You are designing an application to support an automobile rental agency. Which of the following probably should NOT be
represented as an object?
a) Auto
b) Customer
c) Payment amount
d) Rental contract

Answers

Answer 1

The following probably should NOT be represented as an object is c) Payment amount when you are designing an application to support an automobile rental agency.

In object-oriented programming, an object represents a real-world entity or concept, and has properties (attributes) and methods (behaviors). When designing an application, it is important to decide which entities should be represented as objects and which should not. In the context of an automobile rental agency, it makes sense to represent "Auto", "Customer", and "Rental contract" as objects.

These are real-world entities with attributes and behaviors that can be modeled in the application. For example, an "Auto" object could have attributes such as make, model, year, and mileage, and behaviors such as starting, accelerating, and braking. Similarly, a "Customer" object could have attributes such as name, address, phone number, and email, and behaviors such as reserving a car, picking up a car, and returning a car. A "Rental contract" object could have attributes such as start date, end date, rental rate, and total cost, and behaviors such as generating a rental agreement and processing payment.

To know more about object,

https://brainly.com/question/21113563

#SPJ11


Related Questions

what dose a bios system do?

Answers

BIOS instructs the computer on how to preform basic functions such as booting and keyboard control. It is also used to identify and configure the hardware in a computer
Bios tells computer how to do basic functions

what statement about constructors is false? group of answer choices all constructors are passed a pointer argument constructors may take arguments you must write at least one constructor for every class classes may have more than one constructor constructors have no return type

Answers

A return type cannot exist in the constructor. It ought to produce and deliver fresh objects. Consequently, a compilation error would result.

Including a return type in a constructor declaration is not allowed. A constructor has to accept one or more input parameters. In the absence of explicitly declared constructors for the class, Java will give a default constructor. The name of the constructor should match the class name. 2) The compiler will automatically produce a default parameterless constructor for a class if you don't define one. 3) All instance variables are initialized to default values, such as 0, null, and super(), by the default constructor.

Learn more about variable here-

https://brainly.com/question/13375207

#SPJ4

What missing condition will give you the output shown?

numB = 2
while _____:
numB = numB + 3
print(numB)

Output: 11

a numB 12

c numB > 10

d numB < 10

Answers

Answer:

B

Explanation:

I hope this helps!

The missing condition that will give you the output of 11 is as follows:

numB = 2

       while numB < 10:

       numB = numB + 3

       print(numB)

       Output: 11

Thus, the correct option for this question is D.

What is the Missing condition?

The missing condition may be defined as the data value that is not stored for a variable in the observation of interest during programming or coding in the computer.

According to the context of this question, if you want an output of 11 by adding 3 with a certain number. This certain number may definitely be lower than 10. The same principle is applied in the question, where numB is added to 3 which leads to an output of 11. So, the value of numB must be lower than that of 10.

Therefore, the correct option for this question is D.

To learn more about Output in programming, refer to the link:

https://brainly.com/question/20727977

#SPJ2

Problem 5 (10 pts)

An online IT company operates a help desk chat area with 2 techs. Users access the chat system at a rate of 1 every 2 minutes. Once a chat session has started, chats are resolved in 3 minutes. If the system goes over capacity, users are diverted to a central help desk.

What is the interarrival time of help desk chat requests?

What is the offered load?

What is the probability of a user being diverted?

If a policy is enacted that no more than 5% of calls will be diverted, what is the minimum number of techs that should be employed?

Answers

Requests made through the support desk chat have a 2-minute interarrival wait. This means that on average, a new chat request arrives every 2 minutes.

According to the issue, there is one person logging into the chat system every two minutes. This indicates that the interarrival time between chat requests is 2 minutes.

The offered load can be calculated by dividing the arrival rate by the service rate. In this case, the arrival rate is 1 chat every 2 minutes and the service rate is 1 chat resolved in 3 minutes.

Arrival Rate / Service Rate = Offered Load

Offered Load = 1 chat every 2 minutes / 1 chat resolved in 3 minutes

Offered Load = 1/2 * 3/1 = 3/2 = 1.5

The offered load is 1.5.The offered load represents the amount of work the system receives compared to its processing capacity. In this case, since the arrival rate is greater than the service rate, the system is operating under a higher load.

To know more about interarrival click the link below:

brainly.com/question/31804469

#SPJ11

A store has 2 employees that earn 135 dollars altogether. If they all earn the same amount, how much does each employee earn?

Answers

$67.50
135/2=67.5
So each employee would earn $67.50

suppose you are given a binary tree t with vertices v and edges e. this tree is not necessarily a complete binary tree: i.e., every node has at most 2 children, but might only have 0 or 1 child. describe an efficient greedy algorithm to determine if t has a perfect matching. your algorithm does not have to work for non-tree graphs.

Answers

A perfect matching in a graph is a set of edges such that every vertex in the graph is incident to exactly one edge in the set. One way to determine if a tree has a perfect matching is to use a greedy approach, starting at the leaves of the tree and working towards the root.

Outline of the algorithm is as follows:

Initialize a queue with all the leaves of the tree.While the queue is not empty:Remove a vertex from the queue.If the vertex has a parent, add the parent to the queue.If the vertex has a sibling, add the sibling to the queue.

3. If the root of the tree is in the queue, the tree has a perfect matching. Otherwise, it does not have a perfect matching.

The time complexity of this algorithm is O(n), where n is the number of vertices in the tree, because every vertex is added to the queue at most once.

This algorithm works by starting at the leaves of the tree and working its way up to the root. It adds each vertex's parent and sibling to the queue, and if the root is reached, it means that every vertex in the tree is incident to exactly one edge in the set, which is the definition of a perfect matching. If the root is not reached, it means that there is at least one vertex in the tree that is not incident to an edge in the set, which means the tree does not have a perfect matching.

read more about binary tree at https://brainly.com/question/16644287

#SPJ4

definition of hibbard deletion in bst, what is the problem with it?

Answers

Hibbard deletion is a technique used to remove nodes from a binary search tree (BST) without leaving any holes while Hibbard deletion can be useful in some cases, it has a major problem known as "degeneration".

It involves replacing the node to be deleted with its predecessor or successor, and then deleting the original node. This method is called "lazy deletion" because the node is not actually removed from memory, but rather marked as deleted. Degeneration occurs when a BST has undergone multiple Hibbard deletions, resulting in an imbalanced tree with a long path from the root to the deepest leaf node.

This can lead to a decrease in the efficiency of tree operations, as well as an increased likelihood of tree-related problems such as stack overflow or memory leaks. To avoid this issue, other deletion techniques such as "eager deletion" or "lazy deletion with rebalancing" may be used instead.

Learn more about BST: https://brainly.com/question/30391092

#SPJ11

The Monte Carlo method uses ___________ for computer simulations

Answers

Answer: repeated random sampling

Explanation:

your patient has a hormone-secreting tumor of the adrenal medulla. what hormone is most likely to be secreted by this tumor?

Answers

The adrenal gland has a tumor called a pheochromocytoma. As a result, the gland produces an excessive amount of the hormones norepinephrine and epinephrine. You often develop this tumor in your 30s, forties, or 50s. Even men and women are affected by it.

What is the hormonal peak for girls?

Between both the ages of eight and 13 is when female puberty often starts. Even if it might happen later, the procedure might go on until the child is 14 years old.

What is the hormonal peak for girls?

Between both the ages of eight and 13 is when female puberty often starts. Even if it might happen later, the procedure might go on until the child is 14 years old.

To know more about hormone visit:

https://brainly.com/question/13020697

#SPJ4

SOMEONE PLEASE HELP ME PLEASE HELP ME OUT WITH THIS!!!!!!!

SOMEONE PLEASE HELP ME PLEASE HELP ME OUT WITH THIS!!!!!!!

Answers

Answer: Brainstorm

Explanation:

If there are three classes, shape, circle, and square, what is the most likely relationship among them?

Answers

Shape and Circle and Square are subclasses of Shape, which suggests a superclass relationship as the most likely explanation.

What are a shape, a square, and a circle?A circle is a spherical shape without boundaries or edges. A circle is a closed, curved object with two dimensions in geometry.A square is an unique sort of parallelogram as well as an equilateral rectangle (an equilateral and equiangular one).The two finite diagonals of a square are equal and have four axes of symmetry, much like those of any rectangle. Two right triangles are produced by the diagonal bisection of a square.A circle is a closed, two-dimensional object where every point in the plane is equally spaced from the "center" of the circle. The line of reflection symmetry is formed by all lines that traverse the circle.

To learn more about  shape, circle, and square, refer to:

https://brainly.com/question/7254468

#SPJ4

We can send a maximum of 240kbps over a noiseless channel with a bandwidth of 20KHz. How many signal levels do we need? (1 Point) 1024 99 64 256

Answers

There should be at least 64 signal levels to achieve a data rate of 240 kbps over a noiseless channel with a bandwidth of 20 KHz.

To determine the number of signal levels required, we can use the Nyquist formula. According to the formula, the maximum data rate (R) of a noiseless channel is equal to twice the bandwidth (B) multiplied by the logarithm of the number of signal levels (L).

In this case, the maximum data rate is 240 kbps and the bandwidth is 20 KHz.

So, the formula becomes:

240 kbps = 2 * 20 KHz * log2(L)

By rearranging the equation, we can solve for L:

L = 2^(240 kbps / (2 * 20 KHz))

Simplifying further, we get:

L = 2^(6)

Therefore, the number of signal levels required is 64

Learn more about bandwidth at

https://brainly.com/question/20466501

#SPJ11

A radio and communications security repairer is responsible for both radio and satellite communication systems.

True
False

Answers

i'm almost certain the answer is true

Answer:

The answer is true

Explanation:

I got it correct on the quiz

a technique known as _____ places code conforming to older standards before newer properties, providing support for old browsers but still allowing newer standards and techniques to be used by the browsers that support them.

Answers

Answer: As per listed below:

Explanation:

"Progressive Enhancement"

The technique that places code conforming to older standards before newer properties, providing support for old browsers but still allowing newer standards and techniques to be used by the browsers that support them, is called "progressive enhancement".

Progressive enhancement is a design strategy that involves building web pages with a basic, functional structure using widely supported technologies and then adding more advanced features and styling using newer technologies that are supported by modern browsers. By layering these enhancements on top of a solid foundation of basic functionality, web designers can ensure that their pages are accessible and usable by the widest possible range of users, including those with older browsers or devices that may not support the latest web technologies.

One common implementation of progressive enhancement is to use a technique called "feature detection", where the website checks whether a certain feature is supported by the user's browser before using it. If the feature is not supported, the website falls back to a simpler, more basic version of the page that still provides the core functionality. This allows the website to provide a consistent user experience across a wide range of devices and browsers, while still taking advantage of the latest web technologies where they are available.

This question has two parts : 1. List two conditions required for price discrimination to take place. No need to explain, just list two conditions separtely. 2. How do income effect influence work hours when wage increases? Be specific and write your answer in one line or maximum two lines.

Answers

Keep in mind that rapid prototyping is a process that uses the original design to create a model of a part or a product. 3D printing is the common name for rapid prototyping.

Accounting's Business Entity Assumption is a business entity assumption. It is a term used to allude to proclaiming the detachment of each and every monetary record of the business from any of the monetary records of its proprietors or that of different organizations.

At the end of the day, we accept that the business has its own character which is unique in relation to that of the proprietor or different organizations.

Learn more about Accounting Principle on:

brainly.com/question/17095465

#SPJ4

write a generator function merge that takes in two infinite generators a and b that are in increasing order without duplicates and returns a generator that has all the elements of both generators, in increasing order, without duplicates.

Answers

Here is a generator function merge that takes in two infinite generators, a and b, and returns a generator with all the elements of both generators in increasing order without duplicates.

def merge(a, b):
 curr_a = next(a)
 curr_b = next(b)
 while True:
   if curr_a == curr_b:
     yield curr_a
     curr_a = next(a)
     curr_b = next(b)
   elif curr_a < curr_b:
     yield curr_a
     curr_a = next(a)
   else:
     yield curr_b
     curr_b = next(b)


     

This function takes in two generators and loops through them one element at a time. If the two elements are the same, the element is yielded and both generators are advanced. Otherwise, the smaller element is yielded and the corresponding generator is advanced.

The above function is a bit more verbose than is strictly necessary, but it is easier to understand when given the comments. In particular, the function utilizes two while True loops, which are commonly utilized when dealing with generators. Additionally, the function employs the try-except block to account for the possibility of the two generators a and b being of different lengths.

For such  more questions on generator function:

brainly.com/question/31112159

#SPJ11

In which phase of the ethical hacking methodology would a hacker be expected to discover available targets on a network

Answers

Answer:

Scanning and enumeration.

Explanation:

In the scanning and enumeration phase of the ethical hacking methodology, a hacker would be expected to discover available targets on a network.

The scanning and enumeration phase of the ethical hacking follows the reconnaissance phase and it typically involves discovering available targets on a network for informations such as username, password, IP address etc.

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

Correct all the mistakes in the following sentence:

When you proofread look for punctuation spelling and Capitalization Mistakes.

Answers

Answer:

When you proofread, look for punctuation, spelling, and capitalization mistakes.

Explanation:

Answer:

When you proofread, look for punctuation, spelling, and capitalization mistakes.

:]

Помогите пожалуйста исправить код и ответить на вопрос задачи. Что покажет этот код? PYTHON s = ‘Hi! Mister Robert' i = 0 while (i < (len(s))) and (count==0): if s[i] == ‘?': count+=1 i+=1 if count > 0: print("Найдено") else: print ("Готово")

Answers

Answer:

It checks if "?" exists in the string s. print Найдено if found, otherwise prints Готово

Explanation:

s = ‘Hi! Mister Robert'  

i = 0  

while (i < (len(s))) and (count==0):  

   if s[i] == ‘?':  

       count+=1  

       i+=1

if count > 0:  

   print("Найдено")  

else:  

   print ("Готово")

Positives and negatives side effects of government the stimulus check


Help pls☹️

Answers

Answer:

Stımulus check ıs the check offered to cıtızens of America inorder to help them to meet thier needs at that particular point in time. This is done, if there is an unforseen circumstances that made them not to earn an income.

Some of the postitves of stimulus check include:

1. Ability of the citizens to pay for their rent and other bills.

2. Ability to do some shopping and feeding

3. It create the sense of recognition among the citizens that the government always remember them in their moment of their needs.

4. To let the working class people know that their tax payment is used judiciously in helping other citizens.

The negative side effects of stimulus check include:

1. It makes people lazy since it is free money.

2. More money would be spent in the course of trying to meet the needs of everyone.

3. People would manipulate the system thereby getting more than one stimulus pay check.

4. Working class people would be angry with the system. This is because, they wil feel that all their hard work and taxes isbeing used to feed some lazy citizens who has never contributed anything to the country.

5. It would increase the debt profile of the government.

Explanation:

how does frequency division multiplexing (fdm) enable multiple signals to share a common medium?

Answers

Frequency Division Multiplexing (FDM) enables multiple signals to share a common medium by allocating different frequency ranges to each signal. It utilizes the principle that different signals can coexist without interfering with each other as long as they operate at different frequencies.

1. Signal Separation: FDM takes multiple input signals, each with its own frequency band, and combines them into a single composite signal. Each input signal is modulated onto a different carrier frequency within its allocated frequency band.

2. Frequency Allocation: The composite signal containing all the modulated signals is transmitted over a shared medium, such as a cable or a wireless channel. Each signal is assigned a specific frequency range within the total bandwidth of the medium.

3. Signal Extraction: At the receiving end, the composite signal is received and passed through a demultiplexer, which separates the different signals based on their carrier frequencies. Each demultiplexed signal is then sent to the appropriate receiver for further processing.

By assigning distinct frequency ranges to different signals, FDM ensures that they occupy non-overlapping portions of the frequency spectrum. This allows multiple signals to be transmitted simultaneously over the same medium without interfering with each other. Each signal retains its integrity and can be reconstructed at the receiving end by filtering out the desired frequency range.

FDM is commonly used in various communication systems, including analog and digital radio broadcasting, cable television, and telecommunications networks. It enables efficient utilization of the available bandwidth by allowing multiple signals to share the same transmission medium without causing interference or degradation in signal quality.

Learn more about FDM here:

https://brainly.com/question/32216807

#SPJ11

What is an "Expert System"?

If you can’t answer pls leave It

Answers

Answer:

program that use artifical intelligents

Explanation:

Expert system, a computer program that uses artificial-intelligence methods to solve problems within a specialized domain that ordinarily requires human expertise.

Who was the first person to create a iPhone.

Answers

Answer:

steve jobs

Explanation:

Answer:

Explanation:

The great man theory has crept back into popular culture in recent years, repurposed for the world of entrepreneurs, tech start-ups and digital conglomerates. Elon Musk revolutionized the electric car. Mark Zuckerberg pioneered the social network. Steve Jobs and his team at Apple invented the iPhone.  

A power supply is an electrical transformer that regulates the electricity used by the computer. Select one: A. False B. True

Answers

Answer:

The Answer is B

Explanation:

The power supply converts AC current to DC current and protects the P.C. hardware from being fried from electrical surges. So it regulates electricity.

Does this photo look good? I took it myself for photography class

Does this photo look good? I took it myself for photography class

Answers

Yep it looks good :)
AMAZING! I LOVE IT! IT'S AWESOME!

USB 3.1 offers an improvement over its predecessors by enabling a maximum data transfer rate of up to:

Answers

Answer:

10 Gbps

Explanation:

The full form USB is Universal Serial Bus. It is used to connect to electronics as well as computers. The 3.1 USB is a recent and advance version of the USB standard. It was released in the year 2013. It can transfer data speed up to a speed of 10 Gbps.

It USB 3.1 can use the USB-C connector types and other connector types as well.

Answer each of the following questions.
Which of the following describes a hot spot?
Check all of the boxes that apply.
an unsecured wireless network
inherently vulnerable to hackers
private Wi-Fi networks available at airports,
hotels, and restaurants
susceptible to third-party viewing
DONE

Answers

Answer:

1)

a. an unsecured wireless network

b. inherently vulnerable to hackers

d. susceptible to third-party viewing

2)

Check All Boxes

Explanation:

The hotspot can be described by:-

a. An unsecured wireless network.

b. inherently vulnerable to hackers.

d. Susceptible to third-party viewing.

What is a hotspot?

A hotspot is a physical site where users can connect to a wireless local area network (WLAN) with a router connected to an Internet service provider to access the Internet, generally using Wi-Fi.

The internet is the network that set up communication between the different computers of the world by using internet protocols to share data in the form of documents, audio, and videos.

A computer network that uses wireless data links between network nodes is referred to as a wireless network. Homes, telecommunications networks, and commercial installations can all connect via wireless networking.

Therefore, an unsecured wireless network., inherently vulnerable to hackers, and susceptible to third-party viewing describe the hotspot.

To know more about hotspots follow

https://brainly.com/question/7581402

#SPJ2

If you are one of the famous CEO now a days, what kind of product you can share to the world

Answers

Answer:

cosmetics

Explanation:

for beauty and to help young people to make they glow up

The temperature at 8 AM was 44°F and at noon it was 64°F. what was the percent of change from 8 AM to noon?

Answers

Answer: 45.45%

Explanation:

Time Passed: 4 hours

Difference in Temperature: 20°F

20/44 = .45454545454545

.45454545454545*100 = 45.45%

Correct me if I am incorrect.

Other Questions
Consider an infinitely repeated game in which, in each period, two firms with zero costs choose quantities and prices are given by: Pi = 1 -q1-q2/2, P2 = 1 - q2-q 1/2. Firms have a common discount factor of d = 1/2. a) Explain what a trigger strategy is and determine whether the firms can attain the joint profit maximising outcome in a subgame perfect equilibrium using trigger strategies. b) Explain what a stick and carrot strategy is and discuss whether it is possible to attain the joint-profit maximising outcome in a subgame perfect equilibrium using stick and carrot strategies. Read the paragraph below. Soon after the moving truck departed, I made way next door to greet the new neighbors. A boy was playing in the yard, and I greeted him and introduced myself. In response, the boy ducked his head and mumbled an inaudible reply. Though he smiled, he quickly retreated toward his mother on the porch. When I said, "Welcome to the neighborhood, his cheeks turned pink, and he disappeared through the open front door. What inference can be drawn about the boy? A He is upset by the narrators intrusion. B He creates imaginative games with others. C He prefers his friends from his old neighborhood. D He is shy and uncomfortable in new situations. please help me i will mark brianliest Which law was passed in 1862 to encourage Americans to settle on the Great Plains? How do the proportions of the population compare that are identified as intellectually disabled or as gifted? If you were able to study one of the parasites discussed in the lesson, which one would you choose to study? why? imagine that you are sorting a small set of computer files by their file name. you realize, however, that each computer file is huge and takes up a lot of disk space, so you do not want to copy excessively when sorting. in fact, even just moving and rearranging these large files is expensive, so you dont want to move them often. Which is equivalent to 2=512 ? (A) log 2=9 (C) log 9=512 (B) log 512=9 (D) log 512=2 Cooking methods 1, what are the types of dry - heat cooking methods and which food items are best suited for them .Culinary arts class What is the effect of recording depreciation expense on the accounting equation? (Check all that apply.)-Total stockholders' equity increases.-Total assets decrease.-Total stockholders' equity decreases.-Total assets increase.-Total liabilities increase.-Total liabilities decrease. R(-1,0), S(3, 0), T(2, -3), U(-3, -2);Distance Formula On what occasion does the Mariner tell his story? Why do you think Coleridge chose this occasion for the poem? Multiple-choice questions each have five possible answers(a,b,c,d,e),one of which is correct. Assume that you guess the answers to 3 such problem:a. Use the multiplication rule to find the probability that the first 2 guesses are wrong and the 3rd is correct.b. Beginning with 2wrong and 1 correct,(WWC), make a complete list of all possibilities of 2 wrong and 1 correct, then find the probability for each.c. Based on the preceding results, what is the probability of getting exactly one correct answer when 3 guesses are made? Exercise 2 Draw a line under the subject. Then write the form of the verb in parentheses that agrees with the subject. Use the present tense of the verb when you write it.A moat, together with armed knights, ______________ the castle. (surround) electrophoresis for inactive inhibitor detection of cleaved c1inh by sodium dodecyl sulfate polyacrylamide gel electrophoresis (sds page) and immunoblotting use the given value to evaluate the function. sin(t) = 3 5 (a) sin( t) (b) sin(t ) Chuck, a single taxpayer, earns $76,000 in taxable income and $1 in interest from an investment in city of heflin bonds. if chuck earns additional 40,000 of taxable income, what is the marginal tax rate on this income? When looking at the book in front of you, you probably perceive it as rectangular rather than trapezoidal, as it appears on your retina. this shows the importance of:________ The following sentence contains a transitional word or phrase: The commercial had promised bounce and shine instead her hair was dull and limp as ever. Which revision correctly punctuates the sentence In Figure 26.4, which similarly inclusive taxon descended from the same common ancestor as Canidae? a. Felidae b. Mustelidae c. Carnivora d. Lutra For Year 2, the Sacramento Corporation had beginning and ending Retained Earnings balances of $161,967 and $193,900, respectively. Also during Year 2, the board of directors declared cash dividends of $17,100. which were paid during Year 2. The board also declared a stock dividend, which was issued and required a transfer in the amount of $13,500 to paid-in capltal. Total expenses during Year 2 were $34.916. Based on this information, what was the amount of total revenue for Year 2? 01:45:00 eBook Multiple Choice $97,449 $83,949 $144,867