Answer:
Following are the code to this question:
//import package
import java.util.*;
import java.text.*;
public class Main//defining a class
{
static final int t = 50;//defining an integer constant variable
static int[] ele = new int[t];//defining an array
static int tS = 0;//defining integer variable
static void initelements()//defining a static method
{
Random r= new Random();//creating Random class Object
for (int i = 0; i < t; i++)//use loop to add value in array
ele[i] = Math.abs(r.nextInt()) % 100;//add value in array
}
static public boolean isSorted()//defining a method isSorted
{
boolean x = true;//defining boolean variable
for (int i = 0; i < (t - 1); i++)//use for loop to count array values
if (ele[i] > ele[i + 1])//use if to compare array values
x = false;//use boolean variable to hold false value
return x;//return boolean value
}
static public void swap(int x1, int x2)//defining swap method
{
tS++;//increment variable value by 1
//performing swapping
int te = ele[x1];//defining te variable that holds array values
ele[x1] = ele[x2];//exchanging array values
ele[x2] = te;//holding te values
}
static public void disp()//defining a method disp
{
int v1;
DecimalFormat f = new DecimalFormat("00");//creating DecimalFormat class Object
System.out.println("The elements array is:");//print message
for (int i = 0; i <t; i++)//defining for loop
{
v1 = ele[i];//holding array value in v1 variable
if (((i + 1) % 10) == 0)//use if to check i value
System.out.println(f.format(v1));//print value
else//else block
System.out.print(f.format(v1) + " ");//print value
}
System.out.println();//print space
}
static int getMinimum(int st, int en)//defining a method getMinimum
{
int iMi = st;//defining variable that holds parameter value
for (int i = st + 1; i <= en; i++)//use for loop compare array value
if (ele[i] < ele[iMi])//compare array value
iMi = i;//use iMi to hold loop value
return iMi;//return iMi value
}
static void selectionSort()//defining a selectionSort method
{
int e = t - 1;//defining e variable that holds total array count value
for (int i = 0; i < e; i++)//use for loop to call swap method
swap(i, getMinimum(i, e));//calling the swap method
}
public static void main(String[] args)//defining main method
{
initelements();//calling initelements method
disp();//calling disp method
System.out.println("elements is sorted: " + isSorted());//calling is isSorted method with the message
System.out.println();//for space
selectionSort();//calling selectionSort method
System.out.println("No of swaps :" + tS);//print totalswap value with the message
disp();//calling disp method
System.out.println("elements is sorted: " + isSorted());//calling is isSorted method with the message
System.out.println();//for space
}
}
Output:
Please find the attached file.
Explanation:
In this code inside the Main class, 5 static methods "initelements, isSorted, swap, disp, getMinimum and selectionSort" is declared, in which the first method holds random values in arrays, in second array it sorts its values, in the third method it swap the array, in the disp method it shows array values.
In the "getMinimum and selectionSort" it sorts array values and inside the main method, it calls all methods and prints their values.
When do you need to apply for a federal student loan?
Answer:
Explanation:
In order to apply for federal student loans, you must fill out your FAFSA during a specific time. The federal deadline for completing your FAFSA is generally very forgiving — meaning that it comes very late in the school year.
Compare the OSI Application Layer with the TCP/IP Application Layer. Which statement is true? Both application layers are relevant mainly to programmers, not to network technicians. The OSI application layer involves more things than does the TCP/IP application layer. They are the same layer, only they are viewed through different conventions. The TCP/IP application layer is for the user; it is not important to programmers or network technicians.
Answer:
They are the same layer, only they are viewed through different conventions.
Explanation:
OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Each layer has its unique functionality which is responsible for the proper functioning of the communication services.
On the other hand, the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer comprises of four (4) main layers and these includes;
I. Application layer.
II. Transport layer.
III. Internet layer.
IV. Network layer.
This ultimately implies that, the Open Systems Interconnection (OSI) Application Layer and the Transmission Control Protocol and Internet Protocol (TCP/IP) Application Layer are the same layer, only they are made up of different number of layers and as such are viewed through different conventions.
Answer:
c
Explanation:
Low-level programming languages are (5 points)
a
closer to human languages
Ob
less readable by humans
O
C
more readable by humans
Od
written in human languages
Answer:
Low-level programming languages are essentially written as the computer interprets them (examples would be assembly and machine language), so the answer is B.
Explanation:
When did computer networking go beyond the walls of the firm?
Answer:
All kinds of computing devices such as tablets, PCs, or laptops feature a brain-like unit called the central processing unit or CPU. Your computer's CPU calculates and interprets instructions while you're surfing the web, creating documents, playing games, or running software programs.
Explanation:
Each contestant auditioned her singing voice for the pageant. Participle: Word it Modifies:
Answer:
participle is singing
word it modifies is voice
Hardware failure, power outages, and DOS attacks will affect:
data confidentiality.
data integrity.
data verification.
data availability.
Answer:
The answer should be data availability
PLZZZ HELP
Escaping Literal Quotes in Strings (JavaScript)
first pic is instructions
second pic is the code I have
Also, please provide feedback on the code I have.
WILL GIVE BRAINLIEST'
WILL REPORT ALL SCAMS
Answer:
If you just want to escape string literals, here are the ways to do it. There are at least three ways to create a string literal in Javascript - using single quotes, double quotes, or the backtick (). So, if you enclose your string in single quotes, no need to escape double quotes and vis versa.
Explanation:
Columns are identified by numbers (1,2,3,4,5....) and Rows are identified by letters (A,B,C,D,E.....) True False
Which language paradigm interacts well with database systems in business environments that use SQL?
A) logic-based
B) fourth-generation
C) data-oriented
D) aspect-oriented
Write a Python code to take input of age of three people by user and determine youngest people among them
Answer:
# Take Ages
person1 = eval(input("Enter age of person 1 : "))
person2 = eval(input("Enter age of person 2 : "))
person3 = eval(input("Enter age of person 3 : "))
# check youngest
if person1 < person2 and person1 < person3:
print("Person 1 is youngest")
elif person2 < person1 and person2 < person3:
print("Person 2 is youngest")
elif person3 < person1 and person3 < person2:
print("Person 3 is youngest")
Posts that you delete _____.
cannot ever be shared
will be released in five years
are still visible to others
may already have been shared
Answer: Below
Explanation:
What is Polymorphism in programming? Explain in your own words with examples.
Answer:
A computer program which can change on it's own, such as a polymorphic virus that is harder to detect. It can change it's own code to achieve the same goal but have a different structure.
Explanation:
Answer:
Polymorphism is a feature of object-oriented
programming languages that allows a specific routine to use variables of different types at different times. Polymorphism is the ability of a programming language to present the same interface for several different underlying data types.
Explanation:
hope it helps
One of the distinguishing characteristics of computer-based fraud is that access occurs ________________________. A. Through the Dark Web where the value of the stolen funds can be stored on hidden servers B. In violation of computer internal controls whether by management override or other means C. With the intent to execute a fraudulent scheme or financial criminal act D. When a hacker or virus successfully bypasses the firewall protecting financial data
Answer:
Option A, Through the Dark Web where the value of the stolen funds can be stored on hidden servers
Explanation:
Content that is available on dark web can not be detected by search engines specially through the traditional browsers or standard browsing technology. Along with that it has tens of thousands of sites and at a time only certain limited number of sites are available.
Money related frauds are basically driven by this dark web. Criminal enterprises determine personal details through various means and hence can derive your credentials and financial details. The criminal portions of the dark web makes trade in fraudulent information easy and accessible
Hence, option A is correct
BE CAREFUL OF SCAM LINKS HERE
check attached bcuz brainly freak block this
also i love u grammarly
Answer:
I know what the scam links look like and to be careful. Thanks for warning us though. Have a awesome day!
Explanation:
Answer:
have u watched euphoria
Explanation:
lol
List two examples of following types of communication
Answer:
Explanation:
sign language is communication
touch is communication
Multitasking systems _____.
are easier to develop than single programming systems
execute each job faster
execute more jobs at the same time
are used only in large mainframe computers
Answer: Multitasking systems execute more jobs at the same time, hence the name multitasking systems.
When comparison shopping, all of these hint at a good deal EXCEPT_____________________.
Answer:
lower-priced models offer more features
Explanation:
Fill in the blank!!!!!!!!!!!!!!!!!!!! ASAP!! Please!!!
Recent improvements in __________ have increased the pace of globalization.
so I believe that the word you are looking for is technology
Hope this helps
-scav
Two parter:
A.) What is wrong with the program segment below? The program does not contain syntax errors.
B.) Fix the programming error(s)
num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
Answer:
the variable num is not declared so the compiler doesn't define it.
add int before num:
int num = 1;
while (num < 9)
{
cout << num;
num = num - 1;
}
now the code will run but it won't stop as it will never break the condition (num < 9).
Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.
security
what time of day you are online
protection of sensitive information
from which location you are accessing the site
Answer:
protection of sensitive information
Explanation:
Answer:
a c baka baddies
Explanation:
Briefly explain the main difference between how to connect a new office computer in the SHSS office to the internet and how to connect a standalone computer in your house to the internet
Answer:
Once you've set up your computer, you may want to purchase home Internet access, up a home wireless network, commonly known as Wi-Fi, so you can connect multiple. Now that you know about the different types of Internet service, you can do. The primary piece of hardware you need is a modem.
A restaurant is interested in learning about the food preferences of people living nearby to the restaurant and intends to use survey data to help decide which new items to add to the menu. Which of the following is LEAST likely to be part of the process used to analyze the data?
a. Cleaning a data visualization to remove unwanted patterns.
b. Iteratively creating visualizations to ask and answer new questions.
c. Cleaning data to remove inconsistencies.
d. Filtering the data to look at the responses from only certain groups.
Answer:
answer is d
Explanation:
i got it right in code.org
Answer:
A. Cleaning a data visualization to remove unwanted patterns.
Explanation:
While cleaning data in its raw format can be an important part of the Data Analysis Process, the visualizations are not cleaned and/or altered but rather they are interpreted to discover what patterns exist in the data.
*If one is in search of a pattern, why would one clean or alter the pattern they have been provided, self-sabotage.*
Betty set up an account on a popular social networking website. She wants to know whether the privacy policy is effective for her account. Which information should she look for in this document?
the info needed to log in
-This would show what is protected in the privacy policy and its related to you since it would show personal data.
-A good Privacy Policy depends on understanding these matters - showing that this is not an agreement to take for granted.
High-level programming languages are (5 points)
O a
closer to human languages
Ob
less time consuming to run
ос
much more in control over the hardware
Od
similar to native machine code
A radio and communications security repairer is responsible for both radio and satellite communication systems.
True
False
Answer:
The answer is true
Explanation:
I got it correct on the quiz
You are part of a testing team at a software business. Your job is to see how many concurrent users the system can host and how many database transactions the system can handle without a noticeable drop in performance. You are doing _____ testing. a. acceptance testing b. volume testing c. system testing d. integration testing
Answer:
The right approach is Option b (volume testing).
Explanation:
A non-functional trial that has been conducted throughout a results evaluation where even a large amount of information becomes accessible to something like the program, would be determined as Volume testing.The application functionality has been analyzed by determining the maximum volume throughout the database.Other options are not related to the given query. So the above is the right response.
You manage Windows desktops for your organization. You recently updated all of your workstations to Windows 10. Your organization relies on a particular application, which worked correctly on Windows 7, but now does not run in Windows 10. You have checked the application vendor's website, but they do not provide a Windows 10 update. What are your options for running the application
Answer:
The options for running a Windows 7 application on Windows 10 are;
1) Run the compatibility troubleshooter
2) Reinstall the app
Explanation:
The most recent version of Windows 10 supports the majority of applications made for versions of Windows before Windows 10, however, in the event that an application does not run on Windows 10 the options available for running the application are;
1) Run the compatibility troubleshooter as follows;
a) Type the application's name in the tax bar search box
b) In the menu showing the application that comes up, right click on the application's name and select the "Open file location option" from among the options menu
c) In the file location, locate and right click the program file which is the .EXE file and select "Properties" from the options menu. In the Properties dialogue box, select the "Compatibility mode"
d) In the "Compatibility mode" tab, select "Run compatibility troubleshooter"
2) Reinstall the app
a) With the app not yet installed on Windows, in the setup files location of the application, right-click the setup .MSI or .EXE application file
b) In the options menu select "Properties" and then the "Compatibility" tab in the "Properties" dialog box
c) On the Compatibility tab select the "Run this program in compatibility mode for" checkbox and select Windows 7 as your desired Windows
d) Click Ok.
bakit mahalaga ang pagtutugma ng iyong mga personal na salik sa minimithing karera
Answer:
Hi not able to understand your language
write a program. in QBAsSIC
a to find product of two numbers
b to calculate sum of two numbers
c to calculate difference between two numbers
computer q qubasic can anybody help me plz
Answer:
The program is as follows:
5 INPUT A,B
6 PROD = A * B
7 PRINT PROD
8 TOTAL = A + B
9 PRINT TOTAL
10 DIFF = A - B
11 PRINT DIFF
12 END
Explanation:
This gets input for the two numbers
5 INPUT A,B
This calculates the product
6 PROD = A * B
This prints the calculated product
7 PRINT PROD
This calculates the sum
8 TOTAL = A + B
This prints the calculated sum
9 PRINT TOTAL
This calculates the difference
10 DIFF = A - B
This prints the calculated difference
11 PRINT DIFF
This ends the program
12 END
True or False? Apprenticeships have been used for thousands of years to pass knowledge on to a succeeding generation.
Answer:
true
Explanation:
true true true true true