Which component allows you to enjoy cinematic
or 3-D effects on your computer?
A.Cache memory
B.Ethernet port
C.external hard drive
D.video and sound cards

Answers

Answer 1

external hard drive

external hard drive

Answer 2

Answer:

Amswer would be D

Explanation:


Related Questions

Bill downloaded an antivirus software from the Internet. Under the Uniform Commercial Code (UCC), the software is a: Select one: a. good. b. service. c. good-faith warranty. d. mixture of goods and services.

Answers

Answer:

a. good

Explanation:

According to the Uniform Commercial Code (UCC), It deals with all the contracts that also involves the sale of the goods,

Here goods include those things or items that are movable in a nature and also consist of manufactured goods that are specialized in nature

Therefore, as per the given situation, the bill downloaded an antivirus software so here the software is treated as a good

In the lab, you defined the information systems security responsibility for each of the seven domains of a typical IT infrastructure. In which domain would you be most likely to secure access through the Internet and from employees’ homes?

Answers

Answer:

Remote Access Domain

Explanation:

Remote access Domain allows users to enter into system network through VPN.

5. Write a C++ program that can display the output as shown below. Your
program will calculate the price after discount. User will input the
price and the discount is 20%


Answers

Answer:

#include<iostream>

using namespace std;

int main()

{

float price;

float discount;

cout<<"enter price : ";

cin>>price;

discount=price - (price * 20 / 100);

cout<<"discount rate is :"<<discount;

}

Explanation:

Let K(x, y) denote the statement "x knows y" and D denote the domain of all people. Express the following English sentences as a quantified proposition using the definitions above:

1. Everybody knows somebody.
2. There is somebody that no one knows.
3. There is no one who knows everybody

Answers

Answer:

Given: K(x,y) denotes statement:

"x knows y"

D denote domain of all people.

Explanation:

1. Everybody knows somebody.

Solution:

∀x∈D ∃y∈D : K(x, y)

∀ means for all. Here it is used for Everybody.

∃ means there exists some. Here it represents Somebody.

∈ means belongs to . Both x and y belongs to the domain D of all people.

2. There is somebody that no one knows.

Solution:

∀x∈D ∃y∈D : ¬K(x, y)

∀ means for all. ∃ means there exists some. ∈ means belongs to both x and y belongs to the domain D of all people.¬ this is negation sign which means not K(x,y). So the negation of everybody knows somebody can be expressed as there is somebody that no one knows.

3. There is no one who knows everybody

Solution:

This can be represented in both the ways below.

∀ y∈D ∃ x∈D : K(x, y)

∀ means for all. ∃ means there exists some. ∈ means belongs to both x and y belongs to the domain D of all people.

∀x∈D ∀y∈D : ¬K(x, y)

∀ means for all. The negation shows that there is no one who knows everybody.

#Write a function called "scramble" that accepts a string #as an argument and returns a new string. The new string #should start with the last half of the original string #and end with the first half. # #If the length of the string is odd, split the string #at the floor of the length / 2 (in other words, the second #half is the longer half). # #For example: # scramble("abcd") -> "cdab" # screamble("abcde") -> "cdeab" # scramble("railroad")) -> "roadrail" # scramble("fireworks")) -> "worksfire"

Answers

Answer:

def scramble(s):

   if len(s) % 2 == 1:

       index = int(len(s)//2)

   else:

       index = int(len(s)/2)

   

   return s[index:] + s[:index]

Explanation:

Create a function called scramble that takes one parameter, s

Check the length of the s using len function. If the length is odd, set the index as the floor of the length/2. Otherwise, set the index as length/2. Use index value to slice the s as two halves

Return the second half of the s and the second half of the s using slice notation (s[index:] represents the characters from half of the s to the end, s[:index] represents the characters from begining to the half of the s)

You are writing a paragraph in a word processor. You
want to use the same text that appears elsewhere in a
different document, but you want to keep it in the other
document. To get the other text into the new document
most efficiently, you should:
Cut and paste
Ctrl + S
Copy and paste
Print the text and retype it so you don't make any mistakes.

Answers

Answer:

Explanation:

I mean I would copy and paste it. I hope thats right

Consider the following class definitions.

public class Robot

{

private int servoCount;

public int getServoCount()

{

return servoCount;

}

public void setServoCount(int in)

{

servoCount = in;

}

}

public class Android extends Robot

{

private int servoCount;

public Android(int initVal)

{

setServoCount(initVal);

}

public int getServoCount()

{

return super.getServoCount();

}

public int getLocal()

{

return servoCount;

}

public void setServoCount(int in)

{

super.setServoCount(in);

}

public void setLocal(int in)

{

servoCount = in;

}

}

The following code segment appears in a method in another class.

int x = 10;

int y = 20;

/* missing code */

Which of the following code segments can be used to replace /* missing code */ so that the value 20 will be printed?


A Android a = new Android(x);

a.setServoCount(y);

System.out.println(a.getServoCount());

B Android a = new Android(x);

a.setServoCount(y);

System.out.println(a.getLocal());

C Android a = new Android(x);

a.setLocal(y);

System.out.println(a.getServoCount());

D Android a = new Android(y);

a.setServoCount(x);

System.out.println(a.getLocal());

E Android a = new Android(y);

a.setLocal(x);

System.out.println(a.getLocal());

Answers

Answer:

The correct answer is option A

Explanation:

Solution

Recall that:

From the question stated,the following segments of code that should be used in replacing the /* missing code */ so that the value 20 will be printed is given below:

Android a = new Android(x);

a.setServoCount(y);

System.out.println(a.getServoCount());

The right option to be used here is A.

Based on the information given, the code segments that's appropriate will be A  Android a = new Android(x);

a.setServoCount(y);System.out.println(a.getServoCount());

From the question stated, it was inferred that we should get the segments of code that should be used in replacing the /* missing code */ so that the value 20 will be printed.

This will be:

Android a = new Android(x);

a.setServoCount(y);

System.out.println(a.getServoCount());

In conclusion, the correct option is A.

Learn more about codes on:

https://brainly.com/question/22654163

8) Which of the following statements is FALSE?
1) You will likely need to use a combination of both popular and scholarly resources in your research
2) The CRAAP test can be used to help evaluate all of your sources
3) Academic journal articles are always unbiased in their analysis
4) Popular resources tend to be easier to read than scholarly articles

Answers

Answer:

3) Academic journal articles are always unbiased in their analysis.

Explanation:

The Academic journals are not always unbiased. There can be some authors which may write in some situation and bias the articles. It is important to analyse source and reliability of the article before relying on it. An unbiased author will try to capture picture fairly. The unbiased author presents the facts as it is and does not manipulates the truth.

An assault on system security that derives from an intelligent act that is a deliberate attempt to evade security services and violate the security policy of a system is a(n) _________.
A. Risk
B. Attack
C. Asset
D. Vulnerability

Answers

Answer:

Option B: Attack

Explanation:

A security attack is an act to access to a system without a legit authorization. Usually the aim is to steal confidential info from the system or control the system by manipulating the data stored in the system. Some attacks are also aimed to disable the operation of the hacked system. Nowadays, there are several common types of security attacks which include

phishingransomwaredenial of servicemain in the middleSQL injectionmalware

Write a function named file_stats that takes one string parameter (in_file) that is the name of an existing text file. The function file_stats should calculate three statistics about in_file i.e. the number of lines it contains, the number of words and the number of characters, and print the three statistics on separate lines.

For example, the following would be be correct input and output. (Hint: the number of characters may vary depending on what platform you are working.)
>>> file_stats('created_equal.txt')

lines 2
words 13
characters 72

Answers

Answer:

Here is the Python program.

characters = 0

words = 0

lines = 0

def file_stats(in_file):

   global lines, words, characters

   with open(in_file, 'r') as file:

       for line in file:

           lines = lines + 1

           totalwords = line.split()

           words = words + len(totalwords)

           for word in totalwords:

               characters= characters + len(word)

file_stats('created_equal.txt')

print("Number of lines: {0}".format(lines))

print("Number of words: {0}".format(words))

print("Number of chars: {0}".format(characters))

   

Explanation:

The program first initializes three variables to 0 which are: words, lines and characters.

The method file_stats() takes in_file as a parameter. in_file is the name of the existing text file.

In this method the keyword global is used to read and modify the variables words, lines and characters inside the function.

open() function is used to open the file. It has two parameters: file name and mode 'r' which represents the mode of the file to be opened. Here 'r' means the file is to be opened in read mode.

For loop is used which moves through each line in the text file and counts the number of lines by incrementing the line variable by 1, each time it reads the line.

split() function is used to split the each line string into a list. This split is stored in totalwords.

Next statement words = words + len(totalwords)  is used to find the number of words in the text file. When the lines are split in to a list then the length of each split is found by the len() function and added to the words variable in order to find the number of words in the text file.

Next, in order to find the number of characters, for loop is used. The loop moves through each word in the list totalwords and split each word in the totalwords list using split() method. This makes a list of each character in every word of the text file. This calculates the number of characters in each word. Each word split is added to the character and stored in character variable.

file_stats('created_equal.txt')  statement calls the file_stats() method and passes a file name of the text file created_equal.txt as an argument to this method. The last three print() statements display the number of lines, words and characters in the created_equal.txt text file.

The program along with its output is attached.

Mikayla wants to create a slide with a photograph of a car and the car horn sounding when a user clicks on the car. Which
feature should she use, and why?
a. She should use the Action feature because it allows a user to embed a hyperlink for an Internet video on the car.
b. She should use the Video from Website feature because it allows a user to embed a hyperlink for an Internet video on the car.
c. She should use the Action feature because it allows a user to place an image map with a hotspot on the car.
d. She should use the Video from Website feature because it allows a user to place an image map with a hotspot on the car.

Answers

Answer: A

Explanation: edge :)

Answer:

C

Explanation:

What is a digital security risks?

Answers

Answer:

A digital security risk is an action that could result in damage to a computer or similar device's hardware, software, data etc.

Create an empty list called resps. Using the list percent_rain, for each percent, if it is above 90, add the string ‘Bring an umbrella.’ to resps, otherwise if it is above 80, add the string ‘Good for the flowers?’ to resps, otherwise if it is above 50, add the string ‘Watch out for clouds!’ to resps, otherwise, add the string ‘Nice day!’ to resps. Note: if you’re sure you’ve got the problem right but it doesn’t pass, then check that you’ve matched up the strings exactly.

Answers

Answer:

resps = []

percent_rain = [77, 45, 92, 83]

for percent in percent_rain:

   if percent > 90:

       resps.append("Bring an umbrella.")

   elif percent > 80:

       resps.append("Good for the flowers?")                  

   elif percent > 50:

       resps.append("Watch out for clouds!")

   else:

       resps.append("Nice day!")

       

for r in resps:    

   print(r)

Explanation:

*The code is in Python.

Create an empty list called resps

Initialize a list called percent_rain with some values

Create a for loop that iterates through the percent_rain. Check each value in the percent_rain and add the required strings to the resps using append method

Create another for loop that iterates throgh the resps and print the values so that you can see if your program is correct or not

Answer:

resps = []

for i in percent_rain:

   if i > 90:

       resps.append("Bring an umbrella.")

   elif i >80:

       resps.append("Good for the flowers?")                    

   elif i > 50:

       resps.append("Watch out for clouds!")

   else:

       resps.append("Nice day!")

Explanation:

Someone help me with this

Answers

Answer:

(b) public String doMath(int value){

return " " + (value * 3);

}

Explanation:

Two of the answers doesn't even have a variable to pass into. In order, to return a String the return " " in b will do this. Therefore, I think the answer is b.

Two-factor authentication can best be breached by the adversary using:________. a. social engineering attack b. using sniffers like Wireshark and capturing packets c. using rootkits and privilege escalation to get to the kernel processes d. using a virus and destroying the computer that stores authentication information.

Answers

Answer:

a. social engineering attack

Explanation:

Two-factor authentication requires that the user/owner of the account enter a second verification code alongside their password in order to access the account. This code is usually sent to a personal phone number or email address. Therefore in order to breach such a security measure the best options is a social engineering attack. These are attacks that are accomplished through human interactions, using psychological manipulation in order to trick the victim into making a mistake or giving away that private information such as the verification code or access to the private email.

7d2b:00a9:a0c4:0000:a772:00fd:a523:0358 What is IPV6Address?

Answers

Answer:

From the given address:  7d2b:00a9:a0c4:0000:a772:00fd:a523:0358

We can see that:

There are 8 groups separated by a colon.Each group is made up of 4 hexadecimal digits.

In general, Internet Protocol version 6 (IPv6) is the Internet Protocol (IP) which was developed to deal with the expected anticipation of IPv4 address exhaustion.

The IPv6 addresses are in the format of a 128-bit alphanumeric string which is divided into 8 groups of four hexadecimal digits. Each group represents 16 bits.

Since the size of an IPv6 address is 128 bits, the address space has [tex]2^{128}[/tex] addresses.

) If FIFO page replacement is used with five page frames and eight pages, how many page faults will occur with the reference string 236571345157245 if the five frames are initially empty?

Answers

Answer:

There are a total of 8 page faults.

Explanation:

In FIFO page replacement, the requests are executed as they are received. The solution is provided in the attached figure. The steps are as follows

Look for the digit in the pages. if they are available, there is no page fault. If the digit does not exist in the page frames it will result in an error.

Shut down and unplug the computer. Remove the CPU case lid. Locate the various fans, and then use
compressed air to blow dirt out through the internal slits from inside the case.

Answers

Answer:

Cleaning the fan

Explanation:

Just did it on Ed

Would you mind giving me brainliest?

Which one of these is not a way of identifying that a website is secure?

a) Message on website
b) URL begins 'https://'
c) Colour of address bar
d) Padlock symbol

Answers

Answer:

B

Explanation:

all url's begin with https://

I need the answer to the below question *ASAP*

Answers

2 4 9

Explanation:

Basically what I thought was the way was, since 2 is first, then its 1, then since 4 is second, it's added second, lastly to get the last oneI added them all and got 9 so that's third.

Answer:

Does not exist.

Explanation:

The answer is not in the option:

Let's analyse the code:

random.randint(2,4)

This means take in random integer numbers starting with 2 and ending with 4.

Meaning numbers : 2, 3 and 4

Next math.pow(a,2) means a× a = a2

So when we input 2 the function;

math.pow(a,2) returns an integer 4

You do same for input 3 , it returns 9.

For input 4 it returns 16.

And the result is encapsulated in the function string(). Meaning display the result as a string:

4 9 16

Write Python code to save the data to a MongoDB collection:Import json module to parse JSON dataImport MongoClient from pymongo to use MongoDBCreate a loop to iterate through the variable with data from Twitter, and for each tweet:Parse these related values: id, text, created_at, user’s screen_name, retweet_count, favorite_count, lang.Use MongoDB’s insert method to add the parsed tweet values to MongoDB collection;Write Python code to query the database:Use find method to search for tweets with lang="en";Use the aggregate method with $sum to compute the total retweets;Use the aggregate method with $count and $group to count the number of tweets by each user (screen_name);

Answers

Answer:

Explanation:

The objective of this task is to compute a program that involves the usage of Python code to save the data to MongoDB and to query  the database.

Due to the error that occur which makes me to be unable to submit this answer, I've created a word document instead and the attached file can be found below.

Thanks!

Write a basic program that performs simple file and mathematical operations.
a. Write a program that reads dates from input, one date per line. Each date's format must be as follows: March 1, 1990. Any date not following that format is incorrect and should be ignored. Use the find() method to parse the string and extract the date. The input ends with -1 on a line alone. Output each correct date as: 3/1/1990.
b. After the program is working as above, modify the program so that it reads all dates from an input file "inputDates.txt" (an Example file is attached).
c. Modify your program further so that after parsing all dates from the input file "inputDates.txt", it writes out the correct ones into an output file called: "parsedDates.txt".
Ex: If the input is:
March 1, 1990
April 2 1995
7/15/20
December 13, 2003
-1
then the output is:
3/1/1990
12/13/2003

Answers

Answer:

Explanation:

I have written the Python program based on your requirements.

Just give the path of the input file and the path for the output file correctly where you want to place the output file.

In, my code - I have given my computer's path to the input and output file.

You just change the path correctly

My code works perfectly and I have tested the code with your inputs.

It gives the exact output that you need.

I have attached the Output that I got by running the below program.

Code:

month_list={ "january":"1","february":"2", "march":"3","april":"4", "may":"5", "june":"6","july":"7", "august":"8", "september":"9","october":"10", "november":"11", "december":"12"} input_file=open('C:\\Users\\Desktop\\inputDates.txt', 'r') output_file=open('C:\\Users\\Desktop\\parsedDates.txt','w') for each in input_file: if each!="-1": lis=each.split() if len (lis) >=3: month=lis [0] day=lis[1] year=lis [2] if month.lower() in month_list: comma=day[-1] if comma==',': day=day[:len (day)-1] month_number=month_list[month.lower()] ans-month_number+"/"+day+"/"+year output_file.write (ans) output_file.write("\n") output_file.close() input_file.close()

- O X parsedDates - Notepad File Edit Format View Help 3/1/1990 12/13/2003

- X inputDates - Notepad File Edit Format View Help March 1, 1990 April 2 1995 7/15/20 December 13, 2003 -1

cheers i hope this helped !!

In this exercise we have to use the knowledge in computer language to write a code in python, like this:

the code can be found in the attached image

to make it simpler we have that the code will be given by:

month_list ={"january": "1", "february": "2", "march": "3", "april": "4", "may": "5", "june": "6", "july": "7", "august": "8", "september": "9", "october": "10", "november": "11", "december":"12"}

input_file = open ('C:\\Users\\Desktop\\inputDates.txt', 'r') output_file =

open ('C:\\Users\\Desktop\\parsedDates.txt', 'w') for each

in input_file:if each

 !="-1":lis = each.split ()if len

   (lis) >= 3:month = lis[0] day = lis[1] year = lis[2] if month

    .lower ()in month_list:comma = day[-1] if comma

    == ',': day = day[:len (day) - 1] month_number =

 month_list[month.lower ()]ans - month_number + "/" + day + "/" +

 year output_file.write (ans) output_file.write ("\n") output_file.

 close ()input_file.close ()

See more about python at brainly.com/question/26104476

Write the class "Tests". Ensure that it stores a student’s first name, last name, all five test scores, the average of those 5 tests’ scores and their final letter grade. (Use an array to store all test scores.)

Answers

Answer:

The following assumption will be made for this assignment;

If average score is greater than 75, the letter grade is AIf average score is between 66 and 75, the letter grade is BIf average score is between 56 and 65, the letter grade is CIf average score is between 46 and 55, the letter grade is DIf average score is between 40 and 45, the letter grade is EIf average score is lesser than 40, the letter grade is F

The program is written in Java and it uses comments to explain difficult lines. The program is as follows

import java.util.*;

public class Tests

{

public static void main(String [] args)

{

 //Declare variables

 Scanner input = new Scanner(System.in);

 String firstname, lastname;

 //Prompt user for name

 System.out.print("Enter Lastname: ");

 lastname = input.next();

 System.out.print("Enter Firstname: ");

 firstname = input.next();

 char grade;

 //Declare Array

 int[] Scores = new int[5];

 //Initialize total scores to 0

 int total = 0;  

  //Decalare Average

  double   average;

 //Prompt user for scores

 for(int i =0;i<5;i++)

 {

  System.out.print("Enter Score "+(i+1)+": ");

  Scores[i] = input.nextInt();

  //Calculate Total Scores

  total+=Scores[i];

 }

 //Calculate Average

 average = total/5.0;

 //Get Letter Grade

 if(average>75)

 {

 grade = 'A';

 }

 else if(average>65)

 {

 grade = 'B';

 }

 else if(average>55)

 {

 grade = 'C';

 }

 else if(average>45)

 {

 grade = 'D';

 }

 else if(average>40)

 {

 grade = 'E';

 }

 else

 {

 grade = 'F';

 }

 //Print Student Results

 System.out.print("Fullname: "+lastname+", "+firstname);

 System.out.print('\n');

 System.out.print("Total Scores: "+total);

 System.out.print('\n');

 System.out.print("Average Scores: "+average);

 System.out.print('\n');

 System.out.print("Grade: "+grade);

}

}

See Attachment for .java file

Write a calling statement for the following code segment in Java: public static int sum(int num1, int num2, String name) { int result = num1 + num2; System.out.println("Hi " + name + ", the two numbers you gave me are: " + num1 + " " + num2); return result; } Function Integer sum(Integer num1, Integer num2, String name) Integer result = num1 + num2 Display "Hi " + name + ", the two numbers you gave me are: ", num1, " ", num2 Return result End Function Write a calling statement to the function in Java or Pseudocode. You may use any value of appropriate data samples to demonstrate your understanding.

Answers

Answer:

Following are the calling of the given question

public static void main(String[] args) // main function

{

int store; // variable declaration

store = sum(32,15,"san"); // Calling of sum()

System.out.println(" TheValue returned by sum() : "+store); // display

}

Explanation:

Following are the description of the above statement

Here is the name of function is sum() In the sum() function definition there are 3 parameter in there signature i.e  two "int" type and 1 is "string" type .In the main function we declared the variable store i,e is used for storing the result of sum() it means it storing the result of value that is returning from the definition of sum() function .After that calling the function by there name and passing three parameter under it  sum(32,15,"san"); and store in the "store" variable.Finally print the value by using system.out.println ().

Write a program that accepts any number of homework scores ranging in value from 0 through 10. Prompt the user for a new value if they enter an alphabetic character. Store the values in array. Calculate the average excluding the lowest and highest scores. Display the average as well as the highest and lowest score that were discarded.

Answers

Answer:

This program is written in C++

Note that the average is calculated without the highest and the least value.

Comments are used for explanatory purpose

See attachment for .cpp file.

Program starts here

#include<iostream>

using namespace std;

int main()

{

int num;

cout<<"Enter Number of Test [0-10]: ";

//cin>>num;

while(!(cin>>num) || num > 10|| num<0)

{

cout << "That was invalid. Enter a valid digit: "<<endl;

cin.clear(); // reset the failed input

cin.ignore(123,'\n');//Discard previous input

}

//Declare scores

int scores[num];

//Accept Input

for(int i =0;i<num;i++)

{

cout<<"Enter Test Score "<<(i+1)<<": ";

cin>>scores[i];

}

           //Determine highest

           int max = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] > max)

               {

                   max = scores[i];

               }

           }

           //Determine Lowest

           int least = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] < least)

               {

                   least = scores[i];

               }

           }

           int sum = 0;

           //Calculate total

           for(int i =0; i< num;i++)

           {

               sum += scores[i];

           }

           //Subtract highest and least values

           sum = sum - least - max;

           //Calculate average

           double average = sum / (num - 2);

           //Print Average

           cout<<"Average = "<<average<<endl;

           //Print Highest

           cout<<"Highest = "<<max<<endl;

           //Print Lowest

           cout<<"Lowest = "<<least;

return 0;  

}

Given the array [13, 1, 3, 2, 8, 21, 5, 1] suppose we choose the pivot to be 1 the second element in the array. Which of the following would be valid partitions?
A. 1 [1, 2, 3, 5, 8, 13, 21]
B. 1 [13, 1, 3, 2, 8, 21, 5]
C. 1 [13, 3, 2, 8, 21, 5, 1]
D. [1] 1 [13, 3, 2, 8, 21, 5]
E. [13] 1 [3, 2, 8, 21, 5, 1]
F. [13, 1, 3, 2, 8, 21, 5] 1 2/4

Answers

Answer:

D. [1] 1 [13, 3, 2, 8, 21, 5]

Explanation:

Using a quicksort with 1 as the pivot point, elements less than 1 will be sorted to the left of 1 and the other elements are greater than one will be sorted to the right of 1. The order doesn't matter. So we sort [1] to the left of 1 and [13, 3, 2, 8, 21, 5] to the right of 1. So, D. [1] 1 [13, 3, 2, 8, 21, 5] is the valid partition.

For this assignment, you will create flowchart using Flowgorithm and Pseudocode for the following program example:
Hunter Cell Phone Company charges customer's a basic rate of $5 per month to send text messages. Additional rates apply as such:
The first 60 messages per month are included in the basic bill
An additional 10 cents is charged for each text message after the 60th message and up to 200 messages.
An additional 25 cents is charged for each text after the 200th message
Federal, state, and local taxes add a total of 12% to each billThe company wants a program that will accept customer's name and the number of text messages sent. The program should display the customer's name and the total end of the month bill before and after taxes are added.

Answers

Answer:

The pseudocode is as given below in the explanation while the flow diagram is attached herewith

Explanation:

The pseudocode is as follows

input cust_name, num_texts  

Set Main_bill=5 $;

if the num_texts is less than or equal to 60

Excess_Charge=0;

If the num_texts is greater than 60 and less than or equal to 200

num_text60200 =num_texts-60;

Excess_Charge=0.1*(num_text60200);

else If the num_texts is greater than 60

num_texts200 =num_texts-200;

Excess_Charge=0.25*(num_texts200)+0.1*(200-60);

Display cust_Name

Total_Bill=Main_bill+Excess_Charge;

Total_Bill_after_Tax=Total_Bill*1.12;

Write a program that displays the following pattern: ..\.\* .\.\*** \.\***** ******* \.\***** .\.\*** ..\.\* That is, seven lines of output as follows: The first consists of 3 spaces followed by a star. The second line consists of 2 spaces followed by a 3 stars. The third consists of one space followed by 5 stars, and the fourth consists just of 7 stars. The fifth line is identical to third, the sixth to the second and the seventh to the first. Your program class should be called StarPattern

Answers

Answer:

public class StarPattern {

   

   public static final int MAX_ROWS = 7;

   

    public static void main(String []args){

       

       for (int row = 1; row <= MAX_ROWS; row++) {

           int numOfSpaces = getNumberOfSpaces(row);

           int numOfStars = MAX_ROWS - (getNumberOfSpaces(row) * 2);

           String spaces = printSpaces(numOfSpaces);

           String stars = printStars(numOfStars);

           System.out.println(spaces + stars);

       }

       

    }

    public static int getNumberOfSpaces(int row) {

        int rowOffset = (MAX_ROWS / 2) + 1;

        return Math.abs(row-rowOffset);

    }

   

    public static String printSpaces(int num) {

        String result = "";

        for (int i = 0; i < num; i++) {

            result += " ";

        }

        return result;

    }

   

    public static String printStars(int num) {

        String result = "";

        for (int i = 0; i < num; i++) {

            result += "*";

        }

        return result;

    }

}

Explanation:

So it sounds we need to make a diamond shape out of asterisks like this:

  *

 ***

*****

*******

*****

 ***

  *

There are 7 rows and each row has up to 7 characters. The pattern is also symmetrical which makes it easier. Before writing any code, let's figure out how we are going to determine the correct amount of spaces we need to print. There are a lot of ways to do this, but I'll just show one. Let's call the 4th row y=0. Above that we have row 3 which would be y=-1, and below is row 5 which is y=1. With 7 rows, we have y=-3 through y=3. The absolute value of the y value is how many spaces we need.

To determine the number of stars, we just double the number of spaces, then subtract this number from 7. This is because we can imagine that the same amount of spaces that are printed in front of the stars are also after the stars. We don't actually have to print the second set of spaces since it is just white space, but the maximum number of characters in a row is 7, and this formula will always make sure we have 7.

I hope this helps. If you need help understanding any part of the code, jsut let me know.

You can add additional design elements to a picture by adding a color background, which is accomplished by using what Paint feature?
Pencil tool

Shapes tool

Color Picker tool

Fill with Color tool

Answers

Answer:

Fill with Color tool

Pretend that your mother is a real estate agent and that she has decided to automate her daily tasks by using a laptop computer. Consider her potential hardware and software needs and create a hardware and software specification that describes them. The specification should be developed to help your mother buy her hardware and software on her own.

Answers

TJ life was the way to get

The specification should be developed to help your mother buy her hardware and software on her own is hardware.

Which is hardware?

Hardware refers back to the computer's tangible additives or shipping structures that shop and run the written commands furnished through the software program. The software program is the intangible a part of the tool that shall we the consumer have interaction with the hardware and command it to carry out unique tasks.

A few automatic software programs could ship messages, alert and notifications to the customer in addition to the owner.The pc need to be of respectable potential and processing pace three. Video calling software program to have interaction with the clients. Softwares like Excel to keep the information and all An running gadget of right here convenience 4.320 to 500 GB difficult drive three.2.2 GHz of processor. Long battery life Software: three GB RAM.

Read more about the hardware :

https://brainly.com/question/3273029

#SPJ2

Other Questions
A recipe submitted to a magazine by one of its subscribers states that the mean baking time for a cheesecake is 55 minutes. A test kitchen preparing the recipe before it is published in the magazine makes the cheesecake 10 times at different times of the day in different ovens. The following baking times (in minutes) are observed. 54 55 58 59 59 60 61 61 62 65 Assume that the baking times belong to a normal population. Test the null hypothesis that the mean baking time is 55 minutes against the alternative hypothesis > 55. Use = .05. What is the surface area of the rectangular pyramid below?A. 363 units2B. 484 units2C. 1026 units2D. 242 units2 After observing the heavy snow that his town received the previous winter, Ajay Patel, an enterprising student, plans to offer a show-clearing service in his neighborhood this winter. If he invests in a new heavy-duty blower. Ajay forecasts a profit of $700 if snowfall this winter is heavy, a profit of $200 if it is moderate and a loss of $900 if it is light. As per the current weather forecasts, the probabilities of heavy, moderate and light snowfall this winter are 0.4, 0.3 and 0.3 respectively. Rather than purchase a new blower, Ajay could get his father's blower repaired and just accept smaller jobs. Under this option, Ajay estimates profit of $350 for a heavy snowfall, and a loss of $150 for a light snowfall. Ajay, of course has the option of choosing neither of these options. The local weather Adams, is Ajay's good friend. For $50, she is willing to run sophisticated computer weather models on her computer and tell Ajay whether she expects this winter to be cold. For the sake of solving this problem, assume that the following information is available. There is a 45% chance that Samantha will predict this winter to be unseasonably cold. If she does say this, the probabilities of heavy, moderate, and light snowfall are revised to 0.7, 0.25, and 0.05, respectively. On the other hand, if she predicts that this winter will not be unseasonably cold, these probabilities aye revised to 0.15, 0.33, and 0.52, respectively. Draw the decision tree for the situation faced by Ajay. Fold back the tree and determine the strategy you would recommend he follow. What is the efficiency of Samantha's information? Can someone help me solved this problem plz need help ASAP! Show de steps plz! I really need help John, a manager with Whole Foods Grocery Company, has just participated in a meeting that looked at future trends in the grocery business, and identified new challenges and opportunities for Whole Foods. John's participation in this meeting is an example of the __________ function of management. A girl flying a kite lets out 130 feet of string that makes an angle of 52 with the ground. If the string forms a straight line, how high is the kite above the ground? Hint: Draw a picture (triangle) and label. 80.04 feet 102.44 feet 166.39 feet 164.97 feet 4 lines are shown. A line with points A, F, D intersects with a line with points B, F, E at point F. A line extends from point F to point G between angle E F D. Another line extends from point F to point D in between angle B F D. In the diagram, which angle is part of a linear pair and part of a vertical pair? AngleBFC AngleCFG AngleGFD AngleEFA A banking system has a reserve ratio equal to 15%. For every $100 deposited into the banking system, the bank is required to keep 2 at least ____________ on reserve and can therefore lend no more than _________ Instructions: Enter a whole number in each box above. b. For this banking system, the money multiplier is equal to__________meaning that $100 of cash deposited into the banking system 4 points can be turned into ___________ deposits through the money creation process. 5x=29x what is the value of x Which best describes the reigon around Lake Victoria? A)Arid B) High Density C) Little agricultural production D) Lacking in natural resources. A 15.50 gram sample of a gas exerts a pressure of 1.40 atmospheres when held in an 8.00 liter at 22 C. What is the molar mass (grams/mol) of the gas? Tim, who is subject to a 35 percent marginal gift tax rate, made a gift of a painting to Ben, valuing the property at $7,000. The IRS later valued the gift at $15,000. Compute the applicable undervaluation penalty. describe characteristics of allegory Find the slope of the line will mark as brain y = 94x 14.Simplify your answer and write it as a proper fraction, improper fraction, or integer. which of the following is equivalent to the radical expression below 8x^5 I NEED HELPPPPP!!! Juana is making a triangular hat for a puppet. If two of the three angles of the hat both measure 30 . what is the measure of the third angle? When trying to resolve conflicts, the goal of talking honestly and lovingly is to _____. learn from one another describe how best to ignore problems dominate the conversation with your concerns prove that you are correct The reaction 2 NO(g) N2(g) + O2(g) has a value of Keq = 2400 at a temperature of 2000 K. If 0.570 mol of NO(g) is initially placed in a 3.0 L container, calculate the equilibrium concentrations of each gas Why is secondary production important to Ghanas economy.Three reasons pls. The drum has a mass of 50 kg and a radius of gyration about the pin at O of 0.23 o k m = . If the 15kg block is moving downward at 3 / m s , and a force of P N =100 is applied to the brake arm, determine how far the block descends from the instant the brake is applied until it stops. Neglect the thickness of the handle. The coefficient of kinetic friction at the brake pad is 0.5 k = .