Suppose that you have the following declaration:
stack Type stack(50); double num; and the input is
25 64-3 6.25 36-4.5 86 14 -129
Write a C++ code that processes this input as follows: If the number is non-negative, it pushes the square root of the number onto the stack; otherwise it pushes the square of the number onto the stack. After processing these numbers write a C++ code that outputs the elements of the stack.

Answers

Answer 1

Answer:

Explanation:

The code is written in C++:

#include <iostream>

#include <stack>

#include <math.h>

#include <iomanip>

using namespace std;

/*

* Supporting method to print contents of a stack.

*/

void print(stack<double> &s)

{

if(s.empty())

{

cout << endl;

return;

}

double x= s.top();

s.pop();

print(s);

s.push(x);

cout << x << " ";

}

int main(){

// Declaration of the stack variable

stack<double> stack;

//rray with input values

double inputs[] = {25,64,-3,6.25,36,-4.5,86,14,-12,9};

/*

* For each element in the input, if it is positive push the square root into stack

* otherwise push the square into the stack

*/

for(int i=0;i<10;i++){

if(inputs[i]>=0){

stack.push(sqrt(inputs[i]));

}else{

stack.push(pow(inputs[i],2));

}

}

//Print thye content of the stack

print(stack);

}

OUTPUT:

5     8     9     2.5     6     20.25     9.27362     3.74166     144     3

-------------------------------------------------------------------------

Process exited after 0.01643 seconds with return value 0

Press any key to continue . . . -


Related Questions

what does "route print" do?

Answers

Answer:Route is a Windows command that displays and updates the network routing table. These activities will show you how to use the route command to display the local routing table.

Explanation:

It is always better to get at least 3 times the amount of b-roll needed

True
False

Answers

Answer:

true

Explanation:

Consider a Dog class and a Mammal class. Which is true? Group of answer choices The Dog class is abstract The Mammal class is concrete Both classes are concrete The Mammal class is abstract

Answers

Mammals include mammals having hair, udders used to suckle infants having milk, a stomach, four bones in the eardrum, and a jaw bone built up of a single set of bones which clarifies with the skull uniquely.

This will be an abstract class with some functions that aren't declared, and their functions can be declared in the given class, which would be a dog class. The statement that a mammalian is an abstract class is true because the dog class is a mammal.

Therefore, the answer is the last choice "Mammal is an abstract class".

Learn more:

brainly.com/question/14137031

Question #3
Multiple Choice
Which statement is true?
O A collection is a type of deque.
O A list is a type of deque.
O A deque is a type of list.
O Adeque is a type of collection.

Answers

A deque is a type of list

Answer:

D. A deque i a type of collection

Explanation:

I do computer science too ;3

What is one feature that differentiates social media information systems (SMIS) from Web site applications? A user has to login to a Web site to use the special features. SMIS do not use browsers. A user can comment on a Web site. SMIS has more users than a Web site. SMIS has connection data

Answers

Answer:

A user has to login to a Web site to use the special features.

Explanation:

This is true because, even though website could be able to give the required information needed at that particular point in time, in order to use the special features found in the website, there is need to login into the website.

For example, Brainly which is a website needs the students to login in-order to ask his or her questions where not clarified with an expected answer gotten from the website.

What is the formula for total current in a series circuit?

Answers

Answer:

Series Circuit Diagram and Formula

This means you can calculate current using V = I/R in which R is 18 Ω and V is 9 V to get a current I of 162 A (amps)

Explanation:

Which feature is being used when connecting a device to the network using an electrical outlet?

Answers

Answer:

In other words, a WiFi bridge can convert Ethernet to WiFi. WiFi bridges can be high-performance and can support more WiFi network types than the T7-Pro can.

list any three importance of computer​

Answers

Answer:

here is the answer

Explanation:

1) accurate

2) fast

3) can accomplish tasks more effencily

An algorithm whose worst-case time complexity is bounded above by a polynomial function of its size is called a(n)

Answers

Answer:

polynomial-bounded algorithms

Explanation:

There are two algorithm complexities and they are time and space complexities. They can be denoted with the big-O notation. The big-o notation for a time and space complexity gets the worst-case time and space respectively.

The time complexity gets the measure of the execution time of an algorithm. When the time function is a polynomial ( k^n + k^n-1 ...) then the algorithm is said to be a polynomial-bounded algorithm.

Type the correct answer in the box. Spell all words correctly.

A freelance graphic designer has received an assignment to design a company logo. What image format is most suitable to display this logo on the company website?

The _________ format is most suitable in order to display the logo on the company website.

Answers

Answer:

The most suitable format for logo is PNG

Explanation:

PNG stands for portable network graphics. It is an improved version of gif. The best thing in png is that it is lossless compression and the background is not visible. Both 24 and 32 bit Colour can be used in png. PNG became ISO standard in sixteen years ago in 2004.

Drag the tiles to the correct boxes to complete the palrs.
Match the types of letters with their descriptions.
letter of interest
cover letter
thank you letter
letter of recommendation
discusses how you meet job requirements
>
reiterates why you're the best candidate for the job
>
tells more about your character and who you are
expresses your interest in working for a company

Answers

Answer:

Letter of interest> tells you more about your character and who you are expresses your interest in working for a company

Letter of recommendation> reiterates why you're the best candidate for the job

Cover letter> discusses how you meet job requirements

Hope this helped!

Answer:

Discusses how you meet job requirements = Cover Letter

Expresses your interest in working for a company = Letter of Interest

Tells more about your character and who you are = Letter of Recommendation

Reiterates why you're the best candidate for the job = Thank You Letter

Match the following internet related terms to their definition

Answers

Answer:

1st buble goes to web address 2nd goes to browser 3rd goes to chat 4th goes to email

Explanation:

Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control. Group of answer choices AVI ActiveX Class Quicktime

Answers

Answer:

Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control.

ActiveX

Explanation:

ActiveX controls are small apps, also called “add-ons,” that allow websites to provide content such as videos and games. They also enable web interaction, make browsing more enjoyable, and allow animation. However, these ActiveX controls can sometimes malfunction, produce unwanted contents, or install spyware in your system because they exercise the same level of control as the computer user.

Professor Gig A. Byte needs to store text made up of the characters A with frequency 6, B with frequency 2, C with frequency 3, D with frequency 2, and E with frequency 8. Professor Byte suggests using the variable length codes:
Character Code
A 1
B 00
C 01
D 10
E 0
The professor argues that these codes store the text in less space than that used by an optimal Huffman code. Is the professor correct?

Answers

Answer:

This is not true

Explanation:

The optimal Huffman code is used to encrypt and compress text files. It uses fixed-length code or variable-length code for encryption and compression of data.

The professor's character code is similar to Huffman's variable-length coding which uses variable length od binary digits to represent the word strings. The file size of the text file above is;

= 6 x 1 + 2 x 2 + 3 x 2 + 2 x 2 + 8 x 1 = 28 bits

This would be the same for both cases.

The encrypt would be the problem as the encoded and decoding of the characters B and E may cause an error.

PLEASE PEOPLE WHO DO PYTHON PLEASE HELP ITS DUE IN THE NIGHT
if you do not know the answer please do not answer otherwise I will report.
the answer that works will get brainliest


Please help me debug this code

Answers

Answer:Yo i was just on this in codehs

Explanation:

def turn_right():

   turn_left()

   turn_left()

   turn_left()

def jump_hurdle():

   turn_left()

   move()

   turn_right()

   move()

   turn_right()

   move()

   turn_left()

while front_is_blocked():

   jump_hurdle()

   

while front_is_clear():

   move()

Documenting findings, actions, and outcomes of network troubleshooting calls is an essential part of the troubleshooting process. List the reasons why documentation is critical, and discuss the form that this documentation could take (e.g. blogs, wikis, professional document management software, etc). Include a detailed description of what information would need to be saved.

Answers

Answer:

The main purpose of documentation is for future reference on the cost, materials, procedures, and techniques used in a task. It can be in form of a video log, report, digital text document or software, etc.  

Explanation:

Documentation is an important practice of taking notes of events during a process. It could in the process of creating or discovering new ideas or repair or management of existing processes. It holds the time, cost, technique, event name, measures-taken, etc, that would totally describe the event.

Which tools can Object Drawing Mode be applied to?
Line tool
Rectangle Tool
Oval Tool
Pencil tool
Pen Tool
Brush Tool

Answers

Answer:

• Line Tool

• Rectangle Tool

• Oval Tool

• Pencil Tool

• Brush Tool.

Explanation:

When people want to animate when using the Adobe Animate CC, it is vital for them to know how to draw shapes like squares, lines, ovals, rectangles, and circles. This is to enable such individuals understand how to draw objects as it can be difficult if they do not know how to draw these shapes.

The tools that Object Drawing Mode be applied to include:

• Line Tool

• Rectangle Tool

• Oval Tool

• Pencil Tool

• Brush Tool.

When the tool is being selected, it should be noted that the option for the drawing mode will be shown in the Property Inspector panel or it can also be seen in the tools panel.

Which statement is true?
1)A deque is a type of collection,
2)A collection is a type of deque.
3)A list is a type of deque.
4)A deque is a type of list.

Answers

Answer:

1. A deque is a type of collection.

Explanation:

The statement that is true is as follows:

A deque is a type of collection.

Thus, the correct option for this question is A.

What is Deque?

Deque may be defined as an ordered and systematic collection of items similar to the queue. It is also known as a double-ended queue. It consists of two ends, a front, and a rear, and the items remain positioned in the collection.

According to the context of this question, a deque is a kind of collection that holds data and information identical to a queue. From here, elements can be added to or eliminated from either the front or back very efficiently.

It is also often called a head-tail linked list. Though properly this signifies specific data with appropriate structure that has been the implementation of a deque.

Therefore, a deque is a type of collection that is a true statement. Thus, the correct option for this question is A.

To learn more about Deque, refer to the link:

https://brainly.com/question/16750037

#SPJ2

What is the main advantage of using a WYSIWYG (“what you see is what you get”) editor when constructing a website?
Only one programming language is required.
Websites may have more professional construction.
Knowledge of HTML is not required.
Website templates are not necessary.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The correct answer among the given options to this question is:

Knowledge of HTML is not required.

Because when you are constructing a website using WYSIWYG (“what you see is what you get”) editor, then you don't need the knowledge of HTML. Because, when you use WYSIWYG editor to insert button, table, images, text, paragraph, etc. It will automatically insert HTML code behind the page. For example, you can insert a form and a submit button using drag and drop with the help of WYSIWYG (“what you see is what you get”)  editor, for this purpose, you don't need exact knowledge of HTML. WYSIWYG (“what you see is what you get”)  automatically inserts the HTML for the form and button on a website page.

While other options are not correct because:

Using the WYSIWYG (“what you see is what you get”)  editor, you can use different programming languages in your website, such as VB.net, Asp.Net, C#, Javascript, Bootstrap, etc. It is not necessarily that you may have more professional construction and in WYSIWYG (“what you see is what you get”)   website templates are mostly used and modified using WYSIWYG editor.

Answer:

(C):Knowledge of HTML is not required.

Assume a file containing a series of integers is named numbers.txt and exists on the computer’s disk. Write a program that reads all of the numbers stored in the file, calculates their total and displays it.


Very Important: The file could have any number of numbers, so you need to use a loop to process the data in the file

Answers

#include <iostream>

#include <fstream>

using namespace std;

int main(){

   int x, sum=0;

ifstream f("numbers.txt");

while(!f.eof()){

       f >> x;

       sum +=x;

}

cout << "Sum : " << sum;

}

This is a C++ program.

Next time be more precise on the programming language you want

How many permutations for a 7 characters in length string, which contains all following letters R, X, S, Y, T, Z, U, has either the string 'RXS' or string 'ZU' in the 7 characters string?

Answers

Answer:

Following are the solution to this question:

Explanation:

In the following forms, RXS can appear:  

[tex]R X S \_ \_ \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ R X S \_ \_ \_[/tex] it may look like that really,  [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ \_ R X S \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ \_ \_ R X S \_[/tex] it may look like that really,  [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

[tex]\_ \_ \_ \_ R X S[/tex] it may look like that really,  [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.  

And we'll have a total of [tex]24 \times 5 = 120[/tex] permutations with both the string RXS.

In the following forms, UZ can appear:

[tex]U Z \_ \_ \_ \_\ _[/tex]  They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ UZ \_ \_ \_ \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ U Z \_ \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ \_ U Z \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ \_ \_ U Z \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

[tex]\_ \_ \_ \_ \_ U Z[/tex] They can organize your remaining 5 characters through 5 categories! Procedures  [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]

There may be [tex]120 \times 6 = 720[/tex] ways of complete permutations.

write passage on computer virus​

Answers

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a computer operates and is designed to spread from one computer to another. A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code.

Answer:

A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.

hope it helps

While your hands are on home row, both of your thumbs are on _____.

Answers

Answer:

While your hands are on home row, both of your thumbs are on Space-barI know this will definitely help✍️✍️✍️

1) Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.
2) Write a statement that defines an array of string objects nameddirections. The array should be implicitly sized, with an initialization list containing the values "Up", "Down", "Left", and "Right.

Answers

Answer:

Explanation:

The following code statements are written in Java and are simple one line statements that can be into any Java code or function. The first code statement creates a simple integer array with 4 predefined values initialized.

1) int[] miles = {1,5,9,22};

The second code statement creates a simple String array with four-string objects in it.

2) String[] nameddirections = {"Up", "Down", "Left","Right"};

Please have a look at the screenshot below

Answers

C. Reliability

Because of the network and recovery time



Plz give brainliest

FELLING GENEROUS GIVING AWAY POINTS:)


Who plays Lol btw (league of legends)
ADD me ign : Davidoxkiller (euw server)

Answers

Answer:

thanksssssssss

To prevent long page load times for pages containing images, it is best to use a compressed file format such as JPG, as well as appropriate image dimensions and
resolution.
magnification.
orientation.
colors.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

The given options to this question are:

resolution. magnification. orientation. colors.

The correct option to this question is 1. i.e.

Resolution.

The resolution of an image determines how many pixels per inch an image contains. Image having a higher resolution takes long page load times for a page and lower resolution takes less page load time. So, to prevent long page load times for pages containing images, it is best to use compressed file formation as well as appropriate image dimension and resolution.

While other options are not correct because:

Magnification, orientation, and color does not affect the page load time. Page load time for images only affected by the dimension and resolution of the images.

Answer:

B C E

A web page is taking too long to load. It contains only a small amount of text and two images. Choose all items that represent possible causes.

large font size

images do not use a compressed format like JPG

image resolution too high

image resolution too low

image dimensions too large

For things like school, you should have a more serious:

Answers

Answer:

who and what do you mean

Explanation:

What are the advantages and disadvantages of using steganography versus symmetric or asymmetric encryption

Answers

Explanation:

Steganography is a technique used in securing or hiding sensitive information by encrypting the information in a non-hidden file like a JPEG format. A major advantage of this method is that it reduces the risk of attack or break-in since the data is enclosed in a non-secure file; thereby reducing threats of any hack. One main disadvantage of this method is that the hidden message may become difficult to recover if the source file (non-secure file) used, is edited or deleted.

In symmetric or asymmetric encryption they both employ cryptographic encryption method. While symmetric encryption uses one key to encrypt and decrypt data, asymmetric encryption uses two keys (one for encryption, the other for decryption) of the data. A major advantage of using these methods is that they provide more security. Although while symmetric encryption is faster, asymmetric encryption is slower (eg using separate keys to gain access), a disadvantage.

A strategy for concealing critical information as well as ensuring its secure communication everything in non-hidden storage is steganography.

Advantage:

Because the content is contained throughout a non-secure file, the above strategy decreases the chance of an assault on classified info.

Disadvantage:

This approach has the disadvantage that concealed information might be able to retrieve if somehow the documents have been changed or deleted as of a non-secure file.

Once again to encrypt as well as decode information, symmetric encryption employs a unique key, but asymmetric encryption utilizes two different keys, something for encryption as well as someone else for decryption.

Advantage:

One such approach is superior to steganography throughout the level of protection.

Disadvantage:

Because distinct keys have been needed to get access, such techniques of asymmetric encryption are considerably slower.

Thus the approach above is correct.

Learn more about steganography here:

https://brainly.com/question/15187715

Bluetooth uses this medium to connect two devices.
Select one:
a. microwave signals
b. fiber optics
c. infrared light
d. radio signals

Answers

Answer:

D

Explanation:

Bluetooth is the wireless technology which allows for the exchange of the data between different devices. It uses wavelength to transmit information and generally works with short rage devices.

Due to Bluetooth relies on the range of devices and hence it depends on the UHF radio waves. These have a range of 2.4 to 2.5 Ghz. Such that the devices can talk to each other. The usage is control automation system.

Hence the option D is correct.

Learn more about the uses this medium to connect two devices.

brainly.in/question/5681178.

Other Questions
A family has four daughters, Molly, Daisy, Rosie and Tilly. Daisy is six years older than Molly. Molly is four years younger than Tilly. Rosie is one year older than double Molly's age. The total of their ages is 51.Find the age of each of the four girls. Which of these is an example of a CLIMATE region zone? A. tropicalB. foggyC. overcastD. sunny what is the purpose of using a celebrity to endorse products? Why would the general public want to buy products endorsed by celebrities?pls help :( Which of the following selections is best supported by evidence in the text? In a classroom of 20 students, 70% of them have brown eyes. If a teacher picks two students at random to pass out supplies, what is the probability he chooses two students without brown eyes? Hi I need is a 4-5 sentence paragraph about "is smoking still a problem among teenagers. That's it, if you do end up doing this thank you so very much! Color is the perception of reflected light (pigment theory) and has threeproperties , what are they?A:Hue, Value and Intensity.B:Height, Width and Depth.C:Positive Space, Negative Space and Empty Space.D:Contrast, Shadow and Highlight. Eric would like to have a callout text box that makes it look as if the character in an image is speaking. Which object should he insert into the Word document? standard text box WordArt callout shape picture How does the theme that stories can help us understand oneanother develop in "The Speech"? Graph each equation below and identify the slope and the y-intercept (hint: use slope intercept form: y = mx + b where m is the slope and b is the y-intercept). 7. HELP URGENT BEAINLYWhat does most cell division produce? Which of the following is found in the cells offungi but NOT of archaebacteria?A ribosomesB cell membraneC DNAD nucleus The U.S. Supreme Court came to a decision not long ago about the proper application of the word use. Briefly, the case in point was about a man named John Angus Smith who traded a handgun for cocaine. The law under which Smith was charged provided for a much more severe penaltyknown as an enhanced penaltyif a gun was used in a drug-related crime than if no gun was involved. (In this case, the enhanced penalty was a mandatory thirty-year sentence; the unenhanced penalty was five years.)Justice Antonin Scalia argued that Smiths penalty should not be enhanced because he did not use the gun in the way that the writers of the law had in mind; he did not use it as a gun. Justice Sandra Day OConnor argued that the law requires only the use of a gun, not any particular kind of use. If you were a judge, would you vote with Scalia or with OConnor? Construct an argument in support of your position. What Does Dependance Mean ? a commander in the army of ancient rome Where did The Missouri Compromiseban slavery?a. areas west of missourib. missouric. the louisiana purchase except missouri PLEASE ANSWER FAST ITS FOR A BIG TEST!!! Find an expression which represents the difference when (6x+5) is subtracted from (x8) in simplest terms. ILL GIVE BRAINLIEST What type of citizen participation is used in Brazil (Autocracy, Oligarchy, or Democracy)? ERGENT PLS ANSWER! In Naqada I graves, the deceased were buried with statuettes to keep them company in the afterlife. These were the forerunners of ushabti figures found in Egyptian tombs. Along with these figures, the dead person was buried with food, weapons, amulets, ornaments and decorated vases and palettes."Naqadan Culture, Jenny HillWhat is the central idea of the passage?Naqadan culture valued the dead.Naqadan culture feared the dead.Naqadan culture rejected the dead.Naqadan culture worshipped the dead. Use the seven W's framework to highlight the nature of important roots of uncertainty in (Challenger Space Shuttle) case study. Justify your answer in details?