Answer:
#include <iostream>
#include <algorithm>
using namespace std;
int main(){
int a, b, c[20], search, maxi, mini, totalSum = 0;
char option;
int * p;
cout<< "Enter value for a: ";
cin>> a;
cout<< "Enter value for b: ";
cin>> b;
if (a == 0 || b == 0){
cout<< "Both values must be greater than zero.";
} else if(a>b){
maxi = a;
mini = b;
}
else{
maxi = b;
mini = a;
}
for (int i =0; i < 20; i++){
c[i] = (rand() % maxi) + mini;
totalSum += c[i];
}
cout << "Please choose an option: 1 , 2, 3 ";
cin>> option;
option = tolower(option);
switch(option){
case 1:
cout << "The Average of the array items is: "<< totalSum/20;
break;
case 2:
cout<< "The sum of the array items is: "<< totalSum;
break;
case 3:
cout<< "Enter number to be searched: ";
cin>> search;
p = find (c, c+20, search);
if (p != c+20)
{
cout << "Element found in c array: " << *p << '\n';
}else{
cout << "Element not found in c array\n";
}
break;
}
}
Explanation:
The C++ source code prompts the user for the a,b, option and search values and executes either of the options from the switch statement.
Answer:
#include <iostream>
#include <algorithm>
using namespace std;
int main(){
int a, b, c[20], search, maxi, mini, totalSum = 0;
char option;
int * p;
cout<< "Enter value for a: ";
cin>> a;
cout<< "Enter value for b: ";
cin>> b;
if (a == 0 || b == 0){
cout<< "Both values must be greater than zero.";
} else if(a>b){
maxi = a;
mini = b;
}
else{
maxi = b;
mini = a;
}
for (int i =0; i < 20; i++){
c[i] = (rand() % maxi) + mini;
totalSum += c[i];
}
cout << "Please choose an option: 1 , 2, 3 ";
cin>> option;
option = tolower(option);
switch(option){
case 1:
cout << "The Average of the array items is: "<< totalSum/20;
break;
case 2:
cout<< "The sum of the array items is: "<< totalSum;
break;
case 3:
cout<< "Enter number to be searched: ";
cin>> search;
p = find (c, c+20, search);
if (p != c+20)
{
cout << "Element found in c array: " << *p << '\n';
}else{
cout << "Element not found in c array\n";
}
break;
}
}
Explanation:
The C++ source code prompts the user for the a,b, option and search values and executes either of the options from the switch statement. Is correct
Explanation:
Great work person above me! :)
Bluetooth uses this medium to connect two devices.
Select one:
a. microwave signals
b. fiber optics
c. infrared light
d. radio signals
Answer:
D
Explanation:
Bluetooth is the wireless technology which allows for the exchange of the data between different devices. It uses wavelength to transmit information and generally works with short rage devices.
Due to Bluetooth relies on the range of devices and hence it depends on the UHF radio waves. These have a range of 2.4 to 2.5 Ghz. Such that the devices can talk to each other. The usage is control automation system.Hence the option D is correct.
Learn more about the uses this medium to connect two devices.
brainly.in/question/5681178.
Asymmetric encryption uses only 1 key.
A)
False
B)
True
Which tools can Object Drawing Mode be applied to?
Line tool
Rectangle Tool
Oval Tool
Pencil tool
Pen Tool
Brush Tool
Answer:
• Line Tool
• Rectangle Tool
• Oval Tool
• Pencil Tool
• Brush Tool.
Explanation:
When people want to animate when using the Adobe Animate CC, it is vital for them to know how to draw shapes like squares, lines, ovals, rectangles, and circles. This is to enable such individuals understand how to draw objects as it can be difficult if they do not know how to draw these shapes.
The tools that Object Drawing Mode be applied to include:
• Line Tool
• Rectangle Tool
• Oval Tool
• Pencil Tool
• Brush Tool.
When the tool is being selected, it should be noted that the option for the drawing mode will be shown in the Property Inspector panel or it can also be seen in the tools panel.
How would you change your prompt to have it display the current time (hour and minute) and the full path of the current directory?
Answer:I tried using following command:
Code:
export PS1="$(date +%k:%M:%S) $ "
but it gave me a fixed time in prompt whereas my objective is to get the current time everytime.
Code:
$ export PS1="$(date +%k:%M:%S) $ "
17:42:42 $
17:42:42 $ date
Tue Oct 2 17:42:54 PDT 2012
17:42:42 $
Explanation:
Using direct mapping, consider a 16-bit memory addresses, and a cache with 64 blocks, where each block is 8 bytes. What is the size of offset, block, and tag
Answer:
Tag Block Offset
7 6 3
Explanation:
Using direct mapping hashing:
Memory address size = 16 bits
Number of cache blocks = 64
Size of each block = 8 bytes
Thus;
Offest field = size of each block = 2^{3} = 3 bits
Number of blocks = 64 = 2
Thus, the index field is = 2^{6} = 6 bits of block
Tag filed is of size = 16 - (3+6) = 7 bits of tag
Lynn would like to insert a hyperlink into an email message without using the ribbon. What is the keyboard shortcut to do so?
Ctrl+G
Ctrl+K
Ctrl+C
Ctrl+Shift+G
Answer:
Ctrl+K
Explanation:
Edg 2020
B on edg 2021, hope i could help
He should identify his various
online and offline audiences,
and how best to engage them
TRUE
FALSE
Answer:
false, that shouldn't be a a priority to identify if they are or not.
Explanation:
Code used when creating a hyperlink to a specific part of the same page.
Answer:
Give The Object Or Text You'd Like To Link To A Name.
Take That Name That You've Chosen, And Then Now Insert It To An Opening HTML Anchor Link Tag.
Place That Complete Opening <a> Tag From Before The Text Or Object You Want To Link It To, Then Now Add A Closing </a> tag after.
(Hope this is correct and hope this helped. Sorry if I'm wrong and you get this wrong)
You want to search for contacts in your email program. You enter the person’s first name and last name in the search box. You want the computer to display the contact with the exact first and last name as well as contacts with either of the names. Which logic gate idea are you using here?
A.
AND
B.
NOT
C.
NAND
D.
OR
E.
NOR
Answer:
NOR
Explanation:
Answer:
Correct answer: D. OR
Explanation:
Took test
Consider the following code snippet:public class Employee{private String empID;private boolean hourly;public Employee(){}. . .}Which statement reflects the action performed when the constructor to Employee is called?
Answer:
Following are the solution to this question:
Explanation:
In the given question the choices are missing, that's why its solution can be defined as follows:
In the given question, a class Employee is declared, that defines two-variable "empID and hourly", in which both are different in data type, and a default constructor of the class is declared, in this class, the variable empID will be assigned the value that is equal to null, and the variable hourly that assign a value that is equal to false.
Select all examples of proper keyboarding technique.
Look at the keys while keyboarding.
Keep your hands higher than your elbows.
Sit up straight.
Relax your fingers.
Aim to make no mistakes.
Answer:
all except keeping your hands higher than your elbows
Answer:
Sit up straight.
Relax your fingers.
Aim to make no mistakes.
Explanation:
Write, in your own words, a one-two paragraph summary on the Running Queries and Reports tutorials. Apply critical thinking and an academic writing style that demonstrates your understanding of the difference between a Microsoft Access database and an Excel spreadsheet by comparing the features of each and when they would be used as personal computer applications if applicable.
Answer:
Running queries in SQL or structured query language interacts with a relational database. It is used to create new databases and tables, read the content of the database tables, update and also delete the content.
Microsoft Access is a database software but Excel is a spreadsheet application.
Explanation:
Access databases hold large datasets that can be accessed from other platforms and generate automatic query while datasets in Excel are limited but it has comprehensive statistical tools for data analysis.
Explain how a stored procedure is processed by the DBMS query processor (including the type of return value after the query is processed
Answer:
The stored procedures in DBMS can be executed with;
EXEC procedure_name
It can also be executed with single or multiple arguments with
EXEC procedure_name (use the at tag here)Address= data1, (use the at tag here)Address= data2;
It returns a status value of the queried table.
Explanation:
A stored procedure is a subroutine used in SQL servers to perform a task on a table in a database or the database itself. The syntax for creating a stored procedure is;
CREATE PROCEDURE procedure_name
And then, other statements can be written to be executed when the procedure is called.
You are configuring a firewall to use NAT. In the configuration, you map a private IP address directly to a persistent public IP address. What form of NAT is being used?
A. Registered NAT.B. Static NAT.C. Dynamic NAT.D. Advanced NAT.
Answer:
Option B (Static NAT) would be the correct choice.
Explanation:
Static NAT seems to be a method of NAT methodology used to navigate as well as monitor internet usage from some kind of specific public IP address to something like a private IP address. Everything always allows the provision of web access to technology, repositories including network equipment inside a protected LAN with an unauthorized IP address.Some other decisions made aren't relevant to the situation in question. So the above alternative is indeed the right one.
What is one feature that differentiates social media information systems (SMIS) from Web site applications? A user has to login to a Web site to use the special features. SMIS do not use browsers. A user can comment on a Web site. SMIS has more users than a Web site. SMIS has connection data
Answer:
A user has to login to a Web site to use the special features.
Explanation:
This is true because, even though website could be able to give the required information needed at that particular point in time, in order to use the special features found in the website, there is need to login into the website.
For example, Brainly which is a website needs the students to login in-order to ask his or her questions where not clarified with an expected answer gotten from the website.
Which statement is true?
1)A deque is a type of collection,
2)A collection is a type of deque.
3)A list is a type of deque.
4)A deque is a type of list.
Answer:
1. A deque is a type of collection.
Explanation:
The statement that is true is as follows:
A deque is a type of collection.Thus, the correct option for this question is A.
What is Deque?Deque may be defined as an ordered and systematic collection of items similar to the queue. It is also known as a double-ended queue. It consists of two ends, a front, and a rear, and the items remain positioned in the collection.
According to the context of this question, a deque is a kind of collection that holds data and information identical to a queue. From here, elements can be added to or eliminated from either the front or back very efficiently.
It is also often called a head-tail linked list. Though properly this signifies specific data with appropriate structure that has been the implementation of a deque.
Therefore, a deque is a type of collection that is a true statement. Thus, the correct option for this question is A.
To learn more about Deque, refer to the link:
https://brainly.com/question/16750037
#SPJ2
list any three importance of computer
Answer:
here is the answer
Explanation:
1) accurate
2) fast
3) can accomplish tasks more effencily
What is this screen called? (I attached a picture)
A. Y Editor Screen
B. Graph Screen
C. Window Screen
D. Table Screen
Answer:
graph screen is the correct answer
Answer:
a
Explanation:
Multiple Choice
The Boolean operators include which of the following?
A. and, or, not
B. to, for, from
C. a, an, the
D. is, are, not
Answer:
a
Explanation:
Boolean Operators are simple words (AND, OR, NOT or AND NOT) used as conjunctions to combine or exclude keywords in a search, resulting in more focused and productive results. ... Proximity Operators (with, near and others) can also help you in searching.
Hi, Everybody i have a question it is almost my B-day i want this lego set
(Nintendo Entertainment System™) BUT THEY ARE SOLD OUT
I NEED HALP
Answer:
You can look at different websites of look on an app for people selling it, or something :p
Explanation:
Write two statements that each use malloc to allocate an int location for each pointer. Sample output for given program:
numPtr1 = 44, numPtr2 = 99
#include
#include
int main(void) {
int* numPtr1 = NULL;
int* numPtr2 = NULL;
/* Your solution goes here */
*numPtr1 = 44;
*numPtr2 = 99;
printf("numPtr1 = %d, numPtr2 = %d\n", *numPtr1, *numPtr2);
free(numPtr1);
free(numPtr2);
return 0;
}
Answer:
#include <stdio.h>
#include <stdlib.h>
int main(void) {
int* numPtr1 = NULL;
int* numPtr2 = NULL;
/* Your solution goes here */
numPtr1 = (int *) malloc(10);
numPtr2 = (int *) malloc(20);
*numPtr1 = 44;
*numPtr2 = 99;
printf("numPtr1 = %d, numPtr2 = %d\n", *numPtr1, *numPtr2);
free(numPtr1);
free(numPtr2);
return 0;
}
Explanation:
The C library malloc function is used to assign memory locations (in bytes) to variables. It accepts the size parameter and returns a pointer to the specified variable location.
The two malloc statements above assign two memory locations 10 and 20 to the numPtr1 and numPtr2 integer variables respectively.
While your hands are on home row, both of your thumbs are on _____.
Answer:
While your hands are on home row, both of your thumbs are on Space-barI know this will definitely help✍️✍️✍️Which of the following is a popular search engine?
Apple.com
Bing.com
Firefox.com
Microsoft.com
Answer:
We conclude that Bing is the only option that is correct. Thus, Bing.com is a popular search engine.
Explanation:
Given the option
AppleBingFirefoxMicrosoftFrom the given option, we can easily determine that Bing is the only popular search engine using which we can carry out web searches. It means we can search for the information in a systematic way based on the input web query we write.
Please note that Bing is a web-based search engine, operated by Microsoft.
All the other options are incorrect.
Apple is a famous technology company; Firefox is an open-source web browser, free to use. and Microsoft is another tech company.
Therefore, we conclude that Bing is the only option that is correct. Thus, Bing.com is a popular search engine.
The popular search engine is Bing.com.
Thus, option (B) is correct.
Bing.com is a popular search engine. It is owned and operated by Microsoft and is one of the well-known search engines used by people worldwide to find information on the internet.
The other options listed Apple.com, Firefox.com, and Microsoft.com are not search engines; they are websites related to specific companies Apple, Mozilla Firefox, and Microsoft but do not function as search engines like Bing.
Apple is a famous technology companyFirefox is an open-source web browser, free to use.and Microsoft is another tech company.Therefore, Bing.com is a popular.
Thus, option (B) is correct.
Learn more about Search engine here:
https://brainly.com/question/32419720
#SPJ6
How many permutations for a 7 characters in length string, which contains all following letters R, X, S, Y, T, Z, U, has either the string 'RXS' or string 'ZU' in the 7 characters string?
Answer:
Following are the solution to this question:
Explanation:
In the following forms, RXS can appear:
[tex]R X S \_ \_ \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
[tex]\_ R X S \_ \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
[tex]\_ \_ R X S \_ \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
[tex]\_ \_ \_ R X S \_[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
[tex]\_ \_ \_ \_ R X S[/tex] it may look like that really, [tex]4 \times 3 \times 2 \times 1[/tex] forms = 24 may construct the remainder of its letters.
And we'll have a total of [tex]24 \times 5 = 120[/tex] permutations with both the string RXS.
In the following forms, UZ can appear:
[tex]U Z \_ \_ \_ \_\ _[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ UZ \_ \_ \_ \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ \_ U Z \_ \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ \_ \_ U Z \_ \_[/tex]They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ \_ \_ \_ U Z \_[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
[tex]\_ \_ \_ \_ \_ U Z[/tex] They can organize your remaining 5 characters through 5 categories! Procedures [tex]= 5 \times 4 \times 3 \times 2 \times 1 = 120[/tex]
There may be [tex]120 \times 6 = 720[/tex] ways of complete permutations.
In order to be an effective employee who knows recent information on loans and laws, in what topic should your information be current?
regional trends
industry politics
regional politics
industry trends
Answer:
industry politics
Explanation:
In order to be an effective employee who knows recent information on loans and laws, your information should be current in industry politics.
This ultimately implies that, an employee who wants to be well-informed and knowledgeable on recent informations on loans and laws, is saddled with the responsibility of gathering and sourcing for informations through industry politics. Thus, the employee must have been involved in working with various industry leaders and most likely to have interacted with various employees working there.
Industry politics can be defined as a group of policies, standards and regulations set by the government to promote and facilitate competitiveness among the private and publicly owned industries.
Answer:
industry politics
Explanation:
the other person is first and correct mark him brainliest!
1) Write a statement that defines an array of four integers named miles. The array should be initialized with the values 1, 5, 9, and 22.
2) Write a statement that defines an array of string objects nameddirections. The array should be implicitly sized, with an initialization list containing the values "Up", "Down", "Left", and "Right.
Answer:
Explanation:
The following code statements are written in Java and are simple one line statements that can be into any Java code or function. The first code statement creates a simple integer array with 4 predefined values initialized.
1) int[] miles = {1,5,9,22};
The second code statement creates a simple String array with four-string objects in it.
2) String[] nameddirections = {"Up", "Down", "Left","Right"};
what does "route print" do?
Answer:Route is a Windows command that displays and updates the network routing table. These activities will show you how to use the route command to display the local routing table.
Explanation:
Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control. Group of answer choices AVI ActiveX Class Quicktime
Answer:
Internet Explorer inserts the Flash Shockwave Player as a(n) ____ control.
ActiveX
Explanation:
ActiveX controls are small apps, also called “add-ons,” that allow websites to provide content such as videos and games. They also enable web interaction, make browsing more enjoyable, and allow animation. However, these ActiveX controls can sometimes malfunction, produce unwanted contents, or install spyware in your system because they exercise the same level of control as the computer user.
A backup can be installed that costs​ $100. What is the minimum allowable reliability for the backup that would make installing it​ worthwhile? The minimum allowable reliabilit​ = nothing​%
Answer:
0.95
Explanation:
Reliability is a assurance that a machine would have an efficiency of one or close to one.
The minimum allowable reliability R;
(1 - R) x 2000 = 100
Make R the subject of the formula;
R = 1 - (100/ 2000)
R = 1 - 0.05
= 0.95
write passage on computer virus
Answer:
A computer virus is a relatively small program that attaches itself to data and program files before it delivers its malicious act. There are many distinct types of viruses and each one has a unique characteristic. Viruses are broken up into to main classes, file infectors and system or boot-record infectors.
hope it helps