Explanation:
Software is a data and information collection of computer.
It needs to protect computer from viruses.
I hope this helps you
As information technology has grown in sophistication, IT professionals have learned how to utilize __________ to look for hidden patterns and previously unknown relationships among data which can lead to better decision making. Multiple Choice data mining data hoarding knowledge management cloud computing
Answer:
data mining
Explanation:
Data mining can be defined as a process which typically involves extracting and analyzing data contained in large databases through the use of specialized software to generate new information.
Generally, computer database contain the records about all the data elements (objects) such as data relationships with other elements, ownership, type, size, primary keys etc. These records are stored and communicated to other data users when required or needed.
Hence, as a result of the advancement in information technology (IT), IT professionals have learned over time on how to utilize data mining as a technique to look for hidden patterns and previously unknown relationships that exists among data which is capable of leading to better decision making.
Furthermore, data mining is a process that has been in existence for a very long time and has significantly impacted workflow management, communication and other areas.
Mark is flying to Atlanta. The flight is completely full with 200 passengers. Mark notices he dropped his ticket while grabbing a snack before his flight. The ticket agent needs to verify he had a ticket to board the plane. What type of list would be beneficial in this situation?
Answer:
The list that would be helpful in this situation would be a list of people in the airport
Hope This Helps!!!
Prepare an algorithm and draw a corresponding flowchart to compute the sum and product of all prime numbers between 1 and 50.
Answer:
35 or it has to be 27 it's definitely one of those right there
A junior network administrator has used the wrong cable type to connect his or her computer to the administrative port on a router and cannot establish a terminal session with the device. What layer of the OSI reference model does this problem appear to reside at
Answer: Application Layer
Explanation: trust
What is the value of 25 x 103 = ________?
Answer:
2575
heres coorect
Answer:
2575
Explanation:
you just multiply.
According the SDLC phases, which among these activities see a substantial amount of automation initiatives?
A code generation
B release build
C application enhancement
D test case generation
E incident management
Answer:
d. test case generation
Explanation:
Testing should be automated, so that bugs and other errors can be identified without a human error and lack of concentration.
The System Development Life Cycle (SDLC) phase that has seen a substantial amount of automation is the A. code generation.
The main phases of the SDLC include the planning, analysis, design, development, testing, implementation, and maintenance phases.Using automation for the code generation will help eliminate human errors and increase efficiency.The code generation phase still requires some human input to ensure that user requirements are completely met.Thus, while automation will be useful with all the SDLC phases, substantial amount of automation initiatives have been seen with the code generation phase.
Learn more about SDLC phases at https://brainly.com/question/15074944
State the Data types with two examples each
Answer:
A string, for example, is a data type that is used to classify text and an integer is a data type used to classify whole numbers. When a programming language allows a variable of one data type to be used as if it were a value of another data type, the language is said to be weakly typed. Hope it help's! :D
To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent _____ relationships whenever possible.A) unary.B) binary.C) strong.D) weak.
Answer: binary
Explanation:
Conceptual design refers to the early phase of the design process, whereby the outlines of function are articulated. The conceptual design consist of the design of processes, interactions, and strategies. It is the first stage in the database design process.
The output of the conceptual design process describes the main data entities, and constraints of a particular problem domain. To simplify the conceptual design, most higher-order relationships are decomposed into appropriate equivalent binary relationships whenever possible.
In this progress report, you will be focusing on allowing one of the four transactions listed below to be completed by the user on one of his accounts: checking or savings. You will include defensive programming and error checking to ensure your program functions like an ATM machine would. The account details for your customer are as follows:CustomerUsernamePasswordSavings AccountChecking AccountRobert Brownrbrownblue123$2500.00$35.00For this progress report, update the Progress Report 2 Raptor program that allows the account owner to complete one of the 5 functions of the ATM:1 – Deposit (adding money to the account)2 – Withdrawal (removing money from the account)3 – Balance Inquiry (check current balance)4 – Transfer Balance (transfer balance from one account to another)5 – Log Out (exits/ends the program)After a transaction is completed, the program will update the running balance and give the customer a detailed description of the transaction. A customer cannot overdraft on their account; if they try to withdraw more money than there is, a warning will be given to the customer. Also note that the ATM does not distribute or collect coins – all monetary values are in whole dollars (e.g. an integer is an acceptable variable type). Any incorrect transaction types will display an appropriate message and count as a transaction.
Answer:
Please find the complete solution in the attached file.
Explanation:
In this question, the system for both the Savings account should also be chosen, the same should be done and for checking account. Will all stay same in.
Write a program that opens the salesdat.txt file and processes it contents. The program should display the following per store:
The total sales for each week. (Should print 5 values - one for each week). The average daily sales for each week. (Should print 5 values - one for each week).
The total sales for all the weeks. (Should print 1 value)
The average weekly sales. (Should print 1 value)
The week with the highest amount in sales. (Should print 1 week #)
The week with the lowest amount in sales. (Should print 1 week #)
The file contains the dollars amount of sales that a retail store made each day for a number of weeks. Each line in the file contains thirty five numbers, which are sales numbers for five weeks. The number are separated by space. Each line in the file represents a separate store.
//FileIO.java
import java.io.BufferedReader;
import java.io.FileReader;
import java.io.IOException;
public class FileIO {
//Franchise readData(String filename)
public static void main(String[] args) {
try {
FileReader file = new FileReader("Salesdat.txt");
BufferedReader buff = new BufferedReader(file);
boolean eof = false;
while (!eof) {
String line = buff.readLine();
if (line == null)
eof = true;
else
System.out.println(line);
}
buff.close();
} catch (IOException e) {
System.out.println("Error -- " + e.toString());
}
}
}
//Store.java
public class Store {
private float salesbyweek[][];
Store() {
salesbyweek = new float[5][7];
}
//getter and setters
//setsaleforweekdayintersection(int week, int day, float sale)
public void setsaleforweekdayintersection(int week, int day, float sale){
salesbyweek[week][day]=sale;
}
//float [] getsalesforentireweek(int week)
//float getsaleforweekdayintersection(int week, int day)
//businessmethod
//a. totalsalesforweek
//b. avgsalesforweek
//c. totalsalesforallweeks
//d. averageweeklysales
//e. weekwithhighestsaleamt
//f. weekwithlowestsaleamt
//analyzeresults //call a through f
//print()
}
//Franchise.java
public class Franchise {
private Store stores[];
public Franchise(int num) {
stores = new Store[num];
}
public Store getStores(int i) {
return stores[i];
}
public void setStores(Store stores, int i) {
this.stores[i] = stores;
}
}
//Driver.java
public class Driver {
public static void main(String[] args) {
}
}
Answer:
I'm going to try and help you with this question.
Explanation:
Just give me a few minutes.
Wilh the aid of the the diagram using an algorithm to calculate table 2 of multiplication
Answer:
See attachment for algorithm (flowchart)
Explanation:
The interpretation of the question is to design a flowchart for times 2 multiplication table (see attachment for the flowchart)
The explanation:
1. Start ---> Start the algorithm
2. num = 1 ---> Initializes num to 1
3. while num [tex]\le[/tex] 12 ---> The following loop is repeated while num is less than 12
3.1 print 2 * num ----> Print the current times 2 element
3.2 num++ ---> Increment num by 1
4. Stop ---> End the algorithm
Write code that prints: Ready! firstNumber ... 2 1 Run! Your code should contain a for loop. Print a newline after each number and after each line of text. Ex: If the input is: 3 the output is: Ready! 3 2 1 Run!
Answer:
Explanation:
The following code is written in Java. It asks the user to enter the first number. Then it saves that number in a variable called firstNumber. It then uses that number to loop backwards from that number to 1 and goes printing out the countdown text. A test case has been created and the output can be seen in the attached image below.
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.print("Enter First Number: ");
int firstNumber = in.nextInt();
System.out.println("Ready!");
for (int i=firstNumber; i>0; i--) {
System.out.println(i);
}
System.out.println("Run!");
}
}
I'm using Visual Studio to make a grocery app for school that includes usernames and passwords. I'm given all the code then it tells me to use search arrays to implement two functions. They should return true if the username and password is found in the arrays. But i can't seem to get the function and arrays right. Below is the code and I'm supposed to implement the array in the two empty functions at the bottom. Would really appreciate some help here, thanks
Module Main
Friend blnLoggedIn As Boolean
Dim arrUsernames() As String = {"Admin", "Clerk", "Manager"}
Dim arrPasswords() As String = {"password", "password2", "password3"}
Sub Login(username As String, password As String)
blnLoggedIn = False
If VerifyUsername(username) And VerifyPassword(password) Then
'Find index for username
Dim userIndex As Integer
For loopIndex = 0 To arrUsernames.Length - 1
If arrUsernames(loopIndex) = username Then
userIndex = loopIndex
Exit For
End If
Next
'Check for password match
If arrPasswords(userIndex) = password Then
blnLoggedIn = True
Else
MessageBox.Show("Incorrect password.")
End If
End If
End Sub
Function VerifyUsername(username As String) As Boolean
End Function
Function VerifyPassword(password As String) As Boolean
End Function
End Module
Answer:
VB:
Public Function VerifyUsername(ByVal username As String) As Boolean
For positionInUsernameArray As Integer = 0 To arrUsername.Length - 1
If positionInUsernameArray = arrUsername.Length Then Exit For
If username = arrUsername(positionInUsernameArray) Then
Return True
Else
Continue For
End If
Next
Return False
End Function
Public Function VerifyPassword(ByVal password As String) As Boolean
For positionInUsernameArray As Integer = 0 To arrPassword.Length - 1
If positionInUsernameArray = arrPassword.Length Then Exit For
If password = arrPassword(positionInUsernameArray) Then
Return True
Else
Continue For
End If
Next
Return False
End Function
C#:
sealed class Main
{
internal bool blnLoggedIn;
string[] arrUsername = new string[] { "Admin", "Clerk", "Manager" };
string[] arrPassword = new string[] { "password", "password2", "password3" };
public void Login(string username, string passowrd)
{
blnLoggedIn = false;
if (VerifyUsername(username) && VerifyPassword(passowrd))
{
// Find index for username
int userIndex = 0;
for (int loopIndex = 0; loopIndex <= arrUsername.Length - 1; loopIndex++)
{
if (arrUsername[loopIndex] == username)
{
userIndex = Convert.ToInt32(loopIndex);
break;
}
else continue;
}
// Check for password match
if (arrPassword[userIndex] == passowrd)
blnLoggedIn = true;
else
MessageBox.Show("Incorrect password");
}
}
public bool VerifyUsername(string username)
{
for (int positionInUsernameArray = 0; positionInUsernameArray <= arrUsername.Length - 1; positionInUsernameArray++)
{
if (positionInUsernameArray == arrUsername.Length)
break;
if (username == arrUsername[positionInUsernameArray])
return true;
else continue;
}
return false;
}
public bool VerifyPassword(string password)
{
for (int positionInUsernameArray = 0; positionInUsernameArray <= arrPassword.Length - 1; positionInUsernameArray++)
{
if (positionInUsernameArray == arrPassword.Length)
break;
if (password == arrPassword[positionInUsernameArray])
return true;
else continue;
}
return false;
}
}
Explanation:
First I created a for loop with a "positionInUsernameArray" and singed it a value of 0. Next I stated while positionInUsernameArraywas less than or equal to arrUsername.Length - 1, positionInUsernameArraywould increment.
Once the base for loop was in place I created two if statements. The first if statement determines if positionInUsernameArray is equal to arrUsername.Length, if so, the for loop breaks and the method returns false. The second if statement determines if the parameter is equal to the position in the arrUsername array, if so, the method would return true, otherwise the for loop will restart.
For the "VerifyPassword" method, I used the same method as "VerifyUsername" just I changed the variable names.
Hope this helped :) If it didn't please let me know what happened so I can fix the code.
Have a good day!
Gimme Shelter Roofers maintains a file of past customers, including a customer number, name, address, date of job, and price of job. It also maintains a file of estimates given for jobs not yet performed; this file contains a customer number, name, address, proposed date of job, and proposed price. Each file is in customer number order.
Required:
Design the logic that merges the two files to produce one combined file of all customers whether past or proposed with no duplicates; when a customer who has been given an estimate is also a past customer, use the proposed data.
Answer:
Hre the complete implementation of python code that reads two files and merges them together.
def merge_file(past_file_path,proposed_file_path, merged_file_path):
past_file_contents=load_file(past_file_path)
proposed_file_contents=load_file(proposed_file_path)
proposed_customer_name = []
for row in proposed_file_contents:
proposed_customer_name.append(row[1])
with open(merged_file_path,'w') as outputf:
outputf.write("Customer Number, Customer Name, Address\r\n")
for row in proposed_file_contents:
line = str(row[0]) +", " + str(row[1]) + ", " + str(row[2]) +"\r\n"
outputf.write(line)
for row in past_file_contents:
if row[1] in proposed_customer_name:
continue
else:
line = str(row[0]) + ", " + str(row[1]) + ", " + str(row[2]) + "\r\n"
outputf.write(line)
print("Files merged successfully!")
# reads the file and returns the content as 2D lists
def load_file(path):
file_contents = []
with open(path, 'r') as pastf:
for line in pastf:
cells = line.split(",")
row = []
for cell in cells:
if(cell.lower().strip()=="customer number"):
break
else:
row.append(cell.strip())
if len(row)>0:
file_contents.append(row)
return file_contents
past_file_path="F:\\Past Customer.txt"
proposed_file_path="F:\\Proposed Customer.txt"
merged_file_path="F:\\Merged File.txt"
merge_file(past_file_path,proposed_file_path,merged_file_path)
You have a contactless magnetic stripe and chip reader by Square. What type of wireless transmission does the device use to receive encrypted data
Answer:
Near field communication (NFC)
Explanation:
Near field communication (NFC) can be defined as a short-range high radio-frequency identification (RFID) wireless communication technology that is used for the exchange of data in a simple and secure form, especially for electronic devices within a distance of about 10 centimeters.
Also, Near field communication (NFC) can be used independently or in conjunction with other wireless communication technology such as Bluetooth.
Some of the areas in which Near field communication (NFC) is used are confirmation of tickets at a concert, payment of fares for public transport systems, check-in and check-out in hotels, viewing a map, etc.
Assuming you have a contactless magnetic stripe and chip reader by Square. Thus, the type of wireless transmission that this device use to receive encrypted data is near field communication (NFC).
What type of address do computers use to find something on a network?
Use MPLAB to write an asemply program to multipy two numbers (11111001) and (11111001). Then save the product in file reisters 0x50 and 0x51. Return a snapshot of your code, the SFR memory view showing the register used to store the multiplication, the file register view showing the product value.
CRM Technologies Build Versus Buy Analysis and Program Management You work for a large Boston based investment firm. They are currently using an older CRM (Client Relationship Management) system. It was home grown/built in house 10 years ago and has served them well but like all old systems, newer technologies have come along that are slicker, more integrated and higher functioning in general. Your boss has come to you and asked you to begin the process of researching solutions. You could
Build a new one – probably from scratch to use newer technologies
Analyze commercial purchase-able cloud based solutions
Required:
Create a framework to evaluate all/any short term and longer term costs associated with software ownership. Build versus buy. Creativity and original ideas and concepts are encouraged. Use , use lecture material and use your intuition.
Answer:
Following are the solution to the given question:
Explanation:
The cloud-based CRM system may best be used by companies because it has regular releases featuring additional features focused on customer listening and monitoring market dynamics as requirements.
The first stage issue could be the problem faced by the company. When your company demands were appropriately addressed within such a product not already covered by edge case, the decision to build a new CRM may well be justifiable.
Build:
The in-house IT teams have varying skills in CRM design, based on experience. Like databases, information development, and management.We have to construct the integration from scratch.CRM can be developed to match your current business & processes exactly.Whether there is any management issue, you can solve it.We only know in this how in-house CRM it will cost.Hardware & environment in-house systems have had to be configured.Buy:
CRM vendors create a browser system and have support personnel to even get experience.With integrating with the other systems, a CRM system is built.With the most industry in accordance, a vendor establishes a structure that can be modified according to company requirements.CRM bid committee client feedback improvements and fixes.The system is designed and marketed in this respect.And this is immediately hosted ready and hardly ever needs to be configured on this solution.The greatest option for a CRM system would be to establish a large company with many existing IT resources and save money by removing long-term costs for subscriptions. It's doesn't satisfy your requirements by using your existing system. If the company is tiny, you would be able to purchase a leading CRM system that is based on their demands.
Therefore the business pre-purchases most of the CRM system. But it is extremely vital to realize why companies find a custom system if you're choosing for the prebuild solution.
Unfortunately, not all firms were suited to the CRM system.
The largest companies employ Microsoft's dynamics dynamic 365 again for the smallest businesses.
This system below gives techniques to increase efficiency and profitability.
It can offer various benefits if businesses buy a ready-made CRM system
It has a lifetime permit- It is beneficial because you must only CRM once, but you must pay a significant amount for the product.
Or for a certain duration, such as month, year, membership - The cost may be affordable for a subscription but you should pay monthly.
Software copy to put on the computer of your firm.
Richard wants to create a cloud-based system that will be a centralized repository of log files from various servers in the organization. Which of the following is best used for this scenario?
a. Object
b. Block
c. LUN
d. CAD
Answer:
CAD ( d )
Explanation:
Richard should use CAD to create a cloud-based system, since he wants it to be a centralized repository of log files to be taken from the different servers associated with the organization
CAD ; Computer aided design software is the best software to be used because files created using CAD can be easily stored in cloud and it is easily accessible.
define natural language?
Answer: Natural Language is a language that is the native speech of a people. A language that has developed and evolved naturally, through use by human beings, as opposed to an invented or constructed language, as a computer programming.
Hope this helps!
The Fibonacci sequence begins with 0 and then 1 follows. All subsequent values are the sum of the previous two, for example: 0, 1, 1, 2, 3, 5, 8, 13. Complete the fibonacci() method, which takes in an index, n, and returns the nth value in the sequence. Any negative index values should return -1.
Ex: If the input is: 7
the out put is :fibonacci(7) is 13
import java.util.Scanner;
public class LabProgram {
public static int fibonacci(int n) {
/* Type your code here. */
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int startNum;
System.out.println("Enter your number: ");
startNum = scnr.nextInt();
System.out.println("fibonnaci(" + startNum + ") is " + fibonacci(startNum));
}
}
You could use recursion to write java method for computing fibonacci numbers. Though it will be inefficient for n > about 50, it will work.
public static int fibonacci(int n) {
if (n < 0) { return -1; }
if (n < 2) { return n; }
else { return fibonacci(n-1)+fibonacci(n-2); }
}
Hope this helps.
The current term of a Fibonacci series is derived by adding the two previous terms of its sequence; and the first two terms are 0 and 1.
The code segment (without comments) that completes the program is as follows:
int T1 = 0, T2 = 1, cT;
if (n < 0){
return -1; }
for (int i = 2; i <= n; i++) {
cT = T1 + T2;
T1 = T2;
T2 = cT; }
return T2;
With comments (to explain each line)
/*This declares the first term (T1), the second term (T2) and the current term (CT).
T1 and T2 are also initialized to 0 and 1, respectively
*/
int T1 = 0, T2 = 1, cT;
//This returns -1, if n is negative
if (n < 0){ return -1;
}
//The following iterates through n
for (int i = 2; i <= n; i++) {
//This calculates cT
cT = T1 + T2;
//This passes T2 to T1
T1 = T2;
//This passes cT to T2
T2 = cT;
}
//This returns the required term of the Fibonacci series
return T2;
At the end of the program, the nth term of the series would be returned to the main method for output.
Read more about Fibonacci series at:
https://brainly.com/question/24110383
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, which indicates a threshold. Output all integers less than or equal to that last threshold value. Assume that the list will always contain fewer than 20 integers.
Answer:
Ex: If the input is:
5 50 60 140 200 75 100
the output is:
50 60 75
The 5 indicates that there are five integers in the list, namely 50, 60, 140, 200, and 75. The 100 indicates that the program should output all integers less than or equal to 100, so the program outputs 50, 60, and 75.
For coding simplicity, follow every output value by a space, including the last one.
Such functionality is common on sites like Amazon, where a user can filter results.
#include <iostream>
#include <vector>
using namespace std;
int main() {
/* Type your code here. */
return 0;
}
If you could design your own home, what kinds of labor-saving computer network or data communications devices would you incorporate
Answer:
Access Points, Home Server, and Virtual Assistant/IOT connected devices
Explanation:
There are three main things that should be implemented/incorporated into your design and these are Access Points, Home Server, and Virtual Assistant/IOT connected devices. Access Points for Ethernet, and HDMI should be located in various important walls near outlets. This would allow you to easily connect your devices without having to run cables around the house. A home server will allow you to easily access your data from multiple devices in your home, and if you connect it to the internet you can access that info from anywhere around the world. Lastly, would be a virtual assistant with IOT connected devices. This would allow you to control various functions of your home with your voice including lights, temperature, and locks.
What are the trinity of the computer system
Answer:
I think the answers are input, processes, output
Which of the following is not a characteristic of Web 2.0?
a. blogs
O b. interactive comments being available on many websites
O c. mentorship programs taking place via the internet
d. social networking
Answer:
c. mentorship programs taking place via the internet
Explanation:
The World Wide Web (WWW) was created by Tim Berners-Lee in 1990, which eventually gave rise to the development of Web 2.0 in 1999.
Web 2.0 can be defined as a collection of internet software programs or applications which avails the end users the ability or opportunity to share files and resources, as well as enhance collaboration over the internet.
Basically, it's an evolution from a static worldwide web to a dynamic web that enhanced social media. Some of the examples of social media platforms (web 2.0) are You-Tube, Flickr, Go-ogle maps, Go-ogle docs, Face-book, Twit-ter, Insta-gram etc.
Some of the main characteristics of Web 2.0 are;
I. Social networking.
II. Blogging.
III. Interactive comments being available on many websites.
Also, most software applications developed for Web 2.0 avails its users the ability to synchronize with handheld or mobile devices such as smartphones.
However, mentorship programs taking place via the internet is not a characteristic of Web 2.0 but that of Web 3.0 (e-mentoring).
The option that is not a characteristic of Web 2.0 from the following is mentorship programs taking place via the internet.
What is Web 2.0?Web 2.0 speaks volumes about the Internet applications of the twenty-first millennium that have revolutionized the digital era. It is the second level of internet development.
It distinguishes the shift from static web 1.0 pages to engaging user-generated content. Web 2.0 websites have altered the way data is communicated and distributed. Web 2.0 emphasizes the following:
User-generated content, The convenience of use, andEnd-user inter-operability.Examples of Web 2.0 social media include:
Face book, Twi tter, Insta gram etcWith these social media and web 2.0 websites;
It is possible to create a personal blog,Interact with other users via comments, and Create a social network.Therefore, we can conclude that the one that is not part of the characteristics of Web 2.0 is mentorship programs taking place via the internet.
Learn more about web 2.0 here:
https://brainly.com/question/2780939
The data section called Transaction Growth shows how many boxed sets were sold each month. Keith entered a formula into the range O6:O10 to calculate the highest amount of each set sold over the course of the year. He notices that all of the values in the range are 1,408, even though more boxed sets than this were sold in some months. Edit the formula in cell O6 so that it uses relative references instead of absolute references for the range B6:M6, and then copy the formula from cell O6 to fill the range O7:O10 without formatting.
I cant figure out how in the world to change it to make the formula do what I want. I just blasted through Word, PowerPoint, Access and the first 2 parts of Excel in 30 hours, so maybe my brain is fried. any help is wanted!
Answer:
Please find the complete solution in the attached file.
Explanation:
In this question for a complete solution the table file is added please find it.
For this go to cell number O6
In which we modify the formula that is [tex]=MAX(B6:M6)[/tex]
After that, press enter at this value is calculated.
Then copy the formula to [tex]O7:O10[/tex]
Give your own example of a nested conditional that can be modified to become a single conditional, and show the equivalent single conditional.
Answer:
following are the program to the given question:
Program:
x = 0#defining an integer variable that holds a value
if x < 0:#defining if that checks x less than 0
print("This number ", x, " is negative.")#print value with the message
else:#defining else block
if x > 0:#defining if that checks x value greater than 0
print(x, " is positive")#print value with message
else:#defining else block
print(x, " is 0")#print value with message
if x < 0:#defining another if that checks x less than 0
print("This number ", x, " is negative.")
elif (x > 0):#defining elif block that check x value greater than 0
print(x, " is positive")#print value with message
else:#defining else block
print(x, " is 0")#print value with message
Output:
Please find the attachment file.
Explanation:
In this code, an x variable is defined which holds a value that is "0", in the next step nested conditional statement has used that checks the x variable value and uses the print method that compares the value and prints its value with the message.
In another conditional statement, it uses if that checks x value less than 0 and print value with the negative message.
In the elif block, it checks x value that is greater than 0 and prints the value with the positive message, and in the else block it will print the message that is 0.
In PyCharm, write a program that prompts the user for their name and age. Your program should then tell the user the year they were born. Here is a sample execution of the program with the user input in bold:What is your name? AmandaHow old are you? 15Hello Amanda! You were born in 2005.
Answer:
def main():
name = input("What is your name? ")
if not name == "" or "":
age = int(input("What is your age? "))
print("Hello " + name + "! You were born in " + str(2021 - age))
main()
Explanation:
Self explanatory
How many bits are there in two nibbles?
Answer:
8 bits
Explanation:
4 bits is 1 nibble
Write a program that defines an array of integers and a pointer to an integer. Make the pointer point to the beginning of the array. Then, fill the array with values using the pointer (Note: Do NOT use the array name.). Enhance the program by prompting the user for the values, again using the pointer, not the array name. Use pointer subscript notation to reference the values in the array.
Answer:
#include<iostream>
using namespace std;
int main()
{
int a[20],n;
int *p;
cout<<"\n enter how many values do you want to enter:";
cin>>n;
for(int i=0;i<n;i++)
{
cout<<"\n Enter the "<<i+1 <<"th value :";
cin>>*(p+i);
//reading the values into the array using pointer
}
cout<<"\n The values in the array using pointer is:\n";
for(int i=0;i<n;i++)
{
cout<<"\n (p+"<<i<<"): "<<*(p+i);
//here we can use both *(p+i) or p[i] both are pointer subscript notations
}
}
Output: