Answer:
These all are constructors.
CONS
(CONS A B)
makes a pair like this: (A . B)
In other words, A is the CAR of the pair; B is the CDR of the pair.
For example:
(CONS 4 5) ==> (4 . 5)
(CONS 4 '(5 6)) ==> (4 5 6)
[The pair (4 . (5 6)) is the same thing as (4 5 6)].
APPEND
(APPEND A B)
makes a new list by replacing the final nil in A with the list B. A and
B must be proper lists.
For example:
(APPEND '(4) '(5 6)) ==> (4 5 6)
This takes any amount of number and put in this order
LIST
In this ,it will return a list whose elements are value of arguments in the order as it appeared in the LIST.It can take any amount of parameters
For example,
(LIST 4) ==> (4)
(LIST 4 5) ==> (4 5)
(LIST 4 5 '(6 7)) ==> (4 5 (6 7))
(LIST (+ 5 6)(* 5 6)) ==> (8 9)
Answer:
The answer is "O(n2)"
Explanation:
The worst case is the method that requires so many steps if possible with compiled code sized n. It means the case is also the feature, that achieves an average amount of steps in n component entry information.
ii. How do the first three security concepts relate to these four attacks
Answer and Explanation:
I and II answered
Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.
Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.
Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.
Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.
Answer: d)The cross sections of the slices are disks.
Explanation:The slicing method deals with the elimination of the horizontal layer of the solid body .It is considered that disk method is the special case of the slicing method.
Disk method consist of the slices that are used for the estimated volume of the solid body of revolution that are known as disk.The solid body revolving around a line and its volume is estimated.Thus, the correct option is option (d).
A String variable named sentence that has been initialized, write an expression whose value is the number of characters in the String referred to by sentence. Python: sentence = “this is the sentence.” size = lens (sentence), C++: string sentence = “this is the sentence.” int size = sentence.
Python is an programming language with the integration of dynamic semantics for web and app development, extremely attractive in the field of Rapid Application Development.
Python is simple in comparison to other language program, so it’s easy to learn and understand well; it needs a unique syntax which is mainly focus on readability.
Developers can read and translate Python code in a easy way, than other languages and reduces the cost of program maintenance and development.
For more details regarding python, here
#SPJ2
B. Neither Technician A nor Technician B
C. Both Technician A and Technician B
D. Technician B only
b, a 2 to 1 increases doubles speed and reduces speed by half
JLabel
JTextField
JFrame
Answer:
JTextField
Explanation:
JTextField is a Swing control which can be used for user input or display of output. It corresponds to a textfield and can be included with other controls such as JLabel, JButton,JList etc. on a comprehensive user interface which is application dependent. JTextField supports a read-write mode where the user can enter a value and it also supports a read-only mode which can be used to display non-editable output to the user.