if the function's vector parameter is 0 3 9 7 7, what does the function return? int myfct(const vector

Answers

Answer 1

The function return is 9

What does mean function's vector parameter?A function's parameter, a vector, is possible.There is no difference in how things work when a vector is sent as a parameter to any C++ function. Both by value and by reference, we may send a vector. We'll talk about when to employ which passing style and the differences between them in the section that follows.A mathematical function of one or more variables with a collection of multidimensional vectors or infinite-dimensional vectors as its domain is known as a vector-valued function or simply a vector function.A duplicate of the vector is made when a vector is provided to a function.

The complete question is If the function's vector parameter is 0 3 9 7 7, what does the function return?

int MyFct(const vector<int>& v) {

int i;

int x;

x = v.at(0);

for (i=0;i<v.size();++i) {

if(v.at(i)>x) {

x = v.at(i);

}

}

return x;

}

To learn more about function's parameter refer to:

https://brainly.com/question/13151723

#SPJ4


Related Questions

which of the following represents a severe limitation of using the internet for primary research?

Answers

A sample universe composed solely of Internet respondents represents a potential bias.

A sample universe made exclusively out of Internet respondents addresses a potential bias. The data on the Internet are typically obsolete. Secondary data can't be gotten to on the Internet for directing examination. The instructive capabilities of the respondents of surveys on the Internet can't be recognized precisely.

Characterize the exploration issue and lay out research targets.

Decide the sources of data to satisfy the exploration targets.

Think about the expenses and advantages of the exploration.

Accumulate the important data from secondary or primary sources or both.

Dissect, decipher, and sum up the outcomes.

Successfully impart the outcomes to leaders.

to know more about primary and secondary sources click here:

https://brainly.com/question/896456

#SPJ4

what parameter can be used in the windows cli to force a user to change their password on the next logon?

Answers

To modify the password of another user, enter the password command along with their login name (the User parameter).

How can I have Windows compel a password change at the next logon?

Right-click the username of the user whose password you want to change, and then select Properties from the context menu. Check the box next to User must update password at next logon in the Account Options section. OK.

Passing the -e or —expire flag together with the user's username as shown when using the password command, which is used to update a user's password, causes a user's password to expire. The user will be forced to modify their password as a result.

User account passwords can be changed using the password command. The password for a superuser is the only accounts a typical user can change the password for are their own and any. The validity period associated with an account or password can also be changed with Password.

To learn more about  password command refer,

https://brainly.com/question/14310628

#SPJ4

the control process begins with establishing standards. group startstrue or falsetrue, unselectedfalse, unselectedgroup ends

Answers

The fundamental control method entails three steps: (1) setting standards, wherever it may be found, whatever it may be discovered, and whatever it regulates. (2) benchmarking performance versus these requirements. (3) Remedial action for standards and plan violations. 1. Why is setting standards crucial?

Standards preserve human health and the health of the environment while ensuring the quality, safety, and dependability of goods and services. They also enable trade. For businesses, standards enhance systems and procedures, minimize expenses, promote uniformity, and reduce waste.

Why are the standards in place?

A standard's purpose is to give individuals a solid foundation on which to base their expectations of a good or service. Trade is made easier because to this. Establish a framework for achieving interoperability, efficiency, and economies.

To know more about establishing standards visit;

https://brainly.com/question/29897980

#SPJ4

a senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production. the email was sent from someone she doesn't know, and he is asking for immediate clarification on several of the project's details so the project can get back on schedule. which type of attack best describes the scenario?

Answers

Whaling attack best describes the scenario where a senior executive reports that she received a suspicious email concerning a sensitive internal project that is behind production.

What is whaling attack?

Whaling is a highly focused phishing assault that masquerades as a legitimate email and targets top executives. Whaling is a type of technologically enabled social engineering fraud that encourages victims to execute a secondary action, such as starting a wire transfer of monies. For example, an attacker may send an email seeking cash to a CEO while pretending to be a client of the firm. Whaling assaults usually address targeted persons individually, frequently using their title, position, and phone number gathered from corporate websites, social media, or the press.

Here,

Whaling assault best defines the scenario in which a top executive reports receiving a strange email about a key internal project that is behind schedule.

To know more about whaling attack,

https://brainly.com/question/6585219

#SPJ4

who is known as the father of computer ​

Answers

Answer:

Konrad Zuse

Explanation:

I learned this in Computer class. Most people think that Charles Babbage is the father of the computer, but Konrad is the actual father of the computer because he advent of the Z1, Z2, Z3, and Z4.

If you can, please give me a Brainliest; thank you, and have a good day!

When using a spreadsheet, the expression "=D8-D17" is called a _______.

a) function
b) range
c) cell
d) formula

Answers

The expression "=D8 - D17" is called a formula when using a spreadsheet.

A formula is a mathematical expression that works on values in a set of cells. Even if the result is an error, these formulae return it. You can use formula to accomplish computations like addition, subtraction, multiplication, and division. For example, =A1+A2+A3 delivers the sum of the values from cell A1 to cell A3.

Another term that formulas are quite familiar with is "function." The terms "formulas" and "functions" are frequently used interchangeably. They are connected, but they are not the same.

A formula starts with the equal sign (=). Meanwhile, functions are utilized to execute sophisticated calculations that would be impossible to perform manually. Excel functions have names that reflect their intended application.

Learn more about formula in spreadsheet here https://brainly.com/question/1808833

#SPJ4

which of the following statements regarding solid state disks (ssds) is false? a) they generally consume more power than traditional hard disks. b) they have the same characteristics as magnetic hard disks, but can be more reliable. c) they are generally more expensive per megabyte than traditional hard disks. d) they have no seek time or latency.

Answers

The following statement regarding solid state disks (SSDs) is false.

A) They generally consume more power than traditional hard disks.

What is a SSD?

Computer storage that is more recent is called a solid state drive (SSD). To read and write digital data, SSDs use flash memory. SSDs provide almost immediate boot and load times because they don't need to manually search for data.

For many years, computers used hard disk drives (HDDs), which read each chunk of data using an arm that moves across a spinning platter. HDDs are among the computer hardware components that are most susceptible to malfunction or damage due to their moving parts.

Operating SSD technology is completely different. SSDs don't rely on any moving parts, making them a more durable component because they use a chip made with NAND flash memory.

Learn more about SSD

https://brainly.com/question/28476555

#SPJ4

e correct statement(s) regarding dhcp. a. dhcp is used specifically to extend limited ipv4 addressing, therefore there is no plan to use dhcp with ipv6 b. dhcp enables ip address assignments through manual, automatic, and dynamic processes c. the dhcp protocol maps ipv4 addresses to uniform resource locators (urls) d. all statements are correct

Answers

The correct statement regarding DHCP is b: 'DHCP enables IP address assignments through manual, automatic, and dynamic processes.'

Dynamic Host Configuration Protocol or DHCP is a client/server protocol that automatically delivers an Internet Protocol (IP) host with its IP address and other associated configuration information such as the default gateway and subnet mask. In other words, the network protocol DHCP is used to configure network devices to communicate on an IP network. A DHCP client uses the DHCP protocol to obtain configuration information, such as a default route, an IP address, and one or more DNS server addresses from a DHCP server.

You can learn more about DHCP at

https://brainly.com/question/10097408

#SPJ4

The type of logical database model that treats data as if they were stored in two-dimensional tables is the:

Answers

The type of logical database model that treats data as if they were stored in two-dimensional tables is called the relational model.

What is relational model?

In the relational model, data is organized into tables, also known as relations, which consist of rows and columns.

Each row represents a single record, and each column represents a specific attribute or field of the data. The tables are connected to each other through relationships, which define how the data in the tables is related.

The relational model is the most widely used database model, and it is the basis for most modern database management systems.

To Know More About Database, Check Out

https://brainly.com/question/13262352

#SPJ1

Which of the following is not a valid Java identifier? a. Factorial, b. anExtremelyLongldentifierlfYouAskMe, c. 2ndLevel, d. Ievel2, e. highest$.

Answers

2ndLevel, option c is not a valid Java identifier.

What are Java identifiers ?

In Java, an identifier is a group of one or more characters that is used to name variables, methods, classes, etc. There are requirements that must be followed in order to produce an identification. Additionally, because they have a fixed meaning in Java, some character sequences, such as keywords, reserved words, and literals, cannot be used as identifiers.

In Java, can keywords be used as identifiers?

Since these words are part of the grammar of the Java programming language, you cannot use them as variable names (or identifiers) for variables like int, for, class, etc. Here is a list of every single keyword used in Java programming. You are not permitted to use the IDs true, false, or null in addition to these terms. Due to the fact that they are literals.

To know more about Java Programming visit

https://brainly.com/question/12948162

#SPJ4

real world situations that are too expensive or dangerous to test can be represented using computer _________

Answers

Answer:

Real world situations that are too expensive or dangerous to test can be represented using computer simulations.

Explanation:

A simulation is a computer-based model of a real-world system or process, which allows users to study and analyze the behavior of the system without having to conduct physical experiments. Simulations can be used in a wide variety of fields, including engineering, science, business, and medicine, to study complex systems, predict outcomes, and explore different scenarios and scenarios. For example, a simulation could be used to model the flow of traffic through a city, the spread of a disease, or the performance of a financial investment. By using simulations, researchers and analysts can gain valuable insights and make more informed decisions without the need for costly or risky experiments.

The small number of laboratory tests that have the best chance of solving the problem under study are found via millions of computer experiments.

What, expensive or dangerous using computer?

A simulation is a computer-based representation of a real-world system or process that enables users to research and examine the system's behaviour without having to carry out actual physical tests.

In a wide range of disciplines, including engineering, science, business, and medical, simulations can be used to investigate complicated systems, forecast results, and explore various scenarios.

A simulation might be used, for instance, to simulate the movement of traffic in a metropolis, the development of a disease, or the success of an investment.

Without the need for expensive or risky trials, researchers, and analysts can use simulations to gather insightful information and make more educated judgments.

Therefore, A biological system can be studied using computational models of today on various levels.

Learn more about computer here:

https://brainly.com/question/21080395

#SPJ2

Given the variables, which boolean condition is true?
int a = 7;
int b = 7;

Answers

Answer:

The boolean condition that is true is a == b, which checks if the values of the variables a and b are equal. Since both a and b have been assigned the value of 7, this condition will evaluate to True.

what parameter can be used in the windows cli to force a user to change their password on the next logon?

Answers

Enter the passwd command together with the user's login name to change another user's password (the User parameter).

What is a user parameter?User parameters are the inputs a user offers for a user routine to process. For instance, the ATTACHX macro's PARAM parameter specifies user parameters. These parameters are provided to the routine that the ATTACHX macro attaches.You must change data ingestion techniques to pass the exact data you wish to save with a "user" prefix in order to set a user parameter. For instance, you might edit your tag so that it passes "user.first name" as the data on a login event if you wish to store a user's first name. As a result, for all events submitted by that user, a new user block with the "first name" field appears in your event payloads.

To learn more about payloads refer :

https://brainly.com/question/11128668

#SPJ4

explain why data normalization is needed before conducting the k-means algorithm in clustering analysis.

Answers

When this option is chosen, Analytic Solver first applies the k-Means algorithm to the supplied data before normalizing it. It's crucial to normalize the data to make sure that the distance measure gives each variable the same weight. Without normalization, the measure will be dominated by the variable with the biggest scale.

What is the purpose of K-means?

To locate groups in the data that have not been explicitly labeled, the K-means clustering algorithm is utilized. This can be used to confirm organizational hypotheses about the kinds of groups that exist or to find unidentified groupings in large, complex data sets.

What in arithmetic is K-means?

Our data is clustered into K number of groups using one of the simplest unsupervised clustering algorithms, K-Means. Based on how close a data point is to the cluster centroid, the algorithm repeatedly allocates the data points to one of the K clusters.

To know more about K-means visit;

https://brainly.com/question/29571529

#SPJ4

when you need information stored in computer files, you select the file and open it. when you need information from your long-term memory, you utilize the memory process known as question 10 options: a) iconic processing. b) dishabituation. c) encoding. d) retrieval.

Answers

when you need information stored in computer files, you select the file and open it. when you need information from your long-term memory, you utilize the memory process known as retrieval

What is retrieval?

Automated storage and retrieval systems, also referred to as ASRS or AS/RS, are a class of computer-controlled devices that swiftly, precisely, and automatically place and recover loads from predetermined storage locations in a facility.

One of an information retrieval system's most crucial parts is the retrieval function. The retrieval function is employed for a user-submitted query to calculate the degree of similarity between the query and each document in the collection.

Hence to conclude retrieval is the process of recovering the older files

To know more on the retrieval process follow this link:

https://brainly.com/question/1226264

#SPJ4

what is the purpose of a comment? group of answer choices a comment provides information to the compiler a comment provides information to the virtual machine a comment provides information to the user running the program a comment provides information to the programmer

Answers

The purpose of a comment is to help the compiler understand your program and a  comment provides information to the programmer.

What is a comment and its use ?Comments are text notes that are added to the program to provide explanations for the source code. They are used in a programming language to document the program and remind programmers of the tough things they just accomplished with the code. They also aid in the understanding and maintenance of code for future generations. These are considered non-executable statements by the compiler. Each programming language has its own method for incorporating comments in the source code. We can write the pseudocode that we planned before writing the original code in the comments. Pseudocode is a language that combines conversational language and high-level programming. This makes it easier to review the source code because pseudocode is more understandable than the program. The programmer uses code descriptions to help others comprehend his or her intent. It contains the code's summary. The process is explained in the comments. Diagrams and rigorous mathematical proofs are examples of such explanations. This could be interpreted as an explanation of the code rather than a clarification of its intent. For example, a programmer may provide a comment explaining why an insertion sort was chosen over a quicksort, as the former is, in theory, slower.

What is a compiler ?

A compiler is a computer program that converts computer code written in one program into another. The term "compiler" refers to programs that convert source code from a high-level programming language to a lower-level language in order to build an executable program.

an learn more about coding and comment from https://brainly.com/question/28338824

#SPJ4

a variable inside a function has a scope limited to? group of answer choices the entire program anything after the function the variable is defined in before the function the variable is defined in only inside the function

Answers

A compass is a section of the program, and generally speaking, variables can be declared in one of three places inside a block or function that's appertained to as a variable.

Define variable inside the function?

A variable's continuance in a program is its compass. This indicates that a variable's compass is the block of law throughout the entire program where it's declared, employed, and adjustable. These are the variables that are declared inside a system, constructor, or block and have a compass that's specific to that system, constructor, or block and can not be penetrated from a different position.

When a variable is declared inside of a system, only the law in that particular procedure can pierce it.

To learn further about limited compass from given link

brainly.com/question/27959951

#SPJ4

your company runs a virtualized web application server in-house. you decide to make the web applications available over the internet through a cloud provider. which method represents the quickest way to accomplish this?

Answers

Since the internal server is already virtualized, (C) moving it directly to the cloud as a cloud server is quicker.

What is an in-house server?

An in-house server sometimes referred to as a dedicated server, requires a dedicated location for the server system and has infrastructure that is built up inside the office.

Since you have a team of IT specialists on staff and your own IT infrastructure, you don't need to rely on a third party to meet your needs.

A computer that performs network-related tasks at home is called a server.

A basic personal computer with a sizable hard drive, enough memory, and a network connection can serve as the device.

Home servers are frequently used to store media, but this is just the beginning.

So, in the given situation, "Your internal web application server should be moved to the cloud." is the quickest way to accomplish the following.

Therefore, since the internal server is already virtualized, (C) moving it directly to the cloud as a cloud server is quicker.

Know more about an in-house server here:

https://brainly.com/question/29311211

#SPJ4

Complete question:
Your company runs a virtualized web application server in-house. You decide to make the web applications available over the Internet through a cloud provider. Which method represents the quickest way to accomplish this?

A. Create a new cloud server, install web services, and install and configure web applications.

B. Create a new cloud server, install web services, and import web application data.

C. Migrate your in-house web application server to the cloud.

D. This cannot be done—only generic applications are available through the cloud.

the sdlc phase in which the detailed conceptual data model is created is the ________ phase.

Answers

The SDLC phase in which the detailed conceptual data model is created is the analysis phase.

The Software Development Life Cycle (SDLC) is a structured method that allows the production of low-cost, high-quality software, in the shortest possible production time. The aim of the SDLC is to develop superior software that meets and exceeds all user expectations and demands.  The analysis phase is the second of phase of SDLC that includes gathering all the details required for a new system to be developed as well as determining the first ideas for prototypes i.e to create a detailed conceptual model of the system.

You can learn more about SDLC at

https://brainly.com/question/15696694

#SPJ4

an attack at a company renders a network useless after a switch is impacted. engineers review network traffic and determine that the switch is behaving like a hub. what do the engineers conclude is happening

Answers

The switch is overflowing with unicast traffic and has run out of memory.

What do the engineers deduce is taking place?

A switch is attacked through MAC flooding. The attack's goal is to eat up all of the memory that is utilized to hold the switch's MAC address database.

The switch may stop attempting to implement MAC-based forwarding and begin flooding unicast traffic out of all ports if its MAC table becomes overloaded.

The switch would have to create a new MAC table if any of the entries were invalid. It wouldn't cause a traffic jam at any of the ports.

To decide which port to utilize to forward unicast traffic to its intended destination, the switch consults the MAC address table.

P238

Flooding MAC Attacks While ARP poisoning targets hosts, MAC flooding targets switches.

The attacker's goal is to eat up all of the memory that is used to hold the switch's MAC address database.

To identify which port to utilize to forward unicast traffic to its intended destination, the switch consults the MAC address table.

The switch may stop attempting to employ MAC-based forwarding if the table is overloaded and begin acting as a hub by flooding unicast traffic out of all ports. This makes it simpler for the threat actor to sniff network traffic.

To learn more about MAC flooding attack refer to:

https://brainly.com/question/25246068

#SPJ4

your friend has an asus tuf505du laptop, and the magnetic hard drive has failed. their uncle has offered to give them a working hard drive he no longer needs, the toshiba mk8009gah 80 gb 4200rpm drive. will this drive fit this laptop? why or why not?

Answers

No, the drive form factor and interface do not match with the Toshiba MK8009GAH 80-GB 4200-RPM drive.

What is an interface?

An interface is a shared boundary that allows data to be exchanged between two or more independent computer system components. The exchange may involve software, computer hardware, auxiliary equipment, people, or combinations of these. Interface, put simply, is a means of communication between system components and users. For instance, the air conditioner, bike, and ATM machine are examples of daily life. The languages, codes, and messages that programs use to speak to one another and to the hardware are known as software interfaces (sometimes referred to as programming interfaces). The SMTP email protocol, IP network protocols, the Windows, Mac, and Linux operating systems, as well as the software drivers that turn on peripheral devices, are among examples.The DMA (direct memory access) interface, interrupt interface, and memory/IO interface are the three primary interface connectors.

The complete question is;

Your friend has a Lenovo IdeaPad N580 laptop, and the hard drive has failed. Her uncle has offered to give her a working hard drive he no longer needs, the Toshiba MK8009GAH 80-GB 4200-RPM drive. Will this drive fit this laptop? Why or why not?

To learn more about an interface refer to:

https://brainly.com/question/20340641

#SPJ4

sonet/sdh uses a highly accurate central timing source that is distributed to all sonet/sdh nodes within the network (i.e., sonet/sdh uses a synchronous network timing approach). true false

Answers

The given statement "to provide synchronous network time, SONET/SDH employs a very precise central timing source that is delivered to all SONET/SDH nodes throughout the network" is TRUE.

What is SONET/SDH?

Using lasers or highly coherent light from light-emitting diodes, the synchronous optical networking (SONET) and synchronous digital hierarchy (SDH) protocols send multiple digital bit streams synchronously via optical fiber (LEDs).

An electrical interface can also be used to send data at low transmission rates.

The technique was created to take the role of the plesiochronous digital hierarchy (PDH) system for moving heavy volumes of data and voice traffic over the same cable without synchronization issues.

A very accurate central timing source is used by SONET/SDH to deliver synchronous network time to all of the nodes in the network.

Therefore, the given statement "to provide synchronous network time, SONET/SDH employs a very precise central timing source that is delivered to all SONET/SDH nodes throughout the network" is TRUE.

Know more about SONET/SDH here:

https://brainly.com/question/17063432

#SPJ4

you have an input volume that is 32x32x16, and apply max pooling with a stride of 2 and a filter size of 2. what is the output volume? a. 15x15x16 b. 16x16x16 c. 32x32x8 d. 16x16x8

Answers

The output's width, height, and depth are (32 - 5 + 2 * 2) / 1 + 1 = 32 and 10 respectively.

What is the maximum pooling size?

The output size is (28-2)/2 +1 = 14 because the kernel size of the max-pooling layer is (2,2) and the stride is 2. Pooling results in the output form being (14,14,8). The second Conv layer and pooling layer can be calculated independently. We quickly reach the second max-pooling layer's output, and the resulting shape is as follows: (5,5,16).

The max pooling step's purpose is what?

A pooling procedure known as maximum pooling, sometimes known as max pooling, determines the maximum or greatest value in each patch of each feature map. In contrast to average pooling, which highlights the feature's average presence, the results are down sampled or pooled feature maps that highlight the feature that is most prevalent in the patch.

To know more about max pooling visit;

https://brainly.com/question/13956566

#SPJ4

on a system that uses paging, a process cannot access memory that it does not own. why? how could an operating system allow a process to access additional memory that it does not own? why should it this be allowed and what risks would be introduced once it were allowed. how would separate processes ameliorate these risks? (20 points)

Answers

A process cannot refer to a page that it does not own since it won't be in the page table. Such access can be enabled by an operating system by simply allowing the addition of non-process memory entries to the process' page table.

What is an operating system?

An operating system is a piece of system software that controls computer resources, hardware, and common services for software programs.

Microsoft's main operating system, Windows, is the industry norm for personal and commercial computers.

The GUI-based OS was first introduced in 1985 and has subsequently been published in numerous iterations.

The rapid growth of personal computing was primarily attributed to the approachable Windows 95.

Because the page won't be in the page table, a process cannot refer to a page that it does not own.

An operating system only needs to let the addition of entries for non-process memory to the process' page table in order to permit such access.

Therefore, a process cannot refer to a page that it does not own since it won't be in the page table. Such access can be enabled by an operating system by simply allowing the addition of non-process memory entries to the process' page table.

Know more about an operating system here:

https://brainly.com/question/22811693

#SPJ4

recovery from a deadlock works best when a single process can be identified whose termination will break the circular wait.

Answers

Recovery from a deadlock works best when a single process can be identified whose termination will break the circular wait. (False)

What is a deadlock?

In concurrent computing, a deadlock occurs when no entity can move forward because each one is waiting for another entity, including itself, to take action. This action could be as simple as sending a message or, more commonly, releasing a lock.

Due to the prevalence of using hardware or software locks in these environments to manage shared resources and implement process synchronization, deadlocks are a common issue in multiprocessing systems, parallel computing, and distributed systems.

A deadlock in an operating system happens when a process or thread enters a waiting state because a system resource that is being sought after is being held by another process that is itself waiting for another resource that is being sought after by yet another waiting process.

Learn more about deadlock

https://brainly.com/question/29544979

#SPJ4

assuming a base cpi of 1.0 without any memory stalls, what is the total cpi for p1 with the addition of an l2 cache?

Answers

Because a new instruction is sent out every cycle, a pipelined processor should have a CPI of 1.

The CPI is slightly greater and is dependent on the exact program being run because a stall or flush consumes a cycle. In 2021, AMD's Ryzen ThreadRipper 3990X desktop PC processor, which has 64 cores and 128 threads, is anticipated to be the fastest CPU in the world. The CPU's 2.9 GHz base clock and 4.3 GHz maximum boost clock make it possible to multitask and load pages quickly. CPI measures that are not seasonally adjusted Over the previous 12 months, the Consumer Price Index for All Urban Consumers (CPI-U) increased 7.7%, reaching an index level of 298.012 (1982-84=100).

Learn more about program here-

https://brainly.com/question/14618533

#SPJ4

fill in the blank: a business decides what kind of data it needs, how the data will be managed, and who will be responsible for it during the stage of the data life cycle.

Answers

Answer:

A business decides what kind of data it needs, how the data will be managed, and who will be responsible for it during the planning stage of the data life cycle.

Explanation:

A business decides what kind of data it needs, how the data will be managed, and who will be responsible for it during the planning stage of the data life cycle.

The data life cycle is the process of acquiring, storing, processing, analyzing, and managing data over time. The planning stage is the first stage of the data life cycle, in which a business determines what data it needs, how it will be collected and managed, and who will be responsible for it. This stage is important because it helps the business identify its data needs and develop a plan for acquiring and managing the data effectively.

Therefore, the correct answer is:

A business decides what kind of data it needs, how the data will be managed, and who will be responsible for it during the planning stage of the data life cycle.

Which of the following is not a form of electronic output?
A. fax
B. email
C. report
D. bulletin board messages

Answers

Report is not a form of electronic output.

What are the different forms of output?

output. Information is data that has been transformed into a format that is intelligible and practical for a human or another machine.

paper copy. printed out.unhard copy exhibited on a screen.text. contains symbols that are used to form words and sentences.graphics.audio.video

output device.

If we talk about output device then plotter, printer and monitor are output device however touch screen is not an output device.

The four fundamental output kinds are audio output, graphic output, text output, and video output.

Report is not a form of electronic output.

To learn more about output refer to:

https://brainly.com/question/20727977

#SPJ4

row arrays sales2013 and sales2014 reflect the quarterly sales (in millions) of a popular potato chip company. write a statement that assigns row array percentchange with the percentage change of sales in each quarter between 2013 and 2014. ex: quarter 1 sales are $20 in 2013 and $30 million in 2014. the percentage of change is ((30 - 20)/20) * 100, or 50 percent.

Answers

You can subtract the sales in 2013 from the sales in 2014, divide that value by the sales in 2013, and then multiply the result by 100 to convert it to a percentage.

How to write the program?

This can be written as a single statement using the percentchange variable as follows:

percentchange <- ((sales2014 - sales2013) / sales2013) * 100

Here, sales2013 and sales2014 are assumed to be row arrays containing the quarterly sales for each year.

The percentchange variable will be assigned the percentage change in sales for each quarter.

For example, if the sales2013 and sales2014 arrays contain the following values:

sales2013 <- c(20, 18, 23, 21)

sales2014 <- c(30, 25, 27, 26)

To Know More About percentage, Check Out

https://brainly.com/question/13244100

#SPJ4

The first step in the systems development life cycle (SDLC) is _______________.
A. Analysis

B. Design

C. Problem/Opportunity Identification

D. Development and Documentation

Answers

Answer:

D

Explanation:

Other Questions
an uncle would like to invest for his nephew's college education. which of the following factors is a benefit of a 529 plan? qid: 3571086 mark for review a uniformity of state taxation b pretax contributions c change of beneficiaries allowed d no limits on contributions Which of the following characteristics of this painting are traits of Romanticism?O Figure is idealizedO Figure is arranged in shallow space; background has little depthO Choice of subject indicates a growing interest in the exoticO Lines are clean and simple Mae Ling earns a weekly salary of $365 plus a 5.0% commission on sales at a gift shop. How much she make in a workweek if she sold $4,800 worth of merchandise? S-13. Determine the reactions at the supports. 900 N/m 600 N/Tm 3 m Prob. 5-16 a company reported a net loss of $30,000 for the current year, yet its cash balance increased during the year. which financial statement should management refer to for an explanation of this situation? a.balance sheet b.statement of cash flows c.income statement d.statement of retained earnings za stack emitting 80 g/s of no has an effective stack height of 100 m. the windspeed is 4 m/s at 10 m, and it is a clear summer day with the sun nearly overhead. estimate the ground-level no concentration As discussed in the chapter opener, select all of the characteristics common to individuals with down syndrome.Multiple select question.increased risk of cardiac defectupwardly slanted eyestaller than normallow muscle toneextreme mental dysfunctionmild to moderate intellectual disability a device used to move heat from one fluid to another without direct physical contact of the fluids. Janet is shopping for silver as an investment. At her local silver shop she is presented with two options: round coins and rectangular bars. She looks at theprices for each.The silver shop will sell her round silver coins according to the equation p=27s which shows the relationship between s, the number of ounces of silvershe buys, and p. what she will pay for the round coins.The silver shop will sell her rectangular silver bars but they are more popularso she has to pay a premium to acquire the rectangular bars. The equation p= 27.5s +50 shows the relationship between s, the number of ounces ofsilver she buys, and p, what she will pay for the rectangular bars.Janet intends to buy 40 ounces of silver at the silver shop. How much money willshe save by purchasing only round coins instead of rectangular bars? brainly which process forms all elements up to and including iron, except light elements such as hydrogen and helium? many chronic illnesses such as stroke and heart disease compromise sexual activity. in many cases, the decline can be traced to . 66.7 ml of ethanol was dissolved in 222.2 ml of water. what is the volume % of the ethanol in the solution? Respond with the correct number of signficant figures in scientific notation. (Use E notation and only 1 digit before decimal, for example, 2.5E5 for 2.5 times 10 to the power of 5) describe and outline how humans' view of nature has changed through our history beginning with the prehistoric era to the present. consider the change in lifeways, attitude toward nature, and the major events that influenced these changes, ie. the beginning of agriculture. 24+6k Based on the 2010 US census, the population of Milwaukee, Wisconsin, was about 96% of the population of Baltimore, Maryland. In 2010, if Milwaukee's population was about 595,000, which of the following is the bestapproximation of Baltimore's population?A 620,000B 570,000C 300,000D 95,000 why do the people say mother is supreme when the man is the head of the family and his wives and children are obedient to him? How does the popular vote differ from the electoral vote during a presidential election?A. The popular vote applies during the general election rather than the primaries.B. The popular vote measures the total number of voters supporting a candidate.C. The popular vote is determined by the Electoral College rather than voter.D. The popular vote represents the total number of states a candidate won. suppose we flip four coins simultaneously: a penny, a nickel, a dime, and a quarter. what is the probability that the penny and nickel both come up heads? a uniform 2 meter long beam weighing 100 n is held in place by a wall with a 0.4 coefficient of static friction and a cable. a 50 n sign is hung from the beam. what is the furthest the sign can be hung from the wall if the beam is in static equilibrium? what is the tension in the cable and the normal force exerted by the wall in that case? Wendy spent 1/4of her paycheck on Monday and 3/7of it on Tuesday. She spent the rest of her paycheck over the next 3 days. If Wendy spent $18 on each of the 3 days, what was the amount of her paycheck