Answer:
All varieties of information, from bullet pointed text to numerical tables
Explanation:
Answer:
All varieties of information, from bullet pointed text to numerical tables
Explanation:
Add my epic games account "Lil Carr OXB" and if that not work, then "swish4444"
Or on Xbox "Lil Carr OXB" Thanks.
Answer:
-_________________________________-
Explanation:
-__________________________________________________________-
Answer:
okExplanation:
Write a program that lets the user enter the loan amount and loan period in number of years and displays the monthly and total payments for each interest rate starting from 5% to 8%, with an increment of 1/8.
Answer:
Following are the code to this question:
import java.util.*;//import package
public class Main //defining a class
{
public static void main(String[] axc)//main method
{
double Loan_Amount,years,Annual_Interest_Rate=5.0,Monthly_Interest_Rate,Total_Amount,Monthly_Payment;//defining variables
Scanner ax = new Scanner(System.in);//creating Scanner class object
System.out.print("Enter loan amount:");//print message
Loan_Amount = ax.nextDouble();//input Loan_Amount value
System.out.print("Enter number of years: ");//print message
years= ax.nextInt();//input number of years value
System.out.printf(" %-20s%-20s%-20s\n", "Interest Rate", "Monthly Payment","Total Payment");//print message
while (Annual_Interest_Rate <= 8.0) //use while loop to calculate Interest rate table
{
Monthly_Interest_Rate = Annual_Interest_Rate / 1200;//calculating the interest Rate
Monthly_Payment = Loan_Amount * Monthly_Interest_Rate/(1 - 1 / Math.pow(1 + Monthly_Interest_Rate,years * 12));//calculating monthly payment
Total_Amount = Monthly_Payment * years * 12;//calculating yearly Amount
System.out.printf("\t %-19.3f%-19.2f%-19.2f\n", Annual_Interest_Rate,Monthly_Payment,Total_Amount);//use print meethod to print table
Annual_Interest_Rate = Annual_Interest_Rate + 1.0 / 8;//use Annual_Interest_Rate to increating the yearly Rate
}
}
}
Output:
Please find the attached file.
Explanation:
In this code inside the class, several double variables are declared in which the "Loan_Amount and years" is used for input value from the user-end, and another variable is used for calculating the value.
In this code a while loop is declared that checks the "Annual_Interest_Rate" value and creates the interest rate table which is defined in the image file please find it.
# change amount as an integer input, and output the change using the fewest coins, one coin type per line. The coin types are Dollars, Quarters, Dimes, Nickels, and Pennies. Use singular and plural coin names as appropriate, like 1 Penny vs. 2 Pennies
my code produces no output and i cant find why?
coin_change =int(input())
def coin_change(cents):
if cents <= 0:
print( 'Zero cents.')
else:
quarter = cents // 25
dime = (cents % 25) //10
nickle = cents % 25 % 10 // 5
penny = cents % 5
print (coin_change )
# produces no output
Answer:
Explanation:
The Python code provided was not producing any output because you were never printing out the coin variables that you created. The following code adds the needed print statements using the right singular or plural coin name as needed.
cents = int(input())
def coin_change(cents):
if cents <= 0:
print('Zero cents.')
else:
quarter = cents // 25
dime = (cents % 25) // 10
nickle = cents % 25 % 10 // 5
penny = cents % 5
if quarter == 0 or quarter > 1:
print(str(quarter) + " quarters")
else:
print(str(quarter) + " quarter")
if dime == 0 or dime > 1:
print(str(dime) + " dimes")
else:
print(str(dime) + " dime")
if nickle == 0 or nickle > 1:
print(str(nickle) + " nickels")
else:
print(str(nickle) + " nickel")
if penny == 0 or penny > 1:
print(str(penny) + " pennies")
else:
print(str(penny) + " penny")
coin_change(cents)
Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
Answer:open source
Explanation: what is's called
Linux is the operating systems would allow a user to add functionality and sell or give away their versions.
