developed the first compiler and conducted work that led to the development of COBOL ?

Answers

Answer 1

Answer:

Grace Hopper.

Explanation:

Grace Hopper was a US Naval Rear Admiral and an American computer scientist who was born on the 9th of December, 1906 in New York city, United States of America. She worked on the first commercial computer known as universal automatic computer (UNIVAC), after the second World War II.

In 1953 at the Remington Rand, Grace Hopper invented the first high-level programming language for UNIVAC 1 by using words and expressions.

Additionally, the high-level programming language known as FLOW-MATIC that she invented in 1953 paved the way for the development of common business-oriented language (COBOL).

Hence, Grace Hopper developed the first compiler and conducted work that led to the development of COBOL.


Related Questions

Assume that you are working with spreadsheets, word processing documents, presentation slides, images, and sound files for a school project. You stored all your files in a folder named “untitled” on your laptop. Now, you cannot locate a particular document in this folder and you realize that you need to organize your files properly.
Write down the steps that you will take to organize your files.

Answers

Answer:

See explanation below.

Explanation:

File organization is very important especially when one is working with numerous files from different applications.

When you are working with spreadsheets, word processing documents, presentation slides, images and sound files, it is important to create folders and sub-folders to make locating your files a lot easier.

Make sure you have all your files saved with names that are relevant to your school project.Create a sub-folder to store all spreadsheets files, create a sub-folder to store all word processing files, create a sub-folder to store all presentation slides and create another folder to store images and sound files. You do this to make it easy for you to locate whichever file you want. You create the sub-folder by right clicking on your documents section and clicking on new folder. Type in the name of the folder and save.After creating sub-folders,  create a general folder for all your folders by using the same method in step 3. Copy all your sub-folders into this major folder. You can name this folder the name of your school project.

This way, you never have to look for any files for your school project.

Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this document. Save the file in a directory named homeworks that you would have created. Set the permissions for this file such that only you can edit the file while anybody can only read. Find and list (on the command prompt) all the statements that contain the word POINTS. Submit your answer as a description of what you did in a sequential manner

Answers

Answer:

mkdir homeworks    // make a new directory called homeworks.

touch homework_instructions.txt //create a file called homework_instruction

sudo -i    // login as root user with password.

chmod u+rwx homework_instructions.txt  // allow user access all permissions

chmod go-wx homework_instructions.txt // remove write and execute permissions for group and others if present

chmod go+r homework_instructions.txt  // adds read permission to group and others if absent.

grep POINTS homework_instructions.txt | ls -n

Explanation:

The Linux commands above first create a directory and create and save the homework_instructions.txt file in it. The sudo or su command is used to login as a root user to the system to access administrative privileges.

The user permission is configured to read, write and execute the text file while the group and others are only configured to read the file.

Mark is a stockbroker in New York City. He recently asked you to develop a program for his company. He is looking for a program that will calculate how much each person will pay for stocks. The amount that the user will pay is based on:


The number of stocks the Person wants * The current stock price * 20% commission rate.


He hopes that the program will show the customer’s name, the Stock name, and the final cost.


The Program will need to do the following:


Take in the customer’s name.

Take in the stock name.

Take in the number of stocks the customer wants to buy.

Take in the current stock price.

Calculate and display the amount that each user will pay.

A good example of output would be:

May Lou
you wish to buy stocks from APPL
the final cost is $2698.90

Answers

ok sorry i cant help u with this

Your class is in groups, working on a sets worksheet. Your classmate suggests that if the union of two non-empty sets is the empty set, then the sets must be disjoint. What would you say to explain how this statement is false, and how would you help correct them

Answers

Answer:

The answer is "[tex]\bold{A \cap\ B=\phi}[/tex]"

Explanation:

let

[tex]A=\{1,2,3\}\\\\B=\{4,5,6\}[/tex]

A and B are disjoint sets and they are not an empty set  then:

[tex]A\cup\ B=\{1,2,3,4,5,6\} \\\\A\cup\ B\neq 0[/tex]

therefore if the intersection of the two non-empty sets is the empty set then its disjoint set, which is equal to [tex]\bold{A \cap\ B=\phi}[/tex].

Which of the statements below are true? Which are false?

a. In polling, I/O devices set flags that must be periodically checked by the CPU.
b. When using interrupts, the CPU interrupts I/O devices when an I/O event happens.
c. The overhead of polling depends on the polling frequency.
d. Polling is often a viable option for slow and asynchronous devices.
e. Synchronous I/O cannot be done with interrupts.
f. User processes are always blocked during asynchronous I/O operations.
g. Traps are software-generated interrupts.
h. System-calls can be implemented using either traps or polling.
i. DMA usually improves the overall system performance.
j. DMA is necessary for asynchronous I/O transfers

Answers

Answer:

a. True

b. False

c. False

d. True

e. True

f. True

g. False

h. True

i. False

j. False

Explanation:

Polling is a technique in which users are connect externally and programs are run by synchronization activity. The users are allowed to set flags for devices which are periodically checked. The end user can implement system calls using the polling technique.

Write a method that evaluates to true or false depending on whether a box completely fits inside another:
public boolean nests( Box outsideBox )
This is potentially a difficult method, since the box may fit or not fit depending on how it is rotated. To simplify the method, write it so that it returns true if the two boxes nest without considering rotations (so height is compared to height, length compared to length, and so on.)

Answers

Answer:

box outside box

Explanation:

It is used to display a window with many options, or buttons, in Easy GUI. It can be used in situations when it is necessary to determine which option is the first selection because it returns 1 for buttons with index 0 and 0 for buttons with other indexes.

What public boolean nests contain box outside box?

One of the built-in data types in Python is the Boolean type. It serves as a representation of an expression's truth value. For instance, the statement 0 == 1 is False while the statement 1 = 2 is True.

To write effective Python code, one must have a solid understanding of how Python's Boolean values operate.

A boolean value describes the checked attribute. Whenever it is present, it indicates that a checkbox next to an input> element should be selected (checked) before the page loads.

Therefore,  The checked attribute can be applied to both checkbox and radio input types. Additionally, JavaScript can be used to modify the checked attribute after the page has loaded.

Learn more about boolean nests here:

https://brainly.com/question/28660200

#SPJ5

During TCP/IP communications between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format with the appropriate layer of the OSI model.

a. Packets
b. Segments
c. Bits
d. Frames

1. Session Layer
2. Transport Layer
3. Network Layer
4. Data Link Layer
5. Physical Layer

Answers

Answer:

a. Packets - Network layer

b. Segments - Transport layer

c. Bits - Physical layer

d. Frames - Data link layer

Explanation:

When TCP/IP protocols are used for communication between two network hosts, there is a process of coding and decoding also called encapsulation and decapsulation.

This ensures the information is not accessible by other parties except the two hosts involved.

Operating Systems Interconnected model (OSI) is used to standardise communication in a computing system.

There are 7 layers used in the OSI model:

1. Session Layer

2. Transport Layer

3. Network Layer

4. Data Link Layer

5. Physical Layer

6. Presentation layer

7. Application layer

The information formats given are matched as

a. Packets - Network layer

b. Segments - Transport layer

c. Bits - Physical layer

d. Frames - Data link layer

Write a function called is_present that takes in two parameters: an integer and a list of integers (NOTE that the first parameter should be the integer and the second parameter should be the list) and returns True if the integer is present in the list and returns False if the integer is not present in the list. You can pick everything about the parameter name and how you write the body of the function, but it must be called is_present. The code challenge will call your is_present function with many inputs and check that it behaves correctly on all of them. The code to read in the inputs from the user and to print the output is already written in the backend. Your task is to only write the is_present function.

Answers

Answer:

The function in python is as follows

def is_present(num,list):

    stat = False

    if num in list:

         stat = True

       

    return bool(stat)

Explanation:

This defines the function

def is_present(num,list):

This initializes a boolean variable to false

    stat = False

If the integer number is present in the list

    if num in list:

This boolean variable is updated to true

         stat = True

This returns true or false        

    return bool(stat)

What is the relationship between an object and class in an OOP program?


The object contains classes.

The object and class are the same thing.

The object is used to create a class.

The object in a program is called a class.

Answers

Answer:

D. The object in a program is called a class.

Explanation:

Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995. Java was designed by a software engineer called James Gosling and it is originally owned by Oracle.

In object-oriented programming (OOP) language, an object class represents the superclass of every other classes when using a programming language such as Java. The superclass is more or less like a general class in an inheritance hierarchy. Thus, a subclass can inherit the variables or methods of the superclass.

Basically, all instance variables that have been used or declared in any superclass would be present in its subclass object.

Hence, the relationship between an object and class in an OOP program is that the object in a program is called a class.

For example, if you declare a class named dog, the objects would include barking, color, size, breed, age, etc. because they are an instance of a class and as such would execute a method defined in the class.

Write a program to help a local restaurant automate its breakfast billing system. The program should do the following:

Show the customer the different breakfast items offered by the restaurant.
Allow the customer to select more than one item from the menu.
Calculate and print the bill.
Assume that the restaurant offers the following breakfast items (the price of each item is shown to the right of the item):

Food Price
Plain Egg $1.45
Bacon and Egg $2.45
Muffin $0.99
French Toast $1.99
Fruit Basket $2.49
Cereal $0.69
Coffee $0.50
Tea $0.75

Use an array menuList of type menuItemType, as defined in Programming Exercise 3. Your program must contain at least the following functions:

Function getData: This function loads the data into the array menuList.
Function showMenu: This function shows the different items offered by the restaurant and tells the user how to select the items.
Function printCheck: This function calculates and prints the check. (Note that the billing amount should include a 5% tax.)

A sample output is:

Welcome to Johnny's Resturant

----Today's Menu----

1: Plain Egg $1.45
2: Bacon and Egg $2.45
3: Muffin $0.99
4: French Toast $1.99
5: Fruit Basket $2.49
6: Cereal $0.69
7: Coffee $0.50
8: Tea $0.75

You can make up to 8 single order selections
Do you want to make selection Y/y (Yes), N/n (No): Y
Enter item number: 1
Select another item Y/y (Yes), N/n (No): Y
Enter item number: 2
Select another item Y/y (Yes), N/n (No): N
Welcome to Johnny's Resturant
Plain Egg $1.45
Bacon and Egg $2.45
Tax $0.20
Amount Due $4.10

Format your output with two decimal places. The name of each item in the output must be left justified. You may assume that the user selects only one item of a particular type.

Answers

Answer:

Please find the code and its output in the attached file:

Explanation:

In this code a structure "menuItemType" is defined that declared float and integer variable and outside the structure its list type variable "menuList" is defined that holds and calculates its value.

In the next step, a class "Rest" is defined, and inside the class a method "getData", "showMenu", and "printCheck" is defined, in which the above methods uses the switch for input and calculate the value and the last "printCheck" calculates the Tax and Amount Due value.

In the main method, a class object is created that prints message and call the above method.

What Game is better Vacation Simulator Or Beat Saber

Answers

Answer:

I love Beat Saber and Beat Saber is the best!!!!

Explanation:

Answer:

I would have to agree with the other person I think Beat Saber is better than Vacation Simulator

Explanation:  

                               ~Notify me if you have questions~

                               have a nice day and hope it helps!

                                                         ^ω^

-- XxFTSxX

What do network operating systems use? Check
all of the boxes that apply.
hardware
software
plant material
desks
sunlight

Answers

Answer:

1 and 2Explanation:

Drag the tiles to the correct boxes to complete the pairs.
Match each type of database to its application
Multistage
Stationary
Distributed
Virtual
used for concise as well as detailed
historical data
arrowRight
used where access to data is rare
arrowRight
used for accessing data in diverse
applications using middleware
arrowRight
used by an organization that runs
several businesses
arrowRight

Answers

Answer:

1. Multistage database.

2. Stationary database.

3. Virtual database.

4. Distributed database.

Explanation:

A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.

There are four (4) major types of database in a data warehouse and these are;

1. Multistage database: used for concise as well as detailed historical data. It provides summarized data which can be used by an employee for short-term decision making.

2. Stationary database: used where access to data is rare i.e business firms who do not access data frequently. In order to use this database, the users must have an access to metadata store and thus, directly having access to the data on a source system.

3. Virtual database: used for accessing data in diverse applications using middleware. This type of database is dependent on having access to information on various databases.

4. Distributed database: used by an organization that runs several businesses. Therefore, this type of database are usually located or situated in various geographical regions.

let m be a positive integer with n bit binary representation an-1 an-2 ... a1a0 with an-1=1 what are the smallest and largest values that m could have

Answers

Answer:

Explanation:

From the given information:

[tex]a_{n-1} , a_{n-2}...a_o[/tex] in binary is:

[tex]a_{n-1}\times 2^{n-1} + a_{n-2}}\times 2^{n-2}+ ...+a_o[/tex]

So, the largest number posses all [tex]a_{n-1} , a_{n-2}...a_o[/tex]  nonzero, however, the smallest number has [tex]a_{n-2} , a_{n-3}...a_o[/tex] all zero.

The largest = 11111. . .1 in n times and the smallest = 1000. . .0 in n -1 times

i.e.

[tex](11111111...1)_2 = ( 1 \times 2^{n-1} + 1\times 2^{n-2} + ... + 1 )_{10}[/tex]

[tex]= \dfrac{1(2^n-1)}{2-1}[/tex]

[tex]\mathbf{=2^n -1}[/tex]

[tex](1000...0)_2 = (1 \times 2^{n-1} + 0 \times 2^{n-2} + 0 \times 2^{n-3} + ... + 0)_{10}[/tex]

[tex]\mathbf {= 2 ^{n-1}}[/tex]

Hence, the smallest value is [tex]\mathbf{2^{n-1}}[/tex] and the largest value is [tex]\mathbf{2^{n}-1}[/tex]

In this programming assignment, you will write a simple program in C that outputs one string. This assignment is mainly to help you get accustomed to submitting your programming assignments here in zyBooks. Write a C program using vim that does the following. Ask for an integer input from the user. Do not print any prompt for input. If the number is divisible by 3, print the message CS If the number is divisible by 5, print the message 1714 If the number is divisible by both 3

Answers

Answer:

In C:

#include <stdio.h>

int main() {

   int mynum;

   scanf("%d", &mynum);

   if(mynum%3 == 0 && mynum%5 != 0){

       printf("CS");    }

   else if(mynum%5 == 0 && mynum%3 != 0){

       printf("1714");    }

   else if(mynum%3 == 0 && mynum%5 == 0){

       printf("CS1714");    }

   else    {

       printf("ERROR");   }

   return 0;

}

Explanation:

This declares mynum as integer

   int mynum;

This gets user input

   scanf("%d", &mynum);

This condition checks if mynum is divided by 3. It prints CS, if true

   if(mynum%3 == 0 && mynum%5 != 0){

       printf("CS");    }

This condition checks if mynum is divided by 5. It prints 1714, if true

   else if(mynum%5 == 0 && mynum%3 != 0){

       printf("1714");    }

This condition checks if mynum is divided by 3 and 5. It prints CS1714, if true

   else if(mynum%3 == 0 && mynum%5 == 0){

       printf("CS1714");    }

This condition checks if num cannot be divided by 3 and 5. It prints ERROR, if true

   else    {

       printf("ERROR");    }

The cafeteria offers a discount card for sale that entitles you, during a certain period, to a free meal whenever you have bought a given number of meals at the regular price. The exact details of the offer change from time to time. Describe an algorithm that lets you determine whether a particular offer is a good buy. What other inputs do you need

Answers

Answer:

Explanation:

The algorithm can be described as follows

The first process is to ensure that the constraints for the time at which the offers begin is well defined.

TIME1 = 14:00

TIME2 = 16:00

TIME3 = 18:00

Then, decide the final number of meal following the free meal that has been offered.

NUMBER_OF_MEALS=4;

Then; decide the prices attached to the meal at regular times.

PRICE = 200;

At regular mode, decide the prices attached to the meal and as well as when the offer time commences.

PRICE_OFFER = 160;

Then ask the client(i.e the user) to put in the value required for the number of meals they desire to order.

Input values in n

Suppose (the value exceeds 8)

Then proceed to enquire from the client if they wish to go for the offer.

If not, use the regular price for the order.

Assume the client asks if the offer is a good one to bid for.

You are to show then the analysis of the calculation.

regular = 8 × PRICE

offer = 8 × PRICE_OFFER

profit = regular - offer

Finally, show the profit to the client which will let them know if it is good to bid for it or not.

Computing devices translate digital to analog information in order to process the information


Computing devices are electronic.


The CPU processes commands.


The memory uses binary numbers

Answers

Complete Question:

Which of the following about computers is NOT true?

Group of answer choices.

A. Computing devices translate digital to analog information in order to process the information.

B. Computing devices are electronic.

C. The CPU processes commands.

D. The memory uses binary numbers

Answer:

A. Computing devices translate digital to analog information in order to process the information.

Explanation:

Computing is the process of using computer hardware and software to manage, process and transmit data in order to complete a goal-oriented task.

The true statements about computers are;

I. Computing devices are electronic: the components and parts which makes up a computer system are mainly powered by a power supply unit and motherboard that typically comprises of electronic components such as capacitors, resistors, diodes etc.

II. The CPU processes commands: the central processing unit (CPU) is responsible for converting or transforming the data from an input device into a usable format and sent to the output device.

III. The memory uses binary numbers: computer only understand ones and zeros.

The default print setting for worksheets is________
Print Vertically
Print Selection
Print Entire Workbook
Print Active Sheets

Answers

Answer:

Print Active Sheets .

Explanation:

This question refers to the default printing system of the Excel program. Thus, when printing a job using this program, the default option will print all the active sheets, that is, all those spreadsheets where information has been entered. To be able to print in another option, such as selecting certain cells, rows or columns, you must configure the printing for this purpose.

Write a program, named NumDaysLastNameFirstName.java, which prompts the user to enter a number for the month and a number for the year. Using the information entered by the user and selection statements, display how many days are in the month. Note: In the name of the file, LastName should be replaced with your last name and FirstName should be replaced with your first name. When you run your program, it should look similar to this:

Answers

Answer:

Explanation:

The following code is written in Java and uses Switch statements to connect the month to the correct number of days. It uses the year value to calculate the number of days only for February since it is the only month that actually changes. Finally, the number of days is printed to the screen.

import java.util.Scanner;

public class NumDaysPerezGabriel {

   public static void main(String args[]) {

       int totalDays = 0;

       Scanner in = new Scanner(System.in);

       System.out.println("Enter number for month (Ex: 01 for January or 02 for February): ");

       int month = in.nextInt();

       System.out.println("Enter 4 digit number for year: ");

       int year = in.nextInt();

       switch (month) {

           case 1:

               totalDays = 31;

               break;

           case 2:

               if ((year % 400 == 0) || ((year % 4 == 0) && (year % 100 != 0))) {

                   totalDays = 29;

               } else {

                   totalDays = 28;

               }

               break;

           case 3:

               totalDays = 31;

               break;

           case 4:

               totalDays = 30;

               break;

           case 5:

               totalDays = 31;

               break;

           case 6:

               totalDays = 30;

               break;

           case 7:

               totalDays = 31;

               break;

           case 8:

               totalDays = 31;

               break;

           case 9:

               totalDays = 30;

               break;

           case 10:

               totalDays = 31;

               break;

           case 11:

               totalDays = 30;

               break;

           case 12:

               totalDays = 31;

       }

       System.out.println("There are a total of " + totalDays + " in that month for the year " + year);

   }

}

In the following code segment, assume that the ArrayList numList has been properly declared and initialized to contain the Integer values [1, 2, 2, 3]. The code segment is intended to insert the Integer value val in numList so that numList will remain in ascending order. The code segment does not work as intended in all cases.

int index = 0;
while (val > numList.get(index))
{
index++;
}
numList.add(index, val);

For which of the following values of val will the code segment not work as intended?

a. 0
b. 1
c. 2
d. 3
e. 4

Answers

Answer:

e. 4

Explanation:

The code segment will not work as intended if the value of the variable val is 4. This is because the while loop is comparing the value of the variable val to the value of each element within the numList. Since there is no element that is bigger than or equal to the number 4, this means that if the variable val is given the value of 4 it will become an infinite loop. This would cause the program to crash and not work as intended.

The program illustrates the use of while loops.

The code segment will not work as intended when the value of val is 4

Loops

Loops are used to perform repeated operations

The program

From the program, the while loop is repeated under the following condition:

val > numList.get(index)

This means that:

The loop is repeated as long as val has a value greater than the index of numList (i.e. 3)

From the list of options, 4 is greater than 3.

Hence, the code segment will not work as intended when the value of val is 4

Read more about loops at:

https://brainly.com/question/19344465

what is used to manufacture chips in computer​

Answers

Answer:

The process of creating a computer chip begins with a type of sand called silica sand, which is comprised of silicon dioxide. Silicon is the base material for semiconductor manufacturing and must be pure before it can be used in the manufacturing process.

Explanation:

You've created a new programming language, and now you've decided to add hashmap support to it. Actually you are quite disappointed that in common programming languages it's impossible to add a number to all hashmap keys, or all its values. So you've decided to take matters into your own hands and implement your own hashmap in your new language that has the following operations:
insert x y - insert an object with key x and value y.
get x - return the value of an object with key x.
addToKey x - add x to all keys in map.
addToValue y - add y to all values in map.
To test out your new hashmap, you have a list of queries in the form of two arrays: queryTypes contains the names of the methods to be called (eg: insert, get, etc), and queries contains the arguments for those methods (the x and y values).
Your task is to implement this hashmap, apply the given queries, and to find the sum of all the results for get operations.
Example
For queryType = ["insert", "insert", "addToValue", "addToKey", "get"] and query = [[1, 2], [2, 3], [2], [1], [3]], the output should be hashMap(queryType, query) = 5.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 2, 2: 3}
3 query: {1: 4, 2: 5}
4 query: {2: 4, 3: 5}
5 query: answer is 5
The result of the last get query for 3 is 5 in the resulting hashmap.
For queryType = ["insert", "addToValue", "get", "insert", "addToKey", "addToValue", "get"] and query = [[1, 2], [2], [1], [2, 3], [1], [-1], [3]], the output should be hashMap(queryType, query) = 6.
The hashmap looks like this after each query:
1 query: {1: 2}
2 query: {1: 4}
3 query: answer is 4
4 query: {1: 4, 2: 3}
5 query: {2: 4, 3: 3}
6 query: {2: 3, 3: 2}
7 query: answer is 2
The sum of the results for all the get queries is equal to 4 + 2 = 6.
Input/Output
[execution time limit] 4 seconds (py3)
[input] array.string queryType
Array of query types. It is guaranteed that each queryType[i] is either "addToKey", "addToValue", "get", or "insert".
Guaranteed constraints:
1 ≤ queryType.length ≤ 105.
[input] array.array.integer query
Array of queries, where each query is represented either by two numbers for insert query or by one number for other queries. It is guaranteed that during all queries all keys and values are in the range [-109, 109].
Guaranteed constraints:
query.length = queryType.length,
1 ≤ query[i].length ≤ 2.
[output] integer64
The sum of the results for all get queries.
[Python3] Syntax Tips
# Prints help message to the console
# Returns a string
def helloWorld(name):
print("This prints to the console when you Run Tests")
return "Hello, " + name

Answers

Answer:

Attached please find my solution in JAVA

Explanation:

long hashMap(String[] queryType, int[][] query) {

       long sum = 0;

       Integer currKey = 0;

       Integer currValue = 0;

       Map<Integer, Integer> values = new HashMap<>();

       for (int i = 0; i < queryType.length; i++) {

           String currQuery = queryType[i];

           switch (currQuery) {

           case "insert":

               HashMap<Integer, Integer> copiedValues = new HashMap<>();

               if (currKey != 0 || currValue != 0) {

                   Set<Integer> keys = values.keySet();

                   for (Integer key : keys) {

                       copiedValues.put(key + currKey, values.get(key) + currValue);

                   }

                   values.clear();

                   values.putAll(copiedValues);

                   currValue = 0;

                   currKey = 0;

               }

               values.put(query[i][0], query[i][1]);

               break;

           case "addToValue":

               currValue += values.isEmpty() ? 0 : query[i][0];

               break;

           case "addToKey":

               currKey += values.isEmpty() ? 0 : query[i][0];

               break;

           case "get":

               copiedValues = new HashMap<>();

               if (currKey != 0 || currValue != 0) {

                   Set<Integer> keys = values.keySet();

                   for (Integer key : keys) {

                       copiedValues.put(key + currKey, values.get(key) + currValue);

                   }

                   values.clear();

                   values.putAll(copiedValues);

                   currValue = 0;

                   currKey = 0;

               }

               sum += values.get(query[i][0]);

           }

       }

       return sum;

   }

Consider the definition of the Person class below. The class uses the instance variable adult to indicate whether a person is an adult or not.

public class Person
{
private String name;
private int age;
private boolean adult;
public Person (String n, int a)
{

name = n;
age = a;
if (age >= 18)
{
adult = true;
}
else
{
adult = false;
}
}
}

Which of the following statements will create a Person object that represents an adult person?

a. Person p = new Person ("Homer", "adult");
b. Person p = new Person ("Homer", 23);
c. Person p = new Person ("Homer", "23");
d. Person p = new Person ("Homer", true);
e. Person p = new Person ("Homer", 17);

Answers

Answer:

b. Person p = new Person ("Homer", 23);

Explanation:

The statement that will create an object that represents an adult person would be the following

Person p = new Person ("Homer", 23);

This statement creates a Person object by called the Person class and saving it into a variable called p. The Person method is called in this object and passed a string that represents the adult's name and the age of the adult. Since the age is greater than 18, the method will return that adult = true.

The other options are either not passing the correct second argument (needs to be an int) or is passing an int that is lower than 18 meaning that the method will state that the individual is not an adult.


Effects of disregarding to ignoring computer problems

Answers


-It can cause damage to essential computer hardware.

-It can also lead to electric shock circuit that may cause fire.

-Loss of information and data.

Python (and most programming languages) start counting with 0.
True
False

Answers

True....................

Answer:

yes its true  :)

Explanation:

PLEASE HELP
This graph shows the efficiencies of two different algorithms that solve the same problem. Which of the following is most efficient?

Answers

Answer:

D is correct

Explanation:

Think of it by plugging in values. Clearly the exponential version, according the graph, is more efficient with lower values. But then it can be seen that eventually, the linear will become more efficient as the exponential equation skyrockets. D is the answer.

Write a method that extracts the dollars and cents from an amount of money given as a floating-point value. For example, an amount 2.95 yields values 2 and 95 for the dollars the cents. You may assume that the input is always a valid non-negative monetary amount.

Answers

Answer:

The method in C++ is as follows:

void dollarextract(double money){

int dollar = int (money);

int cent = (money - dollar) * 100;

cout<<dollar<<" dollar "<<cent<<" cent";

}

Explanation:

This defines the method

void dollarextract(double money){

This gets the dollar part of the amount

int dollar = int (money);

This gets the cent part of the amount

int cent = (money - dollar) * 100;

This prints the amount in dollars and cent

cout<<dollar<<" dollar "<<cent<<" cent";

}

To call the method from main, use:  

dollarextract(2.95);

The above will return 2 dollar 95 cent

Please help! I don’t know the answer to it :( it’s Fashion marketing

Answers

Answer:

I believe the answer should be C)

Sorry if it’s wrong,but hope it helps

In the ( ) Model, each in a network can act as a server for all the other computers sharing files and acsess to devices

A host server
B client server
C peer to peer

Answers

Answer:

C peer to peer

Explanation:

A peer to peer is a computer network in a distributed architecture that performs various tasks and workload amount themselves. Peers are both suppliers and consumers of resources. Peers do similar things while sharing resources, which enables them to engages in greater tasks.

Answer:

C. Peer-to-peer

Explanation:

On Edge, it states, "In a peer-to-peer model, each computer in a network can act as a server for all the other computers, sharing files and access to devices."

I hope this helped!

Good luck <3

udsvb kbfnsdkmlfkmbn mk,dsldkfjvcxkm ,./ss.dskmcb nmld;s,fknvjf

Answers

Answer:

not sure what language it is

Explanation:

Other Questions
What is the value of x? Use an informal argument to justify your answer * A 6.40 g sample of a compound is burned to produce 8.37 g CO_2, 2.75 g H_2O, 1.06 g N_2, and 1.23 g SO_2. What is the empirical formula of the compound? Give your answer in the form C#H#N#O#S# where the number following the elements symbol corresponds to the subscript in the formula. (Dont include a 1 subscript explicitly). Hello, if you cod answer this it would be very much appreciated. what is a way to improve or maintain phychological health?what is something that has a negative impact on phychological health? A middle school took all of its 6th grade students on a field trip to see a play at atheater that has 5000 seats. The students filled 71% of the seats in the theater. Howmany 6th graders went on the trip? the supreme court helps settle conflicts between the various levels of government Which word best describes a conflict that takes place within a literary characterA. FictionalB. InternalC. ClimaticD. Dramatic What makes a country an enemy in the world we live in today? HELP ME PLEASE!!!!!!!! 5 1/4 divided by 5/8 someone please help! true or false? Both speed and acceleration include thedirection of an object's motion. 6z + 9 - 7 = 4z + 12 Which property of multiplication is shown?6 x 5 = 5 x 6 2. What was Napoleon Bonaparte's title when he was first elected as leader of the French republic? ndias caste system is based on all of the following factors except __________.A. the region a person comes fromB. the sports or games a person playsC. the ethnic group a person is a part ofD. the family heritage a person holdsPlease select the best answer from the choices provided A B C D Can someone please help me? Energy can be transferred from one place to another through? Which value of k makes 5 k + 12 = 16 a true statement?Choose 1 answer: Make 7 questions about the Declaration of Independence and answer them.