Write a JAVA program that reads from the keyboard a small password and then offers two options:
1. enter your name and a filename to save or
2. enter a file name to load.
With the option 1 proceed to save to the file an encrypted version of your name (details below), with the option 2 proceed to load the information from the file and decrypt the name and print it to the screen. The options 1 and 2 are in reverse (1 saves the encrypted information to the file, 2 decrypts the information from the file). Details of the encryption: Say your name is Andrei and you chose the password 1234, then you do XOR between the ASCII code for A (first letter in your name) and the ASCII code for 1(first letter in your password), I will denote this operation (A,1) then you do XOR between n and 2 (n,2) (second letter in your name with second letter in password) and so on, thus we will have the following operations to perform: (A,1) (n,2) (d,3) (r,4) (e,1) (i,2). Obviously, if you would choose the password qwer then the XOR operations will be between the following pairs: (A,q)(n,w)(d,e)(r,r)(e,q)(i,w). The trick is that the encrypted text can be decrypted due to the following property of XOR: A XOR B=C; C XOR B=A, thus if I have the results of the XOR operations in the file (and this is your name encrypted) then it is sufficient to do XOR with the same password (with the same ASCII codes) and I will get back the original string. For example, with the first password, (A XOR 1) XOR 1 =A, (n XOR 2) XOR 2=n and so on: ((A,1),1) ((n,2),2) ((d,3),3) ((r,4),4) ((e,1),1) ((i,2),2)= A n d r e i.

Answers

Answer 1

To write a Java program in that conditions you will need to use the following concepts:

ASCII codes - to perform the XOR operations with the given passwordXOR operator - to encrypt and decrypt the nameReading/writing to files - to save and load the encrypted information

You can use the following Java code to read a small password and then offer two options:

Scanner in = new Scanner(System.in);
System.out.print("Please enter a small password: ");
String password = in.nextLine();

System.out.println("Please choose one of the following options:");
System.out.println("1. Enter your name and a filename to save");
System.out.println("2. Enter a file name to load");

int option = in.nextInt();
switch (option) {
 case 1:
   // Enter your name and a filename to save
   break;
 case 2:
   // Enter a filename to load
   break;
 default:
   System.out.println("Invalid option!");
}

Then you can use the ASCII codes of each letter of the name and the password to perform the XOR operations and encrypt/decrypt the name. After that, you can save the encrypted information to a file and load it again when needed.

Learn more about ASCII code https://brainly.com/question/18844544

#SPJ11


Related Questions

Write a script in HTML for displaying your name in brown color.

Answers

Answer:

I don't quite understand the question. If you mean "create page in HTML", see image 2. If you mean "create script that is placed in the HTML page", see image 1

HTML is not a programming language. It is a markup language. You should write scripts in JavaScript or other programming languages.

1

<!DOCTYPE html>

<html>

<head>

 <meta charset="utf-8">

</head>

<body>

 <h1>Hello world!</h1>

 <*cript>

  function paint() {

   document.querySelector("h1").style.color = "brown";

  }

  setTimeout(paint, 2000)  

 </*cript>

</body>

</html>

2

<!DOCTYPE html>

<html>

<head>

 <meta charset="utf-8">

 <style>

  h1 {

   color: brown;

  }

 </style>

</head>

<body>

 <h1>Hello world!</h1>

</body>

</html>

Write a script in HTML for displaying your name in brown color.
Write a script in HTML for displaying your name in brown color.

Draw a DFD( Data Flow Diagram) for the following case study: Please read the case study carefully and draw the DFD according to the case study.

Case Study:
This case is a simplified (initial draft) of a new system for the University Library. Of course, the library system must keep track of books. Information is maintained about both book titles and the individual book copies. Book titles maintain information about title, author, publisher, and catalog number. Individual copies maintain copy number, edition, publication year, ISBN, book status (whether it is on the shelf or loaned out), and date due back in.


The library also keeps track of patrons to the library. Since it is a university library, there are several types of patrons, each with different privileges. There are faculty patrons, graduate student patrons, and undergraduate student patrons. Basic information about all patrons is name, address, and telephone number. For faculty patrons, additional information is office address and telephone number. For graduate students, information such as graduate program and advisor information is maintained. For undergraduate students program and total credit hours are maintained.


The library also keeps information about library loans. A library loan is a somewhat abstract object. A loan occurs when a patron approaches the circulation desk with a stack of books to check out. Over time a patron can have many loans. A loan can have many physical books associated with it. (And a physical book can be on many loans over a period of time. Information about past loans is kept in the database.) So, in this case, it is recommended that an association class be created for loaned books.


If a book is checked out that a patron wants, he/she can put that title on reserve. This is another class that does not represent a concrete object. Each reservation is for only one title and one patron. Information such as date reserved, priority, and date fulfilled is maintained. When it is fulfilled, the system associates it with the loan on which it was checked out.



​Patrons have access to the library information to search for book titles and to see whether a book is available. A patron can also reserve a title if all copies are checked out. When patrons bring books to the circulation desk, a clerk checks out the books on a loan. Clerks also check books in. When books are dropped in the return slot, the clerks check them in. Stocking clerks keep track of the arrival of new books.



​The managers in the library have their own activities. They will print out reports of book titles by category. They also like to see (online) all overdue books. When books get damaged or destroyed, they will delete information about book copies. Managers also like to see what books are on reserve.

Answers

A Data Flow Diagram (DFD) is a graphical representation of the flow of data within a system. Based on the given case study of a University Library system, the following DFD can be drawn:

Level 0 DFD:

- The main process in the center represents the University Library system.

- The external entities are represented by rectangles on the edges of the diagram, which include Patrons, Stocking Clerks, Clerks, and Managers.

- The data flow between the external entities and the main process indicate the interactions between them.

- The main process interacts with various data stores, including Book Titles, Individual Copies, Patrons, Library Loans, Reservations, and Reports.

Level 1 DFD:

- The main process is decomposed into more detailed processes, such as Book Management, Patron Management, Loan Management, and Report Generation.

- The data flow between the processes and data stores represents the exchange of information and data within the system.

- Specific data stores are shown for each process, indicating the data being stored and retrieved.

Learn more about Data Flow Diagrams here:

https://brainly.com/question/29418749

#SPJ11

Explain how trends such as BYOD, online collaboration, video, and cloud computing are changing the way we interact.
 

Answers


Online courses teach students how to manage their time better since the student bears the responsibility of engaging with the course instead of simply showing up to class on an assigned day and time. As a result, students not only gain knowledge from the coursework, but they also sharpen their time management skills

In collaborative group discussions, learners learn to listen attentively to each other and value the efforts of shared knowledge and input. Online discussion technology also helps learners respond to questions, participate, and offer peer feedback to support the sharing of new information

Should Valorant have agent skins? Why/Why not

Answers

Answer:

I mean sure why not. Many games already have them and it'll buff its income. The rarity system can really increase the excitement in its players and let them play the game most often

when you create a user with the useradd command, what is the immediate state of it?

Answers

When a user is created in Linux using the useradd command, the immediate state of the created account is locked.

The useradd command can be invoked in other to create a new user account using the following command

sudo useradd fast_user

#fast_user is the name of the account created

At this point, the account has been created but it will be locked until the required login details are set. This can be achieved using the line ;

sudo passwd fast_user

Therefore, an account created using the useradd command is in a locked state.

Learn more :https://brainly.com/question/12135504?referrer=searchResults

suppose that the language uses dynamic scoping. what is the output

Answers

Logo, Emacs Lisp, LaTeX, and the shell languages bash, dash, and PowerShell are a few examples of languages that make use of the dynamic scope. Implementing dynamic scope is not too difficult.

A viable alternative to globally scoped variables is dynamic scoping. The other functions will all output in hexadecimal when a function instructs them to "let current numeric base = 16; call other functions;". The base will then revert to its initial state after they depart and the base-setting procedure exits. The shallow binding dynamic scope would output "5". This is due to the fact that dynamic scope uses the bindings (combinations of variables and values) from the method it is called from. Which value you obtain when looking up the variable depends on scoping. The "nearest" definition used by static scoping to match variable references to assignments in your program text.

Learn more about Learn numeric more about

https://brainly.com/question/27922641

#SPJ4

What happens if you run a delete command that does not contain a where clause?

Answers

All rows in the table will be destroyed if you issue a delete command without a where clause.

What happens if you execute a DELETE command without a WHERE clause?

REMOVE Syntax Which record needs to be erased is indicated by the WHERE clause. The entire table's records will be removed if the WHERE clause is left off.

If you type DELETE, what will happen?

We don't need to be concerned about retrieving any data from the table after executing the delete command, and we don't need to be concerned about manipulating any data we receive back from the table. We only instruct the database to remove a certain record, and it either does so or it doesn't. That much is obvious.

To know more about delete command visit :-

https://brainly.com/question/8305259

#SPJ4

Please help answerr. You don’t have to answer all questions just whichever one you know :::))

a Give the meaning of the abbreviation GPS. (1 mark)
b Explain what is needed for a GPS system to become a
satellite navigation system as used in cars. (1 mark)
c Give the name of the input device used with a
satellite navigation system.
(1 mark)
d Describe three uses for a GPS system other than
for a satellite navigation system.
(3 marks)

Answers

a. GPS means Global Positioning System

Automated Deployment is one of the prerequisite for DevOps Implementation.1. True2. False

Answers

True I think………………………..

Automated Deployment is one of the prerequisite for DevOps Implementation is a true statement.

Automated deployment

Automated deployment provides the ability to move your software between testing and production environments by using automated processes.

In other words, it allows organizations to release new features faster and more frequently.

Automated deployment allows faster approach to development, production  and deployment.

learn more on automated deployment: https://brainly.com/question/17052494

#SPJ2

John is directing a television series. He has to shoot a scene that presents the lead character in a dominating and commanding position.

What
shooting technique should he use?

(NO LINKS!!!!)

A low angle
B. high angle
C. Dutch tilt
D. front angle

Answers

The answer is D hope this helped.

Answer:

it is A or B

Explanation:

I know it is either A or B because I took the test and tried Dutch tilt n front angle, got them both wrong on my 1st and second try.

Which operating system function has a steeper learning curve and can potentially break the system without careful use of its operations

Answers

Answer:

Command line interface

Explanation:

Given that Command Line Interface requires a user to typed in commands accurately, otherwise a spelling error of the command will lead to failure or can break the system.

Also, by using command line interface requires a user to avoid a wrong instruction, otherwise the system may break and will require starting from the beginning.

Hence, Command-Line-Interface function has a steeper learning curve and can potentially break the system without careful use of its operations

A______ is a type of malware that self-replicates and spreads through computers and networks. Select your answer, then click Done.
O surge protector
O clipboard
O DVD disk
O worm

Answers

A worm is a type of malware that self-replicates and spreads through computers and networks.   A worm is a type of self-replicating malware that spreads through computers and networks.

A worm is a malicious software program that can replicate itself and spread to other computers and networks without requiring any user intervention. Unlike viruses, worms do not need to attach themselves to existing files or programs. They can independently exploit vulnerabilities in operating systems or network protocols to infect other systems. Once a worm infects a computer, it can use various methods to propagate itself. This can include exploiting security vulnerabilities, using email attachments or links, or leveraging shared network resources. Worms can quickly spread across networks, infecting multiple computers and causing widespread damage. The primary purpose of worms is often to disrupt or compromise computer systems and networks. They can steal sensitive information, delete files, create backdoors for remote access, or launch large-scale distributed denial-of-service (DDoS) attacks. To protect against worms, it is crucial to maintain up-to-date security software, apply security patches and updates, practice safe browsing habits, and regularly back up important data.

Learn more about  malware here:

https://brainly.com/question/29786858

#SPJ11

Identify industries and career-based activities in which computer technology makes people's work easier or more efficient.

Answers

Answer:

Those helpful safety or convenience features in modern vehicles? They are all programmed!

Explanation:

he movsw instruction can copy signed words as well as unsigned words, from one memory location to another True or False

Answers

The movsw instruction is an assembly language instruction that is used to move a word (16 bits) from one memory location to another. The question at hand is whether the movsw instruction can copy signed words as well as unsigned words. The answer to this question is True.

When the movsw instruction is used to copy data from one memory location to another, it copies the data byte by byte. This means that it does not differentiate between signed and unsigned data. The movsw instruction simply copies the data as it is stored in memory, regardless of whether it is signed or unsigned.However, it is important to note that when the movsw instruction is used to copy signed data, the sign bit must be preserved. This is because the sign bit is used to indicate whether the data is positive or negative. If the sign bit is lost during the copying process, the data may be interpreted incorrectly.In conclusion, the movsw instruction can copy both signed and unsigned words from one memory location to another. However, when copying signed data, the sign bit must be preserved to ensure that the data is interpreted correctly.

For such more questions on data

https://brainly.com/question/30395228

#SPJ11

4 Two people play a counting game.
The rules of the game are as follows:
The first player starts at 1
Each player may choose one, two or three numbers on their turn and the numbers must be in ascending order
Players take it in turns to choose
The player who chooses "15" loses the game. For example, if the first player chooses three numbers (1, 2, 3) then the second player could choose one number (4), two numbers (4, 5) or three numbers (4,5,6).
The first player then takes another go.
-Write an algorithm using pseudocode that allows two players to play this game.
The algorithm should:
--Alternate between player 1 and player 2
--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3
--Display the numbers that the player has chosen Display a suitable message to say --which player has won once the number 15 has been displayed​

Answers

Answer:

algorithm should:

--Alternate between player 1 and player 2

--Ask the player how many numbers they would like to choose, ensuring that this is between 1 and 3

An algorithm using pseudocode that allows two players to play the game is:

BEGIN Player One num "1"ASCENDING order num;TURN Player One num;TURN Player Two num;INCREMENT IF there is num "15"THENPLAYER loses

What is a Pseudocode?

This refers to the use of plain language to describe the sequence of steps for solving a problem.

Hence, we can see that from the given game rules about the input that is made by a player where he starts at 1 and any player that selects 15 loses the game and there is an increment is displayed in a rough form above.

Read more about pseudocodes here:

https://brainly.com/question/24953880

#SPJ2

There is no ability to check or monitor if your email address was found on the dark web.
a. True
b. False

Answers

The statement " There is no ability to check or monitor if your email address was found on the dark web" is True.

What is the web?

The World Wide Web, or simply "the Web," is an information system that enables users to access papers and other web resources over the Internet. Through web servers, which can be accessed by software like web browsers, documents and downloadable media are made available to the network. Not just scientists had access to the internet before the advent of the world wide web. It unified the globe in a way that facilitated communication, sharing, and information access for everyone. The World Wide Web, sometimes known as the Web, the WWW, or just the Web, is a network of open websites that may be accessed online. The Web is not synonymous with the Internet: it is one of many applications created on top of the Internet.

To learn more about the web, use the link given
https://brainly.com/question/13211964
#SPJ4

Branch of philosophy that seeks to resolve questions of morality.

Answers

The branch of philosophy that seeks to resolve questions of morality is known as ethics. Ethics deals with principles and values that guide human behavior and decision-making. It explores what is right and wrong, good and bad, just and unjust, and how we ought to live our lives in a moral sense.

It also examines the nature of moral judgments, the sources of moral authority, and the foundations of moral reasoning. The study of ethics is essential in our lives as it provides us with a framework for making moral choices and developing our own sense of morality. Overall, ethics is a critical field in philosophy that helps us understand the moral implications of our actions and guides us towards leading a virtuous and ethical life.


The branch of philosophy that seeks to resolve questions of morality is called "Ethics" or "Moral Philosophy." This area of study deals with concepts such as right and wrong, good and bad, virtue and vice, justice, and responsibility. Ethicists explore moral principles, develop ethical theories, and examine the implications of our actions and decisions.

To know more about philosophy visit:-

https://brainly.com/question/28428294

#SPJ11

what is filter in computer​

Answers

Answer:

hope it helped you a little

what is filter in computer

1)Which tool can you use to find duplicates in Excel?
Select an answer:
a. Flash Fill
b. VLOOKUP
c. Conditional Formatting
d. Concatenation
2)What does Power Query use to change to what it determines is the appropriate data type?
Select an answer:
a.the headers
b. the first real row of data
c. data in the formula bar
3)Combining the definitions of three words describes a data analyst. What are the three words?
Select an answer:
a. analysis, analyze, and technology
b. data, programs, and analysis
c. analyze, data, and programs
d. data, analysis, and analyze

Answers

The tool that you can use to find duplicates in Excel is c. Conditional Formatting

b. the first real row of datac. analyze, data, and programs

What is Conditional Formatting?

Excel makes use of Conditional Formatting as a means to identify duplicate records. Users can utilize this feature to identify cells or ranges that satisfy specific criteria, like possessing repetitive values, by highlighting them.

Using conditional formatting rules makes it effortless to spot repeated values and set them apart visually from the other information. This function enables users to swiftly identify and handle identical records within their Excel worksheets, useful for activities like data examination and sanitation.

Read more about Conditional Formatting here:

https://brainly.com/question/30652094

#SPJ4

what does the windows update feature allow you to do?
a. scan email attachments
b. install important patches
c. scan for viruses
d. block pop-ups

Answers

The answer is D
Explanation: none

Answer:

B

Explanation:

The purpose of Windows Update, is to bring feature updates and hotfixes to your Windows PC, it also allows for updating services such as the Windows Defender virus definitions. However, Windows Update does not block popups, but instead installs important updates for your PC.

Definition of high-level language in computer​

Answers

Answer:

A high-level language is a programming language designed to simplify computer programming. It is "high-level" since it is several steps removed from the actual code run on a computer's processor. ... Most common programming languages are considered high-level languages.

¯\_(ツ)_/¯

high-level language is a programming language designed to simplify computer programming

printer is hardware or software​

Answers

Answer:

the printer is hardware

9. Which of the following will best protect your computer from viruses and hackers?
A. A passcode
O B. A Trojan horse
O C. Avoiding strangers on the Internet
OD. Antivirus software

Answers

Answer:

D

Explanation:

I believe its Antivirus software because it protects your computer from virus and hackers . If i am wrong im so sorry

Have A Good Day

Antivirus software best protect your computer from viruses and hackers.

The correct option is D.

Antivirus software:

Antivirus software is a program that is designed to protect computer against harmful software, also known as malware. Antivirus software scans your computer for any viruses and malware and removes them from your system.

Antivirus software is crucial in protecting computer from viruses and hackers. It can detect and eliminate malicious software before it can damage your computer or compromise your data.

Therefore, having antivirus software installed on your computer is important in keeping your system secure and preventing unauthorized access by hackers and other malicious actors.

The correct option is D.

Know more about Antivirus software,

https://brainly.com/question/32545924

#SPJ3

Spending time getting to know the OS in your environment requires all of the following except _______________.
Understanding use of cloud services
Working with command-line
Only using GUI
Working with company administrators

Answers

Spending time getting to know the OS in your environment is an important task that can help improve your productivity and efficiency. It involves familiarizing yourself with the features, tools, and capabilities of the operating system that you are using, which can vary depending on the type of OS and the specific environment.

To effectively get to know the OS in your environment, you will need to understand how to work with both the graphical user interface (GUI) and the command-line interface (CLI). The GUI is typically the primary way that most users interact with the OS, providing a visual representation of the OS and its various functions. However, the CLI can often provide greater control and flexibility, allowing you to execute commands and automate tasks more efficiently.


In summary, spending time getting to know the OS in your environment requires working with both the GUI and CLI, collaborating with company administrators, and understanding the specific features and tools of your OS. It does not require understanding the use of cloud services.

To know more about operating visit :

https://brainly.com/question/29949119

#SPJ11

Which of the following accounts for the most mobile ad spending?A) display adsB) search engine advertisingC) video adsD) SMS text messages

Answers

According to recent studies, search engine advertising (option B) accounts for the majority of mobile ad spending, with estimates ranging from 50-60% of total mobile ad spending.

This is likely due to the fact that search engine advertising allows for highly targeted and personalized ads based on user search behavior and intent. Display ads (option A) also make up a significant portion of mobile ad spending, with estimates ranging from 20-30%. Video ads (option C) and SMS text message ads (option D) make up smaller percentages of mobile ad spending, with estimates ranging from 10-20% and less than 5% respectively. However, it's worth noting that the distribution of mobile ad spending may vary based on industry and geographic location.

To know more about search engine visit :

https://brainly.com/question/18559208

#SPJ11

you have a nano server named nano1. you deploy several containers to nano1 that use an image named image1. you need to deploy a new container to nano1 that uses image1. what should you run?

Answers

To deploy a new container to nano1 that uses image1, the following command should be run: docker run image1More than 100 containers can be run in nano servers without any difficulties. What is Docker?

Docker is an open-source platform that allows you to construct, distribute, and operate containers. Containers are self-contained and easily deployable software units that contain an application and all of the dependencies that it needs to operate properly. Each container is isolated from other containers on the same system, allowing for increased consistency and less overhead in terms of system resources.

Docker allows developers and operations personnel to create, distribute, and operate applications more quickly and efficiently than traditional software development and deployment processes, thanks to its versatility and ease of use. It also enables containerized applications to be run in almost any environment, including the cloud, on-premises data centers, and hybrid environments, making it an essential tool for businesses of all sizes.

To know more about command visit:

https://brainly.com/question/32329589

#SPJ11

what is computer generation​

Answers

Answer:

Generation in computer terminology is a change in technology a computer is/was being used which includes hardware and software to make of an entire computer system .

Elgin is taking notes for his presentation about how people drink too much soda and other sugary drinks, and he finds information about how some cities and states are taxing sugary beverages at a higher rate to encourage people to make healthier choices. In which portion of Elgin's presentation does this information fit?

Answers

Answer:

a solution to the problem

Explanation:

In organizing his text, the move taken by some cities to help their citizens make better choices will fall into the part where he lists or proffers solutions to the excessive intake of soda and sugary drinks by people. Prior to this part, he might begin by explaining what the problem is, and including data that shows the impact of this problem in the society.

When concluding the text, he may now include details of how the government has intervened in remedying the situation.

design the logic for a program that allows a user to enter 20 numbers, then displays each number and its difference from the numeric average of the numbers entered.

Answers

The program uses an array to store 20 numbers entered by the user, calculates the average, and displays each number with its difference from the average.

Logic for the program:

1. Initialize variables sum and count to 0.

2. Create an array to store the 20 numbers entered by the user.

3. Use a loop to iterate 20 times:

  a. Prompt the user to enter a number and store it in the array.

  b. Add the entered number to the sum.

  c. Increment the count variable.

4. Calculate the average by dividing the sum by the count.

5. Use a loop to iterate through the array:

  a. Display each number.

  b. Calculate the difference between the number and the average.

  c. Display the difference.

6. End the program.

The logic for the program involves using an array to store the 20 numbers entered by the user. A loop is used to iterate through the array and perform calculations for each number.

The sum variable keeps track of the total sum of the numbers, and the count variable keeps track of the number of entries. After the loop, the average is calculated by dividing the sum by the count. Another loop is used to iterate through the array again, displaying each number and its difference from the average.

The difference is calculated by subtracting the average from each number. By implementing this logic, the program will allow the user to enter 20 numbers and display each number along with its difference from the average.

To learn more about program  click here

brainly.com/question/14368396

#SPJ11

Drag each label to the correct location on the image. Match the movie qualities with the right period of movies.

Answers

Bro where is the table
Other Questions
Lincolnshire Lumber sells boards for many uses including wood floors. For floors, the boards are sold to local installers or do-it-yourself homeowners. The boards go through up to four processes, although only the first two are completed for all sales.Lincolnshire employs 10 workers in the Flooring Department who are each trained and experienced in all four processes. Each employee works 35 hours per week for 50 weeks per year. Lincolnshire allocates 10 percent of the workers' time to training and staff meetings, The total annual cost for Flooring, excluding the cost of the wood itself but including the tools, machinery, labor and so on, is $737,100.The supervisor of the flooring department estimates the following time for each of the four processes for a unit of wood as sold:Cutting: 11 minutesPlaning: 18 minutesDistressing (optional): 24 minutesStaining (optional): 27 minutesDuring the year, Flooring received orders for 12,000 units. Of these, 7,000 units were distressed and 9,500 units were stained.Required:a. What is the cost per minute for activities in Flooring?Note: Round your answer to 2 decimal places.b. What is the cost of a unit that is cut, planed, and stained?Note: Round your intermediate calculations and final answer to 2 decimal places.c. How many minutes of unused capacity did Flooring have for the year?d. What was the cost of the unused capacity in Flooring?Note: Round your intermediate calculations to 2 decimal places and round your final answer to the nearest whole dollar. 1. Describe President Andrew Jackson's actions surrounding the Second National Bank. Yourresponse should identify Jackson's position on a national bank and explain his reasoning. Thendescribe the effect Jackson's position on the bank had on the nation's economy. (4 points)I Sean wants to talk to his teenage daughter about the dangers of smoking. Which of the following suggestions is least likely to persuade Sean's daughter to resist the pressure to smoke?A. Ask her to think about the negative effects of smoking (e.g., cancer).B. Ask her to make a public commitment to not smoke.C. Increase her fear of smoking by showing her pictures of lung cancer.D. Tell her she is forbidden from smoking and threaten to take her car away if she ever tries smoking. use the following information for the next two problems: the expected returns for stocks a and b have the following probability distributions: state of the economy probability stock a stock b below average 0.15 -12 % -15 % average 0.60 13 16 above average 0.25 18 28 vi calculate the expected rate of return for stock a. a. 14.35 percent b. 10.50 percent c. 19.00 percent d. 14.10 percent e. 12.25 percent vii calculate the coefficient of variation for stock b, assuming b's expected return is 14.35%. (keep 4 decimals throughout problem.) a. 9.6825 b. 0.9421 c. 1.2686 d. 1.3251 e. 0.9282 compute the determinants in exercises 9-14 by cofactor expansions. at each step, choose a row or column that involves the least amount of computation. [\begin{array}{ccc}6&3&2&4&0\\9&0&-4&1&0\\8&-5&6&7&1\\3&0&0&0&0\\4&2&3&2&0\end{array}\right] Read the following scenario and then label the stimuli and responses. Benny decides to teach his fish to swim to the top of the fish bowl. Currently, his fish swim to the top of the bowl only after he feeds them. Benny uses a flashlight to shine light in the bowl before sprinkling in the fish food. After a week, when Benny shines a light in the bowl, the fish swim to the top of the tank whether or not he has sprinkled in food. Unconditioned Stimulus fish food d unconditioned Response light from the flashlight Neutral Stimulus -Conditioned Stimulus swim to the top of the tank Conditioned Response When the concentration of sodium in the blood plasma (the watery portion of blood) is higher than the concentration of sodium inside the blood cells, which of the following will occur?Water will flow from the blood cells into the blood plasma The nurse is educating a parent of a toddler with Down syndrome. Which statement by the parent indicates teaching was effective?a. "I hope my child does well with the various therapies we have arranged."b. "I am aware my child needs to be immunized on a delayed schedule."c. "I will continue to offer my child low fiber foods for meal and snacks."d. "I know my child will meet developmental milestones earlier than my other children." Identify the letter indicating a gland which secretes a hormone controlling basal metabolic rate.a. Eb. Ac. Cd. Be. D When the bicycle manufacturer Trek determined that some consumers use bikes for green transportation whereas others use them for a hobby, it was most likely assessing the _____ of its bicycles to consumers. -brand equity -associated services -brand awareness -core customer value -physical characteristics The word extracted through lemmatisation are called A band of color appears behind text in paint whe we choose the option____ A company purchases merchandise for $600 plus a freight charge of $60 from a supplier, payment is due in 30 days. The $60 freight charge will be recorded as a (debit/credit)________to the__________ account in the amount of $60. An inexperienced bookkeeper prepared the following trial balance that does not balance. Prepare a correct trial balance, assuming all account balances are normal. SHERIDAN COMPANY Trial Balance December 31, 2017 Debit CreditCash $22,380 Prepaid Insurance $4,610 Accounts Payable 4,080 Unearned Service Revenue 4,170 Common Stock 10,000 Retained Earnings 6,600 Dividends 7,050Service Revenue 26,710 Salaries and Wages Expense 12,550 Rent Expense 4,970 $39,100 $64,020 Which of the following is true regarding business professionals who frequently ask questions and offload their own tasks to others instant messages or email?They get a reputation as takers rather than givers.They can be easily misunderstood or misinterpreted.They help business professionals resolve problems more quickly.They allow business professionals to connect with better understanding. An RR recommends to a client that she invest in a mutual fund just prior to the fund's ex-dividend date. This recommendation[A] is suitable because it ensures an immediate return on the client's investment[B] is not suitable because the client would only be eligible to receive the dividend if shares are bought three days after ex-dividend date[C] is not suitable because the client may be subject to additional income tax liabilities and could have bought the shares at a reduced price[D] is suitable because fund prices usually rise shortly after the ex-dividend date A set of facts and circumstances that would induce a reasonably intelligent and prudent person to believe that a particular other person has committed a specific crime. Also reasonable grounds to make or believe an accusation. Probable cause refers to the necessary level of belief that would allow for police seizures (arrests) of individuals and full searches of dwellings, vehicles, and possessions. After You Read1. Give an example in which the distance you travel is different from yourdisplacement. draw a lewis structure for ammonia, nh3 . include all hydrogen atoms and show all unshared pairs and the formal charges, if any. assume that bonding follows the octet rule. the initial responsibility of the first responding officer after they determine that a crime was committed is to crij