which of the following would be considered an input device? cpu cpu microsoft word microsoft word keyboard keyboard printer

Answers

Answer 1

A keyboard is regarded as an input device. Examples of input devices include scanners, mice, joysticks, and digital cameras.

Which of the following statements—that an output device provides information to the computer and an input device receives it—is true?

A computer's output device transmits information to an input device, and the other way around. The computer provides information to an input device, which receives it, and the other way around. Both assertions are false.

What kind of hardware is used in computers?

Computer hardware refers to the actual physical components of a computer, such as the chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, and speakers.

To know more about input device visit :-

https://brainly.com/question/13014455

#SPJ4


Related Questions

A clique of size k is a subgraph that consists of k vertices that are all connected to each via an edge, i.e., all k(k−1)/2 edges exists. In class we proved that the problem of finding whether a graph contains a k -elique is NP-complete. Consider a similar problem: a k -clique with spikes consists of 2k vertices such that the first k elements form a clique and the rest k vertices are connected via an edge a different vertex of the clique. onsider a similar problem: Given a graph G and a number k find whether a k -clique with spikes exists. Show that the problem is NP-conplete.

Answers

A k-clique is a relaxed clique in social network analysis, i.e. a quasi-complete sub-graph.In a graph, a k-clique is a subgraph where the distance between any two vertices is less than k.

What exactly is a K-clique subgraph? A k-clique is a relaxed clique in social network analysis, i.e. a quasi-complete sub-graph.In a graph, a k-clique is a subgraph where the distance between any two vertices is less than k.A graph can readily display a limited number of vertices.A clique of size k in a graph G is a clique of graph G with k vertices, which means that the degree of each vertex in that clique is k-1.So, if there is a subset of k vertices in the graph G that are related to each other, we say that graph has a k-clique.A clique is a subgraph of a graph that has all of its vertices linked. The k-clique problem is concerned with determining the biggest complete subgraph of size k on a network, and it has numerous applications in Social Network Analysis (SNA), coding theory, geometry, and so on.

To learn more about A clique refer

https://brainly.com/question/1474689

#SPJ4

this feature in powerpoint makes slide objects move on a slide. sorting movement transition animation

Answers

Sorting movement transition animation allows you to create customized animation effects that you can leave to run on their own or synchronize with other elements.

What is powerpoint?

PowerPoint is a presentation program developed by Microsoft. It is a powerful tool used to create professional-looking presentations that can include animation, text, graphics, and other elements. PowerPoint can be used to present information in a variety of formats, including slideshows, handouts, and reports. It is a very useful tool for creating presentations and can be used to create presentations for business meetings, classes, conferences, and more. PowerPoint presentations can be shared with others online or in person.

You can add movement to pictures, clip art, shapes, and text boxes. adding animation to your presentation makes it more dynamic and helps to bring points to life for the audience. you can also use animation to draw attention to a certain element on the screen.

Movement transition animation in powerpoint can be used to add movement to pictures, clip art, shapes, and text boxes. You can customize the animation effects for each object, including the speed and direction of the movement. You can also create synchronized animation between multiple objects and create effects such as bouncing, fading, and spinning. You can also adjust the duration of the animation to make it shorter or longer.

By using movement transition animation in powerpoint, you can bring your presentations to life and catch the attention of your audience. You can create customized animation effects to draw attention to a certain element or to provide a visual aid to help explain a concept. The animation can also be synchronized with other elements to create an eye-catching sequence. You can also use animation to emphasize certain points or add a sense of excitement to your presentation.

To know more about power point click-

https://brainly.com/question/1130738

#SPJ4

True or False: A performance baseline is helpful in troubleshooting because it contains a backup of system critical data.
a. True
b. False

Answers

To make an effective backup plan, the very first step is to determine and identify the critical data. Hence the statement is true.

What is backup of system critical data?Organizations, individuals, and professionals mostly take backup regularly to avoid the risk of data loss.A backup plan is a plan that is created by the organizations or professionals to ensure that have backed up their essential and critical data if there is any risk of data loss. If data get loss then the organization may suffer. Because data is crucial for the organization or for professionals. If data get loss then the organization may need to minimize the downtime as much as possible. When organizations have their data backed up, then they would be in a position to restore the data that guaranty the ongoing business operations.Identify the critical data and determine the data importance: it is very first to identify the critical data for backup. In this step, data importance is determined, and the critical data are identified.

To learn more about System Critical refer to:

https://brainly.com/question/27332238

#SPJ4

which of the following steps will most likely help you to find the specific cause of the error without the need to re-install windows?

Answers

Driver Signature Enforcement must be disabled. Launch the Recovery Environment's tools and use them.

How to re-install windows?Click the Start menu, which is typically found at the bottom-left corner of the screen, to reinstall Windows 10 from your settings. From there, select the gear icon or Setting button, which ought to be located in the lower-left corner of the Start menu. Select "Update and Security" by clicking the icon, which resembles two curving arrows.You can reinstall Windows 11 to try and resolve your difficulties and restore your PC to a cleaner condition if you're experiencing issues with Windows 11 on your computer or you want a clean copy of Windows 11 without the clutter of outdated files or apps. Low disc space could be to blame if your computer isn't operating as it should or if you're having problems with Windows 11.

To learn more about  re-install windows refer to:

https://brainly.com/question/29852089

#SPJ4

True or False: Modern managers need both financial and nonfinancial information that traditional GAAP-based accounting systems are incapable of providing.

Answers

Answer:True

Explanation:

Managerial accounting focuses on internal users, including executives, product managers, sales managers, and any other personnel in the organization who use accounting information for decision-making. focuses on internal users—executives, product managers, sales managers, and any other personnel within the organization who use accounting information to make important decisions. Managerial accounting information need not conform with U.S. GAAP. In fact, conformance with U.S. GAAP may be a deterrent to getting useful information for internal decision-making purposes. For example, when establishing an inventory cost for one or more units of product (each jersey or hat produced at Sportswear Company), U.S. GAAP requires that production overhead costs, such as factory rent and factory utility costs, be included. However, for internal decision-making purposes, it might make more sense to include nonproduction costs that are directly linked to the product, such as sales commissions or administrative costs.

Because of the vast array of available technology, there is evidence that information technologies improve learning. true or false.

Answers

The physiological aspect of listening is hearing, which is the physiological response to sound waves striking a functioning eardrum. Interpreting is the process of putting all the information we've chosen and arranged together to make meaning of communication.

What stage of the hearing process interprets and gives meaning to the stimuli?

Selecting, organizing, and interpreting information is the process of perception. Additionally, it entails the exchange of meaning with other people. This process has an impact on communication since our responses to stimuli—whether they are people or objects—depend on how we perceive them.

Which of the following physiological processes is a passive one that receives sound waves and sends them to the brain for analysis?

Receiving sound waves and sending them to the brain, where they are evaluated, constitutes the physiological passive process of hearing.

To know more about physiological component visit;

https://brainly.com/question/11532740

#SPJ4

Write a program
that asks the user to enter seven
ages and then finds the sum. The input weights
should allow for decimal values.
Sample Run
Enter Age: 25.2
Enter Age: 26.7
Enter Age: 70
Enter Age: 30
Enter Age: 52.6
Enter Age: 24.4
Enter Age: 22
Sum of Ages
250.9

Answers

C++ is an extremely capable general-purpose programming language. It can be used to create operating systems, browsers, and games, among other things.

What is the program?C++ supports various programming styles such as procedural, object-oriented, functional, and so on. As a result, C++ is both powerful and flexible.Because C++ is statically typed, it compiles code faster than Python. Python is slower than C++ because it supports dynamic typing and relies on an interpreter, both of which slow down compilation.

Given,

The input is entering seven ages.

The output is the sum of ages.

The C++ program code of the given problem is:

#include <iostream>

int main(int argc, char* argv[])

{  

  float sum = 0;

  for(int i=0;i<7;i++)

{

      float tmp;

      std::cout << "Enter age: "; std::cin>>tmp;

      sum+=tmp;

  }

  std::cout << "Sum of ages = " << sum << std::endl;

  return 0;

}

To learn more about C++ program refer to :

https://brainly.com/question/27019258

#SPJ1

Which of the following blocks would most likely be used to create a string constant from scanned code?

Question 15 options:

{ append_scan(yytext); return TOKEN_STRING; }


{ return TOKEN_STRING; }


{ append_scan(yytext); return TOKEN_STRING; }


{ $$ = createLiteral(scanned_text); }

Answers

The blocks that would most likely be used to create a string constant from scanned code is { append_scan(yytext); return TOKEN_STRING; }. The correct option is c.

What is scanned code?

Code scanning makes it possible to find vulnerabilities and fix them before they are released into production, removing the cybersecurity risks they present.

When scanning a string, the literal "EOL" means "end of the line." When Python encounters an EOL error, it means that it has reached the end of a line in a string. You might have done this by forgetting the closing quotes or by trying to make a string span more than one line. Single or double quotes around strings.

Therefore, the correct option is c, { append_scan(yytext); return TOKEN_STRING; }.

To learn more about scanned code, refer to the below link:

https://brainly.com/question/15098539

#SPJ1

Which of the following activities is least likely to result in a segmentation fault?

Question 19 options:

Removing an element from the middle of a linked list without fixing the pointers afterwards


Growing the stack too large, such as with an unbounded recursive function


Trying to write into protected space, such as modifying the code segment of the program


Accessing a memory address outside its boundaries

Answers

From the following activities, the one that is least likely to result in a segmentation fault is: "Removing an element from the middle of a linked list without fixing the pointers afterwards" (Option A)

What is a segmentation fault?

A segmentation fault or accessibility violation is a fault, or failure condition, reported by memory-protected hardware that alerts an operating system that software has attempted to access a restricted portion of memory. This is a type of generic protection fault on ordinary x86 machines.

Check whether your compiler or library can be made to check limits on I at least in debug mode, to remedy a segmentation error. Buffer overruns that write trash over excellent pointers can trigger segmentation faults. These actions will significantly minimize the chance of segmentation faults and other memory issues.

Learn more about Segmentation Fault:
https://brainly.com/question/15412053
#SPJ1

Suppose that move is a member function of the class vehicleType. Which of the following statements declare move to be a pure virtual function.
(i) virtual void move(double a, double b) const = 0;
(ii) virtual void move(double a, double b) 0 = const;
A) Only (ii) B) Only (i) C) Both (i) and (ii) D) None of these.

Answers

Let's assume that move is a function of the vehicleType class. virtual void move(double a, double b) const = 0.

What accomplishes a class method?

A class method is a method that is tied to the class itself, not to its objects. Because the class parameter refers to the class rather than the object instance, they have access to the class's state. It can alter a class state so that it would affect every instance of the class.

What are the features and functions of a class?

It is used to describe and comprehend objects in more detail than just their label through the usage of feature, function, and class.

To know more about vehicleType visit :-

https://brainly.com/question/14567843

#SPJ4

A technician assist Joe, an employee in the sales department who needs access to the client database, by granting him administrator privileges. Later, Joe discovers he has access to the salaries in the payroll database.Which of the following security practices was violated?

Answers

The following security procedures were broken in accordance with the assertion made above on the principle of least privilege.

Giving an example, what is a database?

A collection is a planned gathering of data. They enable the manipulation and storage of data electronically. Data administration is made simple by databases. Let's use a database as an example. A database is used to hold information on people, their mobile numbers, or other contact information in an online telephone directory.

What purposes serve databases?

Any set of data or information that has been properly structured for quick searching and retrieval by a machine is referred to as a database, often known as an electronic database. Databases are designed to make it easy to save, retrieve, edit, and delete data while carrying out various data-processing tasks.

To know more about Database visit:

https://brainly.com/question/6447559

#SPJ4

To add drop-down lists to your worksheet with predetermined options for each city name, you decide to use _____

Answers

To add drop-down lists to your worksheet with predetermined options for each city name, you decide to use Data validation.

What is worksheet?

In the original sense of the word, a worksheet refers to a piece of paper used for work. They take many different forms, but are most frequently connected to tax forms, accounting, and other business settings. The worksheet made of paper is increasingly being replaced by software.

It might be a printed page that a kid fills out with a writing implement. There is no requirement for additional supplies. It is "a piece of paper used to record work schedules, working hours, special instructions, etc. a piece of paper used to jot down problems, ideas, or the like in a rough form." A worksheet used in education might contain questions for students and spaces for them to record their responses.

Learn more about worksheet

https://brainly.com/question/25130975

#SPJ4

LAB: Reverse list Complete the reverse_listo function that returns a new string list containing all contents in the parameter but in reverse order. Ex: If the input list is. ['a', 'b', 'c'] then the returned list will be: ['e', 'b', 'a') Note: Use a for loop. DO NOT use reverse() or reverse(). 3318701732513 LAB ACTIVITY 12.11.1: LAB: Reverse list 0/10 main.py Load default template. 1 def reverse_list(letters): 2 # Type your code here. 3 4 if __name__ ='__main': 5 ch - ['a', 'b', 'c'i 6 print(reverse_list(ch)) # Should print ['c', 'b', 'o']

Answers

def reverse_list(letters): result = [] for s in letters: result = [s] + result return result if __name__ == '__main__': ch = ['a', 'b', 'c'] print(reverse_list(ch))

What exactly does a string mean?

In programming, a string is a form of data use to data type rather than integers. Letters, numbers, symbols, and even spaces may all be found in a string, which is a collection of characters.

Why is a string an object?

Java specifies strings as objects, in contrast to many other computer languages that describe strings as arrays. Java strings are also unchangeable. This indicates that once initialised, they cannot be changed.

To know more about String visit:

https://brainly.com/question/24275769

#SPJ4

which of the following statements are true? local variables do not have default values. data fields have default values. a variable of a primitive type holds a value of the primitive type. all of the above

Answers

True local variables do not all have default values. Data fields come with default options. A primitive type's value is stored in a variable of that type.

Exist default values for data fields?

Data fields come with default options. - No default values exist for local variables. A value of a primitive type is stored in a primitive type variable.

Which of the above techniques can be used to set up many variables with the same value at the beginning?

By using = back-to-back, you can give many variables the same value. This is helpful, for instance, when setting numerous variables to the same value at the beginning. After assigning a value, it is also possible to assign a different value.

To know more about primitive type's visit :-

https://brainly.com/question/16996584

#SPJ4

In the optimistic approach, during the phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values.
a. read b. validation
c. write d. shared

Answers

The correct answer for this problem is a. read

Why does it uses read phase?

In the optimistic approach to concurrency control in database systems, during the read phase, a transaction scans the database and reads the values it needs in order to execute the necessary computations.

This is often referred to as the "read" phase.

If the values have been modified by another transaction, the current transaction may need to abort and retry the process from the beginning. This ensures that transactions are able to execute without conflicting with one another and helps to maintain the integrity of the database.

To Know More About database, Check Out

https://brainly.com/question/29774533

#SPJ4

Virtual memory layout [20] You have a 64-bit machine and you bought 8GB of physical memory. Pages are 256KB. For all calculations, you must show your work to receive full credit. (a) [1] How many virtual pages do you have per process? (b) [1] How many bits are needed for the Virtual Page Number (VPN)? (Hint: use part (a)) (c) [1] How many physical pages do you have? (d) [1] How many bits are needed for the Physical Page Number (PPN)? (Hint: use part (c)) (e) [1] How big in bytes does a page table entry (PTE) need to be to hold a single PPN plus a valid bit? (f) [1] How big would a flat page table be for a single process, assuming PTEs are the size computed in part (e)? (g) [10] Why does the answer above suggest that a "flat page table" isn't going to work for a 64-bit system like this? Research the concept of a multi-level page table, and briefly define it here. Why could such a data structure be much smaller than a flat page table? (h) [4] Does a TLB miss always lead to a page fault? Why or why not?

Answers

We have 2^48 pages per person. The number of physical pages is 2^16.. 48 bits of VPN are mapped to 16 bits of PPN. The PTE size is 2B. The page table size is 2^49 B.

What are the steps to calculate pages per person, physical pages, VPN ,PTE size and the table size?

We know that;

Virtual Address = 64bits

Virtual Address Space = 2^Virtual Address = 2^64B

Physical Address Space = 4GB  = 4 X 2^30 B = 2^32 B

Physical Address = log_2(Physical Address Space )  = log_2(2^32)

                             = 32 * log_2(2) = 32 bits.

Page size = 64KB =2^16 B

a) No of Virtual Pages = Virutal Address Space/PageSize

                                      =  2^64B / 2^16 B = 2^48

b) NoOfPhysicalPages = PhysicalAddressSpace/PageSize

                                      =  2^32 B / 2^16 B = 2^16

c) VPN (in Bits) = log_2(NoOfVirtual Pages)   = log_2(2^48) = 48

    PPN(inBits)=log_2(NoOfPhysicalPages)=  log_2(2^16) = 16

Thus 48 bits of VPN are mapped to 16 bits of PPN.

d) PTE( Page Table Entry) holds the Physical Page Number of given Virtual Page along with many information about the page.

PTEsize = PPN(inBits) = 16 bits = 2B

e) Flat page table is single level page table. A page table contains the Physical Page number for a given page number. It helps in the translation of Vitual Address to Physical Address.

PageTableSize = NoOfVirtualPages*PTEsize = 2^{48}*2B = 2^49

To know moe about  pages refer:

https://brainly.com/question/1362653

#SPJ4

in this lab, your task is to discover whether arp poisoning is taking place as follows: use wireshark to capture packets on the enp2s0 interface for five seconds. analyze the wireshark packets to determine whether arp poisoning is taking place. use the 192.168.0.2 ip address to help make your determination. answer the questions.

Answers

Open Wireshark and choose enp2so from the Capture menu. To start the capture, select Blue fin. Choose the red box to stop after 5 seconds. Enter arp to display those packets in the Apply a display filter box. Look for lines in the Info column that contain the IP 192.168.0.2.

What is meant by which of the following when an attacker sends phony packets to link their MAC address?

An attack known as ARP spoofing involves a malicious actor sending forged ARP (Address Resolution Protocol) packets across a local area network.

To find duplicate IP address traffic, which of the following wireshark filters is used?

For Wireshark to only show duplicate IP information frames, use the arp. duplicate-address-frame filter.

To know more about Wireshark visit :-

https://brainly.com/question/13127538

#SPJ4

To select adjacent worksheet tabs, click the first tab, press down and hold down this key, and then click the last tab.Shift

Answers

To select the adjacent worksheet tabs, click the first tab, press down and hold down the shift key and then click the last tab.

What is Microsoft Word?

Microsoft Word is a word processor that may be used to create papers, letters, reports, and other types of writing of a professional calibre. It includes sophisticated capabilities that give you the best formatting and editing options for your files and projects.

What are examples of MS Word?

Application software that enables you to create, edit, and save any documents is an example of Microsoft Word. It was first developed by software engineers Richard Brodie and Charles Simoyi in 1983 and is now owned by Microsoft.

To know more about word processors visit:

https://brainly.com/question/14103516

#SPJ4

Descending selection sort with output during execution
Write a program that takes an integer list as input and sorts the list into descending order using selection sort. The program should use nested loops and output the list after each iteration of the outer loop, thus outputting the list N-1 times (where N is the size of the list).

Important Coding Guidelines:

Use comments, and whitespaces around operators and assignments.
Use line breaks and indent your code.
Use naming conventions for variables, functions, methods, and more. This makes it easier to understand the code.
Write simple code and do not over complicate the logic. Code exhibits simplicity when it’s well organized, logically minimal, and easily readable.
Ex: If the input is:

20 10 30 40
the output is:

[40, 10, 30, 20]
[40, 30, 10, 20]
[40, 30, 20, 10]
Ex: If the input is:

7 8 3
the output is:

[8, 7, 3]
[8, 7, 3]
Note: Use print(numbers) to output the list numbers and achieve the format shown in the example.

452172.2624902.qx3zqy7
LAB ACTIVITY
2.15.1: LAB: Descending selection sort with output during execution
0 / 10

Answers

Answer:

Here is a python program that implements the descending selection sort algorithm and outputs the list after each iteration of the outer loop:

def descending_selection_sort(numbers):

# loop through all numbers in the list

for i in range(len(numbers)):

# assume the maximum value is at the current index

max_index = i

# loop through all remaining numbers in the list

for j in range(i+1, len(numbers)):

# if a larger value is found, update the max index

if numbers[j] > numbers[max_index]:

max_index = j

# swap the maximum value with the current value

numbers[i], numbers[max_index] = numbers[max_index], numbers[i]

# output the list after each iteration of the outer loop

print(numbers)

# test the function with an example input

numbers = [20, 10, 30, 40]

descending_selection_sort(numbers)

The output of this program will be:

[40, 10, 30, 20]

[40, 30, 10, 20]

[40, 30, 20, 10]

This program follows the important coding guidelines specified in the question. It uses comments to explain the code, whitespaces around operators and assignments, and line breaks and indentation to improve readability. It also uses descriptive variable names and a function name that accurately describes the purpose of the code. The logic of the code is also kept simple, using two nested loops to find the maximum value and swap it with the current value.

TRUE/FALSE. firewalls firewalls can block designated computers from sending messages into a network and restrict services accessed. cannot restrict the services accessed by computers that are working remotely. cannot look inside packets. cannot allow designated computers to have access to many services.

Answers

Answer:

True i think

Explanation:

one drawback to the sequential search is that it cannot be used with an array that contains string elements. T/F

Answers

The sequential search has the limitation that it cannot be utilized with arrays containing string elements.Thus, it is false.

What sequential search, an array contains string elements?

Searching linearly over an array of strings for the supplied string is an easy fix. Performing a modified binary search is a better solution.

Get the list of arrays. Get each element of the Array List object using the for-each loop. Make sure the array list's elements all contain the necessary string. Print the elements if applicable.

We compare the given string with the middle string, just like in a standard binary search. If the middle string is empty, we linearly search on both sides for the nearest non-empty string x.

Therefore, it is false that one drawback to the sequential search is that it cannot be used with an array that contains string elements.

Learn more about string here:

https://brainly.com/question/17330147

#SPJ1

with contention, a computer does not have to wait before it can transmit. a computer can transmit at anytime. true or false

Answers

This claim is untrue since a computer need not wait before transmitting when there is dispute. A computer is always able to send.

What is a brief explanation of a computer?

A computer is a machine that gathers input (in the type of digitalized data) that processes it in accordance with a program, piece of software, or set of instructions that specify how the information should be handled.

What makes it a computer?

The phrase "computer" was first used to people (human computers) who used mechanical calculators like the arithmetic and slide rule to conduct numerical computations. Later, as overhead cranes started to take the place of human programmers, the word was used to them.

To know more about Computer visit:

https://brainly.com/question/20837448

#SPJ4

design a 32 bit counter that adds 4 at each clock edge the counter has reset and clock inputs upon reset the counter output is all 0

Answers

The counter is a digital sequencer, here a 4-bit counter. This simply means that you can count from 0 to 15 or vice versa depending on the counting direction (up/down).

The counter value (“count”) is evaluated on each positive (rising) edge of the clock cycle (“clk”).

If the "reset" input is logic high, the counter is set to zero.

If the "load" signal is logic high, the counter is loaded with the "data" input. Otherwise, count up or count down. If the "up_down" signal is logic high, the counter counts up, otherwise it counts down.

What are counters and their types

A counter is a sequential circuit. A well-known counter is a digital circuit used for counting pulses. Counters are the widest use of flip-flops. There are two types of counters. Asynchronous or ripple counter.

What are counters used for?

Counters are used not only to count, but also to measure frequency and time. increase memory address

To know more about counter visit;

https://brainly.com/question/29131973

#SPJ4

Which of the following applications would be a viable reason to use write-only memory in a computer?

Question 20 options:

Using a linked list that can remove elements from the head as well as the tail


Acquiring user input from the keyboard


Preparing geometric shapes for use on a graphics card


None of the above

Answers

Note that of the following applications the one that would be a viable reason to use write-only memory in a computer is: "None of the above" (Option D)

What is write-only memory?

Write-only memory, the inverse of read-only memory, started as a joking allusion to a memory device that could be recorded to but not read, as there appeared to be no practical purpose for a memory circuit that could not be retrieved.

ROM stores the instructions required for communication among various hardware components. As previously stated, it is required for the storage and functioning of the BIOS, but it may also be used for basic data management, to store software for basic utility tasks, and to read and write to embedded systems.

Learn more about write-only memory:
https://brainly.com/question/15302096?
#SPJ1

which of the following statements is true of firewalls? answer unselected they are placed all over the internet. unselected they are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet. unselected they completely prevent network penetration by outsiders and therefore should be viewed as the sole element required for the overall security plan. unselected they are implemented in hardware but not software.

Answers

Answer:

They are used to prevent unauthorized internet users accessing private networks.

Explanation:

44.7.1: unit testing. add two more statements to main() to test inputs 3 and -1. use print statements similar to the existing one (don't use assert).

Answers

To add two more statements to main() to test inputs 3 and -1, check the given code.

What is statements?

A list of directives for a computer to follow constitutes a computer programme. These instructions for programming are referred to as statements in a programming language.

The parts of programmes called C++ statements govern the order and flow of execution of other programmes. Statements may either be one line of code with a semicolon ; at the end or a block of code enclosed in curly braces.

There are several different types of statement in C++.

Labeled statementsExpression statementsCompound statementsSelection statementsIteration statementsJump statementsTry-Catch blocksDeclaration statements

//CPDE//

cout << "3,

expecting 27,

got: " << CubeNum(3) << endl;

cout << "-1,

expecting -1,

got: " << CubeNum(-1) << endl;

Learn more about statements

https://brainly.com/question/14467883

#SPJ4

Digital ______ includes music, photos, and videos. a. animation b. multiplex c. media d. playables

Answers

Digital media includes music, photos, and videos.

What is digital media?

Any communication tool that utilises one or more machine-readable data formats that are encoded is considered digital media. On a digital electronics device, digital media can be produced, seen, heard, distributed, changed, and preserved.

Media refers to ways of broadcasting or communicating this information. Digital is defined as any data represented by a sequence of digits.

Collectively, the term "digital media" refers to information delivery channels that use speakers and/or screens to broadcast digital information. Text, music, video, and photos that are sent over the internet and used for online viewing or listening are also included in this.

Learn more about digital media

https://brainly.com/question/25356502

#SPJ4

the data link layer accepts messages from the network layer and controls the hardware that transmits them (T/F)

Answers

The data link layer accepts messages from the network layer and controls the hardware that transmits them is True.

What is OSI Model?Providing a "shared basis for the coordination of [ISO] standards development for the purpose of systems interconnection," the Open Systems Interconnection model (OSI model) is a conceptual framework. Physical, Data Link, Network, Transport, Session, Presentation, and Application are the seven separate abstraction layers into which the communications between computing systems are divided in the OSI reference model.In order to describe networked communication, the model divides the flow of data in a communication system into seven abstraction layers, starting with the physical implementation of transmitting bits across a communications medium and ending with the highest-level representation of data in a distributed application. Each intermediate layer assists the layer above it and is assisted by the layer below it in providing a class of functionality. In all programme, classes of functionality are realised.

To learn more about OSI Model refer to:

https://brainly.com/question/22709418

#SPJ4

Two .o files have been linked together with the command line ld -o p main.o weight_sum.o. Consider the following statements:
(i) There are no more undefined symbols.
(ii) The file must be dynamically linked
(iii) The file is a relocatable object file.
(iv) The file is an executable object file.
(v) There might be one undefined symbol.
(vi) The .bss section consumes no file space.
Which of these statements are correct?
Select one:
a. Only (i) and (iv) are correct (this is not correct)
b. Only (i), (iv) and (vi) are correct (updating on my own -- this is the correct answer)
c. Only (ii) is correct
d. Only (i) and (iii) are correct
e. Only (ii) and (v) are correct
f. None of the above is correct

Answers

Only (i), (iv) and (vi) are correct, since all files are given and are connected with executables.

What is executable files?

An executable file is a file that can be used by a computer to carry out different tasks or operations. An executable file, in contrast to a data file, has been compiled and cannot be read. .BAT,.COM,.EXE, and.BIN are examples of common executable files on an IBM compatible computer.

The.DMG and.APP files can be executed on Apple Mac computers running macOS. Other executable files might also exist, depending on the operating system and its configuration.

You can run our download.exe file on your computer as an example test executable. Congratulations! You've successfully downloaded an executable programme file from the Computer Hope website, says the executable file that displays this message.

Learn more about executable files

https://brainly.com/question/28943328

#SPJ4

Consider the following incomplete code segment, which is intended to print the sum of the digits in num. For example, when num is 12345, the code segment should print 15, which represents the sum 1 + 2 + 3 + 4 + 5. int num = 12345;int sum = 0;/ missing loop header /{sum += num % 10;num /= 10;}System.out.println(sum);Which of the following should replace / missing loop header / so that the code segment will work as intended?

Answers

The term  that should replace / missing loop header / so that the code segment will work as intended is option A: while (num > 0).

What is the header about?

The body of the code is executed once for each iteration, and the header specifies the iteration.

The body of a for loop, which is executed once each iteration, and the header, which specifies the iteration, are both components. A loop counter or loop variable is frequently declared explicitly in the header.

Therefore, the module and division action inside the loop must be our main attention in order to comprehend why. The crucial thing to remember is that we are adding the numbers in reverse order and that we must repeat this process until we reach the initial number (1%10 = 1). As a result, num must equal one in order to compute the final operation.

Learn more about loop header from

https://brainly.com/question/14675112
#SPJ1

See options below

Which of the following should replace /* missing loop header */ so that the code segment will work as intended?

while (num > 0)

A

while (num >= 0)

B

while (num > 1)

C

while (num > 2)

D

while (num > sum)

E

Other Questions
Inequality x + y > 11.05x + .10y < .95 an irs auditor randomly selects 3 tax returns from59returns of which7contain errors. what is the probabilitythat she selects none of those containing errors? 2. The basic advertising package has a value of $1,000and the premium package has a value of $2,500. Thegoal of the agency is to sell more than $60,000 worthof small-business advertising packages.If you know that exactly 10 premium packages weresold, what can you say about the number of basicpackages the agency needs to sell to meet its goal? when you looked at solar activity on the heliophysics event registry website, on which date did you find activity on the sun? When a partnership is insolvent and a partner has a deficit capital balance, that partner islegally required to:A. declare personal bankruptcy.B. initiate legal proceedings against the partnership.C. contribute cash to the partnership.D. deliver a note payable to the partnership with specific payment terms.E. None of the above. The partner has no legal responsibility to cover the capital deficitbalance.Answer: C. contribute cash to the partnership. Blood pressure is usually measured in the ________ artery with a sphygmomanometer. Whichof the following characteristics is not true of minimalist music?A. A fast rate of changeB. A clear tonalityC. A constant repetition of melodic andrhythmic patternsD. A steady, driving pulse What would be a reasonable outcome following the complete disappearance of wolves? Gray wolf Red fox Pronghorn Coyote Vole Snowshoe hare Grass, willow, berries O a Coyotes may increase because one of their primary predators is gone ob Coyotes may decline because they eat wolves c. Voles may decline as coyotes become less abundant O d. Grass, willow, and berries will increase as more elk become available T/F for a real-world transistor where s12 is non-zero, a simultaneous conjugate match is desired at the input and output of the transistor to achieve maximum linear gain. (URGENT!!) In the diagram, FELJOS. Which ratios are equivalent to tanF? Select all that apply.ResponsesEF/ELEL/EFEL/FLFL/EFOJ/OSOJ/JSOS/OJOS/SJ Occasionally, such women as ______ played prominent roles in the political sphere and presided over their own religious and economic affairs. what is a song with character? can u give me a song the small business administration: lends exclusively to small business investment companies that in turn lend to small businesses makes only working capital loans lends to businesses with reasonable prospects of repayment but which cannot obtain credit through private channels makes loans at lower than market rates you are dispatched to a residence for a 4-year-old girl who is sick. your assessment reveals that she has increased work of breathing and is making a high-pitched sound during inhalation. her mother tells you that she has been running a high fever for the past 24 hours. your most immediate concern should be: in what way does ias 16 (property, plant, and equipment) differ from u.s. gaap concerning fixed asset measurement subsequent to initial recognition? Treatment in which a trained professional (a therapist) uses psychological techniques to help someone overcome psychological difficulties and disorders, resolve problems in living, or bring about personal growth; goal is to produce psychological change in a person (client/patient) through discussions and interactions with the therapist. Marcellus is African American, and when he goes to take a graduate school entrance exam, he is asked to indicate his ethnicity before he begins. This leads Marcellus to begin thinking about the assumptions people make regarding African Americans and intelligence, and he begins to fear that he will confirm these assumptions. This could result in _________, leading Marcellus to perform poorly on the test. What is the approximate perimeter of this triangle? Which of these is ATP?The figure shows the molecule, which consists of two phosphate groups, ribose, and nitrogenous base adenine.The figure shows the molecule, which consists of three phosphate groups, ribose, and nitrogenous base thymine.The figure shows the molecule, which consists of three phosphate groups, ribose, and nitrogenous base adenine.The figure shows the molecule, which consists of three phosphate groups, deoxyribose, and nitrogenous base adenine.The figure shows the molecule, which consists of three phosphate groups, deoxyribose, and nitrogenous base guanine. A ______ identifies the best media to use to deliver an advertising message to a targeted audience and is a subsection within a marketing communications plan.