Answer: Hyperpersonal communication
Explanation:
In this type of communication we have inter personnel communication mediated through computers such that there is more scope for textual messages than face to face communication.
The calls radioed to patrol officers, or assignments given to police patrol units by 911 dispatchers, reveal the types of problems for which people call the police and the types of problems ___________.
Answer: the police feel deserve a response by patrol units.
Explanation:
The calls radioed to police shows all types of problem people face and why they call the police and all data are collected every hour to show its effectiveness.
Luchen Modo, a software development firm in Asia, launched a new software for smartphones that allowed users to remotely control certain functions and features of their vehicles, such as ignition, windshields, and headlights. The success of this technology prompted other companies across the world to produce similar software. In this scenario, which of the following is most likely to have influenced other companies to produce similar software?
Answer: it is called inflow of innovation
Explanation:
Inflow of innovation also means influence of innovation.
As you can see in the example, other companies want to produce similar products due to the inflow of innovation.
The ______ is the information center that drivers need to refer to when they're NOT scanning the road.
Answer:
The DIC (Driver Information Center) is the information center
Explanation:
Scanning the road means that the road has to looked and analyzed for traffic jams, the cars that are coming close together and how fast the driver is driving etc, to keep ourselves safe from accidents.
If the driver is not scanning the road, then DIC will help the driver to find lots of useful information which keeps himself as well as the peer drivers on the road safe and thus avoiding accidents where by saving lives and heavy injury.
DIC will have Traffic details, navigation, entertainments, traffic signs, etc.
Answer:
instrument panel
Explanation:
I just took the test
Write the definition of a function named maxmin that is passed four int arguments. The function returns nothing but stores the larger of the first two arguments in the third argument it receives and the the smaller of the first two arguments in its fourth argument. So, if you invoke maxmin(3,7,x,y), upon return x will have the value 7 and y will have the value 3.
Answer:
To get the values in x and y, we should use the pass -by -reference method. Where a reference to the actual variable is created in the called function. When we update the value inside the called function, it reflects in the calling function.
C++ code:
#include<iostream>
using namespace std;
void maxmin(int p, int q, int &r, int &s);
int main()
{
int k,l,x,y;
cout<<"Enter two integers for k and l: ";
cin>>k>>l;
maxmin(k, l, x, y);
cout<<"The maximum of two numbers is: "<<x<<endl;
cout<<"The minimum of two numbers is: "<<y<<endl;
}
void maxmin(int p, int q, int &r, int &s)
{ //r and s holding the address of x and y respectively.
if(p>q)
{
r=p;
s=q;
}
else
{
r=q;
s=p;
}
}
Explanation:
The program shows how the method is working and the output is
What is the value of choice after the following statements? void getChoice(int& par_choice, int par_count); int choice, count = 3; getChoice(choice, count); void getChoice(int& par_choice, int par_count) { if (par_count <0) par_choice = 0; if (par_count = 0) par_choice = -1; else par_choice = 99; return; }
In every programming language the return type of the function is must but here in the given code the return type for the following function is not given so this program will cause a syntax error that no return type is defined for the function getchoice.
getChoice(choice, count);
it should be like :
returntype getchoice(params);
Interpretations of the AICPA Code of Professional Conduct are dominated by the concept of: Question 4 options: 1) independence. 2) compliance with standards. 3) accounting. 4) acts discreditable to the professi
Answer: independence
Explanation:
The AICPA Code of professional Conduct is based on the following concepts which are :
1. responsibilities
2. serve the public interest
3. integrity
4. objectivity and independence
5. due care
6. The scope and nature of services.
Write a statement that reads a word from standard input into firstWord. Assume that firstWord. has already been declared as a String variable. Assume also that stdin is a variable that references a Scanner object associated with standard input.
// taking the super class object to take input
Scanner stdlin = new Scanner(System.in);
// saving it in the firstWord
// assuming that the firstWord is already declared as mentioned in question
firstWord = stdlin.nextString();
//Java uses nextstring method of class scanner to take a word as input.
Final answer:
The Java code statement to read a word from standard input into a variable 'firstWord' is 'firstWord = stdin.next();', using the next() method of the Scanner class.
Explanation:
To read a word from standard input into the variable firstWord, you can use the following Java code statement assuming firstWord is already declared, and stdin is a Scanner object linked to standard input:
firstWord = stdin.next();
The given code utilizes the next() method of the Scanner class, which reads the next complete token from the input as a String. In this context, a token is typically a word separated by whitespace (like spaces, tabs, or new line characters).
The getline function mentioned relates to C++ and not to Java. The use of getline in C++ is similar to nextLine() in Java, which reads an entire line from the input.
Write a full class definition for a class named Player, and containing the following members:
A data member name of type string.
A data member score of type int.
A member function called setName that accepts a parameter and assigns it to name.
The function returns no value.
A member function called setScore that accepts a parameter and assigns it to score.
The function returns no value.
A member function called getName that accepts no parameters and returns the value of name.
A member function called getScore that accepts no parameters and returns the value of score.
// making class
class Player {
// Data members
string name;
int score;
// Name setter
void setName(string str){
this.name = str;
}
// Score setter
void setScore(int num){
this.score = num;
}
// Score getter
int getScore(){
return score;
}
// Name getter
string getName(){
return name;
}
};
Given a int variable named yesCount and another int variable named noCount and an int variable named response write the necessary code to read a value into into response and then carry out the following: if the value typed in is a 1 or a 2 then increment yesCount and print out "YES WAS RECORDED" if the value typed in is a 3 or an 4 then increment noCount and print out "NO WAS RECORDED" If the input is invalid just print the message "INVALID" and do nothing else. ASSUME the availability of a variable, stdin, that references a Scanner object associated with standard input.
// This command takes input from the user.
Scanner input = new Scanner(System.in);
int response= input.nextInt();
// Making the variables required
int noCount =0 ;
int yesCount =0;
// Checking the response if it is 1 or 2 and reporting accordingly
if(response == 1 || response ==2){
yesCount+=1;
System.out.println("YES WAS RECORDED");
}
// Checking if the input is 3 or 4 then printing the required lines
else if (response == 3 || response ==4){
noCount+=1;
System.out.println("NO WAS RECORDED");
}
// if the input is not valid than printing INVALID
else{
System.out.println("INVALID");
}
what examples of the influence of the media on current events. Are there, or should there be, limits on the power of the media? Should there be extra restrictions on the events and individuals that the media is allowed to report?
I believe that there should be limits to the use of social media, regarding using it for absurd pointless things as taking constant selfies of oneself, and who you message. I do think that taking pictures is okay, as long as it regards taking pictures of sceneries and of people we treasure, but taking endless pictures of oneself over and over again is pointless. We should also limit the use of social media because people become easily addicted, especially for people's in their teens, spending hours either talking to people they dont know or talking to people they do know, which either way, they are spending too much time doing; they aren't getting any exercise done and are increasing there chance of contracting a headache and becoming blind/having lower vision. I believe that social media should only be used for contacting people when we need to, not just to talk each other's ears of all day, and sharing important information to people that need to be aware of things. So in conclusion, yes, there should be restrictions on the events and individuals that the media is allowed to report because a majority of people will spend 50% of there time to useless things, when they aren't living there life to their fullest potential.
A user is trying to access content in a library but is receiving an insufficient privileges message. How should the administrator troubleshoot this issue? Choose 2 answers A. Determine if the user's profile has the Salesforce CRM Content user permission enabled. B. Determine if the user has been granted "Viewer" permission to the library of interest. C. Determine if the user's record has the Salesforce CRM Content feature license enabled. D. Determine if the user has been granted viewer permission to the content.
Answer:
Option D and Option B
Explanation:
Option D is selected because if the user has the permission to see the content then the situation should be like there is a technical issue or if his approval for granting the content view permission is in process.
Option B is also the answer because by getting the licence there can be a in process permission grating work that should be completed to give that user authority to see the content.
Option C is rejected because the user is getting insufficient privileges and it has nothing to do with the CRM content license.
Option A is rejected because again it the content in the library regarding viewing does not have anything to do with the CRM.
Given an int variable n that has already been declared and initialized to a positive value, and another int variable j that has already been declared, use a while loop to print a single line consisting of n asterisks. Thus if n contains 5, five asterisks will be printed. Use no variables other than n and j.
To print a line of n asterisks using a while loop, initialize j to 0 and increment it until it equals n, printing an asterisk each iteration.
To solve this problem, you will implement a while loop in a programming language such as Java or Python. Given that int variable n already contains a positive value and int variable j has already been declared, the following pseudocode will print a line of n asterisks:
j = 0;
java
int j = 0;
while (j < n) {
System.out.print("*");
j++;
}
System.out.println();
Here is a code snippet in Java that uses a while loop to print a single line of `n` asterisks using only the variables `n` and `j`:
```java
int j = 0; // declare and initialize j to 0
while (j < n) {
System.out.print("*");
j++;
}
System.out.println(); // move to the next line after printing n asterisks
```
Explanation:
1. `int j = 0;` initializes the variable `j` to 0.
2. `while (j < n)` sets up the loop to run as long as `j` is less than `n`.
3. Inside the loop, `System.out.print("*");` prints an asterisk without moving to a new line.
4. `j++;` increments `j` by 1 each time the loop runs.
5. After the loop finishes, `System.out.println();` is used to move the cursor to the next line, which is optional but often used to ensure proper formatting.
A news ____ website collects and displays content from a variety of online news sources, including wire services, print media, broadcast outlets, and even blogs, and displays it in one place.
Answer:
Aggregation
Explanation:
This type of website is responsible for collecting the data through RS feeds and web scrapping tools and inject the data in server side templates of highly flexible technologies like pug to display them in one space.By this the user do not will have to walk around many web sites to find the data on news he/she need. This type of news website collects it in one place.
You need to design a backup strategy. You need to ensure that all servers are backed up every Friday night and a complete copy of all data is available with a single set of media. However, it should take minimal time to restore data. Which of the following would be the ____
(A) Full backup
(B) Incremental backup
(C) SNMP (collect & organize data)
(D) Priority code point (PCP)
Answer: Full backup
Explanation:
Full backup is comparatively faster in restore operations and conatins all the data in the files or folders selected to be backup ed.
Full backup is also the starting point of all backups and contain all the data.
____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company.
Answer:
Third-party
Explanation:
Third-party cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company.
What is a digital certificate? Select one: a. It is a means of establishing the validity of an offer from a person, entity, web site, or email. b. It is a centralized directory wherein registered keys are created and stored. c. It is a means of establishing your credentials electronically when doing business or other transactions on the Web. d. It is an entity that generates electronic credentials and distributes them upon proving their identity sufficiently.
Option D is the answer because Digital Certificate is an entity that generates electronic and distributes them upon proving their identity sufficiently. In early days there was issues with people using the certificates that were not even issued by the organizations. Today it's a cryptographic technique which uses digital signatures and gives users a digital certificate that can be authenticated anytime online by any organization and is unique for every user having it.
Option A cannot be the answer because it has nothing to do with the identity of person but rather it is for specific fields.
Option B is not answer because it has no key and score matter to do with it.
Option C Web transactions has nothing to do with the certificates.
How to solve "You cannot call a method on a null-valued expression" error
You have an object declared in the function which has a undeclared value.
Explanation:
if you will make a variable of class or object in JAVA or other reference typed languages and will not assign the value to it this error occurs.
For example :
obj object; // this line declares a object named variable of type obj class
Here it will cause same error iff i will do it like :
obj = object = new obj();
Which of the structures listed below hold an ovary in position? 1. mesovarium 2. cardinal ligament 3. ovarian ligament 4. round ligament 5. suspensory ligament 6. uterosacral ligament
Answer: 3. ovarian ligament.
Write a method named areFactors that takes an integer n and an array of integers, and that returns true if the numbers in the array are all factors of n (which is to say that n is divisible by all of them).
Answer:
The c++ program to show the implementation of parameterized method returning Boolean value is shown below.
#include<iostream>
using namespace std;
bool areFactors(int n, int arr[]);
int main()
{
int num=34;
int factors[5]={2, 3, 5};
bool result;
result = areFactors(num, factors);
if(result == true)
cout<<"The number "<<num<<" is divisible by all factors."<<endl;
else
cout<<"The number "<<num<<" is not divisible by all factors."<<endl;
return 0;
}
bool areFactors(int n, int arr[])
{
bool divisible=true;
int flag=0;
for(int i=0; i<3; i++)
{
if(n%arr[i] != 0)
{
divisible = false;
flag ++;
}
}
if(flag == 0)
return true;
else
return false;
}
OUTPUT
The number 34 is not divisible by all factors.
Explanation:
This program shows the implementation of function which takes two integer parameters which includes one variable and one array. The method returns a Boolean value, either true or false.
The method declaration is as follows.
bool areFactors(int n, int arr[]);
This method is defined as follows.
bool areFactors(int n, int arr[])
{
bool divisible=true;
// we assume number is divisible by all factors hence flag is initialized to 0
int flag=0;
for(int i=0; i<3; i++)
{
if(n%arr[i] != 0)
{
divisible = false;
// flag variable is incremented if number is not divisible by any factor
flag ++;
}
}
// number is divisible by all factors
if(flag == 0)
return true;
// number is not divisible by all factors
else
return false;
}
The Boolean value is returned to main method.
bool result;
result = areFactors(num, factors);
This program checks if the number is divisible by all the factors in an array.
There is no input taken from the user. The number and all the factors are hardcoded inside the program by the programmer.
The program can be tested against different numbers and factors. The size of the array can also be changed for testing.
Which of the following is a difference between a centralized communication network and a decentralized communication network? a. In a centralized network, there is free flow of information in all directions, whereas in a decentralized network, team members must communicate through one individual. b. A centralized network can be effective for small teams, whereas a decentralized network is best for large teams. c. The decision-making process is fast in a decentralized network, whereas the decision-making process is slow in a centralized network. d. A decentralized network allows members to process information equally until all agree on a decision, whereas a centralized network limits the number of people involved in decision making.
Option D is the answer.
Option A is rejected because in centralized communication notwork there is no free flow of communication in all directions ( all direction means between all the groups or layers of the network).
Option B is not the answer because centralized and decentralized networks has nothing to do with the size of organizations.
Option C is rejected because decision making process depends on the hard work and technical skills of groups of an organization about a field but not by the network discipline.
Option D is selected because in centralized network the information or decision making power is primarily limited to the upper level or higher members of organization and as mentioned decentralized decides on the basis of decision of all the groups or levels of the network.
The fast movement of briefly flashed images in an animated motion picture produces what effect? subliminal messaging convergence autokinetic effect stroboscopic movement Phi phenomenon
Answer:
The answer is Stroboscopic movement
Explanation:
Stroboscopic movement occurs when we do not see a motion continuously but in discrete shots. It is an effect in which we see an object at one place and after another instant the object seems to have shifted it's position.
Auto kinetic effect is an effect in which a stationary point of light appears to move.It occurs as our brains can perceive motion relative to some other object and cannot observe ,motion along a featureless terrain or environment.
Phi effect causes an observer to perceive motion in stationary objects.
Write a full class definition for a class named Counter, and containing the following members: A data member counter of type int. A data member named limit of type int. A static int data member named nCounters which is initialized to 0. A constructor that takes two int arguments and assigns the first one to counter and the second one to limit. It also adds one to the static variable nCounters A member function called increment that accepts no parameters and returns no value. If the data member counter is less than limit, increment just adds one to the instance variable counter. A member function called decrement that accepts no parameters and returns no value. If counter is greater than zero, decrement subtracts one from the counter. A member function called getValue that accepts no parameters. It returns the value of the instance variable counter. A static function named getNCounters that accepts no parameters and returns an int. getNCounters returns the value of the static variable nCounters.
// making the class
class Counter {
int counter;
int limit;
// Constructor
Counter(int a, int b){
counter = a;
limit = b;
}
// static function to increment
static increment(){
if(counter<limit)
nCounter+=1;
}
// Decrement function
void decrement(){
if(counter>0)
nCounter-=1;
}
int getValue(){
return counter;
}
static int nCounter;
int getNCounters(){
return nCounter;
}
};
// Initializa the static
int Counter::nCounter = 0;
Explain one way world war ii?-era advances in computers
Answer: It forced almost the whole world to advance in computers and other technology.
Explanation: When WWII started everyone had there older computers but when country's got destroyed, along with millions killed. It sparked a revolution, which lead to many new inventions such as the ATM, but also a huge advance in computers and technology.
An array of int named a that contains exactly five elements has already been declared and initialized. In addition, an int variable j has also been declared and initialized to a value somewhere between 0 and 3. assign the programming symbols
Answer:
Hi, according to your description you need the code that represents the statement I will use C++ language to describe the code.
// Example program
#include <iostream>
int main()
{
int a [5] = [1,2,3,4,5];
int j = 0;
return 0;
}
Explanation:
In this language you must have to declare in the header the libraries that you include in your main program, after that a function main where your put your logical algorithm in fact, you declare the algorithm that you need. In this case declare a variable and assign an array of 5 positions and a j variable and assign a number between 0 and 3.
I hope it's help you.
Class members are accessed via the ____(1)_____ operator in conjunction with the name of an object of the class, or via the ___(2)_____ operator in conjunction with a pointer to an object of the class.
Answer:
1.ClassName and . operator
2. ClassName and [] operator
Explanation:
There are two ways to get the members of a class first one is by using dot(.) operator.
Example : with assumption that person is a class object and age is the member in it we can use it as:
person.age
Second way is to use [] operator with member as a string in it which is used by the compiler as key to get its value.
Example : person["age"]
Class members are accessed via the dot (.) operator with an object name, or the arrow (->) operator with a pointer. This is part of object-oriented programming which involves classes and objects that encapsulate data and methods.
Explanation:Class members are accessed via the dot (.) operator in conjunction with the name of an object of the class, or via the arrow (->) operator in conjunction with a pointer to an object of the class.
In the context of object-oriented programming, when we work with classes and objects, we deal with functions called methods and variables referred to as instance variables. Methods are used to define the behavior of objects while instance variables store data for each object.
An object, quite simply, can be seen as a segment of memory that includes instance variables representing data, and methods to work with that data. A class serves as the blueprint which outlines the methods by which objects can interact with their data.
What is the output of the following program? #include using namespace std; class TestClass { public: TestClass(int x) { cout << x << endl; } TestClass() { cout << "Hello!" << endl; } }; int main() { TestClass* test; return 0; }
Answer:
An error will be occurred here. In C++ a function must be like
returntype function_name(){
}
but the functions in given class does not have returntype given. So there will be a syntax error.
If the returntype is defined then the code does not show any output since nothing is printed in the main function.
Many commercial encryption programs use a technology called ____, which is designed to recover encrypted data if users forget their passphrases or if the user key is corrupted after a system failure
Answer: key escrow
Explanation:
using key escrow technique users can recover encrypted data if users forget their passphrase or if the user key is corrupted. The concept here is that those keys are held in an escrow meaning a bond or a document so that it could be accessed via a third party in case of system failure.
Answer:
key escrow
Explanation:
When does a scatterplot show a correlation
Software built and delivered in pieces is known as
Answer:
Incremental technique is the way in which software is built and delivered in pieces. The concept is to keep the client and developer on same page and the client is known as a non tech person, so he should be given software in piece by piece to avoid any confusion and sudden change.
Agile method is the best example of this technique in which steps are defined on contract basis and the software is delivered and build by pieces to keep client and developer on same page.
Software delivered in pieces is associated with the Agile Method and iterative development, allowing for a product to be enhanced over time with new features and updates.
Software built and delivered in pieces is commonly known as iterative development or incremental delivery, which is a core principle of the Agile Method. This approach contrasts with traditional software delivery, where a complete and final version is provided to the user. With Agile, developers can release a basic version of an application, such as a game or app, and then continuously add features and updates over time. The idea is to deliver a product step by step, enhancing its functionalities based on user feedback and changing requirements.
Iterative development is possible through the Agile Method, which emphasizes the quick delivery of small, workable pieces of software rather than waiting to deliver a complete and potentially outdated product. New features can be added, and changes can be made dynamically, which is highly beneficial in an environment where customer needs are constantly evolving. This method embraces flexibility and focuses on rapid delivery of high-quality, usable chunks of functionality.
Write an if/else statement that compares the variable age with 65, adds 1 to the variable seniorCitizens if age is greater than or equal to 65, and adds 1 to the variable nonSeniors otherwise show the age of seniorCitizens.
Answer:
Hi!
Explanation in Javascript:
int age;
int seniorCitizens = 0;
int nonSeniors = 0;
while(true) { //infinite loop, always true.
age = getAge(); // gets the age.
if (age >= 65) { // if age is greater or equal to 65 adds 1 to seniorCitizens and show the age.
o
seniorCitizens = seniorCitizens + 1;
print (age);
}
else { // otherwise adds 1 to nonSeniors.
nonSeniors = nonSeniors + 1; //
}