Scientists measure an employee’s work done in joules,distance in kilometers and force in newtons. If you know the force on the object and the distance travelled, you can calculate its work done in joules, with the following formula: work done= Force * Distance;Scientist need a computer program that can help them calculate the work done in joules. The program should prompt a scientist to enter an object’s Force in newton and distance in kilogram. The program should then calculate and displays its workdone . If the workdone more than 5000 joules, display a message indicating that The force is too much, if it is less than or equal to 5000 joules display a message indicating that force is too light.The program should keep calculating the work done and display the message as long as the user to entered value for the Force is not negative .Write a Pseudocode and draw a flowchart for the program

Answers

Answer 1

The pseudocode and the flowchart based on the question requirements are given below:

Pseudocode:

Prompt the scientist to enter the Force in newtons.

If the entered Force is negative, go back to step 1 and prompt again.

Prompt the scientist to enter the distance in kilograms.

Calculate the work done using the formula: workdone = Force * distance.

If workdone > 5000, display "The force is too much."

If workdone <= 5000, display "The force is too light."

Flowchart:

[Start] -> [Prompt Force]

[Check Force]

[Prompt Distance]

[Calculate workdone]

[Check workdone]

[Display appropriate message]

[End]

Read more about pseudocode here:

https://brainly.com/question/24953880
#SPJ1


Related Questions

universal gates Short note​

Answers

Explanation:

FREE POITNS HAHAAHHHAAHAHAH

Define a function PrintAverageOf2() that takes two double parameters, and outputs "Average: " followed by the parameters' average with a precision of two digits. End with a newline. The function should not return any value.

Ex: If the input is 2.00 7.00, then the output is:

Average: 4.50
Note:

The calculation to find the average of two values x and y is (x + y) / 2.
Use cout << fixed << setprecision(2) to output doubles with precision of two digits.

Answers

PrintAverageOf2() is a function that takes two double parameters, outputs their average with a precision of two digits, and ends with a newline.

To define a function PrintAverageOf2(), we first need to specify that it takes two double parameters.

We can achieve this by including the following code at the beginning of the function definition: void PrintAverageOf2(double param1, double param2) Next, we need to calculate the average of the two parameters.

This can be done using the following code:

double average = (param1 + param2) / 2.0;

We then need to output the result using cout with a precision of two digits.

We can achieve this by including the following code:

cout << "Average: " << fixed << setprecision(2) << average << endl; Finally, we need to end with a newline character.

This can be achieved by including the following code at the end of the function definition:

cout << endl;

Overall, the function definition for PrintAverageOf2() would look something like this:

void PrintAverageOf2(double param1, double param2) { double average = (param1 + param2) / 2.0;

cout << "Average: " << fixed << setprecision(2) << average << endl;

cout << endl; }

This function would take in two double parameters, calculate their average with a precision of two digits, and output the result with a newline character at the end.

For more such questions on Double parameters:

https://brainly.com/question/30904360

#SPJ11

Output the following figure with asterisks. Do not add spaces after the last character in each line.
*****
* *
*****
* *
*****

Answers

The result for the output of figure 8 described is:

*********

*          *

*          *

*********

*          *

*          *

*********

This is achieved with the   followig code    

print("*********\n*       *\n*       *\n*********\n*       *\n*       *\n*********")

What Print Function in programming?

The print() method outputs the message supplied to the screen or another standard output device.


The message can be a    string or any other object, which will be transformed to a string before being displayed on  the screen.

To output data to the screen   in Python, we utilize the print( ) method.

Learn more about Print function at:

https://brainly.com/question/13384972

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Output and 8 figure with asterisks. Do not add spaces after the last character in each line.

Note: Whitespace (blank spaces / blank lines) matters; make sure your whitespace exactly matches the expected output.

Why we make block of statements using braces in c++

Answers

Answer:

In C++, braces are crucial for organizing and structuring code, clarifying scope, and controlling execution flow. They serve several purposes: enhancing code readability, defining variable scope, handling control structures, delimiting functions and classes, and initializing objects using initializer lists. Overall, braces contribute to the organization, readability, and safety of C++ code by offering a clear structure for statement blocks and defining their scope.

The world has entered the threshold of Big Data Control economy and many nations have formed a magnificent digital colony within. The digital firestorm has emerged and weaponization of Data has taken center stage! Nations that control Data today will ultimately control the future. True or false?

Answers

The statement "Nations that control Data today will ultimately control the future" is a subjective opinion and cannot be categorically stated as true or false. However, it is true that data has become a valuable asset in today's world and those who can effectively collect, analyze and use data have a strategic advantage in various fields including business, politics, and military. As such, many nations are investing heavily in their data infrastructure and capabilities to gain a competitive edge.

When a wedge is pushed down between objects,the objects..?

Answers

When a wedge is pushed down between objects, the objects will be forced apart from each other.

Explanation :

This is because the wedge converts the force applied to it into a larger force perpendicular to the direction of the force. This perpendicular force is what causes the objects to be pushed apart.

What's the full meaning of COBOL,FORTRAN,PL1,dBASE,ALGOL,RRG,APL,LISP,PROLOG,PASCAL in high level programming​

Answers

Answer:

this doesn't scare me

Explanation:

COBOL(Common Business-Oriented Language) is a high-level programming language for business applications. It was the first popular language designed to be operating system-agnostic and is still in use in many financial and business applications today

FORTRON(FORmula TRANslation) general-purpose, compiled imperative programming language that is especially suited to numeric computation and scientific computing.

(Programming Language One) procedural, imperative computer programming language developed and published by IBM

dBASE( arbitrary name) was one of the first database management systems for microcomputers

... look mister I got tons of anime to watch

what will be the value of x in c code
#include

int main()
{
x=9*5/3+9 ;
}

Answers

Answer:

The value of x in the C code you provided will be 27.

Explanation:

The order of operations in C follows the standard mathematical rules. In this code, the expression is evaluated from left to right, taking into account the order of operations.

First, the multiplication operation of 9 and 5 is performed, which gives the result of 45.

Next, the division operation of 45 and 3 is performed, which gives the result of 15.

Finally, the addition operation of 15 and 9 is performed, which gives the final result of 24.

Therefore, the value of x in the code is 24.

What is example of scope three carbon emission

Answers

Answer:

driving gasoline fueled

vehicle

What are three things to consider in programming design?
the problem being addressed, the goals of the project, and the programming language that will be used
the problem being addressed, the goals of the project, and the age of the end users
the age of the end users, the programming language that will be used, and the programming style of the
programmers working on the project
the age of the end users, the goals of the project, and the programming style of the programmers working on the
project
Help me :(

Answers

Answer:

the problem being addressed, the goals of the project, and the programming language that will be used

Explanation:

After selecting the Slide Master view, how should Gloia proceed?She should select

Answers

The Slide Master view in PowerPoint allows Gloria to customize the overall design of her presentation quickly and efficiently, saving time and effort.

Once Gloria has entered the Slide Master view in PowerPoint, she can proceed to make changes to the slide master, which will apply to all slides using that particular master.

Here are the steps she can take:

To make changes to the overall design of the slides, she can select the master slide in the left-hand pane.

This will display the overall layout of the slides, including the background, fonts, and colors.

To make changes to individual slide layouts, she can select the slide layouts in the left-hand pane.

This will display the layout of each type of slide, such as title slides or content slides.

Gloria can then make the desired changes to the slide master or slide layouts.

This could include changing the background color or image, adjusting the font style or size, adding a logo or image, or any other customization.

Once she has made the desired changes, she can exit the Slide Master view and return to the normal slide view.

The changes she made to the Slide Master will now apply to all slides that use that particular master.

For similar questions on Slide Master

https://brainly.com/question/29769003

#SPJ11

A software
program can help parents assess their income and savings.

Answers

Answer:

what are the choices? Please state the choices and the complete question

In Chapter 8, Programming Exercise 6 you created a Salesperson class with fields for an ID number and sales values. Now, create an application that allows you to store an array that acts as a database of any number of Salesperson objects up to 20. While the user decides to continue, offer four options: to (A)dd a record to the database, to (D)elete a record from the database, to (C)hange a record in the database, or to (Q)uit. Then proceed as follows: • If the user selects the add option, issue an error message, Sorry - array is full -- cannot add a record, if the database is full. Otherwise, prompt the user for an ID number. If the ID number already exists in the database, issue the error message Sorry -- ID number already exists. Otherwise, prompt the user for a sales value and add the new record to the database. • If the user selects the delete option, issue the error message, Cannot delete - no records in database, if the database is empty. Otherwise, prompt the user for an ID number. If the ID number does not exist, issue the error message, Sorry - ID number #xxx does not exist in the database. Otherwise, do not access the record for any future processing. • If the user selects the change option, issue the error message, Database is empty -- cannot change record, if the database is empty. Otherwise, prompt the user for an ID number. If the requested record does not exist, issue the error message, Sorry - ID number #xxx does not exist in the database. Otherwise, prompt the user for a new sales value and change the sales value for the record. After each option executes, display the updated database in ascending order by Salesperson ID number and prompt the user to select the next action. An example of the program is shown below: ... Do you want to (A)dd, (D)elete, or (C)hange a record or (Q)uit >> A Enter salesperson ID >> 7 Enter sales >> 550 Current database: ID #5 $500.0 ID #6 $600.0 ID #7 $550.0 Do you want to (A)dd, (D)elete, or (C)hange a record or (Q)uit >> C Enter ID to change >> 6 Enter

Answers

A good example of how a person can implement the described application in Python is given in the image attached

What is the Programming about?

Sales goals provide a well-defined path for your sales team to contribute towards the attainment of your company's overarching targets.

The Salesperson class is one that is set up in this code, and it is one that is made up of attributes such as an ID number and sales value. The Salesperson objects are saved in the database in the form of a list. The software subsequently offers alternatives to include, eliminate, modify data, or exit. The records in the database are organized by ID number in ascending order and are shown on the screen after each action.

Learn more about Programming from

https://brainly.com/question/26134656

#SPJ1

in the string shown below what data type is the varible time?

Time="The time is"

Answers

Answer:

String

Explanation:

While you already know that given you said "in the string shown below", time is clearly a string. Time is a variable that holds text, clearly shown by the quotation marks.

Question 7 of 10
What is a network?
A. Many people or things that are individually connected to one
another
OB. The main idea or information contained in a media piece
OC. A means of mass communication in print and other forms
OD. A group of individuals who share the same ideas and values
SUBMIT

Answers

A group of individuals who share the same ideas and values is a network.

Thus, Two or more computers connected together to share resources (such printers and CDs), exchange files, or enable electronic communications make up a network.

A network's connections to its computers can be made by cables, phone lines, radio waves, satellites, or infrared laser beams.

A network that is contained inside a very limited region is known as a local area network (LAN). It is typically constrained to a certain location, such a writing lab, building, or school.

Servers and workstations are the two primary categories of computers that are networked. In most cases, servers are not directly used by people; instead, they run continually to offer "services" to the other computers on the network and their human users.

Thus, A group of individuals who share the same ideas and values is a network.

Learn more about Network, refer to the link:

https://brainly.com/question/29350844

#SPJ1

OJT Experience 2023

1. What is your work?
2. What is your schedule tome of work from Monday to Friday? Shifting time or changes every week?
3. How is your relationship with your supervisor (hearing boss)
4. Do you have hearing friends in your work?
5. How do you communicate in the workplace?
6. How do you manage/ budget your time?
7. How do you discipline yourself by not being late and absent?
8. What did you learn from your OJT?

Answers

During my OJT hours, I was determined to work hard in order to complete all of the tasks set to me by my employer. It was my duty and responsibility to work without hesitation to offer excellent work that would impress the people around me inside the firm in a professional manner.

What was my work?

My work had to do with understudying other permeant employees and helping them in delegated tasksMy schedule was was from Monday to FridayThe relatioship with my bos was cordial and pofssionalYes, I made friends at workCommunication was professional at work and regular when relating with friends outside workI was very strick with time and budget.Discipline was ahcievd by planning aheadI learnt to be professional and to manage time well.

Learn more about OJT:
https://brainly.com/question/29852472
#SPJ1

2. Match the parts of software applications with what they do

1. Ribbon

a. the control center for using the application

b. part of the ribbon that contains important tasks within an application

2. Tab

3 Menu bar

c. a row of icons or buttons

d. lists sets of commands

- 4 Toolbar

e. move from part of a window to another.

top row of an application window, displays the name of the document

g shows the information about the program and other useful messages

- 5. Title bar

6. Scroll

7 Workspace

h the largest area of a program's window

8 Status bar

SANT

Answers

The match is given like this


Ribbon: Part of the user interface that contains important tasks within an application.

Tab: A set of related commands or options in a program.

Menu bar: A row of menus at the top of a program window that lists sets of commands.

Toolbar: A row of icons or buttons used to execute frequently-used commands in an application.

Title bar: The top row of an application window that displays the name of the document.

Scroll: To move from one part of a window to another.

Workspace: The largest area of a program's window where the user can work on documents or data.

Status bar: Displays information about the program and other useful messages, such as the current status of a process or the state of a particular tool or setting.

What is the definition of a software?

A collection of computer programs, documentation, and data is referred to as software. This is in contrast to hardware, which is the system's base and conducts the actual work.

Software is a collection of instructions, data, or programs that are used to run machines and perform certain tasks. It is the inverse of hardware, which describes the physical components of a computer. Apps, scripts, and programs that run on a device are referred to as software.

Learn more about software  at:

https://brainly.com/question/1022352

#SPJ1

what is a WAP and why is it important in a wireless network​

Answers

In the context of wireless networks, WAP stands for Wireless Access Point. A Wireless Access Point is a networking device that allows wireless devices to connect to a wired network using Wi-Fi or other wireless communication standards.

WAPs play a crucial role in wireless networks for several reasons:

Connectivity: WAPs provide a wireless connection point for devices such as laptops, smartphones, tablets, and IoT devices to connect to a network without the need for physical cables. They act as intermediaries between wireless devices and the wired network infrastructure, enabling seamless communication between them.

Network Expansion: WAPs allow for the expansion of network coverage in both home and enterprise environments. By strategically placing WAPs, network administrators can extend the reach of wireless signals, ensuring that devices in different areas have reliable connectivity.

Mobility: With WAPs, users can access the network and maintain connectivity while moving within the coverage area. This is particularly important in environments where mobility is essential, such as office buildings, schools, airports, or public spaces. WAPs enable users to stay connected and access network resources without being tied to a specific location.

Bandwidth Sharing: WAPs help distribute available bandwidth among multiple devices connected to the network. They manage data transmission and ensure fair sharing of resources, optimizing network performance and preventing congestion. WAPs can prioritize traffic, allocate bandwidth, and manage quality of service (QoS) settings to improve the user experience.

Security: WAPs play a vital role in securing wireless networks. They act as gateways and provide authentication and encryption mechanisms to protect data transmitted over the network. WAPs often implement security protocols like WPA2 (Wi-Fi Protected Access II) or newer standards like WPA3 to ensure secure and private wireless communication.

Centralized Management: In larger wireless network deployments, multiple WAPs can be centrally managed. This allows network administrators to configure, monitor, and troubleshoot the network from a central location, simplifying network management and reducing maintenance efforts.

Overall, WAPs are essential in wireless networks as they provide wireless connectivity, extend network coverage, enable mobility, facilitate bandwidth sharing, enhance network security, and allow centralized management. They are a fundamental component in ensuring reliable and efficient wireless communication, supporting the increasing demand for wireless connectivity in our modern world.

What type of structure is this?

Answers

Note that these structures belong to Nano technology and allotropes.

What type of bonding do allotropes have?

Carbon atoms are connected by strong covalent bonds in all three allotropes, but in such varied patterns that the characteristics of the allotropes are significantly different.

Allotropes are several forms of the same element in the same physical condition. Carbon allotropes include diamond and graphite. They are both large covalent structures made up of numerous carbon atoms connected together by covalent bonds.

Learn more about nano structures;
https://brainly.com/question/29813999
#SPJ1

Full Question:

See attached image.

For each of the following file extensions, select the correct file format from the drop-down menu.

.ibooks
✔ Multi-Touch iBook
.rtf
✔ Rich text format
.pdf
✔ Portable document format
.txt
✔ Plain text

Answers

Answer:

All the options selected are correct:

.ibooks → Multi-Touch iBook

.rtf → Rich text format

.pdf → Portable document format

.txt → Plain text

What TWO skills does the Microsoft Certified Solutions Expert (MCSE) certification validate?

managing cloud-based solutions
protecting enterprises against security threats
basic computer troubleshooting
creating solutions with Microsoft products
security risk solutions

Answers

The Microsoft Certified Solutions Expert (MCSE) certification validates two key skills: managing cloud-based solutions and creating solutions with Microsoft products.

The Microsoft Certified Solutions Expert (MCSE) certification was a globally recognized credential offered by Microsoft. However, as of January 31, 2021, Microsoft retired the MCSE certification along with other Microsoft Certified Solutions Associate (MCSA) and Microsoft Certified Solutions Developer (MCSD) certifications. Microsoft has transitioned to a role-based certification model.

The Microsoft Certified Solutions Expert (MCSE) certification validates two key skills:
1. Managing cloud-based solutions: This skill involves the ability to design, implement, and manage cloud-based solutions using Microsoft technologies and platforms. This includes configuring and deploying virtual machines, storage solutions, and networking components.
2. Creating solutions with Microsoft products: This skill covers proficiency in using various Microsoft products to develop and implement customized solutions for businesses. This involves understanding and applying the features of Microsoft products like Windows Server, SQL Server, and SharePoint, among others, to meet specific organizational needs.
These two skills are essential for professionals seeking the MCSE certification, as they demonstrate expertise in managing modern IT infrastructures and creating effective solutions using Microsoft technologies.

For more questions on Microsoft Certified Solutions Expert

https://brainly.com/question/27851202

#SPJ11

Write a short paper addressing each of the following items (two paragraphs total, one-half to one page in length):

Briefly describe each of the four principles of ethics as outlined by Bosworth.

Talk about the four components of a complete organizational security policy and their
basic purpose OR describe the benefits of change control management.

Answers

These principles outlined by Bosworth serve as a guide for ethical decision-making and behavior within various contexts. Secondly, we will delve into the four components of a complete organizational security policy and highlight their basic purposes. A well-defined security policy helps organizations protect their valuable assets and maintain a secure operating environment.

Principles of Ethics by Bosworth:

Bosworth outlines four fundamental principles of ethics that provide a framework for individuals and organizations to make morally sound decisions.

1. The first principle is Respect for Autonomy, which emphasizes the importance of recognizing and honoring an individual's right to make independent choices. It promotes informed consent and requires providing relevant information and ensuring voluntary participation.

2. The second principle is Beneficence, which focuses on acting in the best interest of others and promoting their well-being. It entails actively seeking opportunities to do good and prevent harm, often requiring a balance between individual and collective interests.

3. The third principle is Non-maleficence, which underscores the obligation to avoid causing harm or inflicting unnecessary suffering. It involves minimizing risks, preventing harm, and exercising due diligence to ensure that actions and decisions do not have adverse consequences.

4. The fourth principle is Justice, which advocates for fairness and equity in the distribution of benefits, resources, and burdens. It requires impartiality, equal treatment, and addressing systemic inequalities to ensure that all individuals are treated justly.

Components of a Complete Organizational Security Policy:

A comprehensive organizational security policy consists of four key components, each serving a distinct purpose.

Firstly, the Policy Statement outlines the overarching objectives, principles, and responsibilities related to security within the organization. It sets the tone for the entire policy framework and provides a clear direction for security-related decision-making.Secondly, the Risk Assessment component helps identify and evaluate potential risks and vulnerabilities. By conducting a thorough assessment, organizations can understand their unique security challenges and develop appropriate mitigation strategies. This component facilitates proactive risk management and supports the implementation of effective security measures.Thirdly, the Security Controls section defines the specific measures and procedures that an organization implements to protect its assets and ensure a secure environment. It encompasses physical, technical, and administrative controls such as access control, encryption, incident response, and employee training. These controls are tailored to address identified risks and minimize potential threats.Lastly, the Enforcement and Compliance component establishes mechanisms for enforcing the security policy and ensuring adherence to established controls. It includes monitoring, auditing, and disciplinary procedures to detect and address policy violations. By enforcing compliance, organizations can maintain a consistent and robust security posture.

For more questions on Bosworth

https://brainly.com/question/30453065

#SPJ11

Write any kind of loop to prove that a number is a palindrome number. A palindrome number is a number that we can read forward and backward and the result of reading both ways is the same: e.g 147741 is a palindrome number.  
With me code program C.

Answers

The program based on the given question that checks whether a given number is a palindrome is

#include <stdio.h>

int isPalindrome(int num) {

  int reverse = 0, temp = num;

  while (temp > 0) {

      reverse = reverse * 10 + temp % 10;

      temp /= 10;

  }

  return (num == reverse);

}

int main() {

  int number;

  printf("Enter a number: ");

  scanf("%d", &number);

  if (isPalindrome(number))

      printf("%d is a palindrome number.\n", number);

  else

      printf("%d is not a palindrome number.\n", number);

  return 0;

}

How does this work?

This program's isPalindrome function checks if an input integer is a palindrome number by using a while loop to continuously extract the last digit and build the reversed number.

If reversed number = original number, function returns 1 (true); else function returns 0 (false). The main function prompts input, checks for palindrome status, and displays the result.

Learn  more about programs here

brainly.com/question/26134656

#SPJ1:

Rewrite the non-stop simple calculator as multi-value witch case program.

C program

Answers

The  non-stop simple calculator as multi-value witch case program in C  is

#include <stdio.h>

int main() {

   int choice;

   float num1, num2, result;

   printf("Enter two numbers: ");

   scanf("%f %f", &num1, &num2);

   printf("\nSelect an operation to perform:\n");

   printf("1. Addition\n");

   printf("2. Subtraction\n");

   printf("3. Multiplication\n");

   printf("4. Division\n");

   scanf("%d", &choice);

   switch(choice) {

       case 1:

           result = num1 + num2;

           printf("\n%.2f + %.2f = %.2f\n", num1, num2, result);

           break;

       case 2:

           result = num1 - num2;

           printf("\n%.2f - %.2f = %.2f\n", num1, num2, result);

           break;

       case 3:

           result = num1 * num2;

           printf("\n%.2f * %.2f = %.2f\n", num1, num2, result);

           break;

       case 4:

           if (num2 == 0) {

               printf("\nError: Division by zero\n");

           } else {

               result = num1 / num2;

               printf("\n%.2f / %.2f = %.2f\n", num1, num2, result);

           }

           break;

       default:

           printf("\nError: Invalid choice\n");

   }

   return 0;

}

How can you have many values in a switch case?

In Java, you may use the case label for each value or the case label with a range of values to utilize two values in a switch case statement.

This will return "1 or 2" for the first and second values, and "3" for the third.

C is a programming language for general-purpose computers. Dennis Ritchie invented it in the 1970s, and it is still extensively used and influential today. C's characteristics are designed to accurately match the capabilities of the targeted CPUs.

Learn more about C program:
https://brainly.com/question/30905580
#SPJ1

4. In Six Sigma processes, very few
products fall outside specifications because
there are at least six
between the
mean value and specification limits.
A. sprints
B. processes
C. normal distributions
D. standard deviations

Answers

In Six Sigma processes, very few products fall outside specifications because there are at least six standard deviations between the mean value and specification limits. (Option D)

What are the six Sigma Processes?

Six Sigma processes have a specification limit that is 6 times the sigma (standard deviation) from the mean. In other terms, the 6 refers to the capacity to match the process's excellent outputs within 6 standard deviations (or sigmas).

Six Sigma is an acronym that stands for six standard deviations (6SD) between the average and permissible limits. LSL and USL are abbreviations for "Lower Specification Limit" and "Upper Specification Limit." Specification Limits are generated from client needs and establish the process's minimum and maximum permissible limits.

Learn more about Six Sigma Processes:
https://brainly.com/question/29993908
#SPJ1

Which CTSO focuses on nurturing middle and high school students looking for careers in science, technology, engineering, and math (STEM)?

A.
Future Business Leaders of America – Phi Beta Lambda (FBLA-PBL)
B.
Business Professionals of America (BPA)
C.
Technology Student Association (TSA)
D.
EC-Council
E.
SkillsUSA

Answers

The CTSO focuses on nurturing middle and high school students looking for careers in science, technology, engineering, and math (STEM)  is C. Technology Student Association (TSA)

How is this so?

The Technology Student Association (TSA) is the CTSO (Career and Technical Student Organization) that primarily focuses on nurturing middle and high school students interested in pursuing careers in science, technology, engineering, and math (STEM).

TSA provides a platform for students to develop skills, engage in STEM-related activities, and explore their interests in these fields through various competitions, projects, and educational programs. It aims to prepare students for future careers and leadership roles in STEM-related industries and professions.

Learn more about CTSO  at:

https://brainly.com/question/37564944

#SPJ1

carry out the binary arithmetic 10100+1010-1010-1010 ​

Answers

Hello !

64     32    16    8    4    2    1

                  1     0    1    0    0

                        1     0    1     0

10100 => 20

1010 => 10

20 + 10 - 10 - 10 = 10          

binary : 10100 + 1010 - 1010 - 1010 ​= 1010

Test 3 project stem answers

Answers

Answer:

Purpose of wedding ceremony in Christians

Question 18 of 20:
Select the best answer for the question.
18. Illegally downloading media such as music or movies is called
O A. plagiarism.
OB. harassment.
OC. bullying.
D. piracy.

Answers

Answer:

A is the answer

Explanation:

we don't have to bully some one if they are not nice or their skin colour

12.3 queston 1 projet stem please help

Write a method named print_capitals which prints every value from a dictionary parameter in capital letters. So, for example, this call
d = {"green": "go", "yellow": "prepare", "red": "stop"}
print_capitals(d)
should print the following:
GO
PREPARE
STOP

Answers

Answer:

python

def print_capitals(d: dict):

for key in d:

print(d[key].upper())

# Example usage:

d = {"green": "go", "yellow": "prepare", "red": "stop"}

print_capitals(d)

```

Other Questions
sudoriferous glands are categorized as two distinct types how do I find the inverse of this function?? which pays no dividend at the beginning of the year for $204.60 then sell it at the end of the year for $247.72 what will be your return as a percent Which of the following would inhibit an infant's ability to learn about the social world?A. when caregivers show no facial expressions and are unresponsive to infantsB. cooperative tasks with peersC. self-produced locomotion skillsD. face-to-face play an administrator can run a powershell command on a remote server using what additional element? Question 7 of 22Read this passage from the U.S. Constitution:We the People of the United States, in order to form amore perfect Union, establish Justice, insure domesticTranquility, provide for the common defence, promote thegeneral Welfare, and secure the Blessings of Liberty toourselves and our Posterity, do ordain and establish thisConstitution for the United States of America.1Which statement reflects a main idea expressed in the passage?A. The federal government is superior to state governments. Which of the following is NOT a likely explanation of the Flynn effect in many cultures? a. IQ tests have become progressively easier over time. b. The quality of childhood nutrition has generally increased over time. c. The amount of scientific education people typically receive has increased over time. d. The rates of many childhood diseases have fallen over time the self-serving bias illustrates our tendency to judge others more charitably than ourselves. Which of the following produces a greenish pigment that may appear in infected wounds? A. E. coliB. S. aureusC. S. pyogenesD. P. aeruginosa technician a says that a fuel cell produces electricity through an electrochemical reaction that combines hydrogen and oxygen to form water. technician b says that in a fuel cell, catalysts are used to ignite the hydrogen, causing a release of electrical energy. who is correct? as a parent, carol is excessively lenient. she fails to give her children solid boundaries. this illustrates Three children are lined up to run a 50-meter race. The children all weigh the same. They start running at the same speed, but child 1 runs fastest over the final 10 meters and crosses the finish line first. What is true about the kinetic energy of child 1 at the moment she cross the finish line? in the 1600s, most europeans believed the institution of the monarchy had been created by whom? 2)According to the principle of equivalence all objects fall at the same speed towards the Earthduetogravity. ButwhenyoudropafeatherandabowlingballfromthesameheightanywhereonEarththey will fall at different rates. Why? Can I hv help with this pls!! a capacitor is connected across an ac generator whose fre- quency is 750 hz and whose peak output voltage is 140 v. the rms current in the circuit is 3.0 a. (a) what is the capacitance of the capacitor? (b) what is the magnitude of the maximum charge on one plate of the capacitor? Unlike product, promotion, or place, price is the only part of the marketing mixA. that offers the opportunity for an oligopoly.B. that is subject to gray market manipulation.C. that leads to competition.D. that generates revenue.E. that is determined by the consumer. the bronze sculpture riace warrior a was created as ________ representation of the human body. A teenage girl asks why chemotherapy causes hair loss. Which response by the nurse is accurate?A.Circulation to the head causes large doses of chemotherapy to reach the scalp.B.Hair is not a living tissue, and it is easily damaged by chemotherapy.C.Chemotherapy affects cancer cells and normal cells that multiply rapidly.D.Hair is exposed to the sun, which increases sensitivity to chemotherapy. . In your opinion, does the state present sufficient evidence of Tom's guilt in to kill a mockingbird