Describe the process of writing and running a Java program, referringto the terms "run-time" and "compile-time"

Describe the process of writing and running a Java program, referringto the terms "run-time" and "compile-time"

In: Computer Science

write a summary report of new royal adelaide hospital regarding on its stakeholders and the challenges...

write a summary report of new royal adelaide hospital regarding on its stakeholders and the challenges it faces.

In: Operations Management

Identify the priincipal intermolecular forces in each of the following substances: HF, C4H8, NCl3, Br2, HI

Identify the priincipal intermolecular forces in each of the following substances: HF, C4H8, NCl3, Br2, HI

In: Chemistry

Problem 2: Acronym Match                                      &nb

Problem 2: Acronym Match                                                                         (6 Points)

For each of the concepts given below, list which of the following acronyms apply:

802.3, 802.11, ARP, BGP, CIDR, CRC, CSMA/CD, DNS, FDMA, FTP, HTTP, IPv4, IPv6, ICMP, LAN, MTU, NIC, OSPF, RFC, RTT, SMTP, TCP, TDMA, TLD, TTL, UDP, URL

Not all acronyms are used. Unless otherwise stated, there is one acronym per concept.

  1. A way of interpreting IP addresses as having an initial (variable-length) network prefix, plus the remaining bits identifying a host within that network: _____________
  2. The IEEE standardization of Ethernet Medium Access: _____________
  3. 2 types of layer-4 protocols: _____________
  4. A term referring to a host’s network adaptor; Hardware device that handles an interface to a computer network and allows a network-capable device to access that network: _____________.
  5. The largest sized packet that can be sent across a link (or a network path) without requiring fragmentation: _____________.
  6. The style of MAC (Media Access Control) protocol used by Ethernet: _____________
  7. A scheme for computing a checksum value over a block of data in order to detect bit errors: _____________
  8. The time it takes to send a packet to a destination and hear a response back from it: _____________
  9. A counter in the IP header that is decreased at each hop; if it reaches 0, the packet is discarded (also refers to how long to keep a DNS response in a local cache): ________
  10. A way of sharing a link’s capacity among a group of senders in which each sender is assigned its own frequency to use when transmitting, which it can use to transmit whenever it pleases: _____________

[Good formatting, explanations and descriptions can fetch you additonal 10 points.]

In: Computer Science

Consider the following fact pattern: Claimant, Stephanie Britton, was a young female employee working at the...

Consider the following fact pattern: Claimant, Stephanie Britton, was a young female employee working at the Florida Light and Power Authority. Several of the male employees commented daily on her tight fitting clothing. She was continually asked on dates by several of her male co-workers but she always refused, asserting that she was not interested in dating her co-workers. On several occasions, while on the job, she overheard her male co-workers engage in sexual conversations, most distressingly discussions about her body parts. She repeatedly told management about the sexual comments. The employer took no action to discipline the male employees or otherwise change the workplace environment.   She eventually quit the job but filed an action with the EEOC claiming that she was forced to leave the job because she was sexually decimated against.

Perform an internet based research inquiry. Find any relevant statutes and at least two precedent cases related to the fact pattern. If you were the EEOC claims’ officer hearing Stephanie’s case, what factor would you find most important in your review. Based upon the cases and statute do you believe that Stephanie will prevail in her claim? Why or why not?

(300 words in total) PLEASE DO NOT PLAGIARIZED, DO OWN, NO COPY AND PASTE

In: Operations Management

Gauss's Law A spherical shell of radius R has charge Q spread uniformly over its surface....

Gauss's Law

A spherical shell of radius R has charge Q spread uniformly over its surface.
Find the electric field inside and outside the shell.

In: Physics

In C++, please include main Goals  Identify requirements for a program using polymorphism  Create...

In C++, please include main

Goals

 Identify requirements for a program using polymorphism

 Create a program to demonstrate your class hierarchy

Requirements

In this project, you will create a simple class hierarchy as the basis for a fantasy combat game. Your ‘universe’ contains Vampires, Barbarians, Blue Men, Medusa and Harry Potter. Each has characteristics for attack, defense, armor, and strength points as follows. Type

Attack

Defense

Armor

Strength Points

Vampire1

1d12

1d6* Charm

1

18

Barbarian2

2d6

2d6

0

12


1. Suave, debonair, but vicious and surprisingly resilient!

2. Think Conan or Hercules from the movies. Big sword, big muscles, bare torso.

“3d6” is rolling three 6-sided dice, “2d10” is rolling two 10-sided dice, etc.

NOTE: The sample creatures are unbalanced intentionally. This will help you in debugging your program! Some will win a lot, and others will lose a lot.

To resolve an attack, you will need to generate 2 dice rolls. The attacker rolls the appropriate number and type of dice under Attack. The defender rolls the appropriate number and type of dice under Defense. You will subtract the Defense roll from the Attack roll. That is the damage to the defender.

Each class only has its own information or data. When O1 is fighting O2, your program should call O1’s attack function. It will return the damage inflicted. Then O2’s defense function will take the damage inflicted, roll the specified dice and subtract the damage points from the defense. To apply the damage, you subtract the Armor value. The result is then subtracted from the Strength Points. That value becomes the new Strength Points for the next round. If Strength Points goes to 0 or less, then the character is out of the combat. For example, if one object receives 9 points of damage and rolls 3 for its defense, and has an armor of 4 and strength point of 8, it would take 9 subtract 3, and then 4 for the armor, to receive 2 points of damage, and its new strength point will be 8-2=6.

Start with the base and Barbarian classes.

You need to create a Creature base class. Then you will have a subclass for each of these characters. Note that the Creature class will be an abstract class. For our purposes right now, each subclass will vary only in the values in the table. It is part of your design task to determine what functions you will need.

To play the game, write a menu. Display two fighters by their names and prompt the user to select two fighters to fight one another. Students must account for two fighters of the same type. Randomly select one fighter to attack first. The fighters will take turns fighting each other until one's Strength point is zero or negative. (You do not have to display results of each round of fighting, but you can do that for the purpose of debugging.) Then display the winning fighter to the screen. Ask users to play again or exit the game. This is the first stage of a larger project. Please do not add any creatures of your own.

In: Computer Science

Calculate the volume (in mL) of 0.170 M NaOH that must be added to 341 mL...

Calculate the volume (in mL) of 0.170 M NaOH that must be added to 341 mL of 0.0555 M 3-(N-Morpholino)propanesulfonic acid (MOPS) to give the solution a pH of 7.55. The pKa of MOPS = 7.18.

In: Chemistry

1. Suppose a random sample of 100 Utah families yields a total fertility rate (the average...

1. Suppose a random sample of 100 Utah families yields a total fertility rate (the average number of children born per woman) of 2.71. Given what the Central Limit Theorem tells us about the relationship between sample statistics and population parameters, we can assume the total fertility rate for all Utah families is

Exactly 2.71. No more, no less.

Less than 2.71, as the sampling distribution for the TFR is always negatively skewed

likely close to 2.71, though not necessarily EXACTLY 2.71

Far too high relative to the number of students our public education system can realistically support (this is NOT the correct answer)

2. Suppose you're interested in tracking Americans' church attendance. A sample of 900 Americans finds that 22 percent of respondents report attending church at least once per week. If this poll has a margin of error of plus/minus three percent, we can be fairly certain that the percentage of all Americans who attend church at least once per week falls between _______ percent and _______ percent.

Group of answer choices

19; 25

21.7; 22.3

16; 28

There's simply no way of knowing because everyone lies about how often they go to church (this is not the correct answer, although it's probably true).

3. Suppose weights of high school wrestlers are normally distributed with a mean of 145 pounds and a standard deviation of 15 pounds. Approximately what percent of wrestlers weigh between 135 and 150 pounds?

Group of answer choices

37.81 percent

74.75 percent

25.25 percent

0.3781 percent

4. Suppose weights of high school wrestlers are normally distributed with a mean of 145 pounds and a standard deviation of 15 pounds. What weight (approximately) corresponds with the 75th percentile?

Group of answer choices

134.883

140.22

149.78

155.117

In: Math

Generally, what communication skills does it appear you would need to develop to get better at...

Generally, what communication skills does it appear you would need to develop to get better at a) participating in and b) facilitating a mediation?

In: Economics

In a Sodium Borohydride reduction of 9-fluorenone to 9-fluorenol, methanol is used as the solvent because...

In a Sodium Borohydride reduction of 9-fluorenone to 9-fluorenol, methanol is used as the solvent because it will not react with the products and reactants and because the products and reactants are very sluble in methanol. Would 2-propanone also be a suitable solvent for this reaction? Why/Why not?

In: Chemistry

What is known about the mechanism of infection by SARs–CoV-2, in particular, what do we know...

What is known about the mechanism of infection by SARs–CoV-2, in particular, what do we know about the cellular proteins involved? Focus on protein biochemistry. Need a good answer

In: Biology

Greedy algorithm for the minimum coin change problem (the number of required coins is given) function...

Greedy algorithm for the minimum coin change problem (the number of required coins is given)

function parameters :

- int amount = 20

- int Coins[] = [1, 5, 11, 25]

- int requiredCoins = 4

Expected result = 5,5,5,5,

****algorithm should be greedy, and find optimal solution***

You can provide the program or the algorithm

In: Computer Science

PYTHON COADING In this homework, we are mostly going to work with and manipulate pre-written code....

PYTHON COADING In this homework, we are mostly going to work with and manipulate pre-written code. But first, let’s practice writing a few lines of code ourselves.

(a) Create a function that raises any number to the power of 3 and fully annotate in the code itself what each line is doing. Check that your function is operating correctly (this may seem trivial now, but is good practice going forward as your programs become more complicated).

(b) Create three objects, which represent one of each of the following: a list, an array, and a tuple, each with three items.

(c) Multiply each of these three objects by three. What are the results, and why?
(d) Replace the third item in the array with the number 23. Do the same for the tuple. Show what happens. Why do you get this result?

(e) Create a range from 0 to 42 that includes every third number.

(f) Create a table with three rows and three columns, containing any kind of data (made up or real) that you like using pandas and a dictionary. Show the table, and describe the contents of the rows and columns.

In: Computer Science

How many asterisks does the following code fragment print? a = 0 while a < 100:...

  1. How many asterisks does the following code fragment print?

a = 0

while a < 100:

b = 0

while b<55:

   print('*', end='')

   b += 1

  print()

a += 1

In: Computer Science