Answer:
Since the language isn’t stated, I’ll give answers in the two most-used (?) languages: Java and Python.
a) To print a’s value 3 times in the same line, in Java we would do:
System.out.print(a+a+a);
In Python, we would write:
print(a*3)
b) 2 times in different lines using one print statement
In Java, we would write
System.out.println(a+”\n”+a+”\n”+a);
In Python we would write:
print(a,a,a,sep=’/n’)
Hope this helps!
list three social implications of the wider range of piracy
Answer:
Street prices are affected by the extent of illegal commercial copying. The availability of inexpensive, high-quality illegal copies reduces the demand for legal copies to the extent that some users buy illegal copies instead of legal ones.
A type of sensor used to detect which way around a device is being held.
write difference between dvd r and dvd ram( Any 3 points or any a little big paraph for test)
Answer:
Following are the differences two the given questions:
Explanation:
DVD-R:
DVD-R is a common DVD recordable media that seems like a conventional DVD, and it can only be used once for writing data or analyzing information many times.It is identical to a regular DVD, however, it can be used to record data like a CD-R. Once a DVD-R is "burned," it cannot be read to anymore.There is a 650 nm range recording, nicknamed "Authoring DVD-R." "DVD-R for general" is another format with protection against duplicating, which records at 635 nm. Whilst DVD-R(a) and DVD-R(g) may read forms of one another, they cannot write formats of each other.DVD-RAM:
This is a technology for optical DVD storage where the information may be read, deleted & written constantly.It offers outstanding integrity of data, preservation, and avoidance of damages that can be used for basic storing data, data preservation, or data backup.Those disc drives can indeed be frequently recorded and deleted, and only compatible with DVD-RAM format devices produced by corporations.Your knowledge of algorithms helps you obtain an exciting job with the Acme Computer Company, along with a $10,000 signing bonus. You decide to invest this money with the goal of maximizing your return at the end of 10 years. You decide to use the Amalgamated Investment Company to manage your investments. Amalgamated Investments requires you to observe the following rules. It offers n different investments, numbered 1 through n. In each year j , investment i provides a return rate of rij . In other words, if you invest d dollars in investment i in year j , then at the end of year j, you have drij dollars. The return rates are guaranteed, that is, you are given all the return rates for the next 10 years for each investment. You make investment decisions only once per year. At the end of each year, you can leave the money made in the previous year in the same investments, or you can shift money to other investments, by either shifting money between existing investments or moving money to a new investement. If you do not move your money between two consecutive years, you pay a fee of f1 dollars, whereas if you switch your money, you pay a fee of f2 dollars, where f2 > f1.
a) The problem, as stated, allows you to invest your money in multiple investments in each year. Prove that there exists an optimal investment strategy that, in each year, puts all the money into a single investment. (Recall that an optimal investment strategy maximizes the amount of money after 10 years and is not concerned with any other objectives, such as minimizing risk.)
b) Prove that the problem of planning your optimal investment strategy exhibits optimal substructure.
c) Design an algorithm that plans your optimal investment strategy. What is the running time of your algorithm?
d) Suppose that Amalgamated Investments imposed the additional restriction that, at any point, you can have no more than $15,000 in any one investment. Show that the problem of maximizing your income at the end of 10 years no longer exhibits optimal substructure.
Answer:
C
Explanation:
write any four common hardware devices
Answer:
Input devices: For raw data input.
Processing devices: To process raw data instructions into information.
Output devices: To disseminate data and information.
Storage devices: For data and information retention.
A friend was just promoted to a new job that requires part-time travel, and he has also been promised a new laptop after his first month with the company. He needs an easy way to disconnect and reconnect all his peripheral devices to his old laptop. Devices include two external monitors (one HDMI, one DVI), a USB wireless mouse, USB wireless keyboard, Ethernet network, USB printer, headphones, and microphone. He has a budget of $100. What kind of device would best suit his needs
Answer:
usb-c hub
Explanation:
In this specific scenario, his best option would be a usb-c hub. This is a fairly cheap device which he can get one of many variations for less than $100. This device connects through a single USB-C port on the computer and has multiple USB ports on the hub. This allows you to connect all of your devices to the hub and connect/disconnect all of them instantly from the single USB-C cable connected to the laptop. Thanks to the new USB-C technology these hubs now usually include both HDMI and DVI inputs.
how to convert binary number into decimal number
Answer:
Multiplying by 2
Explanation:
The binary num number to decimal conversion is made by making the sum of each binary digits multiplying by 2 with raised to the power of the positional notation of digits .
Hope it is helpful to you
Answer:
HOW TO CONVERT BINARY INTO DECIMAL SYSTEM.
The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n):
decimal = d0×20 + d1×21 + d2×22 + ...
Example #1.SEE,
Find the decimal value of 1110012:
binary number: 1 1 1 0 0 1
power of 2: 25 24 23 22 21 20
1110012 = 1⋅25+1⋅24+1⋅23+0⋅22+0⋅21+1⋅20 = 5710
Explanation:
YOU WILL LEARN MORE IN HIGHER CLASSES.
list out the application of the computer and explain it?(and as the answer for this question as image)
Answer:
There are several applications of the computer; some of these applications are:
Word processorsGraphics applicationsWeb browsersGamingMedia playersAlarms and tasks schedulersEtc...Explanation:
The computer system can be applied in various fields (such as medicine, gaming, governments, education, etc.) for various purposes.
Each of these fields require computer software products and/or applications to carry out their activities. I've listed some applications, but there are several other applications.
My explanation could not be submitted; so, I added it as an attachment.
The HTML tag for the smallest heading is what
Answer:
The HTML <h1> to <h6> tag is used to define headings in an HTML document. <h1> defines largest heading and <h6> defines smallest heading.
Explanation:
Write a program to input value of three sides, to check triangle is triangle is possible to form of not
Answer:
Explanation:
import java.util.Scanner;
public class KboatTriangleAngle
{
public static void main(String args[]) {
Scanner in = new Scanner(System.in);
System.out.print("Enter first angle: ");
int a1 = in.nextInt();
System.out.print("Enter second angle: ");
int a2 = in.nextInt();
System.out.print("Enter third angle: ");
int a3 = in.nextInt();
int angleSum = a1 + a2 + a3;
if (angleSum == 180 && a1 > 0 && a2 > 0 && a3 > 0) {
if (a1 < 90 && a2 < 90 && a3 < 90) {
System.out.println("Acute-angled Triangle");
}
else if (a1 == 90 || a2 == 90 || a3 == 90) {
System.out.println("Right-angled Triangle");
}
else {
System.out.println("Obtuse-angled Triangle");
}
}
else {
System.out.println("Triangle not possible");
}
}
}
OUTPUT:
What is the name given to the role of digital media users that navigate the Web to find and consume content, but do not create content or contribute their opinions? critic organizer joiner spectator
Answer:
The answer is Spectator
It is D
Information Technology Question
What is the best topic in Information Technology ever?.
Answer:
I don't know about others but I like Binary
Answer:
Explanation:
5 Key Actions for IT Leaders for Effective Decision Making
Progressive leaders reengineer data and analytics to turn decision making into a competitive advantage.
This Gartner eBook shows you the power and potential of reengineered decision making and guides you to:
Identify what decisions to reengineer, and why
Prioritize decisions, analytics and data
Fit artificial intelligence into decision making
Rethink your D&A architecture
Build skills, habits and teams geared for effective decision making
Question 1 of 30
Match each type of tax with an example of its use.
Consumption tax
?
10% on profits from the
sale of a house
Capital gains tax
6% tax on all sales
Excise tax
$5 tax on a cable
television line
Payroll tax
15% tax to pay for Social
Security
Capital gains tax - 10% profits from sale of the house
Consumption tax - 6% tax on all sales
Excise tax - 5$ tax on cable tv line
Payroll tax - 15% tax to pay for social security
Since the rules cannot address all circumstances, the Code includes a conceptual framework approach for members to use to evaluate threats to compliance. Using this framework, Group of answer choices the first step is to discuss the threat with the client's management team. safeguards can be used to eliminate any threat. all threats must be completely eliminated. more than one safeguard may be necessary.
Answer:
more than one safeguard may be necessary.
Explanation:
The conceptual framework can be used to developed as well as construct through a process of the qualitative analysis. The approach includes the in the frameworks for identifying and evaluating the threats to compliance with the rules.
But since the rules formed cannot always address all the circumstances, the Code includes to evaluate the threats to the compliance of more than one safeguards that are necessary.
What is a status update?
A. An automatic enhancement to a computer's performance
B. Any new software that can be downloaded for free
C. A short post in which users write what they are doing
D. A news flash that announces new government posts
Sue follows these steps to create a chart in her presentation.
Step 1: Navigate to the Insert tab.
Step 2: Click the Chart button in the Illustrations command group.
Step 3: Choose the column chart.
Step 4: Click OK.
Which objects appear on the slide after she clicks OK? Check all that apply.
a fully completed table
a fully completed chart
a table with blank values
a chart with blank values
a table with sample values
a chart with sample values
Answer:
A chart with sample values
Answer:
A table with sample values
A chart with sample values
Explanation:
Argue whether we can infer anything about a candidate's ability to work in a professional environment based on his or her resume's formatting. Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.
Answer:
Candidates resume shows his way of presenting and organizing.
Explanation:
Resume formatting is an important part of a candidate's ability to work. In any professional environment, it's necessary to have a properly formatted resume. The resume formatting should be up to date with the latest information and data. The formatting involves the borders, headings, grammar, and spelling or typo errors, etc. But these mistakes can be easily avoided such as proofreading and removing unnecessary details and sloppy fronts.A college student borrowed his roommate's notebook computer without permission because he needed to write a term paper that was due the next day. While the computer was sitting open on the student's desk overnight, a water pipe in the ceiling began leaking and water dripped down on the computer, rendering it inoperable. A computer repair service estimated that it would cost $500 to repair all the damaged components. At the time it was damaged, the computer was worth $700. If the roommate sues the student for the damage caused to the computer, what will be the extent of his recovery
Answer: $700
Explanation:
Based on the information given in the question, if the roommate sues the student for the damage caused to the computer, the extent of his recovery will be $700.
In this scenario, the student has committed a conversion as the right of possession of the roommate's computer was interfered with by the student as he took it without the roommate's permission, which later sustained damage that was more than 70% of the computer's value. In such case, the extent of the recovery will be the fair market value which is $700.
You work for a retail clothing chain whose primary outlets are in shopping malls and are conducting an analysis of your customers and their preferences. You wish to find out if there are any particular activities that your customers engage in, or the types of purchases made in the month before or after purchasing select items from your store. To do this, you will want to use the data mining software you are using to do which of the following?
a. Identify clusters
b. Identify sequences
c. Classify data
d. Identify associations
Answer: Identifying sequences
Explanation:
Since the user wants to know if there are any particular activities that the customers engage in, or the types of purchases made in the month before or after purchasing select items from your store, therefore, the data mining software can be used in identifying sequences.
In this case, the data mining software can't be used in classifying data whether into structured or unstructured data. Furthermore, the identification of clusters and associations aren't the correct answers.
Therefore, the best option is B.
Rachel is planning on writing code that will have to do computations with very large
numbers. Which of the following is the most important issue she should check
before writing her code?
PLEASE
Group of answer choices.
A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.
B. Rachel should reset her machine to store data using hexadecimal values instead of binary.
C. Rachel should run a program to ensure that she has enough memory on her machine to write the program itself.
D. Rachel does not have to worry about the size of the numbers
Answer:
A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.
Explanation:
In Computer programming, a bit is a short word for the term binary digit and is primarily the basic (smallest) unit measurement of data or information.
A bit is a logical state which represents a single binary value of either one (1) or zero (0). This ultimately implies that, a single bit in computer science represents a boolean value of;
1. True or ON, which is equal to one (1).
2. False or OFF, which is equal to zero (0).
Additionally, a binary numbering represents all numeric values that are to be written in sequences of ones (1s) and zeroes (0s). Therefore, a binary number refers to any numerical value (number) that is expressed in base-2 numerical system; 0s and 1s.
Also, the total numbers which can be represented with an 8 bit binary (base-2) system is 256.
For all computations that would involve the use of very large numbers, it's important to look up how many bits are used to store integers and floating point numbers.
In this context, Rachel should ensure that she check how many bits the chosen high-level programming language uses to store integers and floating point numbers before writing her codes.
How to save a file for the first time?
Answer:
i have the website version of word but you want to click file and save as then click whatever option you need to personly if you are submitting online i download it to my computer then I will submit it from downloads. thats how i do it
if (accountBalance < 1000.00):
print(“SAVINGS3”)
elif (accountBalance < 2000.00):
print(“SAVINGS2”)
elif (accountBalance < 3000.00):
print(“SAVINGS1”)
else:
print(“SAVINGS”)
Answer:
See explanation
Explanation:
Given
The code segment
Required
The output
The code segment is incomplete, as the value of accountBalance is not given.
However, I will explain the given segment using few illustrations.
The following will be executed if accountBalance is less than 1000.00
if (accountBalance < 1000.00):
print(“SAVINGS3”)
Take for instance:
accountBalance = 500.0; "SAVINGS3" will be printed
The following will be executed if accountBalance is less than 2000.00 but more than or equal to 1000.00
elif (accountBalance < 2000.00):
print(“SAVINGS2”)
Take for instance:
accountBalance = 1500.0; "SAVINGS2" will be printed
The following will be executed if accountBalance is less than 3000.00 but more than or equal to 2000.00
elif (accountBalance < 3000.00):
print(“SAVINGS1”)
Take for instance:
accountBalance = 2500.0; "SAVINGS3" will be printed
Lastly, if accountBalance is 3000.00 or greater, the following will be executed
else:
print(“SAVINGS”)
Take for instance:
accountBalance = 3500.0; "SAVINGS" will be printed
i was able to solve the question :))
Answer:
ill take the points anyway
Explanation:
If you forget your privacy password what will you do if the ask this question what is the name of one of your teacher?
Explanation:
you write the name of your primary school teacher
A security question is a form of the shared secret used as an authenticator. The answer to questions asked by the system is personalized and can be answered by you only.
What are security questions?A security question is a form of the shared secret used as an authenticator. It is commonly used by banks, cable companies, and wireless providers as an extra security layer.
When you forget your privacy password, the system tries to help you to get your password back or reset it. But for this, it needs to make sure that it's you. Therefore, whenever you set a privacy password for the first time the system also asks you a few questions these questions are known as security questions and are present in the system for such situations. Therefore, the answer to questions asked by the system is personalized and can be answered by you only.
Learn more about the Security Questions:
https://brainly.com/question/15008697
#SPJ2
can someone please tell me the name of some of the best driving simulator games?
Answer:
Editor's Pick: Assetto Corsa. Assetto Corsa is a highly regarded racing game with a realistic force feedback feel.
Project Cars 2.
Gran Turismo Sport.
F1 2019.
Dirt Rally.
