Answer:
import java.lang.Math;
import java.util.Scanner;
class lineLength {
private double x1;
private double x2;
private double y1;
private double y2;
public lineLength(double x1, double y1, double x2, double y2){
this.x1 = x1;
this.x2 = x2;
this.y1 = y1;
this.y2 = y2;
}
public String toString(){
double length = Math.sqrt( ( ( this.x2 - this.x1 ) * ( this.x2 - this.x1 ) ) + ( ( this.y2 - this.y1 ) * ( this.y2 - this.y1 ) ) );
String answer = String.format("%.4f %n", length);
return answer;
}
}
class Main{
public static void main(String[] args) {
Scanner scanner = new Scanner(System.in);
System.out.println("Please input x1, y1, x2, and y2");
double x1 = scanner.nextDouble();
double y1 = scanner.nextDouble();
double x2 = scanner.nextDouble();
double y2 = scanner.nextDouble();
lineLength test = new lineLength(x1,y1,x2,y2);
System.out.println(test);
}
}
Explanation:
we use formula
[tex]\sqrt{(x_2-x_1)^2+(y_2-y_1)^2}[/tex]
13. You're emailing your grandparents. Which of the following is the best example of digital etiquette?
A. Typing in all caps because they wear glasses
B. Repeatedly teasing them in an attempt at humor
C. Pirating movies that they want to see
D. Spelling out words and avoiding slang
Answer:
D
Explanation:
spelling out words and avoiding slang
What is the function of network security
It protects information from users.
It protects networks from intruders,
It secures networks from users,
It protects users from networks,
It protects users from networks
and other data from breaches intrusion and other threats.
Answer:
it protects netorks from intruders
Explanation:
i took the test
What is keyword density?
Answer:
Keyword density is the percentage of times a keyword or phrase appears on a web page compared to the total number of words on the page. In the context of search engine optimization, keyword density can be used to determine whether a web page is relevant to a specified keyword or keyword phrase.
Write a 2 page paper explaining why a compiler needs to know about both the target architecture as well as the target OS.
The target architecture and the operating system are important to the compiler to perform high level executions which are made in programming language.
What is a compiler?A compiler simply means a computer program that is important in the translation of codes that are written in a particular language to another programming language.
In this case, they're vital to perform high level executions which are made in programming language.
The target architecture also sets the framework for the planning and assigning of resources to reach a desired state.
Learn more about compiler on:
https://brainly.com/question/26175597
1. Welds made critical piping must be expertly
Completed, thoroughly inspected, and
Welds made on critical piping must be expertly completed, thoroughly inspected, and also at least as strong as the piping being welded.
What welding process is used on pipelines?Welding processes are known to be the method that is used in a range of industries such as aerospace, automotive, energy, construction etc.
Pipe welding is known to be one that uses arc welding techniques, such as shielded metal arc welding (SMAW), gas metal arc welding (GMAW) and others. note that Welds that is done on critical piping have to be expertly completed, thoroughly inspected, and also at least as strong as the piping being welded.
Learn more about Welds from
https://brainly.com/question/5794222
3. Which of the following strategies will lower the conduction load in a building? (choose all that apply)
A. Lowering the U-factor
B. Raising the U-factor
C. Lowering the A in square feet
D. Raising the A in square feet
E. Lowering the AT
F. Raising the AT
Explanation:
Site the building carefully. ...
Use trees and other vegetation to shade the house. ...
Minimize size of windows on east and west; limit size on south. ...
Use low-solar-transmittance glazings to reduce solar gain. ...
Shade windows with architectural features.
Write pseudo code that performs the following: Ask a user to enter a number. If the
number is between 0 and 10, write the word blue. If the number is between 10 and
20, write the word red. if the number is between 20 and 30, write the word green.
If it is any other number, write that it is not a correct color option.
Ask a user to enter a number. If the number is between 0 and 10, write the word blue. If the number is between 10 and 20, write the word red. if the number is between 20 and 30, write the word green. If it is any other number, write that it is not the correct color option
pseudo-code is:
Write "Please enter a number"
Read colornum
If(colornum >0 and colornum <= 10)
Write blue
else If(colornum >10 and colornum <= 20)
Write red
else If(colornum >20 and colornum <= 30)
Write green
else
Write "not a correct color option"
What is pseudo code?Pseudocode is also called false code. Pseudocode is a natural way of programming description that does not require any strict programming language syntax or underlying technology considerations. In simple words, the pseudocode is the planning or designing program.To learn more about Pseudocode refer to:
https://brainly.com/question/24953880
#SPJ2
A______data structure goes in order of arrival.
_______means First in, First out.
A _______data structure data is pushed onto the stack and uses _______
Last in, First out.
-queue
-FIFO
-LIFO
-stack
What purpose does encryption on the internet serve? Why is it so important?
Answer:
it keeps cybercriminals from stealing private information
Explanation:
hope this helps
discuss about programming language make use of both interperter and complier?
Answer:
I think High Level Language is the Programming language that makes use of both interpreter and compiler
Spreadsheets are sometimes credited with legitimizing the personal computer as a business tool. Why do you think they had such an impact?
Spreadsheets is known to be an credited tool with legitimizing the personal computer as a business tool. Spreadsheets have a lot of impact in business world because:
It has low technical requirement. Here, spreadsheet does not need a complex installation and it is easy to understand.Data Sifting and Cleanup is very easy to do.It is a quick way to Generate Reports and Charts for business.What is Spreadsheets?Spreadsheets is known to be a key business and accounting tool. They are known to have different complexity and are used for a lot of reasons.
The primary aim of this is that it helps us to organize and categorize data into a kind of logical format and thus helps us to grow our business.
Learn more about Spreadsheets from
https://brainly.com/question/4965119
Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?
A.
software engineering process
B.
software quality metrics
C.
SQA audits
D.
reviews
Answer:
B: software quality metrics .
What does a good SOW include?
a mission statement with summarized sections.
a mission statement with detailed sections
a broad statement with summarized sections
a broad statement with detailed sections
Answer:
a broad statement with summarized sections
Explanation:
Which of these best describes the principle of least privilege? Users should have at least the privileges they need to do their jobs, and usually more. Users should have at least the privileges they need to do their jobs, and usually more. Only one system administrator should have the highest level of privileges. Only one system administrator should have the highest level of privileges. The fewer privileges users have, the better a network operates. The fewer privileges users have, the better a network operates. Users should have the minimum privileges needed to do their work. Users should have the minimum privileges needed to do their work.
The statement which best describes the principle of least privilege is: D. Users should have the minimum privileges needed to do their work.
What is principle of least privilege?Principle of least privilege is also referred to as the principle of minimal privilege (least authority) and it can be defined as a security concept that involves giving an end user, software program, or process the least (minimum) levels of access and permissions necessary to perform a work or an action in a database.
In this context, end users should have the least (minimum) privileges needed to do their work, in order to protect a database or network.
Read more on least privilege here: brainly.com/question/4365850
Answer:
Users should have the minimum privileges needed to do their work.
Explanation:
Ed22
Which type of testing requires the tester to enter erroneous data into an application?
A.
usability testing
B.
data comparison
C.
validation testing
D.
stress testing
a researcher saved her draft work on a CD ROM from a friends computer with an intention of sending it to her supervisor by e-mail once she got home. however on reaching home she realized that her computer could not read a CD ROM. how can you advice her to have her work sent without physically going back to her friend?
Answer:
mail the cd to the supervisor
Explanation:
What is the term given to large values of information collected from various sources?
A.
association
B.
classification
C.
neural networks
D.
big data
The term given to large values of information collected from various sources ; association.
What is the various?The various can refer to a range of different things, depending on context. It could refer to different types of people, cultures, items, or anything else that can be seen as different or distinct from each other. It could also refer to different ways of looking at or doing something. For example, various methods of problem solving, various approaches to studying, various strategies for communication, etc. Ultimately, the various refers to the different options that exist in a given situation.
To learn more about various
https://brainly.com/question/26986135
#SPJ1
_________security may also be referred to as Information Technology security.
Answer:
Computer Security or Cybersecurity
Explanation:
Information Technology Security is the protection of computer systems and networks from information disclosure, theft of, or damage to their hardware, software, or electronic data.
how you are going to use the online platforms responsibly as a source of information you may cite an example on how will you comply to existing laws on use the online platforms
Answer:
1. Don't post or say anything bad.
2. Stay away from the dark internet.
3. Don't hack people.
4. Be safe!
Problem: Write the Python code of a program called University Application that asks the user enter their name, age, and high school GPA. If the user is at least 18 years old and their school GPA is at least 2.75, display a message telling the user they eligible to apply to study that major. However, in case the user's GPA is below 2.75, display a message telling them that they are not eligible to apply to study at this university. If the user is 17 or 16 years old, and have a GPA of at least 3.0, display a message telling them they can apply for exceptional acceptance. If the user is younger than 16, tell them they must wait until they are older to apply.
Th python code of a program that asks the user enter their name, age, and high school GPA and determine if they are eligible for admission is as follows:
x = input("please enter your name: ")
y = int(input("Enter your age: "))
z = float(input("Please enter your high school GPA: "))
if y >= 18 and z >= 2.75:
print(f"You are eligible to apply to study your major")
elif y >= 18 and z < 2.75:
print("You are not eligible to apply to study your major")
elif y == 16 or y == 17 and z >= 3.0:
print("You can apply for exceptional acceptance")
else:
print("You must wait until you are old to apply")
Code explanation:
The code is written in python.
The first variable stores the users name.The second variable stores the users age.The third variable stores the users high school GPA.If the users age is greater than or equals to 18 and his/her GPA is equal or greater than 2.75, the user is eligible. else if the users age is greater than or equals to 18 and his/her GPA is less than 2.75, the user is not eligible.else if the user age is 16 or 17 and his/her GPA is equals or greater than 3.0, then they can apply for exceptional acceptance. Else we will print that the users is not old enough to apply if he/she is less than 16 years.learn more on python code here; https://brainly.com/question/13450046
why are laptops more expensive than desktop with same features and power
Cryptography is the science of secret writing. Cryptography involves creating written or generated codes that allow information to be kept secret.
a. True
b. False
Answer:
true
Explanation:
the answer is true dude
A.Direction: identify the following examples of the ingredients used for sandwiches.
Answer:
i dont know how to answer may module because i dont have helper
In your program, your ball dropped. What condition made the ball stop when it reached the origin of the axes you had drawn?
The condition that made the ball stop when it reached the origin of the axes you had drawn is the gravitational force that is of the interaction between two objects with mass.
What is the force that act on an object when you drop a ball?The gravitational force is known to be a kind of interaction that exist between two objects with their mass.
Note that for a falling ball, the two objects with their known mass are said to be the Earth and also the ball. The power of this gravitational force is said to be proportional to the product of the two said masses.
Learn more about gravitational force from
https://brainly.com/question/72250
Answer: while ball.pos.y > 0
Explanation: This is the aswer if you are looking fo the equation.
What are the different selection structures in the C programming language?
Answer:
SELECTION STRUCTURES
Selection statements allow you to control the flow of program execution on the basis of the outcome of an expression.
different selection structures are:
1)if statements
2)if-else statements
3)if-else-if statements
4)switch statements
Explanation:
THE IF STATEMENTS
the first statement in the if block is only executed when the specified condition is true.If the condition is false then the contained statement will be skipped and execution continued with the rest of the program.
example:
public class IfDemo
{
public static void main(String[] args) {
int age;
Scanner inputDevice = new Scanner(System.in);
System.out.print("Please enter Age: ");
age = inputDevice.nextInt();
if(age > 18)
System.out.println("above 18 ");
}
}
THE IF-ELSE STATEMENTS
if the specified condition in the if statement is false, then the statement after else will be executed.
example:
public class IfElseDemo
{
public static void main( String[] args )
{
int age;
Scanner inputDevice = new Scanner( System.in );
System.out.print( "Please enter Age: " );
age = inputDevice.nextInt();
if ( age >= 18 )
System.out.println( "above 18 " );
else
System.out.println( "below 18" );
}
}
THE IF-ELSE-IF STATEMENTS
the statements after else can be another if or if-else statement, multiple if-else statements.When the condition is true, the associated statement will be executed and remaining conditions will be bypassed.
example:
public class IfElseIfDemo
{
public static void main( String[] args )
{
int age;
Scanner inputDevice = new Scanner( System.in );
System.out.print( "Please enter Age: " );
age = inputDevice.nextInt();
if ( age >= 18 && age <=35 )
System.out.println( "between 18-35 " );
else if(age >35 && age <=60)
System.out.println("between 36-60");
else
System.out.println( "not matched" );
}
}
THE SWITCH STATEMENTS
It is a multi way branch statement. It defines multiple paths of execution of a program.It provides a better alternative than if-else-if statements.
example:
public class SwitchDemo
{
public static void main( String[] args )
{
int age;
Scanner inputDevice = new Scanner( System.in );
System.out.print( "Please enter Age: " );
age = inputDevice.nextInt();
switch ( age )
{
case 18:
System.out.println( "age 18" );
break;
case 19:
System.out.println( "age 19" );
break;
default:
System.out.println( "not matched" );
break;
}
}
}
The different types of selection structures in the C programming language are:
1) if statements2) if-else statements3) if-else-if statements4) switch statementsWhat is C programming language?The sequence statement, selection statements (of which there are three variants: if, if...else, and switch), and repetition statements are the only three forms of control structures available in C++.
Due to the fact that C is compiled, it is a quicker language than Python. Since Python programs are interpreted, they typically run more slowly than C applications. When a variable is created in C, its type must be defined, and only values of that specific type are allowed to be given to it.
Therefore, the different selections of C programming languages are
1) if statements2) if-else statements3) if-else-if statements4) switch statementsTo learn more about C programming language, refer to the link:
https://brainly.com/question/10937743
#SPJ2
Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spent?
Answer: I will choose a good study area. Then, I will use highlighting, notes, flash cards, and checklists to study for the tests.
Answer:
I will also choose a good study area and copy them and paste it
Answer:
Imagine that you need to prepare for three end-of-term tests. What steps will you take to make sure your study time is well spent?
Explanation:
i did it
In Python
Create a conditional expression that evaluates to string "negative" if user_val is less than 0, and "non_negative" otherwise.
Sample output with input -9
The python program is an illustration of conditional expressions or conditionals statements, and they are used to make decisions
The Python programThe conditional expression written in Python, where comments are used to explain each action is as follows:
#This tests if user_val is less than 0
if user_val < 0:
#This prints "negative" if true
print("negative")
else:
#This prints "non_negative" if true
print("non_negative")
Read more about conditional statements at:
https://brainly.com/question/24833629
I won't to convert text to a table . what is the first step I should take ?
Answer:
Use paragraph marks to indicate where you want to begin a new table row. Select the text that you want to convert, and then click Insert > Table > Convert Text to Table. In the Convert Text to Table box, choose the options you want.
Explanation:
please put me in brainlest
Write the syntax of GOTO, ON GOTO and IF THEN ELSE with examples.
Answer:
GOTO:
goto label;
... .. ...
... .. ...
label:
statement;
Example:
/ Program to calculate the sum and average of positive numbers
// If the user enters a negative number, the sum and average are displayed.
#include <stdio.h>
int main() {
const int maxInput = 100;
int i;
double number, average, sum = 0.0;
for (i = 1; i <= maxInput; ++i) {
printf("%d. Enter a number: ", i);
scanf("%lf", &number);
// go to jump if the user enters a negative number
if (number < 0.0) {
goto jump;
}
sum += number;
}
jump:
average = sum / (i - 1);
printf("Sum = %.2f\n", sum);
printf("Average = %.2f", average);
return 0;
}
Write a program whose input is a character and a string, and whose output indicates the number of times the character appears in the string. The output should include the input character and use the plural form, n’s, if the number of times the character appears is not eactly 1.
Ex if the input is: n Monday
the output is: 1 n
Ex: if the input is: z Today is Monday
The output is 0 z’s
Ex: if the input is: n It’s a Sunday day
the output is: 2 n’s
case matters
Ex: if the input is: n Nobody
the output is: 0 n’s
N is different than N.
I need help putting it in Java
Answer:
class Main {
public static void analyzeString(char c, String s) {
int count = 0;
for(int i=0; i<s.length(); i++) {
if (s.charAt(i) == c) {
count++;
}
}
System.out.printf("%c %s\n", c, s);
System.out.printf("%d %c%s\n\n",count, c, count==1 ? "":"'s");
}
public static void main(String[] args) {
analyzeString('n', "Monday");
analyzeString('z', "Today is Monday");
analyzeString('n', "It’s a Sunday day");
analyzeString('n', "Nobody");
}
}
Explanation:
I did not add code to prompt the user for input, but rather added the test cases as you provided.
By the way, there is only one 'n' in 'It's a Sunday day'. So the example is wrong there.