Answer:
Explanation:
The following method is written in Java, using the Item class and ItemGrid class found online we can use this method to grab the 2-dimensional array and compare the three neighbors in the same row. It saves the position of the neighbor with the greatest value in the variable greatest and then uses that position to call the getName() method from the object in that position to get the name of that Neighbor and returns the name.
public String mostValuableNeighbor(ItemGrid grid, int r, int c) {
int greatest = grid[r][c];
if (grid[r][c+1].getValue() > greatest.getValue()) {
greatest = grid[r][c+1];
}
if (grid[r][c-1].getValue() > greatest.getValue()) {
greatest = grid[r][c-1];
}
return greatest.getName();
}
In this exercise we have to use the knowledge of computational language in JAVA to write the code.
We have the code in the attached image.
The code in Java can be found as:
public String mostValuableNeighbor(ItemGrid grid, int r, int c) {
int greatest = grid[r][c];
if (grid[r][c+1].getValue() > greatest.getValue()) {
greatest = grid[r][c+1];
}
if (grid[r][c-1].getValue() > greatest.getValue()) {
greatest = grid[r][c-1];
}
return greatest.getName();
}
See more about JAVA at brainly.com/question/26104476
Briefly explain how Riboflavin deficiency lead to disease state.
Answer:
Severe riboflavin deficiency can impair the metabolism of other nutrients, especially other B vitamins, through diminished levels of flavin coenzymes [3]. Anemia and cataracts can develop if riboflavin deficiency is severe and prolonged [1]. The earlier changes associated with riboflavin deficiency are easily reversed.
The vulnerabilities common to the software development process, including buffer overflows, race conditions, input validation attacks, authentication attacks, authorization attacks, and cryptographic attacks, and how we might mitigate these by following secure coding guidelines. Besides protecting O S software on hosts, there is a need to protect applications that run on these devices. Aspects of application security includes all except:____.
A. Application development security.
B. Secure coding techniques.
C. Code testing.
D. Requirement Assessment.
Answer:
Aspects of application security includes all except:____.
D. Requirement Assessment.
Explanation:
The requirement assessment is carried out during the initial development stage to meet the user's requirements. This assessment does not necessarily deal with application security. However, the other three aspects are security-related. They focus on the areas where application security is mostly required to reduce errors and technical weaknesses of a software, including authentication, privacy, access control, data segregation, and error handling.
Create the following: (1) a CREATE VIEW statement that defines a view named FacultyCampus that returns three columns: FirstName, LastName, and Term for faculty that are teaching during the semester, along with the terms they teach, and (b) a SELECT statement that returns all of the columns in the view, sorted by Term, of faculty members who are teaching during the semester.
Answer:
a-
CREATE VIEW FacultyCampus
AS
SELECT F.FirstName, F.LastName, C.Term
FROM Faculty F, Course C
WHERE C.Faculty_ID=F.Faculty_ID
b-
SELECT *
FROM FacultyCampus
ORDER BY Term DESC
Explanation:
As the database table creation is not given, the question is searched and the remaining portion of the question is found which indicates the table created. This is attached:
From the created database, the view is created as follows:
a-
CREATE VIEW FacultyCampus
AS
SELECT F.FirstName, F.LastName, C.Term
FROM Faculty F, Course C
WHERE C.Faculty_ID=F.Faculty_ID
Here first the view is created in which the selection of the first name from faculty table, last name from faculty table, and term from the Course table is made where the values of Faculty ID in course table and Faculty ID of Faculty table are equal.
The select query is as follows:
b-
SELECT *
FROM FacultyCampus
ORDER BY Term DESC
Here the selection of all the columns from the view is made and are ordered by the term in the descending form.
write a c++ program that accept student information
Answer:
Structure
This program stores the information (name, roll and marks entered by the user) of a student in a structure and displays it on the screen.
To understand this example, you should have the knowledge of the following C++ programming topics:
C++ StructuresC++ StringsIn this program, a structure(student) is created which contains name, roll and marks as its data member. Then, a structure variable(s) is created. Then, data (name, roll and marks) is taken from user and stored in data members of structure variable s. Finally, the data entered by user is displayed.This structure has three members: name (string), roll (integer) and marks (float).
Then, a structure variable s is created to store information and display it on the screen.
Discuss similarities and differences between the software development and video game development processes.
Answer:
Game design is actually making the graphics of the game and how it works, software design is when the make all the equipment for the console and how it looks like.
Briefly stated, game design is an art, whereas software design is about the technicalities involved in creating any form of software, which include software architecture development, UX/UI, etc. Software design will eventually be a part of the game design, prototyping, and development process, among other things. Designing a game means having a creative idea, prototyping the gameplay, conceptualizing art, and then moving on to actual development process which will have programming, detailed artwork, audio production, game play development, etc.
Explanation:
Game design is an art, whereas software development is all about the technicalities which are involved in creating any form of software.
What is game design and software development?Game design is the making of the graphics of a game and how it actually works, software design is the making of all the equipment for the console and how it actually looks like.
Game design is an art, whereas software design is about the technicalities which are involved in creating any form of software, which include the software architecture development, UX/UI development, etc. Software design will eventually be a part of the whole game design, prototyping, and developmental processes, among other things. Designing a game means having a creative idea or thought, prototyping the gameplay, conceptualizing of the art, and then moving on to actual development process which will have all the programming, detailed artwork, audio production, game play development, etc.
Learn more about Software development here:
https://brainly.com/question/3188992
#SPJ2
5.27 LAB*: Program: Soccer team roster (Vectors)
This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balanced team.
(1) Prompt the user to input five pairs of numbers: A player's jersey number (0 - 99) and the player's rating (1 - 9). Store the jersey numbers in one int vector and the ratings in another int vector. Output these vectors (i.e., output the roster). (3 pts)
Ex:
Enter player 1's jersey number:
84
Enter player 1's rating:
7
Enter player 2's jersey number:
23
Enter player 2's rating:
4
Enter player 3's jersey number:
4
Enter player 3's rating:
5
Enter player 4's jersey number:
30
Enter player 4's rating:
2
Enter player 5's jersey number:
66
Enter player 5's rating:
9
ROSTER
Player 1 -- Jersey number: 84, Rating: 7
Player 2 -- Jersey number: 23, Rating: 4
...
(2) Implement a menu of options for a user to modify the roster. Each option is represented by a single character. The program initially outputs the menu, and outputs the menu after a user chooses an option. The program ends when the user chooses the option to Quit. For this step, the other options do nothing. (2 pts)
Ex:
MENU
a - Add player
d - Remove player
u - Update player rating
r - Output players above a rating
o - Output roster
q - Quit
Choose an option:
(3) Implement the "Output roster" menu option. (1 pt)
Ex:
ROSTER
Player 1 -- Jersey number: 84, Rating: 7
Player 2 -- Jersey number: 23, Rating: 4
...
(4) Implement the "Add player" menu option. Prompt the user for a new player's jersey number and rating. Append the values to the two vectors. (1 pt)
Ex:
Enter a new player's jersey number:
49
Enter the player's rating:
8
(5) Implement the "Delete player" menu option. Prompt the user for a player's jersey number. Remove the player from the roster (delete the jersey number and rating). (2 pts)
Ex:
Enter a jersey number:
4
(6) Implement the "Update player rating" menu option. Prompt the user for a player's jersey number. Prompt again for a new rating for the player, and then change that player's rating. (1 pt)
Ex:
Enter a jersey number:
23
Enter a new rating for player:
6
(7) Implement the "Output players above a rating" menu option. Prompt the user for a rating. Print the jersey number and rating for all players with ratings above the entered value. (2 pts)
Ex:
Enter a rating:
5
Answer:
Explanation:
The following code is written in Java and loops five times asking for the desired inputs from the user and saves that information in two Vectors named jerseyNumber and ratings. Then creates a while loop for the menu and a seperate method for each of the options...
import java.util.Scanner;
import java.util.Vector;
class Brainly {
static Scanner in = new Scanner(System.in);
static Vector<Integer> jerseyNumber = new Vector<>();
static Vector<Integer> ratings = new Vector<>();
public static void main(String[] args) {
for (int x = 0; x < 5; x++) {
System.out.println("Enter player " + (x+1) + "'s jersey number:");
jerseyNumber.add(in.nextInt());
System.out.println("Enter player " + (x+1) + "'s rating:");
ratings.add(in.nextInt());
}
boolean reloop = true;
while (reloop == true) {
System.out.println("Menu");
System.out.println("a - Add player");
System.out.println("d - Remove player");
System.out.println("u - Update player rating");
System.out.println("r - Output players above a rating");
System.out.println("o - Output roster");
System.out.println("q - Quit");
char answer = in.next().charAt(0);
switch (answer) {
case 'a': addPlayer();
break;
case 'd': removePlayer();
break;
case 'u': updatePlayer();
break;
case 'r': outputRating();
break;
case 'o': outputRoster();
break;
case 'q': System.exit(0);
reloop = false;
break;
}
}
}
public static void addPlayer() {
System.out.println("Enter player's jersey number:");
jerseyNumber.add(in.nextInt());
System.out.println("Enter player's rating:");
ratings.add(in.nextInt());
}
public static void removePlayer() {
System.out.println("Enter Jersey number:");
int number = in.nextInt();
for (int x = 0; x < jerseyNumber.size(); x++) {
if (jerseyNumber.get(x) == number) {
jerseyNumber.remove(x);
ratings.remove(x);
}
}
}
public static void updatePlayer() {
System.out.println("Enter Jersey number:");
int number = in.nextInt();
System.out.println("Enter new Rating:");
int rating = in.nextInt();
for (int x = 0; x < jerseyNumber.size(); x++) {
if (jerseyNumber.get(x) == number) {
ratings.set(x, rating);
}
}
}
public static void outputRating() {
System.out.println("Enter Rating:");
int rating = in.nextInt();
for (int x = 0; x < ratings.size(); x++) {
if (ratings.get(x) >= rating) {
System.out.println(jerseyNumber.get(x));
}
}
}
public static void outputRoster() {
for (int x = 0; x < jerseyNumber.size(); x++) {
System.out.println("Player " + (x+1) + " -- Jersey number: " + jerseyNumber.get(x) + ", Rating: " + ratings.get(x));
}
}
}
Time-management techniques work most effectively when performed in which order?
prioritize tasks, reward system, study-time survey, project schedule
project schedule, study-time survey, reward system, prioritize tasks
reward system, prioritize tasks, project schedule, study-time survey
study-time survey, project schedule, prioritize tasks, reward system
Answer:
study-time survey, project schedule, prioritize tasks, reward system.
Explanation:
Time management can be defined as a strategic process which typically involves organizing, planning and controlling the time spent on an activity, so as to effectively and efficiently enhance productivity. Thus, when time is properly managed, it avails us the opportunity to work smartly rather than tediously (hardly) and as such making it possible to achieve quite a lot within a short timeframe. Also, a good time management helps us to deal with work-related pressures and tight schedules through the process of properly allocating the right time to the right activity.
Hence, time-management techniques work most effectively when performed in the following sequential order; study-time survey, project schedule, prioritize tasks, and designing (creating) a reward system.
Answer:
The Answer is:
D. study-time survey, project schedule, prioritize tasks, reward system
Explanation:
got it right on edge
What does an operating system provide so you can interact with a device
Answer:
Operating system software provides the user interface for interacting with the hardware components, whereas application software enables you to accomplish specific tasks.
Explanation:
please give me brainlist and follow
An operating system provides graphical user interface, which enables the user to interact seamlessly with a computer device.
Graphical user interface (GUI) provides user-friendly visual representations to help the user to manage the human interaction with the device via the operating system.
Some graphical user interface tools include icons, menus, and mouse.
Thus, with visual representations of data and operating instructions, users are able to understand the operating system and interact easily with the computer device.
Read more about graphical user interface at https://brainly.com/question/16956142
What are some things you need to be careful not to change while editing a macro? Check all that apply. commas names spaces brackets rows columns
Answer:
commas, spaces, brackets
Explanation:
I hope this helps.
What is the output of the following code?
int num=25;
if (num > 5)
System.out.print(num + " ");
num += 10;
}
if (num > 30){
System.out.print(num + " ");
num += 5;
}
if (num > 45 ) {
System.out.print(num);
}
Answer:
25 35
Explanation:
First if checks if num is greater than 25, it is so it prints 25 with a space after and adds 10 to num (num is now 35)
Then it checks if num is greater than 30, it is, so it prints 35 with a space after and adds 5 to num (num is now 40)
Lastly, it checks if num is greater than 45, it is not, so the program terminates with output: "25 35 " (note the space at the end)
You have been tasked with building a URL file validator for a web crawler. A web crawler is an application that fetches a web page, extracts the URLs present in that page, and then recursively fetches new pages using the extracted URLs. The end goal of a web crawler is to collect text data, images, or other resources present in order to validate resource URLs or hyperlinks on a page. URL validators can be useful to validate if the extracted URL is a valid resource to fetch. In this scenario, you will build a URL validator that checks for supported protocols and file types.
What you need to do?
1. Writing detailed comments and docstrings
2. Organizing and structuring code for readability
3. URL = :///
Steps for Completion
Task
Create two lists of strings - one list for Protocol called valid_protocols, and one list for storing File extension called valid_ftleinfo . For this take the protocol list should be restricted to http , https and ftp. The file extension list should be hrl. and docx CSV.
Split an input named url, and then use the first element to see whether the protocol of the URL is in valid_protocols. Similarly, check whether the URL contains a valid file_info.
Task
Write the conditions to return a Boolean value of True if the URL is valid, and False if either the Protocol or the File extension is not valid.
main.py х +
1 def validate_url(url):
2 *****Validates the given url passed as string.
3
4 Arguments:
5 url --- String, A valid url should be of form :///
6
7 Protocol = [http, https, ftp]
8 Hostname = string
9 Fileinfo = [.html, .csv, .docx]
10 ***
11 # your code starts here.
12
13
14
15 return # return True if url is valid else False
16
17
18 if
19 name _main__': url input("Enter an Url: ")
20 print(validate_url(url))
21
22
23
24
25
Answer:
Python Code:
def validate_url(url):
#Creating the list of valid protocols and file name extensions
valid_protocols = ['http', 'https', 'ftp']
valid_fileinfo = ['.html', '.csv', '.docx']
#splitting the url into two parts
url_split = url.split('://')
isProtocolValid = False
isFileValid = False
#iterating over the valid protocols and file names for validity
for x in valid_protocols:
if x in url_split[0]:
isProtocolValid = True
break
for x in valid_fileinfo:
if x in url_split[1]:
isFileValid = True
break
#Returning the result if the URL has both valid protocol and file extension
return (isProtocolValid and isFileValid)
url = input("Enter an URL: ")
print(validate_url(url))
Explanation:
The image of the output code is attached. Hope it helps.
What is the most important part of the brainstorming process?
Answer:
Some people may say that the most important part of brainstorming is the ability to come up with creative ideas, but this end result is still linked to the need for a lack of judgement or criticism during the session.
Explanation:
brainliest please
The UNIX cal command prints out the calendar of the month/year that the user enters. Type in the following, one at a time, and observe the output:
cal 3 2014 cal 2014 cal 1 1
To learn more about this command, type in man cal for help.
Write a program named cal.c that prints out the following (which is the output when you type in cal 10 2018 in UNIX). Note that you are not asked to implement the cal command. You can assume that you know October 1 is a Monday. You will need to use loops and the % operator.
October 2018 Su Mo Tu We Th Fr Sa 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Solution :
#include<[tex]$\text{stdio.h}$[/tex]>
int [tex]$\text{dayofweek}$[/tex](int d, [tex]$\text{int m}$[/tex], int y){
static [tex]$\text{int t}[]$[/tex] = { 0, [tex]$3,2$[/tex], 5, [tex]$0,3$[/tex], 5, 1, [tex]$4,6,2,4$[/tex] };
y -= [tex]$m<3$[/tex];
return ([tex]$y+$[/tex] y/4 - y/100 + y/400 + t[m-1] + d) % 7;
}
int main() {
int month,year,i;
printf("Enter Month : ");
scanf("%d",&month);
printf("Enter Year : ");
scanf("%d",&year);
//find week day number
int day = dayofweek(1,month,year);
char * weekDays[] = {"Su","Mo","Tu","We","Th","Fr","Sa"};
printf("\n");
//print week day header
for(i=0;i<7;i++)
printf("%s ",weekDays[i]);
printf("\n");
//print days accordingly
for(i=0;i<day;i++)
printf(" ");
for(i=day;i<=day+30;i++){
printf("%-2d ",i-day+1);
if((i+day)%7==0)
printf("\n");
}
}
what is the output of int s; in c programming?m
Answer:
No output
Explanation:
Given
int s;
Required
The output
The above instruction is not an output statement, but rather it is a statement that declares variable s as an integer.
Hence, no output is expected.
To produce an output in C, you make use of the following print statement:
printf("%d", s);
The above instruction prints the value of s
Consider the following code: def tryIt(b): for i in range(len(b)): b[i] = b[i] + 100 #***********MAIN************ x = [] x = [56, 78, 88] print(x) tryIt(x) print(x) [156, 178, 188] [156, 178, 188] [56, 78, 88] [156, 178, 188] [56, 78, 88] [56, 78, 88]
Answer: I took a high school robotics class when I was in 5th grade and I don't even understand your code there aren't any instructions other than "Consider" the following code you may want to improve your question
Do you think renewable energy can power the world? If so, why?
Answer:
yes
Explanation:
Because it is a new safer and more energy efficient way of producing energy
Write a python program to print the square of all numbers from 0 to 10.
Answer:
for i in range(11):
print(i**2)
Assume you have created an inheritance hierarchy with the following classes:
Class: Organization
Methods: getName(), getNumEmployees(), getTaxLiability()
Class: Nonprofit extends Organization
Methods: getAnnualContribution(), getTaxLiability()
Class: Commercial extends Organization
Methods: getTaxLiability()
In your implementation class, assume you create the following line of code.
Organization o = new Nonprofit();
Using this line of code, write additional code that will call the getAnnualContribution() method
Answer:
Creating an object of Class Organization Organization o = new Nonprofit
Explanation:
Organization Methods: getName(), getNumEmployees(), getTaxLiability(). Class: Nonprofit extends Organization Methods: getAnnualContribution(), getTaxLiability(). Class: Commercial extends Organization Methods: getTaxLiability().
What is the name for the last word on a dictionary page?
a. Final word
c. First guideword
b. Second guideword
d. None of these
Please select the best answer from the choices provided
A
B
XOOO
с
Answer:
bbbbbbbbbbbbbbbbbbbbbbbb
Explanation:
bbbbbbbbbbbbbbbbbbbbbbbbb
Answer:
B.Second guideword
Explanation:
A ___________ is a variable used to pass information to a method.
Answer:
A parameter is a variable used to pass information to a method.
Explanation:
A parameter is a variable used to pass information to a method.
What are the features of parameter?In general, a parameter "beside, subsidiary" is any quality that aids in describing or categorizing a certain system. In other words, a parameter is a component of a system that is crucial or useful for identifying the system or assessing its functionality, status, or other characteristics.
In some fields, such as mathematics, computer programming, engineering, statistics, logic, linguistics, and electronic music production, the term "parameter" has more precise definitions.
In addition to its technical applications, it also has broader meanings, particularly in non-scientific situations. For example, the terms "test parameters" and "game play parameters" refer to defining qualities or boundaries.
A novel method of characterizing surface texture, in particular surfaces having deterministic patterns and features, is the use of feature parameters.
Traditional methods for characterizing surface texture, such profile and areal field parameters, are considered as supplementary to the feature parameter approach.
Learn more about parameter, here
https://brainly.com/question/29911057
#SPJ6
A processor has word-addressable memory with all instructions of length 1 word (which is equal to 4 bytes). At a given point in time, the current instruction being executed has an operand field with the value 7C30. At this time, suppose the Program Counter contains the address 49A072, the register R3 contains the value 5600, and the register R4 contains the value 3A. All addresses and values above are in hex. For each of the following addressing modes, find the effective address of the operand:______.
a) Direct mode
b) PC-relative mode
c) Displacement mode with base register R3 and displacement given by the operand field
d) Indexed mode with index register R4 and base address given by the operand field
Answer:
i dont
Explanation:
know im lazy to do it but it looks easy just put some effort into it youg ot it!
explain the procedure you will undertake to create a new partition
Which of the following would a cyber criminal most likely do once they gained access to a user id and password
Answer:
do something wrong as you
A
is the movement you see when one slide changes to another in slide show
view.
O style
O
dissolve
O transition effect
O
bevel effect
Answer:
Transition effect
Explanation:
Transition effects are slide changing with animations.
The ____ character is allowable in a folder name. Select one: a. < b. : c. / d. -
Answer:
d. - is allowed in a folder name.
what of the following uses heat from deep inside the earth that generates steam to make electricity
Answer:
Geothermal power plants.
outline four advantages of digital
cameras over analogue cameras
Answer:
Explanation:
A digital camera refers to a camera whereby the photographs are being captured in digital memory. An analogue camera refers to the traditional camera that typically sends video over cable.
The advantages of digital cameras over analogue cameras include:
1. Massive Storage Space:
There is a large storage space for photos and thus helps to prevent limitations to film. There are memory cards that can store several images.
2. Multiple functions:
The digital camera performs several functions like face detection, night and motion detection This makes capturing of images more fun and brings about better images.
3. Video Camera:
Digital cameras can also capture moving pictures while analog camera typically captures images that are still. Digital camera is vital as it can be used for live streaming.
4. Smaller and Lighter:
Digital cameras are usually smaller and lighter which makes them more portable and easy to carry about.
PLEASE HELP there are TWO ANSWERS
Select all the correct answers.
Which two data types can be used to store the sentence "Click to open."?
character
string
float
Boolean
array
Answer:
boolean is correct
Explanation:
Answer:
its string and array
Explanation:
Edmonton gang
Which of the following characteristics differentiates PCM from BWF audio
file formats?
metadata storage
.wav file extension
uncompressed audio file format
compressed audio file format
Answer: A
Explanation:
Answer:
A
Explanation:
Which program enables different computers to transmit data to each other?
A. simple message transfer protocol
B. Hypertext transfer protocol
C. Interactive file transfer protocol
D. Transmission control protocol/Internet protocol
Answer:
Option D, Transmission control protocol/Internet protocol
Explanation:
Transmission control protocol/Internet protocol is a communication protocol through which files are transferred from the server to the client's system via computer network.
On the internet, It interconnects the network devices and also serve as a communications protocol in a private computer network
Hence, option D is correct