1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
ivolga24 [154]
4 years ago
11

Ming's computer crashed suddenly the other day. Ming kept trying the solution that worked last few times it had crashed, even th

ough it is clear that it won't fix his computer now. Ming's failure to solve this problem is most likely due to ______________.
Computers and Technology
1 answer:
Nesterboy [21]4 years ago
3 0

Answer:

A mental set is the correct answer of this question.

Explanation:

Ming's computer crashed abruptly the next day. Ming has continued to try the workaround the last couple of times it's crashed, though it's clear that it's not going to fix his computer now. The inability of Ming to overcome this issue is most likely due to a collection of mentalities.Because of his mental set he fails to solve the problem.

It means it is directly related to the mind set of the computer system the main objective of mental set in computer to solve the problem is mental set in computer is not crashed then computer system is not working.

You might be interested in
What is the maximum number of edges for an undirected graph? A directed graph?
siniylev [52]

Answer:

For undirected graph n(n-1) for directed graph \frac{n(n-1)}{2}

Explanation:

The maximum number of edges for a undirected graph is given by n(n-1), where n is number of vertices

The maximum number of edges in directed graph is given by \frac{n(n-1)}{2}, where n is number of vertices

The maximum number of edges is greater in undirected graph than directed graph

5 0
4 years ago
Describe the three essential characteristics of an object fromthe perspective of object oriented paradigm.
erastovalidia [21]

Answer:

Explained

Explanation:

The three characteristics of an object

Encapsulation: It is the process of capturing data and securing it for safety from the outside interfaces. Binding data and operations of data into a single unit.

Inheritance: This is the process by which a class can be derived from the base class, with all features of base class and some of its own. This increases data reusability.

Abstraction: The ability to represent data at very basic level without showing the details of it is called abstraction.

3 0
3 years ago
PARTNERING AS IT RELATES TO BPR.​
balandron [24]

Answer:

The answer to this question can be defined as follows:

Explanation:

The term BPR stands for "business processes reengineering", It is the recreating of the core business process to improve product performance or reliability or lower costs.

  • It generally includes analyzing business processes, which identifying sub-par or ineffective processes but identifying ways to dispose of or change it.
  • IT important for improving changes, especially to shift in aspects of the work, its incorporation in business operations, or competitive strength change.
  • It might contribute to making reconfiguration improvements, and is known as a BPR enabler.
6 0
4 years ago
In this exercise you will debug the code which has been provided in the starter file. The code is intended to take two strings,
vampirchik [111]

Answer:

Here is the corrected program:

import java.util.Scanner; //to accept input from user

public class 02_14_Activity_one { //class name

    public static void main(String[] args) { //start of main method

    Scanner scan = new Scanner(System.in); //creates Scanner class object

  System.out.println("Enter first string"); //prompts user to enter first string

          String s1 = scan.nextLine(); //reads input string from user

  System.out.println("Enter second string"); //prompts user to enter second string

          String s2 = scan.nextLine(); //reads second input string from user

    System.out.println("Enter number of letters from each word"); //enter n

          int n = scan.nextInt(); //reads value of integer n from user

          System.out.println(s1.substring(0,n) + s2.substring(s2.length() - n ));

         } } //uses substring method to print a string made up of the first n letters of s1 and the last n letters of s2.

Explanation:

The errors were:

1.

Scanner scan = Scanner(System.in);

Here new keyword is missing to create object scan of Scanner class.

Corrected statement:

 Scanner scan = new Scanner(System.in);

2.

String s1 = nextLine();  

Here object scan is missing to call nextLine() method of class Scanner

Corrected statement:

String s1 = scan.nextLine();

3.

String s2 = Scanner.nextLine();

Here class is used instead of its object scan to access the method nextLine

Corrected statement:

String s2 = scan.nextLine();

4.

String n = scan.nextLine();

Here n is of type String but n is a whole number so it should be of type int. Also the method nextInt will be used to scan and accept an integer value

Corrected statement:

int n = scan.nextInt();

5.

System.out.println(s1.substring(1,n-1) + s2.substring(s1.length()-n));

This statement is also not correct

Corrected statement:

System.out.println(s1.substring(0,n) + s2.substring(s2.length() - n ));

This works as follows:

s1.substring(0,n) uses substring method to return a new string that is a substring of this s1. The substring begins at the 0th index of s1 and extends to the character at index n.

s2.substring(s2.length() - n ) uses substring method to return a new string that is a substring of this s2. The substring then uses length() method to get the length of s2 and subtracts integer n from it and thus returns the last n characters of s2.

The screenshot of program along with its output is attached.

7 0
3 years ago
What are three to five (3-5) key differences and features in Windows Server 2016 versus 2012?
Kipish [7]

Answer:

Find the features and differences below.

Explanation:

Five key features of the 2012 version of the Windows Server include;

1. Metro-style start button which disables the old start button.

2. Hyper V which enables the creation and use of a virtual machine.

3. Resilient file system (ReFS file system), aimed at managing large data and maintaining their integrity.

4. New Windows Task management, and

5. Internet protocol address management

Key features of the 2016 Windows Server include;

1. Nested virtualization

2. Secure boot

3. Nano server

4. Windows container, and

5.  Docker support.

The differences between the two versions are;

1. While the 2016 version would need a hard and software upgrade, the 2012 version would not need an upgrade.

2. The 2016 version is more expensive than the 2012 version.

3. The 2016 version also incorporates the features of the 2012 version, while the 2012 version only has its unique features.

4 0
4 years ago
Other questions:
  • In cell E13, create a formula using the AVERAGE function
    8·2 answers
  • 15 POINTS COMPUTER LITERACY <br> The range A2:A4 has how many cells<br> -2<br> -4<br> -6<br> -8
    14·1 answer
  • Read the following code carefully and do as directed: int main() { // Initialising starting number int num = 1; int n=7 // Outer
    5·1 answer
  • Robert is leading a project online that includes students from different cultures. Two of the students spend most of the time li
    7·1 answer
  • When security issues are a special concern, companies want to take extra steps to make sure that transmissions can’t be intercep
    7·1 answer
  • Which type of CPU instruction performs arithmetic calculations and stores the results in memory?
    14·2 answers
  • When adopting the use of social media in emergency management, it is important to have
    10·1 answer
  • I need to create a method named "root positive". which will either print the square root of the number passed to it or if the nu
    13·1 answer
  • Select the correct answer from each drop-down menu.
    8·1 answer
  • ________ is the art of manipulating people into breaking normal security procedures or divulging confidential information.
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!