Next, Su wants to explain how the cotton gin separated seeds from cotton. At first, she considers using star bullets for
the steps in this process. But then, she determines that is not the right approach. Which action would most clearly
show the steps in the process in her presentation?
Su should change the type of bullet.
Su should change the size of the bullets.
Su should change the bullets to numbers.
Su should change the color of the bullets.​

Answers

Answer 1

Answer:

change bullets to numbers

Explanation:

100%


Related Questions

What is the maximum duration of daily Scrum meetings?

Answers

Answer:

15 minutes

Explanation:

this meeting is normally timeboxed to a maximum duration of 15 minutes.

Answer:

A.  15 minutes

B.  45 minutes

C.  10 minutes

D.  30 minutes

The Answer is A): 15 minutes

explanation:

PLZ Mark Me As Brainliest

Write a function PrintShampooInstructions(), with int parameter numCycles, and void return type. If numCycles is less than 1, print "Too few.". If more than 4, print "Too many.". Else, print "N: Lather and rinse." numCycles times, where N is the cycle number, followed by "Done.". End with a newline. Example output for numCycles = 2:
1: Lather and rinse.
2: Lather and rinse.
Done.
Hint: Define and use a loop variable.
Sample program:
#include
using namespace std;

int main() {
PrintShampooInstructions(2);
return 0;
}

Answers

Answer:

public static void PrintShampooInstructions(int numberOfCycles){

       if (numberOfCycles<1){

           System.out.println("Too Few");

       }

       else if(numberOfCycles>4){

           System.out.println("Too many");

       }

       else

           for(int i = 1; i<=numberOfCycles; i++){

               System.out.println(i +": Lather and rinse");

           }

       System.out.println("Done");

   }

Explanation:

I have used Java Programming language to solve this

Use if...elseif and else statement to determine and print "Too Few" or "Too Many".

If within range use a for loop to print the number of times

Answer:

#In Python

def shampoo_instructions(num_cycles):

   if num_cycles < 1: ///

       print ('Too few.') ///

   elif num_cycles > 4:

       print ('Too many.')

   else:

       i = 0

       while i<num_cycles:

           print (i+1,": Lather and rinse.")

           i = i + 1

       print('Done.')

user_cycles = int(input())

shampoo_instructions(user_cycles)

Explanation:

def shampoo_instructions(num_cycles): #def function with loop

   if num_cycles < 1:  #using 1st if statement

       print('Too few.')

   elif num_cycles > 4:

       print ('Too many.')

   else:

       i = 0

       while i<num_cycles:

           print (i+1,": Lather and rinse.")

           i = i + 1

       print('Done.')

user_cycles = int(input())

shampoo_instructions(user_cycles)

Account Balance Design a hierarchy chart or flowchart for a program that calculates the current balance in a savings account. The program must ask the user for:________.
A- The starting balance
B- The total dollar amount of deposits made
C- The total dollar amount of withdrawals made
D- The monthly interest rate
Once the program calculates the current balance, it should be displayed on the screen.

Answers

Answer:

a. starting balance

Explanation:

A program that calculates the current balance of a savings should ask the user for the starting balance and then ask for the annual interest rate. A loop should then iterate once for every month of the savings period in order to perform other tasks such as asking the user for the total amount deposited into the account, the total amount withdrawn from the account, and calculate the interest rate. The program will then proceed to display the result at the end of the savings period.

Suppose that the following two classes have been declared public class Car f public void m1) System.out.println("car 1"; public void m2) System.out.println("car 2"); public String toString) f return "vroom"; public class Truck extends Car public void m1) t System.out.println("truck 1"); public void m2) t super.m1); public String toString) t return super.toString) super.toString ); Write a class MonsterTruck whose methods have the behavior below. Don't just print/return the output; whenever possible, use inheritance to reuse behavior from the superclass Methog Output/Return monster 1 truck1 car 1 m2 toString "monster vroomvroom'" Type your solution here:

Answers

Answer: provided in the explanation section

Explanation:

// code to copy

Car.java

public class Car {

 

  public void m1()

  {

  System.out.println("car 1");

}

 

  public void m2() {

      System.out.println("car 2");

}

 

  public String toString()

  {

  return "vroom";

}

 

}

Truck.java

public class Truck extends Car{

 

  public void m1()

  {

  System.out.println("truck 1");

  }

 

  public void m2()

  {

  super.m1();

  }

 

  public String toString()

  {

      return super.toString() + super.toString();

  }

}

MonsterTruck​​​​​​​.java

public class MonsterTruck extends Truck

{

  public void m1() {

System.out.println("monster 1");

}

 

public void m2() {

super.m1();

super.m2();

}

 

public String toString() {

return "monster " + super.toString();

}

public static void main(String[] args) {

  MonsterTruck mt=new MonsterTruck();

  mt.m1();

  mt.m2();

  System.out.println(mt);

}

}

cheers i hope this helped !!!

The main() module in the starter code below takes integar inputs separated by commas from the user and stores them in a list. Then, it allows the user to manipulate the list using 3 functions:
mutate_list() takes 3 parameters -- a list, index number, and a value -- and inserts the value in the position specified by the index number in the list.
remove_index() takes 2 parameters -- a list and an index number -- and remove the element at the position number indicated by index. It also prints the total number of elements in the list before and after removing the character in this fashion:"Total elements in list = 11
Total elements in list = 10"
reverse_list() takes 1 parameter -- a list -- and returns the list reversed.
Examples:
Example 1:
Enter values in list separated by commas: 1,2,4,63,6,4,22,53,76
[1, 2, 4, 63, 6, 4, 22, 53, 76]
Menu:
mutate list(m), remove (r), reverse_list (R)
Enter choice (m,r,R): m
4,45
[1, 2, 4, 63, 45, 6, 4, 22, 53, 76]
Example 2:
Enter values in list separated by commas: 1,2,4,6,84,3,2,2,76
[1, 2, 4, 6, 84, 3, 2, 2, 76]
Menu:
mutate list(m), remove (r), reverse_list (R)
Enter choice (m,r,R): R
[76, 2, 2, 3, 84, 6, 4, 2, 1]
Example 3:
Enter values in list separated by commas: 12,2,3,5,2,6,2,1,2,333,65
[12, 2, 3, 5, 2, 6, 2, 1, 2, 333, 65]
Menu:
mutate list(m), remove (r), reverse_list (R)
Enter choice (m,r,R): r
Example 4
Total elements in list = 11
Total elements in list = 10
[12, 2, 3, 5, 6, 2, 1, 2, 333, 65]
please use the codes below
def main():
user_list = input("Enter values in list separated by commas: ")
user_list = user_list.split(",")
user_list = [int(i) for i in user_list]
print(user_list)
print("Menu: ")
print("mutate list(m), remove (r), reverse_list (R)")
user_choice = input("Enter choice (m,r,R): ")
if user_choice == 'm':
index_num, v = input().split(",")
index_num = int(index_num)
v = int(v)
mutate_list(user_list, index_num, v)
print(user_list)
elif user_choice == 'r':
index_num = int(input())
remove_index(user_list, index_num)
print(user_list)
elif user_choice == 'R':
new_list = reverse_list(user_list)
print(new_list)
main()

Answers

Find the given attachments

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet capture, next generation.

(a) .packcng
(b) .paccapnextg
(c) .pcnextgen
(d) .pcapng

Answers

Answer:

Option (d) is correct

Explanation:

Previously saved capture files can be read using Wireshark. For this, select the File then open the menu. Then Wireshark will pop up the “File Open” dialog box.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a .pcapng extension, which stands for packet capture, next generation.

Write a program that reads integers start and stop from the user, then calculates and prints the sum of the cubes (=> **3) of each integer ranging from start to stop, inclusive. "Inclusive" means that both the values start and stop are included.

Answers

Answer:

This program is written in python programming language

Comments are used for explanatory purpose;

Take note of indentations(See Attachment)

Program starts here

#Initialize Sum to 0

sum = 0

#Prompt user for start value

start= int(input("Start Value: "))

#Prompt user for stop value

stop= int(input("Stop Value: "))

#Check if start is less than stop

if(start<=stop):

       #Iterate from start to stop

       for i in range(start, stop+1, 1):

              sum+=i**3

else:

print("Start must be less than or equal to Stop")

#Display Result

print("Expected Output: ",sum)

#End of Program

Which component allows you to enjoy cinematic
or 3-D effects on your computer?
A.Cache memory
B.Ethernet port
C.external hard drive
D.video and sound cards

Answers

external hard drive

external hard drive

Answer:

Amswer would be D

Explanation:

Given: The following if statement uses an overloaded > operator to determine whether the price of a Car object is more than $5000. Car is a struct and myCar is an object of Car. Each Car object has two variables: id (int) and price (float). As you can see in the following code, the ID of myCar is 12345 and the price is $6,000.
Car myCar = {12345, 6000.};
float price = 5000;
if (myCar > price)
cout << "My car price is more than $5,000.\n";
Which one of the following function prototypes is correct syntax to overload the > operator based on the if statement above.
a. void operator>(float price);
b. bool operator>(Car& car, float price);
c. bool operator >(float amt);
d. bool operator>(Car& yourCar);
e. none of the above

Answers

Answer:

Option(c) is the correct answer to the given question.

Explanation:

In the given question car is the structure and mycar is the instance or the object of the class also the object mycar holds two variables of type integer and the one float variable .

Following are the syntax of operator overload in C++ programming language

return -type operator operator-symbol(datatype variable name )

Now according to the question the option(c) follows the correct syntax of operator overload

All the other option do not follow the correct prototype that's why these are incorrect option .

Max magnitude Write a method maxMagnitude() with two integer input parameters that returns the largest magnitude value. Use the method in a program that takes two integer inputs, and outputs the largest magnitude value. Ex: If the inputs are: 5 7 the method returns: 7 Ex: If the inputs are: -8 -2 the method returns: -8 Note: The method does not just return the largest value, which for -8 -2 would be -2. Though not necessary, you may use the absolute-value built-in math method. Your program must define and call a method: public static int maxMagnitude(int userVal1, int userVal2)

Answers

Answer:

The java program is as follows.

import java.lang.*;

public class Numbers

{

   //variables to hold two numbers

   static int num1=-8, num2=-2;

   //method to return integer with higher magnitude

   public static int maxMagnitude(int userVal1, int userVal2)

   {

       if(Math.abs(userVal1) > Math.abs(userVal2))

           return userVal1;

       else    

           return userVal2;

   }

public static void main(String[] args) {

    int max = maxMagnitude(num1, num2);

 System.out.println("The number with higher magnitude among "+num1+ " and "+num2+ " is "+max);

}

}

OUTPUT

The number with higher magnitude among -8 and -2 is -8

Explanation:

1. Two integer variables are declared to hold the two numbers. The variables are declared at class level (outside main()) and declared static.

2. The variables are initialized with any random value.

3. The method, maxMagnitude(), takes the two integer parameters and returns the number with higher magnitude. Hence, return type of the method is int.

public static int maxMagnitude(int userVal1, int userVal2)

4. This method finds the number with higher magnitude using the Math.abs() method inside if-else statement.

               if(Math.abs(userVal1) > Math.abs(userVal2))

                   return userVal1;

        else    

                   return userVal2;

5. Inside main(), the method, maxMagnitude(), is called. This method takes the two variables as input parameters.

6. The integer returned by the method, maxMagnitude() is assigned to a local integer variable, max, as shown.

      int max = maxMagnitude(num1, num2);

7. The result is displayed to the user as shown.

System.out.println("The number with higher magnitude among "+num1+ " and "+num2+ " is "+max);

8. The class variables and the method, maxMagnitude(), are declared static so that they can be used and called inside main().

9. The variable, max, is called local variable since it can be used only within the main() where it is declared. It is not declared static.

10. The class is declared public since it has the main() method and execution begins with main().

11. The program is saved with the same name as the name of the public class having main(). In this case, the program is saved as Numbers.java.

12. No user input is taken for the two input parameter values. The static variables can be assigned any integer value and the program can be tested accordingly.

Universal Containers has two customer service contact centres and each focuses on a specific product line. Each contact centre has a varying call volume, contributing to a high operational cost for the company. Universal Containers wants to optimize the cost without compromising customer satisfaction.; What can a consultant recommend to accomplish these objectives?
A. Prioritize customer calls based on their SLA
B. Cross-train agents on both product lines
C. Enable agents to transfer calls to other agents
D. Implement a customer self-service portal

Answers

Answer:

B. Cross-train agents on both product lines

D. Implement a customer self-service portal

Explanation:

Cross-training is a way of teaching employees different aspects of the job so that they can have a measure of flexibility in the discharge of duties. Managers find this approach to be effective as they believe it saves cost and maximizes the usefulness of employees. It also helps to serve and satisfy a wider range of customers.

So for Universal Containers seeking to optimize cost without compromising customer satisfaction while managing two customer service contact centers, an effective way of dealing with the large call volumes is cross-training agents on both product lines so that they can attend to a wider range of customers. Cross-training agents on both product lines would make them more knowledgeable of the services being offered and this would minimize the need to transfer calls as all agents can provide information on the various products.

Implementing a customer self-service portal would also reduce the workload on the customer service agents as customers can access the information they need on their own.

Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, and distribute his work, but he would still like to retain his copyright on the content. What type of license should he u for his book?

Answers

Answer:

The correct answer will be "Project Gutenberg".

Explanation:

Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.

So that the above is the right answer.

Look at these examples:- • Men are not emotional. • Women are too emotional. • Jewish people are good business people. • The French are great lovers. • Old people are useless. • Young people are sex mad. • Black people are poor. • Thin people are self-disciplined. • Fat people are clumsy. • Rock stars are drug addicts. To what extent do you agree with these statements? Make a note of which ones you agree with

Answers

Answer:

None

Explanation:

These are all stereotypes. Sure, there are definitely some people who fit their stereotypes, but not all. It's just a generalization at the end of the day. I can't really agree with any of them due to the fact that it's all stereotyping.

Perhaps you feel differently, and believe that some of these example are true. I can't though, sorry. Hope this take helps.

The beginning of a free space bitmap looks like this after the disk partition is first formatted: 1000 0000 0000 0000 0000 0000 0000 0000 (the first block is used by the root directory). The system always searches for free blocks starting at the lowest numbered block, so after writing file A, which uses 8 blocks, the bitmap looks like this 1111 1111 1000 0000 0000 0000 0000 0000. Show the bitmap after each of the following actions: (a) File B is written, using 12 blocks (b) File C is written, using 7 blocks (c) File A is deleted (d) File B is deleted (e) File D is written, using 6 blocks (f) File E is written, using 9 blocks Show all steps.

Answers

Hgvccnnfdknvjdkvkdjdi

The bitmap is 1110 0000 0001 0000 after some use. The system always looks for free blocks beginning using a contiguous allocation technique.

What is a bitmap?

After some use, the new bitmap is 1110 0000 0001 0000. The system employs a contiguous allocation mechanism and starts searching for free blocks at the position.

(a) File B is made up of five blocks, 1111 1111 1111 0000.

b) The batch number 1000 0001 1111 0000 deletes File A.

c) Eight blocks are used for writing in file C.

1111 1111 1111 1100

File B is deleted (d). 1111 1110 0000 1100

Free-space bitmaps are one method used by some file systems to keep track of allocated sectors. Even though the most fundamental implementation of free-space bitmaps is incredibly wasteful, some modern file systems use complex or hybrid versions of them.

Therefore, after some use, the bitmap is 1110 0000 0001 0000. The contiguous allocation strategy is always used by the system to look for free blocks to start with.

To learn more about bitmap, refer to the link:

https://brainly.com/question/26230407

#SPJ2

Translate each statement into a logical expression. Then negate the expression by adding a negation operation to the beginning of the expression. Apply De Morgan's law until each negation operation applies directly to a predicate and then translate the logical expression back into English.
Sample question: Some patient was given the placebo and the medication. ∃x (P(x) ∧ D(x)) Negation: ¬∃x (P(x) ∧ D(x)) Applying De Morgan's law: ∀x (¬P(x) ∨ ¬D(x)) English: Every patient was either not given the placebo or not given the medication (or both).(a) Every patient was given the medication.(b) Every patient was given the medication or the placebo or both.(c) There is a patient who took the medication and had migraines.(d) Every patient who took the placebo had migraines. (Hint: you will need to apply the conditional identity, p → q ≡ ¬p ∨ q.)

Answers

Answer:

Explanation:

To begin, i will like to break this down to its simplest form to make this as simple as possible.

Let us begin !

Here statement can be translated as: ∃x (P(x) ∧ M(x))

we require the Negation: ¬∃x (P(x) ∧ M(x))

De morgan's law can be stated as:

1) ¬(a ∧ b) = (¬a ∨ ¬b)

2) ¬(a v b) = (¬a ∧ ¬b)

Also, quantifiers are swapped.

Applying De Morgan's law, we have: ∀x (¬P(x) ∨ ¬M(x)) (∃ i swapped with ∀ and intersecion is replaced with union.)

This is the translation of above

English: Every patient was either not given the placebo or did not have migrane(or both).

cheers i hope this helped !!

You have decided that the complexity of the corporate network facility and satellite offices warrants the hiring of a dedicated physical security and facilities protection manager. You are preparing to write the job requisition to get this critical function addressed and have solicited some ideas from the PCS working group members regarding physical and environmental security risks. Discuss the operational security functions that the physical security and facilities protection manager would be responsible for. Discuss how these functions would inform the development and implementation of system related incident response plans. Further discuss how these incident response plans fit into business continuity planning. Include at least one research reference and associated in-text citation using APA standards. In yourreplies to your peers further discuss how the concepts improve the security posture of PCS.

Answers

Answer:

All organizational security functions are as follows:  

i) Classify any vital data  

ii) Analyze of the hazard  

iii) Analyze vulnerability  

iv) Assess the risk  

v) Take the appropriate risk prevention measures.

Explanation:

These methods described the incident that will fit into this business model was its ongoing support and control of its system that involves the improvements and fix bugs.  For above-mentioned mechanisms aid in evaluating potential events/attacks and help reduce the risk involved with these, as well as promote network security by reducing the likelihood of any harm.  In this case, appropriate monitoring and monitoring should be a must.

Create a Python program that: Allows the user to enter a person's first name and last name. The user should be able to enter as many names as they desire. Create a function that takes the first name and last name, puts them together with the last name first, followed by the first name; with the names separated by commas. Take the result from the function, and place the resulting name in a list. Once the user finishes entering names, sort the contents of the list. Write the sorted names from a list into a text file. When you create the text file, allow the user to enter a name for the file to be created. After you finish writing names to the file, close the file and end the program.

Answers

Answer:

#main function start

def main():

#list to store names entered by user

name_list=[]

#variable to take input from user to keep rotating the loop and take input from user again and again

ch='y'

fname=""

lname=""

while ch=='y' or ch=='Y':#keep the loop taking input from user till user do not want to enter more

#take input from user

name=[]

fname=input("Enter first name: ")

lname=input("Enter last name: ")

name.append(fname)

name.append(lname)

 

#append the previously input first and last name in main list

name_list.append(name)

ch=input("Do you want to continue: (y/Y for yes)")

#main function end

#get file name from user

filename=input("Enter output file name")

#open file in write mode

file=open(filename,"w")

#keep loop add data in file till main list 'name_list' have

for i in name_list:

#Write data in file

file.write("%s, %s\r\n" % (i[0],i[1]))

#close the file

file.close()

#call main function

main()

Explanation:

input the above code and see output

2) An algorithm that takes in as input an array with n rows and m columns has a run time of O(nlgm). The algorithm takes 173 ms to run in an input array with 1000 rows and 512 columns. How long will the algorithm take to run on an input array with 1500 rows and 4096 columns? (Note: For ease of calculation, please use a base of 2 for your logarithm.)

Answers

Answer:

The algorithm takes 346 ms to run on an input array with 1500 rows and 4096 columns.

Explanation:

For an input array with 1000 rows and 512 columns, the algorithm takes 173 ms.

We want to find out how long will the algorithm take to run on an input array with 1500 rows and 4096 columns?

Let the algorithm take x ms to run 1500 rows and 4096 columns.

For an input of n rows and m columns, it takes

[tex]n \: log_{2} \:m[/tex]

So,

[tex]1000 \: log_{2} \:512 = 173 \\\\1000 \: log_{2} \:2^{9} = 173 \:\:\: ( 2^{9} = 512) \\\\1000 \times 9 = 173 \:\:\:\:\: \: \: eg. 1[/tex]

and

[tex]1500 \: log_{2} \:4096 = x \\\\1500 \: log_{2} \:2^{12} = x \:\:\: ( 2^{12} = 4096) \\\\1500 \times 12 = x \:\:\:\:\: \: \: eg. 2[/tex]

Now divide the eq. 2 by eq. 1 to find the value of x

[tex]\frac{1500 \times 12}{1000 \times 9} = \frac{x}{173} \\\\\frac{18000 }{9000} = \frac{x}{173} \\\\2 = \frac{x}{173} \\\\x = 2 \times 173 \\\\x = 346 \: ms[/tex]

Therefore, the algorithm takes 346 ms to run on an input array with 1500 rows and 4096 columns.

Design an algorithm for a monitor that implements an alarm clock that enables a calling program to delay itself for a specified number of time units (ticks). You may assume the existence of a real hardware clock that invokes a function tick() in your monitor at regular intervals.

Answers

Answer:

The algorithm a monitor that implements an alarm clock is designed below.

Monitor alarm

{

      Condition c;

      int  current = 0;

      void  delay (int ticks)

      {

             int alarms;

             alarms = current + ticks;

             while (current > alarms)

             c. wait (alarms) ;

             c. signal;

      }

      void tick ( )

      {

             current = current + 1;

             delay. signal;

       }

}

For this assignment, you will create flowchart using Flow gorithm and Pseudocode for the following program example: Hunter Cell Phone Company charges customer's a basic rate of $5 per month to send text messages. Additional rates apply as such:The first 60 messages per month are included in the basic billAn additional 10 cents is charged for each text message after the 60th message and up to 200 messages.An additional 25 cents is charged for each text after the 200th messageFederal, state, and local taxes add a total of 12% to each billThe company wants a program that will accept customer's name and the number of text messages sent. The program should display the customer's name and the total end of the month bill before and after taxes are added.

Answers

Answer:

The pseudocode is as given below while the flowchart is attached.

Explanation:

The pseudocode is as follows

input customer name, number of texts  

Set Basic bill=5 $;

if the number of texts is less than or equal to 60

Extra Charge=0;

If the number of texts is greater than 60 and less than 200

number of texts b/w 60 and 200 =number of texts-60;

Extra Charge=0.1*(number of texts b/w 60 and 200);

else If the number of texts is greater than 200

number of texts beyond 200 =number of texts-200;

Extra Charge=0.25*(number of texts beyond 200)+0.1*(200-60);

Display Customer Name

Total Bill=Basic bill+Extra Charge;

Total Bill after Tax=Total Bill*1.12;

Complete main() to read dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not following that format is incorrect and should be ignored. Use the substring() method to parse the string and extract the date. The input ends with -1 on a line alone. Output each correct date as: 3/1/1990.
Ex: If the input is:
March 1, 1990
April 2 1995
7/15/20
December 13, 2003
-1
then the output is:
3/1/1990
12/13/2003
Given Code:
import java.util.Scanner;
public class DateParser {
public static int getMonthAsInt(String monthString) {
int monthInt;
// Java switch/case statement
switch (monthString) {
case "January":
monthInt = 01;
break;
case "February":
monthInt = 02;
break;
case "March":
monthInt = 03;
break;
case "April":
monthInt = 04;
break;
case "May":
monthInt = 05;
break;
case "June":
monthInt = 06;
break;
case "July":
monthInt = 07;
break;
case "August":
monthInt = 8;
break;
case "September":
monthInt = 9;
break;
case "October":
monthInt = 10;
break;
case "November":
monthInt = 11;
break;
case "December":
monthInt = 12;
break;
default:
monthInt = 00;
}
return monthInt;
}
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
// TODO: Read dates from input, parse the dates to find the one
// in the correct format, and output in mm/dd/yyyy format

}
}

Answers

Using the knowledge in computational language in C++ it is possible to write a code that complete main() to read dates from input, one date per line

Writting the code:

#include <iostream>

#include <string>

using namespace std;

int DateParser(string month) {

  int monthInt = 0;

 

  if (month == "January")

      monthInt = 1;

  else if (month == "February")

      monthInt = 2;

  else if (month == "March")

      monthInt = 3;

  else if (month == "April")

      monthInt = 4;

  else if (month == "May")

      monthInt = 5;

  else if (month == "June")

      monthInt = 6;

  else if (month == "July")

      monthInt = 7;

  else if (month == "August")

      monthInt = 8;

  else if (month == "September")

      monthInt = 9;

  else if (month == "October")

      monthInt = 10;

  else if (month == "November")

      monthInt = 11;

  else if (month == "December")

      monthInt = 12;

  return monthInt;

}

int main ()

{

 

  // TODO: Read dates from input, parse the dates to find the one

  // in the correct format, and output in m/d/yyyy format

  while(1)

  {

   //declaring the required variables

  int monthInt,dayInt,yearInt;string input;

  //receive the input string frim the user

  getline(cin,input);

  //if the input is -1 then quit

  if(input=="-1")

    break;

  //else try to process the input

  try

  {

  //find and extract the month name and parse it to monthInt

  monthInt=DateParser(input.substr(0,input.find(' ')));

  //find and extract the day and parse it to dayInt

  dayInt=stoi(input.substr(input.find(' '),input.find(", ")));

  //find and extract the year and parse it to yearInt

  yearInt=stoi(input.substr(input.find(", ")+1,input.length()));

  //display the output

  cout<<monthInt<<"/"<<dayInt<<"/"<<yearInt<<endl;

  }

  //catch if any of the exceptions happens

  catch(exception& e){}

  }

}

See more about C++ at brainly.com/question/19705654

#SPJ1

Write a program that displays a menu allowing the user to select air, water, or steel, and then has the user enter the number of feet a sound wave will travel in the selected medium. The program should then compute and display (with four decimal places) the number of seconds it will take. Your program should check if the user enters a valid menu choice, if not, it should terminate with an appropriate message.

Answers

Answer:

yooooooooooooooooooooo

Explanation:

Which of the following meanings of the plus sign, +, are built-in to the language (and/or standard libraries or classes that we have been using with the language)?
A. Numeric subtraction
B. Numeric addition
C. string concatenation
D. The logical "or" operation

Answers

Answer:

Numeric Addition

Explanation:

Literally, the + sign is an arithmetic operator used to perform addition operation between numeric datatypes (integer, float, decimal, double, long integer, etc...)

Its default built in function of the plus is sign is to add variables, constants and/or expressions.

The plus sign is used as follows;

a = 5;

b = 3;

c = a + b

-------------

a + b = 5 + 3 = 8

8 will be saved in variable c. This is only possible using the plus sign.

The plus sign also has other function such as string concatenation but this function is language dependent (i.e. some programming languages do not use + for string concatenation).

Conclusively, the built in function of the plus sign is for numeric addition

. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Today, a symmetric session key needs to be 100 bits long to be considered strong. How long will a symmetric session key have to be in 30 years to be considered strong?

Answers

Answer:

130 bits

Explanation:

If the length of a key = N bits

Total number of key combinations = [tex]\frac{2^{N} }{2}[/tex]

For a key length of 100, the total number of key combinations will be  [tex]\frac{2^{100} }{2} = 2^{99}[/tex] combinations. This is a whole lot and it almost seems impossible to be hacked.

The addition of  one bit to the length of the symmetric key in 1 year is sufficient to make the key strong, because even at double its speed, the processor can still not crack the number of combinations that will be formed.

Therefore, if a bit is added to the key length per year, after 30 years, the length of the symmetric session key will be 130 bits.

In which situations would it be most helpful to filter a form? Check all that apply.

Answers

Filtering is a useful way to see only the data that you want displayed in Access databases.

Alcatel-Lucent's High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on the environment. This works because the HLN:_____________.
a. Reduces or eliminates use of finite (non-renewable) radio frequencies utilized by wireless devices.
b. Reduces Radio Frequency Interference (RFI) - overcrowding of specific areas of the electromagnetic spectrum.
c. Limits the number of people who can access the network at any one time —particularly during times of peak energy demand.
d. Delivers increased bandwidth using fewer devices and energy.

Answers

Answer:

d. Delivers increased bandwidth using fewer devices and energy.

Explanation:

Alcatel-Lucent, formed in 1919 was a French global telecommunications equipment manufacturing company with its headquarter in Paris, France.

They provide services such as telecommunications and hybrid networking solutions deployed both in the cloud and properties.

Alcatel-Lucent's High Leverage Network (HLN) increases bandwidth and network capabilities while reducing the negative impact on the environment. This works because the High Leverage Network (HLN) delivers increased bandwidth using fewer devices and energy on Internet Protocol (IP) networks.

The Alcatel-Lucent's High Leverage Network (HLN) provides reduced cost of transmitting data as fewer network equipments are used with less adverse effects on the environment.

The High Leverage Network (HLN) when successfully implemented helps telecom firms to improve their operational efficiency, maintenance costs, and enhance network performance and capacity to meet the bandwidth demands of their end users.

The common field cricket chirps in direct proportion to the current tem­perature. Adding 40 to the number of times a cricket chirps in a minute, then dividing by 4, gives us the temperature (in Fahrenheit degrees). Write a program that accepts as input the number of cricket chirps in fifteen seconds, then outputs the current temperature

Answers

Answer:

This program is written in Java programming language;

First, you should understand that:

The formula given in the question implies that the current temperature can only be calculated using measurement of time in minutes;

Given that the number of chirps is directly proportional to the temperature.

If the cricket made n chirps in 15 seconds, it will make n * (60/15) chirps in 1 minutes;

n * (60/15) = n * 4

Base on this analysis, the program is as follows

import java.util.*;

public class cricket

{

public static void main(String []args)

{

 //Declare number of chips in 1 minutes

 int num;

 Scanner input = new Scanner(System.in);

 //Prompt user for input

 System.out.print("Number of chirps (in 15 seconds): ");

 num = input.nextInt();

 //Calculate temperature  (multiply temperature by 4 to get number of chirps in minutes

 double temp = (num * 4+ 40)/4;

 //Print temperature

 System.out.print("Current Temperature = "+temp+" F");

}

}

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

Answers

Answer: provided in the explanation section

Explanation:

The question says:

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

The Answer:

multi-segment executable file template. data segment ; add your data here! pkey db "press any key...$" ends stack segment dw 128 dup(0) ends code segment start: ; set segment registers: mov ax, data mov ds, ax mov es, ax ; add your code here mov cx,4 input: mov ah,1 int 21h push ax loop input mov dx,13d mov ah,2 int 21h mov dx,10d mov ah,2 int 21h mov cx,4 output: pop bx mov dl,bl mov ah,2 int 21h loop output exit: lea dx, pkey mov ah, 9 int 21h ; output string at ds:dx ; wait for any key....

mov ah, 1 int 21h mov ax, 4c00h ; exit to operating system. int 21h ends end start ;

set entry point and stop the assembler.

Cheers I hope this helps!!!

You are working at the Acme company that has the following environment: 400 Windows Servers 2. 8000 Windows client devices (laptops running Windows os) 40 Linux servers Active Directory Domain Services to provide dns services to all the hosts, both Windows and Linux. Acme acquires a small research company, Uni-Tech that uses Unix servers for all of its applications. For host resolution they use BIND
a. Describe what BIND is and what the acronym stands for? BIND stands for Berkley Internet Name Domain. BIND allows you to pick one of your computers to act as the DNS server.
b. This acquisition happens very quickly and on day one the business needs people at Uni-Tech to connect to hosts at Acme using hosts names that can be resolved by Active Directory. Describe a method for integrating the two environments that does not require too many individual tasks that will take many hours. (10) Describe how you would test to make sure your integration is working correctly.

Answers

Answer: Provided in the explanation section

Explanation:

(a). BIND is a type of DNS server used on the internet, actually it is reported to be most widely used DNS server on the internet. Also BIND is the de-facto standard on Unix like operating systems and Linux. Thus it can be used to locate computers on a network using domain names instead of their IP addresses. BIND was originally programmed at the University of California, Berkeley in the 1980s, this was made possible by a grant from US based DARPA program.

Originally, BIND stood for Berkeley Internet name daemon, but nowadays it is called Berkeley Internet name domain.

(b). In some of the clients in windows and Windows servers we will install LDP. By the LDP.exe we can test tDNS, Active directory woking , even we can add or modify. LDP is used to test and verify the Active Directory objects. We will install in windows machine then open the software, then from the menu we will select connect and type the IP adress of the Active Directory then we will select or type the objects of Active directory. For Linux system we have to openldap and can search the AD.

From Linux or Unix we can use the nmap tool which can test the network connectivity between all the computers whether it is windows or Linux. By nmap we can test by ICMP protocol to verify the network connectivity. By nmap we can scan all the port which are required to open from client to the server. We can also use nslookup to test DNS server from the client. By nslookup we can check that client can connect the server.

Which of the following is NOT a type of software?
O a database system
O Skype
O Microsoft PowerPoint
O an output device
Previous
Noyt

Answers

Answer:

Output device

Explanation:

Im pretty sure that correct

Other Questions
Liquid suspension contains 125 MG of medication aide for every 300 ML solution this is Spenton is being infused into a patient at the rate of 100 ML per hour if the infusion started at 6 AM and the patient needs 500 MG of the medication a at what time will you need to stop the infusion A sugar cookie recipe that makes 3 dozen cookies calls for 1.5 cups of white sugar. How much white sugar would you need to make 5dozen cookies? A solution of pentane and ethanol (CH3CH2OH)that is 50.% pentane by mass is boiling at 57.2C. The vapor is collected and cooled until it condenses to form a new solution.Calculate the percent by mass of pentane in the new solution. Here's some data you may need: normal boiling point density vapor pressure at 57.2Cpentane 36.C 0.63gmL 1439.torrethanol 78.C 0.79gmL 326.torrBe sure your answer has 2 significant digits.dont round during math only for answer!Note for advanced students: you may assume the solution and vapor above it are ideal. the graph shows the speed of a vehicle during the final 50 seconds of a journey at the start of the 50 seconds the speed is k metres per second which layer lise directly above the inner core *Giving brainliest* Over what interval is the function in this graph constant? Please help! Correct answer only!For a fundraiser, there is a raffle with 100 tickets. One ticket will win a $150 prize, and the rest will win nothing. If you have a ticket, what is the expected payoff?$ ___ Interpret the average rate of change of -14/3 thatyou found previously. What does this mean interms of the waterslide, from x = 0 to x = 15? What fraction is equivalent to 5%?A: 50/100B: 1/20C: 5/10D: 1/5 Kyle is 30 years old, weighs 125 pounds, and is 72 inches tall. what is his bmi Help! Read the sentence from Julius' rough draft.I'd been walking quickly in the growing darkness when a group of kids on their bikes came around the corner so abruptly I had to dive into a bush to keep from getting run over.Julius wants to replace "abruptly." When he looks it up in the thesaurus, he finds the following four words. Which is his best choice? A) suddenly B) rudely C) sharply D) hastily Read the sentence.In film production, it is the role of directors to envision the script that tells a story, to develop an artistic lens that enhances their ideas, and guiding the team that will carry out their vision.How should the underlined section be revised to create parallel structure?guiding the team to carry out their visionto guide the team that will carry out their visionguiding the team that is carrying out their visionguides the team that will carry out their vision Enzyme activity within metabolic pathways is regulated byO food consumptionO activators and inhibitorsO oxidationO neurons Need HELP!!!! Write the point-slope form of the line that passes through (5, 5) and is perpendicular to a line with a slope of 1/4. Include all of your work in your final answer. g(-4) Please help!! 15. How are mitochondria similar to prokaryotic cells? A tank contains 60 kg of salt and 1000 L of water. A solution of a concentration 0.03 kg of salt per liter enters a tank at the rate 9 L/min. The solution is mixed and drains from the tank at the same rate. Let y be the number of kg of salt in the tank after t minutes. Write the differential equation for this situation A taxi driver charges a flat rate of $3.50 plus an additional $1.65 per mile. If Mohammad wants to spend, at most, $60, how far can he travel in the taxi cab? Round your answer to the nearest mile. Write a letter for the health care community (Hospital or Nursing Home) to thank them for everything theyre doing for us during this pandemic Tell them how much their jobs are important Offer them encouragement I need help plsss Noowww Please help! I dont understand