Answer:
See below
Explanation:
Because sometimes you have to 'carry' a 1 over to the ext column when adding two binary numbers
Example :
1 1 1
+1 1 1 <==== starting in the first R column add 1 + 1 to get 0 and carry 1
then the next column you will add 1 + 1 + 1 = 1 and carry 1 again
then 1 + 1 + 1= 1 and carry 1 again (to column 4) to get
1 1 1 0
Identify the places in the code where there are object-oriented concept violations, content coupling, common coupling, control coupling, and stamp coupling situations. In the Directory Management System Submission Document, paste the code segments that correspond to each situation and explain how you would fix object-oriented concept violations, common coupling, control coupling, and content coupling issues.
In this way, using the knowledge in computational language in JAVA it is possible to write a code that identifies the directories and also the people who own these directories:
Writing the code we have:import java.util.Scanner;
public class PersonnelDirectory
{
public static void main(String[] args)
{
Personnel per = new Personnel();
totalObjects total = new totalObjects();
Scanner scan = new Scanner(System.in);
String firstN, lastN, middleN;
int empID;
double salary;
int choice = -1;
do{
System.out.println("Welcome to the Personnel Directory Management System");
System.out.println("\n\n\t 1. Add Personel");
System.out.println("\n\t 2. Find Personel");
System.out.println("\n\t 3. Print Names");
System.out.println("\n\t 4. Number of Entries in the Directory");
System.out.println("\n\t Select one of the options above (1, 2, 3, 4)");
choice = scan.nextInt();
scan.nextLine();
switch(choice)
{
See more about JAVA at brainly.com/question/12975450
#SPJ1
Most practical applications of integer linear programming involve mostly ordinary integer variables and a small number of 0-1 integer variables. only 0-1 integer variables and not ordinary integer variables. a near equal number of ordinary integer variables and 0-1 integer variables. only ordinary integer variables.
Most practical applications of integer linear programming involve mostly; a. only 0-1 integer variables and not ordinary integer variables.
How to deal with Linear Programming Questions?
Linear programming is defined as a method used to achieve the best outcome in a mathematical model where its' requirements are represented by linear relationships.
Now, Linear programming is useful in a number of different applications and where integer linear programming is involved, it uses only 0-1 integer variables and not ordinary integer variables.
Read more about Linear Programming at; https://brainly.com/question/14309521
#SPJ1
A program that performs handy tasks, such as computer management functions or diagnostics is often called a/an ____________.
Answer:
DOS
Explanation:
Disk operating
Which file format produces a lock-down version of an access database? accdb accdb-be accde accdb-e
The file format that produces a lock-down version of an access database is called; ACCDE
How to Identify Access Database?ACCDB files are the default Microsoft Access database format in Access 2007 and later versions while the ACCDE format is a read-only, compressed version.
Now, the file format that produces a lock down version of an access database is called ACCDE file which is a Microsoft Access Execute Only Database file used to protect an ACCDB file.
Read more about Access Database at; https://brainly.com/question/9745438
#SPJ1
Write a class called point that represents a point in 2d plane.
- the constructor accepts the x and y dimensions of the point.
- provide a method getx that returns the x coordinate of a point, and another method gety
that returns the y coordinate of a point.
- provide a method called translate that changes the original coordinates of the point by
adding a given values for x and y coordinates.
- provide a method distanceto that calculates the distance between that point and another
one.
use this equation to calculate the distance math.sqrt((x2 - x1) ** 2 + (y2 - y1) ** 2))
while the math is a library you should import. where the (x1, y) is the coordinates of the first point
and (x2, y2) is the coordinates of the second point
the output should be like this screenshot
In this way, writing the code in C++ we can say that it will be possible to make the coordinates on the planes.
Writing the code we have:#include <iostream>
#include <cmath>
#include <iomanip>
using namespace std;
class Point{
private:
float x;
float y;
public:
Point(){
x = y = 0;
}
Point(float x, float y){
this->x = x;
this->y = y;
}
float getX(){
return x;
}
float getY(){
return y;
}
float getDistance(){
return math.sqrt((x2 - x1) ** 2 + (y2 - y1) ** 2));
}
string toString(){
return "("(x1, y)","(x2, y2)")";
}
};
See more about C code at brainly.com/question/17544466
#SPJ1
Your guardian receives a call similar to the one described in the amazon video. what is one thing they can do to check that it is a legitimate message?
One thing they can do to check that it is a legitimate message is to see if there is any link for you to click, or numbers to call, this will tell you that it is a scam.
How do you tell if someone is scamming you online?There are a lot of ways to know online scam. Some include
Unexpected contact. Asking for your personal info.links been posted along with random messages.Therefore, One thing they can do to check that it is a legitimate message is to see if there is any link for you to click, or numbers to call, this will tell you that it is a scam.
Learn more about Scam from
https://brainly.com/question/1063454
#SPJ1
Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check
Based on the above scenario, in frame control field of the 802.11, the data frame will you run this check.
What are the three key 802.11 frame types?There are 3 types of 802.11 frames which are:
ManagementcontrolDataTherefore, Based on the above scenario, in frame control field of the 802.11, the data frame will you run this check.
See full question below
Mediacom Communications has requested you to manage the access to its 802.11 standard wireless networks. A recent instance of errors in transmission has been recorded, and in order to fix this problem, you want to run a cyclical code to check for errors in transmission. In which field of the 802.11 data frame will you run this check?
a.
Sequence Control
b.
Trailer
c.
Data
d.
Frame Control
Learn more about Communications from
https://brainly.com/question/26152499
#SPJ1
A computer program can contain limited number of instructions true or false
Answer:
true
Explanation:
depending on how it is made
What physical disk oriented performance counter should be used to determine the number of requests waiting to be processed by a disk
Answer:
current disk queue length
Explanation:
Your dod common access card has a public key infrastructure token approved for access to the.
Your dod common access card has a public key infrastructure token approved for access to the NIPRNet.
What is NIPRNet?This is known to be Non-classified Internet Protocol (IP) Router Network (NIPRNet).
It is said to be a kind of an IP network that is often used to pass in and out unclassified information, such as information subject and thus Your dod common access card has a public key infrastructure token approved for access to the NIPRNet.
Learn more about public key from
https://brainly.com/question/8782374
#SPJ2
This program has a bug. When the green flag is clicked, nothing happens. How would you fix it?
A. Change the number inside the “Move” block
B. Change the number inside the “repeat” block
C. Make the sound louder with the purple block
D. Connect the event block directly to the “repeat” block
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
How to turn off parental controls without a password on android?.
Answer:
Ask your parents.
Online banking is a convenience that mostly affects which area of your life?
OA. Personal
B. Social
C. Cultural
OD. Ethical
Online banking is a convenience that mostly affects this area of a person's life: A. personal.
What is online banking?Online banking simply refers to a type of technology that is used by financial institutions to offer their customers an opportunity to receive and send money through the Internet.
Some examples of online banking institutions include the following:
MoneygramPayment processorWestern UnionPay-PalIn conclusion, online banking is a convenience that mostly affects the personal area of a person's life.
Read more on online banking here: https://brainly.com/question/2772610
#SPJ1
Non linear editing can cause _____ where edit and re-edit and re-edit again can cause video to be less true than the original material
Non-linear editing can cause modification in the original video whereas editing and re-edit and re-edit again can cause the video to be less true than the original material.
What is non-linear editing?In non-linear editing, the editor can do any operation with the video like adding or removing any frame without starting from the beginning.
It's been characterized as a ‘cut and paste’ technique that can really innovate how video makers approach videography.
Therefore Non-linear editing can cause modification in the original video whereas editing and re-editing and re-editing again can cause the video to be less true than the original material.
To know more about non-linear editing follow
https://brainly.com/question/15614247
#SPJ4
help me help you............
Answer:
change how big or small the shape or sprite is
What are the benefits of digital media?
Answer:
- easy to access
- day to day information updates worldwide
- convenient
- versatility
- accuracy
- cost....etc
Explanation:
Draw and implement of an organization which have 125 employees. use the following features 1.email services 2.lan communication 3.vlan 4.security 5.storage 6.server
An organisation usually hires employees which helps in the successful achievement of the goals of the organisation.
Implementation of an organisationThe implementation of an organisation can be carried out using the following features:
Email services: Email address can be assigned to different employees of the organisation.LAN communication: Local Area Network is used by organisation to connect their computer devices to a server using a common communication line.VLAN: This is known as Virtual Local Area Network which is created between two LAN's.Security: This is set up by a company to guide their data from theft.Storage: This is used by the organisation to store their data.Server: This is a device that provides internet services to another computer in an organisation.Learn more about LAN here:
https://brainly.com/question/26956118
#SPJ4
Select the correct answer.
Denise is creating a web page about rainforest animals. Her friend has many photos of animals from a trip to Brazil. Denise wants to use some
of those photos for her web page. Which input device is best for transferring photos to her multimedia project?
O A digitizing tablet
OB.
keyboard
OC. graphic pad
OD. digital camera
Explain different characteristics of computer?
[tex]\huge\purple{Hi!}[/tex]
The characteristics of computer are speed, accuracy, reliability, Automaticon, Memory
Speed=A computer works with much higher speed and accuracy compared to humans while performing mathematical calculations. Computers can process millions (1,000,000) of instructions per second. The time taken by computers for their operations is microseconds and nanoseconds.
Accuracy=Computers perform calculations with 100% accuracy. Errors may occur due to data inconsistency or inaccuracy.
Reliability=A computer is reliable as it gives consistent result for similar set of data i.e., if we give same set of input any number of times, we will get the same result.
Automation=Computer performs all the tasks automatically i.e. it performs tasks without manual intervention.
Memory=A computer has built-in memory called primary memory where it stores data. Secondary storage are removable devices such as CDs, pen drives, etc., which are also used to store data.
To notify the browser that we have JavaScript code, we should use .............
Answer:
almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console
what is a sub folder in ICT
Answer:
A sub folder is a folder within a folder.
Explanation:
A subfolder on a computer is a folder inside of another folder. For example, someone may create a main folder for their music and then create subfolders to separate the genres of music.
Additionally, "sub" prefix means "under" or within.
Hope this helps.
Answer:
It's folder that is created from the main folder.
What effect does the sudo iptables --policy INPUT DROP command have on the access to computing resources
The effect of the sudo iptables --policy INPUT DROP command is that it gives room for system administrators to handle incoming and outgoing traffic.
What does Sudo iptables -- policy input drop command do?The iptables -P INPUT DROP is known to be an -P switch that places the default policy on any given chain.
When the default policy on the INPUT chain changes to DROP., it implies that an incoming packet did not match one set of the rules and as such, it will have to be dropped.
Learn more about computing resources from
https://brainly.com/question/14596532
#SPJ2
What are the method to decrease friction?
Answer: For objects that move in fluids such as boats, planes, cars, etc the shape of their body is simplified in order to reduce the friction between the body of the objects and the fluid.
By polishing the surface, polishing makes the surface smooth and friction can be reduced.
Using lubricants such as oil or grease can reduce the friction between the surfaces.
When objects are rolled over the surface, the friction between the rolled object and the surface can be reduced by using ball bearings.
Explanation:
Select all the correct answers. Javier is preparing his resume for a network enginee list relevant experien El use a fancy font style for aesthetics mention all the certifications achieved list skills related to the job give importance to personal sition. Which three best practices should be employ? Reset Next
Answer:
A and C
Explanation:
yes its correct I know what I'm doing
Why do people take off the keys on the school computers
Answer:
is this supposed to be a joke-
Explanation:
cuz i dont get it
How did Lamarck's theory of evolution differ from Darwin's?
Lamarck believed animals evolved by passing acquired traits down to offspring.
Lamarck believed species evolved slowly, over millions of years.
Lamarck believed that only vertebrates could evolve.
Lamarck believed that the fossil record was complete.
Answer:
Lamarck's theory of evolution was wrapped around the fact that in order for the organism to adapt to it's "new" environment it has to change but Darwin's theory was that the organism will change before it's environment does thus it doesn't impact it's change
pls help!!
Calculate the standard deviation for the following data set: Data Set = 2, 9, 10, 4, 8, 4, 12
Answer:
4.24
Explanation:
First you find the mean of the data set, which is 7. Then to find standard deviation you have to follow the formula which tells you to subtract the mean from each number under the square root : √(2 - 7)^2 + (9 - 7)^2 + (10 - 7)^2 + (4 - 7)^2 + (8 - 7)^2 + (4 - 7)^2 + (12 - 7). Once you solve the parenthesis you square it, once you square it the negatives won't matter. That will leave you with this : √(25 + 4 + 9 + 9 + 25). The formula tells you to find the sum of those numbers (which is 72) then subtract one from how many numbers there are, 5 - 1 = 4, and divide your sum by that number. So 72 / 4 = 18. Then you find the square root of 18 and that becomes your answer.
For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called ________. Group of answer choices Hypertext Markup Language (HTML) top-level domains (TLDs) uniform resource locators (URLs) hyperlinks
URL is the right answer
Explanation:
Ive worked in data management
How many pages is 1500 words double spaced 12 font?.
Answer:
1-2 pages
Explanation: