The update program is an illustration of the file manipulation processes, where files are read and updated
How to write the program?The program written in QBASIC, where comments are used to explain each line is as follows:
REM This opens a new file for output
OPEN "NEW.DAT" FOR OUTPUT AS #2
REM This is repeated until the end of the file
WHILE NOT EOF(1)
REM This inputs the item details
INPUT #1, N$, R, Q
REM This updates the rate by 10%
NEWRATE = R + 10 / 100 * R
REM This writes the inputs to the file
WRITE #2, N$, NEWRATE, Q
WEND
REM This closes the files
CLOSE #1, #2
REM This deletes the Data.dat file
KILL "DATA.DAT"
REM This renames the NEW.DAT to the Data.dat file
NAME "TEMP.DAT" AS "DATA.DAT"
REM The program ends here
END
Read more about file manipulation at:
https://brainly.com/question/25324400
The ages of ELEVEN(11) students on Environmental Awareness Camp are:
12 9 11 7 10 10 9 9 8 9 11
Find the mean and standard deviation
A. Mean = 9.545; Standard deviation = 1.440
B. Mean = 9.545; Standard deviation = 2.073
C. Mean = 10.5; Standard deviation = 1.440
D. Mean = 10.5; Standard deviation = 2.073
Answer:
Gonna be smart. This took me a long time.
Explanation:
Result Standard Deviation, σ: 1.3726971700492
Count, N: 11
Sum, Σx: 105
Mean, μ: 9.5454545454545
Variance, σ2: 1.8842975206612
Steps
σ2 = Σ(xi - μ)2
N= (12 - 9.5454545454545)2 + ... + (11 - 9.5454545454545)2
11
=
20.727272727273
11
= 1.8842975206612
σ = √1.8842975206612
= 1.3726971700492
In simple words. A.
Discussion 5
Kris Allen runs a pet daycare center. She needs to keep track of contact information for her customers, their animals, the services provided (such as walking and grooming), and the staff who are assigned to care for them. She also must send out invoices for payment each month. What features of spreadsheets and/or database software might she use to facilitate her business?
The features of spreadsheets and/or database software that she can use to facilitate her business are;
Rows and columns in spreadsheet's can make her information to be neatly organized.The use of Formulas and functions. Data filtering Accounting.Analytics, etc.Why does business use database software?Businesses can known to use database software to make a good and well manage data output. They also use it to work with their data.
Note that in almost all kinds of businesses, there is the use database software just to keep a track of contacts, addresses, payrolls and other kind of functions to is linked to business and customers.
Learn more about database software from
https://brainly.com/question/1022352
True or False: F Layout is better for users who read left to right, but layout is better for users who read right to left.
Answer:
false
Explanation:
it depends on the user
Should new technology be created if there is a chance it will be misused?
Answer:
yes
Explanation:
sometime great things can happen out of terrible things.
Answer:
No, because if there is a chance that it will be misused, then it should not be created. Also, we are not told exactly how it may be misused - it could have catastrophic impacts, and cause harm.
Explanation:
Write an application that reads the file created by the WriteCustomerList application and displays the records. Save the file as DisplaySavedCustomerList.java.
Answer:
hi
Explanation:
Question 2:
(5 marks)
According to the following code; you are required to draw the flowchart in details with
clear sequences
message=input("enter yes if there is message in the inbox");
attached=input("\n enter yes if there is attachment");
inbox=eval (input ("enter number of email"));
while inbox > 0:
if message=="yes":
print ("extract the message");
if attached=="yes":
print("extract the message");
email=input("eneter v for valied or not");
if email=="V":
print ("extract attached ");
print("inject Job ");
print("inject Submission");
en email=="N":
print("Inject an error");
print ("Remove the inbox mail ");
inbox-inbox-1;
DIO:
print("stop")
Flowcharts are visual representations of a code or program segments
How to draw the flowchart?To draw the flowchart, we make use of the following symbols and figures
Oval: To begin and end the flowchartParallelogram: To accept input for the message, attached, inbox & email variables Parallelogram: To display all outputsRectangle: To perform the arithmetic operation; inbox = inbox - 1Diamond: To make several decisions and to initiate a loop processSee attachment for the flowchart that represents the code
Read more about flowcharts at:
https://brainly.com/question/24735155
The quickest way to change a word is to double
click it.
Select the correct answer
O True
False
Answer:
I don't think that the fastest way to change a word is to double click it. Even though it highlights it super fast, then you just press backspace once, it doesn't compare to the one where you press the "ctrl" and "backspace" key at the same time, and it makes the whole entire word disappear in the blink of an eye. But, I am not sure if anybody really knows about this trick. So, it is 50/50.
Explanation:
:)
List one unprofessional AND one professional example of internet/social media
Professional: Using social media to advertise a company you created
Unprofessional: Using social media to watch cat videos
The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.
What is social media?A social media is given as the network that forms the connections of the individuals over the internet. It enables the user to connect irrespective of borders.
The use of social media has been professional and unprofessional both. The professional use of social media involves the use for job posting, while the unprofessional use involves watching videos.
Learn more about social media, here:
https://brainly.com/question/9564823
#SPJ5
A processor accesses main memory with an average access time of T2. A smaller cache memory is interposed between the processor and main memory. The cache has a significantly faster access time of T1
For any single memory access, the theoretical speedup to access a word stored in the cache rather than in main memory is given by:
[tex]Speedup=\frac{T_2}{T_1}[/tex]
Given the following data:
Access time = [tex]T_1 < T_2[/tex]
What is cache?Cache can be defined as a random access memory (RAM) that is used by the central processing unit (CPU) of a computer system to minimize (reduce) the average time taken to access memory (AMAT).
For any single memory access, the theoretical speedup that would be used by the processor to access a word stored in the cache rather than in main memory is given by:
[tex]Speedup=\frac{T_2}{T_1}[/tex]
Where:
[tex]T_2[/tex] is the time to access in main memory.[tex]T_1[/tex] is the time to access in cache.Read more on processor here: https://brainly.com/question/5430107
A program checks to see if the input is valid using
numbers
operators
logic
output
Use the knowledge in computational language in python program checks to see if the input is output.
How to define input in Python?In Python, we do this using the input() function, which is literally 'input' in English. The input() function receives as a parameter a string that will be shown as an aid to the user, usually informing him what kind of data the program is expecting to receive.
So in an easier way we have that the code is:
def isNumber(x):
if type(x) == int:
return True
else:
return False
input1 = 122
input2 = '122'
if isNumber(input1):
print("Integer")
else:
print("String")
if isNumber(input2):
print("Integer")
else:
print("String")
See more about python at brainly.com/question/18502436
how bridges are built over water
the difference between tool bar and status bar
Answer:
A toolbar offers easier access to tasks typically conducted within the application whereas in the status bar it is displayed at the lower side of the web browser screens and other application windows.
Explanation:
Create a file using any word processing program or text editor. Write an application that displays the files name, containing folder, size, and time of last modification. Save the file as FileStatisits.java
Explanation:
TO MAKE FOLDER
-right click
-select 'new'
-and click on folder
Which layer abstracts away the need for any other layers to care about what hardware is in use?
Answer:
data link layer
Explanation:
you answer is data link layer
Does anyone know how to get past this part in Lego Harry Potter it’s the one right after Dobby in year 2? I’m so stuck!!!
thats a nice game. i dont know how to play it. how are you doing?
state the name of the following computer components
Answer:
Memory.
Hard Drive or Solid State Drive.
Video card.
Motherboard.
Processor.
Power Supply.
Monitor.
Keyboard and Mouse.
Explanation:
Given the string “supercalifragilisticexpialidocious”.
1. What is the length of the string i.e. write the script to find the length? (2 points)
2. Find the sub-string of first 5 positions and the other sub-string with last 5 positions. (4 points)
3. Find how many times “i” occurs in this word in python
The string and the three instructions is an illustration of the python strings
The length of the stringThe following instruction calculates the length of the string using the Python script:
len("supercalifragilisticexpialidocious")
The returned value of the above instruction is: 34
The substringsThe following instruction calculates the sub-string of first 5 positions and the other sub-string with last 5 positions
myStr[:5]+myStr[-5:]
The returned string of the above instruction is: "supercious"
The number of occurrence of iThe following instruction calculates the occurrences of i in the string
"supercalifragilisticexpialidocious".count("i")
The returned value of the above instruction is: 7
Read more about python strings at:
https://brainly.com/question/13795586
You're a consultant for a large enterprise that needs a comprehensive IP addressing and DNS management solution for its physical and virtual networks. The enterprise has a primary office in Pittsburgh and three branch offices in Los Angeles, New York, and Miami. It has IT support staff only in the branch offices.The enterprise's server specialists are located in Pittsburgh. The IT directory in Pittsburgh wants to offload some of the IPAM management functions to some of the IT staff without giving them broader domain or forest administrative right. Which type of IPAM architecture do you recommend? Which features of IPAM are you likely to recommend using to address the requirements?
The type of IPAM architecture that I will recommend is the Centralized IPAM. The centralized IPAM server when deploy can help to address the issue.
What is IPAM?IPAM (IP Address Management) is known to be a kind of administration of DNS and DHCP. This is known to be a network services that helps and handles IP addresses to machines in a TCP/IP network.
The Centralized Repository can help administrators to maintain or keep a good, correct and current records of all their IP assignments and left over addresses.
Learn more about IPAM from
https://brainly.com/question/24930846
Someone tell me the answer who thanks who ever who
Answer:
2. Trumpets,Guitar,Drums,Harp,Piano
3. The music notes and variety of colors and the melodies lines
4. 1 thing that needed change is maybe, it needed more intruments.
do you think film is a great media in exposing information?
Answer:I think film is a great media in exposing information
Explanation:Films are great for exposing information for many reasons. Films are long, which increases the chance the watcher will remember, also it makes the watcher more involved and more interactive
Why do Linux administrators prefer to give sudo access to application teams instead of letting them su to root?
Answer:
Explanation:
some distros like ubuntu do not even allow su to switch to root. furthermore the su to root is dangerous because the user becomes the all-powerful administrative account, so no warnings are issued if the application team user tries to do something system-breaking.
Take any software or Application that you have recently purchased, this can be a video game or any other application helping you to complete you educational objectives or professional purposes. Go through about the copyright, license policies [you will find this information on the leaflet or on the packaging] and answer the following questions]
Can you make copies? What does the license agreement say about the number of copies you can make? Explain in detail [ 2Marks]
Does it specify penalties for making unauthorized copies if yes give the brief detail on that?
[1 Mark]
Do you consider the license agreement to be clearly stated? Reasonable? Explain with two reasons. [ 2 Marks]
A good product should have copyright protection which prevents others from using the product without permission.
Some products specify the penalties which are given to a person who makes unauthorized copies of their product and this is done to clearly educate to avoid ignorance claims.
A good product should have clear lettering which are legible and can be easily read, and should also have reasonable copyright protection.
What is Copyright?This refers to the licensing which is done for a product and is also legally backed which prevents a person from illegally using or redistributing the work of a creator without their explicit consent.
Read more about copyright infringement here:
https://brainly.com/question/1078532
a. The insert, Delete, and Format options are present in the
group on the Home tab.
Answer:
False
Explanation:
They are on the keyboard.
write a C++ program to print name, age, class, school
Answer:
#include <iostream>
using namespace std;
int main()
{
string name;
string age;
string Nameclass;
string school;
cout<<"What is your name?\n";
cin>>name;
cout<<"What is your age?\n";
cin>>age;
cout<<"What is your class?\n";
cin>>Nameclass;
cout<<"What is your school?\n";
cin>>school;
cout<<"Name: " + name;
cout<<"\nAge: " + age;
cout<<"\nClass: " + Nameclass;
cout<<"\nSchool: " + school;
return 0;
}
Explanation:
Suppose that you have a computer with a memory unit of 24 bits per word. In this
computer, the assembly program’s instruction set consists of 198 different operations.
All instructions have an operation code part (opcode) and an address part (allowing for only one address). Each instruction is stored in one word of memory.
1. How many bits are needed for the opcode?
2. How many bits are left for the address part of the instruction?
3. How many additional instructions could be added to this instruction set without
exceeding the assigned number of bits? Discuss and show your calculations.
4. What is the largest unsigned binary number that the address can hold?
Answer:
a ) The amount of bits required for the opcode
8 bits
2^8= 256
256>198
We get the next lower number, which is 2^7 = 128 bits, because it is greater than 198. As a result, the operation code necessitates 8 bits.
b) The number of bits reserved for the instruction's address.
16 bits
24-8 = 16
c)
65536
2^16 = 65536
Maximum number = 65535
2^15 = 32768-1
= 32767
Explanation:
Write a C# program to Trim the Given String.
Write a C# program to Convert Upper case to Lower Case.
In C# programming
Answer:
Step by step explanation:
CHALLENGE
ACTIVITY
1.6.1: Defining a class constructor.
Write a constructor with parameters self, num_mins and num_messages. num_mins and num_messages should have a default
value of 0.
Sample output with one plan created with input: 200 300, one plan created with no input, and one plan created with input: 500
My plan... Mins: 200 Messages: 300
Dad's plan... Mins: Messages: 0
Mom's plan... Mins: 500 Messages: 0
Python please
Coding:
class PhonePlan:
def __init__(self, minutes=0, messages=0):
self.num_mins=minutes
self.num_messages=messages
def print_plan(self):
print('Mins:', self.num_mins, end=' ')
print('Messages:', self.num_messages)
my_plan = PhonePlan(int(input()), int(input()))
dads_plan = PhonePlan()
moms_plan = PhonePlan(int(input()))
print('My plan...', end=' ')
my_plan.print_plan()
print('Dad\'s plan...', end=' ')
dads_plan.print_plan()
print('Mom\'s plan...', end= ' ')
moms_plan.print_plan()
Have a great day <3
Select the correct answer.
What should every HTML document begin with?
A. the element
B.the declaration
C. the element
D.the element
Answer:
B
Explanation:
Every HTML document must begin with a declaration of what the document is going to be about.
Draw a rectangle, give its perimeter and Area
Ask the user for a length and width of a rectangle.
Draw the rectangle
find and show the perimeter
find and show the Area
I am assuming this is in python, so I will use comments to explain each step
l=int(input('What is the length of the rectangle')
w=int(input('What is the width of the rectangle')
#here use whatever graphics code required to draw the rectangle
#will probably be similar to rect=Rectangle(l,w)
print('Perimeter is' +(2*l+2*w))
print('Area is' +(l*w))
Complete the sentence.
For self-driving cars, both the programmers of the software and governments who regulate them must adhere to
intellectual property laws
ethical principles
noncompete agreements
- to safeguard that the software that controls the car is capable of making life-or-death
Answer:
[ C ] governments who regulate the car industry
[ D ] the programmers who create the software that control the car
Proof:
Governments who regulate the car industry, the programmers who create the software that control the car are the complete sentence.
What is car industry?Car industry is the place where the manufacturing of the cars and automobile parts are placed. Car industry do manufacturing work for the selling purpose. The company may be directly or indirectly engage in the selling industry.
Thus, sentences are completed.
For more details about car industry, click here:
https://brainly.com/question/1139792
#SPJ2