A programmer notices the following two procedures in a library. The procedures do similar, but not identical,things.Procedure square (n) returns the value n2Procedure cube (n) returns the value n3Which of the following procedures is a generalization of the procedures described above?A. Procedure Add (n, m), which returns the value n + mB. Procedure Fourth (n), which returns the value n4C. Procedure Polynomial(n), which returns the value n3 +n2D. Procedure Power (n, m), which returns the value nm

Answers

Answer 1

Answer:

Option B) Procedure Fourth (n), which returns the value n4

Explanation:

it the only one that makes sense because procedure 1, 2, and 3 return values n1, n2, and n3, it makes sense that the fourth procedure would return a value of n4.


Related Questions

Toggling the caps lock key on and off for capital letters is EASIER than holding and releasing the shift key
True
False

Answers

True is the answer to your question my friend

Which pdu is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model?.

Answers

The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment.

What is this PDU about?

Note that in the transport layer, a host computer is said to often de-encapsulate  what we call a segment so that they can be able to put back data to an acceptable or given format through the use of the application layer protocol that belongs to the TCP/IP model.

Therefore, The PDU that is processed when a host computer is de-encapsulating a message at the transport layer of the tcp/ip model is segment as it is the right thing to do.

Learn more about host computer from

https://brainly.com/question/553980

What’s unique about New Cashierless stores?

Answers

There’s no cashiers, meaning if you need help you got to figure it out alone.

Can yall help me pls

Answers

Answer:

A.cc the answer

Explanation:

if I wrong Im sorry

Discussion Topic
Think of a situation in the not-too-distant future in which an autonomous robot, for example a factory manufacturing robot or a self-driving car, through some unfortunate coincidental combination of circumstances accidentally causes a human serious injury or even death. In a case such as this, who should be held responsible for the crime and damages? Can the developer or team of developers who wrote the code justifiably be held responsible? Is it simply considered a mechanical malfunction and nobody is held responsible, but the machine is destroyed?

Answers

I believe that the developer or team of developers who wrote the code should not be held responsible but the company that gave a go ahead for it use should be the one held accountable.

What is autonomous driving technology?

A self-driving car is known to be called an autonomous car or simply say a driverless car as it is known to be a  vehicle that uses both sensors, cameras, and artificial intelligence (AI) in its operations.

Note that in the above scenario,  I believe that the developer or team of developers who wrote the code should not be held responsible but the company that gave a go ahead for it use should be the one held accountable.

Learn more about developer from

https://brainly.com/question/11352260

#SPJ1

True or False? The background color block should be inserted after all the images are added.
True
O False

Answers

False because it would be better for the background

The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network is known as

Answers

Answer:

out-of-band management

Explanation:

The management option that can provide on-site infrastructure access when the network is down or complete remote access in cases of connectivity failures on the network, such as via a cellular signal, is known as?

✓ out-of-band management

The open-ended activity requires you to develop a program on a topic that interests you. Requirements Formulate a question you would like to answer. Identify a data set that will help determine the answer to your question. Create a class to model one entry of the identified data set. Write a program with a main method to read the data from the identified data set into your program. Utilize an array or ArrayList and the created class to store data that has been read. Write code to process the data and determine an answer to the identified question. Review the provided scoring guidelines so that you understand what you will be expected to explain once you are done completing your program. Tip: When traversing multiple data structures simultaneously, structures might not be the same size and loop bounds must be adjusted to make sure that only locations that are valid in all structures are accessed

Answers

Answer:

Create, and submit a novel Java program (individually or with one; Question: This open-ended activity requires you to develop a program on a topic that interests you

Explanation:

Create, and submit a novel Java program (individually or with one; Question: This open-ended activity requires you to develop a program on a topic that interests you

What technology has seen the largest increase in venture funding for products and services related to well-being and care delivery?.

Answers

The technology has seen the largest increase in venture funding for products and services related to well-being and care delivery is Tech startups.

Why do venture capitalists invest in the use of technology?

Venture capital funds are known to be firms or people that are said to often invest in things or tech that can bring a lot of  substantial returns on any of their invested capital.

Due to the above, Tech startups are known to have a special characteristics that make them a good  technology investment for venture capitalists.

Learn more about technology from

https://brainly.com/question/25110079

#SPJ1

Situation: jackie is trying to access the memory diagnostics on her computer to check its memory usage and function. she goes to the control panel, clicks system and security, and selects the action center, but she cannot find the right tool.

Answers

The memory diagnostics can be assessed by:

Open Memory Diagnostics Tool by going to Control Panel on your systemType Memory in the text box  and later click Diagnose your computer's memory problems.  You may be asked  for an administrator password or confirmation.Then type the password or give confirmation.Choose if to run the tool.

What is memory diagnostic?

The Memory Diagnostic Tool is is known to be a tool that is often used in the verification and test of a system's RAM.

Note that The memory diagnostics can be assessed by:

Open Memory Diagnostics Tool by going to Control Panel on your systemType Memory in the text box  and later click Diagnose your computer's memory problems.  You may be asked  for an administrator password or confirmation.Then type the password or give confirmation.Choose if to run the tool.

Learn more about memory diagnostics  from

https://brainly.com/question/14917819

#SPJ1

A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

Answers

Answer:

client attack

Explanation:

Q:

A __________ is when an adversary attempts to achieve user authentication without access to the remote host or to the intervening communications path.

A:

client attack

Given that you are working with a processor that is designed to fit in a socket 775 LGA motherboard you can see the northbridge chipset. Which heat sink would you recomment for northbridge chipset

Answers

The heat sink would you recommend for the northbridge chipset are passive chipset.

What is the major distinction between B550 and X570 Chipsets?

The major distinction between B550 and X570 Chipsets is the model of PCIe lanes from them. Ignoring the direct PCIe lanes from the CPU for the moment, the X570 Chipset hyperlinks to the CPU over PCIe 4.0 lanes at the same time as the B550 Chipset connects to the CPU over PCIe 3.0 lanes.

Northbridge is an Intel chipset that communicates with the pc processor and controls interplay with memory, the Peripheral Component Interconnect (PCI) bus, Level 2 cache, and all Accelerated Graphics Port (AGP) activities. Northbridge communicates with the processor the use of the frontside bus (FSB).

Read more about the chipset:

https://brainly.com/question/2679962

#SPJ1

Use the Image below to answer this question.
At your company, you need to have telephone conversations transmitted over the existing data network using VoIP. Your manager
directs you to complete this project as follows:
1. Use the phone's ports to daisy chain the PCs to the rest of the network.
2. Do not use the regular power outlets to power the phones.
The list on the left displays several cable types and devices that may be required in this scenario. Drag each cable type or device on
the left to the corresponding location identified in the image.
items on the left may be used more than once.

Answers

Since the image is not given, answer will be subjective. Check more below.

What is VoIP communication?

The Voice over Internet Protocol (VoIP), is known to be a kind of a technology that helps a person to be able to make voice calls.

Note that this can be done through the use of a broadband Internet connection and one do not need to use  any analog  phone line.

Learn more about VoIP  from

https://brainly.com/question/14255125

SPJ1

Describe the role of a distributed file system in a job execution environment such as MapReduce in a large-scale cloud system. g

Answers

Answer:

allows users of physically distributed systems to share their data and resources

Explanation:

The main purpose of the Distributed File System (DFS) is to allows users of physically distributed systems to share their data and resources

To stored three characters a computer occupies. Bytes memory space

Answers

Answer:

The computer represents all characters and numbers internally in the same fashion. In practice, memory is measured in KiloBytes (KB) or MegaBytes (MB).

Explanation:

The computer represents all characters and numbers internally in the same fashion. In practice, memory is measured in KiloBytes (KB) or MegaBytes (MB).

On the multi-floor office, the staff is deploying multiple switches and there must be multiple broadcast domains. The Layer 2 switch with a single broadcast domain requires more bandwidth as more hosts are connecting to it. How can these switches be set up to accommodate the network architecture

Answers

Broadcast domains are the part of the network sharing system that shares the two layers of the segment. To accommodate the network architecture multiple VLANs should be used.

What are VLANs?

Virtual local area networks (VLANs) are the subnetwork type that combines the local area networks together. These are used by the network administrators to limit access with the help of the workstation division.

The VLANs are used to eliminate the issue of collision and can connect hosts with different switches to allow the sharing of the same broadcast domain.

Therefore, VLAN with multiple domains must be used.

Learn more about VLANs here:

https://brainly.com/question/14530025

#SPJ1

Which are good reasons to use a database? Select all that apply.
A to find data in a large dataset
B to perform calculations with data
C to store large datasets
D to find answers to questions about the data

Answers

Databases are used to find data in large sets, store large informational sets, and answer the questions that are present in the data set. Thus, options a, c, and d are correct.

What is a database?

A database is a systematized compilation of the information and the data set that is stored physically on electronic devices like a computer system. DBMS controls the databases.

Databases can be based on the hierarchy, or network, or can be object-oriented. They store the electronic form of the data set in an organized manner.

Therefore, databases stores data sets.

Learn more about the database here:

https://brainly.com/question/14101897

#SPJ1

7. licenses show people how content creators would like their work to be used.
o a. intellectual property
o b. phishing
o c. spamming
o d. creative commons

Answers

Intellectual property licences outline the intended uses of content providers' creations.

Which licences make it clear how the creators of content want their work to be used?

Everyone, from small businesses to major institutions, now has a standardised approach to offer the public permission to use their creative works in accordance with copyright laws thanks to Creative Commons licences.

Which kind of licence enables content producers to allow for the reuse of their work while maintaining their copyright?

By giving specific permissions to others to share, utilise, and/or build upon their creative works, Creative Commons copyright licences enable authors to maintain their ownership of their intellectual property. Creators assign them to their own works. The purpose of CC licences is to allow for the adaptation, sharing, and reuse of educational resources.

To know more about content visit:-

https://brainly.com/question/28589374

#SPJ1

Online education students need to be taught ______. Select 2 options.

Answers

Answer:

-the reasons why they should be ethical


-how to communicate professionally

Explanation:

GOT IT RIGHT ON ODYSSEY

Answer: Below

Explanation:

A cloud computing service model whereby one or more computing environments suitable for use in application development and testing are provided as a turnkey, on-demand service. is known as _____.

Answers

A cloud computing service model whereby one or more computing environments suitable for use in application development and testing are provided as a turnkey, on-demand service. is known software-as-a-Service (SaaS).

What is Cloud computing?

Cloud computing refers to programs and offerings that run on an allotted community the usage of virtualized sources and accessed via way of means of not unusual place Internet protocols and networking standards.

Software-as-a-Service (SaaS) is a version of carrier shipping wherein one or greater programs and the computational sources to run them are furnished to be used on call for as a turnkey carrier. Its principal cause is to lessen the overall fee of hardware and software program development, maintenance, and operations.

Read more about the cloud computing service :

https://brainly.com/question/19057393

#SPJ1

solve the expression 4*3/ (5+2) 7%4

Answers

Answer:

36/7

Explanation:

First, multiply 4 and 3 then add 5 and 2 the answer you will get is 12/7, and then calculate 7%4 answers you will get is 3 now multiply 12/7 and 3 your answer will be 36/7

From the PC or Laptop, open a web browser and navigate to cisco. Srv. Open the link titled A small page. What is the message displayed on the page

Answers

The message displayed on the page is "Hello, world". Check more about messages below.

What is computer message?

In computer science, a message is regarded as a data that is in bit size which is often transmitted from sender, to its recipient.

Conclusively, Note that when you press from the PC or Laptop, and then open a web browser and navigate to cisco. Srv. by Opening the link titled A small page, the message that would be shown on the page  is "Hello, world".

Learn more about web browser from

https://brainly.com/question/15243054

#SPJ1

PLEASE HELP WILL MARK BRAINLIEST
A programmer ensures the user inputs valid data by setting

algorithms
boundaries
data
output

Answers

I believe it’s boundaries
boundaries probably but i could be wrong

when you save a presentation with a .potx file extension, which type of powerpoint file is created?

Answers

A file with the POTX file extension is a Microsoft PowerPoint Open XML Template file used to maintain the same layout, text, styles, and formatting across multiple PPTX files.

When you save a presentation with a .potx file extension, the type of PowerPoint file that is created is known as .PPTX file.

What do you mean by Presentation?

The presentation may be defined as an activity in which someone expresses, describes, or explains something to a group of people in order to explore the given facts and understandings. The person who presents is known as the speaker, while the person who listens is known as the audience.

A POTX file is a presentation template created by PowerPoint, a program that significantly allows users in order to create slide show presentations. It contains default styles, text, layout, and formatting. POTX files are utilized in order to create multiple .PPTX files with the same formatting.

Therefore, when you save a presentation with a .potx file extension, the type of PowerPoint file that is created is known as .PPTX file.

To learn more about Presentation, refer to the link:

https://brainly.com/question/24653274

#SPJ5

If students follow the directions for trying to add a waitlisted class and later become eligible to register for the class, they will be notified via email that they have a time window of _____ hours to register for the class.

Answers

The students have 24 hours of window time to register for the class after they become eligible to register for the class.

What is waitlisted?

The waitlist is a part of the normal decision-making process. This signifies that the college is still interested in you, but there isn't a spot for you right now.

You might get admission if enough other students don't want to go. It's not an outright rejection, as a deferral, but it does mean you'll have to wait to find out if you'll be admitted.

If students follow the directions for trying to add a waitlisted class and later become eligible to register for the class, they will be notified via email that they have a time window of 24 hours to register for the class.

Thus, the students have 24 hours of window time to register for the class after they become eligible to register for the class.

Learn more about the waitlisted here;

https://brainly.com/question/15526156

#SPJ1

PRACTICAL ACTIVITY

1.Write a program in python to find the area of rectangle with following inputs:
Length = 4
Breadth = 5

2. Write a program in python to print multiples of 5

3. Write a program in python to check if the given number is positive or negative

4. Write a program in python to find the following
a) Average of 3 numbers
b) Power of 2 numbers
c) Minimum of 3 numbers

Answers

"""

1.Write a program in python to find the area of rectangle with following inputs:

Length = 4

Breadth = 5

2. Write a program in python to print multiples of 5

3. Write a program in python to check if the given number is positive or negative

4. Write a program in python to find the following

a) Average of 3 numbers

b) Power of 2 numbers

c) Minimum of 3 numbers

"""

# Program 1

print("Question 1")

print("Rectangle Area Calculator")

length  = int(input("Enter length  > "))

breadth = int(input("Enter breadth > "))

print(length * breadth)

# Program 2

print("Question 2")

for multiplier in range (0, 13):

   print(5 * multiplier)

# Program 3

print("Question 3")

num = int(input("Enter a number to check if positive or negative > "))

if num > 0:

   print("positive")

elif num < 0:

   print("negative")

else:

   print("0")

# Program 4

# Part A

print("Question 4A")

num1 = int(input("Enter first num > "))

num2 = int(input("Enter second num > "))

num3 = int(input("Enter third num > "))

print("Average:", (num1 + num2 + num3) / 3)

# Part B

print("Question 4B")

base  = int(input("Enter base > "))

power = int(input("Enter power > "))

print(base ** power)

# Part C

print("Question 4C")

num1 = int(input("Enter first num > "))

num2 = int(input("Enter second num > "))

num3 = int(input("Enter third num > "))

print("Min:", min(num1, num2, num3))

You are writing a program that uses these modules. An error occurs when you
try to make the monkey sprite walk from one side of the screen to the other.
Which module needs to be edited?

Answers

Since the modules. Answer will be subjective. The module needs to be edited is the Object modules.

What is Object modules?

This is known as object file as it is the section of code that is said to be object-based programming.

Note that to make the monkey sprite walk , one has to change x by 10 block is that tends to really moves the sprite. One can make it move faster  or slower by the act of increasing or decreasing its value.

Learn more about modules from

https://brainly.com/question/13171394

#SPJ1

Font-size property changes
O Color
O Alignment
O Font
Size of font

Answers

O font or Size of the font

Part B How could installing new technology, such as scrubber machines, affect the factories required to install them? Name a positive and a negative consequence. pls help need done by end of week

Answers

Answer:It will decrease harmful emissions, so the factories will no longer need to install them.

Explanation:

This helps improve the safety of the surrounding community and workers. But this technology is expensive and required time and effort to install.

Answer:

Installing new technology, such as scrubbers, in factories will decrease their harmful emissions. This helps improve the safety of the surrounding community and the workers. But this technology is expensive and requires time and effort to install.

________ helps in determining the cause of a security threat in an incident response plan. Question 7 options: A) Restricting system access B) Investigating system logs C) Reevaluating the risk matrix D) Taking systems offline

Answers

Investigating system logs helps in determining the cause of a security threat in an incident response plan.

What do system logs works for?

A system log is known also as syslog. This is known to be that part of a system that tells or show the  records of all the actions that takes place in an operating system.

Conclusively, the Investigating system logs helps in determining the cause of a security threat in an incident response plan because it will tell all of the startup messages, system changes and other processes that took place in the system.

Learn more about security threat from

https://brainly.com/question/25758530\

#SPJ1

Other Questions
18 bracelets in 3 hours Don't understand this help anyone? Read the passage.On today's hike, Jake wore a brown patterned sweatshirt and dun pants that matched the trunks of the elm trees. When he walked through the trees, it was hard to tell Jake from the tree trunks.Which option best defines the word dun?cargo-styledull brownish-gray colorcorduroylight olive green 25 POINTS Belief bias may cause one to make invalid conclusions seem valid or vice versa. please select the best answer from the choices provided t f To evaluate the performance of a security system, administrators must establish system performance _____________________ in which plant cell is there single number of chloroplast Why was the issue of slavery in theerritories so important to the North andSouth? The length, breadth and height of a cuboid bear the ratio 5:3:2 . If it's total surface area is 279 cm,find it's volume. 50 hours total 20 spent joggin what % is that Is this triangle acute, right, or obtuse?acuterightobtuse A topic or recent clinical interest is the possibility of using drugs to reduce infarct size is patients who have myocardial infarction within the past 24 hours. Suppose we know that in untreated patients the mean infarct size 25 (ck - g-EQ/m). Furthermore, in 8 patients treated with a drug the mean infarct size is 16. Suppose = 10 . Is there statistical evidence the drug is effective in reducing infarct size? Solve both please thanks Which equation is modeled by the data in the table? What was born out of the Treaty of Verdun in 843?The Kingdom of NormansThe Kingdom of FransicoThe Kingdom of FranceThe Kingdom of Neverland What is moment of inertia? HELP ME PLEASEWhich of these is a function of the placenta?A. To store the embryo's wastesB. To hold the fetus upside down for birthC.To digest food for the fetusD. To bring oxygen to the embryo's cells The graph shows the solution to a system of equations. What is that solution?A) (2,2)B) (2,2)C) (2,2)D) (2,2) Describe one good and bad thing about using electric air conditioners i hate science :/ a0) Chelsea invests $4,734 in a savingsaccount with a fixed annual interest rate of4.02% compounded 4 times per year.What will the account balance be after 12years?A) $7,962.65 B) $8,625.82C) $8,287.61 D) $7,650.44