Answer:
Abstract
Explanation:
I think it’s abstract because, in the question it says that it implements an interface and must provide an implementation for
And my answer was abstract methods.
what are the methods of gilding
nonsense will be immediately reported.
Write the code for a mapping that generates a list of the absolute values of the numbers in a list named numbers.
Answer (python):
mixednumbers = [49.5, -2, -54.5, -87.6, 17.3, 92, -1.4, 47.7, -27.4, -31.8]
numbers = []
def absolute(num):
num = abs(num)
return num
mappednumbers = map(absolute, mixednumbers)
for i in mappednumbers:
numbers.append(i)
print(numbers)
Explanation (in line numbers):
1 provides the numbers that we will work with in an array called mixednumbers
2 creates an empty array called numbers where we will store the result
4-6 create a function that will take a number, get the absolute value of it, then return it
8 is where we use our function and mixednumbers to create a map named mappednumbers (it contains the numbers in absolute value)
10-11 take each item in the map and append it to our numbers array (printing the map directly will give us a memory address)
12 prints the numbers array, giving us our solution
Output:
[49.5, 2, 54.5, 87.6, 17.3, 92, 1.4, 47.7, 27.4, 31.8]
advantages and disadvantages of algorithm
Answer:
\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
Explanation:
It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program
Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.
what is a program answer these question
of grade-6
A network administrator has asked robin, a network engineer, to use ospf (open shortest path first) along with rip (routing information protocol) on an edge router in a network so that it demands more memory and cpu power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. identify and analyze which characteristic of ospf signifies this.
The option that can be used to identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.
What is OSPF about?The OSPF is known to be called an open Shortest Path First protocol.
It belongs to the family of IP Routing protocols as it serves as Interior Gateway Protocol (IGP) used mainly for the Internet, and the option that can be used to identify and analyze which characteristic of OSPF signifies this is known to be Low overhead, fast convergence.
See full question below
A network administrator has asked Robin, a network engineer, to use OSPF (Open Shortest Path First) along with RIP (Routing Information Protocol) on an edge router in a network so that it demands more memory and CPU power for calculations but keeps network bandwidth to a minimum with a very fast convergence time. Identify and analyze which characteristic of OSPF signifies this.
Shared data
Low overhead, fast convergence
Stability
Multi-vendor routers
Learn more about OSPF from
https://brainly.com/question/14604232
#SPJ1
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
a customer is traveling to a branch office, and the network administrator provides her with a static ip address for her laptop. which should the customer do to use the static ip address
The customer traveling with a provided static IP address should assign the IP in the network adapter settings. Thus, option B is correct.
What is static IP?The complete question is: A customer is traveling to a branch office, and the network administrator provides her with a static IP address for her laptop Which should the customer do to use the static IP address?
A) Run the command "ipconfig configure static"
B) Assign the static IP in network adapter settings
C) Switch the button from dynamic to static on her laptop
D) Disconnect from WiFi and use an Ethernet cable
E) Type the IP address into the browser
A static IP is a setup that is configured manually instead of the DHCP assigned setup. It is a constant and nonchanging IP setup that is used when working remotely.
In the network and sharing system, open the adapter setting and choose the appropriate adapter. Then choose the IPV 4 and check the current internet settings. Choose the desired IP address and then click the OK and save button.
Therefore, option B. static IP is assigned in the network setting option.
Learn more about static IP here:
https://brainly.com/question/18849429
#SPJ1
Write an algorithim and flowchart to check it the temperature is more than 25°. If it more than 25°C switch fan on else off.
Answer:
write the sly flowchart
Explanation:
#stdlib.etc
main()
{
int temp;
bool fan = false;
print("enter the frigin temperature: ");
read(temp);
if (temp > 25)
{
fan = true;
print("the fan is on");
}
else
{
print("the fan is off");
}
return 0;
}
Northern Trail Outfitters uses a custom object Invoice to collect customer payment information from an external billing system. The Billing System field needs to be filled in on every Invoice record. How should an administrator ensure this requirement
An administrator should ensure this requirement by creating a process builder to set the field.
What is a billing system?A billing system is a complex software that enables service providers' order to cash process (O2C) and sends invoices, tracks, and processes payments for different consumers.
It is the process by which a business bills and invoices customers. Billing systems often include payment software that automates the process of collecting payments, sending out recurring invoices, expense tracking, and invoice tracking.
Learn more about billing system here,
https://brainly.com/question/14315763
#SPJ1
What will be the output, if any, when the user clicks the right mouse button?
from tkinter import
def clicked(event):
print("That hurt.")
widget = Button(None, text='Button')
widget.pack()
widget.bind('', clicked)
widget.mainloop()
O an error statement
O That hurt.
O no output
O Button
The output, if any, when the user clicks the right mouse button is (b) That hurt
How to determine the output?The flow of the program implies that:
When the user clicks the button, the program prints "That hurt" without the quotes.
This action is on the third line of the program
Hence, the output, if any, when the user clicks the right mouse button is (b) That hurt
Read more about programs at:
https://brainly.com/question/16397886
#SPJ1
You saved your style options as "webstyle.css" in a subfolder called "styles."
what line do you include in the head section of your html file to use your styles?
A line which should be included in the head section of a html file to use these styles is link rel="stylesheet" type="text/css" href="styles/webstyle.css"
What is HTML?HTML is an abbreviation for hypertext markup language and it can be defined as a standard programming language that is used for designing, developing and creating websites or webpages.
In Cascaded style sheet (CSS), a line which should be included in the head section of a html file to use these styles is given by:
link rel="stylesheet" type="text/css" href="styles/webstyle.css"
Read more on HTML here: https://brainly.com/question/4056554
#SPJ1
A malicious actor is preparing a script to run with an excel spreadsheet as soon as the target opens the file. the script includes a few macros designed to secretly gather and send information to a remote server. how is the malicious actor accomplishing this task
Thay is the malicious actor accomplishing this task is done by using the VBA code.
What is The Visual Basic button?It opens the Visual Basic Editor, in which you create and edit VBA code. Another button at the Developer tab in Word and Excel is the Record Macro button, which robotically generates VBA code that could reproduce the moves which you carry out withinside the application.
To run VBA withinside the “Microsoft Visual Basic for Applications” window, you could simply press “F5” key button or click on the “Run” icon withinside the toolbar.
Read more about the spreadsheet :
https://brainly.com/question/26919847
#SPJ1
Which programming best practice does saving code snippets help you achieve?
O using consistent indentation and formatting
O documenting all changes and tracking revisions
O avoiding repetition of the same code in a program
O avoiding having to re-create code that you or another programmer has already written
Answer:
When it comes to formatting your code (not just strings), the Python programming community has spent a long time establishing and documenting best practice.
Missing: tracking | Must include: tracking
When an interviewer asks "tell me about yourself", you should tell them about your childhood past. please select the best answer from the choices provided t f
In the interview when the candidate is asked about yourself then telling about childhood past is not correct. Therefore the given statement is false.
What is an interview?An interview is an interaction or a conversation between an employer and the interested candidate. In the conversation the interviewee is asked about their education, family background, and work experiences.
When an interviewer ask about tell me about yourself, then the interviewee should not tell about their childhood past, rather the interviewee should give few information about their family, education, and working.
Therefore, the given statement is false.
Learn more about interview, here:
https://brainly.com/question/13073622
#SPJ1
What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.
What type of hackers are motivated by social or political issues?Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated aim or reason.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.
Learn more about Hacktivism from
https://brainly.com/question/5483494
#SPJ1
When you start an online course, what should you do to make sure you have access to college resources
As a student starting an online course, you should explore the college website to make sure you have access to college resources.
What is an online course?An online course can be defined as an education programme that typically involves the process of providing and sharing learning resources (contents) in an organized way over the Internet, so as to allow the students (users) progress in their understanding of a course or topic.
As a student starting an online course, you should do the following to make sure you have access to college resources:
Explore the college website.Bookmark links to your course.Search for information with regards to advising, degree requirements, and financial aid.Read more on online course here: https://brainly.com/question/14591988
#SPJ1
To notify the browser that we have JavaScript code, we should use .............
Answer:
almost all browsers allow you to type JavaScript code directly into the browser, using something called the “console
Which is a best practice that can prevent viruses and other malicious code from being downloaded.
A best practice that can prevent viruses from being downloaded is by not clicking on links in graphic email messages
How to prevent virus or malicious codes?Virus and malicious codes can be installed on a computer through several ways, which include:
Not using an antivirus on the computerClicking on untrusted links in graphic email messagesInsecure downloadsThe above can be prevented by
Installing a genuine antivirusNot clicking on trusted linksAccessing sites with secured downloadsRead more about virus at:
https://brainly.com/question/12543839
#SPJ1
Match the Job description with the job titles.
What does Fees, Risk Assessment and Returns mean?
Answer:
The term return refers to income from a security after a defined period either in the form of interest, dividend, or market appreciation in security value. On the other hand, risk refers to uncertainty over the future to get this return. In simple words, it is a probability of getting return on security.
Explanation: