations. Jenny enters =INT(3.1428) in one of the cells, which returns the integer value. The function used by Jenny is a _____ function.

Answers

Answer:

Math & Trig

Explanation:

INT is Math & Trig function that returns the integer part of the given number, rounds down to the nearest integer.

For example,

INT(3.1428) will give us 3

INT(-5.88) will give us -6

Many application controls are useful for enhancing the reliability of both transaction data and master record data. This application control compares the data entered into a field for a transaction to that in a master record to verify the data entered exists.
A. True
B. False

Answers

Answer:

True

Explanation:

In most accounting software like SAP, Application control performs what is known as validity check.

And Validity check is when this application control compares the data entered into a field for a transaction to that in a master record to verify the data entered exists.

With above definition we can infer that the question statement is true.

A company uses DHCP servers to dynamically assign IPv4 addresses to workstations. The address lease duration is set as 5 days. An employee returns to the office after an absence of one week. When the employee boots the workstation, it sends a message to obtain an IP address. Which Layer 2 and Layer 3 destination addresses will the message contain?

Answers

Answer:

FF-FF-FF-FF-FF-FF and 255.255.255.255

Explanation:

FF-FF-FF-FF-FF-FF can be defined as the layer 2 address broadcast which is often used on ethernet frames as well as help to broadcast all equipment due to the fact broadcast is made possible through Ethernet networks in which the Frames are addressed to reach every computer system on a given LAN segment as far as they are addressed to MAC address FF:FF:FF:FF:FF:FF.

255.255. 255.255 can be seen as the layer 3 address which help to address the exact same hosts because it enables the broadcast address of the zero network which is the local network due to the fact that the IP broadcasts are often used by BOOTP and DHCP clients to find and send requests to their respective servers in which a message sent to a broadcast address may be received by all network-attached hosts.

Therefore the Layer 2 and Layer 3 destination addresses which the message contain are FF-FF-FF-FF-FF-FF and 255.255.255.255

Eric is working on his website, which sells produce from his farm. He's thinking of different ways to improve his website so that it appears on more search engine results and gets more traffic. Which of these ideas will help improve his search visibility?

Answers

OPTIONS:

1. Write recipes that use vegetables that he sells

2. Get lots of likes or followers on social media

3. Encourage others to write about his website

4. Add lots of links to the website

Answer:

1. Write recipes that use vegetables that he sells , and 3. Encourage others to write about his website

Explanation:

In other for Eric to improve his website search visibility, there are several search engine optimization techniques that he can use to make his website appear more on search engine results. Two of such tips is given in the options above, they are "write recipes that use vegetables that he sells", and "encourage others to write about his website".

If Eric writes quality contents that feature keywords and vegetables that he uses in his recipes, this would go a long way in giving his website a good search visibility score.

Also, getting other to write about his website would make his website more visible online, and also increase search visibility score.

Using Task Manager, you discover an unwanted program that is launched at startup. Of the items listed below, which ones might lead you to the permanent solution to the problem? Which ones would not be an appropriate solution to the problem? Explain why they are not appropriate.

a.Look at the registry key that launched the program to help determine where in Windows the program was initiated.
b.Use Task Manager to disable the program.
c.Search Task Scheduler for the source of the program being launched.
d.Use System Configuration to disable the program.
e.Search the startup folders for the source of the program.

Answers

Answer: A) - E)

Explanation: A and E might be the most helpful options to your question.

With "read" function, which one of the following statements is NOT correct? a.If the read is successful, the number of bytes read is returned. b.If the end of file is encountered, 0 is returned. c.The number of bytes actually read is always same as the amount requested for a successful read.d.The read operation starts at the file's current offset.e.Before a successful return, the offset is incremented by the number of bytes actually read

Answers

Answer:

a. If the read is successful, the number of bytes read is returned.

b. If the end of file is encountered, 0 is returned.

Explanation:

A read function is one of the functions used in computer programming. A read function is used to read an information or data that was written before into a file.

If any portion of a regular file before to the end of file has not been written and the end of file is encountered the read function will return the bytes with value 0.

If read function has read some data successfully, it returns the number of bytes it read.

30 POINTS!!!!

Select the correct answer from each drop-down menu.

Justin is pursuing a computer science degree in college. He wants to take extra training as a back-end developer. What kind of programming languages should he learn that would be useful to him?

As a back-end developer, Justin can take courses and training in database tools such as
- illustrator
- sybase
- axure
- indesign
and programming languages such as
- balsamiq
- firework
- perl
- flex

Answers

Final answer:

As a back-end developer, Justin should focus on learning Perl for programming and become familiar with database systems such as Sybase to handle user data and implement security measures effectively. Proficiency in multiple programming languages is also highly beneficial.

Explanation:

Selecting Programming Languages for Back-End Development

To become a skilled back-end developer, Justin should participate in targeted and ongoing training to build his skills and knowledge in programming. The programming languages that are highly valuable for back-end development include languages such as Perl. Additionally, understanding database tools is crucial, and one of the most recognized database management systems a developer might use is Sybase. Learning these technologies will equip Justin to receive, store, and manipulate user data, interact with files, and implement basic security measures to deter malicious attacks.

Identify the traditional communication process. A. Source-Encoding-Message channel-Decoding-Receiver-Feedback. B. Source-Encoding-Message channel-Receiver-Feedback. C. Source-Encoding-Message channel-Noise-Receiver-Feedback. D. Source-Message channel-Decoding-Receiver-Feedback. E. Source-Noise-Message channel-Receiver-Feedback.

Answers

Final answer:

The correct answer to the question identifying the traditional communication process is option A: Source-Encoding-Message channel-Decoding-Receiver-Feedback. This sequence encapsulates the full cycle of communication from the inception of a message by the source to the reception and feedback from the receiver, incorporating both encoding and decoding processes.

Explanation:

The question asks to identify the traditional communication process from given options. The correct process is Source-Encoding-Message channel-Decoding-Receiver-Feedback. This sequence starts with a source that creates a message; this message is then encoded, or turned into a form that can be transmitted. It's sent through a chosen communication channel to the receiver, who then decodes, or interprets, the message. Feedback is provided back to the original source, closing the communication loop and making the process interactive. Noise can interfere at any point in this process, potentially distorting the message.

This traditional communication process encompasses the essential elements needed for effective communication: a sender (or source), encoding, a message channel, decoding, a receiver, and feedback. Understanding this process is key in fields like public speaking, marketing, interpersonal communication, and computer-mediated communication.

Suppose you use Batch Gradient Descent to train a neural network and you plot the training error at every epoch. If you notice that the training error consistently goes up, what is likely going on? How can you fix this?

Answers

Answer:

The answer is "using validation error".

Explanation:

The validation error is used to response the test for one of the queries is activated to the participant, which may not properly answer the question. These errors go up continuously after each time, the processing rate is too high and also the method is different.  

These errors are also unless to increase when they are actually in the problem.  The training level will be that, if the learning error may not increase when the model overrides the learning set and you should stop practicing.

XBRL: a. Is an XML-based language b. Can be read by almost any software package and easily searched by Web browsers c. All of these choices are correct d. Consists of a set of tags that are used to unify the presentation of BR information into a single format

Answers

Answer:

c. All of these choices are correct

Explanation:

XBRL (eXtensible Business Reporting Language) is a freely available and global framework for exchanging business information which uses XML-based data tags to describe financial statements for both public and private companies. It is a normalized version of XML. It leverages efficiencies of the Internet as today’s primary source of financial information by making Web browser searches more accurate and relevant.

Therefore, options a, b and d can be identified in the above definition of XBRL. Therefore,all the choices are correct.

Multiple organizations operating in the same vertical want to provide seamless wireless accessfor their employees as they visit the other organizations. Which of the following should be implemented if all the organizations use the native 802.1xclient on their mobile devices?A.ShibbolethB.RADIUS federationC.SAMLD.OAuthE.OpenID connect

Answers

Answer:

The answer is "Option B"

Explanation:

It is a union service, that uses Uplink ports to obtain network access, and an EAP is a framework for an encryption of point-to-point links. It is eduroam, that is moving around learning, and wrong choices can be described as follows:

In option A, It is a single, that provides a login device, that's why it is wrong. In option C, It is wrong because it does not exchange authentication and approval information. Option D and Option E both are wrong because it works on HTTP and Licenses System and based on the server.

Search engines rank Web pages based on which of the following?

.The amount of advertising used on the web page

.The popularity and credibility of the Web page

.The profit margins of the sponsoring company

.The ratio of graphics to text on the web page​

Answers

Answer:

The popularity and credibility of the Web page.

The page must have a lot of traffic on it, and for this to happen the page must also be a provider of most needed information.

Is the following an example of social media viral marketing? Indicate your response by selecting Yes or No.
When you sign on to your favorite social media website, a number of sponsored ads appear on your home page.
A) Yes
B) No

Answers

Answer:

A) Yes

This is the social media's way of getting money.

HELP ME!!!!!!!!!!!!
Select the correct answer.
Robin wants her presentation to move from one slide to another with special motion effects. Which option should Robin use?
A.
Graphic Elements
B.
Animation
C.
Slide Transition
D.
Slide Master

Answers

Answer: c

Explanation: because that’s the group it’s under

The option Robin should use to move from one slide to another with special motion effects is Animation. The correct option is B.

What is animation?

In PowerPoint, animation allows users to add movement and special effects to individual objects on a slide, such as text, images, and shapes.

Robin can use animation to create a dynamic and engaging presentation that captures the audience's attention and emphasizes key points.

Slide transitions, on the other hand, govern how one slide disappears from the screen and the next one appears. Slide transitions help to create a smooth transition between slides.

Graphic elements and slide master are also ineffective for creating special motion effects.

Slide master is used to create a consistent look and feel throughout the presentation, whereas graphic elements are used to add pictures, icons, and other graphics to the presentation.

Thus, the correct option is B.

For more details regarding animation, visit:

https://brainly.com/question/29996953

#SPJ7

During the Requirements Definition stage of a systems development​ project, the employees who will be the primary users of the new system are not asked about their needs. The IS department is violating which of its​ responsibilities?

Answers

Answer:

enabling users to contribute to requirements for new system features and functions

Explanation:

Based on the scenario being described within the question it can be said that the main responsibility that is being violated is enabling users to contribute to requirements for new system features and functions. They are responsible for gathering user feedback, in order to get a sense of what the user's like and dislike regarding a system in order to later make the necessary changes needed to the system.

Technician A says that PTC heaters can be built into a conventional heater core assembly. Technician B says that a PTC heater's electrical resistance will decrease as its temperature increases. Which technician is correct?A) Technician A only B) Technician B only C) Both technicians D) Neither technician

Answers

Answer:

A) Technician A only.

Explanation:

Only Technician A who said that Positive Temperature Coefficient (PTC ) heaters can be built into a conventional heater core assembly is correct because they use the same heat loss and transfer system. This is easily verifiable with a simulation.

Technician B, who said that a PTC heater's electrical resistance will decrease as its temperature increases is incorrect because the resistance of a conductor is directly proportional to temperature. This means that a PTC heater's electrical resistance will increase as its temperature increases.

What role does energy play in the formation of sedimentary rock?

Answers


Sedimentary rock. ... Four basic processes are involved in the formation of a clastic sedimentary rock: weathering erosion caused mainly by friction of waves, transportation where the sediment is carried along by a current, deposition and compaction where the sediment is squashed together to form a rock of this kind.


Hope this helps

The major role of energy in the formation of sedimentary rock is that the energy from the Sun creates the cycle of rain and wind that causes erosion to produce sedimentation. Thus, the correct option is C.

What are Sedimentary rocks?

Sedimentary rocks are the class of rocks which are formed from the pre-existing rocks or the pieces of once-living organisms. These rocks form from the deposits which accumulate on the Earth's surface. Sedimentary rocks are often found to have distinctive layering or bedding on them.

The energy plays an important role in the formation of sedimentary rock which is that the energy from the Sun creates the cycle of rain and wind which causes the erosion to produce sedimentation.

Therefore, the correct option is C.

Learn more about Sedimentary rock here:

https://brainly.com/question/10709497

#SPJ6

Your question is incomplete, most probably the complete question is:

What role does energy play in the formation of sedimentary rock?

A. Rain cools sand, mud, and pebbles into hard layers that solidify using energy from the Sun.

B. The heat from the Sun melts sand, mud, and pebbles which then cool and solidify into a rock that can be broken down again through erosion.

C. Energy from the Sun creates the cycle of rain and wind that causes erosion to produce sedimentation.

D. Rain provides the energy needed to bring sand, mud, and pebbles to one location where energy from the Sun changes them to rock.

Write a program that use a switch statement whose controlling expression is the variable area code. If the value of area_code is in the table, the switch statement will print the corresponding city's name to the screen. Otherwise, the switch statement will print the message "Area code not found." to the screen. Use case "fall throughs" in order to simplify the switch block as much as possible.

Answers

Answer:

Table for Area codes are not missing;

See Attachment for area codes and major city I used

This program will be implemented using c++ programming language.

// Comments are used for explanatory purposes

// Program starts here

#include <iostream>

using namespace std;

int main( )

{

// Declare Variable area_code

int area_code;

// Prompt response from user

cout<<Enter your area code: ";

cin<<"area_code;

// Start switch statement

switch (area_code) {

// Major city Albany has 1 area code: 229...

case 229:

cout<<"Albany\n";

break;

// Major city Atlanta has 4 area codes: 404, 470 678 and 770

case 404:

case 470:

case 678:

case 770:

cout<<"Atlanta\n";

break;

//Major city Columbus has 2 area code:706 and 762...

case 706:

case 762:

cout<<"Columbus\n";

break;

//Major city Macon has 1 area code: 478...

case 478:

cout<<"Macon\n";

break;

//Major city Savannah has 1 area code: 912..

case 912:

cout<<"Savannah\n";

break;

default:

cout<<"Area code not recognized\n";

}

return 0;

}

// End of Program

The syntax used for the above program is; om

ou are a network administrator for your company. When establishing the company encryption policies, you must determine the risk of sending unencrypted data based on its risk to the company if obtained by unauthorized users. Much of the data your company sends is proprietary and sensitive in nature, so you determine that encrypting company transmissions is critical. What is the disadvantage of encrypting company transmissions

Answers

Answer:

Encrypting transmissions slows communication because each data packet must be encrypted and decrypted.

Explanation:

Encryption is defined as a process that uses an algorithm to scramble or encode a message in order for the message to be read by only authorized persons. Companies use this process when trying to keep some messages within a set of people. However, one advantage of encrypting company transmission is that it slows communication to a great extent. This is so because every message or packet data that is transmitted must be encrypted and decrypted before it is sent and read respectively.

The network board in a workstation is currently configured as follows:

-Network speed = Auto
-Duplexing = Auto

The workstation is experiencing poor network performance and you suspect that the network board is not correctly detecting the network speed and duplex settings. Upon investigation, you find that it is running at 10 Mbps half-duplex. You know that your network switch is capable of much faster throughput. To fix this issue, you decide to manually configure these settings on the workstation.

Before you do so, you need to verify the configuration of the switch port that the workstation is connected to. Given that it is a Cisco switch, which commands can be used on the switch to show a list of all switch ports and their current settings?

Answers

Answer:

show running-config interface

Explanation:

Given that it is a Cisco switch, "show running-config interface" or "show interface" commands can be used on the switch to show a list of all switch ports and their current settings.

This will help to verify the configuration of the switch port that the workstation is connected to.

Your ASP.NET page contains a page-level variable of Customer type. You want to preserve the value of this variable across page postbacks, but you do not need this variable in any other page in the application. Which of the following state-management techniques is the best way to achieve this?
a. Query strings
b. Cookies
c. ViewState
d. Session

Answers

Answer:

Option c is the correct answer for the above question.

Explanation:

View states are a mechanism that is used in c# programming language, It is used on only one page on which the user or programmer is working currently. It does not hold the records when the control goes to the other page.

The above question also wants which is described above. Hence option c is the correct answer while the other is not because:-

Option a states about the query string which is not any technique to hold the record.Option b states about cookies which are used to hold the record of all page.Option d states about the session which is used to hold any record and can be accessed on any page.

Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus their operating systems are referred to as which of the following? a.multiuser b.single user c.single processing d.multiprocessing

Answers

Answer:

a. multiuser

Explanation:

Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time and thus their operating systems are referred to as multiuser.

Examples of multiuser operating systems are Unix, Mac OS, Ubuntu, Linux, Windows 2000 etc.

Given the following sequence of names added to an ADT sorted list:nameListPtr->insertSorted("Tammie");nameListPtr->insertSorted("Brenda");nameListPtr->insertSorted("Sarah");nameListPtr->insertSorted("Tom");nameListPtr->insertSorted("Carlos");What would be returned by the call nameListPtr-> getPosition("Tammie")a. 1b. 3c. 4d. 5

Answers

Answer:              

c. 4

Explanation:  

This will work as following:

Lets say first Tammie is inserted by this statement insertSorted("Tammie")

Next insertSorted("Brenda") statement adds Brenda on top of Tammie so the sequence is now

Brenda  Tammie

Next insertSorted("Sarah"); statement inserts Sarah below Brenda and above Tammie so the sequence becomes:

BrendaSarahTammie

Next insertSorted("Tom"); statement inserts Tom below Tammie so the sequence becomes:

BrendaSarahTammieTom

Lastly insertSorted("Carlos"); statement inserts Carlos above sarah and below brenda so the sequence becomes:

BrendaCarlosSarah TammieTom

Now the statement getPosition("Tammie") is called which returns the position value of Tammie. So as you can see above its position is 4th so output is 4.

Other Questions
Johns Company manufactures products R, S, and T from a joint process. The following information is available: Product R S T Total Units produced 12,000 ? ? 24,000 Sales value at split-off ? ? $ 50,000 $ 200,000 Joint costs $ 48,000 ? ? $ 120,000 Sales value if processed further $ 110,000 $ 90,000 $ 60,000 $ 260,000 Additional costs if processed further $ 18,000 $ 14,000 $ 10,000 $ 42,000 Assuming that joint product costs are allocated using the relative-sales-value at split-off approach, what was the sales value at split-off for products R and S? Product R Product S A) $ 55,000 $ 75,000 B) $ 63,000 $ 81,000 C) $ 80,000 $ 70,000 D) $ 91,000 $ 83,000 E) $ 101,000 $ 92,000 A rectangle has two pairs of sides of equal length.Explain how you can find the unknown length of two sides when the length of one side is 4 units, and the perimeter is 14 units. please help! What is significant about the story's setting in Story of an Hour? A) The story's set in a time period that afforded women very few rights.B)It takes place in a large house.C)The story encompasses one hour.D)The setting makes no difference. When the ambulance arrives at the scene of the collision, they find that the driver of one of the cars is conscious and standing up. However, he seems disoriented. He has cuts on his face and hands, and may have other, more serious injuries. However, he refuses all attempts to examine or treat him. When asked to explain his refusal, his speech is slurred and he doesn't seem to understand what has happened. The EMTs then use gentle force to get him to lie down and submit to an examination. What sort of paternalism are they using? hree TAs are grading a final exam. There are a total of 60 exams to grade. (a) How many ways are there to distribute the exams among the TAs if all that matters is how many exams go to each TA? (b) Now suppose it matters which students' exams go to which TAs. How many ways are there to distribute the exams? (c) Suppose again that we are counting the ways to distribute exams to TAs and it matters which students' exams go to which TAs. The TAs grade at different rates, so the first TA will grade 25 exams, the second TA will grade 20 exams and the third TA will grade 15 exams. How many ways are there to distribute the exams? 1. What are KPIs in the hospitality industry? a.Key Personal Indicators b.Key Performance Indicators c.Key Pathways Into Success d.Data that is seldom looked at by senior leadership 2. Which of the following is a labor KPI as discussed in the lecture notes. a.Covers per hour b.# of Employees c.Number of employees needed to run a shift d.# of Managers On August 1, Ernie wrote to Elsie offering to sell Elsie his car for $7,600, and he promised to hold the offer open for ten days. On August 4 Ernie changed his mind; he sent Elsie a letter revoking the offer. On August 5 Elsie e-mailed Ernie, accepting the offer. Ernies letter of revocation arrived on August 6. Is there a contract? Explain. Which software program allows the user to create Flash presentations in a simplified manner?OA. BlinklistOB. SwishOC. PowerPointOD. Simpy Which of the following motions is least like an earthquake wave? In Spanish How is the verb stem that is used to conjugate a verb in the future perfect different than that of verbs in the present, preterit or imperfect tenses? Is it similar to the conditional mood? Humans start from a single cell. Eventually, as cells divide, they start to differentiate, or specialize. Some cells are specialized for movement of the human body. What type cells would these be? How might the images and methods used by e-cigarette companies to market their products mislead people into thinking they are safe? Use specific examples to support your answer. Jeremy Corporation estimated manufacturing overhead costs for the year to be $ 550 comma 000. Jeremy also estimated 8 comma 000 machine hours and 3 comma 000 direct labor hours for the year. It bases the predetermined overhead allocation