Answer:
import java.lang.Object
import java.lang.Math
public class RegularPolygon extends java.lang.Object{
public void randomize(RegularPolygon c){
int min = 10, max1 = 20;
double min1 = 5, max1 = 12;
double range = (max - min) + 1;
double range1 = (max1 -min1) + 1
int side = (Math.random() * range) + min;
double len = (Math.random() * range1) + min1;
c.setNumSides(side);
c.setSideLength( len);
}
public static void main(String[] args) {
RegularPolygon r = new RegularPloygon();
randomize(r);
}
}
Explanation:
The randomize method accepts a regular polygon class as its only parameter and assigns a random number of sides and the length of these sides with the 'Math.random' function.
<span>Answer:
-Software architecture isn't about big design up front;
-Every software team needs to consider software architecture;
-The software architecture role is about coding, coaching and collaboration;
-You don't need to use UML;
-A good software architecture enables agility.</span>
A benefit, profit, or value of something that must be given up to acquire or achieve something else. Since every resource (land, money, time, etc.) can be put to alternative uses, every action, choice, or decision has an associated opportunity cost<span>.</span>
Answer:
2.489 dB
Solution:
As per the question:
Power ratio, 
The Equivalent of this power ratio in decibel or dB is calculated by taking the log of the power ratio as below:


Thus the value of the power ration in decibel comes out to be 2.489 dB
Answer:
By modifying the hidden form values that is in a local copy of the company web page
Explanation:
In a situation were the hacker successful change the price of the items he/she purchased through the web site of the company's in which the company web server as well as the company Oracle database were not compromised directly which means that the most likely method in which the attacker used to modified the sale price of the items he/she purchased was by modifying the HIDDEN FORM VALUE that was in the local copy of the company web page making it easy for the HIDDEN FORM VALUE to be vulnerable to the hacker because the hidden form value did not store the company server side information or data but only store the company software state information which is why HIDDEN FORM VALUE should not be trusted.