The code of the given query is presented below.
Program explanation:
Declaration of header file.Declaration of main method.Declaration of integer type variable.Enter a value.Use of if statement.Program code:
#include <iostream> //header file
using namespace std;
int main() //main method
{
int userAge;
cin>>userAge;
if(userAge > 20)
{
cout<<"greater than 20" << endl;
}
else
{
cout<< "20 or less" <<endl;
}
return 0;
}
Output:
Find the attachment below.
Learn more about program code here:
https://brainly.com/question/17782638
What is network redundancy????
Network redundancy is a process through which additional or alternate instances of network devices, equipment and communication mediums are installed within network infrastructure. It is a method for ensuring network availability in case of a network device or path failure and unavailability. As such, it provides a means of network failover.
Explanation:
I hope it will help you...
Question # 4
Multiple Choice
Which step comes first?
Process the data.
Gather data from the user.
Check for accuracy.
Define the problem.
Answer:
The answer is Define the problem.
Explanation:
Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices. True or false?.
Embedded computers usually are small and have limited hardware but enhance the capabilities of everyday devices: True.
What is a computer?A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data through the central processing unit (CPU) into an output (information) that could be used by an end user.
What is a computer hardware?A computer hardware can be defined as a physical component of an information technology (IT) or computer system that can be seen and touched such as:
Random access memory (RAM).Read only memory (ROM).Central processing unit (CPU)KeyboardMonitorMouseMotherboard bios chipGenerally, embedded computers such as robotic vacuum cleaners, smart wrist-watches, home security systems, etc., usually are small and have limited hardware, but are designed and developed to enhance the capabilities of everyday devices.
Read more on embedded computers here: https://brainly.com/question/14614871
#SPJ1
In the following code snippet, what are the local variables of the function modByTwo?
function addFive(x){
var five = 5;
var result = x + five;
return result
}
function modByTwo(x){
var result = x % 2;
return result;
}
result and x
x only
five, result and x
result only
In the following code snippet, the local variables of the function modByTwo are the result and x. The correct option is a.
What are local variables?A local variable is one that can only be accessed from within a certain section of a program. These variables are often declared or defined within a subroutine and are local to that routine.
Local variables can alternatively be thought of as parameters that have values. The duration of the program's execution is reflected in a global variable. When the function is called, a local variable is created, and it is removed after the function has run its course. All the program's functions have access to it at all times.
One particular sub-program of a bigger main program declares a local variable. The values of local variables will be stored in RAM while this sub-program is running.
Therefore, the correct option is a, result, and x.
To learn more about local variables, refer to the link:
https://brainly.com/question/16978529
#SPJ2
an intranet is a lan that uses internet technologies and is publicly available to people outside of the organization.
An intranet is a LAN that uses internet technologies and is publicly available to people outside of the organization: False.
What is an intranet?An intranet can be defined as an internal company or organizational network which is designed and developed to be used privately. Also, it is used for providing the employees of a company with easy access to data or information.
In Computer networking, its only the end users of an intranet that have the ability to access a company's or organization's entire intranet.
In this context, we can reasonably infer and logically deduce that an intranet is a LAN that uses internet technologies and is privately available to people inside of the organization
Read more on intranet here: https://brainly.com/question/2580626
#SPJ1
Complete Question:
An intranet is a LAN that uses internet technologies and is publicly available to people outside of the organization. True of False
Which feature helps a user navigate through the slides of a presentation
-Backstage view
-Open screen
-Status bar
-Thumbnail pane
Answer:
Thumbnail pane
Explanation:
What is the next line?
tupleA = (5, 20, 30, 40, 30)
tupleA.index(40)
The next line is
Answer:3
Explanation: it’s 3
Answer:
3
Explanation:
Write a program that reads the student mark and absent percentage and displays a proper message for student status considering the pass mark is 60 and the maximum
allowed absent percentage rate is 15%. As an optional challenge you may enhance the program by considering some absences are excused and shall not be counted.
To write a program that reads the student mark and absent percentage and displays a proper message for student status considering the pass mark is 60 and the maximum allowed absent percentage rate is 15%, you would need an algorithm and it is given below.
The AlgorithmStep 1: Start the execution of the program
Step 2: Read mark and absent percentage
Step 3: Checking if the given mark is greater than 60, if yes, displays the preassigned message
Step 4: If the mark is above 60
Step 5: Display, "Checking your absent record"
Step 6: If the absent percentage record is less than or equals to 15%
Step 7: Display, "This is a pass mark"
Step 8: Else, display "You failed"
Step 9: End program
What is an Algorithm?This refers to the sequence of steps that are followed in order to help write a program for use.
Hence, To write a program that reads the student mark and absent percentage and displays a proper message for student status considering the pass mark is 60 and the maximum allowed absent percentage rate is 15%, you would need an algorithm and it is given above.
.
Read more about algorithms here:
https://brainly.com/question/24953880
#SPJ1
**Random answers to get points will be reported.**
Identify the error in the following block of code.
for x in range(2, 6):
print(x)
The first line is missing quotes.
The first line has a spelling error.
The second line has a spelling error.
The second line needs to be indented four spaces.
Answer
I think its: The first line is missing quotes
Explanation:
Answer:
B
Explanation:
"(2, 6)" the space in between those numbers create a bad income I tried it and it was the problem so hence its B
What is bill Gates passion?
tO CrEaTe ToiLeT. Sorry, the real answer is to change the world via technology, and to keep on innovating.
I hope this helps, and Happy Holidays! :)
Each symbol of an octal number corresponds to 3 bits of a binary number. is it true or false
Answer: True.
Explanation: It uses only the 3 bits to represent any digit in binary and easy to convert from octal to binary and then to vice-versa. Hope that helps
Samantha is looking for a lens that is lightweight and small, making it easy to transport. She doesn’t care about the lens being interchangeable nor does she need to zoom as she prefers to move physically closer to her subjects. She wants a simple lens that has the ability to produce a natural perspective. What kind of lens is likely best for Samantha?
Select one:
a. micro
b. zoom
c. telephoto
d. prime
Answer:
The correct option is;
d. Prime
Explanation:
A prime lens is a unifocal, or fixed-focal-length lens and it is referred to as the opposite of a zoom lens
The maximum aperture of ranges from f2.8 to f1.2, which are fast and have a creamy rendering of light that are out of focus, and also provide crispy image details, by making the most use of the light available and provide distinct combination of foreground and background images in pictures that give a crisp and visually pleasing appearance.
this is very simple i just need someone to type out this for me
Answer:
#27
2i , -2i, i, -i i^2 = -1
1(x - 2i)(x + 2i) 1(x-i)(x+i)
x^2 +2x-2x -4.2i x^2 -xi-xi -i
(x^2 + 4) x^4 + 1
x^2 +x^2 +11x
x^4 +5x^2 +4
+4+2+2+-1
*This was not simple for me
Grade 8 technology term 3
Explanation:
I am from Nepal County it is beautiful country
Select the correct answer.
Linda is making handouts for her upcoming presentation. She wants the handouts to be comprehensible to people who do not attend her
presentation. Which practice should Linda follow to achieve this goal?
OA.
OB.
OC.
OD.
provide a summary of the presentation
make the handouts more image-oriented
speak in detail about each topic
provide onlya printout of the slideshow
Can someone please help me with this class b4 I lose my mind
Amos: xoxo_11n
Answer:
OA
Explanation:
I took this quiz
The number of binary digits required to count 10010 is called _________
Steve and kelvin are having an argument . They finally reach a settlement in which most of both their demands are satisfied. Which approach to conflict management are they using ?
Kevin and Steve are both
Blank in order to resolve their conflict.
