Explanation:
Morality is a set of values and habits that a society acquires over time and can be categorized as good and bad values, right and wrong, justice and crime. Ethics is defined as the study of morals, the practical application of moral behaviors defined by society.
Therefore, the concept of "murder" or "killing" is seen as an immoral act by the vast majority of society around the world, strengthened by the set of moral conduct common to all human beings, which are the Articles on the Universal Declaration of Human Rights. Human Rights, which is an official document of the UN, which contains several universair and analytical rules on the rights of every individual, such as the right to life, security, freedom, etc.
Question 1
1 pts
The pressure of the electrons in a wire is measured in units called
volts
amperes
watts
ohms
The largely instinct 3.5 inch floppy disc uses which connector
Answer:
Option A, Volts
Explanation:
Volts is the unit of pressure of the electrons in a wire. One Volt is the required pressure to allow flow of one unit of current in a circuit against a resistance of one ohm.
Hence, option A is correct
Need to compress this IPv6 Address
ad93:a0e4:a9ce:32fc:cba8:15fe:ed90:d768
I can't underatnd your question
SORRY
what materials can I find at home and make a cell phone tower
Answer:
you cant
Explanation:
You simply cant make a tower from materials found in a household
Suppose you have the following search space:
State
next
cost
A
B
4
A
C
1
B
D
3
B
E
8
C
C
0
C
D
2
C
F
6
D
C
2
D
E
4
E
G
2
F
G
8
Draw the state space of this problem.
Assume that the initial state is A and the goal state is G. Show how each of the following search strategies would create a search tree to find a path from the initial state to the goal state:
Breadth-first search
Depth-first search
Uniform cost search
Breadth
Depth
Uniform
U
Do you think renewable energy can power the world? If so, why?
Answer:
yes
Explanation:
Because it is a new safer and more energy efficient way of producing energy
9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula using the COUNTIF function and structured references to count the number of students who have been elected to offices in student organizations.
Let understand that a spreadsheet perform function such as getting the sum, subtraction, averages, counting of numbers on the sheet rows and columns.
Also, the image to the question have been attached as picture.Here, Lael wants to count the number of students who have been elected to offices in student organizations.Lael will used the COUNTIF Function in the Spreadsheet to achieve the count because function helps to count cells that contain numbers.In conclusion, the formulae that Lael should use on the Spreadsheet to count the number of students who are elected is "Q8 = COUNTIF(M2:M31, "Elected")"
Learn more about Excel function here
brainly.com/question/24826456/
Explain with examples:
What are the reasons of a successful and unsuccessful software project?
Answer:
A good starting point is by addressing some of the key reasons software projects fail.
Explanation:
Not Enough Time. ...
Insufficient Budget. ...
Poor Communication. ...
Never Reviewing Project Progress. ...
Inadequate Testing. ...
Testing in the Production Environment. ...
Lack of Quality Assurance. ...
Not Conforming to Industry Standards.
User involvement, management support, reasonable requirements, and accurate projections are some of the most frequent aspects that contribute to software project success.
What is a software project?A software project is the entire process of developing software, from gathering requirements to testing and maintenance, carried out in accordance with execution techniques over a predetermined amount of time to produce the desired software output.
Some of the most frequent factors that influence the success of software projects are user interaction, management support, fair needs, and realistic estimates.
Application bug or error, environmental conditions, infrastructure or software failure, virus, hacker, network/hardware failure, and operator error are the main causes of software project failure.
According to the study, project success and failure are most heavily influenced by the degree of customer/user interaction, software process management, and estimation and timeline.
Thus, these are the reasons of a successful and unsuccessful software project.
For more details regarding software project, visit:
https://brainly.com/question/3818302
#SPJ2
write a c++ program that accept student information
Answer:
Structure
This program stores the information (name, roll and marks entered by the user) of a student in a structure and displays it on the screen.
To understand this example, you should have the knowledge of the following C++ programming topics:
C++ StructuresC++ StringsIn this program, a structure(student) is created which contains name, roll and marks as its data member. Then, a structure variable(s) is created. Then, data (name, roll and marks) is taken from user and stored in data members of structure variable s. Finally, the data entered by user is displayed.This structure has three members: name (string), roll (integer) and marks (float).
Then, a structure variable s is created to store information and display it on the screen.
In java I need help on this specific code for this lab.
Problem 1:
Create a Class named Array2D with two instance methods:
public double[] rowAvg(int[][] array)
This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per row of the 2D array argument.
The method will adjust automatically to different sizes of rectangular 2D arrays.
Example: Using the following array for testing:
int [][] testArray =
{
{ 1, 2, 3, 4, 6},
{ 6, 7, 8, 9, 11},
{11, 12, 13, 14, 16}
};
must yield the following results:
Averages per row 1 : 3.20
Averages per row 2 : 8.20
Averages per row 3 : 13.20
While using this other array:
double[][] testArray =
{
{1, 2},
{4, 5},
{7, 8},
{3, 4}
};
must yield the following results:
Averages per row 1 : 1.50
Averages per row 2 : 4.50
Averages per row 3 : 7.50
Averages per row 4 : 3.50
public double[] colAvg(int[][] array)
This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per column of the 2D array argument.
The method will adjust automatically to different sizes of rectangular 2D arrays.
Example: Using the following array for testing:
int [][] testArray =
{
{ 1, 2, 3, 4, 6},
{ 6, 7, 8, 9, 11},
{11, 12, 13, 14, 16}
};
must yield the following results:
Averages per column 1: 6.00
Averages per column 2: 7.00
Averages per column 3: 8.00
Averages per column 4: 9.00
Averages per column 5: 11.00
While using this other array:
double[][] testArray =
{
{1, 2},
{4, 5},
{7, 8},
{3, 4}
};
must yield the following results:
Averages per column 1: 3.75
Averages per column 2: 4.75
My code is:
public class ArrayDemo2dd
{
public static void main(String[] args)
{
int [][] testArray1 =
{
{1, 2, 3, 4, 6},
{6, 7, 8, 9, 11},
{11, 12, 13, 14, 16}
};
int[][] testArray2 =
{
{1, 2 },
{4, 5},
{7, 8},
{3,4}
};
// The outer loop drives through the array row by row
// testArray1.length has the number of rows or the array
for (int row =0; row < testArray1.length; row++)
{
double sum =0;
// The inner loop uses the same row, then traverses all the columns of that row.
// testArray1[row].length has the number of columns of each row.
for(int col =0 ; col < testArray1[row].length; col++)
{
// An accumulator adds all the elements of each row
sum = sum + testArray1[row][col];
}
//The average per row is calculated dividing the total by the number of columns
System.out.println(sum/testArray1[row].length);
}
} // end of main()
}// end of class
However, it says there's an error... I'm not sure how to exactly do this type of code... So from my understanding do we convert it?
Answer:
Explanation:
The following code is written in Java and creates the two methods as requested each returning the desired double[] array with the averages. Both have been tested as seen in the example below and output the correct output as per the example in the question. they simply need to be added to whatever code you want.
public static double[] rowAvg(int[][] array) {
double result[] = new double[array.length];
for (int x = 0; x < array.length; x++) {
double average = 0;
for (int y = 0; y < array[x].length; y++) {
average += array[x][y];
}
average = average / array[x].length;
result[x] = average;
}
return result;
}
public static double[] colAvg(int[][] array) {
double result[] = new double[array[0].length];
for (int x = 0; x < array[x].length; x++) {
double average = 0;
for (int y = 0; y < array.length; y++) {
average += array[y][x];
}
average = average / array.length;
result[x] = average;
}
return result;
}
Which of the following characteristics differentiates PCM from BWF audio
file formats?
metadata storage
.wav file extension
uncompressed audio file format
compressed audio file format
Answer: A
Explanation:
Answer:
A
Explanation:
What is the benefit of making an archive folder visible in the Outlook folder list?
This makes the folder available on the Office 365 website.
The folder can be password protected to increase security.
Archived items in the folder are accessible within the Outlook client.
Archived items in the folder can be shared with other Outlook users.
Answer:
a
Explanation:
An example of a host-based intrusion detection tool is the tripwire program. This is a file integrity checking tool that scans files and directories on the system on a regular basis and notifies the administrator of any changes. It uses a protected database of cryptographic checksums for each file checked and compares this value with that recomputed on each file as it is scanned. It must be configured with a list of files and directories to check and what changes, if any, are permissible to each. It can allow, for example, log files to have new entries appended, but not for existing entries to be changed. What are the advantages and disadvantages of using such a tool? Consider the problem of determining which files should only change rarely, which files may change more often and how, and which change frequently and hence cannot be checked. Hence consider the amount of work in both the configuration of the program and on the system administrator monitoring the responses generated.
Answer:
The main problem with such a tool would be resource usage
Explanation:
The main problem with such a tool would be resource usage. Such a tool would need a large amount of CPU power in order to check all of the files on the system thoroughly and at a fast enough speed to finish the process before the next cycle starts. Such a program would also have to allocate a large amount of hard drive space since it would need to temporarily save the original versions of these files in order to compare the current file to the original version and determine whether it changed or not. Depending the amount of files in the system the work on configuring the program may be very extensive since each individual file needs to be analyzed to determine whether or not they need to be verified by the program or not. Monitoring responses may not be so time consuming since the program should only warn about changes that have occurred which may be only 10% of the files on a daily basis or less.
Joseph learned in his physics class that centimeter is a smaller unit of length and a hundred centimeters group to form a larger unit of length called a meter. Joseph recollected that in computer science, a bit is the smallest unit of data storage and a group of eight bits forms a larger unit. Which term refers to a group of eight binary digits? A. bit B. byte O C. kilobyte D. megabyte
Answer:
byte
Explanation:
A byte is made up of eight binary digits
You have been tasked with building a URL file validator for a web crawler. A web crawler is an application that fetches a web page, extracts the URLs present in that page, and then recursively fetches new pages using the extracted URLs. The end goal of a web crawler is to collect text data, images, or other resources present in order to validate resource URLs or hyperlinks on a page. URL validators can be useful to validate if the extracted URL is a valid resource to fetch. In this scenario, you will build a URL validator that checks for supported protocols and file types.
What you need to do?
1. Writing detailed comments and docstrings
2. Organizing and structuring code for readability
3. URL = :///
Steps for Completion
Task
Create two lists of strings - one list for Protocol called valid_protocols, and one list for storing File extension called valid_ftleinfo . For this take the protocol list should be restricted to http , https and ftp. The file extension list should be hrl. and docx CSV.
Split an input named url, and then use the first element to see whether the protocol of the URL is in valid_protocols. Similarly, check whether the URL contains a valid file_info.
Task
Write the conditions to return a Boolean value of True if the URL is valid, and False if either the Protocol or the File extension is not valid.
main.py х +
1 def validate_url(url):
2 *****Validates the given url passed as string.
3
4 Arguments:
5 url --- String, A valid url should be of form :///
6
7 Protocol = [http, https, ftp]
8 Hostname = string
9 Fileinfo = [.html, .csv, .docx]
10 ***
11 # your code starts here.
12
13
14
15 return # return True if url is valid else False
16
17
18 if
19 name _main__': url input("Enter an Url: ")
20 print(validate_url(url))
21
22
23
24
25
Answer:
Python Code:
def validate_url(url):
#Creating the list of valid protocols and file name extensions
valid_protocols = ['http', 'https', 'ftp']
valid_fileinfo = ['.html', '.csv', '.docx']
#splitting the url into two parts
url_split = url.split('://')
isProtocolValid = False
isFileValid = False
#iterating over the valid protocols and file names for validity
for x in valid_protocols:
if x in url_split[0]:
isProtocolValid = True
break
for x in valid_fileinfo:
if x in url_split[1]:
isFileValid = True
break
#Returning the result if the URL has both valid protocol and file extension
return (isProtocolValid and isFileValid)
url = input("Enter an URL: ")
print(validate_url(url))
Explanation:
The image of the output code is attached. Hope it helps.
outline four advantages of digital
cameras over analogue cameras
Answer:
Explanation:
A digital camera refers to a camera whereby the photographs are being captured in digital memory. An analogue camera refers to the traditional camera that typically sends video over cable.
The advantages of digital cameras over analogue cameras include:
1. Massive Storage Space:
There is a large storage space for photos and thus helps to prevent limitations to film. There are memory cards that can store several images.
2. Multiple functions:
The digital camera performs several functions like face detection, night and motion detection This makes capturing of images more fun and brings about better images.
3. Video Camera:
Digital cameras can also capture moving pictures while analog camera typically captures images that are still. Digital camera is vital as it can be used for live streaming.
4. Smaller and Lighter:
Digital cameras are usually smaller and lighter which makes them more portable and easy to carry about.
Write a SELECT statement that displays each product purchased, the category of the product, the number of each product purchased, the maximum discount of each product, and the total price from all orders of the item for each product purchased. Include a final row that gives the same information over all products (a single row that provides cumulative information from all your rows). For the Maximum Discount and Order Total columns, round the values so that they only have two decimal spaces. Your result
Answer:
y6ou dont have mind
Explanation:
Which technologies combine to make data a critical organizational asset?
Answer: Is in the image I attached below of my explanation. Hope it helps! Have a wonderful day! <3
Explanation: Brainliest is appreciated, I need 2 more for my next last rank please!
1 There are several applications to assist you to surf through the internet, mention
three (3 marks)
Assume a manufacturing company which manufactures and sells several electronic
products. This company has a list of suppliers who supply various components for
different products. Several components assembled together form a product. A product
will be manufactured in many work centers. Each product contains several components.
A product has at least one component and may comprise of several components. A
component must belong to a product and the same component can be used in multiple
products. Also mention the quantity of the component which a product requires.
Company has a list of suppliers who supply various components. A supplier may not
be supplying any component and may supply several components. A component must
be supplied by at least one supplier or several suppliers may provide the same
component. A supplier supplies the quantity and unit price of the products. A supplier
also supplies the quantity and unit price of the components. Each product will be
manufactured in single or multiple work centers. A work center may not produce a
product and may produce several products. Each work center will have one or more
employees and an employee would be working in single work center only. A customer
may not place any order and may place multiple orders. But an order will belong to a
specific customer only. Each order may contain single product or multiple products and
the same product may be demanded in many orders.
Construct an ER diagram for the manufacturing company.
Answer:
reboot it
Explanation:
What is the command to launch each of the following tools? Local Group Policy Local Security Policy Computer Management console Local Users and Groups console Resultant Set of Policy (RSoP)
Answer:
The command for
Local Group Policy is GPedit.msc
Local Security Policy is SecPol.msc
Computer Management console is Compmgmt.msc
Local Users and Groups console is Lusrmgr.msc
Resultant Set of Policy is RSOP.msc
Explanation:
The command for
Local Group Policy is GPedit.msc
Local Security Policy is SecPol.msc
Computer Management console is Compmgmt.msc
Local Users and Groups console is Lusrmgr.msc
Resultant Set of Policy is RSOP.msc
SHORT ANSWERS:
Q.1 List some causes of poor software quality?
Q.2 List and explain the types of software testing?
Q.3 List the steps to identify the highest priority actions?
Q.4. Explain the importance of software quality?
Answer:
Hard drive Microsoft have the highest priority actions
Consider the following code snippet:
public static void print(E[] a)
{
for (int i = 0; i < a.length; i++)
{
System.out.println(a[i] + " ");
}
}
int[] a = {3,6,5,7,8,9,2,3};
print(makeArray(a));
Assume that the method call to print(makeArray(a)) works correctly by printing the int array a. Which of the following headers for the makeArray method will make this possible?
I public static Integer[] makeArray(int[] a)
II public static E[] makeArray(int[] a)
III public static Integer[] makeArray(E[] a)
I and III only
I only
I and II only
II and III only
What does it mean when the syntax ? extends D is used?
Any subclass of D may be used.
Any superclass of D may be used.
Any subclass or superclass of D may be used.
This indicates a wildcard with an upper bound.
Consider the following code snippet that declares the GraduateStudent class:
public GraduateStudent extends Student { . . .}
Which of these statements are false?
a. I GraduateStudent is a subclass of Student
b. II Stack is a subclass of Stack
c. III Stack is a subclass of Stack
d. II only
e. III only
f. II and III only
g. I only
Answer:
Explanation:
1) I and II only ... This is because the makeArray parameter must be an int[] since that is what the a array that is being passed actually is. The return type should be E[] only but since that is not an option, it could work with Integer[] if the E class allows.
2) Any superclass of D may be used. Although this is not complete, extends allows for a subclass to access any variables and methods within the superclass D but not directly access another superclass of D.
3) I only ... GraduateStudent is a subclass of Student
Reusing existing software to create a new software system or product can be a cost-efficient approach to development in many software projects. It may not be cost-efficient in all projects. As a software engineer, you can determine if it is the best approach for your project only if you know, and can estimate, the associated costs. Which of the following costs is NOT one of the costs typically considered when estimating the cost of reuse?
A. The purchase or license cost of COTS software, where applicable
B. Modification and/or configuration costs associated with making reusable software meet system requirements
C. The cost associated with finding analyzing, and assessing software for reuse
D. Legal costs associated with defending against charges of copyright infringement
E. Integration costs associated with mixing reusable software and other software (either new or reused)
Answer:
D. Legal costs associated with defending against charges of copyright infringement
Explanation:
When estimating the cost of reusing software you are planning to obtain the necessary licences that are required for your project which will prevent copyright infringement claims from taking place.
Which of the follwing are examples of meta-reasoning?
A. She has been gone long so she must have gone far.
B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.
C. I am getting tired so I am probably not thinking clearly.
D. I am getting tired so I will probably take a nap.
Answer: B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.
C. I am getting tired so I am probably not thinking clearly
Explanation:
Meta-Reasoning simply refers to the processes which monitor how our reasoning progresses and our problem-solving activities and the time and the effort dedicated to such activities are regulated.
From the options given, the examples of meta reasoning are:
B. Since I usually make the wrong decision and the last two decisions I made were correct, I will reverse my next decision.
C. I am getting tired so I am probably not thinking clearly
What is the difference between an information system and a computer application?
Answer:
An information system is a set of interrelated computer components that collects, processes, stores and provides output of the information for business purposes
A computer application is a computer software program that executes on a computer device to carry out a specific function or set of related functions.
Consider the following recursive method.
public static String doSomething(String str)
{
if (str.length() < 1)
{
return "";
}
else
{
return str.substring(0, 1) + doSomething(str.substring(1));
}
}
Which of the following best describes the result of the call doSomething(myString) ?
A
The method call returns a String containing the contents of myString unchanged.
B
The method call returns a String containing the contents of myString with the order of the characters reversed from their order in myString.
C
The method call returns a String containing all but the first character of myString.
D
The method call returns a String containing only the first and second characters of myString.
E
The method call returns a String containing only the first and last characters of myString.
Answer:
A
The method call returns a String containing the contents of myString unchanged.
Explanation:
Create a recursive procedure named (accumulator oddsum next). The procedure will return the sum of the odd numbers entered from the keyboard. The procedure will read a sequence of numbers from the keyboard, where parameter oddsum will keep track of the sum from the odd numbers entered so far and parameter next will (read) the next number from the keyboard.
Answer:
Explanation:
The following procedure is written in Python. It takes the next argument, checks if it is an odd number and if so it adds it to oddsum. Then it asks the user for a new number from the keyboard and calls the accumulator procedure/function again using that number. If any even number is passed the function terminates and returns the value of oddsum.
def accumulator(next, oddsum = 0):
if (next % 2) != 0:
oddsum += next
newNext = int(input("Enter new number: "))
return accumulator(newNext, oddsum)
else:
return oddsum
Briefly explain how Riboflavin deficiency lead to disease state.
Answer:
Severe riboflavin deficiency can impair the metabolism of other nutrients, especially other B vitamins, through diminished levels of flavin coenzymes [3]. Anemia and cataracts can develop if riboflavin deficiency is severe and prolonged [1]. The earlier changes associated with riboflavin deficiency are easily reversed.
Use the drop-down menus to describe how to add a data bar to a report.
1. Open the table in view.
2. Click the column of the desired numerical field.
3. Click the conditional tab Format, then .
4. In the Rules Manager dialog box, click .
5. Select to “compare to other records,” and determine whether you want the value and bar to show at the same time.
6. Adjust the desired length of the bar and the color. Click OK.
7. Once satisfied with your rule, click and then OK.
Answer:
1. layout
3. conditional formatting
4. new rule
7. apply
Explanation:
just did it on edge
Write the Java classes for the following classes. Make sure each includes 1. instance variables 2. constructor 3. copy constructor Submit a PDF with the code The classes are as follows: Character has-a name : String has-a health : integer has-a (Many) weapons : ArrayList has-a parent : Character has-a level : Level (this should not be a deep copy) Level has-a name : String has-a levelNumber : int has-a previousLevel : Level has-a nextLevel : Level Weapon has-a name : String has-a strength : double Monster is-a Character has-a angryness : double has-a weakness : Weakness Weakness has-a name : String has-a description: String has-a amount : int
Answer:
Explanation:
The following code is written in Java. It is attached as a PDF as requested and contains all of the classes, with the instance variables as described. Each variable has a setter/getter method and each class has a constructor. The image attached is a glimpse of the code.