1. PP 2.1 Create a revised version of the Lincoln program from Chapter 1 to print the quotation
inside a box made up of character ^.
2. PP 2.2 Write a program that reads four integers and prints the sum of their squares.
3. PP 2.3 Write a program that reads three floating point numbers and prints the cube of their
average.
4. PP 2.7 Write a program that prompts for and reads integer values for typing speed and number
of characters in the document, then prints the time required to type them as a floating point
result.

Answers

Answer 1

The revised version of the Lincoln program from Chapter 1 to print the quotation us illustrate below.

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software contains computer programs as well as documentation and other intangible components.

The program will be:

public class Print {

public static void main(String[] args)

{

char ch='"';

System.out.println("A quote by Abraham Lincoln:\n"+ch+"Whatever you are, be a good one."+ch);

//by using char for storing double quote

System.out.println("A quote by Abraham Lincoln:\n"+'"'+"Whatever you are, be a good one."+'"');

//in single quote

System.out.println("A quote by Abraham Lincoln:\n\"Whatever you are, be a good one.\"");

//using \"

}//end of main

}//end of Print class

/******OUTPUT*******

A quote by Abraham Lincoln:

"Whatever you are, be a good one."

A quote by Abraham Lincoln:

"Whatever you are, be a good one."

A quote by Abraham Lincoln:

"Whatever you are, be a good one."

*/

Learn more about programs on:

https://brainly.com/question/26568485

#SPJ1


Related Questions

Cloud providers have virtually unlimited resources, which allows for

Answers

Cloud providers have virtually unlimited resources, which allows for scalability.

What is resource?

All materials available in our environment that are technologically accessible, economically possible, and culturally sustainable that assist us to satisfy our needs and desires are referred to as resources. They can also be characterised as actual or potential based on their level of development and use, as biotic or abiotic based on their origin, and as ubiquitous or localised based on their distribution. With the passage of time and the advancement of technology, an object becomes a resource.

Cloud scalability in cloud computing refers to the ability to scale up or scale down IT resources in response to changing demand. Scalability is a distinctive property of the cloud and a significant driver of its growing attractiveness among organisations.

To learn more about resource

https://brainly.com/question/24514288

#SPJ9


A hotel chain is using AI to enhance its booking services. Its system can locate each of its users using their mobile GPS location.

Which AI application is used to perform this task?

A) prediction
B) profiling
C) tracking
D) voice or facial recognition

Answers

The AI application that is used to perform this task is tracking. The correct option is C.

What is AI technology?

In its most basic form, AI (artificial intelligence) refers to systems or machines that mimic human intelligence in order to perform tasks and can iteratively improve themselves based on the data they collect.

Tracking is used to increase or decrease the amount of text on a page by increasing or decreasing the amount of space between letters.

It differs from kerning in that it affects an entire font or range of text, whereas kerning only affects specific letter pairs.

Tracking is the AI application that is used to perform the task using their mobile GPS location.

Thus, the correct option is C.

For more details regarding artificial intelligence, visit:

https://brainly.com/question/22678576

#SPJ1

You have found a file named FunAppx86.exe on your hard drive. Which system(s) would this executable file MOST likely run on?

Answers

Since you have found a file named FunAppx86.exe on your hard drive, the systems that this executable file MOST likely run on is Both 32-bit and 64-bit systems.

What does 32- and 64-Bit Mean?

When it comes to computers, the processing capability differential between a 32-bit and a 64-bit is everything. 64-bit processors are newer, quicker, and more secure than 32-bit processors, which are older, slower, and less secure.

Therefore, A computer file that contains an encoded sequence of instructions that the system can directly execute when the user clicks the file icon," is the definition of an executable file.

Learn more about executable file from

https://brainly.com/question/28146265
#SPJ1

Our goal is to develop a very simple English grammar checker in the form of a boolean function, isGrammatical(wordList). To begin, we will define a sentence to be grammatical if it contains three words of form: determiner noun verb. Thus
[“the”, “sheep”, “run”] is grammatical but [“run”, “the”, “sheep”] is not grammatical nor is
[“sheep”, “run”]. By tagging convention, determiners are tagged as DT, nouns as NN, verbs as VB, and adjectives (which we discuss later) as JJ. The tagSentence function from the tagger module will help you convert your wordlist to tags; a challenge is that some words (such as swing) have multiple definitions and thus multiple parts of speech (as swing is a noun and swing is a verb). Carefully examine the results returned by tagSentence when defining the logic of isGrammatical.

Note that by our current definition, we are not concerned with other aspects of grammar such as agreement of word forms, thus “an sheep run” would be considered as grammatical for now. (We will revisit this concern later.)


[3 points]
Add the words “thief”, “crisis”, “foot”, and “calf” to the lexicon.txt file, and modify wordforms.py so that it generates their plural forms correctly (“thieves”, “crises”, “feet”, “calves”). In terms of categories for the lexicon.txt, thief is a person, crisis and feet are inanimates. Interestingly, ‘calf’ might be an animal (the young cow) but might be an inanimate (the part of the body).

We are not yet using plurals in our sentences, but you should be able to add additional tests within the wordforms.py file to validate that these new words and forms are handled properly.


[3 points]
The original lexicon includes singular nouns such as cat but not plural forms of those nouns such as cats, and thus a sentence such as “the cats run” is not yet deemed as grammatical. However, the wordforms module does include functionality for taking a singular noun and constructing its plural form.

Modify the code in tagger.py so that it recognizes plural forms of nouns and tags them with NNS. We recommend the following approach:


update the loadLexicon function as follows. Every time you encounter a word that is a noun from the original lexicon.txt file, in addition to appending the usual (word,label), add an extra entry that includes the plural form of that noun, as well as a label that adds an ‘s’ to the original label. For example, when encountering ‘cat’ you should not only add (‘cat’,’animal’) to the lexicon but also (‘cats’,’animals’).


Then update the the labelToTag function to return the new tag NNS when encountering one of those plural labels such as ‘animals’.


Test your new functionality on sentences such as “the cats run” as well as with your new plurals such as “thieves”.

[2 points]
The original lexicon includes verbs such as run but not 3rd person singular forms of those verbs that end in -s such as runs, and thus a sentence such as “the cat runs” is not yet deemed as grammatical. As you did with nouns in the previous step, modify the software so that 3rd person singular verbs are added to the lexicon and tagged as VBZ. Test this new functionality on sentences such as “the cat runs” and
“the sheep runs”.


[2 points]
Now we have both plural nouns and 3rd person singular verbs, however the grammar checker currently doesn’t match them and thus accepts sentences like
“the cat run” and “the cats runs”, neither of which is truly grammatical. Update the rules so that it requires the tag VBZ on the verb if the noun has the singular tag NN, and requires the tag VB on the verb if the noun has the plural tag NNS. Add some test cases to ensure the program is working as intended. Include tests with unusual forms such as the noun “sheep” that can be singular or plural; thus “the sheep runs” and “the sheep run” are grammatical. Make sure to update any previous tests to conform to these new expectations.


[2 points]
Update your grammar to allow any number of optional adjectives between the determiner and noun in a sentence, thereby allowing sentences such as
“the big sheep run” and “the big white sheep run”, though disallowing sentences such as “the cat sheep run”.

Answers

Using the knowledge in computational language in python it is possible to write a code that form of a boolean function, isGrammatical(wordList). To begin, we will define a sentence to be grammatical if it contains three words of form: determiner noun verb.

Writting the code:

# importing the library  

import language_tool_python  

 

# creating the tool  

my_tool = language_tool_python.LanguageTool('en-US')  

 

# given text  

my_text = 'A quick broun fox jumpps over a a little lazy dog.'  

 

# correction  

correct_text = my_tool.correct(my_text)  

 

# printing some texts  

print("Original Text:", my_text)  

print("Text after correction:", correct_text)  

See more about python at brainly.com/question/18502436

#SPJ1

Question # 2 Multiple Choice Do you think it is acceptable to copy and paste material from a web page into a term paper?
Yes, because information on the internet is free for everyone to use.
Yes, because information on the internet is free for everyone to use.
Yes, if you paste of where you got it from but do not quote it.
Yes, if you paste of where you got it from but do not quote it.
No, because you should not pass other people’s work off as your own.
No, because you should not pass other people’s work off as your own.
No, because you can get sued by the owner of the material.

Answers

Do you think it is acceptable to copy and paste material from a web page into a term paper: No, because you should not pass other people’s work off as your own.

What is plagiarism?

Plagiarism simply refers to an act of representing or using an author's literary work, thoughts, ideas, language, or expressions without their consent, permission, acknowledgement or authorization.

This ultimately implies that, plagiarism is an illegal act that involves using another author's intellectual work or copyrighted items word for word without getting an authorization and permission from the original author.

In this context, we can reasonably infer and logically deduce that it is very wrong to copy and paste material from a web source into a term paper without an accurate citation or reference to the original author.

Read more on plagiarism here: brainly.com/question/397668

#SPJ1

Answer:

C. No, because you should not pass other people’s work off as your own.

Explanation:

Write a pseudocode algorithm to accept two values in variables num1 and num2. if num1 is greater that num2 subtract num2 from num1and multiply the result by itself If num2 is greater than num1 multiply num1 by num2 Print the numbers that were entered and the result of either scenarios​

Answers

The required Pseudocode Algorithm of the given question are:

Set num1 and num2 equal to user inputIf num1 is greater than num2Subtract num2 from num1Multiply result by itselfIf num2 is greater than num1Multiply num1 by num2Print num1, num2, and result

What is algorithm?

An algorithm in computer science is a finite sequence of rigorous instructions that is typically used to solve a class of specific problems or to perform a computation. Algorithms serve as specifications for calculating and processing data. Advanced algorithms can perform automated deductions and then use mathematical and logical tests to route code execution through different paths.

To learn more about algorithm

https://brainly.com/question/24953880

#SPJ9

Consider the following program segment:

//include statement(s)
//using namespace statement

int main()
{
//variable declaration
//executable statements
//return statement
}


Write C++ statements that include the header files iostream and string.

Write a C++ statement that allows you to use cin, cout, and endl without the prefix std::.

Write C++ statements that declare and initialize the following named constants: SECRET of type int initialized to 11 and RATE of type double initialized to 12.50.

Write C++ statements that declare the following variables: num1, num2, and newNum of type int; name of type string; and hoursWorked and wages of type double.

Write C++ statements that prompt the user to input two integers and store the first number in num1 and the second number in num2.

Write a C++ statement(s) that outputs the values of num1 and num2, indicating which is num1 and which is num2. For example, if num1 is 8 and num2 is 5, then the output is:

The value of num1 = 8 and the value of num2 = 5.
Write a C++ statement that multiplies the value of num1 by 2, adds the value of num2 to it, and then stores the result in newNum. Then, write a C++ statement that outputs the value of newNum.

Write a C++ statement that updates the value of newNum by adding the value of the named constant SECRET to it. Then, write a C++ statement that outputs the value of newNum with an appropriate message.

Write C++ statements that prompt the user to enter a person’s last name and then store the last name into the variable name.

Write C++ statements that prompt the user to enter a decimal number between 0 and 70 and then store the number entered into hoursWorked.

Write a C++ statement that multiplies the value of the named constant RATE with the value of hoursWorked and then stores the result into the variable wages.

Write C++ statements that produce the following output:

Name: //output the vlaue of the variable name
Pay Rate: $ //output the value of the Rate
Hours Worked: //output the value of the variable hoursWorked
Salary: $ //output the value of the variable wages
For example, if the value of name is "Rainbow" and hoursWorked is 45.50, then the output is:

Name: Rainbow
Pay Rate: $12.50
Hours Worked: 45.50
Salary: $568.75
Write a C++ program that tests each of the C++ statements that you wrote in parts a through l. Place the statements at the appropriate place in the C++ program segment given at the beginning of this problem. Test run your program (twice) on the following input data:

a.
num1 = 13, num2 = 28; name ="Jacobson"; hoursWorked = 48.30.


b.
num1 = 32, num2 = 15; name ="Crawford"; hoursWorked = 58.45.

Answers

The program will be illustrated thus:

c++ code:

#include <iostream>

using namespace std;

int main() {

string s;

cout<<"Enter your name : "<<endl;

cin>>s;

int num1,num2,num3,average;

num1=125;

num2=28;

num3=-25;

average=(num1+num2+num3)/3;

cout<<"num1 value is : "<<num1<<endl;

cout<<"num2 value is : "<<num2<<endl;

cout<<"num3 value is : "<<num3<<endl;

cout<<"average is : "<<average<<endl;

return 0;

What is a program?

A program is a precise set of ordered operations that a computer can undertake. The program in the modern computer described by John von Neumann in 1945 has a one-at-a-time series of instructions that the computer follows. Typically, the software is saved in a location accessible to the computer.

Computer programs include Microsoft Word, Microsoft Excel, Adobe Photoshop, Internet Explorer, Chrome, and others. In filmmaking, computer applications are utilized to create images and special effects.

Learn more about Program on:

https://brainly.com/question/23275071

#SPJ1

Which of the following Windows tools can be used to manage group information?

Answers

Active Directory Users and Computers is the Windows tools can be used to manage group information.

What is Active Directory used for?

Administrators and users can easily locate and use the information that Active Directory holds about network objects. Active Directory organizes directory data logically and hierarchically on the basis of a structured data store.

To access Active Directory Users and Computers, choose Start > Administrative Tools.Locate and pick your domain name from the Active Directory Users and Computers tree.To navigate your Active Directory hierarchy, expand the tree.

Therefore, You may manage user and computer accounts, groups, printers, organizational units (OUs), contacts, and other Active Directory objects with Active Directory Users and Computers. You can create, delete, alter, move, arrange, as well as set rights on these items with this tool.

Hence, option C is correct.

Learn more about Active Directory Users from

https://brainly.com/question/24215126
#SPJ1

See option below

Local Users and Groups

o  User Accounts

o  Active Directory Users and Computers

o  User and Group Management

you receive an email from your organization notifying you that you need to click on a link and enter some personal information to verify your identity or else your account will be suspended. what should you do?

Answers

You should reach out to your organization to confirm that the email is legitimate before taking any action. If you are unsure, you can also try to look up the organization's contact information online to verify.

What is email?

Electronic mail (often known as e-mail) is a technique of transmitting messages ("mail") between persons via electronic equipment. Email was thus envisioned as the electronic (digital) alternative to mail at a period when "mail" solely referred to physical mail (thus e- + mail). Email later became a ubiquitous (extremely extensively used) communication channel, to the point where an email account is often viewed as a basic and necessary aspect of many procedures in most nations, including business, trade, government, education, entertainment, and other realms of daily life.

To learn more about email

https://brainly.com/question/24688558

#SPJ4

5.Usage of sexual slurs, repeatedly pressurizing someone for a date, sharing provocative jokes and display of obscene pictures at workplace is considered as which form of sexual harassment
a. Hostile Work Environmaent
b. B.Quid pro quo
c. Both

Answers

Answer:

c. Both

Explanation:

I don't know who to do this assignment
An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Overtime pay equals the total overtime hours multiplied by 1.5 times the hourly wage. Write a program that takes as inputs the hourly wage, total regular hours, and total overtime hours and displays an employee’s total weekly pay.

Answers

Python:

wage=int(input("What the hourly wage?: "))

total_reg_hours=int(input("Enter total regular hours: "))

total_over_hours=int(input("Enter total overtime hours: "))

#Calculate the weekly pay.

print("The weekly pay of this employee is ",(total_reg_hours*wage)+(total_over_hours*(1.5*wage)))

C++:

#include <iostream>

int main(int argc, char* argv[]) {

   int wage,t_reg,t_over;

   std::cout << "Enter wage: "; std::cin>>wage;

   std::cout << "\nEnter total regular hours: "; std::cin>>t_reg;

   std::cout << "\nEnter total overtime hours: "; std::cin>>t_over;

   

   //Calculate the weekly pay.

   std::cout << "The weekly pay of this employee is " << (t_reg*wage)+(t_over*1.5*wage) << std::endl;

   return 0;

}

Write a program to display the s
tandard/deviation of 100 sets of numbers already stored in an array​

Answers

import random

import statistics

number = [1, 2, 3, 4, 5]

print("Standart deviation is: ", statistics.stdev(number))

Please edit the array before compiling the code.

Which type of footwear should be worn while working on hybrid electric vehicles (HEVs) and electric vehicles (EVs)

Answers

Answer: Insulated safety footwear.

Explanation: While working on a hybrid electric vehicle (HEV) or an electric vehicle (EV) you should wear Insulated safety footwear.

