write a program that asks the user to enter a number of seconds and then prints the same amount of time in days, hours, minutes, and seconds.

Answers

Answer 1

inp = int(input("Enter amount of seconds: "))

for i in range(4):

   idx = (39630*((i+1)**2))-(201690*(i+1))+248460

   calc = str(int(inp/idx))+" days," if (i+1==1) else str(int(inp/idx))+" hours," if (i+1==2) else str(int(inp/idx))+" minutes," if(i+1==3) else str(inp)+" seconds."

   print(calc)

   inp-=idx*int(inp/idx)

Write A Program That Asks The User To Enter A Number Of Seconds And Then Prints The Same Amount Of Time

Related Questions

(char)('a'+ Math.random() * ('z'- 'a'+ 1)) returns a random character ________. 36)

a. between 'b' and 'z'
b. between 'a' and 'y'
c. between 'b' and 'y'
d. between 'a' and 'z'

Answers

option d So, (char)('a'+ Math.random() * ('z'- 'a'+ 1)) returns characters from 'a' and 'z'.

Math.random() With an essentially uniform distribution throughout that range, the Math.random() method returns a floating-point, pseudo-random number that is higher than or equal to 0 and less than 1, which you can scale to your desired range. Using the random() method, you can get a pseudorandom double type number that is larger than 0.0 and less than 1.0. When this method is called for the first time, it creates a single new pseudorandom-number generator, exactly as if by the expression new java.random will not return 1.0 itself; instead, multiplying what Math. random range returns with 100 will result in a maximum value of 99.999... and when cast to an int turns to 99. You must multiply by 101 since the randomly produced number must contain the digit 100.

Learn more about math.random() here

https://brainly.com/question/17586272

#SPJ4

avicenna, developed by ibm, is smart software that is able to review medical images such as ct scans. if it reaches its potential, there might not be as great a need for:

Answers

When IBM-developed Avicenna reaches its potential there might not be as great a need for reviewing and analyzing a CT scan result manually. CT scan results nowadays are observed manually by doctors to determine disease and find the proper handling. The cons of this manual method are it easily produces human errors when analyzing the CT scan result.

A glimpse on Avicenna

Avicenna, developed by IBM is an artificial intelligence to automate CT scan reading and identify any abnormalities in medical images. This software will be used by cardiologists and radiologists to reduce error in reading and speed up the work. This software observes the image using image-processing algorithms with multiple specialties.

Learn more about artificial intelligence https://brainly.com/question/25523571

#SPJ4

the following code computes the product of a and b. what is its runtime?

int product (int a, int b) { int sum =0; for (int i=0; i< b; i ) { sum = a; } return sum; }

Answers

Since neither loop depends on the other, the two loops are independent. Therefore, we may define the difficulty of the two stacked loops as the sum of the difficulties of the separate loops.

The inner loop in j is O(lgn) and the outer loop in I is O(n) in this scenario (log base 2 of n). The total time is therefore O. (nlgn). The term is derived from the separation between compile time and runtime in compiled languages, which also distinguishes between the computer operations involved in creating a program (compilation) and running it on the target machine (the run time). Consider the following for a n of 16 to understand why the inner loop is O(lgn): j | step# 1 | 1 2 | 2 4 | 3 8 | 4 16 | 5.

Learn more about loop here-

https://brainly.com/question/14390367

#SPJ4

a computer excels at applications which do not require a large amount of precise user input and is designed to be held in one or two hands

Answers

The underlined word (excel) is similar in meaning to: A. Surpass.

What is a synonym?

A synonym can be defined as a type of word that has the same meaning as a listed word. This ultimately implies that, two or more words that are similar in meaning are referred to as synonyms.

In English literature, some examples of synonyms include the following:

Innovative: new.Shut: close.Old: elderly.Loyal: faithful.Vociferous: stridentDangerous: hazardous.Destitute: poor.Stymie: deduceExcel: surpass

In conclusion, excel and surpass are synonyms because they describe the higher abilities of a tablet in comparison with other mobile computing devices, based on the amount of precise user input.

Read more on synonyms here: https://brainly.com/question/24870405

#SPJ1

Complete Question:

Tablet. A tablet, tablet computer or tablet PC is a mobile computing device designed to be held in one or two hands. It is typically the size of a book (7 inches or bigger) and resemble a large smartphone.

Tablet let the users do many of the same things as a traditional computer. They can browse the internet, connect to social network apps, and display HD videos. They excel at application which do not require a large amount of precise user input.

Early tablet devices used light pens or a stylus as their input devices. However, today all tablets use a touchscreen as their primary input devices with the option to connect external devices such as a keyboard. Most tablet only have a few physical buttons, the back power, and volume buttons and everything else can be done using your fingers. Today there are top two operating systems used with tablets. A tablet can have apps installed onto them to perform a function.

The concept of a tablet was first sketched by Alan Kay while at Xerox in 1971 and since then there have been many iterations of tablet devices including PDA’s predecessors to the tablet.

“They excel at applications which do not require a large amount of precise user input”

The underlined word is similar in meaning to?

answer choices

Surpass

Solve

Beat

Get over

Be talented

isabelle is the cybersecurity engineer for a medium-sized company. she is setting up a firewall for examining inbound network traffic for a variety of characteristics. while remote users working from home should be allowed access to network resources, malicious traffic should be blocked. to differentiate, isabelle is looking at factors such as whether the inbound traffic is a response to a previous request inside the network, whether it includes blocked domain names, ip addresses and protocols, and whether it conforms to known malicious patterns or is otherwise abnormal. what is she setting up the firewall to practice?

Answers

The firewall is set up to practice filtering in the computer system which prevents the unauthorized access into the company's network. Thus, the correct option is A.

What is Cybersecurity?

Cybersecurity or information technology security is the protection of the computer system and networks from the information disclosure and theft or damage to the system or network from public network.

Firewall acts as a filter between internal network and the public network. The firewall keeps out the dangerous traffic from network. Thus, isabelle will set up the firewall for filtering to check the inbound network traffic for various features.

Therefore, the correct option is A.

Learn more about Cybersecurity here:

https://brainly.com/question/27560386

#SPJ1

Your question is incomplete, most probably the complete question is:

Isabelle is the cybersecurity engineer for a medium-sized company. she is setting up a firewall for examining inbound network traffic for a variety of characteristics. while remote users working from home should be allowed access to network resources, malicious traffic should be blocked. to differentiate, isabelle is looking at factors such as whether the inbound traffic is a response to a previous request inside the network, whether it includes blocked domain names, ip addresses and protocols, and whether it conforms to known malicious patterns or is otherwise abnormal. what is she setting up the firewall to practice?

A. Filtering

B. Modeling

C. Access management

D. Active Hub

how packet switching could be used to download a large web page from a website

Answers

Packet switching is s process that transfers data by dividing it into small packets or blocks, which makes it more efficient to download a large web page from a website.

What is packet switching?

Packet switching is a method of sending data in which a message is divided into several pieces that are sent separately over the best route for each packet before being put back together at the destination.

Therefore, for more effective transfer using multiple network devices, packet switching divides data into blocks or packets before transmitting it across digital networks.

To learn more about packet switching, refer to the below link:

https://brainly.com/question/27054556

#SPJ1

what best describes the purpose of a class’s constructor

Answers

A constructor is often used to initialize the fields to their default values or in the case of a parameterized constructor, to the values passed in to the constructor.

Java constructors, also known as constructors in Java, are a term we use to construct things in our programs. A particular function used to initialize objects in Java is known as a constructor. When an object of a class is created, the constructor is invoked. The initial values of object properties can be set using it.

A constructor is a block of code equivalent to a method in Java. The memory is allocated for the object at the time the constructor is called. The object is initialized using a unique class of method. At least one constructor is invoked each time an object is created using the new() keyword. In Java, there are two different kinds of constructors: parameterized constructors and constructors without arguments. It constructs the values at the time the object is created, which is why it is called a constructor. A class's constructor does not have to be written.

Learn more about constructors here:

https://brainly.com/question/17347341

#SPJ4

where should an organization's web server be placed?

Answers

There should be a web server in the demilitarised zone (DMZ). A network with resources that are open to the public is called the DMZ. A firewall guards the DMZ, which is situated in between the private network and an untrusted network (like the internet).

A private network (LAN) called an intranet uses internet information services only for internal usage. A website's server shouldn't be located on the intranet because it should be accessible to the whole public.

A network that is privately run and separate from the intranet is called an extranet. Between a private LAN and the internet lies an extranet. Business associates, suppliers, and sometimes even clients from outside the corporation are given access to resources through an extranet. There should not be a web server there.

Learn more about DMZ :

https://brainly.com/question/21420867

#SPJ4

Which of the following became the standard PC in the Personal Computer Era? A) Wintel PC B) DOS PC C) MITS PC D) Altair E) Apple II

Answers

Wintel PC is the correct answer. This became the standard PC in the Personal Computer era.

The IBM PC was the most widely used personal computer in the world, and both its operating system, which was based on Microsoft Corporation's MS-DOS system, and its CPU, the Intel 8088, became industry standards. When Steve Jobs and Steve Wozniak created the Apple computer in 1976, the personal computer era officially began. The personal computer was transforming culture by the 1980s, and libraries jumped on board the change. How many computers can handle data, based on their capacity? Three different computer types—analogue, digital, and hybrid—are categorized based on how well they can handle data.

Learn more about computer here-

https://brainly.com/question/21080395

#SPJ4

I use a Dell Precision T3500 with 24 GB of ram and an Intel Xeon X5690 with 3.47 GHz, and I wanted to know, would an RTX 3050 from nvidia work just fine with this computer?

Answers

Answer:

yes it would

Explanation:

as long as it's fast enough you'll be fine.

What protocols is the one that is most likely to require irb review?

Answers

Research involving a human subject protocols is the one that is most likely to require irb review.

Introduces the ethical and governing concerns surrounding the use of human subjects in research. It gives an explanation of the informed consent procedure and the Common Rule, a set of rules that several U.S. federal agencies have embraced.

Certain categories of researchers must complete RCR training in order to work with the National Institutes of Health (NIH), National Science Foundation (NSF), and U.S. Department of Agriculture (USDA). Regardless of a researcher's funding source, RCR is increasingly seen as a crucial part of training.

The key RCR issues, such as authorship, collaborative research, conflicts of interest, human subjects, and research misconduct, are thoroughly reviewed in this course. The use of case studies and audiovisual examples to illustrate crucial ideas.

To know more about research click on the link:

https://brainly.com/question/18723483

#SPJ4

A study to test a newly created wheelchair by having senior citizens use it.

To know more about irb review :

https://brainly.com/question/28902906

#1234

Which of the following are examples of security threats?

Select all of the boxes that apply.

antivirus software

bugs

power surges

theft of hardware

Answers

Answer:

b,c.d

Explanation:

bc i got it wrong

Answer:

B, C, D

Explanation:

all 3 and got correct

Color theory is a type of code, like HTMI, that computers use to visually display colors. (3 points)
True
False

Answers

The answer to your problem would be true because htmi is color

I/O systems (networking, video, etc.) suffer the biggest performance hit in virtualized systems.

a. True
b. False

Answers

Option a is correct. It is true that I/O system (networking, video, etc.) suffer the biggest performance hit in virtualized systems.

An information processing system called I/O (Input/Output) is made to send and receive data from a network, device, or piece of computer hardware.

Over a network, data can be sent between devices. Computers couldn't communicate with other systems or devices without I/O.

In the domain of I/O, input devices and output devices are the two main categories of hardware.

Only data input into another device is possible with input devices. A mouse is an example of an input device because it can only transmit data to a computer; it cannot receive or replicate data from the computer. Only the output of data from one device is received by output devices.

To know more about I/O click on the link:

https://brainly.com/question/17226929

#SPJ4

vincent is performing a wireless environment analysis and wishes to identify factors that affect signal propagation. which factor is least likely to impact wireless signals?

Answers

Since Vincent is performing a wireless environment analysis and wishes to identify factors that affect signal propagation. the factor that is least likely to impact wireless signals is Time of day

How do wireless signals work?

Electromagnetic waves that are traveling through the atmosphere are wireless signals. These are created when electric energy passes through a metal object, such a wire or an antenna, and waves are created all around that object.

In summary, the manipulation of radio waves enables the wireless transport of data. These waves are produced by creating electrical pulses in a natural way. Then, in order to transmit sound or data, these radio waves might have their amplitude or frequency altered.

Learn more about wireless signals from

https://brainly.com/question/23091703
#SPJ1

Write a while loop that reads integers from input and calculates finalVal as follows:


If the input is divisible by 3, the program outputs "hit" and increases finalVal by 1.

If the input is not divisible by 3, the program outputs "miss" and doesn't update finalVal.

The loop iterates until a negative integer is read.


Ex: If the input is 6 9 4 -2, then the output is:


hit

hit

miss

Final value is 2


Note: x % 3 == 0 returns true if x is divisible by 3.


Code:


#include

using namespace std;


int main() {

int in;

int finalVal;


finalVal = 0;

cin >> in;


/* Your code goes here */


cout << "Final value is " << finalVal << endl;


return 0;

}

Answers

Using the knowledge of computational language in C++ it is possible to write a code that write a while loop that reads integers from input and calculates finalVal.

Writting the code:

#include <iostream>

using namespace std;

int main() {

   int numInput;

   int result;

   result=0;

   cin>>numInput;

   while(numInput>0){

       if(numInput%4==0)

           cout<<"miss\n";

       else{

           cout<<"hit\n";

           result+=1;

       }

       cin>>numInput;

   }

   cout<<"\nResult is "<<result<<endl;

   return 0;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

what is the name for the device that allows read-only access to all accessible data on a drive and keeps anything from being written to an original drive?

Answers

The name for the device that allows read-only access to all accessible data on a drive and keeps anything from being written to an original drive is write blocker

What is a Write blocker?

A writer blocker is any tool that provides read-only access to a data storage device without compromising data integrity. A writer blocker is any tool that provides read-only access to a data storage device without compromising data integrity. Proper use of write blockers ensures protection of the Data Chain of Custody. There are two main types of writer's blockers. The first type is hardware write blockers. These devices are typically placed between the evidence drive and the forensic workstation. The second type is software write blockers, sometimes built into computer forensics suites such as EnCase and FTK.Protecting the evidence drive from write operations during an investigation is also important to counter potential claims that the contents of the drive were modified during the investigation.

To learn more about data safety, refer

https://brainly.com/question/27034337

#SPJ4

a pre-designed spreadsheet that is a version of a common document type, like an invoice, is called a(n) .

Answers

A free excel template is a predesigned spreadsheet that has already been created with specified formulae. Free excel templates don't even require you to know how to create formulae because the spreadsheet already includes these features.

Explain about the Pre designed spreadsheet?

A spreadsheet is a piece of software that can store, display, and edit data that has been organized into rows and columns. One of the most used tools for personal computers is the spread sheet. A spreadsheet is typically used to record numerical data and brief text strings.

A predesigned Excel worksheet called a "template" can be used to create new worksheets with the same design, style, and calculations. Because they are already included in the spreadsheet, using templates eliminates the need to generate the fundamental components from scratch each time.

Template a pre-made document that is a variation of a typical document type, such as an invoice or a resume.

To learn more about Pre designed spreadsheet refer to:

https://brainly.com/question/25879801

#SPJ4

Explain how you can legally use a song without the songwriters permission

Answers

Original creators, like musicians, have copyright protection over their works, which means they have the sole right to perform or duplicate those compositions. If you violate their rights by using their music without permission (that is infringe on their rights), you may face legal consequences.

What is copyright infringement?

The use or creation of copyright-protected content without the authorization of the copyright holder is copyright infringement. Copyright infringement occurs when a third party violates the rights granted to the copyright holder, such as the exclusive use of a work for a specific period of time.

