Answer:
integer userInput
userInput = Get next input
if userInput % 400 == 0
Put userInput to output
Put " is a leap year" to output
else
if userInput % 4 == 0
Put userInput to output
Put " is a leap year" to output
else
Put userInput to output
Put " is not a leap year" to output
Explanation:
I don't know what is so special about Coral but here we go. I couldn't find and IDE that supported Coral so I just used their Coral simulator on their website. The first if statement on line 5 determines if the number is divisible by 400. If so, the leap year is on a century year e.g 1900 1800. If not, the else statement will be executed and the second if statement will execute. If the number is divisible by 4, it is a leap year. If not, the else statement gets executed in which case the number was not a century leap year or a leap year. After that the program terminates.
Hope this helped :) If it didn't let me know and I do my best to find out what went wrong.
Have a good day :)
Chất xơ có nhiều trong thực phẩm nào?
Answer:
Quả lê Quả lê là một loại trái cây phổ biến vừa ngon vừa bổ dưỡng. ...
Quả dâu tây. Dâu tây là loại quả cực kỳ ngon. ...
Quả bơ Quả bơ khác hơn so với hầu hết các loại trái cây. ...
Quả táo. ...
Quả mâm xôi. ...
Quả chuối. ...
Cà rốt. ...
Củ cải đường.
(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term ergonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop
Answer:
1.similarity:
they are both editing keys3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours
4.
.a click is pressing and releasing the left mouse button onceright click is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selectiondouble click is pressing the left button twice in rapid successiondrag and drop is where by the user drags an icon or item from one location on the screen to another.Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses to the int * parameters. Prompt the user for a character. Get their response as a single character and return that from the function. In main Define three variables and call your function. Print values of your variables
Answer and Explanation:
In C programming language:
char fun(int*a, int*b){
printf("enter two integers: ");
scanf("%d%d",a,b);
int e;
printf("please enter a character: ");
e=getchar();
return e;
}
int main(int argc, char *argv[]) {
int d;
int f;
int g;
fun();
printf("%d%d%d", d, f, g);
}
We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.
Write a c program that asks the user
to enter distance in KM and Petrol Price in Rs.
Program should compute estimated budget for
the travel distance (Assume your car covers 100
KM in 8 Liters of fuel). Program should run in a
loop and ask the user “Do you want to
continue?”. If user enters ‘y’ or ‘Y’ program
should repeat otherwise terminate.
Answer:
#include <stdio.h>
int main()
{
int x;
float y;
printf("Input total distance in km: ");
scanf("%d",&x);
printf("Input total fuel spent in liters: ");
scanf("%f", &y);
printf("Average consumption (km/lt) %.3f ",x/y);
printf("\n");
return 0;
}
There are two circular grounds Ground-A and Ground-B. Ground-A is having diameter of 15 meters and Ground-B is having diameter of 20 meters. Mohsin is running in Ground-A and Neetesh is running in Ground-B. Write a program in C++ that asks the user to input the time taken, in seconds, to complete one compete round of the ground by both the friends and displays who is running faster.
Answer:
A
Explanation:
b/c the round of 'A' is less than ruond of'B'
1. Open the start file EX2019-ChallengeYourself-9-3. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
2. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the top of the workbook so you can modify the workbook.
3. Use Consolidate to create a summary of real estate sales for all property types. Place the consolidated data on the Summary worksheet in cells B3: C15. Use the Average function to consolidate the data from cells B2: C14 in the Condo, Townhouse, and Single Family worksheets. Include links to the source data.
4. Import individual sales data from the tab-delimited text file Select Sales Data 2019-2020. Import the data as a table in cell A1 of the Select Sales worksheet.
5. Remove the data connection when the import is complete.
6. In the Select Sales worksheet, add data validation to restrict values in the House Type columns (cells B2: B139) to the values in the cell range named PropertyTypes. Include a drop-down list of values in the cells to assist in data correction.
7. Add the following input message to cells B2:B139: Select a property type from the list.
8. Add the following error alert to cells B2:B139: Not a valid property type.
9. Apply data validation circles to any values that violate the data validation rules you just created.
10. Add a comment to cell B1 in the Select Sales worksheet that reads: This needs to be fixed.
11. Add a hyperlink from cell B1 in the Select Sales worksheet to link to the named range (defined name) PropertyTypes. Test the link.
