What should drivers do in case of a brake failure

Answers

Answer 1
If your taking about driving there supposed to go very slowly

Related Questions

Given an int variable n that has been initialized to a positive value and, in addition, int variables k and total that have already been declared, use a for loop to compute the sum of the cubes of the first n whole numbers, and store this value in total. Thus if n equals 4, your code should put 1*1*1 + 2*2*2 + 3*3*3 + 4*4*4 into total. Use no variables other than n, k, and total.

Answers

Explanation & answer:

We do not know which language you are using, so a pseudocode will be given, it will be similar to java or C/C++.  For other languages, you can adapt to the syntax of the target language.

int n=5;

//

total = 0  // initialize  variable to store total value, already declaired.

// k will be used as a dummy variable, already declared

for (k=1; k<=n; k++){

   total+=k*k*k;  // k*k*k works for almost all languages.  adapt as needed

   }

print(n, total)

_______________, such as BASIC, Python, Java, Prolog, and C , make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.

Answers

Answer:

High level Languages

Explanation:

High level languages are made so that the byte code, Assembly code that computers can understand should be converted into a higher level human understandable languages such as Python,C++. Also, remember that the compilers of these languages such as Visual studio ultimately converts the high level code into low level code ( Assembly code ) that computers can understand.

Write an if/else statement that adds 1 to the variable minors if the variable age is less than 18, adds 1 to the variable adults if age is 18 through 64, and adds 1 to the variable seniors if age is 65 or older.

Answers

Answer:

Explanation:

data is a statement like

data 10,20, 30 , 40 , 50, 60 , 70, 80

\\the numbers represent ages.

For x := 1 to end of data do a[x]:=read(data)

\\ This is a comment. You could do this much easier if you just use three if statements rather than the if then else.

minor:=0;adult:=0;senior:=0;

while a[x] <> 0 do begin

age:= a[x]

if age < 19 then minor:=minor + 1;

If age > 18 then if age < 65 the adult:=adult + 1;

if age > 64 then senior := senior + 1;

end;

I have not declared the variables anywhere. That depends on what language you are using. The key step you  want are the three if statements. How you find out what's in them is another matter.

Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is considered a consecutive duplicate. In this example, there are three such consecutive duplicates: the 2nd and 3rd 5s and the second 6. Note that the last 3 is not a consecutive duplicate because it was preceded by a 7. Write some code that uses a loop to read such a sequence of non-negative integers , terminated by a negative number. When the code finishes executing, the number of consecutive duplicates encountered is printed. In this case, 3 would be printed. Assume the availability of a variable, stdin, that references a Scanner object associated with standard input. That is, stdin = new Scanner(System.in); is given.

Answers

// Variable to keep track of array size

int length = 0;

// Array itself

int array[] = {};

// while loop will take input in the array until a negative number is entered

while(input>=0){

stdin = new Scanner(System.in);

array[length] = stdin;

length +=1;

}

// int variable to terminate while loop

int i =0;

// keep track of index of output array

int y =0;

while(arr[i] != length){

// making output array

int output[]={}; bool flag;

// put the element in out put array considering if it the desired one

output[y] = array [i];

// Now check if it was the desired?

for(int z=1;z<=length;z++){

if(array[i+z]!=output[y]){

 flag = true;

}

else

{

 output[y]=0;

 y+=1;

}

if(array[i+z+1]=output[y] && flag == true){

output[y] = array[i];

y+=1;

}

}

//output the array

for(int o=0;o<y;o++)

System.out.println(output[o];

Final answer:

To solve this problem, use a loop to read the sequence of non-negative integers terminated by a negative number. Compare each number with the previous number and increment a counter if they are the same. Print the value of the counter representing the number of consecutive duplicates encountered.

Explanation:

To solve this problem, we can use a loop to read the sequence of non-negative integers terminated by a negative number. We can keep track of the consecutive duplicates encountered by comparing each number with the previous number. If they are the same, we increment a counter. If they are different, we continue with the next number. Finally, we print the value of the counter, which represents the number of consecutive duplicates encountered.

Which of the following is a communications device that connects multiple computers together and transmits data to its correct destination on a network?

A. A router
B. An Ethernet card
C.A network card
D. A modem

Answers

Answer: Router

Explanation:

An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE. What information must be supplied to the IDE during this process? Choose 3 answers: - The environment into which the changes was deployed - The related change set connection Information - The username and password of the destination environment - The data of the fields which are being deployed - The metadata components that need to be deployed

Answers

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

What type of slide show is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer? A. Photo album B. OLE C. Office Clipboard D. Brochure

Answers

Answer:

C. Office Clipboard

Explanation:

An Office Clipboard is a type of slide show that is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer.

Answer:

A:Photo album

Explanation:

Organizing photos into a slide show is an effective technique for a business to showcase its products and services. Rather than a static brochure, a slide show is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer. Photo album slide shows can be presented at a conference booth, online, or distributed through email.

Compose a C++ function named getSpeed that uses a reference parameter variable named speed to accept an integer argument. The function should prompt the user to enter a number in the range of 20 through 70. The value entered by the user should be validated and stored in the parameter variable. Set the parameter variable to zero if the user enters a number outside the range of 20 through 70. void getSpeed (int &speed) { Cout << “Enter a number in the range between 20 and 70” << endl; Cin>>speed; If ( speed <=20 || speed >= 70) Speed = 0; }

Answers

// Making the function

void getSpeed(int &speed){

// initialize the variable to take input

int input =0;

cout << " Enter the Number in range of 20 through 70 : "<<;

cin>>input;

// validate the input

if(input>=20 && input<=70)

 speed = input;

else

 speed = 0;

}

Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006. A boolean variable named recalled has been declared. Given a variable modelYear write a statement that assigns true to recalled if the value of modelYear falls within the two recall ranges and assigns false otherwise. Do not use an if statement in this exercise!

Answers

//Making a variable bool to save answer

bool recalled = false;

//Making the modelyear variable

int modelYear = 0;

//taking input from user

Scanner input = new Scanner(System.in);

modelYear = input.nextInt();

//check statement to see if the input is in range

if((modelYear >=1995 && modelYear <=1998) || (modelYear <=2004 && modelYear <=2006 )

{

recalled = true;

}else{

recalled = false ;

}

Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive. After the loop terminates, it prints out, on a line by itself and separated by spaces, the sum of all the even integers read, the sum of all the odd integers read, a count of the number of even integers read, and a count of the number of odd integers read, all separated by at least one space. Declare any variables that are needed.

Answers

Answer:

The loop for the given scenario is shown.

while( num >= 0 )

   {

          if( num%2 == 0 )

       {

           sum_even = sum_even + num;

           count_even = count_even + 1;

       }

       else

       {

           sum_odd = sum_odd + num;

           count_odd = count_odd + 1;

       }

      cout << "Enter a positive number." << endl;

       cin >> num;

   }

Explanation:

The program uses three variables to hold the user input, sum and count of even numbers and odd numbers.

int sum_even, sum_odd, count_even, count_odd, num;

The sum variables are initialized.

   sum_even = 0;

   sum_odd = 0;

   count_even = 0;

   count_odd = 0;

Only positive input from the user needs to be considered as per the question, hence, while loop is used.

This loop will execute only if the user inputs valid number. Upon entering the negative number which is less than 0, the loop terminates.

Following this, the sum and count of even numbers is displayed followed by the sum of negative numbers.

cout << sum_even << " " << sum_odd << " " << count_even << " " << count_odd << endl;

The c++ program for the given problem statement is as follows.

#include <iostream>

using namespace std;    

int main()  

{      

   // variables declared for sum and input

   int sum_even, sum_odd, count_even, count_odd, num;    

   // sum initialized to 0

   sum_even = 0;

   sum_odd = 0;

   count_even = 0;

   count_odd = 0;

   

   cout << "This program calculates the sum and count of even and odd numbers which are positive. This program will end on invalid input." << endl;

   cout << "Enter a positive number." << endl;

   cin >> num;    

   // loop will terminate if the user inputs negative number

   while( num >= 0 )

   {

       // for even numbers, input is added to sum_even else sum_odd

       if( num%2 == 0 )

       {

           sum_even = sum_even + num;

           count_even = count_even + 1;

       }

       else

       {

           sum_odd = sum_odd + num;

           count_odd = count_odd + 1;

       }            

       cout << "Enter a positive number." << endl;

       cin >> num;

   }    

   cout << sum_even << " " << sum_odd << " " << count_even << " " << count_odd << endl;    

   return 0;    

}

OUTPUT

This program calculates the sum of even and odd numbers which are positive. This program will end on invalid input.            

Enter a positive number.                                                                                                        

23                                                                                                                              

Enter a positive number.                                                                                                        

56                                                                                                                              

Enter a positive number.                                                                                                        

78                                                                                                                              

Enter a positive number.                                                                                                        

91                                                                                                                              

Enter a positive number.                                                                                                        

-4                                                                                                                              

134 114 2 2

To accomplish the student's task, we can use a while loop to continuously read integers and accumulate sums/counters for even and odd numbers, terminating the loop when a non-positive integer is encountered. The resulting sums and counts are then printed out.

To write a loop that reads positive integers from standard input and terminates when a non-positive integer is read, we can use a while loop in a programming language such as Python. Below is an example of how this could be achieved:

sum_even = 0
sum_odd = 0
count_even = 0
count_odd = 0

while True:
   number = int(input("Enter a positive integer (or a non-positive integer to quit): "))
   if number \<= 0:
       break
   if number % 2 == 0:
       sum_even += number
count_even += 1
   else:
       sum_odd += number
count_odd += 1

print(sum_even, sum_odd, count_even, count_odd)

In this code, we initialize the variables sum_even and sum_odd to keep track of the total sum of even and odd numbers respectively. Similarly, count_even and count_odd are used to keep a count of even and odd numbers. The while loop continues to prompt the user for a number and checks if it is even or odd, updating the sums and counts accordingly. The loop breaks when a non-positive number is entered, after which it prints the sum of even numbers, the sum of odd numbers, the count of even numbers, and the count of odd numbers, all separated by spaces.

Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method should return the person's last name followed by the first initial and a period. For example, the call lastFirst("Marla Singer") should return "Singer, M." . You may assume that the string passed consists of exactly two words separated by a single space.

Answers

I'm going to assume this is Java, because you said "method" meaning it will be some sort of object oriented language, and Java's really common. Here would be the full program, but you can just take the method out isolated if you need it.

package lastname;

public class LastName {

   public static void main(String[] args) {

       // Example usage:

       String name = LastName.lastName("Garrett Acord");

       System.out.println(name);

       // Output: Acord G.

   }

   public static String lastName(String fullName)

   {

       String[] splitName = fullName.split(" ");

       return String.format("%s %s.", splitName[1], splitName[0].substring(0,1) );

       

   }

   

}

Final answer:

The method 'lastFirst' takes a full name as input and returns a string with the last name, followed by the first initial and a period. This can be implemented in a programming language like Java, and calling 'lastFirst("Marla Singer")' will return 'Singer, M.'.

Explanation:

The method lastFirst is designed to take a string input representing a person's first and last name, and return a formatted string with the last name followed by a comma, a space, the first initial of the first name, and a period. Here is how you could implement the method in Java:

public String lastFirst(String fullName) {
   int spaceIndex = fullName.indexOf(" ");
   String firstName = fullName.substring(0, spaceIndex);
   String lastName = fullName.substring(spaceIndex + 1);
   return lastName + ", " + firstName.charAt(0) + ".";
}

For example, when you call lastFirst("Marla Singer"), the method will return "Singer, M."

What is drill-down capability?
Multiple Choice
a. Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
b. The ability to look at information from different perspectives.
c. Finds the inputs necessary to achieve a goal, such as a desired level of output.
d. Enables users to get details, and details of details, of information.

Answers

Answer:

Enables the users to get details ,and details if details ,of information.

Explanation:

Drill - Down Capability is the capability that lets user to see more information by pointing and clicking on the specific element.For example - a report that displays literacy rate by state can allow the user to select a state and by clicking on it and user can see the literacy rate by county or city within that state.

Hence we conclude that option d is the correct answer that is  

Assume that two int constants,FIRST_YEAR and LAST_YEAR have already been declared and initialized with year values (like 2009, 2014), along with a double variable oil that has been initialized with the number of barrels of oil consumed in Canada in the year given by FIRST_YEAR. Write some code that uses a while statement to print on a line by itself, each of the years from FIRST_YEAR to LAST_YEAR inclusive. On each line, after the year, separated by a colon and a space, print the new value amount of oil, taking into account that each year the oil consumed increases by 20%.

Answers

// While loop

while(FIRST_YEAR < LAST_YEAR)

{

cour<<"Year : " << First_YEAR << " Oil consumed is : " << oil <<"."<<endl;

FIRST_YEAR+=1;

// calculate the 20% increase

oil = oil + (oil *.20)

}

The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program. __________

Answers

Answer: This Information Security Handbook assist and guide managers to establish and implement an information security program.

Explanation:

The handbook looks to implement adequate security programs and also to demonstrate their effectiveness.

a) True, The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program.

This handbook is published by the National Institute of Standards and Technology (NIST). Offers comprehensive advice and strategies on:

Creating effective information security policiesMaintaining effective information security practicesIntended to assist organizations in protecting their information systems

Provides detailed recommendations on:

Security controls Risk managementOther critical aspects of information security

The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program.

a) True

b) False

You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn’t seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial?

Answers

What are the following advertising methods?

Which major NIMS Component describes systems and methods that help to ensure that incident personnel and other decision makers have the means and information they need to make and communicate decisions?

Answers

Answer:

1.Communication Management

2.Information Management

Explanation:

NIMS has introduced COMMUNICATION management system that determines if the decision makers has the ways to communicate decisions. It has standards that defines the ways that can be used by the personnel to communicate the decisions in a better and efficient manner.

NIMS has also a system which is primarily introduced to check the the personnel has the information to make and communicate decisions called Information management. Again, it also has the templates that defines that how information should be spread considering the confidentiality of the information.

Communications and Information Management is the major NIMS (National Incident Management System) Component that describes systems and methods ensuring that incident personnel and other decision-makers have the means.

Who: Incident personnel and decision-makers involved in managing an emergency or disaster situation.

What: Communications and Information Management deals with the systems, tools, and methodologies used to gather, organize, manage, and disseminate information effectively. This ensures that all participants have access to the accurate and timely information required to make informed decisions and coordinate efforts.

When: Effective communication and information management need to be in place at every stage of an incident, from the initial response through to recovery. This helps in maintaining a coordinated and efficient response effort throughout the incident.

Where: These systems and methods are applied wherever an incident or emergency situation occurs. This can include local, state, and national levels, and sometimes even international scenarios, depending on the nature and scope of the incident.

Why: The primary purpose of this component is to ensure seamless information flow among incident personnel, helping to support decision-making processes and enhance overall incident management. This ultimately leads to a more efficient and effective response and recovery effort.

How: Communications and Information Management involves using various tools and technologies, such as incident command systems, public information systems, alert and warning systems, and interoperable communication systems. These tools help ensure that critical information is shared accurately and timely among all relevant stakeholders.

Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia") Write some code that reads a value into name then prints the message "Greetings, NAME" where NAME is replaced the value that was read into name.

Answers

// i am writing c++ code for the given problem...

// taking input

cout<< " Enter the name : ;

cin>>name;

// printing the message

cout << " Greetings, " << name << endl;

Pete is designing a web page for a clothing company. He wants to show the different types of clothing lines available through a video. He wishes to use Adobe Flash Player to play the videos on the website.​Pete wants to set the playback quality parameter of the movie where the display quality of the video is favored over the playback speed. Which of the following values of the quality parameter must he apply to accomplish this?​false​true​low​high

Answers

Final answer:

Pete should set the quality parameter of the video to 'high' in Adobe Flash Player to prioritize display quality over playback speed.

Explanation:

Pete is designing a web page and wants to use Adobe Flash Player to play videos with a focus on display quality over playback speed. To achieve this, Pete should set the quality parameter of the video to 'high'. When the quality parameter is set to high, it ensures that the video will be displayed with the best quality possible, even if this means that the video might buffer or play back with less speed on slower internet connections or less capable devices. This setting prioritizes the visual experience for users who want to see the clothing lines with the highest image clarity and detail.

Write a complete program that declares an integer variable, reads a value from the keyboard into that variable, and writes a single line to standard output consisting of the variable's value, twice the value, and the square of the value, separated by single spaces. Besides the numbers, nothing else should be in the line written to standard output except for the spaces separating the values.

Answers

// making the variable

int variable = 0;

// input variable

cout << "Enter the value of variable : " <<endl;

cin>>variable;

// statement for out put

cout << " Value is : " << variable << "," <<"Twice value is : "<< 2(variable) <<","<<"Sqaure is " << variable * variable <<"."<<endl;

After stating your thesis, follow up by demonstrating the importance of the topic, and explain why the audience or future audience should care about the topic. This why statement is often referred to as ______.

Answers

Answer: audience relevance

Explanation:

Most importantly when stating a thesis we should show and present how the work in the thesis is relevant to the audience. In this way we would be able to connect our research work more to the people and the audience. We should be able to state how our work is going to benefit them, what the people should do in this regard and all the dos and don't must be mentioned clearly while stating our thesis.

Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y, the message Your request is being processed is printed if response is n, the message Thank you anyway for your consideration is printed if response is h, the message Sorry, no help is currently available is printed for any other value of response, the message Invalid entry; please try again is printed.

Answers

// Here is the required switch statement on response character

switch(response){

case 'y': // case to check if the response is y

cout<<" Your request is being processed ";

case 'n': // case to check for n

cout<<" Than you, anyway for your consideration";

case 'h': // case to check for h

cout<<"Sorry \, no help is currently available.";

default : // default case

cout<< Invalid entry: please try again.";

}

Write three separate code which would use a while loop, for loop and do ..while loop to output integers 200 down to 50 with their squares listed besides the integers which increments by steps of -10

Answers

Answer:

The c++ program using for loop is given below.

#include <iostream>

using namespace std;

int main() {

   int sq, i;    

   cout<<"Integer"<<"\t"<<"Square"<<endl;    

   for(i=200;i>=50;i=i-10)

   {

       cout<<i<<"\t"<<"\t";

       sq=i*i;

       cout<<sq<<endl;

   }

   return 0;    

}

 

The c++ program using do-while loop is given below.

#include <iostream>

using namespace std;

int main() {

   int sq, i=200;    

   cout<<"Integer"<<"\t"<<"Square"<<endl;    

   do

   {

       cout<<i<<"\t"<<"\t";

       sq=i*i;

       cout<<sq<<endl;

       i=i-10;

   }while(i>=50);    

   return 0;

}

 

The c++ program using while loop is given below.

#include <iostream>

using namespace std;

int main() {

   int sq, i=200;    

   cout<<"Integer"<<"\t"<<"Square"<<endl;    

   while(i>=50)

   {

       cout<<i<<"\t"<<"\t";

       sq=i*i;

       cout<<sq<<endl;

       i=i-10;

   }    

   return 0;

}

 

OUTPUT

Integer  Square

200  40000

190  36100

180  32400

170  28900

160  25600

150  22500

140  19600

130  16900

120  14400

110  12100

100  10000

90  8100

80  6400

70  4900

60  3600

50  2500

Explanation:

The integer variables sq and i are declared to hold the square and the integer respectively. The square of an integer is also a square hence, it is also declared as integer and not float.

The variable i is initialized to 200 as required by the question. All the three loops continue till value of i reaches 50. Once, the value goes below 50, loop is discontinued.

In for loop initialization, condition and decrement, all are done simultaneously.

for(i=200;i>=50;i=i-10)

In do-while and while loops, variable declaration and initialization are done simultaneously. The condition and decrement logic is contained within the loop.

This loop executes once irrespective whether the condition is satisfied or not. From the second execution onwards, the condition is taken into account.

   do

   {

       cout<<i<<"\t"<<"\t";

       sq=i*i;

       cout<<sq<<endl;

       i=i-10;

   }while(i>=50);    

The while loop is similar to do-while loop except that the while loop executes only if the condition is satisfied.

The output for all the three loops is the same hence, output is shown only once.

Which statement is NOT CORRECT?

In a file approach to data management, the data definitions are included in each application separately.
The file approach to data management causes the same information to be stored separately for different applications.
In a file approach to data management, a change in the structure of a data file is easily handled because each application has its own data files.
In a file approach to data management, different applications could be using older and newer versions of the same data."

Answers

Option C is not correct because in file system there is problem of using same data at different place with old and new updated versions and thus change in the data on one file is not reflected on the other related files implicitly rather we will have to change the data in each file manually which is indeed not easy task. In fact that is one of the biggest drawback of file system.

Option A is correct because the files of different data has separate definitions of the topics they are about.

Option B is correct because has no reversibility and thus same data can be present on different files.

Option D is correct because because of no reversibility the files can have same records with new or old versions

Joan owns a dog walking business and read a blog post that explained search engines are a great place to generate ideas on what people are searching for. Joan starts off her research by typing in 'dog walking tip' to see what insight she can find. Fill in the blank: Joan notices that when she types in 'dog walking tip' the search engine offers some helpful suggestions on popular searches, like 'dog walking tips and tricks.' This is known as _________.

related searches
autocomplete
suggestion finder
Google search queries

Answers

Answer: autocomplete

Explanation:

autocomplete is a feature of the search engine whereby it it able to complete sentences we type based on our browsing or surfing experiences. It has a database that store all related words and phrases people use and when we type any words it provides us hints in respect of what we type next.


One who is capable of identifying existing and predictable hazards in the surroundings, or working conditions
which are unsanitary, hazardous, or dangerous to employees, and who has authorization to take prompt
corrective measures to eliminate them is a/n
O A. Competent person
O B. OSHA Compliance Officer
O C. Qualified person
O DOSHA Outreach Trainer

Answers

Answer:

A: Competent Person

Explanation:

An OSHA “competent person”, by way of training and/or experience, has knowledge of applicable standards and authority to stop work deemed hazardous or that may cause harm to an employee. He/she has the authority, given from above, to correct workplace hazards. Such authority sets OSHA’S competent person apart from OSHA’S qualified person.

You are building a small network in the office. You will need to connect two different network segments that have different network addresses. What device will you use to connect them?

Answers

Answer:

Router device

Explanation:

whenever there is need to connect two networks with different IP addresses over the internet, they are connected by routers which has the ability to define these networks uniquely over the internet.

To adjust the height of cells, position the pointer over one of the dividing lines between cells. When the pointer changes to the _______ shape, drag the dividing line to the correct position.

Answers

Answer:

double arrow shape

Explanation:

To adjust the height of the cells

1. We have to position the mouse pointer over one of the column line or the one of the row line.

2. As we place the pointer between the dividing lines, the cursor of the mouse pointer change from singe bold arrow to double arrow symbol.

3.Now press or click the left mouse button and drag the dividing lines of the   cells to the desired position to have the required width or height of the cell.

An administrator has created a new custom object in a sandbox environment and now is ready to deploy in production. How can the administrator ensure that the field-level security that was tested and approved in the sandbox environment is maintained as part of the deployment? a) Create a change set that includes the custom object and all custom fields b) Create a change set that includes the custom object and all profiles c) Create a change set that includes the custom object, check the retain field-level security option d) Create a change set for the custom object; use Data Loader to transfer field-level security

Answers

Answer:

Option D

Explanation:

Option A is rejected because adding a custom object will cost both in memory and computation power. Consider that you have 1 million users, than there will be 1 million custom objects in the memory for checking the security which is not good.

Option B is not answer because again making a custom object will cost in memory and computation power.

Option C is not good because it also makes the custom object.

Option D is selected because change sets can be made which will not cost as much as the other options are costing. Also Data Loader can have come credentials defined in it which we can use to check if the user activities are according to the rules at each level.These days these data loader object technique is used because there will be static change sets for the class of users to check security.

Which black inventor patented fifty different devices, most of them dealing with the lubrication of machines, and successfully contested claims against the genuineness of his designs?

Answers

Answer:

American engineer Elijah McCoy was born in Canada but became US citizen very young, and and made vital contributions in the United States after the Civil War such as in the progress of locomotives design and railroads in America, the automatic lubrication systems for steem engines and many other inventions among his 57 U.S. patents that made train travel more efficient.

Explanation:

public class Player implements Comparable
{
private String name;
private int goalsScored;

// other methods go here

public int compareTo(Object otherObject)
{ __________________________________
return (goalsScored – otherPlayer.goalsScored);
}
}

What statement can be used to complete the compareTo()method?
A. Player otherPlayer = otherObject;
B. Object otherPlayer = otherObject;
C. Player otherPlayer = (Player) otherObject;
D. Object otherPlayer = (Player) otherObject;

Answers

Answer:

OPtion A

Explanation:

As otherObject is coming as a parameter to the function, there must be another object of type player that it should be assigned to so that we can compare its field.

IN Option B there is syntax error that Object class is not defined, if defined also the comparison will not work because the comparison can be done for same type objects.

In Option C the right hand size is syntax error because there is no definition of it in Java.

In Option C also there is syntax error and it its right hand size is not defined.

Other Questions
Which is the most appropriate answer for this problem? Jeremy bought a sandwich for $5.98, a drink for $2.99, and an apple for $1.49. How much change will Jeremy get if he gives the cashier $20? A. exactly $9.54 B. exactly $10.46 C. about $9 D. about $10 W I L LM A R KB R A I N L I E S T which is true of african american soldiers in the civil war (T) (F) The Great Decoupling means that well-being and wealth can increase while the use of resources and production of pollution can decrease. The ratio of the lengths of corresponding parts in two similar solids is 21.What is the ratio of their surface areas?. 2:1. 8:1D. 4:1D. 6:1 HELP ME PLEASE!!! Steps would be helpful :) A 0.500 kg piece of granite is heated 21.5 C by a sitting in the sun and thereby absorbs 8.5 kcal of heat. What is the specific heat of the granite rock? which of the following accurately describes the function of motor neurons? Using the number 3,5,and 8 can you right nine proper fractions and nine improper fractions If you want someone to do something just once, you should use ______; but if you want someone to develop a deep-seated attitude that lasts, you should use ______. la.arge rewards; small rewards b.large rewards; large punishments c.small punishments; large punishments d.small rewards; large punishments Acceleration is the magnitude of average velocity. benefits of black seed and honey 22 Which of the following polynomials has a factor of x-1? A) p(x)=x^3 +x^2 -2x+1 B) q(x)=2x^3-x^2 +x-1 (Crx)= 3x^3-x-2 D) S(x)=-3x^3+ 3x +1 What is the axis of symmetry for the function shown in the graph?(*1,4)(1,-4)(1,4)(-1,3) The following answer choices contain a paragraph from a John Muir article. Read each answer choice and select the one that uses semicolons correctly. (A)Two years ago, when picking flowers in the mountains back of Yosemite Valley, I found a book. It was blotted and storm-beaten; all of its outer pages were mealy and crumbly. The paper seemed to dissolve like the snow beneath which it had been buried; however, many of the inner pages were well preserved. And although all were more or less stained and torn, whole chapters were easily readable. This is the condition of the great open book of Yosemite glaciers today; its granite pages have been torn and blurred by the same storms that wasted the castaway book. (B)Two years ago; when picking flowers in the mountains back of Yosemite Valley, I found a book. It was blotted and storm-beaten, all of its outer pages were mealy and crumbly. The paper seemed to dissolve like the snow beneath which it had been buried; however many of the inner pages were well preserved. And although all were more or less stained and torn; whole chapters were easily readable. This is the condition of the great open book of Yosemite glaciers today, its granite pages have been torn and blurred by the same storms that wasted the castaway book. (C)Two years ago, when picking flowers in the mountains back of Yosemite Valley, I found a book. It was blotted and storm-beaten; all of its outer pages were mealy and crumbly. The paper seemed to dissolve like the snow beneath which it had been buried, however; many of the inner pages were well preserved. And although all were more or less stained and torn, whole chapters were easily readable. This is the condition of the great open book of Yosemite glaciers today; its granite pages have been torn and blurred by the same storms that wasted the castaway book. (D)Two years ago, when picking flowers in the mountains back of Yosemite Valley; I found a book. It was blotted and storm-beaten, all of its outer pages were mealy and crumbly. The paper seemed to dissolve like the snow beneath which it had been buried, however, many of the inner pages were well preserved. And although all were more or less stained and torn; whole chapters were easily readable. This is the condition of the great open book of Yosemite glaciers today, its granite pages have been torn and blurred by the same storms that wasted the castaway book. Find the equation of the line that passes through the points (12,21) and (46,33). V.35r-162 Simplify:a. (-18x2y)/(3x) What happened to Havana after 1991 during the Special Period in a Time of Peace? A. The citys housing stock began to expand. B. Rural populations in eastern Cuba illegally migrated westward to the capital. C. Automobile use soared as the price of gasoline declined. D. International tourism declined. Mis Padres - Argentina muy bien.OA. conocenOB. conocesOC. sabesOD. saben A company sold merchandise for $24,000 on account with terms of 5/15, n/30. The company uses a perpetual inventory system. After two days, it received defective merchandise worth $4,000. The journal entry to record the cash receipt for the sale if the payment is received within 10 days of the invoice date would include ________. A) a debit to Cash for $20,000, a credit to Merchandise Inventory for $1,000, and a credit to Sales Revenue for $19,000. B) a debit to Cash for $19,000, a debit to Sales Discount for $1,000, and a credit to Accounts Receivable for $20,000 C) a debit to Cash for $20,000, a debit to Merchandise Inventory for $4,000, and a credit to Accounts Receivable for $24,000. D) a debit to Sales Revenue for $24,000, a credit to Accounts Receivable for $20,000, and a credit to Sales Discounts for $4,000 What is the composition of Gilsonite?