The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.
The 4 functions of Information Security:It protects the organisation's ability to function.It enables the safe operation of applications implemented on the organisation's IT systems.It protects the data the organisation collects and uses.It safeguards the technology the organisation uses.
What are progression mechanics? Why are they important for games?
The phrase "progression mechanics" in game design refers to video game mechanics where the creator establishes a path of action that a player must follow to advance in the game. The checkpoints that a character must achieve to move on to the next level are crucial to the progression of gameplay. The checkpoints change depending on the type of game. A few standard checkpoints are:
In action, adventure, and role-playing games, defeating the level boss (RPGs)achieving the third place on a certain track in racing gamescompleting a set of puzzles in a game of puzzlestaking down the enemy's base of operations in real-time strategy gamesMost video games are developed using a progression gameplay concept. Designers like progression gaming because it enables them to build a compelling narrative around the game's action. Every game aims to be both engaging and enjoyable to play. Proponents of progression gameplay point out that because game creators are aware of the direction their creation will go in, they can create a far richer and more complex narrative around that direction.
On the other hand, proponents of emergent gameplay prefer games where player random acts have an unlimited number of potential results rather than a finite set of predetermined outcomes that are mapped out by designers. Of course, there is a lot of room for compromise between the two methods. Both emergent gameplay and progression are features found in many games.
Read more about game mechanics here:
https://brainly.com/question/24010467
4. Answer the following. a. Write the steps to create new presentation from Blank Presentation. How
Create new presentation from a Blank Presentation using PowerPoint by following these steps:
Launch PowerPoint.Select New from the left pane.Select an option:
Choose Blank Presentation to start from scratch when creating a presentation.Choose one of the templates to use a ready-made design.To see PowerPoint tips, click Take a Tour, and then click Create.With PowerPoint on your PC or on any device, you can:
Make a presentation from scratch or from a template.Text, images, art, and videos can all be added.Using PowerPoint Designer, choose a professional design.Include transitions, animations, and movement.Save your presentations to OneDrive so you can access them from your computer, tablet, or phone.Share and collaborate with others, no matter where they are.To learn more about powerpoint presentations, visit: https://brainly.com/question/23714390
#SPJ9
GAME DESIGN
If you are designing a video game that will primarily be played on a smartphone or tablet, what considerations about the operation or control methods should you keep in mind?
If you are designing a video game that will primarily be played on a smartphone or tablet, the considerations about the operation or control methods that you should keep in mind are:
The Orientation of the device; The processing power of the device; andThe size of the device in relation to the spacing of the controlls.What are video games?As a result, there is a growing need for mobile app development services and mobile app development companies. As a result of this demand, various smartphone app development businesses promise to provide excellent services.
Regardless of phone manufacturer improvements, there are still uses for the game design process, such as:
Feature Creep IssueNot Targeting the Correct AudienceGetting the Game NoticedManaging Security ConcernsOperating System Fragmentation.Creating the Monetization ModelUpkeep.Learn more about video games:
https://brainly.com/question/28060919
#SPJ1
What is variable view?
Answer:
Variable View contains descriptions of the attributes of each variable in the data file. In Variable View, rows are variables. Columns are variable attributes.
Explanation:
Data View is where we inspect our actual data and. Variable View is where we see additional information about our data.
4.what the economic and ideological causes of the American, the French, and the Chinese Revolutions, and to see the larger historical contexts in which these events took place?
The economic and ideological causes of the American, French, and Chinese revolutions were the imposition of taxes, poor economic policies, and increasing imperialist demand, respectively.
The economic and ideological causes behind the American revolution:
The imposition of taxes on the colonies, which they refused to pay. The primary goal of levying a tax was to recoup the debt incurred by the colonists as a result of the war. The corrupt ideology drove this revolution.
The French revolutions' economic and ideological causes:
Poor economic policies that resulted in bankruptcies and the extravagant spending of France's royals resulted in the imposition of high taxes on the people. The Enlightenment, influenced by the British political system, was the ideological cause.
The economic and ideological causes of the Chinese revolution:
The major reasons for the revolution were increasing imperialist demand from the West and Japan, as well as the desire to see a unified China.
To know more about the American Revolution, visit: https://brainly.com/question/18317211
#SPJ1
Which of the following is not used as an Internet security indicator?
A) shield icon
B) handshake icon
C) lock symbol
D) heart symbol
Internet security is not indicated by the shield icon.
