In Java, create a program to determine the perimeter and area of a rectangle. Write a rectangle class with a separate runner class. Allow the user to input the rectangle length and width. All should be tested in a runner. You need: file input using scanner, instance variables, constructors, minimum of 3 objects and 3 methods.
Example:
Please enter the length of the rectangle (in inches): 6
Please enter the width of the rectangle (in inches): 10
The area of the rectangle is 60 inches. The perimeter is 32 inches. Would you like to run another (y/n)?

Answers

Answer 1

The program to determine the perimeter and area of a rectangle can be written in Java programming language.

The code in Java is,

import java.util.*;

class Rectangle

{

private double l,w;

public Rectangle(double l,double w)

{

this.l=l;

this.w=w;

}

public double getArea()

{

return l*w;

}

public double getPeri()

{

return 2*(l+w);

}

public void printInfo()

{

System.out.println("The area of the rectangle is "+getArea()+" inches. ");

System.out.println("The perimeter is "+getPeri()+" inches.");

}

}

public class Main {

public static void main (String [ ] args)

{

Scanner sc=new Scanner(System.in);

char choice='y';

while(choice!='n'&&choice!='N')

{

System.out.println("Please enter the length of the rectangle (in inches): ");

double l,w;

l=sc.nextDouble();

System.out.println("Please enter the width of the rectangle (in inches): ");

w=sc.nextDouble();

Rectangle r=new Rectangle(l,w);

r.printInfo();

System.out.println("Would you like to run another (y/n)?: ");

choice=sc.next().charAt(0);

}

}

}

The variable l and w is to input for the length and width of rectangle, we can change the variable name.

We use the double datatype to ensure the precise calculation, also to provide the flexibility to the user since it doesn't only accept the integer number.

Learn more about Java here:

brainly.com/question/26642771

#SPJ4

In Java, Create A Program To Determine The Perimeter And Area Of A Rectangle. Write A Rectangle Class

Related Questions

FILL IN THE BLANK The _____stage of information technology planning outlines business processes that are central to achieving strategic goals and helps determine which ones could most benefit from information technology.

Answers

The business area analysis stage of information technology planning outlines business processes that are central to achieving strategic goals and helps determine which ones could most benefit from information technology.

What is Information Technology?

Utilizing hardware, software, services, and supporting infrastructure to manage and transmit information utilizing speech, data, and video is known as information technology. Data storage, retrieval, transmission, and sending are all part of the field of information technology, or IT.

The phrase "IT" is frequently used as a shorthand for computers and the networks that connect them, but it also refers to other means of information dissemination, such as television and mobile devices.

IT, or information technology, is the term used to describe the use of technology to an organization's business difficulties or to expedite and manage business processes.

To learn more about information technology, use the link given
https://brainly.com/question/26986135
#SPJ4

which of the following terms describes a network device that is exposed to attacks and has been hardened against those attacks?a. multi-homedb. kernel proxyc. bastion sacrificial hostd. circuit proxy

Answers

Host used as a bastion or sacrifice Unfirewalled hosts, sometimes known as bastions or sacrifice hosts, are unprotected. Any object protected from assault is referred to as a bastion host. A device deliberately left open to assault, like a honeypot, could serve as a sacrifice host.

Which of the following best defines a network device that is vulnerable to assaults and has been hardened against those attacks?

Unfirewalled hosts are referred to as bastions or sacrifice hosts. Any object protected from assault is referred to as a bastion host.

Which of the three access control kinds are they?

Role-based access control (RBAC), mandatory access control, and discretionary access control are the three basic categories of access control systems (MAC).

To know more about network device visit :-

https://brainly.com/question/28618641

#SPJ4

Using for loop,write a program that accepts a series of genders from a class of 10 students and count the number of female and male students in the class(c++ programming)
Output:in the file

Answers

#include <iostream>

#include <algorithm>

#include <vector>

#include <cctype>

int main(int argc, char* argv[]) {

   //Creating a vector. It's also dynamic array.

   std::vector<char> genders;

   //Input section using loop.

   for(int i=0; i<10; i++) {

       //Point. If the user entered the wrong letter and something else, start from here.

       wrong_input:

           //Variable that store the gender letter.

           char gender;

           //Ask the user.

           std::cout << "Enter gender of student " << i+1 << " <F/M>: "; std::cin >> gender;

           //Check if something went wrong. Basic Exception handling.

           if(tolower(gender) == 'f' || tolower(gender) == 'm') {

               //Send data into vector.

               genders.push_back(tolower(gender));

           } else {

               std::cout << "Something went wrong. Try again for student " << i+1 << std::endl;

               goto wrong_input;

           }

   }

   //Inform the user.

   std::cout << "\nThe number of female students are " << std::count(genders.begin(), genders.end(), 'f') << "\nThe number of male students are " << std::count(genders.begin(), genders.end(), 'm') << std::endl;    

   return 0;

}

FILL IN THE BLANK the _____clustering method first quantizes the object space into a finite number of cells that form a structure and then performs clustering on the_____structure.

Answers

Grid clustering method first quantizes the object space into a finite number of cells that form a structure and then performs clustering on the Grid structure.

What is grid-based method?The instance space is partitioned into a grid structure in grid-based methods. Then, instead of utilizing distinct data points as the basic units for clustering, the grid's Cells are used. The processing time improvement is this method's main benefit. A statistical method for grouping data is known as model-based clustering. It is believed that the observed (multivariate) data was produced from a finite mixture of component models. A probability distribution, often a parametric multivariate distribution, makes up each component of a component model. The grid technique is a textual strategy for teaching multiplication to kids. Prior to multiplication, it entails dividing integers into tens and units.

To learn more about grid  refer to:

https://brainly.com/question/28334899

#SPJ4

In database recovery, the transaction log shows before and after images of records that has been modified by transactions. Yes No

Answers

As per the given statement in the question in database recovery, the transaction logs show before and after images of records that have been modified by transactions. The answer is true.

What is a database?

A database is a group of data that is electronically accessible and stored in computing. Small data can be kept on such a file system, whereas large databases are kept in data centers or the cloud.

Database design encompasses both formal methodologies and pragmatic factors, such as data modelings, effective data presentation and storage, scripting languages, privacy and security of sensitive data, and cloud control issues, such as concurrent access support and fault tolerance.

Therefore, the given statement is true.

To know more about the Database:

https://brainly.com/question/29412324

#SPJ4

a decision that faithfully reflects the concerns and interests of affected parties fulfills which of the following dimensions of quality with respect to decision making? group of answer choices justice due process fairness coherence accuracy

Answers

Answer:

Explanation:

Justice, fairness, and due process.

11-12 sid davidson is the personnel director of babson and willcount, a company that specializes in consulting and research. one of the training programs that sid is considering for the middle-level managers of babson and willcount is leadership training. sid has listed a number of activities that must be completed before a training program of this nature could be conducted. the activities and immediate predecessors appear in the following table:

Answers

Explanation:

when 11 times a certain integer is subtracted from twice the square of the integer ,the result is 21 what is the integer

how to solve
write a function fact that takes an integer as a parameter and returns the factorial of that number in c program

Answers

Answer:

#include <stdio.h>

// Function prototype

int fact(int num);

int main() {

 int num = 5;

 

 printf("The factorial of %d is %d\n", num, fact(num));

 

 return 0;

}

// Function definition

int fact(int num) {

 int result = 1;

 

 for (int i = 1; i <= num; i++) {

   result *= i;

 }

 

 return result;

}

Explanation:

The fact() function takes an integer as a parameter and calculates the factorial of that number by using a for loop to multiply the numbers from 1 to the given number. It then returns the result of the calculation.

In this example, the main() function calls the fact() function and passes the value 5 as an argument. The fact() function calculates the factorial of 5 and returns the result, which is then printed to the console by the main() function.

17. build a phone-book utility that allows you to access and modify an alphabetical list of names, addresses and telephone numbers. use utilities such as awk and sed, to maintain and edit the file of phone-book information. please use pseudo names and numbers (maintain privacy) in the phone book. the phone-book needs to have at least 20 entries. 18. must incorporate use of functions and pointers

Answers

To build a phone-book utility that allows you to access and modify an alphabetical list of names, addresses and telephone numbers, check the code given below.

What is telephone numbers?

A telephone number is a set of digits that is assigned to a landline telephone subscriber station that is connected to a phone line, to a wireless electronic telephony device, such as a radio telephone or a mobile telephone, or to other devices in order to transmit data over the public switched telephone network (PSTN) or other public and private networks.

When switching calls, a telephone number serves as an address using a system of destination code routing. On the calling party's originating phone set, the calling party enters or dials a telephone number, and the originating phone set sends the entered or dialled numbers as a signal to a phone exchange. The exchange concludes the call by connecting it to the called party over the PSTN or to a different subscriber who is locally connected.

//CODE//

#!/bin/sh

         #this particular script can be used for entry purpose

          echo -n "Enter the name of the person: "

         read name

         echo -n "Provide the address of respective person: "

        read address

         echo -n "Provide the phone number of respective person: "

        read telephone_number

         echo "$name ;

$address ;

$telephone_number" >>book.txt

          #book.txt:- {{provide the address of text file where you want to store the info

}

}

or it will create one in the current directory

Learn more about telephone number

https://brainly.com/question/13096298

#SPJ4

Capitalize words programming challenge description: write a program which capitalizes the first letter of each word in a sentence. input: your program should read lines from standard input. each line has a sequence of words. output: print the capitalized words.

Answers

The sample solution for the programming challenge to capitalize the first letter of each word in a sentence:

#include <iostream>

#include <string>

#include <cctype>

using namespace std;

int main() {

 string line;

 while (getline(cin, line)) {

   // Iterate over each character in the line

   for (int i = 0; i < line.length(); i++) {

     // If this is the first character in a word, capitalize it

     if (i == 0 || isspace(line[i - 1])) {

       cout << (char)toupper(line[i]);

     } else {

       cout << line[i];

     }

   }

   cout << endl;

 }

 return 0;

}

This program reads lines from standard input using the getline function. It then iterates over each character in the line and checks whether it is the first character in a word. If it is, the character is capitalized using the toupper function. All other characters are printed as-is. The resulting capitalized words are then printed to standard output.

This solution assumes that words are separated by whitespace characters (e.g., spaces, tabs, newlines). If the input sentence uses a different delimiter (such as a comma or a period), you will need to modify the solution accordingly.

What is  getline function?

A string or line can be read from an input stream using the standard library function getline() in C++. It belongs to the string header. Until the delimiting character is reached, the getline() method collects characters from the input stream and appends them to the string object.

To know more about getline function checkout https://brainly.com/question/20388738

#SPJ4

which of the following will meet the needs of an organization who wants to control the construction and delivery of all cloud-based services? a. Public cloud
b. Hybrid cloud
c. Private cloud
d. Community cloud

Answers

The following factors should be taken into account when creating a successful enterprise hybrid cloud strategy in order to reduce risks and choose between private, public, and hybrid cloud options:

Protection and control Is physical access to the platforms and infrastructure that are utilized to supply workloads important? Are there any security and compliance standards that clients must adhere to.Flexibility and agility.Which cloud option will provide enough resources to suit the needs of developers and businesses?Which cloud infrastructure can effectively serve users during periods of high demand or peak usage? Management of application complexity.Security and control, application complexity management, and operating cost reduction are frequently non-negotiable in large enterprises.

To know more about hybrid cloud click on the below link:

https://brainly.com/question/27838623

#SPJ4

assume that three jobs arrive at approximately the same time (arrival time are all 0), but job a arrives slightly before job b, and job b arrives slightly before job c (if the jobs must be selected in order, the order should be a->b->c). job a requires 3 sec of cpu, job b is 5 secs, and job c is 4 secs. assume a time-slice of 1 second.

Answers

To calculate Response time, R.T = Time(at which the process get the cpu for 1st time) - Arrival Time(A.T)

Average Response time =(0+1+2 )/3 = 1second.

Turnaround Time, T.T = Exit time - A.T(Arrival Time) ,So for the SJF, T.T for B = (12-0) = 12 sec.

so, for FIFO, T.T for B = 8 seconds = (8-0) seconds.

What is Shortest Job First in cpu scheduling?

A scheduling strategy known as "shortest task first" chooses the process with the shortest execution time to run next. Preemptive or non-preemptive ordering is both possible for shortest job first.

Shortest job first is thought to be the best practice due of its simplicity. It also cuts down on the typical amount of time that other operations take to execute.

The terms shortest job first (SJF), shortest job next (SJN), and shortest process next are frequently used (SPN).

There are also some drawbacks to the shorter tasks being completed first. One effect of having several shorter processes is that it may result in process starvation for longer jobs.

Another is the need to be aware of each process's approx. anticipated execution time. This is frequently so difficult in so many system or cases.

To know more about shortest job first, visit: https://brainly.com/question/13814589

#SPJ4

A colleague mentions using a client VPN. Which of the following protocols or technologies would you expect your colleague to have used?
a. SSL
b. IPsec
c. GRE
d. DMVPN

Answers

A coworker brings up using a client VPN. The below protocols or technologies would you anticipate your coworker using SSL.

What are the protocols of technology?

An established set of guidelines that govern how data is transferred between various devices connected to the same network is known as a network protocol. In essence, it enables interconnected devices to interact with one another despite any variations in their internal workings, organizational structures, or aesthetics.

What kinds of protocols are examples?

Basic data communication technologies like TCP/IP and HTTP are examples of communication protocols. Through protocols like ICMP and SNMP, management protocols upkeep and control the network. HTTPS, SFTP, and SSL are security protocols.

To know more about network protocol visit:-

https://brainly.com/question/13327017

#SPJ4

Please help on this problem about data

Answers

Answer:

The answer is "sound"

Explanation:

Video: It includes both image and voice.

Images: It also includes data.

Memory: it uses to contain data.

Sound: It is a hardware device.  

Documents: It also contains files like text, images, graphs, and bar charts.

Text messages: It used in the electronic device, that includes string data.

numbers: It is also used to store data.

list and explain 3 components of the operating systems

Answers

Answer:

An operating system (OS) is a type of software that manages the hardware and software resources of a computer. It is the foundation on which other programs, such as application software, are built.  

There are three main components of an operating system:  

The kernel: This is the central part of the operating system that manages the hardware and software resources of the computer. It is responsible for allocating memory, controlling the input/output devices, and managing the system's resources. The shell: This is the interface between the user and the kernel. The shell allows the user to interact with the operating system using commands and programs. System libraries: These are collections of reusable software routines that provide common services to application programs. They are often used for tasks such as input/output, math operations, and other common tasks.

Together, these components form the core of an operating system, and they work together to provide the basic functionality that allows a computer to run.

Database administrators have created a database used by a web application. However, testing shows that the application is taking a significant amount of time accessing data within the database. Which of the following actions is MOST likely to improve the overall performance of a database?
A. Normalization
B. Client-side input validation
C. Server-side input validation
D. Obfuscation

Answers

A. Normalization. Normalization is a process used to organize a database in a way that reduces redundancy and dependency.

Normalization is a common technique used to improve the performance of a database by reducing the amount of data that needs to be accessed and processed. By organizing the data in a more efficient manner, normalization can help to improve the overall performance of a database, particularly when it is accessed frequently or by multiple users.

Client-side input validation and server-side input validation are both techniques used to validate user input and ensure that it is in the correct format. While these techniques can help to improve the security and reliability of a database, they are not directly related to performance and are not likely to have a significant impact on overall performance.

Learn more about performance, here https://brainly.com/question/13143885

#SPJ4

Which of the following statements correctly opens a file in append mode without the need for specifying a close function for the file? O A with open('my_listas file: O with open my list.txt', 'b') as file: OC file = with open('my.list.but, a) OD file with open('my_list.txt. a) QUESTION 9 Which code opens a csv file with semicolon as a delimiter? O A with open('myfile.csv, nas file: csv_data.csv.reader("my_file.csv, delimitery OB. with open('myfile.csv, as file: csv data-sv.reader file, delimiter - OC with open('myfile.csv, nas file: csv_data = csv.reader file, delimiter - semicolon OD with open('my file csv, ) as file csv data=csy reader(file)

Answers

Answer:  Your Answer Is In Steps

Explanation:  To open a file in append mode without specifying a close function, you can use the following statement:

with open('my_list.txt', 'a') as file:

This statement opens the file 'my_list.txt' in append mode, meaning that any data written to the file will be added to the end of the file, rather than overwriting the existing contents. The file will be automatically closed when the block of code indented under the 'with' statement is finished executing.

To open a CSV file with a semicolon as the delimiter, you can use the following statement:

with open('myfile.csv', 'r') as file:

csv_data = csv.reader(file, delimiter=';')

This statement opens the file 'myfile.csv' in read mode and creates a CSV reader object using the csv module. The delimiter parameter is set to ';', so the CSV reader will use a semicolon as the delimiter when parsing the data. The file will be automatically closed when the block of code indented under the 'with' statement is finished executing.

a children's book editor is writing code to detect words that are too large for the target reading level. their program processes the word lists from the sentences in the book, and creates a new list with words that are too large, i.e. more than 5 letters. How to do it ?

Answers

Sequencing, selection, and iteration are the three fundamental components of an algorithm. An algorithm is a series of processes, and the right sequencing of these phases is essential to ensuring that the algorithm works as intended.

What kind of assistance may distributed computing provide?Through the use of hundreds or thousands of computers operating simultaneously, distributed computing may enhance the performance of numerous solutions. By dividing the time required for the sequential solution by the time required for the distributed parallel solution, or "speedup, " we may determine the benefits.Sequencing, selection, and iteration are the three fundamental components of an algorithm. An algorithm is a series of processes, and the right sequencing of these phases is essential to ensuring that the algorithm works as intended. See what results by attempting those steps in various successions.

To learn more about algorithm refer to:

https://brainly.com/question/24953880

#SPJ4

which of the following scheduling algorithms will tend to schedule i/o bound jobs before cpu bound jobs?

Answers

I/O-bound processes are often given priority over CPU-bound processes under FCFS scheduling scheme.

What method is most appropriate for IO-bound processes?SRTF favors processes that are I/O-bound. LRTF favors processes that are CPU-bound. Reason: CPU-bound large CPU burst operations are prioritized higher.FCFS often penalizes I/O-bound operations and short processes. Processes that are CPU bound are preferred over I/O bound processes because they run completely.The complete phrase for FCFS is First Come First Serve. The easiest and simplest CPU scheduling algorithm is this one. The process that asks the CPU receives the CPU allocation first in this kind of procedure. A FIFO queue can be used to manage this scheduling technique.I/O-bound processes are often given priority over CPU-bound processes under FCFS scheduling scheme.

To learn more about I/O-bound refer to:

https://brainly.com/question/14704591

#SPJ4

Under the FCFS scheduling mechanism, I/O-bound processes frequently have precedence over CPU-bound ones.

Which approach is ideal for IO-bound processes?

Processes that are I/O-bound are preferred by SRTF. Processes that are CPU-bound are preferred by LRTF. Reason: Large CPU burst actions that are CPU-bound are given higher priority.

I/O-bound operations and brief processes are frequently penalized by FCFS. The fact that CPU-bound processes execute entirely makes them preferable to I/O-bound ones.

First Come First Serve is the full form of FCFS. This is the simplest and most straightforward CPU scheduling algorithm. In this type of method, the process that requests the CPU gets it first. This scheduling method may be controlled using a FIFO queue.

Under the FCFS scheduling mechanism, I/O-bound processes frequently have precedence over CPU-bound ones.

To learn more about I/O-bound refer to:

brainly.com/question/14704591

#SPJ4

Q Which of the following Algorithm favour CPU bound Bound process ?

1) RR  2) FCFS  3) Multilevel feedback queue

option are : a)  1 only

b) 2 only

c) 1 and 2 only

d) 1 and 3 only

Velma receives an email from a stranger who claims he will be receiving a large inheritance soon and will share it with her in exchange for a loan to help him escape his current financial difficulties. He requests that Velma allow him to pay his creditors from her bank account. Velma deletes the email because she recognizes that it represents _____.

Answers

Velma deletes the email because she recognizes that it represents advance fee fraud.

What is a bank account?

You can deposit and withdraw money from a bank account, make payments, send money to another person or organization, pay bills online, and more.

An account in banking is an arrangement whereby a company, often a financial institution like a bank or credit union, takes a customer's financial assets and retains them on the customer's behalf according to the customer's discretion.

Therefore, since Velma is aware that the email contains advance fee fraud, she deletes it.

To learn more about bank account, refer to the link:

https://brainly.com/question/28835887

#SPJ4

private string name; /* missing constructor */ } the statement below, which is located in a method in a different class, creates a new person object

Answers

The following can be used to replace / missing constructor / so that the object p is correctly created:

public Person(String n)

{

name = n;

}

What is a string?

A string is a type of data used in programming that is similar to integers and floating point numbers, but it represents text rather than numerical values. It is made up of a string of characters, which can also include spaces and numbers.

As an illustration, the words "hamburger" and "I ate 3 hamburgers" are both strings. If properly specified, even "12345" could be regarded as a string. To make sure that a string is recognized as a string and not a number or variable name, programmers typically have to enclose strings in quotation marks.

Learn more about strings

https://brainly.com/question/25324400

#SPJ4

lisa works as a system analyst for a small company. she is doing testing of a few applications in her system, and hence created a lot of restore points as a measure of backup. she observes that these restore points have taken up a large amount of her disk space and are making her system slow. which of the following utilities will you use to resolve this problem?

Answers

Perform regular system backups.

You work as a system administrator for a large of the organization. Some employees report to you that their system crashed  and is unable to boot. Although you have recovered their systems, you are  want to take proactive measures to plan the recovery of the systems by the  before any further failure occurs. Which of the following preparations can you take to meet your goal-

- Keep your computer up-to-date with Windows Update.

- Use current software to scan for any malware and ensure having the most recent updates.

- Perform regular system backups.

To know more about code click-

https://brainly.com/question/25976025

#SPJ4

to test an action query before running the query, it is a good practice to create a query first to make sure the correct records are selected.

Answers

A set of instructions for working with data is called a query. To carry out these instructions, you run a query. As well as returning outcomes — which can be arranged, gathered, or sifted — a question can likewise make, duplicate, erase, or change information.

The most fundamental reason for a query's poor performance is that it processes too much data. Some queries simply require extensive data shifting and cannot be avoided. But that's unusual; Changes can be made to most bad queries to access less data. The two-step process of analyzing a poorly performing query has proven useful to us:

Check to see if your application is obtaining more data than necessary. In most cases, this indicates that it is accessing too many rows, but it could also be accessing too many columns. Determine if the MySQL server is analyzing more rows than necessary. Action queries come in four varieties: make-table queries, append queries, delete queries, update queries, and so on. Action queries modify the data in the tables they are based on, with the exception of make-table queries, which create new tables. If you make changes with an action query that you later decide you didn't want to make, you will typically need to restore the data from a backup copy because these changes cannot be easily undone, such as by pressing CTRL+Z. Before running an action query, you should always ensure that you have a fresh backup of the underlying data.

To know more about Queries visit

brainly.com/question/29575174

#SPJ4

is typically the longest and most expensive phase of the sdlc. group of answer choices planning design analysis implementation

Answers

The phase of the systems development life cycle known as "implementation" is the most time-consuming and expensive (SDLC).

What stage of system development is the most crucial?

The requirement gathering and analysis phase of the SDLC is, according to many software development professionals, the most crucial step. The project team starts to grasp the expectations of the project's stakeholders at this point.

In the SDLC, which step is the most expensive?

Testing and planning phases, which can take anywhere from a month to several years, are the most expensive components of this type of software development. It rarely lasts longer than three years, though.

To know more about implementation visit :-

https://brainly.com/question/13142009

#SPJ4

Create Table EXAMS ( SUB_NO integer Not Null, STUDENT_NO integer Not Null, MARK decimal (3), DATE_TAKEN date Not Null, Primary Key (SUB_NO, STUDENT_NO, DATE_TAKEN));
The above SQL statement is used to create the EXAMS table. Considering the EXAMS table; which of the following table contents can't be inserted to the EXAMS table (assume date format is correct)?
a. alter table exams add student no as foreign key (exams); b. alter table exams add foreign key (student no) references students; c. alter table sub no add foreign key (exams); d. alter table exams foreign key (sub no);

Answers

The table content can't be inserted to the EXAMS table (assume date format is correct) is alter table exams add student no as foreign key (exams);. The correct option is a.

What is a SQL?

A database can be communicated using SQL. It is the accepted language for relational database management systems, claims ANSI (American National Standards Institute).

To change data on a database or to obtain data from a database, SQL statements are employed. A high-performance language called SQL is used to interact with databases.

Therefore, the correct option is a. alter table exams and add student no as a foreign key (exams);.

To learn more about SQL, refer to the link:

https://brainly.com/question/20264930

#SPJ4

Which of the following components requires special disposal procedures to comply with environmental guidelines?
a. Faceplate
b. Notebook battery
c. DDR3 doubles the data transfer rate of DDR2; DDR3 uses less power than DDR2
d. Install an add-on RAID controller

Answers

Answer:

Explanation:

card

B. Notebook battery

there are several application to assist you to surf through the internet mention three regarding computer​

Answers

Answer:

E-mailweb browsingpeer-to peer services

What power points feature will you use to apply motion effects to different objects of a slide

Answers

Answer:

Animation scheme can be used to apply motion effects to different objects of a slide.

Question 20:
Which of the following scenarios involve computers making predictions based on the analysis of
patterns in large data sets?
Select two answers.
Astate education board analyzing demographic information and academic records to identify students at risk
of dropping out of school.
The federal government analyzing state spending data to identify which states spent the most on social
services
A video streaming service analyzing viewer's habits to suggest videos based on the viewing history of other
viewers.
An airline analyzing flight records to determine the routes it operates with the least bookings.

Answers

Answer:

A video streaming service analyzing viewer’s habits to suggest videos based on the viewing history of other viewers.

 A state education board analyzing demographic information and academic records to identify students at risk of dropping out of school.

Explanation:

I just took the test and passed when you have multiple choice questions always pick ones that similar to each other and make sure it fit the question.

carolhas created a subnet of 10.20.30.0/27. which of the following is the address that is used for broadcast messages within the subnet?

Answers

For broadcast messages within the subnet, use the IP 10.20.30.31.

A host with the IP address 172.16.66.21 belongs to what subnetwork?

Every subnet has two hosts. A host with the IP address 172.16.66.0/21 is located in subnetwork. the broadcast address of the subnet 64 is 71.255 since is 72.0.

The cloud's method for allocating private IP addresses?

Method of allocating. According to the address range of the virtual network subnet where the resource is located, Azure assigns private IP addresses to resources. For each subnet address range, Azure reserves the top four addresses. Resource assignments cannot be made using the addresses.

To know more about subnet visit :-

https://brainly.com/question/16180699

#SPJ4

Other Questions
HELP URGENT PROBLEM IS IN THE PICTURE || SHOW YOUR WORK PLS ILL ADWQARD BRAINLEST Energy that comes from the Sun1. chlorophyll 2.Photosynthesis3.Radiant energy4.Phytoplankton Under British common law, what do judges rely on to interpret cases? codified lawsprecedentjurisdictionindictment THE ANSWER IS B An environmentalist wants to find out the fraction of oil tankers that have spills each month. Step 1 of 2: Suppose a sample of 211 tankers is drawn. Of these ships, 146 did not have spills. Using the data, estimate the proportion of oil tankers that had spills. Enter your answer as a fraction or a decimal number rounded to three decimal places. Plz help me its due soon. And no download link plzzzzzzzzCladograms are diagrams that can be used to show evolutionary relationships between different species. The diagram below is a cladogram of four plant groups.According to the diagram, which pair of groups diverged most recently?A. conifers and fernsB. conifers and mossesC. flowering plants and fernsD. flowering plants and conifers A XYZ is an equilateral triangle.X23ZYWhat is the measure of Z 2?HURRY AND NO LINKS Which of their daughters is Mr. Bennets alleged favorite and why? Jill has 34% of cyarons and 9999.0045 percent of markers how much will she have if she adds them together Someone plz help!! Plz read the question Many people believe that because wages are lower in developing countries than in developed countries, competition from developing countries in goods traded internationally will soon eliminate large numbers of jobs in developed countries. Currently, developed countries' advanced technology results in higher productivity, which accounts for their higher wages. Advanced technology is being transferred ever more speedily across borders, but even with the latest technology, productivity and wages in developing countries will remain lower than in developed countries for many years because developed countries have better infrastructure and better-educated workers. When productivity in a developing country does catch up, experience suggests that wages there will rise. Some individual firms in developing countries have raised their productivity but kept their wages (which are influenced by average productivity in the country's economy) low. However, in a developing country's economy as a whole, productivity improvements in goods traded internationally are likely to cause an increase in wages. Furthermore, if wages are not allowed to rise, the value of the country's currency will appreciate, which (from the developed countries' point of view) is the equivalent of increased wages in the developing country. And although in the past a few countries have deliberately kept their currencies undervalued, that is now much harder to do in a world where capital moves more freely.The passage suggests that if the movement of capital in the world were restricted, which of thefollowing would be likely?(A) Advanced technology could move more quickly from developed countries to developing countries.(B) Developed countries could compete more effectively for jobs with developing countries.(C) A country's average wages could increase without significantly increasing the sophistication of its technology or the value of its currency.(D) A country's productivity could increase without significantly increasing the value of its currency.(E) Workers could obtain higher wages by increasing their productivity. 7 students drew were 6, 4, 5, 7, and 8. What is the mean height of the triangles? How will how will taking ownership and communication most likely improve a relationship x2-3x-2=0 by Formula method What are the possible genotypes for blood type of the offspring of two parents, one with blood type O and one with blood type AB? Approximately 3 x 10 people live in the USA.In the world of 100 people, how many would live in the USA? Choose any topic to write about. It must have a title, topic sentence, 4-5 detail/supporting sentences and a conclusion sentence. please help mee on this question Please help!!! ill mark brainliest!! Cynthia wants to buy a round magnetic photo frame for her locker. The radius of the frame is 9cm. What is the circumference of the frame in terms of (pi) . tell me why you don beleive in god / jesus