What is the missing word?

class TooWide(Exception):
pass

answer = input('How wide is it? ')
width = float(answer)
try:
if width > 30:

TooWide
else:
print("Have a nice trip!")
except TooWide:
print("Your luggage will not fit in the overhead bin.")
Call
Detect
except
raise

Answers

Answer 1

A program in python needs a word called print if the programmer wants to print anything on the output screen.

How to print on the output Screen?

Python uses print statement to print anything.

Some of examples are:

  print("Python")   - #Python

Now in the following code:

class TooWide(Exception):

pass

answer = input('How wide is it? ')

width = float(answer)

try:

if width > 30:

print("TooWide")

else:

print("Have a nice trip!")

except TooWide:

print("Your luggage will not fit in the overhead bin.")

To know more about python visit:

https://brainly.com/question/30427047

#SPJ1


Related Questions

kerberos is the primary system used for authorization and authentication in windows domains. the key distribution center and the ticket-granding server are often single points of failure making the system susceptible to outages. what types of attacks does the system protect against?

Answers

Kerberos provides protection against various types of attacks, including: replay attacks, spoofing attacks, dictionary attacks, and man-in-the-middle attacks.

Replay attacks: In a replay attack, an attacker captures a valid Kerberos authentication message and then replays it later to gain unauthorized access. Kerberos protects against replay attacks by using a timestamp or nonce in its authentication messages, which ensures that each message is unique.

Spoofing attacks: In a spoofing attack, an attacker impersonates a legitimate user or host to gain access to resources or sensitive information. Kerberos protects against spoofing attacks by using strong cryptography to ensure that authentication messages cannot be intercepted or modified.

Dictionary attacks: In a dictionary attack, an attacker attempts to guess a user's password by trying different combinations of characters until the correct password is found. Kerberos protects against dictionary attacks by using strong cryptographic keys that are generated from the user's password, making it much more difficult to guess the password.

Man-in-the-middle attacks: In a man-in-the-middle attack, an attacker intercepts communication between two parties and masquerades as each party to the other. Kerberos protects against man-in-the-middle attacks by using strong cryptographic keys that are generated during the authentication process, which ensures that the keys are only known to the parties involved in the communication.

You can learn more about kerberos at

https://brainly.com/question/28348752

#SPJ11

C++ please help
The program first reads integer orderCount from input, representing the number of pairs of inputs to be read. Each pair has a string and an integer. One Order object is created for each pair and added to vector orderList. Call each Order object's Print().
Ex: If the input is:
5 bread 17 gyro 4 coconut 3 fennel 5 truffle 12
then the output is:
Order: bread, Quantity: 17 Order: gyro, Quantity: 4 Order: coconut, Quantity: 3 Order: fennel, Quantity: 5 Order: truffle, Quantity: 12
Note: The vector has at least one element.
code below:
#include
#include
using namespace std;
class Order {
public:
void SetFoodAndQuantity(string newFood, int newQuantity);
void Print() const;
private:
string food;
int quantity;
};
void Order::SetFoodAndQuantity(string newFood, int newQuantity) {
food = newFood;
quantity = newQuantity;
}
void Order::Print() const {
cout << "Order: " << food << ", Quantity: " << quantity << endl;
}
int main() {
int orderCount;
unsigned int i;
vector orderList;
Order currOrder;
string currFood;
int currQuantity;
cin >> orderCount;
for (i = 0; i < orderCount; ++i) {
cin >> currFood;
cin >> currQuantity;
currOrder.SetFoodAndQuantity(currFood, currQuantity);
orderList.push_back(currOrder);
}
/* Your code goes here */
return 0;
}

Answers

Here is the modified code that meets the requirements mentioned in the problem:

#include <iostream>

#include <vector>

using namespace std;

class Order {

public:

void SetFoodAndQuantity(string newFood, int newQuantity);

void Print() const;

private:

string food;

int quantity;

};

void Order::SetFoodAndQuantity(string newFood, int newQuantity) {

food = newFood;

quantity = newQuantity;

}

void Order::Print() const {

cout << "Order: " << food << ", Quantity: " << quantity << endl;

}

int main() {

int orderCount;

unsigned int i;

vector<Order> orderList; // vector of Order objects

Order currOrder;

string currFood;

int currQuantity;

cin >> orderCount;

for (i = 0; i < orderCount; ++i) {

   cin >> currFood;

   cin >> currQuantity;

   currOrder.SetFoodAndQuantity(currFood, currQuantity);

   orderList.push_back(currOrder);

}

// Loop through the orderList vector and print each order

for (i = 0; i < orderList.size(); ++i) {

   orderList[i].Print();

}

return 0;

}

How does the above code work?

The code reads an integer representing the number of pairs of inputs to be read.


For each pair, an Order object is created with the string and integer values, and then added to a vector. Finally, the Print() function is called for each object in the vector.

Learn more about codes;
https://brainly.com/question/28848004
#SPJ1

____ databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely. data warehouse.

Answers

Data warehouse databases reflect the ever-growing demand for greater scope and depth in the data on which decision support systems increasingly rely.

Data warehouses are specifically designed to support decision-making activities by providing a large, integrated, and historical database that can be used for data analysis, reporting, and business intelligence. They are designed to handle large volumes of data from multiple sources and to provide users with easy access to the data they need. Data warehouses also typically include tools for data cleaning, data integration, and data transformation to ensure that the data is accurate, consistent, and meaningful.

Overall, data warehouses are a critical component of modern decision support systems, enabling organizations to make better decisions based on a deeper understanding of their data.

You can learn more about data warehouse  at

https://brainly.com/question/25885448

#SPJ11

If you want to use a font color many times in your app design, it is a good idea to configure this color as a color tag as illustrated in this question image. Where should you add this tag to use this font color name: ATCtext in the app activities? # 05 ff 90 color > a.activity_main.xml c.cssx xml
c.format.xml d.colors xml

Answers

If you want to use a font color many times in your app design, it is a good idea to configure this color as a color tag as illustrated in this question image. The place where you should add this tag to use this font color name: ATCtext in the app activities is d.colors xml.

In the web design language HTML, the color tag is used to add color to text or background. A color name is a word that identifies a particular color within the color palette. A color number is a 6-digit hexadecimal value, such as # 0000FF, which represents the red, green, and blue components of the color. The color tag, along with the attributes that specify how the text or background should appear, allows you to color your HTML text or background.You can use the colors.xml file to define color values that you may reference in your application's layouts or Java code. This file, located in the res/values/ directory, contains a list of color values, each of which has a name and an associated color value in hexadecimal #RRGGBB format.

Learn more about ATCtext: https://brainly.com/question/29670545

#SPJ11

biometric identifiers refer to something the user knows, such as a user id, password, pin, or answer to a security question. true or false?

Answers

The statement ''Biometric identifiers do not refer to something the user knows, such as a user id, password, pin, or answer to a security question'' is false.

Biometric identifiers are unique physical characteristics or traits that can be used to identify an individual, such as fingerprints, facial recognition, iris scans, and voiceprints. Biometric identifiers refer to unique physical or behavioral characteristics of an individual that can be used to recognize, authenticate, or identify a person for a security question. Biometric identifiers are usually divided into two categories: physiological and behavioural. Physiological identifiers are biological characteristics that are unique to an individual, such as fingerprints, facial recognition, iris scans, and voiceprints. Behavioural identifiers are unique traits that can be determined by an individual's behavior or the way they interact with the environment, such as gait recognition or signature recognition.

Learn more about  security here: https://brainly.com/question/27602536

#SPJ11

Downloading and installing cracked software from the internet can be harmful.​

Answers

Answer: Yes, it can be harmful

Explanation:

The crack can include malware in it.

As cracked software is distributed by unidentified third parties, it is impossible to know what else, other than the promised program, you will receive when you download it. This indicates that there is a constant chance that a crack will allow malware to attack your machine or network.

T/F if domain1 is the forest root domain, you can use the command set-adforestmode windows2012r2domain to raise the forest functional level to windows server 2012 r2.

Answers

The given statement is ture because if domain1 is the forest root domain, you can use the command set-adforestmode windows2012r2domain to raise the forest functional level to Windows Server 2012 R2.

The forest is the highest level of the Active Directory structure. A forest is a set of domain trees that share a common catalog, global security policies, and forest-wide search. A forest is typically separated from other forests and has a different DNS namespace. The schema and configuration naming contexts are the only naming contexts shared by all domains in a forest.

The Forest Functional Level (FFL) is the minimum functional level required for the forest to function. The functionality offered in the forest varies based on the FFL. You can raise the forest functional level to Windows Server 2012 R2 using the set-adforestmode Windows 2012 r2domain command. This would raise the forest functional level to Windows Server 2012 R2. The new schema features would be enabled, allowing for new functionality, but the old functionality would still be there.

You can learn more about  Active Directory at

https://brainly.com/question/12963619

#SPJ11

6. 23 Lab training: Unit tests to evaluate your program Auto-graded programming assignments may use a Unit test to test small parts of a program. Unlike a Compare output test, which evaluates your program's output for specific input values, a Unit test evaluates individual functions to determines if each function: is named correctly and has the correct parameters and return type calculates and returns the correct value (or prints the correct output) In Python labs, the line if __name__

Answers

Unit tests are a popular way to test small parts of a program to ensure that each function is working correctly.

Unlike Compare output tests that evaluate a program's output for specific input values, a Unit test evaluates individual functions to check if they are named correctly, have the correct parameters and return type, and calculate and return the correct value or print the correct output. In Python labs, the line "if name == 'main':" is often used to ensure that the code inside it only runs when the script is executed directly and not when it's imported as a module. These unit tests are essential for ensuring that the code is reliable, efficient, and works as expected, leading to fewer bugs and better software quality.

Find out more about Unit tests

brainly.com/question/16343405

#SPJ4

requiring user involvement in the purchase, development, and testing of programs before they are implemented is an example of a(n) control.

Answers

Requiring user involvement in the purchase, development, and testing of programs before they are implemented is an example of preventive control.

Here's why: A preventive control is a mechanism that attempts to prevent a security breach from occurring. It is proactive rather than reactive, which means it focuses on preventing problems before they occur rather than attempting to resolve them once they have occurred. As a result, preventive controls are frequently more cost-effective than corrective controls, which are reactive.

A preventive control is a method that attempts to avoid a security breach from occurring. Preventive controls are proactive rather than reactive, which means they aim to prevent issues before they happen rather than attempting to resolve them after they've happened. Preventive controls are often more cost-effective than corrective controls, which are reactive. So, requiring user involvement in the purchase, development, and testing of programs before they are implemented is an example of preventive control.

Read more about the purchase:

https://brainly.com/question/27975123

#SPJ11

we detected suspicious activity, which shows that there may be malware on this device. malware can be used to gain access to your personal account information, like your password. steps to remove the malware scan this device for malware with the antivirus software of your choice follow recommendations to remove any malware sign back in on this device only after running an antivirus scan.

Answers

We have to, we must follow the recommendations to remove any malware, get back into this device only after running an antivirus scan.

How do we remove malware with an antivirus?

Scan this device for malware with the antivirus software of your choice. Follow the recommendations to remove any malware. Sign back in to this device only after running a virus scan. Designed to cause damage or harm to a computer system or network. It is a harmful program that can infiltrate and damage or steal sensitive information from a device. As a result, it is critical to remove it as soon as possible if it is detected.

What you should do if you detect malware on your device is to run a scan with antivirus software. Antivirus software is software that looks for malware and removes it if found. A full scan will detect any viruses or malware on your computer and remove them if found.

It is important to run an antivirus scan with your preferred software to detect and remove any malware infection on your device. Steps to remove malware: Scan this device for malware with the antivirus software of your choice. Follow the recommendations to remove any malware. Re-enter this device only after running a virus scan.

See more information about malware at: https://brainly.com/question/399317

#SPJ11

a loop where the terminating condition is never achieved is called . select one: a. an infinite loop b. a universal loop c. a while loop d. a for .. ever loop

Answers

A loop where the terminating condition is never achieved is called (A) an "infinite loop".

An infinite loop is a type of programming loop that continues to execute indefinitely because the terminating condition is never met. This can occur for a variety of reasons, such as an error in the code or an incorrect condition in the loop statement. Infinite loops can cause a program to crash or become unresponsive, and they can be difficult to detect and correct. As a result, it is important for programmers to carefully test their code and use appropriate programming techniques to prevent infinite loops from occurring.

Thus, option A is the correct answer.

You can learn more about infinite loop at

https://brainly.com/question/29824958

#SPJ11

under certain conditions, you may hear a whine from the power supply when you first power up the system. however, if you hear a whine coming from the video card, how can you fix it?

Answers

You can fix a whine coming from the video card by making sure it is properly seated in its slot and that the power cables are correctly connected. If the issue persists, then you may need to replace the card.

What is a power supply?

If you hear a whine coming from the power supply when you first power up the system, it is generally acceptable, and it may not pose any significant issues. It is common in many power supplies under certain conditions. The video card may also cause a whine if it has a poor-quality voltage regulator or a high-performance processor that demands more power from the system's power supply.

You may follow the steps outlined below to fix the whine from the video card: Adjusting fan speedIf you notice a whine coming from the video card, you can attempt to modify the fan speed to solve the issue. You may use various applications to control the fan speed, such as Afterburner, MSI Afterburner, and EVGA Precision. These applications allow you to adjust the speed of the fan and monitor the GPU's temperature.

Changing the power supply. If adjusting the fan speed does not fix the whine from the video card, you may need to replace the power supply. You may consider purchasing a high-quality power supply that will provide a stable supply of energy to your system.

To learn more about power supply from here:

https://brainly.com/question/14544262

#SPJ11

the cstp are organized around six interrelated domains of teaching practice. the following are the six standards there is

Answers

The California Standards for the Teaching Profession (CSTP) are organized around six interrelated domains of teaching practice. These six standards include the following:

Engaging and Supporting All Students in LearningDomain Creating and Maintaining Effective Environments for Student LearningDomain Understanding and Organizing Subject Matter for Student LearningDomain Planning Instruction and Designing Learning Experiences for All StudentsDomain Assessing Student LearningDomain Developing as a Professional EducatorThese standards provide guidance for educators to be effective in their practice and ensure that all students receive a high-quality education.

They provide a framework for educators to engage in ongoing professional learning and reflection, in order to continuously improve their teaching practice. The California Standards for the Teaching Profession (CSTP) are designed to give all teachers a common vocabulary to define and develop their practice within. They also offer a picture of the breadth and complexity of the profession.

Learn more about teaching practice: https://brainly.com/question/30379005

#SPJ11

define a function swaprank() that takes two char parameters passed by pointer and swaps the values in the two parameters. the function does not return any value. ex: if the input is a b, then the output is: b a

Answers

To define a function swaprank() that takes two char parameters passed by pointer and swaps the values in the two parameters and does not return any value, the code can be used: void swaprank(char *a, char *b) {char temp = *a;*a = *b;*b = temp;} `

In this code, the function takes two char pointers as parameters, designated by the asterisk before the variable name. The function then swaps the values in the two parameters by creating a temporary variable, storing the value of one parameter, and then swapping the values using the pointer notation. Finally, the function returns nothing, indicated by the use of the keyword void.

Learn more about parameters: https://brainly.com/question/28249912

#SPJ11

you want to prevent users in your domain from running a common game on their machines. This application does not have a digital signature. You want to prevent the game from running even if the executable file is moved or renamed. You decide to create an Applocker rule to protect your computer. Which type of condition should you use in creating this rule?

Answers

To prevent users in your domain from running a common game on their machines, you can use AppLocker to create a rule that blocks the game's executable file from running.

Since the application does not have a digital signature, you can create a path rule that specifies the location of the executable file. To ensure that the rule applies even if the file is moved or renamed, you should use a publisher condition with a hash rule.

A publisher condition with a hash rule checks the digital signature of an executable file to ensure that it has not been tampered with or modified. Since the game does not have a digital signature, the hash rule will generate a unique identifier based on the file's content, and this identifier will be used to enforce the rule. By combining the publisher condition with the hash rule, you can prevent the game from running even if the file is moved or renamed to a different location.

You can learn more about executable file at

https://brainly.com/question/13166283

#SPJ11

Which of the following would be a valid endpoint your developers could use to access a particular Relational Database Service instance you're running in the Northern Virginia region?
A. us-east-1.amazonaws.com.rds
B. ecs.eu-west-3.amazonaws.com
C. rds.us-east-1.amazonaws.com
D. rds.amazonaws.com.us-east-1

Answers

The correct endpoint that developers could use to access a particular Relational Database Service instance you're running in the Northern Virginia region is rds.us-east-1.amazonaws.com. Thus, Option C is correct.

What is an endpoint?

An endpoint is a URL that a client app or service sends a request to and from which a response is received from the server. An endpoint can be considered as a point of entry into the server's domain. To send a request to a server, a client app or service must know the URL of its endpoint.

In the cloud, an endpoint is frequently a DNS name that allows a cloud-based service to be accessed. Some services use the DNS name as an endpoint for your resources. For instance, Amazon S3 uses the S3 endpoint to determine the bucket in which a client is operating.

Option C is correct because it follows the correct format for RDS endpoints which is "rds.<region>.amazonaws.com". The region code for Northern Virginia is "us-east-1", which is included in the endpoint. Option A is incorrect because it does not include the correct region code in the endpoint.

Option B is for ECS, a different AWS service, and Option D includes the region code in the wrong place.

Learn more about endpoint https://brainly.com/question/29164764

#SPJ11

What is the current situations with bussnisses using instant messaging

Answers

In recent years, instant messaging has grown in popularity as a method of communication in the corporate world. As the trend towards remote work has escalated due to the COVID-19 epidemic.

Instant messaging (IM) is a real-time communication tool that allows users to send and receive messages and media files over the internet quickly and effortlessly. In recent years, IM has gained popularity as a tool for fostering cooperation and communication among team members, clients, and partners, especially in the business sphere. IM has been increasingly more crucial for maintaining contacts and organising virtual meetings as distant work has increased. Compared to email, instant messaging (IM) has a number of advantages, including quicker response times, greater accessibility, and a better capacity to transmit tone and emotions. To guarantee that it is used properly in the workplace, it is crucial to use IM responsibly and to develop clear norms and guidelines.

Learn more about instant messaging here:

https://brainly.com/question/28342829

#SPJ4

A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security risks is most pressing?
(a) Non-repudiation
(b) Integrity
(c) Availability
(d) Confidentiality

Answers

The most pressing security risk in this scenario is (d) Confidentiality.

USB- A USB, or universal serial bus, is a type of hardware interface used to connect devices to computers. USB technology simplifies the process of connecting peripherals to computers by replacing a range of incompatible connectors with a single standardized plug and socket.

Security- Security is a procedure or system that is put in place to safeguard an organization, business, or individual from theft, destruction, or unauthorized access. Security is a set of measures and protocols that are designed to protect and secure an individual, organization, or business from harm, damage, or loss, as well as to provide a safe and secure environment for workers and customers. Security involves the use of technology, software, and hardware to secure digital and physical assets. Confidentiality, integrity, and availability are three principles of security.

Confidentiality- Confidentiality is the practice of keeping sensitive data, information, or communications private and secure. Confidentiality is critical in any business or organization, particularly when it comes to sensitive financial or personnel information. Confidentiality is one of the three cornerstones of security, and it helps to ensure that private information remains private.

In the scenario provided, a user copies files from her desktop computer to a USB flash drive and puts the drive in her pocket. The most pressing security risk is Confidentiality. Since the USB device is portable, it's simple for it to be lost, misplaced, or stolen, allowing any confidential data on it to be viewed by anyone who finds it. As a result, keeping sensitive information safe is critical.

Therefore, the correct answer is (d) confidentiality

To learn more about "security risk", visit:  https://brainly.com/question/31143416

#SPJ11

subtract each element in origlist with the corresponding value in offsetamount. print each difference followed by a space. ex: if the input is: 4 5 10 12 2 4 7 3 the output is: 2 1 3 9. import java.util.Scanner;
public class VectorElementOperations {
public static void main (String [] args) {
final int NUM_VALS = 4;
int[] origList = new int[NUM_VALS];
int[] offsetAmount = new int[NUM_VALS];
int i;

Answers

The following is the Java code that subtracts each element in origlist with the corresponding value in offsetamount and prints each difference followed by a space. Example of Java code:

import java.util.Scanner;

public class VectorElementOperations

{

     public static void main (String [] args)

      {  

           final int NUM_VALS = 4;

           int[] origList = new int[NUM_VALS];  

           int[] offsetAmount = new int[NUM_VALS];  

           int i;  

           Scanner scnr = new Scanner(System.in);

            for (i = 0; i < origList.length; ++i)

           {  

                  origList[i] = scnr.nextInt();  

            }    

           for (i = 0; i < offsetAmount.length; ++i)

           {    

              offsetAmount[i] = scnr.nextInt();    

           }  

          for (i = 0; i < origList.length; ++i) {    

           System.out.print((origList[i] - offsetAmount[i]) + " ");    

         }

   }

}

-The Scanner class is used to read input from the user.

-The code prompts the user to input the values in the two arrays origList and offsetAmount.

-It then subtracts each element in origlist with the corresponding value in offsetamount.

-It prints each difference followed by a space.

Learn more about the Scanner class here: https://brainly.com/question/29640971

#SPJ11

he police was able to identify the outgoing numbers dialed by an individual that was under investigation by using the electronic pulses of the phone. Which of the following is likely the device the police used?
A. Crime scene technology
B. Less-lethal device technology
C. Information Technology
D. Database Technology

Answers

The device the police likely used to identify the outgoing numbers dialed by an individual that was under investigation by using the electronic pulses of the phone is Information Technology. The correct option is C.

What is Information Technology?

Information Technology (IT) is the use of any computers, storage, networking, and other physical devices, infrastructure, and processes to create, process, store, secure, and exchange all forms of electronic data. This includes voice, text, images, and video.

Electronic Pulses: An electronic pulse, also known as a signal, refers to a specific, brief variation in the electrical charge of a circuit.

Database Technology: Database technology pertains to the principles, algorithms, tools, techniques, and practices used in the design, implementation, and management of large-scale data management systems.

Crime scene technology: This refers to the collection and analysis of data obtained from a crime scene in order to determine what occurred and the people involved.

Less-lethal device technology: Less-lethal device technology, as the name suggests, refers to devices that are utilized in law enforcement scenarios to limit an individual's movements or render them temporarily incapacitated without causing any severe bodily harm or death.

Therefore, the correct option is C.

Learn more about Information Technology here:

https://brainly.com/question/14426682

#SPJ11

// TO DO: add your implementation and JavaDocs.
//These are all the imports you are allowed, don't add any more!
import java.util.Scanner;
import java.io.File;
import java.io.IOException;
import java.util.Iterator;
public class StockMonitor {
// NO ADDITIONAL CLASS/INSTANCE MEMBERS SHOULD BE ADDED
// YOU CAN ADDITIONAL PRIVATE HELPER METHODS
public ThreeTenDLList fileToPriceList(String filename) throws IOException {
//Given a file name, open that file in a scanner and create a list of prices:
// - the values in the list should be the integers read in each time you call
// nextInt() on the scanner;
// - from head to tail, the values should follow the order from the input file
// return an empty list if file is empty
//default return, remove or updated as needed
Scanner scanner = new Scanner(new File(filename));
ThreeTenDLList priceList = new ThreeTenDLList<>();
while (scanner.hasNextInt()) {
priceList.addTail(scanner.nextInt());
}
// Close the scanner
scanner.close();
// Return the price list
return priceList;
}
public int stepProcess(int day, int price) {
//perform one step of span measurement:
// - determine and return the span of the given day and price using recordStack
// - additional updates to perform:
// - add the measured span to the back of spanList
// - add the pair of to the top of recordStack
// - update priceSpanMap as needed to ensure it always records the max span
// of each price we have processed
//
// Assume day and price are always non-negative
//
// With your implementation of this method, the updating loop in runPrograms()
// should be O(n) in non-debug mode (i.e. excluding printing overhead)
// where n is the number of prices processed
// - assume hashMap updating and searching is O(1)
//default return, remove or updated as needed
// Initialize the span to 1
int span = 1;
// Check if the price is already in the map
if (priceSpanMap.containsKey(price)) {
// If it is, increment the span by the maximum span seen so far for this price
span += priceSpanMap.get(price);
}
// Update the price span map with the new span for this price
priceSpanMap.put(price, span);
// Add the pair to the top of the record stack
recordStack.push(new Pair<>(day, price));
// Return the span
return span;
}
public int reportMaxSpan(int price){
// Use priceMap to find out and return the current max span for the given price
// if price is not present in priceMap, return 0
// O(1) if hashMap searching is O(1)
//default return, remove or updated as needed
// Check if the price is in the map
if (priceSpanMap.containsKey(price)) {
// If it is, return the maximum span seen so far for this price
return priceSpanMap.get(price);
} else {
// Otherwise, return 0
return 0;
}
}
public String spanRecordToString(){
// return a string to report the max span of each price in priceList
// - only report each price once
// - follow the same order as the first occurence of each price
// - each price report should use the same format of "price:maxSpan"
// - a single space should be padded between price reports
// - no leading or trailing whitespaces in the return string
// - return an empty string if priceList is empty
// O(n) where n is the length of price list
// - assume hashMap updating and searching is O(1)
//
//default return, remove or updated as needed
return null;
}
public static void testMain() {
//edit this as much as you want, if you use main without any arguments,
//this is the method that will be run instead of the program
System.out.println("You need to put test code in testMain() to run StockMonitor with no parameters.");
}
Include java docs please

Answers

Answer:

THE ANSWER IS B

Explanation:CORRECT ME IF IM WRONG

in python. write some code that repeatedly reads a value from standard input into the variable response untill at last y or y or n or n had been entred

Answers

Here's some code that will repeatedly prompt the user to input a value until either 'y', 'Y', 'n', or 'N' is entered:

The Python Program

response = ''

while response not in ['y', 'Y', 'n', 'N']:

   response = input("Enter 'y' or 'n': ")

The response variable is initialized to an empty string, and the while loop will continue to prompt the user for input as long as the response is not one of the valid options.

Once a valid option is entered, the loop will exit and the program will continue executing.

Read more about python here:

https://brainly.com/question/26497128

#SPJ1

Ava Is Unable To Pull Up Her Company's Website, Theoretical.Com, In Her Web Browser. She Wants To Check That The Server Is Online And Responding To Requests. Which Of The Following Could She Try? A. Use The Command: Dig Theoretical.Com B. Ping The IP Address Of The Web Server C. Use The Man Command To Look Up The Online Status Of The Web Server D. Use The command nslookup theoretical . com

Answers

Ava is unable to pull up her company's website, Theoretical.com, in her web browser, she could try using the command "ping the IP address of the web server."Option B, "Ping the IP address of the web server" is the correct option.

As it will help to check the server's online status and response time. Ping is a networking utility that is used to check if a particular IP address is available online and measure the round trip time for data to be sent from a source to a destination device and back.The other options, such as using the command "dig Theoretical.com," using the man command to look up the online status of the web server, and using the command "nslookup Theoretical.com" may be used for other purposes but they will not help to check the server's online status and response time. Therefore, option B is the correct option.

Learn more about  troubleshooting a website connectivity issue:https://brainly.com/question/17898582

#SPJ11

Zachariah has been asked to assess whether the backup process at his organization is sufficient to meet all of the company's goals and objectives, which support their key performance indicators. One of the topics that he is analyzing is the frequency of backups to ensure that the company does not lose any more than 6 hours of data in the case of a hard drive or other system failure. Which of the following describes the particular metric that he is concerned about?
a. RPO b. RTO c. MTTR d. MTBF

Answers

The metric Zachariah is analyzing to ensure the company does not lose more than 6 hours of data in the case of system failure is the Recovery Point Objective (RPO).

The Recovery Point Objective (RPO) refers to the amount of data that can be lost without causing irreparable damage to an organization. RPO is the amount of time between each backup and the maximum acceptable amount of data loss measured in time.

The other metrics that could have been considered are:

Recovery Time Objective (RTO): The targeted duration of time and service level within which a business process must be restored after a disaster or disruption.

Mean Time To Repair (MTTR): The average amount of time required to repair a failed component or device.

Mean Time Between Failures (MTBF): The predicted elapsed time between inherent failures of a system during operation.

If an organization does not have a backup plan in place, they risk losing a significant amount of data. The RPO is calculated in terms of time, and it represents the maximum amount of data loss that can be sustained before the organization's objectives are no longer achievable. When backups are performed, the RPO is an important consideration, as it is used to ensure that the organization's data is protected.

Learn more about Recovery Point Objective here:

https://brainly.com/question/15172767

#SPJ11

nikita attempts to install a hypervisor on her laptop. when she tries to create a virtual machine an error message suggests that virtualization is not supported. where can she check to see if virtualization is enabled?

Answers

To check if virtualization is enabled on your laptop, you can check in the BIOS settings. Typically, this setting is located under the Advanced tab. However, it can differ depending on the make and model of your laptop.



What is virtualization?

Virtualization is the technology that allows multiple operating systems to run on the same physical computer simultaneously. The hypervisor is the software that makes virtualization possible by sitting between the computer hardware and the operating system .However, before installing a hypervisor and running a virtual machine, one must check whether their laptop supports virtualization. It can be checked in the BIOS settings. To enter the BIOS settings, restart the computer and press the appropriate key to enter the BIOS setup utility during the startup process. The key to press may vary depending on the manufacturer and model of the laptop

.Inside the BIOS, navigate through the options and look for a setting that refers to virtualization. The name may vary depending on the laptop model, and the option may be under advanced or security settings. If the virtualization option is not present in the BIOS, the laptop may not support it, and therefore, it cannot run a hypervisor or virtual machines.

Read more about the virtualization :

https://brainly.com/question/27939176

#SPJ11

external hard disks use different technology than internal hard disks. falase or true?

Answers

The claim that "external hard discs use different technology than internal hard discs" is untrue because external hard drives frequently employ the same technology as inside hard discs.

The term "technology" describes the practical application of scientific knowledge, particularly in the creation of tools, machines, systems, and processes. Information technology, engineering, biology, and materials science are just a few of the many subjects that make up technology. Almost every element of contemporary life has been impacted by technology, including how we interact, how we get information, how we work, how we travel, and even how we think. Technology advancements have made it possible for us to do activities more quickly, find solutions to challenging issues, and make substantial strides in industries like healthcare, education, and energy. To assure a sustainable future, technology also brings with it issues like cybersecurity, moral quandaries, and environmental effects.

Learn more about technology here:

https://brainly.com/question/14529761

#SPJ4

_____ can be examined in both simple bivariate designs and longitudinal designs?A) Autocorrelation, B) Cross-sectional Correlation, C) Cross-lag Correlation, D) Sequential Correlation

Answers

Cross-sectional and longitudinal design elements are combined in cross-sequential designs. They are also referred to as accelerated, mixed, and sequential longitudinal designs.

Why is a multivariate design referred to as a longitudinal design?

The reason longitudinal designs are multivariate is because they actually test four variables overall, even if they only examine the bare minimum of two variables to check for correlation.

Does the longitudinal design have a correlation?

In longitudinal studies, a sort of correlational research, researchers watch and gather information on numerous factors without attempting to change them. There are a range of different types of longitudinal studies: cohort studies, panel studies, record linkage studies.

To know more about longitudinal design visit:-

brainly.com/question/29740624

#SPJ1

You have been contacted by OsCorp to recommend a wireless internet solution. The wireless strategy must support a transmission range of 150 feet, use a frequency range of 2.4 GHz, and provide the highest possible transmission speeds. Which of the following wireless solutions would you recommend?802.11g802.11n802.11b802.11a802.11n

Answers

Based on the given requirements of a 150-feet transmission range and 2.4 GHz frequency range, it is recommended to use 802.11n as the wireless solution for OsCorp. Option B is the correct answer.

802.11n can operate on both 2.4 GHz and 5 GHz frequency bands, providing a maximum transmission range of 230 feet and the highest possible transmission speeds among the options listed. It also offers improved reliability and reduced interference compared to older standards, making it a suitable choice for OsCorp's wireless needs.

Thus, the correct answer is B. 53.

You can learn more about wireless solution at

https://brainly.com/question/1347206

#SPJ11

Which of the following is a key difference in controls when changing from a manual system to a computer system?A. Internal control objectives differ.B. Methodologies for implementing controls change.C. Internal control principles change.D. Control objectives are more difficult to achieve.

Answers

"Methodologies for implementing controls change"is a key difference in controls when changing from a manual system to a computer system. The correct answer is B.

When changing from a manual system to a computer system, the key difference in controls is the methodology for implementing those controls. In a manual system, controls may be implemented through procedures, forms, and physical security measures. In a computer system, controls may involve access controls, authentication, encryption, backups, and audit trails, which are implemented using software and hardware controls.

While the internal control objectives and principles remain the same, the specific controls needed to achieve those objectives and principles may differ when transitioning to a computer system. Additionally, control objectives may become more challenging to achieve due to the increased complexity and potential for errors in computer systems.

The correct answer is B.

You can learn more about computer system at

https://brainly.com/question/22946942

#SPJ11

How would this program be affected if the on button block were deleted from
the code?
on menu ▼ button pressed
show long text Hello
bottom
A. Text would be shown, but it would not be the text "Hello."
OB. No text would be shown when the "Menu" button was pressed.
OC. The text would be shown without the player pressing the "Menu"
button.
D. Nothing would change, because the on button block does not have
a specific purpose in a game.

Answers

Answer:

B

Explanation:

I just recently learned a bunch of coding and programming skills but don't remember if this is the correct answer or not...

I used Khan Academy.

Other Questions
Gray and White Matter of the Spinal Cord Each label describes either the gray matter or white matter of the spinal cord. Drag each label to the appropriate box Functions to transmit Contains somas electrical signals over Lateral horn synapses, and Ventral hom Gracile fasciculus long distances dendrites Functions to integrate arriving electrical signals Corticospinal tract Posterior column Marked by low myelination Contains myelinated axons Gray Matter White Matter Ventral horn Posterior column Lateral horn Gracile fasciculus White Matter Gray Matter Ventral horn Posterior column Lateral horn Gracile fasciculus x What are the dimensions of organizational climate? Discuss the challenges that both interviewees mentioned their blended family faced that traditional families might not. 21. Reverse Chronological Resume requires:a. starting with your very first job and listing them in orderb. listing your most recent job firstc. not including volunteerismd. only listing your most recent job Which of the following would be LEAST useful in correlating the ages of these two sequences of rocks?a. numeric ages on the volcanic rocks on topb. the pattern of magnetic reversals (R and N)c. the overall sequence of the upper three layersd. the type of material present in the landslide at the bottom of the right column Question 2) Complete the paragraph by using proper subject verbagreement.Most Indians believe that your name(be) the name the world will call you forever. Theythat choosing a name for a child(be) very important because itvery seriously. We oftenOur name(believe)(be) something that should be taken(has) strong feelings about our name.(be). Some of us(be) part of who we(do) notlike our names and would like to change them. But we can't change our namesas they(be) used in papers since our birth. If we strongly(want) to change them we(has) to fulfill some legal formalities. How did McNeil and the other civil rights activists respond to their treatment at the Woolworth's lunch counter? B. Turn & Talk: How does this story support McNeil's definition of activism? A box of chocolates has 8 red, 12 blue, 5 green and 10 yellow. Express the number of chocolates asratios in their lowest terms.a. red: yellowb.green: yellowc. red: total chocolates When the bicycle manufacturer Trek determined that some consumers use bikes for green transportation whereas others use them for a hobby, it was most likely assessing the _____ of its bicycles to consumers. -brand equity -associated services -brand awareness -core customer value -physical characteristics When making a prediction about reading, students should make a(n) educational guess about what is likely to happen next. An educated prediction is one that is made based on information and experience. Hence, such a guess is more likely to be correct. all the photons produced in the sun's core have been absorbed by the outer edge of what region of the sun? which teams were involved in the 2023 trade for the nba player kyrie irving? As with all financial decisions, a firm should try to set a capital structure that maximzes the stock price, or shareholder value. This is called the optimal capital strucutre; it is also the debt-equity mix that:a. Maximizes the WACCb. Maxmizes the net incomec. maximizes the dividendsd. Minimizes the WACC When the price of radios decreases 5%, quantity demanded increases 5%. The price elasticity of demand for radios is ________ and total revenue from radio sales will ________. What is the solution to -1/2 [x-1] =0?x=1x=-1 or x=1x=1 or x=2No solutions exists 1. What explanation does Cheever give for Parris' "mad look"? true or false unless specific sales criteria are met, the factoring of accounts receivable with recourse is accounted for as a loan. calculate the mass of butane needed to produce 46.0 g of carbon dioxide. What happens when the Federal Reserve increases the interest rate on bank deposits? on april 25, foreman electric installs wiring in a new home for $3,500 on account. however, on april 27, foremans electrical work does not pass inspection, and foreman grants the customer an allowance of $600 because of the problem. the customer makes full payment of the balance owed, excluding the allowance, on april 30.1. Record the Journal entries for the above information2. calculate net revenue associated with these transactions