A cashier distributes change using the maximum number of five-dollar bills, followed by one-dollar bills. Write a single statement that assigns num_ones with the number of distributed one-dollar bills given amount_to_change. Hint: Use %.
Sample output with input: 19
Change for $ 19
3 five dollar bill(s) and 4 one dollar bill(s)
1 amount_to_change = int(input())
2
3 num_fives amount_to_change // 5
4
5 Your solution goes here
6 I
7 print('Change for $, amount_to_change)
8 print(num_fives, 'five dollar bill(s) and', num_ones, 'one dollar bill (s)')

Answers

Answer 1

Answer:

Explanation:

The code that was provided in the question contained a couple of bugs. These bugs were fixed and the new code can be seen below as well as with the solution for the number of one-dollar bills included. The program was tested and the output can be seen in the attached image below highlighted in red.

amount_to_change = int(input())

num_fives = amount_to_change // 5

#Your solution goes here

num_ones = amount_to_change % 5

print('Change for $' + str(amount_to_change))

print(num_fives, 'five dollar bill(s) and', num_ones, 'one dollar bill (s)')

A Cashier Distributes Change Using The Maximum Number Of Five-dollar Bills, Followed By One-dollar Bills.

Related Questions

Base conversion. Perform the following conversion (you must have to show the steps to get any credit.
3DF16 = ?

Answers

Base to be converted to was not included but we would assume conversion to base 10(decimal)

Answer and Explanation:

The 3DF in base 16 is a hex number so we need to convert to its equivalent binary/base 2 form:

We therefore each digit of given hex number 3DF in base 16 to equivalent binary, 4 digits each.

3 = 0011

D = 1101

F = 1111

We then arrange the binary numbers in order

3DF base 16 = 1111011111 in base 2

We then convert to base 10 =

= 1x2^9+1x2^8+1x2^7+1x2^6+0x2^5+1x2^4+1x2^3+1x2^2+1×2^1+1×2^0

= 991 in base 10

The purpose of the five-entity minimum, six-entity maximum is to establish a relatively small baseline for you to keep the scope of your database project constrained.

a. True
b. False

Answers

It would have to be false ^

how an operating system allocates system resources in a computer​

Answers

Answer:

The Operating System allocates resources when a program need them. When the program terminates, the resources are de-allocated, and allocated to other programs that need them

I need the SQL statements for these questions:
1. For each reservation, list the reservation ID, trip ID, customer number, and customer last name. Order the results by customer last name.
2. For each reservation for customer Ryan Goff, list the reservation ID, trip ID, and number of persons.
3. List the trip name of each trip that has Miles Abrams as a guide.
4. List the trip name of each trip that has the type Biking and that has Rita Boyers as a guide.
5. For each reservation that has a trip date of July 23, 2016, list the customer’s last name, the trip name, and the start location.
6. List the reservation ID, trip ID, and trip date for reservations for a trip in Maine (ME). Use the IN operator in your query.
7. Repeat Exercise 6, but this time use the EXISTS operator in your query.
8. Find the guide last name and guide first name of all guides who can lead a paddling trip. (Note: The query results should include duplicate values.)
Here are the tables:
CUSTOMER FIRST NAME POSTAL CODE CUSTOMER NUM LAST NAME ADDRESS Northfold Liam 9 Old Mill Rd Londonderry 10 NH 03053 103 Kasuma Sujata 132 Main St. #1 East Hartford CT 06108 MA 01854 Goff 164A South Bend Rd. Lowell Ryan 105 McLean Kyle 345 Lower Ave. Wolcott NY 14590 106 Morontoia Joseph 156 Scholar St Johnston 02919 107 Marchand Quinn 76 Cross Rd Bath NH 03740 108 32 Sheep stop St Edinboro PA Rulf Usch 16412 109 Caron Jean Luc 10 Greenfield St Rome ME 04963 110 Martha York Bers 65 Granite St NY 14592 112 Jones Laura 373 Highland Ave. Somerville MA 02143 115 Nu Adam 1282 Ocean Walk Ocean City Vaccari 08226 116 Murakami Iris 7 Cherry Blossom St. Weymouth MA 02188 119 Londonderry vT Chau 18 Ark Ledge Ln Clement 05148 120 Gernowski Sadie 24 stump Rd. Athens ME 04912 121 Cambridge VT Bretton-Borak Siam 10 Old Main St 122 Hefferson orlagh 132 South St. Apt 27 Manchester NH 03101 123 25 Stag Rd Fairfield Barnett Larry 06824 124 Busa Karen 12 Foster St. South Windsor CT 06074 125 51 Fredrick St Albion Peterson Becca NY 14411 126 Brown Brianne 154 Central St Vernon CT 06066 PHONE Click to Add 603-555-7563 413-555-3212 860-555-0703 781-555-8423 585-555-5321 401-555-4848 603-555-0456 814-555-5521 207-555-9643 585-555-0111 857-555-6258 609-555-5231 617-555-6665 802-555-3096 207-555-4507 802-555-3443 603-555-3476 860-555-9876 857-555-5532. 585-555-0900 860-555-3234

Answers

Answer:

Explanation:

/* From the information provided, For now will consider the name of table as TRIPGUIDES*/

/*In all the answers below, the syntax is based on Oracle SQL. In case of usage of other database queries, answer may vary to some extent*/

1.

Select R.Reservation_ID, R.Trip_ID , C.Customer_Num,C.Last_Name from Reservation R, Customer C where C.Customer_Num=R.Customer_Num ORDER BY C.Last_Name

/*idea is to select the join the two tables by comparing customer_id field in two tables as it is the only field which is common and then print the desired result later ordering by last name to get the results in sorted order*/

2.

Select R.Reservation_ID, R.Trip_ID , R.NUM_PERSONS from Reservation R, Customer C where C.Customer_Num=R.Customer_Num and C.LAST_NAME='Goff' and C.FIRST_NAME='Ryan'

/*Here, the explaination will be similar to the first query. Choose the desired columns from the tables, and join the two tables by equating the common field

*/

3.

Select T.TRIP_NAME from TRIP T,GUIDE G,TRIPGUIDES TG where T.TRIP_ID=TG.TRIP_ID and TG.GUIDE_NUM=G.GUIDE_NUM and G.LAST_NAME='Abrams' and G.FIRST_NAME='Miles'

/*

Here,we choose three tables TRIP,GUIDE and TRIPGUIDES. Here we selected those trips where we have guides as Miles Abrms in the GUIDES table and equated Trip_id from TRIPGUIDES to TRIP.TRIP_Name so that can have the desired results

*/

4.

Select T.TRIP_NAME

from TRIP T,TRIPGUIDES TG ,G.GUIDE

where T.TRIP_ID=TG.TRIP_ID and T.TYPE='Biking' and TG.GUIDE_NUM=G.GUIDE_NUM and G.LAST_NAME='Boyers' and G.FIRST_NAME='Rita'

/*

In the above question, we first selected the trip name from trip table. To put the condition we first make sure that all the three tables are connected properly. In order to do so, we have equated Guide_nums in guide and tripguides. and also equated trip_id in tripguides and trip. Then we equated names from guide tables and type from trip table for the desired results.

*/

5.

SELECT C.LAST_NAME , T.TRIP_NAME , T.START_LOCATION FROM CUSTOMER C, TRIP T, RESERVATION R WHERE R.TRIP_DATE='2016-07-23' AND T.TRIP_ID=R.TRIP_ID AND C.CUSTOMER_NUM=R.CUSTOMER_NUM

/*

The explaination for this one will be equivalent to the previous question where we just equated the desired columns where we equiated the desired columns in respective fields and also equated the common entities like trip ids and customer ids so that can join tables properly

*/

/*The comparison of dates in SQL depends on the format in which they are stored. In the upper case if the

dates are stored in the format as YYYY-MM-DD, then the above query mentioned will work. In case dates are stored in the form of a string then the following query will work.

SELECT C.LAST_NAME , T.TRIP_NAME , T.START_LOCATION FROM CUSTOMER C, TRIP T, RESERVATION R WHERE R.TRIP_DATE='7/23/2016' AND T.TRIP_ID=R.TRIP_ID AND C.CUSTOMER_NUM=R.CUSTOMER_NUM

*/

6.

Select R.RESERVATION_ID, R.TRIP_ID,R.TRIP_DATE FROM RESERVATION R WHERE R.TRIP_ID IN

{SELECT TRIP_ID FROM TRIP T WHERE STATE='ME'}

/*

In the above question, we firstly extracted all the trip id's which are having locations as maine. Now we have the list of all the trip_id's that have location maine. Now we just need to extract the reservation ids for the same which can be trivally done by simply using the in clause stating print all the tuples whose id's are there in the list of inner query. Remember, IN always checks in the set of values.

*/

7.

Select R.RESERVATION_ID, R.TRIP_ID,R.TRIP_DATE FROM RESERVATION WHERE

EXISTS {SELECT TRIP_ID FROM TRIP T WHERE STATE='ME' and R.TRIP_ID=T.TRIP_ID}

/*

Unlike IN, Exist returns either true or false based on existance of any tuple in the condition provided. In the question above, firstly we checked for the possibilities if there is a trip in state ME and TRIP_IDs are common. Then we selected reservation ID, trip ID and Trip dates for all queries that returns true for inner query

*/

8.

SELECT G.LAST_NAME,G.FIRST_NAME FROM GUIDE WHERE G.GUIDE_NUM IN

{

SELECT DISTINCT TG.GUIDE_NUM FROM TRIPGUIDES TG WHERE TG.TRIPID IN {

SELECT T.TRIP_ID FROM TRIP T WHERE T.TYPE='Paddling'

}

}

/*

We have used here double nested IN queries. Firstly we selected all the trips which had paddling type (from the inner most queries). Using the same, we get the list of guides,(basically got the list of guide_numbers) of all the guides eds which were on trips with trip id we got from the inner most queries. Now that we have all the guide_Nums that were on trip with type paddling, we can simply use the query select last name and first name of all the guides which are having guide nums in the list returned by middle query.

*/

Java !!!
A common problem in parsing computer languages and compiler implementations is determining if an input string is balanced. That is, a string can be considered balanced if for every opening element ( (, [, <, etc) there is a corresponding closing element ( ), ], >, etc).
Today, we’re interested in writing a method that will determine if a String is balanced. Write a method, isBalanced(String s) that returns true if every opening element is matched by a closing element of exactly the same type. Extra opening elements, or extra closing elements, result in an unbalanced string. For this problem, we are only interested in three sets of characters -- {, (, and [ (and their closing equivalents, }, ), and ]). Other characters, such as <, can be skipped. Extra characters (letters, numbers, other symbols) should all be skipped. Additionally, the ordering of each closing element must match the ordering of each opening element. This is illustrated by examples below.
The following examples illustrate the expected behaviour:
is Balanced ("{{mustache templates use double curly braces}}") should return true
is Balanced("{{but here we have our template wrong!}") should return false
is Balanced("{ ( ( some text ) ) }") should return true
is Balanced("{ ( ( some text ) } )") should return false (note that the ordering of the last two elements is wrong)
Write an implementation that uses one or more Stacks to solve this problem. As a client of the Stack class, you are not concerned with how it works directly, just that it does work.

Answers

Answer:

Explanation:

import java.util.*;

public class BalancedBrackets {

// function to check if brackets are balanced

static boolean isBalanced(String expr)

{

Stack<Character> stack = new Stack<Character>();

for (int i = 0; i < expr.length(); i++)

{

char x = expr.charAt(i);

if (x == '(' || x == '[' || x == '{')

{

// Push the element in the stack

stack.push(x);

continue;

}

if (stack.isEmpty())

return false;

char check;

switch (x) {

case ')':

check = stack.pop();

if (check == '{' || check == '[')

return false;

break;

case '}':

check = stack.pop();

if (check == '(' || check == '[')

return false;

break;

case ']':

check = stack.pop();

if (check == '(' || check == '{')

return false;

break;

}

}

// Check Empty Stack

return (stack.isEmpty());

}

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.println("\nEnter the expression to check is balanced or not !");

String expr = scan.nextLine();

boolean output;

output = isBalanced(expr);

System.out.println(output);

if (output)

System.out.println("Balanced ");

else

System.out.println("Not Balanced ");

scan.close();

}

}

Which of the following terms describes an attacker walking or driving through business areas and neighborhoods to identify unprotected wireless networks from the street using a laptop or a handheld computer?
A. Wi-Fi stealing.
B. Wi-Fi trolling.
C. Wi-Fi jacking.
D. Wi-Fi hacking.

Answers

Answer:

C. Wi-Fi jacking

Explanation:

Answer: yessir b

Explanation:

Register the countChars event handler to handle the keydown event for the textarea tag. Note: The function counts the number of characters in the textarea.
Do not enter anything in the HTML file, put your code in the JavaScript section where it says "Your solution goes here"
1 klabel for-"userName">user name: 2
3

Answers

Answer:

Explanation:

The following Javascript code is added in the Javascript section where it says "Your solution goes here" and counts the current number of characters in the text within the textArea tag. A preview can be seen in the attached image below. The code grabs the pre-created variable textareaElement and attached the onkeypress event to it. Once a key is pressed it saves the number of characters in a variable and then returns it to the user.

var textareaElement = document.getElementById("userName");

function textChanged(event) {

   document.getElementById("stringLength").innerHTML = event.target.value.length;

}

// Your solution goes here

textareaElement.onkeypress = function() {

   let numOfCharacters = textareaElement.value.length;

   return numOfCharacters;

};

Briefly explain what an array is. As part of your answer make use of a labelled example to show the declaration and components of an array

Answers

Answer:

Explanation:

In programming an array is simply a grouping of various pieces of data. Various data elements are grouped together into a single set and saved into a variable. This variable can be called which would return the entire set which includes all of the elements. The variable can also be used to access individual elements within the set. In Java an example would be the following...

int[] myArray = {33, 64, 73, 11, 13};

In Java, int[] indicates that the variable will hold an array of integers. myArray is the name of the variable which can be called to access the array elements. The elements themselves (various pieces of data) are located within the brackets {}

While configuring a wireless access point device, a technician is presented with several security mode options. Which of the following options will provide the most secure access?

Answers

Answer:

Bro this is my area the answer is WPA2 and AES  

Explanation:

its because AES is a more secure encryption protocol introduced with WPA2. AES isn't some creaky standard developed specifically for Wi-Fi networks, either. It's a serious worldwide encryption standard that's even been adopted by the US government.

There are many possible variations in wireless network design depending on the surroundings.

What is wireless network?

Even in a complicated single site, different wireless networks running on the same hardware as part of the broader wireless LAN environment can have different network configuration fundamentals needed for a successful deployment.

At the same time, a number of essential network configuration activities are part of any successful wireless project's typical chores. Let's look at the broad and specific procedures that wireless experts should take while setting up enterprise-grade Wi-Fi networks.

Therefore, There are many possible variations in wireless network design depending on the surroundings.

To learn more about wifi, refer to the link:

https://brainly.com/question/6145118

#SPJ5

Select the correct statement(s) regarding decentralized (distributed) access control on a LAN. a. no centralized access process exists, and therefore each connected station has the responsibility for controlling its access b. data collisions are possible, therefore mechanisms such as CDMA/CD are required c. when a data collision occurs, the nearest station detecting the collision transmits a jamming signal d. all of the above are correct

Answers

Answer: D. all of the above are correct

Explanation:

The correct statements regarding the decentralized (distributed) access control on a LAN include:

• no centralized access process exists, and therefore each connected station has the responsibility for controlling its access

• data collisions are possible, therefore mechanisms such as CDMA/CD are required

• when a data collision occurs, the nearest station detecting the collision transmits a jamming signal.

Therefore, the correct option is all of the above.

????????????????????????? ???????????????

Answers

Answer:

sorry, I don't know what that is

Which key should you press to leave the cell as it originally was?

Answers

Answer:

Backspace.

Explanation:

Cancel Button you should press to leave the cell as it originally was. Cancel Button you should press to leave the cell as it originally was. This answer has been confirmed as correct and helpful.

Backspace is press to leave the cell as it originally was.

What is Backspace key?

The Backspace key is situated in the top-right corner of the character keys part of the keyboard.

Backspace is replaced by a "delete" key on Apple computers, although it serves the same purpose.

There are no "backspace" keys on an Android or Apple iPhone smartphone or iPad tablet, but there is a key that serves the same purpose. Look for a key that resembles an arrow with a "X" or an arrow pointing left, as illustrated in the image.

Therefore, Backspace is press to leave the cell as it originally was.

To learn more about backspace, refer to the link:

https://brainly.com/question/29790869

#SPJ2

For the following 4-bit operation, assuming these register are ONLY 4-bits in size, which status flags are on after performing the following operation? Assume 2's complement representation. 1010+0110
a) с
b) Z
c) N

Answers

Answer:

All flags are On ( c, z , N  )

Explanation:

Given data:

4-bit operation

Assuming 2's complement representation

Determine status flags that are on after performing 1010+0110

    1   1

    1  0   1  0

    0  1   1  0

  1  0 0 0 0

we will carry bit = 1 over

hence C = 1

given that: carry in = carry out there will be zero ( 0 ) overflow

hence V = 0

also Z = 1      

But the most significant bit is  N = 1

Using Python suppose an array sorted in ascending order is rotated at some pivot unknown to you beforehand. (i.e., [0,1,2,4,5,6,7] might become [4,5,6,7,0,1,2]).
You are given a target value to search. If found in the array return its index, otherwise return “The input is not on this list”
You may assume no duplicate exists in the array.
Hint: Use a function. Use the built in method .index( ) and/or for loops.

Answers

Answer:

Explanation:

class Solution {

   public int search(int[] nums, int target) {

       int n = nums.length;

       int low = 0 , high = n - 1;

       While(low < high){//Set virtual node

           int mid = (low + high) / 2;

           if(nums[mid] > nums[high]){

               low = mid + 1;

           }else{

               high = mid;

           }

       }

       int rot = low;

       low = 0;

       high = n - 1;

       while(low <= high){

           int mid = (low + high) / 2;

                        Int real = (mid + rot) % n;//The virtual node is mapped to the real node.

           if(nums[real] == target){

               return real;

           }else if(nums[real] < target){

               low = mid + 1;

           }else{

               high = mid - 1;

           }

       }

       return -1;

   }

}

Write a function int checkBalance(char exp[]); that can take an expression as input and check whether the parenthesis used in that expression are valid or invalid. It returns 1 if it is valid, and returns 0 if it is not valid.For example, the following expressions are valid: [ A * {B (C D)}] and [{()()}]The following expressions are invalid: [ A * {B (C D})], [ { ( ] ) ( ) }

Answers

Answer:

Explanation:

The following code is written in Java. It uses for loops to loop through the array of characters, and uses IF statements to check if the symbols in the expression are balanced. If so it returns true, otherwise it breaks the function and returns false. Two test cases have been provided in the main method and the output can be seen in the attached image below.

import java.util.ArrayList;

class Brainly {

   public static void main(String[] args) {

       char[] exp = { '[', 'A', '*', '{', 'B', '(', 'C', 'D', ')', '}', ']'};

       char[] exp2 = {'[', 'A', '*', '(', 'C', '}', ']'};

       System.out.println(checkBalance(exp));

       System.out.println(checkBalance(exp2));

   }

   public static boolean checkBalance(char exp[]) {

       ArrayList<Character> symbols = new ArrayList<>();

       for (char x: exp) {

           if ((x =='[') || (x == '{') || (x == '(')) {

               symbols.add(x);

           }

           if (x ==']') {

               if (symbols.get(symbols.size()-1) == '[') {

                   symbols.remove(symbols.size()-1);

               } else {

                   return false;

               }

           }

           if (x =='}') {

               if (symbols.get(symbols.size()-1) == '{') {

                   symbols.remove(symbols.size()-1);

               } else {

                   return false;

               }

           }

           if (x ==')') {

               if (symbols.get(symbols.size()-1) == '(') {

                   symbols.remove(symbols.size()-1);

               } else {

                   return false;

               }

           }

       }

       return true;

   }

}

Can we update App Store in any apple device. (because my device is kinda old and if want to download the recent apps it aint showing them). So is it possible to update???
Please help

Answers

Answer:

For me yes i guess you can update an app store in any deviceI'm not sure

×_× mello ×_×

Write a recursive function that calculates the sum 11 22 33 ... nn, given an integer value of nin between 1 and 9. You can write a separate power function in this process and call that power function as needed:

Answers

Answer:

The function in Python is as follows:

def sumDig(n):

if n == 1:

 return 11

else:

 return n*11 + sumDig(n - 1)

Explanation:

This defines the function

def sumDig(n):

This represents the base case (where n = 1)

if n == 1:

The function returns 11, when it gets to the base case

 return 11

For every other value of n (n > 1)

else:

This calculates the required sum recursively

 return n*11 + sumDig(n - 1)

The conversion rate would be the highest for keyword searches classified as Group of answer choices buyers grazers researchers browsers

Answers

Answer:

buyers

Explanation:

Search engine optimization (SEO) can be defined as a strategic process which typically involves improving and maximizing the quantity and quality of the number of visitors (website traffics) to a particular website by making it appear topmost among the list of results from a search engine such as Goo-gle, Bing, Yah-oo etc.

This ultimately implies that, search engine optimization (SEO) helps individuals and business firms to maximize the amount of traffic generated by their website i.e strategically placing their website at the top of the results returned by a search engine through the use of algorithms, keywords and phrases, hierarchy, website updates etc.

Hence, search engine optimization (SEO) is focused on improving the ranking in user searches by simply increasing the probability (chances) of a specific website emerging at the top of a web search.

Typically, this is achieved through the proper use of descriptive page titles and heading tags with appropriate keywords.

Generally, the conversion rate is mainly designed to be the highest for keyword searches classified as buyers because they're the main source of revenue for a business and by extension profits.

When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.

Answers

Answer:

Parameter

Explanation:

q: When an application contains just one version of a method, you can call the method using a(n) ____ of the correct data type.

a: Parameter

how to Write a simple Java socket programming that a client sends a text and server receives and print.

Answers

Answer:

Java Socket programming is used for communication between the applications running on different JRE.

Java Socket programming can be connection-oriented or connection-less.

Socket and ServerSocket classes are used for connection-oriented socket programming and DatagramSocket and DatagramPacket classes are used for connection-less socket programming.

The client in socket programming must know two information:

IP Address of Server, and

Port number.

Here, we are going to make one-way client and server communication. In this application, client sends a message to the server, server reads the message and prints it. Here, two classes are being used: Socket and ServerSocket. The Socket class is used to communicate client and server. Through this class, we can read and write message. The ServerSocket class is used at server-side. The accept() method of ServerSocket class blocks the console until the client is connected. After the successful connection of client, it returns the instance of Socket at server-side.

Explanation:

Creating Client:

import java.io.*;

import java.net.*;

public class MyServer {

public static void main(String[] args){

try{

ServerSocket ss=new ServerSocket(6666);

Socket s=ss.accept();//establishes connection.

DataInputStream dis=new DataInputStream(s.getInputStream());

Which attack form either exploits a software flaw or floods a system with traffic in order to prevent legitimate activities or transactions from occurring?

Answers

Answer:

Denial of service attack.

Explanation:

In Cybersecurity, vulnerability can be defined as any weakness, flaw or defect found in a software application or network and are exploitable by an attacker or hacker to gain an unauthorized access or privileges to sensitive data in a computer system.

This ultimately implies that, vulnerability in a network avail attackers or any threat agent the opportunity to leverage on the flaws, errors, weaknesses or defects found in order to compromise the security of the network.

Data theft can be defined as a cyber attack which typically involves an unauthorized access to a user's data with the sole intention to use for fraudulent purposes or illegal operations. There are several methods used by cyber criminals or hackers to obtain user data and these includes DDOS attack, SQL injection, man in the middle, phishing, sniffing, DOS attack, etc.

A denial of service (DOS) attack is a form of cyber attack that involves either the exploitation of a software flaw or overwhelmingly floods a computer system in a network with traffic in order to prevent authorized users from performing legitimate activities or transactions.

Some of the ways to prevent vulnerability or cyber attacks in a network are;

1. Ensure you use a very strong password with complexity through the use of alphanumerics.

2. You should use a two-way authentication service.

3. You should use encrypting software applications or services.

Explain why you want a USB hub if there are already USB ports in the computer.

Answers

Answer:

Powered USB hubs provide their own power supply for devices. Typically, when you connect a device to your computer via USB, the device draws upon your computer's power to function. Powered USB hubs come with their own power source and provide power for your connected devices so your computer doesn't have to.

Explanation:

Please Mark me brainliest

what type of slab and beam used in construction of space neddle​

Answers

Answer:

Pyramidal Space Frame Glamorizes Swimming Pool 15. News Briefs 16 ... to use every pound of steel with no sacrifice in safety or ... form of steel trusses in an inverted coni- ... be embedded in the concrete slab when.

Explanation:

I HOPE THIS HELPS

Database multiple-choice question don't bs pls
Which of the following is not a common factor for database management system selection?
a. Cost
b. Features and tools
c. Software requirements
d. Hardware requirements
e. All of the above
f. None of the above
(D and F are wrong)

Answers

Answer:

f. None of the above

Explanation:

Considering the available options, the right answer is option F "None of the above."

Common factors for database management system selection are the following:

1. Cost: various DBMS vendors have different pricing, hence, interested buyers will consider the price before selections

2. Features and Tools: different types of DBMS have varied features and tools in carrying out the work.

3. Software requirements: there are various software requirements in various DBMS, such as encryption support, scalability, application-level data recovery, etc.

4. Hardware requirement: various DBMS vendors have different hardware requirements to consider, such as sizeable RAM, CPU value, etc.

Hence, in this case, the correct answer is option F.


The part of the computer that provides access to the Internet is the

Answers

Answer:

MODEM

Explanation:

Given the code as follows: main() { int i = 3, n; float x; x = i; n = 8 % x; } What problem will occur? Group of answer choices A compilation error will occur. A run time error will occur. An inheritance error will occur. No problem will occur at all.

Answers

Answer:

A compilation error will occur.

Explanation:

The % operator does not accept a float as its right-hand operand.

A technician needs to manage a Linux-based system from the GUI remotely. Which of the technician should the technician deploy

Answers

Complete Question:

A technician needs to manage a Linux-based system from the GUI remotely.  Which of the following technologies should the technician deploy?

A. RDP  

B. SSH  

C. VNC  

D. Telnet

Answer:

Managing a Linux-based System from the GUI Remotely

The technology that the technician should deploy to manage the Graphic User Interface (GUI) remotely is:

C. VNC

Explanation:

VNC stands for Virtual Network Computing. This computing technology enables a remote user to access and control another computer to execute commands. It acts as a cross-platform screen-sharing system and is used to remotely access and control another computer. VNC makes a computer screen, keyboard, and mouse available to be seen and used from a remote distance.  The remote user does everything from a secondary device without being in front of the primary computer or device.  An example of a good VNC is TeamViewer.

Describe how keyboard software works and which problems does keyboard software
need to handle?

Answers

Answer:

The target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location.

No physical sensation of pressing a button results in misfires. Lack of physical divisions between keys makes touch typing impossible. Smaller key spacing results in typos.

convert FA23DE base 16 to octal

Answers

kxjhdjshdjdjrhrjjd

snsjjwjsjsjjsjejejejd

s

shsjskkskskskekkes

slskekskdkdksksnsjs

djmsjs

s JM jsmsjjdmssjsmjdjd s

jsmsjjdmssjsmjdjd

HS shhsys

s

s

sujdjdjd s

sujdjdjd

syshdhjdd

Answer:

764217360

Explanation:

Explain the following terms.
a) Explain Final keyword with example. b) Define Static and Instance variables

Answers

Answer:

A.

the final keyword is used to denote constants. It can be used with variables, methods, and classes. Once any entity (variable, method or class) is declared final , it can be assigned only once.

B.

Static variables are declared in the same place as instance variables, but with the keyword 'static' before the data type. While instance variables hold values that are associated with an individual object, static variables' values are associated with the class as a whole.

Other Questions
Is the discriminant of g positive, zero, or negative? if f(x) = 2x/7 +4, which of the following is the inverse of f(x)? Why was the Battle of Saratoga a turning point in the Revolutionary War? Helpppppppppppppppppppp If x+y=15 and x-y=25, then what is the value of 2x^2 - y^2? In the situation shown below, what would the Moon look like from Earth? Find the equivalent exponential expression.(543 Does (-54, -90) make the equation y = x - -36 true? yes no Choose all that apply:1.Circle A and circle A', have the same circumference.2.The radii of circle A and circle A', have the same lengths.3. Points A and A', are both on the xxx-axis.4. None of the above Carin opened a money market account with adeposit of $3,000. This account earns 2% simpleinterest annually. How many years will it take forher $3,000 deposit to earn $420 in interest, assum-ing she does not withdraw any of the money? During the respiration of an organism A, 1 molecule of glucose produces 2 ATP molecules whereas in the respiration of another organism B, 1 molecule of glucose produces 38 ATP molecules. Which of the organisms, A or B has anaerobic mode ofrespiration? Explain with reason. A friend who is not taking your Biology course fills a cup with ice and then a drink. The friend asks you why the ice in the cup is floating, and you are able to say that Group of answer choices water vapor is less dense than liquid water. ice is denser than liquid water. convection currents caused by temperature differences push upwards on the ice. the molecules are closer together in ice than in liquid water. the molecules are farther apart in ice than in liquid water. help me por favor?!?!?! 5 solution measures of brain drain Drag the tiles to the boxes to form correct pairsMultiply the sets of numbers and match them with their products. A triangle has sides with lengths of 60 yards, 80 yards, and 100 yards. Is it a right triangle? Given circle O below, if arc AB and arc CD are congruent, what is the measure of angle COD? What aspect of Chinese history has been a long standing feature? What is true of Mussolini, Hitler, Franco, and Lenin?A. They abolished labor unions and freedom of the press.B. They took advantage of the social conditions after WWI.C. They brought all land under the control of the state.D. They used speeches and protests to inspire change. 2(2x + 4) + 2(x - 7) = 78. Determine the side lengths of this rectangle.