XYZ is a large real estate firm. Their core competence is their understanding of the real estate market, and their understanding of their customers and the customer needs. Their most critical tools are their CRM and email servers. They are growing, and so is their customer list and their IT and marketing costs are growing at an alarming rate. They currently use managed services to run their CRM, email, etc software but they have had to deal with significant delays as each growth spurt is bogged down by the time and cost it takes to provision new servers, install the software, test it and bring it online. Which cloud delivery model would be best suited for them?

Answers

Answer 1

Answer:

SaaS is the correct answer to the given question .

Explanation:

The saas is known as "software as a service is a model " In the software as a service is a model the software is authorized and distributed only when  software is approved on a subscription basis also it is distributed in the centralized manner .

The cost of software as a service is a model is not so expensive as compared to the other model  also the software as a service model is more Integrated  and extensible as compared to the other model of the cloud delivery.According to the given question only the SaaS i.e "  software as a service " model is best to implement cloud delivery.

Answer 2

Final answer:

XYZ's real estate firm should adopt a Software-as-a-Service (SaaS) cloud delivery model to tackle growth-related IT and marketing cost increases, ensuring scalability, reliability, and a focus on core business activities.

Explanation:

For a large real estate firm like XYZ, which is experiencing rapid growth and increasing IT and marketing costs, the most suited cloud delivery model would be Software-as-a-Service (SaaS). This model provides access to applications over the internet with flexibility and scalability. SaaS applications are updated regularly in the cloud, offering enhanced responsiveness without the need for XYZ to bear the costs of server provisioning, software installation, and maintenance.

Using SaaS for their CRM and email servers allows for a cost-effective approach with a subscription-based model that adjusts easily with the company's growth. Additionally, given the criticality of these tools for XYZ, the SaaS model will ensure uptime and reliability while delivering sophisticated features and functionalities that cater to the firm's understanding of the real estate market and customer needs.

Moreover, as echoed in the cases of Scandic Hotels and Zalando, relying on cloud services will enable XYZ to focus on their core business activities and customer engagement without being bogged down by the complexities of IT infrastructure management.


Related Questions

Write a telephone lookup program. Read a data set of 1,000 names and telephone numbers from a file that contains the numbers in random order. Handle lookups by name and also reverse lookups by phone number. Use a binary search for both lookups.

Answers

Answer:

See explaination

Explanation:

PhoneLookup.java

import java.io.FileReader;

import java.io.IOException;

import java.util.Scanner;

public class PhoneLookup

{

public static void main(String[] args) throws IOException

{

Scanner in = new Scanner(System.in);

System.out.println("Enter the name of the phonebook file: ");

String fileName = in.nextLine();

LookupTable table = new LookupTable();

FileReader reader = new FileReader(fileName);

table.read(new Scanner(reader));

boolean more = true;

while (more)

{

System.out.println("Lookup N)ame, P)hone number, Q)uit?");

String cmd = in.nextLine();

if (cmd.equalsIgnoreCase("Q"))

more = false;

else if (cmd.equalsIgnoreCase("N"))

{

System.out.println("Enter name:");

String n = in.nextLine();

System.out.println("Phone number: " + table.lookup(n));

}

else if (cmd.equalsIgnoreCase("P"))

{

System.out.println("Enter phone number:");

String n = in.nextLine();

System.out.println("Name: " + table.reverseLookup(n));

}

}

}

}

LookupTable.java

import java.util.ArrayList;

import java.util.Collections;

import java.util.Scanner;

/**

A table for lookups and reverse lookups

*/

public class LookupTable

{

private ArrayList<Item> people;

/**

Constructs a LookupTable object.

*/

public LookupTable()

{

people = new ArrayList<Item>();

}

/**

Reads key/value pairs.

atparam in the scanner for reading the input

*/

public void read(Scanner in)

{

while(in.hasNext()){

String name = in.nextLine();

String number = in.nextLine();

people.add(new Item(name, number));

}

}

/**

Looks up an item in the table.

atparam k the key to find

atreturn the value with the given key, or null if no

such item was found.

*/

public String lookup(String k)

{

String output = null;

for(Item item: people){

if(k.equals(item.getName())){

output = item.getNumber();

}

}

return output;

}

/**

Looks up an item in the table.

atparam v the value to find

atreturn the key with the given value, or null if no

such item was found.

*/

public String reverseLookup(String v)

{

String output = null;

for(Item item: people){

if(v.equals(item.getNumber())){

output = item.getName();

}

}

return output;

}

}

Item.java

public class Item {

private String name, number;

public Item(String aName, String aNumber){

name = aName;

number = aNumber;

}

public String getName(){

return name;

}

public String getNumber(){

return number;

}

}

input.txt

Abbott, Amy

408-924-1669

Abeyta, Ric

408-924-2185

Abrams, Arthur

408-924-6120

Abriam-Yago, Kathy

408-924-3159

Accardo, Dan

408-924-2236

Acevedo, Elvira

408-924-5200

Acevedo, Gloria

408-924-6556

Achtenhagen, Stephen

408-924-3522

Note: Replace all the "at" with at symbol

g Given an array, the task is to design an efficient algorithm to tell whether the array has a majority element, and, if so, to find that element. The elements of the array are not necessarily from some ordered domain like the integers, and so there can be no comparisons of the form "is A[i] ≥ A[j]?". (Think of the array elements as GIF files, say.) However you can answer questions of the form: "is A[i] = A[j]?" in constant time

Answers

Answer:

If there is a majority element in the array it will be the median. Thus,

just run the linear time median finding algorithm, and compare the result with all the  elements of the array (also linear time). If [tex]\frac{n}{2}[/tex]elements are the same as the median, the  median is a ma majority element. If not, there is none.

Suppose now that the elements of the array are not from some ordered domain like the  integers, and so there can be no comparisons of the form "is the ith element of the array  greater than the jth element of the array?" However you can answer questions of the  form:

"Are the ith and jth elements of the array the same?" in constant time. Such

queries constitute the only way whereby you can access the array. (Think of the elements  of the array as GIF files, say.) Notice that your solution above cannot be used now.

_____ has many knowledge management applications, ranging from mapping knowledge flows and identifying knowledge gaps within organizations to helping establish collaborative networks. Select one: a. Social network analysis (SNA) b. Branching router-based multicast routing (BRM) c. Online analytical processing (OLAP) d. Drill-down analysis (DDA)

Answers

Answer:

A. Social network analysis (SNA).

Explanation:

This is explained to be a process of quantitative and qualitative analysis of a social network. It measures and maps the flow of relationships and relationship changes between knowledge possessing entities. Simple and complex entities include websites, computers, animals, humans, groups, organizations and nations.

The SNA structure is made up of node entities, such as humans, and ties, such as relationships. The advent of modern thought and computing facilitated a gradual evolution of the social networking concept in the form of highly complex, graphical based networks with many types of nodes and ties. These networks are the key to procedures and initiatives involving problem solving, administration and operations.

Create a winform application that lets the user enter a temperature. With a ComboBox object offer the user three choices for input type: Farenheit, Celsius, and Kelvin. Offer the same three choices for the output type. Now when the user clicks the Calculate button, convert them temp and show the user the results.

Answers

Answer:

See explaination

Explanation:

//namespace

using System;

using System.Windows.Forms;

//application namespace

namespace TemperatureConversionApp

{

public partial class Form1 : Form

{

public Form1()

{

InitializeComponent();

}

//calculate button click

private void btnCalculate_Click(object sender, EventArgs e)

{

//taking temperature type

string temperatureType = cmbTemperatureType.SelectedItem.ToString();

//taking temperature entered by user

double temperature = double.Parse(txtTemperature.Text);

//taking conversion temperature type

string conversionType = cmbConversionType.SelectedItem.ToString();

//checking temperature type and conversion type

if(temperatureType == "Farenheit" && conversionType == "Celsius")

{

//if Farenheit to Celsius temperature then

double temp = (temperature - 32) * 5 / 9;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Farenheit is " + temp.ToString("0.00") + " Celsius";

}

else if (temperatureType == "Farenheit" && conversionType == "Kelvin")

{

//if Farenheit to Kelvin temperature then

double temp = (temperature - 32) * 5 / 9+273.15;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Farenheit is " + temp.ToString("0.00") + " Kelvin";

}

else if (temperatureType == "Celsius" && conversionType == "Kelvin")

{

//if Celsius to Kelvin temperature then

double temp = temperature + 273.15;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Celsius is " + temp.ToString("0.00") + " Kelvin";

}

else if (temperatureType == "Celsius" && conversionType == "Farenheit")

{

//if Celsius to Farenheit temperature then

double temp = (temperature*9/5) +32;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Celsius is " + temp.ToString("0.00") + " Farenheit";

}

else if (temperatureType == "Kelvin" && conversionType == "Farenheit")

{

//if Kelvin to Farenheit temperature then

double temp = (temperature-273.15) * 9 / 5 + 32;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Kelvin is " + temp.ToString("0.00") + " Farenheit";

}

else if (temperatureType == "Kelvin" && conversionType == "Celsius")

{

//if Kelvin to Celsius temperature then

double temp = temperature - 273.15;

//display on the label

lblDetails.Text = temperature.ToString("0.00") + " Kelvin is " + temp.ToString("0.00") + " Celsius";

}

else

{

lblDetails.Text = "Select valid temperature conversion unit";

}

}

//Exit button click

private void btnExit_Click(object sender, EventArgs e)

{

this.Close();//close application

}

}

}

check attachment for the windows application

You are in the middle of restarting your computer when the power goes out in the building. When the power is restored, your computer will not restart. When you push the button to turn on the computer, nothing happens. You do not have video on your monitor, but the monitor will turn on. You also notice that you don't hear fans spinning and no indicator lights show on your computer. The monitor is on the same power strip as your computer. What might be the problem?

Answers

Answer:

The Power supply has been damaged.

Explanation:

There is no video on the monitor, but the monitor is tamed on. Also, there is no fan spinning sound. What this means is that the Power supply is not working, because fan is unable to work. The light of monitor is on because the direct power supply from the building is fate.

Note: In case of CMOS RAM is damaged, or processor is damaged, CPU fan will run properly until and unless the power supply is not enough.

Select the correct statements regarding Asynchronous Transfer Mode (ATM): a. ATM is a fixed-length cell standard that supports voice, video and data b. ATM is connection-oriented c. ATM offers predictability regarding latency; therefore ATM can offer quality-of-service (QoS) to users d. All of the above are correct

Answers

Answer:

D. All of the above are correct.

Explanation:

Asynchronous Transfer Mode is a fixed-length cell structure which allows cells to support voice, video  and data. Voice data can be converted to packets and shared with large packet data. Because voice packets, encounter queuing delays, they ought to be of the same size or length.

ATM provides a route between two end points and that is why it can be said to be connection oriented. There is an ease of switching in hardware because of the fixed structure of the ATM. It also offers predictability regarding latency which could be either high or low. So, all of the above satisfy the mode of operation of the Asynchronous Transfer Mode.

what is linux? what is it good for. And why do people use it?

Answers

Answer:

Linux is Unix-based and Unix was originally designed to provide an environment that's powerful, stable and reliable yet easy to use. Linux systems are widely known for their stability and reliability, many Linux servers on the Internet have been running for years without failure or even being restarted

Explanation:

Linux is used for commercial networking

Write a Java program which reads a text file and writes the content into a new file. During the read-write process, convert all the upper case letters into lower case ones. In other words, your programming task is to create a new file with the same content of the original file, only that all the upper case letters are converted into lower case ones in the new file.

Answers

Answer:

Kindly go to the explanation part for the code you seek.

Explanation:

This is the Code to Copy:

package file;

import java.io.BufferedReader;

import java.io.BufferedWriter;

import java.io.DataInputStream;

import java.io.FileInputStream;

import java.io.FileWriter;

import java.io.InputStreamReader;

import java.util.Scanner;

public class file

{

public static void main(String []args)

{

try

{

System.out.print("Type a file name: ");

//declare scanner for keyboard input

Scanner reader = new Scanner(System.in);

//scan the input file name

String infilename=reader.nextLine();

//define file stream

FileInputStream fstream = new FileInputStream(infilename);

DataInputStream in = new DataInputStream(fstream);

//define the buffer reader

BufferedReader br = new BufferedReader(new InputStreamReader(in));

String outfilename = "output.txt";

FileWriter fileWriter = new FileWriter(outfilename);

//declare buffer writer for file write

BufferedWriter bufferedWriter = new BufferedWriter(fileWriter);

String strLine,filename;

int status = 0;

int i=0;

//read lines one by one from input file

while ((strLine = br.readLine()) != null)

{

String temp="";

//for each character in a line

for(int k=0;k<strLine.length();k++)

{

char c;

c=strLine.charAt(k);

//if the character is uppercase

if(Character.isUpperCase(c))

//make the character lowercase and append it to the output line

temp +=Character.toLowerCase(c);

else

//character is not lowercase. append to the output line without changing it

temp += c;

}

//write the line to the file

bufferedWriter.write(temp+"\n");

}

//close the input file

in.close();

//close the output file

bufferedWriter.close();

}

catch (Exception e)

{

//System.err.println("Error: " + e.getMessage());

}

}

}

g What field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers? When a large datagram is fragmented into multiple smaller datagrams, where are these smaller datagrams reassembled into a single larger datagram? Do routers have IP addresses? If so, how many? How many bits do we have in an IPv6 address? We use hexadecimal digits (each with 4 bits) to represent an IPv6 address. How many hexadecimal digits do we need to represent an IPv6 address?

Answers

Answer:

a) Time to live field

b) Destination

c) Yes, they have two ip addresses.

d) 128 bits

e) 32 hexadecimal digits

Explanation:

a) the time to live field (TTL) indicates how long a packet can survive in a network and whether the packet should be discarded. The TTL is filled to limit the number of packets passing through N routers.

b) When a large datagram is fragmented into multiple smaller datagrams, they are reassembled at the destination into a single large datagram before beung passed to the next layer.

c) Yes, each router has a unique IP address that can be used to identify it. Each router has two IP addresses, each assigned to the wide area network interface and the local area network interface.

d) IPv6 addresses are represented by eight our characters hexadecimal numbers. Each hexadecimal number have 16 bits making a total of 128 bits (8 × 16)  

e) IPv6 address has 32 hexadecimal digits with 4 bits/hex digit

The TCP/IP concepts of packet forwarding, fragmentation, and reassembly along with IPv4 and IPv6 addressing schemes are explained.

TTL (Time To Live) field in the IPv4 datagram header can be used to ensure that a packet is forwarded through no more than N routers. When a large datagram is fragmented into multiple smaller datagrams, these smaller datagrams are reassembled into a single larger datagram at the destination host. Routers do have IP addresses, typically one per interface, so the number varies. IPv6 addresses consist of 128 bits; represented using hexadecimal digits (each 4 bits), hence we need 32 hexadecimal digits to represent an IPv6 address.

How are graphs used to analyze data?

Answers

Answer:

Graphs and charts are visual representations of data in the form of points, lines, bars, and pie charts. Using graphs or charts, you can display values you measure in an experiment, sales data, or how your electrical use changes over time. Types of graphs and charts include line graphs, bar graphs, and circle charts.

Explanation:

Graphs are used to visually display data, making it easier to identify trends and patterns. They simplify complex data and allow for effective comparisons, aiding better understanding and data-driven decision-making.

Graphs are a powerful tool used to display data visually, making it easier to see trends and patterns compared to numerical data in a table. In high school mathematics, understanding how to interpret various types of graphs is crucial.

Here are some key reasons why graphs are employed:

Visualizing trends: For example, a line graph can show how temperature changes over time, making it easy to spot trends such as increases or decreases.Simplifying complex data: Complicated data sets can often be more easily interpreted when presented in a pie chart, bar graph, or scatter plot rather than a dense table.Comparing data: Graphs allow for side-by-side comparison of different data sets. For example, bar graphs can compare the population of different cities.

Overall, utilizing graphs not only aids in understanding data better but also helps in making data-driven decisions effectively.

Write a program that uses nested loop or for statements to display Pattern A below, followed by an empty line and then another set of loops that displays Pattern B. Once again no setw implementation is allowed here but you must use nested loop or for statements with proper indentation to generate these patterns. Use meaningful variable identifier names, good prompting messages and appropriate comments for each loop segment as well as other sections in the body of your program.

Note: Each triangle has exactly seven rows and the width of each row is an odd number. The triangles have appropriate labels displayed.


Pattern A

+

+++

+++++

+++++++

+++++++++

+++++++++++

+++++++++++++

Pattern B

+++++++++++++

+++++++++++

+++++++++

+++++++

+++++

+++

+

Answers

Answer:

public class Pyramid {

   public static void main(String[] args) {

             int h = 7;

       System.out.println("Pattern A");

               for(int i = 1; i <= h; ++i)

               {

                   for(int j = 1; j <= i; ++j) {

                       System.out.print("+");

                   }

                   System.out.println();

               }

       System.out.println();

       System.out.println("Pattern B");

               for (int i = 1; i<=h; ++i)

               {

                 for(int j = h; j >=i; --j){

                     System.out.print("+");

                 }

                   System.out.println();

               }

           }

       }

Explanation:

The trick in this code is using a nested for loopThe outer for loop runs from i = 0 to the heigth of the triangle (in this case 7)The inner for loop which prints the (+) sign runs from j = 0 to j<=iIt prints the + using the print() function and not println()In the pattern B the loop is reversed to start from  i = height

QUESTION
UNi-Library is conducting a survey to rate the quality of their services in order to improve their
services. In the survey, 30 students were asked to rate the quality of the service in the library on a
scale of 1 to 5 (1 indicating very bad and 5 indicating excellent). You have to store the 30 responses of
the students in an array named responses [ ]. Then, you have to count the frequency of each scale
and store it in an array named frequency[ ]. Use the appropriate looping structure to enter the
responses and to count the frequency. You are also required to display the percentage of the
frequency of each scale. Display the scale, frequency and its percentage as shown below.
The program also allows the user to repeat this process as often as the user wishes.

*Write a complete C++ program*​

Answers

Answer:

Explanation:

#include <iostream>

using namespace std;

int main ()

{

   int responses[30],count[6];

   int score = 0;

   string resp = " ";

   for (int i = 0; i < 30; i++)

   {

    responses[i] = 0;

   }

   for (int i = 0; i < 6; i++)

   {

    count[i,1]=0;

    count[i,2]=0;

    count[i,0]=0;

   }

   while ((resp != "Y") && (resp != "y"))

   {

    for (int i = 0; i < 30; i++)

    {

        while ((score > 5) || (score < 1))

           {

            cout << "Student " << (i+1)<< " please enter a value (1-5):";

            cin >> score;

        }

           responses[i] = score;

           if((score > 5)||(score<1))

           {

               if(score==1) count[1]++;        

               if(score==2) count[2]++;        

               if(score==3) count[3]++;        

               if(score==4) count[4]++;        

               if(score==5) count[5]++;        

           }

           score = 0;

    }

    cout<< "Response               Frequency              Percentage"<<endl;;

    cout<< "    1                      "<<count[1]<<"               "<<(count[1]/30)<<"%"<<endl;

    cout<< "    2                      "<<count[2]<<"               "<<(count[2]/30)<<"%"<<endl;

    cout<< "    3                      "<<count[3]<<"               "<<(count[3]/30)<<"%"<<endl;

    cout<< "    4                      "<<count[4]<<"               "<<(count[4]/30)<<"%"<<endl;

    cout<< "    5                      "<<count[5]<<"               "<<(count[5]/30)<<"%"<<endl;

    cout<< "Do you want to exit? Press Y to exit any other key to continue: ";

    cin>> resp;

   }

   return 0;

}

Create a flowchart from start to end. 1.Initialize Z (set Z=0)2.Ask for user’s input X3.If X =1, then continue to the next statement. If X does not equal to 1, end the program.4.While Z is incrementing by 1, print Z. (Note: use WHILE symbol for the flowchart)5.Print Z until Z = 5. 6.When Z = 5, ends the program and print "HW is done".

Answers

Answer:

The flowchart to this question can be given in attachment.

Explanation:

In the given statement, a flowchart is defined, in which we use an oval shape to start the, in the next step square shape is used, that initializes the value 0 in z variable, and an input box is used for user input in x variable.

In the next step, the conditional box is used, that checks variable x value if the value is equal to 1, it will increment the value of variable z by 1. Inside this another, if block is used, that check value of z equal to 5, if the value does not match it will increment the value of z, and prints its value.

Tom has just started working as an intern for a local radio station. He is responsible for managing the request line and presenting request trends to management each month. Tom uses Microsoft PowerPoint 2016 to create his presentations. As he hovers over each choice, Tom sees his slide change automatically. What Tom is experiencing is called ____.

Answers

Answer:

Live Preview.

Explanation:

This is a feature specifically found in the microsoft power point in detailing or slides showing in a preliminary stage of its previews.

By default, when you select the composing email content and change its text format, such as text font, size, color and so on, the live preview will be displayed when you put your cursor on different text format.

Actually the live preview function can be enabled or disabled manually in Outlook. In this tutorial, we will show you how to enable or disable live preview in Outlook in details.

Write a class named Employee that has the following fields: • name: The name field is a String object that holds the employee's name. • idNumber: The idNumber is an int variable that holds the employee's ID number. • department: The department field is a String object that holds the name of the department where the employee works. • position: the position field is a string object that holds the employee's job title.

Answers

Answer:

See attachment please

Jim is a forensic specialist. He seized a suspect computer from a crime scene, removed the hard drive and bagged it, documented and labeled the equipment, took photographs, completed a chain of custody form, and locked the computer in his car. On the way to the lab, he stopped to purchase supplies to use at the next crime scene. What did Jim do wrong

Answers

Answer: Jim left the computer unattended while shopping for supplies to be used at the next crime scene.

Explanation: While transporting the evidence to a secure location (lab), he left the computer unattended in his car and goes shopping for supplies that will be used in his next crime scenes. This act will give the criminals or their accomplice the opportunity to break into his car and tamper with what ever evidence he might have left behind in his car.

Define a JavaScript function named thanos which has a single parameter. This function will be called so that the parameter will be an array. Your function should return a NEW array which contains only the entries at even indices. (Hint: you can tell an index is even if that index mod 2 is equivalent to 0).. Examples: thanos([ ]) would evaluate to [ ] thanos(['0', 2, 4]) would evaluate to ['0', 4]

Answers

Answer:

See explaination

Explanation:

function thanos(lst) {

var result = [];

for (var i = 0; i < lst.length; i += 2) {

result.push(lst[i]);

}

return result;

}

// Testing the function here. ignore/remove the code below if not required

console.log(thanos([]));

console.log(thanos(['0', 2, 4]));

When Judy logged on the network, she faced the message requesting that she changes her password. So, she changed her password. But, she does not like to remember too many passwords. She wants to keep only one password. So, she tried to change the password again to her original password. But, she cannot change the password. Why can’t she change the password

Answers

Answer:

Because reusing the old passwords possess security threats.

Explanation:

A password can be defined as a string of characters or words or phrases that are used to authenticate the identity of the user. It is also known as passcode and should be kept confidential. A password is used to access constricted systems, applications, etc.

A password or passcode is usually composed of alphabets, numbers, symbols, characters, alphanumeric, or a combination of these.

In the given case, Judy was not able to change her passcode to the previous one because reusing old passwords is prohibited in any sites or systems. A system denies the user to reuse the old passwords for various reasons but most importantly due to security reasons. Though it is said that old passwords can be used after 100 times but seldom someone changes a password that much. All systems care for the security of their users thus they deny reusing old passcodes.

Create a public non-final class called InsertionSorter. It should provide one public class method called sort. Sort should accept an array of Comparable Java objects and sort them in ascending order. However, it should sort the array in place, meaning that you modify the original array, and return the number of swaps required to sort the array. That’s how we’ll know you’ve correctly implemented insertion sort. If the array is null or empty you should return 0. You can assume that the array does not contain any null values.

Answers

Answer:

See explaination

Explanation:

public class InsertionSorter {

/* Function to sort array using insertion sort */

int sort(Comparable arr[]) {

int count = 0;

if (arr == null || arr.length == 0)

return 0;

int n = arr.length;

for (int i = 1; i < n; ++i) {

Comparable key = arr[i];

int j = i - 1;

while (j >= 0 && arr[j].compareTo(key) > 0) {

count++;

arr[j + 1] = arr[j];

j = j - 1;

}

arr[j + 1] = key;

}

return count;

}

// Driver method

public static void main(String args[]) {

Integer arr[] = { 50,21,34,26, 18, 31, 37, 54 };

InsertionSorter ob = new InsertionSorter();

int comp = ob.sort(arr);

System.out.println("Comparisons required : "+comp);

for(int i:arr)

System.out.print(i+" ");

}

}

Write an application that inputs a telephone number as a string in the form (555) 555-5555. The application should use String method split to extract the area code as a token, the first three digits of the phone number as a token and the last four digits of the phone number as a token. The seven digits of the phone number should be concatenated into one string. Both the area code and the phone number should be printed. Remember that you will have to change deliminator characters during the tokenization process.

Answers

Answer:

See explaination

Explanation:

// File: TelephoneNumber.java

import java.util.Scanner;

public class TelephoneNumber

{

public static void main(String[] args)

{

Scanner input = new Scanner(System.in);

String inputNumber;

String tokens1[];

String tokens2[];

String areaCode;

String firstThree;

String lastFour;

String allSeven;

String fullNumber;

/* input a telephone number as a string in the form (555) 555-5555BsAt4ube4GblQIAAAAASUVORK5CYII= */

System.out.print("Enter a telephone number as '(XXX) XXX-XXXX': ");

inputNumber = input.nextLine();

System.out.println();

/* use String method split */

tokens1 = inputNumber.split(" ");

/* extract the area code as a token */

areaCode = tokens1[0].substring(1, 4);

/* use String method split */

tokens2 = tokens1[1].split("-");

/* extract the first three digits of the phone number as a token */

firstThree = tokens2[0];

/* extract the last four digits of the phone number as a token */

lastFour = tokens2[1];

/* concatenate the seven digits of the phone number into one string */

allSeven = firstThree + lastFour;

/* concatenate both the area code and the seven digits of the phone number into one full string separated by one space */

fullNumber = areaCode + " " + allSeven;

/* print both the area code and the phone number */

System.out.println("Area code: " + areaCode);

System.out.println("Phone number: " + allSeven);

System.out.println("Full Phone number: " + fullNumber);

}

}

1)Write a class called Time that represents time in the form of hour minute and second where (35) hour takes values between 0 and 23, minute is between 0 and 59 and second is between 0 and 59. The constructor public Time(int hour, int minute, int second ) constructs a new time whose hour, month and second are taken from the parameter. The addSec(int sec), addMinute(int minute) and addHour(int hour) add seconds, minutes and hours respectively to the current hour, minute and second. They work exactly as if seconds, minutes and hours were added to the real like 24 hour clock. For a current time of 23:59:59 addSec(1) would result in 00:00:00. Addsec(6) to current time of 05:45:55 would give 05:46:01. AddSec(65) to current time of 05:45:55 would give 05:47:00. AddSec(910) to current time of 05:45:55 would give 06:01:10. The parameters of addHour, addMinute and addSec can be any number >=0. Values less < 0 should be invalidated and no change made. You cannot "go back in time".

Answers

Answer:

See attached image for the source code and output

Consider the following method substringFound, which is intended to return true if a substring, key, is located at a specific index of the string phrase. Otherwise, it should return false.
public boolean substringFound(String phrase, String key, int index)
{
String part = phrase.substring(index, index + key.length());
return part.equals(key);
}
Which of the following is the best precondition for index so that the method will return the appropriate result in all cases and a runtime error can be avoided?
A. 0 <= index < phrase.length()
B. 0 <= index < key.length()
C. 0 <= index < phrase.length() + key.length()
D. 0 <= index < phrase.length() - key.length()
E. 0 <= index < phrase.length() - index

Answers

Answer:

Option D 0 <= index < phrase.length() - key.length()

Explanation:

The index has to be between the range of 0 <= index < phrase length - key length to prevent index out of bound error. This is because the substring method will have to extract part of the string with a certain length from the original string starting from the index-position. If the key length is longer than the string area between phrase[index] and  phase.length(), an index out of bound runtime error will be thrown.

Your friends’ preschool-age daughter Madison has recently learned to spell some simple words. To help encourage this, her parents got her a colorful set of refrigerator magnets featuring the letters of the alphabet (some number of copies of the letter A, some number of copies of the letter B, and so on), and the last time you saw her the two of you spent a while arranging the magnets to spell out words that she knows. Somehow with you and Madison, things always end up getting more elaborate than originally planned, and soon the two of you were trying to spell out words so as to use up all the magnets in the full set – that is, picking words that she knows how to spell, so that once they were all spelled out, each magnet was participating in the spelling of exactly one of the words. (Multiple copies of words are okay here; so for example, if the set of refrigerator magnets includes two copies of each of ‘C,’ ‘A,’ and ‘T,’ it would be okay to spell out "CAT" twice.) This turned out to be pretty difficult, and it was only later that you realized a plausible reason for this. Suppose we consider a general version of the problem of Using Up All the Refrigerator Magnets, where we replace the English alphabet by an arbitrary collection of symbols, and we model Madison’s vocabulary as an arbitrary set of strings over this collection of symbols.

Answers

Answer:

See explaination

Explanation:

Given a set U which is the set of magnets where each magnet representing a symbol, but are accepted more copies of the same symbol which we number arbitrarily 1,2,3,. ... For example if we had two copies of the symbol A, we would have elements A 1 ,A 2 ) and subsets S 1 ,...S n which represent words formed from the magnets that Madison knows how to spell. Note that if ‘’CAT” was a word in Madison’s vocabulary, then both of the sets C,A 1 ,T and C,A 2 ,T would appear among the S i . We are interested in the maximum number of disjoint sets (which correspond to words in Madison’s vocabulary that can be simultaneously spelled out by the magnet pieces).

We reduce Independent Set (IS) to Set Packing. Given an instance of IS ( G,k ), we set U to be the set of edges of G . For each vertex v i , we introduce a set S i = { e : e = ( v i ,x ) } which has one element for each edge incident to v i . We claim that G has an independent set of size k iff there are k disjoint sets among the S i . Indeed, if I is an independent set of size k then the k sets S v for v ∈ I have no common elements. Also, if { S i 1 ,...,S i k } are k disjoint sets then the vertices v i 1 ,...,v i k have no edges between them thus they form an independent set of size.

Write a program to determine all pairs of positive integers, (a, b), such that a < b < n and (a 2 b 2 1)/(ab) is an integer. Here n is an integer and n > 1. Note: Your method should take n as a parameter and return nothing. You should print inside the method.c

Answers

Answer:

following are the code to this question:

#include <iostream> //defining header file  

using namespace std;  

void me(int n) //defining a method me, that accept an integer value  

{  

int a,b,t1,t2; //defining integer variable  

for(a = 1; a<n; a++) //defining loop to calculates a variable value  

{

for(b=a+1; b<n; b++) //defining loop to calculates a variable value  

{

t1=(a*a)+(b*b)+1; //hold value in t1 value

t2=a*b; // calculates multiplication value and hold in t2 variable          

if(t1%t2==0) //defining condition that check calculated value is equal to 0

{

cout<<"("<<a<<","<<b<<")"; //print a and b value.

}

}

}

}

int main() //defining main method

{

int n; // defining integer variable

cout<< "Enter a number: "; //print message

cin>> n; // input value  

if(n>1) //defining condition that check value is greater then 1

{

me(n); //call method and pass the value

}

else

{

cout<<"Enter a number, which is greater then 1";  //print message  

}

   return 0;

}

Output:

Enter a number: 3

(1,2)

Explanation:

In the given C++ language code, a method "me" is defined, that accepts an integer value "n" as its parameter and this method does not return any value because its return type is void, inside the method two for loop is declared, that calculates a and b value and hold in t1 and t2 variable.

In the next step, if the condition is used, that checks module of t1 and t2 is equal to 0, then it will print a, b value. Inside the main method an integer variable n is declared, that accepts a value from the user end, and use if block that checks user input is greater then 1, then we call method otherwise, print a message.  

Write a function shampoo_instructions() with parameter num_cycles. If num_cycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N : Lather and rinse." num_cycles times, where N is the cycle number, followed by "Done.". Sample output with input: 2 1 : Lather and rinse. 2 : Lather and rinse. Done. Hint: Define and use a loop variable.

Answers

Answer:

def print_shampoo_instructions(num_cycles):

   if num_cycles < 1:

       print("Too few.")

   elif num_cycles >4:

       print("Too many.")

   else:

       N = 1

       for N in range (N,num_cycles+1):

           print(N,": Lather and rinse.")

       print("Done.")

Explanation:

Final answer:

The function shampoo_instructions() controls repetitions based on input, preventing infinite loops, akin to the shampoo instructions' issue. It emphasizes the importance of iteration control in programming loops to avoid endless execution. Understanding how to manage loop cycles prevents program malfunction due to infinite loops.

Explanation:

shampoo_instructions() is a function that takes a parameter num_cycles and prints instructions based on the input. If num_cycles is less than 1, it prints 'Too few.'; if more than 4, it prints 'Too many.'; otherwise, it prints the cycle number followed by 'Lather and rinse.' num_cycles times.The directions on shampoo create an infinite loop since they lack an iteration variable to specify the number of repetitions. In programming, developers must include a mechanism to control loops' execution, preventing infinite iterations.

In a loop, each iteration represents a cycle, akin to the instructions in shampoo; therefore, the concept of controlling the number of repetitions is fundamental to avoid infinite loops and ensure proper program execution.

Which of the following can be considered beta testing? A programmer at Linus Systems checks the integration of multiple modules of an information system. System users at URP feed data into a new information system to test its capability. MNP Inc. checks the system to ensure that it meets all the necessary design requirements. Taro Inc. checks the correctness of the modules in its new information system. Software testers compare the finished system against user requirements to see if it satisfies all necessary criteria.

Answers

Final answer:

System users at URP feeding data into a new information system to test its capability represents beta testing, where real users assess the software in real-world conditions.

Explanation:

The scenario that can be considered beta testing is when system users at URP feed data into a new information system to test its capability. Beta testing involves real users testing the software in a production environment to identify any unresolved bugs or issues before the official release. It is typically the last type of testing done after in-house tests such as unit testing and integration testing have been completed.

In beta testing, the goal is to assess how well the software performs under real-world conditions and to gather feedback from users that can be used to further improve the product's design. This is consistent with the cycle of prototyping, testing, and refinement discussed in the provided references, where testing and evaluation reveal weaknesses or potential improvements, and the design may be adjusted accordingly.

Other scenarios described may represent different levels and types of testing such as integration testing, system testing, or validation testing, which occur before beta testing in the software development lifecycle.

Consider the following two code segments, which are both intended to determine the longest of the three strings "pea", "pear", and "pearl" that occur in String str. For example, if str has the value "the pear in the bowl", the code segments should both print "pear" and if str has the value "the pea and the pearl", the code segments should both print "pearl". Assume that str contains at least one instance of "pea".

I.

if (str.indexOf("pea") >= 0)

{

System.out.println("pea");

}

else if (str.indexOf("pear") >= 0)

{

System.out.println("pear");

}

else if (str.indexOf("pearl") >= 0)

{

System.out.println("pearl");

}

II.

if (str.indexOf("pearl") >= 0)

{

System.out.println("pearl");

}

else if (str.indexOf("pear") >= 0)

{

System.out.println("pear");

}

else if (str.indexOf("pea") >= 0)

{

System.out.println("pea");

}

Which of the following best describes the output produced by code segment I and code segment II?

Both code segment I and code segment II produce correct output for all values of str.

Neither code segment I nor code segment II produce correct output for all values of str.

Code segment II produces correct output for all values of str, but code segment I produces correct output only for values of str that contain "pear" but not "pearl".

Code segment II produces correct output for all values of str, but code segment I produces correct output only for values of str that contain "pearl".

Code segment II produces correct output for all values of str, but code segment I produces correct output only for values of str that contain "pea" but not "pear".

Answers

Answer:

Code segment II produces correct output for all values of str, but code segment I produces correct output only for values of str that contain "pea" but not "pear".

Explanation:

The main issue with the first code segment is the way how the if else if condition are arranged. The "pea" is checked at the earliest time in the first code segment and therefore so long as there is the "pea" exist in the string (regardless there is pear or pearl exist in the string as well), the if condition will become true and display "pea" to terminal. This is the reason why the code segment 1 only work for the values of str that contain "pea".

What are advantages of lookup fields?

Answers

Answer:

Easier data entry, acceptable values, fewer misspellings

Explanation:

Edge 2021

A column in a table that looks up data from another table or query is known as a lookup field.

What is Lookup filed?

The Lookup Wizard should always be used to create a lookup field. The Lookup Wizard streamlines the procedure by automating the required field attributes' automatic insertion and the creation of the proper table associations.

A lookup field is used to display something more meaningful, such a name, instead of a number like an ID. For instance, Access can show a contact name rather than a contact ID number.

The bound value is the contact ID number. It is automatically replaced with the contact name after being looked up in a source database or query.

Therefore, A column in a table that looks up data from another table or query is known as a lookup field.

To learn more about lookup field, refer to the link:

https://brainly.com/question/31923038

#SPJ2

What is SDLC? Explain different phases of SDLC in detail.

Answers

Answer:

systems engineering

Explanation:

In systems engineering, information systems and software engineering, the systems development life cycle, also referred to as the application development life-cycle, is a process for planning, creating, testing, and deploying an information system.

For credit card processing, stock exchanges, and airline reservations, data availability must be continuous. There are many other examples of mission-critical applications. Research the Internet to find four additional mission-critical applications and explain why data availability must be continuous for these applications. If you use information from the Web, use reputable sites. Do not plagiarize or copy from the Web. Be sure to cite your references.

Answers

Answer:

The answer to this question can be described as follows:

Explanation:

The mission-critical System-

A vital mission program is necessary for an organization's life. If a critical task program disrupted, industrial control should be severely affected.  The essential support device is often referred to as critical task equipment.

Safety system for nuclear reactors-

The nuclear power plant is used to control the system, and it also contains and continues reactions.  It's also usually used only for energy production, and also used experiments and clinical isotope manufacture.  

If another system of nuclear power fails, this could result in a continuous nuclear reaction in a range of aspects like irradiated leaks. These same persons across the area may experience serious radioactivity symptoms.

The main task in their personal life-  

They realize, that without power, they turn down your entire life when you've never encountered a dark off with more than 30 minutes. Essentially, people wouldn't have been allowed to do what you'll do, entirely frozen.  

Consumer survey: big financial transfer controlling business-

That company is the infrastructure and software supplier for banks, traders, distributors, and institutional investors to take out money transfers. With all the money transfers they depend on, you must establish a successful company to become the 'guy behind the button', etc.

Other Questions
Answer help points a lot At the extreme temperatures within the Sun, hydrogen forms plasma. Plasma forms when:1. atoms join together in chemical reactions2. protons and electrons fuse together3. protons fuse together, releasing heat and light4. atoms break down to form free protons and electronsIf you could please let me know which option would be the answer to the question, it would be great! What physical condition is caused by eating disorders? The probability of a chance event is 0.05, it isto happenwhen compared to a chance event with a probability of 0.Select one:more likelyboth more and less likelyless likelyequally likely g "Slack, Inc. had an IPO on June 1, 2019 and sold 275m shares with par value of $0.03 for $37.50/share. What is the journal entry Slack records on June 1, 2019? Group of answer choices DR Common Stock $8.25m; DR PIC-Common Stock $10,304.25m; CR Cash $10,312.50m DR Cash $10,312.50m; CR Common Stock $8.25m; CR PIC-Common Stock $10,304.25m DR Cash $10,312.50m; CR Common Stock $10,312.50m DR Common Stock $10,312.50m; CR Cash $10,312.50" The goal of NAFTA was to create a " between the UnitedStates, Canada, and Mexico.U borderless countryO military allianceO political unionO free trade zone 10-M/J Language Arts 1 (Q4)EnglishUsing Signal WordsAbgHighlight the cause-and-effect signal word.Even closer to the middle, if the fish couldn't go muchfaster, it would find itself swept all the way in, stuck inthe swirl, pulled round and round and round.-A Black Hole Is NOT a Hole,Carolyn Cinami DeCristofanoWhat does the word you highlighted indicate?O The cause is the fish not going much faster.The effect is the fish not going much fasterThe cause is the fish being swept into the whirlpool.3 The effect is the fish being swept into the swirl. 30 pts and crown first come first serveWhich event caused the most economic hardship for African American families after 1968?Select the best answer from the choices provided.A. Nixon's Family Assistance PlanB. the loss of manufacturing jobsC. Clintons policy on crimeD. the decline of the family farm Which of the following BEST defines labor?A managementB. invested capitalC. work for which someone is paidD. means of production that produce a good or servicePlease select the best answer from the choices provided A box contains 50 cups. It is a mix of plastic and paper cups. Simon chooses a cup out of the bag, without looking, records the cup type, and then places that cup back in the bag. Simon has recorded 24 plastic cups and 26 paper cups. Using these results, predict the number of plastic cups in the bag. Which of the following lacks a nucleus?A. plant cellB. animal cellC. virusD. fungus Describe the transformation f(x) = x + 1 5 in words. The parent function f(x) = x has been shifted 1 unit and 5 units. Solve the inequality: 2x > 6 Question 3 options: x < 3 x > 3 x > 3 x < 3 Consider this chemical reaction, where moving from left to right represents moving forward in time. A five panel comic strip. In the first panel, there are ten large red spheres. In the second panel, there are 8 large red spheres and two small blue spheres. In the third panel, there are six large red spheres and four small blue spheres. In the fourth panel, there are four large red spheres and six small blue spheres. In the fifth panel, there are four large red spheres and six small blue spheres. At what point does the reaction first reach equilibrium Is (1, 7) a solution to this system of inequalities? y < x + 8 y 6x + 1 In peas the flower color and pollen length genes are very close together on the same chromosome. Purple flowers (P are dominant to white (p), and long pollen (L) is dominant to short pollen (l). A true breeding variety of peas with purple flowers and short pollen is crossed to a true breeding variety with white flowers and long pollen. The F1 plants are then self-crossed to produce an F2 generation.Required:a. What is the genotype and phenotype of the F1 generation?b. What proportion of the F2 will have purple flowers with long pollen?c. What proportion will have white flowers and short pollen? Solve triangles using the law of cosinesFind AB.Round to the nearest tenth. All of the following can be characteristics that link people together through ethnicity except __________. The answers I dont really understand the question HELP!What is the volume of the prism?5.6 cm4 cm9 cm7.8 cm Steam Workshop Downloader