What does "Internet security" mean?A key element of cybersecurity is online security, which includes controlling risks and dangers posed by the Internet, online browsers, web apps, websites, and networks. Protecting consumers & corporate IT assets against online threats is the main objective of Online security systems.
What are the many methods of Internet security?Access control, antivirus, security testing, network analytics, various forms of network-related safety (endpoint, online, wireless), firewalls, VPN encryption, and more are all included in network security.
To know more about Internet security visit:
https://brainly.com/question/27730901
#SPJ4
Answer:
it is A.
Explanation:
Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.
Sample Run
What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop
Sample Output
What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop
Answer:
#include <iostream>
using namespace std;
int main() {
/*
What pet do you have? lemur
parrot
What pet do you have? cat
What pet do you have? stop
*/
string pet;
int num=1;
while (pet!="stop"){
cin>>pet;
cout<<"What pet do you have?";
if (pet!="stop"){
cout<<"you have one "<< pet<<" total numof # is "<<num++<<endl;
}
else{
cout<<"stop";
}
}
}
Explanation:
you did not specify the language so i went with c++
i used while loop which will keep asking the user for an input until he/she write stop in order to break the loop
first i declared the data type of the input
used it as a conditionin the while loop
then printed the input everytime the loop runs
Consider this program on the picture attached:
(a) In what programming language is this program implemented?
(b) Why is this program correct? In other words, how does it work?
(c) In what way is the program poorly designed?
Answer:
a) Javascript
b) The program works because it iterates through an array and logs each array element into the console
c) It is poorly designed because depending on the array element value, the program will have to wait that many milliseconds before it logs and move on to the next element. This isn't good because the program may take a long time to execute if the array contains elements with large values.
What effect do coworkers have on the socialization of new employees?
O a
Coworkers potentially do all of these things.
Ob
Coworkers provide valuable support and information to newcomers.
Oc
Od
Coworkers have no benefit to the socialization process and should be separated from newcomers as much as possible.
By welcoming the newcomer to the team, coworkers tend to offer more job-related information to the newcomer.
Through social interaction, coworkers reduce the newcomer's stress during socialization.
Oe
Through social interaction, coworkers reduce the newcomer's stress during socialization. Thus option E is the correct answer.
What is socialization?
Socialization generally refers to the process of social influence through which a person acquires the culture or subculture of their group, and in the course of acquiring these cultural elements, the individual's self and personality are shaped.
Why is socialization important?
Socializing not only staves off feelings of loneliness, but also helps sharpen memory and cognitive skills increases your sense of happiness and well-being, and may even help you live longer.
How will you socialize new employees in your organization?
You can help socialize employees by encouraging after-work gatherings.
Thus, option E is the correct option.
To know more about socialization:
https://brainly.com/question/10455747
#SPJ1
1. Write down a brief history about the internet.
Answer:
The Internet was developed by Bob Kahn and Vint Cerf in the 1970s. They began the design of what we today know as the 'internet. ' It was the result of another research experiment which was called ARPANET, which stands for Advanced Research Projects Agency Network.
Explanation:
with aid of two examples, describe the use of merging of docments
Answer:
Answer down belowExplanation:
Q's Asked: With the aid of two examples, describe the use of merging of documents.
------------------------------------------------------------------------------------------------------------
Explanation of "merging documents":
What is the use of merging of documents?
Well merging documents is really only used for organization or systems where documents/ data are changed by different users or systems.
Anyway The requirements for "mail merging" is :
(a) Main Document,
(b) Data Source,
(c) Merge Document.
: Meaning of A horizontal merger: A horizontal merger is when competing companies merge—companies that sell the same products or services.
: Meaning of A vertical merger: A vertical merger is a merger of companies with different products. :3
Welp anyway back to the Q's: With the aid of two examples, describe the use of merging of documents.Umm some people that use "merging of documents", are horizontal mergers which increase market share, such as Umm... T-moblie and sprit bc they are both a phone company. vertical mergers which exploit existing synergies. So like ummm.... a sports drink company and a car company combining together. hope this helps ~~Wdfads~~~
Looking for similarities between concepts or problems is referred to as
an algorithm
Odecomposition
pattern recognition
abstraction
Pattern recognition is used for similarities between concepts or problems in an algorithm.
What is meant by pattern recognition?
Pattern recognition is a data analysis method that uses machine learning algorithms to automatically recognize patterns and regularities in data. This data can be anything from text and images to sounds or other definable qualities. Pattern recognition systems can recognize familiar patterns quickly and accurately.
An example of pattern recognition is classification, which attempts to assign each input value to one of a given set of classes (for example, determine whether a given email is "spam" or "non-spam").
Therefore, Pattern recognition is used.
To know more about Pattern recognition from the given link
https://brainly.com/question/28427592
#SPJ1
Devision of floating binary
(100.0001)÷(10.1)
1.101 is the correct answer for floating-point binary (100.0001)÷(10.1).
The sign of a binary floating-point number is represented by a single bit. A 1 bit indicates a negative number, and a 0 bit indicates a positive number.
What is Binary Number System?
One of the four types of number systems is a binary number system. Binary numbers are represented in computer applications by only two symbols or digits, namely 0 (zero) and 1 (one). The binary numbers in this example are written in the base-2 numeral system. [tex]101_{2}[/tex] is an example of a binary number. In this system, each digit is referred to as a bit.
A binary number is defined in digital electronics and mathematics as a number expressed in the binary system or base 2 numeral system. It denotes numerical values with two distinct symbols: 1 (one) and 0. (zero). The positional notation with 2 as a radix is the base-2 system.
Because of its direct implementation in electronic circuits using logic gates, the binary system is used internally by almost all modern computers and computer-based devices. Every digit is known as a bit.
To know more about Binary Number, visit: https://brainly.com/question/8649831
#SPJ1
Memory Management - Page fault and Page Thrashing
i) What is page fault?
ii) Describe the steps that take place after a page fault. Include both the actions taken within the handler and those that are taken in hardware before the handler is initiated. How segment defects might be found and treated should be mentioned in your response. Including diagrams may make it easier for you.
iii) What is page thrashing and how might it be avoided?
1) A page fault is an exception raised by the memory management unit when a process accesses a memory page without making the necessary preparations. To access the page, a mapping must be added to the process's virtual address space.
2) Once the virtual address that produced the page fault is determined, the system verifies that the address is genuine and that there is no protection access problem. If the virtual address is legitimate, the system determines if a page frame is available. If no frames are available, the page replacement procedure is used to delete a page.
3) Thrashing occurs when the page fault and switching occur at a higher frequency, requiring the operating system to spend more time exchanging these pages. This is referred to as thrashing in the operating system. The CPU utilization will be lowered or nonexistent as a result of thrashing.
Eliminating one or more running programs is a temporary remedy for thrashing. Adding extra RAM to the main memory is one of the recommended strategies to minimize thrashing. Another option for dealing with thrashing is to increase the size of the swap file.
What is Memory Management?Memory management is a type of resource management that is used to manage computer memory. Memory management must include mechanisms for dynamically allocating parts of memory to programs at their request and freeing it for reuse when no longer required.
Management is the method of regulating and coordinating computer memory by allocating parts known as blocks to various operating applications in order to maximize system performance. The primary memory management function of an operating system is the most critical.
Learn more about Page Faults:
https://brainly.com/question/28557805
#SPJ1
What is output by the following code?
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)
It is to be noted that the output of the code given above is Sum = 35.
What is Sum in programming?The sum() method sums all of the elements in an iterable and returns the total.
sum = sum + inputValue; can be substituted with sum += inputValue; This sentence can be interpreted as "Add up inputValue to total." or "Increase sum by inputValue."
With regard to the above code, when a complier runs this:
c = 1
sum = 0
while (c < 10):
c = c + 2
sum = sum + c
print (sum)
Output: 35
The output is 35.
Learn more about codes:
https://brainly.com/question/13013054
#SPJ1
Which is true about a gas? Choose the correct answer. Responses It changes to a liquid when it heats up. It changes to a liquid when it heats up. It takes up a definite amount of space. It takes up a definite amount of space. It takes up a definite amount of space but does not have a definite shape. It takes up a definite amount of space but does not have a definite shape. It does not take up a definite amount of space and does not have a definite shape. It does not take up a definite amount of space and does not have a definite shape.
A gas does not take up a definite amount of space and does not have a definite shape.
What are the properties of a gas?
There are four basic states of matter, with gas being one of them. A pure gas can be composed of single atoms, elemental molecules derived from a single type of atom, or complex molecules derived from a combination of atoms. There are many different pure gases in a gas mixture like air.
Three characteristics distinguish gas from liquids or solids they come from:
(1) they are easily compressed,
(2) they expand to fill their containers, and
(3) they take up a lot more area than solids or liquids.
To learn more about gas, use the link given
https://brainly.com/question/25649765
#SPJ9
Find advert in magazines or websites of working desktop computer systems or laptop as well as a monitor, keyboard and software you will also need additional devices such as mouse or printer. Reports outlines and explaining the details of the advertising
Because of our independence, you have complete control over your data. Your information is your information. Independent, open platform. MRC-accredited metrics Increase the effectiveness of advertising.
How do you write outlines for reports and explain the details of advertising?Analyze market position information for the product and explain how that position is expected to change. Make a list of suggestions to improve your next advertisement.
Typically, advertising campaigns promote a product or service. A national automaker, for example, may launch a new vehicle model through print advertisements in newspapers and magazines. To reach the vehicle's target market, the company may also place graphics-rich ads on websites. This combined media blitz produces more desirable results than isolated advertisements without a central strategy.
This automobile manufacturer, or any business selling a product or service, evaluates its campaign's effectiveness based on defined criteria. A written report provides an objective campaign analysis, highlights favorable results and identifies areas in which advertising strategy adjustments are appropriate.
To learn more about details of advertising refer to:https://brainly.com/question/1658517
#SPJ1
how does virtual memory different from main memory and secondary memory
A secondary memory device is comparable to a spinning magnetic disk or, in modern times, an SSD. Basically, it moves slowly (even an SSD is slow compared to the main memory). Data is stored there as files.
A software can fool itself into believing it has a collection of linear address blocks that it can use as ordinary memory by creating the illusion of virtual memory.
Except in cases where the total quantity of virtual memory needed by all running processes exceeds the physical memory attached to the computer, it has nothing to do with the idea of secondary storage. In that instance, relatively unoccupied pages will be transferred to secondary storage; nevertheless, this is more of a "side effect" of secondary storage's handy proximity and size compared to main memory.
Learn more about memory at:
https://brainly.com/question/13147674
Describe how smartphones communicate. List and describe four popular types of messages you can send with smartphones. Write one well-written paragraph and answer the above question to earn 10 points.
The way that smartphones communicate is that people connect with each other and with businesses has been changed by mobile messaging. However, users and businesses can choose from a variety of mobile messaging types.
The Kinds Of Mobile Messaging are:
SMS & MMS MessagingPush Notifications.In-App Messages.RCS.What is the messaging about?Brief Message Service (SMS): One of the most popular types of mobile communications is SMS. A basic text message sent via a cellular signal is known as an SMS, or short messaging service.
SMS is completely text-based and has a character restriction of 160. Users in the United States who don't have an unlimited messaging package pay cents per message.
Therefore, in Notifications through Push: It's possible that you mistakenly believe that the thing that's flashing on your cell phone's screen is a text message. Similar to SMS messages, push notifications are pop-up windows that appear while you're using your phone or on the lock screen rather than in your inbox with other texts.
Learn more about Mobile Messaging from
https://brainly.com/question/27534262
#SPJ1
Write a method that takes two String
parameters, returns the number of times the
second string appears in the first string.
This method must be named
substringCount () and have two String
parameters. This method must return an
integer
A method that takes two String parameters, returns the number of times the second string appears in the first string.
public static int substringCount(String s1, String s2)
{
int count = 0;
int i = 0;
while ((i = s1.indexOf(s2, i)) != -1)
{
count++;
i += s2.length();
}
return count;
}
What is string?
A string is typically a sequence of characters in computer programming, either as a literal constant or as some sort of variable. The latter can either be fixed or its elements and length can be changed (after creation). A string is typically implemented as just an array data structure of bytes (or words) that stores a sequence of elements, typically characters, using some character encoding. A string is generally thought of as a type of data. A string can also represent other sequence(or list) data types and structures, such as more general arrays. A variable declared to be a string may cause memory storage to be statically allocated for just a predetermined maximum length or utilise dynamic allocation to allow this to hold a variable number of elements, depending on this same programming language and specific data type used.
To learn more about string
https://brainly.com/question/28290531
#SPJ13
In reference to computers, what is a firewall?
A) letters, numbers, and special characters assigned to unlock accounts and websites
B) email attachments
C) an installed software element that protects and monitors incoming and outgoing data
D) a second copy of files saved to a cloud
Answer:
C) an installed software element that protects and monitors incoming and outgoing data
Explanation:
What is the method for combining permissions from different database objects?
Group of answer choices
1. database level
2. role
3. user
Database level is the method for combining permissions from different database objects.
What is database?The types of access given to particular secureables are called permissions. Permissions are given to SQL Server logins and server roles at the server level. They are assigned to database users and database roles at the database level.The three sorts of permissions that files and directories can have are read, write, and execute: A file's or directory's contents can be viewed by someone having read permission. The contents of a file can be changed by someone with write rights, including by adding, removing, or modifying file contents.The right or permission to access a named object in the recommended way, such a table access authorization. A specific user's connection to the database may be permitted by privileges.To learn more about database refer to:
https://brainly.com/question/518894
#SPJ1
Database level is the method for combining permissions from different database objects.
What is database?Permissions are the many sorts of access that are granted to specific secureables. At the server level, permissions are assigned to SQL Server logins and server roles. At the database level, they are assigned to database users and database roles.Read, write, and execute are the three types of permissions that files and directories can have. Anyone with read permission can view the contents of a file or directory. Anyone with write access can edit, add, or remove data from a file, among other file-related operations.the capability or authorization to make a recommended access to a named object, like a table access authorization. Privileges may allow a specific user's connection to the database.To learn more about database refer to:
brainly.com/question/518894
#SPJ1
Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
A sample expression that uses Boolean operators that prints "Special number" if special_num is -99, 0, or 44 is given below:
The Programimport java.util.Scanner;
import java.io.*;
public class Test
{
public static void main(String[]args) throws IOException
{
File file = new File("SNUMS.INP");
Scanner inputFile = new Scanner(file);
int order = 1;
int i = 1;
int[] special = new int[1000000+1];
// Write all 10^6 special numbers into an array named "special"
while (order <= 1000000)
{
if (specialNumber(i) == true)
{
special[order] = i;
order++;
}
i++;
}
// Write the result to file
PrintWriter outputFile = new PrintWriter("SNUMS.OUT");
outputFile.println(special[inputFile.nextInt()]);
while (inputFile.hasNext())
outputFile.println(special[inputFile.nextInt()]);
outputFile.close();
}
public static boolean specialNumber(int i)
{
// This method check whether the number is a special number
boolean specialNumber = false;
byte count=0;
long sum=0;
while (i != 0)
{
sum = sum + (i % 10);
count++;
i = i / 10;
}
if (sum % count == 0) return true;
else return false;
}
}
Read more about boolean operators here:
https://brainly.com/question/5029736
#SPJ1
Identification where Information Technology causes a hindrance to business processes
Identification where Information Technology causes a hindrance to business processes is one that is Lacking an IT Plan.
Why is planning for information technology so crucial?The organization's strategic goals and objectives may be achieved with the aid of this planning. The strategic IT plan should take into account how each of the organization's strategic business goals relates to technology as well as any modifications that will need to be made to the organization's information and communications infrastructure.
Note that So much so that a business will find it difficult to run efficiently without fully functional computers and access to emails and data. The consequences of data loss or corruption due to hardware failure, human mistake, hacking, or malware could be disastrous for any organization, it is a basic reality.
Learn more about Technology from
https://brainly.com/question/25110079
#SPJ1
(دانا
Physical appearance
OF Fith generation
computer
The physical appearance of the fifth-generation computers is VLSI architecture, parallel processing such as data flow control, and logic programming.
What are the generations of computers?The phrase “generation” refers to a shift in the technology that a computer is/was using. The term “generation” was initially used to describe different hardware advancements.
These days, a computer system's generation involves both hardware and software. 5 Fifth Generation: The period of the fifth generation: 1980-onwards. ULSI microprocessor based.
Thus, fifth-generation computers have knowledge based on a relational database and applied artificial intelligence and pattern processing.
To learn more about Fifth generation computers, refer to the link:
https://brainly.com/question/9354047
#SPJ1
which search algorithm uses three variables to mark positions within the array as it searches for the searchvalue?
A binary search algorithm that uses three variables to mark positions within the array as it searches for the searchvalue.
What is a binary search?In Computer technology, a binary search simply refers to an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(logn)
Note: n is the total number of elements in a list.
Additionally, keywords and search operators are important variables (elements) that have a significant effect on search results. Therefore, searchvalue is a binary search algorithm that is designed and developed to make use of three (3) variables to mark positions within an array as it perform a searche operation.
Read more on binary search here: https://brainly.com/question/17180912
#SPJ1
SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN
JAVA.
• Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
• Unless otherwise noted in the question, assume that parameters in method calls are not null and that methods are called only when their preconditions are satisfied.
• In writing solutions for each question, you may use any of the accessible methods that are listed in classes defined in that question. Writing significant amounts of code that can be replaced by a call to one of these methods will not receive full credit.
A manufacturer wants to keep track of the average of the ratings that have been submitted for an item using a running average. The algorithm for calculating a running average differs from the standard algorithm for calculating an average, as described in part (a).
A partial declaration of the RunningAverage class is shown below. You will write two methods of the RunningAverage class.
*
public class RunningAverage
{
}
/** The number of ratings included in the running average. private int count;
/** The average of the ratings that have been entered. */ private double average;
// There are no other instance variables.
/** Creates a RunningAverage object.
* Postcondition: count is initialized to 0 and average is
* initialized to 0.0.
*/
public RunningAverage()
{ /* implementation not shown */ }
/** Updates the running average to reflect the entry of a new
* rating, as described in part (a).
*/
public void updateAverage (double newVal)
{ /* to be implemented in part (a) */ }
/** Processes num new ratings by considering them for inclusion
* in the running average and updating the running average as
necessary. Returns an integer that represents the number of
*
* invalid ratings, as described in part (b).
* Precondition: num > 0
*/
public int processNewRatings (int num)
{ /* to be implemented in part (b) */ }
/** Returns a single numeric rating.
public double getNewRating()
{ /* implementation not shown */ }
(a) Write the method updateAverage, which updates the RunningAverage object to include a new rating. To update a running average, add the new rating to a calculated total, which is the number of ratings times the current running average. Divide the new total by the incremented count to obtain the new running
average.
For example, if there are 4 ratings with a current running average of 3.5, the calculated total is 4 times 3.5, or 14.0. When a fifth rating with a value of 6.0 is included, the new total becomes 20.0. The new running average is 20.0 divided by 5, or 4.0.
Complete method updateAverage.
/** Updates the running average to reflect the entry of a new
* rating, as described in part (a).
*/
public void updateAverage (double newVal)
(b) Write the processNewRatings method, which considers num new ratings for inclusion in the running average. A helper method, getNewRating, which returns a single rating, has been provided for you.
The running average must only be updated with ratings that are greater than or equal to zero. Ratings that are less than 0 are considered invalid and are not included in the running average.
The processNewRatings method returns the number of invalid ratings. See the table below for three examples of how calls to process NewRatings should work.
Statement
Ratings
processNewRatings
Generated
Return Value
processNewRatings (2)
2.5, 4.5
processNewRatings (1)
-2.0
1
0.0,
-2.2,
processNewRatings (4)
2
3.5, -1.5
Comments
Both new ratings are included
in the running average.
No new ratings are included in the running average.
Two new ratings (0.0 and 3.5) are included in the running
average.
Complete method processNewRatings. Assume that updateAverage works as specified, regardless of what you wrote in part (a). You must use getNewRating and updateAverage appropriately to receive full
credit.
/** Processes num new ratings by considering them for inclusion
* in the running average and updating the running average as
*
necessary. Returns an integer that represents the number of
* invalid ratings, as described in part (b).
* Precondition: num > 0
*/
public int processNewRatings (int num)
Explain the following :Union within structure union
Answer:
union with union structure
Explanation:
A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?
Since the user launches an application on an Android device, the option that is the cause of the issue is option (C) The application was not developed to react to changes to the gyroscope.
What is the gyroscope about?The majority of Android devices have sensors available. One of them rotates the screen appropriately is the gyroscope.
Because the software or application is not set up to rotate in accordance with the gyroscope when the user runs an application on the tablet, the screen does not rotate when the tablet is turned by the user.
Therefore, The gyroscope keeps functioning properly by monitoring the rate of turn around one specific axis. An real value is determined when the rotations around an aircraft's roll axis are measured up until the item stabilizes.
Learn more about application from
https://brainly.com/question/24264599
#SPJ1
See full question below
A user launches an application on an Android device. Once the software loads, the user reports that when turning the tablet to work the application in landscape mode, the software does not automatically adjust to landscape mode. Which of the following is the cause of the issue?
(A) The auto-adjust setting is not enabled in the operating system.
(B) The tablet is running low on power and disabled landscape mode.
(C) The application was not developed to react to changes to the gyroscope.
(D) The user did not switch the tablet to landscape mode.
(blank) affects the ability to query a database.
a. i/o performance
b. schema
c. Backup
Answer:
performance
Explanation: