Answer:
Explanation:
The code that was provided in the question contained a couple of bugs. These bugs were fixed and the new code can be seen below as well as with the solution for the number of one-dollar bills included. The program was tested and the output can be seen in the attached image below highlighted in red.
amount_to_change = int(input())
num_fives = amount_to_change // 5
#Your solution goes here
num_ones = amount_to_change % 5
print('Change for $' + str(amount_to_change))
print(num_fives, 'five dollar bill(s) and', num_ones, 'one dollar bill (s)')
What type of device is a computer? Where does it use
Answer:A computer is an electronic device that manipulates information, or data. It has the ability to store, retrieve, and process data. You may already know that you can use a computer to type documents, send email, play games, and browse the Web.
The valid call to the function installApplication is
void main( )
{
// call the function installApplication
}
void installApplication(char appInitial, int appVersion)
{
// rest of function not important
}
Answer:
B. installApplication(‘A’, 1);
Explanation:
Given
The above code segment
Required
The correct call to installApplication
The function installApplication is declared as void, meaning that it is not expected to return anything.
Also, it receives a character and an integer argument.
So, the call to this function must include a character and an integer argument, in that order.
Option D is incorrect because both arguments are integer
Option C is incorrect because it passes no argument to the function.
Option A is incorrect because it receives an integer value from the function (and the function is not meant not to have a return value).
Option B is correct
Database multiple-choice question don't bs pls
Which of the following is not a common factor for database management system selection?
a. Cost
b. Features and tools
c. Software requirements
d. Hardware requirements
e. All of the above
f. None of the above
(D and F are wrong)
Answer:
f. None of the above
Explanation:
Considering the available options, the right answer is option F "None of the above."
Common factors for database management system selection are the following:
1. Cost: various DBMS vendors have different pricing, hence, interested buyers will consider the price before selections
2. Features and Tools: different types of DBMS have varied features and tools in carrying out the work.
3. Software requirements: there are various software requirements in various DBMS, such as encryption support, scalability, application-level data recovery, etc.
4. Hardware requirement: various DBMS vendors have different hardware requirements to consider, such as sizeable RAM, CPU value, etc.
Hence, in this case, the correct answer is option F.
how much is this worth in dollars
Answer:
This is worth 50 dollars.
Explanation:
١ - one
٢ - two
٣ - three
٤ - four
٥ - five
٦ - six
٧ - seven
٨ - eight
٩ - nine
٠ - zero
What you see above is the ten digits in Arabic.
Both 5 (٥) and 0 (٠) appear here, thus representing 50.
LAB: Count multiples (EO)
Complete a program that creates an object of the Count class, takes three integers as input: low, high, and x, and then calls the countMultiples() method. The countMultiples() method then returns the number of multiples of x between low and high inclusively.
Ex: If the input is:
1 10 2
countMutiples() returns and the program output is:
5
Hint: Use the % operator to determine if a number is a multiple of x. Use a for loop to test each number between low and high.
Note: Your program must define the method:
public int countMultiples(int low, int high, int x)
Count.java
1 import java.util.Scanner;
2
3 public class Count {
4
5 public int countMultiples(int low, int high, int x) {
6 /* Type your code here. */
7
8 }
9
10 public static void main(String[] args) {
11 Scanner scnr = new Scanner(System.in);
12 /* Type your code here. */
13 }
14)
15
Following are the Java Program to the given question:
import java.util.Scanner; //import package for user-input
public class Count //defining a class Count
{
public static int countMultiples(int low,int high,int x)//defining a method countMultiples that takes three integer parameters
{
int c=0,i; //defining integer variables that hold value
for(i=low;i<=high;i++)//defining loop that iterates value between low and high
{
if(i%x==0)//defining if block that uses % operator to check value
{
c+=1; //incrementing c value
}
}
return c; //return c value
}
public static void main(String[] args)//main method
{
int l,h,x;//defining integer variable
Scanner scnr=new Scanner(System.in); //creating scanner class object
l=scnr.nextInt(); //input value
h=scnr.nextInt();//input value
x=scnr.nextInt();//input value
System.out.println(countMultiples(l,h,x)); //calling method and print its value
}
}
Output:
Please find the attached file.
Program Explanation:
Import package.Defining a class "Count", and inside the class two method "countMultiples and main method" is declared.In the "countMultiples" method three integer parameter that are "low, high, and x".Inside this method a for loop is declared that uses the parameter value and use conditional statement with the % operator and check and return its values.Inside the main method three integer variable is declared that uses the scanner class to input the value and pass to the method and print its calculated value.Learn more:
brainly.com/question/16106262
Draw a Card. Write a program to simulate drawing a card. Your program will randomly select one card from a deck of 52 playing cards. Your program should display the rank (Ace, 2, 3, 4, 5, 6, 7, 8, 9, 10, Jack, Queen, King) and suit (Clubs, Diamonds, Hearts, Spades) of the card. Here is a sample run of the program: in The card you picked is Jack of Heart The program should use at a minimum: sequence, selection, arrays, and random numbers.
Answer:
Explanation:
The following code is written in Java. It is a function that creates a Random object to generate random values, then uses those values to choose a random rank and suit using switch statements. It then saves the rank and suit into a String variable in the correct format and finally prints the card that was picked to the screen. The function was called 4 times in the main method and the output can be seen in the attached image below.
public static void randomCardGenerator() {
Random rand = new Random();
int rank = rand.nextInt(14)+1;
int suit = rand.nextInt(4)+1;
String chosenCard = "";
switch (rank) {
case 1: chosenCard += "Ace"; break;
case 2: chosenCard += "1"; break;
case 3: chosenCard += "2"; break;
case 4: chosenCard += "3"; break;
case 5: chosenCard += "4"; break;
case 6: chosenCard += "5"; break;
case 7: chosenCard += "6"; break;
case 8: chosenCard += "7"; break;
case 9: chosenCard += "8"; break;
case 10: chosenCard += "9"; break;
case 11: chosenCard += "10"; break;
case 12: chosenCard += "Jack"; break;
case 13: chosenCard += "Queen"; break;
case 14: chosenCard += "Kind"; break;
default: System.out.println("Wrong Value");
}
chosenCard += " of ";
switch (suit) {
case 1: chosenCard += "Clubs"; break;
case 2: chosenCard += "Diamonds"; break;
case 3: chosenCard += "Hearts"; break;
case 4: chosenCard += "Spades"; break;
default: System.out.println("Invalid Suit");
}
System.out.println(chosenCard);
}
Preserving confidentiality, integrity, and availability is a restatement of the concern over interruption, interception, modification, and fabrication.
i. Briefly explain the 4 attacks: interruption, interception, modification, and fabrication.
ii. How do the first three security concepts relate to these four attacks
Answer and Explanation:
I and II answered
Interruption: interruption occurs when network is tampered with or communication between systems in a network is obstructed for illegitimate purposes.
Interception: interception occurs when data sent between systems is intercepted such that the message sent to another system is seen by an unauthorized user before it reaches destination. Interception violates confidentiality of a message.
Modification: modification occurs when data sent from a system to another system on the network is altered by an authorized user before it reaches it's destination. Modification attacks violate integrity, confidentiality and authenticity of a message.
Fabrication: fabrication occurs when an unauthorized user poses as a valid user and sends a fake message to a system in the network. Fabrication violates confidentiality, integrity and authenticity.
How did the military in the early 1900s move resources?
engines.
In the early 1900s, military moved their resources to distant locations with the help of
Answer:
In the early 1900s, military moved their resources to distant locations with the help of trains, ships, and, to a lesser extent, horse-drawn wagons. This was so because at that time airplanes did not yet exist, capable of transporting inputs to any part of the world in a very short period of time. Therefore, inputs and resources were brought by sea and, if impossible, through land, using railways or highways.
What are the LinkedIn automation tools you are using?
Answer:
Well, for me I personally use LinkedCamap to drive more LinkedIn connections, hundreds of leads, sales, and conversions automatically.
Some other LinkedIn automation tools are;
ExpandiMeet AlfredPhantombusterWeConnectLinkedIn HelperHope this helps!
Please help urgently
Sophia is putting together a training manual for her new batch of employees.Which of the following features can she use to add a document title at the top of each page?
A) Heading style
B) Page margin
C) References
D) Header and Footer
Answer:
A heading style to add a document title
The feature can she use to add a document title at the top of each page is - Heading style. Therefore option A is the correct resposne.
What are Header and Footer?A footer is a text that is positioned at the bottom of a page, whereas a header is text that is positioned at the top of a page. Usually, details about the document, such as the title, chapter heading, page numbers, and creation date, are inserted in these spaces.
A piece of the document that appears in the top margin is called the header, while a section that appears in the bottom margin is called the footer. Longer papers may be kept structured and made simpler to read by including more information in the headers and footers, such as page numbers, dates, author names, and footnotes. Each page of the paper will have the header or footer text you input.
To read more about Header and Footer, refer to - https://brainly.com/question/20998839
#SPJ2
How would you type the word floor
Answer:
f l o o r
Explanation:
/*
Given a 2D board containing 'X' and 'O', capture all regions surrounded by 'X'.
A region is captured by flipping all 'O's into 'X's in that surrounded region .
For example,
X X X X
X O O X
X X O X
X O X X
After running your function, the board should be:
X X X X
X X X X
X X X X
X O X X
*/
public class Solution {
// This algorithm cannot solve the large test set
public void solve(char[][] board) {
// Start typing your Java solution below
// DO NOT write main() function
int rows = board.length;
if(rows == 0) return;
int cols = board[0].length;
for(int i = 0; i < cols; i++) {
// check first row's O
if(board[0][i] == 'O') {
// change it to other symbol
board[0][i] = '#';
dfs(board, 0, i);
}
// check the last row
if(board[rows - 1][i] == 'O') {
board[rows - 1][i] = '#';
dfs(board, rows - 1, i);
}
}
for(int i = 0; i < rows; i++) {
// check first col
if(board[i][0] == 'O') {
board[i][0] = '#';
dfs(board, i, 0);
}
// check last col
if(board[i][cols - 1] == 'O') {
board[i][cols - 1] = '#';
dfs(board, i, cols - 1);
}
}
// change O to X
changeTo(board, 'O', 'X');
// change # to O
changeTo(board, '#', 'O');
return;
}
public void dfs(char[][] board, int row, int col) {
// check up
if(row > 0) {
if(board[row - 1][col] == 'O') {
board[row - 1][col] = '#';
dfs(board, row - 1, col);
}
}
// check left
if(col > 0) {
if(board[row][col - 1] == 'O') {
board[row][col - 1] = '#';
dfs(board, row, col - 1);
}
}
// check right
if(row < board.length - 1) {
if(board[row + 1][col] == 'O') {
board[row+1][col] = '#';
dfs(board, row+1, col);
}
}
// check down
if(col < board[0].length - 1) {
if(board[row][col+1] == 'O'){
board[row][col+1] = '#';
dfs(board, row, col+1);
}
}
return;
}
public void changeTo(char[][] board, char from, char to) {
for(int i = 0; i < board.length; i++) {
for(int j = 0; j < board[0].length; j++) {
if(board[i][j] == from) {
board[i][j] = to;
}
}
}
return;
}
}
Write a recursive function that returns 1 if an array of size n is in sorted order and 0 otherwise. Note: If array a stores 3, 6, 7, 7, 12, then isSorted(a, 5) should return 1 . If array b stores 3, 4, 9, 8, then isSorted(b, 4) should return 0.
Answer:
The function in C++ is as follows:
int isSorted(int ar[], int n){
if ([tex]n == 1[/tex] || [tex]n == 0[/tex]){
return 1;}
if ([tex]ar[n - 1][/tex] < [tex]ar[n - 2][/tex]){
return 0;}
return isSorted(ar, n - 1);}
Explanation:
This defines the function
int isSorted(int ar[], int n){
This represents the base case; n = 1 or 0 will return 1 (i.e. the array is sorted)
if ([tex]n == 1[/tex] || [tex]n == 0[/tex]){
return 1;}
This checks if the current element is less than the previous array element; If yes, the array is not sorted
if ([tex]ar[n - 1][/tex] < [tex]ar[n - 2][/tex]){
return 0;}
This calls the function, recursively
return isSorted(ar, n - 1);
}
The computer that is used in scientific research is ........
Answer:
supercomputers are the computer that is used in scientific research.
Answer:
super computer is the right answer
How can an Outlook user search for contacts? Check all that apply.
the Search bar located above the list of contacts
the Search People bar on the Find command group
the Search People located on the People navigation icon
CTL + E to activate the search contacts box
advanced Find under the Search tab
the options menu in the backstage view
Answer: the Search bar located above the list of contacts.
the Search People bar on the Find command group.
the Search People located on the People navigation icon.
CTL + E to activate the search contacts box.
advanced Find under the Search tab.
Explanation:
An Outlook user can search for contacts through the following ways:
• the Search bar located above the list of contacts.
• the Search People bar on the Find command group.
• the Search People located on the People navigation icon.
• CTL + E to activate the search contacts box.
• advanced Find under the Search tab.
Therefore, the correct options are A, B, C, D and E.
Explain why interrupt times and dispatch delays must be limited to a hard real-time system?
Answer:
The important problem is explained in the next section of clarification.
Explanation:
The longer it is required for a computing device interrupt to have been performed when it is created, is determined as Interrupt latency.
The accompanying duties include interrupt transmission delay or latency are provided below:
Store the instructions now being executed.Detect the kind of interruption.Just save the present process status as well as activate an appropriate keep interrupting qualitative functions.A coin is tossed repeatedly, and a payoff of 2n dollars is made, where n is the number of the toss on which the first Head appears. So TTH pays $8, TH pays $4 and H pays $2. Write a program to simulate playing the game 10 times. Display the result of the tosses and the payoff. At the end, display the average payoff for the games played. A typical run would be:
Answer:
Explanation:
The following code is written in Java. It creates a loop within a loop that plays the game 10 times. As soon as the inner loop tosses a Heads (represented by 1) the inner loop breaks and the cost of that game is printed to the screen. A test case has been made and the output is shown in the attached image below.
import java.util.Random;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
int count = 0;
int loopCount = 0;
while (loopCount < 10) {
while (true) {
Random rand = new Random();
int coinFlip = rand.nextInt(2);
count++;
if (coinFlip == 1) {
System.out.println("Cost: $" + 2*count);
count = 0;
break;
}
loopCount++;
}
}
}
}
For each of the following memory accesses indicate if it will be a cache hit or miss when carried out in sequence as listed. Also, give the value of a read if it can be inferred from the information in the cache.
Operation Address Hit? Read value (or unknown)
Read 0x834
Write 0x 836
Read 0xFFD
Answer:
Explanation:
Operation Address Hit? Read Value
Read 0x834 No Unknown
Write 0x836 Yes (not applicable)
Read 0xFFD Yes CO
Which statement describes data-sharing in a blockchain?
Answer:
wheres the statement
Explanation:
What variable(s) is/are used in stack to keep track the position where a new item to be inserted or an item to be deleted from the stack
Answer:
Hence the answer is top and peek.
Explanation:
In a stack, we insert and delete an item from the top of the stack. So we use variables top, peek to stay track of the position.
The insertion operation is understood as push and deletion operation is understood as entering stack.
Hence the answer is top and peek.
provides an automated method for discovering host systems on a network. Although it doesn't necessarily discover all weaknesses, it does determine which systems are active on the network and what services they offer or what ports are available
Answer:
Network scan
Explanation:
Cyber security can be defined as preventive practice of protecting computers, software programs, electronic devices, networks, servers and data from potential theft, attack, damage, or unauthorized access by using a body of technology, frameworks, processes and network engineers.
Some examples of cyber attacks are phishing, zero-day exploits, denial of service, man in the middle, cryptojacking, malware, SQL injection, spoofing etc.
Generally, a security assessment is carried out by network security experts on a regular basis to determine potential loopholes or vulnerabilities in the information and technology (IT) infrastructure. One of the techniques or approach used in security assessment is a network scan.
A network scan is a security assessment technique used for the automatic detection of host systems on a network. Although a network scan isn't capable of discovering or detecting all the weaknesses on a network, it avails users information about the computer systems that are active on the network and what services the computer systems offer or what ports are available on them.
Use NAND operator to write; P or Q, and P -Q make an everyday implication sentence using only NAND
Answer:
Hence the answer is given as follows,
Explanation:
By using the NAND operator:-
P or Q and P -Q make an everyday implication sentence using the only NAND is given as,
Illustrate why Sally's slide meets or does not meet professional expectations?
Describe all the things Sally can improve on one of her slides?
Suggest some ways Sally can learn more PowerPoint skills.
The correct answer to this open question is the following.
Unfortunately, you did not provide any context or background about the situation of Sally and the problem with her slides. We do not know it, just you.
However, trying to be of help, we can comment on the following general terms.
When someone does not meet professional expectations, this means that this individual did not prepare her presentation, lacked technical skills, did not included proper sources, or missed the proper visual aids to make the presentation more attractive and dynamic.
What Sally can improve about her slides is the following.
She can design a better structure for the presentation to have more congruence.
Sally has to clearly establish the goal or goals for her presentation.
She has to add many visuals instead of plain text. This way she can better capture the interest of her audience.
If she can use more vivid colors instead of pale or dark ones, that would be best.
No paragraphs unless necessary. She better uses bullet points.
Take care of the tone of her voice. During her practice, she can record her vice to check how it sounds.
To connect several computers together, one generally needs to be running a(n) ____ operating system
a. Network
b. Stand-alone
c. Embedded
d. Internet
Answer. Network
Explanation:
How can I pass the variable argument list passed to one function to another function.
Answer:
Explanation:
#include <stdarg.h>
main()
{
display("Hello", 4, 12, 13, 14, 44);
}
display(char *s,...)
{
va_list ptr;
va_start(ptr, s);
show(s,ptr);
}
show(char *t, va_list ptr1)
{
int a, n, i;
a=va_arg(ptr1, int);
for(i=0; i<a; i++)
{
n=va_arg(ptr1, int);
printf("\n%d", n);
}
}
now now now now mowewweedeeee
Answer:
15
Inside the type declaration, you specify the maximum length the entry can be. For branch, it would be 15.
I can't seem to type the full "vc(15)" phrase because brainly won't let me.
Can anyone decipher these? There a bit random. Maybe binary but if there are other ways please include them.
Answer:
Explanation:
so this is what "format" is about, it's saying what do the ones and zeros represent. b/c the bits can represent lots of different things , like letters with ascii code , and that's got several types. some are 8 bits, some are 16 bits, the questions you've shown are in groups of 5 which is really not a "thing" in binary, it's always by twos, without some type of "frame work" around the bits, we won't know what they represent, if that is helping? the important part is what is the "frame work" that these bits are in.
all of your questions seem to have some "art" thing going on, they make some kinda of binary artwork, for what they are saying, that's not what's important. Other than if they form palindromes, maybe that's what the questions are really about, how these do from palindromes, that is, they read the same backwards as forwards... I know.. why would anyone read backwards.. but a computer can do that pretty quickly, sooo sometimes to check, it will read forwards and backwards.. but when there is a palindrome, the computer is "confused"
this is also a big big part of "typing" not like on a keyboard but when you program, and you say that your variables are of a certain type, like a char, or a string, or a double, you are specifying how many bits will be used to represent your data. so then when you put the ones and zeros into the memory , ( think RAM) then it's stored in groups of what ever size you've determined. hmmmm does this help?
Write a program that reads in the size of the side of a square and then prints a hollow square of that size out of asterisks and
blanks. Your program should work for squares of all side sizes between 1 and 20. For example, if your program reads a size of 5, it
should print
Answer:
Explanation:
#include <iostream>
using std::cout;
using std::endl;
using std::cin;
int main()
{
int side, rowPosition, size;
cout << "Enter the square side: ";
cin >> side;
size = side;
while ( side > 0 ) {
rowPosition = size;
while ( rowPosition > 0 ) {
if ( size == side || side == 1 || rowPosition == 1 ||
rowPosition == size )
cout << '*';
else
cout << ' ';
--rowPosition;
}
cout << '\n';
--side;
}
cout << endl;
return 0;
}
Which of the following terms describes an attacker walking or driving through business areas and neighborhoods to identify unprotected wireless networks from the street using a laptop or a handheld computer?
A. Wi-Fi stealing.
B. Wi-Fi trolling.
C. Wi-Fi jacking.
D. Wi-Fi hacking.
Answer:
C. Wi-Fi jacking
Explanation:
Answer: yessir b
Explanation: