Java is a programming language that developers use to build applications for computers, servers, game consoles, scientific supercomputers, mobile phones, and other devices.
Why is Java so popular? The features of JavaAccording to the TIOBE index, which ranks programming language popularity, Java comes in third place overall behind Python and C. We can thank Java outstanding qualities for the language extensive usage, including:
Versatility. For producing Web applications, Android applications, and software development tools like Eclipse, IntelliJ IDEA, and NetBeans IDE, Java has long been the de-facto language of choice.User-friendliness : Java has an English-like grammar, making it the perfect language for beginners. Core Java should be learned first, followed by advanced Java.Decent documentation Java is 100 percent free because it is an open-source language. Java has excellent documentation, which is a key aspect of the language. It provides a thorough guide that will clarify any problems you might run into when coding in Java.A reliable API. Although Java only has roughly fifty keywords, it offers a broad and robust Application Programming Interface (API) with a variety of methods that may be utilized instantly in any code.A sizable neighborhood One of the factors contributing to Java's popularity is community support. The community there is notable for being the second-largest on Stack Overflow.To Learn more about Java refer to:
https://brainly.com/question/25458754
#SPJ9
Ask the user to think of a number between zero and one hundred. Your goal is to guess the number in as few guesses as possible. The user will inform you if you guessed too high, low or correct. Start by always guessing the middle number 50. If the user informs you it’s too low, then try 75. If 50 was too high, then try 25. Always guess the middle of the range of numbers left. In doing so, the range of numbers will be cut in half after each guess. If done correctly, no more than 7 guesses are needed. Print out “you cheated” if you reach 7 guesses and are still wrong.
A program in Python that asks the user to think of a number between zero and one hundred and tries to guess the number in as few guesses as possible is given below:
The Programimport random
import math
# Taking Inputs
lower = int(input("Enter Lower bound:- "))
# Taking Inputs
upper = int(input("Enter Upper bound:- "))
# generating random number between
# the lower and upper
x = random.randint(lower, upper)
print("\n\tYou've only ",
round(math.log(upper - lower + 1, 2)),
" chances to guess the integer!\n")
# Initializing the number of guesses.
count = 0
# for calculation of minimum number of
# guesses depends upon range
while count < math.log(upper - lower + 1, 2):
count += 1
# taking guessing number as input
guess = int(input("Guess a number:- "))
# Condition testing
if x == guess:
print("Congratulations you did it in ",
count, " try")
# Once guessed, loop will break
break
elif x > guess:
print("You guessed too small!")
elif x < guess:
print("You Guessed too high!")
# If Guessing is more than required guesses,
# shows this output.
if count >= math.log(upper - lower + 1, 2):
print("\nThe number is %d" % x)
print("\tBetter Luck Next time!")
Read more about python programming here:
https://brainly.com/question/26497128
#SPJ1
“A military contractor has been asked to produce a new all-terrain tablet PC which will be used by the armed forces when out in combat situations. Cost is not an option, lives could well depend on how reliable this tablet PC is under extreme conditions.
Storage devices are pieces of hardware used to store large amounts of data. Storage devices such as SD cards and SSD cards can be used in military operations because they are durable, do not break easily, and can store large amounts of data.
What exactly is a storage device?Storage devices are any type of computing hardware that is used to store, transfer, or extract data. Storage devices can temporarily and permanently hold and store data. They can be either internal or external to a computer.
SD cards are the best device for storing and playing large data files. SSDs, on the other hand, are designed to run a computer's operating system partition.
One device serves a simpler purpose, whereas the other must be smarter and more adaptable. These are the most compatible storage devices for military applications.
Thus, it is reliable this tablet PC is under extreme conditions.
For more details regarding storage devices, visit:
https://brainly.com/question/11599772
#SPJ1
Your question seems incomplete, the probable complete question is:
Read the following scenarios carefully and select a suitable storage device for each situation. Make sure to justify your choice by talking about the characteristics of your chosen storage device such as Capacity, Speed, Portability, Durability and Reliability.
(a) “A military contractor has been asked to produce a new all-terrain tablet PC which will be used by the armed forces when out in combat situations. Cost is not an option, lives could well depend on how reliable this tablet PC is under extreme conditions.”
HELP
When communicating online, it is important to understand there is no vocal tone or body language, as there is in face-to-face conversation. What are some things you can do when communicating online to maintain appropriate netiquette? Use details to support your answer.
When communicating online, it is important to understand there is no vocal tone or body language, as there is in face-to-face conversation. What are some things you can do when communicating online to maintain appropriate netiquette? Use details to support your answer.
Some starter ideas to get you going:
Avoid the use of slang and profanity.This signals a lack of respect and professionalism.
Avoid using all caps when composing the message.This comes across as yelling and is inappropriate for business communication.
Ask for clarification and repeat back the message to ensure the understood message was the intended message.Do not make assumptions when information is vague. For example:
Mary: Send me the report by 4 tomorrow.
John: Just to clarify, do you mean 4 PM tomorrow?
Avoid the use of jargon or idioms if communicating with a person from a different culture.This will increase confusion in a conversation.
Answer:
Avoid the use of slang and profanity.
This signals a lack of respect and professionalism.
Avoid using all caps when composing the message.
This comes across as yelling and is inappropriate for business communication.
Ask for clarification and repeat back the message to ensure the understood message was the intended message.
Explanation:
One of the four function of Information.
Security
is called
The basic tenets of information security are confidentiality, integrity and availability. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.
The 4 functions of Information Security:It protects the organisation's ability to function.It enables the safe operation of applications implemented on the organisation's IT systems.It protects the data the organisation collects and uses.It safeguards the technology the organisation uses.What is a defining feature of the Metaverse?
Virtual reality (VR), augmented reality (AR), AI, social media, and digital currency are the defining features of Metaverse.
What Is A Defining Feature Of The Metaverse?
The Metaverse has a wide range of distinct characteristics. Rather than leaving the comfort of your own home, you can interact with other people in the same way you would in the real world. It's a fascinating and entertaining experience.
Perhaps the most significant advantage of the Metaverse is that anyone, no matter where they are, can use a physical device such as a smartphone or computer to connect to and interact with Virtual Worlds. It may provide solutions to a wide range of global issues by providing an interactive digital mingling and management experience that may be useful in remote working, medical, internet browsing, and much more.
The Metaverse is also distinguished by the fact that it is a virtual world in which users can interact in real time. It is a 3D representation of the internet in which users can create their own avatars, visit virtual spaces, and engage in a variety of activities. The Metaverse has its own economy, with users earning and spending virtual currency.
Furthermore, Metaverse is constantly evolving and expanding, adding new features and content on a regular basis. The Metaverse is likely to become more immersive and realistic as more people join it, blurring the line between the virtual and real worlds.
To know more about the Metaverse, visit: https://brainly.com/question/28949928
#SPJ1
Many documents use a specific format for a person's name. Write a program that reads a person's name in the following format:
firstName middleName lastName (in one line)
and outputs the person's name in the following format:
lastName, firstInitial.middleInitial.
Ex: If the input is:
Pat Silly Doe
the output is:
Doe, P.S.
If the input has the following format:
firstName lastName (in one line)
the output is:
lastName, firstInitial.
Ex: If the input is:
Julia Clark
the output is:
Clark, J.
Using the knowledge in computational language in JAVA it is possible to write the code that write a program whose input is: firstName middleName lastName, and whose output is: lastName, firstName middleInitial.
Writting the code:import java.util.Scanner;
import java.lang.*;
public class LabProgram{
public static void main(String[] args) {
String name;
String lastName="";
String firstName="";
char firstInitial=' ',middleInitial=' ';
int counter = 0;
Scanner input = new Scanner(System.in);
name = input.nextLine(); //read full name with spaces
int i;
for(i = name.length()-1;i>=0;i--){
if(name.charAt(i)==' '){
lastName = name.substring(i+1,name.length()); // find last name
break;
}
}
for(i = 0;i<name.length()-1;i++){
if(name.charAt(i)==' '){
firstName = name.substring(0, i); // find firstName
break;
}
}
for(i = 0 ;i<name.length();i++){
if(name.charAt(i)==' '){
counter++; //count entered names(first,middle,last or first last only)
}
}
if(counter == 2){
for(i = 0 ;i<name.length();i++){
if(Character.toUpperCase(name.charAt(i)) == ' '){
middleInitial = Character.toUpperCase(name.charAt(i+1));//find the middle name initial character
break;
}
}
}
firstInitial = Character.toUpperCase(name.charAt(0)); //the first name initial character
if(counter == 2){
System.out.print(lastName+", "+firstName+" "+middleInitial+".");
}else{
System.out.print(lastName+", "+firstName);
}
}
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
E-commerce Web sites can use many different hardware architectures to divide the work of serving Web pages, administering databases, and processing transactions.
Discuss in detail the TWO (2) types of web architectures generally used in ecommerce websites.
The two type of web architectures generally used in ecommerce websites are the business logic and the customer side application.
What are web architectures?Web architectures are defined as a system that controls the communication between application components. The interconnections between web applications, databases, and middleware technologies are referred to as web application architecture.
The user interface is executed on the client side, which is the first, and database data is stored on the server side, which is the second. The business logic and the customer-side application are two web applications that operate on opposite sides of the architecture.
Thus, the two type of web architectures generally used in ecommerce websites are the business logic and the customer side application.
To learn more about web architectures, refer to the link below:
https://brainly.com/question/28560751
#SPJ1
Looking for similarities between concepts or problems is referred to as
an algorithm
Odecomposition
pattern recognition
abstraction
Pattern recognition is used for similarities between concepts or problems in an algorithm.
What is meant by pattern recognition?
Pattern recognition is a data analysis method that uses machine learning algorithms to automatically recognize patterns and regularities in data. This data can be anything from text and images to sounds or other definable qualities. Pattern recognition systems can recognize familiar patterns quickly and accurately.
An example of pattern recognition is classification, which attempts to assign each input value to one of a given set of classes (for example, determine whether a given email is "spam" or "non-spam").
Therefore, Pattern recognition is used.
To know more about Pattern recognition from the given link
https://brainly.com/question/28427592
#SPJ1
1. Write down a brief history about the internet.
Answer:
The Internet was developed by Bob Kahn and Vint Cerf in the 1970s. They began the design of what we today know as the 'internet. ' It was the result of another research experiment which was called ARPANET, which stands for Advanced Research Projects Agency Network.
Explanation:
The cpu is the component responsible for commanding which other component in the system?
The CPU is the component responsible for commanding memory in the system. The correct option is 3.
What is a CPU?The CPU is instructed on what to do next and how to communicate with other components by the operating system, a sizable program.
As you are aware, there are numerous computer operating systems, including the Microsoft Windows operating system. An operating system is a substantial piece of software that controls your computer and aids the CPU in decision-making. The CPU is controlled by an operating system so that it can communicate with other system components.
Therefore, the correct option is 3. Memory.
To learn more about CPU, refer to the link:
https://brainly.com/question/14671593
#SPJ1
The question is incomplete. Your most probably complete question is given below:
1. CPU
2. bus
3. memory
4. I/O subsystem.
What percent of 2.5 hours decrease to 1 hour
Answer: 60% decrease
Explanation:
How to calculate percentage decrease:
Subtract starting value minus final value
Divide that amount by the absolute value of the starting value
Multiply by 100 to get percent decrease
If the percentage is negative, it means there was an increase and not an decrease.
Percentage Decrease Formula
You can use the percentage decrease formula for any percent decrease calculation:
Percentage Decrease=Starting Value−Final Value|Starting Value|×100
Example Problem: Percentage Decrease
You have a lamp with a 60-watt traditional light bulb. Your lamp uses 60 watts of electricity per hour. You're considering replacing the bulb with an LED light bulb that uses 8 watts of electricity per hour. What is the percentage decrease in the lamp's hourly energy use if you switch to an LED light bulb?
Percentage Decrease = [ (Starting Value - Final Value) / |Starting Value| ] × 100
60 - 8 = 52
52 / 60 = 0.8667
0.8667 × 100 = 86.67%
So if you switch to an LED light bulb your lamp will use 86.67% less energy per hour.
Related Calculators
Answer:
40%
Explanation:
Whenever we find "x" percent of a number, we simply multiply by "x/100", because "percent" just means "per 100".
We can divide the 2.5, by 100 to see how many "groups" of 100 are in 2.5, which gets us, 0.025.
Now we multiply this by some value, which will be our percent, to get "1"
So we have the equation: [tex]0.025 * x = 1[/tex]
Dividing both sides by 0.025 gives us: [tex]x=40[/tex]
so our percentage would be 40.
But generally whenever you solve these problems you convert the "percentage" to a "decimal" by dividing the percentage by 100.
So finding "x" percent of "a", can be calculated by: [tex]a*\frac{x}{100}[/tex]
and from here you would calculate the value with the givens.
on What is the output of the following code: int i = 1; while (i <= 9)
{
system. out.print(i+"");
i=i+2;
}
Answer:
13579
java
Explanation:
notice that the System.out.print call does not output a new line.
so... it is going to print 1, then what is 1 plus 2? the answer is 3.
what is 3 plus 2? the answer is 5.
what is 5 plus 2? the answer is 7.
what is 7 plus 2? the answer is 9.
now if we proceeded, i is more than 9, thus ends the while loop.
the output is 13579
because there are no newlines, the numbers are all squished together on the same line.
GAME DESIGN
If you are designing a video game that will primarily be played on a smartphone or tablet, what considerations about the operation or control methods should you keep in mind?
If you are designing a video game that will primarily be played on a smartphone or tablet, the considerations about the operation or control methods that you should keep in mind are:
The Orientation of the device; The processing power of the device; andThe size of the device in relation to the spacing of the controlls.What are video games?As a result, there is a growing need for mobile app development services and mobile app development companies. As a result of this demand, various smartphone app development businesses promise to provide excellent services.
Regardless of phone manufacturer improvements, there are still uses for the game design process, such as:
Feature Creep IssueNot Targeting the Correct AudienceGetting the Game NoticedManaging Security ConcernsOperating System Fragmentation.Creating the Monetization ModelUpkeep.Learn more about video games:
https://brainly.com/question/28060919
#SPJ1
What are some examples of common watermarks? Check all that apply.
save
sample
draft
do not copy
open
The common Watermarks that can be applied are
1. Sample
2. Do not copy
3. Draft
What is watermark with example?
Watermarking is the process of superimposing a logo or piece of text atop a document or image file, and it's an important process when it comes to both the copyright protection and marketing of digital works.
There are two types of digital watermarking:
Visible Digital Watermarking:
Invisible Digital Watermarking:
Hence, Sample , Do not copy and Draft can be considered as Watermark
To know more about watermark from the given link
https://brainly.com/question/19709292
#SPJ4
the difference bitween hardware and software ?
Answer:
Hardware refers to the physical and visible components of the system such as a monitor, CPU, keyboard and mouse. Software, on the other hand, refers to a set of instructions which enable the hardware to perform a specific set of tasks.
Hardware is any physical part of the computer, like the monitor or keyboard. Software is the virtual part that tells the hardware what to do.
Given an array of distinct positive integers. Which of the following can be used to find the longest consecutive sub-sequence of integers? (Note that the consecutive numbers need not be sorted.)
For example, if the given array is [1 , 7, 3, 2, 8], the longest consecutive subsequence is [1 , 3, 2] as 1 , 2,3 are consecutive integers.
A Naive approach can be used to find the longest consecutive sub-sequence of integers.
What do you mean by Integers?Integers may be defined as whole numbers that can be positive, negative, or zero. It does not include any functional number or the numbers in the form of p/q. Examples of integers may include -5, 1, 5, 8, 97, etc.
The idea for finding the longest consecutive sub-sequence of integers is to sort or filter the array and find the longest subarray with consecutive elements. After sorting the array and eliminating the multiple occurrences of elements, run a loop and keep a count and max.
Therefore, a Naive approach can be used to find the longest consecutive sub-sequence of integers.
To learn more about Integers, refer to the link:
https://brainly.com/question/929808
#SPJ1
5. Define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2
and y2 and will calculate the distance between these two points using the formula
√((x2 – x1)² + (y2 – y1)²). You must use the SquareRoot function you defined previously.
[10 points]
Test case:
> (DistanceBetweenTwoPoints 2 5 3 2)
3.1622776601683795
Can anyone please help me to write this procedure in Scheme Language? I am stuck! Please help!
Using the knowledge in computational language in JAVA it is possible to write the code that define a procedure “DistanceBetweenTwoPoints” that will take four paramaters x1, y1, x2 and y2.
Writting the code:package org.totalbeginner.tutorial;
public class Point {
public double x;
public double y;
Point(double xcoord, double ycoord){
this.x = xcoord;
this.y = ycoord;
}
public double getX() {
return x;
}
public double getY() {
return y;
}
}
package org.totalbeginner.tutorial;
public class Line {
double x;
double y;
Point p1 = new Point(2.0,2.0);
Point p2 = new Point(4.0,4.0);
Point mp = new Point(x,y);
public void midpoint() {
x = (p1.getX() + p2.getX()) / 2;
y = (p1.getY() + p2.getY()) / 2;
}
See more about JAVA at brainly.com/question/12975450
#SPJ1
what is search engine optimization?
Answer:
Make the website clear with search engine
Explanation:
which search algorithm uses three variables to mark positions within the array as it searches for the searchvalue?
A binary search algorithm that uses three variables to mark positions within the array as it searches for the searchvalue.
What is a binary search?In Computer technology, a binary search simply refers to an efficient algorithm that is designed and developed for searching an element (information) from a sorted list of data that are stored on a database, especially by using the run-time complexity of Ο(logn)
Note: n is the total number of elements in a list.
Additionally, keywords and search operators are important variables (elements) that have a significant effect on search results. Therefore, searchvalue is a binary search algorithm that is designed and developed to make use of three (3) variables to mark positions within an array as it perform a searche operation.
Read more on binary search here: https://brainly.com/question/17180912
#SPJ1
SHOW ALL YOUR WORK. REMEMBER THAT PROGRAM SEGMENTS ARE TO BE WRITTEN IN
JAVA.
• Assume that the classes listed in the Java Quick Reference have been imported where appropriate.
• Unless otherwise noted in the question, assume that parameters in method calls are not null and that methods are called only when their preconditions are satisfied.
• In writing solutions for each question, you may use any of the accessible methods that are listed in classes defined in that question. Writing significant amounts of code that can be replaced by a call to one of these methods will not receive full credit.
A manufacturer wants to keep track of the average of the ratings that have been submitted for an item using a running average. The algorithm for calculating a running average differs from the standard algorithm for calculating an average, as described in part (a).
A partial declaration of the RunningAverage class is shown below. You will write two methods of the RunningAverage class.
*
public class RunningAverage
{
}
/** The number of ratings included in the running average. private int count;
/** The average of the ratings that have been entered. */ private double average;
// There are no other instance variables.
/** Creates a RunningAverage object.
* Postcondition: count is initialized to 0 and average is
* initialized to 0.0.
*/
public RunningAverage()
{ /* implementation not shown */ }
/** Updates the running average to reflect the entry of a new
* rating, as described in part (a).
*/
public void updateAverage (double newVal)
{ /* to be implemented in part (a) */ }
/** Processes num new ratings by considering them for inclusion
* in the running average and updating the running average as
necessary. Returns an integer that represents the number of
*
* invalid ratings, as described in part (b).
* Precondition: num > 0
*/
public int processNewRatings (int num)
{ /* to be implemented in part (b) */ }
/** Returns a single numeric rating.
public double getNewRating()
{ /* implementation not shown */ }
(a) Write the method updateAverage, which updates the RunningAverage object to include a new rating. To update a running average, add the new rating to a calculated total, which is the number of ratings times the current running average. Divide the new total by the incremented count to obtain the new running
average.
For example, if there are 4 ratings with a current running average of 3.5, the calculated total is 4 times 3.5, or 14.0. When a fifth rating with a value of 6.0 is included, the new total becomes 20.0. The new running average is 20.0 divided by 5, or 4.0.
Complete method updateAverage.
/** Updates the running average to reflect the entry of a new
* rating, as described in part (a).
*/
public void updateAverage (double newVal)
(b) Write the processNewRatings method, which considers num new ratings for inclusion in the running average. A helper method, getNewRating, which returns a single rating, has been provided for you.
The running average must only be updated with ratings that are greater than or equal to zero. Ratings that are less than 0 are considered invalid and are not included in the running average.
The processNewRatings method returns the number of invalid ratings. See the table below for three examples of how calls to process NewRatings should work.
Statement
Ratings
processNewRatings
Generated
Return Value
processNewRatings (2)
2.5, 4.5
processNewRatings (1)
-2.0
1
0.0,
-2.2,
processNewRatings (4)
2
3.5, -1.5
Comments
Both new ratings are included
in the running average.
No new ratings are included in the running average.
Two new ratings (0.0 and 3.5) are included in the running
average.
Complete method processNewRatings. Assume that updateAverage works as specified, regardless of what you wrote in part (a). You must use getNewRating and updateAverage appropriately to receive full
credit.
/** Processes num new ratings by considering them for inclusion
* in the running average and updating the running average as
*
necessary. Returns an integer that represents the number of
* invalid ratings, as described in part (b).
* Precondition: num > 0
*/
public int processNewRatings (int num)
how does virtual memory different from main memory and secondary memory
A secondary memory device is comparable to a spinning magnetic disk or, in modern times, an SSD. Basically, it moves slowly (even an SSD is slow compared to the main memory). Data is stored there as files.
A software can fool itself into believing it has a collection of linear address blocks that it can use as ordinary memory by creating the illusion of virtual memory.
Except in cases where the total quantity of virtual memory needed by all running processes exceeds the physical memory attached to the computer, it has nothing to do with the idea of secondary storage. In that instance, relatively unoccupied pages will be transferred to secondary storage; nevertheless, this is more of a "side effect" of secondary storage's handy proximity and size compared to main memory.
Learn more about memory at:
https://brainly.com/question/13147674
Tech A says that it is usually better to pull a wrench to tighten or loosen a bolt. Tech B says that
pushing a wrench will protect your knuckles if the wrench slips. Who is correct?
Tech A is correct because pulling a wrench to tighten or loosen a bolt secures it to the bolt threading, reducing the possibility of it slipping.
How to tighten nuts and bolts?
Place your socket on the wrench's head. To begin using your torque wrench, insert a socket that fits your nut or bolt into the torque wrench's head. If you have an extender or adaptor, you can insert it into the opening at the head instead.
Hand-tighten the nut or bolt until it catches the threading on the screw. Place the nut or bolt to be tightened over the threading for the screw or opening on your vehicle by hand. Turn the nut or bolt on the vehicle clockwise with your fingers until the threading on the screw catches. Turn the nut or bolt until it can no longer be turned by hand.
Place the wrench on top of the nut or bolt being tightened. Hold the torque wrench handle in your nondominant hand while the nut or bolt is set on the threading.
Tighten the nut or bolt by turning the handle clockwise. When the wrench starts clicking or stops moving, stop turning it.
To know more about wrench and bolts, kindly visit: https://brainly.com/question/15075481
#SPJ1
Which CPU sockets are supported by the motherboard and are the
least expensive? (Select two.)
17-975, 3.33 GHZ, 8MB Cache, LGA1366
AMD Phenom II X4 940 Black Edition
Intel Pentium 4 Processor 662
Intel Core 2 Duo Processor E6300
i7-930, 2.80 GHZ, 4MB Cache LGA1366
Answer:
Educated guess: The 662 and E6300, since the others are both i7. The 662 and E6300 are both socket LGA775.
Explanation:
The Intel Pentium and Core 2 lines are lower spec than Intel's i7 generations, so they must be cheaper. AMD is entirely different, and that Phenom II is AM2 socket type if I'm remembering correctly. This is all so dated. The E6300 there came out 16 years ago. That i7-930 is the most recent in the list and came out in 2010, 12 years ago.
Find advert in magazines or websites of working desktop computer systems or laptop as well as a monitor, keyboard and software you will also need additional devices such as mouse or printer. Reports outlines and explaining the details of the advertising
Because of our independence, you have complete control over your data. Your information is your information. Independent, open platform. MRC-accredited metrics Increase the effectiveness of advertising.
How do you write outlines for reports and explain the details of advertising?Analyze market position information for the product and explain how that position is expected to change. Make a list of suggestions to improve your next advertisement.
Typically, advertising campaigns promote a product or service. A national automaker, for example, may launch a new vehicle model through print advertisements in newspapers and magazines. To reach the vehicle's target market, the company may also place graphics-rich ads on websites. This combined media blitz produces more desirable results than isolated advertisements without a central strategy.
This automobile manufacturer, or any business selling a product or service, evaluates its campaign's effectiveness based on defined criteria. A written report provides an objective campaign analysis, highlights favorable results and identifies areas in which advertising strategy adjustments are appropriate.
To learn more about details of advertising refer to:https://brainly.com/question/1658517
#SPJ1
How does a Cell is Addressed in MS Excel ?
Cells are the boxes you see in the grid of an Excel worksheet, like this one. Each cell is identified on a worksheet by its reference, the column letter and row number that intersect at the cell's location. This cell is in column D and row 5, so it is cell D5. The column always comes first in a cell reference
Design a flowchart or pseudocode for a program that accepts two
numbers from a user and displays one of the following messages: First
is larger, second is larger, and numbers are equal.
Using the knowledge in computational language in python it is possible to write the code that design a flowchart or pseudocode for a program that accepts two numbers from a user and displays
Writting the code:firstNum=int(input("enter the firstNum "))
secondNum=int(input("enter the secondNum "))
First="First is larger"
Second="Second is large"
Equal="Numbers are equl"
if firstNum>secondNum:
print(First)
elif(secondNum>firstNum):
print(Second)
else:
print(Equal)
See more about python at brainly.com/question/18502436
#SPJ1
Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
A sample expression that uses Boolean operators that prints "Special number" if special_num is -99, 0, or 44 is given below:
The Programimport java.util.Scanner;
import java.io.*;
public class Test
{
public static void main(String[]args) throws IOException
{
File file = new File("SNUMS.INP");
Scanner inputFile = new Scanner(file);
int order = 1;
int i = 1;
int[] special = new int[1000000+1];
// Write all 10^6 special numbers into an array named "special"
while (order <= 1000000)
{
if (specialNumber(i) == true)
{
special[order] = i;
order++;
}
i++;
}
// Write the result to file
PrintWriter outputFile = new PrintWriter("SNUMS.OUT");
outputFile.println(special[inputFile.nextInt()]);
while (inputFile.hasNext())
outputFile.println(special[inputFile.nextInt()]);
outputFile.close();
}
public static boolean specialNumber(int i)
{
// This method check whether the number is a special number
boolean specialNumber = false;
byte count=0;
long sum=0;
while (i != 0)
{
sum = sum + (i % 10);
count++;
i = i / 10;
}
if (sum % count == 0) return true;
else return false;
}
}
Read more about boolean operators here:
https://brainly.com/question/5029736
#SPJ1
common errors in writing Python
Answer:
1.not following the rules
2.misusing expression
All academic departments in a University keeps a database of its students. Students are classified into undergraduate, graduate, and international students. There are few reasons for grouping the students into these three categories. For example the department's secretary informs: the undergraduate students about new undergraduate courses offered, the graduate students about graduate courses and professional conferences and international students about new emigration laws.
i. Identify (if any) the subtypes of entity students.
ii. Identify a unique attribute (relationship) for each subtype.
iii. Draw an EER diagram for the department's database.
The identification of subtypes of entity students may be done on the basis of students those who have taken courses on the basis of their educational qualifications.
What do you mean by the EER diagram?The EER diagram stands for the Enhanced-entity-relationship diagram. This diagram provides a visual representation of the relationship among the tables in your model. The revisions that are made with the Model editor are significantly represented in the associated diagram.
According to the context of this question, the unique attribute (relationship) for each subtype is the classification of students based on the national and international characteristics of all courses.
The EER diagram is manipulated by the structural arrangement of the classification of the students on the basis of several characteristics.
To learn more about the EER diagram, refer to the link:
https://brainly.com/question/15183085
#SPJ1
What is the fee involved in order for a Worker to use Microworkers service?
$9
$1
$2
None, Microworkers id free
None, Microworkers id free there is no charge .
What are microworkers ?A microworker is someone who undertakes and completes these tasks. Tasks are generally easy and don't require a lot of time or skill. Microwork is often used as a way to make extra money because it can be done in a short period of time and does not require a long-term commitment. There are many of his Microwork sites that provide tasks that workers can perform. These sites include Amazon Mechanical Turk, Microworkers, and Clickworker. In Clickworker, microworkers are called Clickworkers.
learn more about microworkers here :
brainly.com/question/20851831
#SPJ13