1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Rudiy27
4 years ago
14

Pendant Publishing edits multi-volume manuscripts for many authors. For each volume, they want a label that contains the author'

s name, the title of the work, and a volume number in the form Volume 9 of 9. For example, a set of three volumes requires three labels: Volume 1 of 3, Volume 2 of 3, and Volume 3 of 3. Design an application that reads records that contain an author's name, the title of the work, and the number of volumes. The application must read the records until eof is encountered and produce enough labels for each work.

Computers and Technology
1 answer:
lbvjy [14]4 years ago
3 0

Answer:

Check the explanation

Explanation:

Pseudocode For Reading File:

start

Declarations

InputFIle records.txt

OutputFile result.txt

string authorName

string title

int numOfVol

open InputFile

open OutputFile

input authorName, title, numOfVol from records.txt

while not eof

output authorName

output title

output numOfVol

end while

close records.txt

close results.txt

END

The flowchart for reading the file can be seen below.

You might be interested in
On many advanced routers and switches, you can implement QoS through bandwidth management, such as __________, where you control
Mila [183]

Answer:

c. traffic shaping

Explanation:

A traffic shaping system is one that allows to adapt the incoming data traffic that comes from some node of the network giving it a special treatment called conformation of accepted traffic and thus allowing the frames to be forwarded through the network of data under traffic rules without having gone through some traffic shaping method, this can be detected as non-conforming traffic at the edge of access to the discarded metropolitan network.

Traffic shaping is a mechanism that alters the traffic characteristics of the cell flow of a connection to achieve better network efficiency while maintaining QoS objectives or in order to ensure that the cell flow conforms to traffic parameters according to the leaky bucket algorithm configuration of the traffic contract. Traffic shaping can be used in ATM, for example, to reduce peak speed, limit the length of the burst by means of adequate spacing of cells over time. The use and location of this function is network specific.

5 0
3 years ago
................,...
docker41 [41]

Answer:

there's a comma

Explanation:

after all those periods

6 0
4 years ago
Describe an application where a parallel circuit might work better than a series circuit.
PtichkaEL [24]

The application is electricity in the home.  Every light bulb, appliance,
and wall-outlet in your house is in parallel with all the others. 

If any electrical devices in your house were in series, then whenever
you turned any of those off, they would ALL go off. 

Also, the ones that needed the least power, like a night light, would get
the most, and the ones that needed the most power, like the refrigerator,
would get the least.

8 0
4 years ago
Find the error and rewrite the code with the error fixed.
kap26 [50]

Answer:

Explanation:

1st mistake: Barcode is written with upeer case, that's not the convention for variables in java, only classes.

2nd: Barcode is public, it is convention to always leave variables private then create getters and setters in case you need to change the value but never acess the variable outside the class it belongs. Also the class should at least have a default constructor in case you are going to instantiate an object outside it.

so the product class should be:

--------------------------------------------------------------------

public class Product {

private int barcode;

        public Product() {

        // default constructor

        }

public int getBarcode() {

 return barcode;

}

public void setBarcode(int barcode) {

 this.barcode = barcode;

}

}

-------------------------------------------------------------------------

3rd: in the main class now you can instantiate the 2 objects but you are gonna set the variable and get the value through the method, like this:

public class Main {

 

public static void main(String[] args) {

   

 Product prod1 = new Product();

 prod1.setBarcode(123456);

 Product prod2 = new Product();

 prod2.setBarcode(987654);

 System.out.println(prod1.getBarcode());

 System.out.println(prod2.getBarcode());

}

}

-----------------------------------------------------------------------------------

Assuming the 2 classes (main and product) are in the same package. But in case they are in different packages, just make sure to import the Product class into the Main class so that you can instantiante an object (new Product()) of it.

7 0
3 years ago
In what way(s) did the password you tried to use not meet the password policy requirements?
Gre4nikov [31]
Depends on the organization. Password policies differ between each organization. Generally on a mainstream point of view. Passwords should generally be complex. If your passcode is too short. This could pose a risk to your account and the companies data could be at risk.

Broad range of possible pass code rules that may be blocked.

7 character limit
Capital letter and/or number figure
No easy consecutive digit or character: e.g abcd1234
8 0
3 years ago
Other questions:
  • ​_______ consists of the analysis​ tools, technologies, and processes by which marketers dig out meaningful patterns in big data
    7·1 answer
  • A(n) __________________ device is a breath analyzer on your vehicle that is electronically connected to the ignition.
    11·1 answer
  • 1) which colour filter is used to pumps up black and white effects?
    13·1 answer
  • Which is true about POP3 and IMAP for incoming email?
    10·1 answer
  • Does anyone know to get Google updated if it failed to update?
    12·1 answer
  • Ethical design refers to...
    13·1 answer
  • How do open online courses help with independent learning
    6·2 answers
  • Question 1 of 10
    13·1 answer
  • A hydraulic lift has a mechanical advantage of 5. If the load weighs 350 N, what effort is required to lift the weight? Provide
    5·1 answer
  • Lucy wants to access the webpage. She is using her computer to access the webpage. What types of information will be in one fram
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!