This lab focuses on inheritance and polymorphism in object-oriented programming. It demonstrates the concept of an abstract class and how child classes can inherit and extend its functionality.
In this lab, the objective is to create three classes: Item (an abstract class), Book (a child class of Item), and Periodical (another child class of Item). The Item class should have a private attribute called title, along with a getter and setter for the title. It should also have a constructor with no arguments and a constructor that takes a title as an argument. Additionally, the Item class should have an abstract method called getListing(). The Book class, which inherits from Item, should have two additional private attributes: isbn_number (for the ISBN number) and author (for the author's name). It should have getters and setters for these attributes, along with constructors that set the attributes in both the Book and Item classes. The Book class should also implement the getListing() method, which returns a string containing the book's title, author, and ISBN number.
The Periodical class, also inheriting from Item, should have a private attribute called issueNum (for the issue number). It should have a getter and setter for this attribute, along with constructors that set the attributes in both the Periodical and Item classes. The Periodical class should implement the getListing() method, which returns a string containing the periodical's title and issue number. The myCollection driver program prompts the user five times to add either a Book or a Periodical to an array of type Item. The program uses polymorphism since the Item array can hold objects of both Book and Periodical classes. The user is asked to enter 'B' for Book or 'P' for Periodical, and based on their choice, the program prompts for the corresponding information (title, author, ISBN, or issue number). Once the user has entered five items, the program displays the collection by calling the getListing() method for each item.
In summary, this lab focuses on inheritance and polymorphism in object-oriented programming. It demonstrates the concept of an abstract class and how child classes can inherit and extend its functionality. By creating a driver program that utilizes the classes and their methods, the lab reinforces the principles of encapsulation, abstraction, and inheritance.
To learn more about object-oriented programming click here:
brainly.com/question/31741790
#SPJ11
HELP MEEEEEEEEEEEEEEEEEEEEEEEEEE
Answer:
1) b. 10011
2) a. 15
3) b. 0.0005
What is the process used for creating natural
sets?
Answer:
natural sets of what thing?
Which of the following is not a top priority in mobile application development?
designing for multitouch
saving resources
designing for multiple screens
limiting the use of keyboards
designing for keyboard data entry
The designing for keyboard data entry is not a top priority in mobile application development.
In modern mobile application development, designing for keyboard data entry is not considered a top priority. This is because the majority of mobile devices, such as smartphones and tablets, primarily rely on touch-based input methods rather than physical keyboards.
The other options mentioned are considered important priorities in mobile application development:
Designing for multitouch: Mobile devices support multitouch capabilities, allowing users to interact with the screen using multiple fingers simultaneously. Mobile applications need to be designed to take advantage of multitouch gestures and provide a smooth and intuitive user experience.Saving resources: Mobile devices have limited resources such as processing power, memory, and battery life. Therefore, optimizing resource usage and implementing efficient coding practices are essential to ensure that mobile applications run smoothly and do not drain the device's resources excessively.Designing for multiple screens: Mobile devices come in various screen sizes and resolutions. Mobile applications need to be designed to be responsive and adaptable to different screen sizes and orientations to provide a consistent user experience across devices.Limiting the use of keyboards: As mentioned earlier, physical keyboards are not as common on mobile devices. Mobile applications should prioritize minimizing the dependency on physical keyboards and instead focus on touch-based interactions and virtual keyboards.In summary, while the design of mobile applications should consider various factors, designing specifically for keyboard data entry is not a top priority in mobile application development due to the prevalent use of touch-based input methods on mobile devices.
Learn more about mobile application visit:
https://brainly.com/question/31315613
#SPJ11
On a security forum, you learned that a competitor suffered a data breach when an industrial spy bypassed cloud security policies by downloading sensitive data from a company docs account and sharing it on a personal docs account. What security controls could prevent it from happening to you? choose the best response
To prevent data breaches, implement user access controls, data loss prevention measures, cloud security policies, encryption, and data protection, as well as provide employee training and awareness programs.
What security controls could prevent it from happening to you?To prevent a similar data breach, the best response would be to implement the following security controls:
1. User Access Controls: Ensure strict user access controls are in place to limit access to sensitive data only to authorized personnel. Implement multi-factor authentication, strong password policies, and regular access reviews to prevent unauthorized access.
2. Data Loss Prevention (DLP): Deploy a DLP solution that can monitor and prevent sensitive data from being downloaded or shared outside authorized systems. This can help detect and block the transfer of sensitive information to personal accounts or unauthorized locations.
3. Cloud Security Policies: Establish comprehensive cloud security policies that outline acceptable usage, data handling practices, and restrictions on sharing sensitive information. Regularly review and enforce these policies to mitigate risks.
4. Encryption and Data Protection: Encrypt sensitive data at rest and in transit to ensure its confidentiality. Implement encryption mechanisms that safeguard data stored within cloud services and secure data transfers between systems.
5. Employee Training and Awareness: Provide regular security training to employees, emphasizing the importance of data protection, recognizing phishing attempts, and adhering to security policies. Foster a security-conscious culture within the organization.
By implementing these security controls, you can enhance the protection of sensitive data, mitigate the risk of data breaches, and reduce the likelihood of unauthorized access or sharing of information.
Learn more on data breach here;
https://brainly.com/question/518894
#SPJ2
Analyze the following source code and then find the best description. void Task1(void *pvParameters)\{ for (;;) \{ if (xSemaphoreTake(mutex, 10/portTICK_PERIOD_MS) = pdTRUE) Serial.println("TaskMutex"); xSemaphoreGive(mutex); \} vTaskDelay(10/portTICK_PERIOD_MS); (a) If the semaphore is not available, the system will wait 10 ticks to see if it becomes free. (b) If the semaphore is available within 10 ms, the system will send "TaskMutex" via serial communcation. (c) If the semaphore is not available after 10 ms, the system will send "TaskMutex" via serial communcation. (d) This task will be executed every 10 ms.
The best description is (b) If the semaphore is available within 10 ms, the system will send "TaskMutex" via serial communication.
The code snippet is a task function written in C for a real-time operating system. Let's analyze the code line by line:
1. The function Task1 is defined with a void pointer argument (pvParameters), indicating that it is a task function for an RTOS.
2. The for (;;) loop represents an infinite loop, which means the task will keep executing repeatedly.
3. Inside the loop, the code checks if the semaphore (mutex) can be taken by calling xSemaphoreTake(mutex, 10/portTICK_PERIOD_MS). The second argument, 10/portTICK_PERIOD_MS, indicates a timeout value of 10 ms.
4. If the semaphore is successfully taken (xSemaphoreTake returns pdTRUE), the code executes Serial.println("TaskMutex"), which sends the string "TaskMutex" via serial communication.
5. After executing the code within the if statement, xSemaphoreGive(mutex) is called to release the semaphore.
6. The vTaskDelay(10/portTICK_PERIOD_MS) function suspends the task for 10 ms before executing the next iteration of the loop.
Based on the code analysis, the best description is (b) If the semaphore is available within 10 ms, the system will send "TaskMutex" via serial communication. The code waits for a maximum of 10 ms to acquire the semaphore, and if it succeeds, it sends "TaskMutex" via serial communication. If the semaphore is not available within 10 ms, the code moves on to the next iteration of the loop without sending anything.
To know more about serial communication, visit
https://brainly.com/question/33186106
#SPJ11
A parent downloads an app that allows him to monitor the amount of screen time his child is using on the phone. The child claims that she is only using 1 hour per day on the phone on average, but the app, over the course of 47 days, finds that the child used an average of 1.2 hours per day. The parent wants to know if the child is using an average of 1 hour per day for all days of use.
a) The 1 is equal to the the claimed value for the:
population
sample
parameter
statistic
b) The symbol for the 1 is:
¯x
π
ˆp
μ
c) The symbol for the 1.2 is:
π
ˆp
μ
¯x
d) If we conduct a simulation in order to create a distribution of sample statistics, then the distribution will be centered at approximately:
1
1.2
47
e) If we conduct a simulation in order to create a distribution of sample statistics, then the shape of the distribution will be approximately:
there is no way to know
right skewed since 1.2 is more than 1
left skewed since 1 is less than 1.2
normal (bell curve)
The specific information about the underlying data or the simulation process, it's challenging to make a definitive statement about the shape of the distribution.
a) The statement "The 1 is equal to the claimed value for the population" is unclear and seems incomplete.
It's difficult to provide a definitive answer without more context or information.
b) The symbol for the mean of a population is usually represented by the Greek letter "μ."
c) The symbol "¯x" typically represents the sample mean, not specifically the value 1.2.
The sample mean represents the average of a set of observed values from a sample.
d) If a simulation is conducted to create a distribution of sample statistics, and the average use of a child's phone on 47 days is 1.2 hours per day, then the distribution will likely be centered around the value of 1.2.
e) If a simulation is conducted to create a distribution of sample statistics, and the sample size is sufficiently large, then the shape of the distribution will often approximate a normal distribution (bell curve) due to the central limit theorem.
To know more about simulation process visit:
https://brainly.com/question/33359257
#SPJ11
why is default value use in ms access table ?
Answer:
The DefaultValue property specifies text or an expression that's automatically entered in a control or field when a new record is created. For example, if you set the DefaultValue property for a text box control to =Now(), the control displays the current date and time.
a data hierarchy is the structure and organization of data, which involves fields, records, and files. true or false?
True. A data hierarchy is a system that arranges data into levels in which each level contains specific types of data in order to provide efficient access and organization.
A data hierarchy is a system that arranges data into levels in which each level contains specific types of data in order to provide efficient access and organization. Typically, a data hierarchy is composed of three main levels: fields, records, and files. Fields are the lowest level of the hierarchy and contain specific pieces of data, such as names, addresses, and phone numbers. Records are composed of multiple fields and represent a single instance of data, such as a customer profile. Finally, files are collections of records and provide the highest level of organization. Data hierarchies make it easier to access and analyze data by organizing it into logical groupings. Additionally, they make it easier to retrieve specific pieces of data as needed, since each level of the hierarchy is organized in a predetermined structure. Data hierarchies are used in a variety of settings, from databases to spreadsheets and beyond.
Learn more about data here-
brainly.com/question/11941925
#SPJ4
List Apple's activities, resources, and capabilities.
2. From prompt 1, identify five core competencies.
3. Conduct a VRIO analysis on the five core competencies identified in prompt 2. Explain the rationale for each criterion.
Apple's Activities, Resources, and Capabilities: Activities: Designing and developing innovative consumer electronics, including smartphones, tablets, computers, and wearables. Operating the App Store and iTunes Store for digital content distribution.
Providing software services, such as iOS, macOS, iCloud, and Apple Music.
Offering online services like Apple Pay, iCloud Drive, and Apple TV+.
Retailing products through Apple Stores and online channels.
Resources: Intellectual property, including patents, trademarks, and proprietary technologies.
Strong brand reputation and customer loyalty.
Skilled workforce comprising designers, engineers, and software developers.
Extensive supply chain network and partnerships with suppliers.
Financial resources for research and development, marketing, and acquisitions.
Capabilities:
Design expertise and user-centric approach to product development.
Seamless integration of hardware, software, and services.
Strong marketing and advertising capabilities.
High-quality customer service and support.
Global distribution and retail network.
Five Core Competencies:
Design expertise and user-centric approach.
Seamless integration of hardware, software, and services.
Strong brand reputation and customer loyalty.
Marketing and advertising capabilities.
Global distribution and retail network.
VRIO Analysis:
Design expertise and user-centric approach: Valuable (V), Rare (R), Inimitable (I), Organized (O). This competency sets Apple apart by delivering aesthetically appealing and intuitive products, providing a competitive advantage that is difficult to imitate.
Seamless integration of hardware, software, and services: V, R, I. Apple's ability to create a cohesive ecosystem enhances the user experience and creates differentiation, contributing to a sustainable competitive advantage.
Strong brand reputation and customer loyalty: V, R, I, O. Apple's brand value and loyal customer base provide a significant advantage in attracting and retaining customers, leading to sustained profitability and market share.
Marketing and advertising capabilities: V, R, I. Apple's marketing prowess in creating compelling campaigns and generating buzz contributes to its success, but it can be replicated by competitors.
Global distribution and retail network: V, R, I, O. Apple's extensive retail presence and distribution channels provide a competitive advantage, enabling widespread product availability and customer accessibility.
The VRIO analysis assesses each core competency's value, rarity, imitability, and organizational support. The analysis helps identify Apple's sustainable competitive advantages, potential areas for improvement, and resource allocation strategies.
Learn more about electronics here
https://brainly.com/question/30507087
#SPJ11
Writing a program to calculate a person's BMI is an example of using a math algorithm. In the BMI case,
you used a formula to find a person's BMI and assigned the result to a category. Your program handled
possible errors. This man needs to be concerned about his potential errors.
Answer:
BMI is calculated = mass or weight in kilograms / height in meters.
Examples:
Input : height(in meter): 1.79832
weight(in Kg): 70
Output : The BMI is 21.64532402096181, so Healthy.
Explanation : 70/(1.79832 ×1.79832)
Input : height(in meter): 1.58496
weight(in Kg): 85
Output : The BMI is 33.836256857260594 so Suffering from Obesity
Explanation : 70/(1.58496×1.58496).
PLEASEEEE HELPPPP
Which key navigates a user out of Read View to the previous view?
What shape will this code make?
import turtle
Mark = turtle.Turtle()
Mark.back(80)
Mark.left(90)
Mark.forward(50)
Mark.right(90)
Mark.forward(80)
Mark.back(80)
Mark.left(90)
Mark.foward(50)
Mark.right(90)
Mark.forward(80)
why do most operating systems let users make changes
By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.
A camera detector has an array of 4096 by 2048 pixels and uses a colour depth of 16.
Calculate the size of an image taken by this camera; give your answer in MiB.
The size of an image taken by this camera is approximately 16 MiB.
How to calculate the size of an image?To calculate the size of the image taken by the camera, we need to know the total number of bits in the image.
The number of pixels in the image is:
4096 pixels × 2048 pixels = 8,388,608 pixels
The colour depth is 16, which means that each pixel can be represented by 16 bits. Therefore, the total number of bits in the image is:
8,388,608 pixels × 16 bits per pixel = 134,217,728 bits
To convert bits to mebibytes (MiB), we divide by 8 and then by 1,048,576:
134,217,728 bits ÷ 8 bits per byte ÷ 1,048,576 bytes per MiB = 16 MiB (rounded to two decimal places)
Learn more about cameras at:
https://brainly.com/question/26320121
#SPJ1
which component of aws global infrastructure does amazon cloudfront use to ensure low-latency delivery?
Amazon CloudFront uses the global infrastructure of AWS to ensure low-latency delivery. Specifically, it leverages the AWS network of edge locations around the world to deliver content to end-users with high performance and low latency. These edge locations act as a distributed network of servers that are geographically dispersed and optimized for content delivery. By caching content closer to end-users, CloudFront can reduce latency and improve delivery speed, ensuring a fast and seamless user experience.
AWS's ecosystem includes the content delivery network (CDN) Amazon CloudFront.AWS has a worldwide infrastructure that consists of an international network of edge locations.These edge sites are data centres that have been placed carefully and are geared towards content delivery.Through CloudFront, a user's content request is forwarded to the edge location that is most convenient for them.The material is subsequently served from the edge location's cache, which cuts down on round-trip time and lowers latency.To further enhance performance, CloudFront employs other strategies including HTTP/2 and TCP optimization.CloudFront can serve content with high performance and low latency thanks to AWS's worldwide infrastructure and edge locations, ensuring a quick and seamless user experience.Learn more about the AWS :
https://brainly.com/question/30582583
#SPJ11
A table has several fields related to computer data do you want the serial number field to increase by one every time you add a new record which data type would you use for the serial number field
The data type that I would use for the serial number field is Autonumber.
AutoNumber can be described as a type of data used in Microsoft Access tables to generate an automatically incremented numeric counter. It may be used to make an identity column which typically identifies each record of a table. Only one AutoNumber is allowed in each table. The data type can be called Counter in Access 2.0.
Autonumber columns can be defined as some columns that automatically generate alphanumeric strings whenever they are made. Makers can choose the format of these columns to their liking, and then rely on the system to bring about matching values that automatically fill them in at runtime.
Here you can learn more about autonumber in the link brainly.com/question/28145557
#SPJ4
17.It is a network device with two or four ports that is used to connect multiple network segments or to split a large network into two smaller, more efficient networks. It can be used to connect different types of cabling, or physical topologies but they work only in networks with the same
what is a password attack?
Answer:
A password attack is exactly what it sounds like: a third party trying to gain access to your systems by cracking a user's password.
Answer:
A hacker trying to hack into your accounts/systems by cracking your password.
!WILL GIVE BRAINLIEST!
Write a Python program that prompts the user for a word. If the word comes between the words apple
and pear alphabetically, print a message that tells the user that the word is valid, otherwise, tell
the user the word is out of range.
Answer:
word = input()
if word > "apple" and word < "pear":
print("Word is valid.")
else:
print("Word is out of range.")
1.suppose you have a memory system using fixed-size partitions with all partitions the same size, 2^16 bytes and a total main memory size of 2 ^24 bytes. in the process table there is a pointer to a partition for each resident process. how many bits are needed for this pointer?
8 bits are needed for partition pointer in fixed-size partition memory system with \(2^{16}\) byte partitions and \(2^{24}\) bytes of main memory, as each process in the process table has a pointer to one of \(2^{8}\) partitions.
To determine the number of bits needed for the partition pointer, you need to find out how many partitions there are in the main memory. If the main memory size is \(2^{24}\) bytes and each partition size is \(2^{16}\) bytes, then the number of partitions can be calculated as follows:
\(2^{24}\) bytes / \(2^{16}\) bytes per partition = \(2^{8}\) partitions
Therefore, there are \(2^{8}\) partitions in the main memory. To represent a pointer to a partition, we need log2(\(2^{8}\)) = 8 bits. So, 8 bits are needed for the partition pointer.
This means that each process in the process table has a pointer to one of the 256 partitions in the main memory. The pointer is stored as an 8-bit binary number, which can take on any value from 0 to 255, representing the partition number. When a process is swapped into main memory, its pointer is set to the partition number it is assigned to. When the process is swapped out, its partition is freed and can be reused by another process.
In this memory system, the use of fixed-size partitions with equal sizes and a pointer to a partition in the process table makes it easier to manage the allocation and deallocation of main memory. This method is called the Fixed Partition Memory Allocation technique.
Learn more about Memory Allocation here:
https://brainly.com/question/14365233
#SPJ4
Explain the simliparities or difference between a workbook , worksheet and spread sheet
Answer:
Spreadsheet vs Workbook. Summary: Difference Between Spreadsheet and Workbook is that Spreadsheet software allows users to organize data in rows and columns and perform calculations on the data. ... While Workbook is consider as whole file that can contain bundle of worksheets in it.
Explanation:
mark brainlyist
You hide three worksheets in a workbook and need to unhide them. How can you accomplish this?.
Answer:
Nevermind, I didn't get that this was for a computer.
Explanation:
To unhide the worksheets in a workbook. Choose View > Unhide from the Ribbon. The PERSONAL XLSB workbook and the book are hidden. After selecting the worksheet to reveal it, click OK.
What is a worksheet?Created in Excel, a workbook is a spreadsheet programme file. One or more worksheets can be found in a workbook. Cells in a worksheet (sometimes referred to as a spreadsheet) can be used to enter and compute data. Columns and rows have been used to arrange the cells.
Choose the worksheets you want to conceal. How to choose a worksheet.Click Format > under Visibility > Hide & Unhide > Hide Sheet on the Home tab.The same procedures must be followed, except choose Unhide to reveal worksheets.Therefore, steps are written above for unhiding a workbook.
To learn more about the worksheet, refer to the link:
https://brainly.com/question/15843801
#SPJ2
For questions 1-4, consider the following code:
num = int(input("Enter a number: "))
num = num % 4
if (num == 1):
print ("A")
elif (num == 2):
print ("B")
elif (num == 3):
print ("C")
elif (num == 4):
print ("D")
else:
print ("E")
If the user enters 5 what is output?
Answer:
A
Explanation:
if enters 5, then num takes a 5 value
num % 4 is the remainder of 5 divided by 4 that is 1
Finally num is equals to 1. For this reason the outpuut is A
cloud kicks has created a screen flow for their sales team to use when they add new leads. the screen flow collect name, email and shoe preference. which two things should the administrator do to display the screen flow?
The two things that the administrator should do to display the screen flow is option A and D:
Create a tab and add the screen flow to the page.Use a flow element and add the screen flow to the record page.How do screen flows work?Users can be guided through a business process using screen flows, which offer instructions or call scripts, urge them to fill up certain fields, and then carry out operations such as Record Create or Record Update behind the scenes.
