Answer:
d) The speak method defined in the Dog class will be called.
Explanation:
In this code, a new instance of the Dog class is created and assigned to a variable of type Animal. When the method speak() is called on this instance using the variable spot, the overridden version of speak() in the Dog class will be called, since method calls are determined at runtime based on the actual object type, not the variable type. Therefore, option d) is the correct answer.
The dealer’s cost of a car is 85% of the listed price. The dealer would accept any offer that is at least $500 over the dealer’s cost. Design an algorithm that prompts the user to input the list price of the car and print the least amount that the dealer would accept for the car. C++
Here is an algorithm in C++ that prompts the user to input the list price of the car and prints the least amount that the dealer would accept for the car:
#include <iostream>
using namespace std;
int main() {
double list_price, dealer_cost, min_accepted_price;
const double DEALER_COST_PERCENTAGE = 0.85;
const double MIN_ACCEPTED_PRICE_OVER_COST = 500;
cout << "Enter the list price of the car: ";
cin >> list_price;
dealer_cost = list_price * DEALER_COST_PERCENTAGE;
min_accepted_price = dealer_cost + MIN_ACCEPTED_PRICE_OVER_COST;
cout << "The least amount the dealer would accept for the car is: $" << min_accepted_price << endl;
return 0;
}
The algorithm starts by including the library iostream and declaring the namespaces. Then it declares the variables that will be used in the program (list_price, dealer_cost, min_accepted_price) and the constants that will be used (DEALER_COST_PERCENTAGE and MIN_ACCEPTED_PRICE_OVER_COST). Then it prompts the user to enter the list price of the car. Next, it calculates the dealer's cost by multiplying the list price by the dealer cost percentage and the minimum amount the dealer would accept by adding the dealer's cost to the minimum accepted price over cost. Finally, it prints the least amount the dealer would accept for the car.
Giving reasons for your answer based on the type of system being developed, suggest the most appropriate generic software process model that might be used as a basis for managing the development of the following systems: • A system to control anti-lock braking in a car • A virtual reality system to support software maintenance • A university accounting system that replaces an existing system • An interactive travel planning system that helps users plan journeys with the lowest environmental impac
There are different kinds of systems. the answers to the questions is given below;
Anti-lock braking system: Is simply known as a safety-critical system that helps drivers to have a lot of stability and hinder the spinning of car out of control. This requires a lot of implementation. The rights generic software process model to use in the control of the anti-lock braking in a car is Waterfall model. Virtual reality system: This is regarded as the use of computer modeling and simulation that helps an individual to to be able to communicate with an artificial three-dimensional (3-D) visual etc. the most appropriate generic software process model to use is the use of Incremental development along with some UI prototyping. One can also use an agile process.University accounting system: This is a system is known to have different kinds of requirements as it differs. The right appropriate generic software process model too use is the reuse-based approach.
Interactive travel planning system: This is known to be a kind of System that has a lot of complex user interface. The most appropriate generic software process model is the use of an incremental development approach because with this, the system needs will be altered as real user experience gain more with the system.
Learn more about software development from
https://brainly.com/question/25310031
what is an operating system
An operating system (OS) is a system software program that operates, manages, and controls the computer's hardware and software resources. The OS establishes a connection between the computer hardware, application programs, and the user.
Its primary function is to provide a user interface and an environment in which users can interact with their machines. The OS also manages the storage, memory, and processing power of the computer, and provides services like security and network connectivity.
Examples of popular operating systems are Windows, macOS, Linux, iOS, and Android. These OSs have different user interfaces and feature sets, but they all perform the same essential functions. The OS is a fundamental component of a computer system and is responsible for ensuring the computer hardware operates efficiently and correctly.
The OS performs several key tasks, including:
1. Memory management: Allocating memory to applications as they run, and releasing it when the application closes.
2. Processor management: Allocating processor time to different applications and processes.
3. Device management: Controlling input/output devices such as printers, scanners, and other peripherals.
4. Security: Protecting the computer from malware, viruses, and other threats.
5. User interface: Providing a graphical user interface that enables users to interact with their machine.
For more such questions on operating system, click on:
https://brainly.com/question/22811693
#SPJ8
Hello, I've tried everything and I cannot get this code to be fair. I need help. Can someone provide guidance so I can understand how to formulate the proper code for this question so I can understand how it should be set up in Python or Python #. Thanks truly. I really appreciate a response. Enjoy your day:
2.26 LAB: Seasons
Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day.
Ex: If the input is:
April
11
the output is:
Spring
In addition, check if the string and int are valid (an actual month and day).
Ex: If the input is:
Blue
65
the output is:
Invalid
The dates for each season are:
Spring: March 20 - June 20
Summer: June 21 - September 21
Autumn: September 22 - December 20
Winter: December 21 - March 19
A program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day is given below:
The Programinput_month = input()
input_day = int(input())
months= ('January', 'February','March', 'April' , 'May' , 'June' , 'July' , 'August' , 'September' , "October" , "November" , "December")
if not(input_month in months):
print("Invalid")
elif input_month == 'March':
if not(1<=input_day<=31):
print ("Invalid")
elif input_day<=19:
print("Winter")
else:
print ("Spring")
elif input_month == 'April' :
if not(1<=input_day<=30):
print("Invalid")
else:
print("Spring")
elif input_month == 'May':
if not(1<=input_day<=31):
print("Invalid")
else:
print("Spring")
elif input_month == 'June':
if not(1<=input_day<=30):
print("Invalid")
elif input_day<=20:
print ("Spring")
else:
print("Summer")
elif input_month == 'July' or 'August':
if not(1<=input_day<=31):
print("Invalid")
else:
print("Summer")
elif input_month == 'September':
if not(1<=input_day<=30):
print("Invalid")
elif input_day<=21:
print ("Summer")
else:
print ("Autumn")
elif input_month == "October":
if not(1<=input_day<=31):
print("Invalid")
else:
print("Autumn")
elif input_month == "November":
if not(1<=input_day<=30):
print("Invalid")
else:
print ("Autumn")
elif input_month == "December":
if not(1<=input_day<=31):
print("Invalid")
elif input_day <=20:
print ("Autumn")
else:
print ("Winter")
elif input_month == 'January':
if not(1<=input_day<=31):
print("Invalid")
else:
print("Winter")
elif input_month == "February":
if not(1<=input_day<=29):
print("Invalid")
else:
print ("Winter")
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
What are two options for exiting a presentation
Answer:Instructions on How to Close PowerPoint Presentations:
=To close a PowerPoint presentation if you have multiple presentations open, click the “x” in the upper-right corner of the application window.
=Alternatively, click the “File” tab in the Ribbon.
=Then click the “Close” command at the left side of the Backstage view.
Explanation:
The ____ icon provides an option to insert images from an external storage device into a document.
A) Shapes
B) Image
C) SmartArt
D) Picture
a democratic government has to respect some rules after winning the elections. Which of these points is not a part of those rules
After coming to power, a democratic administration is bound to follow certainrules and regulations. And Office-bearers are not accountable is not a part of those rules.
How is this so?In a democratic administration,office-bearers are indeed accountable as they are bound by rules and regulations.
The accountability ensures transparency,ethical conduct, and adherence to the principles of democracy.
Office-bearers are expected to uphold the laws and serve the interests of the people they represent.
Learn more about democratic administration at:
https://brainly.com/question/31766921
#SPJ1
Describe how hackers maintain access in a system. What steps do they follow? What tools do they use? In your opinion, once in a system, is it easy to maintain access? Why or why not? What challenges are there to staying in the system?
The way that hackers maintain access in a system is that Hackers accomplish this by searching for every log and file that might contain information about their movements or presence.
The steps are:
Reconnaissance: This is when hacking begins.Three different kinds of scanning are involved.Gaining Access: During this stage, an attacker enters the system or network using a variety of tools or techniques. Keeping Access Open Clearing the Way:Changing the subject: How do hackers obtain information?One method is to use spyware, which sends data from your device to others without your knowledge or consent, to try and obtain data directly from an Internet-connected device. By tricking you into opening spam email or into "clicking" on attachments, images, and links in it, hackers may be able to infect your computer with spyware.
Note that Hackers may write programs that look for unprotected entry points into computers and network systems. By infecting a computer or system with a Trojan horse—a tool designed by hackers to steal sensitive data secretly from a victim—hackers can gain backdoor access.
Learn more about hackers from
https://brainly.com/question/23294592
#SPJ1
Referring to narrative section 6.4.1.1. "Orders Database" in your course's case narrative you will:
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entit
Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIC
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of
your last name.
Student Last Name
A-E
F-J
K-O
P-T
U-Z
1.2. Your ERD must include the following items:
All entities must be shown with their appropriate attributes and attribute values (variable type and
length where applicable)
All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
intersection tables
●
.
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
.
The following is a description of the entities and relationships in the ERD -
CustomersProductOrdersOrder Details How is this so?Customers is a standard entity that stores information about customers, such as their name, address,and phone number.Products is a standard entity that stores information about products, such as their name, description, and price.Orders is an intersection entity that stores information about orders, such as the customer who placed the order,the products that were ordered, andthe quantity of each product that was ordered.Order Details is an intersection entity that stores information about the details of each order,such as the order date, the shipping address, and the payment method.The relationships between the entities are as follows -
A Customer can place Orders.An Order can contain Products.A Product can be included inOrders.The primary keys and foreign keys are as follows -
The primary key for Customers is the Customer ID.The primary key for Products is the Product ID.The primary key for Orders is the Order ID.The foreign key for Orders is the Customer ID.The foreign key for Orders is theProduct ID.The foreign key for Order Details is the Order ID.The foreign key for Order Details is the Product IDLearn more about ERD at:
https://brainly.com/question/30391958
#SPJ1
Probability Practice: Cass is interested in figuring out how many customers have applied for a home mortgage recently.
Review the data and calicut are the probability that if Cass runs into one of the financial institutions customers at random, that person has applied for a home mortgage this year.
What is the total number of customers?
How many customers applied for a home mortgage?
Answer:
Doesn't make a lot of sense. Can you be more specific.
Explanation:
website is a collection of (a)audio files(b) image files (c) video files (d)HTML files
Website is a collection of (b) image files (c) video files and (d)HTML files
What is websiteMany websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.
To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.
Learn more about website from
https://brainly.com/question/28431103
#SPJ1
which of the following is a common security misconfiguration an attacker might use to gain access to a website or application?
Default passwords and accounts are activated— It is a typical security mistake to use vendor-supplied defaults for system accounts and passwords, which could provide attackers access to the system without authorization.
Guest, admin, and password are a few examples of default passwords. These single default passwords, which are frequently used by suppliers, are easily discoverable online using search engines or websites that gather lists. Consequently, if left unaltered, they pose a serious security risk. Most routers typically use "admin" and "admin" as their default username and password. The router's manufacturer may change these credentials, though. Administrator Password: This password, which was established by E-CORPORATION, is needed by the system in order for the user to complete the transaction. To get the three-dot menu, open the Chrome browser and tap it. Select Autofill > Password Manager from the menu in the upper-left corner.
Learn more about Default passwords here
https://brainly.com/question/30035709
#SPJ4
For the discussed 8-bit floating point storage:
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.
B. Determine the smallest (lowest) negative value which can be incorporated/represented using the
8-bit floating point notation.
C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-
bit floating point notation.
Note: You need to follow the conventions (method) given in the video lessons for the solution of this
question. Any other solution, not following the given convention, will be considered incorrect.
Using the conventions in the video lessons, the largest positive value for 8-bit floating point storage is 3.996 x 10²⁸.
A. To encode the decimal fraction -9/2 in 8-bit floating-point notation, we follow the IEEE 754 convention.
This notation consists of a sign bit, an exponent, and a mantissa. First, we convert -9/2 to binary, which is -1001/10. The sign bit will be 1 since it's negative. The next step is to represent -9/2 as a normalized binary fraction, which is -1.001 × 2^3. In this case, the exponent is 3 and the mantissa is 001.The 8-bit floating-point notation is as follows:
Sign bit: 1 (negative)
Exponent: 3 + 127 (biased exponent) = 130 (binary: 10000010)
Mantissa: 001
Putting it all together, the 8-bit floating-point representation of -9/2 is: 1 10000010 001.
B. In 8-bit floating-point notation, the smallest negative value is determined by setting the sign bit to 1 (negative), the exponent to the minimum representable value (00000000), and the mantissa to all zeros.
Therefore, the smallest negative value in 8-bit floating-point notation is: 1 00000000 000.C. The largest positive value in 8-bit floating-point notation is obtained by setting the sign bit to 0 (positive), the exponent to the maximum representable value (11111111), and the mantissa to all ones.
Therefore, the largest positive value in 8-bit floating-point notation is: 0 11111111 111.Please note that the given solution follows the conventions of IEEE 754 for encoding 8-bit floating-point values.For more such questions on Floating point:
https://brainly.com/question/30453230
#SPJ8
What are some current and future trends for network technology? Check all of the boxes that apply. an increase in the number and types of devices an increase in the people who will not want to use the network an increase in the number and types of applications an increase in the use of wired phones an increase in the use of the cloud
Answer: A,C,E
Source: trust me bro
1) primary storage is stored externally (true or false)
2) one function of storage is to store program and data for later use(true or false)
correct answer only i will mark u as brainliest and i will give u 5 star rating if ur answer will correct
Answer:
1.true
2.true
Ok will wait my rate ok❤️
A user clicks. such as option buttons and check boxes in a dialog box to provide information
Answer:
It's an input,
Sam and you work together in an IT firm. One day you overhear Sam bragging how he investigated a complex network issue at a client site and solved it to the client's satisfaction. You later come to know he was chatting with a friend who works in another IT company but smaller than yours. He also at times visits a few clients of his friend, and offers them professional services. Which professional work standards Sam may have violated?
Answer:
Based on the scenario you have described, Sam may have violated several professional work standards, including:
1. Confidentiality: By discussing the details of a client's network issue with someone outside the company, Sam may have breached the client's trust and violated the confidentiality of their information.
2. Conflict of Interest: Sam's work for his friend's clients could create a conflict of interest with his job at your company. He may be in a situation where he could potentially prioritize his friend's clients over his own, which is unethical.
3. Professional Competence: If Sam is providing professional services to clients outside of his area of expertise, he may be violating the professional competence standard. It is important for IT professionals to only provide services within their area of expertise.
4. Professional Conduct: Sam's bragging about his work to someone outside of the company may also be seen as unprofessional conduct. It may reflect poorly on the company and damage its reputation.
Overall, Sam's actions could potentially harm the company's reputation, violate ethical standards, and jeopardize client relationships. It is important for IT professionals to uphold high ethical standards in their work.
Hope this helps!
Swimming coach Yuki prepared a presentation to encourage more people to swim for exercise.
Swimming provides a better workout than walking
Which three ideas can she use to support her thesis
Swimming works practically all of the body's major muscle groups, giving you a full-body workout. Swimming concurrently exercises the upper body, core, and legs, as opposed to walking, predominantly uses the lower body.
Swimming is a sort of exercise.Cardio is a term for physical activity that benefits the heart, lungs, and circulatory system. This kind of exercise is a part of a comprehensive exercise program that includes swimming.
Is swimming a talent or a skill?It really is a talent. We are not inferior because of these abilities. Instead, they add to our distinctiveness and can be included in the growing list of benefits that this sport provides for us. The most crucial lesson to learn from this is that swimmers are gifted individuals.
To know more about Swimming visit:-
https://brainly.com/question/17470781
#SPJ1
Which of the following is not a fundamental way to approach the creation of a new information system?
a. develop a custom application in-house
b. rely on an external vendor to build the system
c. purchase a software package and customize it
d. rely on end-users to develop it themselves
e. all of these are ways to create new information systems
Answer:
The correct answer is d. rely on end-users to develop it themselves.
All of the other options (a. develop a custom application in-house, b. rely on an external vendor to build the system, and c. purchase a software package and customize it) are common ways to approach the creation of a new information system. These approaches involve hiring professionals or purchasing software packages to design, build, and implement the system.
Option d, relying on end-users to develop the system themselves, is not a fundamental way to approach the creation of a new information system. End-users are typically not trained in the technical skills needed to design and build an information system, and they may not have the necessary expertise or resources to do so. It is generally more effective to rely on professionals or pre-existing software packages to create a new information system.
Is there an an alternative to windows's TASKKILL command?
If there is, what is the name in .exe?
Answer:
The alternative to Windows's taskkill command is called Tskill.exe.
Explanation:
Assume you are given a boolean variable named isNegative and a 2-dimensional array of ints that has been created and assigned to a2d. Write some statements that assign true to isNegative if more integer elements in entire 2-dimensional array are negative than not.
Answer:
#include <iostream>
using namespace std;
int main(){
int rows, cols;
bool isNegatives;
cout<<"Rows: ";
cin>>rows;
cout<<"Columns: ";
cin>>cols;
int a2d[rows][cols];
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
cin>>a2d[i][j];} }
int negatives, others = 0;
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
if(a2d[i][j]<0){
negatives++;}
else{
others++;}} }
if(negatives>others){
isNegatives = true;}
else{
isNegatives = false;}
cout<<isNegatives;
return 0;
}
Explanation:
For clarity and better understanding of the question, I answered the question from the scratch.
This line declares number of rows and columns
int rows, cols;
This line declares the Boolean variable
bool isNegatives;
This line prompts user for rows
cout<<"Rows: ";
This line gets the number of rows
cin>>rows;
This line prompts user for columns
cout<<"Columns: ";
This line gets the number of columns
cin>>cols;
This line declares the array
int a2d[rows][cols];
This line gets user input for the array
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
cin>>a2d[i][j];} }
This line declares and initializes number of negative and others to 0
int negatives, others = 0;
The following iteration counts the number of negatives and also count the number of non negative (i.e. others)
for(int i =0;i<rows;i++){
for(int j =0;j<cols;j++){
if(a2d[i][j]<0){
negatives++;}
else{
others++;}} }
This checks of number of negatives is greater than others
if(negatives>others){
If yes, it assigns true to isNegatives
isNegatives = true;}
else{
If otherwise, it assigns false to isNegatives
isNegatives = false;}
This prints the value of isNegatives
cout<<isNegatives;
See attachment
Which feature in QuickBooks Online reports allows you to customize section headings on the Profit and Loss and Balance Sheet reports?
Add notes
Filter
Display columns by
Edit titles
Accounting method
The feature in QuickBooks Online reports allows you to customize section headings on the Profit and Loss and Balance Sheet reports is Edit titles.
Which feature in QBO reports allows customization of section headings?The feature is known to be the one that is often used to alter the section titles of a report, and it is said to be the select “edit titles” .
This is often gotten from the customize ribbon that is seen at the top of a Profit and Loss or at the Balance Sheet report.
Hence, The feature in QuickBooks Online reports allows you to customize section headings on the Profit and Loss and Balance Sheet reports is Edit titles.
So option D is correct.
Learn more about QuickBooks from
https://brainly.com/question/24441347
#SPJ1
Explain the parts of an information system
Explanation:
An information system is essentially made up of five components hardware, software, database, network and people. These five components integrate to perform input, process, output, feedback and control. Hardware consists of input/output device, processor, operating system and media devices.
Susan has a sheet with both numerical and textual data. She has to enter the numerical data in currency format. She has to input the textual data in underlined format, and she has to wrap the text. Which formatting options will she use? Susan can use the tab to select options to format numerical data in a spreadsheet. She can use the tab to select the underlining option and the tab to wrap text in a cell or range of cells.
Answer:
Susan has a sheet with both numerical and textual data. She has to enter the numerical data in currency format. She has to input the textual data in underlined format, and she has to wrap the text. Which formatting options will she use?
Susan can use the [ Numbers ] tab to select options to format numerical data in a spreadsheet. She can use the [ Font Affects ] tab to select the underlining option and the [ Text Alignment ] tab to wrap text in a cell or range of cells.
Im not 100% sure hope this helps
a database of the virus is called____
Answer:
I believe it is poisoning I could be wrong
Imagine you have just learned a new and more effective way to complete a task at home or work. Now, you must teach this technique to a friend or coworker, but that person is resistant to learning a new way of doing things. Explain how you would convince them to practice agility and embrace this new, more effective method.
if a person is resistant to learning a new way of doing things, one can practice agility by
Do Implement the changeMake a dialogue with one's Unconscious. Free you mind to learn.How can a person practice agility?A person can be able to improve in their agility by carrying out some agility tests as well as the act of incorporating any form of specific drills into their workouts.
An example, is the act of cutting drilling, agility ladder drills, and others,
A training that tends to help in the area of agility are any form of exercises such as sideways shuffles, skipping, and others.
Therefore, if a person is resistant to learning a new way of doing things, one can practice agility by
Do Implement the changeMake a dialogue with one's Unconscious. Free you mind to learn.Learn more about agility from
https://brainly.com/question/15762653
#SPJ1
You would like the cell reference in a formula to remain the same when you copy
it from cell A9 to cell B9. This is called a/an _______ cell reference.
a) absolute
b) active
c) mixed
d) relative
Answer:
The answer is:
A) Absolute cell reference
Explanation:
An absolute cell reference is used in Excel when you want to keep a specific cell reference constant in a formula, regardless of where the formula is copied. Absolute cell references in a formula are identified by the dollar sign ($) before the column letter and row number.
Hope this helped you!! Have a good day/night!!
Answer:
A is the right option absoluteHELPPP
44 What text will be output by the program?
A- less than 10
B- less than 20
C- less than 30
D- 30 or more
Answer:
D. 30 or more
Explanation:
All other ones are canceled out ad the score adds 10.
The correct text for the output of the program is, ''30 or more''. So, option (D) is true.
A program is a set of instructions that a computer can run.
Programs are clear, ordered, and in a language that computers can follow.
Given that,
A program for the score is shown in the image.
Now, From the given program;
The last line will appear with the,
console,log (''30 or more'')
Hence, The correct text for the output of the program is, ''30 or more''.
Therefore, the correct option is,
D) 30 or more
Read more about Python programs at:
brainly.com/question/26497128
#SPJ6
some context free languages are undecidable
3. What is a Trojan horse?
O A. Antivirus software for your computer
O B. Another name for a hacker
OC. A computer virus that can damage or delete files
O D. Software that eats cookies