Suppose you have a class Ship, which was written by another programmer who used to work for your employer. Ship is used in several different applications. Ship contains a public method called getBearing() that consults gyroscopes and a compass to determine the direction in which the ship is moving and returns a Location object. You need to refactor the code to use a GPS receiver instead. You should

Answers

Answer 1

Answer:

Research of the GPS features and the modules and packages needed by the programming language to implement and receive data from a GPS tracker.

Explanation:

The Ship class is a blueprint that holds a data structure of a ship's location in coordinates. The location variable can be changed using the getBearing method and an instance of the ship class can be made several times for different ships in the harbor. This class depicts the power of object-oriented programming.

Refactoring is a concept in software engineering where source codes are modified to achieve code efficiency and speed. All programming language source code should be refactored where needed with the right packages or modules.


Related Questions

Which of the following is not true about templates?

It incorporates formatting elements.

They slow down the process of creating presentations.

It incoprorates layout options.

It may include content that can be modified.

Answers

The answer is they slow down the creating of presentations.

When computers are connected and operate through one main computer, it is called a _________ network. centralized client server GUI peer-peer

Answers

Answer:

the answer would be a client server

Explanation:

In a situation wherein computers are connected and operate through one main computer, it is called a client server network. Therefore, the option B holds true.

What is the significance of a client server network?

A client-server network can be referred to or considered as a network wherein all the systems that are collectively a part of the computer network are controlled and handled by a single system. This single system of computers is also known as the main computer.

The main computer has access to all the data, as well as information tracking of the activities performed by the main computer. In order to access anything between the different systems, the members systems need to get authorized access through the main computer.

Therefore, the option B holds true and states regarding the significance of a client server network.

Learn more about a client server network here:

https://brainly.com/question/28099574

#SPJ2

When performing actions between your computer and one that is infected with a virus, which of the following offers No risk of your computer becoming infected?
A. Printing to the same printer as infected computer
B. Accepting email attachments sent from an infected computer
C. Sharing Word documents with an infected computer
D. Sharing removable disks with an infected computer

Answers

Answer:

d

Explanation:

The correct option is D: Sharing removable disks with an infected computer

Removable disks are disks that use to keep data as well transfer data or information from one computer to another computer.

With Removable disks a computer infected with a virus cannot infect another Computer as the what the user does is to simply insert  the USB port of the  Removable disks into the computer which inturn enable the transfer of data to the computer to take place .

Learn more about Removable disks here:

https://brainly.com/question/4327670

1. Which of the following is a result of a successful negotiation?
Mediation
Win-win outcome
Conflict resolution
Consensus

Answers

Maybe a Win win outcome
I guess its Win-win outcome.
Thank you!

How to Print output in JavaScript

Answers

If you want to print on a page you can use

document.write();

If you want to write in console then there are multiple options

console.log() - to log information

console.error();- to log errors

console.warn(); - to log warning message

If you want to popup some information the you can use -

alert(message);

there are also various options present in alert.

or

print() essentially just calls up the native print dialog for a given window.

But as you're are thinking, it will work on any window or (i)frame.

thus if you write content to a frame, you can then call this to print it.

window.frameName.print();

note the only drawback (and its a big one), is that this calls up the print dialog... not the print preview window... thus the user doesn't really get a chance to see what they are printing and/or scale it to fit their printer/paper.

I personally wish that all browsers would implement the following to handle the above issue.

window.printPreview();

Hope this will help !!!

Answer:

Just add "document.wright();" to print text.

which of the following is involved in ordering an outline. A.grouping B.merging C.organizing D.arranging

Answers

Answer:

The answer is A.GROUPING

HOPE THIS HELPS...

Answer:

nice name

Explanation:

Explain what a wiki is and list its advantages.

Answers

Explanation:

Wikis are defined as a form of a website or web page or a database where the users can work on the data, they can even add or edit the data. Wikis use a very quick as well as a easy syntax that allows the users to format the text and create various links between the pages. The users need internet browsers for that.

