Answer The answer is
So hope this was helpful
Explanation:
what is polymerization1
Answer:
Polymerization, any process in which relatively small molecules, called monomers, combine chemically to produce a very large chainlike or network molecule, called a polymer. The monomer molecules may be all alike, or they may represent two, three, or more different compounds.please give me brainliest~❤︎ت︎Which best describes the condition under which the Unicode output is the same as plain text?
when the text contains no punctuation
when the text contains only characters that are part of Unicode
when the text contains only characters that are part of ASCII
when the text contains no numbers
Answer:
the answer is c
Explanation:
when the text contains only characters that are part of ASCII- on edge
HAGS
Answer:
when the text contains only characters that are part of ASCII
Explanation:
What is the benefit of using WYSIWYG editor
A WYSIWYG editor is a program with a rich text editing interface that allows your users to see what the end result will look like (more or less) while they're typing. Without one, users would have to edit raw HTML, which can get in the way of the writing process, to say the least.
Hope it helps! :)
Write the recursive method printNumber. The public static method named printNumber takes two parameters. The first parameter is an integer array called nums, and the second is parameter is an even int called index. The return value is an integer that is the product of the even index values in nums whose index is less than or equal to index. Assume that the array nums has length >
Answer:
The function is as follows:
public static void printNumber(int nums[],int index){
if (index < 0) {
System.out.print(nums[0]);
return; }
if (index % 2 == 0){
if(index!=0){
nums[index-2]*=nums[index];} }
printNumber(nums, index - 1);
}
Explanation:
To do this, we need to save the required product in the 0 index element of the array.
This defines the function
public static void printNumber(int nums[],int index){
If the index variable < 0,
if (index < 0) {
Print the 0 index as the product [i.e. the calculated product]
System.out.print(nums[0]);
This ends the recursion
return; }
If the current array index is even
if (index % 2 == 0){
Check if index is not 0
if(index!=0){
If both conditions are valid, calculate the product and save the result in index - 2 element. The final result is then saved in the 0 index
nums[index-2]*=nums[index];} }
Call the function while the base case has not been executed
printNumber(nums, index - 1);
}
Write a recursive function that has an argument that is an array of characters and two arguments that are bounds on array indexes. The function should reverse the order of those entries in the array whose indexes are between the two bounds. For example, if the array is a[0]
Answer:
The function is as follows:
void revArray(char arr[], unsigned int low, unsigned int high) {
if (low >= high){
return; }
swap(arr[low], arr[high]);
revArray(arr, low + 1, high - 1); }
Explanation:
This declares the function. It receives a char array and the lower and upper bounds to be reversed
void revArray(char arr[], unsigned int low, unsigned int high) {
This is the base case of the recursion (lower bound greater than or equal to the upper bound).
if (low >= high){
return; }
This swaps alternate array elements
swap(arr[low], arr[high]);
This calls the function for another swap operation
revArray(arr, low + 1, high - 1); }
All of the following can cause a fatal execution-time error except: Group of answer choices Dereferencing a pointer that has not been initialized properly Dereferencing a null pointer Dereferencing a pointer that has not been assigned to point to a specific address Dereferencing a variable that is not a pointer
Answer: Dereferencing a variable that is not a pointer
Explanation:
The execution time also refered to as the CPU time pertaining to a given task is the time that is used by the system to execute a task.
Some of the reasons for a fatal execution-time error include:
• Dereferencing a pointer that has not been initialized properly
• Dereferencing a null pointer
• Dereferencing a pointer that has not been assigned to point to a specific address.
It should be noted that dereferencing a variable that is not a pointer doesn't cause a fatal execution-time error.
g Consider a disk queue with requests for I/O to blocks on cylinders 95, 120, 41, 122, 15, 142, 65, 167. The Shortest Seek Time First (SSTF) scheduling algorithm is used. The head is initially at cylinder number 100. The cylinders are numbered from 0 (center of disk) to 199 (edge of disk). a) List the requests in the order in which they will be serviced. b) What is the total head movement (in number of cylinders) incurred while servicing these requests
Answer:
follows are the solution to the given question:
Explanation:
Please find the image file for the SSTF scheduling algorithm.
Following are the requested order:
[tex]Request \ \ order :\\\\95\\120\\122\\142\\167\\65\\ 41\\15[/tex]
Calculating the Total Head Movement:
[tex]= (100-95) + (120-95) + (122-120) + (142-122) + (167-142) + (167-65) + (65-41) + (41-15)\\\\= 5 + 25 + 2 + 20 + 25 + 102 + 24 + 26\\\\= 229[/tex]
Write a program to find the sum and product of all elements of an array of size 10. Take input from user.
Answer:
mark me brainleist
Explanation:
#include<iostream>
using namespace std;
int main ()
{
int arr[10], n, i, sum = 0, pro = 1;
cout << "Enter the size of the array : ";
cin >> n;
cout << "\nEnter the elements of the array : ";
for (i = 0; i < n; i++)
cin >> arr[i];
for (i = 0; i < n; i++)
{
sum += arr[i];
pro *= arr[i];
}
cout << "\nSum of array elements : " << sum;
cout << "\nProduct of array elements : " << pro;
return 0;
}
what is a web browser
Answer:
web browser
Explanation:
.........;)
Because travel distance, cost of living, and other factors vary among the three regions, the annual cost of having a salesperson is $5000 in the east, $11000 in the Midwest, and $7000 in the west. The company has 700000 budgeted for expenses. To ensure nationwide exposure for its product, the company has decided that each region must have at least 10 salespeople. The company wants to know how many salespeople to allocate to each region to maximize the total number of products sold. What type of integer programming model it is
Answer:
Pure integer programming model
Explanation:
To know the type of integer model, we simply check the expected variable and/or value of the model.
From the question, we understand that the end result is to determine the number of salespeople that will be allocated to the east, midwest and west region.
The number of salespeople is discrete i.e. it is an integer (whole number). Since the result is purely integer, the type of model is Pure integer programming model
Which of the following statements is correct?
Select one:
a. A failure in Network layer crashes the application
b. A failure in Network layer affects transport layer
c. A failure in Network layer affects Data Link layer
d. A failure in Network layer affects entire communication
e. A failure in Network layer stops the device from working entirely
The statement which is correct from the given answer choices is:
C. A failure in Network layer affects Data Link layerAccording to the given question, we are asked to show which of the statement about the network layer is most represented accurately.
As a result of this, we can see that a network layer is a part of the OSI model which is in charge of receiving and forwarding service requests from the sender to the receiving host in a network.
With this in mind, if the network layer fails, then there would also be a failure in the data link layer.
Therefore, the correct answer is option C
Read more here:
https://brainly.com/question/21298343
In BSD socket API,which call is used for transmitting data in the connectionless mode?
Answer:
UDP is the answer
Explanation:
UDP enables best-effort connectionless transfer to individual block of information, while TCP enables reliable transfer of a stream of bytes. That's two modes of services available through the circuit interface, connection-oriented and connection-less.
What will be the output of the following JavaScript code? functioncomparison() { int number=10; if(number= = ="10") return true; else return false; } Single choice. (0.5 Points) True false runtime error compilation error
Answer:
(b) false
Explanation:
Given
The above code
Required
The expected output
First, variable number is declared as integer and then initialized with 10
Next, the === compares the integer 10 with string "10"
10 and "10" are different type and === will return true if the compared values and/or variables are of the same type.
Since 10 and "10" are different, the expected output is false
The output of the following JavaScript code is false.
Let's write the code appropriately,
functioncomparison() {
int number = 10;
if (number= = ="10")
return true;
else
return false;
}
A function functioncomparison() is declared.
Then the integer number is assigned as 10.
The conditional "if" says if the string 10 is equals to the integer number 10.
The triple equals signs(===)check for the type and the actual value.
The string "10" and integer 10 are not the same type. "10" is a string and 10 is an integer.
Therefore, the output of the code will be false.
learn more about JavaScript conditional here: https://brainly.com/question/17115445?referrer=searchResults
A network-based attack where one attacking machine overwhelms a target with traffic is a(n) _______ attack.
HELLO!
Answer:
''Denial of Service'' also known as ''DoS''Explanation:
It's ''Denial of service'' this is because it means an attack that mean to be shutting down a machine or network. So, ''Denial of Service'' best fits in this sentence.
Question #4
Math Formula
What will you see on the next line?
>>>int(3.9)
Answer:
3
Explanation:
The correct answer is 3. The int() function truncates the decimal part.
-Edge 2022
In which situation is coauthoring of presentations primarily utilized?
A) A reviewer must be able to make changes to a presentation after an author creates it.
B) Multiple authors must be able to simultaneously make changes to a presentation.
C) Multiple reviewers have to be able to view one another's changes after they are made.
D) One author and one reviewer work on a presentation at different times.
Answer:
C) Multiple reviewers have to be able to view one another's changes after they are made.
Explanation:
Ilang takudtod ba isang saknong
Answer:
?
Explanation:
How have technology and social media changed reading?
O A. Physical books can only be read on the web.
B. Now reading is a conversation of give and take.
O C. People no longer have to read anything at all.
D. Reading often takes much longer to undergo.
Answer:
B?
Explanation:
I'm super sorry if I get this wrong for you but after thinking so much I probably think it would be B
Answer:
the guy above is right it is B
Explanation:
because 2+2=4
To launch the mail merge help dialog box, what option should you select using the Microsoft word office assistant?
Answer:
Complete setup.
Explanation:
Microsoft Word refers to a word processing software application or program developed by Microsoft Inc. to enable its users type, format and save text-based documents.
A Mail Merge is a Microsoft Word feature that avails end users the ability to import data from other Microsoft applications such as Microsoft Access and Excel. Thus, an end user can use Mail Merge to create multiple documents (personalized letters and e-mails) for each entry in the list at once and send to all individuals in a database query or table.
Hence, Mail Merge is a Microsoft Word feature that avails users the ability to insert fields from a Microsoft Access database into multiple copies of a Word document.
Some of the options available in the Write & Insert Fields group of Mail Merge are;
I. Highlight Merge Fields.
II. Address Block.
III. Greeting Line.
Generally, when a user wants to launch the Mail Merge help dialog box, the option he or she should select using the Microsoft word office assistant is complete setup.
Additionally, the sequential steps of what occurs during the mail merge process are;
1. You should create the main document
2. Next, you connect to a data source
3. You should highlight or specify which records to include in the mail.
4. You should insert merge fields.
5. Lastly, preview, print, or email the document.
list and describe each of the activities of technology
Answer:
network has led to exposure of dirty things to young ones.
air transport has led to losing of lives
PLEASE I NEED HELP, WILL MARK BRAINLYEST!!! 50 POINTS!!!
Select the correct answer.
Production teams share a script between them, and the script is a collaborative effort. Which action is important to keep its character intact?
A.
develop the structure of the screenplay
B.
mention the details of the genres and the subgenres
C.
develop the hook
D.
create a sales pitch
Answer: Develop the structure of the screenplay
Explanation:
The screenplay helps the team find the character of the film and develop it.
Answer: B.
mention the details of the genres and the subgenres
Explanation:
Right on test
Linda wants to change the color of the SmartArt that she has used in her spreadsheet. To do so, she clicks on the shape in the SmartArt graphic. She then clicks on the arrow next to Shape Fill under Drawing Tools, on the Format tab, in the Shape Styles group. Linda then selects an option from the menu that appears, and under the Colors Dialog box and Standard, she chooses the color she wants the SmartArt to be and clicks OK. What can the option that she selected from the menu under Shape Fill be
Answer: Theme colors
Explanation:
Based on the directions, Linda most probably went to the "Theme colors" option as shown in the attachment below. Theme colors enables one to change the color of their smart shape.
It is located in the "Format tab" which is under "Drawing tools" in the more recent Excel versions. Under the format tab it is located in the Shape Styles group as shown below.
g 4-6 you've been given the network 200.5.0.0 /24 and need to subnet it using vlsm as follows: bldg 1 30 hosts bldg 2 10 hosts bldg 3 10 hosts bldg 4 4 hosts what will be the network address for bldg 3
Answer:
The answer is "200.5.0.0 32/28".
Explanation:
The requirement of the Bldg is =30.
The number of the host bits which is needed = 5
Therefore the subnet mask will be =/27
for bldg 3 netmask could be= /28
and when the /28 after that the last octet will be= 00100000.
00100000 converting value into a decimal value that is = 32.
therefore the correct value is 200.5.0.32 /28.
tell me the most scariest website you know and i'll give you brainlest
Answer:
it's not a website but on insta there's an account that freezes people's phone when you click on their story.
Explanation:
hello! can someone write a c++ program for this problem
Problema 2018.3.2 - Cheated dice
Costica is on vacation and his parents sent him to the country. There he gets terribly bored and looking through his grandfather's closet, he came across a bag full of dice. Having no one to play dice with, but it seemed to him that some of the dice were heavier than the others, Costica chose a dice and started to test it by throwing it with him and noting how many times each face fell. He then tries to figure out whether the dice are rolled or not, considering that the difference between the maximum number of appearances of one face and the minimum number of occurrences (of any other face) should not exceed 10% of the total number of throws.
Requirement
Given a number N of dice rolls and then N natural numbers in the range [1: 6] representing the numbers obtained on the rolls, determine whether the dice is tricked according to the above condition.
Input data
From the input (stdin stream) on the first line reads the natural number N, representing the number of rolls. On the following N lines there is a natural number in the range [1: 6] representing the numbers obtained on throws.
Output data
At the output (stdout stream) a single number will be displayed, 0 or 1, 0 if the dice are normal, and 1 if it is cheated.
ATTENTION to the requirement of the problem: the results must be displayed EXACTLY in the way indicated! In other words, nothing will be displayed on the standard output stream in addition to the problem requirement; as a result of the automatic evaluation, any additional character displayed, or a display different from the one indicated, will lead to an erroneous result and therefore to the qualification "Rejected".
Restrictions and clarifications
1. 10 ≤ N ≤ 100
2. Caution: Depending on the programming language chosen, the file containing the code must have one of the extensions .c, .cpp, .java, or .m. The web editor will not automatically add these extensions and their absence makes it impossible to compile the program!
3. Attention: The source file must be named by the candidate as: . where name is the last name of the candidate and the extension (ext) is the one chosen according to the previous point. Beware of Java language restrictions on class name and file name!
Input data
10
6
6
6
6
6
6
6
6
6
6
Output data
1
Roll the dice 10 times, all 10 rolls produce the number 6. Because the difference between the maximum number of rolls (10) and the minimum number of rolls (0) is strictly greater than 10% of the total number of rolls (10% of 10 is 1), we conclude that the dice are oiled.
Input data
10
1
4
2
5
4
6
2
1
3
3
Output data
0
Throw the dice 10 times and get: 1 twice, 2 twice, 3 twice, 4 twice, 5 and 6 at a time. Because the difference between the maximum number of appearances (two) and the minimum number of occurrences (one) is less than or equal to 10% of the total number of throws (10% of 10 is 1), we conclude that the dice are not deceived.
Answer:
f0ll0w me on insta gram Id:Anshi threddy_06 (no gap between I and t)
What will the declaration below do to its target?
animation-direction: reverse;
The animation steps will play backward.
The animation steps will play forward, then backward.
The animation steps will play forward.
The animation steps will play backward, then forward.
Write a recursive method called printNumPattern() to output the following number pattern.Given a positive integer as input (Ex: 12), subtract another positive integer (Ex: 3) continuallyuntil 0 or a negative value is reached, and then continually add the second integer until therst integer is again reached. For this lab, do not end output with a newline.
Answer:
Explanation:
The following is written in Java and prints out the pattern to and from the first num parameter that is passed to the function. Meaning it goes from num1 to 0 and then from 0 to num1 again. It prints all of the values in a single line seperated by a space and a test case was used using the values provided in the question. The output can be seen in the attached picture below.
static void printNumPattern(int n1,int n2){
System.out.print(n1 + " ");
if(n1<=0) {
return;
} else {
printNumPattern(n1-n2,n2);
}
System.out.print(n1 + " ");
}
What does the top-level domain in a URL indicate?
A. the organization or company that owns the website
B. the organization or company that operates the website
C. the protocol used to access the website D. the type of website the URL points to
Answer:
b i think
Explanation:
A top-level domain (TLD) is the last segment of the domain name. The TLD is the letters immediately following the final dot in an Internet address. A TLD identifies something about the website associated with it, such as its purpose, the organization that owns it or the geographical area where it originates.
Answer:
The answer is D. The type of website the URL points to.
Explanation:
I got it right on the Edmentum test.
Implement a class Rectangle. Provide a constructor to construct a rectangle with a given width and height, member functions get_perimeter and get_area that compute the perimeter and area, and a member function void resize(double factor) that resizes the rectangle by multiplying the width and height by the given factor. (Page EX9-3).
//class declaration
public class Rectangle{
//declare the instance variables - width and height
double width;
double height;
//the constructor
public Rectangle(double width, double height){
//initialize the width of the rectangle
this.width = width;
//initialize the height of the rectangle
this.height = height;
}
//method get_perimeter to compute the perimeter of the rectangle
public double get_perimeter(){
//compute the perimeter
//by using the formula 2(width + height)
double perimeter = 2*(this.width + this.height);
//return the perimeter
return perimeter;
}
//method get_area to compute the area of the rectangle
public double get_area(){
//compute the area
//by multiplying the width and height of the rectangle
double area = this.width * this.height;
//return the area
return area;
}
//method resize to resize the rectangle
public void resize(double factor){
//resize the width of the rectangle
//by multiplying the width by the factor
this.width = this.width * factor;
//resize the height of the rectangle
//by multiplying the height by the factor
this.height = this.height * factor;
}
} //end of class declaration
Explanation:The code above has been written in Java. In contains comments explaining every part of the program.
Select the correct answer.
What is the advantage of using transparencies?
O A. They support better image quality than online presentations.
O B. They are helpful when creating non-linear presentations.
OC. They allow the presenter to jot down points on the slide.
OD. They are better suited to creating handouts.
Reset
Next
Answer:
They are better suited to creating handouts