based on the condition.
The starting value of looping statement is calle
This is the final (last) value of loop statement a
This is a non-executable statement which is al
of QBASIC.
This statement is used to make variable global
It is declared in the main program and changes
This statement is used to close the one or more​

Answers

Answer 1

Answer:

A subroutine is a block of statements that carries out one or more tasks. ... they share all variables with the rest of the main program. ... Once you have defined a function in your program, you may use it in any appropriate expression, such as: ... Thus, functions can- not change the values of the arguments passed to them.

Explanation:


Related Questions

When preparing a photo for a magazine, a graphic designer would most likely need to use a program such as Microsoft Excel to keep track of magazine sales. Microsoft Word to write an article about the photo. Adobe Photoshop to manipulate the photo. Autodesk Maya to create 3-D images that match the photo.

Answers

Answer:

Adobe Photoshop To Manipulate The Photo.

Explanation:

BLACKPINKS new album is amazing OMG I LOVE Lovesick Girls!!!

Write a JavaScript to multiple 2 square matrices (3,3). You can use any numbers as elements of the matrix.

Answers

Answer:

Here is the JavaScript program:

function MatricesMul(matrix1, matrix2) {

   var product = [];

   for (var i = 0; i < matrix1.length; i++) {

       product[i] = [];

       for (var j = 0; j < matrix2[0].length; j++) {

           var total = 0;

           for (var k = 0; k < matrix1[0].length; k++) {

               total += matrix1[i][k] * matrix2[k][j];  }

           product[i][j] = total;        }    }

   return product;}

var matrix1 = [[1,2,3],[4,5,6],[7,8,9]]

var matrix2 = [[3,2,1],[6,5,4],[1,2,3]]

var output = MatricesMul(matrix1, matrix2)

document.write(output);

Explanation:

The function MatricesMul(matrix1, matrix2) takes two matrices (matrix1 and matrix2) as parameters.

var product = [];  product works as an array to contain the result of the multiplication of the two matrices matrix1 and matrix2.

for (var i = 0; i < matrix1.length; i++) this is a loop which iterates through the matrix1 and it continues to execute until the loop variable i exceeds the length of the matrix1. This is basically the loop which iterates through the rows of matrix1.

for (var j = 0; j < matrix2[0].length; j++) this is a loop which iterates through matrix2 and it continues to execute untill the loop variable j exceeds the length of the element of matrix2 at 0-th index (first element). This is basically the loop which iterates through the colulmns of matrix2.

var total = 0;  variable total is initialized to 0 and this variable is used to compute the sum.

for (var k = 0; k < matrix1[0].length; k++) this loop is used for the multiplication of the two matrices matrix1 and matrix2.

total += matrix1[i][k] * matrix2[k][j];  this statement first multiplies each element of matrix1 row to each element of the matrix2 column, takes the sum of pairwise products.

return product; returns the result of the multiplication of matrix1 and matrix2.

For example let matrix1 = [[1,2,3],[4,5,6],[7,8,9]]  and matrix2 = [[3,2,1],[6,5,4],[1,2,3]] .

The first for loop moves through each row of matrix1. The first element of first row of matrix1 is 1, the second element is 2 and third is 3. The second loop iterates through each column of matrix2. Lets take the first column matrix2. The first element of first column of matrix2 i.e. 3, the second element is 6 and the third is 1. Third loop performs the pairwise multiplication of row of matrix1 to column of matrix2 and takes the sum of pairwise product. This means 1 is multiplied to 3, 2 is multiplied with 6 and 3 is multiplied to 1. This will take the form: 1*3 + 2*6 + 3*1 = 3 + 12 + 3 Now their sum is taken and the result is stored in total variable. So the sum of 3 + 12 + 3 is 18. This process will continue until all the rows elements of matrix1 and elements in all columns of matrix2 are multiplied and the sum of each pairwise product is taken.

var matrix1 = [[1,2,3],[4,5,6],[7,8,9]]

var matrix2 = [[3,2,1],[6,5,4],[1,2,3]]

The above two statements two (3,3) square matrices are given values.

var output = MatricesMul() this calls the MatricesMul method and passes the two matrices (matrix1, matrix2) to the function and stores the result of this multiplication to output variable.

document.write(output); displays the result of the multiplication of two square matrices .

Suppose you are provided with 2 strings to your program. Your task is to join the strings together so you get a single string with a space between the 2 original strings. This is a common case is coding and you will need to create your output by joining the inputs and adding the space in the middle.

# Input from the command line
import sys
string1 = sys.argv[1]
string2 = sys.argv[2]

Answers

Answer:

public class TestImport{

   public static void main(String[] args) {

       String string1 = args[1];

       String string2 = args[2];

       System.out.println(string1 +" " +string2);

   }

}

Explanation:

The solution here is to use string concatenation as has been used in this statement System.out.println(string1 +" " +string2);

When this code is run from the command line and passed atleast three command line arguments for index 0,1,2 respectively, the print statment will return the second string (that is index1) and the third argument(that is index2) with a space in-between the two string.

Explain why an organization's firewall should block incoming packets the destination address of which is the organization's broadcast address?

Answers

Answer:

The classification including its given topic has always been outlined in section through below justifications.

Explanation:

Whenever an application running seems to have the destination as either the destination network of the organization, it must use the sophisticated instruments. This would also pressure each host mostly on infrastructure to collect the traffic coming as well as processing the message. Increases system should perhaps be restricted because it will not significantly impact channel or device productivity.Therefore, the firewall of a standard operating organization will block certain traffic with IP addresses as destination host of the organization.Another thing to remember here seems to be that transmitted destination details are usually indicators of an intruder using only a target computer as something of a transmitter. An assailant utilizing a broadcasting channel can trigger the transmitter to occur on a different machine.  

g Write a C program that prompts the user for a string of, up to 50, characters and numbers. It can accept white spaces and tabs and end with a return. The program should keep track of the number of different vowels (a,e, i, o, u) and the number of digits (0, 1, 2, 3, 4, 5, 6, 7, 8,9). The program should output the number of occurrences of each vowel and the number of occurrences of all digits.

Answers

Answer:

Following are the code to this question:

#include <stdio.h> //defining header file

#include <string.h>//defining header file

int main()//defining main method

{

char name[50]; //defining character variable

int A=0,E=0,I=0,O=0,U=0,value=0,i,l; //defining integer variables

printf("Enter string value: ");//print message

gets(name);//input value by gets method

l=strlen(name);//defining l variable to store string length

for(i=0; i<50; i++) //defining loop to count vowels value

{

if(name[i] == 'A' || name[i] == 'a') //defining if condition count A value A++;//increment value by 1

else if(name[i] == 'E' || name[i] == 'e')//defining else if condition count E value

E++;//increment value by 1

else if(name[i] == 'I' || name[i] == 'i') //defining else if condition count I value

I++;//increment value by 1

else if(name[i] == 'O' || name[i]== 'o') //defining else if condition count O value

O++;//increment value by 1

else if(name[i] == 'U' || name[i] == 'u')//defining else if condition count U value

U++;//increment value by 1

else if(name[i]>= '0' && name[i] <= '9')//defining else if condition count digits value

value++;//increment value by 1 }

printf("A: %d\n",A);//print A value

printf("E: %d\n",E); //print E value

printf("I: %d\n",I);//print I value

printf("O: %d\n",O);//print O value

printf("U: %d\n",U);//print U value

printf("value: %d",value);//print digits value

return 0;

}

Output:

please find the attachment.

Explanation:

In the above code, a char array "name" and integer variables "A, E, I, O, U, i, value and l" declared, in which name array store 50 character value, which uses the gets function to take string value.after input value strlen method is used to store the length of the input string in l variable.In the next step, for loop is declared that uses multiple conditional statements to counts vowels and the values of the digits,if it is more then one it increments its value and at the last print method is used to print its count's value.

What will be the tokens in the following statement? StringTokenizer strToken = new StringTokenizer("January 1, 2008", ", ", true);

Answers

Answer:

The tokens are:

January

space

1

,

space

2008

Explanation:

StringTokenizer class is basically used to break a string into tokens. The string consists of numbers, letters, quotation marks commas etc,

For example if the string is "My name is ABC" then StringTokenizer will break this string to following tokens:

My

name

is

ABC

So in the above example, the string is "January 1, 2008". It contains January with a space, then 1, then a comma, then 2008

The last comma and true in the statement do not belong to the string. They are the parameters of the StringTokenizer constructor i.e.

StringTokenizer(String str, String delim, boolean flag)

So according to the above constructor str= "January 1, 2008"

String delim is ,

boolean flag = true

So  the StringTokenizer strToken = new StringTokenizer("January 1, 2008", ", ", true); statement has:

a string January 1, 2008

a delim comma with a space (, ) which is used to tokenize  the string "January 1, 2008".

boolean flag set to true which means the delim i.e. (, ) is also considered to be a token in the string. This means the comma and space are considered to be tokens in the given string January 1, 2008.

Hence the output is January space 1 comma space 2008.

Check the attached image to see the output of the following statement.

Write a statement that assigns total_coins with the sum of nickel_count and dime_count. Sample output for 100 nickels and 200 dimes is: 300

Answers

Answer:

total_coins = nickel_count + dime_count

Explanation:

The statement that performs the operation in the question is total_coins = nickel_count + dime_count

Full Program (Written in Python)

nickel_count = int(input("Nickel Count: "))

dime_count = int(input("Dime Count: "))

total_coins = nickel_count + dime_count

print("Total coins: ",total_coins)

The first two lines prompt user for nickel and dime count respectively

The third line adds the two coins categories together

The last line prints the total count of coins

The statement which gives the sum of nickel and dime is written below :

total_coins = nickel_count + dime_count

The statement required is written using Python 3 :

We could write these as a function :

def total(nickel_count, dime_count) :

total_coins = dime_count + nickel_count

print(total_coins)

total(100, 200)

#the function total takes in two arguments(number of nickels and number of dimes)

#assigns the varibale total_coins to the sum of nickel_count and dime_count

We could also write this in the form of a program which prompts users to enter values :

nickel_count = int(input('Enter count of nickel : '))

# User is prompted to enter number of nickels

dime_count = int(input('Enter count of dime : '))

# User is prompted to enter number of dimes

total_coins = nickel_count + dime_count

#assigns the varibale total_coins to the sum of nickel_count and dime_count

print(total_coins)

#outputs the value of total_coins

Learn more : https://brainly.com/question/17615351

Makers of tablet computers continually work within narrow constraints on cost, power consumption, weight, and battery life. Describe what you feel would be the perfect tablet computer. How large would the screen be? Would you rather have a longer-lasting battery, even if it means having a heavier unit? How heavy would be too heavy? Would you rather have low cost or fast performance Should the battery be consumer-replaceable?

Answers

Answer:

In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.

In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.

What will be the typical runtime of a tablet?

The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets.

The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets. It might go a week or longer between charges if you only use the tablet once or twice each day.

Many people find that charging merely 80% is ineffective. Your phone won't function if you fully charge it and then use it in a single day. The 40-80% rule applies if, like me, your daily usage is limited to 25–50%.

The typical runtime of a tablet is between three and ten hours. More charge is typically needed for less expensive models than for more expensive tablets.                          

Therefore, In my opinion I would spend my money on a pc, tablets are of no use anymore besides having a larger screen, nowadays you either have a phone or a computer.

Learn more about battery on:

https://brainly.com/question/19225854

#SPJ2

The main path of the Internet along which data travels the fastest is known as the Internet ________. Group of answer choices

Answers

Answer:

Internet backbone

Explanation:

The internet backbone is made up of multiple networks from multiple users. It is the central data route between interconnected computer networks and core routers of the Internet on the large scale. This backbone does not have a unique central control or policies, and is hosted by big government, research and academic institutes, commercial organisations etc. Although it is governed by the principle of settlement-free peering, in which providers privately negotiate interconnection agreements, moves have been made to ensure that no particular internet backbone provider grows too large as to dominate the backbone market.

Which of the following manages the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner?
A. Supply chain delivery system.
B. Supply chain demand system.
C. Supply chain execution system.
D. Internal supply chain system.
E. Supply chain planning system.

Answers

Answer:

C. Supply chain execution system.

Explanation:

In Business management, supply chain management can be defined as the effective and efficient management of the flow of goods and services as well as all of the production processes involved in the transformation of raw materials into finished products that meet the insatiable want and need of the consumers. Generally, the supply chain management involves all the activities associated with planning, execution and supply of finished goods and services to the consumers. The supply chain management is enhanced through the use of supply chain softwares.

Also the supply chain software can be classified into two (2) main categories and these are;

1. Supply chain planning system.

2. Supply chain execution system.

In this case, supply chain execution system manages the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner. There are various types of supply chain execution systems, these include;

1. Order fulfillment management system software.

2. Transport management system software.

3. Global trade management system software.

4. Warehouse management system software.

Hence, a supply chain execution system if effectively and efficiently used can be used to enhance final production, reverse distribution, distribution management, commitments, and replenishment.

4.Three years ago your company bought a new RAID 5 array. All the disks in the RAID were brand new, all manufactured within a month of each other. Today one disk has failed in this RAID. How many disks do you replace

Answers

Answer:

one disk

Explanation:

RAID 5:is an  independent disks configuration of redundant array that utilizes disk striping in addition to parity. Data and parity bits are striped uniformly across the entire the disks configuration, so that no any single disk can create a bottleneck.  

"Today one disk has failed in this RAID. How many disks do you replace"

Since RAID 5 guard against data through implementation of stripping of both data and parity bits, the failed disk can be replaced to restore the company's RAID 5 array fully back into service.

#Write a function called random_marks. random_marks should #take three parameters, all integers. It should return a #string. # #The first parameter represents how many apostrophes should #be in the string. The second parameter represents how many #quotation marks should be in the string. The third #parameter represents how many apostrophe-quotation mark #pairs should be in the string. # #For example, random_marks(3, 2, 3) would return this #string: #'''""'"'"'" # #Note that there are three apostrophes, then two quotation #marks, then three '" pairs. #Add your function here!

Answers

Answer:

def random_marks(apostrophe, quotation, apostrophe_quotation):

   return "'"*apostrophe + "\""*quotation + "'\""*apostrophe_quotation

   

print(random_marks(3, 2, 3))

Explanation:

Create a function called random_marks that takes apostrophe, quotation, and apostrophe_quotation as parameters. Inside the function, return apostrophe sign times apostrophe plus quotation mark times quotation plus apostrophe sign quotation mark times apostrophe_quotation.

Note that plus sign (+) is used to concatenate strings. Also, if you multiply a string with a number, you get that number of strings ("#"*3 gives ###).

Then, call the function with given parameters and print

Write code that uses the input string stream inSS to read input data from string userInput, and updates variables userMonth, userDate, and userYear. Sample output if the input is "Jan 12 1992": Month: Jan Date: 12 Year: 1992

Answers


The Code Looks Like this :

import java.util.Scanner;
public class StringInputStream {
public static void main (String [] args) {
Scanner inSS = null;
String userInput = "Jan 12 1992";
inSS = new Scanner(userInput);
String userMonth = "";
int userDate = 0;
int userYear = 0;
/* Your solution goes here */
inSS.useDelimiter(" ");
userMonth=inSS.next();
userDate=inSS.nextInt();
userYear=inSS.nextInt();
System.out.println("Month: " + userMonth);
System.out.println("Date: " + userDate);
System.out.println("Year: " + userYear);
return;
}
}

Out Put:

Month: Jan

Date: 12

Year: 1992

Following are the java program to separing the string value:

Program Explanation:

Import package.Defining a class Main.Defining the main method.Inside the method, a Scanner class type variable "inSS" is define that reads "userInput" a string variable value.In the next step, one string and two integer variable "userMonth, userDate, and userYear" is defined that separe its value by using "useDelimiter" method, and print its value with the message.

Program:

import java.util.*;//import package

public class Main //defining a class main

{

public static void main (String [] ars) //main method

{

Scanner inSS = null;//using Scanner  

String userInput="Jan 12 1992";//defining a String variable userInput that holds a string value

inSS = new Scanner(userInput);//passing userInput value into Scanner class

String userMonth = "";//defining a String variable

int userDate = 0,userYear = 0;//defining an integer variable

inSS.useDelimiter(" ");//calling method useDelimiter

userMonth=inSS.next();//holding value in to the variable

userDate=inSS.nextInt();//holding value in to the variable

userYear=inSS.nextInt();//holding value in to the variable

System.out.println("Month: " + userMonth);//print value with message

System.out.println("Date: " + userDate);//print value with message

System.out.println("Year: " + userYear);//print value with message

return;

}

}

Output:

Please find the attachment file.

Learn more:

brainly.com/question/14063644

Do transformers have life insurance or car insurance? If you chose life insurance, are they even alive?

Answers

Answer:

Car insurance

Explanation:

they are machines with ai

Convert the following numbers from decimal to binary, assuming unsigned binary representation:________.
A) 35
B) 3
C) 27
D) 16

Answers

Answer:

Binary representations of following are:

A) 35 = 100011

B) 3 = 11

C) 27 = 11011

D) 16 = 10000

Explanation:

The method to generate the binary number from a decimal is :

Keep on dividing the number by 2 and keep on tracking the remainder

And the quotient is again divided and remainder is tracked so that the number is completely divided.

And then write the binary digits from bottom to top.

Please have a look at the method in below examples:

A) 35

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 35 & 1 \\ 2 & 17 & 1 \\ 2 & 8 & 0 \\ 2 & 4 & 0 \\ 2 & 2 & 0 \\ 2 & 1 & 1\end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary number is 100011

B) 3

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 3 & 1 \\ 2 & 1 & 1 \\ \end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary equivalent is 11.

C) 27

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 27 & 1 \\ 2 & 13 & 1 \\ 2 & 6 & 0 \\ 2 & 3 & 1 \\ 2 & 1 & 1 \end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary equivalent is 11011.

D) 16

[tex]\begin{center}\begin{tabular}{ c c c }Number & Quotient & Remainder\\ 2 & 16 & 0 \\ 2 & 8 & 0 \\ 2 & 4 & 0 \\ 2 & 2 & 0 \\ 2 & 1 & 1 \\\end{tabular}\end{center}[/tex]

Writing the remainder from bottom to top.

So, binary equivalent is 10000.

Answers are:

Binary representations of following are:

A) 35 = 100011

B) 3 = 11

C) 27 = 11011

D) 16 = 10000

Write down the information for your system’s active network connection (most likely either Ethernet or Wi-Fi).

Answers

Question:

1. Open a command prompt window, type ipconfig/ all and press Enter.

2. Write down the information for your system’s active network connection(most likely either Ethernet or Wi-Fi).

* Physical address in paired hexadecimal form.

* Physical address expressed in binary form.

Answer:

00000000 11111111 00000011 10111110 10001100 11011010

Explanation:

(i)First, open a command prompt window by using the shortcut: Windows key + X then select command prompt in the list.

(ii)Now type ipconfig/ all and press Enter. This will return a few information

(a) To get the Physical address in paired hexadecimal form, copy any of the Physical Addresses shown. E.g

00-FF-03-BE-8C-DA

This is the hexadecimal form of the physical address.

(b) Now let's convert the physical address into its binary form as follows;

To convert to binary from hexadecimal, we can use the following table;

Hex                 |         Decimal                |           Binary

0                      |          0                           |           0000

1                       |          1                            |           0001

2                      |          2                           |           0010

3                      |          3                           |           0011

4                      |          4                           |           0100

5                      |          5                           |           0101

6                      |          6                           |           0110

7                      |          7                           |           0111

8                      |          8                           |           1000

9                      |          9                           |           1001

A                     |          10                           |           1010

B                      |          11                           |           1011

C                      |          12                           |           1100

D                      |          13                           |           1101

E                      |          14                           |           1110

F                      |          15                           |           1111

Now, from the table;

0 = 0000

0 = 0000

F = 1111

F = 1111

0 = 0000

3 = 0011

B = 1011

E = 1110

8 = 1000

C = 1100

D = 1101

A = 1010

Put together, 00-FF-03-BE-8C-DA becomes;

00000000 11111111 00000011 10111110 10001100 11011010

PS: Please make sure there is a space between ipconfig/ and all

What's the value of this Python expression? ((10 >= 5*2) and (10 <= 5*2))

Answers

Answer:

1 (true)

Explanation:

10 == 10 is valid=> 10 >= 10 is valid => 10 >=(5*2) is valid

10 == 10 is valid=> 10 <= 10 is valid => 10 <=(5*2) is valid

=>  ((10 >= 5*2) and (10 <= 5*2)) is valid => Return 1 or True

Kiaan wants to give people who attend his presentation a printed copy of the slides. Instead of printing one slide on each piece of paper, he wants to print six slides on each piece of paper. Which setting should he select on the Print tab in Backstage view to do this?

Answers

Answer:

Under the Print Tab of the Backstage view of his presentation, Kiaan can print 6 slides on each piece of paper by selecting the "Full Page Slides" which is under settings.

Once that is done, he will be presented with an array of choices.

He is to select whether to print 6 pages/sheet vertically or horizontally under the "Handouts" section.

Thereafter, he can proceed to click on "Print".

Cheers!


Conditioning the temperature a computer lab to extend the life of the computers and
improve their performance is known as heating and cooling.
industrial
modern
environmental
process​

Answers

Answer:

environmental

Explanation:

Megan was working on an image for a presentation. She had to edit the image to get the style she wanted. Below is the original picture and her final picture. Which best describes how she edited her picture? She cropped the blue background and added contrast corrections. She removed the complex blue background and added contrast corrections. She cropped the blue background and added artistic effects. She removed the complex blue background and added artistic effects.

Answers

Answer:

She removed the complex blue background and added artistic effects.

Explanation:

This is the best answer because both aspects are correct. If Megan were to "Crop" the backgrounds the shape would have changed and she would not have been able to get the whole background without cropping some of the flowers out. Therefore it is not A or C. The pictured change is most definitely artistic effects. So D is the best option.

Answer:

She removed the complex blue background and added artistic effects.

Explanation:

on edg

hard disk drive has 16 platters, 8192 cylinders, and 256 4KB sectors per track. The storage capacity of this disk drive is at most Select one: a. 32 GB. b. 128 GB. c. 128 TB. d. 32 TB.

Answers

Answer:

B

Explanation:

Here, we want to calculate the storage capacity of the disk drive.

We proceed as follows;

Per track capacity = 4 * 256 KB = 1024 KB = 1 MB

per platter capacity = 1 MB * 8192 = 8192 MB

total capacity = 16 * 8192 MB = 131072 MB

converting total capacity to GB,

1024 MB = 1 GB

thus, 131,072 MB to GB would be;

total capacity =131072/1024 = 128GB

PARTNERING AS IT RELATES TO BPR.​

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

The term BPR stands for "business processes reengineering", It is the recreating of the core business process to improve product performance or reliability or lower costs.

It generally includes analyzing business processes, which identifying sub-par or ineffective processes but identifying ways to dispose of or change it. IT important for improving changes, especially to shift in aspects of the work, its incorporation in business operations, or competitive strength change. It might contribute to making reconfiguration improvements, and is known as a BPR enabler.

.Pretend you are ready to buy a new computer for personal use.First, take a look at ads from various magazines and newspapers and list terms you don’t quite understand. Look up these terms and give a brief written explanation. Decide what factors are important in your decision as to which computer to buy and list them. After you select the system you would like to buy, identify which terms refer to hardware and which refer to software.

Answers

Answer:

Brainly is not meant to give paragraph answers to large questions.

In a computer (desktop)

There are 8-9 main components to a PC

Motherboard

CPU

GPU (for gamers)

RAM

SSD

HDD

PSU

Cooling fans (for AMD processors stock fans are included)

Case (some fans included)

I personally build my computers (desktops) as its cheaper and I won't have to pay a build fee.

The advantage of returning a structure type from a function when compared to returning a fundamental type is that

Answers

Answer:

The function can return multiple values and the function can return an object

Explanation:

The advantage of returning a structure type from a function when compared to returning a fundamental type is that the function can return multiple values and also the function can return an object

A function in a structure can be passed to a function from any other function or from the main function itself and the definition of a structure can be seen in the function where it is found

A copy of the copyrighted work must be exactly the same as the original to infringe a copyright.
1. True
2. False

Answers

Answer:

true

Explanation:

For selection purposes, it is critical that application items have a proven relationship between a selection device and some relevant criterion. This is called

Answers

Answer:

Validity

Explanation:

Personnel Selection encompasses all the processes and methods involved in the selection of workers. The purpose of personnel selection is to determine the best candidate for the job and in so doing the recruiting organization must play by the rules laid down by the government for recruitment. Validity refers to the relationship between interviews and excellent performance at the job.

Validity implies that the method of selection must meet up to a standard criterion. This standard criterion is the expected job performance required of the potential employee. Different interview types (such as job-related, situational, and psychological) have different validity levels.  

A process can be A. single threaded B. multithreaded C. both single threaded and multithreaded D. none of the mentioned

Answers

Answer: C. both single threaded and multithreaded

Explanation:

A process can either be single threaded and multithreated. Single threaded processes is when the execution of instructions are in a single sequence i.e the sequence is one command at a time while for multithreaded processes, there are. execution of several multiple parts of a program that occurs at the same time.

A single threaded process only runs on one CPU, whereas for the execution of a multi-threaded, it may be divided amongst the available processors.

What is the name of the provision of services based around hardware virtualization?

Answers

Explanation:

Hardware virtualization refers to the creation of virtual (as opposed to concrete) versions of computers and operating systems. ... Hardware virtualization has many advantages because controlling virtual machines is much easier than controlling a physical server.

The name of the provision of services based around hardware visualization is called cloud computing

The cloud hypervisor is the software that is made use of during hardware visualization. The hypervisor does the function of managing hardware resources involving the customer and the service provider.

The work of hypervisor is that it manages the physical hardware resource which is shared between the customer and the provider.

Read more on https://brainly.com/question/13088836?referrer=searchResults

What is the difference between requirements and controls in the security process? Give examples of each.

Answers

Answer:

Security controls are those measures taken to prevent, identify, counteract, and reduce security risks to computer systems, whereas, Security Requirements are guidelines or frameworks that stipulates measures to ensure security control.

Explanation:

Security controls encompass all the proactive measures taken to prevent a breach of the computer system by attackers. Security requirements are those security principles that need to be attained by a system before it can be certified as safe to use.

Security controls are of three types namely, management, operational, and technical controls. Examples of technical controls are firewalls and user authentication systems. A statement like 'The system shall apply load balancing', is a security requirement with an emphasis on availability.

C++ PROGRAM THAT DOES THE FOLLOWING:
Problem You Need to Solve for This Lab:
You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should save the data back to the same data file when the program exits.
What Your Program Should Do:
Write an interactive text based menu interface (using a loop) that will allow the user to
 Enter information for a new song
 Display information for all the songs in the database with index for each song
 Remove a song by index
 Search for songs by a certain artist
 Search for songs by a certain album
 Quit

Answers

Answer:

I have updated answer in google

Explanation:

please chek it. I hope it will nice

Other Questions
Which ion with a charge of -2 has an electron configuration of 1s22s22p6 ?Use the periodic table.A. N3- B. O2-C. OD. N How do Teens feel loneliness on Social media? (7-10 Sentences) A couple visits Orlando and has dinner at the A Land Remembered restaurant at Rosen Shingle Creek Resort. They spend $100 and leave a nice 20% tip for the waitperson. The waitperson gets the tip added to his/her weekly wage, which s/he uses to pay his/her rent, food, and transportation expenses. The restaurant owner uses part of the $100 to purchase supplies; pay utilities, insurance, and taxes; and covers part of his/her payroll. The food vendor pays his/her suppliers and employees, and on and on this goes. What is this process called Two brothers, Pedro and John, have a straight log in their backyard. Pedro wants the log cut into 24 equal parts, so he paints red lines on the log and asks a lumberjack to cut the log on the painted lines. John wants the log cut too, but into 18 equal parts. So before the lumberjack arrives, he paints yellow lines on the log, with some yellow lines painted over red lines. The lumberjack arrives and cuts the log on the painted lines of any color. How many cuts did the lumberjack make? Determine whether the sequence converges or diverges. If it converges, find the limit. an = 9 + 14n2 n + 15n2 Step 1 To find lim n [infinity] 9 + 14n2 n + 15n2 , divide the numerator and denominator by the highest power of n that occurs in the fraction. This is n . The net torque acting on an object is zero. What can you say about the angular momentum (about the same axis) of the object? What is the simplified form of? Graph each of the following lines without using a table of values. a. y = 23x - 5 b. 6x - 2y + 5 = 0 I think you can help me Brett Thiesen wants to make a political case for regional economic integration to his electorate. Which valid statement can he make in his regard?A) Those seeking a united europe have always had a desire to make another way in europe imminentB) Linking neighboring economies increases the potential for violent conflictC) making neighboring economies increasingly dependent on each other fails to create incentives for political cooperationD) Countries can enhance their political weight in the world by grouping their economiesE) free trade stimulates economic growth, which creates dynamic gains from trade Matt wants to plot a garden. He was 48 meters to work with. He wants the length of the garden to be 3 times the width of the garden because he has many types of vegetables to grow. What is the width of the garden. Bendel Inc. has an operating leverage of 4.3. If the company's sales increase by 15%, its net operating income should increase by about: On the occasion of Father's Day, your housing colony has planned to organize a function to honour all fathers of the colony. As the chairman of the housing colony, write a notice inviting all the members to this function. Provide all the necessary details. Your notice should not exceed 50 words. PLEASE HELP ME I DO NOT HAVE TIME AND NEED TO PASS Solve this equation with a variable term on both sides. 5.1y = 0.3y 21.6 What is the solution? y = what shows these from least to greatest 1/10, 0.9, 3/10 According to Suzuki, people in northern countries do not share because Determine the intercepts of the line. The proton,neutron and electrons in the atom of the element represented by the symbol 231Y89 are:A. 89,231 and 89B. 142, 89 and 142C. 89, 142 and 89D. 89, 320 and 320 Total energy of a particle executing S.H.M of amplitude A is proportional to:(a)A?(b) A-2(c) A(d) A-