............................

Answers

Answer 1

Honestly yeah. .-- .... .- -

Answer 2

Answer:

................. kinda?

Explanation:


Related Questions

import java.util.Scanner;

public class MoneyConversion
{
// This program reads a monetary amount and computes the equivalent in bills and coins
public static void main (String[] args)
{
double total;
int tens, fives, ones, quarters, dimes, nickels;
int remainingCents;

Scanner scnr = new Scanner(System.in);

// Read in the monetary amount
total = scnr.nextDouble();

// Add the remaining code to finish out the program

}
}

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that write a function cascade that takes a positive integer and prints a cascade of this integer

Writting the code:

import java.util.*;

public class ChangeTendered {

   public static void main(String[] args){

       Scanner scan = new Scanner(System.in);

       System.out.println("Enter the purchase price: ");

       double price = scan.nextDouble();

       System.out.println("Enter the amount payed: ");

       double ammountPayed = scan.nextDouble();

       double changeDue = ammountPayed - price;

       int dollars = (int)changeDue;

       System.out.println("Return"+ dollars+ "Dollars");

       scan.close();

   }

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

Which property is used to identify the origin of an igneous rock ?

Answers

it should be crystal size
Crystal Size

Explanation:

What are some options you can set when adding a border? Check all that apply.
O line type
O border margins
O row height
Ocolumn width
Oline weight
O where to apply the border

Answers

I think it’s the column width :)

Two examples of a relation and their candidate key.

Answers

The two examples of relation and their candidate key are as follows:

STUD_NO in STUDENT relation.FAMIL_EARN in ECoNOMIC relation.

What is the Candidate key?

The candidate key may be defined as a particular kind of field in a relational database that can significantly recognize each unique record independently of any other data.

The candidate key remarkably illustrates the minimal set of ascribes that can uniquely identify given characteristics of the data. More than one candidate key takes place to represent a given set of data and information on the basis of some attributes.

Therefore, the two examples of relation and their candidate key are well described above.

To learn more about Candidate key, refer to the link:

https://brainly.com/question/13437797

#SPJ1

Question 6 of 10 What are three reasons teachers might choose to use Zoom to teach and communicate with students remotely? A. It is easy for teachers to see when students indicate they have a question. B. It has a screen-share feature that allows teachers to share their screen and whiteboard. C. It has a waiting room that allows teachers to send their students to a time-out area for misbehavior. D. It includes the ability to display the video feeds of all students in a session.​

Answers

Answer:

D

Explanation:

so the teacher can see everything they do and would not need to text their parents and moody of them are at home

what cloud computing storage

Answers

Answer:

It's where data is stored on the internet via the cloud servers. This allows for access of your data pretty much anywhere you have internet depending which service you stored your data on.

Examples:
Dropbox
Amazon Web Services (AWS)
iCloud
Mega.nz

PBL projects are graded using what it tells you what you are doing very well and where you may need improvements

Answers

Answer: a rubric

Explanation:

A rubric is a scoring tool that explicitly describes the instructor's performance expectations for an assignment or piece of work

How many bits is needed to distinctly address 226KB in a byte addressable Memory?

Answers

To distinctly address 226kb in a byte addressable memory, one would need 8 bits.

What is an addressable memory?

Word addressing in computer architecture implies that addresses of memory on a computer authenticate words of memory.

In contrast to byte addressing, where addresses authenticate bytes, it is commonly employed.

What is the calculation justifying the above answer?

Given:

2⁸ = 256

and 226 < 256

Hence, we need 8 bit.

Learn more about addressable memory:
https://brainly.com/question/19635226
#SPJ1

Assume that you are the owner of a small bicycle sales and repair shop serving hundreds of customers in your area. Identify the kinds of customer information you would like your firm's Customer Relationship Management (CRM) system to capture. How migh
this information be used to provide better service or increase revenue? Identify where or how you might capture this data.

Answers

Answer:

Bicycle shops specialize in the selling of bicycles. Depending on the shop, they may also buy, special order, rent, or repair bicycles as additional services. The retail space of the shop usually dictates the size of the inventory.

CRM-Customer Relationship Management:

The CRM is the process of integrating the functions of sales of the product, marketing, and services provided in an organization.

The objective of CRM is to help sales associates to plan the relationship development activities required to maintain and expand business.

Cleo is working in Excel and encounters a word that she would like Excel to ignore permanently for all workbooks. Which of the following options should she select?

Ignore Once
Ignore All
Add to Dictionary
AutoCorrect

ANSWER IS C Add to Dictionary

Answers

Answer:

ignore all

Explanation:

The answer is ignore all not add to dictionary

Answer:

C

Explanation:

its C dont listen to anyone else i got you

Please write in Python

Answers

A program that returns the price, delta and vega for European and American options is given below:

The Program

import jax.numpy as np

from jax.scipy.stats import norm

from jax import grad

class EuropeanCall:

   def call_price(

       self, asset_price, asset_volatility, strike_price,

       time_to_expiration, risk_free_rate

           ):

     

The complete code can be found in the attached file.

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Which of the following is a reasonable capacity for a modern thumb drive? 10MB, 80Mb, 128GB, 8000Tb. Do an Internet search and think carefully about what these values mean. To get any credit you must provide a reason for your answer.

Answers

Answer:The reasonable capacity for a modern thumb drive is 128 GB.

Explanation:

Question 6 of 20:
Select the best answer for the question.
6. Harassment is a/an
O A. single
O B. repeated
O C. unsuccessful
O D. successful
attempt to harm a person.

Answers

Harassment is a repeated attempt to harm a person. Thus, the correct option for this question is B.

What is Harassment?

Harassment may be defined as derogatory actions or words that may significantly have a disrespectful nature with the intention to harm the feelings, emotions, and behaviors of others.

According to the question, harassment is not a single attempt, it may force numerous times in order to affect the native feelings and emotions of others. But the ultimate effect of this depends on personal understanding and dedication. If an individual is well-determined, the attempt made is unsuccessful.

Therefore, harassment is a repeated attempt to harm a person. Thus, the correct option for this question is B.

To learn more about Harassment, refer to the link:

https://brainly.com/question/12830365

#SPJ1

why computer is now considered a commodity.

Answers

Answer:

Computers are considered commodities because they are relatively easy to produce and there is a lot of competition in the market. This means that prices are relatively low and there is not a lot of differentiation between products.

Explanation:

Hope this helps!

Students might earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree with an emphasis in digital communications in order to become a

Answers

Answer: Digital Communications Specialist

Explanation:

Took The Test Myself

Students might earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree with an emphasis in digital communications, in order to become a: Digital Communications Specialist.

What is a bachelor's degree?

A bachelor's degree can be defined as an academic degree that is formally awarded by a tertiary institution (university or college) to a student after the successful completion of his or her high school, and it usually takes about 4 or 5 years to complete a bachelor's degree.

What is a master's degree?

A master's degree can be defined as an academic degree that is formally awarded by a tertiary institution (university or college) to a student after the successful completion of his or her bachelor's degree programme.

In conclusion, students are required to earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree in digital communications, in order to become a Digital Communications Specialist.

Read more on Digital Communications Specialist here: https://brainly.com/question/27746922

#SPJ1

If you forget your password for a website and you click [Forgot my password], sometimes the company sends you a new password by email but sometimes it sends you your old password by email. Compare these two cases in terms of vulnerability of the website owner.

If the site tells you what your password was, that means the site is storing your password rather than just a hash of it. This means that anyone who gains access to the site’s password database has access to all the passwords. If the site sends you a temporary password, there is a good chance it is not storing actual passwords, which is the correct approach from a security perspective.

Answers

I believe the first one is better but in regards to the two cases in terms of vulnerability of the website owner, one can say that when the owner to  the site is breached into, a lot of people's account will be breached into also and personal information stolen.

Why the above idea?

If a person is said to click forgot password button on a site, the  email that is said to have their old password will be sent a new Passwords from the website in question.

But this is one that is not often secure based on the fact that the system admins and programmers  will be seeing the  password.

On the  other hand, let say  the site sends a new password without carrying out any kind of proper validation and whoever that has asked  for the new password, the new password may fall into the hands of those who it is being sent to and this may be an intruder therefore, it is one that is also risking website owners and users as well.

Hence, I believe the first one is better but in regards to the two cases in terms of vulnerability of the website owner, one can say that when the owner to  the site is breached into, a lot of people's account will be breached into also and personal information stolen.

Learn more about System hack from

https://brainly.com/question/23294592
#SPJ1

(Geometry: area of a triangle)
Write a C++ program that prompts the user to enter three points (x1, y1), (x2, y2), (x3, y3) of a triangle and displays its area.
The formula for computing the area of a triangle is:
s = (side1 + side2 + side3) / 2
area = square root of s(s - side1)(s - side2)(s - side3)

Sample Run:
Enter three points for a triangle: 1.5 -3.4 4.6 5 9.5 -3.4
The area of the triangle is 33.6

Answers

A C++ program that prompts the user to enter three points (x1, y1), (x2, y2), (x3, y3) of a triangle and displays its area is given below:

The C++ Code

//include headers

#include <bits/stdc++.h>

using namespace std;

//main function

int main() {

//variables to store coordinates

float x1,x2,y1,y2,x3,y3;

cout<<"Please Enter the coordinate of first point (x1,y1): ";

// reading coordinate of first point

cin>>x1>>y1;

cout<<"Please Enter the coordinate of second point (x2,y2): ";

// reading coordinate of second point

cin>>x2>>y2;

cout<<"Please Enter the coordinate of third point (x3,y3): ";

// reading coordinate of third point

cin>>x3>>y3;

//calculating area of the triangle

float area=abs((x1*(y2-y3)+x2*(y3-y1)+x3*(y1-y2))/2);

cout<<"area of the triangle:"<<area<<endl;

return 0;

}

Read more about C++ program here:

https://brainly.com/question/20339175
#SPJ1

A(n) _______ _______ is a collective term for all the ways you interact with a software program.

Answers

Answer:

The user interface is a collective term for all the ways you interact with a software program. You can interact with a software program using a keyboard, a mouse, a touch screen, or a voice-activated assistant.

Explanation:

Hope this helps!


Which of the following types of networks can be used to connect different office
locations of one large company?
Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Network (MAN)
Controlled Area Network (CAN)

Answers

The option that is a types of networks can be used to connect different office locations of one large company is option b: Wide Area Network (WAN).

What do you mean when you say "WAN" (wide area network)?

A wide area network, or WAN for short, is a sizable information network unconnected to a particular region. Through a WAN provider, WANs can make it easier for devices all around the world to communicate, share information, and do much more.

It is a telecommunications network that covers a substantial geographic area is referred to as a wide area network. Leasing telecommunications circuits is a common way to set up wide area networks.

Therefore, The option that is a types of networks can be used to connect different office locations of one large company is option b: Wide Area Network (WAN).

Learn more about Wide Area Network (WAN) from

https://brainly.com/question/14959814
#SPJ1

Type the correct answer in the box. Spell all words correctly.
Complete the sentence describing an analog signal.
An analog video is a video signal transmitted by an analog signal, captured on a _____
.

Answers

Answer : amplitude

Explanation : A channel actually consists of two signals: the picture information is transmitted using amplitude modulation on one carrier frequency, and the sound is transmitted with frequency modulation at a frequency at a fixed offset (typically 4.5 to 6 MHz) from the picture signal.

Write a program that reads a monetary amount in dollars and cents (such as 37.84) and computes the equivalent in bills and coins, using the largest denominations possible.

Use a Scanner object to read in a double value for the monetary amount
Convert the total monetary amount to an integer representing the total number of cents (there are 100 cents in a dollar)
US monetary denominations
ten dollar bill = 1000 cents
five dollar bill = 500 cents
one dollar bill = 100 cents
quarter coin = 25 cents
dime coin = 10 cents
nickel coin = 5 cents
penny coin = 1 cent
Use integer division (/) and modulus (%) to calculate each denomination and the cents left over
Hint: You will need to successively divide the remaining cents by the number of cents in the denomination, starting with the ten dollar bills.
tens = remainingCents / 1000; // Divide the total cents by the number of cents in $10
remainingCents = remainingCents % 1000; //Remainder of division by 1000 is what is left after $10 bills taken out
When user input appears as shown in Figure 1, your program should produce output as shown in Figure 2.

Figure 1: (input)

37.84
Figure 2: (output)

$37.84 is equivalent to the following:
3 ten dollar bills
1 five dollar bills
2 one dollar bills
3 quarters
0 dimes
1 nickels
4 pennies


import java.util.Scanner;

public class MoneyConversion
{
// This program reads a monetary amount and computes the equivalent in bills and coins
public static void main (String[] args)
{
double total;
int tens, fives, ones, quarters, dimes, nickels;
int remainingCents;

Scanner scnr = new Scanner(System.in);

// Read in the monetary amount
total = scnr.nextDouble();

// Add the remaining code to finish out the program

}
}

Answers

Using the knowledge of computational language in python we can write the code as program that reads a monetary amount in dollars and cents (such as 37.84) and computes the equivalent in bills and coins, using the largest denominations possible.

Writting the code:

import java.util.Scanner;

public class Money {

public static void main(String[] args) {

double amount; // This displays user's amount

int one, five, ten;

int penny, nickel, dime, quarter;

// Create a Scanner object to read input.

Scanner kb = new Scanner(System.in);

// Get the user's amount

System.out.print("What is the amount? ");

amount = kb.nextDouble();

// Calculations

ten = (int) (amount / 10);

amount = amount % 10;

five = (int) (amount / 5);

amount = amount % 5;

one = (int) (amount / 1);

amount = amount % 1;

quarter = (int) (amount / .25);

amount = amount % .25;

dime = (int) (amount / .10);

amount = amount % .10;

nickel = (int) (amount / .05);

amount = amount % .05;

penny = (int) (amount / .01);

amount = amount % .01;

// Display the results

//println adds a new line by default

System.out.println(ten + " tens.");

System.out.println(five + " fives.");

System.out.println(one + " ones.");

System.out.println(quarter + " quarters.");

System.out.println(dime + " dimes.");

System.out.println(nickel + " nickels.");

System.out.println(penny + " pennies.");

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Question 15 (1 point)
Saved
Carla is taking a trip to a cabin to write and she's looking for a typewriter that
doesn't need electricity or any other kind of power. What would be the BEST option
for her?
a tablet
a manual typewriter
an electric typewriter
an IBM typewriter

Answers

Since Carla looking for a typewriter that doesn't need electricity or any other kind of power, the best option would be: B. a manual typewriter.

What is an electrical circuit?

An electrical circuit can be defined as an interconnection of different electrical components, in order to create a pathway for the flow of electric current (electrons) due to a driving voltage.

The components of an electrical circuit.

Generally, an electrical circuit comprises the following electrical components:

ResistorsCapacitorsBatteriesTransistorsSwitchesWiresFuse

Generally speaking, a manual typewriter is a mechanical device that is designed and developed to enable an end user to type, especially without the use of electricity or any other kind of power.

Read more on an manual typewriter here: https://brainly.com/question/2939803

#SPJ1

# Your task is to modify the previous examples code to
# print out all the even numbers from 1 to N where N is
# an int from the user

Answers

Answer:

n = int(input('N: '))

for i in range(1, n + 1):

   if i % 2 == 0:

       print(i)

When a copyright for work has expired the work is then said to be in the

Answers

Answer:

Public Domain

Explanation:

Came to me in a dream

Answer:

Public Domain. This means that the work is no longer under copyright protection and can be used by anyone.

Explanation:

Hope this helps!

User asks you to develop a program that calculates and then prints interest earned on a bank
balance. Program should print interest earned for the same balance when interest is accumulated
annually, semiannually and quarterly.
Interest earned yearly-balance * rate /100
Interest earned semiannually balance*rate/2/100
Interest earned quarterly= balance*rate/4/100
for annual
for semi annual
for quarterly
00 is Current (1) times resistance (R)

Answers

The program that calculates and then prints interest earned on a bank balance is given below:

The Program

#include <bits/stdc++.h>

using namespace std;

int main()

{

   double principle = 10000, rate = 5, time = 2;

   /* Calculate compound interest */

   double A = principle * (pow((1 + rate / 100), time));

     double CI = A- principle;

   cout << "Compound interest is " << CI;

   return 0;

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Write a program that prompts the user to input two POSITIVE numbers — a dividend (numerator) and a divisor (denominator). Your program should then divide the numerator by the denominator. Lastly, your program will add the quotient and the remainder together.

Answers

function divide(num, den, rem) { //Numerator, Denomenator, Remainder

 rem = Math.abs(num) % Math.abs(den)

 return rem

}

console.log(divide(13, 5)) // logs '3'

Math.abs() is a function to make the integer a positive integer so that negative integers cant be divided

'rem' gets the remainder

what do u mean by server ?​

Answers

A lot of computers that is shared by one network. They usually help utilize there resources remotely

The automation paradox states: “The more automated machines are, the less we rely on our own skills.” But instead of relying less on automation to improve our skills, we rely even more on automation.” Elaborate further on the skills we would lose as automation is implemented.

Answers

The skills we would lose as automation is implemented are:

Communication Skills. Social Skills. Critical ThinkingThe use of Imagination and Reflection.

What takes place if automation takes over?

The Automation can lead to lost of jobs, as well as reduction in wages.

Note that Workers who are able to  work with machines are said to be the ones that will be more productive than those who cannot use them.

Note that  automation tends to lower both the costs as well as the prices of goods and services, and thus they makes consumers to be able to feel richer as well as loss of some skills for workers.

Therefore, The skills we would lose as automation is implemented are:

Communication Skills. Social Skills. Critical ThinkingThe use of Imagination and Reflection.

Learn more about automation from

https://brainly.com/question/11211656

#SPJ1

Answer: Automation will elimate problem solving skills and communication skills.

Explanation: With the inability to solve problems we lose the skill of using our imaginationa and allowing our brain cells to grow. When you figure out and solve a problem your brain gains more knowledge and you are exercising your brain cells, if you don't use them you will lose them and your inability to make decisions well because there is now AI doing it for you. Also communication one being writing if we no longer have to write with pen and paper we lose the ability to communicate properly in writing our grammer becomes poor and handwriting will no longer be a skill because you never use it.

Now let's build a calorie counter. The NHS recommends that
an adult male takes on board 2,500 calories per-day and an
adult woman takes on 2,000 calories per-day. Build your
program in python for a woman or a man.

Answers

The building of a program in python for a calorie intake per day by a woman or a man is represented as follows:

print("Your calorie counter")

calories = int(input("How many calories have you eaten today? "))

s=2000-calories

print("You can eat", s, "calories today")

What is Python programming?

Python programming may be characterized as a kind of high-level computer programming language that is often utilized in order to construct websites and software, automate tasks, and conduct data analysis.

There are various factors and characteristics of python programming. Each program is built based on specific attributes. They are strings (text), numbers (for integers), lists (flexible sequences), tuples, and dictionaries. The most important components are expression, statements, comments, conclusion, etc.

Therefore, the python programming for a calorie intake per day by a woman or a man is mentioned above.

To learn more about Python programming, refer to the link:

https://brainly.com/question/26497128

#SPJ1

In Java, System is a:

Answers

Answer:

In Java, System is a:

one of the core classes

Other Questions
a is often used for the supervisor to communicate specific concerns about the employees work and to positively reinforce elements of good performance. pls help me out with this HELP(PICTURE BELOW) A client with schizophrenia hears a voice telling him he is evil and must die. the nurse understands that the client is experiencing? Which amendment to the united states constitution protects the rights of women to vote? responses fifteenth fifteenth, seventeenth seventeenth, nineteenth nineteenth, twenty-sixth Suppose that the height of the slide is 2 feet,when x = 20. What is the average rate of changeover the entire slide?(answer is -3.9 on edge 2022 but all the other top brainly answers were incorrect) A researcher found that students who scored high on a test of reading achievement also scored high on a self-esteem inventory. the researcher can say that reading achievement and self-esteem are? Please help! (Also show work)Tutorials :D How long does it take for a radio message to travel from earth to the moon and back? (see the inside back cover of the textbook for the necessary data.) What is a volvox colony?How does it survive? Which term is used to document excessive sweating associated with shortness of breath? Which theorist is associated with a laboratory procedure called the strange situation? Of the various methods of collecting crime and victimization data discussed in this module and in any additional research that you conduct, which are best suited for use in researching victimology? -15-3w = 4w-2wH is it a infinite solution or no solution Carrie collected canned food for a homeless shelter in her area each day for one week. On day one, she collected 7 cans of food. On day two, she collected 8 cans. On day three, she collected 10 cans. On day four, she collected 13 cans. If Carrie wanted to give at least 100 cans of food to the shelter and this pattern of can collecting continued, did she meet her goal? Use function notation to write the equation of the line.please help Which celebrity's famed book club produced an instant best-seller whenever a book was added to the list? ellen degeneres j. k. rowling oprah winfrey barbara walters this type of organizational structure is well suited for the construction industry because it provides limited personal liability for debts, yet benefits from pass-through taxation. After a big snowfall, you take your favorite rocketpowered sled out to a wide field. The field is 205 m across, and you know that your sled accelerates at a rate of 3.95 m/s2 when the rocket is on. How fast will the sled be moving when it reaches the other end of the field? Should schools teach children how to cook ?