How much money would that same computer cost in louisville county, kentucky? what about in coffee county, alabama?.

Answers

Answer 1

The about of money that you save if you bought it in Davidson County is:

It will cost about $1,097.5 in Williamson County.It will cost about $1,092.5 in Davidson County.$5 is the amount which will be saved.What does saving money entail?

Savings is the money that remains after expenses and other commitments have been subtracted from income. Savings are the sum of money that would otherwise be lying about, not being risked on investments or used for consumption.

Deferred consumption, or not spending money, is saving. Savings strategies involve setting money aside in places including cash, investment funds, pension accounts, and deposit accounts. Reducing expenses, such as regular expenses, is another aspect of saving.

Hence,

In  Williamson County, the sales tax rate is 9.75% = 9.75% × $1,000 = $1,097.5

In Davidson County , the sales tax rate is 9.25% =  9.25%  × $1,000 = $1,092.5

The total amount saved will be: $1,097.5 - $1,092.5 = $5.

Learn more about money  from

https://brainly.com/question/27167637
#SPJ1

See full question below

If you were to buy a $1,000 computer in Tennessee, how much would it cost in

Williamson County? How much would you save if you bought it in Davidson County?

Answer 2

Answer:

Louisville County $1,060

Coffee County $1,050

Explanation:

Louisville: 6 x 1,000 = 6,000 hit the percent button and you get 60 then just add that to the original 1,000. Do the same thing with Coffee County


Related Questions

data analyst wants a quick summary of the structure of their data frame, including the column names and the number of rows and variables. what function should they use?

Answers

A summary of a data frame's structure, including column names, row and variable numbers, and the kind of data stored, is returned by the str() function.

What are DataFrames in Python?A 2-dimensional labeled data structure called a "DataFrame" has columns that could be of many sorts. It can be compared to a spreadsheet, SQL table, or dictionary of Series objects. It is typically the pandas object that is used the most.Data for the function. Data frames, the primary data structure utilised by most of R's modelling tools, are closely tied collections of variables that share many characteristics with matrices and lists. Data frames are created via the frame() function.A Dataset is arranged into named columns to form a DataFrame. Similar in idea to a table in a relational database or a data frame in R or Python, but with more sophisticated optimizations.

To Learn more About data frame Refer To:

https://brainly.com/question/28448874

#SPJ4

Organizations that are concerned about the security of their data should not use public cloud computing.

Answers

Answer: True, but with good cyber security and firewalls they should be fine.

Explanation:

a company uses a devsecops approach for developing and maintaining software. in one environment, developers complete penetration and vulnerability scanning to ensure the system is free of bugs and coding errors early on. which of the following best describes this environment?

Answers

By incorporating security early on and throughout the whole software development life cycle, DevSecOps seeks to safeguard the software development process.

What is software development process?

Software development process is defined as a method for streamlining software development tasks into smaller, concurrent, or sequential steps or sub-processes to enhance product management and design. An alternative name for it is a software development life cycle.

DevSecOps integrates real-time continuous feedback loops and insights throughout the whole SDLC, from planning and design to coding, building, testing, and release. The DevOps methodology for developing software is based on three pillars: organizational culture, processes, and technology & tools.

Thus, by incorporating security early on and throughout the whole software development life cycle, DevSecOps seeks to safeguard the software development process.

To learn more about software development process, refer to the link below:

https://brainly.com/question/20318471

#SPJ1

the date for sending the final rfp to vendors is considered a milestone because it signals that .

Answers

The date for sending the final RFP to vendors is considered a(n) milestone because it signals that all RFP preparation work is complete.

What follows the approval of an RFP?

An RFQ is frequently distributed following an RFP, although it can also be distributed independently for products and services that are especially standardized.

After final approval, you can use an RFP award notification letter to inform the winning vendor of your decision and start negotiating the terms of the contract.

Note that An organization, typically a government agency or large corporation, posts a request for proposals (RFP) in order to receive a formal bid from potential vendors for the desired IT solution.

Learn more about RFP from

https://brainly.com/question/12996542
#SPJ1

When using an accumulator variable while iterating through a list, you need to make sure to initialize the value to?.

Answers

When using an accumulator variable while iterating through a list, you need to make sure to initialize the value to 0.

Accumulators are variables that can effectively enable parallel processing because they can only be "added" to through an associative and commutative operation. They can be utilized to implement counters or sums (as in MapReduce). Programmers can add support for new kinds, and Spark already supports accumulators of numeric types by default.

There are some patterns that you will repeatedly observe when writing for loops. The most typical pattern is the accumulator pattern.

Let's take the example of wanting to count the number of times a for loop is executed. Variables in an algorithm (and in the corresponding program) include counters and accumulators, each of which has a specific function. These variables need to be thoroughly documented.

To know more about accumulators click here:

https://brainly.com/question/13152930

#SPJ4

a backdoor acts like a device driver, positioning itself between the kernel (the core program of an operating system) and the hardware

Answers

The kernel of the operating system, which regulates hardware and software operations, is a crucial part of it. The kernel serves as a link between software programs and hardware-level data processing carried out through system calls and inter-process communication.

What constitutes the operating system's core?

The foundation of an operating system is a kernel. The operating system's kernel is the initial software that is loaded into main memory to start the system up.

What does the kernel's interface look like?

The interface of the kernel is a base abstraction layer. A system call must be made when a process asks the kernel for a service; this is typically done through a wrapper function.

To know more about Operating System visit:-

brainly.com/question/6689423

#SPJ4

The ______ interprets and carries out the basic instructions that operate a computer.

Answers

The processor interprets and carries out the basic instructions that operate a computer.

What is Processor?

An integrated electronic circuit called a processor is what does the calculations for a computer. A processor executes basic instructions given from an operating system, including mathematical, logical, input/output (I/O), and other operations (OS). The majority of other processes rely on the actions of a processor.

What is Operating System?

An operating system (OS) is a piece of software that controls all other application programs in a computer after being originally loaded by a boot program. Through a specified application program interface, the application programs use the operating system by requesting services (API).

CPUs will perform most basic arithmetic, logic and I/O operations, as well as allocate commands for other chips and components running in a computer. The term processor is used interchangeably with the term central processing unit (CPU), although strictly speaking, the CPU is not the only processor in a computer.

Learn more about processor click on this:

https://brainly.com/question/474553

#SPJ4

a computer is mounted inside a cabinet, and you want to know if the usb 3.0 port has been disabled. which menu would you use?

Answers

SATA serial cables are incredibly thin, allowing for smaller chassis designs and more effective airflow inside a form factor.

What is the SATA port and its function?

Mass storage devices, including as hard drives and optical discs, can connect with the motherboard utilizing a high-speed serial cable over two pairs of wires to Serial Advanced Technology Attachment, often known as Serial ATA or SATA.

External storage devices can be connected to your PC using USB drives. Universal Serial Bus, sometimes known as USB, offers 1.1 or 2.0 user interfaces.

Therefore, The onboard devices' menu is used to check whether the specific SATA port you're connected to an eSATA bracket is enabled.

Learn more about SATA port here:

https://brainly.com/question/14612177

#SPJ1

8.if converting scada systems to the internet protocol increases the risk of a hacker taking control of an industrial process, why are companies doing just that?

Answers

Companies are trying to convert SCADA systems to Internet Protocol in order to save money and perform remote maintenance and monitoring.

What is a hacker?

Computer hackers are unauthorized users who gain access to computer systems with the intent of stealing, changing, or destroying data, frequently by installing dangerous malware without your knowledge or consent.

Their deft tactics and in-depth technical knowledge enable them to gain access to information you don't want them to have.

If a SCADA system is not properly supervised, it is vulnerable. These systems are designed to keep up with the latest technological advances.

Companies are attempting to convert SCADA systems to Internet Protocol in order to save money on maintenance and monitoring.

Thus, due to this, companies are converting SCADA systems to IP.

For more details regarding hacker, visit:

https://brainly.com/question/29215738

#SPJ1

Which of the following is not true about backbone networks?
a. They may also be called enterprise networks if they connect all networks within an organization.
b. They typically connect many networks, including LANs.
c. They typically provide connections to other BNs, WANs, MANs, and the Internet.
d. They may also be called campus networks if they connect many BNs spanning several buildings as a single location.
e. They tend to use lower speed circuits than LANs.

Answers

The option that is NOT true about backbone networks  is that " They tend to use lower speed circuits than LANs." (Option E)

What are backbone Networks?

A backbone or core network is a component of a computer network that links networks and provides a conduit for information exchange across multiple LANs or subnetworks. A backbone can connect heterogeneous networks inside the same building, across campus buildings, or over large distances.

The backbone network is an essential architectural component for constructing corporate networks. It acts as a conduit for information sharing across multiple LANs or subnetworks. A backbone can connect heterogeneous networks inside the same building, across campus buildings, or over large distances.

A backbone network is a high-speed network that connects many networks inside a single business or government facility. If it links all networks within a corporation, it is also known as an enterprise network.

Learn more about backbone networks:
https://brainly.com/question/13944451
#SPJ1

a single corporation can offer television, phone, and internet services due to which of the following? group of answer choices a key merger between a phone and cable company in the early 2000s the supreme court supporting companies' right to make a profit by offering multiple products the telecommunications act of 2001 the telecommunications act of 1996 deregulation of the telecommunications industry in the 1980s

Answers

A single corporation can offer television, phone, and internet services due to a key merger between a phone and cable company in the early 2000s. Thus, the correct option for this question is A.

What are the advantages of Internet services?

The advantages of internet services may include connectivity, communication, and sharing that increase the efficiency in the working of individuals like banking selling, shopping, funding, entertaining, etc.

According to the key merger between a phone and cable company in the early 2000s, it gave a chance to corporations that can offer multiple products in order to increase their complete turnover. It makes a lot of perks to the corporation in expanding their demands with respect to the customer's needs.

Therefore, the correct option for this question is A.

To learn more about Internet services, refer to the link:

https://brainly.com/question/18000293

#SPJ1

ASAP!!!!!How Can I Create a High-Quality Business Document?
Required Materials
• Word processing software
In Unit 4, you researched some career choices that interested you. Select one of these career
options and think about a word processing document that might need to be generated for
this job. Use your creativity and word processing skills to create this document. You can
choose a business report, a performance review, an informational flier, or any other type of
document that would be useful in this job. Feel free to perform online research for more
ideas if you need to.
I
Step 1: Select a Document to Create
Decide what type of document you would like to create that would be helpful in the career
field of your choice.

Answers

Every business needs its business documents. The story of your company is best told through its documentation, including its origins, present state, and future plans.
What are Business Documents?
All files, documents, papers, books, reports, records, letters, etc. that are related to a business are referred to as business documents.

Simply simply, business documents are any documents that relate to the operations of a business.

They could be contracts, consumer information, financial transactions, meeting minutes, or any other written communication, the list is endless.

How To Create Business Documents?
Step 1: Determine the Document's Need
Step 2: Discover Who Is Your
Step 3: Draft An Outline
Step 4: Maintain Clarity
Step 5: Proofread

You can learn more about creating business document from this link

https://brainly.com/question/10675876

#SPJ13

) suppose you purchase a wireless router and connect it to your cable modem. also suppose that your isp dynamically assigns your connected device (that is, your wireless router) one ip address. also suppose that you have five pcs at home that use 802.11 to wirelessly connect to your wireless router. how are ip addresses assigned to the five pcs? does the wireless router use nat? why or why not?

Answers

Using an Ethernet cable, join your modem to your router. The majority of routers contain many Ethernet ports, however there is one designated for connecting directly to the modem that is marked "Internet" or "WAN" (wide area network).

How do I connect my router to my computer?Depending on the model, you can use a cable or wireless connection to link a computer to a router.In contrast to slim and light laptops like the MacBook Air, the majority of laptops enable Wi-Fi connections but may not have an Ethernet connector for wired communication. You will next want a USB adaptor.Every desktop has an Ethernet port, and some gaming and workstation configurations even have two. Thanks to Wi-Fi 5, computers now have more Wi-Fi than in previous years.You should have all the cables you need if this is your first time connecting a computer to a router with an Ethernet cable. Manufacturers normally provide at least one cable with the router, but be sure your product's parts list includes all of them. If your router didn't come with an Ethernet cable, we offer a list of the top ones.

To Learn more About Ethernet cable refer to:

https://brainly.com/question/28447662

#SPJ4

what most likely the slowest arithmetic operation between two 32bit integer operands on modern cpus. assmume the compiler is optimizing

Answers

The best course is likely to create a different implementations and profile them with different compilers & settings (which is likely what you have already been doing) because while MUL is typically a lot faster in modern architectures, if you take power consumption rather than latency into account, then things change. MUL units are quite huge and draw a lot of power, so you might actually be better off with ADD in some cases.

Performance 32 bit:

Generally, even code written for a 64-bit platform uses 32-bit variables where values will fit in them. This isn't primarily because arithmetic is faster (on modern CPUs, it generally isn't) but because it uses less memory and memory bandwidth.

A structure containing a dozen integers will be half the size if those integers are 32-bit than if they are 64-bit. This means it will take half as many bytes to store, half as much space in the cache, and so on

What is 32-bit?

The 32-bit architecture of a CPU allows for the transfer of 32 bits of data per clock cycle. In plainer terms, it is the volume of data that your CPU can handle each time it executes an operation. Only 32 "vehicles" (bits of data) can pass through an intersection at once in this architecture, which can be compared to a road that is 32 lanes wide.

Technically speaking, this means that processors can operate on 32-bit binary numbers. Any larger, and the computer would have to divide the data into more manageable chunks.

To learn more about CPU, visit:https://brainly.com/question/474553

#SPJ4

what would be the disadvantage of using a single linked list (without a pointer to the back of the linked list) as a queue?

Answers

The disadvantage of using a single linked list as a queue is that it is not possible to efficiently remove an element from the back of the queue.

What is queue?

A queue is a collection of items that are kept in a sequence and can be updated by adding entities at one end of the sequence and removing entities from the other end of the sequence. By convention, the end of the sequence where items are added is referred to as the back, tail, or rear of the queue, and the end where elements are removed is referred to as the head or front of the queue, similar to how people line up to wait for goods or services.

To learn more about queue
https://brainly.com/question/22437959

#SPJ4

Write a program that asks the user to enter a city name, and then prints Oh! CITY is a cool spot. Your program should repeat these steps until the user inputs Nope.

Sample Run:
Please enter a city name: (Nope to end) San Antonio
Oh! San Antonio is a cool spot.
Please enter a city name: (Nope to end) Los Angeles
Oh! Los Angeles is a cool spot.
Please enter a city name: (Nope to end) Portland
Oh! Portland is a cool spot.
Please enter a city name: (Nope to end) Miami
Oh! Miami is a cool spot.
Please enter a city name: (Nope to end) Nope

Answers

user_name = input("Please enter city name to run the program: ")

while( user_name != "Nope" ):

  print("Nice to meet you ", user_name )

  user_name = input("Please enter a name or type Nope to terminate the program: ")

I hope this helps!

Who invented the first computer program to help the analytical engine calculate numbers.

Answers

Answer:

(In 1843 mathematician Ada Lovelace wrote in her notes for a translation of a French article about the Analytical Engine how the machine could be used to follow a program to calculate Bernoulli numbers. For this, she has been called the first computer programmer.)

In the 1840s, Ada Lovelace became the first computer programmer, inspite of the fact that the Analytical Engine (the computer that she designed the programs for) wasn't ever manufactured. She was also the first person to suggest that a computer could be more than just an oversized calculator!

Explanation:

Ada Lovelace is the correct one

in the lab, you covered up the tracking of access to the log files by deleting lines within the access.log file. what other types of controls could be put in place to identify that these changes occurred? what other types of security measures could be put in place to help secure the web server?

Answers

in the lab,  Since you covered up the tracking of access to the log files by deleting lines within the access.log file. the types of controls that could be put in place to identify that these changes occurred is the use of contingency plans (BCP) or the use of intruder detector  or check your history.

Some other types of security measures could be put in place to help secure the web server is the use of intruder detector, malware detector and others such as:

Strong Passwords. Install And Configure The CSF Firewall. Install And Configure Fail2Ban. Why do we need to secure the server?

For authentication, you must have it. Information is more protected and less susceptible to data breaches as a result. Numerous gadgets may be used by visitors to your website. It might be a phone, a laptop, or a tablet.

Note that A cyberattack has the potential to compromise any of these devices. Web server security refers to the safety of any server installed on the Internet or a World Wide Web domain. It is often done using a variety of techniques and in layers, including the network security layer, hosted application security layer, and base operating system (OS) security layer.

So:

Upgrade the operating system and software frequently.Set up your computer so backups may be stored.Access Restrictions to the Files on Your Computer.Put SSL certificates in place.

Learn more about web server from

https://brainly.com/question/1160272
#SPJ1

access control is a form of access control in which users are assigned a matrix of authorizations forparticular areas of access.

Answers

Lattice-based access control is a form of access control in which users are assigned a matrix of authorizations for particular areas of access.

What is Lattice-based access control (LBAC)?

LBAC is a complex Access Control Model that is based on the interaction of any combination of Digital Subjects and Service Provider Resources (such as Resource Actions, Operating System Attributes, and Application Attributes).

A lattice is used in this type of label-based Mandatory Access Control model to define the levels of security that a Resource can have and that a Digital Subject can access. The Digital Subject may only access a Resource if his or her security level is higher than or equal to that of the Resource.

The security level access can also be expressed mathematically in terms of a lattice (a partial order set) in which each Resource and Digital Subject has the greatest lower bound (meet) and the least upper bound (join) of access rights.

For example, if two Digital Subjects A and B require access to a Resource, the security level is defined as the sum of A and B's levels. In another case, if two Resources X and Y are combined, they form a new Resource Z, which is assigned the security level formed by the union of the levels of X and Y.

To learn more about Lattice, visit: https://brainly.com/question/14552036

#SPJ4

In addition to having fun, what is another reason for why people create games? A. Games keep us out of trouble. B. Games teach us to follow rules. C. Games teach us how to fight. D. Games teach strategy and critical thinking.

Answers

D. Games teach strategy and critical thinking



when sorting with bubble sort, how many swaps are needed for 98 to reach its sorted position in the list 98, 12, 34, 78, 35, 78, 45?

Answers

We need 6 swaps to put 98 in its sorted position because 98 is the maximum element and currently placed at the leftmost position; after sorting, its final place will be at the rightmost position, and this will be done by swapping with each element.

What is Bubble Sort?

Bubble sort is a straightforward sorting algorithm. This sorting algorithm is a comparison-based algorithm that compares each pair of adjacent elements and swaps them if they are not in order. Because its average and worst case complexity are O([tex]n^{2}[/tex]), where n is the number of items, this algorithm is not suitable for large data sets.

Bubble Sort Algorithm:

We assume list is an array of n elements. We further assume that swap function swaps the values of the given array elements.

begin BubbleSort(list)

 for all elements of list

     if list[i] > list[i+1]

        swap(list[i], list[i+1])

     end if

  end for

 

  return list

 

end BubbleSort

To know more about Bubble Sort, visit: https://brainly.com/question/29325734

#SPJ4

the keyword phrases you were supposed to use for your socindex search were and and .

Answers

The keyword phrases you were supposed to use for your socindex search is Keyword searching.

What is Keyword Phrases?

In essence, key words are brief, straightforward identifiers that users enter into search engines (such as G**gle, Bing, Yahoo!, MSN, etc.) to locate information or discover answers to queries related to a particular interest or need. Examples are "recipe for chocolate chip cookies," "interesting things to do in St.

What is search engine?

An online resource that helps consumers find information on the Internet is a search engine. G**gle, Yahoo!, and MSN Search are a few well-known search engine examples.

What is Identifiers?

A name that "identifies" (that is, "labels the identity of") either a singular object or a singular class of objects can be an idea, a physical countable object (or class thereof), or a physical noncountable substance.

What is Keyword Search?

The terms that best define your study topic are known as keywords. These may be single words or an entire phrase. You can select these keywords from the sentence you write to describe your study topic. After selecting the important terms, you can then think of synonyms or words with related meanings.

Learn more about Keyword Search click here:

https://brainly.com/question/10055344

#SPJ4

write a query to return a list of professor names and their associated courses for all courses outside of their departments

Answers

The query to a database to return a list of Professor Names and their associated courses for all courses outside of their departments is given as follows:

SELECT distinct p.Name, c.Name, s.*

FROM schedules s

LEFT JOIN Professor p on p.id = s.professor_id

INNER JOIN Department d on d. department_id= p. department_id

LEFT JOIN Course c on s.course_id = c.id

What is a Database Query?

A database query is a comparable operation that is most closely related to a CRUD (create, read, update, delete) function. A database query is a request to alter or get data from a database. This enables us to apply logic to the information returned in response to the query.

Many organizations utilize databases to hold vast volumes of information that users may access to update or maintain records, such as employee or customer information. A database query can be used to inspect or edit data sets within a database.

Learn more about Database Queries:
https://brainly.com/question/24180759
#SPJ1

What will be the output produced by following code statements?(a) 87//5 (b) 87//5.0 (c) (87 // 5.0) ==(87//5) (d)(87 // 5.0) == int(87/5.0)​

Answers

What is coding?The act of writing computer code using programming languages is referred to as coding. The websites, apps, and other technology we use every day are programmed using coding. The terms "code" and "programming" are familiar to most people, both inside and outside of the computer community. Coding proficiency is necessary for many of the finest tech jobs. Understanding and interpreting code is crucial if you want to work in a lucrative area like software engineering, web development, or data science.

a) 87//5

output

17

b) 87//5.0

output

17.0

c) (87//5.0) == (87//5)

output

True

d) (87 // 5.0) == int(87/5.0)

output

True

To learn more about code, refer to

https://brainly.com/question/26098895

#SPJ1

In the presence of oxygen, pyruvate can enter the citric acid cycle but must be converted to.

Answers

In the presence of oxygen, pyruvate can enter the citric acid cycle but must be converted to the Acetyl group.

What is the Citric acid cycle?

The citric acid cycle may be defined as a type of biological process that involves a chain of reactions in the mitochondria through which almost all living cells produce energy in aerobic respiration.

This cycle utilizes oxygen and gives out water and carbon dioxide as products. Due to this, ADP is converted into ATP. It is also known as the Krebs cycle or TCA cycle.

In the presence of oxygen, pyruvate is transformed into an acetyl group attached to a carrier molecule of coenzyme A. The resulting acetyl CoA can enter numerous pathways, but most often, the acetyl group is delivered to the citric acid cycle for further catabolism.

To learn more about the Citric acid cycle, refer to the link:

https://brainly.com/question/14900762

#SPJ1

an analyst is running windows 7 on the pc and is planning to migrate to windows 8.1. the analyst wants help migrating the personal files and settings into the newer version. what tool or utility would be the best choice for the user?

Answers

Since an analyst is running windows 7 on the pc, the  tool or utility that would be the best choice for the user is  Windows Easy Transfer

Does Windows 10 Support Windows 7 Easy Transfer?

You can use Windows Easy Transfer to transfer all of your files and settings from your old computer or old version of Windows to your new computer running Windows 10 whether you intend to upgrade your Windows XP, Vista, 7 or 8 computer to Windows 10 or purchase a new PC with Windows 10 pre-installed.

Note that Microsoft created Windows Easy Transfer, a specialized file transfer tool that enables Windows users to move their personal data and settings from a computer running an older version of Windows to a machine running a more recent version.

Learn more about windows 7 from

https://brainly.com/question/25718682
#SPJ1

which search algorithm uses three variables to mark positions within the array as it searches for the searchvalue?

Answers

A binary search algorithm uses three variables to mark positions within the array as it searches for the searchvalue.

What is a binary search?

Binary search can be defined as an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(log n)

Note: n is the total number of elements in a list.

Additionally, keywords and search operators are important variables (elements) that have a significant effect on search results.

Read more on binary search here: https://brainly.com/question/17180912

#SPJ1

Your server runs in quadruple-channel memory mode. How many memory controllers are being used?.

Answers

Answer: four

Explanation:

Servers and high-end workstations has been commonly used which buffered memory, which has specialized memory as it has additional circuitry to manage large amounts of ram.

What is Vertical scaling?

Vertical scaling has meaning that the ability to increase the capacity of the existing hardware or the software just by adding the resources. In this case, more GB has been added (8GB) to the server or to address the problem. So the vertical scaling has been the resultant type john has been expecting.

Buffered memory would help just to speed up some process by reserving the particular amount of the RAM for it. A hypervisor does not need 20% of the physical server memory which is assigned to just it. 20 percent buffer has been saved for Instant RAM that can be used by the system.

It has been true that 20 percent memory buffer has kept, but it has not meant for the exclusive use of the hypervisor, but it has been used by the operating system entirely.

Therefore, there are many memory controllers are being used.

Learn more about server on:

https://brainly.com/question/30168195

#SPJ2

what is an open-source physical computing platform that can take input from a variety of switches or sensors to control physical objects?

Answers

An open-source physical computing platform that can take input from a variety of switches or sensors to control physical objects is known as Arduino.

Arduino means an electronics prototyping system is built to simplify microcontroller projects. The concept is to product these projects without having to know much about microcontrollers or programming, microcontrollers for dummies is one tips of explaining Arduino. Arduino has function to control of traffic lights, it can also be used for the real time control system with programmable timings, pedestrian lighting etc. Arduino can respond with buttons, LEDs, motors, speakers, GPS units, cameras, the internet, and even your smart-phone or your TV.

Learn more about Arduino at https://brainly.com/question/13098809

#SPJ4

write a program to calculate the circumference of a circle with a diameter of 2. create a constant to hold the diameter. what type will the constant be?

Answers

Answer:

Explanation:

(Diameter, Circumference and Area of a Circle) Write a program that reads in. // the radius of a circle and prints the circle's diameter, circumference and.

The program to calculate the circumference of a circle with a diameter of 2 is in explanation part.

What is programming?

Computer programming is the process of carrying out a specific computation, typically by designing and constructing an executable computer program.

Here's an example program in Python that calculates the circumference of a circle with a diameter of 2 and uses a constant to hold the diameter:

# Define a constant to hold the diameter

DIAMETER = 2

# Calculate the circumference

circumference = DIAMETER * 3.14159

# Print the result

print("The circumference of the circle is:", circumference)

In this program, the constant DIAMETER is assigned the value of 2. Since the diameter is a numeric value that won't change during the program's execution, it makes sense to use a constant to hold it.

Thus, the resulting value of circumference is also a floating-point number.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Other Questions
During prophase, a stage in the cell cycle, a. the cell duplicates its genetic material. b. the cell begins to separate into two new cells. c. the nuclear envelope breaks down. d. the chromosomes in the cell begin to move. The absolute age of a rock is the approximate number of years ago that the rock formed. The absolute age of igneous rock can best be determined by. What is the number if 15% of 500 is equal to 7.5% of the number if an investor asks a registered representative to underline the most important facts in a mutual fund prospectus, the rr: (04.04 MC)Which of the following is a linear function? (1 point)O y = 3xOyy =13xOy=x+5 3x-y-13 Which recombination frequency corresponds to perfect linkage and violates the law of independent assortment?. Complete the sentences with the correct form of the pass composeMS---add nothing MPadd S FSadd E FPadd ESJe (f.) _______ ___________ chez moi aprs les cours. (rentrer)Mes cousins (ils)________ ____________ Bruxelles. (natre)Ma mre (elle) _________ _____________ luniversit en Angleterre. (aller)Mon ami et moi (nous)_________ ___________ hier soir. (sortir)Elles __________ ____________ lheure. (arriver)Tu (m.) _________ _____________ chez moi la semaine dernire. (venir)M. Dupont (il)_________ ___________ mdecin lge de 27 ans. (devenir)Vous (f.pl.) _________ __________ chez vous pendant lorage ? (rester Read this excerpt from Susan Butcher and the Iditarod Trail.Then the two sick children died in Nome and more were ill. The governor made his decision; it would be sled-dog teams on the land route.What can a reader infer based on the information in the excerpt?Pressure from the US government pushed the governor to make a decision.Pressure from doctors all over Alaska pushed the governor to make a decision.The increasing number of sick people in Nome pushed the governor to make a decision.The increasing number of sled-dog teams pushed the governor to make a decision. what would cause the level of demand (meaning the relationship between price and quantity demanded) to shift? What is Chapter 5 of Huckleberry Finn about?. help meeeeeeeeeeee pleaseee rnnnnn!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!help meeeeeeeeeeee pleaseee rnnnnn!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! complete the following story conjugating the verbs in the preterite. ayer yo enter answer (tener) que cuidar a mi sobrino porque mi What is the BEST summary of Kennedy's Inaugural Address?A.America alone can solve the world's problems.B.America will continue to spread liberty around the world.C.America shares an obligation with the world to solve the world's problems.D.America's mission is to ensure the success and prosperity of American citizens. A and \angle BB are upplementary angle. If \text{m}\angle A=(7x-12)^{\circ}mA=(7x12) and \text{m}\angle B=(7x-18)^{\circ}mB=(7x18) , then find the meaure of \angle AA when they go to the playground, gaia climbs to the top and lays daringly down across the bars. she is most likely what age? of the following options, which is not one of the temperaments first proposed by thomas and chess (1977)?a. the easy baby b. the difficult baby c. the slow to warm up baby d. the secure baby uhhhhhh i'm an idlot can someone help- Write an equation of the line that passes through the given point and is perpendicular to the given line. (-8, 4) ; y = 7 Which of the following is filling the role of a consumer? The sun is almost 22 million times as massive as the moon but it is nearly 400 times as far from earth. Which celestial body, the sun or the moon, exerts the greatest amount of gravitational force on you as you sit in class?.