Answer:
In C++:
#include <iostream>
using namespace std;
int main(){
int myArray[10] = {000, 101, 202, 303, 404, 505, 606, 707, 808, 909};
int num;
bool found = false;
cout<<"Search for: ";
cin>>num;
for(int i = 0;i<10;i++){
if(myArray[i]==num){
found = true;
break;
}
}
if(found){ cout<<"found"; }
else { cout<<"not found"; }
return 0;
}
Explanation:
This line initializes the array
int myArray[10] = {000, 101, 202, 303, 404, 505, 606, 707, 808, 909};
This line declares num as integer
int num;
This initializes boolean variable found to false
bool found = false;
This prompts user for input
cout<<"Search for: ";
This gets user input
cin>>num;
This iterates through the array
for(int i = 0;i<10;i++){
This checks if num is present in the array
if(myArray[i]==num){
If yes, found is updated to true
found = true;
And the loop is exited
break;
}
}
If found is true, print "found"
if(found){ cout<<"found"; }
If found is false, print "not found"
else { cout<<"not found"; }
List the operating system you recommend, and write a sentence explaining why.
Answer:
The type of operating system I reccommend really depends on how you use computers
Explanation:
If you want strict productivity/gaming: Windows
If you are a programmer/pen tester: Linux
If you want an easy interface: MacOS X
If you believe in God's third temple: Temple OS
Windows is probably the best for most users due to its balance of a simple interface and its many capabilities. It is also the best OS for gaming due to lack of support in many other OS's.
Linux is pretty much terminal-based with an interface if you need help. Only use this if you know your way around computers well. However, this OS allows you to use many tools that are impossible to use on another OS. This is the OS that many programmers, hackers, and other computer people use due to its coding-oriented environment.
If you like simple then use MacOS. The only problem is that it's only available on apple devices, so you have to pay a pretty penny to use it. This is also a unix-based OS meaning it has SOME linux capabilities.
RIP Terry A. Davis. Temple OS was designed to be the 3rd temple of God prophesized in the bible and created by Terry Davis ALONE over a bunch of years. He made this OS after receiving a revelation from God to make this. According to Davis, all other Operating Systems are inferior and Temple OS is the OS that God uses.
What does the term "death by powerpoint" refer to when dealing with Powerpoint presentations?
Answer:
Death by PowerPoint is a phenomenon caused by the poor use of presentation software. Key contributors to death by PowerPoint include confusing graphics, slides with too much text and presenters whose idea of a good presentation is to read 40 slides out loud.
Explanation:
Hope this helps :)
1. What does it mean for a website to be "responsive"?
Jerome falls sick after eating a burger at a restaurant. After a visit to the doctor, he finds out he has a foodborne illness. One of the symptoms of foodborne illness Jerome has is .
Jerome likely got the illness after eating food.
Answer: food poisning
Explanation:
either the food wasnt
cooked properly or the food was out of date and went bad
application of computer in insurance
Answer:
To keep a list of insured members in the offices.
Explanation:
Compunters can be used to keep records of insured individual and their details
Question 1.
Write a function called ReadTextFile that accepts a string path to the provided file as an
argument, opens the file, splits the file on spaces, and then returns a list of those strings.
• Arguments: String - a path to the puppy.txt file
• Return: A list of strings
#python code
def ReadTextFile(string):
with open(string, "r", encoding="utf-8") as file:
return file.read().split(" ")
print(ReadTextFile("puppy.txt"))
cmd |> ['text', 'text']
By the way, you can look into the Russian community "brainly", I published a lot of similar code there.
znanija.com/app/profile/21571307
Which of the following is the best way to keep up with trends in your industry?
Read the newspaper
Watch the news
Conduct scholarly research
Use social media
Answer:
Use social media
Explanation:
Social media has significantly helped to bridge gaps in the communication as end users are able to send and receive messages in real-time without any form of delay. Also, social media platforms facilitate the connection of friends, families, co-workers and brands with one another by sharing memories, innovations, new technologies, knowledge and ideas without being physically present in the same location through the use of social network services such as Face-book, Insta-gram, Twitter, LinkedIn, Zoom, Sk-ype, Hangout, You-Tube, etc.
Hence, the best way to keep up with trends in your industry is to through the use of social media because you get to see and learn from trending ideas, methods of production, technologies, and innovations that are being posted from time to time.
in Java programming Design a program that will ask the user to enter the number of regular working hours, the regular hourly pay rate, the overtime working hours, and the overtime hourly pay rate. The program will then calculate and display the regular gross pay, the overtime gross pay, and the total gross pay.
Answer:
In Java:
import java.util.Scanner;
public class Main {
public static void main(String[] args) {
int regularhour,overtimehour;
float regularpay,overtimepay;
Scanner input = new Scanner(System.in);
System.out.print("Regular Hour: ");
regularhour = input.nextInt();
System.out.print("Overtime Hour: ");
overtimehour = input.nextInt();
System.out.print("Regular Pay: ");
regularpay = input.nextFloat();
System.out.print("Overtime Pay: ");
overtimepay = input.nextFloat();
float regulargross = regularhour * regularpay;
float overtimegross = overtimehour * overtimepay;
float totalgross = regulargross + overtimegross;
System.out.println("Regular Gross Pay: "+regulargross);
System.out.println("Overtime Gross Pay: "+overtimegross);
System.out.println("Total Gross Pay: "+totalgross);
}
}
Explanation:
This line declares regularhour and overtimehour as integer
int regularhour,overtimehour;
This line declares regularpay and overtimepay as float
float regularpay,overtimepay;
Scanner input = new Scanner(System.in);
This prompts the user for regular hour
System.out.print("Regular Hour: ");
This gets the regular hour
regularhour = input.nextInt();
This prompts the user for overtime hour
System.out.print("Overtime Hour: ");
This gets the overtime hour
overtimehour = input.nextInt();
This prompts the user for regular pay
System.out.print("Regular Pay: ");
This gets the regular pay
regularpay = input.nextFloat();
This prompts the user for overtime pay
System.out.print("Overtime Pay: ");
This gets the overtime pay
overtimepay = input.nextFloat();
This calculates the regular gross pay
float regulargross = regularhour * regularpay;
This calculates the overtime gross pay
float overtimegross = overtimehour * overtimepay;
This calculates the total gross pay
float totalgross = regulargross + overtimegross;
This prints the regular gross pay
System.out.println("Regular Gross Pay: "+regulargross);
This prints the overtime gross pay
System.out.println("Overtime Gross Pay: "+overtimegross);
This prints the total gross pay
System.out.println("Total Gross Pay: "+totalgross);
An entity can be said to have __ when it can be wronged or has feelings of some sort
PLEASE HELP!!!
2. You are developing a new application that optimizes the processing of a warehouse’s operations. When the products arrive, they are stored on warehouse racks. To minimize the time it takes to retrieve an item, the items that arrive last are the first to go out. You need to represent the items that arrive and leave the warehouse in a data structure. Which data structure should you use to represent this situation?
a) array
b) linked list
c) stack
d) queue
Answer:
Option d) is correct
Explanation:
To optimize the processing of a warehouse’s operations, products are stored on warehouse racks when they arrive. The items that arrive last are the first to go out to minimize the time it takes to retrieve an item. The items that arrive need to be represented and the warehouse should be left in a data structure. The data structure which should you use to represent this situation is a queue.
Option d) is correct
Which code segment results in "true" being returned if a number is even? Replace "MISSING CONDITION" with the correct code segment.
Answer Choices:
A. num % 2 == 0;
B. num % 0 == 2;
C. num % 1 == 0;
D. num % 1 == 2;
Answer:
num % 2 == 0
Explanation:
Functions are collection of code segments that are executed when called or evoked
The correct statement that can replace "MISSING CONDITION" is (a) num % 2 == 0
From the question, we understand that the condition is to return true if the number is an even number.
To do this, we simply take the modulus of the number and 2.
If the result of the modulus is 0, then the number is evenIf otherwise, then the number is oddHence, the correct statement that can replace "MISSING CONDITION" is (a) num % 2 == 0
Read more about missing code segments at:
https://brainly.com/question/18430675
what is musical technology specifically, the origins of its genesis & its importance to the baroque era
Answer:
There were three important features to Baroque music: a focus on upper and lower tones; a focus on layered melodies; an increase in orchestra size. Johann Sebastian Bach was better known in his day as an organist. George Frideric Handel wrote Messiah as a counterargument against the Catholic Church
when food material are preserved at a temperature just above freezing the temperature process is called
You are implementing a wireless network in a dentist's office. The dentist's practice is small, so you choose to use an inexpensive consumer-grade access point. While reading the documentation, you notice that the access point supports Wi-Fi Protected Setup (WPS) using a PIN. You are concerned about the security implications of this functionality. What should you do to reduce risk
Answer:
You should disable WPS in the access point's configuration.
Explanation:
Encryption is a form of cryptography and typically involves the process of converting or encoding informations in plaintext into a code, known as a ciphertext. Once, an information or data has been encrypted it can only be accessed and deciphered by an authorized user.
Some examples of encryption algorithms are 3DES, AES, RC4, RC5, and RSA.
In wireless access points, the encryption technologies used for preventing unauthorized access includes WEP, WPA, and WPA2.
In this scenario, you notice that an access point supports Wi-Fi Protected Setup (WPS) using a PIN and you are concerned about the security implications of this functionality. Therefore, to reduce this risk you should disable Wi-Fi Protected Setup (WPS) in the access point's configuration.
This ultimately implies that, the wireless access point will operate in an open state and as such would not require any form of password or PIN for use.
Write a java program for the following
A student will not be allowed to sit in exam if his/her attendance is less than 75% .
Take the following input from user
Number of classes held
Number of classes attended
And print
Percentage of class attended
Is student allowed to sit in exam or not .
Answer:
import java.util.Scanner;
public class Main
{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
int classesHeld, classesAttended;
double percentage;
System.out.print("Enter number of classes held: ");
classesHeld = input.nextInt();
System.out.print("Enter number of classes attended: ");
classesAttended = input.nextInt();
percentage = (double) classesAttended / classesHeld;
if(percentage < 0.75)
System.out.println("You are not allowed to sit in exam");
else
System.out.println("You are allowed to sit in exam");
}
}
Explanation:
Import the Scanner to be able to get input from the user
Create a Scanner object to get input
Declare the variables
Ask the user to enter classesHeld and classesAttended
Calculate the percentage, divide the classesAttended by classesHeld. You also need to cast the one of the variable to double. Otherwise, the result would be an int
Check the percentage. If it is smaller than 0.75 (75% equals 0.75), print that the student is not allowed. Otherwise, print that the student is allowed
Your task is to write and test a function which takes three arguments (a year, a month, and a day of the month) and returns the corresponding day of the year (for example the 225th day of the year), or returns None if any of the arguments is invalid.
Hint: You need to find the number of days in every month, including February in leap years.
Answer:
This is in python
Explanation:
Alter my code if you need anything changed. (You may need to create a new function to add a day to February if necessary)
months = [31,28,31,30,31,30,31,31,30,31,30,31]
monthNames = ['january','february','march','april','may','june',
'july','august','september','october','november','december']
array = []
def test(y,m,d): #Does not account for leap-year. Make a new function that adds a day to february and call it before this one
if m.lower() not in monthNames or y < 1 or d > 31:
if m.lower() == "april" or m.lower() == "june" or m.lower() == "september" or m.lower() == "november" and d > 30:
return None
elif m.lower() == "february" and d > months[1]:
return None
return None
num = monthNames.index(m.lower()) #m should be the inputted month
months[num] = d
date = months[num]
for n in range(num):
array.append(months[n])
tempTotal = sum(array)
return tempTotal + date
x = int(input("Enter year: "))
y = input("Enter month: ")
z = int(input("Enter day: "))
print(f"{y.capitalize()} {z} is day {test(x,y,z)} in {x}")
Write VHDL code for the circuit corresponding to an 8-bit Carry Lookahead Adder (CLA) using structural VHDL (port maps). (To be completed before your lab session.)
Answer:
perdo si la pusiera es español te ayudo pero no esta en español
Given a HashMap pre-filled with student names as keys and grades as values, complete main() by reading in the name of a student, outputting their original grade, and then reading in and outputting their new grade.Ex: If the input is:Quincy Wraight73.1the output is:Quincy Wraight's original grade: 65.4Quincy Wraight's new grade: 73.1GIVEN TEMPLATES StudentGrades.javaimport java.util.Scanner;import java.util.HashMap;public class StudentGrades {public static void main (String[] args) {Scanner scnr = new Scanner(System.in);String studentName;double studentGrade; HashMap studentGrades = new HashMap(); // Students's grades (pre-entered)studentGrades.put("Harry Rawlins", 84.3);studentGrades.put("Stephanie Kong", 91.0);studentGrades.put("Shailen Tennyson", 78.6);studentGrades.put("Quincy Wraight", 65.4);studentGrades.put("Janine Antinori", 98.2); // TODO: Read in new grade for a student, output initial// grade, replace with new grade in HashMap,// output new grade }}
Answer:
import java.util.Scanner;
import java.util.HashMap;
public class StudentGrades {
public static void main (String[] args) {
Scanner scnr = new Scanner(System.in);
String studentName;
double studentGrade;
HashMap<String, Double> studentGrades = new HashMap<String, Double>();
// Students's grades (pre-entered)
studentGrades.put("Harry Rawlins", 84.3);
studentGrades.put("Stephanie Kong", 91.0);
studentGrades.put("Shailen Tennyson", 78.6);
studentGrades.put("Quincy Wraight", 65.4);
studentGrades.put("Janine Antinori", 98.2);
// TODO: Read in new grade for a student, output initial
// grade, replace with new grade in HashMap,
// output new grade
studentName = scnr.nextLine();
studentGrade = scnr.nextDouble();
System.out.println(studentName + "'s original grade: " + studentGrades.get(studentName));
for (int i = 0; i < studentGrades.size(); i++) {
studentGrades.put(studentName, studentGrade);
}
System.out.println(studentName + "'s new grade: " + studentGrades.get(studentName));
}
}
Explanation:
The program first reads in the entire name (scnr.nextLine()) and the next double it sees (scnr.nextDouble()). In the HashMap, it is formatted as (key, value). studentName is the key, while studentGrade is the value. To get the name when printed, use studentName. To get the grade, use studentGrades.get(studentName).
After, use a For loop that replaces the studentGrade with the scanned Double by using studentName as a key. Use the same print statement format but with different wording to finally print the new grade. Got a 10/10 on ZyBooks, if you have any questions please ask!
What should Stephan do to improve his study environment? Check all that apply. remove distracting technology have easy access to his study resources ask his parents to leave the room leave some food and drink for snacks while studying allow his dad to stay only if he is helping with studying remove all food and drink from the room
Answer:
I. Remove distracting technology.
II. Have easy access to his study resources.
III. Allow his dad to stay only if he is helping with studying.
Explanation:
A study environment can be defined as a place set aside for reading and studying of educational materials.
In order to facilitate or enhance the ability of an individual (student) to learn and assimilate information quickly, it is very important to ensure that the study environment is devoid of any form of distraction and contains the necessary study materials (resources).
Hence, to improve his study environment, Stephan should do the following;
I. Remove distracting technology such as television, radio, games, etc.
II. Have easy access to his study resources. Stephan shouldn't keep his study materials far away from his study area.
III. Allow his dad to stay only if he is helping with studying.
Answer:the person above it right
Explanation:
1.) Define Technology
2.) List 2 examples of Technology that you use everyday
3.) The building you live in is an example of this kind of technology
4.) This is technology of making things
5.) This kind of technology helps us talk to each other.
6.) This technology helps us move from one place to another
A company database needs to store information about employees (identified by ssn, with salary and phone as attributes), departments (identified by dno, with dname and budget as attributes), and children of employees (with name and age as attributes). Employees work in departments; each department is managed by an employee; a child must be identified uniquely by name when the parent (who is an employee; assume that only one parent works for the company) is known. We are not interested in information about a child once the parent leaves the company.Draw an ER diagram that captures this information.
usually it is a rectangular box placeed or underneath your desk
Answer:
Uh... there is no question here.
Explanation:
No question to answer.
The ABC box company makes square puzzle cubes that measure 4 inches along each edge. They shipped the cubes in a box 8 in x 12 in x 16 in. How many cubes can they ship in the box?
Answer: They can ship 32 puzzle cubes in the box.
Explanation: So the volume of each puzzle cubes = side³
=(4)³ cubic inches.
Then the volume of the box is= (8×12×16) cubic inches.
(8×12×16)/4^3= 32
Write a program, named sortlist, that reads three to four integers from the command line arguments and returns the sorted list of the integers on the standard output screen. You need to use strtok() function to convert a string to a long integer. For instance,
Answer:
In C++:
void sortlist(char nums[],int charlent){
int Myarr[charlent];
const char s[4] = " ";
char* tok;
tok = strtok(nums, s);
int i = 0;
while (tok != 0) {
int y = atoi(tok);
Myarr[i] = y;
tok = strtok(0, s);
i++;
}
int a;
for (int i = 0; i < charlent; ++i) {
for (int j = i + 1; j < charlent; ++j) {
if (Myarr[i] > Myarr[j]) {
a = Myarr[i];
Myarr[i] = Myarr[j];
Myarr[j] = a;
} } }
for(int j = 0;j<charlent;j++){ printf(" %d",Myarr[j]); }
}
Explanation:
This line defines the sortlist function. It receives chararray and its length as arguments
void sortlist(char nums[],int charlent){
This declares an array
int Myarr[len];
This declares a constant char s and also initializes it to space
const char s[4] = " ";
This declares a token as a char pointer
char* tok;
This line gets the first token from the char
tok = strtok(nums, s);
This initializes variable i to 0
int i = 0;
The following while loop passes converts each token to integer and then passes the tokens to the array
while (tok != 0) {
int y = atoi(tok); -> Convert token to integer
Myarr[i] = y; -> Pass token to array
tok = strtok(0, s); -> Read token
i++;
}
Next, is to sort the list.
int a;
This iterates through the list
for (int i = 0; i < charlent; ++i) {
This iterates through every other elements of the list
for (int j = i + 1; j < charlent; ++j) {
This condition checks if the current element is greater than next element
if (Myarr[i] > Myarr[j]) {
If true, swap both elements
a = Myarr[i];
Myarr[i] = Myarr[j];
Myarr[j] = a;
} } }
The following iteration prints the sorted array
for(int j = 0;j<charlent;j++){ printf(" %d",Myarr[j]); }
}
See attachment for illustration of how to call the function from main
What is the maximum ream size on an agile project?
Most Agile and Scrum training courses refer to a 7 +/- 2 rule, that is, agile or Scrum teams should be 5 to 9 members. Scrum enthusiasts may recall that the Scrum guide says Scrum teams should not be less than 3 or more than 9
Explanation:
Which elements of text can be changed using automatic formatting? Check all that apply.
A) smart quotes
B) accidental usage of the Caps Lock key
C) fractions
D) the zoom percentage
E) the addition of special characters
Answer:a, d, e
Explanation:
what would be the result of running these two lines of code? symptoms = ["cough" "fever", "sore throat", "aches"] print (symtoms[3])
"aches"
an array starts at 0 so spot the 3 is spot 4
[1,2,3,4]
arr[3] = 4 in this case
What are the WORST computer malware in your opinion it can be worms backdoors and trojans I just want a input, nothing right or wrong
Answer:
I think probably mydoom
Explanation:
as it estimated 38 billion dollars in damage, also this malware is technically a worm
Use the drop-down menus to explain what happens when a manager assigns a task in Outlook.
1. Managers can assign tasks to other users within_______ .
2. Once the task is assigned, Outlook__________ the assignment to that user.
3. The user must_______ the task to have it placed in their_________ .
Answer:
1. an organization
2. emails
3. accept
4. to-do list
Explanation: edge
Answer:Use the drop-down menus to complete statements about assigning tasks in Outlook.
A Task Request form is an interactive way to assign tasks to
✔ Outlook users
and report updates on the status of an assigned task.
An assigned task sends
✔ an email
request for the user to accept or decline and sends
✔ an automated response message
to the assigner.
Explanation:
is English-like, easy to learn and use. uses short descriptive word to represent each of the machine-language instructions. is computer's native language. translates the entire source code into a machine-code file. processes one statement at a time, translates it to the machine code, and executes it. is a program written in a high-level programming language. is a program that translates assembly-language code into machine code.
Answer:
The appropriate choice is "Assembly Language ".
Explanation:
Such assembly languages were indeed low-level software packages designed for something like a mobile device or indeed any programmable machine. Written primarily throughout assembly languages shall be constructed by the assembler. Each assembler seems to have its programming languages, which would be focused on a particular computational physics.