Answer:
Explanation:
The following code is written in Java. I recreated the entire Child class as described with the instance variables and the doubleWeight method. Then created the getter and setter methods for both the weight and height variables.
class Child {
double weight, height;
public double doubleWeight() {
double superWeight = weight * height;
return superWeight;
}
public double getWeight() {
return weight;
}
public void setWeight(double weight) {
this.weight = weight;
}
public double getHeight() {
return height;
}
public void setHeight(double height) {
this.height = height;
}
}
Complete Question:
Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come. Which of the following firewall architecture is designed to host servers that offer public services?
a) Bastion Host
b) Screened subnet
c) Screened host
d) Screened
Answer:
b) Screened subnet
Explanation:
In Computer science, Firewall implementation and design for an enterprise can be a daunting task. Choices made early in the design process can have far-reaching security implications for years to come.
Screened subnet firewall architecture is designed to host servers that offer public services.
In network security and management, one of the network architecture used by network engineers for the prevention of unauthorized access of data on a computer is a screened subnet. A screened subnet can be defined as a network architecture that uses a single firewall with three screening routers as a firewall.
<em>A screened subnet is also known as a triple-homed firewall, this is because it has three (3) network interfaces;</em>
1. Interface 1: it is known as the external or access router, which is a public interface and connects to the global internet.
2. Interface 2: it is known as the demilitarized zone or perimeter network, which acts as a buffer and hosted public servers (bastions host) are attached herein.
3. Interface 3: it is known as the internal router, which is a subnet that connects to an intranet.
<em>The screened subnet when properly configured helps to prevent access to the internal network or intranet. </em>
Answer:
C. FIFO
Explanation:
The first-in, first-out (FIFO) page replacement algorithm is a low-overhead algorithm that requires work on the part of the operating system. On a page fault, the frame that has been in memory the longest is replaced.
Using FIFO algorithm implies that
a page which was brought into memory first will be removed first since variable was initialized very early. it is in the set of first in pages that will be removed.
It is the simplest page replacement algorithm. The operating system keeps track of all pages in the memory in a queue, the oldest page is in the front of the queue. When a page needs to be replaced page in the front of the queue is selected for removal that is first in first out.
A memory page containing a heavily used variable that was initialized very early and is in constant use is removed, then the page replacement algorithm used is called First In First Out.
Answer:
D) Java class libraries are not portable
Explanation:
The Java Class Library (JCL) is an array of enthusiastically loadable libraries that Java applications can identify and refer to at run time. Since the Java Platform is independent of any particular operating system, applications can’t depend on any of the platform-native libraries.
The library is a massive collection and works of prebuilt classes that is distributed through the Java SE platform.
Answer:
50
Explanation:
as binary search will search the array by dividing it into two halves till it find the value.