Answer:
Satellite transmission
Write a program that asks for the number of units sold and computes the total cost of the purchase. Input validation: Make sure the number of units is greater than 0. Use output (stream) manipulators: 2 digits after the decimal point g
Answer:
Explanation:
The following code is written in C++, it asks the user for input on number of units sold and places it in a variable called units_sold. Then it asks for the package price and places that value in a variable called package_price. Finally it multiplies both values together into a variable called final_price and adjusts the decimals.
#include <iostream>
#include <iomanip>
using namespace std;
int main()
{
// Variables
int units_sold,
final_price;
// ask user for number of units sold
cout << "\nEnter number of units sold: ";
cin >> units_sold;
//ask for Package price
cout << "\nEnter Package Price: ";
cin >> package_price;
// Total amount before discount
final_price = units_sold * package_price;
cout << setprecision(2) << fixed;
cout << endl;
return 0;
}
Which of the following statements is false?
Copyright exists the moment a work is created.
Copyright protects intellectual property such as text, art, film, music, or software.
Omitting the © copyright symbol means your work is not copyrighted.
Copyright is free.
You are not required to register your copyright.
It is false that omitting the © copyright symbol means your work is not copyrighted. The correct option is C.
What is a copyright?Original works of authorship are protected by copyright, a type of intellectual property, as soon as the author fixes the work in a tangible form of expression.
The creators of the works of expression typically control the copyrights, however there are some significant exceptions: When an employee produces a work while employed, the employer is the rightful owner of the copyright.
Some individuals think that a work isn't covered by copyright law if it doesn't display a copyright emblem. That is untrue. The copyright symbol need not be used in most situations.
Thus, the correct option is C.
For more details regarding a copyright, visit:
https://brainly.com/question/14704862
#SPJ2
Very large storage system that protects data by constantly making backup copies of files moving across an organization's network is known as ...
Answer:
RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
Explanation:
RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
What is File system failure?File system failure refers to disk-related errors that may be due to corrupt files, disk integrity corruption, file execution policies, bad sectors, etc. These errors may prevent be causing users from accessing or opening files. The first line of defense against a file system failure is a well-defined set of proper system backup and file maintenance procedures.
These errors can be encountered in files such as images, documents, PDFs, movies, etc. In order to protect and provide defense against file system failure, it is important to manage proper backup and file maintenance procedures.
Therefore, RAID is a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both.
You can learn more about file system at:
brainly.com/question/14312784
#SPJ2
differentiate between a university and a TVET college in terms of what each offers and explain the stigma associated with TVET colleges
Answer: See explanation
Explanation:
The main focus of a Technical Vocational Education and Training (TVET) college is to prepare the students and train them so that they'll be functional in a skilled trade. It focuses on vocational training and education. University isn't really concerned about transfer of skills but rather more concerned with the transfer of knowledge to the students
The Technical Vocational Education and Training (TVET) qualification is also faster, cheaper and easier to get than the university certificate which is costlier and takes longer period to get.
The stigma associated with TVET colleges has been created by both the society and the government. Firstly, people believed that only those from poor backgrounds or those that couldn't gain university admisson go to TVET colleges.
Also, the government isn't helping matters as public funding for education are allocated more to universities and not really allocated to TVET colleges. These has brought about the stigma to the TVET.
The difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.
University and TVET collegeThe major difference is University provide students with knowledge the need based on the course they are studying while TVET colleges is more of practical as they provide the students with practical skills they need because they render technical and vocational education and training.
The stigma associated with TVET colleges is because people think that University student has higher opportunities when in labor market than TVET colleges student.
Inconclusion the difference between a university and a TVET college in terms of what each offers is university impact knowledge while TVET college is more of practical.
Learn more about University and TVET college here:https://brainly.com/question/26696444
hy please help me do this
Answer:
1 True
2 False
3 False
4 True
5 True
6 True
7 True
8 False
Explanation:
8 robot's are not perfect they make mistakes too
Def locate_substring(dna_snippet, dna): This function takes in two strings, dna_snippet and dna, where dna_snippet is a substring of dna, and returns all locations of the substring as a list of integers. In other words, dna_snippet may exist in multiple locations within dna; you should return the beginning index position of each occurrence of dna_snippet inside of dna. Example: * Sample DNA snippet (substring): "ATAT" * Sample DNA string: "GATATATGCATATACTT" * The returned position list: [1, 3, 9]
Answer:
In Python. The function is as follows:
def locate_substring(dna_snippet, dna):
res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]
print("The returned position list : " + str(res))
Explanation:
This iterates defines the function
def locate_substring(dna_snippet, dna):
Check for all occurrence
res = [i for i in range(len(dna_snippet)) if dna_snippet.startswith(dna, i)]
print all occrrence
print("The returned all position list : " + str(res))
Following is the Python program to the given question.
PythonAccording to the question,
DNA Series: GATATATGCATATACTTDNA
Snippet: ATAT
Program: def locate_substring (dna_snippet, dna):
start = 0 while True: start = dna.
find(dna_snippet, start) #finding the first occurrence of dna_snippet in dna.
if start == -1: return # if dna.find() returns -1 yield start #Resumes next execution start += 1dna=input ("Enter the DNA sequence: ") dna_snippet=input
("Enter the DNA snippet: ") print(list(locate_substring(dna_snippet,dna )))
Program Explanation: Defining a function.
An infinite loop is being utilized just to produce the indexes from which dna snippet begins.
Determining the initial occurrence of dna snippet inside dna. storing the new occurrences of dna snippet throughout the starting point.
Whenever dna.find() returns minus one, it means there was no occurrence identified and the method should be exited.
Find out more information about Python here:
https://brainly.com/question/26497128
Design the program in the following way:
a. Prompt the user for the name of a boat and then for that boat's time (in seconds).
b. Continue to do this until the user presses enter without entering a name or enters a sentinel value.
c. At this point output the name of the race winner along with the time, the average time, the name the slowest boat along with its time.
d. Use a map structure to store the boat names and their associated times. You may use lists within the program as you see fit.
Answer:
d = {}
while True:
name = input("Enter the name of the boat (Press Enter or q to stop): ")
if name == "" or name == "q":
break
time = int(input("Enter the time (in seconds): "))
d[name] = time
winner_name = min(d, key=d.get)
winner_time = min(d.values())
average_time = sum(d.values()) / len(d.values())
slowest_boat = max(d, key=d.get)
slowest_time = max(d.values())
print(f"Winner name: {winner_name} and its time: {winner_time}")
print(f"Average time: {average_time}")
print(f"Slowest boat: {slowest_boat} and its time: {slowest_time}")
Explanation:
*The code is in Python.
Create an empty map(dictionary) to hold the values
Create a while loop. Inside the loop:
Ask the user to enter the name of the boat. Check if the user presses Enter or q, using if and break
Ask the user to enter the time
Insert these values as key-value pair to the map
When the loop is done:
Find the winner_name, the min() function finds the minimum value in a list. In this case, the key=d.get creates a list of the values in the map. The min(d, key=d.get) returns the key of the minimum value
Find the winner_time, min(d.values()) returns the minimum time in our map
Find the average time, the sum() function, returns the sum of the values in a list. In this case, sums all the values in the map. The len() function finds the count of the values. If we divide the sum of times entered by the count of the times entered, we get the average time
Find the slowest_time, the max() function returns the max of the value in a list. In this case, the maximum value is the slowest time
Print the results
What is a key consideration when evaluating platforms?
Answer:
The continuous performance of reliability data integrity will lead to the benefit and profit of the platform's regular structure changes. Cleanliness in the platform whereas addresses the straightforward structure of task performance and adequate data integrity.
X274: Recursion Programming Exercise: Cannonballs Spherical objects, such as cannonballs, can be stacked to form a pyramid with one cannonball at the top, sitting on top of a square composed of four cannonballs, sitting on top of a square composed of nine cannonballs, and so forth.
RequireD:
Write a recursive function that takes as its argument the height of a pyramid of cannonballs and returns the number of cannonballs it contains.
Answer:
The function in C is as follows:
#include <stdio.h>
int C_ball(int height){
if(height == 1) {
return 1;}
return (height * height) + C_ball(height - 1);}
int main(){
int n;
printf("Height: ");
scanf("%d",&n);
printf("Balls: %d",C_ball(n));
return 0;
}
Explanation:
The function begins here
#include <stdio.h>
This defines the function
int C_ball(int height){
If height is 1, return 1
if(height == 1) {
return 1;}
This calls the function recursively
return (height * height) + C_ball(height - 1);}
The main begins here
int main(){
This declares the height as integer
int n;
This prompts the user for the height
printf("Height: ");
scanf("%d",&n);
This calls the function
printf("Balls: %d",C_ball(n));
return 0;
}
2. How has the internet changed the way that people get news?
Answer:
Explanation:
you can access news from anywhere and know what is going on
Answer:
Most of the news is fact due to the ablilty of anybody can make it
Explanation:
Consider the regular expressions:
R1 = (01)* (0*1*) (10)
R2 = (101)* (01)*
R3 = (10) (01*)*(01)
R4 = 10(R2*)|R3
Recall that, for a list of regular expressions, the function getToken() returns the next token from the input that matches one of the regular expressions. If there is more than one match, the longest match is returned. If there is more than one longest match, the token with the longest match that appears first in the list is returned. If there is no match, ERROR is returned. If the function getToken() is called once on input 1000101, it will return:
a. R1
b. R2
c. R3
d. R4
e. ERROR
Answer:
c. R3
Explanation:
For R1;
there are 10 matches, after these 10 no matches occur again
for R2;
this also does not match more than 10 as we have in R1
for r3;
R3 has the longest match. Its matching can be done 1000101 times.
for r4;
The whole of r4 can be matched.
Error;
we cannot have an error because matches exist.
so in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first. R3 came first
In this exercise we have to use computer knowledge to identify which is the correct sequence of code that best corresponds to the given question, in this way we have that the correct alternative is:
[tex]c. R3[/tex]
So analyzing the first alternative, we find;
For R1, there are 10 matches, after these 10 no matches occur again.
So analyzing the second alternative, we find;
For R2, this also does not match more than 10 as we have in R1
So analyzing the third alternative, we find;
R3 has the longest match. Its matching can be done 1000101 times.
So analyzing the fourth alternative, we find;
For R4, the whole of r4 can be matched.
So analyzing the fifth alternative, we find;
Error; we cannot have an error because matches exist.
So in answer to this question we pick R3 as the solution because there are more than one longest march and the one returned in the list is that which appeared first.
See more about computer at brainly.com/question/950632
The following segment of code is meant to remove the even numbers from an ArrayList list and print the results:
int counter = 0;
while(counter < list.size())
{
if(list.get(counter) %2 == 0)
{
list.remove(counter);
}
counter++;
}
System.out.println(list.toString());
The method as written, however, is incorrect. Which ArrayList(s) list would prove that this method was written incorrectly?
I.
[1, 2, 3, 4, 5]
II.
[2, 4, 5, 6, 7]
III.
[2, 4, 6, 8, 10]
IV.
[2, 5, 6, 7, 8]
III only
II and IV
II only
I and IV
II and III
Answer:
II and III
Explanation:
I took the quiz and got this wrong, but it gives you the answer afterwards, just trying to help everyone else out.
Answer:
II and III
Explanation:
The information technology (IT) department of a real-estate group cosponsored a data warehouse with a County governement. In the formal proposal written by the IT team, costs were estimated at 8,000,000/- the project’s duration was estimated to be eight months, and the responsibility for funding was defined as the business unit’s. The IT department proceeded with the project before it even knew if the project had been accepted. The project actually lasted two years because requirements gathering took nine months instead of one and a half, the planned user base grew from 200 to 2,500, and the approval process to buy technology for the project took a year. Three weeks before technical delivery, the IT director canceled the project. This failed endeavor cost the organization and taxpayers 25,000,000/-.
Why did this system fail?
Why would a company spend money and time on a project and then cancel it?
What could have been done to prevent this?
It is desired to create a mortgage estimator by writing a program containing a function. The user inputs the amount of loan (L), the loan term in number of months (W, and the annual interest rate (D in the script. The script then makes use of a function that accepts these values as inputs through its argument and calculates and returns the monthly payment and the total payments over the life of the loan. The monthly payment and the total payment could be calculated using the following expressions:
monthly payment 1-(1+ 1 112) N I/12 total payment Nxmonthly payment
Note that the interest rate must be expressed in decimal; for example, if the interest rate is 8% it must be entered as 0.08 Test your program for several scenarios and submit the results with the program listing.
The values of L, I, monthly payment, and total payment should be written to a file as shown below:
Interest Loan Amount Interest Months Monthly Payment Total Payment
0.06 10000 36
108 120000 0.05
0.07 85000 48
0.08 257000 240
0.05 320000 120
Answer:
In Python:
L = int(input("Loan Amount: "))
N = int(input("Months: "))
I = float(input("Annual Interest Rate: "))
monthly_payment = round(L/((1 - (1 + I/12)**(-N))/(I/12)),2)
total_payment = round(N * monthly_payment,2)
f= open("outputfile.txt","a+")
f.write(str(L)+"\t\t"+str(I)+"\t\t"+str(N)+"\t\t"+str(monthly_payment)+"\t\t"+str(total_payment)+"\n")
Explanation:
The next three lines get the required inputs
L = int(input("Loan Amount: "))
N = int(input("Months: "))
I = float(input("Annual Interest Rate: "))
Calculate the monthly payment
monthly_payment = round(L/((1 - (1 + I/12)**(-N))/(I/12)),2)
Calculate the total payment
total_payment = round(N * monthly_payment,2)
Open the output file
f= open("outputfile.txt","a+")
Write output to file
f.write(str(L)+"\t\t"+str(I)+"\t\t"+str(N)+"\t\t"+str(monthly_payment)+"\t\t"+str(total_payment)+"\n")
What Are the Components of a Web Address? *
Answer:
What Are the Components of a Web Address?
1.Protocol. The first component of a web address is the protocol, which is also known as the scheme. ...
2.Domain Name. The domain name part of the web address is the unique identifier for the website on the internet. ...
3.Domain Extension. ...
4.Path & Filename.
The process of saving information to a secondary storage device is called...
Answer:
The process of saving information to a secondary storage device is referred to as embedding.
Explanation:
The process of saving information to a secondary storage device is called embedding.
What is embedding?One technique a writer or speaker could use to lengthen a sentence is embedding. When two clauses fall into the same category, they can frequently be nested inside of one another. For illustration: The baked product was presented by Norman. My sister didn't know about it.
Her thumb had the thorn embedded in the surface there, locked onto something. A person or thing is said to be embedded when it is a highly important or powerful part of that person, item, etc. Guilt was deeply engrained in my conscience.
The embedding strategy modifies each video frame slightly in an attempt to try covert or undetectable data concealing.
Thus, it is embedding.
For more information about embedding, click here:
https://brainly.com/question/16911950
#SPJ6
Develop a C program that calculates the final score and the average score for a student from his/her (1)class participation, (2) test, (3) assignment, (4) exam, and (5) practice scores. The program should use variables, cout, cin, getline(), type casting, and output manipulators. The user should enter the name of the student and scores ranging from 0 to 100 (integer) for each grading item. The final score is the sum of all grading items. The average score is the average of all grading items. Here is a sample output of the program: Enter the Student's name: John Smith Enter Class Participation Score ranging from 0 to 100: 89 Enter Test Score ranging from 0 to 100: 87 Enter Assignment Score ranging from 0 to 100: 67 Enter Exam Score ranging from 0 to 100: 99 Enter Practice Score ranging from 0 to 100: 80 John Smith: Final Score: 422 Average Score: 84.4 Submit: a flowchart . source file Hw3.cpp The screenshot of output
Answer:
Following are the code to the given question:
#include<iostream>//defining header file
using namespace std;
int main()//defining main method
{
float clspat,test,asst,exam,practice,total,average;//defining floating variable
char name[100];//defining char variable to input value
cout<<"Enter Name of Student: ";//print message
cin>>name; //input value
cout<<"Enter scores in following scoring items between 0 and 100:"<<"\n";//print message
cout<<"Enter class participation score: ";//print message
cin>>clspat;//input value
cout<<"Enter test score: ";//print message
cin>>test;//input value
cout<<"Enter assignment score: ";//print message
cin>>asst;//input value
cout<<"Enter exam score: ";//print message
cin>>exam;//input value
cout<<"Enter practice score: ";//print message
cin>>practice;//input value
total=clspat+test+asst+exam+practice;//calculating total value
average=total/5;//calculating average value
cout<<endl<<"SCORE CARD OF "<<name<<"\n"<<"-----------------------"<<"\n";//print value with message
cout<<"Total score: "<<total<<"\n";//print message with value
cout<<"Average score: "<<average; //print message with value
}
Output:
please find the attached file.
Explanation:
In this code, the floating-point variable is declared, which is used for input value from the user-end and after input the floating-point value it uses the "total, average" variable to calculate its respective values and store its value with init, after storing the value into the variable it uses the print method to print its values.
Your co-worker who went to UCLA tells you that DHCP is not enabled at your new job, so you should just use the same IP address that you have at home to connect to the internet. He told you it should work because your computer is communicating with a unique public IP address at home, so no other computer in the world would have it. When you try this, your computer does not have internet access. Give two reasons why?
Answer:
1. internet connection is not enabled on the computer.
2. The DHCP server in the company is not enabled as well.
Explanation:
For a user to access the internet, the computer must have a public IP address that is either assigned to it by a service provider or dynamically from the DHCP server in the computer. In the case of the former, the user just needs to enable the internet connection to obtain the unique IP address.
If the DHCP server or the internet connection is not enabled, the user would not have access to the internet.
What year was "scripting" first invented
Answer:
Late 1950's
Explanation:
I hope this helps, have a great day :)
Is there an alternative website of https://phantomtutors.com/ to get guidance in online classes?
Answer:
The website is
classroom
Explanation:
What Is the Purpose of a Web Browser? *
Answer:
This is your answer. If I'm right so,
Please mark me as brainliest. thanks!!!
Write a program that would determine the day number in a non-leap year. For example, in a non-leap year, the day number for Dec 31 is 365; for Jan 1 is 1, and for February 1 is 32. This program will ask the user to input day and month values. Then it will display the day number day number corresponding to the day and month values entered assuming a non-leap year. (See part II to this exercise below).
Answer:
In Python:
months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]
daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]
day = int(input("Day: "))
month = input("Month: ")
ind = months.index(month)
numday = 0
for i in range(ind):
numday+=daymonths[i]
numday+=day
print(numday)
Explanation:
This initializes the months to a list
months = ["Jan","Feb","Mar","Apr","May","Jun","Jul","Aug","Sep","Oct","Nov","Dec"]
This initializes the corresponding days of each month to a list
daymonths = [31,28,31,30,31,30,31,31,30,31,30,31]
This gets the day from the user
day = int(input("Day: "))
This gets the month from the user
month = input("Month: ")
This gets the index of the month entered by the user
ind = months.index(month)
This initializes the sum of days to 0
numday = 0
This adds up the days of the months before the month entered by the user
for i in range(ind):
numday+=daymonths[i]
This adds the day number to the sum of the months
numday+=day
This prints the required number of days
print(numday)
Note that: Error checking is not done in this program
Which option in a Task element within Outlook indicates that the task is scheduled and will be completed on a later
date?
O Waiting on someone else
O In Progress
O Not started
O Deferred
Answer: D: Deferred
Explanation:
took test
What is Mobile Edge Computing? Explain in tagalog.
Answer:
English: Multi-access edge computing, formerly mobile edge computing, is an ETSI-defined network architecture concept that enables cloud computing capabilities and an IT service environment at the edge of the cellular network and, more in general at the edge of any network.
Very very rough Tagalog: Ang multi-access edge computing, dating mobile edge computing, ay isang konsepto ng network architecture na tinukoy ng ETSI na nagbibigay-daan sa mga kakayahan sa cloud computing at isang IT service environment sa gilid ng cellular network at, higit sa pangkalahatan sa gilid ng anumang network.
Explanation:
Bugs always seem to creep into programs and code. What strategies have you learned to find bugs more easily and crush them with a fix?
The process involves in finding bugs as well as crushing them in a debugging process is extensive and this can consist of following process;
Examination of the error symptoms
identifying the cause of it
fixing of the error.
This process is usually required a large amount of work, Although no precise procedure that is set in for fixing all error, but some useful strategies that use in reducing the debugging effort.
One of the significant part of this process is localizing of the error, which is figuring out the cause as well as the symptoms. Strategies that I have learnt in finding and fixing the error in the process of debugging includes;Incremental as well as bottom-up program development; development of the program incrementally remains one of the most effective ways that can be used in localizing the error, often testing as the piece of code is added, so with this it will be easier to find the error since any error is from the last piece of code added.And also since the last fragment of the code will be small then searching for bugs won't take much time to find and debug.Bottom-up development helps in maximizing the benefits that comes from incremental development. With bottom-up development, after successful testing of a code, it's behavior will not change once another piece is added to it, since existing code will never replied on new part so it will be easier to trace error in the new code and fix it.Instrument program can be used to log information and there can be insertion of print statements.Instrument program using assertions; Assertions can be used in checking if the program actually maintains the properties or those invariant that the code relies on, Because the program will definitely stops once the assertion fails, and there is actuality that the point where the program reached and stops is closer to the cause, as well as good indicator of how the problem looks like , then the bug can then be fixed.breakpoints can be set in the program as well as stepping and over functions, then watching program expressions, as well as inspection of the memory contents at a particular point during the execution can give the needed run-time information.Backtracking: this option works in a way whereby one will need to start from the point that the problem occurred then go back through the code to to detect the issue, then the bug can then be fixed.Binary search: this is exploration of the code by using divide and conquer approach, so that the the bug be pin down quickly.Therefore, Bugs are treat to programs and they can be dealt with using discussed methods.
Learn more at: https://brainly.com/question/15289374?referrer=searchResults
When text is used as a Hyperlink, it is usually underlined and appears as a different color.
Question 3 options:
True
False
In a word processing program, under which tab or menu option can you adjust the picture brightness?
Explanation:
You must have selected a picture in order the tab format to be available. you should click the picture then you want to change the brightness for and u under picture tools, on the format tab,in the adjust group, click corrections.grade 11 essay about the year 2020
Answer:
This 2020 have a new normal class because of CO VID-19 Disease have more students and teachers patient the teachers is preparing a module to her/his student and the student is answering are not learning lesson because of the COV ID-19 the whole word enduring to that pandemic and all fronliners is the hero in this pandemic because all frontliners is helping the people to we heal and to healed that virus.
Explanation:
How does computer hardware and software work together?
Answer:
Computer software controls computer hardware which in order for a computer to effectively manipulate data and produce useful output I think.
Explanation:
When machining rotors, what is the reason for setting the indexing collars to zero?
A. To know how much metal was taken off of each side.
B. To make sure that no cut exceeds .010 inch
C. To determine the proper cut speed of the Brake Lathe.
D. To measure the depth of the grooves on the rotor surface.
Answer:
To determine the proper cut speed of the brake lathe
To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.
What is indexing collars?
Thus, they can have a maximum of 256 colors, which is the amount of colors that 8 bits of information can specify (28 = 256). Fewer colors are produced by lower bit depths, which also result in smaller files. At the conclusion of this chapter, in Section 19.8, this is covered.
"Indexed color" refers to the fact that a color table contains the palette—the collection of colors—of the image. A reference (or "index") to a table cell containing the pixel's color is present in each pixel of the image.
By choosing Image Mode Color Table in Photoshop, you can view the table for an indexed color image.
Therefore, To determine the proper cut speed of the brake lathe reason for setting the indexing collars to zero.
To learn more about indexing collars, refer to the link:
https://brainly.com/question/12608731
#SPJ2