rate on machine hours. On January 31, Job 25 was completed. It required 5 machine hours and 1 direct labor hours. What is the amount of manufacturing overhead allocated to the completed job? What is the central idea of this passage? A) America no longer needs an Electoral College system. B) Voters must take seriously the responsibility to vote. C) College graduates agree with the Electoral College system. D) American presidents are in support of the Electoral College system.STORY: Every four years, millions of people head to the polls on Election Day to vote for a new president. It is their right and duty as U.S. citizens to do so. In the months before the election, they watch the candidates argue about important issues. They read articles about the candidates' promises. They see ads that draw attention to the candidates' strengths and weaknesses. Armed with this knowledge and their own beliefs, citizens choose the candidate whom they believe will lead our country in the right direction. Or do they?2In the United States, the people do not directly pick the president. Rather, our country gives this important power to the Electoral College. The Electoral College is a body of electors selected by the people in each state to officially choose the next president. How does the Electoral College work? On Election Day, voters take part in the popular vote. They press a button or pull a lever to vote for a presidential candidate. What they actually do, however, is pick the electors who will become members of the Electoral College. These electors pledge to vote for the chosen candidate in another election held in mid-December. 3The number of members each state has in the Electoral College depends on its population. A state with a large population has more votes than a state with a small population. For example, California has 55 votes while Alaska has 3. In most states, the candidate who wins the popular vote wins all of that states electoral votes. A candidate must receive a majority of the electoral votes to become the next president. How many electoral votes is enough to win? In recent elections, candidates have had to earn at least 270 of the 538 electoral votes to win.4In theory, this system should work, and it has workedmost of the time. A few times, however, the system has failed. In these cases, the candidate with fewer popular votes gained enough electoral votes to win the election. This occurred during the 2000 presidential election when more people voted for Al Gore, but George W. Bush earned more electoral votes and became the president. What causes such a breakdown in the system to happen? Let's return to the example of California and Alaska. A single vote in California has the power to override thousands of votes in other states. Imagine that only one person in California casts a vote for Candidate A. That candidate wins the popular vote in California 10. He or she gets all of California's 55 electoral votes. Across the country, thousands of voters in Maine, New Hampshire, Vermont, Massachusetts, Connecticut, Rhode Island, New Jersey, and Delaware cast their votes for Candidate B. Not one voter casts a vote for Candidate A. These states have a combined 52 electoral votes, which is not enough to beat California's 55. How can the leaders of our country believe that this system is fair?5A long time ago, Americans were scattered far and wide about the country. It made sense to have representatives who voted for them. In this day and age, however, polling places are practically in the next room for most people. With the use of computers, it is possible to tally votes quickly and accurately. The need for the "middle man" is gone. U.S. citizens are perfectly capable of choosing the person they want for president without interference. It is time to graduate from the Electoral College and let the people decide. You want your vote to matter, don't you? pls help me peeps. Which pair of statements best explains an environmental stimulus and a bears response to survive winter?Question 3 options:Environmental stimulus: The bear senses that food is becoming scarce. Response: The bear consumes less food, and its heart rate increases.Environmental stimulus: The days are becoming shorter. Response: The bear consumes more food, and its heart rate decreases.Environmental stimulus: The bear is hungry. Response: The bear consumes more food, and its heart rate increases.Environmental stimulus: The days are becoming longer. Response: The bear consumes less food, and its heart rate decreases. what did theCherokees face on the Trail of Tears? Check allthat applywild animal attacksblazing hot temperaturesstorms of snow and sleetfreezing temperaturesa lack of clothing and shoesthe deaths of friends and family How long do geoscience processes take to occur? plz help will give brainliest A narrative by someone who survived the holocaust that tells the story of the authors survival is what kind of story?biography autobiographyessaymemoirplz hurry need fast if the perimeter of a square is 236 inches, how long is each side? Is x greater than,less than,or equal to 37