The changing of values for an object through a system is represented by the _____. (Points : 6) communication diagram
object diagram
use case diagram
None of these

Answers

Answer 1

Answer:

The correct option is communication diagram

Explanation:

The communication diagram represents the change of values for an item by a system.

A communication diagram is an expansion of the diagram of objects showing the objects together with the texts traveling from one to another. Besides the connections between objects, the communication diagram demonstrates the messages that the objects send to one another.

The correct option is a) communication diagram


Related Questions

Which media access method is used by twisted-pair Ethernet networks? (Please select one of the four options)

CSMA/CD

Token passing

CSMA/CA

OFDMA

Answers

Answer: CSMA/CD

Explanation:

 CSMA/CD (Carrier sense multiple access with collision detection) is the media access that is use by the twisted pair ethernet networks. The CDMA/CD is one of the protocol that is used by the various types of computer ethernet in the network.

The carrier sense multiple access is one of the part of MAC (media access protocol) protocol that is implemented by the multiple ethernet networking in the system.

Final answer:

Twisted-pair Ethernet networks use the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) media access method. This allows devices to detect if the network is free and manage collisions if they occur.

Explanation:

The media access method used by twisted-pair Ethernet networks is CSMA/CD (Carrier Sense Multiple Access with Collision Detection). This method allows devices to sense whether the network is free before they send data. If two devices detect that the network is free and start sending data at the same time, a collision occurs. In this situation, the devices stop transmitting for a random length of time before attempting to send the data again.

Learn more about CSMA/CD here:

https://brainly.com/question/32413257

#SPJ6

Why is exception handling an issue for testers in object-oriented developments?

Answers

Answer:

 The exception handling occurs when the unexpected events are happened, which basically require special type of processing. The exception handling is the mechanism that mainly handle all type of the exception during the run time process in the system.

In the object oriented programming, the testers face issue during the development as it used for prevent the abnormal node in the program and also it customize the exceptional message in the system.

We basically used the try catch block in the exception handling as, it efficiently handle the difficult situation in the object oriented development.

Create a program that will calculate the weekly average tax withholding for a customer, given the following weekly income guidelines: Income less than $500: tax rate 10% Incomes greater than/equal to $500 and less than $1500: tax rate 15% Incomes greater than/equal to $1500 and less than $2500: tax rate 20% Incomes greater than/equal to $2500: tax rate 30% Store the income brackets and rates in a dictionary. Write a statement that prompts the user for an income and then looks up the tax rate from the dictionary and prints the income, tax rate, and tax.

Answers

Answer:

#here is code in python

# create a dictionary of tax rate based on the income

tax = {499 : '10%', 1499 : '15%', 2499 : '20%', 2500 : '30%'}

#read the weekly income from user

week_income = int(input("Enter income: "))

#if weekly income is less than 500

if(week_income<500):

   print("Income is : ",week_income)

   print("Tax rate is : ",tax[499])

   print("Tax on income is : ",week_income*0.1)

# if income is greater or equal 500 and less than 1500

elif(week_income<1500):

   print("Income is : ",week_income)

   print("Tax rate is : ",tax[1499])

   print("Tax on income is : ",week_income*0.15)

# if income is greater or equal 1500 and less than 1500

elif(week_income<2500):

   print("Income is : ",week_income)

   print("Tax rate is : ",tax[2499])

   print("Tax on income is : ",week_income*0.20)

# if income is greater 2500

else:

   print("Income is : ",week_income)

   print("Tax rate is : ",tax[2500])

   print("Tax on income is : ",week_income*0.30)

Explanation:

Create a dictionary, in which tax are stored as per the weekly income.For income less than 500 tax will be 10%,for greater or equal 500 and less than 1500 tax will be 15%, for greater or equal 1500 and less than 2500 tax will be 20% and greater than 2500 tax will be 30% . Read the weekly income from user and then display the income, tax rate and tax on income according to the weekly Income.

Output:

Enter income :1200

Income is :  1200

Tax rate is :  15%

Tax on income is :  180.0

With an example in each, describe the use of two basic functions which are known by the "string.h" header file.

Answers

Answer:

strcmp(char * A, char * B);

strcat(char * A, char * B)

Explanation:

One of these basic functions is the function strcmp(char * A, char * B).

This functions compares if two strings are equal; If they are, it returns 0. If not, it returns 1;

So, an example:

char A[13] = "Buffalo Bills";

char B[13] = "Buffalo Bills";

if (strcmp(A,B) == 0)

printf("The strings are the same\n);

else

printf("The strings are not the same");

In this case, they are the same.

----------------------

If for example:

char B[13] = "Buffalo Billz"

It would fall in the else, A and B would not be the same strings.

--------------------------

Other function is the strcat(char * A, char * B);

This function takes two strings as an input, and concatenate them to the first.

For example:

char A[15] = "Buffalo";

char B[5] = "Bills";

strcat(A, B);

printf("%s\n", A);

The output is:

Buffalo Bills

what are "open source" programming language? Give examples of open source languages. Discuss the pros and cons of open source language.

Answers

Answer:

  The open source is the programming language that basically falls inside the parameters of the protocol of open-source convention. This fundamentally implies the language are not proprietary, with the specific arrangements (contingent upon the open source permit), can be adjusted and based upon in a way that is available to general society.

The python and ruby are the main examples of the open source programming language.

The disadvantage of the open source is that it is not much compatible as compared to all other software. It is not user friendly and easy for using the software.

The advantage of the open source programming is that it is available at low cost and it has high availability.

. Convert BAC4 from hexadecimal to decimal. Show your work.

Answers

Answer:

BAC4₁₆ = 47812₁₀

Explanation:

To convert from hexadecimal base system to decimal base system use this formula:

[tex]N = x_1 * 16^0 + x_2 * 16^1 + x_3 * 16^2 + x_4 * 16^3+ ... + x_n 16^n^-^1[/tex]

, where position of the x₁ is the rightmost digit of the number.

and:

A = 10.B = 11.C = 12.D = 13.E = 14.F = 15.

BAC4 = 11*16³+10*16²+C*16¹+4*16⁰ = 45056 + 2560 + 192 + 4 = 47812

A chart that shows the resource (project team member) along with their allocated hours for each week is known as a(n):

Select one:

a. Project staffing chart

b. GANTT chart

c. Histogram

d. Entity diagram

Answers

Answer: b) GNATT chart

Explanation: GNATT is the type of chart that displays the schedule or working in the form of bars in horizontal direction .The chart displays the duties /task performed on the vertical axis and the time periods on horizontal axis week-vise. This chart is usually used for project management purpose fr coordination, tracing, planning etc.

Other options are incorrect because project staffing chart is for the display of the staff activities involved during project, histogram is graph representation using bars of different heights and entity diagram displays the entities relation in databases..Thus , the correct option is option(b).

What are CRC cards and use-case scenarios used for in object-oriented analysis and design?

Answers

CRC stands for class, responsibilities, and collaborators. The analyst can use these concepts when beginning to talk about or model the system from an object-oriented perspective. CRC cards are used to represent the responsibilities of classes and the interaction between the classes.

CRC cards and use-case scenarios are crucial tools in object-oriented analysis and design. They involve defining class responsibilities and interactions (CRC) and detailing user-system interactions (use-case scenarios). These tools help construct efficient computer models by identifying patterns and structures within systems.

Understanding CRC Cards

CRC cards are a brainstorming tool used to represent the responsibilities of classes and how they interact with other classes. Each card typically has three sections: the class name, the responsibilities of the class, and the collaborators (other classes) that the class interacts with.

For example, a CRC card for a Library class might look like this:

Class: LibraryResponsibilities: Manage books, Issue loans, Return booksCollaborators: Book, Member, Loan

Use-Case Scenarios

Use-case scenarios describe the interactions between a user and a system to achieve a specific goal. These scenarios help in understanding the functional requirements of the system by detailing the sequence of actions and reactions required to complete a given task.

For example, a use-case scenario for borrowing a book might include:

User logs inUser searches for a bookUser requests a loanSystem checks for availabilitySystem issues the loan

Both CRC cards and use-case scenarios provide a structured approach to analyze and design a system, ensuring that all necessary interactions and responsibilities are accounted for.

What is ‘validation’?

Answers

Talking about models, validation is the process by the model is corroborated and its outputs are compared with experimental results. From validation, it can be seen how quantitative and qualitative accurate the model is, and it can be confirmed model fidelity to the real world.

What is the difference between a switch and a hub?

Answers

Explanation:

A hub is used to send the message from one port to other ports.It does not know the specific address of the destination where the message needs to send.it works on Physical layer of the OSI model(layer 1).

A switch can handle data and it knows the specific address of the destination.A switch works on the data link Layer of the OSI model(layer 2).

Complete the following conversions. You MUST show all of your work to receive full credit.

Convert the following Hex numbers to decimal.

a. FFFF

b. 0123

c. 005F

d. 026A

e. 73B0

Answers

Answer:

Following are the decimal num

a. FFFF=65535

b. 0123=291

c. 005F=95

d. 026A=618

e.  73B0=29616

Explanation:

Conversion of hexa decimal number to decimal number is done by multiplying the digit with corresponding power of 16.

FFFF= 15 x 16³+15 x 16² + 15 x 16¹+ 15 x 16⁰.

        =61440+3840+240+15

        =65535

0123=0 x 16³+1 x 16²+2 x 16¹+3 x 16⁰

       =0+256+32+3

       =291

005F=0 x 16³+0 x 16²+5 x 16¹+F x 16⁰

        =0+0+80+15

         =95

026A=0 x 16³+2 x 16²+6 x 16¹+A x 16⁰

         =0+512+96+10

         =618

73B0=7 x 16³+3 x 16²+B x 16¹+0 x 16⁰

         =28672+768+176+0

         =29616

A bowl contains 20 candies; 15 are chocolate and 5 are vanilla. You select 5 at random. What is the probability that all 5 are chocolate?

Answers

Answer: 0.1937

Explanation:

Given : A bowl contains 20 candies; 15 are chocolate and 5 are vanilla.

If we select 5 candies, then the number of ways to select them is given by permutations.

The number of ways to select 5 candies is given by :-

[tex]^{15}P_5=\dfrac{15!}{(15-5)!}=\dfrac{15\times14\times13\times12\times11\times10!}{10!}=360360[/tex]

The number of ways of selecting any 5 candies out of 20:-

[tex]^{20}P_5=\dfrac{20!}{(20-5)!}\\\\=\dfrac{20\times19\times18\times17\times16\times15!}{15!}\\\\=1860480[/tex]

Now, the probability that all 5 are chocolate :-

[tex]=\dfrac{360360}{1860480}=0.193691950464\approx0.1937[/tex]

Hence, the probability that all 5 are chocolate =0.1937

Answer:

A bowl contains 20 candies; 15 are chocolate and 5 are vanilla.

If we select 5 candies, then the number of ways to select them is given by permutations.

The number of ways to select 5 candies is given by :-

^{15}P_5=\dfrac{15!}{(15-5)!}=\dfrac{15\times14\times13\times12\times11\times10!}{10!}=360360

15

P

5

=

(15−5)!

15!

=

10!

15×14×13×12×11×10!

=360360

The number of ways of selecting any 5 candies out of 20:-

\begin{lgathered}^{20}P_5=\dfrac{20!}{(20-5)!}\\\\=\dfrac{20\times19\times18\times17\times16\times15!}{15!}\\\\=1860480\end{lgathered}

20

P

5

=

(20−5)!

20!

=

15!

20×19×18×17×16×15!

=1860480

Now, the probability that all 5 are chocolate :-

=\dfrac{360360}{1860480}=0.193691950464\approx0.1937=

1860480

360360

=0.193691950464≈0.1937

Hence, the probability that all 5 are chocolate

Twitter, Foursquare, and other real-time media add to or leverage capabilities of smartphones--improving your ability to be well-informed in real-time.
a. True
b. False

Answers

Answer: True

Explanation: Twitter is the application that functions online for providing news and communication for connecting people on social network.Foursquare is also an online app that works on the social platform in the smartphones and provide the knowledge about activity of people moving through the real-time world.

Other real world apps that operate in the real time helps in providing information about the activities and incidents happening through the smartphones.This also increases the knowledge of the individual by discovering, reading,sharing of the information.Thus the statement given is true.

What is an E-R diagram?

Answers

Answer:

 The E-R diagram is basically used in the designing and debugging the relational database in the field of the information system and software engineering.

In the E-R diagram, entity is the object and the component of the data that is used to represent as rectangle.

This E-R diagram is basically used to control the conjunction in the DFD (Data flow diagram). Entities, attribute and action are the three main components that are used in the E-R diagram.

Using Karnaugh maps, simplify the following Boolean function:

F(a,b,c,d) = a' b' c' + b' c d' + a' b c d' + a b' c'

Answers

Answer:

F(a,b,c,d)=b'c' + a'cd' + ab'd'.

Explanation:

The image of the corresponding k-map is attached to this answer please refer it.By the sop given in the question the k-map is formed.There are 3 groups formed 1 group of four 1's and 2 groups of 2 1's.Hence there are three sop and the sop is reduced from the previous SOP.

Write a program that reads a string from the keyboard and tests whether it contains a valid date. Display the date and a message that indicates whether it is valid. If it is not valid, also display a message explaining why it is not valid. The input date will have the format mm/dd/yyyy. A valid month value mm must be from 1 to 12 (January is 1). The day value dd must be from 1 to a value that is appropriate for the given month. September, April, June, and November each have 30 days. February has 28 days except for leap years when it has 29. The remaining months all have 31 days each. A leap year is any year that is divisible by 4 but not divisible by 100 unless it is also divisible by 400.

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

public class Main {

   // main method of the class

   public static void main(String[] args) throws Exception {

       // Scanner object to read date

       Scanner in = new Scanner(System.in);

       System.out.print("Enter a date in format mm/dd/yyyy to check:");

       // read the date from user

       String inp_date = in .next();

       // split the date with "/" delimeter

       String[] ip = inp_date.split("/");

       // find month from date

       int inp_month = Integer.parseInt(ip[0]);

       // find day from date

       int inp_day = Integer.parseInt(ip[1]);

       // find year from date

       int inp_year = Integer.parseInt(ip[2]);

       // boolean variable

       boolean flag = true;

       // print the input date

       System.out.println("Your Entered date was: " + inp_date);

       

       // check month is valid or not

       if (inp_month < 1 || inp_month > 12)

       {

           

           System.out.println("Entered Date is invalid:");

           System.out.println("The input month  is not from 1 - 12.");

           flag = false;

           

       }

       //check day is valid or not

       else if (inp_day < 1) {

           

           System.out.println("Entered Date is invalid:");

           System.out.println("The value of day is less than 1.");

           flag = false;

       }

       // check days in those month which has 30 days

       else if ((inp_month == 4 || inp_month == 6 || inp_month == 9 || inp_month == 11) && inp_day > 30) {

           

           System.out.println("Entered Date is invalid::");

           System.out.println("This month have only 30 days, but Entered day is greater than 30.");

           flag = false;

           

       }

       // if month is February then check leap year and days

       else if (inp_month == 2 && ((inp_year % 4 == 0) && (inp_year % 100 != 0))) {

           if (inp_day > 29) {

               

               System.out.println("Entered Date is invalid::");

               System.out.println("In a leap year, only 29 days in February.");

               flag = false;

           

           }

       }

       // if month is February and year is non-leap

       else if (inp_month == 2 && inp_day > 28) {

           

           System.out.println("Entered Date is invalid:");

           System.out.println("In a non-leap year, only 28 days in February.");

           flag = false;

       }

       // if all are valid

       if (flag)

           System.out.println("Entered Date is valid:");

   }

}

Explanation:

Read the date from user in mm/dd/yyyy format with the help of Scanner object. Extract day, month and year from the date. Then check whether month is between 1-12 or not and print appropriate message. After that check day is less than 1 or not, if not then print reason. Check the days in those month which has 30 days in it.If month is February then check for leap year and day is greater than 29 then print reason. Else if month is February and year is non-leap then check days whether it is greater than 28 or not. In last If value of flag is true then print date is valid.

Output:

Enter a date in format mm/dd/yyyy to check:2/30/2012                                                                          

Your Entered date was: 2/30/2012                                                                                              

Entered Date is invalid::                                                                                                    

In a leap year, only 29 days in February.


Is 49 greater than y? Which below is correct?
A) 49 > y
B) 49 >= y
C) 49 < y
D)49 != y

Answers

Answer:

49>y

Explanation:

Given objective: Is 49 greater than y?

Among the options:  

a) 49 > y => 49 is greater than y

b) 49 >= y => 49 greater than or equal to y

c) 49 <y => 49 is less than y or in other words, y is greater than 49.

d) 49 !=y => 49 is not equal to y.

So the requires solution is represented by (a) namely, 49>y . This can be alternatively read as y<49, that is y is less than 49. The other options do not represent the given requirement as illustrated earlier.  

List and describe four communication tools that are currently popular.

Answers

Answer: Communications tool that are currently popular are as follow:

a) Intranet:

Intranet is known as a private hub which can be accessed by an authorized individual within an organisation. It is predominately utilized in order to drive internal collaboration and communication.

b) Private Messaging :

Spaces that provide private messaging and also other functions are often perceived as great tool for business communication, in order to keep teams working together. It’s referred to as an effective type of communication mostly for employees and managers.

c) Discussion Forums :

A discussion forum can be referred to as something which brings together employees and management and thus allows for open discussion on several topics. Forums are effective in order to archive organisational knowledge that can be used by individuals as a reference.

d) Internal Blogs :

Internal blog is known as a place where an employee or an individual can share experiences and notion fast and also in an informal way.

Explain the SCAN disk scheduling algorithm. Explain why it is sometimes called the Elevator Algorithm.

Answers

Answer:

SCAN disk scheduling is the algorithm in which a certain arm of disk rotates in particular direction and serves the requests that arrive from that path. It scans the cylinder's disk in both back and forth direction.

If the arm reaches the bottom of the disk , it automatically stars working in the opposite direction and serves the request in the reverse direction path.As this functioning is similar to the elevator movement ,it is also known as elevator algorithm.

Write a C++ program to read N numbers. Find sum, product, and average of N numbers

Answers

Answer:

// here is code in c++

// headers

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

   int n,num;

   double sum=0, avg;

   long long int prod=1;

   cout<<"Enter value of N:";

   // read value of N

   cin>>n;

   cout<<"enter "<<n<<" numbers:";

   // read the N numbers

   for(int x=0;x<n-1)

   {

    cin>> num;

    // calculate sum of all

    sum=sum+num;

    calculate product of all

    prod=prod*num;

   }

   // print sum

   cout<<"sum of all "<<n<<" numbers is: "<<sum<<endl;

   // print product

   cout<<"product of all numbers is : "<<prod<<endl;

   print average

   cout<<"average of all "<<n<<" numbers is: "<<sum/n<<endl;

return 0;

}

Explanation:

Read the value of n from user.Then ask user to enter n numbers. Then calculate sum of all entered number and their product.After this calculate the average of entered number by dividing sum with n.Print sum, product and average of n numbers.

Output:

enter value of N:6

enter 6 numbers:1 2 3 4 5 6

sum of all 6 numbers is: 15

product of all numbers is : 120

average of all 6 numbers is: 2.5

Final answer:

The program starts by asking the user to specify the number of elements (N). The program demonstrates user input, loops, and basic arithmetic operations to achieve the desired output.

Explanation:

A sample C++ program that performs this task is :

#include
using namespace std;

int main() {
   int N, number;
   cout << "Enter the number of elements: ";
   cin >> N;
   double sum = 0.0, product = 1.0;
   for (int i = 0; i < N; ++i) {
       cout << "Enter number " << (i+1) << ": ";
       cin >> number;
       sum += number;
       product *= number;
   }
   double average = sum / N;
   cout << "Sum = " << sum << endl;
   cout << "Product = " << product << endl;
   cout << "Average = " << average << endl;
   return 0;
}
The program starts by asking the user to specify the number of elements (N). It then enters a loop, prompting the user for each number adding to the sum and multiplying the product with each entered number. After going through all N numbers, it calculates the average and prints the sum, product, and average.

Discuss why Web services are important to Web development

Answers

Answer:

 The web services is the software that uses over the internet and also used various standard XML message system.

The web services is basically used in various applications to make the platform and various types of the technologies independent.

The web services play very important role in the web development as, it allow various types of applications to share data and different types of services with each other in the system. It is used in various UNIX applications and java for the communication purpose.

.Statements using the ___________ class are explicit conversions.

a.Explicit

b.Convert

c.ExplicitConvert

d.ConvertType

Answers

Answer: Explicit

Explanation:

 The statement which used the explicit class are the explicit conversion, as  it is type of the conversion which uses the conversion keyword. These type of the keywords act as a function in the explicit conversion and compiler generating the code in the given inline function.  

Explicit conversion basically require the cast operator in its function when, the information is lost during explicit conversion.

Conversion of base class into the derives class is one of the typical example of the explicit conversion.

BI systems have eliminated a common organizational problem, which is simultaneously having too much data but somehow not enough.
a. True
b. False

Answers

Answer:

True

Explanation:

Most of the organization suffers from InfoObesity, i.e., too much data without the proper holding structure for this.

Business intelligence abbreviated as BI plays a major role in the determining the planning strategies of an organizations and serves multiple purposes which includes measurement of performance towards business objectives, quantitative analysis, data reporting and sharing, etc.

BI systems helps in eliminating InfoObesity, by manging the data and filtration of the data with proper data structure to serve specific purposes.

An expression using the conditional operator is called a(n) __________ expression.

Answers

Answer: Conditional expression

Explanation: Conditional operators are those operators that are used between two values or variables for the given condition. This operator return an answer after evaluating the condition that can turns out to be true or false .

They also help in increment and decrement of the variable value by one according to condition.Conditional expression are those expression that use conditional operator in their statement for gaining a return value according to the condition being true or false.

What is the Matlab command to create a column vector with 11 equally spaced elements, whose first element is 2 and whose last is 32.

Answers

Answer:

transpose(linspace(2,32,11))

Explanation:

To get the equally spaced elements you can use:

linspace is the command for generating a linearly spaced vector.

For instance, the command:

linspace(element1,element2,n)

generates n points, between element1 and element2

The spacing between the points is calculated by

[tex]\frac{element2-element1}{n-1}[/tex]

In your case, the linspace command will create a vector with 1 row and 11 columns (1x11).

To get the column vector:

In order to convert this vector into one with 11 rows and 1 column (11x1), you can use:

tanspose(vector)

where vector is linspace(element1,element2,n)

A 40 fps(frames per second) video clip at 5 megapixels per frame would generate large amount of pixels equivalent to a speed of ____________megabps(megabits per second).

4800
200
600

Answers

Answer:

[tex]4800\dfrac{megabytes}{second}[/tex]

Explanation:

We have the next two data:

[tex]40\,\dfrac{frames}{second}[/tex]

[tex]5\,\dfrac{megapixels}{frame}[/tex]

Now we can find the number of megapixels per second.

[tex]40\dfrac{frames}{second}\cdot 5\dfrac{megapixels}{frame}=200\dfrac{megapixels}{second}[/tex]

Finally considering an RGB video we will have 3 channels each one with 8 bytes then we will have 24 bytes per each pixel then:

What is the effect of block size in cache design?

Answers

Answer:

When designing a cache, you have to consider this things:

Delay. Miss rate. Area.

If the cache has a bigger block size may have a lower delay, but when miss the miss rate will be costly. If an application has high spatial locality a bigger block size will do well, but programs with poor spatial locality will not because a miss rate will be high and seek time will be expensive.

Final answer:

The block size in cache design determines the amount of data stored in each cache block. It affects cache hit rate and wasted storage space. The optimal block size depends on various factors.

Explanation:

The block size in cache design refers to the amount of data that can be stored in each cache block. It plays a crucial role in determining the cache's performance and efficiency. A larger block size can lead to a lower cache miss rate and higher hit rate, as it allows for more data to be fetched from memory at once. However, a larger block size also results in more wasted storage space, known as internal fragmentation.

For example, let's consider a cache with a block size of 64 bytes. If the processor requests a single 4-byte integer, the cache will still load the entire 64-byte block into the cache. This leads to wasted space and can reduce the effective cache capacity. On the other hand, if the block size is too small, the cache may experience frequent cache misses, as it would need to load more blocks to fetch the required data.

Choosing the optimal block size involves balancing the trade-off between cache hit rate and wasted storage space. Factors like the access pattern of the application, cache associativity, and memory bandwidth also influence the effect of block size on cache performance.

An instance of an abstract class can be created using _____. (Points : 2) the new operator
encapsulation
a public accessor
None of the above

Answers

Answer:

The correct answer for the given question is the new operator.

Explanation:

An abstract class is those which have the only declaration of the abstract method, not a definition. Any class which inherits abstract class must define all the method of abstract otherwise it also be abstract.

To declared any abstract class following syntax is used  

abstract class class name

{

// abstract method  

}

To create an instance of an abstract class we can use a new keyword. The new keyword created the instance of an abstract class.

encapsulation is the feature of object-oriented we cannot create an object by using encapsulation so this option is wrong.

The public is an access modifier we cannot create an object by using public keyword so this option is also wrong.

Therefore the correct answer is new.

A(n) _____ provides an organization with vision and leadership in the area of business conduct.

Corporate ethics officer
Code of conduct
Code of ethics
Common good practice

Answers

Answer: Corporate ethics officer

Explanation:Corporate ethics officer is the officer that is responsible for examining the business conduct of an organization. The duties of the officer includes the looking after the functioning, execution,development and other factors of the business.They follow the leadership to maintain the ethics and polices.

Other options are incorrect because code of conduct and ethics are general codes that can be followed by schools, individual etc and not necessarily by organization.Common good practices is the practicing of the general good habits and  conducts. Thus, the correct answer is Corporate ethics officer

Do individuals have a privacy interest in their smartphones' locations?

Answers

Answer:

In today's world, everyone using smartphones as it easily allow to communicate by using different types of features like texting, video, e-mail and by using internet we can run various types of applications.

Smartphones carries one of the main and important skills that is show our current location. By using various types of applications like Global positioning system (GPS), cell ID and wifi we can easily trace the location.

But there is different types of option according to the individual requirement as some people want privacy as they are not interested to share their location to anyone.

Other Questions
Drag the tiles to the correct boxes to complete the pairs. Not all tiles will be used.Match each situation to its corresponding expression. Determine the greatest mass among the following measurements.a) 2.0 X106 milli gram b) 5.0X1012 pico gram c) 9.0X109 micro gram and d) 2.0X102 kilo gramb) 5.0X1012 pico gramd) 2.0X102 kilo gramc) 9.0X109 micro grama) 2.0 X106 milli gram Andy and Sylvie each incorrectly simplified the expression -3 - 4(2x - 3). Andy wrote -14x + 21 and Sylvie wrote -8 - 6. Explain their errors and give the correct answer. Bob is ______ with his money. The bar has a length L and cross-sectional area A. Determine its elongationdue to the force P and its own weight. The material has a specific weight y(weight/volume) and a modulus of elasticity E. If 10.6 kg of Al2O3(s),10.6 kg of Al2O3(s), 51.4 kg of NaOH(l),51.4 kg of NaOH(l), and 51.4 kg of HF(g)51.4 kg of HF(g) react completely, how many kilograms of cryolite will be produced? What is the role of a scientist?_______________________(Apex) Answer Choices:A. To keep scientific secretsB. To report accurate results C. To tell people how they must liveD. To dictate government policies If s(x) = 2 - x and f(x) = 3x, which value is equivalent to (s f) (-7) A letterhead is similar to a logo in that: 4. Suppose a security light is set into the ground and aims its light at the top of the building. The angle of elevation of the light is 60 degrees. The building is 9 feet tall. a. What is the distance of the light's base from the bottom of the building? Use a trig function to calculate the distance. b. How long is the light beam? light beam. Use a trig function to calculate the length of the Sketch and label a covalent bond and an ionic bond (you do not need to draw the metallic bond or intermolecular force). Describe the role of electrons in covalent, ionic, and metallic bonds (you do not need to describe the intermolecular force), and describe the strength of these bonds. Also explain (no sketch) how differences in bonds cause diamond and graphite to have very different properties (2.11A). A 5.0 A current is set up in a circuit for 6.0 min by a rechargeable battery with a 6.0 V emf. By how much is the chemical energy of the battery reduced? Azeneth is putting a fence around her rectangular garden. The width of the garden is 4x + 5 ft. and thelength is 2x^2 3x + 7 ft.How much total fencing does Azeneth need to buy in terms of x? The function s(t) represents the position of an object at time t moving along a line. Suppose s( 1 )=123 and s( 3 )=173. Find the average velocity of the object over the interval of time [1,3]? A substance X is secreted by one cell, it travels a short distance through interstitial fluid, and produces an effect in a cell immediately adjacent to the original secreting cell. All of the following terms might fit this substance except: A. Prostaglandin B. Neurotransmitter C. Pheromone D. Growth factor E. Nitric acid No me gustan los exmenes ni la tarea! 2. Hijos, tienen hambre? Desean para comer? 3. No bebo ni Coca-Cola Fanta. 4. No hay en la biblioteca. Todos los estudiantes estn en la cafetera. 5. El aire no cuesta . 6. Sandra estudia lenguas: espaol, italiano, chino y japons. 7. No hay en mi mochila. Est vaca (empty). 8. Esa chica lleva ropa negra. Nunca lleva ropa de colores. 9. comi los sndwiches... no sabemos quin. 10. Siempre traemos regalos a los nios, pero sus primos les traen nada. Trak Corporation incurred the following costs while manufacturing its bicycles. Bicycle components $100,000 Advertising expense $45,000 Depreciation on plant 60,000 Property taxes on plant 14,000 Property taxes on store 7,500 Delivery expense 21,000 Labor costs of assembly-line workers 110,000 Sales commissions 35,000 Factory supplies used 13,000 Salaries paid to sales clerks 50,000 (a) Identify each of the above costs as direct materials, direct labor, manufacturing overhead, or period costs. Bicycle components select a classification Depreciation o Jackie brought 3/4 of a gallon of iced tea to the party. Bill brought 7/8 of a gallon of iced tea to the same party. How much iced tea did Jackie and Bill bring to the party? A bullet fired horizontally hits the ground in 0.5 sec. If it had been fired with a much higher speed in the same direction, and neglecting air resistance and the earths curvature, it would have hit the ground in1. There is no way to tell from the information given.2. less than 0.5 sec.3. 0.5 sec.4. more than 0.5 sec. A U.S. firm has borrowed 50 million from a British firm. The borrower will need to convert dollars to pounds to repay the loan when it is due. The U.S. firm could hedge the exchange rate risk by A.buying pounds forward.B. selling pounds forward.C. borrowing pounds.D. both B and C would hedge the risk E. both A and C would hedge the risk