Answer:
D all of the above
Explanation:
because a computer performs all the above_mentioned tasks
All of the above options are correct statement. Check more about program below.
What is program?A program is regarded as some set of compositions of instructions or codes that a computer needs to follows so as to carry out a specific work.
Conclusively, the correct statement are:
A set of instructions is called program,Computers can be used for diagnosing the difficulty of a student in learning a subject. Psychological testing can be done with the help of computer provided software is available.Learn more about program from
https://brainly.com/question/1538272
steps on how to install a mouse
Answer:
Verify that the mouse you're thinking of purchasing is compatible with your laptop model. ...
Plug the mouse's USB cable into the matching port on the side of your laptop.
Restart your computer while the mouse is connected. ...
Move your mouse a few times to confirm that the cursor responds.
1. P=O START: PRINT PP = P + 5 IFP
<=20 THEN GOTO START: * what is output
Answer:
0
5
10
15
20
Explanation:
P=O should be P=0, but even with this error this is the output.
When P reaches 20 it will execute the loop once more, so 20 gets printed, before getting increased to 25, which will not be printed because then the loop ends.
Under which command group will you find the options to configure Outlook rules?
O Move
O New
O Quick Steps
O Respond
Answer:
Move
Explanation:
I hope that helps :)
Answer:
a). move
Explanation:
edge 2021 <3
Which of the following parameters is optional sample(a,b,c,d=7
The optional Parameter is D as it is said to be assigned an integer value of 7.
What are optional parameters?This is known to be a process that is made up of optional choices that one do not need to push or force so as to pass arguments at their set time.
Note that The optional Parameter is D as it is said to be assigned an integer value of: 7 because it implies that one can use the call method without pushing the arguments.
Learn more about Parameter from
https://brainly.com/question/13151723
#SPJ2
Part 1 of 4 parts for this set of problems: Given an 4777 byte IP datagram (including IP header and IP data, no options) which is carrying a single TCP segment (which contains no options) and network with a Maximum Transfer Unit of 1333 bytes. How many IP datagrams result, how big are each of them, how much application data is in each one of them, what is the offset value in each. For the first of four datagrams: Segment
Answer:
Fragment 1: size (1332), offset value (0), flag (1)
Fragment 2: size (1332), offset value (164), flag (1)
Fragment 3: size (1332), offset value (328), flag (1)
Fragment 4: size (781), offset value (492), flag (1)
Explanation:
The maximum = 1333 B
the datagram contains a header of 20 bytes and a payload of 8 bits( that is 1 byte)
The data allowed = 1333 - 20 - 1 = 1312 B
The segment also has a header of 20 bytes
the data size = 4777 -20 = 4757 B
Therefore, the total datagram = 4757 / 1312 = 4
)Assume passwords are limited to the use of the 95 printable ASCII characters and that all passwords are 10 characters in length. Assume a password cracker with an encryption rate of 6.4 million encryptions per second. How long will it take to test exhaustively all possible passwords on a UNIX system
Answer:
296653 years
Explanation:
The length of password = 10
To get possible password:
95 printable password raised to power 10
= 95¹⁰
Then we calculate time it would take to break password
95¹⁰/6.4million
95¹⁰/6400000
= 9355264675599.67 seconds
From here we get minutes it would take. 60 secs = 1 min
= 9355264675599.67/60
= 155921077927 minutes
From here we get number of hours it would take 1 hr = 60 mins
155921077927/60
= 2598684632 hours
From here we calculate number of days it would take. 24 hrs = 1 day
2598684632/24
= 108278526 days
From here we calculate number of years it would take. 365 days = 1 ye
= 108278526/365
= 296653 years
It would take this number of years to test all possible passwords
You received an email message stating that your mother's bank account is going to be forfeited if you do not respond to the email. Is it safe to reply?Why?
It's a scenario<3
Answer:
No.
Explanation:
I'm almost certain it's a scam. Banks generally don't use emails to contact clients. They use telephones and paper correspondence. If they contact you by email it is because they have no other way of getting in touch with you because you have changed your address and your phone, etc..
Write a program that will input temperatures for consecutive days. The program will store these values into an array and call a function that will return the average of the temperatures. It will also call a function that will return the highest temperature and a function that will return the lowest temperature. The user will input the number of temperatures to be read. There will be no more than 50 temperatures. Use typedef to declare the array type. The average should be displayed to two decimal places
Answer:
#include <iostream>
using namespace std;
typedef double* temperatures;
double avg(array t, int length);
double min(array t, int length);
double max(array t, int length);
int main()
{
cout << "Please input the number of temperatures to be read." << endl;
int num;
cin >> num;
temperatures = new double[num];
for(int i = 0; i < num; i++)
{
cout << "Input temperature " << (i+1) << ":" << endl;
cin >> temperatures[i];
}
cout << "The average temperature is " << avg(temperatures, num) << endl;
cout << "The highest temperature is " << max(temperatures, num) << endl;
cout << "The lowest temperature is " << min(temperatures, num) << endl;
}
double avg(array t, int length)
{
double sum = 0.0;
for(int i = 0; i < length; i++)
sum += t[i];
return sum/length;
}
double min(array t, int length)
{
if(length == 0)
return 0;
double min = t[0];
for(int i = 1; i < length; i++)
if(t[i] < min)
min = t[i];
return min;
}
double max(array t, int length)
{
if(length == 0)
return 0;
double max = t[0];
for(int i = 1; i < length; i++)
if(t[i] > min)
max = t[i];
return max;
}
Explanation:
The C++ program get the array of temperatures not more than 50 items and displays the mean, minimum and maximum values of the temperature array.
importance of information
literay to the society
Explanation:
Information literacy is important for today's learners, it promotes problem solving approaches and thinking skills – asking questions and seeking answers, finding information, forming opinions, evaluateing sources, and making decisions fostering successful learners, effective contributors, and confident individuals.A (n) ___ system can help a business alleviate the need for multiple information systems.
Answer:
Enterprise Resource Planning
Explanation:
ERP
Let's consider a long, quiet country road with houses scattered very sparsely along it. (We can picture the road as a long line segment, with an eastern endpoint and a western endpoint.) Further, let's suppose that despite the bucolic setting, the residents of all these houses are avid cell phone users. You want to place cell phone base stations at certain points along the road, so that every house is within four miles of one of the base stations. Give an efficient algorithm that achieves this goal, using as few base stations as possible.
Answer:
Follows are the solution to these question:
Explanation:
A simple gullible algorithm is present. Let h mark the house to the left. Then we put a base station about 4 kilometers to the right. Now delete and repeat all the houses protected by this base station. In this algorithm, they can simply be seen to position baselines at b1, . . , bk as well as other algorithms (which may be an optimum algorithm) at [tex]b'_{1}, \ . . . . . . ,b'_{k'}[/tex] and so on. (from left to right) [tex]b_1 \geq b'_{1},\ \ b_2 \geq b'_{2}[/tex] That's why [tex]k \leq k'[/tex].
Objective
Make a function that solves the quadratic equation, outputting both values of X. You do not have to worry about imaginary numbers. That is, I will only use input that creates a real output (such as the example screenshots).
NOTE: A function that uses the C version of pass by reference is required to get full credit on this assignment. The C++ form of pass by reference will receive no credit.
Details
STEP 1
#include at the top of your file so that you can use the sqrt function. The sqrt function calculates the square root. For example:
int x = sqrt(9.0)
Will leave x with the value 3, which is the square root of 9.
STEP 2
Define a function THAT USES PASS BY REFERENCE to take in three double inputs and provides two double outputs. In the equations below I use a, b, and c as the double input names and x1 and x2 as the output names.
Inside this function solve the quadratic equation for both possible values of x:
X 1 = − b + b 2 − 4 a c 2 a
That is, X1 is equal to -b + sqrt(b * b - 4 * a * c) then divide all of that by 2 * a.
X 2 = − b − b 2 − 4 a c 2 a
That is, X2 is equal to -b - sqrt(b * b - 4 * a * c) then divide all of that by 2 * a.
Note the difference. One adds sqrt(b * b - 4 * a * c) and the other subtracts it.
This can be done in several lines of code if you want or you can attempt to perform the entire calculation in one line of code.
STEP 3
In the main function read in 3 inputs from the user. Pass these inputs to the quadratic equation function along with the pass by reference variables for the output. Print the results to the screen.
Advice
Your quadratic equation function does NOT need to account for imaginary numbers. Stick with the example inputs to test your code.
If you get NAN that means your equation has an imaginary solution. Do not worry about it. Try different inputs.
The calculation itself is a minor portion of this grade. The majority of the grade comes from implementing pass by reference so make sure you have that part correct.
b2 is simple enough that you do not need to call the pow() function to calculate the power. Instead multiply b * b.
You may want to calculate the numerator into one variable and the denominator into another. You don't have to solve the entire equation on one line (though that is possible).
Since you are using pass by reference you can make the QuadraticEquation function into a void function. It does not need to return anything since it is returning calculations via pointers.
Use scanf on one variable at a time. Don't forget to use double data types and %lf with scanf.
Answer:
In C
#include <stdio.h>
#include<math.h>
void myfunc(double *a, double *b, double *c) {
double x1, x2;
x1 = (-(*b) + sqrt((*b)*(*b)- 4*(*a)*(*c)))/(2*(*a));
x2 = (-(*b) - sqrt((*b)*(*b) - 4*(*a)*(*c)))/(2*(*a));
printf("x1 = %f\n",x1);
printf("x2 = %f\n",x2);}
int main () {
double a,b,c;
printf("a: "); scanf("%lf", &a);
printf("b: "); scanf("%lf", &b);
printf("c: "); scanf("%lf", &c);
myfunc(&a, &b, &c);
return 0;}
Explanation:
#include <stdio.h>
#include<math.h> --- This represents step 1
Step 2 begins here
This gets the values of a, b and c from main by reference
void myfunc(double *a, double *b, double *c) {
This declares x1 and x2
double x1, x2;
Calculate x1
x1 = (-(*b) + sqrt((*b)*(*b)- 4*(*a)*(*c)))/(2*(*a));
Calculate x2
x2 = (-(*b) - sqrt((*b)*(*b) - 4*(*a)*(*c)))/(2*(*a));
Print x1
printf("x1 = %f\n",x1);
Print x2
printf("x2 = %f\n",x2);}
Step 3 begins here
int main () {
Declare a, b and c as double
double a,b,c;
Get input for a, b and c
printf("a: "); scanf("%lf", &a);
printf("b: "); scanf("%lf", &b);
printf("c: "); scanf("%lf", &c);
Call the function to calculate and print x1 and x2
myfunc(&a, &b, &c);
return 0;}
Write a recursive method called lengthOfLongestSubsequence(a, b) that calculates the length of the longest common subsequence (lcs) of two strings. For example, given the two strings aaacommonbbb and xxxcommonzzz the lcs is common which is 6 characters long so your function would return 6. The length of the lcs of two strings a
Answer:
Explanation:
The following code is written in Java and creates the recursive function to find the longest common substring as requested.
static int lengthOfLongestSubsequence(String X, String Y) {
int m = X.length();
int n = Y.length();
if (m == 0 || n == 0) {
return 0;
}
if (X.charAt(m - 1) == Y.charAt(n - 1)) {
return 1 + lengthOfLongestSubsequence(X, Y);
} else {
return Math.max(lengthOfLongestSubsequence(X, Y),
lengthOfLongestSubsequence(X, Y));
}
}
Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as well as the company? Why
Answer:
i will help you waiting
Explanation:
Yes dealing with big data demands high ethical regulations, accountability and responsibility.
The answer is Yes because while dealing with big data, ethical regulations, accountability and responsibility must be strictly followed. Some of the principles that have to be followed are:
Confidentiality: The information contained in the data must be treated as highly confidential. Information must not be let out to a third party.Responsibility: The people responsible for handling the data must be good in analyzing big data. They should also have the required skills that are needed.Accountability: The service that is being provided has to be very good. This is due to the need to keep a positive work relationship.In conclusion, ethical guidelines and moral guidelines have to be followed while dealing with big data.
Read more at https://brainly.com/question/24284924?referrer=searchResults
what is difference between computer and smartphone
Answer: One is smaller than the other.
What values are stored in nums after the following code segment has been executed?
int[] nums = {50, 100, 150, 200, 250};
for (int n : nums)
{
n = n / nums[0];
}
[1, 2, 3, 4, 5]
[1, 1, 1, 1, 1]
[1, 100, 150, 200, 250]
[50, 100, 150, 200, 250]
An ArithmeticException is thrown.
Answer:
D.[50, 100, 150, 200, 250]
Explanation:
This is a trick question because the integer n is only a counter and does not affect the array nums. To change the actual array it would have to say...nums[n] = n/nums[0];
Which cable standard is a standard for newer digital cable, satellite, and cable modem connections?
Answer:
Coaxial cable
Explanation:
what is secondary memory?
Answer:
Secondary memory refers to storage devices, such as hard drives and solid state drives. It may also refer to removable storage media, such as USB flash drives, CDs, and DVDs. ... Additionally, secondary memory is non-volatile, meaning it retains its data with or without electrical power.
Write out code for a nested if statement that allows a user to enter in a product name, store the product into a variable called product_name and checks to see if that product exists in your nested if statement. You must include 5 product names to search for. If it is then assign the price of the item to a variable called amount and then print the product name and the cost of the product to the console. If it does not find any of the items in the nested if statement, then print that item cannot be found.
Answer:
product_name = input("Enter product name : ")
if product_name=="pen"or"book"or"box"or"pencil"or"eraser":
if product_name == "pen":
amount = 10
print(f"Product Name: {product_name}\nCost: {amount} rupees")
if product_name == "book":
amount = 100
print(f"Product Name: {product_name}\nCost: {amount} rupees")
if product_name == "box":
amount = 150
print(f"Product Name: {product_name}\nCost: {amount} rupees")
if product_name == "pencil":
amount = 5
print(f"Product Name: {product_name}\nCost: {amount} rupees")
if product_name == "eraser":
amount = 8
print(f"Product Name: {product_name}\nCost: {amount} rupees")
else:
print("Item not found!")
Explanation:
The python program is a code of nested if-statements that compares the input string to five items of the first if-statement. For every item found, its code block is executed.
helpppp me please..
........
Answer:
The employer's monthly salary (X)
Scenario
Your task is to prepare a simple code able to evaluate the end time of a period of time, given as a number of minutes (it could be arbitrarily large). The start time is given as a pair of hours (0..23) and minutes (0..59). The result has to be printed to the console.
For example, if an event starts at 12:17 and lasts 59 minutes, it will end at 13:16.
Don't worry about any imperfections in your code - it's okay if it accepts an invalid time - the most important thing is that the code produce valid results for valid input data.
Test your code carefully. Hint: using the % operator may be the key to success.
Test Data
Sample input:
12
17
59
Expected output: 13:16
Sample input:
23
58
642
Expected output: 10:40
Sample input:
0
1
2939
Expected output: 1:0
Answer:
In Python:
hh = int(input("Start Hour: "))
mm = int(input("Start Minute: "))
add_min = int(input("Additional Minute: "))
endhh = hh + (add_min // 60)
endmm = mm + (add_min % 60)
endhh += endmm // 60
endmm = endmm % 60
endhh = endhh % 24
print('{}:{}'.format(endhh, endmm))
Explanation:
This prompts the user for start hour
hh = int(input("Start Hour: "))
This prompts the user for start minute
mm = int(input("Start Minute: "))
This prompts the user for additional minute
add_min = int(input("Additional Minute: "))
The following sequence of instruction calculates the end time and end minute
endhh = hh + (add_min // 60)
endmm = mm + (add_min % 60)
endhh += endmm // 60
endmm = endmm % 60
endhh = endhh % 24
This prints the expected output
print('{}:{}'.format(endhh, endmm))
________ can be written only once. The data cannot be erased or written over once it is saved.
Answer:
WORM (Write Once, Read Many)
Explanation:
The full meaning which means Write Once, Read Many implies that data can only be entered (or better put, written) once. Once the data has been written, the data can not be updated or deleted. However, the data being stored on WORM can be read as many times, as possible.
Hence, WORM answers the question.
What may make it easy for cybercriminals to commit cybercrimes? Select 2 options.
Cybercrimes are not classified as real crimes, only as virtual crimes.
They operate from countries that do not have strict laws against cybercrime.
They are not physically present when the crime is committed.
The United States has no law enforcement that acts against them.
Law enforcement agencies lack the expertise to investigate them.
Answer: They operate from countries that do not have strict laws against cybercrime.
They are not physically present when the crime is committed.
Explanation:
edg
Answer:
They operate from countries that do not have strict laws against cybercrime.
They are not physically present when the crime is committed.
Explanation:
what does command do
Consider the following static method, calculate.
public static int calculate(int x)
{
x = x + x;
x = x + x;
x = x + x;
return x;
}
Which of the following can be used to replace the body of calculate so that the modified version of calculate will return the same result as the original version for all values of x?
return 8 * x;
return 3 + x;
return 3 * x;
return 6 * x;
return 4 * x;
Answer:
return 8 * x;
Explanation:
Required
What can replace the three lines of x = x + x
We have, on the first line:
[tex]x=>x +x[/tex]
[tex]x=>2x[/tex]
On the second line:
[tex]x=>x +x[/tex]
[tex]x=>2x[/tex]
Recall that, the result of line 1 is: [tex]x=>2x[/tex]
So, we have:
[tex]x=>2 * 2x[/tex]
[tex]x=>4x[/tex] --- at the end of [tex]line\ 2[/tex]
On the third line:
[tex]x=>x +x[/tex]
[tex]x=>2x[/tex]
Recall that, the result of line 2 is: [tex]x=>4x[/tex]
So, we have:
[tex]x = 2 * 4x[/tex]
[tex]x => 8x[/tex]
So: 8 * x can be used
what does the
command do
2. Write a Python regular expression to replace all white space with # in given string “Python is very simple programming language.”
Dear Parent, Please note that for your convenience, the School Fee counter would remain open on Saturday,27th March 2021 from 8am to 2 pm. Kindly clear the outstanding amount on account of fee of your ward immediately either by paying online through parent portal or by depositing the cheque at the fee counter to avoid late fee charges.For payment of fee the following link can also be used Pay.balbharati.org
PLEASE SOMEONE ANSWER THIS
If the old code to a passcode was 1147, and someone changed it, what would the new code be?
(It’s no version of 1147, I already tried that. There are numbers at the bottom of the pictur, it just wouldn’t show.)
[I forgot my screen time passcode please someone help I literally can’t do anything on my phone.]
Answer:
There's no way for anyone but you to know the password. Consider this a lesson to be learned - keep track of your passwords (and do it securely). If you can't remember your password for this, the only alternative is to factory reset your device.
I don't know exactly if this passcode instance is tied to your Icloud account.. if it is, factory resetting will have been a waste of time if you sign back into your Icloud account. In this case, you would need to make a new Icloud account to use.
Research: Using the Internet or a library, gather information about the Columbian Exchange. Takes notes about the specific goods and diseases that traveled back and forth across the Atlantic, as well the cultural and political changes that resulted. Pay special attention to the indigenous perspective, which will most likely be underrepresented in your research.
Answer:
Small pox, cacao, tobacco, tomatoes, potatoes, corn, peanuts, and pumpkins.
Explanation:
In the Columbian Exchange, transportation of plants, animals, diseases, technologies, and people from one continent to another held. Crops like cacao, tobacco, tomatoes, potatoes, corn, peanuts, and pumpkins were transported from the Americas to rest of the world. Due to this exchange, Native Americans were also infected with smallpox disease that killed about 90% of Native Americans because this is a new disease for them and they have no immunity against this disease. Due to this disease, the population of native Americans decreases and the population of English people increases due to more settlement.
Input 3 positive integers from the terminal, determine if tlrey are valid sides of a triangle. If the sides do form a valid triangle, output the type of triangle - equilateral, isosceles, or scalene - and the area of the triangle. If the three integers are not the valid sides of a triangle, output an appropriats message and the 3 sides. Be sure to comment and error check in your progam.
Answer:
In Python:
side1 = float(input("Side 1: "))
side2 = float(input("Side 2: "))
side3 = float(input("Side 3: "))
if side1>0 and side2>0 and side3>0:
if side1+side2>=side3 and side2+side3>=side1 and side3+side1>=side2:
if side1 == side2 == side3:
print("Equilateral Triangle")
elif side1 == side2 or side1 == side3 or side2 == side3:
print("Isosceles Triangle")
else:
print("Scalene Triangle")
else:
print("Invalid Triangle")
else:
print("Invalid Triangle")
Explanation:
The next three lines get the input of the sides of the triangle
side1 = float(input("Side 1: "))
side2 = float(input("Side 2: "))
side3 = float(input("Side 3: "))
If all sides are positive
if side1>0 and side2>0 and side3>0:
Check if the sides are valid using the following condition
if side1+side2>=side3 and side2+side3>=side1 and side3+side1>=side2:
Check if the triangle is equilateral
if side1 == side2 == side3:
print("Equilateral Triangle")
Check if the triangle is isosceles
elif side1 == side2 or side1 == side3 or side2 == side3:
print("Isosceles Triangle")
Otherwise, it is scalene
else:
print("Scalene Triangle")
Print invalid, if the sides do not make a valid triangle
else:
print("Invalid Triangle")
Print invalid, if the any of the sides are negative
else:
print("Invalid Triangle")