Learning Objective: To demonstrate knowledge of accessing the public/private data and methods of a class. Instructions: There are short answer questions. Type your solution in your PDF document. Problem: Continuing the previous exercise. Within main(), are the following statements syntactically legal, i.e., do they compile? If so, describe what happens when the statement is executed. If not, explain why the statement is syntactically illegal. You may write these statements in main() to solve this exercise, but do not include these statements in the Java file you submit for grading. (a) int al = 101_65.mX; (f) int a5 = cObji.getX(); (k) int a7 = cObji.getY(); (b) int a2 = H01_65.mY; (g) cObj1.setX(20); (1) cObj1.setY(20); (c) int a3 = HO1_65.A; (h) cObj2.setX(cObj.getX()); (m) int a8 = H01_65.getY(); (d) int a4 = HO1_65.B; (i) int a6 - H01_65.getX(); (n) H01_65. setY(20); (e) cObj1.H01_65 (20); G) H01_65. setx (20);

Answers

Answer 1

These are the description of the given statements to check their syntactical accuracy.

(a) int al = 101_65.mX;
Explanation:This statement is syntactically illegal. Because, There is no method called mX in the class H01_65. This is the wrong method name.

(b) int a2 = H01_65.mY;
Explanation:This statement is syntactically illegal. Because, There is no variable called mY in the class H01_65. This is the wrong variable name.

(c) int a3 = HO1_65.A;
Explanation:This statement is syntactically legal. Because, A is a static public variable of the HO1_65 class. Therefore, it can be accessed by its class name.

(d) int a4 = HO1_65.B;
Explanation:This statement is syntactically legal. Because, B is a static public variable of the HO1_65 class. Therefore, it can be accessed by its class name.

(e) cObj1.H01_65 (20);
Explanation:This statement is syntactically illegal. Because, there is no method name called H01_65 in the class. This is a wrong method name.

(f) int a5 = cObji.getX();
Explanation:This statement is syntactically legal. getX() is a public method of the class. Therefore, it can be accessed through its object name cObji.

(g) cObj1.setX(20);
Explanation:This statement is syntactically legal. setX() is a public method of the class. Therefore, it can be accessed through its object name cObj1.

(h) cObj2.setX(cObj.getX());
Explanation:This statement is syntactically legal. setX() and getX() are public methods of the class. Therefore, they can be accessed through their object names.

(i) int a6 - H01_65.getX();
Explanation:This statement is syntactically illegal. Because, there is no method called getX() in the class H01_65. This is a wrong method name.

(j) cObj1.setY(20);
Explanation:This statement is syntactically legal. setY() is a public method of the class. Therefore, it can be accessed through its object name cObj1.

(k) int a7 = cObji.getY();
Explanation:This statement is syntactically legal. getY() is a public method of the class. Therefore, it can be accessed through its object name cObji.

(m) int a8 = H01_65.getY();
Explanation:This statement is syntactically illegal. Because, there is no method called getY() in the class H01_65. This is a wrong method name.

(n) H01_65. setY(20);
Explanation:This statement is syntactically illegal. Because, there is no method called setY() in the class H01_65. This is a wrong method name.

To know more about accuracy visit:

brainly.com/question/28482209

#SPJ11


Related Questions

why CANON G1010 is the best choices than epson L3110 3in 1 Printer​

Answers

Answer:

I would say go with the canon as I have a better history with it than Epson

Explanation:

they both look similar and have similar features

Which of these lights is NOT part of the standard three-point lighting setup?
key light
backlight
fill light
background light

Answers

Answer:

i believe background lighting

Combining the definitions of three words describes a data analyst. What are the three words? Select an answer: 1. analysis, analyze, and technology 2. data, programs, and analysis 3. analyze, data, and programs 4.data, analysis, and analyze

Answers

Data, analysis, and analyze. Data analysts use data, analysis, and the ability to analyze to gather insights and trends from various sources.

What is the Data?

The data is any set of information which can be analyzed and used to make decisions. It can be collected from various sources such as surveys, research, experiments, observations, and historical records. Data can be qualitative or quantitative, and it can be structured or unstructured. Data analysis is the process of interpreting and making sense of the data in order to gain insights and make better decisions. Data analysis techniques include data mining, machine learning, and predictive analytics. Data is an important resource for businesses and organizations, as it provides valuable insights about their customers, processes, products, and services.

To learn more about Data

https://brainly.com/question/28498043

#SPJ1

In January 2006, a Shanghai court said Coffeebux's decision to use the logo and similar sounding name to Javabucks was Multiple Choice

Answers

The statement mentions a legal dispute between Coffeebux and Javabucks regarding the use of a logo and a similar sounding name. In January 2006, a Shanghai court made a decision on this matter.

However, the specific ruling of the court is not provided, making it difficult to determine the outcome of the case.

Trademark infringement and intellectual property disputes are common in the business world, especially when it comes to logos and brand names. Companies strive to protect their unique identifiers to prevent confusion among consumers and maintain their brand reputation. Legal cases involving logo and name similarities often involve claims of trademark infringement, passing off, or unfair competition.

In such cases, courts assess various factors to determine whether there is a likelihood of confusion between the competing marks. These factors may include the similarity of the marks, the similarity of the goods or services, the channels of trade, and the consumers' perception. Based on the evidence and arguments presented, the court makes a decision on whether the alleged infringing party violated the intellectual property rights of the other party.

To know more about Trademark click here: brainly.com/question/14578580

#SPJ11

you're building a new network for a small financial services startup company. security is paramount, so each organization within the company will have their own network segments separated by routers. funds are limited, and you've been asked to keep costs to a minimum. you've acquired a used fiber optic switch, and you want to use it to create a fiber optic backbone that interconnects all of the routers. you've purchased several used multi-mode gbic modules on ebay that you'll install on each router to allow them to connect to the switch.

Answers

Since  both switch and the GBIC modules use MTRJ connectors and if a person use this to connect each module to the switch with 1 meter multimode patch cables. I will say that my response is NO, this  implementation will not work.

Why would the above implementation not work?

The reason is that a person  is not permitted to use multimode patch cables with  one or single mode GBIC modules as this is ideal.

Is GBIC still used?

Not as before, the use of GBIC is known to be considered as old or obsolete, a

The gigabit interface converter, which is GBIC module is said to be a kind of a transceiver that act to converts electric currents to a ay that is known to be optical signals.

Therefore, Since  both switch and the GBIC modules use MTRJ connectors and if a person use this to connect each module to the switch with 1 meter multimode patch cables. I will say that my response is NO, this  implementation will not work.

Learn more about  network segments from

https://brainly.com/question/7181203

#SPJ1

See full question below

You are building a new network for a small startup financial services company. Security is paramount, so each organization within the company will have its own network segment separated by a router. However, funds are limited, and you have been asked to keep costs to a minimum.

You have acquired a used fiber optic switch and want to use it to create a fiber optic backbone that interconnects all of the routers. You purchased several used single mode GBIC modules on eBay that you will install in each router to allow them to connect to the switch.

Both the switch and the GBIC modules use MTRJ connectors. You connect each module to the switch with 1 meter multimode patch cables.

Will this implementation work?

When playing a software instrument, increasing the note velocity value will typically produce a sound that is ______.

Answers

When playing a software instrument, increasing the note velocity value will typically produce a sound that is louder. The note velocity value refers to the strength or intensity with which a note is played.

Increasing the velocity will make the sound produced by the software instrument louder, as it simulates a harder strike on a physical instrument like a piano or a drum.

This can be useful for creating dynamics in a musical composition, as it allows for variation in volume levels.

Additionally, the increased note velocity value may also affect other parameters of the sound, such as the attack or timbre.

However, the primary effect of increasing the note velocity is an increase in volume.

Keep in mind that the specific behavior of note velocity can vary depending on the software instrument being used, so it's always a good idea to consult the instrument's documentation or experiment with different settings to achieve the desired sound.

To know more about dynamics, visit:

https://brainly.com/question/33285572

#SPJ11

given two integers as user inputs that represent the number of drinks to buy and the number of bottles to restock, create a vending machine object that performs the following operations: purchases input number of drinks restocks input number of bottles reports inventory

Answers

A vending machine object that performs the following operations: purchases input number of drinks restocks input number of bottles reports inventory is given below

The Program

public boolean removeItemType(int index)

 {

   if (index < 0)

   {

     return false;

 }

   else

   itemCount = index;

   index--;

  return true;

 }

 public boolean reStock(int which, int qty)

{

   if (index < 0)

   {

     return false;

 }

   else

     

  return true;

 }

public class ItemType

{

private String name;

 private double price;

 private int quantity;

 public ItemType(String n, int p)

 {

   this.quantity = 0;

   this.name = n;

   if (p <= 0){

     this.price = 5;

   }

   else{

     this.price = p;

   }

 }

 public String getName()

 {

   return this.name;      

 }

 public int getPrice()

 {

   return (int) this.price;      

 }

 public int getQuantity()

 {

   return this.quantity;

 }  

public int addQuantity(int n)

 {

   if (quantity <0) {

   return -9999;  

   }

   else{

     if (quantity + n <= 10)

       quantity += n;

    return quantity;

 }

 }

 public int getItem()

 {

   if (quantity < 1){

     return -9999;

   }

   else

     this.quantity --;

   return quantity;

   

 }

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

not answered 13.not answered 14.only visited, not judged 15.only visited, not judged 16.only visited, not judged 17.only visited, not judged 18.only visited, not judged 19.only visited, not judged 20.only visited, not judged question workspace isabel received a message on her computer that appeared to be from the fbi. it informed her that her computer has been locked and she would need to pay a fee to retrieve her data. how would you describe what is happening? a. a hacker is trying to put a trojan on her computer. b. a worm has infected her computer and she needs to unplug her device. c. nothing has happened and the message is fine to ignore since she has not been home all day and her computer has not been turned on until now. d. it is most likely ransomware because it is telling her she has to verify payment information to unlock her computer.

Answers

Isabel is experiencing a situation where her computer is locked, and she is being asked to pay a fee to retrieve her data. This scenario can be described as ransomware (option D).

Ransomware is a type of malicious software that encrypts the victim's data and demands payment in exchange for the decryption key. In this case, the message appears to be from the FBI, which is a common tactic used by cybercriminals to intimidate and deceive their victims. It is important for Isabel to avoid providing any payment information and instead seek assistance from a professional to remove the ransomware and recover her data, if possible. Ignoring the message or assuming nothing has happened (option C) is not recommended, as her data might still be at risk.

To know more about malicious software visit:

brainly.com/question/14309905

#SPJ11

A company that want to send data over the internet has asked you to write a program that will encrypt it so that it may be transmitted more securely.All the data transmitted as four digit intergers.Your application should read a four digit integer enterd by the user and encrypt it as follows:replace each digit with the result of adding 7 to the digit and getting the remainder after diving the new value by 10.Tjen swap the first digit with the third,and swap the second digit with the fourth.Then print the encrpted interger.Write a separate application that inputs an encrypted four digit interger and decrypts it (by reversing the encryption scheme) to form the original number

Answers

Answer:

A java code was used to write a program that will encrypt and secure a company data that is transmitted over the Internet.

The Java code is shown below

Explanation:

Solution:

CODE IN JAVA:

Encryption.java file:

import java.util.Scanner;

public class Encryption {

  public static String encrypt(String number) {

      int arr[] = new int[4];

      for(int i=0;i<4;i++) {

          char ch = number.charAt(i);

          arr[i] = Character.getNumericValue(ch);

      }

      for(int i=0;i<4;i++) {

          int temp = arr[i] ;

          temp += 7 ;

          temp = temp % 10 ;

          arr[i] = temp ;

      }

      int temp = arr[0];

      arr[0] = arr[2];

      arr[2]= temp ;

      temp = arr[1];

      arr[1] =arr[3];

      arr[3] = temp ;

      int newNumber = 0 ;

      for(int i=0;i<4;i++)

          newNumber = newNumber * 10 + arr[i];

      String output = Integer.toString(newNumber);

      if(arr[0]==0)

          output = "0"+output;

      return output;

  }

  public static String decrypt(String number) {

      int arr[] = new int[4];

      for(int i=0;i<4;i++) {

          char ch = number.charAt(i);

          arr[i] = Character.getNumericValue(ch);

      }

      int temp = arr[0];

      arr[0]=arr[2];

      arr[2]=temp;

      temp = arr[1];

      arr[1]=arr[3];

      arr[3]=temp;

      for(int i=0;i<4;i++) {

          int digit = arr[i];

          switch(digit) {

              case 0:

                  arr[i] = 3;

                  break;

              case 1:

                  arr[i] = 4;

                  break;

              case 2:

                  arr[i] = 5;

                  break;

              case 3:

                  arr[i] = 6;

                  break;

              case 4:

                  arr[i] = 7;

                  break;

              case 5:

                  arr[i] = 8;

                  break;

              case 6:

                  arr[i] = 9;

                  break;

              case 7:

                  arr[i] = 0;

                  break;

              case 8:

                  arr[i] = 1;

                  break;

              case 9:

                  arr[i] = 2;

                  break;

          }

      }

     int newNumber = 0 ;

      for(int i=0;i<4;i++)

          newNumber = newNumber * 10 + arr[i];

      String output = Integer.toString(newNumber);

      if(arr[0]==0)

          output = "0"+output;

      return output;    

  }

  public static void main(String[] args) {

      Scanner sc = new Scanner(System.in);

      System.out.print("Enter a 4 digit integer:");

      String number = sc.nextLine();

      String encryptedNumber = encrypt(number);

      System.out.println("The decrypted number is:"+encryptedNumber);

      System.out.println("The original number is:"+decrypt(encryptedNumber));  

  }  

}

What navy website assist the educational serviced office with member tracking and rating specific statistics and testing?

Answers

NAVY ENLISTED ADVANCEMENT SYSTEM (NEAS)  is navy website assist the educational serviced office with member tracking and rating specific statistics and testing.

What education program is fully funded by the Navy?

To help eligible Servicemembers pay for their off-duty education, there are two programs: Tuition Assistance (TA) and Navy College Program for Afloat College Education (NCPACE). Both programs cover the full tuition fees charged by educational institutions for course enrollments, up to 100% (within fiscal year/career caps and limits).

What program provides on duty courses to help sailors improve their reading and mathematical skills?

The Navy ' s VOLED program provides active duty service members the opportunity to complete their high school education, earn an equivalency diploma, improve their academic skills, and enroll in vocational/ technical schools, colleges, and universities.

Learn more about NEAS

brainly.com/question/13137400

#SPJ4

In which of the following stages of the development process is a team MOST likely to interview a potential user of an app?
O A. investigating and reflecting
B. designing
C. prototyping
D. testing

Answers

B draining I’m pretty sure is the answer

A browser ___ is a separate program that adds a variety of useful features to the web browser, such as sending instant messages or playing mobile-style games.

Answers

Answer:

The correct option is;

Extension

Explanation:

A browser extensions are available small applications plug-ins that allow the modification of the web browser by customizing and changing how information flows through the browser. Browser capabilities include the hosting of varying forms of browser extensions, and settings for ad blocking. Web experiences are vastly enhanced by browser extensions by providing personalized experience.

Which SQL command would add a new field named Region to the Clients table?a. ALTER TABLE Clients ADD Region TEXT(20)b. ALTER TABLE Clients MODIFY Region TEXT(20)c. MODIFY TABLE Clients ADD Region TEXT(20)d. MODIFY TABLE Clients MODIFY Region TEXT(20)

Answers

ALTER TABLE Clients ADD Region TEXT(20) SQL command would add a new field named Region to the Clients table.

What is SQL command?
SQL (Structured Query Language) is a domain-specific language used in programming and designed for managing data held in a relational database management system (RDBMS), or for stream processing in a relational data stream management system (RDSMS). It is particularly useful for querying and manipulating data, as well as creating and modifying database schemas. SQL allows users to query a database and retrieve data in a structured format, as well as to create and modify database objects such as tables, views, indexes, and stored procedures. It also provides users with the ability to control access to data, as well as to control transactions. SQL is used by many different database systems including Oracle, Microsoft SQL Server, MySQL, and PostgreSQL.

To learn more about SQL command
https://brainly.com/question/27960551

#SPJ4

which is an ipsec protocol that authenticates that packets received were sent from the source?

Answers

Answer:Encapsulating Security Payload (ESP)

Explanation:Encapsulating Security Payload (ESP) is a member of the IPsec protocol suite. It provides origin authenticity through source authentication, data integrity through hash functions and confidentiality through encryption protection for IP packets.

what makes a good design​

Answers

Answer:

Life

Explanation:Life makes a good design or just some cottonwood fabric that 10*==^667

you are asked to help change some settings on an older smartphone. when you examine the phone, you find it doesn't have a slot for a sim card. what type of technology can you confidently say this phone is not using? (choose all that apply.) a. 4g b. 5g c. cdma with 3g d. gsm with 3g

Answers

If the smartphone does not have a slot for a SIM card, we can confidently say that the phone is not using the following technologies:


a. 4G
d. GSM with 3G

These technologies require a SIM card for connectivity. Since the phone does not have a SIM card slot, it cannot use these technologies. Both 4G and GSM with 3G require a SIM card to operate. Therefore, if the phone does not have a SIM card slot, it cannot be using these technologies.

We cannot rule out the use of CDMA with 3G or 5G based solely on the absence of a SIM card slot, as these technologies do not require a physical SIM card for operation. However, it is worth noting that 5G is a relatively new technology, and most older smartphones do not support it.

To know more about SIM card visit:

https://brainly.com/question/14100139

#SPJ11

what are block ciphers? list and discuss the different modes.

Answers

Block ciphers are cryptographic algorithms that operate on fixed-size blocks of data, encrypting or decrypting them using a symmetric key. They divide the input data into blocks and apply a series of transformations to produce the corresponding output.

Different modes of operation are used to apply block ciphers to larger amounts of data. Some common modes include:Electronic Codebook (ECB): Each block is encrypted independently, resulting in identical plaintext blocks producing the same ciphertext blocks. It lacks security for patterns in the plaintext.Cipher Block Chaining (CBC): Each block is XORed with the previous ciphertext block before encryption, providing diffusion and reducing the impact of repeating patterns.Counter (CTR): A counter value is encrypted and XORed with the plaintext to generate the ciphertext. It supports parallel encryption and decryption and does not require sequential processing.Cipher Feedback (CFB): Similar to CBC, but operates on smaller units, such as individual bits or bytes. It can provide streaming encryption and handle arbitrary-length messages.Output Feedback (OFB): Similar to CFB, but operates on the output of the block cipher rather than the ciphertext. It can provide streaming encryption and handle arbitrary-length messages.

To learn more about encrypting    click on the link below:

brainly.com/question/31831926

#SPJ11

Block ciphers are cryptographic algorithms that operate on fixed-size blocks of data to encrypt or decrypt information. They divide the input data into blocks and use a secret key to perform encryption or decryption operations.

Different modes of operation enhance the security and functionality of block ciphers by specifying how to process multiple blocks and handle data that is larger than the block size. There are several modes of operation for block ciphers, each with its own characteristics and uses. Some commonly used modes include:

1. Electronic Codebook (ECB): This mode encrypts each block independently using the same key, making it simple but vulnerable to certain attacks due to identical plaintext blocks producing identical ciphertext blocks.

2. Cipher Block Chaining (CBC): This mode XORs each plaintext block with the previous ciphertext block before encryption, providing better security than ECB by introducing diffusion.

3. Counter (CTR): This mode uses a counter value for each block, combined with a nonce and the encryption key, to generate a stream of key-dependent pseudo-random values that are XORed with the plaintext to produce ciphertext.

4. Galois/Counter Mode (GCM): This mode combines the CTR mode with a message authentication code (MAC) to provide both confidentiality and integrity of the encrypted data.

These modes, among others, offer different trade-offs between security, efficiency, and functionality. The choice of mode depends on the specific requirements and constraints of the application, such as the desired level of security, data size, and performance considerations.

Learn more about block ciphers here:

https://brainly.com/question/13267401

#SPJ11

A. Explain three of the current trends in computer hardware
platforms?

Answers

Here are three current trends in computer hardware platforms:

1. High-Performance Computing (HPC): High-performance computing focuses on developing hardware platforms capable of delivering exceptional computational power and performance.

This trend is driven by the increasing demand for processing-intensive applications such as artificial intelligence (AI), machine learning, big data analytics, and scientific simulations.

To meet these demands, hardware platforms are incorporating technologies like accelerators (such as GPUs and FPGAs), specialized processors (such as AI-specific chips), and high-speed interconnects (such as InfiniBand or Ethernet) to enable faster processing and data transfer rates.

2. Edge Computing: Edge computing is a paradigm that involves processing and analyzing data closer to the source or at the network edge, rather than relying on centralized cloud infrastructure.

This trend is driven by the increasing need for real-time or low-latency applications, the proliferation of Internet of Things (IoT) devices, and the growth of data generated at the edge.

Edge computing platforms consist of specialized hardware devices or systems deployed closer to the data source, allowing for faster data processing, reduced network latency, and improved privacy and security.

3. Quantum Computing: Quantum computing explores the potential of harnessing quantum phenomena to perform computational tasks that are intractable for classical computers.

Quantum computers use quantum bits, or qubits, which can exist in multiple states simultaneously, offering the potential for parallel processing and solving complex problems more efficiently.

While still in its early stages, quantum computing holds promise for applications in areas such as cryptography, optimization, drug discovery, and material science.

Thus, these trends in computer hardware platforms demonstrate a focus on delivering high-performance capabilities, distributed computing, and exploring the potential of quantum mechanics.

Know more about computer hardware:

https://brainly.com/question/32263857

#SPJ4

in section 2 of this lab, you used robocopy in the script to copy files from one remote machine to another. robocopy was selected because it is native to windows and is a robust tool with a variety of switches for customizing the command line. use the internet to research an alternative to robocopy that could be used in the script. explain your choice.

Answers

Rsync is an effective alternative to robocopy for use in scripts due to its cross-platform compatibility, efficient file transfer capabilities, and secure options.

Rsync is a suitable alternative to robocopy because it provides a range of features, such as delta transfer algorithm, which only transfers the differences between source and destination files, thereby saving bandwidth and time. Additionally, Rsync supports copying of file permissions and attributes, as well as compressing data during the transfer process to reduce network usage. It can also be used with SSH for secure file transfers.

Rsync is a powerful tool for copying and synchronizing files, and it can work over a network connection. It offers a wide range of options for customizing the copy operation, such as skipping certain files or folders, and preserving file permissions and timestamps.

To know more about robocopy visit :-

https://brainly.com/question/15231158

#SPJ11

smart tv has _____ intergrated with it

Answers

Answer:

an operating system

Explanation:

In 25 words if you’re explain way business people should know about marketing? 

Answers

Business people should know about marketing to effectively promote and sell their products or services, attract and retain customers, and grow their business.

What is marketing?

Marketing is an essential part of any business strategy. It involves understanding the needs and preferences of target customers, developing products and services that meet those needs, and effectively promoting and distributing them to the right audience.

By understanding marketing principles and practices, business people can make informed decisions about product development, pricing, distribution, and promotion.

Therefore, They can also analyze market trends and consumer behavior to identify new opportunities for growth and innovation. Ultimately, a strong marketing strategy can help businesses attract and retain customers, build brand recognition and loyalty, and achieve long-term success.

Learn more about marketing from

https://brainly.com/question/25369230

#SPJ1

BJP4 Self-Check 7.21: swapPairs

Write a method named swapPairs that accepts an array of strings as a parameter and switches the order of values in a pairwise fashion. Your method should switch the order of the first two values, then switch the order of the next two, switch the order of the next two, and so on.

PLEASE HELP DUE AT 11:59

Answers

Answer:

public static void swapPairs(ArrayList strList)

{

 for(int i = 0; i < strList.size() - 1; i += 2)

 {

  String temp1 = strList.get(i);

  String temp2 = strList.get(i + 1);

  strList.set(i, temp2);

  strList.set(i + 1, temp1);

 }

}

Explanation:

what is the correct syntax to replace all instances of the word mainframes to servers in a data set? select one: a. rep mainframes servers all b. c mainframes servers all c. ch,mainframes,servers,all d. rep mainframes servers all

Answers

c mainframes servers all is the correct syntax to replace all instances of the word mainframes to servers in a data set.The REPLACE primary command replaces a sequential data set, member of a partitioned data set, or z/OS® UNIX file with data you are editing.

In the partitioned data set that is presently being changed, the name of the member that needs to be replaced. REPLACE looks for a member name first when a name of eight characters or less is given and it may be a data set name or a member name. The name is used as the data set name in the absence of a member. If the member is missing, it is created by the editor. The editor writes the member to the first library in the sequence if the libraries are concatenated. Optional for this operand.

If you want to replace a sequential data set or a member of a different partitioned data set, type REPLACE without a member operand.

learn more about c mainframes servers all  here:

https://brainly.com/question/30694491

#SPJ1

In a file processing environment, descriptions for data and the logic for accessing the data are built into?

Answers

In a file processing environment, descriptions for data and the logic for accessing the data are built into application programs.

What are Computer Application?

In regards to Software classification, one can say that the application program is known to be a kind of a computer program that is said to be set up so that it can be able to carry out a particular work or task.

It is one that is often used by a lot of end-users. A good example of this applications software are Word processors, media players, and others.

Therefore, In a file processing environment, descriptions for data and the logic for accessing the data are built into application programs.

Learn more about application programs from

https://brainly.com/question/24264599

#SPJ1

ANSWER ASAP, I'LL MARK THE BRAINLIEST
A designer has created a doorbell that rings when it is pressed. What is the input in this system?

a) ringing sound
b) push-to-make switch
c) motion sensor
d) temperature sensor​

Answers

Answer:

Push to make switch

Explanation:

The sound is created after you push it. Pushing it is the input and the sound is the output

hw3.11. relative error evaluation suppose in the year 2102 that evaluating for an input parameter becomes an important operation to do quickly. as such, cpu manufacturers want to approximate this operation in hardware using a single x86 operation, f p72. as a computer engineer, you are tasked with creating the necessary components to execute the f p72 instruction. suppose that the function f hat(x) carries out the f p72 instruction for a given floating point input x. that is, f hat(x) evaluates the approximation of . write a short program that evaluates the magnitude of the relative error in approximating using f hat for the input x. f hat(x) is a function that returns the approximation for a given floating point input x. store the magnitude of the relative error in using the approximation f hat in relative error. the setup code gives the following variables: name type description f hat function a function which has the same effect as the f p72 instruction x floating point number a floating point number your code snippet should define the following variables: name type description

Answers

Below is the python program to evaluate the magnitude of relative error in approximating using f hat for input x.

Coding Part of the given problem using Python language:

# Program to evaluate the magnitude of relative error in approximating using f hat for input x

# Function to calculate relative error

def relative_error(f_hat, x):

   # Actual value of function f

   f = # code to evaluate the function f for input x

   # Approximate value of function f using f_hat

   f_approx = f_hat(x)

   # Magnitude of relative error

   relative_error = abs((f - f_approx) / f)

   return relative_error

# Test the function

x = # some value

f_hat = # function that approximates f using the f p72 instruction

relative_error = relative_error(f_hat, x)

print("Relative error: ", relative_error)

Note that the code to evaluate the function f for input x is not provided, you should use the correct math equation for f and implement it.

To learn more about Python programming, visit: https://brainly.com/question/26497128

#SPJ4


Explain the Paragraph tag and its attributes.

Answers

Answer:

Attribute Value Description

align left right center justify Obsolete Specifies the horizontal alignment of the text within a paragraph. Use the CSS text-align property instead.

Why now days 3D images are used in cartoons? What are the drawbacks of 2D image?

Answers

Answer:

There are no drawbacks

Explanation:

People just think 3D is more modern-ish. I liked 2D better, but whatever- things are changing.

Answer:

There are no drawbacks

Explanation:

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

Similarities between Off-site and On-site

Answers

Answer:

As adjectives the difference between onsite and offsite

is that onsite is on or at a site while offsite is away from a main location; in a place not owned by a particular organisation.

Other Questions
All the items on the sale rack were 75 percent off their original price.PercentsTotal75%25%100%25%25%25%25%xIf Jill bought an item on the sale rack and saved a total of $84, what is the value of x in the table above?$21$28$84$112 pls HELPPP !solve the systems of equations of x+2y=21 and -2x-y=-12 you plan to create two different resumes, one chronological and one skills-based, to apply for jobs in different industries. what information should appear on each resume? A hawk flying at 16m/s at an altitude of 182 m accidentally drops its prey. The parabolic trajectory of the falling prey is described by the equation y = 182- x/48 until it hits the ground, where y is its height above the ground and is the horizontal distance traveled in meters. Calculate the distance traveled by the prey from the time it is dropped until the time it hits the ground Answer: Do the ratios 4:12 and 5:15 form a proportion Put the following items in order from most expensive to least expensive. Item Base Price Change Direction Toaster $23. 35 36% Markup DVD $20. 36 66% Markup Headphones $69. 09 56% Markdown Jeans $55. 08 41% Markdown a. Headphones, jeans. Toaster, DVD b. Headphones, DVD, toaster, jeans c. DVD, toaster, headphones, jeans d. DVD, jeans, toaster, headphones. What is the product? (9 t minus 4)(negative 9 t minus 4) negative 81 t squared minus 16 negative 81 t squared 16 negative 81 t squared minus 72 t 16 negative 81 t squared 72 t 16 In what sense does the death of Socrates, and the question of its supposed "injustice," provide a beginning for Western philosophy? Please help me! what is C? If the amount of urine produced were different in the two conditions, how would that affect your calculation? Explain. Suppose you are walking in an airliner in flight. Use Newtons third law to describe the effect of your walk on the motion on the airliner. two causes for the fall of Rome and discuss how they could have led to the fall of the Roman empire. Why was President James Polk unwilling to go to war with Great Britain over Oregon but willing to go to war with Mexico over Texas? Please help with this help me pleaseeeeeeeeeeee someone please explain Why is the vapor pressure of a warm lake higher than the vapor pressure of a cold lake? Explain what a formal, functional, and perceptual region is and give an example each in your own words. I repeat, in your own words. Which one of the following laws most dramatically increased union bargaining power?a. Sherman Actb. Wagner Actc. Taft-Hartley Actd. Landrum-Griffin Act Consider a risk neutral entrepreneur protected by limited liability. She has assets A and must finance an investment of fixed size I > A. The project yields RS in the case of success and RF (0, RS) in the case of failure. There are three versions of the project: good (probability of success pH, no private benefit), bad (probability of success PL, private benefit b), Bad (probability of success PL, private benefit B > b). A risk-neutral monitor can at private cost c rule out the Bad version. There is a monitor who has no cash on hand - thus she cannot cofinance the project but has the monitoring skills to stop the entrepreneur from choosing the Bad project. She is protected by limited liability. Uninformed investors are risk neutral and demand a rate of return equal to 0. Assume that funding can be secured only if the entrepreneur is monitored and is induced to choose the good version of the project. 1 Compute the monitor's, the uninformed investors' and the entrepreneur's compensations in the cases of success and failure, respectively, and show that uninformed lenders get senior debt (R = RF), while informed lenders get junior debt (R = 0).