Answer:
See Explanation
Explanation:
Required
Modify the program
To modify the program, we simply make use of an iterative statement.
To do this, I'll make use of a do while loop.
So, we have:
Declarations
num year = 1
num copies = 100000
num price = 0.15
num total = 0
num COPIES_INCREASE = 0.04
num PRICE_INCREASE = 0.03
do:
copies = copies + copies * COPIES_INCREASE
price = price + price * PRICE_INCREASE
total = total + copies * price
output year, total
year = year + 1
while year<=10
The above do while loop enables the program to repeat the statements in the following block:
do:
----
---------
---
-
while year <=10
The loop calculates the copies & price in each year and also updates the values of the variables; so that they can be used for the nexr iteration
What type of photography relies less on color and more on other elements such as lighting and contrast to give the image an artistic feel?
A.
infrared photography
B.
ultra-violet photography
C.
black and white photography
D.
high speed photography
E.
still life photography
The type of photography that relies less on color and more on other elements such as lighting and contrast to give the image an artistic feel is ''Black and white photography''. So, the correct choice is option C.
This eliminates the distraction of color and allows photographers to focus on the interplay of light, shadow, texture, and composition. By removing the element of color, black-and-white photography emphasizes the tonal range and contrast within an image. It highlights the play of light and shadow, creating a visually striking and dramatic effect. This type of photography allows photographers to emphasize shapes, lines, and textures, which can evoke a sense of mood, depth, and emotion.
Black and white photography has a long artistic history and has been used by many renowned photographers to capture powerful and iconic images. It offers a timeless and classic aesthetic that can convey a sense of nostalgia or evoke a more abstract and interpretive response from viewers.
In summary, black-and-white photography relies less on color and places more emphasis on elements such as lighting, contrast, and composition to create an artistic and impactful image.
For more questions on photography
https://brainly.com/question/31166522
#SPJ8
100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.
I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :
- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9
I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?
Help is very much appreciated. Thank you for your time!
Answer: 266299 669922 292629 969622 Also just saying did you backup your files to the cloud? If not you can buy a usb-c flash drive or a lighting cable flashdrive. Best Luck.
Explanation:
Which of the following would be considered unethical for a programmer to do? (5 points)
Create software used to protect users from identity theft
Ignore errors in programming code that could cause security issues
Protect users from unauthorized access to their personal information
Use someone else's code with the original developer's permission
One thing that would be onsidered unethical for a programmer to do is B. Ignore errors in programming code that could cause security issues
Why would this be unethical for a programmer ?Creating software designed to protect users from identity theft stands as a commendable and ethical endeavor, demonstrating the programmer's commitment to safeguarding user information and thwarting identity theft.
Engaging in such behavior would be considered unethical since it undermines the security and integrity of the software, potentially exposing users to vulnerabilities and compromising their sensitive data. Respecting intellectual property rights and obtaining proper authorization reflects adherence to ethical and legal standards.
Find out more on programmers at https://brainly.com/question/13341308
#SPJ1
What do we call the software program that handles the communication between a peripheral device and your computer?
Select one:
a. Device Driver
b. Device Interpreter
c. Peripheral Program
D. Peripheral Interpreter
Answer:
a. Device Driver
A Quicksort (or Partition Exchange Sort) divides the data into 2 partitions separated by a pivot. The first partition contains all the items which are smaller than the pivot. The remaining items are in the other partition. You will write four versions of Quicksort:
• Select the first item of the partition as the pivot. Treat partitions of size one and two as stopping cases.
• Same pivot selection. For a partition of size 100 or less, use an insertion sort to finish.
• Same pivot selection. For a partition of size 50 or less, use an insertion sort to finish.
• Select the median-of-three as the pivot. Treat partitions of size one and two as stopping cases.
As time permits consider examining additional, alternate methods of selecting the pivot for Quicksort.
Merge Sort is a useful sort to know if you are doing External Sorting. The need for this will increase as data sizes increase. The traditional Merge Sort requires double space. To eliminate this issue, you are to implement Natural Merge using a linked implementation. In your analysis be sure to compare to the effect of using a straight Merge Sort instead.
Create input files of four sizes: 50, 1000, 2000, 5000 and 10000 integers. For each size file make 3 versions. On the first use a randomly ordered data set. On the second use the integers in reverse order. On the third use the
integers in normal ascending order. (You may use a random number generator to create the randomly ordered file, but it is important to limit the duplicates to <1%. Alternatively, you may write a shuffle function to randomize one of your ordered files.) This means you have an input set of 15 files plus whatever you deem necessary and reasonable. Files are available in the Blackboard shell, if you want to copy them. Your data should be formatted so that each number is on a separate line with no leading blanks. There should be no blank lines in the file. Even though you are limiting the occurrence of duplicates, your sorts must be able to handle duplicate data.
Each sort must be run against all the input files. With five sorts and 15 input sets, you will have 75 required runs.
The size 50 files are for the purpose of showing the sorting is correct. Your code needs to print out the comparisons and exchanges (see below) and the sorted values. You must submit the input and output files for all orders of size 50, for all sorts. There should be 15 output files here.
The larger sizes of input are used to demonstrate the asymptotic cost. To demonstrate the asymptotic cost you will need to count comparisons and exchanges for each sort. For these files at the end of each run you need to print the number of comparisons and the number of exchanges but not the sorted data. It is to your advantage to add larger files or additional random files to the input - perhaps with 15-20% duplicates. You may find it interesting to time the runs, but this should be in addition to counting comparisons and exchanges.
Turn in an analysis comparing the two sorts and their performance. Be sure to comment on the relative numbers of exchanges and comparison in the various runs, the effect of the order of the data, the effect of different size files, the effect of different partition sizes and pivot selection methods for Quicksort, and the effect of using a Natural Merge Sort. Which factor has the most effect on the efficiency? Be sure to consider both time and space efficiency. Be sure to justify your data structures. Your analysis must include a table of the comparisons and exchanges observed and a graph of the asymptotic costs that you observed compared to the theoretical cost. Be sure to justify your choice of iteration versus recursion. Consider how your code would have differed if you had made the other choice.
The necessary conditions and procedures needed to accomplish this assignment is given below. Quicksort is an algorithm used to sort data in a fast and efficient manner.
What is the Quicksort?Some rules to follow in the above work are:
A)Choose the initial element of the partition as the pivot.
b) Utilize the same method to select the pivot, but switch to insertion sort as the concluding step for partitions that contain 100 or fewer elements.
Lastly, Utilize the same method of pivot selection, but choose insertion sort for partitions that are of a size equal to or lesser than 50 in order to accomplish the task.
Learn more about Quicksort from
https://brainly.com/question/29981648
#SPJ1
The world has entered the threshold of Big Data Control economy and many nations have formed a magnificent digital colony within. The digital firestorm has emerged and weaponization of Data has taken center stage! Nations that control Data today will ultimately control the future. True or false?
Summary of Activities: Learning/Insights:
Summary of Activities:
Gathering Information: Researching, collecting data, and gathering relevant information from various sources such as books, articles, websites, or experts in the field.
What is the Summary about?Others are:
Analysis: Reviewing and analyzing the gathered information to identify patterns, trends, and insights. Extracting key findings and observations from the data.Synthesis: Organizing and synthesizing the gathered information to create a coherent and structured overview of the topic or subject.Reflection: Reflecting on the findings and insights obtained from the research and analysis. Considering their implications, relevance, and potential applications.Evaluation: Assessing the quality, reliability, and validity of the information and insights obtained. Evaluating the strengths and weaknesses of the findings and the research process.Lastly, Application: Applying the obtained knowledge and insights to real-life situations, problem-solving, decision-making, or creative ideation.
Read more about Summary here:
https://brainly.com/question/27029716
#SPJ1
Where should a photographer place lights for a headshot? Headshot lighting is more important with darker backgrounds. The light should be at a 45-degree angle from the subject. The light should be in front of the subject. The third light should be the subject to form a ring of light around the subject’s hair.
Answer:
Headshot lighting is more important with darker backgrounds. The
(key) light should be at a 45-degree angle from the subject. The
(fill) light should be in front of the subject. The third light should be
(behind) the subject to form a ring of light around the subject’s hair.
Explanation:
i searched it up individually and thats what i got
What is a Memory unit
A memory unit is also known as a memory cell. It is a basic unit of memory storage in a computer or electronic device. It is a component that can store a bit of digital information (either a 0 or 1) and can retain that information even when the power to the device is turned coff.
Memory units are typically made up of electronic components such as transistors, capacitors, or magnetic materials, depending on the type of memory technology used.
Examples of memory units include random access memory (RAM), read-only memory (ROM), and flash memory.
The capacity of a memory unit refers to the amount of digital information it can store. usually measured in bytes or bits. The speed of a memory unit refers to how quickly it can access and retrieve stored information. Both capacity and speed are important factors in determining the performance of a computer or electronic device.
What is a Memory unit?
The memory unit is a component of a computer system. It is used to store data, instructions and information. It is also known as a principal/primary/internal memory. There are two types of memory: – Read-only memory (ROM):- ROM is a part of the memory unit.
-------------------------------------------------------------------------------------------------------------
What is the memory unit in a CPU?
The memory management unit (MMU) manages the data flow between the main memory (RAM) and the CPU. It also provides memory protection required in multitasking environments and conversion between virtual memory addresses and physical addresses.
-------------------------------------------------------------------------------------------------------------
Is RAM a memory unit?
RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor. RAM is the main memory in a computer.
Select each of the benefits of wireless communication.
checking e-mail from a remote location
o transmiting broadcast signals
receiving voicemail messages while away from the office
sending and receiving graphics and video to coworkers
sending data from outside the office
Answer:
checking e-mail from a remote location
receiving voicemail messages while away from the office
sending and receiving graphics and video to coworkers
sending data from outside the office
Explanation:
Wireless networks have proved to be more beneficial and accessible as compared to the wired networks. Wireless networks have helped in increasing the efficiency of transferring the data. It is also very accessible and easy to operate. It helps a person be connected even during travelling. It saves the cost and helps in better execution of the work. The speed at which the data is transferred helps in saving the cost and time. The maintenance cost is reduced in wireless communication as that of wired one. It also helps during the times of emergency situations.
Answer:
checking e-mail from a remote location
receiving voicemail messages while away from the office
sending and receiving graphics and video to coworkers
sending data from outside the office
Explanation:
EDGE 2021
1, 3,4,5
Which career qualification is unique to the Energy Transmission career pathway and not to the Energy Distribution pathway? color vision for identifying differences in colored wires critical thinking and reasoning skills for analyzing information stress management for handling urgent tasks mechanical knowledge and ability to drive and operate machinery working well with customers and being friendly
Answer:
a, c, d
Explanation:
Answer:
it is just A
Explanation:
on edge. unit test review
Question 5) What is a feature of podcasts?
A.
They rely on airwaves for broadcasting.
B.
They are inexpensive to produce.
C.
They are accessible only within a specific area.
D.
They require video equipment to create.
E.
They allow easy access to documents.
Answer: B
Explanation: They are inexpensive to produce.
f a student creates a five second animation with
two keyframes using 30 fps, how many tweens are used?
Answer:
Basing it on the information provided, a student that would want to make a short animation that is five seconds long, has two key frames and uses 30 frames per second (fps), he would be using 298 betweens. This is a key process in creating it.
Explanation:
Flavia is focused on making fewer mistakes when she types. what is she trying to improve most
Flavia is primarily trying to improve her typing accuracy. By focusing on making fewer mistakes when typing, she aims to minimize errors in her written work, enhance productivity, and improve the overall quality of her typing.
This could include reducing typographical errors, misspellings, punctuation mistakes, or other inaccuracies that may occur while typing. By honing her typing skills and striving for precision, Flavia can become more efficient and produce more polished written content.
Flavia is trying to improve her typing accuracy and reduce the number of mistakes she makes while typing. She wants to minimize errors such as typos, misspellings, and incorrect keystrokes. By focusing on making fewer mistakes, Flavia aims to enhance her overall typing speed and efficiency.
Learn more about typographical errors on:
https://brainly.com/question/14470831
#SPJ1
use a for loop to create a random forest model for each value of n estimators from 1 to 30;
• evaluate each model on both the training and validation sets using MAE;
• visualize the results by creating a plot of n estimators vs MAE for both the training and validation sets
After that you should answer the following questions:
• Which value of n estimators gives the best results?
• Explain how you decided that this value for n estimators gave the best results:
Why is the plot you created above not smooth?
• Was the result here better than the result of Part 1? Wha: % better or worse was it? in python
Answer:
nvndknnnnnnngjf
Explanation:
f4tyt5erfhhfr
i need to know thr full number of pie
Answer:
3.14159
Explanation:
g A 32-bit computer has a MUL (multiply) instruction. The documentation for this instruction says that the answer appears in the HI and LO registers 8 cycles after the MUL instruction executes, and that another MUL instruction should not be executed until these registers are loaded. What type of multiplier does the CPU have
Answer: The MIPS R4000
According to Raymond from Microsoft Blogs, "The MIPS R4000 can perform multiplication and division in hardware, but it does so in an unusual way, and this is where the temperamental HI and LO registers enter the picture.
The HI and LO registers are 32-bit registers which hold or accumulate the results of a multiplication or addition. You cannot operate on them directly. They are set by a suitable arithmetic operation, and by special instructions for moving values in and out."
Explanation:
Based on the information, the CPU in the 32-bit computer has a "multi-cycle multiplier" or a "pipelined multiplier."
What is the documentationBoth of these multipliers need more than one clock cycle to finish the multiplication. The information says that the answer will show up in the HI and LO registers 8 cycles after the MUL instruction. This means that the multiplication process is split into many parts, and each part takes one unit of time to finish.
The HI and LO registers are often used in a 32-bit computer to store the first 32 bits and the last 32 bits of the answer, respectively.
Read more about multiplier here:
https://brainly.com/question/15883095
#SPJ3
onsider the below given table and write queries for
(i) & (ii) and output of
(iii) –(v):Table Name: Pet
i) Display name, owner and gender for all dogs.
ii) Display Name, owner and age of all pets whose age is more 2 years.
iii)select name, owner from pet where owner name like ‘%ya’;
iv) select name, age from pet where species = dog and age between 1 and 3;
v) select * from pets where species in (‘horse’,’parrot’)
Note that this is an SQL prompt. This is because we are asked to create queries. When you have information on tables are are asked to create queries that will result in a certain output, you are looking at a dataase query. Queries are created in SQL. Here are the queries below. The expected output are all attached.
(i) Display name, owner and gender for all dogs.
Query:
SELECT Name, Owner, Gender
FROM Pet
WHERE Species = 'Dog';
(ii) Display Name, owner and age of all pets whose age is more 2 years.
Query:
SELECT Name, Owner, Age
FROM Pet
WHERE Age > 2;
(iii) select name, owner from pet where owner name like ‘%ya’;
Query:
SELECT Name, Owner
FROM Pet
WHERE Owner LIKE '%ya';
(iv) select name, age from pet where species = dog and age between 1 and 3;
Query:
SELECT Name, Age
FROM Pet
WHERE Species = 'Dog' AND Age BETWEEN 1 AND 3;
(v) select * from pets where species in (‘horse’,’parrot’)
Query:
SELECT *
FROM Pet
WHERE Species IN ('Horse', 'Parrot');
An SQL query is a command used to retrieve or manipulate data in a relational database. It is important because it allows users to extract specific data from large databases, make updates to existing data, and create new records.
SQL queries are essential in many industries that rely on large amounts of data, such as finance, healthcare, and e-commerce.
SQL queries are used to interact with data stored in relational databases, which are typically organized into tables. Queries allow users to extract, modify, and manage data within those tables.
See all output attached.
Learn more about SQL Query on:
https://brainly.com/question/30755095
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Assuming this is a database, consider the above given table and write queries for:
(i) & (ii) and output of
(iii) –(v):Table Name: Pet
i) Display name, owner and gender for all dogs.
ii) Display Name, owner and age of all pets whose age is more 2 years.
iii)select name, owner from pet where owner name like ‘%ya’;
iv) select name, age from pet where species = dog and age between 1 and 3;
v) select * from pets where species in (‘horse’,’parrot’)
Create a class named Circle with fields named radius, diameter, and area. Include a constructor that sets the radius to 1 and calculates the other two values. Also include methods named setRadius()and getRadius(). The setRadius() method not only sets the radius, it also calculates the other two values. (The diameter of a circle is twice the radius, and the area of a circle is pi multiplied by the square of the radius. Use the Math class PI constant for this calculation.) Save the class as Circle.java.
Create a class named TestCircle whose main() method declares several Circle objects. Using the setRadius() method, assign one Circle a small radius value, and assign another a larger radius value. Do not assign a value to the radius of the third circle; instead, retain the value assigned at construction. Display all the values for all the Circle objects. Save the application as TestCircle.java.
class Circle {
private double radius;
public Circle() {
this.radius = 1.0;
}
public Circle(double radius) {
this.radius = radius;
}
public double getRadius() {
return radius;
}
public void setRadius(double radius) {
this.radius = radius;
}
public double getArea() {
return Math.PI * radius * radius;
}
}
public class TestCircle {
public static void main(String[] args) {
Circle circle1 = new Circle();
Circle circle2 = new Circle(5.0);
Circle circle3 = new Circle();
circle1.setRadius(3.0);
circle2.setRadius(10.0);
System.out.println("Circle 1: radius = " + circle1.getRadius() + ", area = " + circle1.getArea());
System.out.println("Circle 2: radius = " + circle2.getRadius() + ", area = " + circle2.getArea());
System.out.println("Circle 3: radius = " + circle3.getRadius() + ", area = " + circle3.getArea());
}
}
1. Identify two real-world examples of problems whose solutions do scale well.
2. Identify two real-world examples of problems whose solutions do not scale well.
3. Identify one problem that is so complex that there is no computational solution to feasibly solve the problem in a reasonable amount of time.
1. Identify two real-world examples of problems whose solutions do scale well.
ANSWER; Real word examples of
problems whose solutions do scale well are;
- To find the smallest/ largest element in a list of data.
This is used when there is trial to find from a table the person that posseses the largest attribute.examples are salary and age.
Or it is also used when finding the highest score on a test, however,this is scalable as it can be done by both humans and machines according to the problem size but in the same fashion.
- Solving simple arithmetic equations.
Solving a simple arithmetic problem is one of an easily scaled problem, however,this depends on the number of operations and the variables present in the equation and which corresponds to daily life situations like adding, finding mean and counting.
2. Identify two real-world examples of problems whose solutions do not scale well.
Real word examples of problems which do not scale well are;
- The sorting of a large list of numbers do not scale well,this is because as the steps required increases as square or increases as more by the increase in size.
- Multiplication of matrices for various applications.example of this is like solving equations.
3. Identify one problem that is so complex that there is no computational solution to feasibly solve the problem in a reasonable amount of time.
Example of a problem that is not feasible computer-wise would be to find the optimal way or best to play the game of Chess. Here, it is possible to tell a good move but to tell the best move is computationally not possible.
How are viruses different from worms?
Explanation:
Viruses and worms both cause damage and copy themselves rapidly. The main difference is how they self-replicate, with viruses requiring the help of a host and worms acting independently. Unlike viruses, worms can replicate and spread without any human activation.
mark me brainliest
Cristina works in the sales department of a company that provides security services to businesses. She is writing a proposal to persuade a shopping mall to hire her company. She is using the most recent version of Microsoft word but just learned that the customer has an older version. What word-processing function will let her provide a document her customer's software can read?
In such a situation, Cristina must save the document in a format that the customer's software can read.To ensure compatibility, Cristina can use the "Save As" function to save the document in an earlier version of Microsoft Word format. When using this function, she must choose the earliest version that is compatible with the customer's software.
When writing a proposal to persuade a shopping mall to hire a company that provides security services to businesses, the writer must ensure that the proposal is compatible with the software the customer uses. Cristina works in the sales department of such a company, and she is using the most recent version of Microsoft Word. However, she just learned that the customer has an older version.
In such a situation, Cristina must save the document in a format that the customer's software can read.To ensure compatibility, Cristina can use the "Save As" function to save the document in an earlier version of Microsoft Word format. When using this function, she must choose the earliest version that is compatible with the customer's software.
In this case, she must save the document in a format that is compatible with the older version of Word used by the customer.The "Save As" function in Microsoft Word is used to create a new version of the same document with a different name and file format. It is used to save the document in a different location and to save it in a different format from the original. The function is useful when a document must be saved in a different file format to be compatible with other software programs.
For more such questions on Microsoft Word, click on:
https://brainly.com/question/25813601
#SPJ8
system. Construct an ER diagram for keeping records for exam section of a college.
What infection type can send information on how you use your computer to a third party without you realizing it
Answer:
Spyware collects your personal information and passes it on to interested third parties without your knowledge or consent. they also install trojan horses
Explanation:
12.2 E-Z LOAN
A loan obtained from a lending institution is typically paid off over time using equal monthly payments over a term of many months. For each payment, a portion goes toward interest and the remaining amount is deducted from the balance. This process is repeated until the balance is zero. Interest is calculated by multiplying the current balance by the monthly interest rate, which is usually expressed in terms of an Annual Percentage Rate (APR). This process produces an Amortization Schedule where the amount applied to interest is gradually reduced each month and the amount applied to the balance grows. For example, the following amortization schedule is for a loan of $ 10.000 at an APR of 3.9% over a term of 30 months:3 will match months 12, 24, and 30 respectively.
Following an amortization schedule, the monthly payments will be $350.39 and the total payment in 30 months will be $10511.7.
How much should be paid monthly to complete loan payment in 30 months?The loan payment follows an amortization schedule where the amount applied to interest is gradually reduced each month and the amount applied to the balance grows.
The amounts to be paid is calculated using the amortization formula:
P = a ÷ {{[(1 + r/n)^nt] - 1} ÷ [r/n(1 + r/n)^nt]}where
P is monthly paymenta is credit amountr is the interest ratet is the time in yearsn is number of times the interest is compoundedFor the loan of $10000;
a = $10000r = 3.9% = 0.039nt = 30 monthsHence,
P = $10000 ÷ {{[(1 + 0.039/12)^60] - 1} ÷ [0.039/12(1 + 0.0.039/12)^60]}
P = $350.39 per month
Total payment in 30 months = $350.39 × 30 = $10511.7
Therefore, the monthly payments will be $350.39 and the total payment in 30 months will be $10511.7.
Learn more about amortization schedule at: https://brainly.com/question/26433770
1 Explain the process of how the memory works with the
processor
Answer:
As every processor works on same stages i.e. fetch , decode , execute.
Most of the computers executes ONE instruction at a time. But speed is very fast .
So let's move to memory
The fastest memory is cache (registers)
Then RAM , then hard disk.
Before an instruction can be executed, program instructions and data must be placed into memory from an input device or a secondary storage device .
Then
1)The control unit fetches (gets) the instruction from memory.
2)The control unit decodes the instruction (decides what it means) and directs that the necessary data be moved from memory to the arithmetic/logic unit. These first two steps together are called instruction time, or I-time.
3)The arithmetic/logic unit executes the arithmetic or logical instruction. That is, the ALU is given control and performs the actual operation on the data.
4)Thc arithmetic/logic unit stores the result of this operation in memory or in a register. Steps 3 and 4 together are called execution time, or E-time.
Explanation:
Manufactured computers and cell phones are part of which industry? Electronics Chemicals Machinery Metal products
Answer:
The correct answer is the electronic industry
Hope this helps
Answer:
Electronics
Explanation:
list of functions of control unit
Answer:
I guess it would help you ✌
Consider the following class, which models a bank account. The deposit method is intended to update the account balance by a given amount; however, it does not work as handed public class BankAccount 1 private String accountOwner Name: private double balance private int account number public BankAccount(String nane, double Initialbalance, Int acetum) account Owner Name - name: balance initialBalance account Number - acetum; ) public void deposit (double amount) double balance - balance + amount; 1 3 What is the best explanation of why the deposit method does not work as intended? O The variable balance must be padded to the deposit method. The deposit method must have a return statement. In the deposit method, the variable balance should be replaced by the variable initialbalance. In the deposit method, the variable balance is declared as a local variable and is different from the instance variable balance
Answer:
the variable balance is declared as a local variable and is different from the instance variable balance.
Explanation:
In this code, the deposit method is not working as intended because the variable balance is declared as a local variable and is different from the instance variable balance. This is occurring due to the keyword double being placed before the balance variable within the deposit method. This is basically creating a new variable called balance that is only targetable by the local scope within the deposit method. Removing this keyword would instead target the class instance variable balance which is what is needed. In this case, the balance local variable being created is always null and would cause the method to not function.
Which of the following choices is not an example of a posible career in information technology
Compared to the remaining streams Networking systems is not an example of possible career in Information technology stream.
What is Information Technology?
Information Technology (IT) is the use of computers, storage, networks and other physical devices, infrastructure and processes to create, process, store, protect and exchange all forms of electronic data .
IT is generally used in the context of business operations rather than technology used for personal or recreational purposes.
Commercial use of IT includes both information technology and telecommunications
What is Networking systems?
Networking, also known as computer networking, is the transfer and exchange of data between nodes on a common information system medium.
To know more Networking systems visit:
https://brainly.com/question/27148473
#SPJ1