What best describes each of the following variable names? • valid, follows convention: the variable name is allowed by the compiler and also follows appropriate naming conventions for Java variables valid, does not follow convention: the variable name is valid- it is allowed by the compiler- but it does not follow naming conventions for Java variables • not valid: the variable name is not allowed by the compiler Note that this question asks about Java variables (not constants or classes). You can review naming conventions in the Java Coding Conventions e lecture video. total-value total_value totalValue totalvalue Value TotalValue tv TOTAL_VALUE [Choose] [Choose ] valid, follows convention [Choose] valid, does NOT follow conve valid, does NOT follow conve [Choose] [Choose]
Q: What exactly does a "Access Point" entail when it comes to wifi? How precisely does the procedure…
A: "Access Point" as it relates to wife Simply said, an access point is a location that offers wireless…
Q: The fastest speeds are attained when both types of networks are utilized, even though wired networks…
A: Wired connections are faster than Wi-Fi. When connected by Ethernet, your PC and wireless gateway…
Q: What are the two technology subcategories that are mostly prevalent in today's wireless networks?
A: introduction: the two technologies that are most often utilised in wireless systems. Therefore, we…
Q: Give an explanation of a cassette drive and how it varies from a typical tape recorder for storing…
A: A common cassette recorder is what is meant when people talk about a "cassette drive" in the context…
Q: Which of the following statements are false? select all that apply The core implementation of a…
A: The false statements are Stack is based on the FIFO concept; however, the queue is based on the…
Q: Question 1: Which of the following standard algorithms is not Dynamic Programming based. 01 02 03 04…
A: Which of the following standard algorithms is not Dynamic Programming based. (A) Bellman–Ford…
Q: What model is used for software testing?
A: Software testing model : - Software testing is part of the software development life cycle. It…
Q: Question 1: Which of the following standard algorithms is not Dynamic Programming based. 1.…
A: Dynamic programming is a technique which is used to solve efficiently which contains overlapping sub…
Q: Describe the evolution of the internet and the technological underpinnings that make it possible for…
A: Explanation: The communication and computer sectors have seen a major transformation because to the…
Q: ***** When the load is greater than the capacity, the delay.. b. Increases linearly c. Goes to…
A: 1) C option is correct that is: Goes to infinity Explanation: Packets become blocked at nodes when…
Q: Why are packet and circuit switches still necessary in the twenty-first century, and which is…
A: Circuit Switches: Circuit switching is a style of the network design in which a physical path is…
Q: What is an interruption, exactly, and how are they used? Sort predicted hardware failures from…
A: The answer for the above question is given in the below step.
Q: If so, what particular function does WiFi play in the development of computer technology?
A: Given: Computers, tablets, telephones, and other devices may connect to the internet via Wi-Fi…
Q: - For the given IP address 128.168.0.1/20, calculate the Subnet mask, Network address, total number…
A: The question has been answered in step2
Q: Homework Update your code from Exercise 1 to ask the user to input two integer values x and y, then…
A: Here is the C++ code: See below step for code.
Q: What was the name of the non-free Linux firewall that was mentioned in the presentation, and what…
A: The Answer is :-
Q: How is data compressed by the operating system's High Performance File System
A: Introduction HPFS: The high-performance file system (HPFS) was created specifically for the IBM OS/2…
Q: Why is the number of computer support specialist jobs expected to increase greatly over the next…
A: According to the information given:- We have to choose the correct option to satisfy the statement.
Q: Is there a hardware or software issue if you power on the computer for the first time but don't hear…
A: It is often a more serious issue when the fault is with the hardware. If the computer will not boot…
Q: hat makes static testing distinct from dynamic testing
A: Make sure you are aware of the differences between generic and acceptability testing.What makes…
Q: Write a triangle (x0, y0, x1, y1, x2, y2) function to draw the triangle with vertices (x0, y0), (x1,…
A: Here is the python code: See below step for code
Q: What precisely does the central processing unit accomplish, in addition to the other things it does?…
A: Introduction: The instructions included in a computer programme are carried out by an electrical…
Q: Consider the evolution of the internet throughout time as well as the present technological…
A: The current mission at hand is to provide a history of the evolution of the Internet. In 1965, two…
Q: When a computer processor has many instructions running at once, how can it prevent wasting…
A: Definition: Almost all programmes alternate between processing data on the CPU and waiting for I/O…
Q: Using a try-except approach, write a Python program to check whether a string input by a user is…
A: Python One of the most well-liked programming languages in the world is Python, according to…
Q: How would you protect your home network using network and personal firewalls?
A: A firewall is used for security purposes which can secure your data from outside the organization…
Q: What factorization of the joint distribution P(A, B, C, D, E, F, G) does the network below…
A: Factorization: A factor is a basically a function or method f(x1,…,xn) which takes all the possible…
Q: A) Every Turing Machine accepts a language. B) Every Turing Machine decides a language. C) There is…
A: A Turing machine is a theoretical computational model that performs calculations by perusing and…
Q: How safe is Lamport's OLP given the relevance of the hash function's properties
A: Lamport's One-Time Password (OTP) scheme is a secure way of generating a password that can be used…
Q: An operating system uses a total of two units of the resource R for each of its three user…
A: Given: Three user processes, each consuming two units of resource R, make up an operating system.…
Q: How difficult was it to build a network that served the whole business? Include a summary of the…
A: The solution to the given question is: An enterprise-wide network can connect computers in different…
Q: When moving from on-premises servers to an laaS architecture, what governance concerns should you be…
A: We need to explain cloud governance concerns we should be aware of during moving to IaaS from…
Q: Using a try-except approach, write a Python program to check whether a string input by a user is…
A: Python A very well-liked general-purpose, interactive, object-oriented, and high-level programming…
Q: Discuss the importance of mobile devices in comparison to cloud computing. The use of cloud…
A: Mobile computing allows us to access information and data via a mobile device, whereas cloud…
Q: What distinguishes the Internet from the World Wide Web the most?
A: The Internet is a network of many computers that are connected around the globe. WWW stands for…
Q: Give a definition of "firewall" in terms of network security, describe how it's applied to various…
A: *firewall is a network security device which monitors incoming and outgoing network traffic and…
Q: How does Linux handle virtual memory?
A: Linux is an open source operating system.
Q: What does "parallel processing" really imply when it is used
A: The management process in clinical supervision involves parallel processing. This supports learning…
Q: What is the output of the following code after fixing the errors if any? Assume all libraries are…
A: Below I have provided a program for the given question. Also, I have attached a screenshot of the…
Q: The logical levels of a distributed client-server programme are what.
A: In a distributed client-server architecture application the workload is divided between the…
Q: If you accidentally delete a file and then decide you want it to be restored, what should you do?
A: If you've ever mistakenly wiped a document or the content of a record, you know how perplexing it…
Q: Your hard drive, central processing unit, random access memory, and graphics card all likely have…
A: Introduction: A super wing-ding diagnostic software says your hard drive, CPU, RAM, and visual card…
Q: most popular programmes used by hosts of software firewalls
A: In computing, a protected network such as a defense is a system of security that protects people…
Q: A network security design is necessary to enhance protection and security since servers on a flat…
A: Demilitarized zones (DMZs), which offer a degree of network segregation, safeguard secure internal…
Q: When you first turn on your computer, you don't hear the spinning disk or see the indicator lights.…
A: "Central Processing Unit" is what the abbreviation "CPU" stands for." and it is comparable to the…
Q: Linux has a variety of exclusive concurrent techniques that are not present in any other operating…
A: introduction: Concurrency in software engineering refers to a collection of techniques and processes…
Q: Which of the following functions a firewall does, and which of those functions is considered to be…
A: Introduction: We'll start with the first one as you posed many questions. If you would like a…
Q: When you first turn on your computer, you don't hear the spinning disk or see the indicator lights.…
A: Introduction: Central Processing Unit, or CPU, is the term for the majority of the computer's…
Q: do live backups of physical hard drives may have an influence on how much storage space is really…
A: the solution is an given below :
Q: If the linked list pointers were stored in an AVL tree, what would happen to insertions, deletions,…
A: Introduction: The majority of BST operations, such as search, max, min, insert, delete, etc., take…
Step by step
Solved in 3 steps with 1 images
- hello! can you help debug my Java program? here are the errors I am getting: line 67: id cannot be resolved to a variableline 102: id cannot be resolved to a variableline 110: id cannot be resolved to a variableline 119: id cannot be resolved to a variable should I re-initialize ID somewhere? is it not a public enough variable? thank you for any insight you can give. here is my code: package automaticTellerMachine; //header importing files import java.text.DecimalFormat; import java.util.Scanner; //class Accountability class Account { public int id; public double balance; public Account() { //where the variables live id = 9; balance = 0; } public Account(int a, double b) { id = a; balance = b; } //defining the methods public double getBalance() { return balance; } //this is the depositing part public void deposit(double a) { //this is depositing at work balance = balance+a; } //this is the withdrawing part public void withdraw(double a) { //if you have enough $$$…Please help me on these questions on my Java Program Questions 1-7 involve writing a Java storage class called Student that keeps track of a student's first name, last name and the number of credits being taken in a semester.. Write down the declarations for the instance variables. Question 2: Write down the mutator methods for the instance variables. You don't need to check for the passed values other than trimming any String values. Question 3: Write down a constructor that allows setting all of the instance variables. You can simply call the mutator methods you came up with in question 2. Question 4: Write down all the accessor methods for the instance variables. Question 5: Create a toString() method that will return: Jane Doe, credits: 12 if Jane Doe is taking 12 credits Question 6: Rewrite the mutator for the first name, so that if a blank String is passed to this method, the first name is set to "NOFIRST". Question 7: Rewrite the mutator for the number of credits, so that if a…For the 8 Java statements below, identify each of the following statements as legal or illegal, and whether legal or not, state whether it represents a "narrowing" or "widening" conversion, or neither. Don't forget to identify the last statement at the very bottom, Member m = new BoardMember();, as legal or illegal and widening or narrowing conversion.
- please type in Java The assignment will test your understanding of handling and working with Java Throwables. On the moodle assignment page is the file name Homework.java. This file contains a class that includes several empty functions. Through the process of implementing these functions, you will develop the skills of working with Java Throwables. Please refer to the Homework.java file for the documentation on what needs to be implemented for each of the functions. When you have completed implementing the functions, please upload the Homework.java file to Grader Than.Indicate whether each of the following C# programming language identifiers is legal or illegal. If it is legal, indicate whether it is a conventional identifier for a class. electricBill ElectricBill Electric bill Static void #ssn Ay56we Theater_Tickets 212AreaCode heightInCentimeters Zip23891 VoidApply the Java concepts that you learned (OOP, polymorphism, interfaces, packaging, …) as well asSOLID design principles to design/extend a Parking Garage application and implement it using theJava/C++ programming language. This application manages a parking space for a configurablemaximum number of vehicles. The designed application must handle the following functions:● Each garage slot has a width and depth that describes the slot dimensions.● The garage consists of a configurable maximum number of slots with different dimensions.● Each vehicle shall be identified by a model name, unique identification number, Model year andvehicle dimensions (width and length).● Park-in function that marks the arrival time of a vehicle if there is an available slot that matchesvehicle dimensions.● The slot selection for vehicle park-in could be done using multiple algorithms:○ First Fit selection where the first slot with big enough dimension to host the vehicle willbe selected○ Best Fit selection…
- Which statement below displays the value of the class variable numRectangles of the Rectangle class? A. print(numRectangles) B. print(mySquare.numRectangles) C. print(Rectangles) D. print(Rectangles.numRectangles) Which of the following statements about Python is true? A. Python does not support inheritance. B. Python supports operator overloading. C. Python does not support garbage collection. D. Python does not support function overloading. ______ manipulate the attributes of an object. A. functions B. methods C. procedures D. rectifiersApply the Java concepts that you learned (OOP, polymorphism, interfaces, packaging, …), SOLID design principles as well as Design Patterns to design/extend a Parking Garage applicationand implement it using the java programming language. This application manages a parking spacefor a configurable maximum number of vehicles. The designed application must handle the following functions: ● Each garage slot has a width and depth that describes the slot dimensions as well as slot hourly cost.● The garage consists of a configurable maximum number of slots as well as a global slot selection algorithm i.e. First Fit or Best Fit where○ First Fit selection where the first slot with big enough dimension to host the vehicle will be selected○ Best Fit selection where the slot with the best dimension match should be used where the wasting area of the slot is minimized. ● Each vehicle shall be identified by a model name, unique identification number, owner mobile number, Model year and vehicle…Decidewhich of the following statements is either true or false and re-correct the false ones.1. The value of the following logical expression is true (1 + 2 == 2) || (4 - 4 == 0)2. In Java, once a variable is declared, it will be visible and could be used anywhere in theprogram.3. Strings are primitive data type in Java.4. In Java, we can initialize a variable during its declaration.5. do ... while repetition statement gives full control on the code block to be repeated.6. All binary operators except for the assignment operators are evaluated from Left to Right7. A ragged 2D array is a 2D array in which each column may contain different number of rows.8. Each row in a 2D array could be dealt with as 1D array.9. The following statement creates and initializes the array x:int x[] = {10, 20, 30, 40, 50};10. A Java program may contain more than one method with the same signature
- Please list all variables of the same type under loose name equivalence, strict name equivalence, and structural equivalence, respectively. --three type declarationtype cell = . . . −− whatever type alink = pointer to cell type blink = alink //blink is an alias of alink --variable declaration belowp , q : pointer to cellr : alinks : blinkt : pointer to cellu : alinkProblem Description and Given Info For this assignment you are given the following Java source code files: IStack.java (This file is complete – make no changes to this file) MyStack.java (You must complete this file) Main.java (You may use this file to write code to test your MyStack) You must complete the public class named MyStack.java with fields and methods as defined below. Your MyStack.java will implement the IStack interface that is provided in the IStack.java file. You must implement your MyStack class as either a linked list or an array list (refer to your MyArrayList and MyLinkedList work). Your MyStack must not be arbitrarily limited to any fixed size at run-time. UML UML CLass Diagram: MyStack Structure of the Fields While there are no required fields for your MyStack class, you will need to decide what fields to implement. This decision will be largely based on your choice to implement this MyStack as either an array list or a linked list. Structure of the Methods As…Which of the following statements about Python is true? A. Python only supports object oriented programming. B. Python only supports procedural programming. C. Python supports both procedural and object oriented programming. D. Python supports neither object oriented nor procedural programming. What is true about indentation for method definitions in a class? A. None of the statements may be indented. B. The first line of the definition is not indented, but the statements that follow are. C. The first line of the definition is indented one level more than the class statement and the remaining statements of the method definition are indented an additional level D. Indentation does not matter for method definitions. Which of the following statements about Python is true? A. Python supports inheritance. B. Python does not support operator overloading. C. Python does not support garbage collection. D. Python does not support function overloading.