Lastly, The way to show the flow of screen are:
Creating a Screen Flow in Salesforce: StepsStep 1: Go to Setup > Flows > Select New Flow.Step 2: Next, from all the available options, choose Screen flow.Create the record element that will create the record in step three. Step 4: A success screen that shows information about the success.Learn more about screen from
https://brainly.com/question/14205713
#SPJ1
See full question below
Cloud Kicks has created a screen flow for their sales team to use when they add new Leads. The screen flow collects name, email, and shoe preference.
Which two things should the administrator do to display the screen flow?
Choose 2 answers
ACreate a tab and add the screen flow to the page.
BInstall an app from the AppExchange.
CAdd the flow in the utility bar of the console.
DUse a flow element and add the screen flow to the record page.
23. Pilihan ganda30 detik1 ptQ. An engineer is assigned the task of reducing the air pollutants being released from a power plant that generates electricity aby burining coal. The engineer performs a variety of computer simulations to determine which techniques and methods would be most effective at reducing air pollution generated by the plant.The air pollutant that computer simulations would likely show as being the most reduced by the installation of baghouse filters in exhaust systemsPilihan jawabansulfur dioxidecarbon dioxidecarbon monoxideparticulate matter
The air pollutant that computer simulations would likely show as being the most reduced by the installation of baghouse filters in exhaust systems is Particulate matter.
PM, or particulate matter, refers to a mixture of solid and liquid droplets that are prevalent in the air. It is also known as particle pollution. Dust, dirt, soot, and smoke are a few examples of particles that can be seen with the unaided eye because they are large or dark. A microscope's electron beam is the only way to see some others because they are so tiny.
Particle pollution consists of two types of fine inhalable particles, PM2.5 and PM10, both of which have dimensions of approximately 2.5 micrometers and below. PM10 particles have an average diameter of 10 micrometers.
Just how little is 2.5 micrometers? Just one hair on your head comes to mind. The average human hair has a diameter of roughly 70 micrometers, which is 30 times greater than the greatest tiny particle.
learn more about Particulate matter here:
https://brainly.com/question/15230454
#SPJ4
The field or fields on which the records are sorted is called the ____ key.
The field or fields on which the records are sorted is called the sorting key.
A sorting key is a field or combination of fields that determine the order in which the data records are organized and stored in a database management system.
The sort key has an enormous impact on how information is retrieved and displayed in the database, and it is frequently a significant factor in determining how quickly data can be processed.
A primary key is a unique identifier for each record that serves as the foundation for relational databases. It's used to identify, define, and create relationships between tables. it's usually implemented as an auto-incrementing integer in the majority of modern databases.
To know more about sorting refer to:
https://brainly.com/question/7582873
#SPJ11
What list of numbers is created by the following code:
range(9)
Group of answer choices
0 1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8 9
1 2 3 4 5 6 7 8
0 1 2 3 4 5 6 7 8 9
Answer:
0 1 2 3 4 5 6 7 8
You are considering two different facial cosmetic surgeries
The two different facial cosmetic surgeries being considered are not specified in the question, so I am unable to provide a specific answer.
However, when considering any cosmetic surgery, it is important to thoroughly research and consult with a qualified medical professional. Factors to consider may include the desired outcomes, potential risks and complications, recovery time, cost, and personal preferences. It is advisable to gather as much information as possible, seek multiple opinions, and make an informed decision based on individual needs and goals.
Learn more about specific here;
https://brainly.com/question/27900839
#SPJ11
help please hurrry asap I WILL MARK BRAINLEST
Adam has decided to add a table in a Word doc to organize the information better.
Where will he find this option?
1 Insert tab, Illustrations group
2 Insert tab, Symbols group
3 Insert tab, Tables group
4 Design tab, Page Layout group
Answer:
4) design tab, Page layout group
Explanation:
Answer:
3 insert tab, tables group
Write the name of the tab, command group, and icon you need to use to access the borders and shading dialog box.
TAB:
COMMAND GROUP:
ICON:
MICROSOFT WORD 2016
I NEED THIS ANSWERED PLZZ
Answer:
Tab: Home Tab
Command group: Paragraph
Icon: Triangle
Explanation: