Answer:
Rotation is the circular movement of an object around an axis of rotation. A three-dimensional object may have an infinite number of rotation axes.
Unit 9 Inheritance and Polymorphism FRQ (a) (b) (c) PENCIL AND PAPER ONLY. SHOW ALL YOUR WORK CLEARLY. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN JAVA. Assume that the classes listed in the Java Quick Reference have been imported where appropriate. Unless otherwise noted in the question, assume that parameters in method calls are not null and that methods are called only when their preconditions are satisfied. In writing solutions for each question, you may use any of the accessible methods that are listed in classes defined in that question. Writing significant amounts of code that can be replaced by a call to one of these methods will not receive full credit. The following Book class is used to represent books and print information about each book. Each Book object has attributes for the book title and for the name of the book's author. public class Book private String title; private String author; public Book (String t, String a) title = t; author = a; public void printBookInfo() System.out.print(title + ", written by " + author); (a) The PictureBook class is a subclass of the Book class that has one additional attribute: a String variable named illustrator that is used to represent the name of the illustrator of a picture book. The PictureBook class also contains a printBookInfo method to print the title, writer, and illustrator of a picture book. Consider the following code segment. PictureBook myBook = new PictureBook ("Peter and Wendy", "J.M. Barrie", "F.D. Bedford"); myBook.printBookInfo(); The code segment is intended to print the following output. Peter and Wendy, written by J.M. Barrie and illustrated by F.D. Bedford Complete the PictureBook class below. Your implementation should conform to the example above. public class PictureBook extends Book (write your class using pencil in a separate page) Unit 9 Inheritance and Polymorphism FRQ (a) (b) (c) Consider the following books. • A book titled Frankenstein, written by Mary Shelley A picture book titled The Wonderful Wizard of Oz, written by L. Frank Baum and illustrated by W.W. Denslow The following code segment is intended to represent the two books described above as objects bookl and book2, respectively, and add them to the ArrayList myLibrary. ArrayList myLibrary = new ArrayList(); /* missing code */ myLibrary.add(bookl); my Library.add(book2); (b) Write a code segment that can be used to replace /* missing code */ so that bookl and book 2 will be correctly created and added to my Library. Assume that class PictureBook works as intended, regardless of what you wrote in part (a). (write your code segment using pencil in a separate page) The BookListing class is used to generate a descriptive listing for a book. The BookListing constructor takes a Book object and a double value as parameters and uses them to print information about the book, along with its price. Assume that book1 and book2 were created as specified in part (b). The following table demonstrates the intended behavior of the BookListing class using objects book1 and book2. Code Segment Result Printed BookListing listing1 = new BookListing (book1, 10.99); Frankenstein, written by Mary Shelley, $10.99 listingl.printDescription(); BookListing listing2 = new BookListing (book2, 12.99); The Wonderful Wizard of Oz, written by L. Frank Baum and illustrated by W.W. Denslow, $12.99 listing2.print Description(); (c) Complete the BookListing class below. Your implementation should conform to the examples. Assume that class PictureBook works as intended, regardless of what you wrote in part (a). public class BookListing (write your class using pencil in a separate page)
(a) The implementation of the PictureBook class:
typescript
Copy code
public class PictureBook extends Book {
private String illustrator;
public PictureBook(String t, String a, String i) {
super(t, a);
illustrator = i;
}
public void printBookInfo() {
System.out.print(title + ", written by " + author + " and illustrated by " + illustrator);
}
}
(b) The code segment that creates book1 and book2 and adds them to myLibrary:
csharp
Copy code
Book book1 = new Book("Frankenstein", "Mary Shelley");
PictureBook book2 = new PictureBook("The Wonderful Wizard of Oz", "L. Frank Baum", "W.W. Denslow");
myLibrary.add(book1);
myLibrary.add(book2);
(c) The implementation of the BookListing class:
csharp
Copy code
public class BookListing {
private Book book;
private double price;
public BookListing(Book b, double p) {
book = b;
price = p;
}
public void printDescription() {
book.printBookInfo();
System.out.println(", $" + price);
}
}
For more questions like Polymorphism visit the link below:
https://brainly.com/question/16344360
#SPJ11
How does malware spread
Answer: Malware can use known software vulnerabilities to infect your PC. A vulnerability is like a hole in your software that can give malware access to your PC. When you go to a website, it can try to use vulnerabilities in your web browser to infect your PC with malware. Other than this malware can spread by four ways Clicking on links to malicious websites in emails, messaging apps or social network posts. Visiting compromised websites, aka drive-by downloads, viruses can be hidden in HTML, thus downloading when the webpage loads in your browser. Connecting your device to infected external hard drives or network drives
Answer: Malware is usually distributed through malicious websites, emails, and software. Malware can also be hidden in other files, such as image or document files, or even in seemingly innocuous files, such as.exe files
You are working as a project manager. One of the web developers regularly creates dynamic pages with a half dozen parameters. Another developer regularly complains that this will harm the project’s search rankings. How would you handle this dispute?
From the planning stage up to the deployment of such initiatives live online, web project managers oversee their creation.They oversee teams that build websites, work with stakeholders to determine the scope of web-based projects, and produce project status report.
What techniques are used to raise search rankings?
If you follow these suggestions, your website will become more search engine optimized and will rank better in search engine results (SEO).Publish Knowledgeable, Useful Content.Update Your Content Frequently.facts about facts.possess a link-worthy website.Use alt tags.Workplace Conflict Resolution Techniques.Talk about it with the other person.Pay more attention to events and behavior than to individuals.Take note of everything.Determine the points of agreement and disagreement.Prioritize the problem areas first.Make a plan to resolve each issue.Put your plan into action and profit from your victory.Project managers are in charge of overseeing the planning, execution, monitoring, control, and closure of projects.They are accountable for the project's overall scope, team and resources, budget, and success or failure at the end of the process.Due to the agility of the Agile methodology, projects are broken into cycles or sprints.This enables development leads to design challenging launches by dividing various project life cycle stages while taking on a significant quantity of additional labor.We can use CSS to change the page's background color each time a user clicks a button.Using JavaScript, we can ask the user for their name, and the website will then dynamically display it.A dynamic list page: This page functions as a menu from which users can access the product pages and presents a list of all your products.It appears as "Collection Name" in your website's Pages section.To learn more about search rankings. refer
https://brainly.com/question/14024902
#SPJ1
If i paid $37.20 for 12 gallons of ice cream how many would 1 quart of ice cream cost
Answer:
$0.78
Explanation:
What type of pointing device is often used by artists, and why is it ideal for artists?
Answer:
A drawing/graphics tablet
Explanation:
It is ideal for artists, due to it being very similar to as if you were to draw on paper. The stylus replicates a pencil or pen.
Which of the following are advantages of a local area network, as opposed to a wide area network? Select 3 options. Responses higher speeds higher speeds provides access to more networks provides access to more networks lower cost lower cost greater geographic reach greater geographic reach more secure more secure
The advantages of a local area network (LAN) over a wide area network (WAN) include higher speeds, lower cost, and greater security.
Advantages of a local area network (LAN) over a wide area network (WAN) can be summarized as follows:
Higher speeds: LANs typically offer faster data transfer rates compared to WANs. Since LANs cover a smaller geographical area, they can utilize high-speed technologies like Ethernet, resulting in quicker communication between devices.Lower cost: LAN infrastructure is generally less expensive to set up and maintain compared to WANs. LANs require fewer networking devices and cables, and the equipment used is often more affordable. Additionally, WANs involve costs associated with long-distance communication lines and leased connections.More secure: LANs tend to provide a higher level of security compared to WANs. Since LANs are confined to a limited area, it is easier to implement security measures such as firewalls, access controls, and encryption protocols to protect the network from unauthorized access and external threats.To summarize, the advantages of a LAN over a WAN are higher speeds, lower cost, and enhanced security.
For more such question on local area network
https://brainly.com/question/24260900
#SPJ8
How does the history of the internet explain the issues in cyberspace and cybersecurity now? Be sure to reference at least one specific issue that you read about in the timeline of the origins of the internet. this is a nearpod and i need help pls
Answer:
The history of the internet can explain the issues in cyberspace and cybersecurity today in a number of ways. One of the key factors is the rapid growth of the internet over the last few decades. This has led to a vastly expanded attack surface for hackers and cybercriminals, as well as a lack of security measures and best practices on many devices and systems that are connected to the internet.
One specific issue that can be highlighted is the lack of security built into the early internet. The early designers of the internet, such as Vint Cerf and Bob Kahn, focused on creating a functional network that could connect computers, with little consideration for security. As a result, the internet was initially built on a trust model where all users were assumed to be trustworthy, and this lack of security has carried over into today's internet. This lack of security in the early days is one of the main reason that made it easy for hackers to exploit and this is still a major problem in modern internet.
Another issue is the decentralized nature of the internet. This decentralization allows for great flexibility and innovation, but it also makes it difficult to impose security measures or regulations. Additionally, the rapid growth of the internet has made it hard for governments, companies, and individuals to keep pace with developments and adequately protect themselves from cyberthreats.
Finally, the expansion of the Internet of Things (IoT) and the increasing connectivity of everyday devices also create new vulnerabilities as these devices may not have the same level of security as traditional computing devices.
Overall, while the history of the internet has brought many benefits, it has also laid the groundwork for many of the cybersecurity challenges we face today.
Explanation:
Take one action in the next two days to build your network. You can join a club, talk to new people, or serve someone. Write about this action and submit this as your work for the lesson. icon Assignment
Making connections is crucial since it increases your versatility.You have a support system of people you can turn to when things get tough so they can help you find solutions or in any other way.
What are the advantages of joining a new club?
Support Network - Joining a club or organization can help you develop a support network in addition to helping you make new acquaintances and meet people.Your teammates and friends will be there for you not only during practice but also amid personal difficulties. Working collaboratively inside a group, between groups, between communities, or between villages is known as network building.One method of creating a network is by forming a group. Attending events and conferences and developing connections with other attendees and industry speakers is one of the finest methods to build a strong network.In fact, the framework of many networking events and conferences encourages networking and connection opportunities. Personal networking is the process of establishing connections with organizations or individuals that share our interests.Relationship growth often takes place at one of the three levels listed below:Networks for professionals.Neighborhood networks.Personal networks. Reaching out is part of an active communication process that will help you learn more about the other person's interests, needs, viewpoints, and contacts.It is a life skill that needs to be actively handled in order to preserve or, more importantly, to advance a prosperous profession. various network types.PAN (personal area network), LAN (local area network), MAN (metropolitan area network), and WAN (wide area network) are the different types of networks.To learn more about network refer
https://brainly.com/question/28041042
#SPJ1
Which of the following devices is NOT required to successfully implement teleconferencing?
Sensor
Modem
Speaker
Microphone
Answer: a. Sensor
Explanation: Modem= internet
Speaker= able to hear
microphone = to speak
Legacy mrp systems typically utilized multiple software packages and databases which caused:_____.
Legacy mrp systems typically utilized multiple software packages and databases which caused the same information to be save in multiple locations.
What is an MRP systems?Material requirements planning (MRP) is known to be a kind of a system that is often used in the calculation of some materials as well as the parts that is known to be needed to create or form a product.
It is one that is also known to be made up of three key steps such as taking inventory of the materials as well as the parts on hand, knowing which other ones are required and then keeping a schedule of their production or buying.
Therefore, Legacy mrp systems typically utilized multiple software packages and databases which caused the same information to be save in multiple locations.
Learn more about mrp systems from
https://brainly.com/question/13647161
#SPJ1
anybody wanna be friends?
yes Avacado?????????????????????
WILL GIVE BRAINLIEST!!!!!!!
A dentist's drill is an example of a hydraulic system.
True
False
Answer:
A drill is one of the most important tools a dentist can have. They run on pneumatic systems which gives the drill power and precision.
Explanation:
So, false
Answer:False
Explanation:Just saw the question and this was the answer. Hope this helps!
Differentiate leakage channels, voltage-gated channels,
ligand-gated channels, and mechanically gated
channels.
leakage channels are always open and contribute to the resting membrane potential, voltage-gated channels open or close in response to changes in membrane potential, ligand-gated channels open or close in response to the binding of specific chemical messengers, and mechanically gated channels open or close in response to mechanical stimuli.
Leakage Channels:
Leakage channels, also known as non-gated channels or passive channels, are ion channels that allow the passive movement of ions across the cell membrane. They are always open and are responsible for the resting membrane potential of a cell.
Voltage-Gated Channels:
Voltage-gated channels are ion channels that open or close in response to changes in the membrane potential. These channels are activated by changes in voltage across the cell membrane. When the membrane potential reaches a certain threshold, the channels undergo conformational changes, leading to their opening or closing.
Ligand-Gated Channels:
Ligand-gated channels, also known as chemically gated channels, are ion channels that open or close in response to the binding of specific chemical messengers or ligands. These ligands can be neurotransmitters, hormones, or other signaling molecules.
Mechanically Gated Channels:
Mechanically gated channels are ion channels that open or close in response to mechanical stimuli such as pressure, stretch, or vibration. These channels are found in cells or tissues that are sensitive to mechanical forces, such as sensory cells in the auditory system or touch receptors in the skin.
Learn more about leakage channels https://brainly.com/question/13287128
#SPJ11
Is computing gcse easy or hard
Answer:
my friend that took it said that there was a lot of complex theory involved- i was initially supposed to take it, but my blocks didn't align so i had to take geography instead
honestly, i would say it was one of the best decisions I've made, since i see lots of computing students completely confused by what they're doing.
To be honest i have never taken a GCSE but give your self time to study like any other test and stress about it.
hope this helped
-scav
How many cubic millimeters are present in 0.0923 m3?
92300000 is the answer.
when converting meter to millimeter we multiply 1000
when converting m³ to cm³ we multiply by 1000000000(1000 x 1000 x1000)
PLZZZ HELPPPP
Use an algorithm to help the Python Turtle get to the finish line in 10 steps by using only the 3 commands below:
- Turn Left
- Turn Right
- Move #
Answer:
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Answer:
move move turn left 2
Explanation:
differences between ancient means of communication and modern means of communication
Answer:
The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging
Answer:
The older methods of communication were cave paintings, smoke signals, symbols, carrier pigeons, and telegraph. The latest and modern ways are more convenient and efficient. For example, Television, Cell Phones, Internet, E-mails, Social media, and Text messaging.
The only real difference is the speed of it. Other than that, only the delivery methods have changed. Communication itself is the same, as far as I can see.
Explanation:
Games were first created as a way to just have fun; they had no real connection to life.
True
False
Answer:
true
Explanation:
define a function calcnum() that takes one integer parameter and returns 5 times the parameter. ex: if the input is 3, then the output is: 15
define a function calcnum() that takes one integer parameter and returns 5 times the parameter.
The code in C is:
#include <iostream>
#inlcude <stdio.h>
int calcnum(int number) {
return (number*number*number*number*number);
int main()
{
int input;
int result;
cout << "Enter any no.: ";
cin >> input;
result = calcnuml(input);
cout << result << endl;
return 0;
}
What is the use of function?
A function is merely a "chunk" of code that may be used repeatedly rather than having to be written out repeatedly. With the use of functions, a programmer can divide a larger issue into smaller parts, each of which can carry out a specific function.
Once a function is defined, a programmer can call it whenever they need it by just using its name. In order for the function to work, it also likely needs some inputs or arguments, which are passed to the function each time it is called.
To learn more about a function, use the link given
https://brainly.com/question/20476366
#SPJ4
why do most operating systems let users make changes
By these changes you most likely are thinking of the term 'Over Clocking'
Over Clocking is used on most Operating Systems to bring the item your over clocking to the max.
Over Clocking; is mostly used for Crypto mining and gaming.
Which of the following best describes a variable?
A. A named area in computer memory that holds value
B. A Python statement that has random effects
C. A place where you store a value that can never change
D. None of these
Answer:
A. A named area in computer memory that holds value
Explanation:
A variable is a way of assigning an area in a computer memory that can hold values like text, number and characters. When using variables, you must specify its type. Specifying its type determines the type of data the variable can hold, how it is handled and its location in the computer memory.
Variables hold information that is stored in the computer memory and is labeled by a name.
The statement among the options that best describes a variable is;
A: A named area in computer memory that holds value
VariablesThe correct answer to this question is option A. This is because a variable is a method that we use to assign an area in a computer memory that is capable of holding inputs such as text, number and other characters.
Now, it is pertinent to note that you must specify the type of variable used. This is done to determine the type of data that the variable can hold, and where it is located in the computer memory.In conclusion, the information that Variables hold in the computer memory are usually labeled by a name.
Read more about variables at; https://brainly.com/question/16397886
Can you find me 3 principles of art in my poster with explain
In the art above, the poster combines pencil lines and watercolors in two colors. It exhibits contrast, unity, and movement, through light and dark values.
What is the explanation for the above response?From the description provided, three principles of art that may be present in the poster are:
Contrast: The use of dark pencil lines and watercolor creates a contrast between the sharp, defined lines and the soft, blended colors. This draws attention to specific elements in the composition.
Harmony: Even though two different media (pencil and watercolor) are used, they may have been applied in a way that creates a sense of unity or harmony in the overall artwork.
Balance: The placement of the different elements in the poster may create a sense of balance or equilibrium, either through symmetrical or asymmetrical composition. This can create a feeling of stability or tension in the artwork.
Learn more about art at:
https://brainly.com/question/19049629
#SPJ1
Place the steps in correct order:
1. Open the sent messages
2. Make additions/edits
3. Click actions
4. Choose resend the message
(correct order as listed here)
The correct order is:
1. Open the sent messages
2. Click actions
3. Make additions/edits
4. Choose resend the message
Unlike the harmonic numbers, the sum 1/12 + 1/22 + ... + 1/n? does converge to a constant as n grows to infinity. (Indeed, the constant is n/6, so this formula can be used to estimate the value of .) Which of the following for loops computes this sum? Assume that n is an int variable initialized to 1000000 and sum is a double variable initialized to 0.0.
Explanation:
None of the following for loops correctly computes the given sum:
for (int i = 1; i < n; i++) {
sum += 1/(i*i);
}
for (int i = 1; i <= n; i++) {
sum += 1/(i*i);
}
for (int i = 1; i <= n; i++) {
sum += 1.0/(i*i);
}
The correct for loop to compute the given sum is:
for (int i = 1; i <= n; i++) {
sum += 1.0/(i*i);
}
This loop correctly iterates from i=1 to i=n and uses the double data type to ensure that the division operation results in a decimal approximation.
3. What will be the output of the following Python code snippet? not(3>4) not(1 & 1) a) True True b) True False c) False True d) False False
Therefore, the output of the code snippet would be:
a) True True
The correct option is a) True True.
The output of the given Python code snippet can be determined as follows:
1. not(3 > 4):
The condition "3 > 4" evaluates to False. The not operator negates the result, so not(3 > 4) evaluates to True.
2. not(1 & 1):
The bitwise AND operation "1 & 1" evaluates to 1. The not operator negates the result, so not(1 & 1) evaluates to False.
Therefore, the output of the code snippet would be:
a) True True
The correct option is a) True True.
Learn more about Python:https://brainly.com/question/26497128
#SPJ11
The following situation uses a robot in a grid of squares. The robot is represented by a triangle which is initially in the top left square facing downwards.
Create a solution that would enable the robot to be in the position found below. Make sure to use CAN_MOVE () to receive credit.
Using knowledge in computational language in python it is possible to write a code that Create a solution that would enable the robot to be in the position found below.
Writting the code:import random
lis=[]
for i in range(0,10):
num=random.randint(1,12)
lis.append(num)
tot=sum(lis)
avg=tot/10
print(avg)
See more about python at brainly.com/question/18502436
#SPJ1
The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ________. Group of answer choices using the letters of the alphabetic characters that are closest to access while typing taking the letters of the first six alphabetic characters found on the top row of keys using the alphabetic characters most frequently used on the keyboard representing the phonetics of the alphabets most closely associated with the keyboard
The setup of keys on a keyboard, QWERTY shows the keyboard layout by taking the letters of the first six alphabetic characters found on the top row of keys.
What is keyboard?A keyboard is known to be a kind of peripheral device that helps a user to be able to input text into any computer or any any kind of electronic device.
Note that The setup of keys on a keyboard, QWERTY shows the keyboard layout by taking the letters of the first six alphabetic characters found on the top row of keys.
Learn more about keyboard from
https://brainly.com/question/13380788
#SPJ1
Read the scenario, and then answer the question below. Alex has accepted an IT position at a new company, and will be leaving her current job in the IT department of a large company. Which is the best example of ethical behavior for leaving her current job?
get her coworkers’ contact information so she can help them get new jobs
make copies of the software she uses regularly to keep for her next job
notify her current job of the accounts she no longer needs access to
delete all the files and accounts that she had access to at her old job
You are the newly hired networking administer and technician for the law firm Dewey, Cheatem and Howe, which is a large firm with over 100 attorneys and staff. DCH has just moved to a newly constructed building where it occupies three floors. At the previous location, each of the workstations on its network had Internet access, but there was relatively little resource and To this point in time, any networking of shared documents has largely been "sneakernet".
In its new offices, you are being asked to implement the networking with consideration for future growth or expansion. Your first task is to decide on the IP addressing scheme you will implement. Which IP address standard (IPv4 or IPv6) is your choice? Why did you make this choice?
It's recommended to use IPv6 as the IP addressing scheme because of its features and backward compatibility with IPv4.
In this case, the choice of the IP address standard depends on the number of hosts, scalability, and future expansion plans. Given that the law firm has just moved to a newly constructed building and there is consideration for future growth or expansion, it's recommended to use IPv6.
IPv6 was created to address the limitations of IPv4, which includes the depletion of IPv4 addresses because of the huge increase in the number of internet-connected devices. IPv6 uses a 128-bit addressing system compared to IPv4's 32-bit addressing system. This means that IPv6 can provide almost limitless IP addresses to the network.
IPv6 features include:
Support for multicast traffic. 128-bit source and destination IP addresses. Automatic address configuration. No need for DHCP in most environments. Better security and encryption features. Simplified header format.IPv6 also provides backward compatibility with IPv4, allowing for easy migration to the new protocol while still maintaining backward compatibility with IPv4 networks.
As a result, it's recommended to use IPv6 as the IP addressing scheme because of its features and backward compatibility with IPv4.
Learn more about IP address: https://brainly.com/question/14219853
#SPJ11
Which of the commands below would be most helpful if you were trying to create a
face shape for your emoticon?
Answer:
draw_circle
Explanation:
This is the correct answer