Create a program that will allow user to input arithmetic operator, first number and second number
then perform a result based on the condition.

and produce the output below.
• When arithmetic operator "+" or "addition" perform addition for first number and second number and
use (for loop) to display count down from result to 1.
• When arithmetic operator "x" or "multiplication" perform multiplication for first number and second
number and use (for loop) to display from 1 to result.
• When arithmetic operator "-" or "subtraction" perform subtraction for first number and second
number and use (while loop) to count down from result to 0.
• When arithmetic operator "/" or "division" perform division for first number and second number and
use (while loop) to display from 0 to result.
• When arithmetic operator "%" or "modulo" perform modulo for first number and second number and
use (do while loop) to display from 0 to result, Otherwise Access Denied

Answers

A program that will allow the user to input the arithmetic operator, the first number, and the second number and then perform a result based on the condition that when the arithmetic operator "+" or "addition" performs addition for the first number and second number and use (for loop) to display count down from result to 1 is given below:

The Program

a = int(input("Enter First Number: "))

b = int(input("Enter Second Number: "))

print("Enter which operation would you like to perform?")

ko = input("Enter any of these char for specific operation +,-,*,/: ")

result = 0

if ko == '+':

   result = a + b

elif ko == '-':

   result = a - b

elif ko == '*':

   result = a * b

elif ko == '/':

  result = a / b

else:

   print("Error")

print(a, ko, b, ":", result)

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Question 2 (1 point)
In a worksheet, the vertical spaces with headings A, B, C, and so on.
columns
cells
rows
labels

Answers

In a worksheet, the vertical spaces with headings A, B, C, are columns.

What do you mean by worksheet?

Spreadsheet software in computing displays a user interface on a computer monitor that resembles one or more paper accounting worksheets. A single spreadsheet (more formally, a two-dimensional matrix or array) is referred to as a worksheet in Microsoft Excel, while a collection of worksheets is referred to as a workbook.

A column in a spreadsheet is defined as the vertical space that runs up and down the window. Each column's location is denoted by a letter.

So, A is the right answer.

To learn more about worksheet

https://brainly.com/question/25130975

#SPJ13

Data for each typeface style is stored in a separate file.
a. True
b. False

Answers

Data for each typeface style is stored in a separate: a. True.

What is a typeface?

In Computer technology, a typeface can be defined as a design of lettering or alphabets that typically include variations in the following elements:

SizeSlope (e.g. italic)Weight (e.g. bold)Width

Generally speaking, there are five (5) main classifications of typeface and these include the following:

SerifSans serifScriptMonospacedDisplay

As a general rule, each classifications of typeface has its data stored in a separate for easy access and retrieval.

Read more on typeface here: https://brainly.com/question/11216613

#SPJ1

many people are now using the web not simply to download content, but to build communities and upload and share content they have created. this trend has been given the name

Answers

The term "Web 1.0" describes the early development of the World Wide Web. In Web 1.0, the vast majority of users were content consumers and there were very few content creators.

Personal websites were widespread and mostly included static pages maintained on free web hosts or web servers controlled by ISPs.

Web 1.0 forbids the viewing of ads while browsing websites. Ofoto, another online digital photography websites from Web 1.0, allowed users to store, share, view, and print digital images. Web 1.0 is a content delivery network (CDN) that allows websites to present the information. One can use it as their own personal webpage.

The user is charged for each page they see. Users can access certain pieces of information from its directories. Web 1.0 was prevalent from around 1991 until 2004.

Four Web 1.0 design requirements are as follows:

1.static web pages

2.The server's file system is used to serve content.

3.Pages created with the Common Gateway Interface or Server Side Includes (CGI).

4.The items on a page are positioned and aligned using frames and tables.

To know more about Web 1.0 click on the link:

https://brainly.com/question/14411903

#SPJ4

How can you add a new printer to a print server within the Print Management tool using the default search option?​

Answers

To add a new printer to a print server within the Print Management tool using the default search option one can automatically find and install printers discovered on the server's local network, right-click ServerName (local) in the Print Management tree, then select Automatically Add Network Printers, and also then click Start.

What is software for print management?

By providing capabilities to more effectively monitor, regulate, as well as maintain their entire printer fleet from a single user interface, print management software enables enterprises to centralize administration and reduce the cost of printing.

Therefore, The Print Management Console snap-in, which is useful for controlling numerous printers or print servers and transferring printers to and from other Windows print servers, is included in the Print Server role, which is used to establish a Windows Print Server.

Learn more about Print Management from

https://brainly.com/question/27960904
#SPJ1

How should companies incorporate Agile methodology into their initiatives?

Answers

Answer:

down below

Explanation:

be more carful with things double checking because we are not perfect mistakes can be made , and shipping and packaging needs to better jobs with delivering items and for the not to be broken or box damaged

1. It has been said that understanding our history can help us better prepare for our futurem
a notion that certainly applies to photography. Keeping this in mind, describe the
mechanics of early photographic systems, analyzing how they differ from the systems of
today and how understanding these past systems can help your craft.

Answers

The mechanics of early photographic systems began in France, with the invention of Joseph Nicéphore, who used a "dark camara" or Camara Obscura and a pewter plate in 1830. He coated the plate with bitumen. He exposed it to light in order to create a permanent image. Following the success of his experiment, he collaborated with French Louis Daguerre to develop the Daguerreotype, which used a copper plate with silver and a chemical called iodine. They exposed the image to light for about 15 minutes, and there you have it. The daguerreotype was a commercial success, and it served as a model for the next great invention, the emulsion plate.

Mechanics of early photograph:

One of the earliest photographic processes was wet collodion. Photographers made their own glass plates and coated them with a collodion (cellulose nitrate) and soluble iodide solution. The plate was then immersed in a silver nitrate solution in the darkroom.

Understanding the origins of photography and early systems reveals how inventive people were. That same creativity is required to create new designs and art concepts that will have an impact on future generations.

To learn more about mechanics of early photograph

https://brainly.com/question/18792950

#SPJ9

I really need help with this what are 4 things that show you this email is a scam

Answers

Answer:

1. Grammar errors and misspelled words.

Example: if no action is "taking" we will be "force"

Correct words are supposed to be taken and forced.

2. Name of sender "Email_Service" The underscore brings a little suspicion and it doesn't match the name of the email its being sent from.

3. Urgency. In other words this is an "ACT NOW, ACTION REQUIRED" email, which normally come from scams.

4. Threats – LAST WARNING,  IF NO ACTION IS TAKEN YOUR EMAIL WILL BE BLACKLISTED.

Explanation:

List and explain the different Print and Document Services components that are available while installing the Print and Document Services server role?​

Answers

The different Print and Document Services components that are available while installing the Print and Document Services server role are:

Supports the loaded paper with a sheet of paper.Edge guides: Assist in loading the paper properly.Protects the printing mechanism with a printer cover.Receiving tray for the paper that was expelled.Sheet feeder: Automatically feeds a stack of papersWhat is print and Document Services role in the server?

You may centralize network printer and print server duties using Print and Document Services. Additionally, you can use this role to obtain scanned documents from network scanners and send them to email addresses, a shared network resource, or a Windows SharePoint Services site.

Therefore, Modern print servers can be broadly categorized into two sorts based on how they connect to the network: wired and wireless ones. Both a serial port and a USB port can be used to connect to the printer simultaneously. Observe that a wireless print server connects to the

Learn more about Document Services components  from

https://brainly.com/question/27960904
#SPJ1

Pregunta Shapes are located on the ______ Tab in PowerPoint.​

Answers

Answer: its located in the insert tab

9. Which of the following actions would NOT help identify your personal
ethics?
a. Describe yourself.
b. Conduct a genetic study of your extended family.
c. Identify the influences of your work environment.
d. Prepare a list of values that are most important to you.

Answers

Conduct a genetic study of your extended family would not help identify your personal ethics.

What is personal ethics?

Personal ethics refers to a person's morals and code of behaviour. These principles are instilled in a person by their parents, relatives, and friends from the time they are born. If there is no personal ethics, human existence is inadequate and superficial. It is the ethical standard by which a person makes decisions and acts in both personal and professional situations. These ethics affect many aspects of a person's life and help to develop a person's work ethic, personal and professional objectives, and values. Individuals use ethics to determine what is right and wrong and to influence how others act in difficult situations.

The primary ethical concerns that IRBs and investigators must grapple with when designing and reviewing studies involving the use of genetic information are privacy, confidentiality, informed consent, and return of results.

So, B is correct answer.

To learn more about Personal ethics

https://brainly.com/question/1031443

#SPJ9

bob is sending a message to alice. he wants to ensure that nobody tampers with the message while it is in transit. what goal of cryptography is bob attempting to achieve?

Answers

He wants to make certain that the communication through message is not tampered with while in transit. The integrity of cryptography is bob attempting to achieve.

What do you mean by message?

A message is a distinct unit of communication intended for consumption by some recipient or set of recipients by the source. A message can be conveyed via courier, telegraphy, carrier pigeon, or electronic bus, among other methods. A broadcast's content can be a message. A conversation is formed through an interactive exchange of messages. A press release is an example of a communication, which can range from a brief report or statement issued by a government body to commercial publicity material.

To learn more about message

https://brainly.com/question/25660340

#SPJ13

Variance for accumulator. Validate that the following code, which adds the
methods var() and stddev() to Accumulator, computes both the mean and variance
of the numbers presented as arguments to addDataValue():
public class Accumulator
{
private double m;
private double s;
private int N;
public void addDataValue(double x)
{
N++;
s = s + 1.0 * (N-1) / N * (x - m) * (x - m);
m = m + (x - m) / N;
}
public double mean(

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that Validate that the following code, which adds the methods var() and stddev() to Accumulator, computes both the mean and variance of the numbers presented as arguments to addDataValue()

Writting the code:

import java.util.*;

public class Accumulator {  

private static double m;  

private static double v;  

private static double st;  

private static  double s[]=new double[5];

private static int N;

private static int count =0;

public static void main(String[] args) {

// TODO Auto-generated method stub

Random r = new Random();

System.out.println("hello world");

for(int i=0;i<5;i++) {

   double randomvalue = r.nextDouble();

addDataValue(randomvalue);

}

for(int i=0;i<s.length;i++) {

   System.out.println("dataValue:"+s[i]);

}  

mean();

System.out.println("mean:"+m);

var();

System.out.println("variance:"+v);

stddev();

System.out.println("standard deviation:"+st);

}

public  static void addDataValue(double value) {     // addes data values to array

 s[count]=value;

 count++;

}

public static double mean() {        // returns mean

double sum=0.0;

for(int i=0;i<s.length;i++) {

   sum+=s[i];

}

m = sum/s.length;

return m;

}  

public static double var() {    //returns variance

double mm = mean();

    double t = 0;

    for(int i=0;i<s.length;i++) {

        t+= (s[i]-mm)*(s[i]-mm);

}

    v= t/(s.length-1);

     return v;  

}

public static  double stddev() {        // returnsn the stardard deviation

st= Math.sqrt(var());

return st;

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

The main issues covered by IT law are: Hardware licensing Data privacy Department security True False

Answers

The main issues covered by IT law are: Hardware licensing, Data privacy, Department security is a true statement.

What topics are addressed by cyber law?

There are three main types of cyberlaw:

Human-targeted crimes (e.g.: harassment, stalking, identity theft) Vandalism of property (e.g.: DDOS attacks, hacking, copyright infringement) The theft from the govt (e.g.: hacking, cyber terrorism)

Cyber law includes provisions for intellectual property, contracts, jurisdiction, data protection regulations, privacy, and freedom of expression. It regulates the online dissemination of software, knowledge, online safety, and e-commerce.

Note that some Internet security issues that must be considered are:

Ransomware Attacks. IoT Attacks. Cloud Attacks. Phishing Attacks.Software Vulnerabilities, etc.

Learn more about IT law from

https://brainly.com/question/9928756
#SPJ1  

Palindrome.java

Question:
Write an application that determines whether a phrase entered by the user is a palindrome. A palindrome is a phrase that reads the same backward and forward without regarding capitalization or punctuation. For example, “Dot saw I was Tod”, “Was it a car or a cat I saw”, and “Madam Im Adam” are palindromes. Display the appropriate feedback: You entered a palindrome or You did not enter a palindrome.

CODE:
import java.util.*;
public class Palindrome {
public static void main(String[] args) {

Scanner sc = new Scanner(System.in);
System.out.println("Enter phrase : ");
String phrase = sc.nextLine();
phrase = phrase.replace(" ", "").toLowerCase();
phrase = phrase.replaceAll("[^a-zA-Z0-9]", "");
int i = 0, j = phrase.length() - 1;
boolean ispalindrome= true;
while (i < j) {
if (phrase.charAt(i) != phrase.charAt(j)) {
ispalindrome = false;
}
i++;
j--;
}

if(ispalindrome)

{
System.out.println("you entered a palindrome.");
}
else
{
System.out.println("you did not enter a palindrome.");
}



}
}

RESULTS:

50% good

pls help

Answers

Ok, where is the phrase that we are trying to determine to see if it’s a palindrome. I can help you with this, I just need the provided phrase that was given with the question as well. All I see is transcripts below

Chris is unfamiliar with the word processing program he is using. He wants to find
the drop-down text-driven options for the document view because he does not yet
recognize the icons at the top of the window. Where can Chris find these drop down
options?

Answers

Since Chris wants to find the drop-down text-driven options for the document view because he does not yet recognize the icons at the top of the window. The place that Chris can  find these drop down options is option D: Menu bar.

What does a computer menu bar do?

The area of a browser or application window known as the menu bar, which is normally found at the upper left corner, contains drop-down menus that let users interact with the application or content in a variety of ways.

Therefore, while menu bars list all of a program's top-level commands, toolbars only display the most commonly used commands. Immediacy. A menu command could require additional input, but clicking a toolbar command has an immediate impact.

Learn more about Menu bar from

https://brainly.com/question/20380901


#SPJ1

See full question below

Chris is unfamiliar with the word processing program he is using. He wants to find the drop-down text-driven options for the document view because he does not yet recognize the icons at the top of the window. Where can Chris find these drop down options?

answer choices

Options bar

Scroll bar

Toolbar

Menu bar

So I'm doing a coding project again and I have to recreate a website I'm having difficulty getting my website to look like the one I'm recreating I have put a screenshot of the website I need I recreate and a picture of the code I have so far

Answers

HTML and CSS tutorials

Explanation:

Search for website tuturials

Other Questions
Find the x-intercept and y-intercept of the line.5x-9y=-12 Ellipses have only one focus. Is this true or false? 4. Which of the following best summarizes the significance of the contributions made by Justinian I to the rise of the Byzantine Empire? O A. Justinian I attempted to reclaim the former Roman Empire; he ultimately failed, but he proved more adept at instituting law than conquering land. OB. Justinian I sought to officially separate the Eastern Roman Empire from the remnants of its dead Western half, thus revitalizing the Byzantine Empire. C. Justinian I attempted to reclaim the former roman empire and succeeded, for the most part; this brought on a brief period of prosperity and order. D. Justinian I set about creating order within his empire with codes of law improved tax systems and more levels of bureaucracy. May I please get help with this. For I have tried multiple times but still cant get the right answer or the triangle after dilation? Which inequalities are shown on the graph?Find your inequalities in the grid below. Check the ONE box that pairs the two correct inequalitiesY-3-1 y>-**-172-**-1 y Question 3 50 POINTS!!!!!Fill in the blank with the correct form of the Imperfect tense. You can copy/paste theaccent marks if needed. Yo _____ cada da. (caminar) which of the following factors could be a significant reason for one country to be poorer than another? a) higher rate of inefficiency. b) lower level of technology. c) none of the above. d) both a) and b). g The janitor at a school discovered a leak in a pipe. The janitor found that it was leaking at a rate of 14 fl oz per hour. How fast was the pipe leaking in gallons per day? 2 SEE ANSWERS LM is the midsegment of Trapeziod RSXY. may you please help me find what LM is? Which of the following illustrates the Commutative Property of Addition?A. (9+12)+3=(12+9)+3 B. None of theseC. (9+12)+3=9+(12+3) D. 7+(1+2)=7+(1+2) ...................... Martina has decided to structure her new business venture to provide liability protection while gaining tax benefits over alternative structures. Her attorney has prepared the operating agreement and advised her of the complexities and expense of setting up this structure. Which of the basic types of ownership has martina chosen?. X + 2y = 3x = 5Enter your answer as a point using parenthesis and a comma. Do not use any spaces in youranswer.If there are no solutions, type "no solutions." If there are infinitely many solutions, type"infinitely many."Answer: Find the area of the figure.A. 57 square yardsB. 66 square yardsC. 180 square yards D. 234 square yards could you please help me answer this please and thank you it's about the rectangular prism.... Data were collected on the distance a baseball will travel when hit by a baseball bat at a certain speed. The speed, s, is measured in miles per hour, and distance, y, is measured in yards. The line of fit is given by = 3.98 + 53.59s. If the ball travels for a duration of 5 seconds, what is the predicted distance of the ball? How do you write 6 tens + 4 ones + 5 tenths + 2 hundredths + 8 thousandths Which of the following English words contains the sound closest to the Spanish "U"?a. underb. usec. poolPlease select the best answer from the choices providedO AO BO C Which of the following sampling methods would most likely have the smallest margin of erro?A. Roll a die 1000 times and estimate the proportion of 5's that result.OB. Sample 250 registered voters in a large city and ask them their political preference and use the results to estOC. Flip a coin 100 times and estimate the proportion of "heads" that resul.OD. Sample 10 adults and ask them if they support the current President's foreign policy and use this data to reReset SelectionMext Write an equation for the line through the point (x0,y0) with a slope of M in point slope form. Enter X0 and Y0 as y0. Use X and Y for variables names. Your equation should be of the form y=.