Question 9 (3 points) Saved How do I tell Java that I want to create a constant of type int named year? Question 9 options: const int YEAR = 2020; final int YEAR = 2020; int final YEAR = 2020; int (const)YEAR = 2020 None of the above
Q: Please summarize any two of the following options for us. what potential applications may be found…
A: An information system is a carefully planned set of components to collect, share, store, and prepare…
Q: Information assurance should be introduced on one presentation, and any essential enhancements…
A: Below is the complete solution with explanation in detail for the given question about the…
Q: in c# i need to Write the program FindSquareRoot that finds the square root of a user’s input…
A: According to the information given:- We have to follow the instruction in order to get desired…
Q: The question, "What does this statement mean?" is one that has to be taken into consideration. In…
A: Introduction: Therefore, in its most basic sense, how would you define Crucial Concern? There isn't…
Q: Please elaborate on the distinction between the limited stack and the unbounded stack.
A: Introduction: Stacks are an essential data structure in computer science and programming. They are…
Q: Make your case for deep access versus shallow access from the perspective of a programmer, and steer…
A: 1) Deep access and shallow access are terms that are commonly used in the context of data…
Q: What comes to mind when you're asked to imagine what email is? In such case, please enlighten me.…
A: The email stands for the electronic mail . It is nothing but just the message which is send from one…
Q: Online business "separation of concerns"—explain.
A: Background E-commerce is a vast platform that enables unprecedented information exchange between…
Q: Do you have any thoughts on the uses of email? What procedures must be followed before message "A"…
A: Let us see the answer:- Introduction:- Email is a widely used communication tool in both personal…
Q: Choose the statement that most accurately reflects your perspective on the importance of keeping…
A: It is of paramount importance to keep data safe both while it is being sent and while it is being…
Q: Think about the problems you'll encounter as you create the framework, and investigate the worries…
A: When creating a framework or developing a software solution, various challenges can be encountered.…
Q: I was hoping you could tell me which of the Compiler Phases is the most crucial. If you could…
A: Introduction: A compiler is a program that translates source code written in one programming…
Q: Could you please define and clarify cloud scalability for me? What several factors affect…
A: Cloud scalability refers to the ability of a cloud system to expand or shrink resources dynamically,…
Q: When an array is only partly complete, how do you know which items already have data in them?
A: Array is only partially complete, elements that have not been assigned a value will still contain…
Q: What is Direct Memory Access (DMA), and how does it work to increase system concurrency? How much…
A: Introduction: We must now discuss how DMA increases system concurrency and the manner in which it…
Q: Just what does it imply when people talk about a "Regular Expression"? What was the point? How does…
A: Introduction: In computer science and programming, regular expressions are a common tool used to…
Q: please code in python, I really need to know this works.. kindly help me out... please use can use…
A: Below is the complete solution with explanation in detail for the given question about the…
Q: When someone refers to a "system security" issue, what precisely do they mean?
A: Introduction: Safety of the system: It is a method for protecting the privacy and security of the…
Q: With a simple graphic, depict the Linux kernel and virtualization ideas.
A: A programme, often known as a set of instructions, is the main task of a computer. This fundamental…
Q: Explore the four features of continuous event simulation that you find most important and explain…
A: What is continuous event simulation ? This is the technique for the modelling or the designing and…
Q: Examine how other computer and mobile app users have dealt with problems in the past so that you may…
A: Introduction: How people respond to software issues: Updated software bugs users. Overpopulation…
Q: Don't merely state that deep access is faster than shallow access without explaining why it's better…
A: Introduction : Deep Access : When an object is accessed deeply, a complete copy of the object is…
Q: Provide a brief list identifying the top three virtualization platforms currently in use. We need to…
A: Dear Student, The top three virtualization platforms currently in use are given below -
Q: In the case of software or program malfunction, it is crucial to consider the various responses from…
A: Portable computers are tiny enough to fit in your hand and designed to be portable. Low-end phones,…
Q: Using a number of programs, Windows 10 may be backed up, but what are the primary advantages of…
A: Computer backups replicate your files, data, and information on your initial devices and a second…
Q: variable's full set of attributes, including its "type" Data types and other properties may be found…
A: specifying a variable's full set of attributes, including its "type" Data types and other properties…
Q: How many different things go into building a compiler that can reliably generate efficient code?…
A: The following are some possible ways to solve the problem: Standards for EducationCompiler writers…
Q: Should the government and law enforcement have access to Facebook and other social media accounts in…
A: Facebook, a social network site, is being used as evidence against student users by college…
Q: Where can I get a comprehensive description of the term "optimize compilers" and how it should be…
A: The answer is given in the below step
Q: The stop-and-wait method is broken down into its component parts. What are the main disadvantages of…
A: The stop-and-wait method is a simple flow control protocol that ensures the reliable delivery of…
Q: implement the network using real PCs
A: As an AI language model, I cannot provide screenshots, but I can provide a written explanation of…
Q: #include #include #include using namespace std; // Krone class class Krone { private: int…
A: The solution is an given below :
Q: Describe briefly how transportation specialists analyze their companies' particular risks.
A: Introduction The following warning signs have been identified by transportation experts:…
Q: When a PictureBox is loaded, it displays a picture from the ImageList. What exactly is the…
A: What is windows: Windows is an operating system developed by Microsoft that manages computer…
Q: Let's pretend you have access to a list of x, y coordinates and the names of local eateries. Take…
A: The following query needs simply a point search, hence the B-Tree index structure is best. B-tree…
Q: The inability to properly secure our system unless we have a thorough understanding of its current…
A: Online assaults: An organisation needs a security strategy to increase and preserve the safety of…
Q: Please give a definition and working example of the operating environment. May I get a definition…
A: The environment in which users run application packages is known as the "operative environment" (or…
Q: Q1 Strings from RES There are eight strings of length 4 which cannot be produced by the following…
A: The regular expression given is: (a+ba)*(ab+ba)(b+ab)* Breaking it down: (a+ba)* means zero or more…
Q: How do things like passwords and other forms of access control factor into rule enforcement?
A: It is impossible to raise and keep standards without proper enforcement. The implementation might…
Q: g for an established beverage company. Include a description of how and why the firm should alter…
A: Please find the answer below. CONSULTING COMPANY: A consulting firm is an organisation made up of…
Q: Please elaborate on the distinction between the limited stack and the unbounded stack.
A: Stack: In a linear data structure called a stack, components are added and removed in a specific…
Q: Recent technological developments have allowed for wireless communication with the vast majority of…
A: Dear Student, Yes, wireless information appliances and services will have a significant impact on…
Q: When people talk about "multi-factor authentication," they're referring to the practice of employing…
A: When it comes to fostering trust, authentication is the act of establishing whether or not a person,…
Q: I was hoping you could tell me which of the Compiler Phases is the most crucial. If you could…
A: Each phase of the compiler plays an important role in translating source code into executable code,…
Q: Is there anything negative about making a whole business networked? Don't merely enumerate the…
A: Networked businesses have become a prevalent model in modern times due to technological advancements…
Q: Is there anything negative about making a whole business networked? Don't merely enumerate the…
A: One of the networking's biggest drawbacks is that it may be stressful, time-consuming, and…
Q: Does the phrase "computer organization" refer to the same thing as "computer architecture" when…
A: This question comes from Computer Architecture which is a paper of Computer Science. Let's discuss…
Q: Provide an explanation of the word "cybersecurity" and the importance of implementing it.
A: Introduction: Cyber security protects electronic systems, networks, and data from harmful attacks.…
Q: Don't merely state that deep access is faster than shallow access without explaining why it's better…
A: Justify the usage of deep access over shallow access from the standpoint of a coder; avoid arguments…
Q: Give brief explation of Illustrative Control Objectives for Cloud Computing
A: Cloud Computing: Cloud computing is a technology that allows users to access and use a range of…
Question 9 (3 points) Saved How do I tell Java that I want to create a constant of type int named year? Question 9 options: const int YEAR = 2020; final int YEAR = 2020; int final YEAR = 2020; int (const)YEAR = 2020 None of the above
Step by step
Solved in 2 steps
- For the 8 Java statements below, identify each of the following statements as legal or illegal, and whether legal or not, state whether it represents a "narrowing" or "widening" conversion, or neither. Don't forget to identify the last statement at the very bottom, Member m = new BoardMember();, as legal or illegal and widening or narrowing conversion.Consider te following declaration:enum fruitType (ORANGE, APPLE, BANANA, GRAPE, STRAWBERRY, MANGO GUAVA, PINEAPPLE, KIWI); fruitType fruit;a. What is the value of static_cast <int>(STRAWBERRY)?b. What is the value, if any, of the expresion?static_cast<fruitType>(static_cast<int>(MANGO) - 2) c. What is the value if any, of the expression?static_cast<fruitType>(static_cast<int>(GRAPE) + 2)d, What if the value, if any, of the expression: BANANA <= KIWIe. What is the output, if any, of the following code?for(fruit = BANANA,; fruit < PINEAPPLE; fruit++) cout << static_cast<int>(fruit) << ", "; cout << endl;. Read the following program and answer the questions given at the end. class Example { int y, z; static int x; static{x=5;} Example () { x=x+1; y=0; z=0; } Example (int a, int y, int z) { x=a; y=y; z=z; } void show(){ S.O.P(x + y+ z);}} How many data members are included in class Example, identify. What is the purpose of static block in the code. The program involves the problem of instance variable hiding. How the problem can be resolved. what will be the output of the program for the following object Example ob1=new Example (4,5,3) and Example ob2=new Example () ;
- Decidewhich of the following statements is either true or false and re-correct the false ones.1. The value of the following logical expression is true (1 + 2 == 2) || (4 - 4 == 0)2. In Java, once a variable is declared, it will be visible and could be used anywhere in theprogram.3. Strings are primitive data type in Java.4. In Java, we can initialize a variable during its declaration.5. do ... while repetition statement gives full control on the code block to be repeated.6. All binary operators except for the assignment operators are evaluated from Left to Right7. A ragged 2D array is a 2D array in which each column may contain different number of rows.8. Each row in a 2D array could be dealt with as 1D array.9. The following statement creates and initializes the array x:int x[] = {10, 20, 30, 40, 50};10. A Java program may contain more than one method with the same signaturejava, Describe the difference(s) between the following two sets of code, neither of which reaches a terminating condition. public void forever() { while (true); } public void foreverMore() { foreverMore(); }Read the following JAVA program and answer the questions given at the end. class Example { int y, z; static int x; static{x=5;} Example () { x=x+1; y=0; z=0; } Example (int a, int y, int z) { x=a; y=y; z=z; } void show(){ S.O.P(x + y+ z);}} How many data members are included in class Example, identify. What is the purpose of static block in the code. The program involves the problem of instance variable hiding. How the problem can be resolved. what will be the output of the program for the following object Example ob1=new Example (4,5,3) and Example ob2=new Example () ; without resolving the problem of instance variable hiding and after resolving the problem.
- Complete the following java programs to demonstrate the use of local variables and 1.Is "balance" the same, yes or no, why? class CheckingAct{ . . . . private int balance; . . . . public void processDeposit( int amount ) { int balance = 0; // New declaration of balance. balance = balance + amount ; // This uses the local variable, balance. } } 2. What is printed, why? class FindIt{ private int sum; public FindIt( int sum ) { this.sum = sum; } public void increment( int inc ) { sum = sum + inc; System.out.println("FindIt sum: " + sum ); } } public class MainClass{ public static void main ( String[] args) { int sum = 99; FindIt findObj = new FindIt( 34 ); findObj.increment( 6 ); System.out.println("sum: " + sum ); } }The Body Mass Index – BMI is a parameter used to measure the health status of an individual. Various BMI values depicts how healthy or otherwise a person is. Mathematically BMI = weight over height times height Write a java program using either JOptionPane or Scanner to collect the following values of an individual: a) i. Name ii. Weight iii. Height b) Compute the BMI of that individual c) Make the following decisions if: i. BMI < 18.5 is under weight. The Body Mass Index – BMI is a parameter used to measure the health status of an individual. Various BMI values depicts how healthy or otherwise a person is. Mathematically BMI = Write a java program using either JOptionPane or Scanner to collect the following values of an individual: a) i. Name ii. Weight iii. Height b) Compute the BMI of that individual The Body Mass Index – BMI is a parameter used to measure the health status of an individual. Various BMI values depicts how healthy or otherwise a person is. Mathematically BMI =…Complete the following programs to demostrate use of local variables. Will amount remain same? (Yes or No) and why? 1. public class CheckingAct { private String actNum; private String nameOnAct; private int balance; . . . . public void processDeposit( int amount ) { balance = balance + amount ; } // modified toString() method public String toString() { return "Account: " + actNum + "\tName: " + nameOnAct + "\tBalance: " + amount ; } } 2. public class CheckingAct{ private String actNum; private String nameOnAct; private int balance; . . . . public void processDeposit( int amount ) { // scope of amount starts here balance = balance + amount ; // scope of amount ends here } public void processCheck( int amount ) { // scope of amount starts here int charge; incrementUse(); if ( balance < 100000 ) charge = 15; else charge = 0; balance = balance - amount - charge ; // scope of amount ends here } }
- Complete the following program to demostrate use of local variables. Will amount remain same? (Yes or No) and why? 1. public class CheckingAct { private String actNum; private String nameOnAct; private int balance; . . . . public void processDeposit( int amount ) { balance = balance + amount ; } // modified toString() method public String toString() { return "Account: " + actNum + "\tName: " + nameOnAct + "\tBalance: " + amount ; } }The Body Mass Index – BMI is a parameter used to measure the health status of an individual. Various BMI values depict how healthy or otherwise a person is. Mathematically BMI = weight ÷hight×hight Write a java program using either JOptionPane or Scanner to collect the following values of an individual: i. Name ii. Weight iii. Height Major Topic Getting user inputs B.) Compute the BMI of that individual Make the following decisions if: i. BMI < 18.5 is under weight ii. BMI >=18.5 but =25 but = 30 but = 40 Morbid Obesity d)Display the results of the individualCan you just give a comment in short on what is this about . Or just give a comment on how dose it run. #include #define MAX_EMP 5 #include "employee.h" int count = 0; struct Employee emp[MAX_EMP]; void display() { printf("\n---=== EMPLOYEE DATA ===---\n"); printf("EMP ID\tEMP AGE\tEMP SALARY\n"); printf("======\t=======\t==========\n"); for(int i = 0; i < count; i++) { printf("%d\t%d\t%.2f\n", emp[i].id, emp[i].age, emp[i].salary); } } void add() { if(count == MAX_EMP) { printf("\nERROR!!! Maximum Number of Employees Reached\n"); return; } printf("\nAdding Employee ===============\n"); printf("Enter Employee ID: "); scanf("%d", &emp[count].id); printf("Enter Employee Age: "); scanf("%d", &emp[count].age); printf("Enter Employee Salary: "); scanf("%f", &emp[count].salary); count++; } void update() { int id, found = 0; float newSalary; printf("\nUpdate Employee Salary…