Answer
b
Explanation:
What is the best way to deal with a spam
Simply ignoring and deleting spam is the best course of action. Avoid responding to or engaging with the spam communication because doing so can let the sender know that your contact information is still live and invite additional spam in the future. Additionally, it's critical to mark the email as spam using your email program or by reporting it to the relevant authorities. Make careful to report the spam to the proper authorities for investigation if it appears to be a phishing scheme or contains hazardous content.
Giving reasons for your answer based on the type of system being developed, suggest the most appropriate generic software process model that might be used as a basis for managing the development of the following systems: • A system to control anti-lock braking in a car • A virtual reality system to support software maintenance • A university accounting system that replaces an existing system • An interactive travel planning system that helps users plan journeys with the lowest environmental impac
There are different kinds of systems. the answers to the questions is given below;
Anti-lock braking system: Is simply known as a safety-critical system that helps drivers to have a lot of stability and hinder the spinning of car out of control. This requires a lot of implementation. The rights generic software process model to use in the control of the anti-lock braking in a car is Waterfall model. Virtual reality system: This is regarded as the use of computer modeling and simulation that helps an individual to to be able to communicate with an artificial three-dimensional (3-D) visual etc. the most appropriate generic software process model to use is the use of Incremental development along with some UI prototyping. One can also use an agile process.University accounting system: This is a system is known to have different kinds of requirements as it differs. The right appropriate generic software process model too use is the reuse-based approach.
Interactive travel planning system: This is known to be a kind of System that has a lot of complex user interface. The most appropriate generic software process model is the use of an incremental development approach because with this, the system needs will be altered as real user experience gain more with the system.
Learn more about software development from
https://brainly.com/question/25310031
Can someone help me with this code please explain it to me in simple way
it's anstance variable in jave public class Record{
public String name;// this instance variable is visible for any child class.
private int age;// this instance age variable is visible in Record class only.
public Record (String RecName)
{
name = RecName;
}
public void setAge(int RecSal)
{
age = RecSal;
}
public void printRec()
{
System.out.println("name : " + name ); // print the value for “name”
System.out.println("age :" + age); //prints the value for “age”
}
public static void main(String args[])
{
Record r = new Record("Ram");
r.setAge(23);
r.printRec();
}
}
Output:
name : Ram
age :23
Answer:
It prints your name and age.
Explanation:
It prints the value for both name and age variables, so you need away to get it.
Given a list of twenty number count the numbers among the list
Answer:
Thank you for the points<33
Automated implementation of an application's build, test, and deployment process is called as _____________________.
Answer:
Deployment pipeline.
Explanation:
Automated implementation of an application's build, test, and deployment process is called as deployment pipeline.
Generally, the main components of the deployment pipeline are the; build automation, test automation and deployment automation.
The main purpose why software engineers use the deployment pipeline is to enable them avoid any waste in the software development process, and to avail them the opportunity to give a rapid feedback to the production team during deployment of the software application. This ultimately implies that it involves the process of picking up a code from version control and presenting it to the end users of the software application in an automated manner.
Since, it is done automatically it helps to mitigate human errors and to meet customer's requirements.
LAB: Contact list A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings). That list is followed by a name, and your program should output the phone number associated with that name. Assume that the list will always contain less than 20 word pairs. Ex: If the input is: 3 Joe 123-5432 Linda 983-4123 Frank 867-5309 Frank the output is: 867-5309
Answer:
The program in Python is as follows:
n = int(input(""))
numList = []
for i in range(n):
word_pair = input("")
numList.append(word_pair)
name = input("")
for i in range(n):
if name.lower() in numList[i].lower():
phone = numList[i].split(" ")
print(phone[1])
Explanation:
This gets the number of the list, n
n = int(input(""))
This initializes list
numList = []
This iterates through n
for i in range(n):
This gets each word pair
word_pair = input("")
This appends each word pair to the list
numList.append(word_pair)
This gets a name to search from the user
name = input("")
This iterates through n
for i in range(n):
If the name exists in the list
if name.lower() in numList[i].lower():
This gets the phone number associated to that name
phone = numList[i].split(" ")
This prints the phone number
print(phone[1])
1. image-editing software
software used to create technical drawings
2. PDF
software used to create a slide show
3. presentation software
software that organizes a collection of information
4. CAD
software used to enhance photographs
5. database software
Portable Document Format
Done
which country did poker originate from?
Poque, a game that dates back to 1441 and that was supposedly invented in Strasbourg, seems to be the first early evidence of the French origin of the game. Poque in particular used a 52-card deck
France/French
Which statement is true?
1)A deque is a type of collection,
2)A collection is a type of deque.
3)A list is a type of deque.
4)A deque is a type of list.
Answer:
1. A deque is a type of collection.
Explanation:
The statement that is true is as follows:
A deque is a type of collection.Thus, the correct option for this question is A.
What is Deque?Deque may be defined as an ordered and systematic collection of items similar to the queue. It is also known as a double-ended queue. It consists of two ends, a front, and a rear, and the items remain positioned in the collection.
According to the context of this question, a deque is a kind of collection that holds data and information identical to a queue. From here, elements can be added to or eliminated from either the front or back very efficiently.
It is also often called a head-tail linked list. Though properly this signifies specific data with appropriate structure that has been the implementation of a deque.
Therefore, a deque is a type of collection that is a true statement. Thus, the correct option for this question is A.
To learn more about Deque, refer to the link:
https://brainly.com/question/16750037
#SPJ2
QUESTION 10
If there is an Apple logo somewhere on your computer, more than likely your computer runs what type of operating system?
O Linux
Windows
macos
Unix
how i want to be good in coding for subject c programming? anyone has a suggestion?
Answer:
Get more details about Standard Library Functions in C.
Use logical variable names to avoid any confusion.
Don't forget to check a complete guide for Variables in C.
Explore how Escape Sequence in C make your coding better.
1. Identify two real-world examples of problems whose solutions do scale well.
2. Identify two real-world examples of problems whose solutions do not scale well.
3. Identify one problem that is so complex that there is no computational solution to feasibly solve the problem in a reasonable amount of time.
1. Identify two real-world examples of problems whose solutions do scale well.
ANSWER; Real word examples of
problems whose solutions do scale well are;
- To find the smallest/ largest element in a list of data.
This is used when there is trial to find from a table the person that posseses the largest attribute.examples are salary and age.
Or it is also used when finding the highest score on a test, however,this is scalable as it can be done by both humans and machines according to the problem size but in the same fashion.
- Solving simple arithmetic equations.
Solving a simple arithmetic problem is one of an easily scaled problem, however,this depends on the number of operations and the variables present in the equation and which corresponds to daily life situations like adding, finding mean and counting.
2. Identify two real-world examples of problems whose solutions do not scale well.
Real word examples of problems which do not scale well are;
- The sorting of a large list of numbers do not scale well,this is because as the steps required increases as square or increases as more by the increase in size.
- Multiplication of matrices for various applications.example of this is like solving equations.
3. Identify one problem that is so complex that there is no computational solution to feasibly solve the problem in a reasonable amount of time.
Example of a problem that is not feasible computer-wise would be to find the optimal way or best to play the game of Chess. Here, it is possible to tell a good move but to tell the best move is computationally not possible.
Suppose we define a WaitlistEntry as follows:
typedef struct{
int iPriority; /* Priority of the student to be enrolled */
int iStudentID; /* ID of the student */
}
WaitlistEntry;
Below are different implements of a function to create a WaitlistEntry from given iPriority and iStudentID data. Some of these implementations are flawed. Identify them and describe what is wrong with them briefly:
WaitlistEntry createWL( int iPriority, int iStudentlD )
WaitlistEntry w,
w.iPriority iPriority;
w.iStudentlD iStudentlD;
return w;
a. correct
b. incorrect, leaks memory
c. incorrect, syntax error
d. incorrect, data will be overwritten by next function call
Answer:
You have syntax errors, but I don't know if it happened when you posted this question, nevertheless
Explanation:
Correct code:
WaitlistEntry createWL( int iPriority, int iStudentID ) { // Opening Brace
WaitlistEntry w; // Should be ; not ,
w.iPriority = iPriority; // Assign Missing
w.iStudentID = iStudentID; // Assign Missing
return w;
} // Closing Brace
// Also note: iStudentID this actually has an 'l' which is LD. Not ID, this is why I assume these errors happened when posting the question.
Create a static method that: - is called appendPosSum - returns an ArrayList - takes one parameter: an ArrayList of Integers This method should: - Create a new ArrayList of Integers - Add only the positive Integers to the new ArrayList - Sum the positive Integers in the new ArrayList and add the Sum as the last element For example, if the incoming ArrayList contains the Integers (4,-6,3,-8,0,4,3), the ArrayList that gets returned should be (4,3,4,3,14), with 14 being the sum of (4,3,4,3). The original ArrayList should remain unchanged.
Answer:
The method in Java is as follows:
public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {
int sum = 0;
ArrayList<Integer> newArr = new ArrayList<>();
for(int num : nums) {
if(num>0){
sum+=num;
newArr.add(num); } }
newArr.add(sum);
return newArr;
}
Explanation:
This defines the method; it receives an integer arraylist as its parameter; nums
public static ArrayList<Integer> appendPosSum(ArrayList<Integer> nums) {
This initializes sum to 0
int sum = 0;
This declares a new integer arraylist; newArr
ArrayList<Integer> newArr = new ArrayList<>();
This iterates through nums
for(int num : nums) {
If current element is greater than 0
if(num>0){
This sum is taken
sum+=num;
And the element is added to newArr
newArr.add(num); } }
At the end of the iteration; this adds the calculated sum to newArr
newArr.add(sum);
This returns newArr
return newArr;
}
In order to average together values that match two different conditions in different ranges, an excel user should use the ____ function.
Answer: Excel Average functions
Explanation: it gets the work done.
Answer:
excel average
Explanation:
Advika needs to send files from one computer to another computer. Which of the following methods is the simplest ways to accomplish this task?
Make sure the two PCs are joined with the same Wi-Fi networks. Locate the file you want to send using File Explorer.
What is a computer?
A laptop is an electronic tool for handling data or information. It has the power to store, retrieve, and process data. You may already be aware of the fact that a computer may be used to make a report, send emails, play games, and surf the Internet.
What component of a computer is most vital?
Your computer's "brain" is the central developed the ability (CPU), often known as the processor. The complex calculations and programming that your computer performs while running apps or programs are all handled by the CPU.
To know more about computer visit:
https://brainly.com/question/21474169
#SPJ1
The Footnote Text style defines characters as ____________.
Question 2 options:
12 point Times New Roman and paragraphs as single-spaced and right aligned
10 point Times New Roman and paragraphs as double-spaced and left-aligned
12 point Times New Roman and paragraphs as double-spaced and right-aligned
10 point Times New Roman and paragraphs as single-spaced and left-aligned
Answer:
D 10 point Times New Roman and paragraphs as single-spaced and left-aligned
what are the three main components of an operating system? define each of them.
The three main components of an operating system are:
1. manage the computer's resources (this includes the central processing unit, memory, printers, and disk drives).
2. establish a user interface (this is where the human interacts with a computer, website or application. the UI, also known as user interface, is to make the user's experience easy and intuitive).
3. execute and provide services for applications software (this is the interface between the application program and the hardware, which gets carried out from OS).
differentiate between cu and mu
Control Unit is 5he part of computer where data is store to CPU.
MU directs the entire computer system to carry out stored programs..
At one time, a station sign-off test pattern was designed so TV owners could adjust the quality of their picture and sound
true or false?
Answer:
true
Explanation:
Directions Interview your parent or any member of your family. Identity
v. Performance Tasks
sources of your family income. Classify the types of your family
income if it is Money Income, Real Oncome or Psychic income
Answer:
Total family income is first classified by it's four major source, earings of a male head , earings of a wife or female head , earings of a family members , and property or transfer income.
Is the intersection of a column and a row
A Cell hope you enjoy your answer
Write full forms of the following: a. CPU b. GHz C. GIGO f. DVD h. CBT k. GUI d. E-mail 1. ICU e. CD j. ECG В CAT
Answer:
A) Central processing unit
B)Gigahertz
C)garbage in, garbage out
f)digital versatile disc
h)Cognitive-behavioral therapy
k)Graphical user interface
d)electronic mail
1)interface converter unit
e)compact disc
j)electrocardiogram
B cat)Brief Cognitive Assessment Tool
You are a systems analyst. Many a time have you heard friends and colleagues complaining that their jobs and businesses are being negatively impacted by e-commerce. As a systems analyst, you decide to research whether this is true or not. Examine the impact of e-commerce on trade and employment/unemployment, and present your findings as a research essay.
E-commerce, the online buying and selling of goods and services, has significantly impacted trade, employment, and unemployment. This research essay provides a comprehensive analysis of its effects.
What happens with e-commerceContrary to popular belief, e-commerce has led to the growth and expansion of trade by breaking down geographical barriers and providing access to global markets for businesses, particularly SMEs. It has also created job opportunities in areas such as operations, logistics, customer service, web development, and digital marketing.
While certain sectors have experienced disruption, traditional businesses can adapt and benefit from e-commerce by adopting omni-channel strategies. The retail industry, in particular, has undergone significant transformation. E-commerce has empowered small businesses, allowing them to compete with larger enterprises and fostered entrepreneurial growth and innovation. However, there have been job displacements in some areas, necessitating individuals to transition and acquire new skills.
Read mroe on e-commerce here https://brainly.com/question/29115983
#SPJ1
Which three statements about RSTP edge ports are true? (Choose three.) Group of answer choices If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status. Edge ports can have another switch connected to them as long as the link is operating in full duplex. Edge ports immediately transition to learning mode and then forwarding mode when enabled. Edge ports function similarly to UplinkFast ports. Edge ports should never connect to another switch.
Answer:
Edge ports should never connect to another switch. If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status. Choose all that Apply: Which of the following steps should be performed by the CIS for creating a part dispatch for systemboard through Tech Direct?
a) Enter the customer's contact and email address into the primary contact fields when requesting a systemboard through TechDirect
b) Logging fusion ticket to request DPK via DDL
c) Access the customer's DDL account to retrieve DPK and activate the os for the customer
d) Verify the customer email address
Answer:
The steps that should be performed by the CIS for creating a part dispatch for system board through TechDirect are:
a) Enter the customer's contact and email address into the primary contact fields when requesting a system board through TechDirect
b) Logging fusion ticket to request DPK via DDL
c) Access the customer's DDL account to retrieve DPK and activate the os for the customer
d) Verify the customer email address
Explanation:
The four steps given above must be performed in the CIS if you want to create a part dispatch for the system board through TechDirect. TechDirect is a support system that enables one to manage all Dell technologies from a single location. After creating the part dispatch, the customer's contact and email address are entered into the primary contact fields to enable the verification of the customer's email address through the TechDirect.
Numbering exception conditions, which often uses hierarchical numbering, in a fully developed use case description is helpful to _______. a. tie the exception condition to a processing step b. show which exception conditions are subordinate to other exceptions c. provide an identifier for each exception condition d. tie exception conditions to other diagrams or descriptions
Answer:
a) tie the exception condition to a processing step
Explanation:
Numbering exception conditions, in a fully developed use case description is helpful to tie the exception condition to a processing step
The fully developed use case description is useful for the documentation of the context, purpose, description, conditions, and workflow of each use case. Activity diagrams give a graphical image of the use case workflow and serve the purpose of illustrating the alternative paths through a business process.
In devising a route to get water from a local lake to its central water storage tank, the city of Rocky Mount considered the various routes and capacities that might be taken between the lake and the storage tank. The city council members want to use a network model to determine if the city's pipe system has enough capacity to handle the demand.
1. They should use ____________.
A. Minimal Spanning Tree Method
B. Shortest Path Method
C. Maximal Flow Method
D. Any of the above will do
Answer:
C. Maximal Flow Method
Explanation:
When it comes to optimization theory, Maximal Flow Method or problems have to do with finding a possible or viable flow through a flow network that obtains the maximum potential flow rate. The maximum flow problem can be viewed as an exceptional case of more complex and complicated network flow problems, such as that of the circulation problem.
what is the process for creating a new merge document for adress lables ?
Answer:
on Microsoft Word 2013 Mail Merge?
Explanation:
Open on the "Mailings" tab in the menu bar.
Click "Start Mail Merge."
Select "Step-by-Step Mail Merge Wizard."
Choose "Labels" and click "Next: Starting document."
Select the "Start from a template" option and click "Next: Select recipient."
HACK ATTACK (MyPltw) MIT app inventor (1.2.2) - I need help on doing the actual hacking algorithm. If someone has done it before please show me how. These blocks are the ones that need to be edited.
Answer: 1.4.3.6.2 Is the order they should be in from there!!!
Explanation: