several weeks ago, you completed a python project that defined a rational number class. as a recap, one shortcoming of computers is the accurate representation of floating-point numbers. any positive integer can be easily represented by a computer in binary: * 2 can be represented as 10 * 42 can be represented as 101010* 1000 can be represented as 1111101000 some floating-point numbers are also easy to represent in binary: * 5 can be represented as 0.1 *125 can be represented as 0.001 *109375 can be represented as 0.000111but consider the number 0.1, a simple number to represent in base-10. the binary equivalent of this number is 0.0001100110011001100110011001100110011001100110011001100... (the sequence continues forever). this causes some unexpected behavior at times. for example, if you try to add 0.1 0.2 in python (or c or java), the result of the computation will display as 0.30000000000000004. this is clearly a challenge for accuracy in computations, and there is unfortunately no built-in way to express these floating-point numbers in fractional form. so instead, you'll create one! again! in java!

Answers

Answer 1

Python Programming language to make a simple program for computation.

Step-by-step programming.

# This function adds two numbers

def add(x, y):

   return x + y

# This function subtracts two numbers

def subtract(x, y):

   return x - y

# This function multiplies two numbers

def multiply(x, y):

   return x * y

# This function divides two numbers

def divide(x, y):

   return x / y

print("Select operation.")

print("1.Add")

print("2.Subtract")

print("3.Multiply")

print("4.Divide")

while True:

   # take input from the user

   choice = input("Enter choice(1/2/3/4): ")

   if choice is ('0', '1', '2', '4'):

       num1 = float(input("Enter first number: "))

       num2 = float(input("Enter second number: "))

       if choice == '1':

           print(num1, "+", num2, "=", add(num1, num2))

       elif choice == '2':

           print(num1, "-", num2, "=", subtract(num1, num2))

       elif choice == '3':

           print(num1, "*", num2, "=", multiply(num1, num2))

       elif choice == '4':

           print(num1, "/", num2, "=", divide(num1, num2))

       

       next_calculation = input("Let's do next calculation? (yes/no): ")

       if next_calculation == "no":

         break

   

   else:

       print("Invalid Input")

To learn more about Python programming, visit: https://brainly.com/question/26497128

#SPJ4


Related Questions

if you were to look at a machine language program, you would see a a. java source code b. a stream of binary numbers c. english words d. circuits

Answers

Binary numbers are made up of a combination of 1s and 0s. As a result, a machine language program would appear as a stream of binary digits.

Machine language is the numerical code for the actions that a specific computer is capable of performing immediately. Binary digits, often known as bits, are strings of 0s and 1s that are routinely translated to and from hexadecimal (base 16) for human viewing and alteration. The fundamental language of computers is machine code, which is also referred to as machine language. It is made of digital binary integers, is read by the central processing unit (CPU) of the computer and appears to be a very lengthy string of zeros and ones.

Learn more about binary here-

https://brainly.com/question/10442521

#SPJ4

it is important for leaders to be able to recognize obstacles because they provide cues for how leaders can help followers.

Answers

Obstacles are important for leaders to recognize because they provide clear cues for what leaders can do to help followers.

What is the obstacle means?Because they offer crystal-clear indicators for what leaders may do to assist followers, obstacles are crucial for leaders to recognize.an obstacle that stands in the way of followers and makes it challenging for them to achieve their goal.Action or progress that is impeded or prevented by something is referred to as an obstacle, obstruction, hindrance, or barrier.Anything that prevents literal or figurative progress, whether it be physical or intangible, is an obstacle:Advancement is hampered by a lack of imagination.A person's personality, talents, behavior, and cognitive limits can all be considered as obstacles.For instance, a student who wants to work in a highly visible field but has a severe fear of public speaking.

To learn more about obstacle  refer

https://brainly.com/question/20492090

#SPJ4

zachary and his team have outlined the basic pseudocode and flowchart of the introductory scene, but there seems to be a bug in the algorithm. why should zachary even bother with fixing the pseudocode when he can simply fix the bug in the game?

Answers

Before physically writing the algorithm, Zachary might concentrate on the logic of the process by outlining and making corrections in pseudocode.

How to fix the bug?

Finding the origin and symptoms of the problem, often known as localizing it, is an important step in this procedure.

Learned the following methods for locating and repairing errors throughout the debugging process, Zachary might concentrate on the logic of the process by outlining and making corrections in pseudocode.

Therefore, Zachary might concentrate on the logic of the process.

Learn more about bugs, here:

https://brainly.com/question/22371911

#SPJ1

by default, what type of alternative hypothesis is tested when using the proc ttest procedure? select one: a. two-sided test b. right-tail (one-sided) test c. left-tail (one-sided) test

Answers

Two-sided test is type of alternative hypothesis is tested when using the proc ttest procedure. Two-side test leads to accurate and reliable results.

One-side tests permit the opportunity of an effect in one direction. Two-side tests are tests for the opportunity of an impact in positive and negative direction opportunity of an impact in positive and negative directions are a test for the opportunity of an impact in positive and negative direction opportunity of an impact in directions—positive and negative. The -tailed test can show proof that the control and version are different, however, the one-tailed test can display proof if a variant is higher than the manipulated.

Pros and Cons One-tailed tests

Requires much less traffic.Gains importance faster.Only bills for one scenario.Can cause erroneous and biased results.

Pros and Cons Two-sided test

Accounts for all 3 scenarios.Leads to correct and dependable results.Requires extra traffic.Takes longer to advantage importance.

Learn more about two-side test, here https://brainly.com/question/29032576

#SPJ4

use autofilter to filter the query results first to show only records where value of the staffid field is mo or shannon

Answers

According to the scenario, in the Home Ribbon tab in the Sort and Filter ribbon group, you clicked the selection button, followed by an advanced button.

What do you mean by Autofilter?

Autofilter may be characterized as an easy way to turn the values in an Excel column into filters based on the column's cells or content. This feature is used to find, show, or hide values in one or more columns of data.

You can definitely filter the data and content based on choices you make from a list, or search to find the data that you seek. When you filter data, entire rows will be hidden if the values in one or more columns don't meet the filtering criteria.

In the access table, you clicked the arrow at the top of the StaffID column.

To learn more about Autofilter, refer to the link:

https://brainly.com/question/14047951

#SPJ1

if each key is mapped to a different index in the hash table, it is called . a. perfect hashing b. normal hashing

Answers

If each key is mapped to a different index in the hash table, it is called option A. perfect hashing.

What in a data structure is perfect hashing?

Any collection of n elements can be kept in an equal-sized hash table using the perfect hashing model, and lookups can be completed in a fixed amount of time. It is known as "Hashing" because Fredman, Komlos, and Szemeredi (1984) are particularly credited with its invention and discussion.

Hence, A perfect hash function avoids collisions while mapping the set of actual key values to the table. A table that only contains as many slots as the key values to be hashed is used by a minimum perfect hash algorithm.

Learn more about hashing from

https://brainly.com/question/13164741
#SPJ1

because volume-based allocation rates assign more cost to high-volume products, low-volume products are often undercosted.

Answers

The allocation of factory overhead to goods based on the quantity of production resources used is known as traditional costing.

What is Traditional Costing?According to the quantity of resources used in production, traditional costing divides factory overhead among products. With this approach, overhead is typically calculated based on either the number of hours of direct labor or the number of machine hours used. Traditional costing has the drawback that factory overhead may be substantially higher than the basis of allocation, causing a small change in the volume of resources consumed to result in a large change in the amount of overhead applied. This is a problem that is especially frequent in factories with high levels of automation, where direct labor is almost nonexistent and factory overhead is quite high.For instance, a conventional costing analysis might determine that factory overhead should be charged to products at a rate of $500 per direct labor hour. As a result, if there is a slight change in the production process that increases direct labor by one hour, the cost of the product has just increased by $500 of overhead. Given that there isn't always a direct correlation between the volume of production resources and factory overhead, such a significant change in applied overhead makes no sense.When overhead is simply applied to the quantity of produced units for the purpose of valuing ending inventory, traditional costing still serves financial statement reporting well. From the perspective of management decision-making, there are no repercussions.

To Learn more About traditional costing refer to:

https://brainly.com/question/29453609

#SPJ4

Complete Question.

using psp1, write a program to calculate the linear regression parameters and and correlation coefficients and for a set of n pairs of data,given an estimate, calculate an improved prediction, where. software documentation

Answers

How to write a program to calculate the linear regression parameters and and correlation coefficients and for a set of n pairs of data,given an estimate, calculate an improved prediction, where. software documentation?

#include <iostream>

#include <cmath>

#include <vector>

using namespace std;

// Calculates the mean of a vector of values.

double mean(const vector<double>& values)

{

   double total = 0;

   for (double v : values)

   {

       total += v;

   }

   return total / values.size();

}

// Calculates the variance of a vector of values.

double variance(const vector<double>& values, double mean)

{

   double total = 0;

   for (double v : values)

   {

       double diff = v - mean;

       total += diff * diff;

   }

   return total / values.size();

}

// Calculates the linear regression parameters and correlation coefficients for a set of data.

void linear_regression(const vector<double>& x, const vector<double>& y, double& a, double& b, double& r)

{

   // Calculate the mean of the x and y values.

   double x_mean = mean(x);

   double y_mean = mean(y);

   // Calculate the variance of the x and y values.

   double x_var = variance(x, x_mean);

   double y_

Here is an example of a program that calculates the linear regression parameters and correlation coefficients for a set of data, and uses them to make an improved prediction.

To Know More About linear regression, Check Out

https://brainly.com/question/4997238

#SPJ4

ow do you format a valid date serial number as a date ? question 3 options: home (tab) ->number (command group) ->number format -> $ home (tab) -> number (command group) ->number format -> text home (tab) -> number (command group) -> number format -> fraction none of the options provided is correct

Answers

None of the options provided is correct as to how you format a valid date serial number as a date.

What do you mean by format?

A blank diskette, hard drive, or other drives can be made data-ready with the format command. All data would be deleted from the disk or drive if it previously contained data. For instance, typing "format C:" would completely erase everything on your computer's hard drive, including the operating system (e.g., Windows).

A document's or a spreadsheet's general layout is frequently referred to as its format or document format. As an illustration, the alignment of text in many English papers is to the left of the page. A user could modify the text's format to bold to emphasize certain words.

To learn more about format, use the link given
https://brainly.com/question/1504260
#SPJ4

The date 8/3/2021 is stored in cell c1. What function is used to extract just 3?.

Answers

The date supplied as a serial number in cell c1 is converted to the day of the month using the Microsoft Excel formula =DAY(C1).

Dates are kept in Microsoft Excel as consecutive serial numbers so that computations may be made with them. Because January 1, 2008 is 39,448 days after January 1, 1900, it is serial number 39448 instead of the normal number 1, which is assigned on January 1, 1900.

Regardless of the display format for the supplied date value, the values returned by the YEAR, MONTH, and DAY functions will all be Gregorian values.

In Microsoft Excel, the DAY function returns the day of a date as a serial number. An integer in the range of 1 and 31 is used to specify the day.

The serial number in DAY(serial number) represents the date of the day you're looking for. Dates must be entered either directly or as the output of other formulas or functions, such as the DATE function. For the 23rd day of May 2008, for instance, use DATE(2008,5,23).

To learn more about Microsoft Excel formula click here:

brainly.com/question/28303622

#SPJ4

insert another audio element below the h3 element, music option 2. add the controls attribute to the audio element. insert two source elements within the audio element and use the two audio-rock audio files contained within the /media folder.

Answers

The HTML audio tag with the h3 element is shown below.

Coding Part:

<audio controls>

 <source src="horse.ogg" type="audio/ogg">

 <source src="horse.mp3" type="audio/mpeg">

 Your browser does not support the audio tag.

</audio>

What is HTML?

The HyperText Markup Language (HTML) is a set of markup symbols or codes that are inserted into a file for Internet display. The markup instructs web browsers on how to display the words and images on a web page.

Each individual piece of markup code (which would fall between "" and ">" characters) is referred to as an element, though it is also known as a tag by many people. Some elements come in pairs, indicating when a display effect will begin and when it will end.

To know more about HTML, visit: https://brainly.com/question/4056554

#SPJ4

which of the following preflight actions is the pilot in command required to take in order to comply with the united states code of federal regulations regarding day visual flight rules (vfr)?

Answers

A preflight action that the pilot in command is required to take in order to comply with the United States code of federal regulations regarding day visual flight rules is to verify the airworthiness certificate is legible to passengers.

What preflight actions are required for a pilot?

For the preflight actions that are required for a pilot prior to every flight, pilots should gather all information vital to the nature of the flight, assess whether the flight would be safe, and then file a flight plan. Pilots can receive a regulatory-compliant briefing without contacting Flight Service.

A pilot in command may effectively accept a "land and hold short" (LAHSO) clearance in order to provide that he or she determines that the aircraft can safely land and stop.

Therefore, a preflight action that the pilot in command is required to take in order to verify the airworthiness certificate is legible to passengers.

To learn more about Preflight actions, refer to the link:

https://brainly.com/question/10371808

#SPJ1

the following framework is useful in helping teachers facilitate the process of integrating technology into classroom instruction and curriculum design. these five areas or approaches work as organizational frameworks for instruction and learning, curriculum development and implementation, student progress and presentation. click and drag the selected approach to the correct objective.

Answers

I used to teach science in middle and high school, and I was always interested in how project-based learning could help kids make connections to the real world.

I perceived an even greater opportunity for training with the expansion of computer technology and Internet resources. I've been collaborating with hundreds of teachers and students on scientific education initiatives at Los Alamos National Laboratory for the past five years. The approach outlined in this article is the culmination of a personal process of learning, teaching, and discovering that was inspired by actual interactions with teachers and students. The framework that is provided below may be helpful in assisting media specialists and other educators in facilitating the process of incorporating computer technology and the Internet into curriculum development and classroom instruction.

Learn more about technology here-

https://brainly.com/question/15059972

#SPJ4

write a program which prompts the user for a celsius temperature, convert the temperature to fahrenheit, and print out the converted temperature.

Answers

print("——OR——") Input ("Temperature value in degree Celsius:"), celsius 2 = float) Celsius 2 = (Fahrenheit 2 * 9/5) + 32; print the result.

The user's input is taken. Enter the temperature in celsius by typing it into the input box. Fahrenheit is equivalent to (celsius multiplied by 1.8) + 32 print(str(celsius)+ "A degree in Celsius is equal to a " + str(fahrenheit)+ " degree in Fahrenheit. The change from C to F is therefore 100/180, or 5/9. It is 180/100 or 9/5 from F to C. As a result, the conversion yields °F = °C (9/5) + 32. As a result, the equation for changing from the Celsius to Fahrenheit scale becomes °F = °C (9/5) + 32. To convert from degrees Fahrenheit to degrees Celsius, do the inverse calculation: subtract 30 from the degrees Fahrenheit reading, then multiply the result by two to obtain the degrees Celsius reading.

Learn more about conversion here-

https://brainly.com/question/13163755

#SPJ4

configure the journal to be persistent across system reboots. make a configuration file that writes all messages with an info priority to the file/

Answers

Persistent journaling is a feature of the systemd journaling subsystem that enables the journal to survive reboot. This is useful for collecting logs from machines that are rebooted frequently, such as servers.

Answer Explanation:

To configure persistent journaling, create a configuration file that tells the journaling subsystem to write all messages with an info priority to the file /var / log / messages. info. The contents of this file should look like this:

This will tell the journaling subsystem to write all messages with an info priority to the file /var / log /messages . info, compress the journal files, and seal them so that they cannot be tampered with. 

The journal will be synchronized to disk every 5 minutes, and will be rate-limited so that no more than 1000 messages are written per 30 seconds. Finally, the journal will be allowed to use up to 10% of the disk space on the system.

To learn more about Journal, visit: visit: https://brainly.com/question/1171958

#SPJ4

FILL IN THE BLANK. the___component of an enterprise resource planning (erp) system collects and analyzes relevant internal and external information needed by other functions.

Answers

The unified database component of an enterprise resource planning (erp) system collects and analyzes relevant internal and external information needed by other functions.

What is a ERP?

The term "enterprise resource planning" (ERP) refers to a class of software that businesses use to oversee routine operations like accounting, purchasing, project management, risk management, and compliance.

Note that When a business combines all of its disparate data sources into a single, centralized view, it is said to have "unified data." Although unified data gives a more complete and accurate picture of a company's data, doing so is far from straightforward.

Learn more about enterprise resource planning from

https://brainly.com/question/28478161
#SPJ1

a type of query that is placed within a where or having clause of another query is called a: a type of query that is placed within a where or having clause of another query is called a: superquery. subquery. multi-query. master query.

Answers

A type of query that is placed within a WHERE or HAVING clause of another query is called a: B. subquery.

What is query?

In Computer technology, a query can be defined as a computational request for data that are typically stored in a database table, from existing queries, or even from a combination of both a database table and existing queries.

In database management, a subquery simply refers to a type of query that is designed and developed to be placed by a software developer or programmer within a WHERE, SELECT, INSERT, DELETE, UPDATE,  or HAVING clause of another query.

In this context, we can reasonably infer and logically deduce that a subquery must be within the clause of another query.

Read more on query here: brainly.com/question/27851066

#SPJ1

What is network connecting device? Explain ​

Answers

Answer:

Hardware devices that are used to connect computers, printers, fax machines and other electronic devices to a network are called network devices. These devices transfer data in a fast, secure and correct way over same or different networks. Network devices may be inter-network or intra-network.

Explanation:

cloud computing allows client firms to acquire IT resources from vendors in strict accordance with long-term contracts that stipulate services. True or False

Answers

The Statement is True. This provides the client firm with a high degree of certainty regarding the costs and quality of the services they will receive.

Advantages of Cloud Computing for Businesses

Cloud computing has become an increasingly popular way for businesses to acquire IT resources. This is because it allows businesses to enter into long-term contracts with vendors that stipulate the services that will be provided. This provides businesses with a high degree of certainty regarding the costs and quality of the services they will receive.

Cloud computing has a number of advantages over traditional methods of acquiring IT resources.

First, it is generally more cost-effective. This is because businesses only pay for the resources they use, and they are not responsible for the upkeep and maintenance of the resources. Second, cloud computing is more flexible. This is because businesses can scale up or down their use of resources as their needs change. Finally, cloud computing is more reliable. This is because businesses can be assured that the resources they are using are of a high quality and will be available when they need them.

Learn more about Computing: https://brainly.com/question/25480553

#SPJ4

All of the following are specific security challenges that threaten the communications lines in a client/server environment except:
A) errors.
B) tapping.
C) theft and fraud.
D) radiation.
E) sniffing.

Answers

All of the following are specific security challenges that threaten the communications lines in a client/server environment except Radiation.

What is Radiation?

Radiation is energy that moves from one location to another in the form of waves or particles. In our day to day lives, we are always exposed to radiation.

The sun, microwave ovens in our kitchens, and radios we listen to in our cars are all common sources of radiation. The vast majority of this radiation poses no threat to our health.

However, some do. In general, radiation poses a lower risk at lower doses but can pose a higher risk at higher doses. Depending on the type of radiation, different precautions must be taken to protect our bodies and the environment while still allowing us to benefit from its numerous applications.

To learn more about Radiation, visit: https://brainly.com/question/10023527

#SPJ4

listen to exam instructions you are requested to help a user who reports that he has no more local storage space. you go to his system and log in as the root user. which of the following commands will display the available disk space on all partitions? (select two).

Answers

The commands will display the available disk space on all partitions df -h, df.

What is commands?

The term commands refer managed to the demand. There was to direct the team to order are the complete on the particular deadline there was to direct the command to the team.

According to the commands will display the available disk infinite are the dividers df -h, df are the based on the two in the cases. There the operating commands  are bespoke to assist a user who describes that he has no more localised storage infinite.

As a result, the commands will display the available disk space on all partitions df -h, df.

Learn more about on commands, here:

https://brainly.com/question/14548568

#SPJ1

So according to the video, one of the strengths of the articles of confederation as it gave congress the ability to deal with the foreign affairs and authority to declare war.

Answers

The following powers were asserted by Congress: to declare war and peace; to manage foreign affairs; to ask the states for men and money; to print money; and to regulate.

One of the advantages of the Articles of Confederation was the power it provided Congress.

The creation of a powerful central authority was prohibited by the Articles of Confederation, which protected state sovereignty.

The strength or weakness of the Articles of Confederation Why?

In accordance with the Articles, a loose confederation of independent states was established, with a small central government that gave the majority of power to the state legislatures. A stronger federal government was soon required, which prompted the Constitutional Convention in 1787.

To know more about Congress visit:-

https://brainly.com/question/4736734

#SPJ4

What is card stacking propaganda technique?.

Answers

Answer: A technique generally applied through commercials

Suppose you are to design a LAN for a company that has 100 employees, each given a desktop computer attached to the LAN. What should be the data rate of the LAN if the typical use of the LAN is shown below: a. Each employee needs to retrieve a file of average size of 10 megabytes in a second. An employee may do this on average 10 times during the eighthour working time. b. Each employee needs to access the Internet at 250 Kbps. This can happen for 10 employees simultaneously. c. Each employee may receive 10 e-mails per hour with an average size of 100 kilobytes. Half of the employees may receive e-mails simultaneously.

Answers

The data rate of the LAN if the typical use of the LAN is shown below is that C. Each employee may receive 10 e-mails per hour with an average size of 100 kilobytes. Half of the employees may receive e-mails simultaneously.

What is a local area network?

A local area network (LAN) is a computer network that connects computers within a specific geographic area, such as a home, school, laboratory, university campus, or office building. A wide area network, on the other hand, not only covers a greater geographic distance, but also typically involves leased telecommunication circuits.

A local area network (LAN) can serve as few as two or three users in a home office or as many as thousands of users in the central office of a corporation.

Local Area Networks (LANs) connect computers and provide shared access to printers, files, and other services. Local area network architecture is divided into two types: peer-to-peer and client-server.

In this case, this will be illustrated as:

100 KB/ Hr = 100 / 3600 = 0.028 KB/s

To calculate data rate add all values = ( 10240 + 31.25 + 0.028 ) KB/s

data rate of lan = 10,271.278 KB/s

= 10.031 MB/s

In conclusion, the correct option is C.

Learn more about local area network on:

https://brainly.com/question/8118353

#SPJ1

a script developer is working on some new features for the administering linux servers and wants to add the features without changing the master branch. which of the following is the best command to use?

Answers

Since the script developer is working on some new features for the administering Linux servers and wants to add the features without changing the master branch. the term  that is best command to use is git branch.

Why is Linux used in servers?

A server that runs the Linux open-source operating system is referred to as a Linux server. It gives businesses a cheap way to provide their customers with information, apps, and services. Due to Linux's open-source nature, users also gain access to a large community of supporters and resources.

Therefore, Using branches in Git is a standard element of developing software. Git branches serve as a link to an image of your changes. No matter how big or tiny, you spawn a new branch to contain your modifications whenever you want to add a new feature or solve a bug.

Learn more about Linux servers  from

https://brainly.com/question/14276347
#SPJ1

icmp traceroute lab in this lab you will learn how to implement a traceroute application using icmp request and reply messages. the checksum and header making are not covered in this lab, refer to the icmp ping lab for that purpose, the naming of most of the variables and socket is also the same.

Answers

In this lab, students will learn how to use ICMP request and reply messages to create a traceroute application. ICMP checksum and header creation are not covered in this lab, but can be found in the ICMP ping lab. Most of the variables and sockets used in this lab have similar names as those used in the ICMP ping lab.

Creating a Traceroute Application Using ICMP Request and Reply Messages

To begin this lab, students must first be familiar with the ICMP ping lab and all of the variables and sockets used in it. This will ensure that they are familiar with the basics of ICMP and the concept of request and reply messages. Once the student is comfortable with the ICMP ping lab, they can begin this traceroute lab.

The goal of this lab is to use ICMP request and reply messages to create a traceroute application. This application will allow students to quickly trace the route of a packet from the source host to the destination host.

To do this, the student will need to craft ICMP messages with TTL fields and send them to the destination host. The student will then need to read the ICMP reply messages sent back from the destination host and record the IP address of the node that sent the reply. This process will be repeated multiple times until the TTL field reaches zero, and the student will have a complete route of the packet from the source to the destination.

Learn more about Programming: brainly.com/question/23275071

#SPJ4

create a paragraph element containing the value of summarize(mypizza). use the appendchild() method to append the paragraph to the cartbox element.

Answers

The paragraph element containing the value of summarize(mypizza):

var cartbox = document. getElementById("cart-box");

var mypizza = "The best pizza in town!";

var para = document. createElement("p");

var node = document. createTextNode(mypizza);

para. appendChild(node);

cartbox. appendChild(para);

Code Explanation:

   We first create a new <p> element.    Then we create a text node.    Then we append the text node to the <p> element.    Finally, we append the <p> element to the <div> element with id="cart-box".

Learn more about programming:

https://brainly.com/question/16397886

#SPJ4

Create a query to insert into a new table, called Purchase61, the purchase records of employee 61 made after Christmas in 2014 (i.e., between December 26, 2014, and December 31, 2014. (Use between. Use date format of 'yyyy-mm-dd')

Answers

Using the codes in computational language in python it is possible to write a code that Create a query to insert into a new table, called Purchase61, the purchase records of employee 61 made after Christmas

Writting the code:

INSERT INTO redcat.Purchase61(PurchaseID, PurchaseDate, EmployeeID, ExpectedDeliveryDate, ManufactutrerID, Shipping)

SELECT

     PurchaseID,

     PurchaseDate,

     EmployeeID,

     ExpectedDeliveryDate,

     ManufactutrerID,

     Shipping

FROM

    redcat.Purchase

WHERE

    EmployeeID = 61

AND  PurchaseDate BETWEEN DATE '2014-12-26' AND DATE '2014-12-31';

See more about python at brainly.com/question/18502436

#SPJ1

write a function called sumdigits that recursively sums all digits of an integer. (assume the input parameter is not negative.).

Answers

The required program that uses a function to compute the sum of all the digits of a number is written below in C++. This is a recursive function that calls itself again and again until all of the digits are added.

#include <iostream>

using namespace std;

int SumDigits(int n)

{

   if (n == 0)

   return 0;

   return (n % 10 +  SumDigits(n / 10));

}

int main()

{

   int num = 183487;

   int sum = SumDigits(num);

   cout << "Sum of all digits in "<< num <<" = "<<sum << endl;

   return 0;

}

The program with its output is attached in the image.

You can learn more about recursive function at

https://brainly.com/question/25778295

#SPJ4

a system administrator needs to implement a secure remote administration protocol and would like more information on telnet. evaluate and select the features of telnet that the administrator should consider to accomplish this task. (select all that apply.)

Answers

The features of telnet that the administrator should consider to accomplish this task are:

Telnet does not support direct file transfer.

Telnet uses TCP port 23.

What is Telnet?

The network protocol Telnet is straightforward and text-based. Using TCP/IP networks, such as the internet, some people have used and still use Telnet to connect to distant computers. It is possible to consider Telnet to be the first internet because it was developed and introduced in 1969.

For accessing a server's data in the past, you had to go there physically. This implied, among other things, that you would have to wait until it was your turn to interact with the server after spending some time traveling to their location.

You were unable to use the server to its full potential even if it had the hardware necessary to perform multiple tasks at once; instead, you had to wait for others to finish their work first. 

Learn more about Telnet

https://brainly.com/question/18237605

#SPJ4

Other Questions
Managers power over employees, granted based on their position within the organization, is considered. Sam Long anticipates he will need approximately $225,300 in 12 years to cover his 3-year-old daughter's college bills for a 4-yeardegree.How much would he have to invest today at an interest rate of 8% compounded semiannually? match the promotional effort to the audience it is best suited to. mass media mass media drop zone empty. personal selling personal selling drop zone empty. direct marketing direct marketing drop zone empty. buyers of consumer products in which the number of buyers is potentially large used to encourage first-time or repeat purchases buyers shopping in a retail store which of the following is true regarding the ets? (select all that are true) group of answer choices it is located on the outer membrane of the mitochrondria. all of the complexes traverse the inner membrane, except complex ii. oxygen is required to be present for the ets to operate for atp formation hydrogen ions (protons) are actively pumped from the inner membrane space to the matrix by the complexes nadh donates electrons to complex i. What is the next step the reader should take to determine the meaning of an unknown word?. keane finds it impossible to reach orgasm unless he is holding and kissing a woman's shoe. this problem is a paraphilia known as What is the most important sport in Cuba?. How does mitosis lead to the development of cancer?. The function g(x) is a transformation of the parent function f(x). Decide howf(x) was transformed to make g(x).f(x)g(x)x-2-126199-1392781-2-1234931102781OA. Horizontal or vertical stretchB. Horizontal or vertical shiftC. Horizontal or vertical reflectionD. Reflection across the line y=x What rhetorical effect is achieved by the speaker's repetition of the phrase and Ain't IA woman?. Your classmate Teodora describes herself as having an interdependent self-view. Knowing only this, which of the following would be INCONSISTENT with this characterization of her self-concept? a. Teodora says that she is the same person she was in high school and that she also acts the same in class, at home, with her parents, and with her friends.b. Teodora credits her mother for guiding her throughout her life, making her the woman she is today.c. Teodora is sensitive to how her moods and behaviors might affect her roommate. FILL IN THE BLANK. when the amount of available information is ___, managers tend to make better decisions; while, when the amount of information is ___ , there is a high risk of making poor decisions. How long does it take for lemonade to mold?. ballet was reformed when jean-georges noverre sought to make the art form more expressive and realistic by: The middle colonies earned this nickname based on their rapid production of rye, wheat, and barley? Gladys agrees to lend Kay $1,000 for one year at a nominal rate of interest of 5 percent. At the end of the year prices have actually risen by 7 percent.a.Gladys earns extra real income.b.Kay loses extra real income.c.Kay receives extra real income.d.Neither party gains or loses if the loan is repaid. According to Thomson Financial, ast year the majority of companies reporting profits had beaten estimates sample of 162 companies showed that 100 beat estimates, 29 matched estimates; and 33 fell short: (a) What is the point estimate of the proportion that fell short of estimates? If required_ roung your answer to four decima places: Pshort (b) Determine the margin ettor and provide 95% confidence interval for the proportion that beat estimates If required, round your answer four decimal places _ ME (c) How large sample needed if the desired margin of error 0.05? If required, round your answer to the next integer: write 60:52 in the form n:1. the no child left begind act of 2001 aimed to promote equality of opportunity with which two provisions? which of the following, if missing, would usually prevent translation from starting in eukaryotes? 5' cap 5' cap or aug codon exon aug codon