9.18 LAB: Exact change - methods Write a program with total change amount as an integer input that outputs the change using the fewest coins, one coin type per line. The coin types are dollars, quarters, dimes, nickels, and pennies. Use singular and plural coin names as appropriate, like 1 penny vs. 2 pennies. Ex: If the input is:

Answers

Answer 1

Answer:

Explanation:

The following code is written in Java. It asks the user to enter the amount of change needed. This is done as a double since we are dealing with coins and not full dollar values alone. It then makes the necessary calculations to calculate the number of each coin needed and outputs it back to the user. A test case has been provided in the picture below with a sample output.

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       int dollars = 1;

       double quarters = 0.25;

       double dimes = 0.10;

       double nickels = 0.05;

       double pennies = 0.01;

       Scanner in = new Scanner(System.in);

       System.out.println("Enter Change Value: ");

       double change = in.nextDouble();

       int numDollars, numQuarters, numDimes, numNickels, numPennies;

       double newChange;

       numDollars = (int) (change / dollars);

       newChange = change % dollars;

       numQuarters = (int) (newChange / quarters);

       newChange = newChange % quarters;

       numDimes = (int) (newChange / dimes);

       newChange = newChange % dimes;

       numNickels = (int) (newChange / nickels);

       newChange = newChange % nickels + 0.001;

       numPennies = (int) (newChange / pennies);

       newChange = newChange % pennies;

       

       System.out.println("Minimum Num of Coins needed: ");

       if (numDollars != 1) {

           System.out.println(numDollars + " Dollars");

       } else {

           System.out.println(numDollars + " Dollar");

       }

       if (numQuarters != 1) {

           System.out.println(numQuarters + " Quarters");

       } else {

           System.out.println(numQuarters + " Quarter");

       }

       if (numDimes != 1) {

           System.out.println(numDimes + " Dimes");

       } else {

           System.out.println(numDimes + " Dime");

       }

       if (numNickels != 1) {

           System.out.println(numNickels + " Nickels");

       } else {

           System.out.println(numNickels + " Nickel");

       }

       if (numPennies != 1) {

           System.out.println(numPennies + " Pennies");

       } else {

           System.out.println(numPennies + " Penny");

       }

   }

}

9.18 LAB: Exact Change - Methods Write A Program With Total Change Amount As An Integer Input That Outputs
Answer 2

The program is an illustration of conditional statements

Conditional statements are used to make decisions

The program in C++ where comments are used to explain each line is as follows

#include<iostream>

using namespace std;

int main() {

// This line declare all the variables

int amount, dollar, quarter, dime, nickel, penny;

// This prompts the user for input (i.e. the amount)

cout<<"Amount: ";

//This gets the amount from the user

cin>>amount;

// This checks if the amount is 0 or less

if(amount<=0)  {

//This prints "No Change"

cout<<"No Change";

}

//If the amount is greater than 0

else {

// These convert the amount to various coins

dollar = amount/100;

amount = amount%100;

quarter = amount/25;

amount = amount%25;

dime = amount/10;

amount = amount%10;

nickel = amount/5;

penny = amount%5;

// The next lines print the coins

if(dollar>=1)  {

if(dollar == 1) {

cout<<dollar<<" dollar\n"; }

else {

cout<<dollar<<" dollars\n"; }

}

if(quarter>=1) {

if(quarter== 1) {

cout<<quarter<<" quarter\n";

}

else {

cout<<quarter<<" quarters\n";

}

}

if(dime>=1) {

if(dime == 1) {

cout<<dime<<" dime\n";

}

else {

cout<<dime<<" dimes\n";

}

}

if(nickel>=1) {

if(nickel == 1) {

cout<<nickel<<" nickel\n";

}

else {

cout<<nickel<<" nickels\n";

}

}

if(penny>=1) {

if(penny == 1) {

cout<<penny<<" penny\n";

}

else {

cout<<penny<<" pennies\n";

}

}

}

return 0;

}

Read more about conditions at:

https://brainly.com/question/15683939


Related Questions

Write a method swapArrayEnds() that swaps the first and last elements of its array parameter. Ex: sortArray

Answers

I understand you want a function that swaps the first and last element of an array so that the first element takes the last one's value and vice versa.

Answer and Explanation:

Using Javascript programming language:

function swapArrayEnds(sortArray){

var newArray= sortArray.values();

var firstElement=newArray[0];

newArray[0]=newArray[newArray.length-1];

newArray[newArray.length-1]=firstElement;

return newArray;

}

var exampleArray=[2, 5, 6, 8];

swapArrayEnds(exampleArray);

In the function above we defined the swapArray function by passing an array parameter that is sorted by swapping its first and last element. We first get the elements of the arrayvusing the array values method. We then store the value of the first element in the variable firstElement so that we are able to retain the value and then switch the values of the first element before using the firstElement to switch value of the last element. We then return newArray and call the function.

HELP ASAP PLZZZZZ

Question 35(Multiple Choice Worth 5 points)

(03.01 LC)


To write a letter to your grandma using Word Online, which document layout should you choose?


APA Style Paper

General Notes

New Blank Document

Table of Contents

Answers

Answer:

third one

Explanation:

To write a letter to your grandma using Word Online, you should choose the "New Blank Document" layout.

What is Word?

Microsoft Word is a word processing application. It is part of the Microsoft Office productivity software suite, along with Excel, PowerPoint, Access, and Outlook.

To write a letter to your grandmother in Word Online, select the "New Blank Document" layout. This will open a blank page on which you can begin typing your letter.

The "APA Style Paper" layout is intended for academic papers and includes formatting guidelines and section headings that a personal letter may not require.

In Word Online, "General Notes" is not a document layout option.

The "Table of Contents" feature generates a table of contents based on the headings in your document, but it is not a document layout option.

Thus, the answer is "New Blank Document".

For more details regarding Microsoft word, visit:

https://brainly.com/question/26695071

#SPJ2

View "The database tutorial for beginners" and discuss how database management systems are different from spreadsheets. Describe one experience you have had working with data.

Answers

Answer and Explanation:

A spreadsheet is an interactive computer application for the analysis and storage of data. The database is a collection of data and accessed from the computer system. This is the main difference between spreadsheets and databases. The spreadsheet is accessed by the user and the database is accessed by the user. The database can store more data than a spreadsheet. The spreadsheet is used for tasks and used in enterprises to store the data. Spreadsheet and database are two methods and the main difference is the computer application that helps to arrange, manage and calculate the data. The database is a collection of data and organized to access easily. Spreadsheet applications were the first spreadsheet on the mainframe. Database stores and manipulates the data easily. The database maintains the data and stores the records of teachers and courses. The spreadsheet is the computer application and analyzing the data in table form. The spreadsheet is a standard feature for productive suite and based on an accounting worksheet.

Data-mining agents work with a _____, detecting trends and discovering new information and relationships among data items that were not readily apparent.

Answers

Answer: data warehouse

Explanation:

Data-mining agents work with a Data warehouse which helps in detecting trends and discovering new information.

A data warehouse refers to the large collection of business data that is used by organizations to make decisions. It has to do with the collection and the management of data from different sources which are used in providing meaningful business insights.

For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache.

Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD

Answers

Answer:

Explanation:

Operation Address Hit? Read Value

Read 0x834 No Unknown

Write 0x836 Yes (not applicable)

Read 0xFFD Yes CO

Write a Java code statement for each of following:
a) To declare TWO (2) decimal numbers, and ONE (1) whole number.​

Answers

Answer:

double decimal1, decimal2;

int whole;

Explanation:

Required

Declare 2 decimals and 1 int.

The syntax to declare a variable is:

data-type variable-name;

To declare decimal, we simply make use of double or float data types.

So, we have:

double decimal1, decimal2; ----> for the decimal variables

And

int whole; ---- for the whole number

What Are the Benefits of Using Leads Automation Tool?

Answers

Answer:

Here are the top benefits of using the latest leads automation tool for your personal pursuit, professional service, and other types of businesses.

Frees Up A Lot of Time & ResourcesCompound Connection Growth StrategyViewing ProfilesSending Connection RequestsEndorses Skills of Your First Level ContactsBuild your network

Importance of Leads Automation Tool For LinkedIn

Unlike a traditional and non-automation approach, the best LinkedIn leads automation tool 2020 makes the process far more easier and efficient. It helps to win a good number of connections which would eventually make it easier for businesses to pitch their products and turn newly gained connections into potential customers.  

Moreover, businesses will also get more views and new messages in your LinkedIn inbox. The best leads automation tool free are especially useful when you have multiple LinkedIn accounts as you will get rid of time-consuming hectic tasks.

Write a RainFall class that stores the total rainfall for each of 12 months into an array of doubles. The program should have methods that return the following: the total rainfall for the year the average monthly rainfall the month with the most rain the month with the least rain Demonstrate the class in a complete program and use java 8 examples to do so. Input Validation: Do not accept negative numbers for monthly rainfall figures.

Answers

Answer:

Explanation:

The following code is written in Java. It creates the Rainfall class with two constructors, one that passes the entire array of rainfall and another that initializes an array with 0.0 for all the months. Then the class contains a method to add rain to a specific month, as well as the three methods requested in the question. The method to add rain validates to make sure that no negative value was added. 8 Test cases were provided, and any methods can be called on any of the 8 objects.

class Brainly {

   public static void main(String[] args) {

       Rainfall rain1 = new Rainfall();

       Rainfall rain2 = new Rainfall();

       Rainfall rain3 = new Rainfall();

       Rainfall rain4 = new Rainfall();

       Rainfall rain5 = new Rainfall();

       Rainfall rain6 = new Rainfall();

       Rainfall rain7 = new Rainfall();

       Rainfall rain8 = new Rainfall();

   }

}

class Rainfall {

   double[] rainfall = {0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0, 0.0};

   public Rainfall(double[] rainfall) {

       this.rainfall = rainfall;

   }

   public Rainfall() {

   }

   public void addMonthRain(double rain, int month) {

       if (rain > 0) {

           rainfall[month-1] = rain;

       }

   }

   public double totalRainfall() {

       double total = 0;

       for (double rain: rainfall) {

           total += rain;

       }

       return total;

   }

   public double averageRainfall() {

       double average = totalRainfall() / 12;

       return average;

   }

   public double rainiestMonth() {

       double max = 0;

       for (double rain : rainfall) {

           if (rain > max) {

               max = rain;

           }

       }

       return max;

   }

}

Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of

Answers

Answer:

confidentiality

Explanation:

Alice sends a message to Bob in a manner such that Bob is the only person who can tell what the real message is. Which security concept is this an example of

This type of security concept is an example of confidentiality. Thus, option B is correct.

What is security?

Security is the capacity to withstand possible damage from other individuals by placing restrictions on their right to act freely. The term security is the absence of threat or a sense of safety.

Any uncovered danger or weakness in any technology that could be exploited by criminals to compromise equipment or knowledge is a security threat.

It has to do with Alice’s ability to decide on their own how if, and why people exploit individual data if it is being sent to bob. To ensure human rights, welfare, and consciousness, solitude must be protected. People are able to independently create their own personalities.

Therefore, option B is the correct option.

Learn more about security, here:

https://brainly.com/question/15278726

#SPJ2

The question is incomplete, the complete question is:

a. message integrity

b. confidentiality

c. availability

d. non-repudiation

e. authentication

/*
Given a 2D board containing 'X' and 'O', capture all regions surrounded by 'X'.
A region is captured by flipping all 'O's into 'X's in that surrounded region .
For example,
X X X X
X O O X
X X O X
X O X X
After running your function, the board should be:
X X X X
X X X X
X X X X
X O X X
*/
public class Solution {
// This algorithm cannot solve the large test set
public void solve(char[][] board) {
// Start typing your Java solution below
// DO NOT write main() function
int rows = board.length;
if(rows == 0) return;
int cols = board[0].length;
for(int i = 0; i < cols; i++) {
// check first row's O
if(board[0][i] == 'O') {
// change it to other symbol
board[0][i] = '#';
dfs(board, 0, i);
}
// check the last row
if(board[rows - 1][i] == 'O') {
board[rows - 1][i] = '#';
dfs(board, rows - 1, i);
}
}
for(int i = 0; i < rows; i++) {
// check first col
if(board[i][0] == 'O') {
board[i][0] = '#';
dfs(board, i, 0);
}
// check last col
if(board[i][cols - 1] == 'O') {
board[i][cols - 1] = '#';
dfs(board, i, cols - 1);
}
}
// change O to X
changeTo(board, 'O', 'X');
// change # to O
changeTo(board, '#', 'O');
return;
}
public void dfs(char[][] board, int row, int col) {
// check up
if(row > 0) {
if(board[row - 1][col] == 'O') {
board[row - 1][col] = '#';
dfs(board, row - 1, col);
}
}
// check left
if(col > 0) {
if(board[row][col - 1] == 'O') {
board[row][col - 1] = '#';
dfs(board, row, col - 1);
}
}
// check right
if(row < board.length - 1) {
if(board[row + 1][col] == 'O') {
board[row+1][col] = '#';
dfs(board, row+1, col);
}
}
// check down
if(col < board[0].length - 1) {
if(board[row][col+1] == 'O'){
board[row][col+1] = '#';
dfs(board, row, col+1);
}
}
return;
}
public void changeTo(char[][] board, char from, char to) {
for(int i = 0; i < board.length; i++) {
for(int j = 0; j < board[0].length; j++) {
if(board[i][j] == from) {
board[i][j] = to;
}
}
}
return;
}
}

Answers

I believe the answer is DN

Select the correct statement(s) regarding decentralized (distributed) access control on a LAN. a. no centralized access process exists, and therefore each connected station has the responsibility for controlling its access b. data collisions are possible, therefore mechanisms such as CDMA/CD are required c. when a data collision occurs, the nearest station detecting the collision transmits a jamming signal d. all of the above are correct

Answers

Answer: D. all of the above are correct

Explanation:

The correct statements regarding the decentralized (distributed) access control on a LAN include:

• no centralized access process exists, and therefore each connected station has the responsibility for controlling its access

• data collisions are possible, therefore mechanisms such as CDMA/CD are required

• when a data collision occurs, the nearest station detecting the collision transmits a jamming signal.

Therefore, the correct option is all of the above.

If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page _____ the last word on a page ______ (recall: 1 word is 4 bytes)

Answers

Answer:

Explanation:

If an OS is using paging with offsets needing 12 bits, give the offset (in decimal or hexadecimal) to: the third word on a page the last word on a page.

Using Python suppose an array sorted in ascending order is rotated at some pivot unknown to you beforehand. (i.e., [0,1,2,4,5,6,7] might become [4,5,6,7,0,1,2]).
You are given a target value to search. If found in the array return its index, otherwise return “The input is not on this list”
You may assume no duplicate exists in the array.
Hint: Use a function. Use the built in method .index( ) and/or for loops.

Answers

Answer:

Explanation:

class Solution {

   public int search(int[] nums, int target) {

       int n = nums.length;

       int low = 0 , high = n - 1;

       While(low < high){//Set virtual node

           int mid = (low + high) / 2;

           if(nums[mid] > nums[high]){

               low = mid + 1;

           }else{

               high = mid;

           }

       }

       int rot = low;

       low = 0;

       high = n - 1;

       while(low <= high){

           int mid = (low + high) / 2;

                        Int real = (mid + rot) % n;//The virtual node is mapped to the real node.

           if(nums[real] == target){

               return real;

           }else if(nums[real] < target){

               low = mid + 1;

           }else{

               high = mid - 1;

           }

       }

       return -1;

   }

}

Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modification, and fabrication.
i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks

Answers

Answer and Explanation:

I and II answered

Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.

Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.

Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.

Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.

9.19 LAB: Sort an array Write a program that gets a list of integers from input, and outputs the integers in ascending order (lowest to highest). The first integer indicates how many numbers are in the list. Assume that the list will always contain less than 20 integers. Ex: If the input is:

Answers

Answer:

i hope you understand

mark me brainlist

Explanation:

Explanation:

#include <iostream>

#include <vector>

using namespace std;

void vector_sort(vector<int> &vec) {

int i, j, temp;

for (i = 0; i < vec.size(); ++i) {

for (j = 0; j < vec.size() - 1; ++j) {

if (vec[j] > vec[j + 1]) {

temp = vec[j];

vec[j] = vec[j + 1];

vec[j + 1] = temp;

}

}

}

}

int main() {

int size, n;

vector<int> v;

cin >> size;

for (int i = 0; i < size; ++i) {

cin >> n;

v.push_back(n);

}

vector_sort(v);

for (int i = 0; i < size; ++i) {

cout << v[i] << " ";

}

cout << endl;

return 0;

}

Calculate how much disk space (in sectors, tracks, and surfaces) will be required to
store 300,000 120-byte logical records if the disk is fixed sector with 512 bytes/
sector, with 96 sectors/track, 110 tracks per surface, and 8 usable surfaces. Ignore
any file header record(s) and track indexes, and assume that records cannot span
two sectors.

It will be great if you could explain the answer to me. :)

Answers

Answer:

see your answer in image

mark me brainlist

The amount of disk space in sectors that would be required to store 300,000 records is equal to 75,000 sectors.

Given the following data:

Number of records = 300,000.Size of each logical record = 120 byte.Number of bytes (sector) = 512.Number of sectors per track = 96.Number of tracks per surface = 110.

How to calculate the required disk space?

First of all, we would determine the number of logical records that can be held by each sector as follows:

Number of logical records per sector = 512/120

Number of logical records per sector = 4.3 ≈ 4.0.

Now, we can calculate the required disk space to store 300,000 records:

Disk space = 300,000/4

Disk space = 75,000 sectors.

For the tracks, we have:

Disk space in tracks = 75,000/96

Disk space in tracks = 781.25 ≈ 782.

Disk space in tracks = 782 tracks.

For the surfaces, we have:

Disk space in surfaces = 782/110

Disk space in surfaces = 7.10 ≈ 8.

Disk space in surfaces = 8 surfaces.

Read more on disk space here: https://brainly.com/question/26382243

Java !!!
A common problem in parsing computer languages and compiler implementations is determining if an input string is balanced. That is, a string can be considered balanced if for every opening element ( (, [, <, etc) there is a corresponding closing element ( ), ], >, etc).
Today, we’re interested in writing a method that will determine if a String is balanced. Write a method, isBalanced(String s) that returns true if every opening element is matched by a closing element of exactly the same type. Extra opening elements, or extra closing elements, result in an unbalanced string. For this problem, we are only interested in three sets of characters -- {, (, and [ (and their closing equivalents, }, ), and ]). Other characters, such as <, can be skipped. Extra characters (letters, numbers, other symbols) should all be skipped. Additionally, the ordering of each closing element must match the ordering of each opening element. This is illustrated by examples below.
The following examples illustrate the expected behaviour:
is Balanced ("{{mustache templates use double curly braces}}") should return true
is Balanced("{{but here we have our template wrong!}") should return false
is Balanced("{ ( ( some text ) ) }") should return true
is Balanced("{ ( ( some text ) } )") should return false (note that the ordering of the last two elements is wrong)
Write an implementation that uses one or more Stacks to solve this problem. As a client of the Stack class, you are not concerned with how it works directly, just that it does work.

Answers

Answer:

Explanation:

import java.util.*;

public class BalancedBrackets {

// function to check if brackets are balanced

static boolean isBalanced(String expr)

{

Stack<Character> stack = new Stack<Character>();

for (int i = 0; i < expr.length(); i++)

{

char x = expr.charAt(i);

if (x == '(' || x == '[' || x == '{')

{

// Push the element in the stack

stack.push(x);

continue;

}

if (stack.isEmpty())

return false;

char check;

switch (x) {

case ')':

check = stack.pop();

if (check == '{' || check == '[')

return false;

break;

case '}':

check = stack.pop();

if (check == '(' || check == '[')

return false;

break;

case ']':

check = stack.pop();

if (check == '(' || check == '{')

return false;

break;

}

}

// Check Empty Stack

return (stack.isEmpty());

}

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.println("\nEnter the expression to check is balanced or not !");

String expr = scan.nextLine();

boolean output;

output = isBalanced(expr);

System.out.println(output);

if (output)

System.out.println("Balanced ");

else

System.out.println("Not Balanced ");

scan.close();

}

}

What is the Open System Foundation?

Answers

Answer:

The Open Software Foundation (OSF) was a not-for-profit industry consortium for creating an open standard for an implementation of the operating system Unix. It was formed in 1988 and merged with X/Open in 1996, to become The Open Group.

Explanation:

YOUR PROFILE PIC IS CUTE :)

Difference between analog and hybrid computer in tabular form​

Answers

Answer:

Analog computers are faster than digital. Analog computers lack memory whereas digital computers store information. ... It has the speed of analog computer and the memory and accuracy of digital computer. Hybrid computers are used mainly in specialized applications where both kinds of data need to be process.

hope it is helpful for you

In Interactive Charting, which chart type allows you to chart the current spread between a corporate bond and a benchmark government bond?
a. Price
b. Price Impact
c. Bond Spread
d. Yield Curve

Answers

Answer:

c. Bond Spread

Explanation:

An interactive chart is used to show all the details in the chart and the user can extend or shrink the details that is presented in the charts by using the slider control.

The bond spread in an interactive is a chart that is used to compare and chart the current spread between the corporate bond as well as the benchmark government bond.

In Interactive Charting, the chart type that give room for charting the current spread between a corporate bond and a benchmark government bond is C:Bond Spread.

An interactive charts serves as a chart that give room to the user to carry out zooming actions as well as hovering a marker to get a tooltip and avenue to choose variable.

One of the notable type of this chart is Bond Spread, with this chart type, it is possible to charting the current spread that exist between a corporate bond as well as benchmark government bond.

Therefore, option C is correct because it allows charting of the current spread between a corporate bond.

Learn note about interactive charts at:

https://brainly.com/question/7040405

A retail department store is approximately square, 35 meters (100 feet) on each side. Each wall has two entrances equally spaced apart. Located at each entrance is a point-of-sale cash register. Suggest a local area network solution that interconnects all eight cash registers. Draw a diagram showing the room, the location of all cash registers, the wiring, the switches, and the server. What type of wiring would you suggest?

Answers

Answer:

The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server

Explanation:

The local area network ( LAN ) solution  that will be used to interconnect all the POS  registers is ; The use of twisted pair cable ( category 5e/6 ) to connect the computers on each register and also the use of switches to connect each register to the server .  

This is because category 5e/6 twisted pair cable has a data rate transfer of up to 10 Mbps and it is best used for LAN connections

while The function of the three switches is to connect each cash register to the the central server been used .

attached below is a schematic representation

Write the code to replace only the first two occurrences of the word second by a new word in a sentence. Your code should not exceed 4 lines. Example output Enter sentence: The first second was alright, but the second second was long.
Enter word: minute Result: The first minute was alright, but the minute second was long.

Answers

Answer:

Explanation:

The following code was written in Python. It asks the user to input a sentence and a word, then it replaces the first two occurrences in the sentence with the word using the Python replace() method. Finally, it prints the new sentence. The code is only 4 lines long and a test output can be seen in the attached image below.

sentence = input("Enter a sentence: ")

word = input("Enter a word: ")

replaced_sentence = sentence.replace('second', word, 2);

print(replaced_sentence)

Please help urgently

Answers

Whats your question

Write a partial class that shows a class constant and an instance method. Write an instance method that converts feet to inches using a class constant representing the number of inches in one foot. The value passed to the method represents the distance in feet.

Answers

Answer:

Please the code snippet below, the code was writen in Kotlin Language

Explanation:

const val inches:Int= 12 .   //This is the const value

fun main(args: Array<String>) {

 //this will ask the user for input

   print("Enter a number")            

  //this will do the conversion

var valueInFeet= Integer.valueOf(readLine())*inches

   print("The value in feet is $valueInFeet feet(s)")  

   }

Insert the missing code in the following code fragment. This fragment is intended to implement a method to set the value stored in an instance variable. public class Employee { private String empID; private boolean hourly; . . . _______ { hourly

Answers

Answer:

public boolean getHourly()

Explanation:

A browser is a program that allow
A. users transfer messages and files through internet.
B. users search for relevant information on the WWW.
C. users to access and view web pages on the internet.
D. users exchange real-time messages or files with another online user​

Answers

C. users to access and view web pages on the internet.

Write three statements to print the first three elements of vector runTimes. Follow each with a newline. Ex: If runTimes = {800, 775, 790, 805, 808}, print: 800 775 790

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

int main()//main method

{

int runTimes[] = {800, 775, 790, 805, 808};//defining array of integer

for(int x=0;x<3;x++)//defining for loop to print three element of array value

{

printf("%d\n",runTimes[x]);//print array value  

}

return 0;

}

Output:

Please find the attached file.

Explanation:

In this code, an array integer "runTimes" is declared that holds the given array values, and in the next step, a for loop is declared.

Inside the loop, an integer variable x is declared that starts from 0 and ends when its value less than 3 in which we print the first three array element values.

solve(-8/3)+7/5 please answer​

Answers

Answer:

hope this will help you more

Hey ! there

Answer:

-19/15 is the answer

Explanation:

In this question we are given two fraction that are -8/3 and 7/5. And we have asked to add them .

Solution : -

[tex]\quad \: \dashrightarrow \qquad \: \dfrac{ - 8}{3} + \dfrac{7}{5} [/tex]

Step 1 : Taking L.C.M of 3 and 5 , We get denominator 15 :

[tex]\quad \: \dashrightarrow \qquad \: \dfrac{ - 8(5) + 7(3)}{15} [/tex]

Step 2 : Multiplying -8 with 5 and 7 with 3 :

[tex]\quad \: \dashrightarrow \qquad \: \dfrac{ - 40 + 21}{15} [/tex]

Step 3 : Solving -40 and 21 :

[tex]\quad \: \dashrightarrow \qquad \: \red{\underline{ \boxed{ \frak{\dfrac{ - 19}{15} }}}} \quad \bigstar[/tex]

Henceforth , -19/15 is the answer .

#Keep Learning

You have recently subscribed to an online data analytics magazine. You really enjoyed an article and want to share it in the discussion forum. Which of the following would be appropriate in a post?
A. Including an advertisement for how to subscribe to the data analytics magazine.
B. Checking your post for typos or grammatical errors.
C. Giving credit to the original author.
D. Including your own thoughts about the article.

Answers

Select All that apply

Answer:

These are the things that are would be appropriate in a post.

B. Checking your post for typos or grammatical errors.

C. Giving credit to the original author.

D. Including your own thoughts about the article.

Explanation:

The correct answer options B, C, and D" According to unofficial online or internet usage it is believed that sharing informative articles is a reasonable use of a website forum as much the credit goes back to the actual or original author. Also, it is believed that posts should be suitable for data analytics checked for typos and grammatical errors.

SQLite is a database that comes with Android. Which statements is/are correct?
The content of an SQLite database is stored in XML formatted files because XML is the only file format supported by Android OS.
A SQLite database is just another name for a Content Provider. There is no difference as the SQLite implementation implements the Content Provider interface.
If an app creates an SQLite database and stores data in it, then all of the data in that particular database will be stored in one, single file.
A database query to an SQLite database usually returns a set of answers
To access individual entries, SQLite provides a so-called Cursor to enumerate all entries in the set.
This is yet another example of the Iterator pattern.

Answers

Answer:

1. Wrong as per my knowledge, SQLite may be an electronic database software that stores data in relations(tables).

2. Wrong. Content provider interface controls the flow of knowledge from your android application to an external data storage location. Data storage is often in any database or maybe it'll be possible to store the info in an SQLite database also.

3.Right. SQLite uses one file to store data. It also creates a rollback file to backup the stored data/logs the transactions.

4. Wrong. The queries are almost like a traditional electronic database system, the queries are going to be answered as per the conditions given and should return a group of answers or one answer depending upon the info and sort of query used.

5. Right. A cursor helps to point to one entry within the database table. this may be very helpful in manipulating the present row of the query easily.

Other Questions
A diagram shows a potato producing new tubers. Buds on the parent plant grow into stems that grow downwards called stolons. The end of each stolon develop in to new tuber.1) Give two pieces of evidence which show that this is an asexual method of reproduction.2) Explain why all the new tubers will be genetically identical. Olivia rides her scooter 3/4 mile in1/3 hour. How fast, in miles per hour,does she ride her scooter? Which of the following recursive formulas represents the same arithmetic sequence as the explicit formula an = 5+ (n-1)2? give a single word, not milk of cow has many uses. Current market trends and consumer preferences across the globe What is the quality of this data about HCV? 10.All of the following are examples of specialized cells except Which of the following lines best demonstrates the hidden identity element ofmedieval romance?O lines 61-62O lines 62-63O lines 53-54O lines 60-61 Which group experienced increaseddiscrimination after the bombing ofPearl Harbor?A. Irish-AmericansB. Japanese-AmericansC. Mexican-Americans Manaliksiktungkol Samoa manunugtog ng mag katutubong waiting sa pilipinas Gawain ito sa Iyong gawain 3 The company's bank reconciliation at June 30 included interest earned in the amount of $150. Complete the necessary journal entry by selecting the account names and dollar amounts from the drop-down menus. Carolina: Pobrecita! La fiesta____ (ser) muy divertida. Indicate type of chemical reactions for 2Mgl2+MN(SO3)2=2MgSO3+Mnl4 Explain whether the unit of work is a fundamental or derived unit Cuando se utiliza el punto y coma? can someone give me the answer for this? __ (5 + 4) = 2 * 5 + 2 * 4 Who did the Habeas Corpus Act protect? the theater sells two types of tickets: adult tickets for $6 and child tickets for 5$. last night, the theatre sold a total of 375 tickets for a total of $2153. How many adult tickets did the theatre sell On January 1, 2021, Nath-Langstrom Services, Inc., a computer software training firm, leased several computers under a two-year operating lease agreement from ComputerWorld Leasing, which routinely finances equipment for other firms at an annual interest rate of 6%. The contract calls for four rent payments of $14,000 each, payable semiannually on June 30 and December 31 each year. The computers were acquired by ComputerWorld at a cost of $98,000 and were expected to have a useful life of seven years with no residual value. Both firms record amortization and depreciation semiannually. (FV of $1, PV of $1, FVA of $1, PVA of $1, FVAD of $1 and PVAD of $1) (Use appropriate factor(s) from the tables provided.) Required: 1. Prepare appropriate journal entries recorded by Nath-Langstrom Services for the first year of the lease. 2. Prepare appropriate journal entries recorded by ComputerWorld Leasing for the first year of the lease. Why do you think that the human resources like veterinarian doctors, agriculturalists are great need of our country? Give reasons.