Assume planets is an ArrayList of Strings and it currently contains several elements. Also assume a String variable named first has been declared. Write a statement that will assign the first element of the ArrayList to the first variable.

Answers

Answer 1

Using the knowledge in computational language in JAVA it is possible to write a code that Assume planets is an ArrayList of Strings and it currently contains several elements.

Writting the code:

ArrayList<Integer> intList=new ArrayList<Integer>();

   intList.add(1);

   intList.add(2);

ArrayList<String> strList=new ArrayList<String>();

   strList.add("Terra");

   strList.add("Marte");

   strList.add("Venus");

See more about JAVA at brainly.com/question/12975450

#SPJ1

Assume Planets Is An ArrayList Of Strings And It Currently Contains Several Elements. Also Assume A String

Related Questions

Drivers are concerned with the mileage their automobiles get. One driver has kept track of several tankfuls of gasoline by recording the miles driven and gallons used for each tankful. Develop a C# application that will input the miles driven and gallons used for each tankful. The application should calculate and display the miles per gallon obtained for each tankful and display the total combined miles per gallon obtained for all tankfuls up to this point. Additionally, the application should categorize and display the consumption rate of gasoline as follows: Low, if the total miles per gallon is greater than 30. • Normal, if the total miles per gallon is between 20 and 30. High, if the total miles per gallon is less than 20. All averaging calculations should produce floating-point results. Display the results rounded to the nearest hundredth. c# program ​

Answers

To solve this problem with the help of C++ programing language, you must know concepts like variables, data type, if-else and while loop.

Step-by-step coding for the problem:

using System;

namespace GasOfMiles

{

   public class Gas

   {

       static void Main(string[] args)

       {

           int miles; // miles for one tankful

           int gallons; // gallons for one tankful

           int totalMiles = 0; // total miles for trip

           int totalGallons = 0; // total gallons for trip

           double milesPerGallon; // miles per gallon for tankful

           double totalMilesPerGallon; // miles per gallon for trip

           // prompt user for miles and obtain the input from user

          Console.Write("Enter miles (-1 to quit): ");

           miles = Convert.ToInt32(Console.ReadLine());

           // exit if the input is -1 otherwise, proceed with the program

           while (miles != -1)

           {

               // prompt user for gallons and obtain the input from user

               Console.Write("Enter gallons: ");

               gallons = Convert.ToInt32(Console.ReadLine());

               // add gallons and miles for this tank to totals

               totalMiles += miles;

               totalGallons += gallons;

               // calculate miles per gallon for the current tank

               if (gallons != 0)

               {

                   milesPerGallon = (double)miles / gallons;

                   Console.WriteLine("MPG this tankful: {0:F}",

                      milesPerGallon);

               } // end if statement

               if (totalGallons != 0)

               {

                   // calculate miles per gallon for the total trip

                   totalMilesPerGallon = (double)totalMiles / totalGallons;

                   Console.WriteLine("Total MPG: {0:F}\n", totalMilesPerGallon);

               } // end if statement

               // prompt user for new value for miles

               Console.Write("Enter miles (-1 to quit): ");

               miles = Convert.ToInt32(Console.ReadLine());

           } // end while loop  

           Console.ReadKey();

       }

   }

}

To learn more about C++ Programming, visit: https://brainly.com/question/13441075

#SPJ9

Which of the following is something computer scientist would do ​

Answers

Computer scientists use technology to solve problems and prepare for the future. They also write and program software to create applications. Their primary focus, however, is to validate and develop models for interaction between people and computers or software and devices

Could so please help me

Answers

Answer: For?

Explanation:

what do you need help with?

Guys I should write the program in C++
Can u help me?


Write a program which reads numbers from keyboard in a loop and checks if the given number is even.
The program ends when a negative number is input.​

Answers

#include <iostream>

int main(int argc, char const* argv[]) {

   while(1) {

       std::cout << ">> "; int x; std::cin>>x;

       if(x<0) break;

       else if(x%2==0) {std::cout << "\nThis is even number.\n";}

       else std::cout << "\nThis is odd number.\n";

   }

   return 0;

}

list all the software apps on your cell phone write their uses and how it helps you as a student

1-5 please i need answers rn ASAP​

Answers

Check out the image below. The text contained a link, so it is in jpeg format.

Write a java program that prints the following sequences (in the given order) using a while loop. The numbers in the sequences can be printed on a single line or on separate lines.
a) 2, 3, 4, ... , 14, 15
b) -10, -9, -8, ... , 9, 10
c) 100, 99, 98 ... , 91, 90
d) 40, 37, 34, ... , 25, 22

Answers

Answer:

class Main {

 static void sequence(int n, int end, int step) {

   for(;step>0 ? n<=end : n>=end; n += step) {

     System.out.printf("%d",n);

     if (n != end) System.out.printf(", ");

   }

   System.out.println();

 }

 

 public static void main(String[] args) {

   sequence(2, 15, 1);

   sequence(-10, 10, 1);

   sequence(100, 90, -1);

   sequence(40, 22, -3);

 }

}

Explanation:

Here is my solution again after being removed previously.

Things conputers can’t do human can do

Answers

Explanation:

A computer cannot “think in the whole”. A computer cannot put itself in the place of a person. A computer cannot be sensitive and understanding. It can only “understand” binary encoded input.It can not do the process of reproduction xD

For the following C statement, write the corresponding RISC-V assembly code. Assume that the variables i, and j are assigned to registers x28, and x29, respectively. Assume that the base address of the arrays A and B are in registers x20 and x21, respectively.

Answers

The corresponding RISC-V assembly code for the statement will be:

x5 = f

x6 = g

x7 = h

x28 = i

x29 = j

x10 = Base address of array A

x11 = Base address of array B

add x30, x28, x29 //x30 = i+j

slli x30, x30, 3 //x30 = 8*(i+j)

add x30, x30, x10 //x30 = address of A[i+j]

ld x30, 0(x30) //x30 = A[i+j]

sd x30, 80(x11) //B[10] = A[i+j]

What is a C statement?

Tokens, expressions, and other statements make up C statements. The "body" of the enclosing statement is a statement that is a component of another statement.

Statements make up the bodies of C functions (including the main function). These can be either simple statements that contain no other statements or compound statements that contain other statements. Control structures are compound statements that control how or whether their component statements are executed, such as if/then/else, while, for, and do...while.

In this case, the corresponding RISC-V assembly code is Illustrated above.

Learn more about computer on:

https://brainly.com/question/27564431

#SPJ1

Write a program that inputs numbers and keeps a running sum. When the sum is greater than 200, output the sum as well as the count of how many numbers were entered.

Sample Run
Enter a number: 50
Enter a number: 11
Enter a number: 66
Enter a number: 23
Enter a number: 53

Sum: 203
Numbers Entered: 5
Hint: If you get an EOF error while running the code you've written, this error likely means you're asking for too many inputs from the user.

Answers

Using the knowledge in computational language in python it is possible to write a code that  inputs numbers and keeps a running sum.

Writting the code:

totalsum=0

count=0

while(totalsum<=200):

  num=int(input("Enter a number: "))

  totalsum=totalsum+num

  count=count+1

print("Sum:",totalsum)

print("Numbers Entered:",count)

See more about python at brainly.com/question/12975450

#SPJ1

Write python code to darken an image.

Answers

A code to implement darken and reduces all three color values is given below:

The Program

<!DOCTYPE html>

<html>

<head>

<link rel="stylesheet"

 type="text/css" href="style.css" />

</head>

<body>

<h1 style="color:green;">

 GeeksforGeeks

</h1>

<h3>Less.js Color Operation darken() Function</h3>

<div class="box">

 <div class="container1">

  <p class="text">

   Base Color<br>hsl(60, 50%, 52%)

  </p>

 </div>

 <div class="container2">

  <p class="text">

   Darkened Color<br>hsl(60, 50%, 32%)

  </p>

 </div>

</div>

</body>

</html>

The complete code is attached as a txt file below.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Question #4
Fill in the Blank
Fill in the blank to complete the sentence.
the users site.
is used to store and process data



over the Internet using computers that are not located at
The users site.

Answers

Answer:

cloud computing

Explanation:

Processing devices are the components responsible for the processing of information within the computer system. This includes devices such as the CPU, memory and motherboard. Storage devices are components which allow data to be stored within a computer system.

What is the purpose for the Information systems?

Answers

to have user get, store and distribute data out

hope this helps this

A typical executive information system (EIS) offers which of the following capabilities?

Answers

A capability which a typical executive information system (EIS) offers include the following: b. slice-and-dice.

What is an information system?

An information system (IS) can be defined as a collection of computer systems and Human Resources (HR) that is used by a business organization (firm or company) or manager to obtain, store, compute, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products from one location to another.

Generally speaking, there are three (3) main kinds of information system (IS) that allow information to be accessed and shared internally among employees;

Executive Information System (EIS)Corporate PortalIntranet

In conclusion, drill-down, consolidation, and slice-and-dice are the three most common and typical capabilities that are being offered in an executive information system (EIS), in order to view information in a business firm from different perspectives.

Read more on information system here: brainly.com/question/24944623

#SPJ1

Complete Question:

A typical executive information system (EIS) offers which of the following capabilities? O a. video conferencing O b. slice-and-dice O c. collaboration d. messaging

Communication control devices play a very important role in computer networks. For example, a _____ provides access to the internet through an internet service provider.

router
client
modern

Answers

Answer:

Hello i think it is client

good luck<3!

Which of the following PC twos record data fastest

Answers

Answer:

Explanation:I believe none are good at all go out and play

conditional_snakes.py - snake_input = int

Answers

Following is the code for conditional snakes:

input = int(input(" Count the number of snakes>"))

if input == 0:

print("There are no snakes !")

elif input == 1:

print("There is  [input] snake and it is fine")

elif input > 1:

print("There are [input] snakes! RUN!")

else:

print ("Snakes cant be negative enter 0 or positive number of snakes")

What is a conditional statement?

A conditional statement is used in your program to deal with conditions, as its name suggests. In making decisions based on the circumstances it encounters, the program is guided by these statements. You should be familiar with Python's three main conditional statements: statement if, else, else if

Hence above program is the conditional snake program in python

To know more about conditional statements follow this link

https://brainly.com/question/27021213

#SPJ1

External hackers have some access to a company's website and made some changes. Customers have submitted multiple complaints via email for wrong orders and inappropriate images on the website. The Chief Information Officer (CIO) is now worried about the distribution of malware. The company should prepare for which of the following other issues or concerns?

Answers

Answer:

-Domain reputation

-URL redirections

Explanation:

Activity 1
the visual basic program to sort the following strings for array named "Place"
(Pacific, Atlantic, Indian, Black, Red, North, Caspian, Caribbean

Answers

Visual basic program to sort the following strings for array:

Public Class Form1
   Private Sub Button1_Click(sender As Object, e As EventArgs) Handles
Button1.Click
       Dim Place() As String = {"Pacific", "Atlantic", "Indian",

What is array?
An array is a significant subject that falls within the umbrella of computer science. Additionally, you must thoroughly examine each angle of the array while preparing for a competitive exam like the GATE. All of the subjects pertinent to the array have been covered in this article. We hope the CSE topic notes will assist your understanding of this subject. An array is a collection of identical elements or data items stored at adjacent memory locations. In plain English, we can say that arrays are typically used in computer programming to organise the same kind of data.

To learn more about array
https://brainly.com/question/24275089
#SPJ1

If you position the key next to the subject so it shines from the side what type of effect will you create

Answers

Answer:

side lighting because it will reflect light to the side of the subject

which of the following can be considered both a secondary source and tertiary
source

Answers

The option that can be considered both a secondary source and tertiary source is option D: dictionaries.

Are secondary and tertiary similar?

The term secondary  source' is another term for secondary  information. Any information that takes place after secondary  source is referred to as tertiary source.

Therefore, Note that Secondary sources explain, interpret, or analyze data from primary sources (often primary sources). Numerous books, textbooks, and academic review articles are examples of secondary sources. Secondary sources are compiled and largely summarized in tertiary sources.

Learn more about secondary source from

https://brainly.com/question/896456

#SPJ1

Letters,

diaries,

artifacts,

dictionaries

Why do you think so many companies continue to invest in new analytics tools without implementing governance programs that ensure data consistency?

Answers

Answer:This is a weird

quision because the world is not bobo

Explanation:

an object's _____ are the tasks or functions that the object performs when it receives a command to do so.

Answers

Answer:

an object's methods are the tasks or functions that the object performs when it receives a command to do so

Answer: C. Methods

Explanation:

You work for a university and your colleague Mikhail sent you a spreadsheet with student information on it. It has the total number of credit hours they are taking, how many years they’ve been at the school, their email addresses, and their student ID number. In hidden columns it has their social security number and names; Mikhail says this is so no one reading the document can know which name goes with which information. Mikhail is planning on sharing the document with several people in and outside of your department and believes he has taken proper steps to secure students’ private information and keep them anonymous. Do you agree? What mistakes has Mikhail made, or what could he do to be more conscientious about sensitive information?

Answers

I do not agree with Mikhail plan on sharing the document with several people in and outside of your department and believes he has taken proper steps to secure students’ private information and keep them anonymous.

The mistakes that Mikhail made is not removing those information before sharing it and the thing that he can do is to lock that folder from been access by anyone.

What exactly does data security mean?

Data security is the process of guarding digital data against unauthorized access, corruption, and theft throughout all stages of its life.

Note that Data security refers to safeguarding digital information, such as that contained in a database, against obnoxious users and destructive forces, such as cyberattacks and data breaches.

Therefore, for safety, Place all sensitive data in a safe location. Never leave it unattended on your desk or anywhere that unauthorized people could easily access it. The best place for it to be kept is in a locked file cabinet or drawer. All confidential information may be requested back, or the owner may choose to have it destroyed.

Learn more about data security from

https://brainly.com/question/25720881
#SPJ1

Write a C++ program, which ask user for date of birth, and generate horoscope
(Zodiac) of that date of birth, using Nested If-else statement, also ask user for another
entry using do-while loop.

Answers

You can check in photo.

If you live in the center of a plate, it's unlikely that you'll ever experience the wonder of plate tectonics True or False??

Answers

Answer: False  

Explanation:Just guessed

Answer:

Explanation:

false  

Earthquakes can occur along faults far from the edges of plates. Although these earthquakes are much less common, they are due to the same forces that cause earthquakes along plate boundaries.

make a list different information system which is people can in
teract with every day

Answers

A list of different information system which people can interact with every day are:

LaptopsDatabasesNetworksSmartphones

Why is information technology so crucial to our daily lives?

Information systems store data in an advanced manner that greatly simplifies the process of retrieving the data. A business's decision-making process is aided by information systems. Delivering all the crucial information through an information system makes it simpler to make better judgments.

Note that examples of information systems that are powered by computers are:

Social media: WeChat, Face book, and LinkedInQ&A website: QuoraAtrium (University of Montreal) and Iris are cataloged in libraries (BAnQ)E-commerce platforms like Amazon and eBay

Learn more about information system  from

https://brainly.com/question/14688347
#SPJ1

For each step in the assignment, make changes to this spreadsheet as described in each step.
1. In the cell below, write three operators and the type of calculation each represents:
2. In the cell below, write the symbol a formula starts with:
3. In cell D16, write the formula =10+5 and hit Enter.
4. In cell D19, write a formula that contains the difference between cells D18 and E18.
5. In cell D22, change the order of operations for the formula so that 3-4 is calculated first.
6. In cell D25, insert an image of any animal.
7. In the cell below, write two ways to open the Save As dialog box to save a brand-new file:
8. In the cell below, write the keyboard shortcut for copying text:
9. In the cell below, write what happens to the pointer to indicate you can drag data:
10. In the cell below, write what key to hold when dragging data in order to copy it:
40 11. Move the data from cells D40:G40 to cells D41:G41.
12. In the cell below, write the number of items that can be stored on the Office Clipboard:

Answers

The answer of the following spreadsheet will be:

1. Plus, minus, equals

2. =

3. D16 now says "10+5"

4. D19 now says "=D18-E18"

5. D22 now says "=3-4+5"

6. An image of a dog was inserted

7. Click on "File" in the top left corner and then click "Save As" OR press "Ctrl+Shift+S"

8. "Ctrl+C"

9. The pointer turns into a plus sign

10. "Ctrl"

11. The data from D40:G40 is now in D41:G41

12. You can store up to 24 items on the Office Clipboard

What is spreadsheet?

A spreadsheet is a computer programme that allows you to compute, organise, analyse, and store data in tabular form. Spreadsheets were created as electronic counterparts to paper accounting spreadsheets. The software runs on data entered into table cells. Each cell can include numeric or text data, as well as the results of formulas that calculate and display a value dependent on the contents of other cells. One such electronic document may also be referred to as a spreadsheet.

To learn more about spreadsheet
https://brainly.com/question/26919847

#SPJ1

What feature would you use to enhance a text box? Shape Styles, Adjust slide layout, Insert new format, or Add-ons?​

Answers

Answer:

I believe add-ons are used for that

Explanation:

Consider a logic function with three inputs A,B, and C, and three outputs D, E, and F. The function is defined as follows:
D is TRUE if at least one input is TRUE, E is TRUE if exactly two inputs are TRUE, and F is TRUE only if all three inputs are TRUE. Design the logic circuit for the function.

Answers

The truth table will contain 2^3 = 8 entries. The image of truth table is attached below. The function will be defined on D is TRUE if at least one input is TRUE, E is TRUE if exactly two inputs are TRUE, and F is TRUE only if all three inputs are TRUE.

What is a Logic Circuit?

Computers frequently chain logic gates together by using the output of one gate as the input to another. That is referred to as a logic circuit.

Circuits allow computers to perform more complex operations than they could with a single gate.

A chain of two logic gates is the smallest circuit.

What is a Logic gate?

Logic gates are the fundamental components of any digital system. It is an electronic circuit with one or more inputs and one output. A logic governs the relationship between the input and the output. Based on this, logic gates are labeled as AND gates, OR gates, NOT gates, and so on.

To learn more about Logic Circuit, visit: https://brainly.com/question/26661878

#SPJ9

If a user's computer becomes infected with malware and used as part of a botnet, which of the following actions can be initiated by the attacker? (Select all that apply.)

Answers

If a user's computer becomes infected with malware and used as part of a botnet, which of the following actions can be initiated by the attacker is option A: have up to date backups of the encrypted files

What exactly does data backup mean?

Malware is any software that has been specifically created to disrupt a computer, server, client, or computer network, leak sensitive data, provide unauthorized users access to data or systems, deny users access to information, or inadvertently compromise a user's computer security and privacy.

Note that To secure data in the event of a catastrophe, accident, or malicious act, data backup is the process of copying it from a primary place to a secondary site. Modern enterprises rely heavily on data, and data loss can seriously harm and disrupt operations.

Learn more about malware from

https://brainly.com/question/399317
#SPJ1

See full question below

If a user's computer becomes infected with malware and used as part of a botnet, which of the following actions can be initiated by the attacker? (Select all that apply.)

have up to date backups of the encrypted files

use a keyboard that encrypts key strokes

a logic bomb

Other Questions
A student used the equation below to create a table.y = 2.50xThe student used 15 as one of the values for the x. Which ordered pair could be taken from the table?O a 17.50, 15)Ob (15, 17.50)Oc 37.50, 15)Od (15,37.50) Discuss how and where the adding of variance concept is being used in the anova technique, and then discuss what is being described by the mean squares being calculated. Hannah wanted to check her solution of b=-3 for the equation 9/7 (1+b)-6/7b 1=1 . Substituting b for -3, she writes the following: A. 9/7(1+(-3))-6/7b+1=1 B. 9(1+(-3))-6(-3)-7=7 C. 9(1+(-3))+18+7=7 D. 6-18+7=7 E. -12+7=7 -5=7F. -5=7In which line did Hannah make a mistake? Choose one. x 3 = y; use x = 3, and y = 1 The population of a specific species of nocturnal mammal is decreasing at a rate of 3.5%/year. The graph models the number of mammals x years after they were originally counted.Identify and interpret the key features of the exponential function modeled in terms of this situation.Select each correct answer.The y-intercept represents the number of mammals when they were originally counted.The line y = 0 is an asymptote of the graph.The y-intercept.is 75.The y-intercept is 120.The asymptote indicates that the number of mammals counted when the study began was 120.The asymptote indicates that as years pass, the number of mammals will approach 0.The line x = 0 is an asymptote of the graph. the nurse is assessing a client who has been admitted to the acute care facility. the client experiences an acute onset of altered level of consciousness and recent memory loss. what does the nurse anticipate the client will be evaluated for? CAN SOMEONE HELP AS SOON AS POSSIBLE a client taking lithium therapy has a serum therapeutic level of 0.8 meq/l. what priority dietary instruction should the nurse include in the teaching plan? Due to the financial crisis of 20072008, many new laws were passed that added more layers of oversight and regulation to the banking industry. Smaller community banks have become concerned with the newly imposed regulations by the federal regulators on their bank. What is the best action the bank could take to alleviate this situation?Apply for a charter conversion from a federally-chartered bank to a credit union.Refuse to implement recommended changes made by the regulators.Apply for a charter conversion from a state-chartered bank to a federally-chartered bank.Do nothing; unfortunately, a bank has no recourse when it comes to regulations. Determine which statements are the converse, inverse, and contrapositive of the following statement.If it is after midnight, Anissa is sleeping.All rights reserIf Anissa is sleeping, it is not after midnight.If Anissa is sleeping, it is after midnight.If it is not after midnight, Anissa is sleeping.If it is not after midnight, Anissa is not sleeping.If Anissa is not sleeping, it is not after midnight.ConverseContrapositiveInverca The graph of the function, f(x) = x2 - 5x - 7 opens and has a value. Silver tarnishes as silver metal reacts with hydrogen sulfide, h2s, in the air. in this reaction, dark silver sulfide, au2s, covers the surface of silver. when silver is polished, this coating of silver sulfide can be removed from the surface. this makes the silver shiny again. enter the coefficients that balance the tarnishing reaction equation. (type 1 for no coefficient.) 2 silver dishes. photo by mgeurts ag(s) h2s(g) ag2s(s) h2(g) According to the npa sections 301. 401 - 301. 410, all of the following are required to report a nurse to the board if the nurse engages in conduct subject to reporting except. the three important ideas mendel postulated concerning the transmission of traits from parents to offspring include: What is the role of epinephrine in cell signaling? why did the house of representatives vote to impeach president johnson and why wasn't he convicted 6. Erin leaves home at 11am. She cycles at a speed of 16 miles per hour for 90 minutes. Shestops for half an hour. Erin then cycles home and arrives at 3pm.(a) Draw a distance-time graph to show Erin's journey.(b) What is Erin's average speed on the return part of her cycle? using the fixed-time period inventory model, and given an average daily demand of 200 units, 4 days between inventory reviews, 5 days for lead time, 120 units of inventory on hand, a z of 1.96, and a standard deviation of demand over the review and lead time of 3 units, which of the following is the order quantity? Jessie uses 20 liters of gasoline to travel 200 kilometers, how many liters of gasoline will he use on a trip of 700 kilometers?. Q011) The National Defense Education Act, which for the first time offered direct federal funding for higher education, was passed into law by Congress in 1957 in response to(a) inner-city riots, and the rise of feminist activist endeavors across the Midwest.(b) the French defeat by Vietnamese forces at Dien Bien Phu.(c) Soviet Premier Nikita Khrushchev's visit to the United States.(d) the Soviet launch of the first artificial Earth satellite, Sputnik.