Answer:
import java.util.Scanner;
public class Speed{
int speed;
public Speed(int speed){
this.speed = speed;
}
public void checkSpeed(){
if(speed >= 24 || speed <= 56){
System.out.println("Speed is normal");
}
else
System.out.println("Speed is abnormal");
}
public static void main(String...args){
Scanner input = new Scanner(System.in);
int userSpeed = 0;
System.out.println("Enter a speed: ");
userSpeed = input.nextInt();
Speed obj1 = new Speed(userSpeed)
obj1.checkSpeed();
}
Explanation:
Answer:
The method definition to this question can be given as:
Method definition:
public void clear(int[] arr, int num) //define method clear.
{
if (num == 0) //if block
{
return 0; return value.
}
else //else block
{
arr[num - 1] = 0; //assign value in arr.
return arr[]; //return value.
}
}
clear(arr, num - 1); //calling
Explanation:
The description of the above method definition as follows:
- Firstly we define a method that is "clear" that does not return any value because its return type is "void". This method accepts two integer variables that are "arr[] and num" where arr[] is an array variable and num is an integer variable.
- Inside a method, we use a conditional statement in if block we check that num variable value is equal to 0. if this condition is true so, it will return 0 otherwise it will go to else block in else block it will assign value in variable arr[num-1] that is "0" and return arr value.
Answer:
Check the explanation
Explanation:
in order to make sure that the built into the new systems, the below input and output levels of security control have to be considered for personal trainers staff.
There are:
Network Security
Application security
Physical security
User security
File security
Procedural security
These securities levels are consistent and advantage in building the decisions regarding system security.
There are the following policies applied to each control:
Network Security: Network interface and traffic controlling, encryption of data.
Application Security: Verification of data input/output and update of software proceedings.
Physical Security: Security to servers, computers and physical environment.
User Security: Protection passwords and identify management skills.
File Security: Access Permission allocated to users and editing authorizations given to users.
Procedural Security: Certify safety protection to perform decision-making activities and document shredders.
Finally, consider another main point is depends the new system performance are system response time, throughput, bandwidth time and turnaround time.
Answer:
xyz = 25
result = square(xyz)
print(result)
The above code assigns the value 25 to variable xyz as 5*5=25. Then next statement is a function call to square() function passing xyz to this function in order to compute the square of 25. The output is:
625
Explanation:
The above code can also be written as:
xyz = 5*5
result = square(xyz)
print(result)
The difference is that xyz is assiged 5*5 which is equal to 25 so the output produced will be the same i.e. 625.
The result variable is used to store the value of square of 25 after the square() method computes and returns the square of 25. So print(result) prints the resultant value stored in the result variable i.e. 625
<span>A chess-playing computer program that routinely calculates all possible outcomes of all possible game moves best illustrates problem solving by means of </span>brute force.