Create a function void process(char ch, int x, int y)- to accept an arithmetic operator (+,-./, in argum
ch and two integers in arguments x and y. Now on the basis of the operator stored in ch perform the operator
in x and y and print the final result. Also, write a main function to input the two integers and an arithmetit
operator, and by invoking function process() print the output.
Example: Input:
First Integer
Second Integer
: 6
Value of ch
Output: The result of 5 and 7 on * = 24

write in java​

Answers

Answer 1

Answer:

The program is as follows:

import java.util.*;

public class Main{

   public static void process(char ch, int x, int y){

if(ch == '+'){

    System.out.print(x+y);  }

else if(ch == '-'){

    System.out.print(x-y);  }

else if(ch == '*'){

    System.out.print(x*y);  }

else if(ch == '/'){

    if(y!=0){

        double num = x;

        System.out.print(num/y);      }

    else{

        System.out.print("Cannot divide by 0");     } }

else{

    System.out.print("Invalid operator"); }

 }

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

 int x, y;

 char ch;

 System.out.print("Enter two integers: ");

 x = input.nextInt(); y = input.nextInt();

 System.out.print("Enter operator: ");

 ch = input.next().charAt(0);  

 process(ch,x, y);

}

}

Explanation:

The function begins here

   public static void process(char ch, int x, int y){

If the character is +, this prints the sum of both integers

if(ch == '+'){

    System.out.print(x+y);  }

If the character is -, this prints the difference of both integers

else if(ch == '-'){

    System.out.print(x-y);  }

If the character is *, this prints the product of both integers

else if(ch == '*'){

    System.out.print(x*y);  }

If the character is /, this prints the division of both integers.

else if(ch == '/'){

    if(y!=0){

        double num = x;

        System.out.print(num/y);      }

    else{

This is executed if the denominator is 0

        System.out.print("Cannot divide by 0");     } }

Invalid operator is printed for every other character

else{

    System.out.print("Invalid operator"); }

}

The main begins here

public static void main(String[] args) {

 Scanner input = new Scanner(System.in);

This declares both integers

 int x, y;

This declares the operator

 char ch;

Get input for both integers

 System.out.print("Enter two integers: ");

 x = input.nextInt(); y = input.nextInt();

Get input for the operator

 System.out.print("Enter operator: ");

 ch = input.next().charAt(0);  

Call the function

 process(ch,x, y);

}

}


Related Questions

1. Imagine you are in a computer shop. Choose five things that would improve your digital lif​

Answers

Answer:

definitley a mac

Explanation:

im not much of an apple company person but i would love to try a mac im more of that disney person who likes the animated stuff like raya and the last dragon which came out in march and luca which came out last friday

The clone() method expects no arguments when called, and returns an exact copy of the type of bag on which it is called.

Answers

Answer:

true

Explanation:

This statement is true. This is a method found in the Java programming language and is basically used to create an exact copy of the object that it is being called on. For example, in the code provided below the first line is creating a new object from the Cars class and naming it car1. The second line is creating an exact copy of car1 and saving it as a new object called car2. Notice how the clone() method is being called on the object that we want to copy which in this case is car1.

       Cars car1 = new Cars();

       Cars car2 = (Cars) car1.clone();

_ is a term used for license like those issues by creative commons license as an alternative to copyright

Answers

, . , .

Explanation:

'

LAB: Divide input integers
Write a program using integers userNum and divNum as input, and output userNum divided by divNum three times. Note: End with a newline.
Ex: If the input is:
2000 2
the output is:
1000 500 250
Note: In Java, integer division discards fractions. Ex: 6 / 4 is 1 (the 0.5 is discarded).
import java.util.Scanner;
public class LabProgram {
public static void main(String[] args) {
/* Type your code here. */
}
}
(My professor wants us to use this temple and I'm not sure how I should start typing the code were it says "type code here". I've tried differnt forms like the one provided below but they all have errors according to the program. it tells me that i have to place ; .
import java.util.Scanner;
public class LabProgram {
public static void main(String[] args) {
userNum= int(input())
divNum= int(input())
# calculating the division three times
userNum=userNum//divNum
#i have used end=' ' so that it does not produce new line
# instead of that it produce space
print(userNum,end=' ')
userNum=userNum//divNum
print(userNum,end=' ')
userNum=userNum//divNum
print(userNum,end=' ')
}
}
Errors:
Program errors displayed here
LabProgram.java:5: error: '.class' expected userNum= int(input()) ^ LabProgram.java:5: error: ';' expected userNum= int(input()) ^ LabProgram.java:6: error: '.class' expected divNum= int(input()) ^ LabProgram.java:6: error: ';' expected divNum= int(input()) ^ LabProgram.java:7: error: illegal character: '#' # calculating the division three times ^ LabProgram.java:7: error: ';' expected # calculating the division three times ^ LabProgram.java:7: error: ';' expected # calculating the division three times ^ LabProgram.java:9: error: illegal character: '#' #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:9: error: ';' expected #i have used end=' ' so that it does not produce new line ^ LabProgram.java:10: error: illegal character: '#' # instead of that it produce space ^ LabProgram.java:10: error: ';' expected # instead of that it produce space ^ LabProgram.java:10: error: ';' expected # instead of that it produce space ^ LabProgram.java:10: error: ';' expected # instead of that it produce space ^ LabProgram.java:11: error: ';' expected print(userNum,end=' ') ^ LabProgram.java:12: error: ';' expected userNum=userNum//divNum ^ LabProgram.java:13: error: ';' expected print(userNum,end=' ') ^ LabProgram.java:14: error: ';' expected userNum=userNum//divNum ^ LabProgram.java:15: error: ';' expected print(userNum,end=' ') ^ 22 errors

Answers

Mark Brainliest please


Answer:
# The user is prompted to enter number as dividend
# The received number is assigned to userNum
userNum = int(input("Enter the number you want to divide: "))
# The user is prompted to enter number as divisor
# The divisor is assigned to x
x = int(input("Enter the number of times to divide: "))
# divideNumber function is defined to do the division
def divideNumber(userNum, x):
# counter is declared to control the loop
counter = 1
# the while-loop loop 3 times
# the division is done 3 times
while counter <= 3:
# integer division is done
# truncating the remainder part
userNum = userNum // x
# the result of the division is printed
print(userNum, end=" ")
# the counter is incremented
counter += 1
# the divideNumber function is called
# the received input is passed as parameter
# to the function
divideNumber(userNum, x)
# empty line is printed
print("\n")
Explanation:
The // operator in python works like the / operator in C. The // operator returns only the integer part of division operation. For instance 6 // 4 = 1. The fraction part is discarded

In the given code you include two languages, that's why it will give the error messages, and for better understanding, we give the program into two languages:

Following are the Java and Python Program to these questions:

Java Program:

import java.util.*;//import package

public class LabProgram  //defining a class LabProgram  

{

public static void main(String[] ar)//defining main method  

{

int userNum,divNum;//defining integer variable

Scanner on=new Scanner(System.in);//defining Scanner class Object for user-input

userNum=on.nextInt();//input value

divNum=on.nextInt();//input value

for(int i=0;i<3;i++)//defining loop to divide value 3 times

{

userNum=userNum/divNum;//dividing userNum by divNum and store its value into userNum

System.out.println(userNum);//print userNum value

}

}

}

Python Program:

userNum= int(input())#input integer value

divNum= int(input())#input integer value

# calculating the division three times

userNum=userNum//divNum#using userNum that divides userNum by divNum and store its value

print(userNum)#print userNum value

userNum=userNum//divNum#using userNum that divides userNum by divNum and store its value

print(userNum)#print userNum value

userNum=userNum//divNum#using userNum that divides userNum by divNum and store its value

print(userNum)#print userNum value

Output:

Please find the attached file.

Learn more:

brainly.com/question/21661364

A person's oral communication skills can give either a positive or negative first impression.

Answers

Answer:

true

Explanation:

oral communication can be awkward or good.

help me with this please​

Answers

Different types of connections are..

-A network is two or more devices connected through links.

-There are two possible types of connections: point-to-point and multipoint.

-A point-to-point connection provides a dedicated link between two devices.

Explain the different types of topologies

-Star network…
In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn't allow direct communication.

-Ring network…
A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology

-Bus network…
In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop 

-tree topology…
Tree topologies have a root node, and all other nodes are connected which form a hierarchy. So it is also known as hierarchical topology. This topology integrates 

-Computer network…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

-Mesh networking…
Ring Topology; Star Topology; Mesh Topology; Tree Topology; Hybrid Topology; How to select a Network Topology? Types of Networking Topologies.

Different type of networks

-Computer network…
Virtual Private Network (VPN). By extending a private network across the Internet, a VPN lets its users send and receive data.

-LAN…
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data. 3. Wireless Local Area Network (WLAN).

-Wide area network…
Wide area network, or WAN. In terms of purpose, many networks can be considered general purpose, which means they are used for everything from sending files etc.

-Metropolitan area network…
MAN or Metropolitan area Network covers a larger area than that of a LAN and smaller area as compared to WAN. It connects two or more computers that are apart.

-Wireless LAN…
WLAN (Wireless Local Area Network) helps you to link single or multiple devices using wireless communication within a limited area like home, school, or office 

-Wireless network…
A Wireless Local Area Network or WLAN is a network that is used to connect different devices without using wires etc.

-Storage area network…
Storage Area Network is a type of network which allows consolidated, block-level data storage. It is mainly used to make storage last longer etc.

-Personal area network…
PAN can be used for establishing communication among these personal devices for connecting to a digital network and the internet.

-Campus area network…
A Metropolitan Area Network or MAN is consisting of a computer network across an entire city, college campus, or a small region. This type of network is large.

Explain your own understand about protocol and standards

A protocol defines a set of rules used by two or more parties to interact between themselves. A standard is a formalized protocol accepted by most of the parties that implement it.

explain layers in OSI model

Physical, Data Link, Network, Transport, Session, Presentation, and Application.

Explain layers in tcp/ip model

Four layers of TCP/IP model are 1) Application Layer 2) Transport Layer 3) Internet Layer 4) Network Interface. ... It is also known as a network layer. Transport layer builds on the network layer in order to provide data transport from a process on a source system machine to a process on a destination system.

what are the peer to peer processing

In peer-to-peer (P2P) networking, a group of computers are linked together with equal permissions and responsibilities for processing data. Unlike traditional client-server networking, no devices in a P2P network are designated solely to serve or to receive data

write the output of given program:​

Answers

Answer:

24

16

80

0

Explanation:

A+B=>20+4=24

A-B=>20-4=16

A*B=>A x B = 20 x 4 = 80

A MOD B=> Remainder of A/B = 0

Select which is true for for loop​

Answers

Answer:

i dont understand what you mean and what you are asking in the qestion

Explanation:

9. Question
As sysadmin, you will have to prioritize issues. Which of these issues would be a top priority
A central printer is down
A server stopped provide service to 100 users
Auser has forgotten the AWON
A users computer Keupayashi

Answers

A server stopped provide service to 100 users

Which effect is used in this image?

A.sepia effect

B.selective focus

C.zoom effect

D.soft focus

Answers

Answer:

A.sepia effect.

It is Selective focus!

Assign sum_extra with the total extra credit received given list test_grades. Iterate through the list with for grade in test_grades:. The code uses the Python split() method to split a string at each space into a list of string values and the map() function to convert each string value to an integer. Full credit is 100, so anything over 100 is extra credit.Sample output for the given program with input: '101 83 107 90'Sum extra: 8(because 1 + 0 + 7 + 0 is 8)user_input = input()test_grades = list(map(int, user_input.split())) # test_grades is an integer list of test scoressum_extra = 0 # Initialize 0 before your loop''' Your solution goes here '''print('Sum extra:', sum_extra)

Answers

Answer:

Replace ''' Your solution goes here '''

With

for i in test_grades:

   if i > 100:

       sum_extra+=i - 100

Explanation:

This iterates through the list

for i in test_grades:

This checks for list elements greater than 100

   if i > 100:

The extra digits (above 100) are then added together

       sum_extra+=i - 100

Select the correct answer. Which is the bottom-most layer in the OSI model?
A application layer
B. physical layer
c. transport layer
D. presentation layer​

Answers

Answer:

B.Physical layer

Explanation:

I am sure.Hope it helps

is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions

Answers

[tex]\boxed{Data \:anomaly}[/tex] is defined as the condition in which all of the data in the database are consistent with the real-world events and conditions.

[tex]\red{\large\qquad \qquad \underline{ \pmb{{ \mathbb{ \maltese \: \: Mystique35}}}}}[/tex]

I don't know, but could you get all edmentum.com answers by creating a teacher's account and choosing the lesson your on and get all the answers that way?

Answers

Answer:

you have to have some authorization

Explanation: just tried

g Write a program that keeps asking the user for new values to be added to a list until the user enters 'exit' ('exit' should NOT be added to the list). These values entered by the user are added to a list we call 'initial_list'. Then write a function that takes this initial_list as input and returns another list with 3 copies of every value in the initial_list. Finally, inside main(), print out all of the values in the new list. For example: Input: Enter value to be added to list: a Enter value to be added to list: b Enter value to be added to list: c Enter value to be added to list: exit Output: a b c a b c a b c Note how 'exit' is NOT added to the list. Also, your program needs to be able to handle any variation of 'exit' such as 'Exit', 'EXIT' etc. and treat them all as 'exit'.

Answers

Answer:

Following are the code to the given question:

def list_function(initial_list):#defining a method list_function that takes list in parameter

   l = initial_list*3#defining l that multiple the list by 3

   return l#return list  

def main(): #defining main method    

   initial_list = []#defining an empty list

   while True:#defining while loop

       i = input("Enter value to be added to list: ")#defining i variable that input list value

       i = i.rstrip()#use rstrip method

       if i.lower() == "exit" and "EXIT" and "Exit":#defining if block that checks list value is in lower case  

           break#use break keyword

       initial_list.append(i)#use list that adds input value

       l = list_function(initial_list)#defining l variable that calls the list_function method

   for i in l:#defining for loop that print list items

       print(i)#print value

main()

Output:

Please find the attached file.

Explanation:

In this code, a method "list_function" is declared that takes list "initial_list" in parameter and defines "l" variable that multiple the list by 3 and return its list value.

In the main method an empty list "initial_list" is declared that defines a while loop that input list value and use rstrip method and define and if block that checks list value is in lower case and pass into the method and use for loop to prints its values.

Please write 2 paragraphs on where you envision yourself academically, and personally in 5 years, and in 10 years.
(What would you have accomplished by the year 2026, and 2031).

Answers

Answer:

Explanation:

This is a personal answer because everyone envisions something different.

In 5 years, I hope to have a well established Front-End Development freelancing site and various clients. Hopefully, this will drastically increase my income and allow for more options. I also would like to start investing heavily in different areas of interest. As for personal life, I would like to learn an instrument and work on developing relationships with those close to me.

In 10 years, I hope to have a large sum of money invested in various assets. I would also love to buy a piece of land and build a small home for myself. I see myself also having worked for a startup company developing an application that would drastically better the lives of a specific group of individuals. If all of this were to become a reality, I guess the only thing left that I would love to do would be to travel the world with someone special by my side.

Again, everyone's vision is different/unique and special to them. Hope this helped.


What software tool can you use to see the applications that are currently running?

Answers

Answer:

You can use the task manager to see what programs are currently running.

Explanation:

Answer:

The answer is Task Manager.

Explanation:

The Microsoft Windows Task Manager is a general, quick, and easy method of viewing what programs, background processes, and apps are running on the computer.

Using the Task Manager, you can also view how much memory a program is using, stop a frozen program, and view available system resources.

For the following machine code expressed in hexadecimal, write the corresponding MIPS assembly instruction. Note: in case of branch or jump instructions, you should write the target address in hexadecimal notation in the MIPS assembly instruction. e.g., j 0x00000016.

Machine code:0x08100008
Assembly instruction:??

Answers

Answer:

Assembly instruction is j 0x00400020

Explanation:

j 0x00400020

EXPLAINATION-

GIVEN Machine Code = 0x 0 8 1 0 0 0 0 8

Step 1:

Now convert 0 8 1 0 0 0 0 8 Each digit to Binary

= 0000 1000 0001 0000 0000 0000 0000 1000

= 000010 00000100000000000000001000

000010 is opcode of j instruction

we are left with

0000 0100000000000000001000

Step 2:

Add two zeroes to right

0000 0100 0000 0000 0000 0010 0000

Step 3:

Remove 4 highest bit

0100 0000 0000 0000 0010 0000

Decimal of it is 4194336

Step 4:

Now convert it into Hexadecimal

we get 400020

So Assembly instruction is j 0x00400020

j 0x00400020

.......................................................................................................................................................................

Although it is not a term Excel uses, how do most people think of Excel?

Answers

Answer:

People think of Excel as a Spreadsheet.

Countdown until matching digits Write a program that takes in an integer in the range 11-100 as input. The output is a countdown starting from the integer, and stopping when both output digits are identical. Ex: If the input is the output is 93 92 91 90 89 88 Ex: If the input is 11 the output is 11 Ex: If the input is 9 or any number not between 11 and 100 (inclusive), the output is: Input must be 11-100 For coding simplicity, follow each output number by a space, even the last one. Use a while loop. Compare the digits do not write a large if-else for all possible same-digit numbers (11,22,33...99), as that approach would be cumbersome for larger ranges. 29999.1122120 LAB ACTIVITY 4.13.1: LAB: Countdown until matching digits 7/10 main.c Load default template... 1 include 2 3 int main() 4 int n, i: 5 scanf("%d", &n); if (n < 20 Il n98) { 7 printf("%d",n); } else { i-n: 1e while (1) printf("%d", 1); if (icie - i/10) 13 14 15 16 17 } 18 printf("\n"); 19 return : 20 ) 12 break; Latest submission - 11:16 PM on 02/05/21 Total score: 7/10 Only show failing tests Download this submission 1: Compare output A 3/3 Input Your output 93 92 91 90 89 88 2: Compare Output A Input 11 Your output 11 3: Compare output a 3/3 Input 20 Your output 20 19 18 17 16 15 14 13 12 11 4: Compare output A 0/2 Output differs. See highlights below. Special character legend Input 101 Your output 101 Expected output Input must be 11-100 5. Compare output A 0/1 Output differs. See highlights below. Special character legend Input Your output Expected output Input must be 11-100

Answers

Answer:

The program in C is as follows:

#include <stdio.h>

int main(){

   int n;

   scanf("%d", &n);

   if(n<11 || n>100){

       printf("Input must be between 11 - 100");    }

   else{

       while(n%11 != 0){

           printf("%d ", n);

           n--;        }

       printf("%d ", n);    }

   return 0;

}

Explanation:

The existing template can not be used. So, I design the program from scratch.

This declares the number n, as integer

   int n;

This gets input for n

   scanf("%d", &n);

This checks if input is within range (11 - 100, inclusive)

   if(n<11 || n>100){

The following prompt is printed if the number is out of range

       printf("Input must be between 11 - 100");    }

   else{

If input is within range, the countdown is printed

       while(n%11 != 0){ ----This checks if the digits are identical using modulus 11

Print the digit

           printf("%d ", n);

Decrement by 1

           n--;        }

This prints the last expected output

       printf("%d ", n);    }

Write a program that accepts inputs, outputs them and exits correctly when - 1
is pressed

Answers

Answer:

Explanation:

The following program is written in Python. It simply creates an endless loop that continously asks the user for an input. If the input is not -1 then it outputs the same input, otherwise it exists the program correctly. A test output can be seen in the attached image below.

while True:

   answer = input("Enter a value: ")  

   if answer != "-1":

       print(answer)

   else:

       break

The following SQL is which type of join? SELECT CUSTOMER_T. CUSTOMER_ID, ORDER_T. CUSTOMER_ID, NAME, ORDER_ID FROM CUSTOMER_T,ORDER_T WHERE CUSTOMER_T. CUSTOMER_ID = ORDER_T. CUSTOMER_ID

Answers

Answer:

Self Join

Explanation:

Required

The type of JOIN

Notice that the given query joins the customer table and the order table without using the keyword join.

SQL queries that join tables without using the keyword is referred to as self join.

Other types of join will indicate the "join type" in the query

Used for monitoring web activity by users to make sure that sensitive information won't leave the building.

A, Web server
B, FTP server
C, POP server
D, Proxy server ​

Answers

Answer: PROXY

Explanation:

The basic objective of the web server is to store, process and deliver web pages to the users.

FTP server is to allow users to upload and download files. An FTP server is a computer that has a file transfer protocol (FTP) address and is dedicated to receiving an FTP connection. FTP is a protocol used to transfer files via the internet between a server (sender) and a client (receiver)

pop provides access via an Internet Protocol (IP) network for a user client application to a mailbox (maildrop) maintained on a mail server

proxy server is a system that isolates internal clients from the servers by downloading and storing files on behalf of the clients. it intercepts requests for web-based or other resources that come from

Write an algorithm that accepts two numbers,
divide the first number by the second and display the
quotient

Answers

Let’s write the algorithm in the form of a pseudocode!

Pseudocode:Quotient_of_Two_Number
Declare: num1, num2, quotient
START
Display (Enter a number)
Read num1
Display (Enter a number)
Read num2
quotient = num1/num2
Print (“Quotient”)
STOP

When a sentinel is used in a (______/posttest) loop to validate data, the loop repeats as long as the input is (valid/______). pretest, invalidPress enter after select an option to check the answer posttest, invalidPress enter after select an option to check the answer pretest, validPress enter after select an option to check the answer posttest, valid

Answers

Answer:

When a sentinel is used in a (pretest/post test) loop to validate data, the loop repeats as long as the input is (valid/invalid).

Explanation:

Required

Fill in the gaps

Sentinel are used to validate or invalidate loops (pretest and post test loops).

Since , some parts of the brackets have aready been filled, we simply complete the blanks with the opposite of the term in the bracket. i.e. the opposite of post test is pretest and the opposite of valid is invalid.

So, the blanks will be filled with pretest and invalid.

how to make an app according to peoples will

Answers

Answer:

Follow these steps to create your own app:

1)Choose your app name.

2)Select a color scheme.

3)Customize your app design.

4)Choose the right test device.

5)Install the app on your device.

6)Add the features you want (Key Section)

7)Test, test, and test before the launch.

8)Publish your app.

Explanation:

(!!_!!)

You are the IT administrator for a small corporate network. The employee in Office 1 needs your assistance managing files and folders. Your task is to use the command prompt to complete the following:

a. Create the D:​\​utilities​\​recover directory. Use the md or mkdir command to create (make) a directory.
b. Delete the D:​\​software​\​arch98 directory and all of its files.
c. Use the rd command to delete (remove) a directory.
d. Use the /s switch to remove the directory and all of its contents at once.

Answers

Answer:

(a) mkdir /d D:\utilities\recover    

     or

    mkdir D:\utilities\recover    

(b) rd  /s  D:​\software​\arch98

Explanation:

(a) To make a new directory we use the md or mkdir command followed by the name of the directory as follows;

mkdir [name_of_directory]

The name of the directory could also be a relative or absolute path depending on the request.

In the task, the specified directory uses an absolute path given as D:​\​utilities​\​recover. This path is in a drive D. Therefore, if you are in another drive different than D, to run this command, it is a great idea to do that with the /d switch.

In summary:

i. if in drive D, to make a directory D:\utilities\recover, type the following command;

mkdir  D:\utilities\recover    

ii. if otherwise in a different drive, type the following command.

mkdir /d D:\utilities\recover

(b) To delete a directory, we use the rd or rmdir command. If the directory has contents that also need to be deleted, we use the switch /s alongside the rd or rmdir.

In the task given, the directory to be deleted is D:\software\arch98. This includes deleting all of its files too. To do this, type the following command;

rd /s D:\software\arch98

In TCP, a welcoming socket is (a) used by the server to receive incoming request from a client (b) closed by the server when interaction with that client is completed (c) bound to a specific port number (d) all of the above

Answers

Answer: (d) all of the above

Explanation:

The Transmission Control Protocol refers to a transport protocol which is used to ensure the transmission of packets on top of IP.

In TCP, a welcoming socket is:

• used by the server to receive incoming request from a client

• closed by the server when interaction with that client is completed

• bound to a specific port number.

Therefore, the correct option is "All of the above".

Consider three strings instr1, instr2 and instr3 having only lowercase alphabets. Identity a string outstr, with the smallest possible length such that when strings instr1, outstr and instr2 are concatenated in the same order instr3 becomes a substring of the concatenated string. Print the smallest possible length of (instr1 + outstr - instr2) satisfying the given criteria. Note: The string outstr can also be an empty string Input Format: The first second and third line contain strings instr1instr2 and instr3 respectively. Read the input from the standard input stream. Output Format: Print the smallest possible length of (instr1 + outstr + instr2) satisfying the given criteria. Print the output to the standard output stream You're Explanati CIAR Sample Output Jusuen that when strings instr 1. outstr and instr2 are concatenated in the same order instr3 becomes a substring of the concatenated string. Print the smallest possible length of (instr. outstr - instr2) satisfying the given criteria

Answers

10 points is nothing to answer this junk just saying

Choose a topic related to a career that interests you and think about how you would research that topic on the Internet. Set a timer for fifteen minutes. Ready, set, go! At the end of fifteen minutes, review the sources you have recorded in your list and think about the information you have found. How w

Answers

Answer:

Following are the solution to the given question:

Explanation:

The subject I select is Social Inclusion Management because I am most interested in this as I would only enhance my wide adaptability and also people's ability to know and how I can manage and understand people.

Under 15 min to this location. The time I went online but for this issue, I began collecting data on the workability to tap, such as a connection to the monster, glass doors, etc.

For example. At example. I get to learn through indeed.com that the HR manager's Avg compensation is about $80,600 a year. I can gather from Linkedin data about market openings for HR at tech companies like Hcl, Genpact, etc. Lenskart has an HR director open vacancy.

This from I learns that for qualified practitioners I have at least 3 years experience in the management of human resources & that I need various talents like organizing, communications, technical skills, etc.

Other Questions
Simon, a respected high school teacher, has a cousin who is infamous for his criminal activities. When Bob, a police officer, gets an alert about an absconding bank robber in the area where Simon lives, Bob raids Simon's house without a warrant. He conducts a thorough search of Simon's home for clues related to the robbery and the missing money, but he does not find anything against Simon. In this scenario, Bob has violated the _____ to the Constitution. Bharti Airtel is the largest cellular provider in India, with more than 300 million customers as of 2014. It also supplies broadband and telephone services, as well as many other telecommunications services to both domestic and corporate customers. Until a few years ago Airtel did not own its own towers, which was a particular strength of some of its competitors, such as Hutchison Essar. Towers are important if your company wishes to provide wide coverage nationally. In a SWOT analysis, this point would be ________. I am desperate please help. Consider what you've learned about suspense, foreshadowing, sensationalism, inevitability, coincidence, and sentimentality. Describe each of these considerations and the result of an author's poor handling of each one. Help me fast 50 points!!!!!!!! Kelly is going two work two part-time jobs during the school year. When she works for her dad, she will make $8.00 per hour. When she works at a day care center, she will make $14.00 per hour. To pay her car payment, Kelly needs to make at least $84.00 a week and can work no more than 10 hours total per week. Write an inequality to represent the difference combinations of hours working for her dad,X, and hours working for the daycare center,Y, Kelly can work if she wants to earn at least $84 per week Is (x - 2) a factor of y = x3 + 2x2 - 9x - 18 ?A: YesB: NoC: Cannot be determined Before dating, a young person should consider their morals, _________, beliefs, what is healthy, what is safe, and right for them personally. Flagstaff Company has budgeted production units of 9,000 for July and 9,200 for August. The direct labor requirement per unit is 0.50 hours. Labor is paid at the rate of $22 per hour. The total cost of direct labor budgeted for the month of August is: find the coordinate for the mid point of the segment with the points given (-16,0)(0,-16)(-8,-8)(8,0)(8,8) 3x-1. 5Write an equalion andsolve for x if the arcaof the rectangle is 55square units. What are the raw materials (reactants/goes into) for photosynthesis?A. water and glucoseB. carbon dioxide and water C. glucose and oxygen On June 30, 2024, L. N. Bean issued $30 million of its 8% bonds for $28 million. The bonds were priced to yield 10%. Interest is payable semiannually on December 31 and July 1. If the effective interest method is used, how much bond interest expense should the company report for the 6 months ended December 31, 2024 Rhonda deposited $3000 in an account in the Merrick National Bank, earning 4.2% interest, compounded annually. She made no deposits or withdrawals. a) Write an equation that can be used to find B, her account balance after t years. b) Find the amount in her bank account after 6 years to the nearest cent Which of the following conditions most clearly helped political machines riseto power in the late 19th century?A. Industrialization of farmsB. Monopolies in big businessC. Poverty among urban workersD. Patronage among political officials Jason bought 3 shirts that each cost the same. He had a coupon for $10 off and he spent $65 altogether. Which equation can be used to find the cost of each shirt? After reading these lyrics what kind of song would you say this is?no foreguntes msSi este amor es verdadSi es un sucito a realidado un simple vlaje espacialQuiero cantarte to que sientoO a love songO a children's songO a patriotic songO a Christmas song Which relation represents a function ? simplify 15 to the power of 18 over 15 to the power of 3 7p+6q-2p+q pls tell me the answer plssssssssssssssssssssssss