12. Use Flash Fill to add a new column of data to the Select Sales worksheet to display the number of bedrooms/the number of bathrooms.
a. In the Select Sales worksheet, cell F1, type the heading: BR/BA
b. Complete the column of data using this pattern in cell F2: 1 BR/1 BA
You will need to enter at least two samples in order for Flash Fill to suggest the correct autofill data. Check your work carefully.
Sales Summary 2019-2020
Number of Sales Average Selling Price
1
2
3 One BR, One BA
4 One BR, Two BA +
5 Two BR, One BA
6 Two BR, Two BA
7 Two BR, Two BA +
8 Three BR, One BA
9 Three BR, Two BA
10 Three BR, Three BA +
11 Four BR, One BA
12 Four BR, Two BA
13 Four BR, Three BA+
14 Five BR-. One BA
15 Five BR+ Two BA+
16
17
18
19
20
21
22
23
24
Answer:
Omg what is this
soooo long questionn
i am fainted
what rubbish you written how long the question is of which subject
what's your name
If you were driving the blue Prius in the situation pictured above, explain why the red Mustang should be given right-of-way at this intersection.
Answer:
The red Mustang should be given the right-of-way at this intersection because:
The red Mustang arrived first before the blue Prius and is closer to the stop sign before the arrival of the blue Prius. This implies that the red Mustang must have waited for its turn, unlike the blue Prius that just arrived at the intersection.
Explanation:
Traffic laws, regulations, and IPDE defensive driving strategy require that drivers always give way to the vehicle that arrived before them at an intersection. Assuming that multiple vehicles reach the intersection simultaneously, then the vehicle must be given the right-of-way. Alternatively, the traffic lights at the intersection should be obeyed and be allowed to regulate the movement of vehicles. IPDE defensive driving strategy requires drivers to be watchful of their driving spaces to determine the appropriate time to move.
Write a recursive function named is_decreasing that takes as its parameter a list of numbers. It should return True if the elements of the list are strictly decreasing (each element in the array is strictly less than the previous one), but return False otherwise.
Answer:
c
Explanation:
Explain the purpose of the open() and close() operations.
Answer:
The open() operation notifies the system that the named file is about to become active. The close() operation notifies the system that the named file is no longer in active use by the user who issued the close operation.
Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the DigiFirm Investigation Company. Chris, your team leader, explains that your biggest client, Major Corporation, is evaluating how they back up their data. Chris needs you to write a report that compares traditional backup methods to those provided by a cloud service provider, including the security of cloud services versus traditional forms of on-site and off-site backup. For this assignment: 1. Research both traditional and cloud data backup methods. 2. Write a paper that compares the two. Make sure that you include the security of cloud services versus traditional forms of on-site and off-site backup. Required Resources Course textbook Internet Submission Requirements Format: Microsoft Word Font: Arial, size 12, double-space Citation Style: Follow your school's preferred style guide Length: 1-2 pages If-Assessment Checklist I researched both traditional and cloud data backup methods. I wrote a report that compares the two. I included the security of cloud services versus traditional forms of on-site and off-site backup. I organized the information appropriately and clearly. . I created a professional, well-developed report with proper documentation, grammar, spelling, and nunctuation
Answer:
Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules.
Security Risk Scoring
Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.
Operational Security
Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.
Database Activity Monitoring
Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.
Only by covering both of these areas can organizations have defense in depth and effectively control risk.
different types of computer and state the major difference between them
Answer:
computers system may be classified according to their size.
four types of computers are;
microcomputers / personal computers- micro computers are also called personal computers which is PC this computer came in different shapes size and colors. a personal computers are designed to be used by one person at a time.some examples of the computer are;
laptopdesktopa palmtopa work station2. mini computers- mini computers are sometimes called mid-range computers which are more powerful than microcomputers and can support a number of users performing different tasks, they were originally developed to perform specific tasks such as engineering calculations.
3. Mainframe computers- Mainframe computers are larger systems that can handle numberous users, store large amounts of data and process transaction at a high rate. these computers are expensive and powerful.
4. super computers- super computers are the most largest, fastest and most powerful computer. this systems are able to process hundreds of million of instructions per second they are used for job requiring and long complex calculation.
If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to a group? What commands would you use? What configuration files would you check and modify?
Following are the responses to this question:
The user account is "olivia".In the Linux system to see the account go to the "/home directory".For the configuration file we use ".bash_logout , .bash_profile, and .bashrc" files.Creating users:
We will use the useradd command to achieve this. Using that same command, you can create users who would log in or customers who would log in (in the case of creating a user for a software installation).
In its basic form, the command is as follows:
[Options] useradd usernameTake this user olivia, for instance. Assuming that you had been to issue the command prompt:
olivia has become a user.Users are added to the system without the need for a home directory and are unable to log on. It if we were using this rather than running the command without arguments?
sudo using useradd -m oliviaUsing the command above, a new user would be created, including a home directory that corresponded to the username. That means that you might now see the name "olivia" in the directory "/home".
But what about the lockout concern that was raised earlier? Both these methods are possible. After creating the user, you can enter the following command:
Password for olivia is: sudo passwd oliviaYou'll be requested to enter & verify your new password once you've completed the process. This unlocks the user profile, allowing them to log in.
This command might look like if you wanted to accomplish it in one go:
sudo useradd -m olivia -p PASSWORDYou should be using Passcodes as the login for the user olivia.
As soon as the user logs in, he or she can update their account password by using the password command to input their current password, and afterward entering/verifying their new one.
To create a user that has no personal account and cannot log in, execute the following instructions:
sudo use useradd as the-M USERNAME sudo use usermod as the -L USERNAMEThe user to be added is identified by USERNAME.
It establishes a user with really no root folder and prevents them from signing in with a second operation.
To add an existing user to a group on Linux, follow the instructions:
As root, log in to your accountUse the useradd instruction to add a new user (for example, useradd roman)If you'd like to log on as a new customer, type su plus that user's name.Entering the word "exit" will logout you from your account.Another way to add a user to a group under Linux would be to use the following syntax:
Alternatively, you can use the usermod command.The name of the club should be substituted for example group in this sentence.Example username should be replaced with the name of the user you'd like added.The following operations are performed when a new login is added to the system.
The user's home directory (/home/username by default) is now created.To set configuration files for the user's session, the following secret files are copied into another user's home directory..bash_logout
.bash_profile
.bashrc
/var/spool/mail/username includes the user's mail spool.The new user account is arranged in groups with the same name.Learn more:
Linux system: brainly.com/question/13843535
A technology company starts a program dedicated to training high school students in the use of the latest computer programming languages. How can the company justify creating and funding such a program since it is not about its primary products
Answer:
The answer is "Spending the money can improve the company's reputation and attract new personnel with the necessary abilities".
Explanation:
In many cases, companies engage in activities tangential to their principal service or brand. As more than just a result, the purpose is to boost the company's reputation and at the same time raising societal awareness.
To strengthen its very own business reputation and to create future employees by teaching necessary skills, a technology organization may be established throughout the given case.
Every one of these initiatives helps to boost the brand's reputation & image, as well as the customer's confidence.
Write a game that performs the roll of two dice randomly. The game should first ask for a target sum. Everytime the player enters r, the program should repeatedly print the side of the dice on a separate line. The game should stop prompting if one of these two events occur: -The sum of the two sides is equal to the target sum. -The player enters q.
Answer:
Explanation:
The following program was written in Java. It asks the user to first enter the target sum. Then it creates a while loop that continues asking the user to either roll dice or quit. If they decide to roll, it rolls the dice and prints out both values. If the target sum was hit, it prints that out and exits the program otherwise it loops again. The code has been tested and can be seen in the attached image below.
import java.util.Random;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Random rand = new Random();
Scanner in = new Scanner(System.in);
System.out.print("Enter Target Sum: ");
int targetSum = in.nextInt();
while (true) {
System.out.println("r: Roll Again");
System.out.println("q: Quit");
String choice = in.next();
char choiceModified = choice.toLowerCase().charAt(0);
if (choiceModified == 'r') {
int roll1 = rand.nextInt(6) + 1;
int roll2 = rand.nextInt(6) + 1;
int total = roll1 + roll2;
System.out.println("Dice 1: " + roll1);
System.out.println("Dice 2: " + roll2);
if (total == targetSum) {
System.out.println("Target Sum of " + targetSum + " hit.");
break;
}
} else if (choiceModified =='q') {
break;
} else {
System.out.println("Wrong choice");
}
}
}
}
if you want to present slides to fellow students or co workers, which productivity software should you use
Answer:
Power point is a good software to use for slides
During the testing phase of an ERP system, the system implementation assurers should review: Group of answer choices Program change requests Vendor contracts Error reports Configuration design specifications
Answer:
Error reports
Explanation:
ERP is a multimodal software system that integrates all business processes and the function's of the entire organizations into single software system using a one database.Write an algorithm to find the sum of the following series:
a) 1+x+x^2+x^3+...+x^20
b) 1-x+x^2-x^3+...+x^20
c) 1+x/2+(x²)/3+(x^3)/4+...+(x^20)/21
Answer:
The algorithm is as follows:
Input x
sum_a = 0
sum_b = 0
sum_c = 0
for i = 0 to 20
sum_a = sum_a + x^i
sum_b = sum_b + (-x)^i
sum_c = sum_c + x^i/(i+1)
print sum_a, sum_b, sum_c
Explanation:
Required
An algorithm to solve (a), (b) and (c)
For Series (a):
This series is a geometric progression and the common ratio is x
i.e.
[tex]r = x/1 = x^2/x = ...... = x^{n+1}/x^n =x[/tex]
So, the sum of the series is:
Sum = Previous Sums + x^i --- where i is between 0 and 20 (inclusive)
For Series (b):
This series is a geometric progression and the common ratio is -x
i.e.
[tex]r = -x/1 = -x^2/x = ...... = -(x^{n+1}/x^n) = -x[/tex]
So, the sum of the series is:
Sum = Previous Sums + (-x^i) --- where i is between 0 and 20 (inclusive)
For Series (c):
This series is a neither arithmetic nor geometric progression.
It obeys the following rule:
[tex]\frac{x^i}{1+i}[/tex] --- where i is between 0 and 20 (inclusive)
So, the sum of the series is:
Sum = Previous Sums + [tex]\frac{x^i}{1+i}[/tex]
how can I order the prices negatively affect other producers of goods and services
(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.
Answer:
The answer is "True".
Explanation:
The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).There must always be the only primary key in such a relational database.This is a specific relational database field (or column combination) that identifies each table entry in a unique way.It utilized it to swiftly analyze the data within the table as a unique identifier.If x=3.123, then int(x) will give ?
Answer:
3
Explanation:
int(x)=3
int(x) rounds to the smallest whole number
For example,
if you say int(3.99) it is also 3
1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message. Save the file as SqrtException.java.
2. Create a ProductException class whose constructor receives a String that
consists of a product number and price. Save the file as ProductException.java.
Create a Product class with two fields, productNum and price. The Product
constructor requires values for both fields. Upon construction, throw a
ProductException if the product number does not consist of three digits, if the
price is less than $0.01, or if the price is over $1,000. Save the class as Product.java.
Write an application that establishes at least four Product objects with valid and invalid values. Display an appropriate message when a Product object is created
successfully and when one is not. Save the file as ThrowProductException.java.
Answer:
Hence the answer is given as follows,
How do i connect WiFi on windows xp without icon?
Answer:
Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.
Write a program that takes a date as input and outputs the date's season. The input is an integer to represent the month and an integer to represent the day. Ex: If the input is: 4 11 the output is: spring In addition, check if both integers are valid (an actual month and day). Ex: If the input is: 14 65 the output is: invalid The dates for each season are: spring: March 20 - June 20 summer: June 21 - September 21 autumn: September 22 - December 20 winter: December 21 - March 19
Answer:
Explanation:
The following program is written in Java. It is a function that takes in the two parameters, combines them as a String, turns the combined String back into an integer, and uses a series of IF statements to check the parameters and determine which season it belongs to. Then it prints the season to the screen. The code has been tested with the example provided in the question and the output can be seen in the attached image below.
class Brainly {
public static void main(String[] args) {
getSeason(4, 65);
getSeason(4, 11);
}
public static void getSeason(int month, int day) {
String combined = String.valueOf(month) + String.valueOf(day);
int combinedInt = Integer.parseInt(combined);
if ((month > 0 && month < 12) && (day > 0 && day < 31)) {
if ((combinedInt >= 320) && (combinedInt <= 620)) {
System.out.println("The Season is Spring");
} else if ((combinedInt >= 621) && (combinedInt <= 921)) {
System.out.println("The Season is Summer");
} else if ((combinedInt >= 922) && (combinedInt <= 1220)) {
System.out.println("The season is Autumn");
} else {
System.out.println("The Season is Winter");
}
} else {
System.out.println("Invalid date");
}
}
}
111+ 11- 1
1111+1111
1101 +1101
1010-11
Answer: 121, 2222, 2202, 999
Explanation:
Answer:
a. 121
b. 2222
c. 2202
c. 999
Hello everybody,
For the quiz questions, I tried using the circular method, but got a numeric, period or comma error?
So I tried using the solver to find the same solution I got, but when I entered it in the answer box, he always said incorrectly.
Any help would be highly appreciated and write the results here, why do I have to read the solution quiz because I was wrong? thank you.
The bisection method is being used to calculate the zero of the following function between x = 0 and x = 1.
What is the midpoint for the 3rd iteration? (The midpoint for the 1st iteration is 0.5.) Provide your answer rounded to the thousandths place.
Answer:
i don't know the answer please tell me
_________ are standard devices, such as switches and routers, that have small onboard computers to monitor traffic flows through the device as well as the status of the device and other devices connected to it
Answer:
Managed devices
Explanation:
hope it helps u
when was first generation of computer invented?
Select the pseudo-code that corresponds to the following assembly code. Assume that the variables a, b, c, and d are initialized elsewhere in the program. You may want to review the usage of EAX, AH, and AL (IA32 registers). Also recall that the inequality a > b is equivalent to b < a. i.e. If A is greater than B, that's equivalent to saying that B is less than A.
.data
; General purpose variables
a DWORD ?
b DWORD ?
c BYTE ?
d BYTE ?
upperLevel DWORD 18
lowerLevel DWORD 3
; Strings
yes BYTE "Yes",0
no BYTE "No",0
maybe BYTE "Maybe",0
code
main PROC
mov eax, 1
cmp AH, c
jg option1
jmp option3
option1:
mov edx, OFFSET yes
call WriteString
jmp endOfProgram
option2:
mov edx, OFFSET no
call WriteString
jmp endOfProgram
option3:
mov edx, OFFSET maybe
call WriteString
endOfProgram:
exit
main ENDP
END main
a) if (c > 0)
print (yes);
else
print (maybe);
b) if (c < 0)
print (yes);
else
print (maybe);
c) if (c < 1)
print (yes);
else
print (maybe);
d) if (c > 1)
print (yes);
else
print (maybe);
Answer:
ae
Explanation:
The pseudo-code that corresponds to the given assembly code is:
b) if (c < 0)
print (yes);
else
print (maybe);
What is the pseudo-codeIn assembly code, the command cmp AH, c checks if the high byte of the EAX register (AH) has the same value as the variable c. Then, if the value in AH is more than the value in c, the instruction jg option1 will move to option1.
Therefore, In the pseudo-code, one can check if c is smaller than 0. If it happens, we say "yes". If not, we say "maybe"
Read more about pseudo-code here:
https://brainly.com/question/24953880
#SPJ2
Irene llegó tarde al colegio_______________
ayúdenme
^_^^_^^_^^_^^_^^_^^_^^_^^_^
Answer:
Explanation:
Absconding
Which one of the following does not contain information?
1) A weather report
2) A time table
3) A price list displayed in a supermarket
4) An unlabeled chart
Answer:
4
Explanation:
4 is the ans as weather;timtable and price list display information