please help me please help me​

Please Help Me Please Help Me

Answers

Answer 1

Explanation:

in C++

#include<iostream.h>

#using namespace std;

main()

{

int array[8];

int oddSum=0;

for(int i=0; i<8;i++)

{

if(array[i]%2==1)

{

oddSum=oddSum+array[i];

}

else()

{ //do nothing }

}

cout<<"The sum of odd numbers are:"<<oddSum;

getch();

return 0;

}


Related Questions

Where are functions stored?

in the development environment or on the Internet

in the development environment or in an individual program

in an individual program or on a computer’s hard drive

in an individual program or in a lookup table

Answers

Answer:

In the development environment or in an individual program

Explanation:

A function in programming is a code or lines of code that perform a particular function.

They are stored in the development environment or in an individual program so they can be called up and execute when needed.

Which tool adds different amazing effects to a picture.

(a) Paint

(b) Lines tool

(c) Magic tool​

Answers

Answer:

magic tool

Explanation:

Which of the following is true of operations within a spreadsheet program’s built-in functions?
Operations within parentheses, then multiplication and division, and then addition and subtraction are computed.
Operations within parentheses, then addition and subtraction, and then multiplication and division are computed.
Multiplication and division, then addition and subtraction, and then operations within parentheses are computed.
Addition and subtraction, then multiplication and division, and then operations within parentheses are computed

A. Operations within parentheses, then multiplication and division, and then addition and subtraction are computed.

Answers

Answer:

a is the answer

Explanation:

Debug the code in the main method of this class, which is intended to initialize an array named arr to hold 3 ints, fill this with 3 inputs from the user, then print the contents of the array in order followed by the sum.
Here's the code that needs to be fixed:

import java.util.Scanner;

public class U6_L1_Activity_One{
public static void main(String[] args){
Scanner scan = new Scanner(System.in);
int[] arr = new int(3);
arr[1] = scan.nextInt();
arr[2] = scan.nextInt();
arr[3] = scan.nextInt;
System.out.println("Contents: " + arr{1} + " " + arr{2} + " " + arr{3});
System.out.println("Sum: " + arr[1] + arr[2] + arr[3]);
}
}

Answers

Answer:

import java.util.Scanner;

public class U6_L1_Activity_One{

 public static void main(String[] args){

   Scanner scan = new Scanner(System.in);

   int[] arr = new int[4];

   arr[1] = scan.nextInt();

   arr[2] = scan.nextInt();

   arr[3] = scan.nextInt();

   System.out.println("Contents: " + arr[1] + " " + arr[2] + " " + arr[3]);

   int Sum = (1 + 2 + 3);

   System.out.println("Sum: " + Sum);

 }

}

Explanation:

Debugging a code involves locating and correcting the errors in the code.

The errors in the code are:

Invalid array declaration and indexingImproper usage of the scanner objectIncorrect syntax of sum

So, the corrected code segment is as follows:

        int [] arr = new int[3];

       arr[0] = scan.nextInt();

       arr[1] = scan.nextInt();

       arr[2] = scan.nextInt();

       System.out.println("Contents: " + arr[0] + " " + arr[1] + " " + arr[2]);

       System.out.println("Sum: " + (arr[0] + arr[1] + arr[2]));

Read more about debugging at:

https://brainly.com/question/18844825

What is the value in y2 when the code show below executes?
x1 = [ 5 3 1 7 9]; [y1 y2] = min(x1)

Answers

Answer:

y2 = 3

Explanation:

This question needs us to give the value of y2 when we run this code in the question.

By min(X1) it is asking for the minimum value in the list of values that we have in the question.

Y1 is the first minimum value in the list and it is = 1

Our answer of interest in this solution is to, which is the second minimum value in the list after Y1

Therefore y2 = 3

Thank you!

pls help ...
Consider the code given below:
public class Testone {
public static void main (String[] args) throws Exception {
Thread.sleep (3000);
System.out.println("sleep");
}
)
What is the result?
Select one:
a. The code executes normally and prints "sleep".
b. The code executes normally, but nothing is printed.
a
C. A RuntimeException is thrown at runtime
d. Compilation fails
e. An exception is thrown at runtime.
Next pag​

Answers

Answer:

You open the class, and print sleep after thread 3000So A

I get brainlist to whoever can help my computer is doing this and I have class and it’s not working and I got it wet yesterday but it was fine in homeroom help please

Answers

Answer:

try putting a lot of rice on the screen.

Explanation:

if it got water in it that should help it.

did u try rice? how about turning it off and back on again?

When is historical data not useful

Answers

Answer:

to address for setting cost increase of a resource to determine the amount of money needed for a future project to plan for future years operation costs to predict sales based on past growth

Name and define two ways an IDS connects to a network.

Answers

Answer:

The two ways an IDS connects to a network are:

1. Signature-based detection uses patterns by establishing a unique identifier for the detection of future cyber attacks, using the IDS sensors and consoles.

2. Statistical anomaly-based detection, as an expert system, relies on the identification of anomalies in the network traffic by comparing against established baselines.

Explanation:

Organizations use the Intrusion Detection System (IDS) as a software program to detect a computer network attack in an effort to stop the attack.  The program analyzes the network traffic for signatures of known cyberattacks and the delivery of network packets.  There are two types: NIDS and HIDS.  Whereas a Network Intrusion Detection System (NIDS) is designed to support multiple hosts, a Host Intrusion Detection System (HIDS) is set up to detect illegal cyber actions in a host's operating system files.

A message with 3000 bytes gets encoded using the scheme Base64. What will be the size of the encoded message?

Answers

Answer:

4000 characters

Explanation:

Base64 encodes each set of three bytes into four bytes.

So 3000 * 4/3 = 4000 characters.

How many total cells can a worksheet window contain? If columns are labelled alphabetically, what will be the label for the cell in row 1, column 16,384?

Answers

Answer:

[tex]5815 {20 \frac{55}{ \\ hii \: \\ \\ } }^{?} [/tex]

An algorithm is Group of answer choices The part of the computer that does the processing A complete computer program The inputs and outputs of a program A finite set of steps to solve a problem

Answers

Answer:

A finite set of steps to solve a problem

Explanation:

From the list of given options, option D describes an algorithm

Other options such as:

(A) describes the CPU of a computer;

(B) describes a written program which is achieved with the use of one or more programming languages

and (C) which describes the data that is being supplied into the program and also the information expected from the program.

Hence:

(D) is correct

1) If a robot has a 3 bit instruction set and needs 20 instructions to reach its destination, how many bits of memory are required?


2) A robot driven by a raspberry Pi has 256MB of memory. The robot has a 3 bit instruction set. What is the maximum number of instructions that can be loaded into the robot?

3) Imagine that the robot with 256MB of memory needs 500,000 4-bit instructions to perform a job. Would it be possible to load in all the 500,000 instructions into the memory of the robot?

Answers

Answer:

Explanat500,000ion:

Docker is focused on ______ containerization.

Answers

Answer:

Application

Explanation:

Docker is a known container technology platform that can help in the packaging of an application by a developer. It is a platform that is used by software developers to build applications based on containers. Using this containerization platform would enable the application to run without issues In any environment. That is either development, test or production environment.

What do presentations in spreadsheet software have in common??

A. Both analyze numeric data
B. Both calculate numeric formulas
C. Both convey numeric and/or text data
D. Both illustrate 


Hurry plzzz first person gets brainiest

Answers

Answer:

C both convey numeric and text data.

Explanation:

It's the most likely answer.

C) hope this helps out

The Publisher-Subscriber design pattern is used to create __________________ communication between software objects and is used to build _____________ components.

Answers

Answer:

indirect, reusable

Explanation:

The Publisher-Subscriber design pattern is used to create indirect communication between software objects and is used to build reusable components.

What is the output of the code?
public class trackList
public static void main(StringD args)
ArrayList track new ArrayListcinteger)
track.add(45);
track.add(55);
track.add(85);
System.out.print(track);
runtime error
45
55
85
compiler error

Answers

Answer:

45, 55, and 85

Explanation:

The Java program is complete and logically correct. It creates and adds integer values to an array list. The 'System.out.print' function of the track array variable would not throw any error but output the list of integer values.

ChodeHS Exercise 4.3.5: Coin Flips

Write a program to simulate flipping 100 coins. Print out the result of every flip (either Heads or Tails).


At the end of the program, print out how many heads you flipped, how many tails you flipped, what percentage were heads, and what percentage were tails.

Answers

Answer:

public class CoinFlips extends ConsoleProgram

{

   public static final int FLIPS = 100;

   

   public void run()

   {

       int countH = 0;

       int countT = 0;

       for(int i = 0; i < 100; i++)

       {

           if (Randomizer.nextBoolean())

           {

               System.out.println("Heads");

               countH += 1;

           }

           else

           {

               System.out.println("Tails");

               countT += 1;

           }

       }

       System.out.println("Heads: " + countH);

       System.out.println("Tails: " + countT);

       System.out.println("% Heads: " + (double) countH / FLIPS);

       System.out.println("% Tails: " + (double) countT / FLIPS);

   }

}

Explanation:

First define your counting variables for both heads and tails (I named them countH and countT). Set them to 0 at the start of the run.

Then use a for loop to flip the coin 100 times. In the video you should have learned about the Randomizer class so you can use the same idea to print out whether you got heads or tails.

Make sure to keep the count going using >variable name< += 1.

The printing at the end is very basic; print the statement for each: ("Heads: " + >variable name<);

For the percentages, print ("% Heads: " + (double) >variable name< / FLIPS); divided by FLIPS (not 100 or any other int because you will get the wrong value) and remember to cast them as doubles to get the correct value.

The program simulates 100 coin flips and displays the result of each flip and the resulting percentage. The program written in python 3 goes thus :

import random

#import the random module

total = 0

#initialize the total coin flips

h_count = 0

t_count = 0

#initialize variable to hold the number of heads and tails

h_t = ['h', 't']

#define the sample space

while total < 100 :

#keeps track that tosses does not exceed 100

toss = random.sample(h_t, 1)

#variable to hold the outcome of each coin toss

if toss[0] == 'h':

#heck if toss is head

h_count+=1

Increase count of heads. owee

print(toss[0], end=' ')

#display the sample selected

else:

#if not head, then it's tail

t_count+=1

#increase count yv

print(toss[0], end=' ')

total+=1

#

print('head counts : ', h_count, 'percentage : ', round(h_count/100, 2),'%')

print('tail counts : ', t_count, 'percentage : ', round(t_count/100, 2), '%')

# display result.

A sample run of the program is attached

Learn more: https://brainly.com/question/18581972

Think about the ways new communication technologies can make certain tasks easier for
users with disabilities. For two categories of individuals with disabilities (e.g., the blind,
deaf, restricted mobility, etc.), explain one way that everyday technology helps them.
Describe the specific way the technology improves their lives.

Answers

Technology gives them the ability to do things that they normally couldn’t do. Like deaf people could get a cochlear implant to make them hear, people without a leg can get a prothetic leg to help them walk. Even something as simple of being colorblind, there are glasses to help them see color. It’s amazing.

What are some of the issues that create conflict in the future and why?

Answers

Answer:

Some of the reasons for future conflict between nations could be:

Explanation:

1: water wars, this is something possibly brewing between Ethiopia and Egypt with Sudan being on Ethiopia's side as the dam Ethiopia plans to build which would take a lot of Egypt's water would also power Sudan with electricity. Oh and something frightening could happen as China is damming India's major rivers which could lead to a world war or India becoming a Chinese vassal and massive amounts of displaced and starving people either way.

2: a global economic drop: this will severely impact the economies of many countries, especially countries in the middle of industrialization in Africa which are very fragile, I will give it a few decades to fully blow up there.

3:Competing interests, ethnic and international for example in Central Asia there are a lot of competing influences and something could happen there but thing is wars because of what I just mentioned are already happening, look at Syria with the "moderate" rebels, between Armenia and Azerbaijan we have had a conflict which had several geopolitical implications and reasons it went as it did, currently Libya is in a proxy war too, and recently Ethiopia has had conflicts within a Northern region which are heavily ethnic-based and could lead to an Ethiopian civil war if the government does not manage to solve this, which would also mean the first war I mentioned would be delayed or prevented trough another bloody war.

4: an incident: many wars have started because of incidents escalating, so watch out for it, for example earlier this yea- oh it's been a year already since Qasem Soleimani was assasinated , however luckily nothing happened then.

Either way we're gonna have more wars before world peace and mercenaries are becoming more popular like Turkey and more countries are using in proxy wars and another thing you should watch out for is the first use of robots in war and hope that they distinguish between regular humans and soldiers and don't commit atrocities, happy 2021!

How do I retrieve the number from an old home phone? Someone called my home phone (it is not a cellular phone) and they did not leave their phone number. Any advice welcome.

Answers

Answer: Use recent Callers function

Explanation:

Now all home phones have different ways of getting there, but should you see a settings, or functions button, or even a button that looks out of place in the middle of the phone right underneath the screen, that is the button that you will select. Go through the options available and you will see a option called "Recent Callers" and there you will be able to find all the recent callers whom called your home phone.

where do you access to header section in excel?​

Answers

Answer:

On the Insert tab, in the Text group, click Header & Footer. Excel displays the worksheet in Page Layout view. Click the left, center, or right header or footer text box at the top or the bottom of the worksheet page.

Explanation:


Victor has an Excel workbook that contains a macro. What is the appropriate file type to save the workbook in?
xlsx
xitx
xlsm
xlx

Answers

Answer:

xlsm

Explanation:

Generally, workbooks are known as Microsoft Excel files. Excel workbook can be defined as a collection of one or more charts and worksheets (spreadsheets) used for data entry and storage in an excel file. In order to create a project on Excel you will have to use a workbook.

A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer software applications such as Microsoft Excel.

The Microsoft developers has made it easy for their users to automate the tasks used frequently through the creation and execution of macros.

Basically, macros comprises of commands and instructions which may be grouped together as a single command to automatically execute a task.

In this scenario, Victor has an Excel workbook that contains a macro. Thus, the appropriate file type to save the workbook in is the xlsm extension (format).

Which of the following is one of the first steps in implementing a comprehensive security program? Setting up a Guest account Creating hierarchical directory structures Setting a strong password policy Establishing forests

Answers

Answer:

Setting a strong password policy

Explanation:

In implementing a comprehensive security program, one of the first steps would be to set up a strong password policy.

It is important to understand what the company is trying to protect from third parties.

Setting up a password policy is going to increase the security of the system through the use of strong passwords.

Cards in a pack are black or red in the ratio
black: red = 2 : 5
What fraction of the cards are red?​

Answers

Answer:

[tex]Fraction = \frac{5}{7}[/tex]

Explanation:

Given

[tex]black: red = 2 : 5[/tex]

Required

Determine the fraction of red

First, we calculate the total ratio.

[tex]Total = black + red[/tex]

Substitute values for black and red

[tex]Total = 2 + 5[/tex]

[tex]Total = 7[/tex]

The fraction of red is then calculated as:

[tex]Fraction = \frac{Red}{Total}[/tex]

[tex]Fraction = \frac{5}{7}[/tex]

Sonja is writing a program to compare two numbers and print the larger number. Which of these should be used?
a while loop
if and else
if, elif, and else
a string variable

Answers

Answer:

if and else

Explanation:

if (num1 > num2):

   print(num1)

else:

   print(num2)

Which line of code will display the variable rounded to the nearest tenth?
print(num, round)
print(round(num, 1))
print(num rounded)
print(round(num,.1))

Answers

Answer:

print(round(num, 1))

Answer:

D

Explanation:

write a valid HTML + Python page that will count numbered from 1 to 1,000,000?​

Answers

Answer:

I remember before the corona virus we used to do math at school

1. What is the primary tool that Windows Server administrators use to create and manage user accounts

Answers

Answer to you questions is: Active Directory

For which of the seven steps to solve a programming problem is the scientific method most useful?

Answers

Answer:

the planning stage

Explanation:

The scientific method would be most useful during the planning stage of solving a programming problem. This is because during this stage you are thinking of what the problem is and what are the possible solutions that may work. The scientific method is made to help scientists do just that, understand what the problem is, design a possible solution from a hypothesis and design a way to implement or test that solution. Which is the most important piece of solving a programming problem (designing a solution)

Other Questions
HELPPPPP ASAP ALL YOU NEED IS PLC BELOW Make a thesis statement regarding Immigrants moving to the USA and make 3 reasons on how they can adjust to the US Find the area of the shaded region. enter a decimal rounded to the nearest tenth Find ex and Y to the quadrilateral is a parallelogram. What is the effect of the chancellor of the exchequer entrance at the inn just after fisher says "by Jove! Thats an idea. Youre perfectly right. And that suggests a very queer idea, doesnt it?" Aaron bought flowers for his mother. The flowers were half off the original price. He paid $1.12 in sales tax. If he paid a total of $15.57, what was the original price of the flowers? Rewrite the sentence using correct pronunciation Daniel asked how did she like the party which triplet are you talking about I dont know they look alike to me he said Jessica picked 40 apples. She gave 15 apples away. What percent of the apples does Jessica still have?Please help im begging right now. I need the work and explanation on how u got it im counting on you guys this is a word problem. Im in middle school (6th grade) i dont know why it says im in high school. Ill make it 30 points. JUST PLEASEEE please can anyone explain congruent triangles If a data set is normally distributed, what percent of the data will lie below the mean A) 99,7%B)68%C)50%D)95% Quadrilateral ABCD has the following vertices:A(-6, -2)B(-4,4)C(8,1)D(6, -6)Also, ZA is a right angle.Is quadrilateral ABCD a rectangle, and why?answers: (ignore the chosen one) FiWhat is the moral and ethical code ofconduct for Islam called JOURNEY TO THE CENTER OF THE EARTHBased upon what has occurred so far, what do you think will possibly happen from here on out? Why do you think so? Have we officially crossed over into complete fantasy at this point? What do you think might happen next? Solve for b in the equation 4(b + 2) = 16 i got the answer which is A and pls tell me if im right Can you please translate this for me would be very appreciated? artifex ad villam venit, artifex est Clra. Clra ianuam pulsat.Clemens artificem non audit. servus est in horto. Clra clamat.canis Clram audit et ltrat. Quintus canem audit. Quintus adlnuam venit. filius ianuam aperit. Clara Quintum salutat etvillam intrat.Metella est in culina. Quintus matrem vocat. Metella triumintrat. artifex Metellam salutat. Metella artificem ad tricliniumducit. any helllp pleasei neeed help pleasee The amount of energy in a system is Which of the following statements about prokaryotic cells is correct? A) They reproduce asexually through a form of cell division called binary fission. B) They contain multiple chromosomes floating in the cytoplasm. C) They have a single DNA strand within a membrane-bound nucleus. D) They reproduce sexually by exchanging genetic information during conjugation. 7 out of 25 employees at Carlo's Car Repair wear contact lenses. What percent of the employees wear contact lenses?