Unit 4 Programming Assignment In this assignment, you will again modify your Quiz program from the previous assignment. You will create a separate class for quiz questions, and you will create objects of that class to ask questions and check answers. This assignment will include multiple cut-and-paste operations from the existing "Quiz" class into the new "MultipleChoiceQuestion" class. Object-oriented programming is designed to avoid cut and paste, and you will see some of the techniques for re-using existing code in the next assignment. In this assignment, however, you will be converting from procedural programming to object-oriented programming, and cut-and-paste is a simple strategy for this conversion.

Answers

Answer 1

In this assignment, you'll modify your Quiz program by creating a new class called Multiple Choice Question.

You'll cut and paste code from the existing Quiz class into this new class. The purpose is to transition from procedural programming to object-oriented programming. While object-oriented programming aims to avoid cut-and-paste, it's used here as a simple strategy for conversion. The assignment involves creating objects of the Multiple Choice Question class to ask questions and validate answers. The next assignment will explore techniques for reusing code and avoiding cut-and-paste in an object-oriented approach.

Learn more about program by creating here:

https://brainly.com/question/31394928

#SPJ11


Related Questions

another common name for a web beacon is a ____________, which tracks user activities.

Answers

Another common name for a web beacon is a​ web bug, which tracks user activities. Therefore, the correct answer option is: B. web bug.

What is a web browser?

In Computer technology, a web browser can be defined as a type of software application (program) that is designed and developed to enable an end user view, access and perform certain tasks on a website, especially when connected to the Internet.

In Computer technology, web browsers are typically designed and developed to save website information in their cache, which helps the website to load faster on future visits.

In conclusion, a web bug is designed and developed to tracks user activities and it is also referred to as a web beacon.

Read more on web browsers here: brainly.com/question/28088182

#SPJ4

Complete Question:

Another common name for a web beacon is a​ ______, which tracks user activities. A. worm. B. web bug. C. fire fly. D. Trojan horse

10Base5 cabling runs at speeds up to 1 Gbps and distances to 500 meters.

True or False

Answers

False.  10Base5 cabling does not run at speeds up to 1 Gbps and distances of 500 meters.  10Base5, also known as thick Ethernet or ThickNet, is an older Ethernet standard that uses coaxial cable for networking.

It supports data transmission speeds of up to 10 Mbps (megabits per second), not 1 Gbps. Additionally, the maximum segment length for 10Base5 is around 500 meters (1640 feet), not 500 meters as stated in the question. For higher speeds like 1 Gbps, other Ethernet standards like 1000Base-T (Gigabit Ethernet over twisted-pair copper) or fiber optic-based standards like 1000Base-SX or 1000Base-LX are used, which offer greater bandwidth and longer distance capabilities.

Learn more about Gigabit Ethernet here: brainly.com/question/14406916

#SPJ11

to answer the questions in this test, which type of memory recall will you most frequently use?

Answers

To answer questions in a test, you will most frequently use episodic memory recall.

Episodic memory recall is the type of memory retrieval that involves recalling specific events or experiences from the past. When answering questions in a test, you rely on your ability to recall and retrieve relevant information stored in your episodic memory.

Episodic memory enables you to remember specific details, facts, or events that you have personally experienced or learned. It allows you to recall information such as dates, names, places, and other specific details that are necessary for answering test questions accurately.

By accessing your episodic memory, you can retrieve and recall information relevant to the questions being asked, allowing you to provide accurate and specific responses based on your previous experiences, knowledge, and learning.

To know more about Episodic memory click here brainly.com/question/14423590

#SPJ11

the members of which built-in security group possess no additional capabilities in windows 8.1?

Answers

In Windows 8.1, the built-in security groups serve to manage user accounts and system resources. Each security group has a specific set of privileges and access rights that determine what actions its members can perform. Among the built-in security groups in Windows 8.1 are the Administrators group, the Users group, and the Guests group.

The members of the Guests group are the users who possess no additional capabilities in Windows 8.1. This group is designed for temporary or untrusted users who need to access the system without being able to make significant changes or modifications to it. Members of the Guests group cannot install software, modify system settings, or change user accounts.
By default, new user accounts in Windows 8.1 are added to the Users group, which has more capabilities than the Guests group but fewer than the Administrators group. Members of the Users group can run most applications, modify their own user accounts, and access shared resources on the local network.
In summary, the members of the Guests group possess no additional capabilities in Windows 8.1. They have limited access rights and are unable to make significant changes to the system. Other built-in security groups, such as the Administrators and Users groups, have different levels of access rights and privileges depending on their roles and responsibilities.

To know more about Window 8.1 visit:

https://brainly.com/question/32151847

#SPJ11

when you delete a section break, what happens to the formatting of the text before the break?

Answers

When you delete a section break in a document, the formatting of the text before the break remains unchanged. In a document, section breaks are used to divide the document into different sections, each with its own formatting settings such as page orientation, margins, headers, footers, and page numbering.

When you delete a section break, the formatting of the text before the break is not affected. The purpose of a section break is to allow different formatting settings within a document. Deleting a section break does not automatically merge the formatting of the two sections on either side of the break. Instead, the formatting of the text before the break remains intact.

If you delete a section break and want the formatting to be consistent throughout the document, you may need to manually adjust the formatting settings or apply a new section break with the desired formatting properties. Deleting a section break simply removes the structural division between sections, but the formatting of the text before the break remains unchanged unless you make further adjustments.

Learn more about footers here: https://brainly.com/question/29793304

#SPJ11

according to the reading "blogger beware," which of the following is permissible under fair use?

Answers

The reading "Blogger Beware" discusses permissible uses under fair use. Fair use is a legal doctrine that allows limited use of copyrighted material without obtaining permission from the copyright owner.

However, the specific details of what constitutes fair use can vary depending on the circumstances and jurisdiction. Without the specific information provided in the reading "Blogger Beware," it is not possible to determine which uses are permissible under fair use. In "Blogger Beware," the author likely discusses various scenarios and factors that can be taken into account when determining fair use. These factors often include the purpose and character of the use (such as whether it is transformative or commercial), the nature of the copyrighted work, the amount and substantiality of the portion used, and the effect of the use on the potential market for the original work.

By examining these factors, individuals can assess whether their use of copyrighted material falls within the boundaries of fair use. It is important to consult the specific reading for a more accurate understanding of permissible uses under fair use.

Learn more about\ substantiality here: https://brainly.com/question/9400710

#SPJ11

what mode allows you to clip through blocks and see others but you are invisible to other players?

Answers

The mode that allows you to clip through blocks, see others, and be invisible to other players is commonly known as "Spectator Mode" in many popular multiplayer video games.

In Spectator Mode, players have the ability to freely fly through the game world, passing through blocks and obstacles without any collision detection. This mode grants the player the ability to explore the environment from different perspectives and observe the gameplay of other players or entities. While in Spectator Mode, players are typically invisible to other players, allowing them to observe the game without interfering or being detected by others.

Spectator Mode is often used in multiplayer games for various purposes, such as game moderation, recording gameplay footage, or simply exploring the virtual world. It provides a unique perspective and a different gameplay experience, allowing players to have a more passive and observational role rather than actively participating in the game's mechanics.

Learn more about Spectator Mode here:

https://brainly.com/question/16796166

#SPJ11

Software that enters a computer system without the user's knowledge or consent and then performs an unwanted and usually harmful action is called
virusware
malware
hackware
attackware

Answers

The software that enters a computer system without the user's knowledge or consent and performs an unwanted and usually harmful action is called malware.

Malware is a broad term used to describe malicious software that is designed to infiltrate and compromise computer systems, often without the user's knowledge or consent. It encompasses various types of harmful programs, including viruses, worms, Trojan horses, ransomware, spyware, and adware. Malware is typically created by attackers with malicious intent, such as stealing sensitive information, damaging or disrupting computer systems, gaining unauthorized access, or conducting fraudulent activities. It can spread through various means, such as infected email attachments, malicious websites, software downloads from untrusted sources, or exploiting vulnerabilities in operating systems or software.

Once malware infects a computer system, it can perform a range of unwanted actions, including data theft, system hijacking, unauthorized access, unauthorized modification or deletion of files, monitoring user activities, displaying unwanted advertisements, or launching further attacks. Protecting against malware requires the use of antivirus software, regular software updates, strong security practices, and cautious online behavior to minimize the risk of infection and mitigate the potential harm caused by such malicious software.

Learn more about websites here: https://brainly.com/question/32113821

#SPJ11

if you have closed a saved presentation, open it in backstage view by using the ____ command.

Answers

In the Chen model, a multivalued attribute is indeed represented by a double line connecting it to the owning entity. This notation indicates that the attribute can have multiple values associated with it.

Regarding the second statement, it is not necessarily true that a database management system (DBMS) can easily handle multivalued attributes. Dealing with multivalued attributes can introduce complexities in data storage, querying, and maintaining data integrity. Traditional relational database systems, for example, are designed primarily for handling single-valued attributes. To handle multivalued attributes in a relational database, additional tables and relationships are typically required. Some modern DBMSs may offer specialized features or data types to handle multivalued attributes more efficiently. For instance, some NoSQL databases or document-oriented databases provide native support for storing and querying documents with multivalued attributes.

In summary, while the Chen model represents multivalued attributes with a double line, handling such attributes in a DBMS can vary depending on the system's capabilities and the database model being used.

Learn more about integrity here: brainly.com/question/32283512

#SPJ11

which term is consistent with feedback that is provided to an individual through the person’s own sensory systems as a result of the movement?

Answers

Intrinsic feedback, also known as proprioceptive feedback, is the term consistent with feedback that is provided to an individual through their own sensory systems as a result of movement. This type of feedback allows individuals to understand and adjust their movements without relying on external sources of information.

Intrinsic feedback originates from various sensory receptors located within muscles, tendons, and joints, which help the person's brain to monitor their body's position, movement, and force during physical activities. This feedback system plays a crucial role in motor learning and skill development, as it helps individuals to refine their motor control and coordination. By receiving immediate, internal feedback from their sensory systems, individuals can make adjustments to improve their performance and prevent injuries. In contrast, extrinsic feedback is information provided by external sources, such as coaches or other individuals, who offer guidance or critique based on their observations. Both intrinsic and extrinsic feedback are important in the overall process of learning and refining motor skills.

Learn more about proprioceptive feedback here-

https://brainly.com/question/28117428

#SPJ11

a shopping bot is one of the simplest examples of an intelligent agent.

Answers

A shopping bot can be considered one of the simplest examples of an intelligent agent.

An intelligent agent is a software program or system that can perform tasks autonomously, make decisions, and interact with its environment to achieve specific goals. A shopping bot, also known as a shopping agent or shopping assistant, is designed to assist users in finding and purchasing products online.

The shopping bot utilizes various technologies, such as web scraping, natural language processing, and machine learning, to gather information about products, compare prices, and provide recommendations based on user preferences. It can automate the process of searching for products, retrieving relevant information, and even completing purchases on behalf of the user.

The simplicity of a shopping bot lies in its focused task of assisting with online shopping. Compared to more complex intelligent agents, such as virtual personal assistants or autonomous robots, shopping bots have a narrower scope and operate within a well-defined domain. Nonetheless, they still exhibit intelligent behavior by analyzing data, making decisions, and providing personalized recommendations to enhance the shopping experience.

To learn more about machine learning click here : brainly.com/question/30073417

#SPJ11

TRUE/FALSE. as a rule of style, when writing an if statement you should indent the conditionally-executed statements

Answers

TRUE. As a rule of style, when writing an if statement, you should indent the conditionally-executed statements.Indentation is an important aspect of code styling that helps to make the code more readable and easier to understand.

Indentation is the process of aligning the code blocks in a way that shows the relationship between them. In Python, indentation is used to define code blocks, and it is especially important when writing if statements.
When you write an if statement, the conditionally-executed statements should be indented to show that they are part of the if block. This makes it clear to the reader that these statements are executed only when the if condition is met.
For example:

```
if x > 5:
   print("x is greater than 5")
   print("This statement is also executed when x > 5")
```In the above code, the conditionally-executed statements (print statements) are indented to show that they are part of the if block. If the condition is not met, these statements will not be executed.

Learn more about conditionally executed statements here:

https://brainly.com/question/31946885

#SPJ11

to take action as long as a condition remains true, you use a

Answers

A while loop is a programming structure that allows a program to repeatedly execute a set of instructions as long as a certain condition remains true. The loop will continue to run until the condition is false.

Here is an example of a while loop in Python that prints out numbers from 1 to 10:
```
i = 1
while i <= 10:
   print(i)
   i += 1
```

In this example, the while loop will continue to run as long as the variable "i" is less than or equal to 10. The "print(i)" statement will execute each time the loop runs, and then the value of "i" will be incremented by 1 with the "i += 1" statement. This loop will output the numbers 1 through 10.

To know more about loop visit:-

https://brainly.com/question/19116016

#SPJ11

I need help writing functions to implement a Hash Map class in python according to the skeleton code shown below. RESTRICTIONS: You are not allowed to use ANY built-in Python data structures and their methods, only the functions within the skeleton Code. Two pre-written classes are provided for you in the skeleton code - DynamicArray and LinkedList. You should use the objects of these classes in your HashMap class implementation. Use a DynamicArray object to store your hash table and LinkedList objects to store chains of key/value pairs.
The functions I need help writing are the put(), get(), remove(), contains_key(), and clear(), examples of the desired outputs are shown below.
put(self, key: str, value: object) -> None:
This method updates the key/value pair in the hash map. If a given key already exists in the hash map, its associated value should be replaced with the new value. If a given key is not in the hash map, a key/value pair should be added.

Answers

To implement a HashMap class in Python, the put() function is used to update or add key/value pairs. If the key already exists, the associated value is replaced with the new value. If the key is not present, a new key/value pair is added.

The put() function in the HashMap class allows for updating or adding key/value pairs in the hash map. Here is an example implementation of the put() function:

def put(self, key: str, value: object) -> None:

index = self._hash_function(key)  # Compute the hash value of the key

# Check if the key already exists in the hash map

node = self.table[index].find(key)

if node is not None:

 node.value = value  # Update the value if the key is found

 else:

 self.table[index].append(key, value)  # Add a new key/value pair

# Check if the load factor exceeds the threshold, and resize the hash     map if necessary

if self._load_factor() > self.threshold:

  self._resize()

In the above code, the _hash_function() method is used to compute the hash value/index of the key. The method find(key) is called on the linked list at the computed index to check if the key already exists. If the key is found, the associated value is updated. If the key is not present, a new node with the key/value pair is appended to the linked list at the respective index. Finally, after updating or adding the key/value pair, the _load_factor() method is used to check if the load factor (ratio of occupied slots to the total slots) exceeds a threshold. If the load factor exceeds the threshold, the _resize() method is called to resize the hash map and rehash the existing key/value pairs into the new hash table.

Learn more about Python here: https://brainly.com/question/30391554

#SPJ11

How would you create an array named someNumbers that holds three rows and four columns?a. int[][] someNumbers = new int[4][3]b. int[][] someNumbers = new int[3][4]c. double[][] someNumbers = new int[3][4]d. int[] someNumbers = new int[3][4]

Answers

To create an array named someNumbers that holds three rows and four columns, the correct syntax would be option b: int[][] someNumbers = new int[3][4].

In Java, arrays can be created using the square brackets [] to specify the dimensions. In this case, we want an array with three rows and four columns, so we use new int[3][4]. The first number, 3, represents the number of rows, and the second number, 4, represents the number of columns. Option a, int[][] someNumbers = new int[4][3], creates an array with four rows and three columns, which is the opposite of the desired dimensions. Option c, double[][] someNumbers = new int[3][4], tries to create a 2D array of double values but uses int instead, which is incorrect. Option d, int[] someNumbers = new int[3][4], attempts to create a 1D array (int[]) but uses the syntax for a 2D array ([3][4]), which is invalid. Therefore, option b is the correct choice for creating a 2D array with three rows and four columns.

To learn more about array click here: brainly.com/question/13261246

#SPJ11

What is not a common form of data mining analysis?

Answers

One type of data mining analysis that is not commonly used is cluster analysis. Cluster analysis involves grouping similar data points together based on similarities in their attributes.

While it can be useful in certain contexts, it is not as widely used as other types of data mining analysis, such as classification, regression, and association rule mining. This is because it can be difficult to interpret the results of cluster analysis, and it may not provide as much insight into the underlying patterns and relationships within the data.

Additionally, it may require more complex algorithms and techniques to implement effectively. Overall, while cluster analysis can be a valuable tool in certain situations, it is not as commonly used in the field of data mining as other types of analysis.

Learn more about algorithms here:

brainly.com/question/21172316

#SPJ11

_____________- are commonly used tools to perform session hijacking.

Answers

Answer:

Ettercap

Explanation:

A tool used to perform session hijacking is Ettercap.

Remember:

Keep Smiling and Have a good day! :)

what is a markup language for documents, containing structured information?

Answers

XML (eXtensible Markup Language) is a markup language for documents that contains structured information.

It uses tags to define elements within the document, allowing for the organization and categorization of data. XML is widely used for representing and exchanging data across different platforms and systems. It provides a flexible and extensible format that can be easily parsed and processed by various applications.

XML allows users to define their own tags, making it suitable for representing a wide range of structured information. It separates the content from the presentation, enabling data to be stored independently of its visual representation. This makes XML a popular choice for data interchange and storage, especially in web-based applications, where structured data needs to be shared and accessed by multiple systems or users.

Learn more about eXtensible Markup Language here:

https://brainly.com/question/5045657

#SPJ11

Which keywords cannot be used to modify an existing table?

Answers

Keywords that cannot be used to modify an existing table in the context of databases and SQL queries include:

CREATE: The CREATE keyword is used to create a new table or other database objects, not to modify an existing table.

ALTER: The ALTER keyword is used to modify the structure or properties of an existing table, such as adding or dropping columns, changing data types, or modifying constraints.

INSERT: The INSERT keyword is used to insert new rows of data into an existing table, but it does not modify the structure or properties of the table itself.

DELETE: The DELETE keyword is used to remove rows of data from an existing table, but it does not modify the structure or properties of the table.

DROP: The DROP keyword is used to delete an entire table, including its structure and data, rather than modifying an existing table.

Learn more about Keywords here; brainly.com/question/29795569

#SPJ11

a control structure alters the normal sequential flow of execution in a program.a. trueb. false

Answers

The statement is true. A control structure in programming is a construct that allows the alteration of the normal sequential flow of execution in a program.

Control structures enable programmers to make decisions, repeat certain actions, and control the flow of code execution based on certain conditions or criteria. By using control structures, such as conditionals (if-else statements) and loops (for, while, do-while), programmers can introduce branching and repetition in their programs. These structures enable the program to execute different sets of instructions based on specific conditions or repeatedly execute a block of code until a certain condition is met. Control structures are fundamental in programming as they provide the means to create flexible and dynamic algorithms by controlling the order and conditions under which different parts of the code are executed.

Learn more about control structure here: brainly.com/question/30078536

#SPJ11

suppose we have a 4096 byte byte-addressable memory that is 64-way high-order interleaved, what is the bit-size of the memory address module offset field? question 17 options: a. 12
b. 6
c. 10
d. 8

Answers

Answer:

a) 12

Explanation:

In a 64-way high-order interleaved memory, the memory is divided into 64 equal-sized sections, and the memory address is divided into two parts: the index and the offset. The index selects the specific section of memory to be accessed, and the offset selects the specific byte within that section.

Since the memory is byte-addressable, the offset field needs to be able to address each of the 4096 bytes in the memory section.

4096 can be represented by 2^12, so we need 12 bits to address each byte.

Therefore, the bit-size of the memory address module offset field is 12.

So the correct answer is (a) 12.

Which term defines a number used by the operating system to track all the running programs?A. Private port numberB. Process ID (PID)C. SocketD. Dynamic port number

Answers

The term that defines a number used by the operating system to track all the running programs is B. Process ID (PID).

A Process ID (PID) is a unique numerical identifier assigned by the operating system to each running process or program. The PID allows the operating system to track and manage various processes concurrently. It provides a way for the operating system to distinguish and manage individual programs, allocate system resources, and facilitate inter-process communication. Private port numbers, socket, and dynamic port numbers are not specifically used by the operating system to track running programs but rather relate to network communication and port allocation in networking protocols.

Learn more about networking protocols here: brainly.com/question/16378707

#SPJ11

You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?A. access-list 10 deny 192.168.160.0 255.255.224.0B. access-list 10 deny 192.168.160.0 0.0.191.255C. access-list 10 deny 192.168.160.0 0.0.31.255D. access-list 10 deny 192.168.0.0 0.0.31.255

Answers

The correct access list to prevent hosts in the network range of 192.168.160.0 to 192.168.191.0 would be:

A. access-list 10 deny 192.168.160.0 255.255.224.0This access list denies the range of IP addresses from 192.168.160.0 to 192.168.191.0 using a subnet mask of 255.255.224.0. This mask covers the desired range and prevents any hosts within that range from accessing the specified resources or network. The other options do not accurately define the desired range or use incorrect subnet masks.

To learn more about  network click on the link below:

brainly.com/question/32308220

#SPJ11

A query's specifications providing instructions about which tables to include must be entered on the:
Table row of the query design grid.

Show row of the query design grid.

Criteria row of the query design grid.

Sort row of the query design grid.

Answers

  The specifications for a query's instructions about which tables to include must be entered on the "Table" row of the query design grid. This is where the tables or database objects that the query will use are selected and added.

  The "Table" row of the query design grid allows users to specify the tables they want to include in their query. By selecting the desired tables from the available options, users can define the data sources for their query. Each table represents a distinct source of data, and by including multiple tables, users can perform complex operations that involve data from different sources.

  By entering the tables on the "Table" row, users define the foundation of their query, determining which datasets will be accessed and joined together. Once the tables are selected, users can proceed to specify the criteria, sorting, and other parameters of the query to retrieve the desired information from the selected tables.

Learn more about database here: brainly.in/question/17917517

#SPJ11

The ______ was important to radio technology because it allowed radio signals to be amplified.a. telephonyb. Hertzc. Audion vacuum tubed. cathode ray tubee. electromagnetic wave

Answers

The  Audion vacuum tube was important to radio technology because it allowed radio signals to be amplified.

The Audion vacuum tube, also known as the triode, was an important invention in radio technology because it allowed for the amplification of radio signals. Before the Audion vacuum tube, radio signals could only travel short distances and were difficult to detect.

With the invention of the Audion vacuum tube, radio signals could be amplified, allowing them to travel further distances and making them easier to detect. This breakthrough in radio technology led to the development of commercial radio broadcasting and paved the way for many of the technological advancements we see today.

To know more about signals visit:

https://brainly.com/question/31170905

#SPJ11

what does the "nbt" part of "nbtscan" stand for?

Answers

The "nbt" part of "nbtscan" stands for "NetBIOS over TCP/IP." NetBIOS (Network Basic Input/Output System) is a networking protocol used for communication between devices on a local area network (LAN).

It provides services for naming, session establishment, and message transfer between devices. NetBIOS over TCP/IP (NBT) is a method of encapsulating NetBIOS messages within TCP/IP packets, allowing NetBIOS-based applications to communicate over TCP/IP networks.

The "nbtscan" tool is a network scanning tool that specifically focuses on scanning and gathering information related to NetBIOS-enabled devices on a network. It can identify and collect NetBIOS-related information such as hostnames, IP addresses, MAC addresses, and other details from NetBIOS-enabled devices.

Learn more about NetBIOS     here:

https://brainly.com/question/32111634

#SPJ11

A. Prove that any comparison-based algorithm to sort 4 elements requires 5 comparisons. Hint: use the proof of the general lower bound for sorting) B. Give an algorithm to sort any sequence of 4 elements in at most 5 comparisons. C. Demonstrate your algorithm on one of its worst-case inputs (an input that requires all 5 comparisons).

Answers

Given that we have 4 elements, applying the general lower bound, we find that we need at least 4-1 = 3 comparisons to sort 4 elements.

How to Demonstrate your algorithm

Now, to provide an algorithm that sorts any sequence of 4 elements in at most 5 comparisons, we can use the following approach

Now, let's demonstrate the algorithm on a worst-case input where all 5 comparisons are required. Consider the input [4, 3, 2, 1]. The algorithm proceeds as follows:

Compare 4 and 3. (Comparison 1)

Compare 2 and 1. (Comparison 2)Compare the larger of 4 and 3 (4) with the smaller of 2 and 1 (1). (Comparison 3)Compare the smaller of 4 and 3 (3) with the larger of 2 and 1 (2). (Comparison 4)Compare 3 and 2. (Comparison 5)

In this worst-case scenario, all 5 comparisons are necessary to sort the input sequence.

Therefore, we have proven that any comparison-based algorithm to sort 4 elements requires at least 5 comparisons, and we have provided an algorithm that sorts any sequence of 4 elements in at most 5 comparisons.

Read more on algorithms  here: https://brainly.com/question/24953880

#SPJ4

to minimize the effect of echo, a device called a(n) ____ can be attached to a line. A.) echo supressor B.) repeater C.) amplifier D.) hub

Answers

Answer:

A) echo suppressor

Explanation:

Which file systems does not have built-in security?

Answers

Answer:

File Allocation Table (FAT) does not have built-in security.

Explanation:

have a nice day.

Below is a class hierarchy for card games. Assuming that these are the only classes and that the concrete classes are correctly completed, which of the following non-member functions are polymorphic?
class Hand {
std::vector cards;
public:
void add(const Card&);
Card get(size_t index) const;
virtual int score() const;
};
class PokerHand : public Hand { . . . };
class BlackjackHand : public Hand { . . . };
class GoFishHand : public Hand { . . . }; void draw(const PokerHand* h) { . . . }
None of these are polymorphic.
void draw(const Hand h) { . . . }
Correct Answer void draw(const Hand& h) { . . . }
void draw(const GoFishHand& h) { . . . }

Answers

Among the provided non-member functions, the only polymorphic function is void draw(const Hand& h) in the class hierarchy for card games.

Explanation:

Polymorphism refers to the ability of objects of different derived classes to be treated as objects of their common base class. In the given class hierarchy, the base class Hand has virtual function score(), making it polymorphic. Consequently, any derived classes that inherit from Hand will also exhibit polymorphic behavior.

Among the non-member functions, void draw(const Hand& h) is polymorphic because it accepts a reference to a Hand object, which can be an instance of the base class or any of its derived classes (PokerHand, BlackjackHand, or GoFishHand). This function allows for dynamic dispatch, meaning that the appropriate draw implementation will be called based on the actual type of the object passed at runtime.

The other non-member functions (void draw(const PokerHand* h) and void draw(const GoFishHand& h)) are not polymorphic since they accept specific derived class types as arguments, limiting their applicability only to those specific types.

Therefore, the correct answer is void draw(const Hand& h) as the only polymorphic function among the provided non-member functions in the given class hierarchy

Learn more about polymorphic function here:

https://brainly.com/question/29887426

#SPJ11

Other Questions
Which polynomials are perfect square trinomials? Select all that apply.A) x-12x+36B) 36x-12x+1C) x-100D) 4x + 81E) 49x-56x + 16F) x + xy + y the ______ present in the light source illuminating an object affects the perceived color.multiple choice question.A. sensitivityB. intensityC. wavelengthD. luminosity Fish may contain high levels of ________, which can be harmful to a developing fetus.A. DDTB. methylmercuryC. leadD. magnesium What is the meaning of "apply the Separation Schema to the property [tex]x\notin x[/tex]"? Pls help my LAST QUESTION!!!!! PLEASE CAN YALL HELP ME WITH THISSS what can the nurse teach the johnsons about lying in preschool children? (learning objectives 2 and 7) all of the following happened as a result of the discovery of gold in california, except : total cost is equal to _____ costs at an output level of zero. suppose x and y are two variables defined in a python script. what is the difference between codes x = y and x == y? at the university of michigan, researchers discovered two different leadership behaviors: employee-centered and behavior. As cash processing systems become more automated and integrated, which of the following is true about the general concept of segregation of duties?a. Segregation of duties becomes less important.b. Segregation of duties becomes more important.c. The importance of segregation of duties does not change.d. Segregation of duties becomes completely computerized without human involvement. the innovations in information technology today is changing structures to more _____ with people being able to work remotely Comets with orbits that take them through the inner solar system shed sand- to pebble-size particles that then follow the comet around its orbit. How do these particles affect Earth? A) On rare occasions, they can blanket our entire atmosphere with dust. B) They are the particles that produce meteor showers. C) They have been implicated in mass extinctions, including the extinction of the dinosaurs. D) They are the particles that produce the lights of auroras. health p.e please help A single-effect evaporator Is used to concentrate a feed solution of organiccolloids from 6 to 50 wt %. The solution has a negligible boiling-point elevation.The heat capacity of the feed is 4.06 kJ kg'' K and the feed enters at 15.6C.Saturated steam at 101.32 kPa absolute is available for heating, and theabsolute pressure in the vapour space of the evaporator is 15.3 kPa. A total of4536 kg hr of water is to be evaporated. The overall heat transfer coefficient is.1988W M2 KL 5= 100C fiom steam tables The while loop is this type of loop. A) post-test B) pre-test C) infinite Di limited E) None You observe a drop of water under a microscope and observe many tiny organisms moving with pseudopodia. What is the type of cellular organization of this organism Sylvia Baxter reaches an agreed upon selling Shoe and tire marks impressed into soft earth can be best preserved by:A. Photographing and then use of the electrostatic lifting technique.B. Casting with dental stone and then attempting the electrostatic lift technique.C. Photographing and casting with dental stone.D. Both A and B