A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to know that this string is my diary. However, I also don't want to make copies of it (because my computer doesn't have enough memory). Which of the following lines will let me access this string via a new name, but without making any copies?

a. std::string book = joshs_diary;
b. std::string & book = joshs_diary; const
c. std::string * book = &joshs_diary;
d. std::string book(joshs_diary);
e. const std::string & book = joshs_diary;
f. const std::string * const book = &joshs_diary;
g. std::string * book = &joshs_diary;

Answers

Answer 1

Answer:

C and G

Explanation:

In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.


Related Questions

Main topics: Basic Java program
Programmatic output
Arithmetic Expressions
User input
Program Specification:
Write a Java program that calculates and outputs a baseball pitcher’s ERA in a reasonable report format. "ERA" is an acronym for "earned run average" and is computed using the following equation: number of earned runs multiplied by 9 and divided by number of innings pitched Your program must do the following: • Prompt the user for the first and last name of the pitcher and store them in two variables of type String • Prompt the user for the pitcher’s number of earned runs and store it in a variable of type int • Prompt the user for the pitcher’s number of innings pitched and store it in a variable of type int • Compute and output the pitcher’s ERA, which should be a (double) floating point number Sample run(s): Pitcher’s first name: Josh Pitcher’s last name: Hader Number of earned runs: 22 Number of innings pitched: 81 Josh Hader has an ERA of 2.4444444444444446

Answers

Answer:

Explanation:

import java.util.Scanner;

public class pitcherValues {

   public static void main(String[] args) {

       String firstName, lastName;

       int earnedRuns, inningsPitched;

       double ERA;

      Scanner in = new Scanner(System.in);

     System.out.println("Pitchers First Name is?");

     firstName = in.nextLine();

     System.out.println("Pitchers Last Name is?");

     lastName = in.nextLine();

     System.out.println("How many runs did the Pitcher earn?");

     earnedRuns = in.nextInt();

     System.out.println("How many innings did the Pitcher Pitch?");

     inningsPitched = in.nextInt();

     ERA = (earnedRuns * 9) / inningsPitched;

     System.out.println(firstName + " " + lastName + " has an ERA of " + ERA);

   }

}

The government of a country wants to know how much inbound tourism (number of tourists visiting from other countries) is contributing to the country’s economic prosperity. The research firm hired to conduct this study surveys 10,000 residents on their favorite spots to visit in the country and how much money they spend on leisurely activities

a. How could the use of a sample like this threaten the value of the study’s outcomes?

b. How might the flawed sample affect the usefulness of the results?

Answers

Answer and Explanation:

A. The study by the research team may not reflect the purpose of the research which is to know how much inbound tourism is contributing to the economy. They are sampling the population on their favorite spots to visit( which may be too narrow here) and what their leisure activities are (which are not the only things tourists spend on). Also 10000 residents may be too small as a sample to reflect more accurate study outcome representative of the population.

2. A flawed sample which is a sampling error would not represent the population as the results from sample would contradict population results

is the core of an operating system that controls its basic functions.
O Freeware
O Kernel
Tweaker
O Open source

Answers

Answer:

Explanation:

Tweaker

ANSWER

Its Kernel

Explanation:

i got a 100%

Which categories format cells? Check all that apply. currency percentage data month date text

Answers

Answer:

currency

percentage

date

text

Explanation:

The category of format cells are currency, percentage, data, month, date, and text. The all options are correct.

What is Format Cells dialog box?

In the Format Cells dialog box, you can configure the formatting options for your report objects.

For a row or column header and the values, you can format the number, font, alignment, border, and pattern.

The format cells command in Excel is used to change the formatting of cell numbers without changing the actual number.

We can change the number, alignment, font style, border style, fill options, and protection using the format cells. We can get to this option by right-clicking the mouse.

Currency, percentage, data, month, date, and text are examples of format cells.

Thus, all options are correct.

For more details regarding format cell, visit:

https://brainly.com/question/24139670

#SPJ2

For this assignment, you will create flowchart usingFlowgorithm and Pseudocode for the following program example:You are to design a program for Alexander’s Coffee Shopproviding customer research data. When a customer places an order,the clerk asks the customer for their zip code and age. The clerkenters this data as well as the number of items purchased. Theprogram should operate continuously until the clerk enters a 0 forthe zip code at the end of the day. If the clerk enters an invalidage (defined as less than 10 or more than 100), an error message isdisplayed and the program re-prompts the clerk continuously toenter a valid age. At the end of the program, display the averagecustomer age as well as counts of the number of items ordered bycustomers under the age of 25 and customers 25 and older.

Answers

Answer:

The flowchart is attached

Oredered accordinly with the flowcahrt number

How many components does a network have ?

Answers

Answer:

There are three primary components to understanding networks: 1. Physical Connections; 2. Network Operating System; and 3. Application Component. Hope this helps!

Explanation:

write a program that calculates the total grade for N classroom exerices as a perfentage. the user should input the value for N followed by each of the N scores and totals.

Answers

Answer:

earned = 0

total = 0

exercises = int(input("Enter the number of exercises: "))

for i in range(exercises):

   score = int(input("Enter score" + str(i+1) + ": "))

   total_score = int(input("Enter total score for exercise " + str(i+1) + ": "))

   

   earned += score

   total += total_score

print("The total is %" + str(earned/total * 100))

Explanation:

*The code is in Python.

Set the earned and total as 0

Ask the user to enter the number of exercises

Create a for loop that iterates number of exercises times. For each exercise;

Ask the user to enter the score earned and total score of that exercise

Add the score to the earned (cumulative sum)

Add the total_score to the total (cumulative sum)

When the loop is done, calculate the percentage, divide earned by the total and multiply the result by 100, and print it

Write a C program to prform simple C aritlimetic calculations. The user is to enter a simple expression(integer operaior integer) such as 15+30=45. The program is to exlract the 2 operands and the operator, perform the indicated calculation and display the result. For examole15 + 30 = 45. Operators should includc t, -, * , l, and %'.Operands are prcsitive integers, no sign. Use getchar to input the cxpression. Allow for variable spacing before the first operand and between operators and operands.

Answers

Answer:

Here is the C program:

#include <stdio.h>  //to use input output functions

//functions prototype

unsigned int mod(unsigned int a, unsigned int b);  

unsigned int mul(unsigned int a, unsigned int b);  

unsigned int sub( unsigned int a,unsigned int b);

float divide(unsigned int a,unsigned int b);  

unsigned int add( unsigned int a,unsigned int b);  

int main()  {  //start of main method

unsigned int a, b;   //declare variables to store the operands

char d;  //declare variable to store the operator

printf("Enter an operator:  ");   //prompts user to enter an operator

scanf("%c",&d);  //reads the operator from use

getchar();  //gets a character

while (d!='q')   { //keeps iterating until user enters q to quit

printf("Enter 1st operand: ");   //prompts user to enter first operand

scanf("%d",&a);   //reads first operand from user

getchar();  //reads character

printf("Enter 2nd operand: ");   //prompts user to enter second operand

scanf("%d",&b);   //reads second operand from user

getchar();  

if (d=='%')  {   //if the character of operator is a mod

printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = ");  //displays =

mod(a,b);  }  //displays computed modulo of two input operands

if (d=='*')   //if the input character is for multiplication operator

{printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = ");  //displays =

mul(a,b); }  //displays computed multiplication

if (d=='+')  {  //if the input character is for addition operator

printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = "); // displays =

add(a,b);  }   //displays computed addition

if (d=='/')  {  //if the input character is for division operator

printf("%d",a); // prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = ");  //displays =

divide(a,b);  }   //displays computed division

if (d=='-')  {  //if the input character is for subtraction operator

printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b); // displays operand 2

printf(" = ");  //displays =

sub(a,b);  }  //displays computed subtraction

printf("Enter an operator: ");   //asks again to enter an operator

scanf("%c",&d);  //reads operator from user

getchar();  }  }   //gets character

unsigned int mod( unsigned int a, unsigned int b){  //function to compute modulo of two integers with no sign

     int c = a%b;  //computes mod

    printf("%d",c);  }  //displays mod result

unsigned int add(unsigned int a, unsigned int b){     // function to compute addition of two integers

    int c = a+b; //computes addition

    printf("%d\n",c);  } //displays result of addition

unsigned int mul(unsigned int a, unsigned int b){       //function to compute multiplication of two integers

    int c = a*b;  //multiplies two integers

   printf("%d\n",c); }  //displays result of multiplication

float divide(unsigned int a, unsigned int b){   //function to compute division of two integers

    float c = a/b;  //divides two integers and stores result in floating point variable c

    printf("%f\n",c);  } //displays result of division

unsigned int sub(unsigned int a, unsigned int b){       //function to compute subtraction of two integers

    int c = a-b;  //subtracts two integers

    printf("%d\n",c);  }  //displays result of subtraction

Explanation:

The program is well explained in the comments mentioned with each line of the program. The program uses while loop that keeps asking user to select an operator and two operands to perform arithmetic calculations. The if conditions are used to check what arithmetic calculation is to be performed based on user choice of operand and calls the relevant function to perform calculation. There are five functions that perform addition, modulo, subtraction, division and multiplication and display the result of computation. The screenshot of output is attached.

How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.

Answers

Answer:

i choose choice D

Explanation:

reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit

(1) Prompt the user to enter a string of their choosing. Output the string.
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself.
(2) Complete the GetNumOfCharacters() function, which returns the number of characters in the user's string. Use a for loop in this function for practice. (2 pts)
(3) In main(), call the GetNumOfCharacters() function and then output the returned result. (1 pt) (4) Implement the OutputWithoutWhitespace() function. OutputWithoutWhitespace() outputs the string's characters except for whitespace (spaces, tabs). Note: A tab is '\t'. Call the OutputWithoutWhitespace() function in main(). (2 pts)
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself. Number of characters: 46 String with no whitespace: The only thing we have to fear is fear itself.

Answers

Answer:

The solution is given in the explanation section

See comments for detailed explanation of each step

Explanation:

import java.util.Scanner;

class Main {

 public static void main(String[] args) {

   //Prompting the User to enter a String

   System.out.println("Enter a sentence or phrase: ");

   //Receiving the string entered with the Scanner Object

   Scanner in = new Scanner (System.in);

   String user_word = in.nextLine();

   //OutPuting User entered string

   System.out.println("You entered: "+user_word);

   //Calling the GetNumOfCharacters Method

   System.out.println("Number of characters: "+ GetNumOfCharacters(user_word));

   //Calling the OutputWithoutWhitespace Mehtod

   System.out.println("String with no whitespace: "+OutputWithoutWhitespace(user_word));

   }

   //Creating the function GetNumOfCharacters()

   //This function will return the number of characters

 // in the string entered by the user_word

 public static int GetNumOfCharacters (String word) {

   int noOfCharacters = 0;

   for(int i = 0; i< word.length(); i++){

     noOfCharacters++;

   }

   return noOfCharacters;

 }

 //Creating the OutputWithoutWhitespace() method

 //This method will remove all tabs and spaces from the original string

 public static String OutputWithoutWhitespace(String word){

   //Use the replaceAll all method of strings to replace all whitespaces with no space.

   String new_string = word.replaceAll(" ","");

   return new_string;

 }

}

describe how to get started on a formal business document by using word processing software

Answers

Answer:Click the Microsoft Office button.

Select New. The New Document dialog box appears.

Select Blank document under the Blank and recent section. It will be highlighted by default.

Click Create. A new blank document appears in the Word window.

Explanation:

CPU BENCHMARKS are measurements used to compare performance between processors

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

CPU benchmarks are used to picking the best CPU. If you want to pick the best CPU for the kind of work you do is easier if you research some performance benchmarks.

As you know, CPU benchmarks are measurements used to compare performance between processors. These benchmarks are the measure to know the performance of CPU.

These CPU Benchmarks are generated by running software programs specifically designed to push the limits of CPU performance.

Which part of the formula is the argument?

=COUNTIF(A1:E59, "Greene City")

=

()

COUNTIF

A1:E59

Answers

Answer:

e on edege

Explanation:

just took the question on edge

Answer:

Guy above is right!

Explanation:

we cannot create a blank table true or false​

Answers

I believe that that statement is true

In __________ write, the data are stored in the cache, and control returns to the caller. Select one: a. a synchronous b. a buffered c. an asynchronous d. a non-buffered

Answers

Answer:

The correct answer to the question is option C (an asynchronous)

Explanation:

Computer store files in its temporary data storage space so as to facilitate easy retrievals when needed. Cache memory is in the temporary data storage space of the computer, faster than any other system memory so that when the processor requests information from the computer memory after a user place a command, the cache memory makes the information available in a short time when the data are required eliminating delay when ram will have to take time to fetch the data to provide to the processor.

In an asynchronous write, the data are stored in the cache to enable easy retrieval by the computer processor just as the cache is explained above, it allows writing data to the cluster. Asynchronous write also allows control returns to the caller.

what are the example of malware spreads

a. social network
b. pirated software
c.removable media
d. all of the above​

Answers

The answer has to be
D. All of the above

Examples of malware spreads include all of the options mentioned: social networks, pirated software, and removable media.

The correct option is d.

a. Social networks: Malware can spread through social networks via malicious links or infected attachments shared within messages, posts, or comments. Users may unknowingly click on these links or download infected files, which can then propagate the malware to their devices or their contacts.

b. Pirated software: Malicious actors often distribute malware-infected versions of popular software through illegitimate channels. Users who download and install pirated software are at risk of unknowingly introducing malware onto their systems, as these versions may be modified to include malicious code.

c. Removable media: Malware can also spread through removable media such as USB drives, external hard drives, or even CDs/DVDs. If an infected device or media is connected to a computer, the malware can transfer onto the system, potentially infecting files and spreading further.

Therefore, all of the options (a, b, and c) are examples of how malware can spread, highlighting the importance of practicing safe online habits, avoiding pirated software, being cautious with links and attachments, and regularly scanning removable media to mitigate the risk of malware infections.

To learn more about malware spreads;

https://brainly.com/question/31115061

#SPJ2

Complete the sentence.
You can buy new applications at a retail store on DVD for ____.

O laptops
O smartphones
O tablets

Answers

Answer:

laptops

Explanation:

B

You can buy new applications at a retail store on DVD for laptops. Thus, option A (laptops) is correct.

What is a DVD?

A website is an accumulation of internet pages and related items that is posted on at least one server and given an unique domain name. Most blogs focus on a single subject or objective, such as reporting, education, industry, entertaining, or photo sharing.

A raster-based photograph designed for the web and publishing is stored as a JPG file. The JPG format is the default file format for image sensors and is the most widely used picture format on the web because of its universal compatibility and decompression. Portraits in both colour and black and white work brilliantly with them.

Therefore, option A (laptops) is the correct option.

Learn more about DVD, here:

https://brainly.com/question/13664390

#SPJ6

what is Service Operations in ITIL​

Answers

Explanation:

the objective of ITIL service operations is to make sure that IT services are delivered effectively and efficiently. the service operation life cycle stage includes the fulfilling of user requests, resolving service failure fixing problems and also carrying out routine operational tasks

Remove gray from RGB Summary: Given integer values for red, green, and blue, subtract the gray from each value. Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray). Given values for red, green, and blue, remove the gray part.

Answers

Answer:  

Here is the C++ program:  

#include <iostream>   //to use input output functions    

using namespace std;   //to identify objects cin cout    

int main() {   //start of main method    

int red,green,blue,smallest;   //declare variables to store integer values of red,green, blue and to store the smallest value    

cout<<"Enter value for red: ";  //prompts user to enter value for red    

cin>>red;  //reads value for red from user    

cout<<"Enter value for green: ";  //prompts user to enter value for green  

cin>>green; //reads value for green from user    

cout<<"Enter value for blue: "; //prompts user to enter value for blue    

cin>>blue;   //reads value for blue from user    

//computes the smallest value  

if(red<green && red<blue) //if red value is less than green and blue values    

smallest=red;   //red is the smallest so assign value of red to smallest    

else if(green<blue)   //if green value is less than blue value    

smallest=green; //green is the smallest so assign value of green to smallest  

else //this means blue is the smallest    

smallest=blue;  //assign value of blue to smallest    

//removes gray part by subtracting smallest from rgb  

red=red-smallest; //subtract smallest from red    

green=green-smallest; //subtract smallest from green    

blue=blue-smallest; //subtract smallest from blue    

cout<<"red after removing gray part: "<<red<<endl;  //displays amount of red after removing gray    

cout<<"green after removing gray part: "<<green<<endl; //displays amount of green after removing gray  

cout<<"blue after removing gray part: "<<blue<<endl;  } //displays amount of blue after removing gray  

Explanation:  

I will explain the program using an example.    

Lets say user enter 130 as value for red, 50 for green and 130 for blue. So  

red = 130    

green = 50

blue = 130  

First if condition if(red<green && red<blue)   checks if value of red is less than green and blue. Since red=130 so this condition evaluate to false and the program moves to the else if part else if(green<blue) which checks if green is less than blue. This condition evaluates to true as green=50 and blue = 130 so green is less than blue. Hence the body of this else if executes which has the statement: smallest=green;  so the smallest it set to green value.    

smallest = 50    

Now the statement: red=red-smallest; becomes:    

red = 130 - 50    

red = 80    

the statement: green=green-smallest;  becomes:    

green = 50 - 50    

green = 0    

the statement: blue=blue-smallest; becomes:    

blue = 130 - 50    

blue = 80    

So the output of the entire program is:    

red after removing gray part: 80                                                                                                 green after removing gray part: 0                                                                                                blue after removing gray part: 80    

The screenshot of the program along with its output is attached.

Adjust list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers. For this program, adjust the values by subtracting the smallest value from all the values. The input begins with an integer indicating the number of integers that follow. Assume that the list will always contain fewer than 20 integers. Ex: If the input is: 5 30 50 10 70 65 the output is: 20 40 0 60 55 The 5 indicates that there are five values in the list, namely 30, 50, 10, 70, and 65. 10 is the smallest value in the list, so is subtracted from each value in the list. For coding simplicity, follow every output value by a space, including the last one.

Answers

Answer:

I've implemented this program using python

userinput = int(input("Length: "))

mylist = []

mylist.append(userinput)

for i in range(1,userinput+1):

   userinp = int(input("Input: "))

   mylist.append(userinp)

smallval = mylist[1]

for i in range(1,len(mylist)):

   if smallval > mylist[i]:

       smallval = mylist[i]

for i in range(1,len(mylist)):

   mylist[i] = mylist[i] - smallval

for i in range(1,len(mylist)):

   print(mylist[i],end=' ')

Explanation:

I've added the full source program as an attachment where I used comments to explain difficult lines

The program written in python 3 deducts the least from a list of user given integers and prints the output. The program goes thus :

len_input = int(input())

#the number of inputs the user wishes to supply

vals = []

#initialize an empty list to accept the inputs

for i in range(1, len_input +1):

#use a loop to accept the user inputs

num = int(input())

#allow users to take in the inputs

vals.append(num)

#append each value to the list

least =min(vals)

#using the min function, obtain the lowest value from the list

output_vals = []

#initialize an empty list to hold the normalized values

for i in range(len_input):

#loop using a for loop

diff = vals[i] - least

#deduct the minimum value from each element in the list

output_vals.append(diff)

#append the values to the new list.

print(output_vals)

#display the output

A sample run of the program and the script is attached.

Learn more :https://brainly.com/question/14276852

Wrire a code that display elements at indices 1 and 4 in the follwoing array.

var userArray = [1, 6, 41, 8, 24, 4];

Answers

Answer:

Console.log(userArray[1]);

Console.log(userArray[4]);

Explanation:

The programming language was not stated; however, the variable declaration implies JavaScript.

JavaScript prints using the following syntax:

Console.log(print-name);

Since, the code is to print some elements of array userArray.

First, we need to determine the index of the elements.

The indices are given as 1 and 4.

So, the code to print these elements is as follows:

Console.log(userArray[1]);

Console.log(userArray[4]);

What is the critical path?


Calculate the minimum overall project completion time and identify which activities are critical by filling out the chart below-forward and backward pass.

What is the maximum time to complete the projects?


Early start Early Finish late start Late finish Slack Critical path?


A
B
C
D
E
F
G
H


Please answer and thank you

Answers

Answer:

yeeeee

Explanation:yeeees quen                   HI SISTERS HI SISTERS

James uses a database to track his school's football team. Which feature in a database allows James to find a specific player by name?

Grid
Filter
Search
Sort

Answers

Search if he knows the players name

Answer:

search

Explanation:

Create an interface called Runner. The interface has an abstract method called run() that displays a message describing the meaning of run to the class. Create classes called Machine, Athlete, and PoliticalCandidate that all implement Runner.
The run() should print the following in each class:
Machine - When a machine is running, it is operating.
Athlete - An athlete might run in a race, or in a game like soccer.
PoliticalCandidate - A political candidate runs for office.
----------------------------------------------------------------------------------------------------
public class Athlete implements Runner
{
public void run()
{
// write your code here
}
}
--------------------------------------------------------------------------------------
public class DemoRunners
{
public static void main(String[] args)
{
Machine runner1 = new Machine();
Athlete runner2 = new Athlete();
PoliticalCandidate runner3 = new PoliticalCandidate();
runner1.run();
runner2.run();
runner3.run();
}
}
------------------------------------------------------------------------------------------
public class Machine implements Runner
{
public void run()
{
// write your code here
}
}
----------------------------------------------------------------------------------------------------
public class PoliticalCandidate implements Runner
{
public void run()
{
// write your code here
}
}
----------------------------------------------------------------------------------------------------
public interface Runner
{
// write your code here
}
----------------------------------------------------------------------------------------------------

Answers

Answer:

Here is the interface Runner:

public interface Runner  {  //interface Runner

public abstract void run();  } //abstract method run that displays a message describing the meaning of run to the class

/*Here Runner is the interface which is an abstract class. It is used to group related methods such as here is run method with empty body. An abstract method run() does not have a body. The body is provided by the sub classes Machine, Athlete, and PoliticalCandidate that all implement Runner.  */

Explanation:

Here is the Athlete class:

public class Athlete implements Runner  {  //class that implements Runner interface

public void run()  {  //interface method accessed by Athlete to provide its body according to describe the meaning of run to the class

    System.out.println("An athlete might run in a race, or in a game like soccer.");  } }    //prints this message

Here is the Machine class:

public class Machine implements Runner  {

public void run()  {

System.out.println("When a machine is running, it is operating.");  }}

Here is the PoliticalCandidate class:

public class PoliticalCandidate implements Runner  {

public void run()  {

System.out.println("A political candidate runs for office.");  } }

/*To access the interface Runner method run(), the Runner must be "implemented" by Machine, Athlete, and PoliticalCandidate classes with the implements keyword. The body of the interface method run() is provided by the "implement" class */      

Here is the DemoRunners class:

public class DemoRunners {  //class name

public static void main(String[] args)  {  //start of main method

Machine runner1 = new Machine();  //creates object of Machine class

Athlete runner2 = new Athlete();  //creates object of Athlete class

PoliticalCandidate runner3 = new PoliticalCandidate();  //creates object of PoliticalCandidate class

runner1.run();  //uses object of Machine class to call run method

runner2.run();  //uses object of Athlete class to call run method

runner3.run();  } } //uses object of PoliticalCandidate class to call run method

When runner1.run() is called it invokes the run() method of class Machine which displays the message:

When a machine is running, it is operating.

When runner2.run() is called it invokes the run() method of class Athlete which displays the message:

An athlete might run in a race, or in a game like soccer.  

When runner3.run() is called it invokes the run() method of class PoliticalCandidate which displays the message:

A political candidate runs for office.

The screenshot of the program is attached.

The two statements belowchar dance1[ ] = {'F','o','x','t','r','o','t'};String dance2 = new String(dance1);will generate an error message:

a. because char variables and String variable do not mix.
b. will generate an error message because char variables and String variable do not mix.
c. show that a String variable, like dance2, is an array.
d. demonstrate that a character array can be used to construct a String object.
e. prove that character variables and String variables are identical.

Answers

Answer:

D. Demonstrate that a character array can be used to construct a String object.

Explanation:

Option D answers the question.

This is so because:

The first line of the code segment creates a char array element i.e. dance1

The second line of the code segment creates a String variable, dance2.

dance2 is then initialised by concatenating the elements in dance1.

i.e. The value of dance2 is

dance2 = "Foxtrot"

Hence, option D answers the question

help me plzz thank you if your right I will mark brainiest

Answers

Answer:

the 1,2, and 3 are the second circle thingy and the fourth question is the first circle thing and dont know the last one hope this helps

Explanation:

Answer in this order.
B, B, B, B, A. I’m 80% sure these are the right answers.

IT professionals have a responsibility to find and use wireless devices that have which of the following features? Check all of the boxes that apply.

compatibility

ability to work well with other wireless devices

ability to communicate wirelessly with other devices, such as a printer and laptop

preloaded with the latest apps

Answers

Answer:

a b c

Explanation:

Answer:

compatibility

ability to work well with other wireless devices

ability to communicate wirelessly with other devices, such as a printer and laptop

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. For a word count vector with indices ordered as the words appear above, what is the word count vector for a document that simply says “the wheels on the bus go round and round.”

Please enter the vector of counts as follows: If the counts were ["the"=1, “on”=3, "and"=2, "go"=1, "round"=2, "bus"=1, "wheels"=1], enter 1321211.
1 point

Answers

Answer:

umm that is a todler song

Explanation:

umm that is a todler song that they sing to them when there crying

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. As per the given scenario, the vector of counts will be 2111211. The correct option is C.

What are the ways to count items in a vector?

C++ has a built-in function that counts the length of the vector. Size is the function's name ().

It returns the size or total number of elements of the vector that was utilized to create it. There is no need for debate.

The number of observations (rows) includes deleted observations as well. In an SAS data collection, there can be a maximum of 2 63-1 observations, or roughly 9.2 quintillion observations. For the majority of users, going above that limit is quite rare.

The vector of counts in the above scenario will be 2111211.

Thus, the correct option is C.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

in your own experience,imagine if someone gained access to any of your social media accounts they could changed your account name,password and recovery data in order to lock you out and take total control. they could even go as far as pretending to be you and send out compromised messages to your contacts and this list is endless really. To help you stay safe from hackers and protect your social media accounts​

Answers

Answer: yes

Explanation: because they now have your info

Explain why you have to import JOptionPane but not the Math class​

Answers

Answer:

To provide standard dialog boxes such as message dialog box, confirm dialog box and input dialog box.

In Java, the import statement is used to include classes or packages from outside sources in your code. This lets you access and use the features of those classes or packages.

What is the JOptionPane

To do the above, You need to import JOptionPane in Java because it belongs to a different package from the Math class.

The Math class is a part of the java. lang package, which is automatically included in Java. This package has important classes and interfaces that are used in Java programs. Because the Math class is already included in this package, you don't have to import it separately.

Read more about  JOptionPane here:

https://brainly.com/question/13101293

#SPJ2

Other Questions
identifica los siguientes elementos a qu medio de comunicacin pertenecen.A. Lenguaje informalB. PrecisinC. Cabina de radioD. E. Sptimo arteF. Informar positivamenteG. Lenguaje visualmente dinmico.H. Cortometraje. What is the interquartile range of the following data set?3,8,14,19,22,29,33,37,43,49 3. Which term describes an organism with no hard skeleton? *a)Endoskeletonb)HydrostaticC) Exoskeleton Who is the speaker of the "Mending Wall"?A) the poet, Robert FrostB) Robert Frosts neighborC) the apple orchard ownerD) the father of the neighbor What is the value of 3 divide 1 1/4 in simplest form For a class experiment, Sally's class weighed a log before and aftersubjecting it to termites. Before subjecting it to termites, the logweighed 2/3 of a pound. After the termites, the log weighed 5/12 of apound. How much weight did the termites take from the log? Help APSP!!!!!!!!!!!!! Can yall answer this for me. 15 points and will mark as brainliest!!! ;) .Over a period of 1,000 years, a lake becomes a maple forest. Is this process primary or secondary succession? Explain your answer. Amanda's book bag is 0.10. Some of Amanda's pens are removed and replaced with pink pens. Her book bag still contains a total of 20 pens. If the probability of choosing a pink pen is close to 1, how many pink pens would you expect to see in Amanda's bag? PLS TELL ME WHICH ONE IS TRUE PLS DONT LIE Determine the intercepts of the graph below please help be sure of your answer Which of the following could be a factor of the following Trinomial.3 pointsx?+ 12x +27 Plz help help me its so hard I Need Help ASAP!!! 1)Purchasing an insurance policy is an example of what approach to risk mitigation?TolerateTransferTerminateTreat2)Working through your lunch break is a good way to get more done.TrueFalse3)The Rhode Island System employed workers as young as ageseven.nine.twelve.fourteen.4) A lack of resources may lead a company to take which approach to risk mitigation?TolerateTransferTerminateTreat5) What type of manufacturing employee is usually in charge of creating work schedules?OperatorOperations managerAssembly line workerQuality manager6)The Equal Opportunity Employment laws ensure that all workersget regular breaks.receive a raise once a year.are treated fairly.have union rights.7) A punctual employee has a sense ofintegrity.self-discipline.pride.personal responsibility.8) Emotions can impede active listening.TrueFalse9) Data collected as a result of a process is referred to asinformation processing.material processing.feedback.output.10) The term laissez-fairecomes from the French word meaninglet do.make do.make happy.be happy. 7. A car is moving at 50.0 mph when the driver applies brakes. Determine the distance itcovers before coming to a halt. Coefficient of static friction between the tires and surface ofthe road is 0.514. Mass of the car is 1000 kg. Jill jumped 6 1 3feet in the long-jump event. Jills best friend jumped 6 5 7feet. How much farther did Jills best friend jump? Describe in words the process you used to solve the problem def build_dictionary(string):d = dict()for x in string:if not d.get(x):d[x] = 1else:d[x] += 1return dPart 2:Create a function named build_word_counter that has the same signature as build_dictionary. This function also returns a dictionary, however, it normalizes each word such that the case of the word is ignored (i.e. case insensitive). So the words LIKE, Like, like should be considered the same word (much like a regular dictionary would). You must use the same function add_item again (so don't make any modifications to it) Normalize words by using the lower case version of the word.Part 3:Create a function named build_letter_distribution that has the same signature as build_dictionary. This function returns a dictionary; however, each key will be a letter and the value will be the count that represents how many times that letter was found. Essentially you will have a letter distribution over a sentence (which is a list of words). The letters should be case insensitive. What ideas or eventscaused the populations of Philadelphia andNew York City to change over time? 5 apples weight 0.6 kilograms. All of our apples weigh the same. How many kilograms will 12 apples weigh?