Consider a system for processing student test scores. The StudentAnswerSheet class is given and will be used as part of this system and contains a student's name and the student's answers for a multiple-choice test. Note the class attribute (key) and method (setKey) for the loading and storing the answer key. The answers are represented as "char" with an omitted answer being represented by the question mark '?'. These answers are stored in an array in which the position of the answer corresponds to the question number on the test (question numbers start at zero). A student's score on the test is computed by comparing the student's answers with the corresponding answers in the answer key for the test. One point is awarded for each correct answer and 1/4 point is deducted for each incorrect answer. Omitted answers do not change the student's score.
Write a class GradeStudents with a "main" method only that will read, using Scanner, a filename from the user (assumed to exist and in the correct format). Then read the comma-delimited input file containing the answer key in the first row and student names/answers in other rows, one per line.
First read and load the key. Then read, grade and output each student. Also determine the highest scoring student. If ties for highest scoring save all their names. You do not know how many questions are on the test until you read the first line of the file, which is always the key.
Given class:
public class StudentAnswerSheet {
private String name;
private char [] answers;
private static final char BLANK='?';
private static final String DEFAULT_NAME="Noname";
private static final double CORRECT_POINTS=1., BLANK_POINTS=0., WRONG_POINTS=-.25;
private static char [] key;
public static void setKey(char [] answerKey) {
if (answerKey==null || answerKey.length==0) {
key=new char[] {'?'};
}
else {
key=new char[answerKey.length];
for (int i=0;i key[i]=answerKey[i];
}
}
}
public StudentAnswerSheet (String n, char [] a) {
if (n==null) {
name=DEFAULT_NAME;
}
else {
name=n;
}
if (a!=null && a.length>0) {
answers=new char[a.length];
for (int i=0;i answers[i]=a[i];
}
}
else {
answers = new char[] {'?'};
}
}
public String getName() { return name; }
public double getScore () {
double total=0;
if (key!=null && key.length == answers.length) {
for (int i=0;i if (answers[i]==BLANK) {
total+=BLANK_POINTS;
}
else if (answers[i]==key[i]) {
total+=CORRECT_POINTS;
}
else {
total+=WRONG_POINTS;
}
}
}
else {
total=Double.NEGATIVE_INFINITY;
}
return total;
}
public String toString () {
String temp = name;
for (int i=0; i temp = temp + ' ' + answers[i];
}
return temp;
}
}
SAMPLE INPUT FILES:
answers1.txt
KEY,e,e,b,b,e,b,c,d,a,e
Matt,a,e,b,b,?,b,c,d,a,e
Cami,e,e,b,b,?,b,c,d,a,e
John,?,?,?,?,?,?,c,d,a,e
Mary,a,a,a,a,a,a,c,d,a,e
Fred,e,e,b,b,?,b,c,d,a,ea
answers2.txt
KEY,e,e,b,b,e,b,c,d,a,e,e,e,b,b,e,b,c,d,a,e
Matt,a,e,b,b,?,b,c,d,a,e,a,a,a,a,a,a,c,d,a,e
Cami,e,e,b,b,?,b,c,d,a,e,?,?,?,?,?,?,c,d,a,e
John,?,?,?,?,?,?,c,d,a,e,a,a,a,a,a,a,c,d,a,e
Mary,a,a,a,a,a,a,c,d,a,e,a,a,a,a,a,a,c,d,a,e
Fred,e,e,b,b,?,b,c,d,a,e,e,e,b,b,?,b,c,d,a,e

Answers

Answer 1

To write a class GradeStudents with a "main" method only that will read, using Scanner, a filename from the user (assumed to exist and in the correct format) check the code given below.

What is a filename?

The title of a file and its extension are included in its filename. An entire file name is, for instance, "readme.txt."

Additionally, only the first part of a file may be described in the file name. A file with the name "readme" and the file name extension ".txt" is an example.

↓↓//CODE//↓↓

package code;

 public class TestResults

{

    private StudentAnswerSheet[] students;

    private int count = 0;

     private static final int DEFAULT_SIZE = 10;

     public TestResults(int size)

{

        if (size > 0) {

            students = new StudentAnswerSheet[size];

        }

        else {

            students = new StudentAnswerSheet[DEFAULT_SIZE];

        }

        count = 0;

    }

     public boolean addStudentAnswerSheet(StudentAnswerSheet x) {

        boolean inserted = false;

         if (x != null && count < students.length) {

            students[count] = x;

            count++;

            inserted = true;

        }

         return inserted;

    }

     public String highestScoringStudent(char[] answerKey) {

                 double maxScore = Double.MIN_VALUE;

        double tempScore;

                 // Finding maximum score

        for (StudentAnswerSheet sheet : students) {

            tempScore = sheet.getScore(answerKey);

                             if (tempScore > maxScore) {

                maxScore = tempScore;

            }

        }

                 // building highest achievers list

        StringBuilder res = new StringBuilder();

                 for (StudentAnswerSheet sheet : students) {

            if (sheet.getScore(answerKey) == maxScore) {

                res.append(sheet.getName()).append(" ");

            }

        }

                 // returning list string

        return res.toString().strip();

    }

}

Learn more about filename

https://brainly.com/question/28578338

#SPJ4


Related Questions

you work in the computer repair department of a large retail outlet. a customer comes in with a workstation that randomly shuts down. you suspect that the power supply is failing.

Answers

The most frequent reason for a computer to go down unexpectedly is overheating.

The computer may shut down at random for a number of reasons. Let's first examine their causes:Your computer's hardware malfunction may also cause this problem.These issues are frequently caused by malware and viruses.Your computer's erratic shutdowns may also be caused by the unstable power supply.This problem is also attributed to the Fast starting feature.Another frequent root cause of this issue is an out-of-date graphics driver.If the Operating System Software  becomes corrupt, your computer may shut down at any time.This problem may also be brought on by damaged system files.

To learn more about Operating System Software refer https://brainly.com/question/15050987

#SPJ4

Answer: Use a known good spare to swap with the existing power supply.

Explanation: Known good spares are sets of components that you know are in proper functioning order. If you suspect a problem with a component, first try to swap it with a known good component. If the problem is not resolved, you can then continue troubleshooting other possible issues.

Write a method named EvenNumbers that takes two integer arguments (say, num1 and num2) 1. and prints all even numbers in the range (num1, num2). The method does not return any value to the caller. Call the above EvenNumbers method from main by passing two numbers input by the user.

Answers

#include<studio.h> the main () {num1, num2, int; &num1,&num1; scanf("%d%d", printf ('%d', 'num1*num1'); deliver 0;}.

Using the formula for the sum of all natural numbers as well as arithmetic progression, it is simple to calculate the sum of even integers from 2 to infinity.

A Scanner object, reader is created in the Java program to read a number from the user's keyboard. After that, the entered number is kept in the variable num.

Now, we use the % operator to calculate the remainder of num and determine whether or not it is divisible by two to determine if it is even or odd.

Java's if...else statement is used for this. If num is divisible by 2, "num is even" is printed. If anything, we print num is weird.

In Java, the ternary operator can be used to determine whether num is even or odd.

Know more about Java here:

https://brainly.com/question/12978370

#SPJ4

you are working as a junior security technician for a consulting firm. one of your clients is upgrading their network infrastructure. the client needs a new firewall and intrusion prevention system installed. they also want to be able to block employees from visiting certain types of websites. the client also needs a vpn.which of the following internet appliances should you install?

Answers

Since the client needs a new firewall and intrusion prevention system installed, block employees from visiting certain types of websites, and needs a VPN, an internet appliance which you should install is: C. Unified Threat Management.

What is information security?

In Computer technology, information security can be defined as a preventive practice which is used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technology, frameworks, processes and network engineers.

Additionally, an access control (ACL) can be configured to only allow a certain amount of space for domains to be added to a blocklist through the use of an intrusion prevention system (IPS).

Read more on firewall here: brainly.com/question/16157439

#SPJ1

Complete Question:

You are working as a junior security technician for a consulting firm. One of your clients is upgrading their network infrastructure. The client needs a new firewall and intrusion prevention system installed. They also want to be able to block employees from visiting certain types of websites. The client also needs a VPN.

Which of the following internet appliances should you install?

Spam gateway

Load balance

Unified Threat Management

Proxy server

assume that a two-dimensional (2d) array arr of string objects with 3 rows and 4 columns has been properly declared and initialized. which of the following can be used to print the elements in the four corner elements of arr ? responses system.out.print(arr[0, 0] arr[0, 3] arr[2, 0] arr[2, 3]); system.out.print(arr[0, 0] arr[0, 3] arr[2, 0] arr[2, 3]); system.out.print(arr[1, 1] arr[1, 4] arr[3, 1] arr[3, 4]); system.out.print(arr[1, 1] arr[1, 4] arr[3, 1] arr[3, 4]); system.out.print(arr[0][0] arr[0][2] arr[3][0] arr[3][2]); system.out.print(arr[0][0] arr[0][2] arr[3][0] arr[3][2]); system.out.print(arr[0][0] arr[0][3] arr[2][0] arr[2][3]); system.out.print(arr[0][0] arr[0][3] arr[2][0] arr[2][3]); system.out.print(arr[1][1] arr[1][4] arr[3][1] arr[3][4]);

Answers

In contrast, initialising a 2D array just requires two stacked loops. 6

What do you meant by dimensional?

A figure that is three-dimensional if it has measurements in one or more different directions, including height, length, or width. Sizes include length, width, and height.

Each of the following objects has one dimension: a line, a square, and a cube (3D). We travel across space in all directions—left, right, up, down. There are three dimensions in everything around us, including the buildings we live in and the items we use on a daily basis.

An additional dimension of space would therefore be considered the fifth dimension. In the 1920s, scientists Theodor Kaluza and Oskar Klein each separately suggested the existence of such a dimension. Einstein's general theory of relativity, which demonstrated how mass warps space-time in four dimensions, served as a source of inspiration.

To learn more about dimensional refer to:

https://brainly.in/question/21281887

#SPJ4

A 2D array may be initialized with simply two stacked loops, though. 6

How would you define "dimensional"?

A three-dimensional figure is one that contains dimensions in one or more separate planes, such as height, length, or breadth. Height, breadth, and length are examples of sizes.

The line, the square, and the cube are all one-dimensional objects (3D). We move through space in all four axes: left, right, up, and down. Everything around us, including the homes we live in and the objects we use every day, has three dimensions.

Therefore, the fifth dimension of space would be an extra dimension. Theodor Kaluza and Oskar Klein, two physicists, independently proposed the possibility of such a dimension in the 1920s. Generalized by Einstein

To learn more about dimensional refer to:

https://brainly.com/question/27230187

#SPJ4

The code below is designed to print out numbers roughly once every second (that is, once every 1000 milliseconds), starting with 0 , and counting upwards by 1 each second. Copy the code into a file called ex13-4.py, and fill in the blanks such that the code works as intended. Note that you must use the same format for calling ontimer that was shown in the lecture slides - the autograder here is looking for a specific answer, since it's unable to actually run the code due to the turtle module not being present on Gradescope. Submit your ex13-4.py file to Gradescope. import turtle class Timer: def _init__(self): self. count =0
self.count_up() def count_up(self): print(self. count) self. count +=1
turtle. ontimer (_)
)
Timer() turtle.mainloop()

Answers

The code below is designed to print out numbers

import turtle

class Timer:

   def __init__(self):

       self.count = 0

       self.count_up()

   def count_up(self):

       print(self.count)

       self.count += 1

       turtle.ontimer(self.count_up, 1000)

Timer()

turtle.mainloop()

What is code?

Code is a set of instructions, usually written using a computer programming language, that tells a computer what tasks to perform. It is used to create software, websites, apps, and other forms of technology. Code is written using specific syntax, which is a set of rules that determine how the code should be written. It is then compiled, which is a process of turning the code into a format that can be read and understood by a computer. Code can be used to create digital products, automate processes, and control hardware. By writing code, developers can create powerful, complex, and useful products that can benefit people all over the world.

To learn more about code
https://brainly.com/question/25694408
#SPJ4

the following provides details on the building class. instance variables all instance variables must be specified as private instance variables. constructor the constructor should accept four parameters: 1) the length of the building, 2) the width of the building, 3) the length of the building's lot, and 4) the width of the building's lot. the constructor parameters should be used to initialize the length, width, lotlength, and lotwidth instance variables, respectively. you may assume the values passed will be valid values for the purposes of the fields.

Answers

The center and radius of several of the instance variables in circle are initialized using the constructor's parameters.

A variable that is declared in a class but not within constructors, methods, or blocks is referred to as an instance variable. When an object is generated, instance variables are created that are available to all of the constructors, methods, and blocks in the class.

A class instance-specific variable is called an instance variable. For instance, each new instance of a class object that you create will have a copy of the instance variables. The variables that are specified inside a class but outside of any methods are known as instance variables.

The many access modifiers available in Java, such as default, private, public, and protected, can be used to declare instance variables.

Know more about instance variable here:

https://brainly.com/question/20658349

#SPJ4

which of the following sources contains standards and templates for the rmf assessment and authorization process?

Answers

DSS Risk Management Framework contains standard and templates for the RMF assessment and authorization process.

The NIST SP 800-37 manual, "Applying the Risk Management Framework to Federal Information Systems: A Security Life Cycle Approach," which has been accessible for FISMA compliance since 2004, is most frequently linked to the Risk Management Framework (RMF). It was revised to version 2 in December 2018.

Every U.S. government agency must now adhere to and incorporate this into their operations; it was the outcome of a Joint Task Force Transformation Initiative Interagency Working Group. The RMF was most recently incorporated into DoD directives, and other organizations are now developing new advice for RMF compliance.

RMF outlines the procedure that must be followed to secure, authorize, and manage IT systems for all federal agencies. An RMF process cycle is defined.

Know more about information systems here:

https://brainly.com/question/28945047

#SPJ4

a distributed database is a single logical database that is physically divided among computers at several sites on a network.

Answers

The statement for distributed database is a single logical database that is physically divided among computers at several sites on a network is true.

What is distributed database?

Distributed database is a single database but its stored in different location it can be in different computer but in same physical location it called as data center or in different physical location which it required connections from network.

Distributed database don't share any physical component. So basically distributed database have multiple of computer and it will improve performance at end-user worksite. For access, only system administrator can distribute the data across multiple computer.

You question is incomplete, but most probably your full question was

A distributed database is a single logical database that is physically divided among computers at several sites on a network.

True

False

Learn more about data center here:

brainly.com/question/13441094

#SPJ4

a ______ refers to the portion of a webpage that a user sees at any one time, regardless of device, browser, screen size, screen resolution, window size, or orientation.

Answers

Without respect to the client browser, internet, screen size, picture quality, window size, or orientation, a viewport is the area of a webpage that they can see at any given time.

Explain what a browser is ?

Every part of the internet is accessible with a web browser. It pulls data from other websites and delivers it on your computer or mobile device. The content is transferred via the Web Send Protocol, which describes how text, images, and video are shared on the internet.

Which browser is the simplest?

Using Chrome Many tech enthusiasts have evaluated the speed and other attributes of various web browsers. The majority of them agree that   Browser is the quickest online browser available, particularly for Windows users. On the crucial download speeds, which we'll go over later in this post, it received very high scores.

To know more about Browser visit :

https://brainly.com/question/25371940

#SPJ1

Which of the following are good candidates for a primary key field for a Customer table? Select all the options that apply.IdentificationNumber
CustomerNumber
CustomerID

Answers

Good possibilities for a primary key field in a customer table are Identification Number.

What field should be the employee table's primary key?

Why and which field in the Employee table should serve as the primary key? The primary key serves as a special code for the information and records in the table. The Social Security Number should be used as the primary key in the Employee table. Each individual allocated to the sheet has a different code.

What do the table's candidate and primary key represent?

Describe a candidate key. Another term for a candidate key is a collection of several properties (or a single feature) that aid in distinctly distinguishing the tuples present in a table or relation.

To know more about primary key visit :-

https://brainly.com/question/13437797

#SPJ4

the life cycle of a program begins with describing a problem and making a plan. then the pdlc requires

Answers

The life cycle of a program begins with describing a problem and making a plan. Then the PDLC requires coding, debugging, and testing. The correct option is a.

What is a life cycle of a program?

Phases of a program's lifetime are the steps it takes from conception to deployment and execution. The five stages of program development are analysis, design, coding, debugging, and testing, as well as implementing and maintaining application software. This process is known as the program development life cycle (PDLC).

Therefore, the correct option is a, coding, debugging, and testing.

To learn more about the life cycle of a program, refer to the link:

https://brainly.com/question/19399363

#SPJ1

The question is incomplete. Your most probably complete question is given below:

a. coding, debugging, and testing.

b. process, input, output.

c. testing and documentation.

d. data and methods.

setting the suid flag is a powerful and useful feature. it can have weaknesses associated with its use. which of the following statements identifies a weakness?

Answers

The weakness of SUID flag that associated with its use is setting the SUID flag for process or application that owned by root user can make security hole.

What is SUID flag?

SUID flag is a set of owner user ID to give permission a bit flag to can be applied and executed. This will give user to execute something with same permission as the owner, or in other word the SUID flag will make the user to have owner permission rather than have the alternate user permission.

Root user is a highest user that have all permission and privileges to read and write all file in Linux or Unix base OS system. This is a special user.

So, make SUID flag for anything that associated to root user can make security hole because the user can access all file in system like root user.

You question is incomplete, but it is a general answer for SUID flag weaknesses.

Learn more about SUID flag here:

brainly.com/question/29744824

#SPJ4

Your troubleshooting a malfunctioning notebook computer system. The user has indicated that the screen is always dark and difficult to read even while the system is plugged into a wall outlet. You check the system and determining the back light isn't working. Which of the following could be the cause
– The notebook video adapter is malfunctioning
– The notebook battery is failing and needs to be replaced
– The LCD cut off switch is stuck in the off position
– The wrong AC adapter is being used with the system

Answers

The LCD cutoff switch is permanently set to Off. A type of flat panel display known as an LCD (Liquid Crystal Display) operates primarily using liquid crystals.

The LCD cutoff switch on the laptop may be stuck in the off position. When the notebook lid is closed, the cutoff switch is used to turn off the backlight (and occasionally the actual video display). Check to see if the issue is really with the cutoff switch by pressing and releasing it. You can be certain that the issue is unrelated to the battery because it persists when you are hooked in.A flat-panel display or other electronically controlled optical device that makes use of polarizers and the light-modulating capabilities of liquid crystals is known as a liquid-crystal display. Liquid crystals don't directly emit light; instead, they create colour or monochromatic pictures using a backlight or reflector.

Learn more about LCD here

https://brainly.com/question/2289534

#SPJ4

which of the following services allows you to utilize a powerful database system without having to manage the server, database security, performance, and other administrative tasks?

Answers

Azure SQL Database allows you to utilize a powerful database system without having to manage the server, database security, performance, and other administrative tasks.

What is Azure SQL Database ?An integrated component of Microsoft Azure, Microsoft Azure SQL Database is a managed cloud database.The term cloud database refers to a database that utilizes a cloud computing platform and offers access as a service. Managed database services handle the database's scalability, backup, and high availability. An always-updated, fully managed relational database service designed for the cloud, Azure SQL Database is a member of the Azure SQL family. A multi-model database that scales to meet demand will let you create your next app with ease and flexibility. Azure Synapse Link for SQL Database ,enables near real-time insights without compromising the speed .

To learn more about Azure SQL, refer:

https://brainly.com/question/30026637

#SPJ4

Given an integer vector of size NUM_ELEMENTS, which XXX, YYY, and ZZZ will count the number of times the value 4 is in the vector? Choices are in the form XXX/YYY / ZZZ. vector NUMELEMENTS;/cnt Fours - cntFours + 1; cnt Fours - myVect.at(); /i> myVect.size: cnt Fours - Vect.at(1);

Answers

Given an integer vector of size NUM_ELEMENTS, the option that XXX, YYY, and ZZZ will count the number of times the value 4 is in the vector is option D:  cntFours = 0; / i < NUM_ELEMENTS; / ++cntFours;

How can one determine whether a vector is an integer?

The atomic vector R Integer Vector has the "integer" vector type. A vector of integers can only contain NA or integers as entries. This article will demonstrate how to generate an integer vector in R.

Therefore, one can say that a vector in R can be rounded using the floor function, the vector's values can be subtracted from it, and the result can then be checked to see if it is zero or not. The value is an integer if the output is zero; otherwise, it is not.

Learn more about  integer vector from

https://brainly.com/question/14483631
#SPJ1

See full question below

Given an integer vector of size NUM_ELEMENTS, which XXX, YYY, and ZZZ will count the number of times the value 4 is in the vector? Choices are in the form XXX / YYY / ZZZ.

vector<int> myVect(NUM_ELEMENTS);int cntFours;XXXfor (i = 0; YYY; ++i) {if (myVals.at(i) == 4) {ZZZ;}}

cntFours = myVect.at(0); / i > myVect.size(); / cntFours = myVect.at(i);

cntFours = myVect.at(1); / i < myVect.size(); / cntFours = myVect.at(i) + 1;

cntFours = 1; / i > NUM_ELEMENTS; / cntFours = cntFours + 1;

cntFours = 0; / i < NUM_ELEMENTS; / ++cntFours;

which of the following code segments alters the sequential flow of control based on a boolean expression

Answers

A control structure modifies a program's usual sequential flow of execution. The outcome of a logical expression can be assigned to a bool variable but not an int variable.

In a computer program, variable are used to hold data that can be accessed and changed. They also give us the means to give data a name that is descriptive, which helps the reader and us understand our programs better. Variables can be thought of as storage spaces for data, which is a useful metaphor. Labeling and storing information in memory is their only function. You can use this information later on in your program.

One of the trickiest tasks in computer programming is naming variables, according to many experts. Consider your name choices carefully before naming variables. Make an effort to call your variable something that is both accurately descriptive and clear to a different reader.

Learn more about variable here:

https://brainly.com/question/13375207

#SPJ4

item(s) in your bag are not available for delivery to the destination you selected. please select a different recipient or remove the item from your shopping bag.

Answers

Certain sorts of addresses are not deliverable by some carriers. Due to manufacturer constraints, government import/export regulations, or warranty concerns, we are unable to ship to your region.

You may find out if a product can be shipped to the address of your choice via the product page by using our address widget, which is located at the top of every Amazon page and on the Amazon app. Every time you shop with us, please make sure you have your intended address chosen.

You might not be able to ship to an address for a few reasons.

For the following reasons, you might not be able to ship to an address:

The item's dimensions go over the shipment restriction. A maximum of 108 inches in length or width and 70 pounds in weight are required for the package.

Due to its size or unusual shape, the item cannot be shipped.

The product is a restricted one.

Know more about address here:

https://brainly.com/question/29834857

#SPJ4

on the statement of cash flows prepared by the indirect method, the operating activities section would include

Answers

The operating activities portion of the statement of cash flows includes non-cash expenses in addition to net income when using the indirect method.

What Is Operating Cash Flow?A company's regular operational procedures produce cash flow, which is known as operating cash flow. Investors place a high value on a company's capacity to produce positive cash flows on a consistent basis from its ongoing operations. The true profitability of a corporation can be found, in particular, by analyzing operating cash flow. It's one of the most accurate ways to measure the sources and uses of money.An organization's sources and uses of cash during a specific time period are shown on a cash flow statement. Although the cash flow statement is typically regarded as being less significant than the income statement and the balance sheet, it can be used to analyze trends in a company's performance that cannot be understood through the other two financial statements.Investors view the cash flow statement as the most transparent of the three financial statements, despite the fact that it is regarded as the least significant. They therefore depend more than on any other financial statement when making investing decisions because of this.

To Learn more About cash flows refer to:

https://brainly.com/question/735261

#SPJ4

Affect the sequential flow of control by executing different statements based on the value of a Boolean expression. A logical statement that has two parts (if p, then q).

Answers

Conditional Statement. A compound statement that meets the "if...then" condition is known as a conditional statement.

What is a conditional statement ?Conditionals are programming language directives used in computer science to handle decisions. Particularly, conditionals carry out various calculations or actions according on whether a boolean condition set by the programmer evaluates to true or false.An if-then statement, also known as a conditional statement, is a set of hypotheses followed by a conclusion. Read this: if p, then q. If the hypothesis is correct but the conclusion is untrue, a conditional statement is false. If the statement in the example above read, "If you achieve good marks then you will not get into a good college," it would be untrue.

There are the following types of conditional statements in C.

If statement, If-Else statement, Nested If-else statement, If-Else If ladder, Switch statement.

To learn more about Conditional Statement refer :

https://brainly.com/question/27839142

#SPJ4

TRUE/FALSE. under the uniform securities act, a person who owns a business providing advice on commodity futures contracts as well as limiting its securities advi

Answers

The person who owns a business providing advice on commodity futures contracts is not required to register as an investment adviser in the state.

The question is referring to federal covered adviser which the futures contracts doesn't considered as securities. The Investment Advisers Act of 1940 explained that the definition of investment adviser is specifically excluded for a person whose securities advice is confined to securities guaranteed or issued by the Treasury.

So, from the Investment Advisers Act of 1940 we know that person is covered under NSMIA so that person is not subject to state regulation as an investment adviser.

You question is incomplete, but most probably your full question was

Under the Uniform Securities Act, a person who owns a business providing advice on commodity futures contracts as well as limiting its securities advice to those issued or guaranteed by the U.S. government is

not required to register as an investment adviser in the state

required to be a registered investment adviser in the state

required to be a registered investment adviser representative in the state

required to be a registered agent in the state

Learn more about futures contract here:

brainly.com/question/29802405

#SPJ4

In which of the following cloud models is the customer responsible for managing the fewest of the computing resources?
Question 2 options:
O On-Premise Software
O Platform-as-a-Service
O Infrastructure-as-a-Service
O Software-as-a-Service

Answers

D: Software-as-a-Service is a cloud model whereby the customer is responsible for managing the fewest of the computing resources.

SaaS or Software-as-a-Service is an on-demand cloud service that provides access to ready-to-use, cloud-based application software. In SaaS storage, networking, middleware,  servers, and application software all are hosted and managed by the SaaS vendor.  In the SaaS cloud model, the users have the minimum level of control over the resources provided by the cloud vendor; they are only responsible to use the data they create.

You can learn more about SaaS at

https://brainly.com/question/14596532

#SPJ4

Which of the following terms is best described as
the choice of colors, fonts, and formatting to give
your presentation an overall look and feel?
Oslide view
Oslide master
Oslide show
O design theme

Answers

Design theme is the term is best described as the choice of colors, fonts, and formatting to give your presentation an overall look and feel.

What are the themes in PowerPoint?A theme is a collection of predetermined colours, fonts, and visual effects that you apply to your presentations to give them a uniform, polished appearance. Using a theme makes your presentation seem cohesive with little work.A theme is a coordinated combination of colours, fonts, effects, and backdrops you may use to make a presentation that has a polished appearance and a unified design. 2010's PowerPoint comes with a tonne of pre-built themes.Click the Design tab, select a theme, then check out how it appears on the slide to discover a theme to use in your presentation. By altering the fonts, colours, and background colours under the Design tab, you may further personalise the theme.

Learn more about themes in PowerPoint refer to :

https://brainly.com/question/22505414

#SPJ4

find the first name and last name of all customer contacts whose customer is located in the same state as the san francisco office. returns 11.

Answers

Below is the SQL code solution for the given problem in which we have to find the first name and last name of all customer contacts whose customer is located in the same state as the san francisco office.

Coding Part:

SELECT contactfirstname, contactlastname FROM Customers

WHERE state =

(

   SELECT DISTINCT state FROM Customers

   WHERE city = 'San Francisco'

);

What is SQL?

Structured query language (SQL) is indeed a programming language used to store and process information in relational databases. A relational database information is stored in tabular form, with rows and columns chosen to represent different data attributes and the numerous relationships between the data values.

SQL statements can be used to store, update, remove, search, and retrieve data from a database. SQL can also be used to maintain as well as optimize database performance.

To know more about SQL, visit: https://brainly.com/question/25694408

#SPJ4

A customer is experiencing a sporadic interruption of their Wi-Fi network in one area of their building. A technician investigates and discovers signal interference caused by a microwave oven. The customer approves replacing the wireless access point that covers the area, but asks that the wireless speed also be increased.Which of the following Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs?802.11a802.11g802.11b802.11ac

Answers

802.11ac Wi-Fi standards should the replacement device support to BEST fulfill the customer's needs.

The fifth era of WiFi is addressed by the 802.11ac norm, otherwise called WiFi 5 and Gigabit WiFi. It's a step up from WiFi 4 or IEEE 802.11n. WiFi 5 was developed to provide improved speeds, WiFi performance, and range in order to keep up with the growing number of users, devices, and data usage. The past adaptations of Wi-Fi are actually consumed by each new norm. Depending on client hardware and network conditions, 802.11ac works with 802.11n and any previous 802 standard when necessary. This compatibility will also continue in the future: Wi-Fi 6 will work just like the previous version and work with 802.11ac. 802.11ac is utilized in most of portable innovation worked after 2015. Both 802.11ax and 802.11ac are supported by the majority of recent smartphones produced after 2019.

Despite its widespread availability, 802.11ac was not widely available until 2015. If you are using a more recent switch that was manufactured prior to 2015, you are limited to the more recent and slower Wi-Fi guidelines at this time.

To know more about 802.11ac visit

brainly.com/question/18370953

#SPJ4

The_____keyword in a total row is used if a calculated field is also required in an aggregate query.

Answers

The TOTAL keyword in a total row is used if a calculated field is also required in an aggregate query.

A calculated field is a field in a database, spreadsheet, or business intelligence tool that derives its value by performing a calculation on the values of other fields. It is a virtual field that does not exist in the database itself but is instead derived from other existing fields. Calculated fields can be used to perform a variety of calculations, from simple arithmetic functions to complex statistical analyses.

An aggregate query is a type of query that is used to compute aggregate values from a set of data records, such as sums, averages, and counts. Aggregate queries are commonly used in database management systems to quickly retrieve data from large datasets.

For more questions like Calculated field click the link below:

https://brainly.com/question/13668122

#SPJ4

g what is the purpose of developing an entity-relationship diagram? (3) why is it important? (2)

Answers

Entity relationship diagrams provide a visual starting point for database design that can also be used to help determine information system requirements throughout an organization.

An ERD, also called an ER diagram or ER model, is used to describe data and how parts of the data interact. This is why ERDs are so important in database design and projects that require a clear structure for all data. Think of ERDs as a standardized way of drawing database diagrams. By applying this standard, teams can easily understand the structure of the database and the information collected by the system. An entity-relationship diagram provides a visual starting point for database design that can also be used to determine information system requirements for an entire organization.

To know more about ERD, visit:-

https://brainly.com/question/28902560

#SPJ4

determining beforehand who is going to be released. to be able to calculate that, you need to know the number of prisoners and the length in words of the rhyme used by the executioner for this particular game. it might be nice to have a program that calculates the position quickly for you (maybe on the computer they let you use in prison). write a program that inputs the number of prisoners and the number of words and calculates where you should stand. for example, print the following text: 'with p prisoners and s words, i'd like to be number x.', where x is the prisoner index of the one

Answers

To write a program that inputs the number of prisoners and the number of words and calculates where you should stand, check the given code.

What is a program?

The source code of a computer program is what is visible to humans. Computers can only run the native machine instructions that came with them, so source code needs to be run by another program.

The compiler of the language can therefore convert source code to machine instructions. An assembler is used to translate assembly language programs. An executable is the term used to describe the final file. The language's interpreter can also run source code as an alternative.

In the event that the executable is asked to be run, the operating system loads it into memory and launches a process. In order to fetch, decode, and then execute each machine instruction, the central processing unit will soon switch to this process.

↓↓//CODE//↓↓

#include <iostream>

using namespace std;

struct Node

{

int prisonerNo;

struct Node *next;

};

class CirList

{

Node *first,*last;

public:

CirList()

{

first=NULL;

last=NULL;

}

void create(int n);

int survivor(int n,int words);  

};

//Create a circular link list

void CirList::create(int n)

{

Node *temp;

int i=1;

while(i<=n)

{temp=new Node;

temp->prisonerNo=i;

temp->next=NULL;

if(first==NULL)

{

first=temp;

last=first;

}

else

{

last->next=temp;

last=temp;

}

i++;

}

last->next=first;

}

// calculating the correct position of surviver by deleting nodes at every number of words

int CirList::survivor(int n,int words)

{

Node *p, *q;

int i;

q = p = first;

while (p->next != p)

{

if(words==1) //When number of words are 1

{ q=q->next;

last->next=q;

delete p;

p=q;

}

else

{  

for (i = 0; i < words-1; i++) //When number of words are more than 1

{

q = p;

p = p->next;

}

q->next = p->next;

delete p;

p = q->next;

}

}

first = p;

cout<<endl<<"With "<<n<<" prisoners and "<<words<<" words, I'd like to be number "<<first->prisonerNo<<endl;

}

int main()

{

CirList list;

int skip,n,words;

cout<<"Enter the number of prisoners:";

cin>>n;

list.create(n); //calling create() function to create circular link list

cout<<"Enter the number of words:";

cin>>words;

list.survivor(n,words); //calling function to know correct position of surviver

return 1;

Learn more about program

https://brainly.com/question/26134656

#SPJ4

Suppose we have a 16-block cache. Each block of the cache is one word wide. When a given program is executed, the processor reads data from the following sequence of decimal addresses:
0,15,2,8,14,15,26,2,0,19,7,10,8,14,11
. Show the contents of the cache at the end of the above reading operations if: - The cache is directly mapped - The cache is a 2-way set associative - The cache is a 4-way set associative - The cache is a fully associative Note: The content address 0 can be shown as [0]. Assume LRU replacement algorithm is used for block replacement in the cache, and the cache is initially empty.

Answers

Fully Associative: [0,15,2,8,14,15,26,2,0,19,7,10,8,14,11]

What is associative?

Associative is a type of thinking or learning that involves connecting or associating concepts or ideas to one another. It is a way of learning that involves the formation of mental links between different concepts and ideas, allowing a person to connect disparate concepts and ideas to one another in a meaningful way. Associative thinking can be used to help problem solve, explore new topics, and even to build new knowledge. It is an important part of the learning process and can help people gain a better understanding of the world around them.

Directly Mapped: [0], [15], [2], [8], [14], [15], [26], [2], [0], [19], [7], [10], [8], [14], [11]

2-way Set Associative: [0,15], [2,8], [14,15], [26,2], [0,19], [7,10], [8,14], [11]

4-way Set Associative: [0,15,2,8], [14,15,26,2], [0,19,7,10], [8,14,11]

To learn more about associating
https://brainly.com/question/28800842
#SPJ4

One of your customers has called you regarding some issues he is having with his graphics while
gaming. After troubleshooting the issue over the phone for a time, you feel it would be helpful to
get a detailed report of his system to see if the computer meets the minimum system
requirements for the game he is playing.
Which of the following is the BEST tool to create the desired report?

Answers

The BEST tool to use in order to create the needed report for Regarding some problems with his graphics while gaming, one of your clients has called DxDiag.

DxDiag.exe must be launched. This utility is intended to gather device information to aid in the investigation of DirectX sound and visual issues. When you ask for assistance, a support person can ask you for this information, or you might post it on a forum. In Windows, click Start and type "dxdiag" into the taskbar search box. From the list of results, pick dxdiag. presenting facts in a style that incorporates both text and visuals. Graphics are used, for instance, in computer-aided design, typesetting, and video games.

Learn more about graphics here

https://brainly.com/question/11764057

#SPJ4

spreadsheets are super helpful in helping you stay organized when calculating recipe costs because they have different rows and columns to track all your individually and what they cost.

Answers

Additionally, spreadsheets can help you to quickly add up all your ingredient costs and track the total cost of the recipe. This makes it much easier to determine your profit margins and adjust the cost of ingredients to reach a desired price point.

What is spreadsheet?
A spreadsheet is a type of computer program used to store and manipulate data arranged in a tabular format. It is typically used to create tables of data and to perform calculations on the data. Spreadsheets contain cells, which can hold data, formulas, or references to other cells. Cells can also contain formatting information such as font type and size. Spreadsheets are used to store, analyze, and share data for many different applications such as business, finance, scientific research, and personal organization. Spreadsheets can be used to create charts and graphs. They can also be used to automate repetitive tasks, such as invoicing and payroll. Spreadsheets are used by people in all walks of life, from students to entrepreneurs to government agencies.

To learn more about spreadsheet
https://brainly.com/question/4965119
#SPJ1

Other Questions
A random sample of 100 students had a mean grade point average (GPA) of 3.2 with a standard deviation of 0.2. Calculate an approximate 95% confidence interval for the mean GPA for all students. Note: Assume z-statistics at 95% confidence interval is 2. Report your answer as" ( X.XX - Y.YY) in 2 decimal points. identify a true statement about the life skills training program. 1. it teaches acceptance skills and focuses on substance users. 2. it is a drug education program and takes a neutral approach to drug use. 3. it is a 3-week program conducted to train teachers. 4. it is based on the social influence model. Which of the following is true about the t-distribution? Assume a reference (random) sample of size 100 with sample mean 10 and sample standard deviation of 1 with unknown population mean and variance.a.The t-distribution will look similar to the standard normal distribution as the sample size increases which results in the degrees of freedom increasing.b.The t-distribution will look similar to the standard normal distribution as the sample size increases which results in the degrees of freedom decreasing.c.The t-distribution will look similar to the normal distribution with mean 10 and standard deviation 1 as the sample size increases which results in the degrees of freedom decreasing.d.The t-distribution will look similar to the normal distribution with mean 10 and standard deviation 1 as the sample size increases which results in the degrees of freedom increasing.e.None of these Marc wrote down a 5 digit number on a piece of paper. The number when rounded off to the nearest thousand was 12 000. What was the greatest possible number that he wrote? during the capture stage of the data life cycle, a data analyst may use spreadsheets to aggregate data. A sampling distribution of the sample means of many large samples of a probability distribution is normally distributed. Which statement is true according to the Central Limit Theorem?A the original PD can have any shapeB the original PD must also be normal C the original PD must be uniform D the original PD must be symmetric how/why is the 1-child family one potential solution to the increasing problem of global warming due to co2 emissions? The map of a walking trail is drawn on a coordinate grid with three points of interest. The trail starts at R(3, 2) and goes to S(2, 2) and continues to T(2, 5). The total length of the walking trail is units. (Input whole numbers only.) (3 points) the smog that frequently exists in major metropolitan areas such as los angeles, california, is known as brown smog/phtochemical smog and consists primarily of what component? Clayton and Iri purchae admiion to a carnival plu a number of game ticket. Clayton purchaed 10 game ticket and pend $19. 50. Iri purchae 15 game ticket and pend $23. 25. Determine tye cot per game ticket The price of Matador is $7.11. Jenna wants to short 1,054 shares of MTDR. The maintenance margin is 25%, the initial margin is 51%. The yearly securities lending fee (APR) is 10.56%. If the price of MTDR is $7.43 one year after she shorted the shares, what is the value of equity in the position? Overtime Hours Worked A random sample of 15 registered nurses in a large hospital showed that they worked on average 44.6hours per week. The standard deviation of the sample was 2.3. Estimate the mean of the population with 99% confidence.Assume the variable is normally distributed. Round intermediate answers to at least three decimal places. Round your finalanswers to one decimal place. lana elf measured the width of 9 xmas presents the total width of all the presents was 135 inches if the presents were the same width ow wide was each present if all presents had different widths what is one possiility for the widths of 9 presents Find the volume V of the solid obtained by rotating the region bounded by the given curves about the specified line. y = 27x^3, y = 0, x = 1; about x = 2 quick changes in weight during a diet, in particular fad diets or low carb diets, are most likely the result of: All of the following were top cybercrimes reported to the IC3 in 2012 EXCEPT ________.A) identity theftB) non-auction scamC) advance fee fraudD) theft of services a segmented bar chart was created showing the lunch preference by grade. what percent would the bar for 11th graders show for preferring hotdogs? Identify the seven types of biomes from their location on a map and description question 1 what is a class of vulnerabilities that are unknown before they are exploited? 1 point acls attack vectors attack surfaces zero-day 2. A computer technician charges$75 for a consultation plus $35per hour