Edhesive 11.1 lesson practice please

Answers

Answer 1

Answer:

1. Bits

2. Bitrate

3. The amount of time it takes for bits to travel from one place to another.

4. Used to send bits wirelessly.

5. Cables that carry light and dramatically increase the speed and accuracy of information over the internet.

6. 8

7. The number of bits per second a system can transmit.

Explanation:

hey lol

Answer 2

In this exercise we have to use the knowledge in computational language in java to write the code.

This code can be found in the attached image.

So we have the code in a simpler way like:

public class Person{

private String firstName,lastName;

public Person(String first,String last)

{

firstName=first;lastName=last;

}

public int throwDisc(int pow)

{

if(pow<1){pow=1;}if(pow>10){pow=10;

}

return pow*2;

}

public String toString(){return lastName+", "+firstName;

}

}

public class Coach extends Person{

private String role;

public Coach(String first,String last,String rol)

{

super(first,last);role=rol;

}

public String toString(){return super.toString()+"\n Role: "+role;

}

}

import java.util.*;

public class UltimateTeam

{

private ArrayList<UltimatePlayer> players=new ArrayList<UltimatePlayer>();

private ArrayList<Coach> coaches=new ArrayList<Coach>();

public UltimateTeam(ArrayList<UltimatePlayer> p,ArrayList<Coach> c)

{

for(UltimatePlayer up:p){players.add(up);}for(Coach co:c)

{

coaches.add(co);

}

}public String getCutters()

{

String list="";for(UltimatePlayer p:players){if(p.getPosition().contains("cutter")){list+=p.toString()+"\n";}}return list;

}

public String getHandlers()

{

String list="";for(UltimatePlayer p:players){if(p.getPosition().contains("handler")){list+=p.toString()+"\n";}}return list;

}

public String toString()

{

String list="COACHES\n";for(Coach c:coaches)

{

list+=c.toString()+"\n";

}

list+="\nPLAYERS\n";for(UltimatePlayer p:players)

{

list+=p.toString()+"\n";

}return list;

}

}

public class Captain extends UltimatePlayer

{

private boolean type;

public Captain(String f,String l,String p,boolean t){super(f,l,p);

type=t;

}

public int throwDisc(int pow)

{

if(pow<1){pow=1;}if(pow>10)

{

pow=10;

}

return pow*5;

}

public boolean getType()

{

return type;

}

public String toString()

{

String off="";if(getType())

{

off="offense";

}

else{off="defense";

}

return super.toString()+"\n Captain: "+off;

}

}

public class UltimatePlayer extends Person

{

private int jerseyNumber=-1;

private static int id=0;

private String position="";

public UltimatePlayer(String f,String l,String p)

{

super(f,l);

if(p.contains("cutter"))

{

position="cutter";

}

else

{

position="handler";

}

id++;

jerseyNumber=id;

}

public String getPosition()

{

return position

}

public int throwDisc(int pow)

{

if(pow<1){pow=1;

}

if(pow>10){pow=10;

}

return pow*4;

}

public String toString()

{

return super.toString()+"\n Jersey #: "+jerseyNumber+"\n Position: "+position;

}

}

See more about JAVA at brainly.com/question/12975450

Edhesive 11.1 Lesson Practice Please
Edhesive 11.1 Lesson Practice Please

Related Questions

I need help getting earbuds please help

My mom wants reasons to get wireless earbuds and i'm out.

I need someone to give me some good things about wireless earbuds and bad things about wired earbuds.
(and i got in truble with bluetooth headphones)

Answers

Answer:

Wireless earbuds are a lot harder to break.

Explanation:

Normally if something goes wrong with wired earbuds/headphones it's due to the cord. Wired earbuds can break more easily and can possibly break off in the headphone jack (which is not fun to deal with, believe me. I had to deal with it a few weeks ago). Furthermore, wireless earbuds can't get tangled because they don't have a cord. Wired earbuds cords tend to get tangled and it's a pain to fix it every time it happens. Good luck getting your earbuds.

well im going to play devil's advocate here

reasons why you should not get wired earbuds they produce more greenhouse gas not just to make them but they take constant power and Bluetooth so this causes more greenhouse gas

you may think you need to replace them less but when you factor in the outright cost you still pay more

Hope this helped

-scav

(Java)
Summarize the connection between controls, events, and subroutines.

Answers

In order to create an effective summary, you must take time to read through the topics that you have been given. Namely:

"The Connection between Controls, event, and subroutines".

What is a Summary?

A summary refers to a concise statement or account or report of the key points of an event, story, or literature.

A summary is usually exclusive of details that are not necessary. It focuses on the key points.

The text relating to the topic must be carefully researched. Jot down your points on a separate sheet, especially when looking at introductory paragraphs and chapters. You will also find key points in the conclusive paragraphs of each chapter or the text.

Then ensure that all your points are arranged in an order that is logical and sequential.

Learn more about Summaries at:

brainly.com/question/25605883

Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks. What does Nicole need to do to make the study group more effective? come better prepared and offer relevant information let other students participate more and share the workload share more of her opinions and answer questions keep her thoughts to herself and let others do all the talking

Answers

Answer:

B

Explanation

Let other students participate more and share the workload.

Have a good day everyone!

Answer:

let other students participate more and share the workload

Explanation:

5.What type of mic would you use for the following scenario:
• You want to pick up a wide range of frequencies , You are looking for an extraordinarily rich representation of the original sound, You seek smooth, detailed sound, You want to capture the subtle nuances in a recording studio, You expect and appreciate subtle, sensitive sound

a. Ribbon
b. Condenser
c. Dynamic

Answers

Answer: ribbon

Explanation:

Ribbon microphones are regarded as the most natural mics which can be used in capturing the voice, the sound of an instrument, and also the ambience of a room.

Ribbon microphone gives an extraordinarily rich representation of the original sound and also provide a smooth, and detailed sound.

BRAINLIEST TO THE BEST ANSWER!!!!!!!!!!!!!
In your own words in at least two paragraphs, explain why it is important, when developing a website, to create a sitemap and wireframe. Explain which process seems most important to you and why you feel most drawn to that process.

Answers

Answer:A sitemap break a website down to it's most basic components and a wirefram gives more details of what each page will contain but if you do have fleshed out content ready bring that content into your wireframed to see how it fits

Explanation:

Computer simulations were first developed during __________
as a part of the _____________

Answers

Answer:

WWII; Manhattan Project.

Explanation:

Computer simulation refers to a mathematical model designed and developed to predict the outcome or behavior of a hypothetical or real-life scenario on a computer system, so as to illustrate and understand how the system functions.

Historically, computer simulations were first developed during World War II (WWII) as a part of the Manhattan Project.

For example, SimpleScalar refers to a computer architectural simulating software application or program which was designed and developed by Todd Austin at the University of Wisconsin, Madison, United States of America. It is an open source simulator written with "C" programming language and it's used typically for modelling virtual computer systems having a central processing unit (CPU), memory system parameters (hierarchy), and cache.

In the Computer, simulations were first developed during the Manhattan Project

as a part of World War II to model the process of a nuclear detonation.

Thus Computer was a simulation of 12 hard spheres which were using a Monte Carlo algorithm. Also, When Computer simulation is often used as an adjunct to, or which substitute is for a modeling system for which is simple and closed-form analytic solutions are not possible. There are many types of computer simulations are The common feature is the attempt are to generate a sample of the representative scenarios for a model in which a complete enumeration of all are possible states of the model would be prohibitive or that are impossible.

Learn more about:  

https://brainly.com/question/15182181

Need answer ASAP. Thanks

Answers

Answer:

1. XHTML

2. XML

3. HTML

4. CSS

Explanation:

and, or, not are examples of boolean logic

Answers

true a example  boolean logic is (and, or, and  not)

-scav

print a test page what is the answer.​

Answers

Answer:

The keys "Ctrl" and "P"

Yah whatever he said i dont have a computer

The syntax for ________ requires you to use a colon after every if statement and while loop.
Java
Boolean
Python
programming

Answers

don't go yo the link

I'm playing robl.
ox right now add me as a friend and we can play together if u want
Name: aftonfam_rules

Answers

Okay I will added you

I'll add you later! btw do you play gach a onli ne? My user name is Wolfie

_

Rolbox

HD

1.The hardware that allows data to be transmitted from a computer along a telephone line to another computer at the other end is a_____

modem

keyboard

visual display unit

printer



Answers

So this is called a modem we use it to send  and receive info over telephone lines

Hope this helps

-scav

Which of the following best describes the protocols used on the Internet?

The protocols of the Internet are designed by government agencies to ensure they remain free to use

The protocols of the Internet are secret to maintain the privacy and security of people using them

Each device connected to the Internet will use a protocol designed by the company that manufactured it

The protocols of the Internet are open and used by all devices connected to the network

Answers

The protocols of the Internet are open and used by all devices connected to the network

-scav

necesito ejemplos de actitud filosófica por favor

Answers

Answer:

La filosofía es una disciplina intelectual que estudia críticamente las cuestiones más básicas de la humanidad y la naturaleza. Preguntas fundamentales de la filosofía son, entre otras, las siguientes:

-¿Existe alguna realidad fuera de mis pensamientos?

-¿Qué es el conocimiento?

-¿Qué es la verdad?

-¿Qué hace que una acción sea valiosa?

-¿Los humanos y los animales tienen valor y son iguales o diferentes?

-¿Qué es el tiempo?

Así, el planteamiento y reflexión de este tipo de preguntas son claros ejemplos de actitud filosfófica.

Beth wants to add information to her powerpoint presentation that is hiden from her audience and only she will see. Which feature should she use?

Answers

Answer:

She should use her "notes pane" in the PowerPoint

Explanation:

PowerPoint is a very good graphics software program available in different versions as a result of upgrades, with in-built functions which aid presentations of information in different formats such as text, videos, graphs in slides. It also allows printing into a hard copy.

Notes pane is a section in the PowerPoint software program located below the slide pane, in other words, it is a box found at the bottom of the slide. You write information in that box when you don't want the audience to see the information when they are viewing the slides during a presentation, giving Beth, for instance, the ability to still add some things that could assist her presentation.

Which of these examples demonstrate portfolio income?

Answers

Answer:

Explanation:

is money that describe when a car house is sold

Dropdown
Choose the word that matches each definition. Each term is only used once.
: to restart a device without powering it down

: to start a device from a powered-off state

: to reset a device back to factory configuration, losing all stored data and configuration

Answers

1-The volume and the home bottons

Answer:

Warm boot, Cold boot, hard reset

Explanation:

just did it on edge

Miriam Is a network administrator. A few employees want to access sensitive Information stored on a backup device. She wants to give access
rights these employees. Which option will she use?
ОА.
remote desktop
ОВ.
monitoring service
Oc.
user accounts
OD.
print service
OE.
directory service

Answers

Answer:

C. user accounts

Explanation:

An access control can be defined as a security technique use for determining whether an individual has the minimum requirements or credentials to access or view resources on a computer by ensuring that they are who they claim to be.

Simply stated, access control is the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication and authorization is used in access control, to ensure a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification

Hence, an access control list primarily is composed of a set of permissions and operations associated with a NTFS file such as full control, read only, write, read and execute and modify.

Generally, access control list are defined for specific user accounts and may either be an administrator, standard user or guest account.

In this scenario, Miriam a network administrator wants to give access rights to employees who are interested in accessing sensitive Information stored on a backup device. Thus, the option Miriam should use is user account.

Answer:

user accounts

Explanation:

Need the answer ASAP. Thanks

Answers

Answer:

join

Explanation:

It’s

Join.

That’s the correct word.

Which option best describes what spotting sessions are in the context of filmmaking? ASAP PLEASEEEEE!!!!!!! 40 points
A.
They are sessions dedicated to discussing the film's art direction.
B.
They are sessions dedicated to discussing the film's screenplay.
C.
They are sessions dedicated to discussing the film's cinematography.
D.
They are sessions dedicated to discussing the film's costume design.
E.
They are sessions dedicated to discussing the film's score.

Answers

The answer you are looking for is E! :)

Answer:

E.  They are sessions dedicated to discussing the film's score.

Explanation:

PLATO

A free open source audio editing software program is
A. Sound Forge.
B. Pro Tools.
C. iTunes.
D. Audacity.

Answers

D. Audacity

،،،،، ،،،،،،،،،،

A free open source audio editing software program is Audacity. Thus, option D is correct.

What is audio editing?

The audio editing is given as the change in the audio, volume, with the length, speed of the audio or other manipulations. The audio editing is performed with the use of the software in the computer that enables the generation of the audio data.

The three types of audio editing techniques involves:

Sound Forge: It mediates the edit in the sound files with playback.

Audacity: It is a free software that has been used for long with multi-track audio editor and recorder.

Pro Tools: It enables the use of the view and edit of the track.

Therefore, A free open source audio editing software program is Audacity. Thus, option D is correct.

Learn more about audio editing, here:

brainly.com/question/24228690

#SPJ3

How to create a trace table

Answers

Answer:

To create table g

Go to insert tab

Choose Table option at left corner and measure the table box.

Table is created in Microsoft.

What does a touch ring allow an artist to do on an a digital tablet

Answers

good question i need more

HELP I HAVE A D RN PLEASE
Use the drop-down menus to describe how to encrypt a database with a password.

1. In Access, click Open on the File tab.

2. Select the database.

3. Click the drop-down arrow to the right of Open, and click
.

4. Click the File tab.

5. Click
, and select Encrypt with Password.

6. Enter a password when you are prompted
. Click OK.

7. Close and reopen the database.

8. To open the database again, you will need to
.

Answers

Answer:

1. Open Exclusive

2. Info

3. twice

4. enter a password

Explanation:

In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password

Which view is opened when File tab is clicked?

The Backstage View is said to be opened. Note that one can use the Backstage through the clicking of the "File" tab that can be found on the top-left hand side of the system application window.

Note that In Access, click Open on the File tab. Open Exclusive or backstage View. Select the database by. clicking Info and Click the File tab twice and enter a password.

Learn more about password from

https://brainly.com/question/17174600

#SPJ2

What is one pass of a coding sequence called? a return a loop an iteration an infinite loop.​

Answers

Answer: an iteration

Explanation:

Edge

Answer:

C

Explanation:

five internal peripheral devices pls help​

Answers

Answer:

TV card, CD-R drive, Floppy Disk, Sound Card, and CD-ROM drive are examples of internal peripheral devices!(Basically hard drives and something like that)

Explanation:

here you go

1 ssd

2 CD-ROM drive

3 wifi extender or  antenna

4  CD-R drive

5 hhd

Hope this helped

-scav

Write a program to Find the Sum of 4 numbers​

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

   int a,b,c,d;//defining integer variable

   cout<<"Enter numbers:";//print message

   cin>>a>>b>>c>>d;//input numbers

   int sum=a+b+c+d;//add value in sum variable

   cout<<"4 number sum is:"<<sum;//print sum

   return 0;

}

Output:

Please find the attachment file.

Explanation:

In the program inside the main method 4 integer variable "a,b,c, and d" is declared that uses the print method to input the value from the user-end and after accepting the value an integer variable "sum" is declared that adds all input values and use a print method that prints the value with the message.

what is the output of this line of code
print("hello" + "goodbye")
A - "hello" + "goodbye"
B- hello + goodbye
C - hello goodbye
D - hellogoodbye

Answers

Answer:

D - hellogoodbye

Explanation:

since your merging two string together you will simply just get one string in total

Answer:

D

Explanation:

Nicole is in a study group to prepare for a test on plant biology, a subject she knows a lot about. During their meetings, she always comes prepared, helps other students, does most of the talking, and handles all of the tasks.

What does Nicole need to do to make the study group more effective?

come better prepared and offer relevant information
let other students participate more and share the workload
share more of her opinions and answer questions
keep her thoughts to herself and let others do all the talking

Answers

Answer:

let other students participate more and share the workload

Explanation:

Answer:

The person above me is right, give them brainliest please

Explanation:

Got it right on Edge, have a good day~

The photograph shows a way individuals work together in groups a the photograph​

Answers

Answer:

D. Administrators

Explanation:

Hope it helps

#CarryOnLearning

Other Questions
Explain how the mean, median, and mode affect your purchase decisions? John gets his first job working at an ice cream shop because he loves ice cream. He gets paid $9 per hour. Create a table to demonstrate how much money John will make from 0 - 6 hours. Let x equal the number of hours worked, and let y equal the amount of money that he will make. Then, create a graph with your results. In the system of equations-3.0 - 4y = 4-52 + y = 2Is (2, 10) a solution to the system? Anyone knows this? im giving 20 points pls answer , and it doesnt need to be big im just in 9th grade can anyone help me with this and explain it will mark brainlyiest. The width of a rectangle is 1units less than the length. The area of the rectangle is 42 units The National Security Archive is a a. private organization that the federal government contracts to provide backup copies for all national security documents. b. private organization that makes extensive use of Freedom of Information Act requests to obtain information about the activities of national security agencies. c. part of the National Security Agency that classifies the security clearance requirements of all government documents. d. bureau-level agency in the Department of Homeland Security that classifies the security clearance requirements of all government documents. NEED HELP FAST....Solve the following system of equations graphically. Select the graph that shows the correct solution of the system. 2x + y =3 3y = x - 12.... graph showing two lines intersecting at (3, 3) / graph showing two lines intersecting at (5, -7) / graph showing two lines intersecting at (3, -3) / graph showing two lines intersecting at (-3, -3) I need help (20 points) What were the core values that inspired various Vietnam conflict problems? 32614 round to nearest 100 place? the authors description of the video in the first paragraph serves primarily to The ratio of small dogs two big dogs at the park is 1: 3 which does not represent this ratio A. 3:9 B. 9:27 C. 2:4 D. 30:90 Was kann man wo machen? Assoziiere den Ort mit der entsprechenden Ttigkei HELP PLEASE:(Determine if the triangles are congruent by using HL? URGENTE!!!MarietaComo o gnio da noite, que desataO vu de rendas sobre a espdua nua,Ela solta os cabelos... Bate a luaNas alvas dobras de um lenol de prata.O seio virginal, que a mo recata,Embalde o prende a mo... cresce, flutua...Sonha a moa ao relento... Alm na ruaPreludia um violo na serenata!......Furtivos passos morrem no lajedo...Resvala a escada do balco discretaMatam lbios os beijos em segredo...Afoga-me os suspiros, Marieta! surpresa! palor! pranto! medo!Ai! noites de Romeu e Julieta!...CASTRO ALVES, Antnio de. Os anjos da meia-noite. In: Poesia. 4. ed. Rio de Janeiro: Agir, 1972. p. 59. (Col. Nossos Clssicos).Vocabulrio:espdua: ombrorecatar: encobrir, ocultarembalde: em vo, inutilmente, debaldepreludiar: iniciar, ensaiar antes de comear a cantarou a tocarpalor: palidezA esttica romntica apresenta, como uma de suas caractersticas, o rompimento com as regras clssicas que definiam temas e estruturas formais apropriadas ao texto potico. Castro Alves, no entanto, conserva, nesse poema, traos clssicos, o que pode ser vistoA)na aluso a elementos musicais.B)na meno a personagens mitolgicos.C)no uso reiterado de metforas.D)na referncia espiritualidade.E)na escolha de mtrica regular e forma fixa. Friar's Corporation expects to sell 22,000 pool cues for $12 each. Direct materials costs are $3, direct manufacturing labor is $4, and manufacturing overhead is $0.84 per pool cue. The following inventory levels apply to 2019: Beginning inventory Ending inventory Direct materials 33,000 units 33,000 units Work-in-process inventory 0 units 0 units Finished goods inventory 1,400 units 2,500 units 21) On the 2019 budgeted income statement, what amount will be reported for cost of goods sold I realized that this was our own electric light for us to turn on and off as we pleased. I pushed a chair under it and after some instruction from my mother proceeded to create lightning in the room by turning the switch as fast as I could.Barrio Boy,Ernesto GalarzaBased on this passage, what is the best inference about Ernesto?He is afraid to explore the world around him.He is not allowed to explore the world around him.He is easily fooled into thinking that electricity is lightning.He is excited to explore the world around him. Find m 70558090 Change into indirect speech"May be it's Tom, said Mas. Adis ?