In java language I want the code

In Java Language I Want The Code

Answers

Answer 1

Answer:

code was too long to paste here, attached below


Related Questions

Use the drop-down menus to describe the Customize Ribbon dialog box,
This section lists the different tabs on the ribbon.
This component helps the user reorder tabs along the ribbon.
This section lists commands to be added to or removed from the ribbon.

Answers

Just say 4th of Independence Day

Coding final. The code needs to be in python. See picture for information.​

Answers

Answer:

Explanation:

def running_sum():

 num = int(input("Enter a number: "))

 limit = int(input("Enter a limit: "))

 sum = num

 while sum < limit or sum == limit:

      number = int(input("Enter another number: ")

      sum+=num

 if sum==limit:

      print(sum)

 

What is the regular expression that generates the language L = {w^n x v^m, n > 0, m > 1}

Answers

The regular expression corresponding to the language L(X) ∪ L(Y) where L(X+Y) = L(X) ∪ L(Y) is X+Y.

What is regular expression?

A regular expression is a pattern that the regular expression engine attempts to match in input text. A pattern consists of one or more character literals, operators, or constructs.

The most basic regular expression consists of a single literal character, such as A. It matches the first occurrence of that character in the string. If the string is Jack is a boy, it matches the A after the J. This regex can match the second a too.

Learn more about regular expression here,

https://brainly.com/question/14186204

#SPJ1

In the event of a fire, the most appropriate failure policy is a policy.​

Answers

In the event of a fire, the most appropriate failure policy is Fail open policy.​

What is fail open policy?

A system set to fail open does not shut down when failure conditions are present. Instead, the system remains “open” and operations continue as if the system were not even in place. This strategy is used when access is deemed more important than authentication.

Fail Open systems allow access as opposed to Fail Closed systems that block access. When handling errors, developers need to carefully choose what actions to take.

Learn more about fire policies here,

https://brainly.com/question/15020213\

#SPJ1

DUE IN AN HOUR PLS HELP
Random answers for points will be reported


Which one of these is an example of an output device digital pen headset keyboard mouse

Answers

Answer:headset

Explanation:because sound comes out of them

Answer:

Headset

Explanation:

It would be a headset because headsets "output sounds"

Digital pens, keyboards, and mice don't output anything.

write three questions you have about jow geography shapes economic activies in Australia and the pacific…

Answers

Answer:

Are the trades gonna be harder or easier?

How did geography shape conomic activies in Australia and the pacific?

How did the land get seperated?

ps im not good with these kind of stuff dk y u chose me to do it

In object-oriented programming, what is a class?

A design approach that divides well-defined tasks into modules, functions, or steps
A planning method that focuses on objects rather than functions
A system that categorizes the different types of actions and functions
A template with attributes and behaviors for an object

Answers

Object-oriented programming is the programming model in a computer that uses objects and data to organize the design. In OOP, class is a template that includes real values. Thus, option d is accurate.

What is OOP?

Object-oriented programming (OOP) is the approach to designing that uses objects instead of variables and functions. The programmers create codes in OOP that interacts and performs the function.

Programming languages like C⁺⁺, Python, and Java are object-oriented programs. The known object in OPP is called a class that contains the data that makes up the objects and methods.

Therefore, the class is the building block of OOP.

Learn more about OOP here:

https://brainly.com/question/26709198

#SPJ1

give an example of an algorithm in c++ that can be used to avoid car collision using four infra red sensors

Answers

Answer:

Since entering the 21st century, the number of vehicles has increased exponentially, and the number of vehicles and drivers has further increased [1]. How to reduce the number of traffic accident deaths and economic losses has become an important issue in the context of such a large number of vehicles [2].

In recent years, some research studies have been made on the collision warning algorithm. The existing collision warning algorithms are mainly divided into two categories, namely, the Safety Time Algorithm and the Safety Distance Algorithm [3]. The safety time logic algorithm compares the collision time between the two workshops with the safety time threshold to determine the safety status. The safety time algorithm mainly uses Time to Collision (TTC) as the research object [4]. The safety distance model refers to the minimum distance between the vehicle and the obstacle, which is also the distance the vehicle needs to maintain to avoid the collision with the obstacle under the current conditions of the vehicle [5].

Explanation:

Assignment Type : Ai using prolog language

• AI Search Techniques

o The search algorithms can solve this problem easily so you must implement one of the uninformed search techniques and one of the informed search techniques to solve the problems


I. Problem #1

1. Problem#1 Overview
Given a list of positive integer Items whose elements are guaranteed to be in sorted ascending order, and a positive integer Goal, and Output is a list of three elements [A,B,C] taken from items that together add up to goal. The Output must occur inside the items list in that order (ascending order).

?-threeSum([3,8,9,10,12,14],27,Output).
Output=[8,9,10];
Output=[3,10,14].

?-threeSum([2,4,8,10,12,14],25,Output).
false.

?-threeSum([2,4,8,12,14,16],20,Output).
Output=[2,4,14].

?-threeSum([1,2,3,4,5,6,7,8,9],12,Output).
Output=[1,2,9];
Output=[1,3,8];
Output=[1,4,7];
Output=[1,5,6];
Output=[2,3,7];
Output=[2,4,6];
Output=[3,4,5].
2. Problem#1 Components:
This program consists of the following engines:

• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using depth first search or greedy algorithm to get the path. This algorithm should be implemented in prolog.
• You must solve this problem twice (depth first search and greedy algorithm)



II. Problem #2

1. Problem#2 Overview
Daisy loves playing games with words. Recently, she has been playing the following Deletive Editing word game with Daniel.
Daisy picks a word, for example, "DETERMINED". On each game turn, Daniel calls out a letter, for example, 'E', and Daisy removes the first occurrence of this letter from the word, getting "DTERMINED". On the next turn, Daniel calls out a letter again, for example, 'D', and Daisy removes its first occurrence, getting "TERMINED". They continue with 'I', getting "TERMNED", with 'N', getting "TERMED", and with 'D', getting "TERME". Now, if Daniel calls out the letter 'E', Daisy gets "TRME", but there is no way she can get the word "TERM" if they start playing with the word "DETERMINED".
Daisy is curious if she can get the final word of her choice, starting from the given initial word, by playing this game for zero or more turns. Your task it help her to figure this out.

% deletiveEditing(Initial,End).
Each word consists of at least one and at most 30 uppercase English letters; Initial is the Daisy's initial word for the game; End is the final word that Daisy would like to get at the end of the game.

?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','R','M','E']).
True.

?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','E','R','M']).
False.

?- deletiveEditing(['D','E','I','N','S','T','I','T','U','T','I','O','N','A','L','I','Z','A','T','I','O','N'], ['D','O','N','A','T','I','O','N']).
True.

?- deletiveEditing(['C','O','N','T','E','S','T'], ['C','O','D','E']).
False.

?- deletiveEditing(['S','O','L','U','T','I','O','N'], ['S','O','L','U','T','I','O','N']).
True.

2. Problem#2 Components:
This program consists of the following engines:

• Planner Engine: is responsible for:
• Taking the query in prolog entered by the user.
• Apply the planning algorithm using informed search algorithm (greedy algorithm) to get the path.
This algorithm should be implemented in prolog.

Answers

Answer:

Explanation:

Assignment Type : Ai using prolog language

• AI Search Techniques

o The search algorithms can solve this problem easily so you must implement one of the uninformed search techniques and one of the informed search techniques to solve the problems

I. Problem #1

1. Problem#1 Overview

Given a list of positive integer Items whose elements are guaranteed to be in sorted ascending order, and a positive integer Goal, and Output is a list of three elements [A,B,C] taken from items that together add up to goal. The Output must occur inside the items list in that order (ascending order).

?-threeSum([3,8,9,10,12,14],27,Output).

Output=[8,9,10];

Output=[3,10,14].

?-threeSum([2,4,8,10,12,14],25,Output).

false.

?-threeSum([2,4,8,12,14,16],20,Output).

Output=[2,4,14].

?-threeSum([1,2,3,4,5,6,7,8,9],12,Output).

Output=[1,2,9];

Output=[1,3,8];

Output=[1,4,7];

Output=[1,5,6];

Output=[2,3,7];

Output=[2,4,6];

Output=[3,4,5].

2. Problem#1 Components:

This program consists of the following engines:

• Planner Engine: is responsible for:

• Taking the query in prolog entered by the user.

• Apply the planning algorithm using depth first search or greedy algorithm to get the path. This algorithm should be implemented in prolog.

• You must solve this problem twice (depth first search and greedy algorithm)

II. Problem #2

1. Problem#2 Overview

Daisy loves playing games with words. Recently, she has been playing the following Deletive Editing word game with Daniel.

Daisy picks a word, for example, "DETERMINED". On each game turn, Daniel calls out a letter, for example, 'E', and Daisy removes the first occurrence of this letter from the word, getting "DTERMINED". On the next turn, Daniel calls out a letter again, for example, 'D', and Daisy removes its first occurrence, getting "TERMINED". They continue with 'I', getting "TERMNED", with 'N', getting "TERMED", and with 'D', getting "TERME". Now, if Daniel calls out the letter 'E', Daisy gets "TRME", but there is no way she can get the word "TERM" if they start playing with the word "DETERMINED".

Daisy is curious if she can get the final word of her choice, starting from the given initial word, by playing this game for zero or more turns. Your task it help her to figure this out.

% deletiveEditing(Initial,End).

Each word consists of at least one and at most 30 uppercase English letters; Initial is the Daisy's initial word for the game; End is the final word that Daisy would like to get at the end of the game.

?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','R','M','E']).

True.

?- deletiveEditing(['D','E','T','E','R','M','I','N','E','D'], ['T','E','R','M']).

False.

?- deletiveEditing(['D','E','I','N','S','T','I','T','U','T','I','O','N','A','L','I','Z','A','T','I','O','N'], ['D','O','N','A','T','I','O','N']).

True.

?- deletiveEditing(['C','O','N','T','E','S','T'], ['C','O','D','E']).

False.

?- deletiveEditing(['S','O','L','U','T','I','O','N'], ['S','O','L','U','T','I','O','N']).

True.

2. Problem#2 Components:

This program consists of the following engines:

• Planner Engine: is responsible for:

• Taking the query in prolog entered by the user.

• Apply the planning algorithm using informed search algorithm (greedy algorithm) to get the path.

This algorithm should be implem

The following equations estimate the calories burned when exercising (source):
Women: Calories = ( (Age x 0.074) — (Weight x 0.05741) + (Heart Rate x 0.4472) — 20.4022 ) x Time / 4.184

Men: Calories = ( (Age x 0.2017) + (Weight x 0.09036) + (Heart Rate x 0.6309) — 55.0969 ) x Time / 4.184

Write a program using inputs age (years), weight (pounds), heart rate (beats per minute), and time (minutes), respectively. Output calories burned for women and men.

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('Men: {:.2f} calories'.format(calories_man))

Ex: If the input is:

49
155
148
60
Then the output is:

Women: 580.94 calories
Men: 891.47 calories

Answers

Answer:

# Women: Calories = ((Age x 0.074) - (Weight x 0.05741) + (Heart Rate x 0.4472) - 20.4022) x Time / 4.184

#Men: Calories = ((Age x 0.2017) + (Weight x 0.09036) + (Heart Rate x 0.6309) - 55.0969) x Time / 4.184

#main function to gets input for age, weight, hear rate and time and print Women and Man calorie burnt

def main():

 #get user input for age, weight, hear rate and time

 age = int(input("Enter your age:"))

 weight = int(input("Enter your weight:"))  

 heartRate = int(input("Enter your heart rate:"))

 time = int(input("Enter your time:"))

 #calculate calories for women and men

 caloriesWomen = ((age * 0.074) - (weight * 0.05741) + (heartRate * 0.4472) - 20.4022) * time / 4.184

 caloriesMen = ((age * 0.2017) + (weight * 0.09036) + (heartRate * 0.6309) - 55.0969) * time / 4.184

 #print calories for women and men

 print("Women: %.2f calories"%caloriesWomen)

 print("Men: %.2f calories"%caloriesMen)

#calling main function

main()

Explanation:

1) Above is your updated program.

2) Please copy it in python file and run

3) Below is the test output for this program

Enter your age:49

Enter your weight:155

Enter your heart rate:148

Enter your time:60

Women: 580.94 calories

Men: 891.47 calories

Connect research concepts to their definitions

Answers

Answer Research is defined as the creation of new knowledge and/or the use of existing knowledge in a new and creative way so as to generate new concepts, methodologies and understandings

List 5 tasks that can be performed by a computer

Answers

Answer:

Input or inserting data and instructions.Processing.Output or retrieving data or information.Storing data or information/file management.Controlling of devices and functions.

In this area, you want to focus on which hardware, application, personnel, or department(s) will be impacted by the security policy. For instance, what type of personal devices are allowed on the network and when? Must the personnel receive formal approval before using such devices on the network? What kind of activity is allowed on a personal device? Who is responsible for granting the permission to use a device on the network?

Answers

The type of personal devices that are allowed on the network are:

LaptopsSmartphones tablets

What devices do BYOD have?

BYOD is known to be Personal devices such as smartphones that organizations often gives permission for employees that are working from home so as to be able to have a flexible schedule and others.

Therefore, The type of personal devices that are allowed on the network are:

LaptopsSmartphones tablets

Learn more about personal device from

https://brainly.com/question/4457705

#SPJ1

In Scratch, what option in the Sounds tab would you select if you wanted to use a sound file already on your local computer?
Choose a Sound
Record
Surprise
Upload

Answers

Answer: is Upload

Hope this helps! :)

Answer:

upload

Explanation:

what gases are involved in the process of respiration​

Answers

Answer: (O(2)), nitric oxide (NO), and carbon dioxide (CO(2))

Explanation:

Allan is a candidate for the position of Mayor in his town. He is worried about using email for the fear that it may be intercepted by the government and used by his opponent. What law protects his email from being intercepted by the government?
The
and its proposed update strengthen the online privacy of users by increasing requirements for governmental access to the stored data.

Answer: Electronic Communications Privacy Act

Answers

Answer:

This is correct.

Explanation:

I took the test and got it right.

Write a question that the database will understand. Which records do not contain "sold"?
a. <>sold
b. /=sold
c. is sold i
d. >=sold

Answers

Answer:

b

Explanation:

b

ANSWER QUICKLY!!!

Ed has taken up a freelancing project to build a website. The website should be easy to navigate and lighter to load. He has brilliant HTML and
CSS coding skills. However, he doesn't have enough time to build the website from scratch. What can he do to create a relatively light website in
a short span of time?

Answers

In the above scenario, he create a relatively light website in a short span of time by using option A.

What is a website?

A website is known to be a composition of web pages and similar or linked content that is known by a common domain name and it is one that is often published on web server.

Note that In the above scenario, he create a relatively light website in a short span of time by using option A as it is the right choice to make.

Learn more about website from

https://brainly.com/question/13171394

#SPJ1

In Exercises 1–4 construct the dual graph for the map shown.
Then find the number of colors needed to color the map so
that no two adjacent regions have the same color.

Answers

Answer:

10.8 Graph Coloring

A coloring of a simple graph is the assignment of a color to each vertex of the graph so that no

two adjacent vertices are assigned the same color.

Chromatic number

The chromatic number of a graph is the least number of colors needed for a coloring of this graph.

The Four Color Theorem

The chromatic number of a planar graph is no greater than four.

10.8 pg. 733 # 3

Construct the dual graph for the map shown. Then find the number of colors needed to color the

map so that no two adjacent regions have the same color.

a

b c d e

f

At least three colors are needed to color the

graph because of triangle 4abc exists in the

graph.

10.8 pg. 733 # 7

Find the chromatic number of the given graph.

a

b

c

d

Since this graph forms two triangles, 4abd and

4bcd, we can color this graph with at least 3

colors where a and c are the same colors.

a

b

c

d

10.8 pg. 733 # 9

Find the chromatic number of the given graph.

1

ICS 241: Discrete Mathematics II (Spring 2015)

a

e

b

c

d

This graph can be colored with two colors like

shown.

a

e

b

c

d

10.8 pg. 734 # 19

The mathematics department has six committees, each meeting once a month. How many different

meeting times must be used to ensure that no member is scheduled to attend two meetings at the

same time if the committees are C1 = {Arlinghaus, Brand, Zaslavsky}, C2 = {Brand, Lee, Rosen},

C3 = {Arlinghaus, Rosen, Zaslavsky}, C4 = {Lee, Rosen, Zaslavsky}, C5 = {Arlinghaus, Brand},

and C6 = {Brand, Rosen, Zaslavsky}?

We will first draw the intersection graph of the given sets.

C1 C2

C3

C5 C4

C6

From here, it is easy to see that we need at least 5 colors like so:

C1 C2

C3

C5 C4

C6

Therefore, 5 meeting times are needed. Committees C4 and C5 can meet at the same time.

Explanation:

done-_-

Question 2 of 25
How could a video's file size be reduced so that it will take up less space on a
computer's hard drive?
A. By shooting it at a lower resolution
B. By shooting it at a higher resolution
C. By shooting it at a higher frame rate
D. By sampling the sound at the maximum rate

Answers

A, as a lower resolution will store less data per frame, reducing file size.

When searching for a video file on your computer, you should look for a file with which extension?

Answers

While searching for a video file on the computer, the .mp4 extension must be searched.

What is a file extension?

A file extension is given as the suffix added to the file name that has the description of the type of file.

The file extensions for various types of files are different and are used for the identification of the file type. The video files have the general extension as .mp4.

Thus, while searching for a video file on the computer, the .mp4 extension must be searched.

Learn more about file extensions, here:

https://brainly.com/question/7640304

#SPJ1

Explain the major hardware and software requirements that supported by Windows OS, Linux OS and Mac OS support

Answers

Answer:

You don’t have a great many choices when it comes to your computer's operating system, but the choice that you make can have wide-ranging consequences. The five OSes included here are your most viable options. That's not a huge number, but these operating systems differ distinctly in strengths and weaknesses. Four come from gargantuan commercial tech giants, while one, the Linux-based Ubuntu, is a free, open-source option. Windows and macOS are generally the most powerful in terms of hardware and software selection as well as interface conveniences and utilities, while Chrome OS is more lightweight and runs on inexpensive hardware.

Answer:

Where they are used: Desktops, laptops, smartphones, and other devices run on the Windows operating system. Computers, servers, and several embedded systems use Linux. Mac is primarily used on desktops and not recommended for servers due to its high cost.

what is another word for low level language​

Answers

Answer:

machine code or assembly language

Explanation:

Because of the low abstraction between the language and machine language, low-level languages are described as "close to the hardware"

wikipedia

Answer:

Another word for Low Level Language is 'Machine-Oriented Language'.

there are two types of Low Level Languages:

1 ) Machine Language

2) Assembly Language

hope that helps...

During a system board replacement, a new TPM is installed. What is the next best step to take?

Answers

The step to install TPM involves the connection of the chip to the connector and snapping of the bolt in its place by pressing down the plastic bolt.

What is a TPM?

A TPM is given as the Trusted Platform Module. It is a computer chip that enables the storage of the artifacts at a safe location for the authentication of the system.

In the system board replacement, the TPM installation is followed by the insertion of the TPM chip in the TPM connector, and pressing down the security rivet in the form of the plastic bolt to make the bolt snap in its place.

Learn more about TPM, here:

https://brainly.com/question/15202666

#SPJ1

Characteristics of VR headsets​

Answers

Answer Believable Virtual Word. The believable virtual world is a key characteristic of Virtual Reality. ...
Immersive. ...
Feedback. ...
Interactive. ...
Virtual Reality Headset. ...
Computing Device (Commuter / Smart Phone) ...
Virtual Reality Input and Output Devices. ...
Fully Immersive Virtual Reality.

ANSWER QUICKLY!!!

What is an advantage of digital portfolios?

Answers

Easy to carry or utilize

Answer:

transmit

Explanation:

A method for breaking a program down into smaller parts

Answers

Answer:

Top Down Design

A method for breaking a program down into smaller parts

Explanation:

Answer:

Top Down Design

A method for breaking a program down into smaller parts

Explanation:

In which of the following careers must one learn and use programming languages?
Systems Analyst
Software Engineer
Database Administrator
Computer Support Specialist

Answers

The career option dealing with the programming languages is software engineer. Thus, option B is correct.

What are programming Languages?

The programming languages are given as the type of computer language that performs the task of converting the strings and graphical elements of the program in a visual program. The language has been utilizing the codes of the machine to implement the algorithm.

The career that enables the dealing with the software and the programming is software engineer. Thus, option B is correct.

Learn more about programming language, here:

https://brainly.com/question/12696037

#SPJ1

Question # 9
Fill in the Blank
Complete the statement using the correct term.
The aerospace industry uses______________ simulators to train astronauts and design spacecraft.

Answers

Answer:

flight stimulators are used to train astronaut and design simple air craft

What is the ability for anyone in a society to own private property _____.

Answers

Answer:

The ability for anyone in a society to own private property incentivizes people to conserve resources and encourages entrepreneurship.

Other Questions
April plans on starting a perfume business and decides she needs to first conduct some marketing research. she wants to find out what kinds of perfumes and scents women like to wear from as many women as possible. which data collection method should she use? how does technology affect our intelligence? (positively) Cytokinesis is when the cellseparates into two identicaldaughter cells. Cytokinesis iswhich phase of cell division? According to the Articles of Confederation, howwas power divided between the states andCongress?Activities WorkbookStates could establish laws as long as theydidn't override federal policy.BCongress had more power than the states.States had to get the approval of Congressbefore passing any laws.DStates could choose to leave the union at anytime.BackNext HI GIVING BRAINLIESST CAN SOMEONE PLEASE EXPLAIN IM SORRY ITS SO LATE Which of the following is true of iron? What was the effect of the debt system peonage that emerged in the Southern States during the 19th century? A brick layer can build a wall in 6 hours and his apprentice would need 16 hours to build the same wall. When they work together, the apprentice works 5 hours longer than the brick layer. How many hours does each work What is the mass of NaCl required to make 160 grams of a 12% solution of NaCl in water?18 grams19 grams22 grams24 grams How do you break apart acompound?A. Chemical bonds must be broken,B. Water must be added.C. It must be physically separated.D. The compound can be cut apart, In order to be healthy, humans must consume a variety of amino acids. any animal product, such as eggs, milk, and meat, contains all of these amino acids. however, consumption of a wide variety of plant products will also supply the necessary amino acids. describe two different meals you could enjoy that contain only plant products. make sure to include at least five different plants in each meal. (10 points) plants produce grains, vegetables, and fruits. meal two 8 oz of cream cheese for $1.98 or 1 pound for 3.75? Which type of people should be chosen to form the project team? I really need help with this Helpppp please Name two other substances with giant covalent substances What is Mean, median and mode of these numbers below? 252525255050125125125 375 how is a verb conjugated in spanish? A. Add the correct verb ending to the infinitive according to the person( subject noun )B. First , drop the -ar from the infinitive. Then add the correct ending according to the person(subject pronoun)C. First , drop the -ar from the infinitive. Then add s. change this to an improper fraction 3 1/8 At the beginning of the school year, Tyrone bought 12 notebooks for a total price of 19.56.Jaime went to the same store and bought 5 notebooks. How much did jaime spend what is the answer to this question? i do not know what the names are