1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Scilla [17]
3 years ago
15

a. Is there any functional difference between the class being instantiated in the following two ways? Balanced bal = new Balance

d ("abc", "xyz"); Balanced bal = new Balanced ("cab", "zxy"); b. Is there any functional difference between the class being instantiated in the following two ways? Balanced bal = new Balanced ("abc", "xyz"); Balanced bal = new Balanced ("abc", "zxy"); c. Is there any functional difference between the class being instantiated in the following two ways? Balanced bal = new Balanced ("abc", "xyz"); Balanced bal = new Balanced ("xyz", "abc"); d. What type is pushed onto the stack? A char? An int? An integer? explain. e. Under which circumstances is the first opeation performed on the stack (not counting the new operation) the top operation? f. What happens if the string expression, that is passed to the test method, is an empty string?
Computers and Technology
1 answer:
Advocard [28]3 years ago
8 0

Answer:

A,B,C -NO

D-Value type like int,char..

E.pop

D. it throws null exception

Explanation:

(A,B,C)There is no functional difference but  as the values passed to the parameterized constructor is different so you will get different outputs but functionality of the class didn't change  

(D) stack is a data structure which stores value types where as heap stores object types.In.stack actual value of the variable stored and heap address of the object stored

(E)the top operation on stack is always pop once we inserted the elements in a stack.if there are no elements in stack pop results null

(D) if the string we passed is null or empty to the test method it returns exception we need to handle that

You might be interested in
In a traditional systems development environment, security issues usually are less complex than with web-based systems, because
NikAS [45]

Answer:

The answer is "True".

Explanation:

Traditional techniques of application development were focused on pre-development stages. These control system flows through claims to design and upgrades and will then tests and repair are directional there.

  • It enables the user to create and run a machine-based data system.  
  • It uses program and device, that specifically the solutions, that enable manual information to be processed.
6 0
4 years ago
What is the technique used to divide information sets into mutually exclusive groups such that the members of each group are as
mars1129 [50]

Answer:

C. Cluster analysis

Explanation:

<em>Cluster analysis </em>or clustering is the task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups.

This statistical method is used to group similar objects into respective categories by <em>identifying trends and patterns</em>.

Cluster analysis is typically used in the <em>exploratory phase of research </em>when the researcher does not have any per-conceived hypotheses. It is commonly not the only statistical method used, but rather is done in the early stages of a project to help guide the rest of the analysis.

5 0
3 years ago
Each of k jars contains m white and n black balls. A ball is randomly chosen from jar 1 and transferred to jar 2, then a ball is
Elodia [21]

Answer:

#initial probability of getting a white ball

init_prob_white=15/25

#initial probability of getting a black ball

init_prob_black=10/25

#probability of getting a white ball given

#that we transferred a white ball in previous

#step is 16/26 which we represent by pww

pww=16/26

#probability of getting a white ball given

#that we transferred a black ball in previous

#step is 15/26 which we represent by pwb

pwb=15/26

#similarly

pbb=11/26;

pbw=10/26;

#The below two functions are recursive which calculate

#total probability right from the start

#The formula they use are

# Prob(W_k)=Prob(W_k-1)*Prob(W_k | W_k-1)+

# Prob(B_k-1)*Prob(W_k | B_k-1)

def pw(n):

if n==1:

return init_prob_white;

else:

return (((pww)*pw(n-1))+((pwb)*pb(n-1)))

def pb(n):

if n==1:

return 10/25;

else:

return (((pbb)*pb(n-1))+ ((pbw)*pw(n-1)))

#for k=5

k=5

x=pw(k)

print("After "+str(k)+" transfers probability="+str(x))

Explanation:

3 0
3 years ago
Select the correct answer.
Akimi4 [234]

Answer:

A. Alphanumerical key

Explanation:

pl please give me points

7 0
3 years ago
Which two components in a system might make a loud whining noise when there is a problem? Why?
umka21 [38]

The power supply and the Hard drive are the two components that makes loud whining noise when a problem is detected.

<u>Explanation:</u>

  • Computers can undergo what's called “coil whine,” which is a high-pitched noise that originates from the computer.
  • coil whine is an unacceptable noise emitted by an electronic component vibrating as power runs through an electrical cable.
  • It's easy to infer that the noise is an indication of influential computer malfunctioning or that something is cut, disconnected, or about to collapse.
  • It is normally caused by an electrical current passing through a power-regulating component like a transformer or inductor, inducing its electrical wiring to vibrate at a shifting frequency.
  • Luckily, coil whine is normal behavior.
5 0
3 years ago
Other questions:
  • What does using indirect quotations allow a writer to do?
    7·2 answers
  • g Write a program that prompts the user for an integer n between 1 and 100. If the number is outside the range, it prints an err
    5·1 answer
  • How do you use a iPad when it has a password ?
    9·2 answers
  • To improve at keyboarding, it is a good idea to master frequently typed words.
    14·2 answers
  • Your S3 backed website is consistently receiving over 400 read requests per second and is steadily rising. What can you do to ac
    14·1 answer
  • You want to receive alerts if unusual activity is detected relating to the Web servers deployed in your perimeter network. What
    7·1 answer
  • . The electric company charges according to the following rate schedule: 9 cents per kilowatt-hour (kwh) for the first 300 kwh 8
    12·1 answer
  • A(n) ____ is a list of authorization rights attached to an object - in other words, who can access that device or application an
    13·1 answer
  • PLz answer I really need the answer
    5·2 answers
  • when connecting to a wireless local area network (wlan), what is the most important fact about the service set identifier (ssid)
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!