1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
10

When Margo decided to buy a new computer, she considered all the brands she could recall seeing advertise. The products she reca

lled represent Margo's ________ set.
Computers and Technology
1 answer:
tia_tia [17]3 years ago
3 0

Answer:

Retrieval set

Explanation:

The retrieval set represents all brands the consumer can recall (as in this case).

You might be interested in
Find functions f1 and f2 such that both f1 and f2 are O(g(n)), but f1(n) is not O(f2)
MakcuM [25]

Answer:

I dont think I can answer this

6 0
3 years ago
An oil slick occurs when an underwater refinery pipe ruptures, pumping oil into the water. The spilled oil sits on top of the wa
yaroslaw [1]

Answer:

Here the code is given as follows,

Explanation:

#include <iostream>

#include <iomanip>

using namespace std;

const double CUBIC_CENTIMETERS_IN_ONE_GALLON = 3785.41;

const double CENTIMETERS_IN_ONE_KILOMETER = 100000.00;

double oilSlickArea(double oilThick,

double oilReleasedRate, double spilTimeInHours);

int main()

{

double oilThickness;

double oilReleasedGallonsPerMinute;

int slickDays;

double spillArea = 0.0;

cout << fixed << showpoint << setprecision(8);

cout << "Enter the oil spill rate per minute (in gallons): ";

cin >> oilReleasedGallonsPerMinute;

cout << endl;

cout << "Enter oil thickness on top of the water (in centimeters): ";

cin >> oilThickness;

cout << endl;

cout << "Enter the number of days for which you want to know "

<< "the area covered by the spilled oil: ";

cin >> slickDays;

cout << endl;

cout << "Oil slick area after each day for " << slickDays << "days."

<< endl << endl;

cout << setw(5) << " " << setw(20) << left << "Slick Area in"

<< setw(20) << left << " Volume of Oil in" << endl;

cout << setw(5) << left << "Day " << setw(20) << left << "Square Kilometers"

<< setw(20) << left << " in Gallons" << endl;

for (int i = 1; i <= slickDays; i++)

{

spillArea = spillArea + oilSlickArea(oilThickness,

oilReleasedGallonsPerMinute, 60 * 24);

cout << setw(4) << left << i << " " << setw(12)

<< setprecision(8) << spillArea / (CENTIMETERS_IN_ONE_KILOMETER * CENTIMETERS_IN_ONE_KILOMETER)

<< " " << setprecision(2)

<< right << setw (15) << (oilReleasedGallonsPerMinute * 60 * 24 * i) << endl;

}

return 0;

}

double oilSlickArea(double oilThick,

double oilReleasedRate, double spilTimeInHours)

{

double oilVolumeInGallons;

double oilVolumeInCubicCentimeters;

double spillArea;

oilVolumeInGallons = oilReleasedRate * spilTimeInHours;

oilVolumeInCubicCentimeters = oilVolumeInGallons * CUBIC_CENTIMETERS_IN_ONE_GALLON;

spillArea = oilVolumeInCubicCentimeters / oilThick;

return spillArea;

}

8 0
3 years ago
Complete the statement below with the correct term.
kvv77 [185]

Answer:

clone

Explanation:

Many manufacturers always ensure their products are accompanied by a user manual and and a driver in a CD or can be obtained from their website to guide users on how to operate the device.

If the device has neither, it means it has been refurbished or its an imitation of the original make.

Cloned devices can easily malfunction and trouble shooting them tends to be a matter of guess work. Compared to the real device, their prices are normally  cheap compared to the real devices.

7 0
3 years ago
Read 2 more answers
What is meant by authorization? The decision to allow or deny a subject access to an object. The ability of a subject and an obj
USPshnik [31]

Answer: <em>The ability of a subject and an object to interact.</em>

Explanation:

Authorization is known as or referred to as a security mechanism that is used in order to determine the client/user access or privileges levels that are related to the system resources these mostly tend to include computer services, programs, files, data and other application. Authorization is also referred to as something that is preceded by authentication i.e for individuals identity verification.

6 0
3 years ago
Do an Internet search for multiple inheritance in programming languages. What are the pros and cons of multiple inheritance? Why
Andrei [34K]

Answer:

Pros and cons of multiple inheritance

Pros

a) You categorize classes in many different ways. Multiple inheritance is a way of showing our natural tendency to organize the world. During analysis, for example, we use multiple inheritance to capture the way users classify objects.

b) By having multiple superclasses, your subclass has more opportunities to reuse the inherited attributes and operations of the superclasses.

Cons

a) If two classes have a method with the same name, the new subclass doesn't know which one to call.

b) multiple inheritance can lead to a lot of confusion when two base classes implement a method with the same name.

c) The more superclasses your subclass inherits from, the more maintenance you are likely to perform. If one of the superclasses happens to change, the subclass may have to change as well.

d) When a single subclass inherits the same attribute or operation from different superclasses, you must choose exactly which one it must use.

Explanation: Question 2

Some programming languages such as Java don’t allow you to use multiple inheritance. You must translate multiple inheritance into single inheritance or individual Java interfaces. This can be confusing and difficult to maintain because the implemented code for categorizing objects is quite different from the way the user organizes those objects. So, when the user changes their mind or adds another category, it is difficult to figure out how to program the new subclass.

5 0
3 years ago
Other questions:
  • Why is it important to bring standalone systems into the domain? 4?
    8·1 answer
  • (count single digits) * write a program that generates 100 random integers between 0 and 9 * and displays the count for each num
    7·1 answer
  • Create a program asks a user for an odd positive integer. If the user gives and even number or a number that is negative it prom
    7·1 answer
  • Explain how software is distinct from hardware.
    8·2 answers
  • Which type of operating system is usually used in personal computers
    13·1 answer
  • What will the following segment of code output if 11 is entered at the keyboard? int number; cin &gt;&gt; number; if (number &gt
    12·1 answer
  • Indicate whether the following statements are true or false:
    14·2 answers
  • Https://www.bing.com/videos/search?q=dancing+aaron+smith+1+hour&amp;view=detail&amp;mid=C6C28AF3C0CEC1E4AEE3C6C28AF3C0CEC1E4AEE3
    14·1 answer
  • The __________ on a mouse is used to select or place the cursor where you want on the page
    13·1 answer
  • Which type of computer networks are bigger as well as smaller than a MAN?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!