Explanation:
Return a version of the given string, where for every star (*) in the string the star and the chars immediately to its left and right are gone. So "ab*cd" yields "ad" and "ab**cd" also yields "ad". starOut("ab*cd") → "ad" starOut("ab**cd") → "ad" starOut("sm*eilly") → "silly"
Answer:
Explanation:
The following code is written in Java and uses a for loop with a series of IF ELSE statements to check the next and previous characters in a string. Checking to make sure that there are no asterix. If so it adds that character to the String variable output. Which is returned to the user at the end of the method. Two test cases have been created and the output can be seen in the attached image below.
class Brainly {
public static void main(String[] args) {
System.out.println(starOut("sm*eilly"));
System.out.println(starOut("ab**cd"));
}
public static String starOut(String str) {
String output = "";
for (int i = 0; i < str.length(); i++) {
if ((i != 0) && (i != str.length()-1)) {
if ((str.charAt(i-1) != '*') && (str.charAt(i+1) != '*') && (str.charAt(i) != '*')) {
output += str.charAt(i);
}
} else {
if ((i == 0) && (str.charAt(i) != '*') && (str.charAt(i+1) != '*')) {
output += str.charAt(i);
} else if ((i == str.length()-1) && (str.charAt(i) != '*') && (str.charAt(i-1) != '*')) {
output += str.charAt(i);
}
}
}
return output;
}
}
Phím tắt nào sau đây được sử dụng để chuyển sang các cửa sổ đang mở khác? A. Ctrl+Tab B. Shift+Tab C. Alt+Tab D. Window+Tab
Câu trả lời:
C. Alt + Tab
Giải trình:
Các phím tắt được sử dụng trên các hệ thống máy tính để điều hướng nhanh chóng chẳng hạn như chuyển đổi giữa các cửa sổ, thực hiện một số tác vụ và hoạt động nhất định, v.v. hoạt động. Trong cửa sổ, người ta có thể dễ dàng điều hướng và di chuyển qua các tab hoặc cửa sổ đang mở khác nhau bằng cách sử dụng nút 'Alt và Tab'. Sau khi nhấn nút Alt, tab sẽ được nhấp để điều hướng qua tất cả các cửa sổ đang mở khác nhau.
What is difference between base font and font tags
Basefont tag is used to define default font, size and color for the whole text in an html document. On the other hand font tag is used to define font, size, color etc for a text which enclosed with in this tag. ... On the other hand you have to enclose the text within the font tag to apply changes.
#LETS STUDY#BRAINLEST LOVE❣️An open area is one that has something in the path of travel that blocks the continuation of travel in that lane. a) True b) False 2 Questions 2 A driver's emotions usually have no impacton his or her ability to effectively implement a search system. a) True b) False 3 Question 3 Glare is enhanced by heat and impairs a driver's visibility. a) True b) False 4 Question 4 A driver must maintain which of the following to ensure implementation of an effective space management system
Answer:
Question 1. B) False
Question 2. B) False
Question 3. A) True
Question 4.
a) Looking ahead
b) Lookout for hazards
c) Focus on the big picture
d) Ensure visibility of her or his vehicle
e) Always have an exit route for safety
Explanation:
Question 1. An open area or condition is a availability of a large area space to drive unrestricted. In an open area, the road ahead is open space and there is continuation of the lane of travel and there is nothing that blocks the road
Therefore, the correct option is B) False
Question 2. A drivers emotion such as anger has remarkable influence on the behavior while driving such that it can impact on his or her ability for appropriate search system implementation which is response based
Therefore, the correct option is B) False
Question 3. Glare sensation is exacerbated by the presence of increased heat, an obstructs the view
Therefore, the correct option is A) True
Question 4. Effective space management is implemented by a driver through;
a) Looking ahead of the vehicles n front
b) Maintaining constant lookout for hazards
c) Ensure that the big picture is in focus
d) Ensure that the vehicle he or she is driving can be seen
e) Ensure that an escape route is always available
What is a compiler?
a tool used to integrate multiple software programs
a tool used to extract a single software program from an integrated collection of programs
a computer software application that translates binary computer machine language into a computer programming language
a computer software application that translates a computer programming language into a binary computer machine language
Answer:
A computer software application that translates a computer programming language into a binary computer machine language
Explanation:
ita in the answer
Answer:
c
Explanation:
im god