Answer:
salesTotalByDept.merge(dept, sales, (d,s) -> s + sales);
Explanation:
In the above statement merge() method is being used which updates the salesTotalByDept map of type Map to update the sales total for a dept by an integer sales value.
Here dept and sales both are used and passed as a parameter to merge() method because salesTotalByDept can be update if both the information about sales and department are provided.
Map.merge() method is used to place new value under the given key if the key does not correspond to any value, or is used to update existing key with a given value.
The World Wide Web is full of unstructured data. Search engines like Google, Bing and Yahoo have been doing a good job of allowing users to search by key term in order to quickly locate links to websites about that particular topic. In order to do this, these search engines use what tool in order to help index and find these results?a. Spiderbotsb. Query Robotsc. Antcrawlersd. Index Finders
Answer: Query
Explanation:
The Search Criteria is entered and any when a related Query is logged, it speedily bring out the linked details for exploration.
Wardrobe engineering is important because
a. knowledge of current fashions is necessary if you are to select appropriate career apparel
b. people make nearly all decisions about you based on what you wear.
c. the right clothing can guarantee a promotion.
d. clothing can establish your credibility and likeability
Answer:
The answer is "Option d"
Explanation:
The wardrobe engineering consists of choosing clothes that are so simple in design and better in the style that they are acceptable to the existing show-up and perfect for the future years. This design Originally coined Dressing for Confidence author John Molloy, which describe that clothes and accessories can also be used to create a certain picture, and wrong choices can be described as follows:
In option a, It's right, that we know about current fashions, but selecting suitable career apparel is not important, that's why it is incorrect. In option b, It is wrong because whatever you wear is not to make choices of any sort. In option c, It is wrong because it can't provide promotion.
After saving her presentation initially, Leah realizes she needs to add another content slide. She adds the slide and is ready to save her presentation again. How can she accomplish this task? Check all that apply.
She can press the keys Ctrl+S.
She can press the function key F12.
She can open the File tab and click Save.
She can go to the Backstage view and click Save As.
She can click the Save option in the Quick Access tool bar.
Answer:
a, c, & e
Explanation:
Answer:
1st, 3rd, and 5th
Explanation:
Today when Dylan turned on his computer, he noticed that the monitor was very dim. He could still see the desktop icon and text. He turned the brightness all the way up, but that did not correct the issue. Dylan also checked to make sure the Power Options brightness was not turned down, causing the screen to go dim. He connected a different monitor, and the screen was fine. What caused the screen to be very dim
Answer:
Monitor backlighting
Explanation:
Dylan haven done some troubleshooting on his computer to find out what the problem was but couldn't restore its brightness.
It then means that the Monitor backlighting caused the screen to be very dim.
The Monitor backlighting is bad or faulty.
Answer:
The Liquid Crystal Display lighting of the monitor is most likely faulty.
Explanation:
By connecting his computer to an external monitor and observing that the brightness of the external monitor was fine, we can deduce that the dimness of his computer was not a software issue but that of hardware. That is the computer monitor itself.
The most probable reason for the dimness of his computer monitor would e an hardware issue occasioned by a faulty LCD - Liquid Crystal Display or LED, the back light powering the LCD of his computer computer monitor would have to be replaced by a qualified technician.
When Tim Berners-Lee developed the first specifications, protocols, and tools for the World Wide Web in 1993, his employers at CERN chose to make the underlying code publicly available on a royalty-free basis so that anyone who ever wanted to use it or build upon it could do so without having to pay any licensing fees to CERN or ask for CERN's permission.
Which of the following best describes the reasons for this decision?
a. CERN did not recognize the full potential of the World Wide Web and did not think it was worth investing any more of its own resources into its further development.
b. By offering the Word Wide Web as a freely available alternative, CERN hoped to discourage people from using America Online, CERN's biggest competitor for online communication services.
c. Had the technology been proprietary (i.e., closed and privately licensed), it would likely not have become as popular as it has or have been adopted by so many users and institutions across the globe.
d. Because Tim Berners-Lee did not ask his employers for permission before using CERN resources to develop the World Wide Web, as punishment, he was required to give the technology away for free and sacrifice the millions of dollars he could have personally made by selling his idea for a profit.
Answer:
c.
Explanation:
People trust open-source software - if they can see how it works and understand it, they can help improve it and build applications using it. If these protocols were not publicly available - then nobody would have implemented services using them - so nobody would be adopting it.
A person is eligible to be a US senator if they are at least 30 years oldand have been a US citizen for at least 9 years. To be a US representativethese numbers are 25 and 7, respectively. Write a program that accepts aperson's age and years of citizenship as input and outputs their eligibilityfor the Senate and House.
Answer:
import java.util.Scanner;
public class num1 {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
//Prompt for the person's age
System.out.println("What is your age");
int age = in.nextInt();
//Prompt for the person's years of citizenship
System.out.println("What is your years of citizenship");
int yearsCitizenship = in.nextInt();
if(age >= 30 && yearsCitizenship >= 9){
System.out.println("You are Eligible to be a US senator");
}
if(age >= 25 && yearsCitizenship >= 7){
System.out.println("You are Eligible to be a US representative");
}
}
}
Explanation:
Using Java Programming language
The scanner class is used to receive and store the persons age and year of citizenship
The first if statement is used to test if the age >= 30 and citizenship>=9 If this is true, it prints out You are Eligible to be a US senator. You are Eligible to be a US representative. Note that if the second condition is true, then the first is also true because to be eligible for senatorial also means you also meet the requirments for representative position
Answer:
age = int(input("Your age: "))
citizen = int(input("Years of being a US citizen: "))
if age >= 30 && citizen >= 9:
print("You are eligible to US representative and a US senator")
elif age >= 25 && citizen >= 7:
print("You are eligible to be a US representative")
else:
print("You are not eligible to be a US representative or US senator")
Explanation:
Ask the user for its age, and years of citizenship
Check the both inputs:
If age is greater than or equal to 30 and citizen is greater than or equal to 9, it means the person is eligible for US representative and a US senator
If age is greater than or equal to 25 and citizen is greater than or equal to 7, it means the person is eligible for US representative
In any other case, the person is not eligible
Suppose that for every 10,000 lightning strikes, meteorologists can predict that one will hit a building and cause damage. If a massive thunderstorm sweeps through your state today, and 5 million lightning strikes are recorded, how many buildings were probably hit by lightning?
Answer:
500
Explanation:
[tex]\frac{1}{10000}*5000000 = 500[/tex]
The meteorologist predicts the building will hit if the supermassive thunderstorm sweeps through. Thus about 500 buildings will e hit by lightning.
Who is a meteorologist :A meteorologist is a scientist who studies the works of wreaths atmospheric phenomenon and makes use of the mathematical model and his knowledge to make daily weather forecasts and they work in government agencies, consulting, and research services.
As per the 10,000 lightning stakes can be predicted ad about 5 million have already been recorded thus one stricke divided by 10,000 predictions and multiplied by 500,00,00 records gives us 500 hits.
Find out more information about the meteorologists.
brainly.com/question/150949
A user brings in a smartphone for repair. The device is unable to send/receive calls or connect to WiFi. All applications on the device are working unless they require connectivity. Which of the following is MOST likely causing the problem?
a. Airplane mode
b. Tethering
c. Disabled hotspot
d. VPN
Answer:
I believe it would be airplane mode:)
Explanation:
A VPN connects you to wifi in a another part of the country or world, hotspot connects others to your celluar when on, tethering is when internet connects to your phone. usually costs $ to do. airplane mode is the only thing left.
Have a great day (or night!)
The issue with the smartphone likely stems from airplane mode being enabled, which turns off all wireless communications. The user should check and disable airplane mode if necessary, and if the problem persists, further troubleshooting steps like restarting the phone and checking VPN settings are recommended.
If a smartphone is unable to send/receive calls or connect to WiFi but operates normally otherwise, the most likely cause is airplane mode. When airplane mode is enabled, all wireless communications, including mobile network, WiFi, and Bluetooth, are turned off to prevent interference with aircraft systems or during certain medical procedures. This would prevent the phone from performing any functions that require connectivity like making calls or connecting to the internet. The user should check to ensure that airplane mode is not activated. If airplane mode is not the culprit, the issue might be more complex, potentially involving hardware or deeper software issues, and further troubleshooting steps would include things like restarting the phone, turning off WiFi, and checking for any active VPN connections which could also cause connectivity problems.
The Fibonacci sequence starts 1, 1, 2, 3, 5, 8, .. . . Each number in the se-quence (after the first two) is the sum of the previous two. Write a pro-gram that computes and outputs the nth Fibonacci number, where n is avalue entered by the user.
Answer:
value=int(input("Enter the number up-to the user wants the Fibonacci series: "))
a=0
b=1
c=1
for x in range(value):
print(c,end=" ")
c=a+b
a=b
b=c
Output :
If the user input 5, then the output is "1 1 2 3 5".If the user input 10, then the output is "1 1 2 3 5 8 13 21 34 55".Explanation:
The above defined a python program which is used for the Fibonacci series.The first line of the program is used to instruct the user and take the input from the user. Then the for loop executes up-to that range value.Then in the for-loop, the two variable needs to store the current value and previous value which is used to give the series after addition.The stack pop operation
removes from the stack the number of elements specified by its integer parameter
removes all items currently on the stack
extracts one element from the stack and returns it
does not exist: There is no such stack operation
Answer:
extracts one element from the stack and returns it
Explanation:
Basically, a stack is an abstract data type that serves as a collection of elements. It has two principal operations:
push, which adds an element to the collection, and
pop, removes an element from the Stack and returns the removed element This operation is often found in c and java programming.
Therefore, the correct option in our case is that the stack pop operation extracts one element from the stack and returns it.
What is syntax?
rules for using tags correctly in HTML
text containing hyperlinks that can go to other hypertext pages
information about how an element should be used by a web browser
text used to mark text or images on a web page
Answer: Rules for using tags correctly in HTML.
Explanation:
The syntax is a set of rules for using the tags correctly on the HTML page. Thus option A is correct.
What is the syntax?The syntax is an arrangement of the words that in phases are sued to create well-formed sentences. The system is an analysis of the language. It shows how the words come with larger units.
In computer the Syntex refers to the programming language and is the set of rule that defines the combination of those symbols that are correctly structured.
Find out more information about the syntax.
brainly.com/question/831003
Injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.
A. True
B. False
Answer:
True
Explanation:
In Computer science, It's true that injection attacks variants can occur whenever one program invokes the services of another program, service, or function and passes to it externally sourced, potentially untrusted information without sufficient inspection and validation of it.
16:9 and 4:3 are numbers that refer to an image’s...
What is the purpose of the Excel Function Reference?
Answer:
Step-by-step explanation:
Answer:
To look up functions and their purposes
Explanation:
Edg
Here's another question!
What is some iterative programming structure uses?
Answer
Often in an algorithm, a group of statements needs to be executed again and again until a certain condition is met, this is where we find the need for iteration.
The repeated execution of some groups of code statements in a program is called iteration.
In iteration control structures, a statement or block is executed until the program reaches a certain state, or operations have been applied to every element of a collection. This is usually expressed with keywords such as while, repeat, for, or do..until.
The basic attribute of an iteration control structure is to be able to repeat some lines of code. The visual display of iteration creates a circular loop pattern when flowcharted, thus the word “loop” is associated with iteration control structures. Iteration can be accomplished with test before loops, test after loops, and counting loops. A question using Boolean concepts usually controls how often the loop will execute.
Applications of Iteration
Iteration methodology has various applications in the programming world
Problem-solving in arrays, vectors, lists, strings, etc. Problem-solving using Stack, Queue and Priority Queue Bottom-up implementation of Dynamic Programming Implementation of greedy algorithms BFS traversal of tree and graph Problem-solving using Hash Table and BST Iterative Implementation of recursive code using stackIteration (Repetition) Control Structures
pseudocode: While
count assigned zero
While count < 5
Display "I love computers!"
Increment count
End
pseudocode: Do While
count assigned five
Do
Display "Blast off is soon!"
Decrement count
While count > zero
pseudocode: Repeat Until
count assigned five
Repeat
Display "Blast off is soon!"
Decrement count
Until count < one
pseudocode: For
For x starts at 0, x < 5, increment x
Display "Are we having fun?"
End
Get two positive integers from the user. Write code to multiply the two numbers together using only addition or subtraction. You should not use the '*' operator. Remember that x*y is simply x+x+x+...+x, y times. You may use eitnher a for loop or a while loop
Answer:
number1 = int(input("Enter the first number: "))
number2 = int(input("Enter the second number: "))
result = 0
for i in range(number1):
result += number2
print(str(result))
Explanation:
Ask the user for two numbers
Initialize result as 0 to hold the multiplication of the numbers
Create a for loop that iterates "number1" times. In each iteration, add number2 to the result.
When the loop is done, print the result
You work for a company that does network cable installations. Your company has been contracted to pull out the existing CAT 3 wiring to install CAT 6. You notice the plug on the end of the CAT 3 is an RJ-45. What is the other connector type that can be used with CAT 3 installations?
Answer:
RJ-11 connector.
Explanation:
RJ-11 (Registered Jack-11) also known as the phone line or modem port is a network cable having twisted wire pairs and a modular jack with two, four or six contacts. It is generally used with telephones and modem.
Hence, the other connector type that can be used with CAT 3 installations is the RJ-11 connector.
(Exhibit: Production Possibilities Curves 2) Assume that a nation is operating on production possibilities curve CD. Economic growth is best illustrated by a Select one:
a. shift from curve CD to curve AB.
b. shift from curve CD to curve EF.
c. movement from point Q to point O on the frontier CD.
d. movement from point R inside the frontier CD to point P on the frontier CD.
Answer:
b. shift from curve CD to curve EF.
Required Details of the Question:
The image of the curve required to answer the question has been attached.
Explanation:
A production possibilities curve shows various combinations of the amounts of two goods( in this case capital and consumer goods) which can be produced within the given resources and a graphical representation showing all the possible options of output for the two products that can be produced using all factors of production.
Now the growth of an economy is best illustrated in the image by the shift from curve CD to curve EF, this means that as the nation's production capacity increases, its production possibilities curve shift outward showing an increase in production of both goods.
A(n) ____is a network of organizations and activities needed to obtain materials and other resources, produce final products, and get those products to their final users. a. business triage b. organizational trail c. supply chain d. vendor-managed inventory
Answer:
c. supply chain
Explanation:
A supply chain in commerce, is a network of organizations and activities needed to obtain materials and other resources, produce final products, and get those products to their final users.
What are the advantages of using charts or graphs in spreadsheet software?
Answer: Can sort out large amount of information into a form that can be easily read.
Explanation:
Answer:
a,c,d
Explanation:
Which of the following are true?
a. Local variables are created by adding a positive value to the stack pointer
b. A subroutine's stack frame always contains the caller's return address ad the subroutine's local variables
c. A subroutine's prologue code always pushes
d. EBP on the stack Arrays are passed by value to avoid copying them onto the stack
Answer: False
Explanation:
A family preservation program director helps design a study that evaluates the effectiveness of her program to keep children living with their abusive parents by providing the families with daily home visits by social workers. She expects the evaluation to show a dramatic reduction in reported child abuse incidents. Instead, the results show an increase in reported child abuse incidents. The director then concludes that the program was undoubtedly effective, reasoning that there really could not possibly have been an increase in actual abuse due to her program, just an increase in reportage of abuse due to closer monitoring in the daily home visits. The director is committing the error of Group of answer choices illogical reasoning ex post facto hypothesizing selective observation. premature closure of inquiry.
Answer:
Ex post facto hypothesizing
Explanation:
ex post facto hypothesizing Is invalid in science. It involves making hypothesis after noticing some form of relationship which has been noticed.
The director concluded that the program was undoubtedly effective, and noticed that there really could not possibly have been an increase in actual abuse due to her program. He noticed it was due to an increase in reportage of abuse due to closer monitoring in the daily home visits. This hypothesis validates ex post facto hypothesizing.