Write a Java program to compute the sum of the upper-rounded value of the number 4.2 and the square of 25. Display all the three values to the user on different lines, without any assignment operation in the entire program.​


please answer.

Answers

Answer 1

Answer:

how do expect someone to write an entire java script code for you

Explanation:


Related Questions

You are an IT technician for a small computer store. You are designing a new gaming PC for a customer. You need to ensure that it provides the capabilities that will be needed by this type of PC. Which of the following should be a concern?

a. motherboard
b. CPU
c. graphics card
d. sound card

Answers

Answer:

all options

a, b and c the most important

Explanation:

Which decimal value (base 10) is equal to the binary number 1012?

Answers

Answer:

The decimal value of 101₂² base 2 = 25 base 10

Explanation:

The number 101₂² in decimal value is found as follows;

101₂ × 101₂ = 101₂ + 0₂ + 10100₂

We note that in 101 + 10100 the resultant 2 in the hundred position will have to be converted to a zero while carrying over 1 to the thousand position to give;

101₂ + 0₂ + 10100₂ = 11001₂

Therefore;

101₂² =  11001₂

We now convert the result of the square of the base 2 number, 101², which is 11001₂ to base 10 as follows;

Therefore converting 11001₂ to base 10 gives;

11001₂= 1 × 2⁴ + 1 × 2³ + 0 × 2² + 0 × 2 ¹ + 1 × 2⁰

Which gives;

16 + 8 + 0 + 0 + 1 = 25₁₀.

The decimal value in base 10 that is equal to the binary number 101_2 is; 5

We want to convert 101_2 from binary to decimal.

To do this we will follow the procedure as follows;

(1 × 2²) + (0 × 2¹) + (1 × 2^(0))

>> (1 × 4) + (0 × 2) + (1 × 1)

>> 4 + 0 + 1

>> 5

In conclusion, the decimal value we got for the binary number 101_2 is 5

Read more about binary to decimal conversion at; https://brainly.com/question/17546250

When does the memory space allocated to local variables and parameters get deallocated? When the application ends, the memory space allocated to local variables and parameters of both the called function and calling program is deallocated. O When the calling program ends, the memory space allocated to local variables and parameters of the called function is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the calling program is deallocated. When the called function ends, the memory space allocated to local variables and parameters of the called function is deallocated. O

Answers

Answer:

The answer is "Option d".

Explanation:

In the question, the numbering of the choices is missing so, in the attached the file defines it numbering after that we provide its solution:  

In the question the "option d" is correct, because when we call the function "stop", it ends the store space assigned to the local variables and "called" function parameters, since the variables are no longer used, so the memory is released and once the process is called, the memory is reassigned and then once again assigned when the function ends.

&. Give three differences between a
web browser
and web page​

Answers

Answer:

The three differences between the Web page and Web browser are given below.

Explanation:

A web browser seems to be a search application that enables internet connectivity. A web-page seems to be a single document containing Website content.A web browser, including Google Chrome as well as Firefox, has become a program on oneself machine. A web page, like Google or Twitter, is what you will need the application to accessWeb browsers can view the contents of the site via the application. Webpage should be any web page and sometimes web destination. If something is opened on the internet, it's a website.

are the network administrator for your company. You are installing a new printer in the network. When you check the print server properties, it displays the following error: Server properties cannot be viewed. The print spooler service is not running. What should you do to resolve the issue using the least administrative effort

Answers

Answer:

Will have to run the net start spooler command.

Explanation:

The printer spooler seems to be accountable for overseeing incoming faxes that have been in effect intended for handling by the printer. Whether this device stops operating, your printer won't publish documentation as well as the machine may not notice it either.To solve these problems, you'll need to run the net start spooler command using the least administrative effort.

An application programming interface (API) is: Group of answer choices the code the application software needs in order to interact with the CPU the currently active part of an application all other answers are incorrect the code to interface between an application and a peripheral like a printer the code to interface between an application and RAM

Answers

Answer:

The code the application software needs in order to interact with the CPU

Explanation:

What are the Typical application
of mini computer​

Answers

Answer:

calls, messages, photos, emails

Explanation:

as in mobile phones

Answer:Minicomputers are used for scientific and engineering computations, business-transaction processing, file handling, and database management, and are often now referred to as small or midsize servers.

Explanation:

When you register to take classes, the registrar office pulls up a file full of
information about you, including your contact information, the list of classes you are
currently taking, classes you have completed, and your grades. What type of
productivity software is best suited for creating and storing this kind of information?
Spreadsheet
Word processing
Presentation
Database

Answers

Answer:

Database

Explanation:

Database software is intended to develop databases and to maintain, alter, access, and obtain useful data stored within them. It is often used to store, manage, and organize information such as field names, documents, and file structures in a database. it helps users to create their own databases to meet their business specifications and requirements. It provides data flexibility, as the storage process and formats can be modified without changing the entire program inside the database.

Question 19 :Rachel, a database administrator, has created a database for her website. It contains pictures of vacations that people have uploaded. In the database, pictures have associated information about who uploaded them and the date. What is this an example of?

Answers

Answer:

The correct answer will be "Semi-structured data".

Explanation:

Semi-structured data comprise evidence that just isn't data collected in some kind of a traditional database management system, but then neither is content typed. It's indeed descriptive information or structured data, but that's not organized into a theoretical design, like a chart or perhaps a graph centered through an entity.

So that the given scenario is the example of semi-structured data.

Technician A says that OBDI and OBDII use different DLC connectors. Technician B says that OBDII standardizes the designations for diagnostic trouble codes (DTCs). Who is correct? Technician A Technician B Both Technician A and Technician B Neither Technician A nor Technician B

Answers

Answer:

The answer is "Technician B"

Explanation:

The OBDII is a standardized, automated framework which the USA EPA had approved and installed into its whole year of modeling (MY) 1996 and then into modern light-duty vehicles and trucks, recognized as "on-board diagnostics II."  

The DTC framework is a set of problematic diagnostic codes that used alert you if a vehicle is unable to operate using an on-board Diagnostic System. If the system of the automobile identifies a problem, a special DTC code is generated as well as a position sensor is sent to the instrument cluster, that's why Technician B is correct.

IblMessage.txt=welcome to fiji.what is the error in the coding and what type of error is it?(explain)​

Answers

Answer:

The correct syntax (assuming WinForms) is

lblMessage.Text = "Welcome to fiji";

The given statement fails to follow the syntax of literal strings, which should be in quotation marks. (depending on the framework and programming language, the txt property may also be incorrect, as well as the missing semi-colon).

Who are the founders of Microsoft?

Answers

Answer:

BILL GATES & PAUL ALLEN

Explanation:

HOPE IT HELPS!!!!!!!!!!!!!!!!!!!!!

ou have spent the last two hours creating a report in a file and afterwards you use cat to create a new file. Unfortunately the new file name you used was the same as the name you used for the report, and now your report is gone. What should you do next time to prevent this from happening

Answers

Answer:

The answer is "Set -o noclobber command before starting."

Explanation:

Whenever this prevent is happening we set the -o noclobber command, this command( -o noclobber ) is used to prevents its > driver to overwrite system files.  Or whenever the user may want to violate their file in certain cases. For this case, users can use > instead of just turn  -o noclobber off! Push the formal file.

Xavier wants to use a solver to find optimal solutions for a decision problem. What should he select as X in the series of clicks for this purpose: Data tab > X > Solver > Enter Solver parameters (read on) > Check "Make Unconstrained Variables Non-Negative" > Select "Simplex LP" > Solve?

Answers

Answer:

The answer is "Analyze"

Explanation:

The term Analyze is the use of a machine or critical thinking to enable more effective management by companies and their information systems, in which the Xavier wishes to use a method for solving to find ideal decision-making strategies. Its object of the series analyses X selects, that's why the "Analyze " is correct.

As you're helping a user configure her e-mail over the phone, she remarks that the IP address is different than it was when she checked last week. This surprises her, since she didn't make any changes to her TCP/IP configuration. The user has had no problems running her web browser. You immediately know that:

Answers

Answer:

D. Her computer is a DHCP client.

Explanation:

Since in the question it is mentioned that IP address is different as compared in the previous week also the user did not make any changes with respect to the TCP/IP configuration and the system is working well

So this situation represents that the user computer is a client of DHCP as it deals with the client-server protocol in which it automatically generates the IP i.e Internet protocol along with the IP address

Hence, the correct option is d.

How are procedural and object-oriented programming approaches similar?
A. Both approaches are used when writing programs.
B. Both approaches focus on functions, modules, and processes to write programs.
C. Both approaches focus on calling attributes and behaviors to write programs.
D. Both approaches require little planning in order to write completed programs.

Answers

Answer:

A. Both approaches are used when writing programs.

Explanation:

Procedural programming (PP), also known as inline programming takes a top-down approach. It is about writing a list of instructions to tell the computer what to do step by step. It relies on procedures or routines. Object-oriented programming (OOP) is about encapsulating data and behavior into objects.

Hope this helps....

Have a nice day!!!!

Answer:

A

Explanation:

i wiil mark brainlist ​

Answers

CAD is the answer you require, but it may also be Spread sheet

Hope this helped ♥︎

Identify characteristics of top-down programming design. Choose all that apply.
It assumes the problem has a simple solution.
It is good for running simple calculations.
It is simple to modify if steps change.
It is made of one or more modules.
It breaks a task into simpler and simpler steps.

Answers

Answer:

The correct option is;

It is made of one or more modules.

It breaks a task into simpler and simpler steps.

Explanation:

The implementation of top-down programming approach begins from the system defining basic modules and progresses by putting in place intermediate modules that take charge of more detailed and complex activities and processes. The intermediate modules are further streamlined into more specific programming

Therefore, the top-down programming is made of one or more modules that breaks a task into simpler and simpler steps.

Answer:

A, B, D and E

Explanation:

what are the disadvantageous of emails

Answers

Answer:

it could lead to overload of information.. wastage information.it can cause misunderstanding and disabilities between both person.

Need internet connection.without it can't use.

it can be hacked.and also lack the personal touch..

Answer:

they can cause misunderstandings and people read with diffrent

moods

Explanation:

Chris needs to create a simple web page with HTML. Which tool will he use? HyperText Web browser Text editor Operating software WILL GIVE 100 AND BRAINLIEST!!!!!!!!!!!!!!!!!!!!!!!!1

Answers

Answer:

The answer is "Text editor".

Explanation:

It is a computer program, which is used to provide editing on the plain text, and for this editing, we use a text editor. This tool differs from word processors software because it doesn't add additional text editing metals. In this tool, we also write the HTML code, and the incorrect choice can be defined as follows:

HyperText is a wrong choice because in these two or more pages are linked and it is used to move from one page to another. The Web browser is also a wrong choice because it is used to display the design of the web page. Operating software is also a wrong choice because it system software in which all things are done.  

Answer:

text editor

Explanation:

You have just purchased a motherboard that has an LGA 1156 socket for an Intel Pentium processor. What type of memory modules will you most likely need for this motherboard? A. DIP B. SIMM C. DIMM D. SODIMM

Answers

Answer:

The answer is "Option C"

Explanation:

The term DIMM  stands for the Dual In-Line Memory Module, which is a kind of memory, that is used in computers.  It is a small board of flash memory that uses the 64-bit memory bus because the SIMM has only a 32-bit path. It enables DIMMs to simultaneously transfer more information, and the wrong choices can be defined as follows:

In choice A, It is used in sockets, that's why it is wrong. In choice B, It is wrong because it is used in 32 bits only. In choice D, It is wrong because it is used in the expansion of memory.  

All of the following statements about MapReduce are true EXCEPT: MapReduce handles the complexities of network communication. MapReduce is a general-purpose execution engine. MapReduce handles parallel programming. MapReduce runs without fault tolerance.

Answers

Answer:

The correct option is;

MapReduce runs without fault tolerance

Explanation:

Map Reduce is a technique of processing or a framework of software, that is geared towards managing, sorting and handling large data by working in the Map and Reduce phases where the map function involves the dividing, filtering and sorting of the data and mapping of the split data while the reduce method involves the rearranging, summary activities having the data reduced.

Your computer science teacher asks you to sample a black and white image that is 4" x 6". How would you sample the image to provide a good digital approximation using the pixelation widget? What sample size would you use? How would your decision affect the digital representation?

Answers

Answer:

The largest dimensions we can make of an image with the pixelation widget is 255*255.

When an image is resized, the number of pixels in the image may be reduced or increased, which causes the image to be resampled. Resampling changes the file size.

Explanation: This is all I could find. I hope its helps Sorry.

The sample size that would provide a good digital approx. will be  255 x 255

When resizing images using the pixelation widget, the pixels of the image will either reduce or increase and the reduction/increase in the pixels will have an effect ( blurry effect ) on the image when viewed by the user.  also

when an image is resized the size of original size is either larger or smaller than the resampled image.

Hence to provide a good digital approx. using the pixelation widget from an image 4" x 6" is by using a sample size of 255 x 255

Note : A picture showing the effect of pixelation is attached below

learn more : https://brainly.com/question/19038576

What are the file extensions of files created with: - Microsoft Office Access - Microsoft Office Publisher

Answers

Answer:

The file extensions of files created with Microsoft Office Access is .adb for Access project

The file extension of files created with Microsoft publisher is .pub

Explanation:

The file extensions of files created with Microsoft Office Access are;

.adp = Access project

.adn = Access blank project template

.accdb= Access database for 2007, 2010, 2013, and 2016 versions

Other file extensions include

laccdb, .accdw, .accdc, .accda, .accdr, .accdt, .mdb, .mda, .mdw, .mdf, .mde, .accde, .mam, .mad, .maq, .mar, .mat, .maf

The file extension of files created with Microsoft publisher is the .pub

What concept or principle requires layered, complementary controls sufficient to detect and deter infiltration and exploitation of an organization, its information systems, and its facilities?

Answers

Answer:

security In-depth

Explanation:

The security in depth is a principle in which a sequence of safeguarding channels is used to secure the important data and information i.e valuation to the company. It also increased the security for a company as a whole

Therefore in the given situation, the  security In-depth required to layered the safeguarding channels to detect the infiltration

Hence, the  security In-depth is the correct answer

how can i earn money?​

Answers

Answer:

You could get a job.

Explanation:

I know that it is sometimes impossible to get a job, because you are unable to get to anywhere, maybe because your family does not own a car, and it is too far to walk, so you could ask your neighbors if they need anything done, and they might pay you. If these don't work, then you could see if you could get a friend to drive you, and get a job, and see if they will be your taxi, but you pay them money for gas.

Hope that helps.

Answer:

maybe babysit

Explanation:

i earned a lot of money

Which is true of ASCII and Unicode?


Every character written in Unicode can be represented in ASCII.

Every character written in ASCII can be represented using Unicode.

ASCII requires more bytes than Unicode.

ASCII and Unicode both define accented characters.

Answers

Answer:

The correct options is;

Every character written in A S C I I can be represented using Unicode

Explanation:

All characters found in A S C I I can be found in Unicode such that A S C I I is a subset of Unicode whereby the meaning of the numbers from 0 to 127 are the same in both A S C I I and Unicode

The size of the A S C I I character in 8-bit A S C I I encoding is 8 bits while a Unicode U T F - 8 encoding has between 8 bits (1 byte) and 32 bits (4-bytes)

A S C I I assigns only 127 of the 255 possible numbers that can be stored in an 8-bits character, where the spare characters are then used by P C s for accented characters, therefore, it A S C I I does not define accented characters

Answer:

Every character written in ASCII can be represented using Unicode

Explanation:

What does "CYBER-COCKROACH" mean??

Answers

Answer:

The cyber cockroach is the presented external anatomy of a cockroach, with labeled views of photographs from diverse angles in place of diagrams. The cyber cockroach can be navigated around the head, thorax and abdomen with possible close up views of the legs and the images are downloadable

Cyber cockroach is a useful tool for the study of insects of the Blattodea order

Explanation:

You are trying to log in to your old computer, and can't remember the password. You sit for hours making random guesses... I'm sure you thought it was funny back when you came up with that password (chEEzburg3rz). Write a program that tells you whether your guess is correct. If it is correct, it should grant access like this: Enter password: chEEzburg3rz Access granted....
If your guess is incorrect it should deny access like this:
Enter password: lolcatZ
Access denied

Answers

Answer:

The program written in Python is as follows (See Explanation Section for detailed explanation)

password = "chEEzburg3rz"

userpassword = input("Enter Password: ")

if userpassword == password:

     print("Access granted....")

else:

     print("Access Denied")

Explanation:

The programming language was not stated; However, I answered your question using Python

The line initializes the password to chEEzburg3rz"

password = "chEEzburg3rz"

This line prompts user for input

userpassword = input("Enter Password: ")

This if condition checks if user input corresponds with the initialized password

if userpassword == password:

     print("Access granted....")  If yes, this line is executed

else:

     print("Access Denied")  If otherwise, this line is executed

Yara needs to provide step-by-step instructions to her staff on how to use a new system for
conducting performance reviews. What is the best tool for communicating this information?
A) Spreadsheet
B) Email
C) Direct messaging
D) Slides

Answers

Answer:

D) Slides

Explanation:

A slide is exactly one page of presentation commonly used in PowerPoint. It is usually shown via a series of image slides on a projected screen.

This is the best tool Yara needs to provide step-by-step instructions to her staff on how to use a new system for conducting performance reviews.

Slides would be very helpful as they would show the steps one at a time to the members of Yara's staff so they can learn better and faster.

Other Questions
The owner of a deli gathered data about the number of flavored bagels and plain bagels sold during the first hour of business for several days. He organized the data in a scatter plot, with x representing the number of flavored bagels and y representing the number of plain bagels sold. Then he used a graphing tool to find the equation of the line of best fit: y = 1.731x + 6.697. Based on the line of best fit, approximately how many flavored bagels can the deli expect to sell during an hour when 50 plain bagels are sold? A soft drink contains 63 g of sugar in 378 g of H2O. What is the concentration of sugar in the soft drink in mass percent Suver Corporation has a standard costing system. The following data are available for June: Actual quantity of direct materials purchased 24,000 pounds Standard price of direct materials $ 6.00 per pound Material price variance $ 6,000 Unfavorable Material quantity variance $ 2,400 Favorable The actual price per pound of direct materials purchased in June was: Gerbils were used to assess the effect of Natural Neutral, a drug designed to reduce emotionality in high-drive people. Each of 20 gerbils spent 10 solitary minutes in an open field. The investigator recorded the number of fecal boluses for each animal. Then each animal was given an injection of Natural Neutral and the open field task was repeated.No Drug Drug mean number of boluse 6 8standard deviation of boluses 2 2The design of this study is:______a. paired samples;b. independent samples;c. testing the significance of a correlation;d. none of the other alternatives are correct. Elite Apparel Inc. is considering two investment projects. The estimated net cash flows from each project are as follows:Year Plant Expansion Retail Store Expansion1 $ 450,000 $ 500,000 2 450,000 400,0003 340,000 350,0004 280,000 250,0005 180,000 200,000Total $1,700,000 $1,700,000Each project requires an investment of $900,000. A rate of 15% has been selected for the net present value analysis.Present Value of $1 at Compound InterestYear 6% 10% 12% 15% 20%1 0.943 0.909 0.893 0.870 0.8332 0.890 0.826 0.797 0.756 0.6943 0.840 0.751 0.712 0.658 0.5794 0.792 0.683 0.636 0.572 0.4825 0.747 0.621 0.567 0.497 0.4026 0.705 0.564 0.507 0.432 0.3357 0.665 0.513 0.452 0.376 0.2798 0.627 0.467 0.404 0.327 0.2339 0.592 0.424 0.361 0.284 0.19410 0.558 0.386 0.322 0.247 0.162Required:1a. Compute the cash payback period for each project. Cash Payback PeriodPlant Expansion < >1 year2 years3 years4 years5 yearsRetail Store Expansion < >1 year2 years3 years4 years5 years1b. Compute the net present value. Use the present value of $1 table above. If required, round to the nearest dollar. Plant Expansion Retail Store ExpansionPresent value of net cash flow total $ $Less amount to be invested $ $Net present value $ $2. Because of the timing of the receipt of the net cash flows, theplant expansionretail store expansion Name:Unit 1: Geometry BasicsDate:Per: Homework 3: Distance & Midpoint Formulas** This is a 2-page document! **Directions: Find the distance between each pair of points.1. 1-4.6) and (3.-7)2. (-6,-5) and (2.0)M=(-12,-1)M=4. (0.-8) and (3.2)3. (-1, 4) and (1-1)5..Directions: Find the coordinates of the midpoint of the segment given its endpoints.6. /15, 8) and B(-1,-4)7. M(-5,9) and N[-2.7)8. P(-3,-7) and Q13.-5)9. F12.-6) and G(-8,5)Gina Whion (All Things Algobro. LLC) 2014-2017 A firm's diversification strategy is most likely to add value if:________. a. There exist economies of scope between diversified business units. b. The firm has a comprehensive business portfolio in different industries. c. The diversification strategy enables the firm to enter several unrelated businesses. d. It enters unfamiliar market through aggressive acquisitions. PLEASE ANSWER !! WILL GIVE BRAINLIEST! Consider the exponential functions f, g, and h, defined as shown. Place the three functions in order from the fastest decreasing average rate of change to the slowest decreasing average rate of change on the interval [0, 3]. As a factor of production how is capital created A. by adding land to entreprenurship B. by adding human labor to land C. by removing land from services D. by using labor to create services All the following statements concerning universal life insurance are correct EXCEPT: Group of answer choices Interest credited to the cash value is taxable to a policyowner in the year credited. The policyowner can add to a policy's cash value at any time subject to policy guidelines. Interest is credited to the policy's cash value each month. Withdrawals from a policy's cash value reduce the death benefit. Select all transformations that carry rectangleABCD onto itself.A. Rotate by 90 degrees clockwise using center P.B. Rotate by 180 degrees clockwise using center P.C. Reflect across line m.D. Reflect across diagonal AC.E. Translate by the directed line segment from A to B. Use the distributive property to rewrite the given expression without parentheses.7(x+2)7(x+2) = HELP PRECALC NEED IN PROOF FORM How does it do? thank you very muchsorry this subject is physic. If 4SINB=3SIN(2A+B) :Prove that:7COT(A+B)=COTA Which equation represents this statement: A number minus 6 is 168? 6 n = 168 n 6 = 168 n 6 = 168 6n = 168 For each function, determine if it intersects or is parallel to the line y = -1.5x. If itintersects the line, find the intersection point.y =0.5x +4PLEASE ANSWER I HAVE 25 MINUTES LEFT PLEASE Explain why the first ionisation energy of helium islarger than that of hydrogen. At an output level of 53,000 units, you calculate that the degree of operating leverage is 3.21. If output rises to 57,000 units, what will the percentage change in operating cash flow be? Suppose fixed costs are $175,000. What is the operating cash flow at 46,000 units? The degree of operating leverage? that the degree of operating Indigo Corporation had the following tax information.Year Taxable Income Tax Rate Taxes Paid2015 $294,000 35% $102,900 2016 332,000 30% 99,600 2017 399,000 30% 119,700In 2018, Indigo suffered a net operating loss of $487,000, which it elected to carry back. The 2018 enacted tax rate is 26%.Prepare Indigos entry to record the effect of the loss carryback. Account titles Debit Credit