PP 11.1 – Write a program that creates an exception class called StringTooLongException, designed to be thrown when a string is discovered that has too many characters in it. In the main driver of the program, read strings from the user until the user enters "DONE". If a string is entered that has too many characters (say 20), throw the exception. Allow the thrown exception to terminate the program.

Answers

Answer 1

Answer

The answer and procedures of the exercise are attached in the following archives.

Step-by-step explanation:

You will find the procedures, formulas or necessary explanations in the archive attached below. If you have any question ask and I will aclare your doubts kindly.  

PP 11.1 Write A Program That Creates An Exception Class Called StringTooLongException, Designed To Be

Related Questions

Meager Media is a small- to medium-sized business that is involved in the sale of used books, CDs/DVDs, and computer games. Meager Media has stores in several cities across the U.S. and is planning to bring its inventory online. The company will need to support a credit card transaction processing and e-commerce website.Write a summary report detailing what Meager Media must do when setting up its website to maintain compliance with PCI DSS. Obtain a copy of the PCI DSS document from the following website and address all 6 principles and 12 requirements in your report:

Answers

Meager Media must comply with six control objectives and twelve requirements of PCI DSS for its e-commerce website, including building a secure network, protecting cardholder data, maintaining a vulnerability management program, implementing strong access control measures, regularly monitoring and testing networks, and maintaining an information security policy.

PCI DSS Compliance for Meager Media

Meager Media, a company planning to expand its operations into the e-commerce space, must adhere to the Payment Card Industry Data Security Standard (PCI DSS) compliance requirements. PCI DSS has six control objectives that encapsulate 12 key requirements for security.

Breakdown of PCI DSS Requirements

Build and Maintain a Secure Network: Implement a firewall to protect cardholder data and ensure that system passwords are not defaults.Protect Cardholder Data: Encrypt transmission of cardholder data across public networks and protect stored data.Maintain a Vulnerability Management Program: Use anti-virus software and develop secure systems and applications.Implement Strong Access Control Measures: Restrict access to cardholder data by business need-to-know, assign unique IDs to those with computer access, and restrict physical access to cardholder information.Regularly Monitor and Test Networks: Track and monitor all access to network resources and cardholder data, test security systems and processes regularly.Maintain an Information Security Policy: Establish, publish, maintain, and disseminate a security policy.

To comply with these requirements, Meager Media must ensure that its IT infrastructure is robust, secure, and capable of protecting sensitive customer information. This includes regular updates, monitoring, and security training for staff. Additionally, Meager Media must engage in regular PCI compliance assessments to ensure ongoing adherence to these standards.

P6. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second frame at step 2, rather than at step 1. What rationale might the designers of CSMA/CA have had in mind by having such a station not transmit the second frame immediately (if the channel is sensed idle)?

Answers

Answer:

To avoid collision of transmitting frames.

Explanation:

CSMA/CA, carrier sense multiple access is a media access control protocol of wireless networks that allows for exclusive transmission of frames and avoidance of collision in the network. When a frame is not being sent, nodes listening for an idle channel gets their chance. It sends a request to send (RTS) message to the access point. If the request is granted, the access point sends a clear to send (CTS) message to the node, then the node can transmit its frame.

Many nodes on a wireless network are listening to transmit frames, when a frame is transmitting, the node has to wait for the access point to finish transmitting, so it sends a RTS message again to exclusively transmit a second frame.

How does the practice of storing personal genetic data in privately owned computer databases raise issues affecting information ownership and property-rights?

Answers

Answer:company privacy policy change, third party access, non-effective laws, database hacking

Explanation:

Company privacy policy:company privacy policy protecting consumer information may not be strong enough, and may also change unfavourably in the future depending on certain factors.

Third party access: company may be pressurized by law enforcement/government to release genetic data for state purposes.

Non-effective laws: state laws guarding genetic information of individuals might not be broad enough as to be effective.

Database hacking: company/private database might be a victim of computer hacking.

A data is a ____ large scale collection of data that contains and organizes all of an organizations data in one place.

Answers

Answer:

"Warehouse" is the correct answer for the given question.

Explanation:

The warehouse is the process that organized the data of the organizations or large data in one place. In the Data Warehouse, it organized and integrated the data from an organization or other sources in the one placed.

The main aim of Warehouse is to organized the data in one place which is used for the process of decision-making activity. The following are the function of the warehouse which is given below.

Extraction of data. Cleaning of data. Transformation of the data. Loading the data. Updating the data.

What command is used to generate an RSA key pair?
a. generate key-pair
b. crypto
c. generate rsa key
d. crypto key generate rsa

Answers

Answer:

D) crypto key generate rsa

Explanation:

In cryptography, the RSA refers to Rivest–Shamir–Adleman. This is an algorithm used for encrypting and decrypting messages in computers thereby ensuring secured transmission of data. In order to generate an RSA key pair, you will use the command crypto key generate rsa while in the global configuration mode. This command has the following syntax:

crypto key generate rsa [general-keys| usage-keys| signature| encryption] [labelkey-label] [exportable] [modulus modulus-size] [storage name of device:][redundancy][on name of device:],

with each parameter having its description

Write a program that prompts the user to input a string.


The program then uses the function substr to remove all the vowels from the string.


For example, if str = "There", then after removing all the vowels, str = "Thr".


After removing all the vowels, output the string.


Your program must contain a function to remove all the vowels and a function to determine whether a character is a vowel.

Answers

Answer:

#include <iostream>

using namespace std;

bool is_vowel(char c)

{

   switch(c)  //switch case to check if vowel is present

   {

       case 'a':

       case 'A':

       case 'e':

       case 'E':

       case 'i':

       case 'I':

       case 'o':

       case 'O':

       case 'u':

       case 'U': return true;

                 break;

       default : return false;

       

   }

}

string remove_vowel(string input)

{

   string str="";

   for(int i=0;input[i]!='\0';i++)

   {

       if(!is_vowel(input[i]))  //if vowel then not copied to substring

           str+=input[i];

   }

   return str;

}

int main()

{

   string str;

   cout<<"Enter string\n";

   cin>>str;

   cout<<"\nAfter removal of vowels substring is : "<<remove_vowel(str);  //substring is returned

   return 0;

}

OUTPUT :

Enter String

There

After removal of vowels substring is : Thr

Explanation:

The above program contains two methods in which one is is_vowel() which checks if the passed character is a vowel or not and the other method is remove_vowel() which removes all vowels from the string and returns a string which does not contain any vowel. This method passes every character of the string to the is_vowel() method and if false then it copies the character to the new string. At last, it returns a new string.  

This program prompts the user to input a string and removes all the vowels from it using custom functions.

Remove Vowels from a String Program

This program will prompt the user to input a string and then remove all the vowels from it using the substr function. Here is the step-by-step explanation:

Step-by-Step Explanation:

Define a function to determine if a character is a vowel.

Define a function to remove all the vowels from the string.

Prompt the user to input a string.

Apply the function to remove vowels from the string.

Print the modified string.

Example Code in Python:

def is_vowel(char):

   vowels = "aeiouAEIOU"

   return char in vowels

def remove_vowels(string):

   return ''.join([char for char in string if not is_vowel(char)])

def main():

   user_input = input("Enter a string: ")

   result = remove_vowels(user_input)

   print("String after removing vowels:", result)

if __name__ == "__main__":

   main()

In this code, the is_vowel function checks if a character is a vowel. The remove_vowels function creates a new string without vowels by filtering characters. Finally, the user input is processed, and the result is displayed.

To use an ArrayList in your program, you must import:1. the java.collections package2. the java.awt package3. Nothing; the class is automatically available, just like regular arrays.4. the java.util package5. the java.lang package

Answers

Answer:

Option 4: the java.util package

Explanation:

Java Array List is not imported by default and therefore we need to import java.util package. Array List is one of the Java predefined collections used to store a group of entities.

One advantage offered by Array List compared with a normal array is that an item can be dynamically added into the list without recreating a new list. Besides, array list also offered some built in methods to manipulate the elements within the list that can save a project development time.

The largest signed integer number, base 16, that can be store in a variable of type BYTE is___________.

Answers

Answer:

7F is largest signed integer number, base 16, that can be store in a variable of type BYTE.

Explanation:

A BYTE has 8bits and it signed value ranges from -128 to 127. thus the largest maximum signed integer number, that can be store in a variable of type BYTE is 127.

Base 16 value for the decimal value of 127 is 7F.

Therefore 7F is largest signed integer number, base 16, that can be store in a variable of type BYTE.

NetSecIT is a multinational IT services company consisting of 120,000 computers that have Internet access and 45,000 servers. All employees communicate using smartphones and email. Many employees work from home and travel extensively. NetSecIT would like to implement an asymmetric general-purpose encryption technology that is very difficult to break and has a compact design so that there is not a lot of overhead. What encryption solution that best meets the company's needs and justify the recommendation?

Answers

Answer and Explanation:

Basically, NetSecIT is a software house where employees are connecting with each other through 120,000 computers and 45,000 servers. They are communicating using smartphones and email. For this purpose, NetSecIt implements asymmetric encryption in their software house. Lets us clear the Asymmetric Encryption first.

Asymmetric Encryption

Asymmetric encryption is used for encrypting and digitally signing data.It involved in communication as well. It has two major algorithm which has been used according to situation.  

Major Algorithms are

Diffie-Hellman key agreement (DH) Rivest Shamir Adleman (RSA) Elliptic Curve Cryto graph y (ECG) Digital Signature Algorithm (DSA)    

Diffie-Hellman key agreement (DH)

DH is not for encryption and decryption of data but it is used when two parties are involved in communication. they generate a key for exchange the information.

For example  

we have two parties that is Q1 and Q2  

Both parties had choose two integers p and l then  

1<p<l.

Q1 chooses randomly an integer i and send it to Q2 using variable p B=a^i

Q2 chooses a randomly an integer j and send it to Q1 using variable p C=a^j

Q1 computes m1 = B^i mode l

Q2 computes m2 = C^i mode l

then m1 and m2 are secret keys.

Similarly  

Rivest Shamir Adleman (RSA)

RSA is using for encryption and decryption.  

Elliptic Curve Cryto graph y (ECG)

is basically used for smaller devices like cell phones.It requires less computing power compared with RSA. ECG based on a curve that contain public / private key pair

Digital Signature Algorithm (DSA)

DSA is used for creating some digital signals faster than validating it.

All these algorithm has been used for encryption  

So as NetSecIt has a general purpose of using encryption technology so after a brief description of asymmetric encryption you can see that its some algorithm have better impact on the situation such as Digital Signature Algorithm DSA , RSA and Elliptic Curve Cryto graph y (ECG). So company has to used some algorithm for using asymmetric algorithm in their company then they will communicate with their employee and employee communicate using smartphone and email.Hence proved encryption solution is a best meet the company's needs.

Final answer:

NetSecIT should consider RSA or Elliptic Curve Cryptography for asymmetric encryption, with ECC being more efficient due to smaller key sizes, beneficial for the extensive infrastructure and mobile use. Coupled with stronger security measures like two-factor authentication and employee education, this will bolster the company's defense against security breaches.

Explanation:

The encryption solution that best meets NetSecIT's needs is likely to be the RSA algorithm or Elliptic Curve Cryptography (ECC). Both RSA and ECC are types of asymmetric encryption which are highly secure and used widely for protecting sensitive communications. Considering the company's requirement for a compact design with less overhead, ECC may have an advantage, as it provides comparable strength to RSA but with smaller key sizes, making it more efficient and better suited for use across the company's 120,000 computers, 45,000 servers, and mobile communications. Implementing such an encryption along with promoting increased security measures like two-factor authentication, stronger passwords, and educating employees to avoid scams will enhance the company's security posture significantly in an era where online privacy and security breaches are a major threat to entities.

Assume all memory accesses are cache hit. 20% of the Load instructions are followed by a dependent computational instruction, and 30% of the computational instructions are also followed by a dependent computational instruction. 20% of the branch instructions are unconditional, while 80% are conditional. 40% of the conditional branches are taken, 60% are not taken. The penalty for taking the branch is one cycle. If data forwarding is allowed, what is the instruction throughput for pipelined execution?

Answers

Answer:

i hope it will help you!

Explanation:

A developer has completed work in the sandbox and is ready to send it to a related org. What is the easiest deployment tool that can be used?Select one:a. Force.com Migration Toolb. Change Setsc. Unmanaged Packagesd. Force.com IDE

Answers

Answer:

b. Change Sets

Explanation:

Change Sets belongs to a group of tools provided by Salesforce to migrate data between organizations. It's such an easy and quick way to exchange metadata from an origin organization to a target organization via a shared production instance (in this case, the sandbox). The benefits you get with this tools are:

Graphical User Interface.User-friendly system (quick and simple process).Easy to learn.No extra charges to use this tool (is included in the Salesforce subscription).

A rootkit uses a directed broadcast to create a flood of network traffic for the victim computer.a. Trueb. False

Answers

Answer:

The following statement is False.

Explanation:

The following statement is not true because the rootkit is an application that provides unauthorized access to the computer or any program and it is the software that is intended to harm the computer system. So, that's why the rootkit is not used to create a flood of the network traffic in the user's system.

g Which statement is true about the difference between combinational logic circuits and sequential logic circuits? A) Combinational circuits combine the inputs and the outputs, but sequential circuits combine the outputs only after generating the inputs. B) Combinational circuits are more complicated than sequential circuits. C) Combinational circuits have feedback, but sequential circuits do not. D) If you know the values of the inputs to a combinational circuit, you can tell what the outputs must be, but a sequential circuit can have different outputs for the same set of input values. E) Combinational circuits are edge triggered, but sequential circuits are level sensitive.

Answers

Answer:

D.

Explanation:  

In combinational circuits, the current output values are always the same for the same set of input values, regardless the previous values.

We say that combinational circuits have no memory, or that the circuit has no feedback from the outputs.  

For sequential circuits, on the contrary, the current output values are not based in the current input values only, but on the previous output values as well.

So, the fact of having a defined set of input values at a given moment, doesn't guarantee which the output values will be.

We say that sequential circuits have memory, or that they have feedback from the outputs.

Examples of these type of circuits are R-S, J-K, D or T flip-flops.

Final answer:

The correct answer is D) If you know the values of the inputs to a combinational circuit, you can tell what the outputs must be, but a sequential circuit can have different outputs for the same input values because it has memory.

Explanation:

The statement that is true about the difference between combinational logic circuits and sequential logic circuits is: D) If you know the values of the inputs to a combinational circuit, you can tell what the outputs must be, but a sequential circuit can have different outputs for the same set of input values. Combinational circuits are logic circuits whose outputs only depend on the current state of their inputs, not on previous inputs or outputs. On the other hand, sequential circuits include memory elements and their outputs depend on both the current and the past inputs, which means they have a state or memory of past events.

Which of the following processes should Angel use to merge cells A1:D4 to create a title?
A. Highlight cells A1:D4, right-click and select Format Cells, click Number, and choose the Merge cells option.
B. Highlight cells A1:D4, click on the Home tab, and click on the Merge cells icon in the Styles group.
C. Highlight cells A1:D4, click on the Home tab, and click on the Wrap text icon in the Alignment group.
D. Highlight cells A1:D4, right-click and select Format Cells, click Alignment, and choose the Merge cells option.

Answers

Answer:

Highlight cells A1:D4, right-click and select Format Cells, click Alignment, and choose the Merge cells option.

Explanation:

We merge cells with the help of following methods.

Method 1  

Highlight cells A1:D4click on the Home tabclick on the Merge and Center icon in the Alignment group

1st method is not given in options of question.

Method 2

Highlight cells A1:D4 right-click and select Format Cells click Alignmentchoose the Merge cells option

2nd method is matching with option D. So, Option D is the answer.

A rectangular range of cells with headings to describe the cells' contents is referred to as a?

A. bar chart.
B. complex formula.
C. table.
D. sparkline.

Answers

Answer:

Table

Explanation:

A table of information is a set of rows and columns. It is a way of displaying information.

For example if we want to organize the information in the rows and columns then we should make the table. These rows and columns are formed cells and cells gathers to make a table.

A rectangular range of cells with headings to describe the cells' contents is referred to as a Table.

Suppose that infile is an ifstream variable and it is associated with the file that contains the following data: 27306 savings 7503.35. Write the C11 statement(s) that reads and stores the first input in the int variable acctNumber, the second input in the string variable accountType, and the third input in the double variable balance.

Answers

Answer:

The C++ code is given below. The highlighted code is essential for reading the file. Appropriate comments given guide for better understanding

Explanation:

// reading a text file

#include <iostream>

#include <fstream>

#include <string>

using namespace std;

int main ()

{

int acctNumber;

string accountType;

double balance;

// openfile

ifstream infile ("inputfile.txt");

 

if (infile.is_open())

{

while (true)

{

 

// reading from file

infile >> accountType;

infile >> accountType;

infile >> balance;

// break loop when end of file reached

if( infile.eof() )

break;

}

// close file

infile.close();

}

else

cout << "Unable to open file";

return 0;

}

Write a program that takes a date as input and outputs the date's season. The input is a string to represent the month and an int to represent the day.

Answers

Answer:

void season(char * month, int day){

if(strcpy(month, "January") == 0 || strcpy(month, "February") == 0)

printf("Winter\n");

else if(strcpy(month, "March") == 0){

if(day < 20)

printf("Winter\n");

else

printf("Spring\n");

}

else if(strcpy(month, "April") == 0 || strcpy(month, "May") == 0)

printf("Spring\n");

else if(strcpy(month, "June") == 0){

if(day < 20)

printf("Spring\n");

else

printf("Summer\n");

}

else if(strcpy(month, "July") == 0 || strcpy(month, "August") == 0)

printf("Summer\n");

else if(strcpy(month, "September") == 0){

if(day < 20)

printf("Summer\n");

else

printf("Autumn\n");

}

else if(strcpy(month, "October") == 0 || strcpy(month, "November") == 0)

printf("Autumn\n");

else if(strcpy(month, "December") == 0){

if(day < 20)

printf("Autumn\n");

else

printf("Winter\n");

}

}

Explanation:

I am going to write a C program for this.

I am going to use the function strcpy, from the library string.h, to compare strings. It returns 0 when strings are equal.

I am going to say that the season change happens at day 20, in March, June, September and December

void season(char * month, int day){

if(strcpy(month, "January") == 0 || strcpy(month, "February") == 0)

printf("Winter\n");

else if(strcpy(month, "March") == 0){

if(day < 20)

printf("Winter\n");

else

printf("Spring\n");

}

else if(strcpy(month, "April") == 0 || strcpy(month, "May") == 0)

printf("Spring\n");

else if(strcpy(month, "June") == 0){

if(day < 20)

printf("Spring\n");

else

printf("Summer\n");

}

else if(strcpy(month, "July") == 0 || strcpy(month, "August") == 0)

printf("Summer\n");

else if(strcpy(month, "September") == 0){

if(day < 20)

printf("Summer\n");

else

printf("Autumn\n");

}

else if(strcpy(month, "October") == 0 || strcpy(month, "November") == 0)

printf("Autumn\n");

else if(strcpy(month, "December") == 0){

if(day < 20)

printf("Autumn\n");

else

printf("Winter\n");

}

}

If a voice call has missing data it makes it hard to understand the speaker. Therefore, we commonly allow time for a limited number of retransmissions before playing the sound to the listener. If the network path (in each direction) has total packetization delay of 15ms, total propagation delay of 25ms, and queuing delay varying between 0ms and 10ms, how large (in milliseconds) does the playback buffer need to be if we want to allow for one retransmission?

Answers

Answer:

There will be a playback buffer of 100ms due to re-transmission.

Explanation:

Video and audio packets needs to be reliable in a network, so a connection oriented protocol like TCP (transmission control protocol) is always configured for this case.

Delays in the transmission of packets can be noticeable with regards to videos and audios and they can be calculated and configured when necessary.

In this scenario, there is a re-transmission of a dropped packet, so it is not acknowledged by the receiver. An ICMP message is sent to the source with a delay of;

total delay to source: packetization delay + propagation delay + queuing delay

                                =   15ms +  25ms  +  10ms      = 50ms

Re-transmitting to the receiver, in equal condition, takes the same amount of time

        Total delay after re-transmission = 2 × 50   = 100ms.

So the maximum delay is 100ms

Describe how tuples can be useful with loops over lists and dictionaries, and give Python code examples. Create your own code examples.

Answers

Answer:

The explained gives the merits of tuples over the lists and dictionaries.

Explanation:

Tuples can be used to store the related attributes in a single object without creating a custom class, or without creating parallel lists..

For example, if we want to store the name and marks of a student together, We can store it in a list of tuples simply:

data = [('Jack', 90), ('Rochell', 56), ('Amy', 75)]

# to print each person's info:

for (name, marks) in data:

       print(name, 'has', marks, 'marks')

# the zip function is used to zip 2 lists together..

Suppose the above data was in 2 parallel lists:

names = ['Jack', 'Rochell', 'Amy']

marks = [90, 56, 75]

# then we can print same output using below syntax:

for (name, marks) in zip(names, marks):

       print(name, 'has', marks, 'marks')

# The enumerate function assigns the indices to individual elements of list..

# If we wanted to give a index to each student, we could do below:

for (index, name) in enumerate(names):

       print(index, ':', name)

       

# The items method is used in dictionary, Where it returns the key value pair of

# the dictionary in tuple format

# If the above tuple list was in dictionary format like below:

marksDict = {'Jack': 90, 'Rochell': 56, 'Amy': 75}

# Then using the dictionary, we can print same output with below code:

for (name, marks) in marksDict.items():

       print(name, 'has', marks, 'marks')

Tuples are useful for looping over lists and dictionaries because of their immutability and hashable properties. They help maintain data integrity and efficiency.

Tuples are immutable sequences in Python, and they are often used when looping over lists and dictionaries to maintain data integrity and utilize their hashable properties in dictionaries.
Here are some examples,

Looping with Tuples Over Lists

When looping over a list of tuples, you can easily unpack the elements for use within the loop.
Here's a simple example,

students = [("John", 85), ("Jane", 92), ("Dave", 78)]

for name, score in students:
   print(f"Student: {name}, Score: {score}")

This code will output:

Student: John, Score: 85
Student: Jane, Score: 92
Student: Dave, Score: 78

Looping with Tuples Over Dictionaries

In dictionaries, tuples can be useful as keys because they are immutable and hashable. You can also convert dictionary items into tuples to easily iterate over them.
Here's an example,

grades = {"John": 85, "Jane": 92, "Dave": 78}

for name, score in grades.items():
   print(f"Student: {name}, Score: {score}")

This code will produce the same output as the previous example. Using tuples in this way helps preserve data integrity and allows for efficient key-value pair iteration.

Consider the following base and derived class declarations: class BaseClass { public: void BaseAlpha(); private: void BaseBeta(); float baseField; }; class DerivedClass : public BaseClass { public: void DerivedAlpha(); void DerivedBeta(); private: int derivedField; }; For each class, do the following:

a) List all private data members.
b) List all private data members that the class's member functions can reference directly.
c) List all functions that the class's member functions can invoke.
d) List all member functions that a client of the class may invoke.

Answers

Final answer:

The private data members of BaseClass and DerivedClass are baseField and derivedField, respectively. Member functions of BaseClass can directly reference baseField and call BaseAlpha(), while DerivedClass member functions can access derivedField and can invoke DerivedAlpha(), DerivedBeta(), and the inherited BaseAlpha(). Clients may call BaseAlpha() for BaseClass and DerivedAlpha(), DerivedBeta(), and the inherited BaseAlpha() for DerivedClass.

Explanation:

Private Data Members and Member Functions in C++ Classes

In the given C++ classes, the private data members and member functions that can be accessed are:

BaseClass

a) Private data members: float baseField

b) Can reference directly: float baseField

c) Member functions can invoke: void BaseAlpha()

d) Client may invoke: void BaseAlpha()

DerivedClass

a) Private data members: int derivedField

b) Can reference directly: int derivedField

c) Member functions can invoke: void DerivedAlpha(), void DerivedBeta(), and inherited void BaseAlpha()

d) Client may invoke: void DerivedAlpha(), void DerivedBeta(), and inherited void BaseAlpha()

Note that private member functions are not listed as they cannot be accessed outside of the class definition. Also, the derived class has access to all of its own members as well as the public and protected members of its base class.

(1) Create three files to submit:
ItemToPurchase.h - Class declaration
ItemToPurchase.cpp - Class definition
main.cpp - main() function
Build the ItemToPurchase class with the following specifications:
Default constructorPublic class functions (mutators & accessors)
SetName() & GetName() (2 pts)
SetPrice() & GetPrice() (2 pts)
SetQuantity() & GetQuantity() (2 pts)
Private data members
string itemName - Initialized in default constructor to "none"
int itemPrice - Initialized in default constructor to 0
int itemQuantity - Initialized in default constructor to 0

Answers

Answer:

We have the files and codes below with appropriate comments

Explanation:

ItemToPurchase.h:

#pragma once

#ifndef ITEMTOPURCHASE_H_INCLUDED

#define ITEMTOPURCHASE_H_INCLUDED

#include<string>

#include <iostream>

using namespace std;

class ItemToPurchase

{

public:

    //Declaration of default constructor

    ItemToPurchase();

    //Declaration of SetName function

    void SetName(string ItemName);

    //Declaration of SetPrice function

    void SetPrice(int itemPrice);

    //Declaration of SetQuantity function

    void SetQuantity(int itemQuantity);

    //Declaration of GetName function

    string GetName();

    //Declaration of GetPrice function

    int GetPrice();

    //Declaration of GetQuantity function

    int GetQuantity();

private:

    //Declaration of itemName as

    //type of string

    string itemName;

    //Declaration of itemPrice as

    //type of integer

    int itemPrice;

    //Declaration of itemQuantity as

    //type of integer

    int itemQuantity;

};

#endif

ItemToPurchase.cpp:

#include <iostream>

#include <string>

#include "ItemToPurchase.h"

using namespace std;

//Implementation of default constructor

ItemToPurchase::ItemToPurchase()

{

    itemName = "none";

    itemPrice = 0;

    itemQuantity = 0;

}

//Implementation of SetName function

void ItemToPurchase::SetName(string name)

{

    itemName = name;

}

//Implementation of SetPrice function

void ItemToPurchase::SetPrice(int itemPrice)

{

    this->itemPrice = itemPrice;

}

//Implementation of SetQuantity function

void ItemToPurchase::SetQuantity(int itemQuantity)

{

    this->itemQuantity = itemQuantity;

}

//Implementation of GetName function

string ItemToPurchase::GetName()

{

    return itemName;

}

//Implementation of GetPrice function

int ItemToPurchase::GetPrice()

{

    return itemPrice;

}

//Implementation of GetQuantity function

int ItemToPurchase::GetQuantity()

{

    return itemQuantity;

}

main.cpp:

#include<iostream>

#include<string>

#include "ItemToPurchase.h"

using namespace std;

int main()

{

    //Declaration of ItemToPurchase class objects

    ItemToPurchase item1Cart, item2Cart;

    string itemName;

    //create a variable names like itemPrice

    //itemQuantity,totalCost as type of integer

    int itemPrice;

    int itemQuantity;

    int totalCost = 0;

    //Display statement for Item1

    cout << "Item 1:" << endl;

    cout << "Enter the item name : " << endl;

    //call the getline function

    getline(cin, itemName);

    //Display statememt

    cout << "Enter the item price : " << endl;

    cin >> itemPrice;

    cout << "Enter the item quantity : " << endl;

    cin >> itemQuantity;

    item1Cart.SetName(itemName);

    item1Cart.SetPrice(itemPrice);

    item1Cart.SetQuantity(itemQuantity);

    //call cin.ignore() function

    cin.ignore();

    //Display statement for Item 2

    cout << endl;

    cout << "Item 2:" << endl;

    cout << "Enter the item name : " << endl;

    getline(cin, itemName);

    cout << "Enter the item price : " << endl;

    cin >> itemPrice;

    cout << "Enter the item quantity : " << endl;

    cin >> itemQuantity;

    item2Cart.SetName(itemName);

    item2Cart.SetPrice(itemPrice);

    item2Cart.SetQuantity(itemQuantity);

    //Display statement

    cout << "TOTAL COST : " << endl;

    cout << item1Cart.GetName() << " " << item1Cart.GetQuantity() << " @ $" << item1Cart.GetPrice() << " = " << (item1Cart.GetQuantity()*item1Cart.GetPrice()) << endl;

    cout << item2Cart.GetName() << " " << item2Cart.GetQuantity() << " @ $" << item2Cart.GetPrice() << " = " << (item2Cart.GetQuantity()*item2Cart.GetPrice()) << endl;

    totalCost = (item1Cart.GetQuantity()*item1Cart.GetPrice()) + (item2Cart.GetQuantity()*item2Cart.GetPrice());

    cout << endl;

    cout << "Total : $" << totalCost << endl;

    return 0;

}

Ann states the issues began after she opened an invoice that a vendor emailed to her. Upon opening the invoice, she had to click several security warnings to view it in her word processor. With which of the following is the device MOST likely infected?A. SpywareB. Crypto-malwareC. RootkitD. Backdoor

Answers

Answer:

Option D i.e., Backdoor is the correct answer.

Explanation:

Because backdoor is the virus that attack on the user's computer to provide unauthorized access to the hackers and it is very hard to detect, and in the following statement an issue occurred on the Ann's computer system when she open an invoice which is sent by any vendor then, several security warning appears on her system. So, that's why the following option is correct.

Consider the following class definition.public class Rectangle{private double length;private double width;public Rectangle(double l, double w){length = l;width = w;}public void set(double l, double w){length = l;width = w;}public void print(){System.out.println(length + " " + width);}public double area(){return length * width;}public double perimeter(){return 2 length + 2 width;}}Which of the following statements correctly instantiate the Rectangle object myRectangle?(i) myRectangle Rectangle = new Rectangle(10, 12);(ii) class Rectangle myRectangle = new Rectangle(10, 12);(iii) Rectangle myRectangle = new Rectangle(10, 12);

Answers

Answer:

The answer is "option (iii)".

Explanation:

Instantiation stands for a specific instance creation of model or abstraction. It is also known as object code. In the given question the correct code for instantiating a class in java is option iii because it is the correct format.  In this option, we create a class object that is "myRectangle" and call the parameterized constructor by passing value in parameter this process is known as instantiation. In instantiation first, we write a class name that is "Rectangle" then create an object that is "myRectangle" and use a new keyword for instantiating an object. In option (i) we use the object name first and in option (ii) we use class keyword that's why both options are incorrect.  

To use an ArrayList in your program, you must import:1. the java.collections package
2. the java.awt package
3. Nothing; the class is automatically available, just like regular arrays.
4. the java.util package
5. the java.lang package

Answers

Answer:

Option 4: the java.util package

Explanation:

ArrayList is one of the Java collections that offer some handy features to manipulate a list of elements.  ArrayList is not available in a Java program by default without explicitly import it. To use ArrayList, we need to write an import statement as follows:

import java.util.ArrayList;

After that, we can only proceed to declare an ArrayList in our Java program. For example:

ArrayList<String> studentNames = new ArrayList<String>();

Which one of the following is not possible to view in the debug logs?

A. Workflow formula evaluation results
B. Assignment rules
C. Formula field calculations
D. Validation rules
E. Resources used by Apex Script

Answers

Answer:

Formula field calculations

Explanation:

We can use debug logs to track events in our company, these events are generated if active users have trace indicators.

A debug log can register information about database operations, system processes and errors, in addition, we can see Resources used by Apex, Workflow Rules, Assignment Rule, HTTP calls, and Apex errors, validation rules. The only one we cannot see is Formula field calculations.

How to write a program in java that finds the max number of an array of integers?

Answers

Answer:

The following steps describes how to write a Java program that finds the maximum of an array of integers

STEP 1: Create the array

STEP 2: Intialize the array by assigning integers values of have the user enter the elements of the array using the Scanner class.

STEP 3: Create a temp variable and call it maxInt assign this variable to the element at index 0 of the array

STEP 4: Using a for loop Statement, iterate over every element of the array and check if they are greater than the maxInt variable which is at index 0.

STEP 5: Reassign the maxInt to a new element when ever a greater integer is found

STEP 6. Return or Printout the value of maxInt

The method below written in java shows all the steps listed above to find the max integer in an integer array

Explanation:

   public static int getMax(int[] arr){

       int maxInt = arr[0];

       for(int i=1;i < arr.length;i++){

           if(arr[i] > maxInt){

               maxInt = arr[i];

           }

       }

       return maxInt;

   }

Display flight number, origin, destination, fl_orig_time as --"Departure Time", fl_dest_time as "Arrival Time". Format times in Miltary time (24 hour format) with minutes. Order results by flight number. Hint the format should be in 'hh24:mi'format.

Answers

Answer:

Select "flight number", origin, destination, format(fl_orig_time, 'HH:mm' ) as "Departure Time", format(fl_dest_time, 'HH:mm') as "Arrival Time" from table_name order by flight_number

Explanation:

The script is used to select records from the table named 'table_name' and formatted to 24hr time format with the hour in capital letters (signifying 24 hrs). Then the inverted comma used for flight number is due to the space character ebtween the two words. In a select statement, order by comes after the table name. While as is used as an alias for a column in a table.

Algonac Systems, a software start-up company, uses a technology in which the employees have to key in certain names and their respective codes to access information from different departments. Given this information, it can be concluded that Algonac Systems uses _____ to access information from different departments.

Answers

Answer:

ADD ME ON TIK TOK @ madison.beautiful.dancer

Explanation:

Algonac Systems uses a Logical Access Control system for accessing departmental information, which includes identification through specific names and codes, enhancing security and efficiency.

Algonac Systems, a software start-up company, uses a Logical Access Control system to access information from different departments. This system requires employees to input specific names and their respective codes to gain entry to various areas of data. This method falls under the identification component of access control systems, where technological restrictions such as usernames and passwords are employed to control access to computers and networks.

The logical access control method at Algonac Systems is designed to enhance security by ensuring that only authorized personnel have access to sensitive information and department-specific data. By incorporating unique identifiers for each department, Algonac Systems maintains organized and secure databases, streamlining the process for employees to reach relevant data. This efficiency is crucial for the company's operations, as it allows employees to report and retrieve data through user-friendly interfaces regardless of their location.

Access Control Systems consist of several parts including identification, authentication, authorization, and audit. In the case of Algonac Systems, they rely heavily on the component of identification where employees use assigned names and codes, which correlates to the database system where information is organized and accessed through unique identifiers, ensuring secure and efficient retrieval of data.

Given an array of intergers, find the greatest product of 3 integers within that array and return that product

Answers

Answer & Explanation:

//written in java

import java.util.Arrays;

class Main {

   //this function find the greatest product of 3

   //integers within any array and return that product

   private static int greatestProduct(int[] arr, int length) {

       // if the size of array is less that 3

       //the method return a value of 0

       if (length < 3) {

           return 0;

       }

       // the code below sort the array in ascending order

       //multiply the last three, which is the product of the 3

       //greatest value in the array

       Arrays.sort(arr);

       return arr[length - 1] * arr[length - 2] * arr[length - 3];

   }

   // the main method

   public static void main(String[] args) {

       int[] arr = {5, 3, 4, 2, 8, 10, 1};

       int n = arr.length;

       int product = greatestProduct(arr, n);

       //if the size of array is less than 3

       //greatestProduct(arr, n) return zero

       //and the program print out

       //"Size of array is less than three so product of 3 integers within that array does not exist"

       //else it print the product of the three largest integer in the array

       if (product == 0)

           System.out.println("Size of array is less than three\nso product of 3 integers within that array does not exist");

       else

           System.out.println("Maximum product is " + product);

   }

}

True or False? Lobbying is a type of innovation where bankers and other financiers try to change regulations

a. True
b. False

Answers

Answer:

The answer is "Option a".

Explanation:

Lobbying is a kind of creativity in which the restrictions are changed by financiers and other industrialists. It is a good deflation often induced financiers to just use legal tax drilling.  

It is too expensive, financiers petitioned to modify the legislative system in order it a little less stringent in general. It is used to convey the desires of a group with the legislation, that is usually formed by-elections, which brings citizens with certain viewpoints to political roles, that's why the given statement is true.
Other Questions
Those arguing for the inclusion of a neutral option on an interval scale believe that some respondents do not have opinions formed on that item, and they must be given the opportunity to indicate their ambivalence. 2. What are the next two terms of the following sequence?-2,4,-8, 16, ...A. -32, 64 D . 32, 64B. -32, 64C. 32, 64 I need help please and thank you If a premium on a bonds payable transaction is not amortized, what are the effects on interest expense and total stockholders' equity? State weather the equation represents exponential growth, exponential decay or neither, 30 POINTS EASY A group of friends bought 7 tickets to a dog show for $30 each. How much did they spend on the tickets? Do SAT coaching classes work? Do they help students to improve their test scores? Four students were selected randomly from all of the students that completed an SAT coaching class. For each student, we recorded their first SAT score (before the coaching class) and their second SAT score (after the coaching class).Student1234First SAT score920830960910Second SAT score10108001000980To analyze these data, we should useA.the one-sample t test., one answer Yahoo,B.the matched pairs t test.C.the two-sample t test.D.) Any of the above are valid. It just needs to be a t since ? is unknown. On which tab would you find Access's features for formatting text? A. File B. Home C. Create D. Format You want to test your newly created Web site, so you have 250 people access it from random locations at random times. Of the people accessing the site, 75 of them experience computer crashes. You want to estimate the proportion of crashes within a margin of error of 4% at a 95% confidence interval. What sample size do you need? The following information was obtained from matched samples. Individual Method 1 Method 2 1 7 5 2 5 9 3 6 8 4 7 7 5 5 6 Refer to Exhibit 10-5. If the null hypothesis is tested at the 5% level, the null hypothesis _____. a. should be rejected b. should be revised c. should not be rejected d. None of these answers are correct Which graph represents the solution to the given system ? Y=- 6X - 2Y +2=- 6X The successful conveyance of real estate depends on a well-formed contract for sale since the contract dictates the rights and type of deed involved, as well as choreographs the entire transaction. Which of the following features of the contract for sale refers to the arrangements agreed to by the parties, such as price and date of closing?A. Contract termsB. Contract conditionsC. Equitable titleD. Contingency clause One important unintended consequence of the Smoot-Hawley Tariff Act was to: a.lessen the severity of the Great Depression by increasing exports.b.provide the federal government with an effective tool for exercising monetary policy.c.increase the efficiency of domestic automobile production.d.increase the severity of the Great Depression by causing other countries to retaliate, and thus leading to a decline in exports.e.increase the U.S. government budget deficit by $15 million What attracted France and England to the North Atlantic region? A.fishing industry B.Native Americans C.possibility for gold D.the glory of conquest Given an int variable datum that has already been declared, write a few statements that read an integer value from standard input into this variable. A sound system is being set up in a gazebo in a park. It needs to produce music so that everyone can hear it. How much power would the speakers need to produce in order for the intensity at 5 meters away to be 1 x 10^-8 W/m^2? (assume the shape of the propagation of the sound wave is a hemisphere)1.87 x 10^-7 W1.57 x 10^-6 W1.14 x 10^-6 W2.46 x 10^-7 W The _______ form is used by non-institutional providers and suppliers to bill Medicare, Part B covered services. Benito, a psychology student, has had an overall negative impression of his psychology professor. As a consequence, during the end-of-term appraisal, he rates his professor low on all performance criteria. Which of the following rater errors has Benito committed?A) HornsB) LeniencyC) Central tendencyD) ContrastE) Strictness Suppose a 52 N sled runs on packed snow. The coefficient of friction is only 0.11. If a person weighing 700 N sits on the sled, what force is needed to pull the sled across the snow at constant speed? Acetylene torches are used for welding. These torches use a mixture of acetylene gas, C2H2, and oxygen gas, O2 to produce the following combustion reaction: 2C2H2(g)+5O2(g)4CO2(g)+2H2O(g) Imagine that you have a 6.50 L gas tank and a 4.00 L gas tank. You need to fill one tank with oxygen and the other with acetylene to use in conjunction with your welding torch. If you fill the larger tank with oxygen to a pressure of 115 atm , to what pressure should you fill the acetylene tank to ensure that you run out of each gas at the same time? Assume ideal behavior for all gases. Steam Workshop Downloader