What is Linux Operating system?Linux has been defined as known to be a kind of an an Operating system which is known to be an open-source. It is one that is compared to Unix-like form of operating system but it is one that is often based on the the use of Linux kernel.
It has been said that to be an operating system kernel that was said to be released in 1991, by Linus Torvalds. Linux is said to be one that is often packaged as a service of a Linux distribution.
Linux has been used in a lot of ways such as the Server OS that is made for web servers, database servers, as well as file servers. They are known to be set up to aid high-volume as well as multithreading applications and also used for a lot of server types.
Therefore, Linux is the operating systems would allow a user to add functionality and sell or give away their versions. Hence, option A is correct.
Learn more about Linux on:
brainly.com/question/12853667
#SPJ2
Which of the following operating systems would allow a user to add functionality and sell or give away their versions?
-Linux
-macOS
-Windows
-UNIX
Write a static generic method PairUtil.minmax that computes the minimum and maximum elements of an array of type T and returns a pair containing the minimum and maximum value. Require that the array elements implement the Measurable interface of Section 10.1.2.
Answer:
Explanation:
The following code is written in Java. It is hard to fully create the code without the rest of the needed code including the T class and the Measurable interface. Regardless the following code can be implemented if you have that code available.
public static T minmax(ArrayList<T> mylist) {
T min = new T();
T max = new T();
for (int x = 0; x < mylist.size(); x++) {
if (mylist.get(x) > max) {
max = mylist.get(x);
} else if (mylist.get(x) < min) {
min = mylist.get(x);
}
}
return (min, max);
}
A _______ is one typed character.
-gigabyte
-byte
-megabyte
-kilobyte
-terabyte
What should a valid website have?
Select one:
a. Cited sources, copyright, and a clear purpose
b. Cited sources, copyright, and a poor design
c. Cited sources, copyright, and colorful images
d. Cited sources, no copyright, and a broad purpose
Answer:
A. cites sources,copyright,and a clear purpose
how to be safe through internet? and what is e safety definition and what are the the rules of e safety pls pls I will give u 74 points lessgooo
Here are the Top 10 Internet safety rules to follow to help you avoid getting into trouble online (and offline).
1. Keep Personal Information Professional and Limited
Potential employers or customers don't need to know your personal relationship status or your home address. They do need to know about your expertise and professional background, and how to get in touch with you. You wouldn't hand purely personal information out to strangers individually—don't hand it out to millions of people online.
2. Keep Your Privacy Settings On
Marketers love to know all about you, and so do hackers. Both catsometimes(detsometimes hard to find because companies want your personal information for its marketing value. Make sure you have enabled these privacy safeguards, and keep them enabled.
3. Practice Safe Browsing
You wouldn't choose to walk through a dangerous neighborhood—don't visit dangerous neighborhoods online. Cybercriminals use lurid content as bait. They know people are sometimes tempted by dubious content and may let their guard down when searching for it. The Internet's demimonde is filled with hard-to-see pitfalls, where one careless click could expose personal data or infect your device with malware. By resisting the urge, you don't even give the hackers a chance.
4. Make Sure Your Internet Connection is Secure. Use a Secure VPN Connection
When you go online in a public place, .Careful What You Download
A top goal of cybercriminals is to trick you into downloading malware—programs or apps that carry malware or try to steal information. This malware can be disguised as an app: anything from a popular game to something that checks traffic or the weather. As PCWorld advises, don't download apps that look suspicious or come from a site you don't trust
6. Choose Strong Passwords
Passwords are one of the biggest weak spots in the whole Internet security structure, but there's currently no way around them. And the problem with passwords is that people tend to choose easy ones to remember (such as "password" and "123456"), which are also easy for cyber thieves to guess. Select strong passwords that are harder for cybercriminals to demystify. Password manager software can help you to manage multiple passwords so that you don't forget etc... .....
follow me entrust
Answer:
안녕
from my opinion don't tell anyone anything about you like be anonymous
and if anyone ask you where u live say earth he /she will think u became angry or for example you said to person 1 ( you stay in England )
but to person 2 ( say to stay in Japan )
but it's good to say nothing about you not even your name or age
I HOPE YOU UNDERSTAND ENGLISH IF NOT I CAN REWRITE IT IN KOREAN
Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which option should he configure?
Answer:
show archive in folder list
Answer:
d
Explanation:
Which of the following is necessary to appreciate features provided by software applications?
a package
O a basic understanding
O a basis of comparison
O coding concepts
Answer: a basic understanding
Explanation:
In other to appreciate the features that an application has, one must have a basic understanding of what the software is meant to do. That way, when the software does this duty, the person will recognize it and appreciate the software.
For instance, a person who does not understand the basic premise of Quickbooks will not be able to appreciate the various features provided by Quickbooks to make accounting easier for small to medium businesses.
What are
the rules for giving
variable name ?
Answer:
Rules for naming variables:
- Variable names in Visual C++ can range from 1 to 255 characters. To make variable names portable to other environments stay within a 1 to 31 character range.
- All variable names must begin with a letter of the alphabet or an underscore ( _ ). For beginning programmers, it may be easier to begin all variable names with a letter of the alphabet.
- After the first initial letter, variable names can also contain letters and numbers. No spaces or special characters, however, are allowed.
- Uppercase characters are distinct from lowercase characters. Using all uppercase letters is used primarily to identify constant variables.
- You cannot use a C++ keyword (reserved word) as a variable name.
how does such editing affect courtrooms where visual evidence is often presented?
NEED HELP ASAP! You are looking for information in the online catalog for your local library. Which field would you not expect to see in a library's catalog or database?
A. Author
B. Title
C. Year
D. Phone number
Answer:
The answer is D
Explanation:
Which of the following will display a string whose address is in the dx register: a.
mov ah, 9h
int 21h
b.
mov ah, 9h
int 22h
c.
mov ah, 0h
int 21h
d.
None of these
e.
mov ah, 2h
int 20h
Answer:
a)
Explanation:
Function 9 of interrupt 21h is display string.
State the causes of the increase in carbondioxide
concerntration
Answer:
The right response is "fossil fuels".
Explanation:
Fossil fuels such as coal as well as oil conduct electricity that has already been photosynthesized by vegetation or plant species from the ecosystem for thousands of generations.Within only several hundred years we've returned fuel to that same ecosystem or environment, the sources of CO₂ rise are fossil fuels.However, the above solution is the right one.
. Create an abstract Dollar class with two integer attributes, both of which are non-public (Python programmers - it is understood that there is nothing private in Python but try to not access the attributes directly from outside the classes). The int attributes will represent whole part (or currency note value) and fractional part (or currency coin value) such that 100 fractional parts equals 1 whole part.
Answer:
Explanation:
The following code is written in Java. It creates the abstract dollar class that has two instance variables for the dollars and the coins that are passed as arguments. The test output can be seen in the picture attached below.
class Dollar {
int dollars;
double coin;
private Dollar(int dollar, int coin) {
this.dollars = dollar;
this.coin = Double.valueOf(coin) / 100;
}
}
What yields 2.5? Type casting
Answer:
5.0/2
Explanation:
I don't do Java, but I do Python. I'm pretty sure the answer to this question is 5.0/2. I'm sorry if I'm wrong.
Write a program that asks the user to enter an international dialing code and then looks it up in the country_codes array (see Sec 16.3 in C textbook). If it finds the code, the program should display the name of the corresponding country; if not, the program should print an error message. For demonstration purposes have at least 20 countries in your list.
