A bank in your town updates its customers’ accounts at the end of each month. The bank offers two types of accounts: savings and checking. Every customer must maintain a minimum balance. If a customer’s balance falls below the minimum balance, there is a service charge of $10.00 for savings accounts and $25.00 for checking accounts. If the balance at the end of the month is at least the minimum balance, the account receives interest as follows:
a. Savings accounts receive 4% interest.
b. Checking accounts with balances of up to $5000 more than the minimum balance receive 3% interest; otherwise, the interest is 5%.
This Java program using Eclipse Indigo reads a customer’s account number ( int type ), account type ( char type; s or S for savings, c or C for checking), minimum balance that the account should maintain, and current balance. The program should then output the account number, account type, current balance, and new balance or an appropriate error message. Test program by running it five times, using the following data:
46728 S 1000 2700
87324 C 1500 7689
79873 S 1000 800
89832 C 2000 3000
98322 C 1000 750
[code]
import java.util.*;
public class bank
{
public static void main (String [] args)
{int num,error=1,itype=0;
char type =0;
double min,cur =0,balanc =0,rate=0;
Scanner in=new Scanner(System.in);
System.out.println("Enter account number: ");
num=in.nextInt();
while(error==1)
{
System.out.println("Enter account type(s-savings or c-checking):");
type=in.next().charAt(0);
if(type=='c'||type=='C')
{itype=1;
error=0;
rate=3/100.;
}
else if(type=='s'||type=='S')
{itype=0;
error=0;
rate=4/100.;
}
if(error==1)
System.out.println("Invalid type-re enter");
}
System.out.println("Enter minimum balance: ");
min=in.nextDouble();
System.out.println("Enter current balance: ");
cur=in.nextDouble();
balance = cur;
if(itype==1)
{ if(cur>min+5000)
rate=5/100.;
else if(cur cur-=25;
}
else
if(cur cur-=10;
cur=cur+rate*cur;
System.out.printf("After interest and fees your balance is = $%.2f\n",cur);
System.out.println("Your account number: " + num);
System.out.println("Your account type: " + type);
System.out.printf("Your starting balance: $%.2f\n ", balanc);
System.out.printf("Your new balance: $%.2f\n", cur);
}
}
[/code]

Answers

Answer 1

Answer:

This is your corrected code and the output of each test example. I have also added comments with the provided code to make the code understandable. I have also changed itype variable to from int to String in order to print the account type (Savings or Checking) in output.

import java.util.*;

public class bank{  //class name

public static void main (String [] args)  //start of main function body

{int num,error=1; //declare variables

String itype=" "; //stores Checking or Savings account type

char type =0;  //type variable which is one of savings S or checking C

double min,cur =0,balance =0,rate=0;

//declare variables for minimum balance, current balance, interest rate

Scanner in=new Scanner(System.in);

System.out.println("Enter account number: ");  //prompts user to enter acc no

num=in.nextInt();  //reads input account number

while(error==1) {  

//asks user to enter account type C or S

System.out.println("Enter account type(s-savings or c-checking):");

type=in.next().charAt(0);  //reads the input character of account type

if(type=='c'||type=='C')  //if user inputs c or C

{itype= "Checking";  //set itype to Checking when user input c or C

error=0;  //set value of error to 0 means user entered valid type input

rate=3/100.; }  // Savings accounts receives  3% interest

else if(type=='s'||type=='S')  //if user enters S or s that shows Savings account

{itype= "Savings";  //set itype to Savings when user input s or S

error=0;  //set error to 0 means there is no error

rate=4/100.; }  //Savings accounts receives 4% interest

if(error==1)  //in case of error in giving input

System.out.println("Invalid type-re enter"); }  //asks user to input again

System.out.println("Enter minimum balance: ");  //asks user to enter min bal

min=in.nextDouble();  //reads value of input minimum balance

System.out.println("Enter current balance: ");

// reads value of input current balance

cur=in.nextDouble();

balance = cur;  

if(itype=="Checking") //if the account type is checking

{ if(cur>min+5000) //Checking accounts interest is 5%

{rate=5/100.;

cur=cur+rate*cur; //computes new balance

System.out.printf("New balance: $%.2f\n", cur);} //returns new balance value

/*If a customer’s balance falls below the minimum balance, there is a service charge of $25.00 for checking accounts */

else if(cur<min)

{cur-=25;

System.out.printf("New balance: $%.2f\n", cur);} returns the value of new

}

if(itype=="Savings"){ //if account type is Savings

/*If a customer’s balance falls below the minimum balance, there is a service charge of $10.00 for savings accounts */

if(cur<min)

{cur-=10;

System.out.printf("New balance: $%.2f\n", cur);}

else

//Savings accounts receive 4% interest

{cur=cur+rate*cur;

System.out.printf("New balance: $%.2f\n", cur);}}

/* as the program should output account number, account type, current balance, and new balance so i have commented out the extra print statements below */

//System.out.printf("After interest and fees your balance is = $%.2f\n",cur);

System.out.println("Account Number: " + num);

System.out.println("Account type: " + itype);

System.out.printf("Current balance: $%.2f\n ", balance);  //the result is //displayed up to 2 decimal place .2f   } }

Explanation:

Following is the output of each test example:

46728 S 1000 2700

Account Number: 46728                                            

Account type: Savings                                                                                          

Current balance: $2700.00                                                                                

New balance: $2808.00

87324 C 1500 7689

Account Number: 87324                                                                                      

Account type: Checking                                                                                        

Current balance: $7689.00                                                                                  

New balance: $8073.45

79873 S 1000 800

Account Number: 79873                                                                                    

Account type: Savings                                                                                        

Current balance: $800.00  

New balance: $790

89832 C 2000 3000

Account Number: 89832                                                                                      

Account type: Checking                                                                                        

Current balance: $3000.00                                                                                  

New balance: $3090.00

98322 C 1000 750  

Account Number: 98322

Account Type: Checking  

Current balance: $1000.00

New Balance: $725.00

A Bank In Your Town Updates Its Customers Accounts At The End Of Each Month. The Bank Offers Two Types

Related Questions

The best way to avoid driving impaired is to...
A. avoid drinking.
B. stay under the legal BAC limit.
C. keep a taxi fare on hand.

Answers

Answer:

the answer is A avoid drinking 10 Tips to Avoid Driving Drunk

Explanation:

Give someone your keys. Find someone trustworthy who isn't drinking and hand over your keys for the night. ...

Don't drink on an empty stomach. ...

Know your body and pace yourself. ...

Take public transit. ...

Spend the night. ...

Wait an hour or two. ...

Stop drinking 90 minutes before you plan to leave. ...

Take the night off from drinking. hope this helps you :)

The following code uses a nested if statement.

if (employed == 'Y')
cout << "Employed!" << endl;

else if (employed == 'N')
cout << "Not Employed!" << endl;

else
cout << "Error!" << endl;

a. True
b. False

Answers

Answer:

true

Explanation:

else if used so I think it's true

Shovels and Shingles is a small construction company consisting of 12 computers that have Internet access. The company's biggest concern is that a wily competitor will send e-mail messages pretending to be from Shovels and Shingles in order to get confidential information. Write down an encryption solution that best prevents a competitor from receiving confidential information and justify the recommendation.

Answers

Answer:

The Encryption solution that best prevents a competitor from receiving confidential information is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

Explanation:

Solution:

From my own perspective the encryption solution that i will use that prevents s a competitor from receiving confidential information and justify the recommendation is the SSL(secure Socket Layer) Or TLS(Transport Layer Security).

This is because in this case we have to share data confidentially (information need to be hidden from Unauthorized  security access. also these provides the Transport Layer security that we needed in above example above.

The purpose of these protocol is to provide server and client authentication, Data confidentiality,and Data integrity (protected from unauthorized change). Application Layer client/server program such as HTTP that uses the service of TCP can encapsulate their data in SSL Packets.

SSL (Secure Socket Layer): is defined as the normal technology for protecting an internet connection secure and defend any sensitive data that is being sent between two systems, and not allowing criminals from reading and changing any information sent, including potential personal details.

TLS (Transport Layer security): It is a procedure that allows  data integrity  and privacy over Internet communications.

Modify short_names by deleting the first element and changing the last element to Joe. Sample output with input: 'Gertrude Sam Ann Joseph'

Answers

Answer:  

I am writing a Python program:

For taking input from user:

user_input = input() # takes input from user

short_names = user_input.split() #splits user_input into list of strings

short_names.pop(0) # removes the first element of the list i.e. Gertrude

short_names[-1] = "Joe" #sets the last element to Joe

print(short_names)    #prints modified list of Sam Ann Joe

If you do not want to take input from user:  

short_names=['Gertrude', 'Sam', 'Ann', 'Joseph']  #list of 4 elements

short_names=short_names[1:]  # removes the first element Gertrude

short_names.pop()  # removes last element i.e. Joseph from list

short_names.append('Joe')  #adds Joe to the end of the list

print(short_names) #prints modified list Sam Ann Joe

If you do not want to use pop() and append() methods:

short_names = ['Gertrude', 'Sam', 'Ann', 'Joseph']  #creates list of 4 values

short_names = short_names[1:]  # removes first value i.e. Gertrude from list

short_names[-1] = "Joe"  #set the last element to Joe

print(short_names) #prints modified list Sam Ann Joe

Explanation:

The first program takes the names from the user, splits them into list of strings, then pop(0) has given index value 0 which means 1st value in the list. So it removes and returns first value from the list. Next statement sets the last value of list to Joe.

The second program has a hard coded list ['Gertrude', 'Sam', 'Ann', 'Joseph']  

short_names = short_names[1:] removes the first value of the short_names list i.e. Gertrude. Next pop() removes and returns last value in the list i.e. Joseph from list. Last statement append('Joe') adds Joe to the end of the list.

The third program has a list of 4 elements. short_names = short_names[1:]   removes first value i.e. Gertrude from list and short_names[-1] = "Joe"  sets the last element to Joe.

The function was implemented using the JavaScript language, the shift, pop and push function was used to get the desired output

Array and String Operations

The function bellow is written in JavaScript

function shortName (short_names){

short_names.shift() // The first element "Gertrude" was removed

short_names.pop() //The last element "Joseph" was removes

short_names.push("joe") //"Joe" is added to the new list

return short_names //The new list is returned as output

}

Learn more about array operation here:

https://brainly.com/question/26104158

Assume that to_the_power_of is a function that expects two integer parameters and returns the value of the first parameter raised to the power of the second parameter. Write a statement that calls to_the_power_of to compute the value of cube_side raised to the power of 3 and that associates this value with cube_volume.

Answers

Answer:

The statement in python is as follows:

to_the_power_of(cube_side,3)

Explanation:

As stated as the requirement of the code segment, the statement takes as parameters a variable cube_side and a constant 3.

It then returns the volume of the cube; i.e. cube raise to power 3

See full program below

def to_the_power_of(val,powe):

    result = val**powe

    print(result)

cube_side = float(input("Cube side: "))

to_the_power_of(cube_side,3)

Explain what a honeypot is. In your explanation, give at least one advantage and one disadvantage of deploying a honeypot on a corporate network.

Answers

Answer:

A honeypot is a computer network set up to act as a decoy to track, deflect, or research trying to obtain unwanted access to the information system.

Explanation:

A honeypot is a device or device network designed to imitate possible cyber-attack targets. It can be utilized to detect or deflect assaults from a legitimate military target. It may also be used to collect knowledge on how cybercrime works.

Advantage:-

Data Value:- One of the challenges faced by the research community is to obtain meaning from big data. Companies hold large quantities of data daily including firewall logs, device logs, and warnings for vulnerability scanning. Resources:- The problem facing most protection systems is resource shortages or even the depletion of resources. Power saturation is when a protection asset can no longer work since it is overloaded by its assets. Simplicity :- I find simplicity to be the biggest single strength of honeypots. No flashy techniques are to be created, no stamp computer systems to be managed, no rule units to be misconfigured.

Disadvantage:-  

That honeypot doesn't replace any safety mechanisms; they just operate with your overall security infrastructure and improve it.

what kind of company would hire an information support and service employee?


-software development


-computer repair


-website development


-network administration

Answers

Answer:

it's a

Explanation:

Create an application named ArithmeticMethods whose main() method holds two integer variables. Assign values to the variables. In turn, pass each value to methods named displayNumberPlus10(), displayNumberPlus100(), and displayNumberPlus1000(). Create each method to perform the task its name implies. Save the application as ArithmeticMethods.java.

Answers

Answer:

public class ArithmeticMethods

{

public static void main(String[] args) {

    int number1 = 7;

    int number2 = 28;

 displayNumberPlus10(number1);

 displayNumberPlus10(number2);

 displayNumberPlus100(number1);

 displayNumberPlus100(number2);

 displayNumberPlus1000(number1);

 displayNumberPlus1000(number2);

}

public static void displayNumberPlus10(int number){

    System.out.println(number + 10);

}

public static void displayNumberPlus100(int number){

    System.out.println(number + 100);

}

public static void displayNumberPlus1000(int number){

    System.out.println(number + 1000);

}

}

Explanation:

Inside the main:

Initialize two integers, number1 and number2

Call the methods with each integer

Create a method called displayNumberPlus10() that displays the sum of the given number and 10

Create a method called displayNumberPlus100() that displays the sum of the given number and 100

Create a method called displayNumberPlus1000() that displays the sum of the given number and 1000

A pen testing method in which a tester with access to an application behind its firewall imitates an attack that could be caused by a malicious insider.

a. True
b. False

Answers

Answer:

a. True

Explanation:

The statement that a pen testing method or penetration test in which a tester who has a means of entry to an application behind its firewall imitates an attack that could be caused by a malicious insider.

A penetration test, which is also refer to as a pen test, pentest or ethical hacking, is an approved simulated cyberattack done on a computer system, performed in order to evaluate the security of the system. The test is carried out to identify both weaknesses or vulnerabilities including the potential for unauthorized parties to penetrate to the system's features and data.

The main purpose of performing this test is to identify any vulnerability in a system's defenses which attackers may take advantage of.

Letm1, m2,···mnbe distinct numbers on the number line, in the increasing order. Your goalis to color all of them blue. You have magical blue pens with the following property: Whenyou place the pen at co-ordinate x, all the points in the range [x - 5, x + 5] turn blue. Apen can be used only once. Give an algorithm to color all the points using as few pens aspossible. Prove the correctness of the algorithm and derive the runtime.

Answers

Answer:

Following are the algorithm to this question:

y = 0 //  initialize variable y that assigns the value  0

p = 1 // initialize value 1 in the variable p which also known as starting position

init num = 1//define variable num that assign value 1

for j = 1 to n: //defining loop

y = m[j] - m[p]

if (y > 10) //defining if block

num++;  //increment num variable

p=i; //holding loop value in p variable

y= 0//assign value 0 in y variable

Explanation:

Following are the runtime analysis of the above-given algorithm:

The above-provided algorithm is greedy, but if it doesn't exceed the scope, it operates by greedily choosing its next object. Therefore the algorithm selects the fewest number of pens.

Running time:

This algorithm merely iterates once over all the points. The run-time is therefore O(n).

______is a technology that allows users to access databases that contain case law or statutory law governing a particular issue.​

Answers

Explanation:

In my opinion this is computer assisted legal search

Write a program that asks the user to input a positive integer and then calculates and displays the factorial of the number. The program should call a function named getN

Answers

Answer:

The program is written in python and it doesn't make use of any comment;

(See explanation section for line by line explanation)

def getN(num):

     fact = 1

     for i in range(1, 1 + num):

           fact = fact * i

     print("Factorial: ",fact)

num = int(input("Number: "))

if num < 0:

     print("Invalid")

else:

     getN(num)

Explanation:

The function getNum is defined here

def getN(num):

Initialize the result of the factorial to 1

     fact = 1

Get an iteration from 1 to the user input number

     for i in range(1, 1 + num):

Multiply each number that makes the iteration

           fact = fact * i

Print result

     print("Factorial: ",fact)

Ths line prompts user to input number

num = int(input("Number: "))

This line checks if user input is less than 0; If yes, the program prints "Invalid"

if num < 0:

     print("Invalid")

If otherwise, the program calls the getN function

else:

     getN(num)

Identify and write the errors given in the flowchart (with steps and flowchart) : Start ↓ Input A,B ↓ Average = (A + B + C) / 3 ↓ Print Average ↓ Stop

Answers

Answer:

i will send you the answers in the next 10minute

Because Java byte code is the same on all computers, compiled Java programs Group of answer choices Cannot run on Linux systems Must be re-compiled for each different machine it is run on Are highly portable Are non-existent

Answers

Answer:

Are highly portable.

Explanation:

Java is a object oriented and class-based programming language. It was developed by Sun Microsystems on the 23rd of May, 1995.

Java was designed by a software engineer called James Gosling and it is originally owned by Oracle. Also, worthy of mention is the fact that Java was originally known as Oak.

Generally, Java as a software application usually are developed having a ".jar", ".class" or ".java" filename extensions.

Because Java byte code is the same on all computers, compiled Java programs are highly portable. This simply means that, the Java byte code was designed such that it has very few implementation dependency, thus, once the code is written, it can run on all computer platforms that supports the Java programming language.

Hence, the Java byte code is a write once, run anywhere software program.

The Java byte code instructions are read and executed by a computer program known as a Java Virtual Machine (JVM).

Additionally, Java program is used for developing varieties of applications such as, mobile, desktop, games, web and application servers etc.

A network technician is designing a network for a small company. The network technician needs to implement an email server and web server that will be accessed by both internal employees and external customers. Which of the following would best secure the internal network and allow access to the needed servers?
A. Implementing a site-to-site VPN for server access.B. Implementing a DMZ segment for the server.C. Implementing NAT addressing for the servers.D. Implementing a sandbox to contain the servers.

Answers

Answer:

Option A (Implementing a site-to-site VPN for server access) seems to be the correct choice.

Explanation:

A site-to-site configuration is something that a single Open VPN network links several more separate networks linked. Technologies through one network will access machines in all the other computer systems in that connection model, including conversely. Implementing this would be extremely straightforward, for as much further even though Access Server was indeed implicated.The much more challenging aspect happens when interacting regarding firewalls including privacy filtering methods, as well as modifying the forwarding table in internet gateways, as several of them from different manufacturers but instead prototypes which they may not be able to log many of these.This rather gateway device uses an Open VPN with a Linux VPN client, to create a connection between various channels. If someone's server hardware is also measured accurately then perhaps a site-to-site configuration could be accomplished which works straightforwardly throughout all systems in both cable systems.

Other choices are not related to the given instance. So that Option A would be the right one.

How does computer mouse impact the world, society and health?

Answers

Explanation:

Without it, we may have endured convoluted keyboard commands for years, greatly hindering the process of bringing the PC into homes everywhere. The mouse revolutionized computer interfaces, simplified an otherwise scary machine, and helped connect the world.

6. A distribution consists of three components with frequencies 200, 250 and 300 having means
25,10, and 15 and standard deviations 3, 4, and 5 respectively.
Calculate
The mean?
The standard deviation?​

Answers

Answer:

The mean  = 16

The standard deviation = 7.19

Explanation:

N1 = 200  X1 = 25   σ1 = 3

N2= 250  X2 = 10   σ2 = 4

N3 = 300  X3= 15   σ3 = 5

The mean of a combined distribution is given by:

[tex]X = \frac{X_1N_1+X_2N_2+X_3N_3}{N_1+N_2+N_3}\\X = \frac{25*200+10*250+15*300}{200+250+300}\\X=16[/tex]

The differences from the mean for each component are:

[tex]D_1 = 25-16=9\\D_2=10-16=-6\\D_3=15-16=-1[/tex]

The standard deviation of a combined distribution is given by:

[tex]\sigma=\sqrt{\frac{N_1(\sigma_1^2+D_1^2)+N_2(\sigma_2^2+D_2^2)+N_3(\sigma_3^2+D_3^2)}{N_1+N_2+N_3}}\\\sigma=\sqrt{\frac{200(3^2+9^2)+250(4^2+(-6)^2)+300(5^2+(-1)^2)}{200+250+300}}\\\sigma=\sqrt{\frac{18000+13000+7800}{750} }\\\sigma=7.19[/tex]

The mean  = 16

The standard deviation = 7.19

An organization's IRP prioritizes containment over eradication. An incident has been discovered where an attacker outside of the organization has installed crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, which of the following would be the NEXT step?

a. Remove the affected servers from the network.
b. Review firewall and IDS logs to identify possible source IPs.
c. Identify and apply any missing operating system and software patches
d. Delete the malicious software and determine if the servers must be reimaged

Answers

Answer:

a. Remove the affected servers from the network.

Explanation:

An organization's incident response process (IRP) can be defined as all of the process involved in the cleanup and recovery of data when they fall victim to an attack or cybersecurity breach. The incident response process comprises of six (6) important stages and these are;

1. Preparation.

2. Detection and analysis (identification).

3. Containment.

4. Eradication.

5. Recovery.

6. Review of incident activities.

When an organization's IRP prioritizes containment over eradication and an incident is discovered, where an attacker outside the organization installed a crypto-currency mining software on the organization's web servers. Given the organization's stated priorities, the cybersecurity engineer should remove the affected servers from the network.

A containment process is focused on taking steps to eliminate or contain the attack. It basically involves acting swiftly in response to the attack, so as to prevent it from spreading across board or in order to mitigate the damage already caused.

In this context, the cybersecurity engineer should remove the affected servers from the network in accordance with the organization's IRP priority (containment).

Furthermore, he could take a step further to contain the attack by installing a firewall and updating their policies in the Intrusion Prevention System (IPS) of the organization.

a. A hard disk has four surfaces (that's top and bottom of two platters). Each track has 2, 048 sectors and there are 131, 072 (2^17) tracks per surface. A block holds 512 bytes. The disk is not "zoned." What is the total capacity of this disk?

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (That, is, what is the capacity of one cylinder?)

Answers

Answer:

Explanation:

Given that:

number of surfaces on a hard disk = 4

number of sectors = 2048 sectors

number of tracks per surface = 131, 072 (2^17)

a block holds 512 bytes.

Since, 'The disk is not "zoned.".....

then, Number of bytes / sector = 512

a) What is the total capacity of this disk?

The total capacity of the disk is:[tex]= 4 \ surfaces \times 131072 \dfrac{tracks}{surfaces} \times 2048 \dfrac{sector}{tracks} \times 512 \dfrac{bytes}{sector}[/tex]

[tex]= 5.49755814\times 10^{11} \ bytes[/tex]

= 549755814 KB ( kilobytes)

= 549755.814 MB (megabytes)

=549.755814  GB (gigabytes)

b. Given the disk in Part 1, how much data can be accessed without moving the disk heads. (i.e what is the capacity of one cylinder?)

The capacity of one cylinder can be estimated by determining the capacity of one surface and the capacity of one track.

The capacity of one surface = [tex]131072\dfrac{tracks}{surface} \times 2048 \dfrac{sector}{tracks} \times 512\dfrac{bytes}{sector}[/tex]

The capacity of one surface = [tex]1.37438953 \times 10^{11[/tex] byte = 137.44 GB

Capacity of one track = 2048 sectors/track × 512 bytes/sector

Capacity of one track = 1048576 Bytes/track

Capacity of one track =1048 KB/track

Capacity of one track ≅ 1 MB/track

Since the hard disk contains four surfaces

capacity of one cylinder = 1 MB/track × 4 track/cylinder

capacity of one cylinder  = 4 MB

Between Handshake protocol, change cipher suite, alert and appplication data protocols, the first one to use is:

a. Handshake protocol.
b. Appplication data protocol.
c. Alert protocol.
d. Change cipher suite protocol.

Answers

Answer:

c is the answer I'm pretty sure but wait for more

The UNIX operating system started the concept of socket which also came with a set of programming application programming interface (API) for 'socket level' programming. A socket was also uniquely identified:

a. as the combination of IP address and port number to allow an application within a computer to set up a connection with another application in another computer without ambiguity.
b. the port number to clearly identify which application is using TCP.
c. IP address to make sure the Internet device using the socket is delineated.
d. the access network, such as Ethernet or Wi-Fi so that multiple LAN devices could be installed on a single computer.

Answers

Answer:

(a). as the combination of IP address and port number to allow an application within a computer to set up a connection with another application in another computer without ambiguity.

Explanation:

The explanation is in the answer.

Complete function PrintPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by " seconds". End with a newline. Example output for ounces = 7:42 seconds#include void PrintPopcornTime(int bagOunces) {}int main(void) {int userOunces;scanf("%d", &userOunces);PrintPopcornTime(userOunces);return 0;}2. Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N: Lather and rinse." numCycles times, where N is the cycle number, followed by "Done.". End with a newline. Example output with input 2:1: Lather and rinse.2: Lather and rinse.Done. Hint: Declare and use a loop variable.#include /* Your solution goes here */int main(void) {int userCycles;scanf("%d", &userCycles);PrintShampooInstructions(userCycles);return 0;}

Answers

Answer:

Function 1:

#include <stdio.h> //for using input output functions

// start of the function PrintPopcornTime body having integer variable //bagOunces as parameter

void PrintPopcornTime(int bagOunces){

if (bagOunces < 3){ //if value of bagOunces is less than 3

 printf("Too small"); //displays Too small message in output

 printf("\n"); } //prints a new line

//the following else if part will execute when the above IF condition evaluates to //false and the value of bagOunces is greater than 10

else if (bagOunces > 10){

    printf("Too large"); //displays the message:  Too large in output

    printf("\n"); //prints a new line }

/*the following else  part will execute when the above If and else if conditions evaluate to false and the value of bagOunces is neither less than 3 nor greater than 10 */

else {

/* The following three commented statements can be used to store the value of bagOunces * 6 into result variable and then print statement to print the value of result. The other option is to use one print statement printf("%d",bagOunces * 6) instead */

    //int result;

    //result = bagOunces * 6;

    //printf("%d",result);

 printf("%d",bagOunces * 6);  /multiplies value of bagOunces  to 6

 printf(" seconds");

// seconds is followed with the value of bagOunces * 6

 printf("\n"); }} //prints a new line

int main(){ //start of main() function body

int userOunces; //declares integer variable userOunces

scanf("%d", &userOunces); //reads input value of userOunces

PrintPopcornTime(userOunces);

//calls PrintPopcornTime function passing the value in userOunces

return 0; }

Explanation:

Function 2:  

#include <stdio.h> //header file to use input output functions

// start of the function PrintShampooInstructions body having integer variable numCycles as parameter

void PrintShampooInstructions(int numCycles){

if(numCycles < 1){

//if conditions checks value of numCycles is less than 1 or not

printf("Too few."); //prints Too few in output if the above condition is true

printf("\n"); } //prints a new line

//else if part is executed when the if condition is false and else if  checks //value of numCycles is greater than 4 or not

else if(numCycles > 4){

//prints Too many in output if the above condition is true

printf("Too many.");

printf("\n"); } //prints a new line

//else part is executed when the if and else if conditions are false

else{

//prints "N: Lather and rinse." numCycles times, where N is the cycle //number, followed by Done

for(int N = 1; N <= numCycles; N++){

printf("%d",N);

printf(": Lather and rinse. \n");}

printf("Done.");

printf("\n");} }

int main() //start of the main() function body

{    int userCycles; //declares integer variable userCycles

   scanf("%d", &userCycles); //reads the input value into userCycles

   PrintShampooInstructions(userCycles);

//calls PrintShampooInstructions function passing the value in userCycles

   return 0;}

I will explain the for loop used in PrintShampooInstructions() function. The loop has a variableN  which is initialized to 1. The loop checks if the value of N is less than or equal to the value of numCycles. Lets say the value of numCycles = 2. So the condition evaluates to true as N<numCycles  which means 1<2. So the program control enters the body of loop. The loop body has following statements. printf("%d",N); prints the value of N followed by

printf(": Lather and rinse. \n"); which is followed by printf("Done.");

So at first iteration:

printf("%d",N); prints 1 as the value of N is 1

printf(": Lather and rinse. \n");  prints : Lather and rinse and prints a new line \n.

As a whole this line is printed on the screen:

1: Lather and rinse.

Then the value of N is incremented by 1. So N becomes 2 i.e. N = 2.

Now at second iteration:

The loop checks if the value of N is less than or equal to the value of numCycles. We know that the value of numCycles = 2. So the condition evaluates to true as N<numCycles  which means 2=2. So the program control enters the body of loop.

printf("Done."); prints Done after the above two lines.

printf("%d",N); prints 2 as the value of N is 2

printf(": Lather and rinse. \n");  prints : Lather and rinse and prints a new line \n.

As a whole this line is printed on the screen:

2: Lather and rinse.

Then the value of N is incremented by 1. So N becomes 2 i.e. N = 3.

The loop again checks if the value of N is less than or equal to the value of numCycles. We know that the value of numCycles = 2. So the condition evaluates to false as N<numCycles  which means 3>2. So the loop breaks.

Now the next statement is:

printf("Done."); which prints Done on the screen.

So as a whole the following output is displayed on the screen:

1: Lather and rinse.

2: Lather and rinse.

Done.

The programs along with their outputs are attached.

Write a method named isPalindrome that accepts a string parameter and returns true if that string is a palindrome, or false if it is not a palindrome. For this problem, a palindrome is defined as a string that contains exactly the same sequence of characters forwards as backwards, case-insensitively. For example, "madam" or "racecar" are palindromes, so the call of isPalindrome("racecar") would return true. Spaces, punctuation, and any other characters should be treated the same as letters; so a multi-word string such as "dog god" could be a palindrome, as could a gibberish string such as "123 $$ 321". The empty string and all one-character strings are palindromes by our definition. Your code should ignore case, so a string like "Madam" or "RACEcar" would also count as palindromes.

Answers

Answer:

The programming language is not stated;

However, I'll answer this question using Java Programming Language;

The method is as follows;

   public static void isPalindrome(String userinput)

    {

       String reverse = "";

       int lent = userinput.length();

int j = lent - 1;

while(j >= 0)

       {

           reverse = reverse + userinput.charAt(j);

           j--;

       }

       if(reverse.equalsIgnoreCase(userinput))

       {

           System.out.println("True");

       }

       else

       {

           System.out.println("False");

       }    

    }

Explanation:

This line defines the method isPalindrome with a string parameter userinput

public static void isPalindrome(String userinput) {

This line initializes a string variable

       String reverse = "";

This line gets the length of the userinput

       int len = userinput.length();

The following while-loop gets the reverse of userinput and saved the reversed string in reverse

int j = lent - 1;

while(j >= 0)

       {

           reverse = reverse + userinput.charAt(j);

           j--;

       }

The following if statement checks if userinput and reverse are equal (cases are ignored)

       if(reverse.equalsIgnoreCase(userinput))

       {

           System.out.println("True"); This line is executed if the if condition is true

       }

       else

       {

           System.out.println("False"); This line is executed if otherwise

       }  

    } The method ends here

Define stubs for the functions get_user_num) and compute_avg). Each stub should print "FIXME: Finish function_name" followed by a newline, and should return -1. Each stub must also contain the function's parameters Sample output with two calls to get_user_num) and one call to compute_avg): FIXME: Finish get_user_num() FIXME: Finish get_user_num() FIXME: Finish compute_avg() Avg: -1 1 ' Your solution goes here '' 2 4 user_num1 = 0 5 user_num2 = 0 6 avg_result = 0 7 8 user_num1 = get_user_num 9 user_num2 = get_user_num ) 10 avg_result = compute_avg(user_num1, user_num2) 11 12 print'Avg:', avg_result)|

Answers

Answer:

Here are the stub functions get_user_num() and compute_avg()

def get_user_num():

   print('FIXME: Finish get_user_num()')

   return -1  

def compute_avg(user_num1, user_num2):

   print('FIXME: Finish compute_avg()')

   return -1

Explanation:

A stub is a small function or a piece of code which is sometimes used in program to test a function before its fully implemented. It can also be used for a longer program that is to be loaded later. It is also used for a long function or program that is remotely located. It is used to test or simulate the functionality of the program.  

The first stub for the function get_user_num() displays FIXME: Finish get_user_num() and then it returns -1.

The seconds stub for the function compute_avg() displays the FIXME: Finish compute_avg() and then it returns -1.

Here with each print statement, there is function name after this FIXME: Finish line. The first function name is get_user_num and the second is compute_avg().

Next the function get_user_num() is called twice and function compute_avg() followed by a print statement: print('Avg:', avg_result) which prints the result. So the program as a whole is given below:

def get_user_num():

   print('FIXME: Finish get_user_num()')

   return -1  

def compute_avg(user_num1, user_num2):

   print('FIXME: Finish compute_avg()')

   return -1  

user_num1 = 0  # the variables are initialized to 0

user_num2 = 0

avg_result = 0  

user_num1 = get_user_num()  #calls get_user_num method

user_num2 = get_user_num()

avg_result = compute_avg(user_num1, user_num2)  

print('Avg:', avg_result)

The method get_user_num() is called twice so the line FIXME: Finish get_user_num() is printed twice on the output screen. The method compute_avg() is called once in this statement avg_result = compute_avg(user_num1, user_num2)   so the line FIXME: Finish compute_avg() is printed once on the output screen. Next the statement print('Avg:', avg_result) displays Avg: -1. You can see in the above program that avg_result = compute_avg(user_num1, user_num2)   and compute_avg function returns -1 so Avg= -1. The program along with the produced outcome is attached.

#Write a function called 'string_type' which accepts one #string argument and determines what type of string it is. # # - If the string is empty, return "empty". # - If the string is a single character, return "character". # - If the string represents a single word, return "word". # The string is a single word if it has no spaces. # - If the string is a whole sentence, return "sentence". # The string is a sentence if it contains spaces, but # at most one period. # - If the string is a paragraph, return "paragraph". The # string is a paragraph if it contains both spaces and # multiple periods (we won't worry about other # punctuation marks). # - If the string is multiple paragraphs, return "page". # The string is a paragraph if it contains any newline # characters ("\n"). # #Hint: think carefully about what order you should check #these conditions in. # #Hint 2: remember, there exists a count() method that #counts the number of times a string appears in another #string. For example, "blah blah blah".count("blah") #would return 3.

Answers

Answer:

I am writing a Python program:

def string_type(string):

   if string=="":  //if the string is empty

       return "empty"

   elif string.count(".")>1:  #if the period sign occurs more than once in string

       if string.count("\n"):  #checks if the new line occurs in the string

           return "page"  #if both the above cases are true then its a page

       return "paragraph"  # if the period sign condition is true then its a para

   elif string.count(" ")>=1:  #if no of spaces in string occur more than once

       return "sentence"  #returns sentence

   elif len(string)==1:  # if length of the string is 1 this

       return "character"  #returns character

   else:  #if none of the above conditions is true then its a word

       return "word" #returns word

Explanation:

def string_type(string):  this is the definition of method string_type which takes a string as argument and determines whether the type of string is a word, paragraph, page, sentence or empty.

if string=="" this if condition checks if the string is empty. If this condition is true then the method returns "empty"

elif string.count(".")>1  This condition checks if the string type is a paragragh

string.count(".")>1   and if string.count("\n") both statements check if the string type is a page.

Here the count() method is used which is used to return the number of times a specified string or character appears in the given string.

Suppose the string is "Paragraphs need to have multiple sentences. It's true.\n However, two is enough. Yes, two sentences can make a paragraph."

The if condition first checks if count(".")>1 which means it counts the occurrence of period i.e. "." in the string. If the period occurs more than once this means it could be a page. But it could also be a paragraph so in order to determine the correct string type another if statement if string.count("\n") inside elif statement determines if the string is a page or not. This statement checks the number of times a new line appears in the string. So this distinguishes the string type paragraph from string type page.

elif string.count(" ")>=1: statement determines if the string is a sentence. For example if the string is "i love to eat apples." count() method counts the number of times " " space appears in the string. If the space appears more than once this means this cannot be a single word or a character and it has more than one words. So this means its a sentence.

  elif len(string)==1:  this else if condition checks the length of the string. If the length of the string is 1 this means the string only has a single character. Suppose string is "!" Then the len (string) = 1 as it only contains exclamation mark character. So the method returns "character" . If none of the above if and elif conditions evaluates to true then this means the string type is a word.

Answer:

def string_type(string):

  if string=="":  //if the string is empty

      return "empty"

  elif string.count(".")>1:  #if the period sign occurs more than once in string

      if string.count("\n"):  #checks if the new line occurs in the string

          return "page"  #if both the above cases are true then its a page

      return "paragraph"  # if the period sign condition is true then its a para

  elif string.count(" ")>=1:  #if no of spaces in string occur more than once

      return "sentence"  #returns sentence

Explanation:

For each of these relations on the set {21,22,23,24},decide whether it is re- flexive, whether it is symmetric, whether it is antisymmetric, and whether it is transitive.1. {(22, 22), (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)} 2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}

Answers

Answer:

1. {(22, 22) (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)} : Not reflective, Not symmetric, Not anti-symmetric, Transitive.

2.  {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}: Reflective, symmetric.

Explanation:

Solution

Reflective: Of every element matched to its own element

Symmetric: For every (a,b) there should be (b,a)

Anti-symmetric: For every (a,b) there should not be (b,a)

Transitive: For every (a,b) ∈R and (b,c)∈ R -then (a,c) ER for all a, b, c ∈ A

Now,

1.{(22, 22) (22, 23), (22, 24), (23, 22), (23, 23), (23, 24)}

Not Reflective: This is because we don't have (21,21) (23,23) and (24,24)

Not symmetric: Because we don't have (23,24) and (24,23)

Not anti symmetric: We have both (22,23) and (23,22)

Transitive: It is either 22 or 23 be (a,b) and 24 (b,a)

2. {(21,21),(21,22),(22,21),(22,22),(23,23),(24,24)}

Reflective: For all we have (a,a)

Symmetric: For every (a,b) we have (b,a)

Not Anti-symmetric

Transitive

More than one component in a particular automotive electric circuit is not working. Technician A starts testing the circuit at the power source. Technician B starts testing the circuit at its load. Who is right?

Answers

Hi there! Hopefully this helps!

--------------------------------------------------------------------------------------------------

The answer is A, testing the circuit at the power source.

"The correct syntax for passing an array as an argument to a method when a method is called and an array is passed to it is: "

Answers

Question:

"The correct syntax for passing an array as an argument to a method when a method is called and an array is passed to it is: "

A) a[0]..a[a.length]

B) a()

C) a

D) a[]  

Answer:

The correct answer is A.

An example is given in the attachment.

Cheers!

The score of a student in two subjects are inserted in the B2 and C2 cells and the passing score for each subject is 60. Which of these functions will you insert in the D2 cell so that it returns TRUE if at least one score is greater than or equal to 60, or else it returns FALSE

Answers

Answer:

=OR(B2>=60, C2>=60)

Explanation:

If you want to check if at least one of the scores is equal to or greater than 60, you should use the OR function. The OR function tests multiple conditions and returns TRUE if at least one is met. Therefore, the function in cell D2 would be:

= OR(B2>=60, C2>=60)

In other to obtain the boolean value True if one of two or more conditions are met, the OR operator is used. Hence, the appropriate function is =OR(B2>=60, C2>=60)

The OR opertor gives a True value if one of the two conditions is met., if the student scores 60 or above in one of the two subjects, the output will be True.

Similarly, if the student score above 60 in both, the output will be true.

Hence, the appropriate function is =OR(B2>=60, C2>=60).

Learn more : https://brainly.com/question/20702793

What is the output of the following Python statements? def recurse(a): if (a == 0): print(a) else: recurse(a) recurse(0)

Answers

Answer:

d) 0 1 1 2

The above piece of code prints the Fibonacci series.

Explanation:

def a(n):

   if n == 0:

       return 0

   elif n == 1:

       return 1

   else:

       return a(n-1)+a(n-2)

for i in range(0,4):

   print(a(i),end=" ")

Other Questions
Which three organs are part of the digestive tract? salivary glands, gall bladder, appendix esophagus, stomach, small intestine teeth, tongue, mouth esophagus, liver, pancreas? Which structure is most likely used for hunting? CDB stock is currently priced at $80. The company will pay a dividend of $4.57 next year and investors require a return of 10.8 percent on similar stocks. What is the dividend growth rate on this stock Select the two values of x that are roots of this equation.x - 5x+2=0A. X=5+33B. X=C. x=5+ _172D. x-5-3 Value of the digit 5 in 75 389 Demario says that the point (1, 5) on the graph below means that one hat costs $5.00. Is Demario correct? yes or no Question 5 PLEASE HELP What is the graph of 3x+6y=-18 Un campanario tarda 4s en tocar 5 campanadas , Cuanto tardara en tocar 10 campanadas? Questions 613: This section covered nine ways to begin a sentence. Use that information to fill in the following blanks. 6. The most common way to write a sentence is to start it with the ________. 7. To accent the main verb, you can start a sentence with a(n) _______. 8. To introduce important facts, some writers begin with a ______ phrase. 9. A dependent _____ clause often helps qualify an infinitive or participle. 10. Starting a sentence with a(n) _________ helps create a vivid description. 11. Writers may choose to begin a sentence with a(n) ____ or _____ participle. 12. When a sentence begins with to, chances are the writer is choosing to start with a(n) ___________. 13. The parenthetical phrase that starts a sentence is known as a(n) ______ (two words). Weatherwear estimates that every unit sold and returned due to defect costs the company $200 in profits. Approximately what would Weatherwears total profits have been in Year 5 if all units sold and returned due to defect had been eliminated? Meline has 4 different coloured crayons and 2 different boxes. How many different ways can Meline put all 4 different crayons into 2 boxes so that each box has at least 1 crayon? The table shown lists the atomic weight of the elements that begin with the letter c. What's the range of theseatomic weights?Review My AnswersSave & EVENo. Atomic Weight Name 48112411 2040078 98251000Cadmium cd Calcium Ca Californium Cf Carbon Cerium Ce Cesium Cs Chlorine C Chromium Cr Cobalt Co Copper Cu Curium Cm6 12.011 58140116 55132906 1735453 2451996 2758933 2963546 96 *247.00A. 215.547B. 238.989C. 234.989D. 134.589 If a person invests $190 at 8% annual interest, find the approximate value of the investment at the end of 10 years. Angina, Inc., has 5 million shares outstanding. The firm is considering issuing an additional 1 million shares. After selling these shares at their $20 per share offering price and netting 95% of the sale proceeds, the firm is obligated by an earlier agreement to sell an additional 250,000 shares at 90% of the offering price. In total, how much cash will the firm net from these stock sales? Which factor is most important for classifying two species into the samegroup?A. The species live in the same place.O B. The species have different common ancestors.O C. The species have the same common name.D. The species have the same set of traits.SUBMIT Which scenario would most likely result in genetic drift?A. When predators are removed from an island, the island's population of finches grows largerB. Climate change causes the arctic habitat of a population of ringed seals to become gradually warmer.C. Several individuals in a population of wolves are killed by ranchers when they attack a herd of cattle.D. A population of moose living at the base of a volcano is nearly wiped out when the volcano erupts What happened the night that Milk was assassinated? 7 5: what is the answer to7/2t5t/9 Gregoire sold 24 cars to his friend for $71.76. What was the price per car?a. $47.76b. $2.99c. $17.22d. $3.25 write your answer without using negative exponents (u^4)^-7