One of the main advantage of wiki is that it provides ability to collaborate asynchronously, and also without  time constraints.Besides it also provides a beneficial function of something. It is free and not expensive.

Clicking and double-clicking are two of the five

Answers

Answer:

The correct answer is events

What does the security element of non-repudiation mean in e-commerce cybersecurity? A. Data needs to be available at all times. B. Only authorized personnel can access data. C. Each website should have privacy control settings. D. Clients cannot refuse to make payments once they place an order.

Answers

Answer:

Non-repudiation is the assurance that someone cannot deny the validity of something. Non-repudiation is a legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data

Explanation:

Answer:

Clients cannot refuse to make payments once they place an order.

Explanation:

PLATO Cyber-security

I got 5/5 on the quiz.

Write a program that performs the following tasks: Display a friendly greeting to the user Prompt the user for the value to convert (a String) Accept that String Prompt the user for the value of the initial base (an integer) Accept that integer Prompt the user for the desired base of the output (an integer) Accept that integer If the String is not a legal expression of a number in the initial base, display an error message and exit the program. Convert the value represented by the String in the initial base to the desired base. Display the result.

Answers

Explanation:

import java.util.Scanner;

import java.math.BigInteger;

public class Main

{

private int x;  

public static boolean isValidInteger(String theValue, int theBase)

{    

BigInteger number = new BigInteger(theValue,theBase);

if(theValue.equals(number.toString(theBase)))

{

return true;

}

else

return false;

}

public static String convertInteger(String theValue, int initialBase, int finalBase)

{

boolean valid=isValidInteger(theValue,initialBase);

if(valid==true)

{

BigInteger number = new BigInteger(theValue);

return(number.toString(finalBase));

}

else

return("String not in initial base");  

}

public static void main(String[] args)

{

System.out.println("Welcome");

String value;

int ibase, dbase;

if(args.length==0)

{

Scanner S = new Scanner(System.in);

System.out.println("Enter Value to be converted :: ");

value = S.nextLine();

System.out.println("Enter initial base :: ");

ibase = S.nextInt();

System.out.println("Enter desired base :: ");

dbase = S.nextInt();

}

else

{

value=args[0];

ibase=Integer.parseInt(args[1]);

dbase=Integer.parseInt(args[2]);

}

  System.out.println("Change base "+convertInteger(value,ibase,dbase));  

}

}

Output

How many bits are reserved for the Transmission Control Protocol (TCP) flags?

Answers

It’s 6 bits are reserved for the 6 TCP control flags. A connection, at which layer, implies that every segment of data sent is acknowledged? transport; A connection at the transport layer implies that every segment of data sent is acknowledged.

A general rule for printing is to use _____ fonts for headlines and serif fonts for body text. sans-serif fantasy cursive monospace

Answers

Answer:

sans-serif

Explanation:

Fonts can be defined as a graphical representation of texts which includes a collection of characters such as numbers, letters, symbols etc in various size, color, typeface, design or weight.

A general rule for printing is to use sans-serif fonts for headlines and serif fonts for body text. This ultimately implies that, for any printed work such as novels, books, newspapers etc, it is a general rule for a printer to use sans-serif fonts for headlines and serif fonts for body text in order to enhance readability.

Also, it can be reversed in some instances by using a serif font for headlines and a sans-serif font for the body of a text.

What makes Java platform independent?

Answers

Answer:

Java it is the use of Byte code that makes it platform independent.

Explanation:

Java platform independent language allows its the end users to access they source code and other language automatically,its a human readable language.

Java is created in the James Gosling at the sun micro systems,and java is an open source programming language, generally the people refer the java because its source connections.Java code may be use sequence of machine that can be use executed by the directly CPU,and all the program in java are compiled by java c.Java is an independent platform and variety of methods, its object oriented language, and java is study platform.Java program are compiled into byte code and that byte code is platform independent, and they machine execute the byte code the java virtual machine.Java is the platform independent because it does not depend on the type of platform,and the virtual machine also interpret the representations.Java compiler is the .class file or the byte code and the machine native code,java is that depend on java virtual machine.Java is does not required any licence to the run and they also reliable platform to work on.

