Write a short program in C that will display the following information:
Name : Phones:
email:
Hometown:
High School(s):
Previous colleges:
List college math/CS courses:
What, when, and where was your last math and cs course?
Type(s) of computers that you are confident working on:
Extracurricular activities (jobs, clubs, sports, etc.)
Favorite books, movies, music:
What you plan to do after graduation? (Be as specific as you can.)
Be sure to include all necessary documentation within your code

Answers

Answer 1

Answer:

Explanation:

The objective of this question and what we are meant to do is to compute a short program in C++ that will display the information given in the question.

Let get started!.

C ++ Program Code.

#include <iostream>

#include<string>

using namespace std;

int main()

{

string name,email,hometown,highschool,previousColleges,mathOrCSCource,lastMathOrCSCource,CompType,ExtraCur,FavBook

,planAfterGrad,phone;

//Reading Data

cout<<"Name:";

getline(cin,name);

cout<<"Phone:";

getline(cin,phone);

cout<<"Email:";

getline(cin,email);

cout<<"HomeTown:";

getline(cin,hometown);

cout<<"High School(s):";

getline(cin,highschool);

cout<<"Previous Colleges:";

getline(cin,previousColleges);

cout<<"List of math/CS Cources:";

getline(cin,mathOrCSCource);

cout<<"When,Where and what was your last math or CS course:";

getline(cin,lastMathOrCSCource);

cout<<"Type(s) of computer you are confident working with:";

getline(cin,CompType);

cout<<"ExtraCurricular Activities (job,club,sports,etc.):";

getline(cin,ExtraCur);

cout<<"Favourite books,movies,music:";

getline(cin,FavBook);

cout<<"What you plan to do after Graduation:";

getline(cin,planAfterGrad);

//Printing data

cout<<"--------------------Printing Data---------------------------"<<endl;

cout<<"Name:"<<name<<endl;

cout<<"Phone:"<<phone<<endl;

cout<<"Email:"<<email<<endl;

cout<<"HomeTown:"<<hometown<<endl;

cout<<"High School(s):"<<highschool<<endl;

cout<<"Previous Colleges:"<<previousColleges<<endl;

cout<<"List of math/CS Cources:"<<mathOrCSCource<<endl;

cout<<"When,Where and what was your last math or CS course:"<<lastMathOrCSCource<<endl;

cout<<"Type(s) of computer you are confident working with:"<<CompType<<endl;

cout<<"ExtraCurricular Activities (job,club,sports,etc.):"<<ExtraCur<<endl;

cout<<"Favourite books,movies,music:"<<FavBook<<endl;

cout<<"What you plan to do after Graduation:"<<planAfterGrad<<endl;

return 0;

}


Related Questions

It's inventiveness, uncertainty futuristic ideas typically deal with science and technology.what is it?

Answers

Answer:

Engineering and Science

Explanation:

You have observed that Alexander Rocco Corporation uses Alika’s Cleaning Company for its janitorial services. The company’s floors are vacuumed and mopped each night, and the trash is collected in large bins placed outside for pickup on Tuesdays and Fridays. You decide to visit the dumpster Thursday evening after the cleaning crew leaves. Wearing surgical gloves and carrying a large plastic sheet, you place as much of the trash on the sheet as possible. Sorting through the material, you find the following items: a company phone directory; a Windows NT training kit; 23 outdated Oracle magazines; notes that appear to be programs written in HTML, containing links to a SQL Server database; 15 company memos from key employees; food wrappers; an empty bottle of expensive vodka; torn copies of several resumes; an unopened box of new business cards; and an old pair of women’s running shoes. Based on this information, write a two-page report explaining the relevance these items have. What recommendations, if any, might you give to Alexander Rocco management?

Answers

Answer:

Explanation:

Relevance of Thrown Items:

   The thrown items mainly consist of the Windows NT training kit, outdated magazines and some written notes, etc. All these things can be used in the company for training the fresh talent.    These things must be used for the purpose of training fresh people and the things like programs written in HTML must not be dumped like this because they consists of the raw code which can be harmful if gotten into wrong hands.    Hence, the information like this must be taken care of seriously as these can be loopholes into companies down.    Rest of the things like food wrappers, empty bottles, resume copies are all worthless to the company and can be thrown into the dump as soon as possible.The business cards must also be thrown if not important.

Recommendation To Management:

   The management must take these things seriously and must double check the company properties before throwing them into dump. There must be a committe build to check the things that are been going directly to the dump.    They must have the responsibility for checking the things before going to the dump and must filter all the important things from the garbage back to the shelves of the office.Hence, these things must be taken care of so that no harm is to be done to the company.

cheers i hope this helped !!

Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to print two random integers between (and including) 0 and 9. End with a newline. Ex: 5 7 Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, after calling srand() once, do not call srand() again. (Notes)
GIVEN:
#include
#include // Enables use of rand()
#include // Enables use of time()
int main(void) {
int seedVal = 0;
/* Your solution goes here */
return 0;
}
2). Type two statements that use rand() to print 2 random integers between (and including) 100 and 149. End with a newline. Ex:
101
133
Note: For this activity, using one statement may yield different output (due to the compiler calling rand() in a different order). Use two statements for this activity. Also, srand() has already been called; do not call srand() again.
GIVEN:
#include
#include // Enables use of rand()
#include // Enables use of time()
int main(void) {
int seedVal = 0;
seedVal = 4;
srand(seedVal);
/* Your solution goes here */
return 0;
}

Answers

Answer:

1. The solution to question 1 is as follows;

srand(seedVal);

cout<<rand()%10<<endl;

cout<<rand()%10<<endl;

2. The solution to question 2 is as follows

cout<<100+rand()%50 <<endl;

cout<<100+rand()%50 <<endl;

Explanation:

The general syntax to generate random number between interval is

Random Number = Lower Limit + rand() % (Upper Limit - Lower Limit + 1)

In 1;

The solution starts by calling srand(seedVal);

The next two statements is explained as follows

To print two random integers between intervals of 0 and 9 using rand()"

Here, the lower limit = 0

the upper limit =  9

By substituting these values in the formula above; the random number will be generated as thus;

Random Number = 0 + rand() % (9 - 0 + 1)

Random Number = 0 + rand() % (10)

Random Number = rand() % (10)

So, the instruction to generate the two random variables is rand() % (10)

2.

Similar to 1 above

To print two random integers between intervals of 100 and 149 using rand()"

Here, the lower limit = 100

upper limit = 149

By substituting these values in the formula above; the random number will be generated as thus;

Random Number = 100 + rand() % (149 - 100 + 1)

Random Number = 100 + rand() % (50)

So, the instruction to generate the two random variables is 100 + rand() % (50)

The following are reasons why many organizations are trying to reduce and right-size their information foot-print by using data governance techniques like data cleansing and de-duplication:
A. None of the above
B. reduce risk of systems failures due to overloading
C. improve data quality and reduce redundancies, reduce increased and staggering storage management costs,
D. Both A and B

Answers

Answer:

C. improve data quality and reduce redundancies, reduce increased and staggering storage management costs

Explanation:

Excess data retention can lead to retention of redundant and irrelevant data, which can reduce data handling and processing efficiency, while at the same time increasing the cost of data storage and management. This can be curbed be reducing data to the right size by using data governance techniques like data cleansing and de-duplication

The degree of a point in a triangulation is the number of edges incident to it. Give an example of a set of n points in the plane such that, no matter how the set is triangulated, there is always a point whose degree is n−1.

Answers

Answer:

squarepentagon

Explanation:

The vertices of a square is one such set of points. Either diagonal will bring the degree of the points involved to 3 = 4-1.

The vertices of a regular pentagon is another such set of points. After joining the points in a convex hull, any interior connection will create a triangle and a quadrilateral. The diagonal of the quadrilateral will bring the degree of at least one of the points to 4 = 5-1.

8) Which of the following statements is FALSE?
1) You will likely need to use a combination of both popular and scholarly resources in your research
2) The CRAAP test can be used to help evaluate all of your sources
3) Academic journal articles are always unbiased in their analysis
4) Popular resources tend to be easier to read than scholarly articles

Answers

Answer:

3) Academic journal articles are always unbiased in their analysis.

Explanation:

The Academic journals are not always unbiased. There can be some authors which may write in some situation and bias the articles. It is important to analyse source and reliability of the article before relying on it. An unbiased author will try to capture picture fairly. The unbiased author presents the facts as it is and does not manipulates the truth.

What are the best data structures to create the following items? And why?
1. Designing a Card Game with 52 cards.
2. Online shopping cart (Amazon, eBay, Walmart, Cosco, Safeway, ...)
3. Online waiting list (De Anza College class waiting list, ...)
4. Online Tickets (Flight tickets, concert tickets, ...)

Answers

Answer:

The best structures to create the following items are

ARRAYHASHMAPS  QUEUE SORTED LINK LISTS

Explanation:

The best structures to create the following items are:

Array : for the storage of cards in a card game the best data structure to be used should be the Array data structure. this is because  the size of the data ( 52 cards ) is known and using Array will help with the storing of the cards values in the Game.Hashmaps : Hashmap data structure should be implemented in online shopping cart this IS BECAUSE  items can be easily added or removed from the cart therefore there is a need to map the Items ID or name to its actual database online waiting list are usually organised/arranged in a first-in-first-out order and this organization is best created using the queue data structure Sorted link lists is the best data structure used to create, store and manage online tickets. the sorted link data structure helps to manage insertions and deletions of tickets in large numbers  and it also reduces the stress involved in searching through a large number of tickets by keeping the tickets in sorted lists

Describe and list advantages and disadvantages of each of the following backup types:

full, differential, incremental, selective, CPD, and cloud. ​

Answers

Answer:

Full back up

It creates complete copy of the source of data. This feature made it to the best  back  up with good speed of recovery of the data and  simplicity.However, because it  is needed for backing up  of  a lot of data, it is time consuming process,Besides it also  disturbs the routine application of  the technologist infrastructure. In addition large capacity storage is needed  for the  storage of  the large volume of back up with each new creation.

Incremental back up: back up work at high speed thus saves time, Little storage capacity is needed. This type of back up can be run as  many time as wished.

However, the restoration of data takes time, due to the time spent for restoration of initial back up and the incremental.

Differential Back up has very fast back up operation, because it only requires two pieces of back up.This is however slower compare to the Incremental.

The selective back up enable selection of certain type of file or folders for back up.

it can only be used to back up folders only when important data  are needed only.Thus the  storage capacity is low.

CPD eliminates back up window and reduces the recovery point objective.However, it has issue of compatibility with the resources to back up.,it is also expensive because its solutions are disk based.

Cloud based is affordable and save cost,It is easier to access. it is efficient,it can be access remotely for convenience.

However, Internet sources and some bandwidth must be available for access., always depends on third party providers,There is also problems encountered when switching providers.

Explanation:

Maya wrote a program and forgot to put the steps in the correct order. Which step does Maya need to review? Pattern following Planning Segmenting Sequencing

Answers

Answer:

Sequencing

Explanation:

Answer:

SEQUENCING

Explanation:

Assume passwords are selected from four character combinations of 26 lower case alphabetic characters. Assume an adversary is able to attempt passwords at a rate of 1 per second. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password

Answers

Answer:

Given:

Passwords are selected from 4 characters.

Character combinations are 26 lower case alphabetic characters.

Passwords attempts by adversary is at rate of 1 second.

To find:

Expected time to discover the correct password

Explanation:

Solution:

4 character combinations of 26 alphabetic characters at the rate of one attempt at every 1 second = 26 * 4 = 104

So 104 seconds is the time to discover the correct password. However this is the worst case scenario when adversary has to go through every possible combination. An average time or expected time to discover the correct password is:

13 * 4 = 52

You can also write it as 104 / 2 = 52 to discover the correct password. This is when at least half of the password attempts seem to be correct.

Alejandra is using a flash drive that a friend gave to her to copy some financial records from the company database so she can complete a department presentation at home. She does not realize that the flash drive is infected with a virus that enables a malicious hacker to take control of her computer. This is a potential __________ to the confidentiality of the data in the files

Answers

Answer:

maybe threat?

Explanation:

Write the class "Tests". Ensure that it stores a student’s first name, last name, all five test scores, the average of those 5 tests’ scores and their final letter grade. (Use an array to store all test scores.)

Answers

Answer:

The following assumption will be made for this assignment;

If average score is greater than 75, the letter grade is AIf average score is between 66 and 75, the letter grade is BIf average score is between 56 and 65, the letter grade is CIf average score is between 46 and 55, the letter grade is DIf average score is between 40 and 45, the letter grade is EIf average score is lesser than 40, the letter grade is F

The program is written in Java and it uses comments to explain difficult lines. The program is as follows

import java.util.*;

public class Tests

{

public static void main(String [] args)

{

 //Declare variables

 Scanner input = new Scanner(System.in);

 String firstname, lastname;

 //Prompt user for name

 System.out.print("Enter Lastname: ");

 lastname = input.next();

 System.out.print("Enter Firstname: ");

 firstname = input.next();

 char grade;

 //Declare Array

 int[] Scores = new int[5];

 //Initialize total scores to 0

 int total = 0;  

  //Decalare Average

  double   average;

 //Prompt user for scores

 for(int i =0;i<5;i++)

 {

  System.out.print("Enter Score "+(i+1)+": ");

  Scores[i] = input.nextInt();

  //Calculate Total Scores

  total+=Scores[i];

 }

 //Calculate Average

 average = total/5.0;

 //Get Letter Grade

 if(average>75)

 {

 grade = 'A';

 }

 else if(average>65)

 {

 grade = 'B';

 }

 else if(average>55)

 {

 grade = 'C';

 }

 else if(average>45)

 {

 grade = 'D';

 }

 else if(average>40)

 {

 grade = 'E';

 }

 else

 {

 grade = 'F';

 }

 //Print Student Results

 System.out.print("Fullname: "+lastname+", "+firstname);

 System.out.print('\n');

 System.out.print("Total Scores: "+total);

 System.out.print('\n');

 System.out.print("Average Scores: "+average);

 System.out.print('\n');

 System.out.print("Grade: "+grade);

}

}

See Attachment for .java file

Advanced Sounds is engaging in a full upgrade of its Windows Server 2003 network to Windows Server 2008. The upgrade includes using Windows Server 2008 Active Directory. Advanced Sounds has pioneered many technological innovations and is very concerned about keeping its network and computer systems secure. Advanced Sounds Information Technology (IT) Department hires you to help them implement Windows Server 2008 Active Directory. Assume the following:
All email servers have been consolidated back in the New York City Complex.
Most all the other applications running on Windows Servers are distributed at all sixteen locations.
Each location at minimum has a file server, a print server and a local application server.
All locations have adequate Wide Area network connections with available capacity; 10 Mbps links
The New York location has enough network capacity to serve all 16 locations.
There are 500 people at the New Your City complex.
There are 200 people at the Quebec City location and 200 at the Montreal location.
There are 40-50 people at each outlet store.
Advanced Sounds IT Department has formed a small installation planning committee consisting of the IT server operations manager, two system programmers, the current Active Directory administrator, and you. After the first meeting they have asked you to prepare a small report to address the following questions:
A. What information is required as input to the initial installation involving Active Directory? a=
B. How many Active directory servers do you propose?
C. Where will the Active directory server(s) be located?

Answers

Answer:

cs

Explanation:

The Nigerian 4-6-9 scam refers to a fraudulent activity whereby individuals claiming to be from a foreign country will promise a victim large sums of money for assisting them in secretly moving large sums of money.

a. True
b. False

Answers

Answer:

b. False

Explanation:

The system of fraud is called 4-1-9 scam. And yes, victims are always promised large sum of money to secretly help in moving a large sum of money.

Answers must be correct. Or else it will be flagged. All of these sub parts need to be answered with step by step process showing all work and reasoning.
DISCRETE STRUCTURES:
1.a. Truth value of a propositional statement For this exercise, it is easier not to use truth tables.
1. Suppose that A → ((BAC)-D) is false. What are the truth values of A, B, C, and D?
2. Suppose that (A-B) v (CA (DAE)) → F) is false.
What are the truth values of A, B, C, D, E, and F?
1.b. Logical equivalence Prove the equivalences below without using truth tables. Instead, use the rules of logical equivalence given in class. Justify your reasoning.
1.c. Inference Formalize the following argument and show that it is valid.
If Jose took the jewellery or Mrs. Krasov lied, then a crime was committed. Mr. Krasov was not in town. If a crime was committed, then Mr. Krasov was in town. Therefore Jose did not take the jewellery

Answers

Note: The complete part of question 1b is attached as a file

Answer:

1ai) A = true, B = true, C = true, D = false

Check the attached files for the answers of the remaining parts

Explanation:

The detailed solutions of all the sections of the question are contained in the attached files

A(n) _____ element, as described by the World Wide Web Consortium (W3C), is an element that "represents a section of a page that consists of content that is tangentially related to the content around that element, and which could be considered separate from that content."

Answers

Answer:

B. Aside element

Explanation:

The options for this question are missing, the options are:

A. ​article element

B. ​aside element

C. ​section element

D. ​content element

An aside element is defined as a section of a page that has content that is tangentially related to the content around the element. In other words, the aside element represents content that is indirectly related to the main content of the page. Therefore, we can say that the correct answer to this question is B. Aside element.

The beginning of a free space bitmap looks like this after the disk partition is first formatted: 1000 0000 0000 0000 0000 0000 0000 0000 (the first block is used by the root directory). The system always searches for free blocks starting at the lowest numbered block, so after writing file A, which uses 8 blocks, the bitmap looks like this 1111 1111 1000 0000 0000 0000 0000 0000. Show the bitmap after each of the following actions: (a) File B is written, using 12 blocks (b) File C is written, using 7 blocks (c) File A is deleted (d) File B is deleted (e) File D is written, using 6 blocks (f) File E is written, using 9 blocks Show all steps.

Answers

Hgvccnnfdknvjdkvkdjdi

The bitmap is 1110 0000 0001 0000 after some use. The system always looks for free blocks beginning using a contiguous allocation technique.

What is a bitmap?

After some use, the new bitmap is 1110 0000 0001 0000. The system employs a contiguous allocation mechanism and starts searching for free blocks at the position.

(a) File B is made up of five blocks, 1111 1111 1111 0000.

b) The batch number 1000 0001 1111 0000 deletes File A.

c) Eight blocks are used for writing in file C.

1111 1111 1111 1100

File B is deleted (d). 1111 1110 0000 1100

Free-space bitmaps are one method used by some file systems to keep track of allocated sectors. Even though the most fundamental implementation of free-space bitmaps is incredibly wasteful, some modern file systems use complex or hybrid versions of them.

Therefore, after some use, the bitmap is 1110 0000 0001 0000. The contiguous allocation strategy is always used by the system to look for free blocks to start with.

To learn more about bitmap, refer to the link:

https://brainly.com/question/26230407

#SPJ2

Given the array [13, 1, 3, 2, 8, 21, 5, 1] suppose we choose the pivot to be 1 the second element in the array. Which of the following would be valid partitions?
A. 1 [1, 2, 3, 5, 8, 13, 21]
B. 1 [13, 1, 3, 2, 8, 21, 5]
C. 1 [13, 3, 2, 8, 21, 5, 1]
D. [1] 1 [13, 3, 2, 8, 21, 5]
E. [13] 1 [3, 2, 8, 21, 5, 1]
F. [13, 1, 3, 2, 8, 21, 5] 1 2/4

Answers

Answer:

D. [1] 1 [13, 3, 2, 8, 21, 5]

Explanation:

Using a quicksort with 1 as the pivot point, elements less than 1 will be sorted to the left of 1 and the other elements are greater than one will be sorted to the right of 1. The order doesn't matter. So we sort [1] to the left of 1 and [13, 3, 2, 8, 21, 5] to the right of 1. So, D. [1] 1 [13, 3, 2, 8, 21, 5] is the valid partition.

Write a class called Triangle that can be used to represent a triangle. It should include the following methods that return boolean values indicating if the particular property holds: a. isRight (a right triangle) b. isScalene (no two sides are the same length) c. isIsosceles (exactly two sides are the same length) d. isEquilateral (all three sides are the same length).

Answers

Answer:

Explanation:

import java.io.*;

class Triangle

{

  private double side1, side2, side3; // the length of the sides of

                                       // the triangle.

  //---------------------------------------------------------------

  // constructor

  //

  // input : the length of the three sides of the triangle.

  //---------------------------------------------------------------

  public Triangle(double side1, double side2, double side3)

  {

      this.side1 = side1;

      this.side2 = side2;

      this.side3 = side3;

  }

  //---------------------------------------------------------------

  // isRight

  //

  // returns : true if and only if this triangle is a right triangle.

  //---------------------------------------------------------------

  boolean isRight()

  {

      double square1 = side1*side1;

      double square2 = side2*side2;

      double square3 = side3*side3;

      if ((square1 == square2 + square3) ||

          (square2 == square1 + square3) ||

          (square3 == square1 + square2))

          return true;

      else

          return false;

  }

  // isValid

  // returns : true if and only if this triangle is a valid triangle.

  boolean isValid()

  {

      if ((side1 + side2 < side3) ||

          (side1 + side3 < side2) ||

          (side2 + side3 < side1))

          return false;

      else

          return true;

  }

  // isEquilateral

  //

  // returns : true if and only if all three sides of this triangle

  // are of the same length.

  boolean isEquilateral()

  {

      if (side1 == side2 && side2 == side3)

          return true;

      else

          return false;

  }

  // isIsosceles

  //

  // returns : true if and only if exactly two sides of this triangle

  // has the same length.

  boolean isIsosceles()

  {

      if ((side1 == side2 && side2 != side3) ||

          (side1 == side3 && side2 != side3) ||

          (side2 == side3 && side1 != side3))

          return true;

      else

          return false;

  }

  // isIsosceles

  // returns : true if and only if exactly no two sides of this

  // triangle has the same length.

  boolean isScalene()

  {

      if (side1 == side2 || side2 == side3 || side1 == side3)

          return false;

      else

          return true;

  }

}

//-------------------------------------------------------------------

// class Application

//

// This class is the main class of this application. It prompts

// the user for input to construct a triangle, then prints out

// the special properties of the triangle.

//-------------------------------------------------------------------

public class Application

{

  //---------------------------------------------------------------

  // getInput

  //

  // input : stdin - BufferedReader to read input from

  //         msg - message to prompt the user with

  // returns : a double value input by user, guranteed to be

  //           greater than zero.

  //---------------------------------------------------------------

  private static double getInput(BufferedReader stdin, String msg)

      throws IOException

  {

      System.out.print(msg);

      double input = Double.valueOf(stdin.readLine()).doubleValue();

      while (input <= 0) {

          System.out.println("ERROR : length of the side of triangle must " +

              "be a positive number.");

          System.out.print(msg);

          input = Double.valueOf(stdin.readLine()).doubleValue();

      }

      return input;

  }

  //---------------------------------------------------------------

  // printProperties

  //

  // input : triangle - a Triangle object

  // print out the properties of this triangle.

  //---------------------------------------------------------------

  private static void printProperties(Triangle triangle)

  {

      // We first check if this is a valid triangle. If not

      // we simply returns.

      if (!triangle.isValid()) {

          System.out.println("This is not a valid triangle.");

          return;

      }

      // Check for right/equilateral/isosceles/scalene triangles

      // Note that a triangle can be both right triangle and isosceles

      // or both right triangle and scalene.

     

      if (triangle.isRight())

          System.out.println("This is a right triangle.");

      if (triangle.isEquilateral())

          System.out.println("This is an equilateral triangle.");

      else if (triangle.isIsosceles())

          System.out.println("This is an isosceles triangle.");

      else

          // we do not need to call isScalene here because a triangle

          // is either equilateral/isosceles or scalene.

          System.out.println("This is an scalene triangle.");

  }

  // main

  // Get the length of the sides of a triangle from user, then

  // print out the properties of the triangle.

  public static void main(String args[]) throws IOException

  {

      BufferedReader stdin = new BufferedReader

          (new InputStreamReader(System.in));

      double side1 = getInput(stdin,

          "What is the length of the first side of your triangle? ");

      double side2 = getInput(stdin,

          "What is the length of the second side of your triangle? ");

      double side3 = getInput(stdin,

          "What is the length of the third side of your triangle? ");

      System.out.print("Pondering...\n");

      printProperties(new Triangle(side1, side2, side3));

  }

}

Write a loop that sets each array element to the sum of itself and the next element, except for the last element which stays the same. Be careful not to index beyond the last element. Ex:
Initial scores: 10, 20, 30, 40
Scores after the loop: 30, 50, 70, 40
The first element is 30 or 10 + 20, the second element is 50 or 20 + 30, and the third element is 70 or 30 + 40. The last element remains the same.
SAMPLE OUTPUT:
#include
int main(void) {
const int SCORES_SIZE = 4;
int bonusScores[SCORES_SIZE];
int i = 0;
bonusScores[0] = 10;
bonusScores[1] = 20;
bonusScores[2] = 30;
bonusScores[3] = 40;
/* Your solution goes here */
for (i = 0; i < SCORES_SIZE; ++i) {
printf("%d ", bonusScores[i]);
}
printf("\n");
return 0;
}

Answers

Answer:

Replace /* Your solution goes here */  with the following lines of code

for(i = 0;i<SCORES_SIZE-1;i++)

{

bonusScores[i]+=bonusScores[i+1];

}

Explanation:

The above iteration starts from the index element (element at 0) and stops at the second to the last element (last - 1).

Using an iterative variable, i

It adds the current element (element at i) with the next element; element at i + 1.

The full code becomes

#include<iostream>

using namespace std;

int main(void) {

const int SCORES_SIZE = 4;

int bonusScores[SCORES_SIZE];

int i = 0;

bonusScores[0] = 10;

bonusScores[1] = 20;

bonusScores[2] = 30;

bonusScores[3] = 40;

for(i = 0;i<SCORES_SIZE-1;i++)

{

bonusScores[i]+=bonusScores[i+1];

}

/* Your solution goes here */

for (i = 0; i < SCORES_SIZE; ++i) {

printf("%d ", bonusScores[i]);

}

printf("\n");

return 0;

}

See attachment for .cpp file

Answer:int main() {

const int SCORES_SIZE = 4;

int bonusScores[SCORES_SIZE];

int i;

for (i = 0; i < SCORES_SIZE; ++i) {

cin >> bonusScores[i];

}

for (i = 0; i < SCORES_SIZE-1; ++i){

bonusScores[i] += bonusScores[i+1];

}

for (i = 0; i < SCORES_SIZE; ++i) {

cout << bonusScores[i] << " ";

}

cout << endl;

return 0;

}

Explanation: SCORES_SIZE -1 will prevent the for loop from going past the last value in the array. bonusScores[i] += will add the value of bonusScores[i+1] to the original bonusScores[i].

for example, i = 1; 1 < SCORES_SIZE - 1 ; bonusScores[1] += bonusScores[1+1} becomes{ bonusScores[1] + bonusScores{2];

Seth would like to make sure as many interested customers as possible are seeing his business’s website displayed in their search results. What are a few things he could pay attention to in order to achieve this?

Answers

Answer:

Hi! Make sure that the website has a few things. Proper Keywords, the pages have the proper tags, a form on the website, contact information, CIty State, Etc., Then a phone number. Social media icons that link properly to the social media pages.

Explanation:

For the PSoC chip what is the minimum voltage level in volts that can be considered to logic one?​

Answers

Answer:

Asian man the man is one 1⃣ in a and the perimeters are not only

If you were required to give a speech identifying the risks of using computers and digital devices, which group of items would you include?

Answers

Camera and Mic

These 2 things are the most likely things to get you in trouble. Unless you have a 100% protected device, and honestly even if you do, cover up the camera and close your mic. This will definitely save you later.

web pages with personal or biograpic information are called ​

Answers

Answer:

Web pages with personal or biographic information are called. a. Social Networking sites. c.

Explanation:

import java.util.Scanner; public class ArraySum { public static void main(String[] args) { Scanner scnr = new Scanner(System.in); final int NUM_ELEMENTS = 8; // Number of elements int[] userVals = new int[NUM_ELEMENTS]; // User numbers int i = 0; // Loop index int sumVal = 0; // For computing sum // Prompt user to populate array System.out.println("Enter " + NUM_ELEMENTS + " integer values..."); for (i = 0; i < NUM_ELEMENTS; ++i) { System.out.print("Value: "); userVals[i] = scnr.nextInt(); } // Determine sum sumVal = 0; for (i = 0; i < NUM_ELEMENTS; ++i) { sumVal = sumVal + userVals[i]; } System.out.println("Sum: " + sumVal); return; } }

Answers

Answer:

There's nothing wrong with the question you posted except that it's not well presented or arranged.

When properly formatted, the program will be error free and it'll run properly.

The programming language used in the question is Java programming lamguage.

in java, the sign ";" signifies the end of each line and lines that begins with // represent comments. Using this understanding of end of lines and comments, the formatted code goes thus

import java.util.Scanner;  

public class Arraysum {  

public static void main(String[] args) {  

Scanner scnr = new Scanner(System.in);  

final int NUM_ELEMENTS = 8;

// Number of elements  

int[] userVals = new int[NUM_ELEMENTS];  

// User numbers  

int i = 0;  

// Loop index  

int sumVal = 0;  

// For computing sum  

// Prompt user to populate array  

System.out.println("Enter " + NUM_ELEMENTS + " integer values...");  

for (i = 0; i < NUM_ELEMENTS; ++i) {  

System.out.print("Value: ");  

userVals[i] = scnr.nextInt();  

}  

// Determine sum  

sumVal = 0;

for (i = 0; i < NUM_ELEMENTS; ++i)

{

sumVal = sumVal + userVals[i];

}

System.out.println("Sum: " + sumVal); return;

}

}

Also, see attachment for source file

Which of the following is an example of joint problem solving?

Answers

Explanation:

There is a high degree of informality to these relationships, which are focused on information sharing, joint-problem solving and joint operations.

A hallmark of most of these processes is their informality, whether through information sharing, joint problem solving or joint operations.

Global joint problem-solving team. In addition to requesting a division of labour, the Global Task Team recommendations called upon the World Health Organization (WHO), UNICEF, the United Nations Population Fund (UNFPA), the United Nations Development Programme (UNDP), the World Bank, the UNAIDS Secretariat and the Global Fund to take the lead in and establish the joint United Nations system-Global Fund problem-solving team by July # in order to support efforts that address implementation bottlenecks at the country level

Mikayla wants to create a slide with a photograph of a car and the car horn sounding when a user clicks on the car. Which
feature should she use, and why?
a. She should use the Action feature because it allows a user to embed a hyperlink for an Internet video on the car.
b. She should use the Video from Website feature because it allows a user to embed a hyperlink for an Internet video on the car.
c. She should use the Action feature because it allows a user to place an image map with a hotspot on the car.
d. She should use the Video from Website feature because it allows a user to place an image map with a hotspot on the car.

Answers

Answer: A

Explanation: edge :)

Answer:

C

Explanation:

The Fast Freight Shipping Company charges the following rates for different package weights:
2 pounds or less: $1.50
over 2 pounds but not more than 6 pounds: $3.00
over 6 pounds but not more than 10 pounds: $4.00
over 10 pounds: $4.75
Write a program that asks the user to enter the weight of a package and then displays the shipping charges. The program should also do "Input Validation" that only takes positive input values and show a message "invalid input value!" otherwise.

Answers

Answer:

import java.util.Scanner;

public class ShippingCharge

{

   static double wt_2=1.50;

   static double wt_6=3;

   static double wt_10=4;

   static double wt_more=4.75;

   static double charge;

   static double weight;

public static void main(String[] args) {

    Scanner sc = new Scanner(System.in);

   do

   {

 System.out.print("Enter the weight of the package: ");

 weight = sc.nextDouble();

 if(weight<=0)

     System.out.println("Invalid input value!");

}while(weight<=0);

 if(weight<=2)

    charge=wt_2;

else if(weight<=6 && weight>2)

    charge=wt_6;

else if(weight<=10 && weight>6)

    charge=wt_10;

else

    charge=wt_more;

System.out.println("Shipping charges for the entered weight are $"+charge);

}

}

OUTPUT

Enter the weight of the package: 0

Invalid input value!

Enter the weight of the package: 4

Shipping charges for the entered weight are $3.0

Explanation:

1. The variables to hold all the shipping charges are declared as double and initialized.

   static double wt_2=1.50;

   static double wt_6=3;

   static double wt_10=4;

   static double wt_more=4.75;

2. The variable to hold the user input is declared as double.

   static double charge;

   static double weight;

3. The variable to hold the final shipping charge is also declared as double.  

4. Inside main(), an object of Scanner class is created. This is not declared static since declared inside a static method, main().

Scanner sc = new Scanner(System.in);

5. Inside do-while loop, user input is taken until a valid value is entered.

6. Outside the loop, the final shipping charge is computed using multiple if-else statements.

7. The final shipping charge is then displayed to the user.

8. All the code is written inside class since java is a purely object-oriented language.

9. The object of the class is not created since only a single class is involved.

10. The class having the main() method is declared public.  

11. The program is saved with the same name as that of the class having the main() method.

12. The program will be saved as ShippingCharge.java.

13. All the variables are declared as static since they are declared outside main(), at the class level.

Convert 2910 to binary, hexadecimal and octal. Convert 5810 to binary, hexadecimal and octal. Convert E316 to binary, decimal and octal. Convert 5916 to binary, decimal and octal. Convert 010010102 to decimal, octal and hexadecimal. Convert 001010102 to decimal, octal and hexadecimal. Convert 438 to binary, decimal and hexadecimal. Convert 618 to binary, decimal and hexadecimal.

Answers

Answer:

2910 to binary = 101101011110

2910 to hexadecimal = B5E

2910 to octal = 5536

E316 to binary = 1110001100010110

E316 to octal = 161426

E316 to decimal = 58134

5916 to binary = 101100100010110

5916 to decimal = 22806

5916 to octal = 54426

010010102 to decimal = 149

010010102 to octal = 225

010010102 to hexadecimal = 95

FOR 438 and 618, 8 is not a valid digit for octal..

What password did the boss gave to the man?

Answers

Answer:

1947

Explanation:

because i dont know

Answer:

where is the password?

Explanation:

Other Questions
Can someone plz help me solved this problem I need help plz help me! Will mark you as brainiest! PLEASE HELP ME WITH THIS IT'S TIMED I WILL GIVE BRAINLIEST-1. A right triangle has side lengths 15 centimeters, 20 centimeters, and 25 centimeters. How can you use the Pythagorean Theorem to write an equation the describes how the side lengths are related?2. How do you know that the geometric proof of the Pythagorean Theorem in question 1 can be applied to all right triangles? Which two common themes of war literature are reflected in this excerpt? If in some smothering dreams you too could pace Behind the wagon that we flung him in, And watch the white eyes writhing in his face, His hanging face, like a devil's sick of sin; If you could hear, at every jolt, the blood Come gargling from the froth-corrupted lungs, Obscene as cancer, bitter as the cud Of vile, incurable sores on innocent tongues, My friend, you would not tell with such high zest To children ardent for some desperate glory, The old Lie: Dulce et decorum est Pro patria mori. (Wilfred Owen, "Dulce Et Decorum Est") -bitterness at the massive loss of life caused by war -anger at the ignorance of civilians and leaders at home -the innocence and ignorance of enlisted soldiers -anger at the government for lying to enlisted youth -the pain of those left at home waiting for the soldiers Why did Herbert Spencer's theories on social Darwinism appeal toimperialists?A. Because Herbert Spencer thought that the nation with the mostcolonies would be the most powerful oneB. Because Herbert Spencer called for the rapid industrialization ofthe worldC. Because Herbert Spencer proposed that Christians were requiredto convert others to ChristianityD. Because Herbert Spencer stated that the strongest civilizationswould conquer the weak plz help plzzz thank you Presented below is information related to Oriole Corp. for the year 2020. Net sales $1,534,000 Write-off of inventory due to obsolescence $94,400 Cost of goods sold 920,400 Depreciation expense omitted by accident in 2019 64,900 Selling expenses 76,700 Casualty loss 59,000 Administrative expenses 56,640 Cash dividends declared 53,100 Dividend revenue 23,600 Retained earnings at December 31, 2019 1,156,400 Interest revenue 8,260 Effective tax rate of 20% on all itemsPrepare a multiple-step income statement for 2020. Assume that 62,370 shares of common stock are outstanding. II. PARTS OF THE DIGESTIVE TRACT A. ORAL CAVITY After ingestion, the physical breakdown of solid foods (mechanical digestion) begins in the oral cavity (mouth). Describe how food is mechanically digested in the oral cavity. Include a discussion of how the teeth, tongue, and saliva work together to convert solid food into a moist, semi-solid mass of food called a bolus. Example: think of how a hard, dry saltine cracker is converted into a moist ball (bolus) in the mouth. B. PHARYNX and ESOPHAGUS 1. After food has been mechanically digested, mixed with saliva, and a bolus has formed, it is swallowed. Swallowing moves the bolus from the mouth into the esophagus. Discuss the events that occur during swallowing. 2. Which portions of the pharynx does food pass through when swallowing Who opened a settlement house in Chicago to assist the urban poor? A runner moves west with an initial velocity of 4 m/s. She accelerates 3 m/s2 for 30 seconds. The runners final velocity is m/s. Use exponential smoothing with trend adjustment to forecast deliveries for period 10. Let alpha = 0.4, beta = 0.2, and let the initial trend value be 4 and the initial forecast be 200.Period- Actual Demand1- 2002- 2123- 2144- 2225- 2366- 2217- 2408- 2449- 25010- 266 plz help!! i believe it's a but i'm not 100% sure Mamie Clark was a psychologist who is known for her research onA. intellectual and developmental disabilities and gifted childrenB. racism and its adverse effects on child developmentC. identity development among Asians living in the USD. academic development of children in desegregated schoolsPlease select the best answer from the choices providedBCD help me find AD in degrees PLEASE HELP! ITS DUE TODAY! Describe fully the single transformation that maps triangle a onto triangle b Read the excerpt from A Country Cottage, in which a couple is relaxing near a train station. What aspect of the excerpt most advances the plot? A. the storys mood B. the main characters thoughts and feelings C. the arrival of minor characters D. the setting of the train station What is the Q1 and Q3? 4,6,8,9,13,21,31 What companies are affected badly by corona? Condensation refers to the process whenA gas turns to a liquidA liquid turns to a gasA liquid turns to a solidA solid turns to a liquid Which number is irrational?-42/98.2611