Answer:
TreeNode minimum(TreeNode root) {
if (root != null) {
if (firstChild == null && nextSibling == null) {
return root;
} else {
TreeNode begin = minimum(root.firstChild);
TreeNode last = minimum(root.nextSibling);
if (begin == false && (last == false || begin.data < last.data)) {
return begin;
} else {
return last;
}
} else {
return null;
}
}
Explanation:
The Java program defines a recursive method called minimum that calls itself twice with the first and last leaf of the treenode as the respective arguments. and returns the minimum value of the treenode if the root argument is not undefined.
Melissa has expanded her Cell class further. In which method is she using a special keyword to help distinguish instance variables in the class and print the results?
public class Cell B. public int getchromosomes) if (this.chromosomes<1) private int chromosomes, rna public double time, h2o, mCount private static int cellCount0; throw new llegalArgumentException("chromosomes is less than 1"); return this.chromosomes public Cell(O chromosomes 23; C. public void grow(double x) rna - 1; inc mCount(this,x); return; mCountrna/h2o cellCount++; System.out.printin("There are now" + cellCount +"cells"; public void inc mCount(Cell cell, double factor) this.mCount mCount factor return public Cell(int a chromosomes, int a rna, double a h20) this) chromosomes a chromosomes; rna -a_rna; h2o-a h20 mCount- rna/h2o; D. public double get mCount) return this.mCount; public staic Cell getLargerCell_mCount(Cell cell_1, Cell cell_2) cellCount++ System.out.printin("There are now"+cellCount +"cells"); if(cell_1.get mCount)cell_2.get mCount)) return cell 1; else return cell 2;
A. public void printinfoo System.out.printin("chromosomes:" + this.chromosomes); System.out.printin("rna:" + this.rna); System.out.printin("h2o:"+this.h20);
Answer:
A. public void printinfoo(){
System.out.printin("chromosomes:" + this.chromosomes);
System.out.printin("rna:" + this.rna);
System.out.printin("h2o:"+this.h20);
Explanation:
The System.out.printin() function is used in Java to print out the output of a program. The first option prints out its output while the other options return the result of their function.
explain atleast 5 areas where computer applied for the social economic development in society
Answer:
The answer is below
Explanation:
Given that socio-economic development has to do with continual positive changes in the socio-economic conditions of individuals, organizations, and society at large.
Hence, the five areas in which computer applied for the social-economic development in society are:
1. Capital resources or market: computer has greatly influenced the development of the capital market through various forms including data sharing, CRM software, Online customer service, Video conferencing, customer application development, cloud management services, etc
2. Government activities: computers over the years have improved the efficient operations of government and their activities through various means including the creation of a database, tracking of policies such as building permits, distribution of payments such as aids and palliatives, etc.
3. Business: computer is known to have tremendous influence in business operations including activities of firms in the area of research, marketing, advertisement, production, distribution, data storage, etc.
4. ICT world: computer generally has improved humans' approach and understanding of the ICT and better ways to maximize its usage. This includes the area of electronic information capture, storing, processing, and transfer.
5. Society: computer typically has its huge and direct impact on our society, this includes the development of human and social capital in terms of education, continuous obtainment of knowledge, skills, and mastery of skills that facilitate personal development and satisfaction, economic success and community prosperity.
Which situation would benefit most from a Watch window?
A B C D
the answer is: D. A 3-D formula causes cells in a worksheet to change when edits are made to other worksheets.
Answer:
yeah i agree with your answer
Answer:
D) A 3-D formula causes cells in a worksheet to change when edits are made to other worksheet
Explanation:
;)
The create_python_script function creates a new python script in the current working directory, adds the line of comments to it declared by the 'comments' variable, and returns the size of the new file. Fill in the gaps to create a script called "program.py". 1- def create_python_script(filename): 2 comments = "# Start of a new Python program" with open("filename", "w+") as file: file.write(comments) import os filesize - os.path.getsize(filename) print("The size of the file is:") return(filesize) Reset 3 4 5 6 7 Run 9 10 11 print(create python script("progran.py"))
Answer:
import os
def create_python_script(filename):
comments = "# new python script file"
with open(filename,"w+") as file:
file.write(comments)
filesize = os.path.getsize(filename)
print(f"The size of the file is: {filesize}")
create_python_script("program.py")
Explanation:
The os module is a built-in python file that is used to interact with the operating system terminal. The with keyword is used to create and open a file with write privileges with no need to close the file.
