1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
mars1129 [50]
3 years ago
5

Assume you have an XML Tree variable called quiz initialized with the following valid XML document. You are not required to draw

the tree, but you might find it helpful. <?xml version="1.0" encoding="UTF-8"?> 155 What is the size of this tree? What would be the value returned by quiz. child(0).child(1).child(0).label() What would be the value returned by quiz. child(1).attributeValue("number")

Computers and Technology
1 answer:
blagie [28]3 years ago
8 0

Answer:

See explaination.

Explanation:

question is the root element which have two children one is M-C and other is Coding.

Again M-C have two sub children Points and parts

Note: The tree will be as shown in the attachment. kindly refer to attachment.

Here if we see the child of quiz(questions) at 0 position is number of type M-C and another child at location 1 is number of type Coding.

Now quiz.child(0) is number of type M-C which has two child and child at 0 is Points and child at 1 is Parts

quiz.child(0).child(1) is Points and now further points doesn't have any children hence going further to quiz.child(0).child(1).child(0) is nothing hence it will not return anything.

Next quiz.child(1) is number of type coding and value is 5.

Size of the tree is (2^depth)-1

and here depth of tree is 3 hence size is (2^3)-1 i.e. 7

You might be interested in
The following method is intended to remove all values from the ArrayList a that have the same value as val; however, this method
Alona [7]

Answer:

ArrayList a contains [2, 3, 3, 3, 4, 5, 3, 2, 1]

Explanation:

Given

The removeValue method

Required

The content of ArrayList a, after the method is called

From the question, we understand that arraylist a is:

a= [2, 3, 4, 3, 3, 4, 4, 5, 4, 3, 2, 1]

val =4

The function fails when the value to be removed appear consecutively in the list.

4 appears in index 5 and 6 of the list. Only one of the 4's will be removed

So, the updated list will be: [2, 3, 3, 3, 4, 5, 3, 2, 1]

6 0
3 years ago
"if x and y are odd integers, then x + y is even"
Naddika [18.5K]

Answer:

Hello!

The statement is "if x and y are odd integers, then x + y is even"

and we want to prove it by contradiction.

Suppose that we have x and y odd numbers, and suppose that his addition is odd.

We know that an odd number can be writen as (2n +1) (and a even number can be written as 2n) where n is an integer number; then:

x = (2k + 1) and y = (2m + 1)

and x + y = j, where j is also a odd number, then j = (2h + 1)

then:

2k + 1 + 2m + 1 = 2h + 1

2(k + m) + 2 = 2h + 1

2(k + m) +1 = 2h

if k and m are integers, then k + m is also an integer, suppose that k + m = g

then 2g + 1 = 2h

this says that in odd number is equal to an even number, then we have a contradiction, and the addition of two odd numbers cant be an odd number.

8 0
4 years ago
Write a 5 paragraph essay about this virus, who created it, why, what damage did it cause, and did they go to jail. The worst co
zheka24 [161]

The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

<h3>What does MyDoom virus do?</h3>

The MyDoom virus was said to be the one that brought about a lot of loss in the whole globe.

The  MyDoom is known to be an effective worm that was created to make zombies out of lots of thousands of computers.

Note that the Hackers are able hijacked terminal to wage a kind of  denial of service (DoS) attack to any firm that they do identified.

The virus is known also as Novarg as it is a“worm,” sthat do pread by mass emailing.

Therefore, The creator of the MyDoom virus is still unknown. This is known to be a worm that was said to have  appeared  in a from of a poorly sent e-mail, and a lot of people who originally were sent the e-mail did ignored it, thought it was a spam and they ignored it and as such, , it was said to have spread to infect about 500 thousand computers in the whole world.

Learn more about Virus from

brainly.com/question/14887682

#SPJ1

6 0
2 years ago
In Windows 7's Jump List, what can we do?
olga_2 [115]

Answer:se muestran los documentos recientes, la de iTunes muestra links para abrir la iTunes Store o reproducir toda nuestra colección, etc

Explanation:

4 0
3 years ago
A 200-g hockey puck is launched at an initial speed of 16 m/s up a metal ramp that is inclined at a 30° angle. The coefficients
rusak2 [61]

Answer:

h = 8.588 m

Explanation:

Given:

Mass of hockey puck:  m  =  200  g  =  0.2  K g

Angle of incline:  θ  =  30º   (with respect to horizontal)

Coefficient of static and kinetic friction between the puck and ramp:  

μ s  =  0.4   and    μk  =  0.3

initial speed:  

v  =  3.5  m /s

Let  h  be the vertical height reached by the puck, above the ground. This corresponds to a distance of  

d =  h *sin  30º =  2 *h

along the incline. As the puck is moving, only kinetic friction comes into play as it climbs up the incline. Let  N  be the normal reaction exerted by the metal ramp on the ball. Then,

N  =  m*g *cos  θ  =  0.2 *9.8 1*cos  30 º =  1.6991  N

Therefore, kinetic friction acting on the puck is:  

F k  =  μ k *N  =  0.3 *1.6974  =  0.50974 N

From work energy theorem, the change in kinetic energy should equal the work done by friction and gravity. Therefore,

0.5*  0.2 *16²  =  0.50974 *2h + 0.2*9.81*h

⇒  h = 8.588 m

8 0
3 years ago
Other questions:
  • If you have an application that is not responding and you want to force it to shut down, whichsystem utility can you use?
    8·1 answer
  • What is a common method for testing a spot weld?
    13·1 answer
  • Explain one way that wartime advances in such areas as computers
    10·1 answer
  • What is a Joint Staff approved, standardized communications link that is suitable for the transmission of digital information an
    5·1 answer
  • In the following code, use a lock to protect any data that might need protecting. Keep your critical sections as small as possib
    8·1 answer
  • Try to figure out who the ideal customer is for the IPhone X
    15·2 answers
  • An option already selected by windows is called____ ( default option/ default selection)​.
    6·1 answer
  • OSI layer for HDLC??​
    13·1 answer
  • How do I mark brainlyist
    7·2 answers
  • HC - AL-Career Preparedness
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!