A program developed for a Web store represents customer account balances using a format that approximates real numbers. While testing the program, a software developer discovers that some values appear to be mathematically imprecise. Which of the following is the most likely cause of the imprecision?
A. The account balances are represented using a fixed number of bits, resulting in overflow errors.
B. The account balances are represented using a fixed number of bits, resulting in round-off errors.
C. The account balances are represented using an unlimited number of bits, resulting in overflow errors.
D. The account balances are represented using an unlimited number of bits, resulting in round-off errors.

Answers

Answer 1

Answer:

B.

Explanation:

The most likely reason for this would be that the account balances are represented using a fixed number of bits, resulting in round-off errors. Since all of the numbers being used are real numbers they would have a fixed 32 bits of data. When these values are multiplied or divided they can be irrational numbers that never end, and therefore are cut off in order to fit the available data. This would cause the numbers to be rounded and can lead to the answer being imprecise.


Related Questions

A programmer writes 500 lines of computer code in 17 days. Must there have been at least 1 day when the programmer wrote 30 or more lines of code

Answers

Answer:

The answer is No

Explanation:

Given data

Total Lines of code= 500

Number of days= 17 days

Number of codes written per day= 500/17

Number of codes written per day= 29.4117

If we multiply 29.4117 by 17

=499.9989

=500 approx

Hence there was never a day when the programmer wrote 30 or more lines

Scenario: A robot is sitting in a chair with its arms facing down. Write an algorithm, using pseudocode, to make the robot:
1. stand up2. walk forward until it senses a wall3. turn around4. walk back to the chair5. sit down in its original starting positionFinally, output the total number of steps taken.Commands--------In addition to our standard pseudocode commands, you must also use the following robot control commands:sitstandstep (one step forward)raise arms (parallel to floor)lower arms (pointing to floor)sense (only if arms are raised)turn (90 degrees right)Immediately after issuing a sense command, you can check whether the robot is at the wall as follows:if at wallor alternativelyif not at wallAssumptions-----------You must assume the following facts:The robot's initial sitting position is directly facing the target wall.There are no obstacles between the robot and the wall.The wall is 1 or more exact steps from the chair.The wall is sensed when it is less than 1 step from the robot's arms.The length of the robot's arms are slightly less than the length of 1 step.Your solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps takenYour solution-------------Your solution must include all of the following:Adequate commentsInitialization and use of at least one variableSequential flow of controlConditional flow of controlIterative flow of controlHandling of any special casesOutput of the total number of steps taken

Answers

Solution :

[tex]\text{Algorithm to}[/tex] stand [tex]$\etxt{up:}$[/tex]

step [tex]1[/tex]: [tex]$\text{stand}$[/tex]

step 2: [tex]\text{raise arms}[/tex]

[tex]\text{Algorithm to}[/tex] walk [tex]$\text{until it senses}$[/tex] a wall:

step [tex]1[/tex]: [tex]$\text{stand}$[/tex]

step 2: [tex]\text{raise arms}[/tex]

step 3: [tex]$\text{wallSensed}$[/tex]=false

step 4: [tex]$\text{numberOfSteps}$[/tex] = 0

step 5: if([tex]$\text{wallSensed}$[/tex]==true) then

[tex]\text{lower arms}[/tex]

step

else

if(sense)

[tex]$\text{wallSensed}$[/tex]=true;

else

step

[tex]$\text{numberOfSteps}$[/tex]++;

step 6: display [tex]$\text{numberOfSteps}$[/tex] to reach the wall

[tex]\text{Algorithm to}[/tex] turn around:

Step [tex]1[/tex]: if([tex]$\text{wallSensed}$[/tex]==true) then

turn

[tex]\text{raise arms}[/tex]

turn

 

[tex]\text{Algorithm to}[/tex] walk back[tex]$\text{ to the chair}$[/tex]:

Step [tex]1[/tex]: [tex]$\text{turn around}$[/tex]

Step 2: for i=[tex]1[/tex] to [tex]$\text{numberOfSteps}$[/tex] do

step

[tex]\text{Algorithm to}[/tex] sit back down:

Step [tex]1[/tex]: sit

Step 2: Lower arms

What component can you use to open windows?

Answers

Answer:

Start Windows 10 Component Services via the Run dialog box. Press Win+ R keyboard shortcuts to launch Run dialog box, type dcomcnfg or dcomcnfg.exe in the box and click OK/press Enter to open Component Services.

Explanation:

The register in the CPU is not the same as the RAM.
Group of answer choices

True

False

Answers

The answer is true ..........

what is gradient descent in neural networks?​

Answers

Answer:

radient Descent is a process that occurs in the backpropagation phase where the goal is to continuously resample the gradient of the model's parameter in the opposite direction

What can be viewed in the Tasks folder? Check all that apply

Answers

Answer: task details; appointments; to do list

Explanation:

Task folders, simply allows an individual organize their tasks in a logical manner. It performs an identical function just like a file directory.

Folders can be created in the root folder. Once can also create them as subfolder in the other files. The task details, appointments and the to do list can be viewed in the task folder.

Identify at least three tips you would give to people to stay safe on the Internet so that their information stays secure. Explain why these tips are useful.

Answers

Answer:

1. Do not give away personal information such as your address, school you go to, or anything like that (obvious reasons

2. Do not share your passwords because people can hack into your things

3. Don't make guessable passwords such as Cookies, ILovePizza, Money

1. Never give out your address, phone number, school name, etc.
This can lead to so many bad things. To protect yourself and others around you, don’t share your personal information to people you don’t know or trust.

2. Don’t add people on social media that you don’t know. I know a lot of people have public accounts and I’m not saying thats bad, but I am saying that you need to be careful on who’s adding you. There are a lot of creepy people out there.

3. Never open links people send you. If someone sends you a link online, it’s best to not open it. This opens up a whole new world for creeps to mess with you. They can track you, give you a virus or viruses. Never open random links that random people send you.

Blank Are input instructions you give to a computer

Answers

Explanation:

A computer is a machine that can be programmed to accept data (input), process it into useful information (output), and store it away (in a secondary storage device) for safekeeping or later reuse. The processing of input to output is directed by the software but performed by the hardware.

I need solutions to below questions with python code:
Write a program, my_family.py For Loop A program, work-list.pyList
1. that contains a Tuple holding the names of friends or family members. Then use a For Loop to read and print the names.
2. that contains a of six integers. Use a list method to add one more integer. Use a list method to sort the list. Use a While Loop to print the entries.

Answers

Answer:

1) my_family.py

family = ('Dad', 'Mom', 'Agnes', 'David', 'Chris', 'Millie')

for name in range(len(family)):

   print(family[name])

2) work_list.py

my_number = [2, 6, 3, 1, 8, 4]

# add items at the end of the list.

my_number.append(0)

my_number.append(5)

# sorts the list, default - ascending.

my_number.sort()

size = 0

while size < len(my_number):

   print(my_number[size])

   size += 1

Explanation:

The tuple and list data structures are ordered, using indexes to locate items in its container.

The family.py file uses the for-loop to iterate and print the family names in the tuple.

The work-list.py file contains a list of integers which is modified by adding items at the end of the list with the append method and a prints all the items using a while-loop.

Question # 4
Fill in the Blank
Complete the following sentence.
The first email was sent in
.

Answers

Answer:

1971

Explanation:

If there is more detail needed i'm sorry

Answer:

1971

Explanation:

#Nova

Have a great day!

:)

A compound Boolean expression created with the _________ operator is true if either of its subexpressions is true.

Answers

The answer for the question is butt

. Write the advantages and disadvantages of CLI?

Answers

If you know the commands, a CLI can be a lot faster and efficient than any other type of interface. ...A CLI requires less memory to use in comparison to other interfaces. ...A CLI doesn't require Windows and a low-resolution monitor can be used

write down the multiples of three from 474 to 483​

Answers

Answer:

474, 477, 480, 483

hope this helps

have a good day :)

Explanation:

You need to build out the networking for your small local business. You have purchased a core switch and will pull home runs to each of the devices. What type of cabling will you use to connect your network

Answers

Answer: Use an Ethernet cable

Explanation:

Since the person will need to build out the networking for a small local business and wants to pull home runs to each of the devices after buying a core switch, the type of cabling that will be used to connect the network is an Ethernet cable.

An Ethernet cable is known to be the commonest network cable that's used on a wired network. The cable is required to connect the wired devices together to local network which is then vital for file sharing and Internet access.

A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a:

Answers

Answer:

True. A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a: Direct-action virus.

Explanation:

A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.

What is Direct-action virus?

A direct action computer virus is known to be a virus class that is said to be self-multiplying malware that is known to be attached to any executable file.

Therefore, Note that A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.

Learn more about virus from

https://brainly.com/question/26128220

#SPJ2

Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. calcPyramidVolume() calls the given calcBaseArea() method in the calculation.

Answers

Answer:

The method in C++ is as follows:

double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

   double baseArea = calcBaseArea(baseLength, baseWidth);

   double volume = baseArea * pyramidHeight;

   return volume;    

}

Explanation:

This defines the calcPyramidVolume method

double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

This calls the calcBaseArea method to calculate the base area of the pyramid

   double baseArea = calcBaseArea(baseLength, baseWidth);

This calculates the volume

   double volume = baseArea * pyramidHeight;

This returns the volume

   return volume;  

}

See attachment for complete program that include all methods that is required for the program to function.

which data type uses %i as a format specifier​

Answers

Answer:

A decimal integer

Explanation:

Hope this helps!

A shop will give discount of 10% if the cost of purchased quantity is more than 1000. Ask user for quantity suppose, one unit will cost 100. Judge and print total cost for user. Plz give answer in C++.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

int main(){

   int qty;

   float discount = 0;

   cout<<"Quantity: ";

   cin>>qty;

   int cost = qty * 100;

[tex]i f (cost > 1000)[/tex] {        [tex]discount=cost * 0.10[/tex];        }

   cout<<"Cost: "<<cost - discount;

   return 0;

}

Explanation:

This declares the quantity as integer

   int qty;

This declares and initializes discount to 0

   float discount = 0;

This prompts the user for quantity

   cout<<"Quantity: ";

This gets input for quantity

   cin>>qty;

This calculates the cost

   int cost = qty * 100;

If cost is above 1000, a discount of 10% is calculated

[tex]i f (cost > 1000)[/tex] {        [tex]discount=cost * 0.10[/tex];        }

This prints the cost

   cout<<"Cost: "<<cost - discount;

LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print

b. random

c. else

d. while

Answers

Question:

LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed

Answer:

d. while ✓

Explanation:

The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.

[tex] \\ \\ [/tex]

Hope it helps

-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀

17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursion; a non-recursive function, or using the built-in function math.pow(), would be more common.

Answers

Answer:

The recursion function is as follows:

def raise_to_power(num, power):

if power == 0:

 return 1

elif power == 1:

 return num

else:

 return (num*raise_to_power(num, power-1))

Explanation:

This defines the function

def raise_to_power(num, power):

If power is 0, this returns 1

if power == 0:

 return 1

If power is 1, this returns num

elif power == 1:

 return num

If otherwise, it calculates the power recursively

else:

 return (num*raise_to_power(num, power-1))

What is a word processing program? Give examples of word processing programs.

Answers

Answer:

A word processor, or word processing program, does exactly what the name implies. It processes words. It also processes paragraphs, pages, and entire papers. Some examples of word processing programs include Microsoft Word, WordPerfect (Windows only), AppleWorks (Mac only), and OpenOffice.org.

Write an algorithm to sum to values

Answers

Answer:

There is no need to make an algorithm for this simple problem. Just add the two numbers by storing in two different variables as follows:

Let a,b be two numbers.

c=a+b;

print(c);

But, if you want to find the sum of more numbers, you can use any loop like for, while or do-while as follows:

Let a be the variable where the input numbers are stored.

while(f==1)

{

printf(“Enter number”);

scanf(“Take number into the variable a”);

sum=sum+a;

printf(“Do you want to enter more numbers? 1 for yes, 0 for no”);

scanf(“Take the input into the variable f”);

}

print(Sum)

Explanation:

hi there answer is given mar me as brainliest

Amy’s new summer job at the pool will put $9 per hour. Which term describes this type of hourly income?
A. Salary
B. Take-home pay
C. Wage
D. All of the above

Answers

Answer:

d

Explanation:

What is a
a program​

Answers

Answer:

-a collection of related measures or activities aimed at achieving a specific long-term goal.

-a set of pre-programmed software instructions for controlling the operation of a computer or other machine

-provide (a computer or other machine) with pre-programmed instructions for completing a task automatically

-Organize according to a schedule or plan.

Explanation:

Answer:

A program is an set of instructions given by a computer to perform particular task

how do computers help us with our homework​

Answers

A computer can be helpful in completing homework because it gives you access to lots of sources of information like graphing websites, calculators, educational games & programs that can help you. It also allows for an easier process to submit work, organize papers, & presentations.

xD I don't know if you said this as a joke, or if you're serious, but here:

A computer can be a helpful tool to complete your homework by giving you access to countless sources of information, it can also provide you with educational games which can enhance a child's learning ability by presenting learning as something fun and interactive as opposed to boring loads of repeated work which barely stimulate learning at all. But keep in mind that a computer can also take the opposite effect on a child's brain, and can gradually turn into addiction.

I hope this helps! :D

(FYI, I spent an unreasonable amount of time typing this all in, so I hope it makes any difference at all :P)

The volumes of data collected by contemporary organizations are so huge that they are beyond the ability of typical DBMS to capture, store, and analyze. These big data may be unstructured or semi-structured and are not suitable for relational DBMS products. What are the new technologies developed to handle the big data

Answers

Answer:

Some of the new technologies developed to handle the big data are as follows:

1. In-memory Databases

2. Blockchain

3. NoSQL Databases

4. Edge Computing

5. Streaming Analytics.

6. Artificial Intelligence

Explanation:

Some of the new technologies developed to handle the big data are explained as follows:

1. In-memory Databases: This allows for rapid and easy access to data and analytics, which can be used to inform a variety of business choices. In-memory computing provides the information required to improve marketing, finances, and operations efficiency.

2. Blockchain: Blockchain is the distributed database technology that underpins the Bitcoin digital currency, and it's a darling among forward-thinking analysts and venture capitalists. The distinctive feature of a blockchain database is that data can't be erased or changed after it's been written. Furthermore, it is extremely secure, making it a perfect solution for sensitive industries such as retail, insurance, health care, banking, and among others.

3. NoSQL Databases: NoSQL databases are used to store unstructured data and offer quick performance. This implies it can handle a wide range of data formats in high volumes while remaining flexible. MongoDB, Redis, and Cassandra are examples of NoSQL databases.

4. Edge Computing: Edge computing systems evaluate data very near to where it was originated — at the network's edge — rather than sending it to a centralized server for analysis. An edge-computing system has the advantage of minimizing the quantity of data that must be transferred over the network, therefore lowering network traffic and expenses.

5. Streaming Analytics: By analyzing data as it is created, Streaming Analytics allows for faster and faster access to insights. Streaming Analytics can also take data from a variety of sources, evaluate it, and offer insights almost instantly.

6. Artificial Intelligence: Artificial intelligence has the ability to transform data analytics by learning (from previous analytic activities) and improving the speed and accuracy of outputs over time. Artificial intelligence has the ability to make accurate future predictions based on current events with vast amounts of data to draw from, as well as analytic results from previous inquiries.

Which of the following describes an iteration in a computer program?

Answers

Answer:

a set of instructions that can be run multiple times throughout a program

Explanation:

Describe Technology class using at least 3 adjectives

Answers

Answer:

clearly alien

typically inept

deadly modern

Explanation:

Sam plans to use this image in artwork for a brochure about airplanes. Which principles of page layout is Sam planning to use in this artwork?

A. emphasis
B. repetition
C. balance
D. alignment
E. proximity

Answers

Answer: Alignment

Explanation:

The principle of repitition indicates that some aspect of a design are repeated. This can be in form of bullet list, lines, color etc.

Balance has to do with how the weight is distributed.

The Principle of Alignment means that the pictures on a page should be connected visually to another thing.

Principle of Proximity simoly means that the items that are related on a page should be close to each other.

Therefore, the principles of page layout that Sam is planning to use in this artwork is alignment.

Answer:

D. alignment

Explanation:

They need network security skills to know how to perform tasks such as:

A. Testing software before launching.
B. maintaining databases.
C. investigating virus attacks​

Answers

B) maintaining databases

Answer:

Your answer should be C

because in they will protect the data base from virus.

Other Questions
when two heterozygous individual are crossed,the proportion of the offspring that are true breeding for dominant trait is 4. Explain what an imaginary number is and its relationship to complex numbers. Then givean example of where complex numbers occur naturally in mathematics. Relationship in FiguresWhat are the first eight numbers in a Fibonacci sequence when N is equal to 1?a. 1,2,3,4,5,6,7,8b. 1,1,2,3,5,8,13,21c. 3,0,2,3,2,5,5,7d. 1,1,2,2,3,4,5,7Please select the best answer from choices provided Riemer, Inc. has four departments. Information about these departments is listed below. Maintenance is a service department. If allocated maintenance cost is based on floor space occupied by each of the other departments, compute the amount of maintenance cost allocated to the Cutting Department. Maintenance Cutting Assembly Packaging Direct costs $20,000 $32,000 $72,000 $47,000 Sq. ft. of space 600 1,100 2,100 3,050No. of employees 4 4 18 6a. $3,520.b. $5,000.c. $20,000.d. $3,874. .What is Javier going to have for main course? Odio las verduras, pero me encantanlos huevos. Tambin me gustala carne, pero no me gustan lospimientos ni los filetes. Me gustamucho el chocolate. Tengo sed, perono quiero caf ni agua, prefiero tEnter your answer Please help its biology!!!!!! What is sieving? Give an example where this method is used. (2) Does anyone have the chemistry paper 1 higher 2019 mark scheme thank you MacGyver Company bought equipment on January 3, 20X1, for $34,100. At the time of purchase, the equipment was estimated to have a useful life of 6 years and a salvage value of $620. Using the straight-line method, the amount of one year's depreciation is The equation of a line is y= 4x - 1 and the point (3, p) lies on this line. Determine the value of P What will happen if I took 8 paracetamol all in once How many kilometers in 10 miles?Round your answer to the nearest tenth. Practice polynomials solve and show your work 3x^2-14x-5 1. What is one similarity between human skeletal muscles and some bacteria? * A bird in flight pushes itself upward witha 7.28 N force. If the bird is climbing at aconstant rate of 1 m/s (no acceleration),what is the weight of the bird?[?] N A ladder is leaning against the side of a 10cm house. If the base of the ladder is a 3cm away from the house, how tall is the Ladder Which image shows an example of potential energy? Answer Correct plzz worth 10 points!!! [tex] \bf \pink{Define \: the \: decimal \: number \: system \: in \: your \: own \: words. }[/tex] 42 is greater than 24, 24 is less than 42