Suppose you have a class called Child with an instance data value called weight and height. Then it has a method called doubleWeight that stores a local double variable called superWeight that multiplies the two instance variables and stores the value in superWeight, and this method returns a double value. Write a getter method and a setter method for weight, and then make them for height.

Answers

Answer 1

Answer:

Explanation:

The following code is written in Java. I recreated the entire Child class as described with the instance variables and the doubleWeight method. Then created the getter and setter methods for both the weight and height variables.

class Child {

   double weight, height;

   public double doubleWeight() {

       double superWeight = weight * height;

       return superWeight;

   }

   public double getWeight() {

       return weight;

   }

   public void setWeight(double weight) {

       this.weight = weight;

   }

   public double getHeight() {

       return height;

   }

   public void setHeight(double height) {

       this.height = height;

   }

}

Suppose You Have A Class Called Child With An Instance Data Value Called Weight And Height. Then It Has

Related Questions


Write the Flowchart to find Even number between 1 to 50

Answers

Answer:

See attachment for flowchart

Explanation:

Required

Flowchart to fine even from 1 to 50

The flowchart has been attached.

The rough algorithm (explanation) of the flowchart is as follows.

1. Start

2. Initialize num to 1

3. Check if num is less than or equal to 50

  3.1 If yes

      3.1.1 Check if num is even

      3.1.1.1 If yes

         3.1.1.2 Print num

  3.1.3 Increase num by 1

 3.2 If num is greater than 50

    3.2.1 Stop

4. Goto 3

a predecessor of a work processor is​

Answers

Answer: Printing of documents was initially accomplished using IBM Selectric typewriters modified for ASCII-character input. These were later replaced by application-specific daisy wheel printers, first developed by Diablo, which became a Xerox company, and later by Qume.

Explanation:

Draw a chart showing the crossing between red and white flowered pea plants till F2 generation. Find out the genotypic and phenotypic ratio of F2 generation. When the mating of black and white rats takes place, all the offspring produced in first generation are black. Why there are no white rats?

Answers

Answer:

part 1

F1 cross -

RR * rr

Rr, Rr, Rr, Rr

F2 Cross

Rr * Rr

RR, Rr, Rr, rr

Part 2

Black is dominant over white

Explanation:

Let the allele for red color trait be R and white color trait be r

Red is dominant over white

Genotype of true breeding parents

Red - RR

white - rr

F1 cross -

RR * rr

Rr, Rr, Rr, Rr

All the offspring are red and of genotype Rr

F2 Cross

Rr * Rr

RR, Rr, Rr, rr

RR: Rr: rr = 1:2:1

Phenotype ration

red (RR, Rr) : white (rr)

3:1

part 2

Black is dominant over white

hence, in first generation cross all mice become white

mips Write a program that asks the user for an integer between 0 and 100 that represents a number of cents. Convert that number of cents to the equivalent number of quarters, dimes, nickels, and pennies. Then output the maximum number of quarters that will fit the amount, then the maximum number of dimes that will fit into what then remains, and so on.

Answers

Answer:

Explanation:

The following program was written in Java. It creates a representation of every coin and then asks the user for a number of cents. Finally, it goes dividing and calculating the remainder of the cents with every coin and saving those values into the local variables of the coins. Once that is all calculated it prints out the number of each coin that make up the cents.

import java.util.Scanner;

class changeCentsProgram {

         // Initialize Value of Each Coin

   final static int QUARTERS = 25;

   final static int DIMES = 10;

   final static int NICKELS = 5;

   public static void main (String[] args) {

       int cents, numQuarters,numDimes, numNickels, centsLeft;

       // prompt the user for cents

       Scanner in = new Scanner(System.in);

       System.out.println("Enter total number of cents (positive integer): ");

       cents = in.nextInt();

       System.out.println();

       // calculate total amount of quarter, dimes, nickels, and pennies in the change

       centsLeft = cents;

       numQuarters = cents/QUARTERS;

       centsLeft = centsLeft % QUARTERS;

       numDimes = centsLeft/DIMES;

       centsLeft = centsLeft % DIMES;

       numNickels = centsLeft/NICKELS;

       centsLeft = centsLeft % NICKELS;

       // display final amount of each coin.

       System.out.print("For your total cents of " + cents);

       System.out.println(" you have:");

       System.out.println("Quarters: " + numQuarters);

       System.out.println("Dimes: " + numDimes);

       System.out.println("Nickels: " + numNickels);

       System.out.println("Pennies: " + centsLeft);

       System.out.println();

   }

}

You are on a team of developers writing a new teacher tool. The students names are stored in a 2D array called “seatingChart”. As part of the tool, a teacher can enter a list of names and the tool well return the number of students in the class found with names that matching provided list. For this problem you will be completing the ClassRoom class in the problem below. Your job is to complete the numberOfStudents found method. This method accepts an array of Strings that contain names and returns the quantity of students with those names. For example:
Assume that a ClassRoom object named “computerScience” has been constructed and the seating chart contains the following names:


“Clarence”, “Florence”, “Ora”


“Bessie”, “Mabel”, “Milton”


“Ora”, “Cornelius”, “Adam”


When the following code executes:


String[] names = {"Clarence", "Ora", "Mr. Underwood"};

int namesFound = computerScience.numberOfStudents(names);

The contents of namesFound is 3 because Clarence is found once, Ora is found twice, and Mr. Underwood is not found at all. The total found would be 3.


Complete the numberOfStudents method

public class ClassRoom

{


private String[][] seatingChart;


//initializes the ClassRoom field seatingChart

public ClassRoom(String[][] s){

seatingChart = s;

}



//Precondition: the array of names will contain at least 1 name that may or may not be in the list

// the seating chart will be populated

//Postcondition: the method returns the number of names found in the seating chart



//TODO: Write the numberOfStudents method


public int numberOfStudents(String[] names){





}


public static void main(String[] args)

{

//DO NOT ENTER CODE HERE

//CHECK THE ACTUAL COLUMN FOR YOUR OUTPUT

System.out.println("Look in the Actual Column to see your results");

}

}

Answers

Answer:

Wait what? Some of the words are mashed together...

public class Dog
{
/* code not shown */
}
public class Dachshund extends Dog
{
/* code not shown */
}
Assuming that each class has a default constructor, which of the following are valid
declarations?
I. Dog sadie = new Dachshund();
II. Dachshund aldo = new Dachshund();
III. Dachshund doug = new Dog();

Answers

Answer:

dog=1/3=1/4

Explanation:

1. If Earth's plates are constantly moving, why don't we need to update the locations of -
continents on world maps (such as the one above) all the time?
The Value of Fossil Evidence

Answers

Answer:

Because the tectonic plates are moving so slowly in such small incraments that it would take a while before there was any noticable change.

Explanation:

Earth's plates are constantly moving, but we do not need to update the locations because the movement of the plates does not dramatically alter the surface of the Earth's landscape.

What are continents?

Any of the numerous enormous landmasses is a continent. Up to seven geographical regions are typically recognized by convention rather than by any precise criterion.

The actions of plate movement take place closer to the Earth's crust, beneath the surface of the earth, and in the lithosphere.

The Earth's plates travel deep within the planet toward the crust, but when they intersect, the result is felt as earthquakes on the surface.

Thus, because plate movement has little impact on the terrain and positioning of the Earth's surface, it is not necessary to update the locations of continents on global maps.

To learn more about earth's plates, refer to the below link:

https://brainly.com/question/16802909

#SPJ2

Consider a two-by-three integer array t: a). Write a statement that declares and creates t. b). Write a nested for statement that initializes each element of t to zero. c). Write a nested for statement that inputs the values for the elements of t from the user. d). Write a series of statements that determines and displays the smallest value in t. e). Write a series of statements that displays the contents of t in tabular format. List the column indices as headings across the top, and list the row indices at the left of each row.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

int main(){

   int t[2][3];

   for(int i = 0;i<2;i++){

       for(int j = 0;j<3;j++){

           t[i][i] = 0;        }    }

   

   cout<<"Enter array elements: ";

   for(int i = 0;i<2;i++){

       for(int j = 0;j<3;j++){

           cin>>t[i][j];        }    }

   

   int small = t[0][0];

   for(int i = 0;i<2;i++){

       for(int j = 0;j<3;j++){

           if(small>t[i][j]){small = t[i][j];}        }    }

   

   cout<<"Smallest: "<<small<<endl<<endl;

   

   cout<<" \t0\t1\t2"<<endl;

   cout<<" \t_\t_\t_"<<endl;

   for(int i = 0;i<2;i++){

       cout<<i<<"|\t";

       for(int j = 0;j<3;j++){

           cout<<t[i][j]<<"\t";

       }

       cout<<endl;    }

   return 0;

}

Explanation:

See attachment for complete source file where comments are used to explain each line

Which of the following is true of binary files?
O They are associated with particular software
programs.
O They are used by developers to store source
code.
They can be opened by most software
programs.
O They are considered universal format files.
DONE

Answers

Answer:

O They are considered universal format files

Explanation:

Binary format files are files that are made of up binary codes which is able to be read by the computer in human readable form. Generally speaking, most readable files stored in computer are simply codes written in binary numbers (0's and 1's).

These codes, when stored as a files are able to be read and interpreted in the computer's interpreters language. On the screen of the computer, they becomes legible words and statements.

Answer: They are associated with particular software programs.

Explanation:

Consider the language defined by the following regular expression. (x*y | zy*)* Does zyyxz belong to the language? Yes, because xz belongs to both x*y and zy*. Yes, because both xz and zyy belong to zy*. Yes, because zyy belongs to both x*y and zy*. No, because zyy does not belong to x*y nor zy*. No, because zyy belongs to zy*, but does not belong to x*y. No, because xz does not belong to x*y nor zy*. Does zyyzy belong to the language? Yes, because zy belongs to both x*y and zy*. Yes, because zyy belongs to both x*y and zy*. Yes, because both zy and zyy belong to zy*. No, because zy does not belong to x*y nor zy*. No, because zyy does not belong to x*y nor zy*. No, because zyy belongs to zy*, but does not belong to x*y

Answers

Answer:

Consider the language defined by the following regular expression. (x*y | zy*)* 1. Does zyyxz belong to the language?

O. No, because zyy does not belong to x*y nor zy*

2. Does zyyzy belong to the language?

Yes, because both zy and zyy belong to zy*.

Explanation:

What are the individual presentation objects that are found in the PowerPoint program and used to display content to an audience?

files
slides
cells
charts

Answers

Answer:

The answer is slides

Explanation:

the largest network in tje world is​

Answers

the largest network in the world is the internet.

Answer:

it should be the internet

Pleaseeeeee help!!!!

Answers

Answer:

1.klone

2.internet information services

3.nginx web server

4 apache HTTP

I hope you like it

Stress is an illness not unlike cancer.
True
False

Answers

Answer:

... not unlike cancer.

Explanation:

so we have a double negative so it makes it a positive, so that would basically mean like cancer

so false i think

Answer: True

Explanation:

Kenneth bought a new phone and added two of his friends' numbers to his phonebook. However, he forgot to transfer the phonebook from his previous phone beforehand. Help Kenneth keep the most up-to-date phone numbers for all his friends on his new device. That is, if there is a number saved on both old and new devices for the same friend, you should keep the number saved on the new phone; or if there is only one phone number for a friend, you should keep it, regardless of which device contains it.

Answers

Answer:

The program in Python is as follows:

phonedirs = {'Maegan': 1 , 'McCulloch': 2, 'Cindy': 3}

for i in range(2):

   name = input("Name: ")

   phonenum = int(input("Phone: "))

   phonedirs [name] = phonenum

   

print(phonedirs)

Explanation:

Given

The instruction in the question is incomplete.

See attachment for complete question

Required

Write a code that carries out the 4 instructions in the attachment

See answer section for solution.

The explanation is as follows:

(1) This initializes the phone book

phonedirs = {'Maegan': 1 , 'McCulloch': 2, 'Cindy': 3}

The following is repeated for the two friends

for i in range(2):

(2) This gets the name of each friend

   name = input("Name: ")

(2) This gets the phone number of each friend

   phonenum = int(input("Phone: "))

(3) This updates the phone book with the inputs from the user

   phonedirs[name] = phonenum

(4) This displays the updated phone book    

print(phonedirs)

perceptron simplest definition

Answers

Answer:

A perceptron is a neural network with a single layer

In this exercise you will debug the code which has been provided in the starter file. The code is intended to do the following:

take a string input and store this in the variable str1
copy this string into another variable str2 using the String constructor
change str1 to the upper-case version of its current contents
print str1 on one line, then str2 on the next

1 /* Lesson 4 Coding Activity Question 2 */
2
3 import java.util.Scanner;
4
5 public class U2_L4_Activity_Two{
6 public static void main(String[] args){
7
8 Scanner = new Scanner(System.in);
9 String str1 = scan.nextLine();
10 String str2 = String(str1);
11 str1 = toUpperCase(str1);
12 System.out.println("str1");
13 System.out.println("str1");
14
15 }
16 }

Answers

Answer:

The corrected code is as follows:

import java.util.Scanner;

public class U2_L4_Activity_Two{

public static void main(String[] args){

Scanner scan = new Scanner(System.in);

String str1 = scan.nextLine();

String str2 = str1;

str1 = str1.toUpperCase();

System.out.println(str1);

System.out.println(str2);

}

}

Explanation:

This corrects the scanner object

Scanner scan = new Scanner(System.in);

This line is correct

String str1 = scan.nextLine();

This copies str1 to str2

String str2 = str1;

This converts str1 to upper case

str1 = str1.toUpperCase();

This prints str1

System.out.println(str1);

This prints str2

System.out.println(str2);

What is the main difference between sequential and parallel computing?

Answers

Answer:

In sequential composition, different program components execute in sequence on all processors. In parallel composition, different program components execute concurrently on different processors. In concurrent composition, different program components execute concurrently on the same processors.

The differences is that in sequential, a lot of program parts exist that help execute in stages on all given processors. While in parallel a lot of program parts execute concurrently on more than one processors.

What is the difference between parallel and sequential?

Parallel computing is one where a given processes that is running do not wait for the former process to be done before it runs.

While Sequential is one where the process are said to be executed only by doing  one at a time.

Therefore, the differences is that in sequential, a lot of program parts exist that help execute in stages on all given processors. While in parallel a lot of program parts execute concurrently on more than one processors.

Learn more about processors from

https://brainly.com/question/614196


In which views can a user add comments to a presentation? Check all that apply.
Outline view
Normal view
Protected view
Slide Sorter view
Notes Page view

Answers

Note that the view that a user can add comments to in a presentation ar:

Normal View;(Option B) and

Notes Page View. (Option E).

How are the above views defined?


Microsoft PowerPoint affords users three possible approaches for adding comments to their presentations:  Normal view, Notes Page veiw, and Slide Show view via pointer annotations.

In Normal view, users can create straightforward slide-specific feedback by selecting a slide and clicking the "New Comment" buton in the Comments section.

Meanwhile, Notes Page view enables users to enter more detailed feedback by adding notes specifically for each slide's notes section.

Learn more about presentations:
https://brainly.com/question/649397
#SPJ1

Answer: outline & normal view

Explanation:

9.4 code practice edhesive. PLEASE PLEASE PLEASE HELP

Answers

Answer:

a = [[34,38,50,44,39],  

    [42,36,40,43,44],  

    [24,31,46,40,45],  

    [43,47,35,31,26],

    [37,28,20,36,50]]

     

for r in range(len(a)):

   for c in range (len(a[r])):

       if (a[r][c]% 3 != 0):

           a[r][c]=0

for i in range(len(a)):

   for j in range (len(a[i])):

       print(a[i][j], end=" ")

   print(" ")

Explanation:

We start off by declaring an array called "a". As introduced in the previous lessons, we use two for loops to fully go through all the rows and columns of the two-dimensional arrays. We then add in the line that checks if the remainder of any of these is not equal to zero, then print them as zero on the grid.

(I also got 100%)

mark as brainliest pls hehe

In this exercise we have to use the knowledge in computational language in python to describe a code that best suits, so we have:

The code can be found in the attached image.

What is the function range?

The range() function returns a number series in the range sent as an argument. The returned series is an iterable range-type object and the contained elements will be generated on demand. It is common to use the range() function with the for loop structure. In this way we have that at each cycle the next element of the sequence will be used in such a way that it is possible to start from a point and go incrementing, decrementing x units.

To make it simpler we can write this code as:

a = [[34,38,50,44,39],  [42,36,40,43,44],  [24,31,46,40,45],  [43,47,35,31,26],

[37,28,20,36,50]]

for r in range(len(a)):

  for c in range (len(a[r])):

      if (a[r][c]% 3 != 0):

          a[r][c]=0

for i in range(len(a)):

  for j in range (len(a[i])):

      print(a[i][j], end=" ")

  print(" ")

See more about python at brainly.com/question/19705654

What are the disadvantages of using a series circuit in a lighting system?

Answers

Answer:

Throughout the following segment, the disadvantages of the given topic are summarized.

Explanation:

It's indeed impossible to monitor each unit, but the entire series can be switched open or closed.Unless the series-connected components vary in any way, they include varying voltages through themselves which could create difficulty when you both need a certain voltage.Working with such positive and negative sequence loads on sequence is extremely challenging.

If the pictures are not the same size when they are selected from a file,

PowerPoint will use AutoCorrect so they are the same size.
the picture will be overcorrected.
these pictures will remain the size as in the file.
the layout should be fit to the slide.

Answers

Answer:

The correct answer is C) the pictures will remain the size as in the file

Explanation:

Microsoft Office PowerPoint is a multi-media presentation tool. It supports, videos, pictures, and hyperlinks.

When a picture is inserted by selection from a file, PowerPoint does not automatically resize. The editor or user will need to manually adjust the size(s) of the picture(s) to fit the dimensions they require.

Cheers

 

A profit of ₹ 1581 is to be divided amongst three partner P,Q and R in ratio 1/3:1/2:1/5.theshareof R will be?​

Answers

Answer:

R's share = 306

Explanation:

Sum of ratio = 1/3 + 1/2 + 1/5

LCM = 30

Sum of ratio = (10 + 15 + 6) / 30 = 31 /30

Profit to be shared = 1581

P = 1/3 ; Q = 1/2 ; R = 1/5

Share of R :

(Total profit / sum of ratio) * R ratio

[1581 / (31/30)] * 1/5

(1581 / 1 * 30/31) * 1/5

51 * 30 * 1/5

51 * 6 = 306

What does Al stand for?
B. Artificial Ingenuity
A. Actual Intelligence
C. Artificial Intelligence
D. Algorithm Intel

Answers

AI stands for Artificial Intelligence

In Scheme, source code is data. Every non-atomic expression is written as a Scheme list, so we can write procedures that manipulate other programs just as we write procedures that manipulate lists.
Rewriting programs can be useful: we can write an interpreter that only handles a small core of the language, and then write a procedure that converts other special forms into the core language before a program is passed to the interpreter.
For example, the let special form is equivalent to a call expression that begins with a lambda expression. Both create a new frame extending the current environment and evaluate a body within that new environment. Feel free to revisit Problem 15 as a refresher on how the let form works.
(let ((a 1) (b 2)) (+ a b))
;; Is equivalent to:
((lambda (a b) (+ a b)) 1 2)
These expressions can be represented by the following diagrams:
Let Lambda
let lambda
Use this rule to implement a procedure called let-to-lambda that rewrites all let special forms into lambda expressions. If we quote a let expression and pass it into this procedure, an equivalent lambda expression should be returned: pass it into this procedure:
scm> (let-to-lambda '(let ((a 1) (b 2)) (+ a b)))
((lambda (a b) (+ a b)) 1 2)
scm> (let-to-lambda '(let ((a 1)) (let ((b a)) b)))
((lambda (a) ((lambda (b) b) a)) 1)
In order to handle all programs, let-to-lambda must be aware of Scheme syntax. Since Scheme expressions are recursively nested, let-to-lambda must also be recursive. In fact, the structure of let-to-lambda is somewhat similar to that of scheme_eval--but in Scheme! As a reminder, atoms include numbers, booleans, nil, and symbols. You do not need to consider code that contains quasiquotation for this problem.
(define (let-to-lambda expr)
(cond ((atom? expr) )
((quoted? expr) )
((lambda? expr) )
((define? expr) )
((let? expr) )
(else )))
CODE:
; Returns a function that checks if an expression is the special form FORM
(define (check-special form)
(lambda (expr) (equal? form (car expr))))
(define lambda? (check-special 'lambda))
(define define? (check-special 'define))
(define quoted? (check-special 'quote))
(define let? (check-special 'let))
;; Converts all let special forms in EXPR into equivalent forms using lambda
(define (let-to-lambda expr)
(cond ((atom? expr)
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
)
((quoted? expr)
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
)
((or (lambda? expr)
(define? expr))
(let ((form (car expr))
(params (cadr expr))
(body (cddr expr)))
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
))
((let? expr)
(let ((values (cadr expr))
(body (cddr expr)))
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
))
(else
; BEGIN PROBLEM 19
'replace-this-line
; END PROBLEM 19
)))

Answers

What are you saying at the bottom?

Implement the above in c++, you will write a test program named create_and_test_hash.cc . Your programs should run from the terminal like so:
./create_and_test_hash should be "quadratic" for quadratic probing, "linear" for linear probing, and "double" for double hashing. For example, you can write on the terminal:
./create_and_test_hash words.txt query_words.txt quadratic You can use the provided makefile in order to compile and test your code. Resources have been posted on how to use makefiles. For double hashing, the format will be slightly different, namely as follows:
./create_and_test_hash words.txt query_words.txt double The R value should be used in your implementation of the double hashing technique discussed in class and described in the textbook: hash2 (x) = R – (x mod R). Q1. Part 1 (15 points) Modify the code provided, for quadratic and linear probing and test create_and_test_hash. Do NOT write any functionality inside the main() function within create_and_test_hash.cc. Write all functionality inside the testWrapperFunction() within that file. We will be using our own main, directly calling testWrapperFunction().This wrapper function is passed all the command line arguments as you would normally have in a main. You will print the values mentioned in part A above, followed by queried words, whether they are found, and how many probes it took to determine so. Exact deliverables and output format are described at the end of the file. Q1. Part 2 (20 points) Write code to implement double_hashing.h, and test using create_and_test_hash. This will be a variation on quadratic probing. The difference will lie in the function FindPos(), that has to now provide probes using a different strategy. As the second hash function, use the one discussed in class and found in the textbook hash2 (x) = R – (x mod R). We will test your code with our own R values. Further, please specify which R values you used for testing your program inside your README. Remember to NOT have any functionality inside the main() of create_and_test_hash.cc
You will print the current R value, the values mentioned in part A above, followed by queried words, whether they are found, and how many probes it took to determine so. Exact deliverables and output format are described at the end of the file. Q1. Part 3 (35 points) Now you are ready to implement a spell checker by using a linear or quadratic or double hashing algorithm. Given a document, your program should output all of the correctly spelled words, labeled as such, and all of the misspelled words. For each misspelled word you should provide a list of candidate corrections from the dictionary, that can be formed by applying one of the following rules to the misspelled word: a) Adding one character in any possible position b) Removing one character from the word c) Swapping adjacent characters in the word Your program should run as follows: ./spell_check
You will be provided with a small document named document1_short.txt, document_1.txt, and a dictionary file with approximately 100k words named wordsEN.txt. As an example, your spell checker should correct the following mistakes. comlete -> complete (case a) deciasion -> decision (case b) lwa -> law (case c)
Correct any word that does not exist in the dictionary file provided, (even if it is correct in the English language). Some hints: 1. Note that the dictionary we provide is a subset of the actual English dictionary, as long as your spell check is logical you will get the grade. For instance, the letter "i" is not in the dictionary and the correction could be "in", "if" or even "hi". This is an acceptable output. 2. Also, if "Editor’s" is corrected to "editors" that is ok. (case B, remove character) 3. We suggest all punctuation at the beginning and end be removed and for all words convert the letters to lower case (for e.g. Hello! is replaced with hello, before the spell checking itself).
Do NOT write any functionality inside the main() function within spell_check.cc. Write all functionality inside the testSpellingWrapper() within that file. We will be using our own main, directly calling testSpellingWrapper(). This wrapper function is passed all the command line arguments as you would normally have in a main

Answers

This question is way to long I don’t even understand what your asking

One of your start-ups uses error-correcting codes, which can recover the original message as long as at least 1000 packets are received (not erased). Each packet gets erased independently with probability 0.8. How many packets should you send such that you can recover the message with probability at least 99%

Answers

Answer:

Number of packets ≈ 5339

Explanation:

let

X = no of packets that is not erased.

P ( each packet getting erased ) = 0.8

P ( each packet not getting erased ) = 0.2

P ( X ≥ 1000 ) = 0.99

E(x) = n * 0.2

var ( x ) = n * 0.2 * 0.8

∴ Z = X - ( n * 0.2 ) / [tex]\sqrt{n*0.2*0.8}[/tex]   ~ N ( 0.1 )

attached below is the remaining part of the solution

note : For the value of n take the positive number


According to the article, each of the following
is a challenge in incorporating computer
science in classrooms EXCEPT?

Answers

Answer:

A

Explanation:

makes more sense to me, would have to read the articles to know

Explain 5G so the public can understand what it is

Answers

Answer:

5G is the next-generation of mobile networking. It's faster than 4G and LTE.

Explanation:

Right now, 5G is inaccessible or demonstrate poor quality in many areas around the world, even in big cities like NYC and San Francisco. In the future, 5G will be available on your mobile phone and you'll be able to browse the internet, watch videos, download stuff up to 100 times faster than your current 4G or LTE connection.

Hope this helps.

PYTHON:
Defining a Figure of Merit
Consider a string-matching figure of merit. That is, it tells you how close to a given string another string is. Each matching letter in the same spot is worth one point. Only letters need be considered.
For instance, if the secret string reads 'BLACKBEARD', then 'BEACKBEARD' is worth 9 points, 'WHITEBEARD' is worth 5 points, 'BEARDBLACK' is worth 4 points, and 'CALICOJACK' is worth 1 point.
Compose a function pirate which accepts a string of characters guess and returns the number of characters which match the secret string 'BLACKBEARD'. It should be case-insensitive; that is, you should convert input to upper-case letters. It should return zero for strings which are not ten characters in length.
Your submission should include a function pirate( guess ) which returns a float or int representing the number of matching characters. (You should provide the secret string 'BLACKBEARD' inside the function, not outside of it.)
strings should not have same lengths

Answers

Answer:

figure of merit is a quantity used to characterize the performance of a device, system or method, relative to its alternatives. In engineering, figures of merit are often defined for particular materials or devices in order to determine their relative utility for an application.

Following are the Python program to find the string-matching figure:

Python Program:

def pirate(g):#defining the method pirate that takes one variable in parameter

 if len(g)!= 10:#defining if block that check the parameter length value that is not equal to 10

   return 0   #using the return keyword that return a value that is 0

 else:#defining else block

   g= g.upper()#defining g variable that converts the parameter value into upper value

   secretString = "BLACKBEARD"#defining string variable secretString that holds string value

   c = 0#defining integer variable c that holds integer value

 for i in range(0, len(g)):#defining loop that counts and check value is in string variable

   if g[i] == secretString[i]:#defining if block that checks value in secretString variable

     c += 1; #defining c variable that increments its value

   return c;#using return keyword that return c value

print(pirate("BEACKBEARD"))#using print method that calls pirate method and prints its value

print(pirate("WHITEBEARD"))#using print method that calls pirate method and prints its value

print(pirate("BEARDBLACK"))#using print method that calls pirate method and prints its value

print(pirate("CALICOJACK"))#using print method that calls pirate method and prints its value

Output:

Please find the attached file.

Program Explanation:

Defining the method "pirate" that takes one variable "g" in parameter.Inside the method an if block that checks the parameter length value that is not equal to 10, and uses the return keyword that returns a value that is 0In the else block, define the "g" variable that converts the parameter value into the upper value, and use a string variable "secretString" that holds the string value. In the next step, define an integer variable "c" that holds an integer value, and define a loop that counts and checks the value in a string variable.Inside this, define if block that checks the value in the "secretString" variable, increments the "c" value, and returns the "c" value.Outside the method, a print method that calls the "pirate" method prints its value.

Find out more about the string-matching here:

brainly.com/question/16717135

Other Questions
3. Valentina and Chloe were standing next to each other. Chloe walked south for 86 metersand then west for 93 meters, while Valentina stood still. Then, Chloe walked directly backto Valentina. To the nearest tenth of a meter, what is the distance that Chloe walked toget back to Valentina? BRAINLIEST + 10 POINTS IF CORRECT PLEASE JUST HELPA certain event may occur, but it is unlikely to occur. Which statement about the probability of the event is true? The probability is 0. The probability is less than 0. The probability is close to 0. The probability is 1. i need help im struggling with spanish need help with 12 to 14 Take a look at the following chemical equation. Complete the following: balance the equation, explain how the conversation of matter supports your answer, and identify the type of reaction. For a school project, Sarah plans to build a scale model of an Egyptian pyramid. She will be using a scale of: 1 cm = 5 meters.If the pyramid is 140 meters tall, how tall will her model pyramid be? A. 56 centimeters B. 28 centimeters C. 32 centimeters D. 28 meters Which line is scanned incorrectly?1. Line 12. Line 23. Line 34. Line 45. Line 5 i need help pls () Please Help me with this question. Needs to be the correct answer. PedigreesHad to repostThis is a practice problem I turned in and I screenshotted what my teacher told me but I still don't understand what's wrong. Thank youPLEASE NO ANSWERS I HAVE TO DOWNLOAD. NO FILES How was the idea of self-governance reflected in Protestantism?Priests set the policies for their churches.The king determined the rules for all churches.Individuals had to obey the rulings of church councils.The members of a congregation made decisions for the church. Divide 468 in the ratio 4:5 give four reasons why money is important in our daily activities https://www.linkedin.com/pulse/100-reasons-why-you-shouldnt-commit-sui cide-aaditya-thapa Here go to the link and take your time to read it! Financial information is presented below: Operating expenses $ 45000 Sales returns and allowances 3000 Sales discounts 7000 Sales revenue 160000 Cost of goods sold 96000 Gross Profit would be $64000. $54000. $61000. $67000. Mary simplified the math expression below. The steps that she took are shown. Which is the line where Mary first made her mistake. Line A: 6 + 9 Line B: [8 + 5 x 3] 6 + 9 Line C: 6 + 9 Line D: 23 6 + 9 Line E: 23 15 Line F: 8 Use the drop-down menus to answer the questions.What would be a reasonable value for the vapor pressure of 1-heptene at 100C? Please help meeeeeeeeeeeeee URGENT!!! NEED ASAP!!! TIMED TEST!!!Given: x + 2 < -5.Choose the solution set.{x | x R, x < -3}{x | x R, x < 3}{x | x R, x < -7}{x | x R, x < 7}(Please answer as soon as you can!!) Emily just got a car. She needed insurance, so she has purchased the insurance and pays the premium. Who is Emily in this scenario? A. the person with power of attorney B. the insurer C. the policyholder D. the rider A bag contains 12 green cubes 5 blue cubes and 3 yellow cubes find each probability if you choose one at random