Analyze the problem statement. Select the correct answer. Vision: We want to decrease errors in our billings to clients. Issue: It may be that we have too many new clients. Method: Develop new software that has multiple checkpoints of billing amounts before invoices are issued. This is a clear, well-defined problem statement. This problem statement will help the staff to focus. This problem statement does not provide a useful issue statement. This problem statement is specific.

Answers

Answer:

answer is B :)

Explanation:

Vision: We want to decrease errors in our billings to clients. This is a clear, well-defined problem statement was the solution.

What is clients?

The individual or customer who utilizes the services of a company, client, or organization is referred to as a “client.” The customer both uses the company's services and pays for them. The customer mostly purchases the company's services in accordance with her preferences and choices.

According to the vision of the given statement. Vision: We want to decrease errors in our billings to clients. It was the issued that so many clients. It was the clear, well-defined issue statement. It was the clear on the statement as easy to analyze that.

As a result, the conclusion of the is a clear, well-defined issue statement was the solution are the aforementioned.

Learn more about on client, here:

https://brainly.com/question/29051195

#SPJ3

A workstation’s user prefers KDE over GNOME. Which login manager can this user run to ensure direct login to KDE?
a. XDM
b. KDM
c. GDM
d. Any of the above

Answers

Answer:

B. KDM

Explanation:

The KDE display manager (KDM) was developed for the KDE desktop environment, while the GDM is a display manager for the gnome desktop environment.

The XDM display manager is used by the Linux operating system when a specific desktop environment is not chosen.

If you have a document that is relevant to more than one folder in your computer what should you do?

Answers

Answer:

save it to my docs

Explanation:

Which expansion slot is used by an NVMe compliant device?
1. PCI
2.USB-C
3.PCIe
4. SATA.

Answers

Answer:

3. PCIe

Explanation:

An expansion card is a slot on the motherboard of a computer which allow users use an additional feature such as network, video, sound that may not be available before.

PCIe is an expansion slot that is used by an NVMe compliant device. NVMe is the short form or acronym for “Non–Volatile Memory express. ”

How can you say that a computer is a versatile machine?​

Answers

Answer:

A computer is a versatile machine because is used for many purposes,a modern day computer can run multiple data at once making a fast and efficient machine very durable and effective for our use in all areas of life.

Which is used to input information on a laptop? Mouse Power button Memory storage Speakers

Answers

Answer:

Keyboard – one of the primary input devices used to input data and commands.

Explanation:

A laptop keyboard is more compact than a desktop keyboard to make the laptop smaller and lighter.

Answer:

mouse

Explanation:

flvs

ASAP

Which tool is useful before starting to code a website?

Rough draft
Storyboard
Text editor
WYSIWYG

Answers

Answer:

Story board

Explanation:

I took the quiz and i have proof that its right if you want it (from flvs coding class 1.03 is the quiz i took)

To the greatest extent possible, coalition members should _____.

Answers

Answer: consider the ramifications of labeling information about operational areas as intelligence

Explanation:

The options to the question are:

a. consider the ramifications of labeling information about operational areas as intelligence

b. prevent the sharing of relevant intelligence about the situation and adversary

c. occasionally seek the necessary authorization for foreign disclosure of information

d. disseminate information freely without a tear line.

To the greatest extent possible, coalition members should, consider the ramifications of labeling information about operational areas as intelligence.

It should be noted that security operations activities are conducted by U.S. forces in order to demonstrate the commitment of the U.S to its alliances, and also enhance regional stability.

Students who respond promptly to e-mails are following which netiquette rule?

A. keeping content appropriate
B. assessing an online environment
C. respecting everyone’s time
D. practicing ethical behaviors

Answers

Answer:

respecting everyone's time

Explanation:

they don't make people wait for a response

Its Option C - Respecting Everyone’s Time.
Thank you!

briefly explain the usage of the MS PowerPoint

Answers

Answer:

PowerPoint is a computer program that allows you to create and show slides to support a presentation. You can combine text, graphics and multi-media content to create professional presentations.

Answer:

Making your presentation more interesting through the use of multimedia can help to improve the audience's focus. PowerPoint allows you to use images, audio and video to have a greater visual impact. These visual and audio cues may also help a presenter be more improvisational and interactive with the audience.

Instructions
Currently, this program will add 6 and 3 together, output the math problem and output the answer. Edit this code so that a random number is generated from 1 - 10 (inclusive) for the variables a and b. Also, instead of adding the two numbers together, the edited program should multiply them, and output the proper math problem and answer. Be sure to update every line of code to reflect the changes needed. import random

Answers

Answer:

The original program is not given; So, I'll just write the program myself in python

import random

x = random.randint(1,10)

y = random.randint(1,10)

result = x * y

print(str(y)+" * "+str(x)+" = "+str(result))

Explanation:

The first line imports random

import random

The next two line generates random numbers between 1 and 10 and save in variables x and y

x = random.randint(1,10)

y = random.randint(1,10)

This line multiplies both numbers

result = x * y

This line prints the result

print(str(y)+" * "+str(x)+" = "+str(result))

The modified program written in python 3 is given below :

import random # import the random module for generating random numbers

a = random.randint(1, 11)#a random integer value between the values (1 and 10) is attached to variable a

b = random.randint(1,11)#a random integer value between the values (1 and 10) is attached to variable b

answer = a * b# multiplies the value of a and b and attach the result to the variable answer

print(str(a) + " * " + str(b) + " = " + str(answer))#displays the operation and result obtained as a string.

Learn more on python programs :https://brainly.com/question/16674303

Egyptian hieroglyphs were part of a writing system used by the ancient Egyptians. What type of graphic design elements did they contain?

Answers

Answer:

Logographic, syllabic, and alphabetic elements. I think thts what u were asking for?

Explanation:

A network is:
A. A group of people or things that are individually connected to one another.
B. A number of individuals who share the same values and ideas.
C.a means of mass communication in print and other forms.
D. The main idea or information contained in a media piece.

Answers

Explanation:

The answer to this question is A

The binary string 00100100 is a member of which of the following problems? Remember, a "problem" is a language whose strings represent the cases of a problem that have the answer "yes." In this question, you should assume that all languages are sets of binary strings interpreted as base-2 integers. The exception is the problem of finding palindromes, which are strings that are identical when reversed, like 00100100, regardless of their numerical value.

Answers

This question is incomplete, the complete question is;

The binary string 00100100 is a member of which of the following problems? Remember, a "problem" is a language whose strings represent the cases of a problem that have the answer "yes." In this question, you should assume that all languages are sets of binary strings interpreted as base-2 integers. The exception is the problem of finding palindromes, which are strings that are identical when reversed, like 00100100, regardless of their numerical value.

a) Is the given string a palindromes ?

b) Is the given string a perfect cube?

c) Is the given string greater than 50?

d) Is the given string even?

e) is the given string a perfect square?

Answer:

a) the given binary string is a palindromes

b) the given string is NOT a perfect cube

c) the given string is NOT greater than 50?

d) the given string is an even

e) the given string a perfect square

Explanation:

Given that;

binary string : 00100100

a)

Is the given string a palindromes ?

the given binary string = 00100100

now when you reverse the string, its still going to be : 00100100

so the given binary string is a palindromes

b)

Is the given string a perfect cube

the given string : 00100100 = 36

now 2^3 = 8,

3^3 = 27,

4^3 = 64

so 36 is not a perfect cubic

hence the given string is NOT a perfect cube

c)

Is the given string greater than 50?

the given string : 00100100 = 36

and 36 < 50

so the given string is NOT greater than 50?

d)

Is the given string even?

the given string  : 00100100 = 36

and 36 can be divided exactly by 2

so the given string is an even

e)

is the given string a perfect square?

the given string  : 00100100 = 36

now 6^2 = 36  i.e 6 multiply by 6 = 36

therefore the given string a perfect square

Many of the first photographers were actullay scientists and inventors

Answers

Answer:

True, if its a true or false. Otherwise I am of no help.

Explanation:

Answer:

True

Explanation:

What problems might you encounter when using the Web for research?
a. Lack of current news
b. Undocumented sources
c. Lack of search tools
d. Time-consuming searches
e. Unreliable conten

Answers

Answer:

b. d. e.

Explanation:

The web is a vast and endless database of information and has become an invaluable resource for research. That being said it can also bring with it many problems, the main one being unreliable content due to undocumented sources, false testimonies, information with no evidence, etc. The amount of false information on the internet can sometimes make it very time consuming since you have to take the extra step of verifying the information you come across. Despite this, the WEB has information on every topic including current news, and with the wide array of search tools available it is very easy to find what you are looking for.

$8.25/hour; _____$/year, when working 40 hours a week.

Answers

if you work 50 weeks/year and 40 hours/week, you will make 16,500 dollars per year if you make 8.25 per hour
Other Questions
List one benefit and one limitation of using scientific models. Which statement best summarizes Captain Smith's account of the conditions in the Jamestowncolony?A)The colonists were tired, but they worked hard to build houses.B)The colonists were farming and getting ready for winter,C)The colonists were building a fort for defense against Native American attacks.D)The colonists were sick, miserable, and unwilling to help themselves. all the living and nonliving things in a selected area form a (an)? how to do this question c. I know how to do b and a 6,0,3,2,2,5 that they scored Which statement best describes how Gilgamesh's dreams affect the plot of Gilgamesh: A New English Version? Which statement correctly connects Hinduism to the religious views of the AryaO Hinduism turned the polytheistic views of the Aryans into one supreme gocO Hinduism kept the polytheistic views of the Aryans but assigned different beHinduism turned the single-god beliefs of the Aryans into the worship of maHinduism kept the single-god beliefs of the Aryans but gave their supreme what is the speed of a car that travels a distance of 200m in 2.3 seconds ? Select all the correct answers.Which three food handlers cause cross-contamination of food?- Jason pauses prepping vegetables for a soup and scratches his scalp and then resumes histask.- Kim preps raw salmon on a cutting board and then slices tomatoes on the same cutting board.- Leandra preps hamburgerpatties thawed overnight at room temperature.- Immanuel mixes undercooked chicken with greens for a salad.- Mina uses an unclean cloth to wipe a tray that will hold cookies. Find two consecutive integers whose product is 12. Name 2 structures in your body that don't need O2 to live A population is growing at a rate of 2, 4, 8, 16, 32. Which type of growth does this describe? linear logistic exponential negative You talk to Luis, the Portuguese manager of the Austrian plant. He says the workers are uncooperative and do not carry out the instructions that he conveys to them. He shows you several emails in which they complain that he is too dominating, and that they find it hard to tell what he is thinking.What is your response to this situation Does anyone know the answer to this?18t + (3b)t + 75 What does The two maps of the Barrow Plantation demonstrate? HELP IMMEDIATELY! Please help, on 1, 2 and 3. Im so lost :( TWO QUESTIONS !! GEOMETRY An automobile manufacturer introduces a new model that averages 27 miles per gallon in the city. A person who plans to purchase one of these new cars wrote the manufacturer for the details of the tests, and found out that the standard deviation is 3 miles per gallon. Assume that in-city mileage is approximately normally distributed. What is the probability that the person will purchase a car that averages less than 20 miles per gallon for in-city driving A series of cash flows may not always necessarily be an annuity. Cash flows can also be uneven and variable in amount, but the concept of the time value of money will continue to apply. Consider the following case: The Purple Lion Beverage Company expects the following cash flows from its manufacturing plant in Palau over the next five years: Annual Cash Flows Year 1 Year 2 Year 3 Year 4 Year 5 $250,000 $37,500 $180,000 $300,000 $550,000 The CFO of the company believes that an appropriate annual interest rate on this investment is 6.5%. What is the present value of this uneven cash flow stream, rounded to the nearest whole dollar A proton the nucleus. A neutron the nucleus. An electron the nucleus. The boy's role , traits and evidence in the story "sixteen"