Answer:
Explanation:
The following code is written in Python, it prompts the user for a country code, look it up and if found prints out the corresponding country name. If not it prints out an error message stating "Code not found"
country_codes = {"Argentina": 54, "Bangladesh": 880,
"Brazil": 55, "Burma (Myanmar)": 95,
"China": 86, "Colombia": 57,
"Congo: Dem. Rep. of": 243, "Egypt": 20,
"Ethiopia": 251, "France": 33,
"Germany": 49, "India": 91,
"Indonesia": 62, "Iran": 98,
"Italy": 39, "Japan": 81,
"Mexico": 52, "Nigeria": 234,
"Pakistan": 92, "Philippines": 63,
"Poland": 48, "Russia": 7,
"South Africa": 27, "South Korea": 82,
"Spain": 34, "Sudan": 249,
"Thailand": 66, "Turkey": 90,
"Ukraine": 380, "United Kingdom": 44,
"United States": 1, "Vietnam": 84}
user_code = int(input("Enter Country code: "))
keys = list(country_codes.keys())
vals = list(country_codes.values())
if user_code in vals:
print(keys[vals.index(user_code)])
else:
print("Code not found")
what is a computer and what is the work of it
Answer:
A computer is an electronic machine that processes information. It is an information processor. It takes data, stores it, and then gives the result or answer.
It is a machine composed of hardare and software componests to be manually ised or atonomosly used.
Hope this helps!
Answer:
A computer is a machine that accepts data as input, processes that data using programs, and outputs the processed data as information. Many computers can store and retrieve information using hard drives. Computers can be connected together to form networks, allowing connected computers to communicate with each other.
“What is an example of the vocabulary word foreshadow?” This question could be a
a.
Potential question
c.
Flashcards question
b.
Vocabulary definition
d.
Both A and C
Please select the best answer from the choices provided
A
B
C
D
Answer:
D) Both A and C
Explanation:
Answer:
D
Explanation:
What is the name for the part of a camera which can block light when it's closed, and let light in when it's open?
Pixel
Lens
Focus
Shutter
Which option would allow you to watch an HD video, without delays in playback, on a computer with a Mac OS and a connection that has a lower bit rate? MPG QuickTime H.264 Flash Player
Answer:
H.264
Explanation:
A file type can be defined as the standard used to store digital data such as pictures, texts, videos, and audios. They all have unique file extension which determines the type of software program (application) to be used for opening a particular file and accessing its data e.g pictures (jpeg, png), texts (txt, docx, rtf), audios (mp3, acc), and videos (mp4, 3gp, avi, h.264, mkv).
Sometimes, computer users make the mistake of opening files with the wrong software application or program, this often leads to an error due to the incompatibility of the software application with the particular file.
H.265 is a high efficiency video codec (HEVC) and it's a standard video compression codec designed and developed to offer a better data compression, as an upgrade to the advanced video coding (AVC) standard.
Hence, the option or file extension (format) which would allow you to watch a high definition (HD) video, without delays in playback, on a computer with a Mac operating system (OS) and a connection that has a lower bit rate is the H.264 format.
Basic python coding, What is the output of this program? Assume the user enters 2, 5, and 10.
numA = 0
for count in range(3):
answer = input ("Enter a number: ")
fltAnswer = float(answer)
numA = numA + fltAnswer
print (numA)
Thanks in advance!
:L
Answer:
17.0
Explanation:
I ran it for you. You could also try that (go to replit).
Your organization, which sells manufacturing parts to companies in 17 different countries, is in the process of migrating your inventory database to the cloud. This database stores raw data on available inventory at all of your company's warehouses globally. The database will be accessible from multiple cloud-based servers that reside on your cloud provider's hardware located in three regions around the world. Each redundant database will contain a fully synchronized copy of all data to accelerate customer access to the information, regardless of the customer's geographical location.What database trend is your company implementing
Answer:
Disributed database
Explanation:
A distributed database stores data on multiple servers sometimes placed in distinct geographical locations.
Which of the following best describes the safety of blogging
Generally safe, but there may be some privacy and security concerns. Therefore option B is correct.
While blogging can offer a relatively safe platform for expressing ideas and connecting with an audience, it is not entirely risk-free.
Privacy and security concerns can arise, especially when bloggers share personal information or discuss sensitive topics.
Cybersecurity threats, such as hacking or data breaches, can also compromise a blogger's personal information or their readers' data.
Additionally, bloggers should be mindful of online harassment and potential legal issues related to content ownership or copyright infringement.
Being aware of these risks and implementing best practices for online safety can help ensure a more secure and enjoyable blogging experience.
Therefore option B is correct.
Know more about Cybersecurity:
https://brainly.com/question/31928819
Your question is incomplete, but most probably your full question was.
Which of the following best describes the safety of blogging?
A. Completely safe, with no risks involved.
B. Generally safe, but there may be some privacy and security concerns.
C. Moderately safe, but potential risks exist, especially with sensitive topics.
D. Highly unsafe, with significant risks to personal information and security.
Consider the following two data structures for storing several million words.
I. An array of words, not in any particular order
II. An array of words, sorted in alphabetical order
Which of the following statements most accurately describes the time needed for operations on these data structures?
A. Finding the first word in alphabetical order is faster in I than in II.
B. Inserting a word is faster in II than in I.
C. Finding a given word is faster in II than in I.
D. Finding the longest word is faster in II than in I.
Answer:
The correct answer is C.
Explanation:
Finding a given word requires the search operation. The search operation is faster in a sorted array compared to an unsorted array. In a sorted array the binary search method is used which runs on logarithmic time while in an unsorted array, there's no other way than linear search which takes O(n) time on the worst case where the required word is not in the array.
The statement which most accurately describes the time needed for operations on these data structures is: C. Finding a given word is faster in II than in I.
What is a binary search?Binary search can be defined as an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data, especially by using the run-time complexity of Ο(log n)
Note: n is the total number of elements.
In Computer science, Binary search typically applies the principles of divide and conquer. Thus, to perform a binary search on an array, the array must first be sorted in an alphabetical or ascending order.
In conclusion, the statement which most accurately describes the time needed for operations on these data structures is that, finding a given word is faster in data structure II than in I.
Read more on data structure here: https://brainly.com/question/24268720
Bro how the hell do u do full screen on windows
(LAPTOP. NOT PC.)
f11 does not work, does anyone have a solution?
Answer:
You'll need to hold down/click f11 and fn at the same time.
If not that, try ctrl + shift + f5.
I can guarantee the first works; not too sure about the second.
Explanation:
Well, it's hotkeys, so...
EDIT: The f5 command does nothing related to full screen, my bad.
Answer:
f11 should work just hold it down or restart your computer and try it again
Explanation:
Which are the 2 main elements that’s make up computer architecture?
Answer:
Explanation:
Computer architecture is made up of two main components the Instruction Set Architecture (ISA) and the RTL model for the CPU.
my code get an input of 1900 and it should output not a leap year but it fails first line of code. It should output not a Leap any number with 1500 not divisble by 4 with/out a remainder should output (not a leap year. )
input_year = int(input())
if input_year % 4 == 0: #fails on this step, 1900 should be false
print(input_year, "- is Leap Year")
elif input_year % 100 == 0:
print(input_year, "- leap year")
elif input_year % 400 ==0:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
Answer:
Explanation:
The code does not fail on the first step since 1900 divided by 4 is actually 475 and has no remainder, meaning that it should return True. The code won't work because the if statements need to be nested in a different format. The correct algorithm would be the following, which can also be seen in the picture attached below that if we input 1900 it would output is not a leap year as it fails on the division by 400 which gives a remainder of 0.75
input_year = int(input())
if input_year % 4 == 0:
if input_year % 100 == 0:
if input_year % 400 == 0:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
else:
print(input_year, "is a leap year")
else:
print(input_year, "- not a leap year")
Me Completan Pliiiis
Answer:
its in Spanish most people cant read Spanish
Explanation: