which type of infrastructure service stores and manages corporate data and provides capabilities for analyzing the data?

Answers

Answer 1

Services for managing and storing corporate data as well as giving users the tools to analyze it.

VoIP, also known as IP telephony, enables users to place or receive phone calls through a broadband internet connection. In this regard, VoIP serves as the foundational technology for the online transmission of speech and other multimedia material. The services offered by all the software and hardware are the main emphasis of IT infrastructure. IT infrastructure is a group of company-wide services that management budgets for and consists of both technical and human resources. SaaS offers on-demand or recurring delivery of software programs through the internet. The cloud service providers host, control, and manage the software program as well as look after the supporting infrastructure.

Learn more about Services here-

https://brainly.com/question/12096912

#SPJ4


Related Questions

you have used firewalls to create a demilitarized zone. you have a web server that needs to be accessible to internet users. the web server must communicate with a database server for retrieving product, customer, and order information. how should you place devices on the network to best protect the servers? (select two.)

Answers

Answer:

1. Put the database server on the private network.

2. Put the web server inside the DMZ.

kind regards

1_>circle 2_>retangle 3->triangle 4_>square 5_>trapezoid 6_>parallelogram enter the figure code 2 enter the breadth and length​

Answers

# define a function for calculating

# the area of a shapes

def calculate_area(name):

 

 # converting all characters

 # into lower cases

 name = name.lower()

 

 # check for the conditions

 if name == "rectangle":

   l = int(input("Enter rectangle's length: "))

   b = int(input("Enter rectangle's breadth: "))

   

   # calculate area of rectangle

   rec area = l * b

   print(f"The area of rectangle is: rec area")

 

 elif name == "square":

   s = int(input("Enter square's side length: "))

     

   #calculate area of square

   sqt_area = s * s

   print(f"The area of square is

         {sqt_area}.")

 elif name == "triangle":

   h = int(input("Enter triangle's height length: "))

   b = int(input("Enter triangle's breadth length: "))

     

   # calculate area of triangle

   tri_area = 0.5 * b * h

   print(f"The area of triangle is

         {tri_area}.")

 elif name == "circle":

   r = int(input("Enter circle's radius length: "))

   pi = 3.14

       

   # calculate area of circle

   circ_area = pi * r * r

   print(f"The area of circle is

         {circ_area}.")

       

 elif name == 'parallelogram':

   b = int(input("Enter parallelogram's base length: "))

   h = int(input("Enter parallelogram's height length: "))

   

   # calculate area of parallelogram

   para_area = b * h

   print(f"The area of parallelogram is

         {para_area}.")

   

 else:

   print("Sorry! This shape is not available")

# driver code

if __name__ == "__main__" :

 

 print("Calculate Shape Area")

 shape_name = input("Enter the name of shape whose area you want to find: ")

 

 # function calling

 calculate_area(shape_name)

Output:

Calculate Shape Area

Enter the name of shape whose area you want to find: rectangle

Enter rectangle's length: 20

Enter rectangle's breadth: 15

The area of rectangle is 300.

What is code?

In computing, source code, is any collection of code, with or without comments, written in a human-readable programming language. The source code of a programme is specially designed to aid the work of computer programmers, who write source code to specify the actions to be performed by a computer.

To learn more about code

https://brainly.com/question/26134656

#SPJ9

A function's return data type must be the same as the function's
parameter(s).
True
False



// For C++

Answers

The given statement of data type is false.

What is data type?

A data type is a set of possible values and operations that may be performed on it in computer science and programming. A data type specifies how the programmer intends to use the data to the compiler or interpreter. Most programming languages support integer numbers (of various sizes), floating-point numbers (which approximate real numbers), characters, and Booleans as basic data types. A data type limits the potential values of an expression, such as a variable or a function. This data type specifies the actions that may be performed on the data, its meaning, and how values of that kind can be stored.

To learn more about data types

https://brainly.com/question/179886

#SPJ13

Given the array, var a = [20, 40, 60, 80, 100], which line of code accesses the value 40?

Answers

Answer:

1

0 = 20

1=40

2=60

3=80

4=100

etc..

Helppp pleaseee help pleaseee look at picture

Answers

Answer:

C & E

Explanation:

Brainlest, Please!

Answer:

C and E

Explanation:

What is the easiest way to create a resume in Word with predefined content that can be replaced with your information?

Answers

The easiest way to create a resume in Word with predefined content that can be replaced with your information is to use a resume template.

What is resume?

A resume, often known as a curriculum vitae (CV) in English outside of North America, is a document written and utilised by an individual to present their background, abilities, and accomplishments. Resumes can be used for a variety of reasons, but they are most commonly utilised to find new job. A CV often includes a "summary" of relevant employment experience and education. The resume is frequently one of the first items a potential employer sees about the job seeker, along with a cover letter and sometimes an application for employment, and is typically used to screen applicants, often followed by an interview.

To learn more about resume

https://brainly.com/question/14178136

#SPJ13

Create a program that will allow user to input arithmetic operator, first number and second number
then perform a result based on the condition.

and produce the output below.
• When arithmetic operator "+" or "addition" perform addition for first number and second number and
use (for loop) to display count down from result to 1.
• When arithmetic operator "x" or "multiplication" perform multiplication for first number and second
number and use (for loop) to display from 1 to result.
• When arithmetic operator "-" or "subtraction" perform subtraction for first number and second
number and use (while loop) to count down from result to 0.
• When arithmetic operator "/" or "division" perform division for first number and second number and
use (while loop) to display from 0 to result.
• When arithmetic operator "%" or "modulo" perform modulo for first number and second number and
use (do while loop) to display from 0 to result, Otherwise Access Denied

Answers

A program that will allow the user to input the arithmetic operator, the first number, and the second number and then perform a result based on the condition that when the arithmetic operator "+" or "addition" performs addition for the first number and second number and use (for loop) to display count down from result to 1 is given below:

The Program

a = int(input("Enter First Number: "))

b = int(input("Enter Second Number: "))

print("Enter which operation would you like to perform?")

ko = input("Enter any of these char for specific operation +,-,*,/: ")

result = 0

if ko == '+':

   result = a + b

elif ko == '-':

   result = a - b

elif ko == '*':

   result = a * b

elif ko == '/':

  result = a / b

else:

   print("Error")

print(a, ko, b, ":", result)

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Consider the following program segment:

//include statement(s)
//using namespace statement

int main()
{
//variable declaration
//executable statements
//return statement
}


Write C++ statements that include the header files iostream and string.

Write a C++ statement that allows you to use cin, cout, and endl without the prefix std::.

Write C++ statements that declare and initialize the following named constants: SECRET of type int initialized to 11 and RATE of type double initialized to 12.50.

Write C++ statements that declare the following variables: num1, num2, and newNum of type int; name of type string; and hoursWorked and wages of type double.

Write C++ statements that prompt the user to input two integers and store the first number in num1 and the second number in num2.

Write a C++ statement(s) that outputs the values of num1 and num2, indicating which is num1 and which is num2. For example, if num1 is 8 and num2 is 5, then the output is:

The value of num1 = 8 and the value of num2 = 5.
Write a C++ statement that multiplies the value of num1 by 2, adds the value of num2 to it, and then stores the result in newNum. Then, write a C++ statement that outputs the value of newNum.

Write a C++ statement that updates the value of newNum by adding the value of the named constant SECRET to it. Then, write a C++ statement that outputs the value of newNum with an appropriate message.

Write C++ statements that prompt the user to enter a person’s last name and then store the last name into the variable name.

Write C++ statements that prompt the user to enter a decimal number between 0 and 70 and then store the number entered into hoursWorked.

Write a C++ statement that multiplies the value of the named constant RATE with the value of hoursWorked and then stores the result into the variable wages.

Write C++ statements that produce the following output:

Name: //output the vlaue of the variable name
Pay Rate: $ //output the value of the Rate
Hours Worked: //output the value of the variable hoursWorked
Salary: $ //output the value of the variable wages
For example, if the value of name is "Rainbow" and hoursWorked is 45.50, then the output is:

Name: Rainbow
Pay Rate: $12.50
Hours Worked: 45.50
Salary: $568.75
Write a C++ program that tests each of the C++ statements that you wrote in parts a through l. Place the statements at the appropriate place in the C++ program segment given at the beginning of this problem. Test run your program (twice) on the following input data:

a.
num1 = 13, num2 = 28; name ="Jacobson"; hoursWorked = 48.30.


b.
num1 = 32, num2 = 15; name ="Crawford"; hoursWorked = 58.45.

Answers

The program will be illustrated thus:

c++ code:

#include <iostream>

using namespace std;

int main() {

string s;

cout<<"Enter your name : "<<endl;

cin>>s;

int num1,num2,num3,average;

num1=125;

num2=28;

num3=-25;

average=(num1+num2+num3)/3;

cout<<"num1 value is : "<<num1<<endl;

cout<<"num2 value is : "<<num2<<endl;

cout<<"num3 value is : "<<num3<<endl;

cout<<"average is : "<<average<<endl;

return 0;

What is a program?

A program is a precise set of ordered operations that a computer can undertake. The program in the modern computer described by John von Neumann in 1945 has a one-at-a-time series of instructions that the computer follows. Typically, the software is saved in a location accessible to the computer.

Computer programs include Microsoft Word, Microsoft Excel, Adobe Photoshop, Internet Explorer, Chrome, and others. In filmmaking, computer applications are utilized to create images and special effects.

Learn more about Program on:

https://brainly.com/question/23275071

#SPJ1

Pregunta Shapes are located on the ______ Tab in PowerPoint.​

Answers

Answer: its located in the insert tab

The following statements describe the use of graphics in presentations. Responses Graphics should be used when they are relevant to the content. Graphics should be used when they are relevant to the content. Graphics should be used on every slide. Graphics should be used on every slide. Many graphics will make a boring presentation interesting. Many graphics will make a boring presentation interesting. Graphics should be large enough to be seen by the audience. Graphics should be large enough to be seen by the audience.

Answers

Answer:

I. Graphics should be large enough to be seen by the audience.

II. Graphics should be used when they are relevant to the content.

Explanation:

Presentation can be defined as an act of talking or speaking formally to an audience in order to explain an idea, piece of work, project, and product with the aid of multimedia resources, slides or samples.

PowerPoint application refers to a software application or program designed and developed by Microsoft, to avail users the ability to graphically create various slides containing textual and multimedia informations that can be used during a presentation.

Some of the features available on Microsoft PowerPoint are narrations, transition effects, custom slideshows, animation effects, formatting options etc.

Hence, the following statements describe the use of graphics in presentations;

I. Graphics should be large enough to be seen by the audience.

II. Graphics should be used when they are relevant to the content.

Explanation:

Answer:

I. Graphics should be large enough to be seen by the audience.

II. Graphics should be used when they are relevant to the content.

B and C

Explanation:

if you're connected to a switch and your nic is in promiscuous mode, what traffic would you be able to capture? check all that apply.

Answers

If one is connected to a switch and the NIC is in promiscuous mode, the traffic that one would be able to capture are:
"packets transmitted to your switch port, which means traffic to or from your computer or broadcast packets. This is because one is connected to a switch.

What is a promiscuous mode in Networking?

"Promiscuous mode" is a mode of operation as well as a security, monitoring, and management strategy in computer networking. In promiscuous mode, a network device, such as an adapter on a host system, can intercept and read each network packet that comes in its entirety.

Promiscuous mode on a network permits a network device to intercept and read each network packet that comes in its entirety. Promiscuous mode is a mode of operation in an Ethernet local area network (LAN) in which every data packet delivered can be received and read by a network device.

You can use any of the following commands to put an interface into idle mode, the latest way is to use the "ip" command. Use the ifconfig command to determine if the NIC is set to promiscuous mode.

Learn more about Switches:
https://brainly.com/question/1147908
#SPJ1

Which type of footwear should be worn while working on hybrid electric vehicles (HEVs) and electric vehicles (EVs)

Answers

Answer: Insulated safety footwear.

Explanation: While working on a hybrid electric vehicle (HEV) or an electric vehicle (EV) you should wear Insulated safety footwear.


A hotel chain is using AI to enhance its booking services. Its system can locate each of its users using their mobile GPS location.

Which AI application is used to perform this task?

A) prediction
B) profiling
C) tracking
D) voice or facial recognition

Answers

The AI application that is used to perform this task is tracking. The correct option is C.

What is AI technology?

In its most basic form, AI (artificial intelligence) refers to systems or machines that mimic human intelligence in order to perform tasks and can iteratively improve themselves based on the data they collect.

Tracking is used to increase or decrease the amount of text on a page by increasing or decreasing the amount of space between letters.

It differs from kerning in that it affects an entire font or range of text, whereas kerning only affects specific letter pairs.

Tracking is the AI application that is used to perform the task using their mobile GPS location.

Thus, the correct option is C.

For more details regarding artificial intelligence, visit:

https://brainly.com/question/22678576

#SPJ1

many people are now using the web not simply to download content, but to build communities and upload and share content they have created. this trend has been given the name

Answers

The term "Web 1.0" describes the early development of the World Wide Web. In Web 1.0, the vast majority of users were content consumers and there were very few content creators.

Personal websites were widespread and mostly included static pages maintained on free web hosts or web servers controlled by ISPs.

Web 1.0 forbids the viewing of ads while browsing websites. Ofoto, another online digital photography websites from Web 1.0, allowed users to store, share, view, and print digital images. Web 1.0 is a content delivery network (CDN) that allows websites to present the information. One can use it as their own personal webpage.

The user is charged for each page they see. Users can access certain pieces of information from its directories. Web 1.0 was prevalent from around 1991 until 2004.

Four Web 1.0 design requirements are as follows:

1.static web pages

2.The server's file system is used to serve content.

3.Pages created with the Common Gateway Interface or Server Side Includes (CGI).

4.The items on a page are positioned and aligned using frames and tables.

To know more about Web 1.0 click on the link:

https://brainly.com/question/14411903

#SPJ4

Which of the following statements are true about routers and routing on the Internet.

a. Protocols ensure that a single path between two computers is established before sending packets over it.
b. Routers are hierarchical and the ""root"" router is responsible for communicating to sub-routers the best paths for them to route internet traffic.
c. A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or ""dropped"".
d. Routers act independently and route packets as they see fit.

Answers

A packer traveling between two computers will always have two router’s. The original one that the information is sent from and the one that received it to be able to communicate with. Answer C.

A packet traveling between two computers on the Internet may be rerouted many times along the way or even lost or ""dropped"" is the statements are true about routers and routing on the Internet. Hence, option C is correct.

What is routers?

A router can connect one or more packet-switched networks or subnetworks. It controls traffic between several networks and enables multiple devices to share an Internet connection by transmitting data packets to their intended IP addresses.

In addition to VPN routers, wired, wireless, core, and edge routers are also included.

In order to transfer data between two or more packet-switched computer networks, a router—either real or virtual—is used. A router looks at the destination's Internet Protocol address and chooses the best route for the data packet to take in order to get there.

Thus, option C is correct.

For more information about routers, click here:

https://brainly.com/question/15851772

#SPJ12

Test if a number grade is an F (less than or equal to 65). If so, print "That’s not good.". (Python)


Hint: Grades may be decimals.


Sample Run

Enter a Number: 60


Sample Output

That's not good.

Answers

Answer:

grade = float(input(Enter a number grade: "))

if grade <= 65:

     print("That's not good")

Explanation:

Answer:

grade=float(input("Enter a number grade:"))

if grade<=65:

    print("That's not good.")

Explanation:

I got a 100% on the question. The first answer had a few mistakes in it.

Sincerely,

         Dangerous Gem


What type of function does a project management tool have that a task management
tool does not?
file sharing
Oprogress tracking
commenting
budgeting

Answers

The type of function does a project management tool have that a task management tool does not use  is option C; commenting.

What is the project management tool from Microsoft?

To develop timetables, project plans, manage resources, and keep track of time, project managers utilize Microsoft Project. For project management experts, it contains features like Gantt charts, kanban boards, and others.

Therefore, This project management tool enables your engineering team to keep tabs on each undertaking. Every component of any project your engineering team is working on may be managed by a single system and commenting is not one of it.

Learn more about  project management tool  from

https://brainly.com/question/6500846
#SPJ1

1.Create a new password
1-Develop an algorithm using pseudocode and a flowchart that asks the user to
create a new password.
The algorithm should:
• get the user to enter a password
● get the user to re-enter the password
• repeat the two bullet points above until both entered passwords are
identical
output "password created" when they are identical

Answers

The algorithm of the question will be:

1. Start

2. get the user to enter a password

3. get the user to re-enter the password

4. if the passwords are not identical, repeat steps 1 and 2

5. output "password created" when the passwords are identical.

6. End

Algorithm:

An algorithm in computer science is a finite sequence of strict instructions that is often used to solve a class of specialised problems or to execute a computation. Algorithms serve as specifications for calculating and processing data. Advanced algorithms can execute automated deductions and apply mathematical and logical tests to direct code execution through several paths.

To learn more about algorithm

https://brainly.com/question/24953880

#SPJ13

you receive an email from your organization notifying you that you need to click on a link and enter some personal information to verify your identity or else your account will be suspended. what should you do?

Answers

You should reach out to your organization to confirm that the email is legitimate before taking any action. If you are unsure, you can also try to look up the organization's contact information online to verify.

What is email?

Electronic mail (often known as e-mail) is a technique of transmitting messages ("mail") between persons via electronic equipment. Email was thus envisioned as the electronic (digital) alternative to mail at a period when "mail" solely referred to physical mail (thus e- + mail). Email later became a ubiquitous (extremely extensively used) communication channel, to the point where an email account is often viewed as a basic and necessary aspect of many procedures in most nations, including business, trade, government, education, entertainment, and other realms of daily life.

To learn more about email

https://brainly.com/question/24688558

#SPJ4

Which errors need to be corrected on this bibliography page? Check all that apply.

Answers

The errors need to be corrected on this bibliography page are:

A. The page title should not be bolded and underlined.

C. The second entry needs a hanging indent.

D. The last entry needs to have a date accessed.

E. The citations should be in alphabetical order.

What is bibliography?

The sources you utilized to gather information for your report are listed in a bibliography. It appears on the final page of your report, near the finish (or last few pages).

A bibliography is a list of all the sources you utilized to research your assignment. The names of the authors are typically included in a bibliography. the names of the pieces. the names and locations of the businesses that released the sources you used for your copies. 3

The things to write on a bibliography page are:The author name.The  title of the publicationThe  date of publication.The  place of publication of a book.The  publishing company of a book.The  volume number of a magazine or printed encyclopedia.The  page number(s)

Learn more about bibliography page  from

https://brainly.com/question/27566131

#SPJ1

See options below

Which errors need to be corrected on this bibliography page? Check all that apply.

The page title, “Bibliography,” should not be in bold or underlined.

The first entry needs the author’s name.

The second entry needs a hanging indent.

The last entry needs to show the date it was accessed.

The citations should be in alphabetical order.

Answer:

What is the purpose of a bibliography or a works-cited list? Check all that apply.

to credit an author’s original idea or information

to avoid plagiarism

to organize source material

to direct readers to sources

Explanation:

What is the work of continue statement in c programming

Answers

Answer:

The continue statement breaks one iteration (in the loop), if a specified condition occurs, and continues with the next iteration in the loop.

Explanation:

one image is 16384 pixels wide and 512 pixels high. He decides to save it as a 256 color bitmap image. Calculate the file size in Gib

Answers

The file size would be 0.268435456 gb

What is a File Size?

This refers to the capacity of a file to store information in it and is a function of memory in computers.

Calculations and Parameters

Given that:

There is a 256 color bitmap image.

The pixel dimensions are: 16384 pixels wide and 512 pixels high (16384 x 512)

To find the file size, this would be:

(16384 x 512 x 256)/8

= 268,435,456 bytes.

Then, to convert bytes to gigabytes and it would be 0.268435456 gb

Read more about digital imaging here:

https://brainly.com/question/26307469

#SPJ1

Functions of a DVD in computer

Answers

DVD is a digital optical disc storage format that are commonly used to store large amounts of data, such as high-quality videos and movies. A DVD-ROM drive and DVD player software are required to read and play DVDs on a computer.

What exactly is a DVD?

DVD (digital video disc) is an optical data storage technology similar to compact disc (CD). Optical data storage is a technique that stores digital information (1's and 0's) by reading the information with light.

A DVD movie is depicted in the image of the Matrix DVD movie disc. It is also where the operating system is kept. In 1995, four companies named Philips, Sony, Toshiba, and Panasonic invented and developed it. The first DVD-ROM drives that used these discs were sold in 1997.

To learn more about DVD

https://brainly.com/question/26223221

#SPJ9

Question # 2 Multiple Choice Do you think it is acceptable to copy and paste material from a web page into a term paper?
Yes, because information on the internet is free for everyone to use.
Yes, because information on the internet is free for everyone to use.
Yes, if you paste of where you got it from but do not quote it.
Yes, if you paste of where you got it from but do not quote it.
No, because you should not pass other people’s work off as your own.
No, because you should not pass other people’s work off as your own.
No, because you can get sued by the owner of the material.

Answers

Do you think it is acceptable to copy and paste material from a web page into a term paper: No, because you should not pass other people’s work off as your own.

What is plagiarism?

Plagiarism simply refers to an act of representing or using an author's literary work, thoughts, ideas, language, or expressions without their consent, permission, acknowledgement or authorization.

This ultimately implies that, plagiarism is an illegal act that involves using another author's intellectual work or copyrighted items word for word without getting an authorization and permission from the original author.

In this context, we can reasonably infer and logically deduce that it is very wrong to copy and paste material from a web source into a term paper without an accurate citation or reference to the original author.

Read more on plagiarism here: brainly.com/question/397668

#SPJ1

Answer:

C. No, because you should not pass other people’s work off as your own.

Explanation:

Which of the following statements are true about validation in the validation and verification process? Each correct answer represents a complete solution. Choose all that apply.
A. Describes proper software construction
B. Answers the 'Are we building the product right?' question
C. Means that the software meets the specified user requirements
D. Answers the 'Are we building the right product?' question

Answers

The  statements that are true about validation in the validation and verification process is option C. Means that the software meets the specified user requirements.

What is the process for verification and validation?

Verification is the process of confirming that the software was created and developed in accordance with the given specifications. The process of validation involves determining whether the software's (the finished product's) genuine needs and expectations have been satisfied.

Therefore, Verification and validation, commonly known as V&V, are separate processes used in tandem to make sure that a system, service, or product complies with requirements and specifications and serves the intended purpose.

Learn more about validation  from

https://brainly.com/question/19423725
#SPJ1

HELP!

What is a central processing unit? Select two options.

the electronic circuitry that receives data and transforms it to human-readable form


the electronic circuitry that stores data and instructions so they can be processed


the electronic circuitry that handles all the instructions it receives from hardware


the electronic circuitry that stores information for immediate use by software


the electronic circuitry that handles all the instructions it receives from software

Answers

It is right to state that a central processing unit (CPU) is;

the electronic circuitry that handles all the instructions it receives from hardware; (Option C)the electronic circuitry that handles all the instructions it receives from software. (Option E)

What is a CPU?

A processor's four fundamental functions are retrieve, decode, execute, and write back. Fetch- is the operation that gets instructions from a system's RAM from program memory.

A CPU, or central processing unit, is the computer's brain. The CPU, like that of a human brain, regulates all computer processes. The CPU's role is to monitor input data from devices such as mice and other applications. Then it seeks up instructions for that data and executes them.

Learn more about central processing units:
https://brainly.com/question/28548014
#SPJ1

Answer:

C and E

Explanation:

> sata 6 gb/s transfer rate > 1 tb capacity > minimizes noise to levels near the threshold of human hearing > 3.5-inch 7,200 rpm > 32 mb buffer size 1. which sata version is being used?

Answers

SATA III (6 Gbs/600 MBs) version of sata is being used.

What is SATA?

Serial ATA (SATA) is a computer bus interface that connects host bus adapters to mass storage devices such as hard disc drives, optical drives, and solid-state drives. Serial ATA surpassed the older Parallel ATA (PATA) standard to become the main storage interface.

SATA III, or SATA 6Gb/s, is the most recent generation of SATA. The SATA III interface operates at 6Gb/s, with a bandwidth throughput of 600MB/s. Each SATA version is backwards compatible with previous versions. However, when relying on backwards compatibility, the data transfer rate may be slower than planned due to power constraints and port speed limitations.

To learn more about SATA

https://brainly.com/question/4555139

#SPJ4

What is output by following code?

C=c+2

Answers

The output of the C++ code is 21.

What is C++?
C++
has changed significantly over time, and modern C++ has object-oriented, generic, and functional features, as well as low-level memory manipulation capabilities. It is always implemented as a compiled language, and various manufacturers, including the Free Software Foundation, LLVM, Microsoft, Intel, Embarcadero, Oracle, and IBM, provide C++ compilers, allowing it to be used on a wide range of systems.

Let first write the question

C=1

sum = 0

while(C<10):

C=C+3

sum=sum + C

print(sum)

Now Focus on

while(C<10):

C=C+3

sum=sum + C

The value of C is initially 1

C=1+3

Sum= 0+4

In second loop the value of C will become 4

c=4+3

sum=4+7

In third loop the value of C will be 7

c=7+3

sum=11+10

so the answer is 11+10=21

To learn more about C ++
https://brainly.com/question/28185875
#SPJ13

A function's return data type must be the same as the function's
parameter(s).
True
False


// For c++

Answers

Answer:

False

Explanation:

Return data type has no relation with the function's parameter

this answer would be false.

I really need help with this what are 4 things that show you this email is a scam

Answers

Answer:

1. Grammar errors and misspelled words.

Example: if no action is "taking" we will be "force"

Correct words are supposed to be taken and forced.

2. Name of sender "Email_Service" The underscore brings a little suspicion and it doesn't match the name of the email its being sent from.

3. Urgency. In other words this is an "ACT NOW, ACTION REQUIRED" email, which normally come from scams.

4. Threats – LAST WARNING,  IF NO ACTION IS TAKEN YOUR EMAIL WILL BE BLACKLISTED.

Explanation:

Other Questions
triangle QRS is shown below using the information given determine the measure of r boron company has net sales of $60,000; beginning inventory of $7,000; purchases of $35,000 and ending inventory of $5,000. the cost of goods sold is . multiple choice question. $33,000 $30,000 $60,000 $42,000 $37,000 $23,000 Write a two-paragraph analysis about which of two artists Dante would have chosen to illustrate the Inferno. The first paragraph should explain Dante's overall purpose for writing the Inferno, based on what you've learned in the unit. The second paragraph should go into detail about why Dante would have chosen one artist and not the other. Can someone please help answer the questions attached - it's on inverse proportion? :) Which word in the sentence is the adverb?The girls had to go inside because of the rain.becausehad to gotheinside A rectangular garden has a walkway around it. The area of the garden is 2(4.5x +1.5). Thecombined area of the garden and the walkway is 3.5(8x + 4). Find the area of the walkway aroundthe garden as the sum of two terms.The area of the walkway around the garden is(Simplify your answer. Use integers or decimals for any numbers in the expression.) An airship propelled by some mechanical device travels five miles in ten minutes in the direction of the wind, but requires one hour to go back again to the starting point against the same wind. How long would it have taken to go the whole ten miles in a calm day without any wind? Hint: You don't have to use equations to solve this problem. You can solve it perfectly using math reasoning. A teacher determines the linear equation y=12x + 40 best models the number of points a student should earn on a test, y, if the student studies for x hours. Which statement is true {3x}^{2} + 4x + 1 = 0 using: completeing the square methodQuadratic formulae Can you Describe ur dream house i.n spanish with 5 adjectives? -it is modern and it is near a beach in Miami. As the sample size becomes larger, the sampling distribution of the sample mean approaches a _____ distribution. (1.2 x 10^7)(2.2 x 10^-3) I need help with my math Rewrite the fraction in the sentence below as a percentage. From 125 yards away, a marksman hit 13/20 of the targets last year. 37. The average height of American adult males is 177 cm, with a standard deviation of 7.4 cm. Meanwhile, the average height of Indian males is 165 cm, with a standard deviation of 6.7 cm. Which is taller relative to his nationality, a 173-cm American man or a 150-cm Indian man? The American man The Indian man An unsharpened, round pencil is in the shape of a right circular cylinder. For one such pencil, the radius is 4.6 mm and the length is 167.7 mm. Find the volume of the pencil. Round your answer to the nearest whole number. Do not type the units in the space below. (Be sure to use the pi button on your calculator to do the calculation.) BRO PLS HELP, I HAVE LIKE 20 MISSING ASSIGNMENTS It should be easy lol Will mark as Brainlist! Which of the following best represents R= A - B ? Please help, its due soon! Laser light passing through two small slits produces a bright fringe centered at the midpoint on a distant screen because. Discuss why it is essential to provide health and safety learning experiences during a child's early years.