Answer:
Explanation:
public class RecursiveCalls {
public static void backwardsAlphabet(char currLetter) {
if (currLetter == 'a') {
System.out.println(currLetter);
}
else {
System.out.print(currLetter + " ");
backwardsAlphabet(--currLetter);
}
return;
}
public static void main (String [] args) {
char startingLetter = '-';
startingLetter = 'z';
// Your solution goes here
backwardsAlphabet(startingLetter);
return;
}
}
Write an application that counts the total number of spaces contained in a quote entered by the user.
Answer:
Explanation:
The following code is written in Java. It asks the user for an input and saves it in a String variable. Then it loops through all the characters in the string and counts the spaces. Finally, it prints the total number of spaces in the String.
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter Line Now:");
String userInput = in.nextLine();
int spaceCount = 0;
for (int x = 0; x < userInput.length(); x++) {
if (userInput.charAt(x) == ' ') {
spaceCount++;
}
}
System.out.println(spaceCount);
}
C++ Code Outputs.
I have a problem with my code and I don't know how to make it run as the project that I need below.
This is my code:
#include
#include
#include
#include
using namespace std;
struct courseInfo{
string name;
int unit;
char grade;
};
struct Student {
string fName;
string lName;
string idNumber;
courseInfo courses[2];
int unitCompleted;
double gpa;
};
Student s;
bool openFile(ifstream &in);
void Print_info_one(Student s);
void Read_info(Student &s);
float Find_points(char c) ;
bool openFile(ifstream &inFile){
string line;
int i=0,k=0;
string fName="", lname="", id="", name1="", name2="";
char grade1, grade2;
int unit1, unit2;
if (inFile.is_open())
{
while (getline(inFile, line))
{
while (line[i] != ',')
{
fName += line[i];
i++;
}
i++;
i++;
while (line[i] != ' ')
{
lname += line[i];
i++;
}
i++;i++;
while (line[i] != ' ')
{
id += line[i];
i++;
}
i++;
int count=0;
while (count <2)
{
name1 += line[i];
i++;
if(line[i] == ' ' ) count++;
}
i++;
grade1 = line[i];
i++;i++;
unit1 = line[i]-'0';
i++;i++;
count=0;
while (count <2)
{
name2 += line[i];
i++;
if(line[i] == ' ' ) count++;
}
i++;
grade2 = line[i];
i++;i++;
unit2 = line[i]-'0';
}
inFile.close();
s.fName = fName;
s.lName = lname;
s.idNumber = id;
s.courses[0].name = name1;
s.courses[0].grade = grade1;
s.courses[0].unit = unit1;
s.courses[1].name = name2;
s.courses[1].grade = grade2;
s.courses[1].unit = unit2;
s.unitCompleted = unit1 + unit2;
s.gpa = (unit1*Find_points(grade1) + unit2*Find_points(grade2))/(unit1+unit2);
}
else
{
cout << "Error reading file\n";
return false;
}
return true;
}
void Print_info_one(Student s){
cout << "Name: " << s.fName << ", " << s.lName << " ID Number: " << s.idNumber << " Course 1 Name: " << s.courses[0].name << " Grade: "
<< s.courses[0].grade << " Units: " << s.courses[0].unit << " Course 2 Name: " << s.courses[1].name << " Grade: "
<< s.courses[1].grade << " Units: " << s.courses[1].unit << " Unit completed: " << s.unitCompleted << " GPA:" << s.gpa << endl;
}
void Read_info(Student &s){
}
float Find_points(char grade){
switch (grade)
{
case 'A':
return 4.0;
break;
case 'B':
return 3.0;
break;
case 'C':
return 2.0;
break;
case 'D':
return 1.0;
break;
case 'F':
return 0;
break;
default:
break;
}
return 0;
}
int main() {
ifstream inFile;
std::fstream fs;
fs.open ("input.txt", std::fstream::in );
Print_info_one(s);
return 0;
}
In the screenshots i'm showing the inputs and outputs that I need for the test
Answer:
#include
#include
#include
#include
using namespace std;
struct courseInfo{
string name;
int unit;
char grade;
};
struct Student {
string fName;
string lName;
string idNumber;
courseInfo courses[2];
int unitCompleted;
double gpa;
};
Student s;
bool openFile(ifstream &in);
void Print_info_one(Student s);
void Read_info(Student &s);
float Find_points(char c) ;
bool openFile(ifstream &inFile){
string line;
int i=0,k=0;
string fName="", lname="", id="", name1="", name2="";
char grade1, grade2;
int unit1, unit2;
if (inFile.is_open())
{
while (getline(inFile, line))
{
while (line[i] != ',')
{
fName += line[i];
i++;
}
i++;
i++;
while (line[i] != ' ')
{
lname += line[i];
i++;
}
i++;i++;
while (line[i] != ' ')
{
id += line[i];
i++;
}
i++;
int count=0;
while (count <2)
{
name1 += line[i];
i++;
if(line[i] == ' ' ) count++;
}
i++;
grade1 = line[i];
i++;i++;
unit1 = line[i]-'0';
i++;i++;
count=0;
while (count <2)
{
name2 += line[i];
i++;
if(line[i] == ' ' ) count++;
}
i++;
grade2 = line[i];
i++;i++;
unit2 = line[i]-'0';
}
inFile.close();
s.fName = fName;
s.lName = lname;
s.idNumber = id;
s.courses[0].name = name1;
s.courses[0].grade = grade1;
s.courses[0].unit = unit1;
s.courses[1].name = name2;
s.courses[1].grade = grade2;
s.courses[1].unit = unit2;
s.unitCompleted = unit1 + unit2;
s.gpa = (unit1*Find_points(grade1) + unit2*Find_points(grade2))/(unit1+unit2);
}
else
{
cout << "Error reading file\n";
return false;
}
return true;
}
void Print_info_one(Student s){
cout << "Name: " << s.fName << ", " << s.lName << " ID Number: " << s.idNumber << " Course 1 Name: " << s.courses[0].name << " Grade: "
<< s.courses[0].grade << " Units: " << s.courses[0].unit << " Course 2 Name: " << s.courses[1].name << " Grade: "
<< s.courses[1].grade << " Units: " << s.courses[1].unit << " Unit completed: " << s.unitCompleted << " GPA:" << s.gpa << endl;
}
void Read_info(Student &s){
}
float Find_points(char grade){
switch (grade)
{
case 'A':
return 4.0;
break;
case 'B':
return 3.0;
break;
case 'C':
return 2.0;
break;
case 'D':
return 1.0;
break;
case 'F':
return 0;
break;
default:
break;
}
return 0;
}
int main() {
ifstream inFile;
std::fstream fs;
fs.open ("input.txt", std::fstream::in );
Print_info_one(s);
return 0;
Explanation:
What is the most vulnerable information that should be protected to prevent unauthorized access to your online files and records?
Answer:
Your user ID and password.
Explanation:
The user Id and password must be protected because when it is exposed to a third party then they can get access to information, data, to things they are not supposed to.
The user Id and password is provided as an authentication measure for one to be able to gain access to a computer system, network or files. It is what grants access to online files and record as it is the case here. It has to be protected for the sake of privacy.
A(n) ___________ analyzes traffic patterns and compares them to known patterns of malicious behavior.a. Intrusion prevention system b. intrusion detection system c. defense-in-depth strategy d. quantitative risk assessment
Answer:b. intrusion detection system
Explanation:
An intrusion detection system (IDS) helps to alert service administrators to detect suspicious or malicious activity by monitoring and analyzing specific patterns to network traffic. Most times, the IDS may be configured to respond to suspicious malicious traffic by blocking the cyber attacker making such IP address unable to access that particular network.
An intrusion detection system (IDS) can be either a Host Based Intrusion Detection Systems (HIDS) or a Network Based Intrusion Detection Systems (NIDS) depending on preference by the user.
It is therefore necessary for businesses who require high level of security to adopt good and effective intrusion detection systems so that the communication of information from businesses to businesses can be safeguarded and secure from cyber attacks.
Which line of code in this program is MOST likely to result in an error
Answer:
What are the choices?
Explanation:
Answer:
line 2 it needs quotation marks :D
Explanation:
Are Dogs are better than video games?
Answer:
In some cases yes.
Explanation:
Some days I really enjoy my video games and other days I enjoy being with my dog but sometimes they are annoying especially if they have way more energy than you
An uniterruptible power supply
Answer:
An uninterruptible power supply is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails.
Explanation:
Your welcome :) PLZ mark brainliest
Write a function named findmax()that finds and displays the maximum values in a two dimensional array of integers. The array should be declared as a 10 row by 15 column array of integers in main()and populated with random numbers between 0 and 100.
Answer:
import java.util.*;
public class Main
{
public static void main(String[] args) {
Random r = new Random();
int[][] numbers = new int[10][15];
for (int i=0; i<10; i++){
for (int j=0; j<15; j++){
numbers[i][j] = new Random().nextInt(101);
}
}
for (int i=0; i<10; i++){
for (int j=0; j<15; j++){
System.out.print(numbers[i][j] + " ");
}
System.out.println();
}
findmax(numbers);
}
public static void findmax(int[][] numbers){
int max = numbers[0][0];
for (int i=0; i<10; i++){
for (int j=0; j<15; j++){
if(numbers[i][j] > max)
max = numbers[i][j];
}
}
System.out.println("The max is " + max);
}
}
Explanation:
*The code is in Java.
Create a function called findmax() that takes one parameter, numbers array
Inside the function:
Initialize the max as first number in the array
Create a nested for loop that iterates through the array. Inside the second for loop, check if a number is greater than the max. If it is set it as the new max
When the loop is done, print the max
Inside the main:
Initialize a 2D array called numbers
Create a nested for loop that sets the random numbers to the numbers array. Note that to generate random integers, nextInt() function in the Random class is used
Create another nested for loop that displays the content of the numbers array
Call the findmax() function passing the numbers array as a parameter
A DVD-ROM can store more data than a CD-ROM of the same size. Comment.
Answer:
ya its true that DVD-ROM can store more data except CD-ROM
Explanation:
more dat saving in with DVD-ROM
who plays a role in the finanical activites of a company
Financial managers are responsible for the financial health of an organization. They produce financial reports, direct investment activities, and develop strategies and plans for the long-term financial goals of their organization.
Which Microsoft technology provides seamless intranet connectivity to client computers when they are connected to the Internet?
Answer:
b. Wi-Fi Direct
Explanation:
These are the options for the question;
a. Wi-Fi Protected Access
b. Wi-Fi Direct
c. Wired Equivalent Privacy
d. Internet Sharing
Wi-Fi Direct can be regarded as Wi-Fi standard that gives enablements for two Wi-Fi connections to have a direct Wi-Fi connection even though there is no intermediary wireless access point or router. It is a peer-to-peer wireless connections. It should be noted that Wi-Fi Direct is one of the Microsoft technology which provides seamless intranet connectivity to client computers when they are connected to the Internet. To use Wi-Fi direct especially on Android, one can go to "setting" and select WiFi direct, it will scan the available device automatically then connect with the preferred device, the receiving device will get invitation to connect, then if "accept" is tap then the network will start.
Which Packet Tracer feature do you think will be most helpful for you in learning how to manage a network
Answer:
Its ability to sniff and analyze packets in a network.
Explanation:
Network administrators require advanced skills and tools to manage a large network, to analyze packets as they are transmitted across the network.
Packet tracer helps to monitor the network connection and packet transfer. It informs the administrator of a dropped connection, slow transmission due to a bottle-neck, and many more packet related issues
What term refers to a sequence of statements in a language that both humans and computers can understand?
a
hexadecimal
b
program
c
binary
d
macro
Answer your answer is Macro
Explanation:
Macro shares language both the computer and the programmer can undestand.
Write a program that contains three methods:
Method max (int x, int y, int z) returns the maximum value of three integer values.
Method min (int X, int y, int z) returns the minimum value of three integer values.
Method average (int x, int y, int z) returns the average of three integer values.
Answer:
#include <stdio.h>//defining header file
int max (int x, int y, int z) //defining a method max that hold three parameters
{
if(x>=y && x>=z)//defining if block that checks x is greater then y and x is greater then z
{
return x;//return the value x
}
else if(y>z)//defining else if block it check y is greater then z
{
return y;//return the value y
}
else//else block
{
return z;//return the value z
}
}
int min (int x, int y, int z) //defining a method max that holds three parameters
{
if(x<=y && x<=z) //defining if block that check x value is less then equal to y and less then equal to z
{
return x;//return the value of x
}
if(y<=x && y<=z) //defining if block that check y value is less then equal to x and less then equal to z
{
return y;//return the value of y
}
if(z<=x && z<=x)//defining if block that check z value is less then equal to x
{
return z;//return the value of z
}
return x;//return the value of z
}
int average (int x, int y, int z) //defining average method that take three parameters
{
int avg= (x+y+z)/3;//defining integer variable avg that calculate the average
return avg;//return avg value
}
int main()//defining main method
{
int x,y,z;//defining integer variable
printf("Enter first value: ");//print message
scanf("%d",&x);//input value from the user end
printf("Enter Second value: ");//print message
scanf("%d",&y);//input value from the user end
printf("Enter third value: ");//print message
scanf("%d",&z);//input value from the user end
printf("The maximum value is: %d\n", max(x,y,z));//calling the method max
printf("The minimum value is: %d\n", min(x,y,z));//calling the method min
printf("The average value is: %d\n", average(x,y,z));//calling the method average
return 0;
}
Output:
Enter first value: 45
Enter Second value: 35
Enter third value: 10
The maximum value is: 45
The minimum value is: 10
The average value is: 30
Explanation:
In the above-given code, three methods "max, min, and average" is declared that holds three integer variable "x,y, and z" as a parameter and all the method work as their respective name.
In the max method, it uses a conditional statement to find the highest number among them.In the min method, it also uses the conditional statement to find the minimum value from them.In the average method, it defined an integer variable "avg" that holds the average value of the given parameter variable.In the main method, three variable is defined that inputs the value from the user end and passes to the method and print its value.What are some applications of a Router?
describe at least five ways in which information technology can help studying subjects other than computing
Answer:
I'd that IT can help in a great many different fields like
Mathematics, in a manner of solving complex math equations
Statistics, in a manner of creating complex graphs with millions of points
Modeling, in a manner of creating models from scratch, either for cars, personal projects or characters for video games and entertainment
Advertising, in a manner of using IT to create not only the advertisements themselves but also, spreading that advertisement to millions in a single click
Music/Audio, in a manner of creating new sounds and music that wouldn't be able to work in any practical manner
Explanation:
You are adding more features to a linear regression model and hope they will improve your model. If you add an important feature, the model may result in.
1. Increase in R-square
2. Decrease in R-square
A) Only 1 is correct
B) Only 2 is correct
C) Either 1 or 2
D) None of these
Answer:
The answer is "Option A".
Explanation:
Add extra functionality, otherwise, it increases the R-square value, which is defined in the following points:
To incorporate essential elements, R-square is explicitly promoted. It Increases the R-square value, which is an additional feature. It removes the features, which provide the value of the reduce R-square. After incorporating the additional features is used as the model, which is R-square, which is never reduced.A Protocol for networked information
Answer:
Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level; and. additional network protocols that include the Hypertext Transfer Protocol (HTTP) and File Transfer Protocol (FTP), each of which has defined sets of rules to exchange and display information.
Explanation:
could i plz have brainliest so close to next rank
server.
10. The Domain Name refers to the
a) Mail
b) Google
c) Internet
d) Local
Answer:
C.
Explanation:
what is the art of prolonging the life of the food items that are available
Answer:
Food preservation.
Explanation:
Food preservation can be defined as an art that typically deals with the process of preventing food spoilage by reducing or mitigating the growth of microorganisms and other external factors while maintaining the nutritional value, flavor and texture of the food.
Some of the factors that causes food spoilage include microorganisms (bacteria, yeast and molds), temperature, moisture content, oxidation etc.
Hence, food preservation is the art of prolonging the life of the food items that are available.
Basically, there are physical, chemical and biological methods which can be used to prolong the life of food items and thus sustaining the edibility and nutritional value of foods. These methods are;
1. Freezing.
2. Pasteurization.
3. Drying.
4. Retorting.
5. Thermal sterilization.
6. Fermentation.
7. Irradiation.
Shelly recorded an audio composition for her presentation. Arrange the following steps that Shelly followed in the proper order.
She added effects to her audio composition.
She saved her audio composition on an optical drive.
She connected her microphone to her computer.
She saved the audio composition in an appropriate file format.
She selected the record option in her DAW.
Answer:
The answer to this question is given below in the explanation section.
Explanation:
Shelly recorded an audio composition for her presentation. She needs to follow the following proper orders to get composition done for her presentation.
She connected her microphone to her computer.She selected the record option in her DAW.She added effects to her audio composition.She saved the audio composition in an appropriate file format.She saved her audio composition on an optical drive.Answer:
She connected her microphone to her computer.
She selected the record option in her DAW.
She added effects to her audio composition.
She saved the audio composition in an appropriate file format.
She saved her audio composition on an optical drive.
What stage is the most inner part of the web architecture where data such as, customer names, addresses, account numbers, and credit card info, is stored
Answer:
Database
Explanation:
A website or web application is a page or a collection of pages addressing the same information on the internet. Web pages and the whole web application is made by a web developer using tools like HTML, CSS, Javascript, Flask, react.js, etc.
All websites or applications require a fast, flexible but secure source of storage to hold information. This storage is called a database. Examples of databases are relational and non-relational databases.
9.2.2: Output formatting: Printing a maximum number of digits. Write a single statement that prints outsideTemperature with 4 digits. End with newline. Sample output with input 103.45632: 103.5
Answer:
The single print statement that does the required in python is:
print("%.4g" % outsideTemperature)
Explanation:
The full program is as follows:
The first line prompts user for input
outsideTemperature = float(input("Outside Temperature: "))
To print significant figures, we make use of g formats. And this is implemented as follows:
print("%.4g" % outsideTemperature)
The above prints 4 significant digits of outsideTemperature
For other significant figures, simply change the 4 to another number
typing which capitals and exclamation points in an email is an example of
The coding system that has just two characters is called:
a
binary
b
dual.
c
basic.
d
double.
Answer:
A. Binary
Definition:
Pertaining to a number system that has just two unique digits 0 and 1. - binary code
I need help plz it’s python
Answer:
The output of the first question would be 9. And the answer the second question is 10.
what do we use HTTP and HTML for?
HTML is a Language while HTTP is a Protocol.
HTML tags are used to help render web pages. The Hypertext Mark-up Language (or HTML) is the language used to create documents for the World Wide Web.
HTTP (Hypertext Transfer Protocol) is a protocol for transferring the hypertext pages from Web Server to Web Browser. HTTP is a generic and stateless protocol which can be used for other purposes as well using extensions of its request methods, error codes, and headers. Basically, HTTP is a TCP/IP based communication protocol, that is used to deliver data (HTML files, image files, query results, etc.) on the World Wide Web.
Write a function named power that accepts two parameters containing integer values (x and n, in that order) and recursively calculates and returns the value of x to the nth power.
Answer:
Following are the code to the given question:
int power(int x, int n)//defining a method power that accepts two integer parameters
{
if (n == 0)//defining if block to check n equal to 0
{
return 1; //return value 1
}
else//defining else block
{
x = x * power(x, --n); //use x variable to call method recursively
}
return x; //return x value
}
Explanation:
In the above-given code, a method power is defined that accepts two integer variable in its parameter, in the method a conditional statement is used which can be defined as follows:
In the if block, it checks "n" value, which is equal to 0. if the condition is true it will return value 1.In the else block, an integer variable x is defined that calls the method recursively and return x value.For Questions 1-4, consider the following code:
def mystery1(x):
return x + 2
def mystery2(a, b = 7):
return a + b
#MAIN
n = int(input("Enter a number:"))
ans = mystery1(n) * 2 + mystery2 (n * 3)
print(ans)
What is output when the user enters 9?
Answer:
9 would be entered as a parameter n of class mystery1 and return 9 + 2 = 11 and then 11 * 2 = 22, PLUS,
mystery2 new parameter is 9 * 3 = 27, then 27 + 7 = 34 returned
FINALLY, ans = 22 + 34
ans = 56 printed as output
HELP URGENTLY!!!!!
Elly supervises an eye doctors office. The office recently received new equipment. To keep that equipment working accurately and dependably, she should:
(Select all that apply.)
Copy the users manual and distribute to all the employees
Identify individuals to complete the tasks
Create a log to document maintenance
Set up auto reminders
Read the manual
List the maintenance tasks
Establish the frequency of the maintenance tasks
Update the software in the office
Note that where Elly supervises an eye doctor's office, and the office recently received new equipment, to keep that equipment working accurately and dependably, she should:
Copy the users manual and distribute to all the employeesCreate a log to document maintenanceSet up auto remindersRead the manualList the maintenance tasksEstablish the frequency of the maintenance tasksUpdate the software in the office.What is the rationale for the above response?In order to ensure that the equipment is working properly and optimally, Elly should distribute the user manual to all employees.
In addition, she should identify individuals to complete maintenance tasks, create a log to document maintenance, set up auto reminders, read the manual, list the maintenance tasks, establish the frequency of the maintenance tasks, and update the software in the office to keep new equipment working accurately and dependably. This will ensure optimal equipment maintenance and lifetime.
Learn more about equipment maintenance:
https://brainly.com/question/21853224
#SPJ1