Answer:
Database Tools, The Line Connecting the Tables, Cascade Delete Related Records
Explanation:
Write a program named HoursAndMinutes that declares a minutes variable to represent minutes worked on a job, and assign a value to it. Display the value in hours and minutes. For example, 197 minutes becomes 3 hours and 17 minutes.'
Answer:
Explanation:
The following code is written in Python, it asks the user for the number of minutes worked. Divides that into hours and minutes, saves the values into separate variables, and then prints the correct statement using those values. Output can be seen in the attached image below.
import math
class HoursAndMinutes:
min = input("Enter number of minutes worked: ")
hours = math.floor(int(min) / 60)
minutes = (int(min) % 60)
print(str(hours) + " hours and " + str(minutes) + " minutes")
1. Programmable logic controllers (also called
PLCs) are used to control machines and other
industrial applications with
instead
of using hard-wired devices.
Answer:
A programmable logic controller (PLC) or programmable controller is an industrial digital computer that has been ruggedized and adapted for the control of manufacturing processes, such as assembly lines, robotic devices, or any activity that requires high reliability, ease of programming, and process fault diagnosis.
Explanation:
What are some examples and non-examples of digital security?
Answer:
Devices such as a smart card-based USB token, the SIM card in your cell phone, the secure chip in your contactless payment card or an ePassport are digital security devices
Consider a model of a drone to deliver the orders of the customers within the range of 20 km of the coverage area.
Identified at least 5 factors (inputs) required to experiment with the above mention system model (e.g. speed of the drone).
Write down the levels (range or setting) for each factor mentioned above. (e.g. speed ranges from 10km/h to 30km/h).
On what responses (results) will you analyses the experiment’s success or failure (e.g. drone failed to deliver the package on time), mention at least 3 responses
Answer:
Explanation:
suna shahani kesa a ..
Write a C++ function with the following signature: void readAndConvert() The function takes no parameters and returns no value. Instead, it reads its input from std::cin and writes its output to std::cout. Both the input and output are information describing a sequence of stock trades, albeit in different formats. Input format The input will be formatted according to the following specification. You may freely assume that the input will be in the format described here; it doesn't matter what your function does with input that doesn't meet those requirements. • The first line of the input will contain a positive integer, which will specify the number of trades whose information will be present in the input. • The second line of the input will contain the stock's symbol, which is a sequence of uppercase letters. • The third line of the input will contain a brief description of the stock, which is any arbitrary sequence of characters. • After that will be one line for each trade - so the integer on the first line tells you how many more lines there will be — which will contain three pieces of information separated by spaces! • A positive integer specifying the number of shares traded. o The price paid for each share, which is a number that will always have exactly two digits after the decimal point. • A sequence of lowercase letters that specifies a confirmation number for the trade. One example input that follows that format is as follows, though your function would need to work on any input that follows the specification, not just the one example. BOO Forever Boo Enterprises 100 50.00 barzxfq. 200 60.75 hhpncstvz 150 7.90 cjjm 175 100.15 fryzyt Output format Your function's output is a reorganization of the information from the input, which you would write in the following format. • The first line of output would contain the description of the stock, followed by a space, followed by the symbol surrounded by parentheses. • Each subsequent line of output describes one of the trades from the input, in the following format: o The confirmation number, followed by a colon and a space, followed by the integer number of dollars spent in the order (i.e., the number of shares times the price per share, always rounding to the floor of the number). The correct output for the example input above is as follows. Forever Boo Enterprises (BOO) barzxfq: 5000 hhpncstvz: 12150 cjjm: 1185 fryzyt: 17526 It is irrelevant whether your program prints all of the output only after reading the input, or whether it prints the output while it reads input; this is your choice. The only requirement is that your output meets the formatting requirements.
Answer:
The function is as follows:
void readAndConvert(){
int n; string symbol,name;
cin>>n;
cin>>symbol;
cin.ignore();
getline (cin,name);
vector<string> trades;
string trade;
for (int inps = 0; inps < n; inps++){
getline (cin,trade);
trades.push_back(trade);}
cout<<name<<" ("<<symbol<<")"<<endl;
for (int itr = 0; itr < n; itr++){
string splittrade[3]; int k = 0;
for(int j=0;j<trades.at(itr).length();j++){
splittrade[k] += trades.at(itr)[j];
if(trades.at(itr)[j] == ' '){
k++; }}
cout<<splittrade[2]<<": "<<floor(stod(splittrade[1]) * stod(splittrade[0]))<<endl; }
}
Explanation:
See attachment for complete program where comments are used to explain each line
Create a public class called Exceptioner that provides one static method exceptionable. exceptionable accepts a single int as a parameter. You should assert that the int is between 0 and 3, inclusive.
If the int is 0, you should return an IllegalStateException. If it's 1, you should return a NullPointerException. If it's 2, you should return a ArithmeticException. And if it's 3, you should return a IllegalArgumentException.
// Begin class declaration
public class Exceptioner {
// Define the exceptionable method
public static void exceptionable(int number){
//check if number is 0.
if(number == 0) {
//if it is 0, return an IllegalStateException
throw new IllegalStateException("number is 0");
}
//check if number is 1
else if(number == 1) {
//if it is 1, return a NullPointerException
throw new NullPointerException("number is 1");
}
//check if number is 2
else if(number == 2) {
//if it is 2, return an ArithmeticException
throw new ArithmeticException("number is 2");
}
//check if number is 3
else if(number == 3) {
//if it is 3, return an IllegalArgumentException
throw new IllegalArgumentException("number is 3");
}
}
}
Sample Output:Exception in thread "main" java.lang.ArithmeticException: number is 2
at Main.exceptionable(Main.java:26)
at Main.main(Main.java:36)
Explanation:The code is written in Java with comments explaining important parts of the code.
A sample output for the call of the method with number 2 is also provided. i.e
exception(2)
gives the output provided above.
The new software organization requires a new point of sale and stock control system for their many stores throughout Pakistan to replace their aging mini-based systems.
A sales assistant will be able to process an order by entering product numbers and required quantities into the system. The system will display a description, price, and available stock. In-stock products will normally be collected immediately by the customer from the store but may be selected for delivery to the customer's home address for which there will be a charge. If stock is not available, the sales assistant will be able to create a backorder for the product from a regional warehouse. The products will then either be delivered directly from the regional warehouse to the customer's home address, or the store for collection by the customer. The system will allow products to be paid for by cash or credit card. Credit card transactions will be validated via an online card transaction system. The system will produce a receipt. Order details for in-stock products will be printed in the warehouse including the bin reference, quantity, product number, and description. These will be collected by the sales assistant and given to the customer. The sales assistant will be able to make refunds, provided a valid receipt is produced. The sales assistant will also be able to check stock and pricing without creating an order and progress orders that have been created for delivery.
You need to answer the following questions.
1. Which elicitation method or methods appropriate to discover the requirement for a given scenario system to work efficiently, where multiple sales and stock points manage. Justify your answer with examples.
2. Identify all stakeholders for a given scenario according to their roles and responsibilities with suitable justifications.
3. Specify functional users and systems requirements with proper justifications.
Answer:
hdyfhwjhsucndiskfbvienucuit
Is the ASSIGN statement a data entry statement, true or false?
a buffer storage that improve computer performance by reducing access time is
Differences between dot_mattix printer and a line printer
Answer:
Difference Between Dot Matrix and Line Printer is that Dot-matrix printer produce printed images, they produce image when tine wire pins on a print head mechanism strike an inked ribbon. While Line printer is a type of impact printer which is high-speed and printer an entire line at a time.
Explanation: Hope this helps!
what is the relationship between a base and the number of symbols in a positional number system?
Answer:
the value of a symbol is given by the weight of it's position expressed in the bases of the system (or radices)
Which item can you add using the tag?
OA.
a movie
OB.
an image
OC.
a documentary
OD.
a music file
Answer:
The answer to this would be D: A music file
Explanation:
Since this tag is is <audio>, all of the other ones are visual and have sound. This means that a tag would need to be able to display visuals as well. Making a music file the only item you would be able to include with the given tag.
Cuál es el objetivo principal de una clave primaria?
La clave principal le permite crear un identificador único para cada fila de su tabla. Es importante porque le ayuda a vincular su tabla a otras tablas (relaciones) utilizando la clave principal como vínculos.
Three reasons why users attach speakers to their computers.
Answer:
Iv'e answered this question 2 times already lol. The purpose of speakers is to produce audio output that can be heard by the listener. Speakers are transducers that convert electromagnetic waves into sound waves. The speakers receive audio input from a device such as a computer or an audio receiver.
Explanation: I hope this helps!
in the lungs,blood picks up carbon dioxide and releases oxygen true or false
Answer:
false
Explanation:
plants do that, they absorb carbon dioxide and then they create oxygen, then humans breathe the oxygen and makes CB
Explain what an IM is, and what is the technology shown in the accompanying figure
Answer: Instant Message
Explanation:
Answer:the technology that is shown is a ch't rooms, a website or application that permits users to ch't with others who are online at the same time. as you type others can see what you type may i get brainiest plz
Explanation:
Suppose you are a merchant and you decide to use a biometric fingerprint device to authenticate people who make credit card purchases at your store. You can choose between two different systems: System A has a fraud rate of 1% and an insult rate of 5%, while System B has a fraud rate of 5% and an insult rate of 1%. Fraud rate is the chance that another person is incorrectly authenticated as you, while insult rate is the chance that you are not successfully authenticated as you.
Required:
Which system would you choose and why?
The choice between biometric fingerprint systems with varying fraud and insult rates depends on the priorities and risks of the merchant and their business.
Give reasons why a particular system would be chosen.When choosing between the two biometric fingerprint systems, it's important to consider the trade-off between the fraud rate and the insult rate.
System A has a lower fraud rate of 1%, which means that there is a lower chance that another person is incorrectly authenticated as a legitimate user. However, System A has a higher insult rate of 5%, which means that there is a higher chance that the legitimate user is not successfully authenticated.
On the other hand, System B has a higher fraud rate of 5%, which means that there is a higher chance that another person could be incorrectly authenticated as a legitimate user. However, System B has a lower insult rate of 1%, which means that there is a lower chance that the legitimate user is not successfully authenticated.
Ultimately, the decision of which system to choose would depend on the priorities and risks associated with the specific merchant and their business. They would need to weigh the potential financial loss from fraud against the inconvenience or loss of business from customers who are not successfully authenticated.
To learn more about biometric, visit:
https://brainly.com/question/20318111
#SPJ1
Which language paradigm interacts well with database systems in business environments that use SQL? (I WILL GIVE BRAINLIEST TO THE RIGHT ANSWER
aspect-oriented
data-oriented
fourth-generation
logic-based
Answer:
I think it is fourth-generation.
Explanation:
Can someone help me with this lab assignment? I really do not know what should I do?
This assignment
The program you wrote in Stacks 1 is incomplete. Without a destructor it creates a memory leak. A destructor has been defined in this program but it is incorrect. To visualize how the destructor works, a cout statement has been added. Fix the errors, including the cout statement, to display the value in each node of the stack before releasing the memory.
Write a loop in main() to enter an unknown number of positive integers. The loop stops when you enter 0 or a negative number. As you are entering integers, they are to be pushed onto a stack.
Ex.: If the user enters '10 20 30 -1` the output (from the destructor) should be:
30 - deleted!
20 - deleted!
10 - deleted!
Empty stack!
Ex.: If the user enters '-1` the output should be:
Empty stack!
This is the code:
#include
using namespace std;
class Stack_int
{
private:
// Structure for the stack nodes
struct StackNode {
int value; // Value in the node
StackNode *next; // Pointer to next node
};
StackNode *top; // Pointer to the stack top
int length; // Number of nodes
public:
Stack_int(){ top = NULL; length = 0; } //Constructor
~Stack_int(); // Destructor
// Stack operations
// bool isEmpty();
bool push(int);
// int pop();
// int peek();
// int getLength();
};
/**~*~*
Member function push: pushes the argument onto the stack.
*~**/
bool Stack_int::push(int item)
{
StackNode *newNode; // Pointer to a new node
// Allocate a new node and store num there.
newNode = new StackNode;
if (!newNode)
return false;
newNode->value = item;
// Update links and counter
newNode->next = top;
top = newNode;
length++;
return true;
}
/**~*~*
Destructor
*~**/
Stack_int::~Stack_int()
{
StackNode *currNode;
// Position nodePtr at the top of the stack.
currNode = top;
// Traverse the list deleting each node.
while (currNode)
{
cout << currNode->value << " - deleted!" << endl;
delete currNode;
currNode = NULL;
currNode = currNode->next;
}
cout << "Empty stack!" << endl;
}
int main() {
Stack_int s;
int item;
return 0;
}
Answer:
your question is too long to read
Explanation:
try explaining it in fewer words
I
Moving to another question will save this response
uestion 1
A field in the logical design of a database corresponds to a row in the physical table of a relational database.
O True
O False
Moving to another question will save this response
Type here to search
o
Answer:
False.
Explanation:
A database management system (DBMS) can be defined as a collection of software applications that typically enables computer users to create, store, modify, retrieve and manage data or informations in a database. Generally, it allows computer users to efficiently retrieve and manage their data with an appropriate level of security.
A data dictionary can be defined as a centralized collection of information on a specific data such as attributes, names, fields and definitions that are being used in a computer database system.
This ultimately implies that, a data dictionary found in a computer database system typically contains the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. This records are stored and communicated to other data when required or needed.
In database management, the term "schema" is used to denote a representation of data.
A database schema is a structure which is typically used to represent the logical design of the database and as such represents how data are stored or organized and the relationships existing in a database management system. There are two (2) main categories of a database schema; physical database schema and logical database schema.
A relational database can be defined as a type of database that is structured in a manner that there exists a relationship between its elements.
In the physical table of a relational database, a record used in the logical design of a database corresponds to a row.
which of the following is an example of how to effectively avoid plagiarism
Answer:
You didn't list any choices, but in order to avoid all plagiarism, you must focus on rewriting the following script/paragraph in your own words. This could be anything from completely changing the paragraph (not the context) to summarizing the paragraph in your own words.
Answer:
Simon cites anything that he didnt know before he read it in any given source
Explanation:
a p e x
The American Red Cross wants you to write a program that will calculate the average pints of blood donated during a blood drive. The program should take in the number of pints donated during the drive, based on a seven hour drive period. The average pints donated during that period should be calculated and displayed. Use a loop in the program to run multiple times.
Answer:
The program in Python is as follows:
num_pints = int(input("Pints: "))
sum_pints = 0
for i in range(num_pints):
blood = int(input("Blood Donated: "))
sum_pints += blood
print("Average: ",sum_pints/num_pints)
Explanation:
This prompts the user for number of pints
num_pints = int(input("Pints: "))
This initializes the sum to 0
sum_pints = 0
This iterates through the number of pints
for i in range(num_pints):
This gets input for each blood donated
blood = int(input("Blood Donated: "))
This adds up all blood donated
sum_pints += blood
This calculates and prints the average
print("Average: ",sum_pints/num_pints)
Three reasons why users attach speakers to their computer
e Highlight
fogy
ст)
4 uses of information
communication technology in the health sector
Answer: See explanation
Explanation:
The uses of information
communication technology in the health sector include:
• Improvement in the safety of patients through direct access to case story.
• Keeping track of the progress of the patient.
• Checking of the treatments for a disease it illness online.
• It's also vital for the electronic storage of the medical data.
You are a web designer, and a client wants you to create a website for their new business. Discuss what you would talk about with the client to ensure they were getting the website they wanted. What questions would you ask the client? What information would you need from the client?
Answer:
1. for what purpose?
2. the pattern design of web
3. what the client wants to add in the web
4. his contact number and email
5. the logo of the business
6. talk about pricing
Explanation:
If a system contains 1,000 disk drives, each of which has a 750,000- hour MTBF, which of the following best describes how often a drive failure will occur in that disk farm:
a. once per thousand years
b. once per century, once per decade
c. once per year, once per month
d. once per week
e. once per day
f. once per hour
g. once per minute
h. once per second
Answer:
once per month
Explanation:
The correct answer is - once per month
Reason -
Probability of 1 failure of 1000 hard disk = 750,000/1000 = 750 hrs
So,
750/24 = 31.25 days
⇒ approximately one in a month.
Write a client program Client Sorting and in the main method:
1. Call a method, SelectionSorter() that accepts an integer array as a parameter and sorts the elements in the array using the selection sort algorithm where it picks the maximum value in the array in each pass. Print the array before it is sorted in the main method, then after it is sorted in SelectionSorter().
2. Call a method, BubbleSorter that accepts an integer array as a parameter and sorts the elements in the array in descending order (highest number first, then the second highest and so on) using the bubble sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in BubbleSortero.
3. Call a method, InsertSorter() that accepts an integer array as a parameter and sorts the elements in the array using the insertion sort algorithm. Print the array before it is sorted in the main method, then after it is sorted in InsertSortero.
Answer:
Explanation:
The following code is written in Java. It creates a method for each of the sorting algorithms and one method to reset the array and print the original, so that all algorithms can be tested with the same array.The entire program code is below.
import java.util.Scanner;
class Brainly {
static int[] arr;
public static void main(String[] args) {
// Print Unsorted Array and Call Selection Sort and print
resetArray();
SelectionSorter(arr);
System.out.print("\nSelection Sort Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
//Reset Array and call Bubble Sort and print
System.out.println('\n');
resetArray();
BubbleSorter(arr);
System.out.print("\nBubble Sort Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
//Reset Array and call Insert Sort and print
System.out.println('\n');
resetArray();
InsertSorter(arr);
System.out.print("\nInsert Sort Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
}
public static void resetArray() {
arr = new int[]{10, 14, 28, 11, 7, 16, 30, 50, 25, 18};
System.out.print("Unsorted Array: ");
for (int x : arr) {
System.out.print(x + ", ");
}
}
public static void SelectionSorter(int[] arr) {
for (int i = 0; i < arr.length - 1; i++) {
int index = i;
for (int j = i + 1; j < arr.length; j++) {
if (arr[j] < arr[index]) {
index = j;//searching for lowest index
}
}
int smallerNumber = arr[index];
arr[index] = arr[i];
arr[i] = smallerNumber;
}
}
static void BubbleSorter(int[] arr) {
int n = arr.length;
int temp = 0;
for (int i = 0; i < n; i++) {
for (int j = 1; j < (n - i); j++) {
if (arr[j - 1] > arr[j]) {
//swap elements
temp = arr[j - 1];
arr[j - 1] = arr[j];
arr[j] = temp;
}
}
}
}
public static void InsertSorter(int arr[]) {
int n = arr.length;
for (int j = 1; j < n; j++) {
int key = arr[j];
int i = j - 1;
while ((i > -1) && (arr[i] > key)) {
arr[i + 1] = arr[i];
i--;
}
arr[i + 1] = key;
}
}
}
Which command will allow you to underline and boldface text on multiple pages using fewer mouse clicks?
Animation Painter
Animation
Format Painter
Answer:
Its D
Explanation:
Edg 2023
Which of the following statements are true about the code shown below in the class named Quiz? (Select all that apply.)
public class Quiz {
public static void printOdd(int n) {
for(int i = 0; i < n; i++){
if(i % 2 != 0)
System.out.println(i);
else
System.out.println(i+1);
}
}
public static void main(String arg[]) {
printOdd(5);
}
}
a. A value of 5 will be substituted for the parameter during the execution of the printOdd method.
b. This method will print a list of all even numbers less than n.
c. This method when executed as called by main will print out 5 lines of output.
d. This method when executed as called by main will print out 1 line of output.
e. A value of 5 is being returned to main from the printOdd method after execution.
Answer:
a. and c.
Explanation:
The snippet of code provided will print out all of the odd numbers between 0 and the value passed as a parameter. If a number is even, it will add 1 to the even number and print out the new value. Therefore, there will be a total of outputs as the number passed as an argument. For example, this code will output a total of 5 lines of output. Therefore, the statements that would be true in this question would be the following...
a. A value of 5 will be substituted for the parameter during the execution of the printOdd method.
c. This method when executed as called by main will print out 5 lines of output.
Provide examples of how information technology has created an ethical dilemma that would not have existed before the advent of I.T.