write a program that implements a simple movie selection decision tree. The decision tree will help the user determine which Dwayne Johnson movie to see.

Answers

Answer 1

Answer:

In order to make the following code in C it is necessary to take in consideration the possible tree of choices, or decision make trees.

Code:

#include <stdio.h>

int main(){

       printf("Please answer with (y/n) \n");

       printf("How about comedy movies?  ");

       char optional[2];

       scanf("%s",&optional);

       if(optional[0] == 'y'){

               printf("Recommended: CENTRAL INTELLIGENCE\n");

       } else if(optional[0] == 'n'){

               printf("Then, how about a current movie ?  ");

               scanf("%s",&optional);

               if(optional[0] == 'y' ){

                       printf("Recommended: HOBBS & SHAW\n");

               }else if(optional[0] == 'n') {

                       printf("how about electronic games ?  ");

                       scanf("%s",&optional);

                       if(optional[0] == 'y' ){

                               printf("Certified Fresh ?  ");

                               scanf("%s",&optional);

                               if(optional[0] == 'y'){

                                       printf("recommended JUMANJI : WELCOME TO THE JUNGLE\n");

                               }else if(optional[0] == 'n') {

                                       printf("RAMPAGE");

                               }

                       }else if(optional[0] == 'n') {

                               

                               printf("about franchises ?  ");

                               scanf("%s",&optional);

                               if(optional[0] == 'y'){

                                       printf("Recommended: FAST FIVE\n");

                               }else if(optional[0] == 'n') {

                                       printf("How about animation ?  ");

                                       scanf("%s",&optional);

                                       if(optional[0] == 'y'){

                                               printf("recommended: MOANA\n");

                                       }else if(optional[0] == 'n') {

                                               printf("recommended: SKYSCRAPPER\n");

                                       }

                               }

                               

                       }

               }

       }        

       return 1;

}


Related Questions

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

Answers

Complete Question:

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

In other words, your program will keep asking for a new number until the number that the user inputs is within the range of the <firstParameter> and <secondParameter>.

The method should present a message asking for the value within the range as:

Please enter a number within the range of (<firstParameter> and <secondParameter>):

Note that <firstParameter> should be changed by the value received as that parameter and <secondParameter> as well.

If the user inputs a value that it is lower than the first value, the program will show the message:

The input number is lower than <firstParameter>

Note that <firstParameter> should be changed by the value received as that parameter

If the user inputs a value that it is greater than the first value, the program will show the message:

The input number is greater than <secondParameter>

Note that <secondParameter> should be changed by the value received as that parameter.

You do not need to modify anything in the main method, you just need to write the missing parts of your new getIntVal method.

Answer:

#include<iostream>

using namespace std;

void getIntVal(int num1, int num2) {

int num;

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

while(num<num1 || num>num2) {

if(num<num1) {

cout<<"The input number is lower than "<<num1<<endl;

}

if(num>num2) {

cout<<"The input number is greater than "<<num2<<endl;

}

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

}

cout<<"Output: "<<num;

}

int main() {

int num1,num2;

cout<<"Enter lower bound: ";

cin>>num1;

cout<<"Enter upper bound: ";

cin>>num2;

getIntVal(num1, num2);

return 0;

}

Explanation:

Programming Language is not stated, So, I answered using C++

I've added the full source code as an attachment where I use comments to explain difficult lines

The formula to convert Fahrenheit (F) temperature to Celsius (C) is C=F-32/1.8 which line of code will accomplish this conversion?

O Celsius = (Fahrenheit - 32) / 1.8

O Celsius = (Fahrenheit - 32) * 1.8

O Celsius = Fahrenheit - 32 * 1.8

O Celsius = Fahrenheit - 32 /* 1.8

Answers

I think it might be the first option

The formula code that coverts the temperature unit of Fahrenheit to Celsius is Celsius = (Fahrenheit - 32) / 18. Therefore, option A is correct.

What are the units of measuring temperature?

Temperature is given as the unit of measuring the hotness or coolness of a body. The SI unit of measuring temperature is Kelvin. The equivalent converts the temperature unit between Kelvin, Celsius, and Fahrenheit.

The code of line that helps in accomplishing the conversion of Fahrenheit to Celsius is,

Celsius = (Fahrenheit - 32) / 18.

Thus, option A is correct.

Learn more about Celsius to Fahrenheit, here:

https://brainly.com/question/14272282

#SPJ2

Match the correct term from the list below with the correct statement.

Answers

Answer:

self-serving bias

feedback

self-fulfilling prophecy

communication

context

This type of file is created when you save your word processing document.
access,
data,
program, or
system

Answers

Answer:

data

Explanation:

Answer:

Data

Explanation:

Files contain data and stuff you have saved to the device.

What type of cipher takes one character and replaces it with one character, working one character at a time

Answers

Answer: An algorithm

Explanation: ​An asymmetric encryption key that does have to be protected. ​An algorithm that takes one character and replaces it with one character.

3.7) BEST ANSWER BRAINLIEST

your answer will be reported if it is ridiculous


Which is NOT a question that might help a network engineer isolate which layer in a network has a problem?



Is the user operating the software correctly?


Is everything plugged in?


Are messages arriving in a timely manner?


Are the data displaying in a garbled manner?

Answers

Explanation:

i think it is are messages ariving in a timely manner?

Answer:

Is the user operating the software correctly?

Explanation:

Thats the correct one for edge

What is the best way to create a pseudocode plan within your program?

Use a flowchart in a file.

Use comments in IDLE.

Use comments in a file.

Use a flowchart in IDLE.

Answers

The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

What is a pseudocode?

Programmers can be set up or design their coding logic using pseudocode to organize and outline it. Learning about pseudocode can aid your development process if you create software.

The term pseudocode is one that often go through some of its fundamental building blocks.

Note that in IDLE or a file, you cannot be able to add flowchart shapes. In IDLE, you could build a pseudocode plan with comments, but you couldn't go back and add lines of code where they were missing.

Therefore, Making a file enables you to plan out your pseudocode using comments, and then fill it in with the actual code.

Hence, The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

Learn more about pseudocode plan from

https://brainly.com/question/27646993
#SPJ1

Answer:

Comments in a file

Explanation:

What is the output password=sdf345

Answers

Answer:what do you mean

Explanation:

Answer:

False

Explanation:

If you put it in python your answer would be false

Give a recursive algorithm that takes as input two positive integers x and y and returns the product of x and y. The only arithmetic operations your algorithm can perform are addition or subtraction. Furthermore, your algorithm should have no loops.

Answers

Answer:

#include <stdio.h>

int product(int x,int y)

(

 if(y==1)

    return x;

 else

    return (x+product(x,y-1));

)

int main()

(

 int a,b;

 scanf("%d %d",&a,&b);

 printf("%d\n*,product(a,b));

return 0;

)

Explanation:

See above code as explanatory enough.

Write a program to simulate a simple calculator. In your program ask the user to enter an operation selected from the menu, ask for two operands. Calculate the result and display it on the screen. Here is a sample run

Answers

Answer:

Written in Python:

opcode = input("Enter operator: +,-,*,/")

operand1 = float(input("Operand 1: "))

operand2 = float(input("Operand 2: "))

if opcode == "+":

    print(operand1 + operand2)

elif opcode == "-":

    print(operand1 - operand2)

elif opcode == "*":

    print(operand1 * operand2)

elif opcode == "/":

    print(operand1 / operand2)

else:

    print("Invalid Operator")

Explanation:

This prompts user for operator

opcode = input("Enter operator: +,-,*,/")

The next two lines prompt user for two operands

operand1 = float(input("Operand 1: "))

operand2 = float(input("Operand 2: "))

This performs + operation if operator is +

if opcode == "+":

    print(operand1 + operand2)

This performs - operation if operator is -

elif opcode == "-":

    print(operand1 - operand2)

This performs * operation if operator is *

elif opcode == "*":

    print(operand1 * operand2)

This performs / operation if operator is /

elif opcode == "/":

    print(operand1 / operand2)

This displays invailid operator if input operator is not +,-,* or /

else:

    print("Invalid Operator")

The _________ contains logic for performing a communication function between the peripheral and the bus.

Answers

Answer:

I/O module

Explanation:

The I/o module is known as the input/output module. Such a module is usually connected to system on one end and and in the other end, one or more input/output devices are connected. Such a technique helps to exchange data between the processor and also the input /output device. It helps in information transfer between the internal storage and also the external storage.

The best way to make sure text stand out in eNotes would be to
A. resize it.
B. printit it
C. bold it
D. strike-through​

Answers

The answer is C.Bold it

Answer: (D) bold it.

Explanation:

Question #6
Multiple Choice
What will you see after on the next line?
>>> int("3.9")

O 4
O an error statement
O 3
O 3.9

Answers

Answer:

an error statement

Explanation:

just took it. have a good one!

You will see after on the next line is an error statement. The correct option is second one.

What is on error statement?

"On error statement" enables an error-handling and specifies the location of the error within a procedure. The On Error statement is used in unstructured error handling and can be used instead of structured exception handling. S

An error statement is occurred after the code entered as >>> int("3.9")

Thus, the correct option is second one.

Learn more about  on error statement.

https://brainly.com/question/13735734

#SPJ2

True/False: When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

Answers

Answer:

True.

Explanation:

In object-oriented programming language, a process known as encapsulation is used for the restrictions of the internal data of a software program from the outside code, therefore preventing an unauthorized direct access to the codes. This is achieved through the use of classes.

When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

Tessa heard that a hacker recently broke into her friend’s e-mail account. Tessa uses her home computer to manage her personal business and wants to make sure her information and online accounts are protected from hackers.

What steps should Tessa take to protect her accounts? Check all that apply.

change passwords frequently
review privacy settings
change current screen name
purchase another computer
adjust safety settings

Answers

Answer:
Adjust privacy settings
Change passwords frequently
Adjust safety settings
Explanation:
Hope that helped

The steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Given that Tessa want to protect her accounts from the hackers,

We need to provide the steps to do the same,

To protect her accounts from hackers, Tessa should take the following steps:

a) Change passwords frequently: Regularly changing passwords for her online accounts can help prevent unauthorized access.

Strong, unique passwords that include a combination of letters, numbers, and symbols should be used.

b) Review privacy settings: Tessa should review the privacy settings on her online accounts and ensure that they are set to the appropriate level of security.

This includes adjusting who can see her personal information, posts, and photos.

c) Adjust safety settings: Tessa should check the safety settings on her computer and enable features like firewalls and antivirus software to protect against malware and other threats.

d) Change current screen name: If Tessa is using a screen name that can be easily linked to her personal information, it's advisable to change it to something less identifiable to reduce the risk of targeted attacks.

e) Purchase another computer: While purchasing another computer may be an option in certain cases, it's not a necessary step for general account protection.

However, if Tessa's current computer is outdated or lacks essential security features, upgrading to a more secure device could be beneficial.

Therefore, the steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Learn more about Hacking click;

https://brainly.com/question/28311147

#SPJ2

Which is an algorithmic form of a procedure?
A.
function calc_area
B.
area=length*breadth
C.
call function calc_area
D.
return area to the main function
E.
end function calc_area

Answers

Answer:

b

Explanation:

im doing the test right now

Answer:

B is correct!

Explanation:

summarize how to write well-organized paragraphs

Answers

Decide on a controlling idea and create a topic sentence. ...
Explain the controlling idea. ...
Give an example (or multiple examples) ...
Explain the example(s) ...
Complete the paragraph's idea or transition into the next paragraph.

Write a single statement that prints outsideTemperature with a or - sign. End with newline. Sample output with input 103.5: 103.500000

Answers

Answer:

Written in C Language

#include <stdio.h>

int main() {

   float temp;

   printf("Temperature: ");

   scanf("%f",&temp);

   temp-=(temp + temp);

   printf("%.6f", temp);

    return 0;

}

Explanation:

This line declares temp as float

   float temp;

This line prompts user for input

   printf("Temperature: ");

This line gets user input

   scanf("%f",&temp);

This line negates the user input

   temp-=(temp + temp);

This line prints out the required output with a - sign

   printf("%.6f", temp);

According to Jonathan Zittrain, technology that cannot be modified by the user who wishes to create new uses for it is:_______

a. Sterile
b. Open
c. Generative
d. Clean

Answers

Answer:

a. Sterile

Explanation:

From a lecture that was given by jonathan zittrain, he described a sterile technology as a type of technology that will not develop. And going further he says that a y third party cannot do any sort of coding for such a technology. It works the same way always. He described it in these words 'what you see is what you get'.

Why are computers popular in education these days?

Answers

Answer:

They have unlimited information

Explanation:

Answer:

computers are popular in education these days because students of this generation prefer to learn from mobiles and computers. They can gain lots of extra knowledge than from their book from computers and internet. If they get confused in some problems, they can just search it in Google and get the answer.

Infrastructure as a Service (IaaS) replaces the _________ of the computer hierarchy with an Internet-based infrastructure.A. digital logic level through user levelsB. digital logic level through high-level language levelsC. system software level through high-level language levelsD. digital logic level through machine levels

Answers

Answer:

D. digital logic level through machine levels

Explanation:

In Computer science, the modern computer systems are basically organized in levels and this is known as computer hierarchy. The three levels in a chronological order are operating system level, machine language level and digital (hardware) logic level.

A digital logic level is the most fundamental level of a computer and can be defined as a level of the computer hierarchy which typically comprises of wires and gates. In digital circuits, the two (2) main logic level of the binary logic state are logical low and logical high which is typically denoted by the number 0 and 1 respectively.

In Computer science, the Infrastructure as a Service (IaaS) replaces the digital logic level through machine levels of the computer hierarchy with an Internet-based infrastructure. This is what enables various users to access resources that are available over the internet through the use of cloud storage.

Computer programmers are responsible for writing code that tells computers commands to follow.

True
False

Answers

True is the correct answer.

Answer:

True

Explanation:

the answer is true

is check payable a liability ?​

Answers

Answer:

Yes

Explanation:

Accounts payable (AP) is money owed by a business to its suppliers shown as a liability on a company's balance sheet.

A pay check is a liability

Suppose you discover that you have a directory called bin2, which includes a bunch of useful programs. You want to move those programs into your bin directory, and then delete bin2. What command(s) will you give

Answers

Answer:

The MV command to move the bin2 directory to the bin directory.

Explanation:

Linux operating system uses a hierarchical arrangement of directories to organise information in its system.

It is an open source operating system with various built-in commands and other commands which can be made by a programmer.

The MV command takes a file or directory from a current directory and a destination directory.

How long will it take to send 1.1 million bits using the Stop and Wait ARQ protocol if each packet contains 1000 bits and the only delay is propagation delay

Answers

Answer:

1.111 second

Explanation:

We know propagation speed =  [tex]$2 \times 10^8$[/tex] m/s

                                                 =  [tex]$2 \times 10^5$[/tex] km/s

One packet size = 1000 bit

Distance between sender and the receiver = 1000 m = 1 km

The channel data rate = 1 Mbps =   [tex]$1 \times 10^6$[/tex] bits per sec

There is no transmission delays of ACKs,

The time to transmit one data packet  = [tex]$T_{trans}+2T_{prop}$[/tex]

Here, time to transmit frame = [tex]$T_{trans}$[/tex]

          propagation time = [tex]$T_{prop}$[/tex]

Therefore, [tex]$T_{trans}$[/tex] = [tex]$\frac{bits\ per\ frame}{transmission \ speed}$[/tex]

                            = [tex]$\frac{1000}{1 \times 10^6}$[/tex]      = 0.001 seconds

[tex]$T_{prop}=\frac{distance\ between\ sender\ and\ receiver}{propagation \ speed}$[/tex]

         = [tex]$\frac{1}{2 \times 10^5}$[/tex]            

         = 0.000005 seconds

Therefore, T = 0.001 +2(0.000005)

                     = 0.00101 seconds

We known, 1.1 million bits= 1100 packets

Therefore to transmit 1 million bits = 1100 x 0.00101

                                                         =  1.111 second

What do type in?
What are the HR tags
What are the h3 headings

Answers

Answer:

HR tags are horizontal breaks in a document.

Your code should look like this:

<html>

<head>

</head>

<body>

<h1>

first heading

</h1>

<h3>

other headings

</h3>

</body>

</html>

<style>

body {

   background-color: #505693;

   color: #FFFFFF;

}

hr {

   background-color: #6A5ACD;

}

</style>

. Because Maya knows that the most important part of an e-mail message is the subject line, she ________.

Answers

Answer:

adjust the subject line if the topic changes after repeated replies

Explanation:

E-mail (electronic mail) message is usually reffered to as a text, usually informal which can be sent electronically or received through a computer network. e-mail message is usually brief but at same time some do contains attachment which allows sending of images as well as spreadsheet. One of the important part of Email message is the Subject Line which serves as the introduction that gives the intent of the message, it is this Subject Line that will show when the recipient is going through the list of emails in his/her inbox. It allows the recipient to know what is conveyed in the body of the message.There are usually action information as well as dates at the end of the email message as well as closing thought.In the case of Maya from the question, Because Maya knows that the most important part of an e-mail message is the subject line, she adjust the subject line if the topic changes after repeated replies, since the subject line convey the information in the body text, so the subject line need to be adjusted to fit the topic as it changes.

Which method accepts a function that combines all the elements in the array and then returns the resulting value?
a. filter()
b. reduce()
c. map()
d. forEach()

Answers

Answer:

The method that accepts a function that combines all the elements in an array and then returns the resulting values is map() method.

Explanation:

map()  method creates a new array with the results of calling a provided  function for every array element. map() element calls function for each array element to compute value.

Problem1: How Much Snow? Snow is falling at the rate of 0.8 inch per hour. Evaporation occurs at the rate of 2% per hour. Complete program HowMuchSnow.java to calculate how many inches of snow are on the ground after snowing a number of hours.

answer in coding on j creator

Answers

public class HowMuchSnow{

    public static void main(String []args){

       System.out.println("Hello World");

       System.out.println("There are "+ SnowFall(3) + " inches of snow on the ground.");

    }

    public static float SnowFall(float hours){

        float falling = 0.8f - (0.8f * 0.02f);

        return falling * hours;

    }

}

I hope this helps!

Write a class named TestScores. The class constructor should accept an array of test scores as its argument. The class should have a method that returns the average of the test scores. If any test score in the array is negative or greater than 100, the class should throw an IllegalArgumentException. Demonstrate the class in a program.

Answers

import java.util.Arrays;

public class TestScores {

   public static float getAverage(float arr[]){

       float total = 0;

       for (float x : arr){

           if (x < 0 || x > 100){

               throw new IllegalArgumentException();

           }

           else{

               total += x;

           }

           

       }

       return (total / arr.length);

   }

   

   public static void main(String [] args){

       float arr[] = {1,100,0,43,-1};

       System.out.println(getAverage(arr));

   }

}

In the main method we test our getAverage method with the arr array. You can replace the values in the arr array and test your own values. I hope this helps!

The code example of the implementation of the TestScores class in Java is shown below:

What is the class?

java

import java.util.Arrays;

public class TestScores {

   private int[] scores;

   public TestScores(int[] scores) {

       this.scores = scores;

   }

   public double getAverage() {

       int sum = 0;

       for (int score : scores) {

           if (score < 0 || score > 100) {

               throw new IllegalArgumentException("Invalid test score: " + score);

           }

           sum += score;

       }

       return (double) sum / scores.length;

   }

   public static void main(String[] args) {

       int[] scores = {85, 90, 92, 88, 95};

       TestScores testScores = new TestScores(scores);

       try {

           double average = testScores.getAverage();

           System.out.println("Average test score: " + average);

       } catch (IllegalArgumentException e) {

           System.out.println("Error: " + e.getMessage());

       }

   }

}

Read more about  class  here:

https://brainly.com/question/26580965

#SPJ2

Other Questions
[What primary impact did the Great Temple's construction have on Jerusalem?It left the entire kingdom deeply in debt.It made the city famous for King Solomory wisdom.It made the city unappealing to foreign visitors.It created controversy over the secular design.Answer this and you get 100 points what is 5 - 10 Contains tires, wheels, engine, transmission, and drive axle assembly. Which statement is true about a unit cube The Spanish club held a car wash to raise money why equals Y=5X represents the amount of money The Y club members made Washing cars identify the constant Proportionality Americans vote more often and for more officers__than the people of almost any other nation PLZZZZZ ANYONE PLZZZZZZZZZZZZZZZZZZZZZZZZZ ANSWER THIS I DO ANYTHING!!! THIS DUETODAY PLZ JUST HELP (93 POINTS)TEXT:Having their guns and hearing nobody, they entered the houses and found the people were gone. (We) took some things but didnt dare stay...We have meant to have left some beads and other things in the houses as a sign of peace and to show we meant to trade with them. But we didnt do it because we left in such a haste. But as soon as we can meet with the Indians, we will pay them well for what we took. We marched to the place we called Cornhill, where we had found the corn before. At another place we had seen before, we dug and found some more corn, two or three baskets full, and a bag of beans...In all we had about ten bushels, which will be enough for seed. It was with Gods help that we found this corn, for how else could we have done it, without meeting some Indians who might trouble us. The next morning, we found...a grave. We decided to dig it up. We found first a mat, and under that a fine bow...We also found bowls, trays, dishes, and things like that. We took several of the prettiest things to carry away with us, and covered the body up again. When last the glorious light of all the sky was underneath this globe, and birds grew silent, I began to settle, as my custom is, to take repose. Before mine eyes were fast closed, me thot I saw a vision, at which my spirit was much troubled, and trembling at that doeful sight a spirit cried aloud, Behold! My son, whom I have cherished; see the paps that gave thee suck, the hands that clasped thee warm, and fed thee oft; canst thou forget to take revenge of those wild people, that hath my monument defaced in a despiteful manner; disdaining our ancient antiquities, and honorable customs. See now the sachems grave lies like unto the common people, of ignoble race defaced. Thy mother doth complain, implores thy aid against this thievish people new come hither; if this be suffered, I shall not rest in quiet within my everlasting habitation.QUESTION: Author says (Quotation)Author means (Interpretation)What do these quotations reveal about the authors perspective? (Elaboration) Author says (Quotation)Author means (Interpretation)What do these quotations reveal about the authors perspective? (Elaboration) What kind of sentence is this? 'Tom and Jerry have a big argument every morning until they decide what to do with their day.' WILL GIVE BRAINLIEST What is an advantage of portrait orientation for portrait photography (photos of people)? The composition shows more context. The composition places attention on the foreground. The composition minimizes the background. All of the above I'm giving away a free brainliest to the hardest question ever (or just a question I don't know the answer to). I do Kumon so I'm pretty good at math (forgot to mention it has to be a math question) so good luck! Instead of typing questions in the chat, please type the question by answering this. :) Have fun! and good luck! Soft skills is one's ability to use skills that are not typically taught in a classroom such as empathy, patience, kindness, etc. What soft skills do you think buyers must have to be effective negotiators jeannette served 2 whole pizza to her friends .each visitor was given 1/4 of the pizza.how many visitors shared the pizza Which decimal is equivalent to 3/8 WHATS THE DEFFINITION OF HELLO??????????? ANSER FAST >:C which is the smallest number that can be divided by 15 16 and 21 leaving a reminder of 3 What is elevation of tammys houseL Traveling between two campuses of a university in a city via shuttle bus takes, on average, 28 minutes with a standard deviation of 5 minutes. In a given week, a bus transported passengers 100 times. The probability that the average transport time was bigger than 27 minutes is A term that refers to someone having extreme pride for one's country is it imperialism or militarism and explain, please thank u PLEASE HELP!!!!!!Which of the following triangles below make a right triangle? Flying against the jetstream, a plane travels 3,132 miles in 9 hours. The same plane flying with the jetstream travels 1.5 times the distance it traveled going against the jetstream. If the plane travels 435 miles per hour, what is the speed of the jetstream? pls help 25 points7x + 39 53 AND 16x + 15 > 31CHOOSE ONE ANSWERx > 1x 2x 2There are no solutionsAll values of x are solutions