The path.getsize() method is used to get the size of the newly created file which is printed in the console.
Question 2: Describe and Discuss the concepts of Higher order functions and currying in a functional programming language such as Haskell (or Standard ML) and describe why these concepts are important.
Answer:
A higher-order function is a type of function in programming that can either accept a function as its parameter or return a function or both. Curring is a process used by functions to accept and access multiple arguments.
Explanation:
Functional programming languages like Hasket, Javascript, Python, etc, use the concept of higher-order functions and Curring to accept multiple arguments and functions as parameters and can also return a function.
Project 1-1: Set Up a Small Network
5. Answer the following questions:
a. Does your network use a client-server or peer-to-peer model?
b. What is the topology of your network?
c. If the lights on the switch ports were not lit or blinking, what is the best theory of
probable cause? At what layer of the OSI model would this theory be?
As you work your way through this book, you will continue to build your small network and its resources.
Answer:
a. peer-to-peer
b star topology
Explanation:
what are major classification of computer software
Answer:
Application Software.
System Software.
Programming Software.
While application software is designed for end-users, and system software is designed for computers or mobile devices, programming software is for computer programmers and developers who are writing code.
Driver Software.
Explanation:
Typically, there are two major classifications of software, namely System Software and Application Software.
1. System SoftwareA system software aids the user and the hardware to function and interact with each other. Basically, it is a software to manage computer hardware behavior so as to provide basic functionalities that are required by the user. In simple words, we can say that system software is an intermediator or a middle layer between the user and the hardware. These computer software sanction a platform or environment for the other software to work in. This is the reason why system software is very important in managing the entire computer system. When you first turn on the computer, it is the system software that gets initialized and gets loaded in the memory of the system. The system software runs in the background and is not used by the end-users. This is the reason why system software is also known as ‘low-level software’.Some common system software examples are:
Operating SystemDevice DriversFirmwareProgramming Language TranslatorsUtility2. Application SoftwareApplication Software, also known as end-user programs or productivity programs are software that helps the user in completing tasks such as doing online research, jotting down notes, setting an alarm, designing graphics, keeping an account log, doing calculations or even playing games. They lie above the system software. Unlike system software, they are used by the end-user and are specific in their functionality or tasks and do the job that they are designed to do. For example, a browser is an application designed specifically for browsing the internet or MS Powerpoint is an application used specifically for making presentations. Application Software or simply apps can also be referred to as non-essential software as their requirement is highly subjective and their absence does not affect the functioning of the system. All the apps that we see on our mobile phones are also examples of Application Software. There is certain software that is exclusively made for app development like Meteor and Flutter. These are examples of Application software too.There are various types of application software:
Word ProcessorsDatabase SoftwareMultimedia SoftwareEducation and Reference SoftwareGraphics SoftwareWeb BrowsersOther than these, all the software that serves a specific purpose fall under the category of Application Software.
However, there exists one more classification of the software. The software can also be classified based on their availability and sharability.
HOPE IT HELPS
PLEASE MARK ME BRAINLIEST ☺️
only evansandre2007 and elizabetharnold84 can answer
Answer:
Explanation:
Okie dokie
Have a nice day
Bob is having no luck performing a penetration test on Retail Store's network. He is running the test from home and has downloaded every security scanner that he could lay his hands on. Despite knowing the IP range of all the systems, and the exact network configuration, Bob is unable to get any useful results. Why is Bob having these problems?
Incomplete question. The full question read;
Why is Jim having these problems?
Options:
A. Security scanners are not designed to do testing through a firewall.
B. Security scanners cannot perform vulnerability linkage.
C. Security scanners are only as smart as their database and cannot find unpublished vulnerabilities.
D. All of the above.
Answer:
D. All of the above.
Explanation:
Remember, security scanners are only designed to gather information about a network, but not with the ability to perform firewall testing. Also, these security scanners are pre-programmed with existing vulnerabilities in their database, and so it would impossible to discover vulnerabilities on the Retail store's network.
Hence, since Bob is using the wrong tools, he is unsuccessful in performing a penetration test.
a character that
is raised and smaller above the baseline is called
Answer:
A character that is raised and smaller above the baseline is called a superscript.
Explanation:
A character that is raised and smaller above the baseline is called a superscript.For example, let 'a' be the number and 'n' is the exponent power of the number 3.
aⁿ
The number 'n' above the number 'a' is an example of a superscript.
In another example, let the expression be
4⁶
The number 6 above the number 4 is an example of a superscript.
Therefore, we conclude that a character that is raised and smaller above the baseline is called a superscript.
A group of students is performing an investigation to measure how much liquid water is produced from a 10 L sample of snow. What must occur in order for the students to perform this investigation?
Answer:
the temperature of the sample must change
Explanation:
Write a program that opens an output file with the filename my_name.txt, writes your name to the file, then closes the file. python
f = open("my_name.txt", "w")
f.write("Your name here")
f.close()
You just have to change Your name here to your actual name. I wrote my code in python 3.8. I hope this helps.
Identify some cases of violations of user privacy from current literature and their impact on data science as a profession.
Explanation:
Remember, the term "violations of user privacy" is usually used when an entity without seeking users' consent uses or sells the private information of people (or users) in a way the users would view as inappropriate.
For example, in 2020, one of Mark Zuckerberg's company was recently accused of secretly watching its user who had the app installed on their phone via their smartphone front camera without their knowledge.
Another prominent case is that of ride-sharing company Uber, in 2018, they were accused of not taking seriously the protection of users privacy after they've experienced a data breach that exposed their customer's personal information, such as phone numbers, addresses, and email addresses. They were penalized as result by a court.
The physical layer of the OSI model is not foundational to any of the other layers. True or False
Answer:
False.
Explanation:
OSI model stands for Open Systems Interconnection. The seven layers of OSI model architecture starts from the Hardware Layers (Layers in Hardware Systems) to Software Layers (Layers in Software Systems) and includes the following;
1. Physical Layer
2. Data link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
Each layer has its unique functionality which is responsible for the proper functioning of the communication services.
The physical layer of the OSI model is the first layer of the OSI model and it is foundational to any of the other layers because it determines the means of transmitting (sending) raw bits from one network node to another and the electrical specification of network equipments.
Several key people were involved in programming-language development in the 1970s and 1980s
Answer:
Brian Kernighan and Dennis Ritchie created the C programming language, and Bjarne Stroustrup took it to the next level by creating C++ in the 80's.
Answer:
Bjarne Stroustrup released C++ programming language in the1980s.
Bill Gates and Paul Allen released the first programming language for a personal computer.
Niklaus Wirth developed Pascal to teach programming.
Explanation:
1,3,4
3. Which property provided the labels in the list below?
1. List item
II. List item
III. List item
IV. List item
O list-style-type: numerals
list-style-type:decimal
O list-style-type: upper-roman
O list-style-type: upper-alpha
Answer:
this doesnt make sense
Explanation:
The property that provided the labels in the list is the "list-style-type" property. The options given are the different values that can be assigned to the "list-style-type" property. The value "numerals" refers to using Arabic numerals (1, 2, 3, etc.) as the labels, while "decimal" is similar but includes a period after each numeral (1., 2., 3., etc.).
What is list-style-type? Property?The 'list-style-type' property is a CSS property that is used to define the style of the marker or bullet of a list item. It specifies the appearance of the marker for unordered lists (like bullet points) and ordered lists (like numbered lists) on a web page.
The value "upper-roman" refers to using uppercase Roman numerals (I, II, III, etc.) as the labels, and "upper-alpha" refers to using uppercase letters (A, B, C, etc.) as the labels.
So, in summary, the "list-style-type" property determines the style of the labels used in a list.
To know more about CSS property:
https://brainly.com/question/30116889
#SPJ2
Write down the pseudo code for a brute-force algorithm to compare elements in array A with elements in array B.
Answer:
def brute_force(array1, array2):
for item in array1:
for element in array 2:
if element == item:
print(f"{element} and {item} are a match")
Explanation:
A brute-force algorithm is a direct-to-solution algorithm that searches and compares variables. It is like trying to unlock a safe but not knowing its four-digit combination, brute-force starts from 0000 through 9999 to get a match.
The python program implements the algorithm using two nested for loops. The first loop iterates over array1 while the second, over array2. For every item in the first array, the program loops through the length of the second array. For every match, the items are printed on the screen.
Please help me I am crying because I don't know
Small computer systems interface and Universal serial bus ports are examples of _____ device Sports
Answer:ubers texi’s
Explanation:
Compare briefly the general structure of the complete language processor of Java and the language processor of C . (b) Explain the major differences.
Answer:
The difference to this question can be defined as follows:
Explanation:
Java language processor:
In java, it uses both compiler and interpreter.It uses high-level data is translated by java computer to byte-code, and by this, it transfers to an element, through either java interpreter or the Just-in-time, into electronic format Just-in-time compiler optimizations are generally preferred to the interpretation so because the process is slowed down. Its state of development of java bytecode is moderate (this byte code can run on any machine, on any operating system), therefore JAVA is an independent platform language.C++ language processor:
In C++, it uses the only compiler. The software is preserved with the .cpp extension. so, that it can be converted to allelopathy of the c++ COMPILER, high - level language. The creation of the byte code is no intermediary, and it is not an independent platform.What is one way polymorphism is implemented?
created a new class using an existing class
changing a variable from a string to a float
hiding class variables from the programs using instances of the class
repurposing an operation
Answer:
repurposing an operation
Explanation:
Got it right
What do search engines use to trust that a local business is an appropriate place for which users are looking?
Answer:
To build trust among search engines, authority needs to be demonstrated not just in a website's content, but how the site is perceived by other authoritative sites. ... Garnering links from authoritative sites like social networks, directories and other sources will improve trust.
HELP!!! What would var d=?
Answer:
51015
Explanation:
Var b is a string, and it'll treat addition like string concatenation (aka just adding a message.) Since it's concatenation, it'll then turn the numbers/integers into strings.
This kind of behavior might be different depending on the language, though. Some languages might not allow this. (For example, C and C++)
Describe your WGU program, including two specific requirements that this degree has for completion.
Answer:
WGU program, including two specific requirements that this degree has for completion is explained below in details.
Explanation:
WGU is an online academy with profession joined bachelor's and master's degrees in—IT, education, marketing, and healthcare—intended to support working professionals fit an online academy learning into their hard-working lives.
As a scholars, graduate pupils must register in at least eight competency units every term, and undergraduate pupils must register in at least twelve competency units respectively term.
It should be noted that WGU program simply refers to an online school where students can have degrees when they complete their courses.
WGU is simply an online school that has career-aligned bachelor degrees and masters degree.
It's designed in order to help working professionals fit an online education into the busy lives that they've. In this case, the students have to register for their courses and pass the required units.
Learn more about programs on:
https://brainly.com/question/13171394
In reviewed assignment, you will use an array to calculate an average from raw data.
a. True
b. False
Answer:
a. True
Explanation:
In C, an array is a data structure used to hold a collection of similar data types. It is ordered and indexed, which means that it can be accessed using the index value of the target item in the array.
A loop statement can be used to iterate over all the items in the array. For example, you can get the average of all the items in an integer array by iterating over it, summing its total and dividing it by the length of the array.
You are given two sorted arrays, A and B, and A has a large enough buffer at the end to hold B. Write a method to merge B into A in sorted order without using any other array space.Implementation instruction:1) Define one array of size 18 for A and the other array of size 5 for B.2) Initialize A by inputting 13 integers in the ascending order, and Initialize B by inputting 5 integers in the ascending order.
Answer:
#include <iostream>
using namespace std;
int main(){
int arrayA[18] = {1,2,3,4,5,6,7,8,9,10,11,12,13};
int n = arrayA.length();
int arrayB[5] = {14,15,16,17,18};
for (int i = 0; i < arrayB.length(); i++){
arrayA[n] = array[i];
n++;
}
}
Explanation:
The C++ program defines two arrays namely; "arrayA" and "arrayB". The first array has a space size of 18 while the second array has a size of 5. In the program, the second array is merged into the first array
__________ often causes overactive eye movement.
A. Alcohol
B. Nicotine
C. Morphine
D. Xanax
Game Informer (often abbreviated to GI) is an American-based monthly magazine featuring articles, news, strategy, and reviews of popular video games and associated consoles. Formed in August 1991,[1] the magazine has nearly 3 million subscribers according to Andrew Reiner, making it the highest circulated video game magazine,[2] and as of the first quarter of 2007, it is listed as the 23rd largest overall magazine. Game Informer is now ranked among the top four magazines for reaching males 18 to 34.[3] It is owned and published by GameStop Corp., the parent company of the video game retailer of the same name. Due to this, a large amount of promotion is done in-store, which has contributed heavily to its large subscription base,[4] especially as a subscription is included with the store's Gamer's Edge discount card. Contents [hide] · · 1 GI Staff · · 2 Recurring events · · 3 Reviews · · 4 Website · · 5 References · · 6 External links Judging from this introduction, what kind of information would you expect to find in the article? a. How many people subscribe to Game Informer c. A list of games about which Game Informer has written b. Who works for Game Informer d. none of the above
Answer:
it is d i just took it
Explanation:
There is not any kind of information would you expect to find in the article, hence option d is correct.
What is information?Information is defined as a vague idea that describes something with the capacity to inform. Information is most fundamentally concerned with the interpretation of what may be sensed. Facts and text elements including a glossary, table of contents, photographs, and captions are characteristics of informational literature.
Game Informer is a consumer advocate who aims to assist gamers in finding games they will enjoy, and it has built a solid reputation for reliable reviews and clear, succinct reporting by an experienced staff. You can access both the PC/Mac browser version of Game Informer as well as the Game Informer app for iOS or Android with a single digital subscription.
Thus, there is not any kind of information would you expect to find in the article, hence option d is correct.
To learn more about information, refer to the link below:
https://brainly.com/question/13629038
#SPJ2
Write a 200 word essay about how a computer is made.
Good luck.
Answer:
Essay about how a computer is made is written below in detailed explanation.
Explanation:
After so many discoveries and inventions, Humans ultimately made the computer. And, today some personalities in the world can't exist a bit without a computer.
The computer is an electric device that is utilized for collecting and processing data. The hard work can be completed in a shorter time with the guidance of computers. With the assistance of the computer, we can do all the stuff in today's world.. Because of this, the computer performs a vital purpose in this contemporary life.
Observe the following output and write the complete HTML-CSS code to generate it:
Answer:
HTML:
<ol start="3">
<li>English</li>
<li>Maths</li>
<li>Physics</li>
<li>Chemistry</li>
<li>Biology</li>
</ol>
CSS:
ol {
color: green;
font-family: Courier;
list-style-type: lower-roman;
border: 2px dotted black;
width: 200px;
}
li {
margin-left: 10px;
}
Explanation:
The left margin on the li is not very clean, but it prevents the roman numbers from exceeding the border.
Application software helps run the computer and coordinates instructions with the hardware.
A. True
B. False
Answer:
A. True
Explanation: