Answer:
Follows are the code to this question:
#include <iostream>//header file
using namespace std;
int main()//defining a main method
{
int customer= 16508;//defining an integer variable
int E_drink, C_drink;//defining an integer variable
double buy_Energy_drink,buy_cold_drink;//defining a double variable
buy_Energy_drink= 0.15;//use double variable to assign value
buy_cold_drink= buy_Energy_drink *0.58;//use double variable to calculate value
E_drink = customer*buy_Energy_drink;//calculating value of E_drink
C_drink= customer*buy_cold_drink;//calculating value of E_drink
cout<<"\t\t\t -:Energy Drink Consumption:-"<<endl;//print message
cout<<"According to A soft drink company surveyed 16,500 of its customers."<<endl;//print message
cout<<E_drink <<" customer purchase one or more energy drinks per week."<<endl;//print message with value
cout<<C_drink <<" customer who prefer citrus-flavored energy drinks."<<endl;//print message with value
return 0;
}
Output:
Please find the attached file.
Explanation:
In this code, three integer variable "customer, E_drink, and C_drink" is defined, in which the first variable is used to hold a value, and the next two variables are used for calculating the value.
In the next step, two double variables "buy_Energy_drink, buy_cold_drink" is defined that calculate the given percentage value and passed into the integer variable to calculate the value and print the value with the given message.
You are a computer consultant called in to a manufacturing plant. The plant engineer needs a system to control their assembly line that includes robotic arms and conveyors. Many sensors are used and precise timing is required to manufacture the product. Of the following choices, which OS would you recommend to be used on the computing system that controls the assembly line and why
Answer:
Linux operating system is suitable for the operation of the automated system because it is more secure with a free open-source codebase to acquire and create new applications on the platform.
Explanation:
Linux operating system is open-source software for managing the applications and network functionalities of a computer system and its networks. It has a general public license and its code is available to users to upgrade and share with other users.
The OS allows user to configure their system however they chose to and provides a sense of security based on user privacy.
Write a program that calculates the tip and total amount to pay per person given the bill. The program gets the bill, tip percentage and number of people as input and outputs the amount of tip per person and total per person. Check the Programming Guideline document on Blackboard to know what to submit. Sample run given below where the red bold numbers are the inputs from the user: TIP CALCULATOR Enter the bill : 20.25 Enter the percentage of the tip : 20 Enter the number of people : 3 Tip per person is $1.35 and total per person is $8.10.
Answer:
Answered below.
Explanation:
#program is written in Python programming language
#Get inputs
bill = float(input('Enter bill: "))
tip = float(input("Enter tip percentage: "))
people = float(input ("Enter number of people: ")
#calculations
amount_per_person = bill / people
tip_per_person = amount_per_person * tip
total_per_person = amount_per_person + tip_per_person
#output
print(tip_per_person)
print (total_per_person)
python program A year with 366 days is called a leap year. Leap years are necessary to keep the calendar in sync with the sun, because the earth revolves around the sun once very 365.25 days. As a result, years that are divisible by 4, like 1996, are leap years. However, years that are divisible by 100, like 1900, are not leap years. But years that are divisible by 400, like 2000, are leap years. Write a program named leap_year.py that asks the user for a year and computes whether that year is a leap year
Answer:
In Python:
year = int(input("Year: "))
if (year % 4) == 0:
if (year % 100) == 0:
if (year % 400) == 0:
print("Leap year")
else:
print("Not a leap year")
else:
print("Leap year")
else:
print("Not a leap year")
Explanation:
This line prompts user for year
year = int(input("Year: "))
This condition checks if input year is divisible by 4
if (year % 4) == 0:
If yes, this condition checks if input year is divisible by 100
if (year % 100) == 0:
If yes, this condition checks if input year is divisible by 400
if (year % 400) == 0:
If divisible by 4, 100 and 400, then it is a leap year
print("Leap year")
else:
If divisible by 4 and 100 but not 400, then it is not a leap year
print("Not a leap year")
else:
If divisible by 4 but not 100, then it is a leap year
print("Leap year")
else:
If it is not divisible by, then it is not a leap year
print("Not a leap year")
Help need right now pls
Read the following Python code:
yards - 26
hexadecimalYards = hex (yards)
print (hexadecimalYards)
Which of the following is the correct output? (5 points)
A. 0b1a
B. 0d1a
C. 0h1a
D. 0x1a
Answer:
d. 0x1a
Explanation:
(1) Prompt the user for an automobile service. Output the user's input. (1 pt) Ex: Enter desired auto service: Oil change You entered: Oil change (2) Output the price of the requested service. (4 pts) Ex: Enter desired auto service: Oil change You entered: Oil change Cost of oil change: $35 The program should support the following services (all integers): Oil change -- $35 Tire rotation -- $19 Car wash -- $7 If the user enters a service that is not l
Answer:
In Python:
#1
service = input("Enter desired auto service: ")
print("You entered: "+service)
#2
if service.lower() == "oil change":
print("Cost of oil change: $35")
elif service.lower() == "car wash":
print("Cost of car wash: $7")
elif service.lower() == "tire rotation":
print("Cost of tire rotation: $19")
else:
print("Invalid Service")
Explanation:
First, we prompt the user for the auto service
service = input("Enter desired auto service: ")
Next, we print the service entered
print("You entered: "+service)
Next, we check if the service entered is available (irrespective of the sentence case used for input). If yes, the cost of the service is printed.
This is achieved using the following if conditions
For Oil Change
if service.lower() == "oil change":
print("Cost of oil change: $35")
For Car wash
elif service.lower() == "car wash":
print("Cost of car wash: $7")
For Tire rotation
elif service.lower() == "tire rotation":
print("Cost of tire rotation: $19")
Any service different from the above three, is invalid
else:
print("Invalid Service")
what if an html code became cracked and formed a bug how can i repair that
In the following code segment, assume that the ArrayList numList has been properly declared and initialized to contain the Integer values [1, 2, 2, 3]. The code segment is intended to insert the Integer value val in numList so that numList will remain in ascending order. The code segment does not work as intended in all cases.
int index = 0;
while (val > numList.get(index))
{
index++;
}
numList.add(index, val);
For which of the following values of val will the code segment not work as intended?
a. 0
b. 1
c. 2
d. 3
e. 4
Answer:
e. 4
Explanation:
The code segment will not work as intended if the value of the variable val is 4. This is because the while loop is comparing the value of the variable val to the value of each element within the numList. Since there is no element that is bigger than or equal to the number 4, this means that if the variable val is given the value of 4 it will become an infinite loop. This would cause the program to crash and not work as intended.
The program illustrates the use of while loops.
The code segment will not work as intended when the value of val is 4
LoopsLoops are used to perform repeated operations
The programFrom the program, the while loop is repeated under the following condition:
val > numList.get(index)
This means that:
The loop is repeated as long as val has a value greater than the index of numList (i.e. 3)
From the list of options, 4 is greater than 3.
Hence, the code segment will not work as intended when the value of val is 4
Read more about loops at:
https://brainly.com/question/19344465
importance of spread sheets
Answer:
Spreadsheets are an essential business and accounting tool. They can vary in complexity and can be used for various reasons, but their primary purpose is to organize and categorize data into a logical format. Once this data is entered into the spreadsheet, you can use it to help organize and grow your business.
Explanation:
Mark is a stockbroker in New York City. He recently asked you to develop a program for his company. He is looking for a program that will calculate how much each person will pay for stocks. The amount that the user will pay is based on:
The number of stocks the Person wants * The current stock price * 20% commission rate.
He hopes that the program will show the customer’s name, the Stock name, and the final cost.
The Program will need to do the following:
Take in the customer’s name.
Take in the stock name.
Take in the number of stocks the customer wants to buy.
Take in the current stock price.
Calculate and display the amount that each user will pay.
A good example of output would be:
May Lou
you wish to buy stocks from APPL
the final cost is $2698.90
ok sorry i cant help u with this
What Game is better Vacation Simulator Or Beat Saber
Answer:
I love Beat Saber and Beat Saber is the best!!!!
Explanation:
Answer:
I would have to agree with the other person I think Beat Saber is better than Vacation Simulator
Explanation:
~Notify me if you have questions~
have a nice day and hope it helps!
^ω^
-- XxFTSxX
Write a program that calculates the average of 4 temperatures. Function 1--write a function to ask a user for 4 temperatures and return them to main. Validate that none of them is negative. Also return a boolean indicating that the data is good or bad. Function 2--write a value-returning function to calculate the average and return it as a double if the data is good. Display an error message if any score was negative.
Answer:
Answered below
Explanation:
Answer written in Python programming language
temp_list = []
count = 0
sum = 0
n = 0
is_good = True
def temperatures(temp1, temp2, temp3, temp4){
temp_list = [temp1, temp2, temp3, temp4]
for i in temp_list:
if i < 0:
is_good = False
break
return is_good
}
def average ( ){
if is_good:
for i in temp_list:
sum += i
count++
average = sum / count
return average
}
If an excel column will contain prices of smartphones, which number format should you uss
Answer:
You can use number formats to change the appearance of numbers, including dates and times, without changing the actual number. The number format does not affect the cell value that Excel uses to perform calculations. The actual value is displayed in the formula bar. Excel provides several built-in number formats.
Explanation:
Where does the revolver get the IP address of a site not visited before?
the file server
the print spooler
the IP provider
the name server
Answer:
The name server
Explanation:
The correct answer is name servers because on the internet, they usually help web browsers and other services to access the records of the domain name system(DNS) by direction of traffic through connection of the domain name with the IP address of the web server.
Write a java program named BMI.java(i)print out your name and your pantherID(ii) Ask user to type in his/her weight and height; if an illegal input (such as a letter) is typed by the user, give the user one more chance to input correctly.(iii)Create a method to compute the body mass index (BMI) accordingly. BMI
Answer:
Answered below
Explanation:
//Print name and ID
Scanner x = new Scanner(System.in);
System.out.print("Enter name");
String name = x.nextline();
Scanner y = new Scanner(System.in);
System.out.print("Enter ID");
int id = y.nextline();
System.out.println(name, id);
Scanner w = new Scanner(System.in);
System.out.print("enter weight");
double weight = w.nextline();
Scanner h = new Scanner(System.in);
System.out.print("enter height: ");
double height = h.nextline();
int i = 0;
while( I < 2){
if ( !isDigit(weight) && !isDigit(height){
Scanner w = new Scanner(System.in);
System.out.print("enter weight:);
weight = w.nextline();
Scanner h = new Scanner(System.in);
System.out.print("enter height");
height = h.nextline();
}else{
break;
double BMI = weight / ( height **2)
System.out.print(BMI)}
I++
}
What is block chain?
Answer:
Block Chain is a system of recording information that makes it difficult or impossible to change, hack, or cheat the system.
A blockchain is essentially a digital ledger of transactions that is duplicated and distributed across the entire network of computer systems on the blockchain.
Hope this helps.
x
Online privacy and data security are a growing concern. Cybercrime is rampant despite the various security measures taken.
-Mention five tools to safeguard users against cybercrime. How do these tools help decrease crime?
-Provide the details of how each of these tools work.
-Describe how these tools are helping to restrict cybercrime.
Answer:
The SANS Top 20 Critical Security Controls For Effective Cyber Defense
Explanation:
Password/PIN Policy
Developing a password and personal identification number policy helps ensure employees are creating their login or access credentials in a secure manner. Common guidance is to not use birthdays, names, or other information that is easily attainable.
Device Controls
Proper methods of access to computers, tablets, and smartphones should be established to control access to information. Methods can include access card readers, passwords, and PINs.
Devices should be locked when the user steps away. Access cards should be removed, and passwords and PINs should not be written down or stored where they might be accessed.
Assess whether employees should be allowed to bring and access their own devices in the workplace or during business hours. Personal devices have the potential to distract employees from their duties, as well as create accidental breaches of information security.
As you design policies for personal device use, take employee welfare into consideration. Families and loved ones need contact with employees if there is a situation at home that requires their attention. This may mean providing a way for families to get messages to their loved ones.
Procedures for reporting loss and damage of business-related devices should be developed. You may want to include investigation methods to determine fault and the extent of information loss.
Internet/Web Usage
Internet access in the workplace should be restricted to business needs only. Not only does personal web use tie up resources, but it also introduces the risks of viruses and can give hackers access to information.
Email should be conducted through business email servers and clients only unless your business is built around a model that doesn't allow for it.
Many scams and attempts to infiltrate businesses are initiated through email. Guidance for dealing with links, apparent phishing attempts, or emails from unknown sources is recommended.
Develop agreements with employees that will minimize the risk of workplace information exposure through social media or other personal networking sites, unless it is business-related.
Encryption and Physical Security
You may want to develop encryption procedures for your information. If your business has information such as client credit card numbers stored in a database, encrypting the files adds an extra measure of protection.
Key and key card control procedures such as key issue logs or separate keys for different areas can help control access to information storage areas.
If identification is needed, develop a method of issuing, logging, displaying, and periodically inspecting identification.
Establish a visitor procedure. Visitor check-in, access badges, and logs will keep unnecessary visitations in check.
Security Policy Reporting Requirements
Employees need to understand what they need to report, how they need to report it, and who to report it to. Clear instructions should be published. Training should be implemented into the policy and be conducted to ensure all employees understand reporting procedures.
Empower Your Team
One key to creating effective policies is to make sure that the policies are clear, easy to comply with, and realistic. Policies that are overly complicated or controlling will encourage people to bypass the system. If you communicate the need for information security and empower your employees to act if they discover a security issue, you will develop a secure environment where information is safe.
Answer:
anyone know if the other answer in right?
Explanation:
The Clean Air Act Amendments of 1990 prohibit service-related releases of all ____________. A) GasB) OzoneC) MercuryD) Refrigerants
Answer:
D. Refrigerants
Explanation:
In the United States of America, the agency which was established by US Congress and saddled with the responsibility of overseeing all aspects of pollution, environmental clean up, pesticide use, contamination, and hazardous waste spills is the Environmental Protection Agency (EPA). Also, EPA research solutions, policy development, and enforcement of regulations through the resource Conservation and Recovery Act .
The Clean Air Act Amendments of 1990 prohibit service-related releases of all refrigerants such as R-12 and R-134a. This ban became effective on the 1st of January, 1993.
Refrigerants refers to any chemical substance that undergoes a phase change (liquid and gas) so as to enable the cooling and freezing of materials. They are typically used in air conditioners, refrigerators, water dispensers, etc.
Answer:
D
Explanation:
Rules used by a computer network
A network protocol
B hierchary protocal
C procedure
Answer:
The answer is B hierchary protocal
Answer:
its network protocol
Explanation:
I got it right
Sophisticated modeling software is helping international researchers
Answer:
A. increase the pace of research in finding and producing vaccines.
Explanation:
These are the options for the question;
A. increase the pace of research in finding and producing vaccines.
B. analyze computer systems to gather potential legal evidence.
C. market new types of products to a wider audience.
D. create more intricate screenplays and movie scripts.
Modeling software can be regarded as computer program developed in order to build simulations as well as other models. modelling software is device by international researchers to make research about different vaccines and other drugs and stimulants to combat different diseases. It helps the researcher to devoid of details that are not necessary and to deal with any complexity so that solution can be developed. It should be noted that Sophisticated modeling software is helping international researchers to increase the pace of research in finding and producing vaccines.
Consider an entity set Person, with attributes social security number (ssn), name, nickname, address, and date of birth(dob). Assume that the following business rules hold: (1) no two persons have the same ssn; (2) no two persons have he same combination of name, address and dob. Further, assume that all persons have an ssn, a name and a dob, but that some persons might not have a nickname nor an address.
A) List all candidate keys and all their corresponding superkeys for this relation.
B) Write an appropriate create table statement that defines this entity set.
Answer:
[tex]\pi[/tex]
Explanation:
We have looked at several basic design tools, such as hierarchy charts, flowcharts, and pseudocode. Each of these tools provide a different view of the design as they work together to define the program. Explain the unique role that each design tool provides (concepts and/or information) to the design of the program.
Answer:
Answered below
Explanation:
Pseudocode is a language that program designers use to write the logic of the program or algorithms, which can later be implemented using any programming language of choice. It helps programmers focus on the logic of the program and not syntax.
Flowcharts are used to represent the flow of an algorithm, diagrammatically. It shows the sequence and steps an algorithm takes.
Hierarchy charts give a bird-eye view of the components of a program, from its modules, to classes to methods etc.
In which cloud service model, virtual machines are provisioned? Iaas
Answer:
SaaS is the cloud service in which virtual machines are provisioned
Write a method named removeRange that accepts an ArrayList of integers and two integer values min and max as parameters and removes all elements values in the range min through max (inclusive). For example, if an ArrayList named list stores [7, 9, 4, 2, 7, 7, 5, 3, 5, 1, 7, 8, 6, 7], the call of removeRange(list, 5, 7); should change the list to store [9, 4, 2, 3, 1, 8
Answer:
Answered below
Explanation:
public ArrayList<Integer> removeRange(ArrayList<Integer> X, int min, int max){
int i; int j;
//Variable to hold new list without elements in //given range.
ArrayList<Integer> newList = new ArrayList<Integer>();
//Nested loops to compare list elements to //range elements.
if(max >= min){
for( i = 0; i < x.length; I++){
for(j = min; j <= max; j++){
if( x [i] != j){
newList.add( x[i] );
}
}
}
return newList;
}
}
Consider the following incomplete method, which is intended to return the longest string in the string array words. Assume that the array contains at least one element.
public static String longestWord(String[] words)
{
/* missing declaration and initialization */
for (int k = 1; k < words.length; k++)
{
if (words[k].length() > longest.length())
{
longest = words[k];
}
}
return longest;
}
Which of the following can replace /* missing declaration and initialization */ so that the method will work as intended?
a. int longest = 0;
b. int longest = words[0].length();
c. String longest = "";
d. String longest = words[0];
e. String longest = words[1];
Answer:
String longest = "";
Explanation:
The initialization that would allow the method to work as intended would be the following
String longest = "";
This is because the method is looping through the array provided as an argument and comparing each word in the array with the word saved inside the variable called longest. The length of both are compared and if the word in the array is longer than the string saved in the variable longest then it is overwritten with the word in the array.
describe a sub routine
Explanation:
A routine or subroutine, also referred to as a function procedure and sub program is code called and executed anywhere in a program. FOr example a routine may be used to save a file or display the time.
According to the vulnerability assessment methodology, vulnerabilities are determined by which 2 factors?
Answer:
3 and 60!
Explanation:
Assume hosts A and B are each connected to a switch Svia 100-Mbps links. The propagation delay on each link is 25μs. The switch Sis a store-and-forward device and it requires a delay of 35μs to process a packet after is has received the last bit in the packet. Calculate the total time required to transmit 40,000 bits from Ato B in the following scenarios. (The total time is measured from the start of the transmission of the first bit at A, until the last bit is received at B. We always assume that links are bi-directional with the same transmission rate and propagation delay in each direction unless specifically instructed otherwise.)
Answer:
885 μs
Explanation:
Given that:
Switch via = 100 Mbps links
The propagation delay for each link = 25μs.
Retransmitting a received packet = 35μs
To determine:
The total time required to transmit 40,000 bits from A to B.
Considering the fact as a single packet:
Transmit Delay / link = size/bandwith
= 4×10⁴ bits / 100 × 10⁶ bits/sec
= 400 μs
The total transmission time = ( 2 × 400 + 2 × 25 + 35) μs
= (800 + 50 + 35) μs
= 885 μs
Create a file named homework_instructions.txt using VI editor and type in it all the submission instructions from page1 of this document. Save the file in a directory named homeworks that you would have created. Set the permissions for this file such that only you can edit the file while anybody can only read. Find and list (on the command prompt) all the statements that contain the word POINTS. Submit your answer as a description of what you did in a sequential manner
Answer:
mkdir homeworks // make a new directory called homeworks.
touch homework_instructions.txt //create a file called homework_instruction
sudo -i // login as root user with password.
chmod u+rwx homework_instructions.txt // allow user access all permissions
chmod go-wx homework_instructions.txt // remove write and execute permissions for group and others if present
chmod go+r homework_instructions.txt // adds read permission to group and others if absent.
grep POINTS homework_instructions.txt | ls -n
Explanation:
The Linux commands above first create a directory and create and save the homework_instructions.txt file in it. The sudo or su command is used to login as a root user to the system to access administrative privileges.
The user permission is configured to read, write and execute the text file while the group and others are only configured to read the file.
During TCP/IP communications between two network hosts, information is encapsulated on the sending host and decapsulated on the receiving host using the OSI model. Match the information format with the appropriate layer of the OSI model.
a. Packets
b. Segments
c. Bits
d. Frames
1. Session Layer
2. Transport Layer
3. Network Layer
4. Data Link Layer
5. Physical Layer
Answer:
a. Packets - Network layer
b. Segments - Transport layer
c. Bits - Physical layer
d. Frames - Data link layer
Explanation:
When TCP/IP protocols are used for communication between two network hosts, there is a process of coding and decoding also called encapsulation and decapsulation.
This ensures the information is not accessible by other parties except the two hosts involved.
Operating Systems Interconnected model (OSI) is used to standardise communication in a computing system.
There are 7 layers used in the OSI model:
1. Session Layer
2. Transport Layer
3. Network Layer
4. Data Link Layer
5. Physical Layer
6. Presentation layer
7. Application layer
The information formats given are matched as
a. Packets - Network layer
b. Segments - Transport layer
c. Bits - Physical layer
d. Frames - Data link layer
You are considering upgrading memory on a laptop. What are three attributes of currently installed memory that HWiNFO can give to help you with this decision?
Answer:
Some of the qualities of the installed memory which HWiNFO can reveal are:
Date of manufactureMemory type Speed of memoryExplanation:
HWiNFO is an open-source systems information app/tool which Windows users can utilize as they best wish. It helps to detect information about the make-up of computers especially hardware.
If you used HWiNFO to diagnose the memory, the following information will be called up:
the total size of the memory and its current performance settingsthe size of each module, its manufacturer, and model Date of manufactureMemory type Speed of memorysupported burst lengths and module timings, write recovery time etc.Cheers