Answer:
compromising
Explanation:
Kevin and Steve are both compromising in order to resolve their conflict. This is the only way that they settle the argument and still BOTH get what they want. This approach is widely used in most arguments simply because of that reason, it allows both parties to adjust their offers or asks in order for all involved parties to get what they want and for all parties to agree and leave happy.
n2care has one product, the medcottage, that is prefabricated and pre-equipped with medical equipment used by nursing homes. n2care is utilizing a(n) targeting strategy.
Based on the above, the n2care is utilizing a concentrated targeting strategy.
What is concentrated targeting strategy?The term Concentrated marketing is known to be a kind of a marketing strategy where the firm or a company is known to be based on one single target market group for all of their marketing goals or initiatives.
Note that Companies are said to make use concentrated marketing to tell more on how their products can be able to reach or meet the special needs of their niche audience.
Therefore, Based on the above, the n2care is utilizing a concentrated targeting strategy.
Learn more about targeting strategy from
https://brainly.com/question/17198359
#SPJ1
N2Care has one product, the MEDCottage, that is pre-fabricated and pre-equipped with medical equipment used by nursing homes. N2Care is utilizing a(n) _______ targeting strategy.
multisegment
undifferentiated
concentrated
mass marketing
1. The Monroe Doctrine was meant to
(2 Points)
establish US colonies.
O invite European nations to settle in the Louisiana Territory.
O protect US interest from European powers.
O end negotiations with France for the purchase of their American territory.
Answer:
protect us interest from European powers
Explanation:
declared that the United States would not allow European countries to interfere with independent governments in the Americas.
in the Leaflet, using columns Makes your text difficult to read.
TRUE OR FALSE
whats the dialog box look like
A dialog box looks like a popup menu that appears on the window in the form of a box.
What is a dialog box?A program can build a temporary window called a dialog box to collect input from the user. Normally, dialog boxes are used by applications to ask the user for further details on menu options.
A small window-like pictorial control method known as a dialog box asks the user for input and provides data to consumers. If a dialog box prevents users from interacting with the application that opened it.
A program can build a temporary window called a dialog box to collect user input. Typically, a program will use text boxes to ask the client for further details on the menu.
Learn more about dialog box, here:
https://brainly.com/question/28445405
#SPJ1
The act of infiltrating a remote computer system is called
Answer:
The act of infiltrating a remote computer system is called (remote)
dion training just installed a new webserver within a screened subnet. you have been asked to open up the port for secure web browsing on the firewall. which port should you set as open to allow users to access this new server? 443 80 21 143 see all questions back next question
The port that should be set as open to allow users to access this new server is port 443.
What is a Computer port?In regards to computer hardware, a port is known to be a tool that helps to act as a kind of an interface that tend to exist between the computer as well as other computers or peripheral units or tools.
Note that the port connote the aspect of a computing device that is made available for connection to other forms of peripherals such as input.
Therefore, based on the work above, the port that should be set as open to allow users to access this new server is port 443.
Learn more about port from
https://brainly.com/question/28391396
#SPJ1
Read the introduction (paragraphs 1-3].
Select the paragraph from the section that shows
how the test will make it seem as though the cars
are completely driverless, even though they are
not.
write a function cascade that takes a positive integer and prints a cascade of this integer. hint - this very challenging problem can be solved with and without string manipulation!
Using the knowledge in computational language in python it is possible to write a code that write a function cascade that takes a positive integer and prints a cascade of this integer
Writting the code:function cascade(s)
for i=1:length(s)
for j=1:i
fprintf("%s", s(j))
end
fprintf("\n")
end
end
% Testing above function here..
cascade('ylem')
cascade('absquatulate')
See more about python at brainly.com/question/18502436
#SPJ1
cynthia wants to make an exact copy of a drive using a linux command-line tool. what command should she use?
The Linux command-line tool that is the command she can use is kwon as option b: cp.
Which Linux command creates a copy of a drive?On Unix kind of operating systems, the cp command is known to be the tool that a person can be able to use to makes some replicas of files as well as directories.
Note that since Cynthia wants to make an exact copy of a drive using a Linux command-line tool, she can use the above command.
Hence, The Linux command-line tool that is the command she can use is kwon as option b: cp.
Learn more about Linux command from
https://brainly.com/question/13615023
#SPJ1
Cynthia wants to make an exact copy of a drive using a Linux command-line tool. What command should she use? A. df B. cp C. dd D. ln
I am having horrible trouble with deciding if I should get Audacity or Adobe Spark for recording, if someone could help me choose, TYSM.
I haven't really used either, but people I know would prefer using Audacity.
What is an important theme in "Once Upon a Time"?
the unity between all peoples
the disintegration of South African society
the birth of a new nation
the importance of self-reliance
Answer:
The disintegration of South African society.
Explanation:
Nadine Gordimer's "Once Upon A Time" revolves around the racist "Apartheid" time of South African society where the whites 'dominate' the blacks. the story focuses on the societal issues between the two races and how it is detrimental to the overall lives of the people involved.
One important theme of the story is racism, "Apartheid" which seemingly dictates who is superior and who is not. The huge divide in not only the living spheres of the two groups of citizens but also in their approaches to society is indicative of the discriminative attitude and perception of the people, especially with the whites claiming themselves to be superior and 'civilized'. The book deals largely with the colonial mindset of the whites while also the structural bigotry apparent in the mindset of the people.
Thus, the correct answer is the second option.
Answer:
The disintegration of South African society.
Explanation:
a 64-year-old man involved in a high-speed car crash, is resuscitated initially in a small hospital without surgical capabilities. he has a closed head injury with a gcs score of 13. he has a widened mediastinum on chest x-ray with fractures of left ribs 2 through 4, but no pneumothorax. after initiating fluid resuscitation, his blood pressure is 110/74 mm hg, heart rate is 100 beats per minute, and respiratory rate is 18 breaths per minute. he has gross hematuria and a pelvic fracture. you decide to transfer this patient to a facility capable of providing a higher level of care. the facility is 128 km (80 miles) away. before transfer, what should you do first?
Before transfer, the first thing you should as an Emergency Medical Technician (EMT) is to call the receiving hospital and speak to the surgeon on call.
What is EMT?EMT is an abbreviation for Emergency Medical Technician and this refers to a specially trained and certified medical technician who provides basic emergency medical services (EMS).
What is CPR?CPR is an acronym for cardiopulmonary resuscitation and it can be defined as an act performed by professionals or experts, in order to revive a patient whose respiratory system is failing.
Basically, cardiopulmonary resuscitation (CPR) should typically be performed for patients who are still consciousness and breathing because they still have life in them.
In conclusion, the first thing you should as an Emergency Medical Technician (EMT) before transfer, is to call the receiving hospital and speak to the surgeon on call so as to ascertain the availability of bed space and the presence of an expert.
Read more on cardiopulmonary resuscitation here: https://brainly.com/question/3725035
#SPJ1
Order the steps to outline how images are grouped in PowerPoint.
Step 1:
Step 2:
Step 3:
Step 4:
Answer: Step1: select all images
Step2: go to the pictures tool format
Step3: choose the arrange group
Step4: choose the group option
Explanation:
The order of the steps that outline how images are grouped in PowerPoint is as follows:
Step 1: Select all images.Step 2: Go to the pictures tool format.Step 3: Select the arranged group.Step 4: Select the group option.What is the importance of PowerPoint?The importance of PowerPoint is determined by the fact that it is most frequently utilized in order to construct presentations for personal and professional purposes or objectives.
In these personal or professional presentations, complex ideas, facts, or figures are easily inserted to make them more attractive and meaningful.
While you are inserting these tools in your Powerpoint, a sequence of steps is followed to make the interpretation more accurate. For example, if you want to group images in PowerPoint, you must definitely follow four steps in sequential order.
Therefore, the order of the steps that outline how images are grouped in PowerPoint is well mentioned above.
To learn more about MS PowerPoint, refer to the link:
https://brainly.com/question/23714390
#SPJ3