reate a base class called Vehicle that has the manufacturer’s name (type string ), number of cylinders in the engine (type int ), and owner (type Person given in the code that follows). Then create a class called Truck that is derived from Vehicle and has additional properties, the load capacity in tons (type double since it may contain a fractional part) and towing capacity in pounds (type int ). Be sure your classes have a reasonable complement of constructors and accessor methods, an overloaded assignment operator, and a copy constructor. Write a driver program that tests all your methods.

The definition of the class Person follows. The implementation of the class is part of this programming project.

class Person

{

public:

Person( );

Person(string theName);

Person(const Person& theObject);

string getName( ) const;

Person& operator=(const Person& rtSide);

friend istream& operator >>(istream& inStream, Person& personObject);

friend ostream& operator <<(ostream& outStream, const Person&

personObject);

private:

string name;

};

Answers

Answer 1

Answer:

Explanation:

class Person

{

public:

Person();

Person(string theName);

Person(const Person& theObject);

string get_name() const;

Person& operator=(const Person& rtSide);

friend istream& operator >>(istream& inStream,Person& personObject);

friend ostream& operator <<(ostream& outStream,Person& personObject);

private:

string name;

};

Person::Person()

{

 

}

Person::Person(string theName)

{

this->name=theName;

}

Person::Person(const Person& theObject)

{

name=theObject.name;

}

string Person::get_name() const

{

return name;

}

Person& Person::operator=(const Person& rtSide)

{

name=rtSide.name;

return *this;

}

istream& operator >>(istream& inStream,Person& personObject)

{

cout<<"Enter Person Name :";

getline(inStream,personObject.name);

return inStream;

}

ostream& operator <<(ostream& outStream,Person& personObject)

{

outStream<<"Name :"<<personObject.get_name()<<endl;

return outStream;

}

//================================

// Declaration of Vehicle Class

//================================

class Vehicle

{

public:

Vehicle();

Vehicle(string m, int cyl, Person p);

Vehicle(const Vehicle& theObject);

string getManufacturer() const;

int getCylinders() const;

Person getOwner() const;

void setManufacturer(string maker);

void setCylinders(int cylinders);

void setOwner (Person p);

void output();

// Outputs the data members of the class appropriately labeled

Vehicle& operator=(const Vehicle& rtSide);

private:

string manufacturer;

int numCylinders;

Person owner;

};

Vehicle::Vehicle()

{

 

}

Vehicle::Vehicle(string m, int cyl, Person p)

{

this->manufacturer=m;

this->numCylinders=cyl;

this->owner=p;

}

Vehicle::Vehicle(const Vehicle& theObject)

{

this->manufacturer=theObject.getManufacturer();

this->numCylinders=theObject.getCylinders();

this->owner=theObject.getOwner();

}

string Vehicle::getManufacturer() const

{

return manufacturer;

}

int Vehicle::getCylinders() const

{

return numCylinders;

}

Person Vehicle::getOwner() const

{

return owner;

}

void Vehicle::setManufacturer(string maker)

{

this->manufacturer=maker;

}

void Vehicle::setCylinders(int cylinders)

{

this->numCylinders=cylinders;

}

void Vehicle::setOwner (Person p)

{

this->owner=p;

}

void Vehicle::output()

{

cout<<"Person Name :"<<owner.get_name()<<endl;

cout<<"Manufacturer :"<<manufacturer<<endl;

cout<<"Number of Cylinders :"<<numCylinders<<endl;

}

// Outputs the data members of the class appropriately labeled

Vehicle& Vehicle::operator=(const Vehicle& rtSide)

{

owner=rtSide.owner;

manufacturer=rtSide.getManufacturer();

numCylinders=rtSide.getCylinders();

return *this;

}

//===============================

// Declaration of Truck Class

//===============================

class Truck : public Vehicle

{

public:

Truck();

Truck(string m, int cyl, Person p, double load, int tow);

Truck(const Truck& theObject);

double getLoadCapacity() const;

int getTowingCapacity() const;

void setLoadCapacity(double newLoad);

void setTowingCapacity(int newTowing);

void output();

// Outputs the data members appropriately labeled.

Truck& operator=(const Truck& rtSide);

private:

double loadCapacity;

int towingCapacity;

};

Truck::Truck()

{

 

}

Truck::Truck(string m, int cyl, Person p, double load, int tow):Vehicle(m,cyl,p)

{

this->loadCapacity=load;

this->towingCapacity=tow;

}

Truck::Truck(const Truck& theObject)

{

this->loadCapacity=theObject.loadCapacity;

this->towingCapacity=theObject.towingCapacity;

}

double Truck::getLoadCapacity() const

{

return loadCapacity;

}

int Truck::getTowingCapacity() const

{

return towingCapacity;

}

void Truck::setLoadCapacity(double newLoad)

{

this->loadCapacity=newLoad;

}

void Truck::setTowingCapacity(int newTowing)

{

this->towingCapacity=newTowing;

}

void Truck::output()

{

Vehicle::output();

cout<<"Load Capacity :"<<loadCapacity<<endl;

cout<<"Towing Capacity :"<<towingCapacity<<endl;

}

// Outputs the data members appropriately labeled.

Truck& Truck::operator=(const Truck& rtSide)

{

this->loadCapacity=rtSide.getLoadCapacity();

this->towingCapacity=rtSide.getTowingCapacity();

}

int main ()

{

Person p("James");

Vehicle v("Toyota",4,p);

cout<<"Displaying Vehicle Info:"<<endl;

v.output();

Person p1("Williams");

Truck t1("Maruthi",4,p1,4500,2500);

cout<<"\nDisplaying Truck Info:"<<endl;

t1.output();

return 0;

Answer 2

Final answer:

To create the base class Vehicle, define data members and constructors. Inherit from Vehicle to create the Truck class with additional properties. Test the classes in a driver program.

Explanation:

To create the base class Vehicle, you need to define three data members: manufacturer's name (string), number of cylinders in the engine (int), and owner (Person object). You can then define a constructor for the Vehicle class that takes these parameters and initializes the data members. You should also include accessor methods to retrieve the values of the data members.

To create the derived class Truck, you can inherit from the Vehicle class using the 'class Truck : public Vehicle' syntax. In the Truck class, you can add two additional properties: load capacity in tons (double) and towing capacity in pounds (int). Again, define constructors and accessor methods for the Truck class.

For the driver program, you can create instances of the Vehicle and Truck classes, and test the constructors, accessor methods, overloaded assignment operator, and copy constructor.


Related Questions

Which of the following is the correct order of the SDLC?
a. analysis, investigation, design, implementation, programming/testing.
b. operation/maintenance analysis,
c. investigation, design, programming/testing, implementation, operation/maintenance
d. investigation, analysis, design, implementation, programming/testing, operation/maintenance
e. investigation, analysis, design, programming/testing, implementation, operation/maintenance

Answers

I say when in doubt, go with c

The correct order of the SDLC is (d) investigation, analysis, design, implementation, programming/testing, operation/maintenance

SDLC represents the software development life cycle, and one of its purposes is to allow the software development team to function optimally when creating a product.

There are several stages of the software development life cycle, all of these stages are structured and must be followed in a sequential order.

The first of the stages is preliminary stages, where investigations and feasibility studies are carried out.

After then, the software is analyzed and then designed.

Of the given options, option (d) represents the correct order of the software development life cycle

Read more about software development life cycle at:

https://brainly.com/question/15172408

1. Define a C++ function with the name evaluateBook. The function receives as one argument the name of the file to be processed (i.e., the book's file). So that if you pass the English version, we will see the results only for that language.



2. Function evaluateBook opens the file, reads it, analyzes it, and prints the answer to the following questions:



a. What it the total number of text lines in the file?

b. What it the number of text lines without any lower-case letter? To answer this question, write and call the function testLowerCase.

c. What it the number of text lines without any number? To answer this question, write and call the function testNumber.

d. What is the total number of visible characters (so, excluding invisible codes such as '\n') ? To answer this question, write and call the function countCharacters.

e. What is the total number of letters (i.e., excluding symbols, numbers, etc.)? To answer this question, write and call the function countLetters.

f. How many times each of the following punctuation symbols appear: comma, period, double quotes, single quotes ?

g. What is the most popular letter (regardless of its case) ? (update: assume it is a vowel)

h. The word "et" in French means "and". How many times does this word appear? The function should search for both words, so that if you pass the English version, the count for "et" will be likely zero. Also, ignore the case, but do not count a matching if part of another word, such as "Andrew".

Answers

Answer:

#include <iostream>

#include<string>

#include<fstream>

using namespace std;

void evaluateBook(string bookName);

int countCharacters(string bookLine);

int countLetters(string bookLine);

int totalPunctuations(string bookLine);

int main()

{

  evaluateBook("demo-book.txt");

  return 0;

}

int countCharacters(string bookLine) {

  return bookLine.length();

}

int countLetters(string bookLine) {

  int counter = 0;

  for (int i = 0; i < bookLine.length(); i++) {

      if ((bookLine[i] >= 'a' && bookLine[i] <= 'z') || (bookLine[i] >= 'A' && bookLine[i] <= 'Z')) {

          counter++;

      }

  }

  return counter;

}

int totalPunctuations(string bookLine) {

  int counter = 0;

  for (int i = 0; i < bookLine.length(); i++) {

      if (bookLine[i]=='\.' || bookLine[i]=='\,' || bookLine[i]=='\"' || bookLine[i]=='\'') {

          counter++;

      }

  }

  return counter;

}

void evaluateBook(string bookName) {

  ifstream in(bookName);

  int totalVisibleCharacters = 0,totalLetters=0,numberOfPunctuations=0;

  if (!in) {

      cout << "File not found!!\n";

      exit(0);

  }

  string bookLine;

  while (getline(in, bookLine)) {

      totalVisibleCharacters += countCharacters(bookLine);

      totalLetters += countLetters(bookLine);

      numberOfPunctuations += totalPunctuations(bookLine);

  }

  cout << "Total Visible charcters count: "<<totalVisibleCharacters << endl;

  cout << "Total letters count: " << totalLetters << endl;

  cout << "Total punctuations count: " << numberOfPunctuations<< endl;

}

Explanation:

Create a function that takes a bookLine string as a parameter and returns total number of visible character.Create a function that takes a bookLine string as a parameter and returns total number of letters.Create a function that takes a bookLine string as a parameter and returns total number of punctuation.Inside the evaluateBook function, read the file line by line and track all the information by calling all the above created functions.Lastly, display the results.

For reproducibility needed for auto-grading, seed the program with a value of 2. In a real program, you would seed with the current time. In that case, every program's output would be different, which is what is desired but can't be auto-graded. Note: A common student mistake is to create an instance of Random before each call to rand.nextInt(). But seeding should only be done once, at the start of the program, after which rand.nextInt() can be called any number of times. Your program must define and call the following method that returns "heads" or "tails". public static String headsOrTails(Random rand)

Answers

Answer:

For reproducibility needed for auto-grading, seed the program with a value of 2. In a real program, you would seed with the current time. In that case, every program's output would be different, which is what is desired but can't be auto-graded.

Note: A common student mistake is to create an instance of Random before each call to rand.nextInt(). But seeding should only be done once, at the start of the program, after which rand.nextInt() can be called any number of times.

Your program must define and call the following method that returns "heads" or "tails".

Explanation:

An array of integers named parkingTickets has been declared and initialized to the number of parking tickets given out by the city police each day since the beginning of the current year. (Thus, the first element of the array contains the number of tickets given on January 1; the last element contains the number of tickets given today.) A variable named ndays has been declared and initialized to hold the size of the array. (Thus, if today were January 18, ndays would have the value 18; if today were February 3, ndays would have the value 34.) In addition, a variable named mostTickets has been declared, along with a variable k. Without using any additional variables, and without changing the values of ndays or the elements of the parkingTickets array, write some code that results in mostTickets containing the largest value found in parkingTickets.

Answers

An array of integers named parkingTickets has been declared and initialized to the number of parking tickets given out by the city police each day since the beginning of the current year.

Explanation:

A variable named ndays has been declared and initialized to hold the size of the array.The first element of the array contains the number of tickets given on January 1; the last element contains the number of tickets given today.A variable named mostTickets has been declared, along with a variable k.If today were January 18, ndays would have the value 18; if today were February 3, ndays would have the value 34

mostTickets=0;

for (k=0; k< ndays; k++)

{

if (parkingTickets[k]>mostTickets) mostTickets=parkingTickets[k];

}

Final answer:

To find the largest value in the parkingTickets array without using any additional variables or changing the values of ndays or the elements in the array, you can use a for loop to iterate through the elements of the array.

Explanation:

To find the largest value in the parkingTickets array without using any additional variables or changing the values of ndays or the elements in the array, you can use the following code:



for (int i = 1; i < ndays; i++) {
 if (parkingTickets[i] > parkingTickets[i - 1]) {
   mostTickets = parkingTickets[i];
 }
}



This code iterates through the elements of the array and checks if each element is greater than the previous element. If it is, it updates the value of mostTickets to the current element. At the end of the loop, mostTickets will contain the largest value found in parkingTickets.

Learn more about Finding the largest value in an array here:

https://brainly.com/question/33888086

#SPJ3

A developer logged into a client machine has recently completed designing a new TaskBot and needs to evaluate the Bot outcome for purpose of meeting the project requirement. If the evaluation is successful, the TaskBot will then be uploaded to the control room. Which three actions could the developer take, to execute the TaskBot for the evaluation

Answers

Answer

Evaluation of the Task bot should completed and successful if the following mentioned three steps works.

1. Open the Task Bot in the workbench and execute it

2. Execute the bot from the administration login at the Control Room

3. Provide the complete path of the Task Bot ATMX file in the CLI window

Explanation:

Task bot are the bots that used to processes the data and repeat the tasks automatically. The developer who designed a new task bot, needs to evaluate the performance and working of this task bot. The performance could be evaluated by completing the following steps.

First of all, the task bot will be opened in workbench to execute it. If the task bot will opened on work bench without any error then developer will execute the bot as administrator to run the task bot. After successful start of the execution, the path of task bot file will be provided in command line interface (CLI) to start the task bot working.

If the above mentioned steps completed successfully, the developer can upload the task bot program to the control room.

2 Which statement best explains how computers are used to analyze information?
A Computers are used to write reports.
B Computers are used to do calculations.
C Computers are used to measure objects.
D Computers are used to share conclusions.
nts the mass of the object in the​

Answers

Answer:

The answer is B

Explanation:

Computers are used to do calculations in investigations. And they help get the bad guy.

I am wasting 20 points

Answers

Okkkkkkkkkkkkkkkkkkkkkkk

Answer:

Sure????

Explanation:

What will be displayed after the following code executes? (Note: the order of the display of entries in a dictionary are not in a specific order.) cities = {'GA' : 'Atlanta', 'NY' : 'Albany', 'CA' : 'San Diego'} if 'FL' in cities: del cities['FL'] cities['FL'] = 'Tallahassee' print(cities)

Answers

Answer:

Nothing will be printed

Explanation:

You can easily find out that FL is not a member of the Dictionary. And we are checking these in the if. Since the if condition ends up being false, the further process will not run as they will only if the condition ends up being true. Hence, nothing will be printed.

Remember, del is used to delete a dictionary item. If this would have been a true condition for if then the FL item in the dictionary would have been deleted as it, in that case, would have been present there. And then the next line would have again added the FL item, and print would have printed the dictionary items with FL item as well. However, since if the condition is ending up being false, nothing will be printed.

If cities['FL'] and print is outside if then

the output will be

{'FL': 'Tallahassee', 'GA': 'Atlanta', 'NY': 'Albany', 'CA': 'San Diego'}

Final answer:

The Python code checks for the 'FL' key in the cities dictionary, does not find it, and thus the dictionary remains unchanged when printed.

Explanation:

The question relates to the execution of a Python code snippet involving a dictionary named cities. Upon running the provided code, the following will be displayed: { 'GA' : 'Atlanta', 'NY' : 'Albany', 'CA' : 'San Diego' }. The code first checks if 'FL' is a key in the cities dictionary, which it is not. Therefore, the deletion operation is not performed and the subsequent assignment of 'FL' to 'Tallahassee' is also not executed. As a result, the initial contents of the dictionary remain unchanged before it is printed.

What is the relationship between a method and a function

Answers

Answer:

Method and a function are the same,whit the different terms. A method is a procedure or function in object - oriented programming. A function is a group of reusable code which can be called anywhere in your program. This eliminates the need for writing the some code again and again.

A function is a piece of code that is called by name. It can be passed data to operate on (i.e. the parameters) and can optionally return data (the return value). All data that is passed to a function is explicitly passed. A method is a piece of code that is called by a name that is associated with an object

"The graphics driver was recently updated on a system. Now, the graphical user interface (GUI) is not displaying, preventing the user from logging in. You need to access the system locally. Which of the following commands will access the tty2 terminal?"

Answers

You can access a full-screen TTY session by holding down the Ctrl+Alt keys, and pressing one of the function keys. Ctrl+Alt+F3 will bring up the login prompt of tty3.  If you log in and issue the tty command, you'll see you are connected to /dev/tty3.

Explanation:

tty2 is short for teletype, but it's more popularly known as terminal. It's basically a device (implemented in software nowadays) that allows you to interact with the system by passing on the data (you input) to the system, and displaying the output produced by the systemYou can either : press ctrl+alt+F7  Or  run the command startx if the above commands do not work.The tty command of terminal basically prints the file name of the terminal connected to standard input.In Linux, there is a pseudo-teletype multiplexor which handles the connections from all of the terminal window pseudo-teletypes (PTS). The multiplexor is the master, and the PTS are the slaves. The multiplexor is addressed by the kernel through the device file located at /dev/ptmx.The -s (silent) option causes tty to generate no output.

Final answer:

Access tty2 terminal by pressing Ctrl+Alt+F2, log in with your username and password, and be aware that password characters won't display for security reasons.

Explanation:

To access the tty2 terminal on a Linux system when the GUI is not displaying, you can use the keyboard shortcut Ctrl+Alt+F2. This will switch you from the GUI to the second tty terminal, tty2. Once the terminal is accessed, you will be prompted to log in with your username and password. Remember that when typing your password, you will not see any characters on the screen; this is a security feature to prevent onlookers from seeing the contents or length of your password. After successfully logging in, the command prompt should reflect your username, similar to oneils atmosphere ~$, indicating you are now logged in to the system via the command-line interface.

A server is expected to process 2,000 transactions per second during its initial year of deployment. If it is expected to increase transaction growth by 10% annually, how many transactions per second should the server be able to process by the end of its fifth year?

Answers

Answer:

This is like a compound interest problem,

Here, p=2000

          r=10%

          t=5

 Transaction after 5 years= 2000(1+10/100)^5= 3221.02 per second

Explanation:

This is as explained above a compound interest type of question. And the number of transaction per second after 5 years is equal to 3221. Remember, you need to understand the difference between compound interest and simple interest. In first one, we have new p after each year. However, in Simple interest, the p remains the same as the first one.

A technician is using a network-attached desktop computer with a Type 2 hypervisor to run two VMs. One of the VMs is infected with multiple worms and other forms of known malware. The second VM is a clean installation of Windows. The technician has been tasked with logging the impact on the clean Windows VM when the infected VM attempts to infiltrate the clean VM through the network. What should the technician do to best protect the company LAN while performing these tests?

Answers

Answer:

Place both VMs on virtual NICs that are isolated from the company LAN.

Explanation:

From the scenario above, for the technician to best protect the company's LAN while performing the above mentioned tests, it us best to place both VMs on virtual NICs that are isolated from the company LAN.

Cheers

The technician do to best protect the company LAN while performing tests is Place both VM on virtual NICs that are isolated from the company LAN.

How does a VM work?

virtual computer

A virtual machine, sometimes abbreviated as just VM, is an actual computer just like a laptop, smartphone, or server. It is equipped with a CPU, RAM, disks for file storage, and an internet connection in case that is required.

What does VM in servers stand for?

On a physical hardware system, a virtualization (VM) is a graphical interface that performs as both a simulated software system featuring its own CPU, memories, network switch, and storage .

To know more about VM visit:

https://brainly.com/question/15517774

#SPJ4

On your Windows server, you’re planning to install a new database application that uses an enormous amount of disk space. You need this application to be highly available, so you need a disk system with the capability to auto-correct from disk errors and data corruption. You also want a flexible storage solution that makes it easy to add space and supports deduplication. Describe your best option.
1. MBR disk with chkdsk
2. NTFS format with EFS
3. ReFS format and storage spaces
4. GPT disc with shadow copies

Answers

Answer:

3. ReFS

Explanation:

Only in ReFS include  and others do not have all of the below features

1. Automatic integrity checking and data scrubbing

2. Removal of the need for running chkdsk  

3. Protection against data degradation

4. Built-in handling of hard disk drive failure and redundancy

5.  Integration of RAID functionality

6.  A switch to copy/allocate on write for data and metadata updates

7. Handling of very long paths and filenames

8. Storage virtualization and pooling

A ______ site is a disaster recovery site that includes a computer system similar to the one the company regularly uses, software, and up-t0-date data so the company can resume full data processing operations within seconds or minutes.
a. Hot
b. Cold
c. Flying start
d. Backup

Answers

Answer:

c, flying start

Explanation:

This would be a flying start site.

Students in a 6th grade science class are completing a project about an invention for which they must print a 3-D prototype on the 3-D printer. After giving them instruction about the 3-D printer software, some of the students are still struggling with how to use the software to create the prototype they envision.
What is the best way to help the students complete the assignment?

Answers

Answer:

Providing them with a template and simple instructions for how to design and print their prototype.

Explanation:

3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file.

The creation of a 3D printed object is achieved using additive processes. In an additive process an object is created by laying down successive layers of material until the object is created. Each of these layers can be seen as a thinly sliced horizontal cross-section of the eventual object.

3D printing is the opposite of subtractive manufacturing which is cutting out / hollowing out a piece of metal or plastic with for instance a milling machine.

3D printing enables you to produce complex shapes using less material than traditional manufacturing methods.

By providing them with the information for how to design the 3D printer and how to print heir prototype in a template is best way to help the students.

It will need some prior research about 3D Printer.

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. ____________ software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated. DDos CAPTCHa VPN Rootkit Keylogging

Answers

The use of public wireless connections can increase a user's vulnerability to monitoring and compromise. VPN software can be used to encrypt transmissions over public networks, making it more difficult for a user's PC to be penetrated.

Explanation:

A VPN, or Virtual Private Network, allows you to create a secure connection to another network over the Internet. VPNs can be used to access region-restricted websites, shield your browsing activity from prying eyes on public Wi-Fi, and more. .Virtual Private Network, is a private network that encrypts and transmits data while it travels from one place to another on the internet. VPNs aren't just for desktops or laptops, you can set up a VPN on your iPhone, iPad or Android phone.A VPN encrypts the traffic from your machine to the exit point of the VPN network. A VPN isn't therefore likely to protect you from an adversary like Anonymous. VPNs add another layer of encryption to your internet traffic, your latency will go up and speeds will go down.

What function does the ALU perform?
A.
storing startup instructions
B.
directing the flow of instructions
C. storing data the CPU needs at the moment
D. making calculations and evaluating conditions

Answers

Answer:

D

Explanation:

ALU performs calculations.

An experimenter discovers that the time for people to detect a string of letters on a computer screen is 400 milliseconds, and that the time to push one of two buttons as to whether that string of letters is a legitimate word (e.g., travel) versus a nonword (e.g., terhil) is 575 milliseconds. Which technique would be most useful in figuring out the time for word recognition, independent of letter-string detection?
a. Introspectionsb. Operant conditioningc. Neuropyshologyd. Subtractive method

Answers

Answer:

The correct answer to the following question will be Option D (Subtractive method ).

Explanation:

This approach essentially requests a participant to construct two activities that are already in almost every way similar, except for a mental process that is assumed to also be included in any of the activities although omitted in another.This method will be much more valuable when deciding the period for phonemic awareness, despite text-string identification.

The other three options are not related to the given scenario. So that Option D is the right answer.

What is a restricted network that relies on Internet technologies to provide an Internet-like environment within the company for information sharing, communications, collaboration, web publishing, and the support of business processes

Answers

Answer:

Deep Web (Tor Browser)

Explanation:

The legal deeper internet that allows the transfer of sensitive information.

100 Base-T: Group of answer choices
can run at either full- or half-duplex
is one of the oldest forms of Ethernet
is one of the slowest forms of Ethernet
can only be used over coaxial cables
has only one version, 100Base-SLCX

Answers

Answer:

can run at either full- or half-duplex

Explanation:

In Computer Networking, 100Base-T also known as fast ethernet is an ethernet standard that operates at 100Mbps and can run at either full- or half-duplex.

It uses Shielded Twisted Pair (STP) cabling system.

The Variations of 100BaseT are;

- 100BaseTX

- 100BaseFX.

For the following C code, variables a, b, c, and n correspond to the registers $s0, $s1, $s2 and $a0 respectively and i corresponds to $t0. The callee doesn’t have to preserve registers $t1-$t9, if used. int iterFib(int n) { int a = 0, b = 1, c, i; for(i=2; i<=n; i++) { c = a + b; a = b; b = c; } return b; } What are the missing MIPS instructions? Please record only the letter in lower case. iterFib: addi $sp, $sp, -12 sw $s0, 8($sp) sw $s1, 4($sp) ---Instruction 1--- add $s0, $zero, $zero addi $s1, $zero, 1 add $t0, $zero, $zero addi $t1, $a0, 1 forFib: slt $t2, $t0, $t1 ---Instruction 2--- add $s2, $s1, $s2 add $s0, $zero, $s1 add $s1, $zero, $s2 addi $t0, $t0, 1 j forFib exitFib: add $v0, $zero, $s1 jr $ra Instruction 1 is a. No instruction b. addi $sp, $sp, 4 c. add $sp, $sp, -4 d. lw $s2, 0($sp) e. sw $s2, 0($sp) f. bne $t2, $zero, exitFib g. beq $t2, $zero, exitFib h. None of the above Instruction 2 is a. j iterFib b. addi $sp, $sp, 4 c. add $sp, $sp, -4 d. lw $s0, 0($sp) e. addi $sp, $sp, -4 f. bne $t2, $zero, exitFib g. beq $t2, $zero, exitFib h. None of the above

Answers

Answer:

a)

Instruction 1 will be: sw $s2,0($s0)

Answer is option e.

b)

Instruction 2 will be: beq $t2,$zero,exitFib

Answer is option g.

Explanation:

At the point of instruction 1, It should store the content of s2 into the stack.

At the point of instruction 2, It will check if the value of t2 is one or not. If it is zero it should exit.

The theme color scheme of the slide can be changed by clicking on the _______ next to the color button, located in the _____ group. (Microsoft Excel 2013)

A) drop-down arrow, Animation
B) drop-down arrow, Themes
C) drop-down arrow, Background
D) drag and drop menu, Themes

Answers

Answer:

B) drop-down arrow, Themes

Explanation:

An Excel theme consists of a collection of colors, fonts, and effects that can be applied to a slide to add beauty. Themes make work to be professional, consistent and make adhering to design guidelines easy.

To change theme color, first open a Blank Workbook.  Secondly, On the Page Layout tab, in the Themes group, click Themes drop down arrow beside the color button.

The theme color scheme of the slide can be changed by clicking on the  drop-down arrow, next to the color button, located in the Themes group. (Microsoft Excel 2013)

The theme color scheme of the slide in Microsoft Excel 2013 can be changed by clicking on the drop-down arrow, located in the Themes group.

To change the theme, you would select a theme from the Themes group on the Design tab. You can find more themes by clicking the More button, which allows for further customization of the themes, such as modifying theme colors, fonts, effects, or background styles. When customizing the presentation's background, you can click the Format Background button in the Customize group of the Design tab to adjust various parameters such as color, gradient fill, and transparency.

Molly, an end-user, connects an external monitor, external keyboard and mouse, and a wired network cable to her laptop while working in the office. She
leaves the office frequently to meet with customers and takes the laptop with her. Disconnecting and reconnecting these external connections has become
inconvenient. Which of the following devices will allow the user to disconnect and reconnect the laptop to the external connections with the least amount
of effort?
Port Replicator
Docking Station

Answers

Answer:

A Port Replicator

Explanation:

Port Replicators are universal and do not require that your computer (laptop) be docked (Placed) on them to function. All you need is the devices connected to the port replicator and whenever you need to move the laptop, you disconnect the port replicator from it. It generally is connected via a type of USB port.

A Docking station on the other hand can be a drag in the sense that you might have a challenge always having to dock and undock your laptop from the station anytime you need to move. This can be annoying if you are in a rush. Also the Docking stations use expansion ports which are a lot of times not universal (Not just any type of laptop can connect to the dock stations, just your model or specified models).

Answer:

Port Replicator

Explanation:

While you may be able to use a docking station for this purpose, a port replicator is designed specifically for this kind of use.

What are the characteristics of OneDrive and the browser version of Outlook? Check all that apply.


1.If you have an Office 365 account, you have cloud storage space on OneDrive.

2.You can access OneDrive by using a browser, an app, or Outlook.

3.OneDrive can be used to save items from the Outlook program.

4.Exchange is Microsoft’s version of Outlook on the web.

5.Both the Outlook program and Outlook web clients use the Exchange server.

6.Outlook on the web provides more features than the desktop client.

Answers

Answer:

If you have an Office 365 account, you have cloud storage space on OneDrive.

You can access OneDrive by using a browser, an app, or Outlook.

OneDrive can be used to save items from the Outlook program.

Both the Outlook program and Outlook web clients use the Exchange server.

Explanation: Got it wrong but it showed me the correct answer.

Statements that gives the characteristics of OneDrive and the browser version of Outlook are;

If you have an Office 365 account, you have cloud storage space on OneDrive.You can access OneDrive by using a browser, an app, or Outlook.OneDrive can be used to save items from the Outlook program.Both the Outlook program and Outlook web clients use the Exchange server.

When using an outlook, it is possible to access OneDrive, and it uses the Exchange server, If you have an Office 365 account, you have cloud storage space on OneDrive.

Therefore, OneDrive can be used to save items from the Outlook program.

Learn more about Outlook program at;

https://brainly.com/question/1538272

Write a program that contains a main function and a custom, void function named show_larger that takes two random integers as parameters. This function should display which integer is larger and by how much. The difference must be expressed as a positive number if the random integers differ. If the random integers are the same, show_larger should handle that, too. See example outputs. In the main function, generate two random integers both in the range from 1 to 5 inclusive, and call show_larger with the integers as arguments.

Answers

A program that contains a main function and a custom, void function named show_larger that takes two random integers as parameters.

Explanation:

The difference must be expressed as a positive number if the random integers differ. If the random integers are the same, show_larger should handle that, too. See example outputs.

def main():

value_1=random.randrange(1,6)

value_2=random.rangrange(1,6)

def show_larger():    

difference= value_1=-value_2

if value_1 == value_2:

   print('The integers are equal, both are' + str(value_1))

What will be the value of discountRate after the following statements are executed? double discountRate = 0.0; int purchase = 100; if (purchase > 1000) discountRate = 0.05; else if (purchase > 750) discountRate = 0.03; else if (purchase > 500) discountRate = 0.01;

Answers

The value of discountRate after the following statements are executed

double discountRate = 0.0;

int purchase = 100;

if (purchase > 1000) discountRate = 0.05;

else if (purchase > 750) discountRate = 0.03;

else if (purchase > 500) discountRate = 0.01;

is 0.0

Explanation:

The discount rate is declared as a double; double discountRate = 0.0;

The purchase is declared as integer; int purchase = 100;

The first if statement shows if purchase > 1000 then the discountRate is 0.05

The second if statement shows if purchase > 750then the discountRate is  0.03

The third if statement shows if purchase > 500 then the discountRate is  0.01

Since none of these statements are true, the original discountRate is printed.

Final answer:

After executing the statements, the value of discountRate will remain 0.0 because the purchase amount does not meet any of the specified conditions to receive a discount.

Explanation:

The value of discountRate after executing the given statements will be 0.0. The code snippet provided is a series of conditional statements that assign a value to the variable discountRate based on the value of the variable purchase.

The initial value of purchase is 100, which does not satisfy any of the given conditions for increasing the discountRate (i.e., purchase must be greater than 500, 750, or 1000 to get a discount). Therefore, the discountRate remains at its initial value of 0.0 since no conditions are met.

You manage a small LAN for a branch office. The branch office has three file servers and few client workstations. You want to use Ethernet device and offer guaranteed bandwidth to each server.How should you design the network?

Answers

You manage small LAN for a branch office. The branch office has three file servers and few client workstations. You want to use Ethernet device and offer guaranteed bandwidth to each server. You design the network by connecting all network devices to a switch. Connect each server to its own switch port.

Explanation:

A local-area network (LAN) is a computer network that spans a relatively small area.Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.The LAN is the networking infrastructure that provides access to network communication services and resources for end users and devices spread over a single floor or building.Designing a LAN for the campus use case is not a one-design-fits-all proposition. If there is a single 48-port switch, 47 devices can be supported, with only one port used to connect the switch to the rest of the network, and only one power outlet needed to accommodate the single switch

The format for the UPDATE command is the word UPDATE, followed by the name of the table to be updated. The next portion of the command consists of the word ____________________, followed by the name of the column to be updated, an equals sign, and the new value.​

Answers

The format for the UPDATE command is the word UPDATE, followed by the name of the table to be updated. The next portion of the command consists of the word SET, followed by the name of the column to be updated, an equals sign, and the new value.​

Explanation:

An Update Query is an action query (SQL statement) that changes a set of records according to criteria you specify.The SQL UPDATE Query is used to modify the existing records in a table. You can use the WHERE clause with the UPDATE query to update the selected rows, otherwise all the rows would be affected. Update Queries let you modify the values of a field or fields in a table.

UPDATE Syntax

UPDATE table_name SET column1 = value1, column2 = value2, ... WHERE condition;

UPDATE table_name SET column1 = value1, column2 = value2, etc WHERE condition;  

table_name: name of the table column1: name of first , second, third column.... value1: new value for first, second, third column.... condition: condition to select the rows for which the  values of columns needs to be updated.

Use the drop-down menus to complete the steps necessary for adding a conditional formatting rule.
On the Home tab, click the
group.
On the drop-down list, click
and click the rule you wish to use.
Use the dialog box to complete the rule,

Answers

Conditional formatting are used to assign specific formatting options to cells based on a specified set of rules. Hence, cells which meets the set rules are given the formatted based on the formatting conditions.

To use conditional formatting, navigate to the styles group which is on the home tab.

A drop down list appears with various options, click conditional formatting

The rule to be used should be clicked in the dialog box and the rules can be tweaked by clicking manage rules.

Learn more :https://brainly.com/question/22654163

Answer:

styles, conditional formatting

Explanation:

got it right :))

In a(n) __________ situation, a wireless device is configured to appear to be a legitimate access point, enabling the operator to steal passwords from legitimate users and then penetrate a wired network through a legitimate wireless access point. a) malicious association b) network injection c) ad hoc network d) identity theft

Answers

Answer:

A) Malicious Association,

Hope this helps.

Explanation:

Other Questions
A race is 9/10 kilometers long. Lamar ran 2 of these races . How far did he run together? Given the following: 2013 2012 2011Sales: $400,000 $450,000 $470,000Gross Profit: $100,000 $130,000 $140,000Net Income: $300,000 $220,000 $330,000Conduct a trend analysis of sales in 2013 to the nearest percent. The base year is 2011. A sign at the store says that all music equipment has been marked down 30% off the original price. You buy an electric guitar for the sale price of $315. What was the original price? Describe the different climate regions of Eastern Europe (North, Southern, and Central) and how the climate affects life in these places (basically, give one example of how people live in each region, use the lessons for examples-Remember that weird fact about Polish seasons). The plaintiff sets forth the charges against the defendant in A straight fin fabricated from 2024 Aluminum alloy (k=185 W/mK) has a base thickness of t=3 mm and a length of L=15 mm. Its base temperature is Tb=100oC, and it is exposed to a fluid for which T[infinity] =20oC and h=50 W/m2K. For the foregoing conditions and a fin of unit width, compare the fin heat rate, efficiency, and volume for rectangular, triangular, and parabolic profiles. Suppose Frances is a researcher at Beaded Gemsz, a company that makes beaded jewelry. She wants to evaluate whether using better equipment during the current year has increased jewelry-making productivity. The company's reporting team estimated an average daily production yield of 105 units per store from previous years. Frances conducts a one-sample z - test with a significance level of 0.08 , acquiring daily unit yield data from each of the stores' databases for 45 randomly selected days of the year. She obtains a P -value of 0.06 . The power of the test to detect a production increase of 12 units or more is 0.85 . What is the probability that Frances concludes that the new equipment increases the average daily jewelry production when in fact the new equipment has no effect Birdseed costs $0.52 a pound and sunflower seeds cost $0.82 a pound. Angela Leinenbachs' pet store wishes to make a 40-pound mixture of birdseed and sunflower seeds that sells for $0.72 per a pound. How many pounds of each type of seed should she use? the state of the atmosphere in a small geographic area refers to What is the value of biodiversity? "In the economy of Wrexington in 2008, consumption was $5000, exports were $100, government purchases were $900, imports were $200, and investment was $1000. What was Wrexingtons GDP in 2008?" The maximum diameter of a bowling ball is 8.6 inches. What is the volume to the nearest tenth of a bowling ball with this diameter? Meat Packers, Incorporated (MPI) preserves and packages various kinds of meats for transportation to grocery stores. To prepare and transport each meat package to a grocery store, the firm must purchase $40 in raw meat and pay $90 in wages for labor and $80 in fuel costs. In addition, the firm rents a factory for $14 comma 000 per month and makes $3 comma 000 in monthly payments on meat packaging equipment. Suppose the firm prepares and transports 2 comma 000 packages of meat per month. What are the firm's fixed and variable costs of production in a given month? The firm's fixed cost of production is $ nothing, and its variable cost of production is $ nothing. (Enter numeric responses using integers.) This is confusing (2x+y)^2(x2y)^2 Which path would occur faster,and why is this advantageous? The question is from a gizmo packet. The packet is a student exploration guide named senses.Please I need an answer right away!?!?! 50 POINTS SUMMARISE THIS ARTICLEYou're mostly stuck inside, you are home from school and the coronavirus pandemic is making the future seem less certain by the day. The coronavirus is a flu-like illness that first arose in China. The virus has now infected people around the globe. Like 27 percent of Americans, you might seek comfort in a familiar place: the refrigerator.Food can be one of the easiest and most immediate ways to make ourselves feel better in stressful times. While enjoying our food is a good thing, experts say emotionally eating lots of food with little nutritional value can weaken our immune systems and worsen our moods at a time when it's especially important to stay positive and protect our bodies.If we want to be able to feel better, given the situation that we're in, we have to think about how we want to fuel our body in ways that we can stay more at ease," said Eva Selhub, a doctor with expertise in stress, resilience and mind-body medicine.Why do my eating habits matter right now?Selhub says that people may feel guilty or shameful for eating highly processed foods with a lot of sugar. Eating these foods can also cause inflammation in the body that increases fatigue, anxiety and depression. Selhub added that our bodies have various ways of connecting our stomachs to our brains, so eating nutritious foods can help control our moods. How can I tell if I'm eating because of emotion and not because of hunger?Eating as a result of stress tends to be an automatic instinct, like putting your hand into a bag of potato chips without thinking about it, said Deanna Minich, a nutritionist with the American Nutrition Association. Physical hunger lasts longer and is more receptive to a variety of foods, rather than just foods with little nutrition.How can I prevent or limit emotional eating in this uncertain time?Although food makes us feel better by releasing dopamine and serotonin in our brains, Selhub said the effect wears off quickly. To stop emotional eating, she suggested doing a gut-check before you reach for a snack: "Am I about to eat because I'm physically hungry, or because I feel stressed or sad?"If the answer is the latter, Selhub said you should consider turning to other sources of comfort: breathing exercises, movement, spirituality, social interactions, hobbies or time in nature, among others. Stick to your normal eating schedule of two or threemeals a day, even if your daily routine has changed, she said."Whether you're alone or with other people, make it a ritual of nurturing - that you're nurturing yourself, that you're fueling yourself," Selhub said.For extra help if you want to stay on track with trying to get in shape or lose weight, she suggested finding or creating an online support group.What if anxiety has the opposite effect on me and I struggle to eat enough?Although many people eat extra when they feel anxious, you may have trouble eating at all. Stress can trigger in your body an elevated physiological state as if you were facing an immediate danger, like early humans may have felt when being chased by a lion, Selhub said.To digest food properly, we need a relaxed digestive system, Minich said. Warm teas can help your body loosen up, while protein shakes and electrolyte packets provide energy.At the very least, Minich said you should drink a lot of water to stay hydrated. To return to regular eating patterns, though, she said it's important to address the underlying stress, like by physically moving or doing a simple meditation.What should I be trying to eat during this public-health crisis?Making good food choices starts when you're scanning the - hopefully still stocked - grocery-store shelves and deciding what to take home, Minich said. To the extent that you can buy fresh, colorful foods, you should, she said.Absent the option of purchasing fresh produce and meat, Minich said frozen almost always beats canned when it comes to nutrition. Frozen food is preserved in close to its original state and usually has little interaction with the plastic it's stored in, she said, whereas canned food touches its metal container and the plasticizer used to seal it. Canned food is also usually stored in a high-salt or high-sugar solution.Minich also suggested using spices to reduce stress-inflicted inflammation and eating foods with vitamin C to strengthen your immune system. Now is a good time to share recipes with friends and family, she said, and to make sure you're also paying attention to other aspects of your health, such as moving your body and getting enough sleep.Ultimately, Minich said eating well heightens our sense of well-being, increases our curiosity and makes us happier."And I think this is the time that we need more well-being and happiness," she said. Find the value of the expression out of 40 students In a class7 20% were absent how many students were present What theme is expressed in both of these excerpts?Read the excerpts from "Escape" and "To Live."I wait anxiouslyFeeling my stomachA block of iceChipping away, melting,Then freezing up againEducation is an important part in discovering who youreally arePeople often see you differently than you see yourselfIt can be very difficult to know yourself and your place inthe world.Life's distractions can make it difficult to know yourself.trial and errorminus lab write-upfeeling withouta thesislearning youthSave and Exit According to ________, "Diversity is about our relatedness, our connectedness, our interactions, where the lines cross." R. Roosevelt Thomas, Jr. Harris Sussman Barack Obama Kathy Hannan