Copyright infringement is prohibited. Copyright infringement is frequently a civil rather than a criminal matter. Copyright infringement penalties often involve a fee and/or restitution to the harmed party.

Learn more about the right Infringement:
https://brainly.com/question/1078532
#SPJ1

true or false? the index of the coding manual contains two tables to help facilitate locating certain diagnostic codes

Answers

Yes, it is true that the index of the coding manual contains two tables to help facilitate locating certain diagnostic codes.

When determining whether to include a patient in a register, the diagnosis is frequently a crucial factor. Due in part to different obligations to precisely collect this data, the quality of diagnosis data is frequently adequate. In order to distinguish between active and inactive diagnoses, EHRs also feature problem lists; nevertheless, the validity of the data contained therein may require further investigation.

It can be difficult to convert diagnosis information from one coding system to another, and even more so to convert diagnosist codes from one coding system's version to another (e.g., mapping ICD-9 to ICD-10). In addition, a number of federal and state laws23 may restrict the ability to extract specific diagnostic codes for use in external registries, such as HIV status and diagnoses of mental illnesses.

TO know more about diagnosist codes click on the link:

https://brainly.com/question/14592968

#SPJ4

Select all the correct answers. Which two of these should a website’s privacy policy created under California Online Privacy Protection Act describe? third parties that may view the information name and designation of the author of the policy effective date and expiration date of the policy links to third-party policies, if any approvals necessary to bypass the policy

Answers

The two ways that describe a website's privacy policy created under California Online Privacy Protection Act are:

third parties that may view the informationeffective date and expiration date of the policy.

What is the California Online Privacy Protection Act?

It is a legislation that secures the new privacy rights for California consumers including the right to know about the personal information a business collects about them, the right to know how it is used and shared, the right to delete personal information collected from them etc.

This law applies to any person or company in the United States whose website collects personally identifiable information from California consumers.

Read more about Privacy Protection Act

brainly.com/question/28289286

#SPJ1

WILL GIVE BRAINLIEST! Will an Intel Xeon X5690 CPU with 3.47 GHz support a Geforce RTX 3050 graphics card?

Answers

This question is one of compatibility. It is to be noted that a Geforce RTX 3050 graphics card will be supported by an Intel Xeon X5690 CPU with 3.47 GHz because the base clock for Geforce RTX is 1.55 / 1.51 which is lower than that of Intel Xenon.

What is a Graphics Card?

A graphics card is an extension card that creates an image feed for a display device such as a computer monitor. To distinguish them from integrated graphics, graphics cards are frequently referred to as standalone or dedicated graphics cards.

To find out what graphics card you have, open your PC's Start menu or desktop search bar, start typing Device Manager, and then choose it when it appears. Display adapters will be listed toward the top. When you click the drop-down arrow, the name and model of your GPU will show just below.

Compatibility between devices simply means that two devices either of the same parent company of not can either work together or not. If they can work together, then they are compatible.

If they can't work together, then they are incompatible.

Learn more about Graphics Card:
https://brainly.com/question/13498709
#SPJ1

small solid-state storage devices widely used within cell phones, laptops, and gps navigation systems are called

Answers

Memory cards are small solid-state storage devices widely used within cell phones, laptops, etc

The small solid-state storage devices widely used within cell phones, laptops, and GPS navigation systems are called a memory card.

What is solid-state storage?

An SSD, or solid-state drive, is a type of computer storage device. On solid-state flash memory, this non-volatile storage medium stores persistent data.

SSDs are hard disk drives (HDDs) that replace traditional hard disk drives (HDDs) in computers and perform the same basic functions as a hard drive.

The term "solid-state" refers to the path that electrical signals take through solid pieces of semi-conductor material.

Prior to the use of solid-state devices like the common transistor, electricity was passed through the various elements inside a heated vacuum tube.

Thus, memory cards are small solid-state storage devices that are widely used in cell phones, laptops, and GPS navigation systems.

For more details regarding SSDs, visit:

https://brainly.com/question/10395261

#SPJ2

suppose that you have a four-byte integer x that contains two sixteen-bit values, one in the high sixteen bits and one in the low sixteen bits. you want to store the value of the integer in the high sixteen bits to a second variable y. what types of operations must you use to accomplish this?

Answers

Answer:idrk whats the assement name

Explanation:

What should you insert if you want to print one page of a document in landscape orientation while the rest of the document prints in portrait?.

Answers

There are two orientations in a document in Microsoft office which include landscape and portrait. These orientations can be changed form the Page Layout option.

What are orientations?

There are two common types of orientation in a document which are portrait and landscape. Portrait denotes a format of printed matter which is higher than the width. Landscape denotes a format of printed matter which is wider than the height. So, the printing orientation that is wider than the length is landscape.

To change the orientation: Select the pages or paragraphs whose orientation you wish to change. Then, Click PAGE LAYOUT > Page Setup dialog box. In the Page Setup box, under Orientation, click on the Portrait or Landscape mode. Then, Click to the Apply to box button, and click Selected text.

Learn more about Orientation here:

https://brainly.com/question/14691941

#SPJ1

Installing a device driver can sometimes cause system instability.

a. true
b. False

Answers

Answer:

the answer of your question is a. true

Installing a device driver can sometimes cause system instability, is the true statement.

What is meant by Installing a device?

Through installation, hardware and/or software are made operational. installing a heating system or software on a computer involves situating or attaching something for use or service.  to establish oneself in a new place; to move into a new workplace, location, or employment. to formally welcome someone into a job or position of authority.

The locks on every door have been replaced. We debated installing a new phone system. When a computer is purchased, the software is already pre-installed on it. The software is easy to install on your hard drive.

An installation is a place where tools and machines are kept that are used for a particular job. The building was changed into a clandestine military installation.

Thus, it is a true statement.

For more information about Installing a device, click here:

https://brainly.com/question/28045764

#SPJ12

While social security benefits millions of americans, the system is not perfect. In what ways is inequality built into the social security system?.

Answers

Growing economic disparity directly jeopardizes the financial stability of Social Security. The total wages of low- and middle-income workers are strongly correlated with Social Security's funding due to the payroll tax cap, but not the full wages of higher-earning workers.

What is the Social Security system?

The phrase "Social Security" is frequently used in the United States to refer to the Old Age, Survivors, and Disability Insurance program, which is run by the Social Security Administration (SSA). The Social Security Act was first passed in 1935, and its present, revised form now includes a number of social welfare and insurance programs.

To get more information about Social Security :

https://brainly.com/question/23913541

#SPJ1

What term is used to describe the method that allows coplink to access many different databases of law enforcement agencies with varying data fields?.

Answers

The term is used to describe the method that allows copylink to access many different databases of law enforcement agencies with varying data fields is option c:  multi dimensional approach .

Why is a multidimensional approach important?

The multidimensional method enables us to assess a company's complex social behavior (for example, a company may only be socially responsible in the environmental dimension) as well as the perspectives of various stakeholders (i.e. shareholders that are made for the economic dimension as well as employees for the social dimension).

Illeris (2002, 2002) took into consideration the cognitive, emotional, and social elements of learning; this method is multidimensional. The Three Dimensions of Learning: Cognitive, Emotional, and Social.

Therefore, Development is multidimensional, which means that aspects like physical, emotional, and psychosocial development interact dynamically. Gains and losses occur as a result of development in many different directions throughout life. Characteristics can be changed since development is changeable.

Learn more about multi dimensional approach from

https://brainly.com/question/13791083
#SPJ1

See full question below

What term is used to describe the method that allows COPLINK to access many different databases of law enforcement agencies with varying data fields? Multi-dimensional Approach Clustering Approach Data Cube Approach Federated Approach

While reviewing an audit log, a financial institution employee notices that several attempts were made by a user to bypass the authentication process. The user attempted to log in ten times in twenty minutes using various methods, though the user never gained visible access. Which of the following describes what the employee should do next?

a. Nothing, the user did not gain access.
b. Clear the audit log, in case of error.
c. Continue to monitor the log until the user authenticates.
d. X Escalate the information to a security manager.

Answers

In GDPR and other privacy laws, the data controller bears the most responsibility for protecting the privacy and rights of the data subject, such as a website user.

Simply put, the data controller is in charge of the procedures and purposes for which data is used. Depending on the type of data involved, the consequences can include database destruction or corruption, the leak of confidential information, intellectual property theft, and regulatory obligations to notify and possibly compensate those affected. For good data management, four major pillars must be considered: strategy and governance, standards, integration, and quality. Most importantly, an organization must embrace data as a corporate asset in order to be data-driven.

Learn more about data here-

https://brainly.com/question/10980404

#SPJ4

which one of the following is a correct declaration for a function named passvect with the vector parameter mynum of size 10, so that the function modifies the contents of the actual parameter mynum?

Answers

The contents of the actual parameter mynum
1)  c)  void passvect(vector& mynum);
2)  d) can be passed either way, but it is best to pass by reference.
3)  d) 10
4)  a) 0

What is parameter?
A parameter, also known as a formal argument in computer programming, is a particular type of variable that is used in a routine to refer to a specific bits of data that are supplied as input to the procedure. These bits of information represent the values of the arguments (also known as real arguments or actual parameters) that will be used to call or invoke the function. A subroutine is typically defined with an ordered list with parameters so that each time the routine is called, its arguments are evaluated for that call and the results can be assigned to the associated parameters. In contrast to how the term "argument" is typically used in mathematics, "argument" in computer science refers to the actual input expression that is passed or supplied to a function, procedure, or routine in the call statement, whereas "parameter" refers to the variable inside the subroutine's implementation.

To learn more about parameter
https://brainly.com/question/15170808
#SPJ4

Other Questions
Jimmy is buying balloons and party hats for his little sisters birthday party. The party store charges $1.50 for each bag of balloons and $6.00 for each package of hats. Which of the following equations could be used to determine different combinations of b bags of balloons and h packages of party hats that he could buy for a total of $24 A.) b+h=24 B.) (1.50+6.00)(b+h)=24 C.) 1.50b+6.00h=24 D.) 6.00b+1.50h=24Please provide how you did it so I can understand How can transport affect a business for local factors? Which idea led to the creation of the interstate commerce commission, the federal trade commission, and the food and drug administration?. simbiri 2009 access impediments to health care and social services between anglophone and francophone african immigrants living in philadelphia with respect to hiv/aids What are some important tools they used in Mesopotamian? What is inverse of square root? How could the inverse be used to solve an equation that included a square root? 4 x 107 is?times as much as 4 x 10. 1. Multiple Choice: What is the author's point of view aboutadvertising?AIt damages people's lives.BIt is difficult to influence people to buy something.CIt influences people to act a certain way over time.DIt should be more obvious about the way itimpacts people. Which of the following apply to completing records? Select all that apply? Solve for u.(u-1)=2u+8u+25 Hello can someone help me with this please A motorcyclist drives 10 miles in the first hour and in each hour after that, drives 6 miles more than the previous hour. in what hour of driving will the motorcyclist cross the 400-mile mark? \ 1.8(b-5.3)-4.2=5.8(b-2.3) help me please If a new McDonalds opens up in town, then the supply curve for cheeseburgers will shift toto the leftto the rightupwarddownward a 800 kg car pushes a 2100 kg truck that has a dead battery. when the driver steps on the accelerator, the drive wheels of the car push against the ground with a force of 4700 n . rolling friction can be neglected. you may want to review (page) . part a part complete what is the magnitude of the force of the car on the truck? what is the most appropriate process for research collaborators to use in determining which journal they should submit their work to? Briefly explain how ONE historical event or development in the period 1830 to 1860 that is not explicitly mentioned in the excerpts could be used to support Wilentzs interpretation. what would most liekly occur when an agecy as served an account for a long time and all the fresh ideas have been worked and reworked Using the Mole: Empirical Formulas, Molecular Formulas, % Composition 2. Find the empirical formulas for the following compounds: a. e. 46.2% Mg, 7.69% H, 46.2% O find the slope x intercept and y intercept of the standard form equation below 7x + 3y equals 42