Write a program that prompts the user to enter a positive integer and displays all its smallest factors in decreasing order.

Answers

Answer 1

Answer:

<fact>[ZRjKt9sw6V(gh6E)ehNM3]<zip>

Explanation:


Related Questions

what is IBM 1401 used for? Write your opinion.​

Answers

Explanation:

The 1401 was a “stored program computer,” allowing programmers to write (and share) applications loaded into the machine from punched cards or magnetic tape, all without the need to physically reconfigure the machine for each task.

Write a program that takes a date as input and outputs the date's season. The input is an integer to represent the month and an integer to represent the day. Ex: If the input is: 4 11 the output is: spring In addition, check if both integers are valid (an actual month and day). Ex: If the input is: 14 65 the output is: invalid The dates for each season are: spring: March 20 - June 20 summer: June 21 - September 21 autumn: September 22 - December 20 winter: December 21 - March 19

Answers

Answer:

Explanation:

The following program is written in Java. It is a function that takes in the two parameters, combines them as a String, turns the combined String back into an integer, and uses a series of IF statements to check the parameters and determine which season it belongs to. Then it prints the season to the screen. The code has been tested with the example provided in the question and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       getSeason(4, 65);

       getSeason(4, 11);

   }

   public static void getSeason(int month, int day) {

       String combined = String.valueOf(month) + String.valueOf(day);

       int combinedInt = Integer.parseInt(combined);

       if ((month > 0 && month < 12) && (day > 0 && day < 31)) {

           if ((combinedInt >= 320) && (combinedInt <= 620)) {

               System.out.println("The Season is Spring");

           } else if ((combinedInt >= 621) && (combinedInt <= 921)) {

               System.out.println("The Season is Summer");

           } else if ((combinedInt >= 922) && (combinedInt <= 1220)) {

               System.out.println("The season is Autumn");

           } else {

               System.out.println("The Season is Winter");

           }

       } else {

           System.out.println("Invalid date");

       }

   }

}

Why are data silos problematic?

Answers

Answer:

Hampers collaboration

Resource wastage

Lack of data integrity

Explanation:

Data silos comes into play When different departments of an orgainiziations independently collects data needed for its operations. The finance, HR, administrative departments and so on collects their data and keeps it to themselves. As a result there is a repetitive and needless gathering and storage of already existing data, that is the data required by one group will have to be gathered again while it currently exists with another group. This leads to inefficient resource management and wastage. This practice also leads to data integrity as data stored differently across departments becomes inconsistent and less accurate over time. Team work and collaboration is gradually eroded as each group continues to hold on to its resources which poses a problem towards organizational growth.

Select the scenario that describes a top-down approach to data warehouse design.


Cathy’s Cards and Gifts, which has three stores, creates data marts for its sales, marketing, and delivery departments to study the possibility of establishing a new store.


Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed.


Cynthia’s Florals, which is dealing with debt, creates new data marts for the service, delivery, and sales departments to develop a strategy to stay in business.


Connor’s Meat Market, which just opened, creates data marts to track the sale of each of the following meats: beef, pork, lamb, and fish.

Answers

Answer:

Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed.

The scenario defines a top-down approach to data warehouse design as "Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed".

What is a top-down approach to data warehouse design?

In the "Top-Down" method system, a data warehouse exists defined as a subject-oriented, time-variant, non-volatile, and integrated data storage for the entire business data from various sources exist validated, reformatted, and saved in a normalized (up to 3NF) database as the data warehouse.

Therefore, the correct answer is option b) Crawford's Fabrics, which wants to expand its operations, combines data from the purchasing and sales departments into a central database, to be divided into new data marts as needed.

To learn more about warehouse design

https://brainly.com/question/25885061

#SPJ2

What are the benefits of using LinkedIn Sales Navigator?

Answers

Answer:

Well, there are a number of advantages that come with this advanced LinkedIn automation tool. Here are some of the top benefits of a Sales Navigator:

1. Can find and export up to 5000 prospects at a time.

2. Enables you to send 30 InMails per month

3. Easy access Teamlink -enabling you to expand your network by pooling connections

4. Integrate with existing systems

Which one is the result of the output given by a computer
I​

Answers

Explanation:

Instruction , data and information all of these.

Alexis received an email message from an unknown sender that included an attachment.

If she opens the attachment, what kind of malicious software might be activated, and what are the consequences?


Opening the attachment would release a worm, which would infect her system with a virus.


Opening the attachment would release a worm, which would infect her system with spyware.


Opening the attachment would release an active worm, which would infect her system with adware.


Opening the attachment would release a passive worm, which would infect her system with adware.

Answers

Answer:

Opening the attachment would release a worm, which would infect her system with a virus.

Answer:  B. Opening the attachment would release a worm, which would infect her system with a virus.

Mary has been locked out of her account after failing to correctly enter her password three times. As the system administrator, you need to unlock her account. Which of the following commands would unlock Mary's account assuming that you are using pam_faillock.so module?

a. faillock --reset --user mary
b. pam_faillock --unlock --user mary
c. pam_faillock --reset --user mary
d. faillock --unlock --user mary

Answers

Oh hey lol yea yea lol I got the money back to me put on the phone so you know

Which of the following is not a computer application?

a. Internet Explorer

b. Paint

c. Apple OSX

d. Microsoft Word

Answers

Answer:C.apple Osx
Answer C

Apple OSX is not a computer application.

The information regarding the computer application is as follows:

The program of the computer application should give the skills that are required for usage of the application software on the computer.An application like word processing, internet, etc.Also, the computer application includes internet explorer, paint, and Microsoft word.

Therefore we can conclude that Apple OSX is not a computer application.

Learn more about the computer here: brainly.com/question/24504878

Instructions
Create a multimedia project that contains the text element and all the contents that you have studied about that element

Answers

Answer:

iiiio888887776558777u765

What is the easiest way to deploy a C++ program to a user’s computer? a. Copy the source code to the user’s computer and then compile it b. Create a batch file that copies the program to the user’s computer and then run it c. Copy the executable file to the user’s computer d. Create an installer program and then run it on the user’s computer

Answers

Answer:

c. Copy the executable file to the user’s computer

Explanation:

When you run a c++ program, an executable file (.exe) is created in the same directory with the source file.

To deploy this program on another system, you need to transfer the executable file from the original system where the program was executed to the new system.

The program will work fine without errors.

However, do not mistake the executable file for the source file. The source file ends in .cpp.

g Add a throw statement to the processNumbers function that throws the message "An element in the list is not a number." if one of the elements in toProcess is not a number. Hint: The function isNaN() returns true if the parameter is not a number.

Answers

Answer and Explanation:

function processNumbers(alist){

var Ourarray= new array(alist);

Ourarray.foreach(

if(isNaN()){

Console.log( "An element in the list is not a number."};

break;

}

}

processNumbers(alist)

From the above, we have defined a function that takes an array parameter(the following array variable will make sure of that). We test each element in the array using foreach array function. The for each function runs the if statement and if isNan is true for each of the elements in the array.

Write a C program that will load entries from a file containing details of books and prints them.

Program Requirements:
a. Load file containing details of books
b. Print out all the books Required approach:

1. Design a struct/class that can hold the details of an individual book.
2. Dynamically allocate an array of these objects. The size should be the number of book entries from the input file given by the user.
3. Load all of the book entries into this array of objects before printing

Answers

Answer:

........

Explanation:

5 Major of computer application

Answers

Im assuming you means applications as in Apps.

Microsoft windows
Microsoft internet Explorer
Microsoft office or outlook
Mcafee antivirus
Adobe pdf

Answer:

Basic Applications of Computer

1 ) Home. Computers are used at homes for several purposes like online bill payment, watching movies or shows at home, home tutoring, social media access, playing games, internet access, etc.

2 ) Medical Field.

3 ) Entertainment.

4 ) Industry.

5 ) Education.

Explanation:

Hope it helps you

Mark my answer as brainlist

have a good day

list two ways to insert a chart in powerpoint

Answers

Answer:

1st way: On the Insert tab, in the Illustrations group, click Chart. In the Insert Chart dialog box, click a chart, and then click OK.

2nd way: Click INSERT > Chart. Click the chart type and then double-click the chart you want.

e) Point out the errors( if any) and correct them:-
class simple
{
inta,b,c;
double sumNumber
{
int d = a + b + c;
double e = d/5.6;
return e;
}
void show Number()
{
a = 10, b = 20, c=5;
System.out.println(d);
double f = sumNumber(a,b,c);
System.out.print(e);
}
}​

Answers

Explanation:

double e-d/5.6;is wrong it should return to c

A computer has many resources. A resource can be memory, disk drive, network bandwidth, battery power, or a monitor. It can also be system objects such as shared memory or a linked list data structure. This principle is based in object-oriented programming (OOP). In OOP, a class definition encapsulates all data and functions to operate on the data. The only way to access a resource is through the provided interface. Which security principle are we referring to

Answers

Answer:

The security principle being referred to here is:

Resource Encapsulation.

Explanation:

Resource Encapsulation is one of the cybersecurity first principles.  It allows access or manipulation of the class data as intended by the designer. The cybersecurity first principles are the basic or foundational propositions that define the qualities of a system that can contribute to cybersecurity.  Other cybersecurity first principles, which are applied during system design, include domain separation, process isolation, modularization, abstraction, least principle, layering, data hiding, simplicity, and minimization.

Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051) / 12. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value))

Answers

Answer:

The program in Python is as follows:

current_price = int(input("Current Price: "))

last_price = int(input("Last Month Price: "))

change = current_price - last_price

mortgage = (current_price * 0.051) / 12

print('Change: {:.2f} '.format(change))

print('Mortgage: {:.2f}'.format(mortgage))

Explanation:

This gets input for current price

current_price = int(input("Current Price: "))

This gets input for last month price

last_price = int(input("Last Month Price: "))

This calculates the price change

change = current_price - last_price

This calculates the mortgage

mortgage = (current_price * 0.051) / 12

This prints the calculated change

print('Change: {:.2f} '.format(change))

This prints the calculated monthly mortgage

print('Mortgage: {:.2f}'.format(mortgage))

Answer:

current_price = int(input())

last_months_price = int(input())

change = current_price - last_months_price

mortgage = current_price * 0.051 / 12

print('This house is $', end= '')

print(current_price, end= '. ')

print('The change is $', end= '')

print(change, end= ' ')

print('since last month.')

print('The estimated monthly mortgage is $', end= '')

print(mortgage, end='0.\n')

who is considered as the father of computer science?​

Answers

Charles Babbage is known as father of computer science because he designed the original programmable computer .

I hope it helps and if you want to have good answer follow me, I will be your second sight on your any problems♥️♥️

Write the following numbers in binary. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. 25. 26. 27. 28. 29. 30. 31. 32. 46. 55. 61.​

Answers

0 1 10 11
Explanaition:

can somebody help what's wrong with this code
asap~

Answers

Answer:

There's a + missing to concatenate your variable to your string.

A good machine should have the mechanical advantage of......?​

Answers

Answer:

The ideal mechanical advantage (IMA) of an inclined plane is the length of the incline divided by the vertical rise, the so-called run-to-rise ratio. The mechanical advantage increases as the slope of the incline decreases, but then the load will have to be moved a greater distance.

Explanation:

Which of the following BEST describes an inside attacker?
An agent who uses their technical knowledge to bypass security.
An attacker with lots of resources and money at their disposal.
A good guy who tries to help a company see their vulnerabilities.
An unintentional threat actor. This is the most common threat.​

Answers

The inside attacker should be a non-intentional threat actor that represents the most common threat.

The following information related to the inside attacker is:

It is introduced by the internal user that have authorization for using the system i.e. attacked.It could be intentional or an accidental.So it can be non-intentional threat.

Therefore we can conclude that The inside attacker should be a non-intentional threat actor that represents the most common threat.

Learn more about the threat here: brainly.com/question/3275422

What do you do if your computer dies/malfunctions? Reboot (Restart) Shut Down Recovery CD and Recover your system Call a person to fix it​

Answers

Answer:

Restart

Explanation:

Simply I may restart my pc if it dies/malfunctions. I'll not restart immediately, I'll wait for an hour and do restart my computer. If it doesn't work then maybe I'll Call a person to fix it.

Write a program named lastname_firstname_cities.py that works with information about large cities. Your program will open the cities.txt downloadfile. Each line in the file has the name of a city, its country, and its population. The first few lines of the file look like this:

Answers

Answer and Explanation:

Open your text editor and open new file. Save new file file as lastname_firstname_cities.py. The program will open the file cities.txt downloadfile hence :

dfile= open(cities.txt, "r")

If we write this into our lastname_firstname_cities.py file it will open our cities.txt downloadfile in read mode and text mode(by default unless we specify binary mode which is for images)

T
N
O
?
You can insert only the row
only to
True or false

Answers

false

Explanation:

good luck bro

have a great day

Answer:

false

Explanation:

consider l= 5 ,r= 11. you must determine the sum of the values of the function in the range L to R . you have to calculate sum = lrf(x) in python coding

Answers

def summation (num1, num2):

i = 0

for x in range (num1 : num2 + 1):

i += x

return i

print ( summation(l, r))

3. Which property is used to select full Row of data grid view
a) Select Mode b) Mode Selection c) Selection Mode d) Mode Select

Answers

Answer:

I think a is correct answer.

3. Coaxial/telephone cable sends
during the data transmission
signal

Answers

Answer:

high frequency signal.

. Write programming code in C++ for school-based grading system

Answers

Explanation:

The grade must be calculated based on following pattern:

Average Mark RangeGrade91-100A181-90A271-80B161-70B251-60C141-50C233-40D21-32E10-20E2

Calculate Grade of Student in C++

To calculate grade of a student on the basis of total marks in C++ programming, you have to ask from user to enter marks obtained in 5 subjects. Now add marks of all the 5 subjects and divide it by 5 to get average mark. And based on this average mark, find grade as per the table given above:

// C++ Program to Find Grade of Student // -------codescracker.com------- #include<iostream> using namespace std; int main() { int i; float mark, sum=0, avg; cout<<"Enter Marks obtained in 5 Subjects: "; for(i=0; i<5; i++)

Other Questions
During what intervals was Jenny positively accelerating? Let's make some smores! Chocolate bars come in packs of 8 and graham crackers come in packs of 12. What is the smallest number of chocolate bars and graham crackers we would need to buy so we don't have any left over? a car completes a journey in 8hours it covers half the distance at 40kms per hours and the rest at 60 km per hour. what is the total distance of the journey? 3 coins Priya spends $45 on gas, $10 on dinner, and $8 on a video game. How much money did Priya spend on variable expenses? if a person is injured at the hospital during a natural disaster a correct action to take is i need help again.lol answer please urgent Amanda rented a bike from Ted's Bikes.It costs $10 for the helmet plus $4.25 per hour.If Amanda paid about $33.38, how many hours did she rent the bike?a) Let h = the number of hours she rented the bike. Write the equation you would use to solve this problem. Sheldon is baking 2-inch cookies. He has 3 trays that are the same size. On one tray, he makes 5 rows with 4 cookies in each row. He cannot fit any more cookies on the tray. He fills the second tray completely and only part of the third tray. How many cookies could Sheldon have made? An oil tank has to be drained for maintenance. The tank is shaped like a cylinder that is 4.5 ft long with a diameter of 1.4 ft. Suppose oil is drained at a rate of1.7 ft per minute. If the tank starts completely full, how many minutes will it take to empty the tank? Doanh nghip c trch trc tin lng ngh php ca ton b ngi lao ng trong cng ty. ung hay sai On hot days, Doodle and I went down to Horsehead Landing and I gave him swimming lessons or showed him how to row a boat. Sometimes we descended into the cool greenness of Old Woman Swamp and climbed the rope vines or boxed scientifically beneath the pine where he had learned to walk. Promise hung about us like the leaves, and wherever we looked, ferns unfurled and birds broke into song. The Scarlet Ibis," James Hurst Which phrases emphasize that Old Woman Swamp is a symbol of paradise for the boys? Check all that apply. "went down to Horsehead Landing" "gave him swimming lessons" "descended into the cool greenness" "promise hung about us like the leaves" "birds broke into song" Find the missing value.Hint: Use the number line to find the missing value.+5 = -2-1550-51015-10Stuck? Review related articles/videos or use a hint. Simplify -23. wjfnwkfnfffkmwnkfm Write a research-based argumentative essay for or against health care for everyone.Use the drop-down menus to answer the questions.What is the product you will write?What is the topic of your writing?Who is your audience?What is your purpose for writing? Find an equation of the line having the given slope and containing the given point. m= 4/5,(1,-8).The equation of the line is y= Which of the following steps were applied to ABC obtain AA'B'C?128B6A-6-24610A. Shifted 4 units left and 3 units downB. Shifted 4 units left and 2 units downC. Shifted 3 units left and 3 units downD. Shifted 3 units left and 2 units downWill give brainliest pls help!!! A charity gala is held in a hotel ballroom each year. The cost is $150 for the ballroom and an additional $22.50 for each attendee. Write an equation showing how the cost of the gala, y, depends on the number of attendees, x. Do not include dollar signs in the equation. y= En qu momento se produce la hinchazn del tejido? Reducing the CFM through the evaporator will cause the amount of moisture removed from the air to ____________________. A. stay the same B. decrease C. increase