Answer:
false
Explanation:
1 MB = 0.001 GB
Given four values representing counts of quarters, dimes, nickels and pennies, output the total amount as dollars and cents. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: System.out.printf("Amount: $%.2f\n", dollars); Ex: If the input is: 4 3 2 1 where 4 is the number of quarters, 3 is the number of dimes, 2 is the number of nickels, and 1 is the number of pennies, the output is: Amount: $1.41 For simplicity, assume input is non-negative.
LAB ACTIVITY 2.32.1: LAB: Convert to dollars 0/10 LabProgram.java Load default template. 1 import java.util.Scanner; 2 3 public class LabProgram 4 public static void main(String[] args) { 5 Scanner scnr = new Scanner(System.in); 6 7 /* Type your code here. */|| 8 9) Develop mode Submit mode Run your program as often as you'd like, before submitting for grading. Below, type any needed input values in the first box, then click Run program and observe the program's output in the second box Enter program input (optional) If your code requires input values, provide them here. Run program Input (from above) 1 LabProgram.java (Your program) Output (shown below) Program output displayed here
Answer:
The corrected program is:
import java.util.Scanner;
public class LabProgram{
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int qtr, dime, nickel, penny;
double dollars;
System.out.print("Quarters: ");
qtr =scnr.nextInt();
System.out.print("Dimes: ");
dime = scnr.nextInt();
System.out.print("Nickel: ");
nickel = scnr.nextInt();
System.out.print("Penny: ");
penny = scnr.nextInt();
dollars = qtr * 0.25 + dime * 0.1 + nickel * 0.05 + penny * 0.01;
System.out.printf("Amount: $%.2f\n", dollars);
System.out.print((dollars * 100)+" cents");
}
}
Explanation:
I've added the full program as an attachment where I used comments as explanation
How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.
Answer:
i choose choice D
Explanation:
reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit
Plz answer me will mark as brainliest
What is his resolution amount
Suppose one machine, A, executes a program with an average CPI of 1.9. Suppose another machine, B (with the same instruction set and an enhanced compiler), executes the same program with 20% less instructions and with a CPI of 1.1 at 800MHz. In order for the two machines to have the same performance, what does the clock rate of the first machine need to be
Answer:
the clock rate of the first machine need to be 1.7 GHz
Explanation:
Given:
CPI of A = 1.9
CPI of B = 1.1
machine, B executes the same program with 20% less instructions and with a CPI of 1.1 at 800MHz
To find:
In order for the two machines to have the same performance, what does the clock rate of the first machine need to be
Solution:
CPU execution time = Instruction Count * Cycles per Instruction/ clock rate
CPU execution time = (IC * CPI) / clock rate
(IC * CPI) (A) / clock rate(A) = (IC * CPI)B / clock rate(B)
(IC * 1.9) (A) / clock rate(A) = (IC * (1.1 * (1.0 - 0.20)))(B) / 800 * 10⁶ (B)
Notice that 0.20 is basically from 20% less instructions
(IC * 1.9) / clock rate = (IC * (1.1 * (1.0 - 0.20))) / 800 * 10⁶
(IC * 1.9) / clock rate = (IC*(1.1 * ( 0.8))/800 * 10⁶
(IC * 1.9) / clock rate = (IC * 0.88) / 800 * 10⁶
clock rate (A) = (IC * 1.9) / (IC * 0.88) / 800 * 10⁶
clock rate (A) = (IC * 1.9) (800 * 10⁶) / (IC * 0.88)
clock rate (A) = 1.9(800)(1000000) / 0.88
clock rate (A) = (1.9)(800000000) / 0.88
clock rate (A) = 1520000000 / 0.88
clock rate (A) = 1727272727.272727
clock rate (A) = 1.7 GHz
5-5. Design an Ethernet network to connect a single client P C to a single server. Both the client and the server will connect to their workgroup switches via U T P. The two devices are 900 meters apart. They need to communicate at 800 M b p s. Your design will specify the locations of any switches and the transmission link between the switches.
5-6. Add to your design in the previous question. Add another client next to the first client. Both connect to the same switch. This second client will also communicate with the server and will also need 800 M b p s in transmission speed. Again, your design will specify the locations of switches and the transmission link between the switches.
Answer:
ok so u have take the 5 and put 6
Explanation:
5-5. Ethernet network design: UTP connections from client PC and server to workgroup switches, 900m fiber optic link between switches, 800 Mbps communication.
5-6. Additional client connects to the same switch, UTP connection, maintains existing fiber optic link, 800 Mbps communication with the server.
What is the explanation for this?5-5. For connecting a single client PC to a single server, both located 900 meters apart and requiring communication at 800 Mbps, the following Ethernet network design can be implemented:
- Client PC and server connect to their respective workgroup switches via UTP.
- Use fiber optic cables for the 900-meter transmission link between the switches.
- Install switches at the client PC and server locations.
- Ensure that the switches support at least 1 Gbps Ethernet speeds to accommodate the required transmission speed.
5-6. In addition to the previous design, for adding another client next to the first client:
- Connect both clients to the same switch.
- Use UTP cables to connect the second client to the switch.
- Ensure the switch supports 1 Gbps Ethernet speeds.
- Maintain the existing fiber optic transmission link between the switches.
- The second client can also communicate with the server at the required 800 Mbps transmission speed.
Learn more about Network Design at:
https://brainly.com/question/7181203
#SPJ2
Jake or Peggy Zale must fix quickly the fax.
Answer:
Sentence: Jack or Peggy Zale must fix quickly the fax.
Correct: Either Jack or Peggy Zale must quickly fix the fax.
There are 2 errors in these sentence construction. In stating two persons as an option we must use the word "either" to indicate that you only have two choose from the two of them. The word "
Explanation:
The correct sentence would be "either Jake or Peggy Zale must quickly fix the fax".
In the question construction, there is a conjunction and misarrangement error.
In conclusion, the word " "either Jake or Peggy Zale must quickly fix the fax" is correct
Read more about conjunction
brainly.com/question/8094735
how many basic element makes up a computer system
Answer:
4
Explanation:
Input/output, datapath, control, and memory
There wrong its C bold it.
:)))))
Online Privacy
1.)Explain why is online privacy a controversial topic?
2.)Explain why this issue is applicable to you and your peers.
3.)Explain why this issue is a federal issue and not a state or local issue.
Answer:
Yes
Explanation:
Online privacy is a controversial topic due to the fact that it's a very hard thing to navigate. Some websites use cookies that are used to store your data so in a way there taking your privacy away which is controversial because of the way they use the information. Some websites store it for use of ads while others sell it. This issue is applicable to me and my peers because of the way we use technology. It can be used to steal my information about where I live and what I look up online. Also, the information stored could have my credit or debit card credentials. This issue should be a federal and nationwide issue because this is an everyday occurrence and leaves tons of people in crushing debt every year.
Write a program that simulates flipping a coin to make decisions. The input is how many decisions are needed, and the output is either heads or tails. Assume the input is a value greater than 0.
Answer:
import random
decisions = int(input("How many decisions: "))
for i in range(decisions):
number = random.randint(0, 1)
if number == 0:
print("heads")
else:
print("tails")
Explanation:
*The code is in Python.
import the random to be able to generate random numbers
Ask the user to enter the number of decisions
Create a for loop that iterates number of decisions times. For each round; generate a number between 0 and 1 using the randint() method. Check the number. If it is equal to 0, print "heads". Otherwise, print "tails"
what is scientific and
Answer:
And what??????????????
The Beaufort Wind Scale is used to characterize the strength of winds. The scale uses integer values and goes from a force of 0, which is no wind, up to 12, which is a hurricane. The following script first generates a random force value. Then, it prints a message regarding what type of wind that force represents, using a switch statement. If random number generated is 0, then print "there is no wind", if 1 to 6 then print "this is a breeze", if 7 to 9 "this is a gale", if 10 to 11 print "this is a storm", if 12 print "this is a hurricane!". (Hint: use range or multiple values in case statements like case {1,2,3,4,5,6})
Required:
Re-write this switch statement as one nested if-else statement that accomplishes exactly the same thing. You may use else and/or elseif clauses.
ranforce = randi([0, 12]);
switch ranforce
case 0
disp('There is no wind')
case {1,2,3,4,5,6}
disp('There is a breeze')
case {7,8,9}
disp('This is a gale')
case {10,11}
disp('It is a storm')
case 12
disp('Hello, Hurricane!')
end
Answer:
The equivalent if statements is:
ranforce = randi([0, 12]);
if (ranforce == 0)
disp('There is no wind')
else if(ranforce>0 && ranforce <7)
disp('There is a breeze')
else if(ranforce>6 && ranforce <10)
disp('This is a gale')
else if(ranforce>9 && ranforce <12)
disp('It is a storm')
else if(ranforce==12)
disp('Hello, Hurricane!')
end
Explanation:
The solution is straight forward.
All you need to do is to replace the case statements with corresponding if or else if statements as shown in the answer section
If the propagation delay through a full-adder (FA) is 150 nsec, what is the total propagation delay in nsec of an 8-bit ripple-carry adder
Answer:
270 nsec
Explanation:
Ripple-carry adder is a combination of multiple full-adders. It is relatively slow as each full-adder waits for the output of a previous full-adder for its input.
Formula to calculate the delay of a ripple-carry adder is;
= 2( n + 1 ) x D
delay in a full-adder = 150 nsec.
number of full-adders = number of ripple-carry bits = 8
= 2 ( 8 + 1 ) x 150
= 18 x 150
= 270 nsec
A____server translates back and forth between domain names and IP addresses.
O wWeb
O email
O mesh
O DNS
Answer:
DNS
Explanation:
Hope this helps
the language is Java! please help
public class Drive {
int miles;
int gas;
String carType;
public String getGas(){
return Integer.toBinaryString(gas);
}
public Drive(String driveCarType){
carType = driveCarType;
}
public static void main(String [] args){
System.out.println("Hello World!");
}
}
I'm pretty new to Java myself, but I think this is what you wanted. I hope this helps!
What are two examples of items in Outlook?
a task and a calendar entry
an e-mail message and an e-mail address
an e-mail address and a button
a button and a tool bar
Answer:
a task and a calendar entry
Explanation:
ITS RIGHT
Answer:
its A) a task and a calendar entry
Explanation:
correct on e2020
B1:B4 is a search table or a lookup value
Answer:
lookup value
Explanation:
Write a program that reads in 10 numbers from the user and stores them in a 1D array of size 10. Then, write BubbleSort to sort that array – continuously pushing the largest elements to the right side
Answer:
The solution is provided in the explanation section.
Detailed explanation is provided using comments within the code
Explanation:
import java.util.*;
public class Main {
//The Bubble sort method
public static void bb_Sort(int[] arr) {
int n = 10; //Length of array
int temp = 0; // create a temporal variable
for(int i=0; i < n; i++){
for(int j=1; j < (n-i); j++){
if(arr[j-1] > arr[j]){
// The bubble sort algorithm swaps elements
temp = arr[j-1];
arr[j-1] = arr[j];
arr[j] = temp;
}
}
}
}
public static void main(String[] args) {
//declaring the array of integers
int [] array = new int[10];
//Prompt user to add elements into the array
Scanner in = new Scanner(System.in);
//Use for loop to receive all 10 elements
for(int i = 0; i<array.length; i++){
System.out.println("Enter the next array Element");
array[i] = in.nextInt();
}
//Print the array elements before bubble sort
System.out.println("The Array before bubble sort");
System.out.println(Arrays.toString(array));
//Call bubble sort method
bb_Sort(array);
System.out.println("Array After Bubble Sort");
System.out.println(Arrays.toString(array));
}
}
How has the rise of mobile development and devices impacted the IT industry, IT professionals, and software development
Answer:
Throughout the interpretation section elsewhere here, the explanation of the problem is summarized.
Explanation:
The growth of smartphone production and smartphone apps and services, as well as the production of smartphones, has had a positive influence on the IT industry, IT practitioners, as well as the development of the technology. As normal, the primary focus is on smartphone apps instead of just desktop software. As we recognize, with innovative features, phone applications, and smartphones are all made, built, modernized every day, and always incorporated with either the latest technology.This has now resulted in far more jobs and employment for the IT sector, and therefore new clients for service-based businesses. It provided various-skilling the application production industry for IT experts including learning how to work on emerging technology. The demand for software production and software growth is evolving at a greater speed than it's ever been, so the increase of smartphone production and smartphones has had a very beneficial effect on perhaps the IT sector, IT practitioners, and business development.Write code that prints: Ready! numVal ... 2 1 Start! Your code should contain a for loop. Print a newline after each number and after each line of text Ex: numVal
Answer:
Written in Python
numVal = int(input("Input: "))
for i in range(numVal,0,-1):
print(i)
print("Ready!")
Explanation:
This line prompts user for numVal
numVal = int(input("Input: "))
This line iterates from numVal to 1
for i in range(numVal,0,-1):
This line prints digits in descending order
print(i)
This line prints the string "Ready!"
print("Ready!")
A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to know that this string is my diary. However, I also don't want to make copies of it (because my computer doesn't have enough memory). Which of the following lines will let me access this string via a new name, but without making any copies?
a. std::string book = joshs_diary;
b. std::string & book = joshs_diary; const
c. std::string * book = &joshs_diary;
d. std::string book(joshs_diary);
e. const std::string & book = joshs_diary;
f. const std::string * const book = &joshs_diary;
g. std::string * book = &joshs_diary;
Answer:
C and G
Explanation:
In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.
3.What are the pros and cons of using a linked implementation of a sparse matrix, as opposed to an array-based implementation
Answer:
speed and storage
Explanation:
The pros and cons of both are mainly in regards to speed and storage. Due to linked lists elements being connected to one another it requires that each previous element be accessed in order to arrive at a specific element. This makes it much slower than an array-based implementation where any element can be quickly accessed easily due to it having a specific location. This brings us to the other aspect which is memory. Since Arrays are saved as a single block, where each element has a specific location this takes much more space in the RAM as opposed to a linked implementation which is stored randomly and as indexes of the array itself.
Array Implementation:
Pros: Much Faster and Easier to target a specific elementCons: Much More Space neededLinked Implementation
Pros: Less overall space neededCons: Much slower speed.My Mac is stuck on this screen? How to fix?
Answer:
Press and hold the power button for up to 10 seconds, until your Mac turns off. If that doesn't work, try using a cellular device to contact Apple Support.
Explanation:
If that also doesn't work try click the following keys altogether:
(press Command-Control-Eject on your keyboard)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This makes the laptop (macOS) instruct to restart immediately.
Hopefully this helps! If you need any additional help, feel free and don't hesitate to comment here or private message me!. Have a nice day/night! :))))
Another Tip:
(Press the shift, control, and option keys at the same time. While you are pressing those keys, also hold the power button along with that.)
(For at least 10 seconds)
Plz answer me will mark as brainliest
Answer:
True
Operating System
Booting
A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. For a word count vector with indices ordered as the words appear above, what is the word count vector for a document that simply says “the wheels on the bus go round and round.”
Please enter the vector of counts as follows: If the counts were ["the"=1, “on”=3, "and"=2, "go"=1, "round"=2, "bus"=1, "wheels"=1], enter 1321211.
1 point
Answer:
umm that is a todler song
Explanation:
umm that is a todler song that they sing to them when there crying
A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. As per the given scenario, the vector of counts will be 2111211. The correct option is C.
What are the ways to count items in a vector?C++ has a built-in function that counts the length of the vector. Size is the function's name ().
It returns the size or total number of elements of the vector that was utilized to create it. There is no need for debate.
The number of observations (rows) includes deleted observations as well. In an SAS data collection, there can be a maximum of 2 63-1 observations, or roughly 9.2 quintillion observations. For the majority of users, going above that limit is quite rare.
The vector of counts in the above scenario will be 2111211.
Thus, the correct option is C.
For more details regarding programming, visit:
https://brainly.com/question/11023419
#SPJ2
(1) Prompt the user to enter a string of their choosing. Output the string.
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself.
(2) Complete the GetNumOfCharacters() function, which returns the number of characters in the user's string. Use a for loop in this function for practice. (2 pts)
(3) In main(), call the GetNumOfCharacters() function and then output the returned result. (1 pt) (4) Implement the OutputWithoutWhitespace() function. OutputWithoutWhitespace() outputs the string's characters except for whitespace (spaces, tabs). Note: A tab is '\t'. Call the OutputWithoutWhitespace() function in main(). (2 pts)
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself. Number of characters: 46 String with no whitespace: The only thing we have to fear is fear itself.
Answer:
See solution below
See comments for explanations
Explanation:
import java.util.*;
class Main {
public static void main(String[] args) {
//PrompT the User to enter a String
System.out.println("Enter a sentence or phrase: ");
//Receiving the string entered with the Scanner Object
Scanner input = new Scanner (System.in);
String string_input = input.nextLine();
//Print out string entered by user
System.out.println("You entered: "+string_input);
//Call the first method (GetNumOfCharacters)
System.out.println("Number of characters: "+ GetNumOfCharacters(string_input));
//Call the second method (OutputWithoutWhitespace)
System.out.println("String with no whitespace: "+OutputWithoutWhitespace(string_input));
}
//Create the method GetNumOfCharacters
public static int GetNumOfCharacters (String word) {
//Variable to hold number of characters
int noOfCharactersCount = 0;
//Use a for loop to iterate the entire string
for(int i = 0; i< word.length(); i++){
//Increase th number of characters each time
noOfCharactersCount++;
}
return noOfCharactersCount;
}
//Creating the OutputWithoutWhitespace() method
//This method will remove all tabs and spaces from the original string
public static String OutputWithoutWhitespace(String word){
//Use the replaceAll all method of strings to replace all whitespaces
String stringWithoutWhiteSpace = word.replaceAll(" ","");
return stringWithoutWhiteSpace;
}
}
What is the maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol? Why?
Answer:
4096 VLANs
Explanation:
A VLAN (virtual LAN) is a group of devices on one or more LAN connected to each other without physical connections. VLANs help reduce collisions.
An 802.1Q Ethernet frame header has VLAN ID of 12 bit VLAN field. Hence the maximum number of possible VLAN ID is 4096 (2¹²). This means that a switch supporting the 802.1Q protocol can have a maximum of 4096 VLANs
A lot of VLANs ID are supported by a switch. The maximum number of VLANs that can be configured on a switch supporting the 802.1Q protocol is 4,094 VLANS.
All the VLAN needs an ID that is given by the VID field as stated in the IEEE 802.1Q specification. The VID field is known to be of 12 bits giving a total of 4,096 combinations.But that of 0x000 and 0xFFF are set apart. This therefore makes or leaves it as 4,094 possible VLANS limits. Under IEEE 802.1Q, the maximum number of VLANs that is found on an Ethernet network is 4,094.
Learn more about VLANs from
https://brainly.com/question/25867685
In Microsoft windows which of the following typically happens by default when I file is double clicked
Answer:
when a file is double clicked it opens so you can see the file.
Explanation:
In a system where Round Robin is used for CPU scheduling, the following is TRUE when a process cannot finish its computation during its current time quantum? The process will terminate itself. The process will be terminated by the operating system. The process's state will be changed from running to blocked. None of the mentioned.
Answer:
B. The process will be terminated by the operating system.
Explanation:
When Round Robin is used for CPU scheduling, a time scheduler which is a component of the operating system is used in regulating the operation. A time limit is set for each of the processes to be run.
So, when a process fails to complete running before its time elapses, the time scheduler would log it off and return it to the queue. This queue is in a circular form and gives each of the processes a chance to run its course.
Based on the information given regarding CPU scheduling, the correct option is C. The process's state will be changed from running to blocked.
It should be noted that in a system where Round Robin is used for CPU scheduling, when a process cannot finish its computation during its current time quantum, the process's state will be changed from running to blocked.
It should be noted that a prices transition to a blocked state occurs when it's waiting for some events like a particular resource becoming available.
Learn more about CPU scheduling on:
https://brainly.com/question/19999569
Jason works as a financial investment advisor. He collects financial data from clients, processes the data online to calculate the risks associated with future investment decisions, and offers his clients real-time information immediately. Which type of data processing is Jason following in the transaction processing system?
A.
online decision support system
B.
online transaction processing
C.
online office support processing
D.
online batch processing
E.
online executive processing
Answer:
The answer to this question is given below in the explanation section.
Explanation:
The correct answer to this question is an online decision support system. Because the decision support systems process the data, evaluate and predict the decision, and helps the decision-makers, and offer real-time information immediately in making the decision in an organization. So the correct answer to this question is the decision supports system.
Why other options are not correct
Because the transaction processing system can only process the transaction and have not the capability to make the decision for the future. Office support processing system support office work, while the batch processing system process the task into the batch without user involvement. however, online executive processing does not make decisions and offer timely information to decision-makers in an organization.
Answer: the answer is A.
Explanation: He has to listen to what the people tell him and think about the information he has and make a choice on what to reply with.