write a program (in main.cpp) to do the following: a. build a binary search tree t1. b. do a postorder traversal of t1 and, while doing the postorder traversal, insert the nodes into a second binary search tree t2 . c. do a preorder traversal of t2 and, while doing the preorder traversal, insert the node into a third binary search tree t3. d. do an inorder traversal of t3. e. output the heights and the number of leaves in each of the three binary search trees.

Answers

Answer 1

Answer:

#include <iostream>

using namespace std;

struct TreeNode

{

   int value;

   TreeNode *left;

   TreeNode *right;

};

class Tree

{

  private:

     TreeNode *root;

     void insert(TreeNode *&, TreeNode *&);

     void destroySubTree(TreeNode *);

     void deleteNode(int, TreeNode *&);

     void makeDeletion(TreeNode *&);

     void displayInOrder(TreeNode *) const;

     void displayPreOrder(TreeNode *) const;

     void displayPostOrder(TreeNode *) const;

     int height(TreeNode *) const;

     int nodeCount(TreeNode *) const;

     int leafCount(TreeNode *) const;

  public:

     Tree()

        { root = NULL; }

     ~Tree()

        { destroySubTree(root); }

     void insertNode(int);

     bool searchNode(int);

     void remove(int);

     void displayInOrder() const

        { displayInOrder(root); }

     void displayPreOrder() const

        { displayPreOrder(root); }

     void displayPostOrder() const

        { displayPostOrder(root); }

     int height() const

        { return height(root); }

     int nodeCount() const

        { return nodeCount(root); }

     int leafCount() const

        { return leafCount(root); }

};

void Tree::insert(TreeNode *&nodePtr, TreeNode *&newNode)

{

  if (nodePtr == NULL)

     nodePtr = newNode;

  else if (newNode->value < nodePtr->value)

     insert(nodePtr->left, newNode);

  else

     insert(nodePtr->right, newNode);

}

void Tree::insertNode(int num)

{

  TreeNode *newNode;

  newNode = new TreeNode;

  newNode->value = num;

  newNode->left = newNode->right = NULL;

  insert(root, newNode);

}

void Tree::destroySubTree(TreeNode *nodePtr)

{

  if (nodePtr)

  {

     if (nodePtr->left)

        destroySubTree(nodePtr->left);

     if (nodePtr->right)

        destroySubTree(nodePtr->right);

     delete nodePtr;

  }

}

void Tree::deleteNode(int num, TreeNode *&nodePtr)

{

  if (num < nodePtr->value)

     deleteNode(num, nodePtr->left);

  else if (num > nodePtr->value)

     deleteNode(num, nodePtr->right);

  else

     makeDeletion(nodePtr);

}

void Tree::makeDeletion(TreeNode *&nodePtr)

{

  TreeNode *tempNodePtr;

  if (nodePtr == NULL)

     cout << "Cannot delete empty node.\n";

  else if (nodePtr->right == NULL)

  {

     tempNodePtr = nodePtr;

     nodePtr = nodePtr->left;

     delete tempNodePtr;

  }

  else if (nodePtr->left == NULL)

  {

     tempNodePtr = nodePtr;

     nodePtr = nodePtr->right;

     delete tempNodePtr;

  }

  else

  {

     tempNodePtr = nodePtr->right;

     while (tempNodePtr->left)

        tempNodePtr = tempNodePtr->left;

     tempNodePtr->left = nodePtr->left;

     tempNodePtr = nodePtr;

     nodePtr = nodePtr->right;

     delete tempNodePtr;

  }

}

void Tree::remove(int num)

{

  deleteNode(num, root);

}

bool Tree::searchNode(int num)

{

  TreeNode *nodePtr = root;

  while (nodePtr)

  {

     if (nodePtr->value == num)

        return true;

     else if (num < nodePtr->value)

        nodePtr = nodePtr->left;

     else

        nodePtr = nodePtr->right;

  }

  return false;

}

void Tree::displayInOrder(TreeNode *nodePtr) const

{

  if (nodePtr)

  {

     displayInOrder(nodePtr->left);

     cout << nodePtr->value << endl;

     displayInOrder(nodePtr->right);

  }

}

void Tree::displayPreOrder(TreeNode *nodePtr) const

{

  if (nodePtr)

  {

     cout << nodePtr->value << endl;

     displayPreOrder(nodePtr->left);

     displayPreOrder(nodePtr->right);

  }

}

void Tree::displayPostOrder(TreeNode *nodePtr) const

{

  if (nodePtr)

  {

     displayPostOrder(nodePtr->left);

     displayPostOrder(nodePtr->right);

     cout << nodePtr->value << endl;

  }

}

int Tree::height(TreeNode *nodePtr) const

{

  if (nodePtr == NULL)

     return 0;

  else

  {

     int lHeight = height(nodePtr->left);

     int rHeight = height(nodePtr->right);

     if (lHeight > rHeight)

        return (lHeight + 1);

     else

        return (rHeight + 1);

  }

}

int Tree::nodeCount(TreeNode *nodePtr) const

{

  if (nodePtr == NULL)

     return 0;

  else

     return (nodeCount(nodePtr->left) + nodeCount(nodePtr->right) + 1);

}

int Tree::leafCount(TreeNode *nodePtr) const

{

  if (nodePtr == NULL)

     return 0;

  else if (nodePtr->left == NULL && nodePtr->right == NULL)

     return 1;

  else

     return (leafCount(nodePtr->left) + leafCount(nodePtr->right));

}

int main()

{

  Tree tree;

  int num;

  cout << "Enter numbers to be inserted in the tree, then enter -1 to stop.\n";

  cin >> num;

  while (num != -1)

  {

     tree.insertNode(num);

     cin >> num;

  }

  cout << "Here are the values in the tree, listed in order:\n";

  tree.displayInOrder();

  cout << "Here are the values in the tree, listed in preorder:\n";

  tree.displayPreOrder();

  cout << "Here are the values in the tree, listed in postorder:\n";

  tree.displayPostOrder();

  cout << "Here are the heights of the tree:\n";

  cout << tree.height() << endl;

  cout << "Here are the number of nodes in the tree:\n";

  cout << tree.nodeCount() << endl;

  cout << "Here are the number of leaves in the tree:\n";

  cout << tree.leafCount() << endl;

  return 0;

}


Related Questions

DNS record allows multiple domain names to resolve to the same ip address.

a. true
b. false

Answers

Answer:

False

Because each domain has a separate IP address.

A toolbar of round buttons that appear when you move the mouse when in Slide Show view id called ____________.A toolbar of round buttons that appear when you move the mouse when in Slide Show view id called ____________.

Answers

Answer:

the slide show toolbar is displayed

when the soviets launched _______________, america devoted even more resources to space and technology research.

Answers

When the Soviets launched Sputnik 1, America devoted even more resources to space and technology research.

What is Sputnik 1?

Sputnik 1 was the first artificial Earth satellite. It was launched into an elliptical low Earth orbit by the Soviet Union on October 4, 1957. The surprise success precipitated the Sputnik crisis and triggered the Space Race between the Soviet Union and the United States.

Sputnik 1 was a small metal sphere measuring about 22.8 inches (58 centimeters) in diameter and weighing 183.9 pounds (83 kilograms). It was powered by two silver-zinc batteries and transmitted radio signals at a frequency of 20.005 and 40.002 MHz.

The satellite orbited the Earth once every 96.2 minutes at an altitude of about 310 miles (500 kilometers) and was visible from the ground as a rapidly moving point of light. It remained in orbit for about three months before its batteries died and it burned up in the Earth's atmosphere on January 4, 1958.

To learn more about satellite, visit: https://brainly.com/question/16761637

#SPJ4

The temperature at 8 AM was 44°F and at noon it was 64°F. what was the percent of change from 8 AM to noon?

Answers

Answer: 45.45%

Explanation:

Time Passed: 4 hours

Difference in Temperature: 20°F

20/44 = .45454545454545

.45454545454545*100 = 45.45%

Correct me if I am incorrect.

he concept of competitive ____ refers to the need to avoid falling behind the competition.

1. disadvantage 2. failure 3. benefit 4. advantage

Answers

The concept of competitive 1. disadvantage refers to the need to avoid falling behind the competition.

What is competitive disadvantage?

Competitive disadvantage (CD) is a term used to describe the inability of a company to compete effectively with its competitors. The deterrent effect of CD is a shrinking customer base. Today's market is literally a competitive landscape with an 'eat or eat' approach as competitors are international players of all sizes rather than local rivals. Therefore, it is becoming increasingly important for companies to try to build immunity to the devastating effects of CD. Businesses, large and small, need to stay ahead of the curve to stay ahead of their competitors.

Learn more about competitive disadvantage https://brainly.com/question/29559060

#SPJ4

Which of the following best describes the difference between software and hardware?


A Hardware is the outside of the computer; software is the material on the inside of a computer.

B Hardware is the material produced by the computer like a business letter; software is the information in the computer.

D Hardware is the equipment; software is the instructions given to the equipment in order for the equipment to perform a task.

C Software is the equipment; hardware are the programs that run the software.

Answers

Answer:

D. Hardware is the equipment; software is the instructions given to the equipment in order for the equipment to perform a task

Explanation:

Hardware is the actual part while Software is the program that operates the Hardware

how does a demilitarized zone (dmz) work. A.By preventing a private network from sending malicious traffic to external networks B.by monitoring traffic on a private network to protect it from malicious traffic. C. by interacting directly with external networks to protect. D. by interacting with a private network to ensure proper functioning of a firewall E.by monitoring traffic on external networks to prevent malicious traffic from reaching a private network

Answers

Answer:

C. by interacting directly with external networks to protect a private network.

Explanation:

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, etc.

Phishing is an attempt to obtain sensitive information such as usernames, passwords and credit card details or bank account details by disguising oneself as a trustworthy entity in an electronic communication usually over the internet.

Phishing is a type of fraudulent or social engineering attack used to lure unsuspecting individuals to click on a link that looks like that of a genuine website and then taken to a fraudulent web site which asks for personal information.

In order to prevent a cyber attack on a private network, users make use of demilitarized zone (DMZ) depending on the situation.

A demilitarized zone (DMZ) work by interacting directly with external networks to protect a private network.

which of the following is not a component of URL; a. web protocol b. name of browser c. name of web server d. name of the file with the directory​

Answers

The component of URL that is not listed correctly is b. name of browser. The components of a URL (Uniform Resource Locator) are:

a. Web protocol: specifies the protocol used to access the resource, such as HTTP or HTTPS.

b. Domain name or IP address of the web server: identifies the location of the server hosting the resource.

c. Path to the resource: specifies the location of the specific resource on the server, including the name of the file and any directories or subdirectories.

d. Query parameters (optional): additional information that is sent to the server to help retrieve or filter the resource.

The name of the browser is not a component of the URL itself, but rather a software application that is used to access the URL.

In a function that does a preorder traversal and printing of a BST, when is the root/top node's value printed out? It is skipped It is the last node printed It is the first node printed It is printed in the ascending sequence order

Answers

In a function that performs a preorder traversal and printing of a Binary Search Tree (BST), the root or top node's value is printed first.

Preorder traversal visits the root node, then recursively traverses the left subtree, and finally traverses the right subtree. Hence, when implementing a preorder traversal function, the root node's value is printed before traversing its child nodes.

Here is an example of a preorder traversal function for a BST:

python

def preorder_traversal(node):

   if node is None:

       return

   print(node.value)  # Print the value of the current node

   preorder_traversal(node.left)  # Recursively traverse the left subtree

   preorder_traversal(node.right)  # Recursively traverse the right subtree

In this function, the print(node.value) statement is responsible for printing the value of the current node, which is the root node in the initial call.

Learn more about tree traversals here:

https://brainly.com/question/28391940

#SPJ11

the _____ risk treatment strategy attempts to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards.

Answers

The protect risk control strategy also called the avoidance strategy is used to eliminate or reduce any remaining uncontrolled risk through the application of additional controls and safeguards.

Risk prevention is the only type of risk management that aims to eliminate the likelihood of a specific risk occurring and/or it's potential to affect your organization in any way.

Mitigation is a control approach that seeks to mitigate the impact of vulnerability through planning and preparation. There are three types of mitigation plans: DRP, incident response plan, and IRP.

To learn more about risk control, refer to the link:

https://brainly.com/question/21905276

#SPJ1

Which of the following best explains how bias could occur in the game?
A. Points of interest may be more densely located in cities, favoring players in urban areas over players in rural areas.
B. Some players may engage in trespassing, favoring players in urban areas over players in rural areas.
C. Weather conditions may be unpredictable, favoring players in urban areas over players in rural areas.
D. Special items may not be useful to all players, favoring players in urban areas over players in rural areas.

Answers

Answer:

I believe the answer is A

Correct me if i'm wrong but hope i helped! xoxo


what is a program answer these question
of grade-6​

Answers


a series of coded software instructions to control the operation of a computer or other machine.

11.1.2 Ball and Paddle Code HS JavaScript



Overview

Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.


Add Ball and Paddle

The first step is to add the ball to the center of the screen, and the paddle to the bottom of the screen. The dimensions of the paddle and its offset from the bottom of the screen are already constants in the starter code.


The next step is to get the paddle to move when you move the mouse. The paddle should be centered under the mouse, and should not go offscreen.


Move Paddle, Bounce Ball

The next step is to get the ball to bounce around the screen. We may have done this exact problem before…

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that Add the ball and paddle. The ball should bounce around the screen. The paddle should move with the mouse.

Writting the code:

function setupBall(){

ball = new Circle(BALL_RADIUS);

ball.setPosition(getWidth()/2, getHeight()/2);

add(ball);

}

function setupPaddle(){

paddle = new Rectangle(PADDLE_WIDTH, PADDLE_HEIGHT);

paddle.setPosition(getWidth()/2 - paddle.getWidth()/2,

 getHeight() - paddle.getHeight() - PADDLE_OFFSET);

add(paddle);

}

function getColorForRow(rowNum){

rowNum = rowNum % 8;

if(rowNum <= 1){

 return Color.red;

}else if(rowNum > 1 && rowNum <= 3){

 return Color.orange;

}else if(rowNum > 3 && rowNum <= 5){

 return Color.green;

}else{

 return Color.blue;

}

}

function drawBrick(x, y, color){

var brick = new Rectangle(BRICK_WIDTH, BRICK_HEIGHT);

brick.setPosition(x, y);

brick.setColor(color);

add(brick);

}

function drawRow(rowNum, yPos){

var xPos = BRICK_SPACING;

for(var i = 0; i < NUM_BRICKS_PER_ROW; i++){

 drawBrick(xPos, yPos, getColorForRow(rowNum));

 xPos += BRICK_WIDTH + BRICK_SPACING;

}

}

function drawBricks(){

var yPos = BRICK_TOP_OFFSET;

for(var i = 0; i < NUM_ROWS; i++){

 drawRow(i, yPos);

 yPos += BRICK_HEIGHT + BRICK_SPACING;

}

}

function setSpeeds(){

vx = Randomizer.nextInt(2, 7);

if(Randomizer.nextBoolean())

 vx = -vx;

}

function setup(){

drawBricks();

setupPaddle();

setupBall();

setSpeeds();

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

11.1.2 Ball and Paddle Code HS JavaScriptOverviewAdd the ball and paddle. The ball should bounce around

select the entire absolute phrase in the sentence. to interact with this question use tab to move through the text tokens. use space or enter to select or deselect the relevant tokens

Answers

Some examples of an absolute phrase is given below:

Weather permitting we shall meet in the evening.God willing we shall meet again.The weather being fine, we went out for a picnic.The sun having risen, we set out on our journey.It being a stormy day, we stayed inside the house.

This is because your question is incomplete as you did not include a sentence where we would have to find the absolute phrase and thus I gave you a general overview which contains some examples of an absolute phrase

What is an Absolute Phrase?

This refers to the type of phrase that contains a noun or pronoun with a participial phrase and modifies the whole sentence, unlike a participial phrase.

Hence, we can see that some examples of an absolute phrase is given below:

Weather permitting we shall meet in the evening.God willing we shall meet again.The weather being fine, we went out for a picnic.The sun having risen, we set out on our journey.It being a stormy day, we stayed inside the house.

This is because your question is incomplete as you did not include a sentence where we would have to find the absolute phrase and thus I gave you a general overview which contains some examples of an absolute phrase

Read more about absolute phrase here:

https://brainly.com/question/2182726

#SPJ1

Answer: She published her first short story, “John Redding Goes to Sea,” in the Howard University campus literary society’s magazine Stylus.

She published her first short story, John Redding Goes to Sea, in the Howard University campus literary society's magazine Stylus.

Explanation: If your looking for the answers on the quiz this is it :)

Pavel has received a score of 50/60 on a math test. What does the number 50 indicate?

the number of items he got incorrect
the number of items he got correct
the total number of items
the percentage score

Answers

Answer:

the number of items he got correct

Explanation:

a percentage is out of 100, you wouldn't put how many he got incorrect, and the number of total is the 60.

Answer:

The number of items he got correct

Explanation:

anosh needs to deploy a new web application that is publicly accessible from the internet. the web application depends on a database server to provide dynamic webpages, but he does not want to put the database server in a subnet that is publicly accessible for security reasons. which of the following devices would allow him to create a lightly protected subnet at the perimeter of the company's network that provides the ability to filer traffic moving between different networks, and is publicly accessible while still allowing the database server to remain in a private subnet?

Answers

The device that would allow him to create a lightly protected subnet at the perimeter of the company's network that provides the ability to filer traffic moving between different networks, and is publicly accessible while still allowing the database server to remain in a private subnet is option C: DMZ.

What is DMZ in the database?

A demilitarized zone (DMZ) or perimeter network, in the context of computer security, is a section of a network (or subnetwork) that lies between an internal network and an external network.

Therefore, Between the private network and the public internet, DMZs serve as a buffer zone. Two firewalls are used to deploy the DMZ subnet. Prior to reaching the servers located in the DMZ, all incoming network packets are screened using a firewall or another security appliance.

Learn more about database server from

https://brainly.com/question/23752341
#SPJ1

See full question below

Anosh needs to deploy a new web application that is publicly accessible from the Internet. The web application depends on a database server to provide dynamic webpages, but he does not want to put the database server in a subnet that is publicly accessible for security reasons. Which of the following devices would allow him to create a lightly protected subnet at the perimeter of the company's network that provides the ability to filer traffic moving between different networks, and is publicly accessible while still allowing the database server to remain in a private subnet?

a. firewall

b. switch

c. DMZ

d. SQL Server

What port on a name server is used for user datagram protocol (udp) name request packets?

Answers

The port name that is used on the server is port 53 over UDP for name resolution communications.

What is datagram protocol?

A datagram protocol is a member of the internet protocol. With this system, we can send messages and texts to the other protocol systems in applications, and other hosts on internet data protocol.

Port 53 is used for sending requests to other ports, and it is a single request service used by UDP. It requires a single UDP request from the clients.

Thus, port 53 on a name server is used for user datagram protocol.

To learn more about datagram protocol, refer to the below link:

https://brainly.com/question/27835392

#SPJ1

Suppose a computer using direct mapped cache has 2³² bytes of main memory and a cache of 1024 blocks, where each block contains 32 bytes.
a How many blocks of main memory does this computer have?
b Show the format of a memory address as seen by cache; be sure to include the field names as well as their sizes.
c Given the memory address 0x00001328, to which cache block will this address map? (Give you answer in decimal.)

Answers

In a direct-mapped cache, the cache block to which a memory address maps can be determined by extracting the index field from the memory address. The index field is used to index into the cache, and it represents the cache block number.

How can we determine which cache block a memory address maps to in a direct-mapped cache?

a) To calculate the number of blocks of main memory, we divide the total size of main memory by the block size. In this case, the total size of main memory is 2^32 bytes, and each block contains 32 bytes. Therefore, the number of blocks of main memory is 2^32 / 32 = 2^27 blocks.

b) The format of a memory address as seen by the cache includes the following fields:

  - Tag field: The size of this field depends on the number of bits required to uniquely identify each block in the cache.

  - Index field: The size of this field is determined by the number of blocks in the cache.

  - Offset field: The size of this field is determined by the block size.

c) To determine which cache block the memory address 0x00001328 maps to, we need to extract the relevant fields from the memory address.

Assuming a direct-mapped cache, the index field determines the cache block. In this case, the index size is 1024 blocks, which can be represented by 10 bits. Taking the lower 10 bits of the memory address (1328 in decimal), we find that the address maps to cache block number 1328 % 1024 = 304.

Learn more about direct-mapped cache

brainly.com/question/31086075

#SPJ11

What type of language is python?

Answers

Answer:

object-oriented programming language

Explanation:

Answer:

I think object-oriented programming language?

Explanation:

application programs called what are designed to prevent the transfer of cookies between browsers and web servers

Answers

Application programs designed to prevent the transfer of cookies between browsers and web servers are known as "cookie blockers" or "cookie managers".

What is the application programs?

Apps that prevent cookie transfer are called "cookie blockers" or "managers", giving users control over online privacy by blocking or allowing cookies per site or session. Cookie blockers intercept and block cookie requests or prompt users to allow or deny them.

Some also let users view and manage stored cookies by deleting individual ones or clearing all from a site. There are popular cookie blockers for web browsers like Chrome, Firefox, etc.

Learn more about application programs from

https://brainly.com/question/28224061

#SPJ4

virtual conections with science and technology. Explain , what are being revealed and what are being concealed​

Answers

Some people believe that there is a spiritual connection between science and technology. They believe that science is a way of understanding the natural world, and that technology is a way of using that knowledge to improve the human condition. Others believe that science and technology are two separate disciplines, and that there is no spiritual connection between them.

What is technology?
Technology is the use of knowledge in a specific, repeatable manner to achieve useful aims. The outcome of such an effort may also be referred to as technology. Technology is widely used in daily life, as well as in the fields of science, industry, communication, and transportation. Society has changed as a result of numerous technological advances. The earliest known technology is indeed the stone tool, which was employed in the prehistoric past. This was followed by the use of fire, which helped fuel the Ice Age development of language and the expansion of the human brain. The Bronze Age wheel's development paved the way for longer journeys and the development of more sophisticated devices.

To learn more about technology
https://brainly.com/question/25110079
#SPJ13

a computer has power, but there are no beeps and the computer does not boot. which of the following would be the MOST LIKELY cause?

a. no operating system installed
b. CPU failure
c. outdated bios
d. hard drive failure
HELP!!

Answers

Answer:

CPU failure

Explanation:

CPU is what runs the computer which if the CPU is broken the computer will not start

A computer has power, but there are no beeps and the computer does not boot. The most likely cause is CPU failure. Thus the correct option is B.

What is Computer?

A computer is an electronic device used to perform arithmetic and logical operations within seconds accurately without causing any error and make ease people's life.

A CPU is referred to as the central processing unit of a computer which plays a significant role in its functions and operations. It helps to convert the data by processing it into output for humans.

When the computer has power but there is no beep its means that there is a problem in the power supply unit which reflects a disruption in the power supply and causes the failure of the CPU.

Therefore, option B  CPU failure is appropriate.

Learn more about CPU, here:

https://brainly.com/question/16254036

#SPJ6

which type of cloud computing service emphasizes the ability for clients to access and use hosted software packages such as 's g suite?

Answers

A cloud provider uses the software as a service (SaaS) model of software delivery to host programs and make them available to consumers through the internet.

What exactly does SaaS mean?

Software as a service, or SaaS, is a method of delivering applications via the Internet. By simply using the Internet to access hardware and software rather than installing and maintaining it, you may escape the burden of controlling it.

What is meant by cloud computing?

In order to provide quicker innovation, adaptable resources, and scale economies, cloud computing, in its simplest form, is the supply of computing services via the Internet ("the cloud"), encompassing servers, storage, databases, networking, software, analytics, and intelligence.

To know more about SAAS visit;

brainly.com/question/11973901

#SPJ4

Complete the Car class by creating an attribute purchase_price (type int) and the method print_info that outputs the car's information. Ex: If the input is:
2011
18000
2018
​where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs: Car's information: Model year: 2011 Purchase price: $18000
Current value: $5770
Note: print_infol should use two spaces for indentation. LAB: Car value (classes) \\ ACTIVITY & \end{tabular} main.py Load default template... 1 class Car: 2. def__init__(self): 3. self.model year=0
4. self. purchase_price=0
5. self.current_value=0
6
7. def calc_current_value(self, current_year): 8. self.current_value=round(self.purchase_price∗(1−0.15)∗∗(current_year - self.model_year)) 9. 10. def print_info(self): 11. print("(ar's information:") 12. print(" Model year:", self.model_year) 13. print(" Purchase price: \$", self.purchase_price) 14. print(" Current value: \$", self.current_value)

Answers

Answer:

class Car:

def __init__(self):

self.model_year = 0

self.purchase_price = 0

self.current_value = 0

def calc_current_value(self, current_year):

self.current_value = round(self.purchase_price * (1 - 0.15) ** (current_year - self.model_year))

def print_info(self):

print("Car's information:")

print(" Model year:", self.model_year)

print(" Purchase price: ${:,}".format(self.purchase_price))

print(" Current value: ${:,}".format(self.current_value))

Explanation:

The purchase_price attribute has been added to the init() method and that the print_info() method now formats the purchase price and current value with commas using the format() function.

Which of these protections covers creative works such as books and artwork?
Choose the answer.

A. trademark

B.registered trademark

C.patent

D.copyright

Answers

The answer is D copyright

How to convert binary to decimal
Please it’s so hard and what is digital and analogue

Answers

Answer:

How to convert binary to decimal ?

It consists of digits from 0 to 9. Binary to decimal conversion can be done in the simplest way by adding the products of each binary digit with its weight (which is of the form - binary digit × 2 raised to a power of the position of the digit) starting from the right-most digit which has a weight of 20.

what is digital and analogue?

In analog technology, a wave is recorded or used in its original form. So, for example, in an analog tape recorder, a signal is taken straight from the microphone and laid onto tape.In digital technology, the analog wave is sampled at some interval, and then turned into numbers that are stored in the digital device.

To compile, debug and execute a program written in java, _______________ is required.

Answers

To compile, debug, and execute a program written in Java, a Java Development Kit (JDK) is required.

The Java Development Kit (JDK) is a software development environment that includes the necessary tools to compile, debug, and execute Java programs. It is an essential component for Java programming and provides a set of tools and libraries that enable developers to create, test, and deploy Java applications. The JDK includes the Java compiler, which translates human-readable Java code into bytecode that can be understood and executed by the Java Virtual Machine (JVM). It also provides debugging tools that help developers identify and fix issues in their code during the development process. Furthermore, the JDK includes the Java Runtime Environment (JRE), which is needed to execute Java applications on a computer. The JRE contains the JVM, necessary libraries, and other components required to run Java programs.  to compile, debug, and execute a program written in Java, you need to have the Java Development Kit (JDK) installed. The JDK provides the necessary tools, including the compiler and debugging utilities, to develop and run Java applications.

Learn more about  (JDK) here:

https://brainly.com/question/15147803

#SPJ11

each browser has its own ______ style sheet that specifies the appearance of different html elements.

Answers

Each browser has its own default style sheet that specifies the appearance of different HTML elements.

The default style sheet, also known as the user agent style sheet, is a built-in set of CSS rules that define how different HTML elements should be displayed by default. When a web page is loaded, the browser applies its default style sheet to the document, and then any additional style sheets included in the page are applied on top of it.

The user agent style sheet is created by the browser developer and is specific to that browser. As a result, different browsers may have slightly different default styles for the same HTML elements. This can cause inconsistencies in the appearance of web pages across different browsers and platforms.

To ensure consistency and control over the appearance of web pages, web developers often use their own custom style sheets, known as author style sheets, to override or supplement the default styles provided by the browser.

To learn more about HTML elements, visit:

https://brainly.com/question/11569274

#SPJ11

Is this statement true or false? While in slide show mode, a click and drag is no different than a click. True false.

Answers

In slide show mode, it should be noted that a click and drag is the same as a click. Therefore, the statement is true.

It should be noted that slide show mode typically occupies the full computer screen. One can see how the graphics and animations will look during the actual presentation.

Rather than waiting and clicking, one can make the PowerPoint files open directly in the slide show mode. Therefore, it's not different from clicking.

Learn more about slideshow on:

https://brainly.com/question/25327617

Answer:

"True"

Explanation:

I took the test!

True or false: The Nickelodeon the first movie theater to become successful showing only films opened in Pittsburgh in 1915

Answers

Answer:

ture

Explanation:

Answer:

TRUE I THINK....................

Explanation:

Other Questions
question 6 a data analyst sorts a spreadsheet range between cells f19 and g82. they sort in ascending order by the second column, column g. what is the syntax they are using? Triangle X has m2A = 30, mZB = 90, and m2C = 60 with side lengths of AB = 3, BC = 4, AC = 5.Triangle Y has m2A = 30, mZB = 90, and mZC = 60' with side lengths of AB = 9, BC = 12, AC = 15.Which statement best describes the relationship between these two triangles?O They are similar triangles.O They are similar and congruent triangles.O They are congruent triangles.O They are congruent but not similar triangles. someone help please! AABC and ADEF are similar. Find the missing side length.(The triangles are not drawn to scale.) Essay on visit to a cinema Write a compound inequality that represents the following phrase. Graph the solutions. all real numbers that are between -3 and 7 Although most American Indian tribes failed to capitalize on their potential wealth during the oil boom, one tribe, thereserved their land's mineral rights, earning the tribe millions.A. SeminoleBCD. ChickasawCreekOsage In data modeling, a(n) ________ is something that the users want to store data about.A. foreign keyB. primary keyC. attributeD. relationshipE. entity suppose that there are no storage costs for crude oil and the interest rate for borrowing or lending is 5% per annum. how could you make money if the june and december futures contracts for a particular year trade at $80 and $86? group of answer choices short one june oil contract and long one december contract short one june oil contract long one december oil contract long one june oil contract long one june oil contract and short one december contract short one december oil contract Which of the following conditions will activate the pyruvate dehydrogenase (PDH) kinase, which catalyzes the phosphorylation and inactivation of the PDH complex? A. Elevated concentrations of NADH and ATP B. Elevated concentrations of NAD+ and ADP C. Elevated concentrations of acetyl CoA A and C B and C You want to buy some songs and you have a specific budget. A new song costs $0.99 and a classical song costs $0.65. Which expression would represent the total you would spend on buying these types of songs?1.64N1.640.99N + 0.65CN + C Work out the area of ABCD.D5544%10 cmFeedback38%BGive your answer to 1 decimal place.Optional working+Answer cm Iron (III) nitrate (Fe(NO3)3) solution reacts with sodium hydroxide (NaOH) solution to form abrown precipitate of iron (III) hydroxide (Fe(OH)3). Sodium nitrate (NaNO3) remains in solution asit is a soluble compound.Write the word equation and the balanced formula equation for this reaction. In the following circle, mBOC=120. Find PBC. b) Can you conclude that the machine is calibrated to provide a mean fill weight of 12 oz? Explain. Check all that are true.A. Yes. We can conclude that the null hypothesis is true.B. No. We cannot conclude that the null hypothesis is true.C. The alternate hypothesis is plausible.D. The alternate hypothesis is false. HELPPPPP AGAINNN UGH THIS IS HARD What do you mean by GDP explain any two methods of calculating GDP? I need help Im being timed Find mMQN. help me on this one. Katherine JohnsonRefer to your Expeditions in Reading book and You Should Meet Katherine Johnson for complete versions of ttexts.Ming Lee is giving a presentation based on "Katherine Johnson Biography."She wants to answer the question, What else does Katherine do to help the United States take the lead over tSoviet Union in space exploration?What information from You Should Meet Katherine Johnson best helps to answer this question?Katherine receives a flag that has been to the moon in honor of her work on the U.S. space program.O Katherine computes the path for the Apollo 11 mission to take the first man to the moon and backShe is part of a team of African American women hired to work on flight research projects for NACA. She works on the project that develops the first man-made satellite to completely orbit the earth.