Answer:
// CPP program to find type of input character
#include <iostream>
using namespace std;
void charCheck(char input_char)
{
// CHECKING FOR ALPHABET
if ((input_char >= 65 && input_char <= 90)
|| (input_char >= 97 && input_char <= 122))
cout << " Alphabet ";
// CHECKING FOR DIGITS
else if (input_char >= 48 && input_char <= 57)
cout << " Digit ";
// OTHERWISE SPECIAL CHARACTER
else
cout << " Special Character ";
}
// Driver Code
int main()
{
char input_char = '$';
charCheck(input_char);
return 0;
}
Explanation:
// CPP program to find type of input character
#include <iostream>
using namespace std;
void charCheck(char input_char)
{
// CHECKING FOR ALPHABET
if ((input_char >= 65 && input_char <= 90)
|| (input_char >= 97 && input_char <= 122))
cout << " Alphabet ";
// CHECKING FOR DIGITS
else if (input_char >= 48 && input_char <= 57)
cout << " Digit ";
// OTHERWISE SPECIAL CHARACTER
else
cout << " Special Character ";
}
// Driver Code
int main()
{
char input_char = '$';
charCheck(input_char);
return 0;
}
Analyzing the role of elements in audio editing and Video
+ analyzing the role of the visual element in Video + analyzing the role of text factor
+ analyzing the role of the audio factor
+ analyzing the role of the transfer scene
+ analysing the role of the audio visual effects
Answer:
Analyzing the role of elements in audio editing and Video
+ analyzing the role of the visual element in Video + analyzing the role of text factor
+ analyzing the role of the audio factor
+ analyzing the role of the transfer scene
+ analysing the role of the audio visual effect
I wanna learn python but I don't know any websites that I can learn it online. Thanks for attention!
Answer:
https://www.codecademy.com/
A computer network is _____.
a group of people who help you solve any technical issues
a group of computers that are interconnected to share information or documents
a certain type of computer that stores files for large businesses
the wire inside the computer that connects the motherboard to the hard drive
Answer:
a
Explanation:
a group of people who help you solve any technical issues
Microsoft created Adobe Photoshop? TRUE FALSE
Answer:
false the creator of adobe photoshop was microsoft adobe photoshop is a popular photo editing software which was developed by a company named as adobe inc.
Answer:
Photoshop is created by Adobe, and Adobe is an independent company started by Jhon Warnockand.
why SSTF disk scheduling is not practically feasible?
Answer:
There is a lack of predictability because of the high variance of response time. Additionally, SSTF may cause starvation of some requests. Starvation is possible for some requests as it favors easy to reach requests and ignores the far-away processes.
SSTF disk scheduling is not practically feasible because it makes an external call and is forced to wait for I/O to complete, thereby giving up its first-place position.
What is SSTF disk scheduling?Shortest Seek Time First (SSTF) is a disc scheduling algorithm that is abbreviated as SSTF. Before moving the head away to service other requests, it selects the request that is closest to the current head location.
Because of the high variance in response time, there is a lack of predictability. Furthermore, SSTF may cause some requests to be denied. Some requests may experience starvation because the system prioritizes nearby requests and overlooks distant operations.
Therefore, because it makes an external call and is obliged to wait for I/O to complete, SSTF disc scheduling is not viable because it loses its first-place status.
To learn more about SSTF disk scheduling, refer to the link:
https://brainly.com/question/23552555
#SPJ2
Why coding conventions are important? Compare the coding conventions of JAVA.
Answer:
Naming conventions make programs more understandable by making them easier to read. They can also give information about the function of the identifier-for example, whether it's a constant, package, or class-which can be helpful in understanding the code.
Question No: 9 Of 50 Time Left : 59:18
ОА
QUESTION
Which of the following two entities (reading from Left to right) can be connected by the dot operator?
A class member and a class object.
A class object and a class,
A constructor and a member of that class.
OB
Ос
OD
A class object and a member of that class.
Answer:b
Explanation:
to get points
Algorithm
Read marks and print letter grade according to that.
Answer:
OKAYYYY
Explanation:
BIJJJJJJJSGJSKWOWJWNWHWHEHIWJAJWJHWHS SJSJBEJEJEJEJE SJEJBEBE
John downloaded the manual for his TV, called manual-of-tv.pdf, from the manufacturer's website. After he clicked twice on the document he was informed by Windows that the file could not be opened. Which software must John install to solve the problem?
Jhon must download third party pdf viewer softwares to open the .pdf file.
For example
Adobe Acrobat Reader
Must click thanks and mark brainliest
Phân tích vai trò của các yếu tố trong biên tập Audio và Video
Answer:
Answer to the following question is as follows;
Explanation:
A visual language may go a long way without even text or narrative. Introductory angles, action shots, and tracker shots may all be utilised to build a narrative, but you must be mindful of the storey being conveyed at all times. When it comes to video editing, it's often best to be as cautious as possible.
PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demilitarized zone (DMZ) and provides name resolution for the domain for Internet hosts.
i. True
ii. False
Answer:
i. True
Explanation:
A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.
This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.
Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.
PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.
Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.
In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).
A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.
What triggers a LinkedIn account ban?
Answer:
Before we dig into using advanced LinkedIn automation tools, it’s important to understand what activities can trigger LinkedIn to ban your account?
Using multiple LinkedIn tools at the same timeUsing Low-quality LinkedIn ToolsSending Connect Requests BlindlySending Templates Messageswhy is Touchpad used in the laptop computer
Answer:
in controlling the mouse or cursor
Explanation:
as is it known tha a cursor is a poniting device. and the only way to control it without a mouse is the touchpad
Code Example 17-1 class PayCalculator { private: int wages; public: PayCalculator& calculate_wages(double hours, double wages) { this->wages = hours * wages; return *this; } double get_wages() { return wages; } }; (Refer to Code Example 17-1.) What coding technique is illustrated by the following code? PayCalculator calc; double pay = calc.calculate_wages(40, 20.5).get_wages(); a. self-referencing b. function chaining c. dereferencing d. class chaining
Answer:
The answer is "Option b".
Explanation:
Function chaining is shown by this code, as the functions are called one after the other with one statement. Whenever you want to call a series of methods through an object, that technique is beneficial. Just because of that, you may give the same effect with less code and have a single given value only at top of the leash of operations.
How should you mark the query if it is a valid one?
A) Gibberish or Vague
B) Profane
C) Foreign Language
D) Valid
E) None
Answer:
None
HOPE IT WILL HELP YOU.
MARK THE ANSWER BRAINLIST
Write a program that prompts the user to enter a positive integer and displays all its smallest factors in decreasing order.
Answer:
<fact>[ZRjKt9sw6V(gh6E)ehNM3]<zip>
Explanation:
What are some 5 constraints in using multimedia in teaching
Answer:
Explanation:
Technological resources, both hardware and software
Technological skills, for both the students and teacher
Time required to plan, design, develop, and evaluate multimedia activities
Production of multimedia is more expensive than others because it is made up of more than one medium.
Production of multimedia requires an electronic device, which may be relatively expensive.
Multimedia requires electricity to run, which adds to the cost of its use
There are constraints in using multimedia in teaching; The Technological resources, both hardware and software Also, Technological skills, for both the students and teacher
What is a characteristic of multimedia?
A Multimedia system has four characteristics and they are use to deliver the content as well as the functionality.
The Multimedia system should be be computer controlled. The interface is interactive for their presentation and lastly the information should be in digital.
There are constraints in using multimedia in teaching;
The Technological resources, both hardware and software
Also, Technological skills, for both the students and teacher
Since Time required to plan, design, develop, and evaluate multimedia activities
The Production of multimedia is more expensive than others because it is made up of more than one medium.
The Production of multimedia requires an electronic device, which may be relatively expensive.
The Multimedia requires electricity to run, which adds to the cost of its use.
Learn more about multimedia here;
https://brainly.com/question/9774236
#SPJ2
write a program that keeps taking integers until the user enters in python
int main {
//variables
unsigned long num = 0;
std::string phrase = " Please enter your name for confirmation: " ;
std::string name;
//codes
std::cout << phrase;
std::cin>> name;
while ( serial.available() == 0 ) {
num++;
};
if ( serial.avaliable() > 0 ) {
std::cout << " Thank you for your confirmation ";
};
};
Mô tả những lợi ích của việc sử dụng đa xử lý không đồng nhất trong một hệ thống di động
Answer:
gzvzvzvzbxbxbxb
Explanation:
hshzhszgxgxggdxgvdvsvzvzv
WILL MARK BRAINLIEST
Write a function called quotient that takes as its parameters two decimal values, numer and denom, to divide. Remember that division by 0 is not allowed. If division by 0 occurs, display the message "NaN" to the console, otherwise display the result of the division and its remainder.
(C++ coding)
https://docs.microsoft.com/en-us/dotnet/api/system.dividebyzeroexception?view=net-5.0#remarks
click in link
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
Answer:
keylogger.
Explanation:
A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.
Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.
In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.
An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.
In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.
Queues can be represented using linear arrays and have the variable REAR that point to the position from where insertions can be done. Suppose the size of the array is 20, REAR=5. What is the value of the REAR after adding three elements to the queue?
Answer:
8
Explanation:
Queues can be implemented using linear arrays; such that when items are added or removed from the queue, the queue repositions its front and rear elements.
The value of the REAR after adding 3 elements is 5
Given that:
[tex]REAR = 5[/tex] --- the rear value
[tex]n = 20[/tex] --- size of array
[tex]Elements = 3[/tex] --- number of elements to be added
When 3 elements are added, the position of the REAR element will move 3 elements backward.
However, the value of the REAR element will remain unchanged because the new elements that are added will only change the positioning of the REAR element and not the value of the REAR element.
Read more about queues at:
https://brainly.com/question/13150995
Write a program that accepts a list of integers and split them into negatives and non-negatives. The numbers in the stack should be rearranged so that all the negatives appear on the bottom of the stack and all the non-negatives appear on the top.
Answer:
The program is as follows:
n = int(input("List elements: "))
mylist = []; myList2 = []
for i in range(n):
num = int(input(": "))
mylist.append(num)
for i in mylist:
if i >= 0:
myList2.append(i)
for i in mylist:
if i < 0:
myList2.append(i)
print(myList2)
Explanation:
This gets the number of list elements from the user
n = int(input("List elements: "))
This initializes two lists; one of input and the other for output
mylist = []; myList2 = []
This is repeated for every input
for i in range(n):
Get input from the user
num = int(input(": "))
Append input to list
mylist.append(num)
This iterates through the input lists
for i in mylist:
If list element is non-negative
if i >= 0:
Append element to the output list
myList2.append(i)
This iterates through the input lists, again
for i in mylist:
If list element is negative
if i < 0:
Append element to the output list
myList2.append(i)
Print output list
print(myList2)
Consider the relational schema below: Students(sid: integer, sname: string, major: string) Courses(cid: integer, cname: string, hours: integer) Enrollment(sid: integer, cid: integer, grade: real) Write a relational algebra expression that satisfies this query? Find the distinct names of all students that take at least three courses and major in "Philosophy".
Solution :
Here, we need to perform JOIN operation of the students and registration.
Use NATURAL JOIN operator [tex]\Join[/tex] and so no need to specify Join condition.
Also we need to selection operator tp select only those course whose major in "philosophy".
Finally we projection operator π to project only distinct students name who took at least three courses.
[tex]$\pi [\sigma_{\text{student's nam}e} [ \sigma(\text{three courses}) \Join \text{"Philosophy"}]]$[/tex]
what is programming language?
Answer:
A programming language is a formal language comprising a set of strings that produce various kinds of machine code output. Programming languages are one kind of computer language, and are used in computer programming to implement algorithms. Most programming languages consist of instructions for computers
Answer:
The artificial languages that are used to develop computer programs are called programming language . hope this help!
Pls help me Pls help me
Answer:
20 10
Explanation:
please mark me as brainlyest
Write a recursive function called DrawTriangle() that outputs lines of '*' to form a right side up isosceles triangle. Function DrawTriangle() has one parameter, an integer representing the base length of the triangle. Assume the base length is always odd and less than 20. Output 9 spaces before the first '*' on the first line for correct formatting.
Answer:
Code:-
# function to print the pattern
def draw_triangle(n, num):
# base case
if (n == 0):
return;
print_space(n - 1);
print_asterisk(num - n + 1);
print("");
# recursively calling pattern()
pattern(n - 1, num);
# function to print spaces
def print_space(space):
# base case
if (space == 0):
return;
print(" ", end = "");
# recursively calling print_space()
print_space(space - 1);
# function to print asterisks
def print_asterisk(asterisk):
# base case
if(asterisk == 0):
return;
print("* ", end = "");
# recursively calling asterisk()
print_asterisk(asterisk - 1);
# Driver Code
n = 19;
draw_triangle(n, n);
Output:-
# Driver Code n = 19;| draw_triangle(n, n);
how do you get The special and extended ending in final fight 2 snes
i need an introduction of apple and microsoft
what is the basic size of supercomputer
Answer:
200 to 300 gigabytes or more.
Answer:
200 to 300 gigabytes or more
Explanation: