difference between ram and rom​

Answers

Answer 1

Answer:

RAMIt stands for Random Access memory.It is used for both purpose( read and write).It is volatile memory.ROMIt stands for Read only memory.It can be used only to perform the read operation.It is non-volatile.

Hope this helps...

Good luck on your assignment...

Difference Between Ram And Rom
Answer 2

Answer:

RAM is the memory available for the operating system, programs and processes to use when the computer is running. ... When you power off your computer the data stored in RAM is deleted. ROM is a type of non- volatile memory. Data in ROM is permanently written and is not erased when you power off your computer.

Explanation:


Related Questions

Using a C# program write a program that accepts any number of homework scores ranging in value from 0 through
10. Prompt the user for a new score if they enter a value outside of the specified range. Prompt
the user for a new value if they enter an alphabetic character. Store the values in an array.
Calculate the average excluding the lowest and highest scores. Display the average as well as the
highest and lowest scores that were discarded.

Answers

Answer:

The program is written using C# Console

Comments are used for explanatory purpose

Program starts here

using System;

using System.Collections.Generic;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

namespace ConsoleApplication1

{

   class Program

   {

       static void Main(string[] args)

       {

           int num;

           Console.WriteLine("Enter digit: [0-10]");

           while (!int.TryParse(Console.ReadLine(), out num) || num<0||num>10)

           {

               Console.WriteLine("That was invalid. Enter a valid digit.");

           }

           //Declare scores

           int[] scores = new int[num];

           //Accept Input

           for(int i =0;i<num;i++)

           {

               Console.WriteLine("Enter Test Score "+(i+1));

               while (!int.TryParse(Console.ReadLine(), out scores[i]))

               {

                   Console.WriteLine("That was invalid. Enter a valid digit.");

                   Console.WriteLine("Enter Test Score " + (i + 1));

               }

           }

           //Determine highest

           int max = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] > max)

               {

                   max = scores[i];

               }

           }

           //Determine Lowest

           int least = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] < least)

               {

                   least = scores[i];

               }

           }

           int sum = 0;

           //Calculate total

           for(int i =0; i< num;i++)

           {

               sum += scores[i];

           }

           //Subtract highest and least values

           sum = sum - least - max;

           //Calculate average

           double average = sum / (num - 2);

           //Print Average

           Console.WriteLine("Average = "+average);

           //Print Highest

           Console.WriteLine("Highest = " + max);

           //Print Lowest

           Console.WriteLine("Lowest = " + least);

           Console.ReadLine();  

       }

   }

}

See Attachment for program source file in txt

Write a program that reads the lengths of the sides of a triangle from the user. Compute the area of the triangle using Heron's formula (below), in which s represents half of the perimeter of the triangle and a, b, and c represent the lengths of the three sides. Print rhe area to three decimal places.

Area= √ s(s-a)(s-b)(s-c)

Answers

Answer:

The java program is as follows.

import java.util.Scanner;

import java.lang.*;

public class Area

{

   //variables to hold the values

   static double a, b, c;

   static double s;

   static double area;

public static void main(String[] args) {

    //scanner class object created

    Scanner sc = new Scanner(System.in);

 System.out.print("Enter the first side: ");

 a=sc.nextInt();

 System.out.print("Enter the second side: ");

 b=sc.nextInt();

 System.out.print("Enter the third side: ");

 c=sc.nextInt();

 s=(a+b+c)/2;

 //function of Math class used

 area = Math.sqrt( s*(s-a)*(s-b)*(s-c) );

 //result displayed with 3 decimal places

 System.out.printf("The area of the triangle is %.3f", area);  

}

}

OUTPUT

Enter the first side: 1

Enter the second side: 1

Enter the third side: 1

The area of the triangle is 0.433

Explanation:

1. The variables to declare the three sides of the triangle, the semi-perimeter and the area of the triangle are declared with double datatype. All the variables are declared at class level and hence, declared with keyword, static.  

2. Inside main(), an object of the Scanner class is created.

Scanner sc = new Scanner(System.in);

3. Using the Scanner class object, user input is taken for all the three sides of the triangle.

4. Following this, the semi-perimeter is computed as shown.

s=(a+b+c)/2;

5. The area of the triangle is computed using the given formula which is implemented as shown.

area = Math.sqrt( s*(s-a)*(s-b)*(s-c) );

6. The sqrt() method of the Math class is used while computing the area of the triangle.

7. The area is displayed with three decimals. This is done using the printf() method as shown.

System.out.printf("The area of the triangle is %.3f", area);

8. The program is saved with the same name as the name of the class having the main() method.

9. The class having the main() method is always public.

Bell LaPadula (BLP) is a security model
a) that can ensure the confidentiality of the classified data as well as its integrity
b) that can ensure the confidentiality of the classified data but not its integrity
c) that can ensure neither the confidentiality of the classified data nor its integrity
d) that can't ensure the confidentiality of the classified data but can its integrity

Answers

Answer:

Option (b) is the correct answer to this question.

Explanation:

BLP model can ensure classified data confidentiality, but it is not integrity. The Bell-LaPadula model is about secrecy. As just that, having read information would jeopardize privacy and security at a greater position than what has been permitted. The Bell – LaPadula Model (BLP) is a finite state model being used for political and police installations to implement authentication.

Other options are incorrect because they are not related to the given scenario.  

Industrial Products is a small light-manufacturing firm that produces a variety of control systems for heavy industry. It has a network that connects its office building and warehouse that has functioned well for the last year, but over the past week, users have begun to complain that the network is slow. Clarence Hung, the network manager, did a quick check of the number of orders over the past week and saw no real change, suggesting that there has been no major increase in network traffic. What would you suggest that Clarence do next?

Answers

Answer and Explanation:

The suggestions are as follows

1. There may be a faulty configuration that leads to packet losses, those packets lost are retransmitted over and over again that may have caused network slowing down.

2. The route or direction for the transmission of packets over the network can shift, which in effect increases the time for the transmission of packets and thus leads to a slowed-down network.

3. Probability is the authentication server that would take too much time to respond.

4. There may be some applications that produce errors for certain requests and therefore fail to complete the process on time. The failures may be on the front end of the server or back end.

Upgrading the apps to new versions will solve the issue, as the upgraded software involve different fixes.

5. Users will be tested on what they're doing on their devices. Unacceptable use of the network services can also result to a network slow- down.

6. Certain bad cable connexions or poor signal strength can result in network slowing down.

Again, consider what you believe to be the goal of performing a penetration test. Why would you worry about doing any privilege escalation or leaving backdoors? What circumstances would cause you to do either of those things? Do you consider this to be practical or theoretical knowledge in light of your beliefs about penetration testing?

Answers

Answer:

Penetration monitoring is conducted based on the vulnerability evaluation (Were a susceptibility evaluated and mentioned).

Explanation:

Penetration Test

Penetration testing is carried out from both within (the network or application) as well as outside that aims to gain access to the system to evaluate if any suspicious activity or improper behavior is likely within the device. When there are some other potential security vulnerabilities, they are all found in the integration check that involves vulnerability assessment for frameworks and checking for network management. Automation of penetration testing is used to make it work better. Penetration monitoring deals with the same risk evaluation correlated with a disadvantage.

Privilege escalation

They need to think about known vulnerabilities as the system for network management works conditional on the privilege rates. Such that, increasing user has an article has highlighted and the consumer is only allowed to control or use the resources that should be used appropriately, depending on the level of privilege. If he gets elevated access then it will be a failure to have access control mechanism.

Leaving backdoors

The creator uses backdoors to test the system's functionality during the designing processes. The loophole can be a workaround overriding the identification for all users, or a default password. They would need to worry about leaving the backdoor because the backdoor.which is performed either deliberately or involuntarily will circumvent the entire security mechanism. During the intrusion testing process, the both privilege increase and the escape from the gateway can be discovered due to the research being done both inside and outside the device. The tester's testing phase acts as various users so that any destabilization of access may be found. The tester will use all numerous methods to supersede the technique of official approval, but when there are certain backdoors, maybe he can start by pointing that out.

Which are strategies for communicating solutions that include flowcharts? Choose all that apply.

breaking the solution into steps

diagramming the solution

modeling the solution

writing the algorithm

Answers

Answer:

The answer is C

Explanation:

Answer:

B and C

Explanation:

If your internet were to go out, what steps would you take to troubleshoot to restore your service?

Answers

Answer:

Make sure all your wires are connected and electricity is flowing

Turn your computer off and on

Turn your modem off and on

is it only your computer that can't connect or also your phone? (if it's only your computer then something in the configurations if off)

Call internet provider is non of these work.

Explanation:

Rachel wants to use Microsoft Query to retrieve data from her corporate databases and files so that she doesn't have to retype the data that she wants to analyze in Excel. To do so, she can click and/or enter the following information in the following series of clicks: Data tab > Get External Data group > From Other Sources > From Microsoft Query > Databases tab (To specify a data source for a database, text file, or Excel workbook) > OK > Create New Data Source dialog box > Type a name to identify the data source > Click a driver for the type of database for use as data source > Connect (Provide the information needed to connect to the data source) > OK.
1. True
2. False

Answers

Answer:

Option: True

Explanation:

Microsoft Query can be used to retrieve data from external source such as databases. There are lots of databases or data sources which are accessible such as Microsoft Access, Microsoft Excel, Microsfot SQL Server OLAP Services, Oracle, Paradox, text file etc.

The steps mentioned in the question are correct. After finishing all the steps, user shall see the name of the data source will appears in the Choose Data Source dialog box.

Rachel can use Microsoft Query to retrieve data from her corporate databases and files by using the aforementioned steps in Microsoft Excel: 1. True.

A database can be defined as a structured (organized) collection of data that are stored on a computer system and are usually accessed in various ways such as electronically.

Microsoft Query is a visual technique in Microsoft Excel that uses a data source to connect to an external database while showing end users the data that are available based on the following criteria:

A text string.Name of the data source.A driver for the type of database to be accessed.A default table for the data source.

In order for Rachel to retrieve data from her corporate databases and files, she should use Microsoft Query in Microsoft Excel while following these steps:

1. Click on Data tab.

2. Click on Get External Data group.

3. Select other Other Sources and then click on From Microsoft Query.

4. A dialog box opens, specify the data source for a database.

5. Click on OK.

6. Create a New Data Source.

7. Click on connect and OK after creating a New Data Source.

Read more: https://brainly.com/question/23388493

The goal of this exercise is to determine whether the following system specifications are consistent: If the file system is not locked, then new messages will be queued. If the file system is not locked, then the system is functioning normally, and conversely. If new messages are not queued, then they will be sent to the message buffer. If the file system is not locked, then new messages will be sent to the message buffer. New messages will not be sent to the message buffer.

Answers

Answer:

The following specifications are consistent

Explanation:

The file system  is locked ⇒ L

New messages will be queued ⇒ Q

The system is functioning normally ⇒ N

The message will be sent to the message buffer ⇒ B

" Now, let us rewrite the specifications"

"If the file system is not locked, then new messages will be queued" ∴ ¬L ⇒ Q

"If the system is not locked, then the system is functioning  normally and conversely" ∴ ¬L ⇔ N

"If new messages are not queued, then they will be sent to the message buffer" ∴ ¬Q ⇒ B

"If the file system is not locked, then new messages will be sent to the message buffer" ∴ ¬L ⇒ B

"New messages will not be sent to the message buffer" ∴ ¬B

To get consistency, take N to be false such that ¬N is true.

This mean that both L and Q be true, by the two conditional statements that have N as consequence.

First conditional statement ¬L ⇒ Q is of the form F?T, which is true.

Finally, the ¬L ⇒ B can be satisfied by taking B to be false.

This means that this set of specifications is consistent!

Truth value assignment

B: False

N: False

Q: True

L: True

Observing the Specification, Condition and Truth Value, it is evident that they are consistent.

A standard science experiment is to drop a ball and see how high it bounces. Once the bounciness of the ball has been determined, the ratio gives a bounciness index. For example, if a ball dropped from a height of 10 feet bounces 6 feet high, the index is 0.6 and the total distance traveled by the ball is 16 feet after one bounce. If the ball were to continue bouncing, the distance after two bounces would be 10 ft 6 ft 6 ft 3.6 ft. Note that the distance traveled for each successive bounce is the distance to the floor plus 0.6 of that distance as the ball comes back up.
Write a program that lets the user enter the initial height from which the ball is dropped, the bounciness index, and the number of times the ball is allowed to continue bouncing. Output should be the total distance traveled by the ball.
Below is an example of the program input and output:
Enter the height from which the ball is dropped: 25
Enter the bounciness index of the ball: .5
Enter the number of times the ball is allowed to continue bouncing: 3

Answers

Answer:

Explanation:

height = float(input('Enter the height from which the ball is dropped: '))

bounci_index = float(input('Enter the bounciness index of the ball: '))

bounces = int(input('Enter the number of times the ball is allowed to continue bouncing: '))

distance = height

for i in range(bounces-1):

   height *= bounci_index

   distance += 2*height

distance += height*bounci_index

print('\nTotal distance traveled is: ' + str(distance) + ' units.')

digital crate to miss meat​

Answers

Im sorry, this makes no sense. i think it is supposed to be an analogy, but i would need more info or background about the question

Answer:

Wait......What is the question or why did u put that??? I am so confused rn. lol

Explanation:

Write a program which increments from 0 to 20 and display results in Decimal on the console 2-b) Modify above program to increment from 0 to 20 and display results in Binary on the console

Answers

Answer:

This program is written in C++

Comment are used to explain difficult lines

The first program that prints 0 to 20 (in decimal) starts here

#include<iostream>

int main()

{

//Print From 0 to 20

for(int i = 0;i<21;i++)

{

 std::cout<<i<<'\n';

}

}

The modified program to print 0 to 20 in hexadecimal starts here

#include<iostream>

using namespace std;

int main()

{

//Declare variables to use in conversion;

int tempvar, i=1,remain;

//Declare a char array of length 50 to hold result

char result[50];

//Print 0

cout<<"0"<<endl;

// Iterate from 1 to 20

for(int digit = 1; digit<21; digit++)

{

//Start Conversion Process

//Initialize tempvar to digit (1 to 20)

tempvar = digit;

while(tempvar!=0)

{

//Divide tempvar by 16 and get remainder

remain = tempvar%16;

if(remain<10)

{

 result[i++]=remain + 48;

}

else

{

 result[i++] = remain + 55;

}

//Get new value of tempvar by dividing it by 16

tempvar/=16;

}

//Print result

for(int l=i-1;l>0;l--)

{

cout<<result[l];

}

i=1;

cout<<endl;  

}

return 0;

}

//The Program Ends Here

See Attachments for program 1 and 2; program 2 is the modified version of 1

You are currently working in a mid-tier accounting firm. In an engagement meeting with a client, the management of your client is concerned that the audit tests that you perform will disrupt operations. Your client has recently implemented a data warehouse and the management suggests that you draw the data for analytical reviews and substantive testing from the data warehouse instead of the operational database. The management points out that operational data are copied weekly into the data warehouse and all data you need are contained there. Outline your response to the management’s proposal and mention any concerns you might have. (maximum 300 words)

Answers

Answer:

The answer "Only when an auditor is free to perform his responsibilities should the audit contract be accepted. There should be no stress on an investigator but no independence".

Explanation:

In the essence of the data store, huge storage of the information, that is used to collect from either a variety of sources within the same company. The DTC  is often used as an analytics capability (OLAP frameworks) because a transfer can be focussed on the data structure. It's also currently easier for organizations to end things or assessment and determine the best information with full of data from one destination.

Create a complete warehouse:  It is unlikely, however, that each one of your getting your information at that same single place seems to be the greatest flexibility for providing a database server.  

Below are various benefits of providing data storage:  

Saving time:  In the company's ease of accessing data from different sources at the data center, that ensures no time to obtain information from other sources is lost. Higher trust: Its data is automatically moved into your data center in an ordered structure, rather than being replaced by human activity, as you'll be more sure that your information is nice and clean, complete and accurate.  Growing knowledge: In the data, the warehouse designs the information so that it can be easily analyzed.  Increasing quality: it would be far easier to manage individuals who reach your data whenever an association position is integrated. Data warehouse allows security fully flexible, allowing users to access all the systems and lock all of them.  

Following are its specific approach to creating a data center, which will you need to develop the core architecture in three sections:  

The stocking(storage) algorithm,  Software and working  HR.

Storage: it's the foundation of the structure and your warehouse lives there. The inner server is the client's office 's internal device as well as the cloud is an electronic storage solution that relies on external servers.

Software: It is a valuable method of private cloud architectural design. For two classes, centralization and visual imagery are commonly isolated.  

Human resources: It is the part of data warehouse operations which is extremely important for a workable example. To keep your warehouse running, you must use new circumstances in your company.

Your solution should for this assignment should consist of five (5)files:============================================== FuelGauge.h (class specification file)FuelGauge.cpp (class implementation file)Odometer.h (class specification file)Odometer.cpp (class implementation file)200_assign6.cpp (application program)=================================================★ For your sixth programming assignment, you will be implementing a program that uses two(2)classes that work together to simulate a car’s fuel gauge and odometer. The classes you will design are: TheFuelGaugeClass: This class will simulate a fuel gauge. Its responsibilities are↘To know the car’s current amount of fuel, in gallons.↘To report the car’s current amount of fuel, in gallons.↘To be able to increment the amount of fuel by 1 gallon. This simulates putting fuel in the car. (The car can hold a maximum of 15 gallons)↘To be able to decrement the amount of fuel by 1 gallon, if the amount of fuel is greater than 0 gallons. This simulates burning fuel as the car runs.TheOdometerClass: This class will simulate the car’s odometer. Its responsibilities are:↘To know the car’s current mileage.↘To report the car’s current mileage.↘To be able to increment the current mileage by 1 mile. The maximum mileage the odometer can store is 999,999 miles. When this amount is execeeded, the odometer resets the current mileage to 0.↘To be able to work with aFuelGaugeobject. It should decrease theFuelGaugeobject’s current amount of fuel by 1 gallon for every 24 miles traveled. (The car’s fuel economy is 24 miles per gallon)The FuelGaugeclass should have at least one constructor, and the appropriate member functions to get the number of gallons, increment the number of gallons, and decrement the number of gallons.★ The odometer class should have at least one constructor, and the appropriate member functions to get the mileage and increment the mileage (unfortunately you cannot decrement the mileage!).★ In the odometer class, you can have a member variable that is a pointer to a FuelGauge object. This is how you can establish a relationship between the two classes that allow them to work together. For every mile the car is driven, the odometer is increased by 1, and for every 24 miles the car is driven, the number of gallons is reduced by one.★ So in the Odometer class, one of the private member variables should be of type fuel gauge* (pointer to a FuelGauge object).★ Demonstrate the two classes by creating instances(objects)of each. Simulate filling the car up with fuel, and then run a loop that increments the odometer until the car runs out of fuel. During each loop iteration, print the car’s current mileage and amount of fuel.

Answers

Answer: provided in the explanation section

Explanation:

This was implemented in C++

Filename: Car.cpp

#include <iostream>

#include <iomanip>

#include <cstdlib>

#include "Odometer.h"

using namespace std;

int main()

{

  char response;

  do

  {

      FuelGuage* myFuel = new FuelGuage(6);

      int fuelLevel = myFuel->getFuel();

      cout << "Car gas level: " << fuelLevel << endl;

      cout << "Car is filling up" << endl;

      while(myFuel->getFuel() < 15)

      {

          myFuel->addFuel();

      }

      Odometer* car = new Odometer(myFuel, 999990);

      cout << "Car gas level: " << car->getFuelGuage()->getFuel() << endl;

      cout << "Car is off!" << endl;

      cout << "--------------------------" << endl;

      while(car->getFuelGuage()->getFuel() > 0)

      {

          car->addMile();

          int miles = car->getMileage();

          cout << "Mileage: " << setw(6) << miles << ", Fuel Level: " << car->getFuelGuage()->getFuel() << endl;

          cout<<"--------------------------------------------------------------"<<endl;

      }

      delete myFuel;

      delete car;

      cout << "Would you like to run the car again(Y/N)? ";

      cin >> response;

      system("cls||clear");

  } while(toupper(response) != 'N');

  return 0;

}

Filename: FuelGuage.cpp

#include "FuelGuage.h"

FuelGuage::FuelGuage()

{

  init();

}

FuelGuage::FuelGuage(int fuel)

{

  init();

  this->fuel = fuel;

}

FuelGuage::FuelGuage(const FuelGuage& copy)

{

  this->fuel = copy.fuel;

}

void FuelGuage::init()

{

  this->fuel = 0;

}

int FuelGuage::getFuel()

{

  return fuel;

}

void FuelGuage::addFuel()

{

  fuel++;

}

void FuelGuage::burnFuel()

{

  fuel--;

}

Filename:FuelGuage.h

#ifndef FUEL_GUAGE_H

#define FUEL_GUAGE_H

class FuelGuage

{

private:

  int fuel;

  void init();

public:

  FuelGuage();

  FuelGuage(int fuel);

  FuelGuage(const FuelGuage& copy);

  int getFuel();

  void addFuel();

  void burnFuel();

};

#endif

Filename : Odometer.cpp

#include "Odometer.h"

Odometer::Odometer()

{

  init();

}

Odometer::Odometer(FuelGuage* inFuel, int inMileage)

{

  init();

  this->fuel = new FuelGuage(*inFuel);

  this->mileage = inMileage;

  this->milesSinceAddingFuel = 0;

}

void Odometer::init()

{

  fuel = new FuelGuage();

  mileage = 0;

  milesSinceAddingFuel = 0;

}

FuelGuage* Odometer::getFuelGuage()

{

  return fuel;

}

int Odometer::getMileage()

{

  return mileage;

}

void Odometer::addMile()

{

  if(mileage < 999999)

  {

      mileage++;

      milesSinceAddingFuel++;

  }

  else

  {

      mileage = 0;

      milesSinceAddingFuel++;

  }

  if((milesSinceAddingFuel % 24) == 0)

  {

      fuel->burnFuel();

  }

}

void Odometer::resetMiles()

{

  milesSinceAddingFuel = 0;

}

Odometer::~Odometer()

{

  delete fuel;

}

Filename: Odometer.h

#ifndef ODOMETER_H

#define ODOMETER_H

#include "FuelGuage.h"

class Odometer

{

private:

  void init();

  int mileage;

  int milesSinceAddingFuel;

  FuelGuage* fuel;

public:

  Odometer();

  Odometer(FuelGuage* inFuel, int inMileage);

  FuelGuage* getFuelGuage();

  int getMileage();

  void addMile();

  void resetMiles();

  ~Odometer();

};

#endif

IF 2+2=4 AND 5+5 IS 10 __________

Answers

Answer:

8+8=16?

Explanation:

Answer:

Then 11+11 IS 22

Explanation:

What will happen if registers are excluding the address register (Memory Address Register - MAR)?​

Answers

Answer: Memory address register captures and stores the memory address in CPU.

Explanation:

It stores the address of the data which is required to be sent and stored to specific location of the computer.It stores the next address of the data to be stored read or written.

If the memory address register is excluded in the system then the storage of memory will be compromised.

Computer has many functions. MAR is known to have the memory location of data that one needs to be accessed and if it is excluded, there is a compromise and one cannot get the data needed as it will be inaccessible.

What is the Memory Address Register?In a computer, the Memory Address Register (MAR) is known to be the CPU register that often stores the memory address through which one can get data to the CPU.

It is also known as the address to which data is often sent to or stored. That is, MAR has the power  to the memory location of data that one needs to be accessed.

Learn more about Memory Address Register from

https://brainly.com/question/24368373

Given class Triangle (in file Triangle.java), complete main() to read and set the base and height of triangle1 and of triangle2, determine which triangle's area is larger, and output that triangle's info, making use of Triangle's relevant methods. Ex: If the input is: 3.0 4.0 4.0 5.0 where 3.0 is triangle1's base, 4.0 is triangle1's height, 4.0 is triangle2's base, and 5.0 is triangle2's height, the output is: Triangle with larger area: Base: 4.00 Height: 5.00 Area: 10.00

Answers

Answer:

The Triangle.java file is not provided; However, the program is as follows;

Comments are used for explanatory purpose

Also see attachment for Triangle.java program file

import java.util.*;

public class triangle

{

public static void main(String [] args)

{

 Scanner input = new Scanner(System.in);

 //Declare variables

 double base1, height1, base2, height2;

 //Prompt user for inputs

 System.out.println("Provide values for the base and height of the two triangles");

 System.out.print("Base of Triangle 1: ");

 base1 = input.nextDouble();

 System.out.print("Height of Triangle 1: ");

 height1 = input.nextDouble();

 System.out.print("Base of Triangle 2: ");

 base2 = input.nextDouble();

 System.out.print("Height of Triangle 2: ");

 height2 = input.nextDouble();

 //Compare and Print Results

 if(0.5 *base1 * height1 > 0.5 * base2 * height2)

 {

  System.out.print("Triangle with larger area: Base: "+base1+" Height: "+height1+" Area: "+(0.5 * base1 * height1));

 }

 else

 {

  System.out.print("Triangle with larger area: Base: "+base2+" Height: "+height2+" Area: "+(0.5 * base2 * height2));

 }

}

}

Create a text file named employee.dat containing the following data: b. Write a C++ program to read the employee.dat file created in Exercise 5a and produce a duplicate copy of the file named employee.bak.

Answers

Answer:

1000 500 250 125 the output

Explanation:

write a program using integers userNum and x as input,  userNum divided by

x four times.  EX : If  the input is 2000 2 the output is 1000 500 250 125

Design a program for Jones College. The current tuition is $12,000 per year, and tuition is expected to increase by 5 percent each year. Display the tuition amount for each year over the next five years (use a looping structure). Hint: You will need to use two assignment statements for calculating purposes. One will be an accumulating total assignment statement.

Answers

Answer:

current_tuition = 12000

for year in range(1, 6):

   increase_in_tuition = current_tuition * 0.05

   current_tuition += increase_in_tuition

   print("The tuition amount after " + str(year) + ".year: " + str(current_tuition))

Explanation:

*The code is in Python

Set the current tuition as 12000

Create a for loop that iterates 5 times

Inside the loop, calculate the increase in tuition. Add the increase in tuition value to the current tuition and print the current tuition.

Discuss whether this is a good Web site to use as a source for reliable, academically sound information on neurotransmitters. Why or why not?

Based on what you have learned about neurotransmitters in this unit through the textbook and intellipath, do you think you would recommend a friend or family member opt for this testing? Explain your response.

Answers

Answer:

The answer to this question can be described as follows:

Explanation:

No, for all of this experiment, I will not remember a family member or friend. It is because the test results and arguments presented in it were not as relevant and fun.  

After all, they should be. They will often seem vague and uninteresting to make this same testing perception boring and tedious overall. In the above line, it is explained, that why they are not is used, that's why the answer to this question is no.

In cell F29, use an IF function to display the correct Shipping Charge, based on the amount of the Discounted Total. If the Discounted Total is greater than or equal to the Free Shipping Minimum found in cell B28, the Shipping Charge is 0 (zero); otherwise, the Shipping Charge is 5% of the Discounted Total. Hint: You will need to use a formula for the Value if False to calculate what 5% of the Discounted Total will be.

Answers

Answer:

= IF(B29 >= B28,0,(0.05 * B29))

Explanation:

Given

Free Shipping Minimum = B28

Shipping Charge = F29

Required

Write a formula in F29 to calculate the total shipping charge based on the condition in the question.

To solve this, the following assumption needs to be made.

It'll be assumed that cell B29 contains the value for Discounted Total.

So,

Discounted Total = B29

The condition in the question says

1. If Discounted Total (B29) is greater than or equal to the Free Shipping Minimum (B29), then Shipping Charge (F29) is 0

This can be represented as

If(B29 >= B28)

F29 = 0

2. Else (i.e. if (1) above is false), Shipping Charge (F29) equals 5% of Discounted Total (B29)

This can also be represented as

F29 = 0.05 * B29

Writing the formula in (1) and (2) together in Excel format;

= IF(B29 >= B28, 0, (0.05 * B29))

The above formula will give the desired result based on the condition in the question.

Take for instance;

Free Shipping Minimum = B28 = 28

Discounted Total = B29 = 30

Since 30 >= 28, the value of F29 will be 0 because it satisfies condition 1.

But if

Free Shipping Minimum = B28 = 30

Discounted Total = B29 = 28

Since 28 < 30, the value of F29 will be 5% of 28 = 1.4 because it satisfies condition 2

Which of the following sorting algorithms could be implemented on a doubly-linked list WITHOUT making the asymptotic worst-case complexity even worse? You must perform the sorting in-place, you CANNOT just copy to an array and then use the normal algorithm

I. Bubble sort
Il. Selection sort
IlI. Insertion sort
IV. Quicksort
V. Heapsort

A. I, II, and IlIl only
B. IV and V only
C. I and II only
D. Iand Il only
E. All except V

Answers

Answer:

C. I and II only

Explanation:

Doubly-linked list is used for sorting algorithms. To sort doubly-linked lists first sort the nodes current and nodes index then compare the data of current and index node. Bubble sort and Selection sort can be used for algorithm sorting without asymptotic complexity. Bubble sort can be created when adjacent nodes are in ascending order.

Complete method printPopcornTime(), with int parameter bagOunces, and void return type. If bagOunces is less than 2, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bagOunces followed by "seconds". End with a newline. Example output for ounces = 7: 42 seconds
code:
import java.util.Scanner;
public class PopcornTimer {
public static void printPopcornTime(int bagOunces) {
/* Your solution goes here */
}
public static void main (String [] args) {
printPopcornTime(7);
}
}

Answers

Answer:

if(bagOunces < 2){

      System.out.println("Too small");

  }

  else if(bagOunces > 10){

      System.out.println("Too large");

  }

  else{

      System.out.println(6*bagOunces+" seconds");

  }

Explanation:

The missing code segment is an illustration of conditional statements.

Conditional statements are used to execute statements depending on the truth value of the condition.

The missing code segment, where comments are used to explain each line is as follows:

//If bagOunces is less than 2

if(bagOunces < 2){

//This prints "Too small"

     System.out.println("Too small");  

 }

//If bagOunces is greater than 10

 else if(bagOunces > 10){

//This prints "Too large"

     System.out.println("Too large");  

 }

//Otherwise

 else{

//This calculates and prints the popcorn time

     System.out.println(6*bagOunces+" seconds");

}

Read more about similar programs at:

https://brainly.com/question/7253053

Write a method called allDigitsOdd that returns whether every digit of a positive integer is odd. Return true if the number consists entirely of odd digits (1, 3, 5, 7, 9) and false if any of its digits are even (0, 2, 4, 6, 8). For example, the call allDigitsOdd(135319) returns true but allDigitsOdd(9145293) returns false.

Answers

Answer:

Sample output:

Enter integer 3232423

true

Enter integer 12131231

false

Explanation:

Above is the output of the program and for the solution check the screenshots attach to understand clearly the program.

Thanks

The data files from a computer-assisted questionnaire software program can be downloaded at the researcher's discretion; however, different formatting options, including SPSS-readable files, may not be available. Group of answer choices True False

Answers

Answer:

False.

Explanation:

When data files are sourced from a computer-assisted questionnaire software program. The data files can be downloaded at the researcher's discretion, different formatting options can be used on the data files, and SPSS (Statistical Product and Service Solutions)-readable files are also available.

For instance, the CAPI (Computer-Assisted Personal Interview), CAWI (Computer-Assisted Web Interview)  and CASI (Computer-Assisted Self Interview) software program collects data from potential targeted population in a survey. These data can be downloaded by the originator of the survey with its SPSS (Statistical Product and Service Solutions)-readable files.

Also, if the researcher wishes to edit or format the data, it is very possible to achieve.

Define a structure with the tag Consumption to consist of a character array (city[20]), an integer (year), and a double (usage). b) Define a structure with the tag Resource to consist of two character arrays (material [30], and units[20]), and three doubles (longitude, latitude, and quantity). Then in the main function, declare metal and fuel to be variables of type struct Resource, and then declare water and power to be variables of type struct Consumption.

Answers

Answer:

..............................................................................

...............................

Explanation:

..............................................................................................................................................

why ‘illegal contract’ is a contradiction in terms?

Answers

Answer:

An Illegal contract or agreement is a contraction in terms when a contract is a legal obligation, illegal contract is viewed as a contradiction in terms.

Explanation:

Solution

An Illegal contract is called a contradiction for the following reasons listed below:

When a contract has a term that is obligatory, it is called a legal contract.

According to the rules of terms, when a contract is not done legally, it is considered an illegal contract.

On the common law of a contract or agreement, when a court does not apply or impose in any case or otherwise for a contract, it is seen as illegal.

Consider the following recursive method, which is intended to return a String with any consecutive duplicate characters removed. For example, removeDupChars("aabcccd") returns "abcd".public static String removeDupChars(String str){if (str == null || str.length() <= 1){return str;}else if (str.substring(0, 1).equals(str.substring(1, 2))){return removeDupChars(str.substring(1));}else{/* missing code */}}Which of the following can replace /* missing code */ so that removeDupChars works as intended?A. return removeDupChars(str.substring(2));B. return removeDupChars(str.substring(1)) + str.substring(0, 1);C. return removeDupChars(str.substring(2)) + str.substring(1, 2);D. return str.substring(0, 1) + removeDupChars(str.substring(1));E. return str.substring(1, 2) + removeDupChars(str.substring(2));

Answers

Answer:

D. return str.substring(0, 1) + removeDupChars(str.substring(1));

Explanation:

The logic here is following:

If the there are consecutive duplicate characters, return the removeDupChars method. The parameter of the removeDupChars method is a string, but the duplicate of the first character is removed from the string. The else-if part of the program does this job.

If the consecutive characters are not duplicated, return the first character of the string and the removeDupChars method. The parameter of the removeDupChars method is the rest of the string characters. The else part of the program does this job.

When the length of the str becomes one (or when the str is null), the program reaches its base and returns the str. The if part of the program does this job.

A recursive function is that function that calls itself from within.

The code statement that can replace the comment /* missing code */ is (d) return str.substring(0, 1) + removeDupChars(str.substring(1));  

The function definition is given as:

removeDupChars(String str)

The function has 3 linked conditional statements, each of which perform three different functions.

The first works for a null string and single characterThe second and the third are to return the intended string for strings with multiple lengths.

For the third condition to work, the consecutive characters must not be duplicated.

So, the code statement that does this is (d) return str.substring(0, 1) + removeDupChars(str.substring(1));

Read more about recursive functions at:

https://brainly.com/question/25647517

For this assignment, you will be writing a Deque ADT (i.e., LastnameDeque). A deque is closely related to a queue - the name deque stands for "double-ended queue." The dierence between the two is that with a deque, you can insert, remove, or view, from either end of the structure. Attached to this assignment are the two source les to get you started:

Answers

Answer:

Explanation:

The objective here is write a Deque ADT code by using Deque.java - the Deque interface; (i.e the specification we must implement) and BaseDeque.java which is  the driver for Deque testing.

For the computation of the code and its output I have written them in a word document due its long array which is much more than the 5000 character  this answer box can accommodate.

SEE THE ATTACHED FILE BELOW.

A cookie recipe calls for the following ingredients: • 1.5 cups of sugar • 1 cup of butter • 2.75 cups of flour The recipe produces 48 cookies with this amount of ingredients. Write a program that asks the user how many cookies they want to make and then displays the number of cups of each ingredient needed for the specified number of cookies in the following format: You need 5 cups of sugar, 3 cups of butter, and 7 cups of flour. Note: Don’t worry about formatting the numbers in the output.

Answers

Answer:

This program is written using c++ programming language

Comments are used to explain difficult lines

See attachment for .cpp source files

Program starts here

#include<iostream>

using namespace std;

int main()

{

// Calculate number of ingredient that makes up 48 cookies

float num_sugar = 1.5/48;

float num_butter =1.0/48;

float num_flour = 2.75/48;

//Declare integer variable to get number of cookies from user

int n;

// Prompt user for number of cookies needed

cout<<"Enter number of cookies: ";

cin>>n;

// Calculate equivalent amount of ingredient

num_sugar *= n;

num_butter *= n;

num_flour *= n;

// Display Result

cout<<"You need "<<num_sugar<<" cups of sugar, "<<num_butter<<" cups of butter, and "<<num_flour<<" cups of flour.";

return 0;

}

//End of Program

Other Questions
just do the one that says dessert dont worry about the other box. And the little boxes with the numbers in it, those r the answer. (geometry) PLZ HELP ASAP list the differences between saturated and unsaturated fats simplify this algebraic expression: y-3/3+12 Moral hazard is a problem associated with debt and equity contracts arising from: a. the borrower's incentive to undertake highly risky investments. b. the owners' inability to ensure that managers will act in the owners' interest. c. the difficulty lenders have in sorting out good credit risks from bad credit risks. d. All of these. e. only the borrower's incentive to undertake highly risky investments and the owners' inability to ensure that managers will act in the owners' interest of these. The expression represents the cost of Janelles cell phone bill, where m represents the number of minutes of use.0.05m + 12What is the constant in the expression?0.0512m0.05m The endpoints of a segment are (4,2) and (7,4). What are the endpoints of the segment after it has been translated 3 units to the right? A. (1,2), (4,4) B. (4,2), (10,4) C. (4,5), (7,7) D. (7,2), (10,4) 1.)A circuit has a current of 0.5A and a resistence of 8 ohms. What is the resistence? 2.) A circuit has a voltage of 9V and a current of 3A, what is the resistence? which value of h makes 8+h/10=1 a true statement Help is appreciated!! Simplify the expression (5 + 3)(5 - 3) 10/7=x/5 which of the following equation can be used to solve for the value of X? 1/2 divided by -1/7 answers please? Solve for c.3 7c 20c = 7(7c 19) + 14cc = 1. The following is (are) non-verbal communicationa.Facial expression b. Appearance c. Posture d. All of the above2. Communication is the task of imparting ..a. Training b. Information c. Knowledge d. Messaged3. Reports from the subordinates to the superiors take the form of a. face-to-face communication b. upward communication c. downward communication d. visual communication 4. The communication cycle, the process of re translation of signals into ideas is called a. responseb. encoding c. decodingd. feedback 5. A gesture is an example of a. speeches b. body language c. grammar d. written language 6. Which of the following is NOT a component in the Communication Model? (1) Sender (2) Messenger (3) Encoding (4) Receiver a. All of the above b. All, except (1) c. All, except (2) d. All, except (3) 7. What are the common barriers that impede communication? (1) Barriers with people (2) Barriers with words (3) Barriers made by cultural differences (4) Barriers made by distance a. All of the above b. All, except (2) c. All, except (3) d All, except (4) 8. Effective communication can ONLY be achieved when: (1) The audience is understood (2) Feedback is encouraged (3) Thoughts are organised a. All of the above b. All, except (1) c. All, except (2) d. All, except (3) 9. The most important goal of business communication is a. favourable relationship between sender and receiverb. organizational goodwill c. receiver responsed. receiver understanding 10. The study of communication through touch is a. chronemics b. haptics c. proxemics d. semantics11. Which of the following information should be included in minutes?(1) Date and venue of the meeting (2) Decisions made at the meeting (3) Comments from the members (4) Action to be taken by the membersA. All of the above B. All, except (2) C. All, except (3) D. All, except (4)12. Which of the following sentences about reports is NOT true?a. A short report is meant to convey information in an efficient, compact format. b. An annual report is usually published once a year for shareholders as well as for employers. c. A recommendation report examines a situation and concludes with specific recommendations. d. A proposal is a report written to convince a reader that a need exists and that specific action should be taken to remedy that need.13. What kind of information should be included in a resume?(1) Work experience (2) Education (3) Affiliation and membership (4) Letter of recommendationa. All, except (1) b. All, except (2) c. All, except (3) d. All, except (4)14. The inside address should be written a. above the salutation b. below the salutation c. above the heading d. above the date 15. Salutationa. comes at the end of the letter b. comes above the inside address c. begins at left hand margin of the letter d. comes in body of the letter16. A memo is an example ofa. lateral communicationb. external communication c. internal communicationd. downward communication17. Communication that takes place between employees with same status is referred to as ..18 . is the final link in the chain of the communication process.19. This type of communication takes place within a single person or the same person, usually for the purpose of clarifying ideas or analyzing a situation is referred to as 20. is the study of measurable distance between people as they interact21. A communication is a form of communication that is meant to share information in a manner that conforms to laid down professional rules, processes and standards and without the use of the slang language or terms what are the monomers of carbohydrates How can u benefit from a positive relationship with your parents? Which situation involves an object that can be considered to be in free fall? A) a bungee jumper just before reaching the bottom of a jump. B) a ball at the top of its motion after being thrown straight up in the air. C) a helicopter that is hovering above a freeway. D) a meteor traveling through the atmosphere I NEED HELP PLS PLS PLSMEAN OR MEDIAN IQR OR MAD Bryce started the summer with 4 hamster. by september he had 28 hamsters. what is the percent of change? Can someone help me on this