Answer:
according to britannica :
"Robotics, design, construction, and use of machines (robots) to perform tasks done traditionally by human beings. ... Robots are widely used in such industries as automobile manufacture to perform simple repetitive tasks, and in industries where work must be performed in environments hazardous to humans"
Explanation:
Helllllllllppppppppppp
Answer:
9
Explanation:
"++" at the beginning increases your "x" by 1 before using it.
if it placed after your variable, it will increase it after your program used it.
Write a Raptor program that will generate a random number between 1 and 10; do not display the randomly generated number. Let the user guess within 3 tries what the random number is. Display hints to help the user, for example "Your guess was too high!". Display appropriate messages based on each try, for example, "1 remaining try" or "You guessed correctly!"
Answer:
Using javascript, explanation with javascript comment
Explanation:
function guessNumber(){
var randomize= math.random()*10;
var roundrand= math.floor(randomize);
var getInput= prompt("guess number from 1 to 10");
var x= 3;
do(
if(getInput>roundrand){
Console.log("your guess is too high");
guessNumber();
}
if(getInput<roundrand){
Console.log("your guess is too high");
guessNumber();
}
else{
Console.log("you are correct pal!");
break;
}
)
while(x<=3)
}
/*Observe that we have used a recursive function that calls the function guessNumber again inside the function definition if the input fails the if condition and doesn't guess correctly. It checks for a correct number 3 times with the do... while loop and breaks out of the function once the user enters a correct input.*/
Write a program num2rome.cpp that converts a positive integer into the Roman number system. The Roman number system has digits I 1 V 5 X 10 L 50 C 100 D 500 M 1,000 Numbers are formed according to the following rules: a. Only numbers 1 to 3,999 (inclusive) are represented. b. As in the decimal system, the thousands, hundreds, tens, and ones are express separately. c. The numbers 1 to 9 are expressed as I 1 II 2 III 3 IV 4 V 5 VI 6 VII 7 VIII 8 IX 9 As
Answer:
Explanation:
#include <stdio.h>
int main(void)
{
int num, rem;
printf("Enter a number: ");
scanf("%d", &num);
printf("Roman numerals: ");
while(num != 0)
{
if (num >= 1000) // 1000 - m
{
printf("m");
num -= 1000;
}
else if (num >= 900) // 900 - cm
{
printf("cm");
num -= 900;
}
else if (num >= 500) // 500 - d
{
printf("d");
num -= 500;
}
else if (num >= 400) // 400 - cd
{
printf("cd");
num -= 400;
}
else if (num >= 100) // 100 - c
{
printf("c");
num -= 100;
}
else if (num >= 90) // 90 - xc
{
printf("xc");
num -= 90;
}
else if (num >= 50) // 50 - l
{
printf("l");
num -= 50;
}
else if (num >= 40) // 40 - xl
{
printf("xl");
num -= 40;
}
else if (num >= 10) // 10 - x
{
printf("x");
num -= 10;
}
else if (num >= 9) // 9 - ix
{
printf("ix");
num -= 9;
}
else if (num >= 5) // 5 - v
{
printf("v");
num -= 5;
}
else if (num >= 4) // 4 - iv
{
printf("iv");
num -= 4;
}
else if (num >= 1) // 1 - i
{
printf("i");
num -= 1;
}
}
return 0;
}
list three social implications of the wider range of piracy
Answer:
Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.
write a short note about applications of computer
Answer:
Computer is very effective machine which can be used for teaching, learning, online bill payment, watching TV, home tutoring, social media access , playing games, internet access, etc. It also provides us to communicate with our friends and relatives although, they are in corner of world......
what are binary code
Answer:
Binary code is a coding system using binary digits 0 and 1 to represent a letter, digit, or other characters in a computer or other electronic device. The binary code assigns a pattern of binary digits, also known as bits, to each character, instruction, etc.
How can the Column settings be accessed?
Layout tab, Page Setup group
Layout tab, Paragraph group
Layout tab, Arrange group
Design tab, Document Formatting group
what is technology in computer
Answer:
she is right or he :)
Explanation:
Answer:
well its somthing
Explanation:
Which of the following statements about RAID is correct? Group of answer choices All RAID configurations provide fault tolerance for up to one disk failure A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration RAID 5 allows up to two disk failures During a RAID 5 disk failure, read performance is not impacted A RAID 1 configuration of four 1TB disks has a storage capacity of 2TB
Answer:
A RAID 1 configuration of 4 disks has higher storage capacity than a RAID 0 configuration
Explanation:
Redundant Array of Independent Disks(RAID) are multiple physical drives arranged in logical units to provide data redundancy and increased performance. They are
RAID 1 configuration duplicates data storage, albeit of lower performance than RAID 0. Also called disk mirroring because it mirrors data on two or more disks, it provides at least two drives that are used interchangeably or together.
A RAID 1 is the configuration of the 4 disks that has higher storage capacity than a RAID 0 configuration. This option A is correct.
What is the RAID ?The RAID is a redundant array of the inexpensive disks and refers to the storage visualization technology that combines multiple physical disk drives. Its contract with earlies highly reliable mainframe disk drives.
The RAID one needs mini of two physical drives as the data is given simultaneously in two places. These drives are mirror images as ne fails the other can take over.
Find out more information about the RAID.
brainly.com/question/26980060.
A college student borrowed his roommate's notebook computer without permission because he needed to write a term paper that was due the next day. While the computer was sitting open on the student's desk overnight, a water pipe in the ceiling began leaking and water dripped down on the computer, rendering it inoperable. A computer repair service estimated that it would cost $500 to repair all the damaged components. At the time it was damaged, the computer was worth $700. If the roommate sues the student for the damage caused to the computer, what will be the extent of his recovery
Answer: $700
Explanation:
Based on the information given in the question, if the roommate sues the student for the damage caused to the computer, the extent of his recovery will be $700.
In this scenario, the student has committed a conversion as the right of possession of the roommate's computer was interfered with by the student as he took it without the roommate's permission, which later sustained damage that was more than 70% of the computer's value. In such case, the extent of the recovery will be the fair market value which is $700.
ou use productivity apps on your iPad tablet device while traveling between client sites. You're concerned that you may lose your iPad while on the road and want to protect the data stored on it from being compromised. Currently, your iPad uses a 4-digit PIN number for a passcode. You want to use a more complex alpha-numeric passcode. You also want all data on the device to be erased if the wrong passcode is entered more than 10 consecutive times. What should you do
Answer:
Enable the Erase data optionDisable the simple passcode optionExplanation:
Most smartphone security experts agree that one way to prevent unauthorized access to one's iPad is to enable the erase data feature. Enabling this feature is believed to allow the possibility of all data on the device to be erased if a wrong passcode is entered after a specified number of times.
Of course, it is also possible to set a complex alphanumeric passcode, however, you'll need to first disable the simple passcode option.
state 4 & circumstances under which warm
booting of a computer may be necessary
Answer:
to close an open application
How to save a file for the first time?
Answer:
i have the website version of word but you want to click file and save as then click whatever option you need to personly if you are submitting online i download it to my computer then I will submit it from downloads. thats how i do it
An open area is one that has something in the path of travel that blocks the continuation of travel in that lane. a) True b) False 2 Questions 2 A driver's emotions usually have no impacton his or her ability to effectively implement a search system. a) True b) False 3 Question 3 Glare is enhanced by heat and impairs a driver's visibility. a) True b) False 4 Question 4 A driver must maintain which of the following to ensure implementation of an effective space management system
Answer:
Question 1. B) False
Question 2. B) False
Question 3. A) True
Question 4.
a) Looking ahead
b) Lookout for hazards
c) Focus on the big picture
d) Ensure visibility of her or his vehicle
e) Always have an exit route for safety
Explanation:
Question 1. An open area or condition is a availability of a large area space to drive unrestricted. In an open area, the road ahead is open space and there is continuation of the lane of travel and there is nothing that blocks the road
Therefore, the correct option is B) False
Question 2. A drivers emotion such as anger has remarkable influence on the behavior while driving such that it can impact on his or her ability for appropriate search system implementation which is response based
Therefore, the correct option is B) False
Question 3. Glare sensation is exacerbated by the presence of increased heat, an obstructs the view
Therefore, the correct option is A) True
Question 4. Effective space management is implemented by a driver through;
a) Looking ahead of the vehicles n front
b) Maintaining constant lookout for hazards
c) Ensure that the big picture is in focus
d) Ensure that the vehicle he or she is driving can be seen
e) Ensure that an escape route is always available
what is local technology ? give examples
Answer:
the technologynwhich is used in our locality os calleg local technology
ex. biogas farm , modern methods of 1transport etc
You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?
a. Identify clusters
b. Identify sequences
c. Classify data
d. Identify associations
Answer: Identifying sequences
Explanation:
Since the user wants to know if there are any particular activities that the customers engage in, or the types of purchases made in the month before or after purchasing select items from your store, therefore, the data mining software can be used in identifying sequences.
In this case, the data mining software can't be used in classifying data whether into structured or unstructured data. Furthermore, the identification of clusters and associations aren't the correct answers.
Therefore, the best option is B.
What is a status update?
A. An automatic enhancement to a computer's performance
B. Any new software that can be downloaded for free
C. A short post in which users write what they are doing
D. A news flash that announces new government posts
i was able to solve the question :))
Answer:
ill take the points anyway
Explanation:
Question 1 of 30
Match each type of tax with an example of its use.
Consumption tax
?
10% on profits from the
sale of a house
Capital gains tax
6% tax on all sales
Excise tax
$5 tax on a cable
television line
Payroll tax
15% tax to pay for Social
Security
Capital gains tax - 10% profits from sale of the house
Consumption tax - 6% tax on all sales
Excise tax - 5$ tax on cable tv line
Payroll tax - 15% tax to pay for social security
On SnapI blocked someone, unblocked them and I want to add them again but I forgot their username. Is there anything I can do? Does snap have a list of like my former friends or people I’ve blocked?
Answer:
There is no list of people you had blocked formerly, however you should have seen their username when unblocking them? That's the only way I can think to find their user. Maybe if you have a friend who knows their username, you can get it that way. Or if you remember just a bit of it or their first/last name, you can try searching that.
how to convert binary number into decimal number
Answer:
Multiplying by 2
Explanation:
The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .
Hope it is helpful to you
Answer:
HOW TO CONVERT BINARY INTO DECIMAL SYSTEM.
The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):
decimal = d0×20 + d1×21 + d2×22 + ...
Example #1.SEE,
Find the decimal value of 1110012:
binary number: 1 1 1 0 0 1
power of 2: 25 24 23 22 21 20
1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710
Explanation:
YOU WILL LEARN MORE IN HIGHER CLASSES.
Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworkers hotspot but is still unable to connect to the internet.What is the cause of the issue?
Answer:
Airplane mode has been set on the tablet.
Explanation:
Joe a frequent visitor to a branch office attempts to connect his tablet to the office wireless network but is unable to connect to the internet even though he has verified that the SSID and password are correct. Joe attempts to connect to a coworker's hotspot but is still unable to connect to the internet.
This is because the Airplane mode has been set on the tablet.
Your knowledge of algorithms helps you obtain an exciting job with the Acme Computer Company, along with a $10,000 signing bonus. You decide to invest this money with the goal of maximizing your return at the end of 10 years. You decide to use the Amalgamated Investment Company to manage your investments. Amalgamated Investments requires you to observe the following rules. It offers n different investments, numbered 1 through n. In each year j , investment i provides a return rate of rij . In other words, if you invest d dollars in investment i in year j , then at the end of year j, you have drij dollars. The return rates are guaranteed, that is, you are given all the return rates for the next 10 years for each investment. You make investment decisions only once per year. At the end of each year, you can leave the money made in the previous year in the same investments, or you can shift money to other investments, by either shifting money between existing investments or moving money to a new investement. If you do not move your money between two consecutive years, you pay a fee of f1 dollars, whereas if you switch your money, you pay a fee of f2 dollars, where f2 > f1.
a) The problem, as stated, allows you to invest your money in multiple investments in each year. Prove that there exists an optimal investment strategy that, in each year, puts all the money into a single investment. (Recall that an optimal investment strategy maximizes the amount of money after 10 years and is not concerned with any other objectives, such as minimizing risk.)
b) Prove that the problem of planning your optimal investment strategy exhibits optimal substructure.
c) Design an algorithm that plans your optimal investment strategy. What is the running time of your algorithm?
d) Suppose that Amalgamated Investments imposed the additional restriction that, at any point, you can have no more than $15,000 in any one investment. Show that the problem of maximizing your income at the end of 10 years no longer exhibits optimal substructure.
Answer:
C
Explanation:
A firm would be most likely to establish an enterprise portal if it wanted to Multiple Choice prevent outsiders from using its information network. allow users to access different areas of its network depending on their relationship to the firm. prevent viruses from being downloaded from the company's website. search for hidden patterns and unknown relationships among data stored in different information systems.
Answer:
prevent outsiders from using its information network.
Explanation:
The firm would use a portal to create a network or intranet for all its information because only employees would have access to it.
10 ICTs that encourage reading...?
10 ICTs that encourage reading are given below:-
laptop / desktopprojectorphotocopierprinterIpadswebboardsinteractive white boardmicrophoneTablets Internet .Hope it is helpful to you
What is a compiler?
a tool used to integrate multiple software programs
a tool used to extract a single software program from an integrated collection of programs
a computer software application that translates binary computer machine language into a computer programming language
a computer software application that translates a computer programming language into a binary computer machine language
Answer:
A computer software application that translates a computer programming language into a binary computer machine language
Explanation:
ita in the answer
Answer:
c
Explanation:
im god
Write a program to input value of three sides, to check triangle is triangle is possible to form of not
Answer:
Explanation:
import java.util.Scanner;
public class KboatTriangleAngle
{
public static void main(String args[]) {
Scanner in = new Scanner(System.in);
System.out.print("Enter first angle: ");
int a1 = in.nextInt();
System.out.print("Enter second angle: ");
int a2 = in.nextInt();
System.out.print("Enter third angle: ");
int a3 = in.nextInt();
int angleSum = a1 + a2 + a3;
if (angleSum == 180 && a1 > 0 && a2 > 0 && a3 > 0) {
if (a1 < 90 && a2 < 90 && a3 < 90) {
System.out.println("Acute-angled Triangle");
}
else if (a1 == 90 || a2 == 90 || a3 == 90) {
System.out.println("Right-angled Triangle");
}
else {
System.out.println("Obtuse-angled Triangle");
}
}
else {
System.out.println("Triangle not possible");
}
}
}
OUTPUT:
Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evaluate threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.
Answer:
more than one safeguard may be necessary.
Explanation:
The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.
But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.
write difference between dvd r and dvd ram( Any 3 points or any a little big paraph for test)
Answer:
Following are the differences two the given questions:
Explanation:
DVD-R:
DVD-R is a common DVD recordable media that seems like a conventional DVD, and it can only be used once for writing data or analyzing information many times.It is identical to a regular DVD, however, it can be used to record data like a CD-R. Once a DVD-R is "burned," it cannot be read to anymore.There is a 650 nm range recording, nicknamed "Authoring DVD-R." "DVD-R for general" is another format with protection against duplicating, which records at 635 nm. Whilst DVD-R(a) and DVD-R(g) may read forms of one another, they cannot write formats of each other.DVD-RAM:
This is a technology for optical DVD storage where the information may be read, deleted & written constantly.It offers outstanding integrity of data, preservation, and avoidance of damages that can be used for basic storing data, data preservation, or data backup.Those disc drives can indeed be frequently recorded and deleted, and only compatible with DVD-RAM format devices produced by corporations.Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and right are gone. So "ab*cd" yields "ad" and "ab**cd" also yields "ad". starOut("ab*cd") → "ad" starOut("ab**cd") → "ad" starOut("sm*eilly") → "silly"
Answer:
Explanation:
The following code is written in Java and uses a for loop with a series of IF ELSE statements to check the next and previous characters in a string. Checking to make sure that there are no asterix. If so it adds that character to the String variable output. Which is returned to the user at the end of the method. Two test cases have been created and the output can be seen in the attached image below.
class Brainly {
public static void main(String[] args) {
System.out.println(starOut("sm*eilly"));
System.out.println(starOut("ab**cd"));
}
public static String starOut(String str) {
String output = "";
for (int i = 0; i < str.length(); i++) {
if ((i != 0) && (i != str.length()-1)) {
if ((str.charAt(i-1) != '*') && (str.charAt(i+1) != '*') && (str.charAt(i) != '*')) {
output += str.charAt(i);
}
} else {
if ((i == 0) && (str.charAt(i) != '*') && (str.charAt(i+1) != '*')) {
output += str.charAt(i);
} else if ((i == str.length()-1) && (str.charAt(i) != '*') && (str.charAt(i-1) != '*')) {
output += str.charAt(i);
}
}
}
return output;
}
}