Answer:
A. The act or process of reaching a conclusion about something from known facts
Hope this helps you!
Please Mark me Brainlest!!
Answer: c. a device or program that allows a user to communicate with a computer
Explanation:
how do I fix when it hits the second session it skips scanf.
#include <stdio.h>
#include <unistd.h>
#include <ctype.h>
main() {
double first, second;
while(1){
printf(" Calculator\n");
printf("\n 7 8 9 / \n 4 5 6 x \n 1 2 3 - \nEnter operator: ");
char op;
scanf("%c" ,&op); //entering operators such as + - \ *
printf("Enter two operands:");
scanf("%lf %lf", &first, &second); //entering operands such as 1 2 5 8 12 414
switch (op) { // printing the math
case '+'://if its +
printf("%.1lf + %.1lf = %lf\n\n", first, second, first + second);
break;
case '-'://if its -
printf("%.1lf - %.1lf = %lf\n\n", first, second, first - second);
break;
case '*'://if its *
printf("%.1lf * %.1lf = %lf\n\n", first, second, first * second);
break;
case '/'://if its :
printf("%.1lf / %.1lf = %lf\n\n", first, second, first / second);
break;
default://if its not + - / *
printf("error!");
}
}
}
Answer:
scanf(" %c" ,&op); //entering operators such as + - \ *
Explanation:
put space before %c
2. What are some other reasons why you might need to know the operating system version on your computer or mobile device
To see if an app/software is compatible, to be aware of the flaws and be informed of system updates that are available are the some reasons to know the operating system version on computer or mobile device.
What is operating system?An operating system is a software program that manages and operates computing device computers, laptops, smart watches, mobile phones.
It is the operating system that makes it unnecessary to know a coding language in order to interact with computers.
Thus, to check compatible, aware of flaws and it keep the updated about the software.
For further details about operating system, click here:
https://brainly.com/question/1763761
#SPJ4
python
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x // 2
Note: The above algorithm outputs the 0's and 1's in reverse order. You will need to write a second function to reverse the string.
Ex: If the input is:
6
the output is:
110
The program must define and call the following two functions. Define a function named int_to_reverse_binary() that takes an integer as a parameter and returns a string of 1's and 0's representing the integer in binary (in reverse). Define a function named string_reverse() that takes an input string as a parameter and returns a string representing the input string in reverse.
def int_to_reverse_binary(integer_value)
def string_reverse(input_string)
main.py
# Define your function here.
if __name__ == '__main__':
# Type your code here. Your code must call the function.
The program illustrates the use of loops .
Loops are used for operations that must be repeated until a certain condition is met.
How to write the program?The program written in Python, where comments are used to explain each action is as follows:
#This defines the int_to_reverse_binary function
def int_to_reverse_binary(integer_value):
#This initializes the string output
strNum = ""
#The following loop calculates the string output
while (integer_value > 0):
strNum += str(integer_value % 2)
integer_value //= 2
#This passes the string output to the string_reverse function
string_reverse(strNum)
#This defines the string_reverse function
def string_reverse(input_string):
#This reverses the string
strRev = input_string[::-1]
#This prints the reversed string
print("Binary number:",strRev)
# The main begins here
if __name__ == '__main__':
#This gets the decimal value
dec_val = int(input("Decimal value: "))
#This calls the int_to_reverse_binary function
int_to_reverse_binary(dec_val)
Read more about Python programs at:
https://brainly.com/question/24833629
How do you define a physics material?
A. As an object in the Hierarchy panel
B. All of these will work
C. As a component on a sprite
D. As an Asset that can be linked to a collider on an object
Answer:
as an object in the hierachy panel
Which device is used to direct the flow of data on a computer network?
Answer:
If you like my answer you can mark it as Brainliest.
Explanation:
A router is a networking device that forwards data packets between computer networks. Routers perform the traffic directing functions on the Internet.
What does Amara hope will
happen when Dad sits on the sofa?
Amara hope her Dad will be comfortable using the sofa. Check more about sofa below.
What does sofa implies?A sofa is known to be a type of long seat that is often made with arms and it also has a back rest. One can convert the sofa to a bed.
Conclusively, when Amara got the sofa for her dad, she hope that her dad will be comfortable using the sofa.
Learn more about sofa from
https://brainly.com/question/14791147
______________ refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts while the ______________ refers to an inventory management technique where an incoming train unloads materials directly into outbound trucks.
Safety stock inventory management refers to the practice of ordering extra inventory beyond expected demand to prevent stockouts.
What is Safety stock inventory?Safety stock inventory management is known to be a kind of more or extra inventory that is said to have been ordered way above the expected demand.
Note that this technique is often used to stop or hinder any form of stockouts that is said to have been caused by incorrect forecasting or unforeseen events in customer demand.
Learn more about Safety stock inventory form
https://brainly.com/question/26954616
Which discipline focuses on the design of computer hardware?
information technology
computer engineering
information systems
computer science
Answer:
Computer Engineering
Explanation:
People that work in the computer engineering field usually create hardware such as the CPU, PSU, RAM, GPU, SSD & a few more.
40 points for this question
Digital citizenship focuses on _____. Select 3 options.
enforcing your rights on others
helping and leading others
targeting potential cybercriminals
creating positive online experiences
promoting the common good
Answer:
I think the answers are
the second one the third one the fourth onehope it helps!
Digital citizenship focuses on the following:
B. helping and leading others
C. targeting potential cyber criminals.
D. creating positive online experiences
What is digital citizenship?Digital citizenship is the ability of a person to learn and engage in digital relationships and learn how to use the system and parts of the digital system, like to use a keyboard, mouse, etc.
It also refers to the development of the skills related to digital communication, relationships, and how to practice dignity and respectful behavior on digital platforms.
The main focus of digital citizenship is helping other people to learn and grasp and be aware of cyber crimes and bullying and creating a positive environment.
Thus, the correct options are B. helping and leading others
C. targeting potential cyber criminals.
D. creating positive online experiences
To learn more about digital citizenship, refer to the link:
https://brainly.com/question/11542933
#SPJ5
What is a search engine
Answer:
A search engine is a software program that helps people find the information they are looking for online using keywords or phrases.
Explanation:
Search engines are able to return results quickly—even with millions of websites online—by scanning the Internet continuously and indexing every page they find.
Choosing what data to store and where and how to store the data are two key challenges associated with big data. true or false
Answer:True
Explanation:
Provide a written response that: describes in general what the identified procedure does and how it contributes to the overall functionality of the program write your response here explains in detailed steps how the algorithm implemented in the identified procedure works. Your explanation must be detailed enough for someone else to recreate it. Write your response here provide a written response that: describes two calls to the selected function. Each call must pass different arguments that cause a different segment of code in the algorithm to execute
These exercises are about a descriptive essay or a descriptive text. The purpose of a descriptive text is to:
Inform; and guide the reader's precision.What is a Descriptive Text?As with every essay or text, your document must have the following:
An introduction (where you state the purpose of the text)The body (where the major description takes place)The conclusion (where you summarize and highlight cautionary instructions).Usually, it helps to itemize, label, and number instructions.
Examples of Descriptive Texts are:
Standard Operating ManualsCar Manuals.Learn more about Descriptive Texts at:
https://brainly.com/question/3530147
These activities are about writing a descriptive essay or text. A descriptive text's objective is to, Instruct and direct the precision of the reader.
What is the Definition of Descriptive Text?The document, like any other essay or literature, must include the following:
a brief overview (where you state the purpose of the text)The body (where the major description takes place)The final word (where you summarize and highlight cautionary instructions).It is often beneficial to itemize, label, and number instructions. Descriptive texts include the following:
Car Manuals and Standard Operating Procedures
Visit to learn more about Descriptive Texts:
brainly.com/question/3530147
#SPJ4
Which type of attack can be addressed using a switched ethernet gateway and software on every host on your network that makes sure their nics is not running in promiscuous mode
Answer:
Network Sniffing
Explanation:
Network sniffing is basically know to be the act of tapping into network traffics and modifying unsafe requests for both good and bad purposes.Network sniffing is also known as Packet Sniffing which means as its name implies; sniffing chunks of packets on a network. This kind of attack mostly arise when a user exposes their device to unsecured Wi-Fi networks.So using ethernet with softwares (Network monitoring softwares) I think would paly an important role in curbing such attacks.
Packet Sniffing is the type of attack can be addressed using a switched Ethernet gateway and software on every host on network that makes sure their nics is not running in promiscuous mode.
How is packet sniffing done?Packet sniffing is done with packet sniffer software. It can be filtered or it can be unfiltered. When just specified data packets must be captured, Filtered is used; when all packets must be captured, Unfiltered is used.
Packet sniffing tools such as WireShark and SmartSniff are examples.
Thus, Packet Sniffing can be addressed using a switched Ethernet gateway.
For further details about Packet Sniffing click here:
https://brainly.com/question/14417640
#SPJ4
PLEASE HELP! The variable initials is to be assigned a string consisting of the first letter of the string firstName followed by the first letter of the string lastName. Which of the following assigns the correct string to initials ?
Answer:
a
Explanation:
Prefix function will grab length character(s) from a string while concat function will join 2 strings into 1.
For initials, use prefix on firstName and lastName to grab the first character. Then join the two together using concat to give the initials:
So the answer is a.
The correct choice to the given function is "initials <--- concat (prefix (FirstName, 1), prefix (lastName, 1))", and its explanation as follows:
Prefix function:To assign the correct string, we must examine the "cancat ()" and "prefix ()" methods in this problem.
The string consists of the first letter of the string "firstName" followed by the first letter of the string "lastName", is to be set to the variable initials.
Please find the attached file for the complete solution.
Find out more bout the prefix function here:
brainly.com/question/14912735
What happens when an auditory system and computing system are connected by abstraction?
A. They convert sound signals Into data that can be used to tell a device how to function.
B. They allow blological abstractions and computing systems to filter data.
C. They analyze data from both systems so only doctors can uno medical devices. D. They separate Input and output data from one another.
Answer:
It's A. They convert sound signals Into data that can be used to tell a device how to function.
Explanation:
5. 16 LAB: Brute force equation solver
Numerous engineering and scientific applications require finding solutions to a set of equations. Ex: 8x + 7y = 38 and 3x - 5y = -1 have a solution x = 3, y = 2. Given integer coefficients of two linear equations with variables x and y, use brute force to find an integer solution for x and y in the range -10 to 10.
How do I write this in python?
Use the knowledge of computational language in python to write a code that force to find an integer solution for x and y .
How to find the solution of an equation in python?To make it simpler the code is described as:
def brute_force_two_equations(first_values, second_values,
max_range=10, min_range=-10):
for x in range(-10, 10, 1):
for y in range(-10, 10, 1):
if a * x + b * y == c and d * x + e * y == f:
print(x, y)
else:
print('No solution')
def equation(const1, const2, x, y):
return const1 * x + const2 * y
def get_three_integers():
inputs = []
for i in range(0, 3):
inputs.append(int(input("Please enter a value: ")))
return inputs
if __name__ == "__main__":
print("== First Equation ==")
first_equation_values = get_three_integers()
print("== Second Equation ==")
second_equation_values = get_three_integers()
solution = brute_force_two_equations(first_equation_values,
second_equation_values)
if solution:
print(f"(x, y) {solution}")
else:
print("No Solution found")
See more about python atbrainly.com/question/22841107
When much of her work was automated with a new computerized system, louisa became unsure of her ability to do her job. Nisa, her boss, has been mentoring her to improve her.
Answer:
self-efficacy
Explanation:
Nisa, her boss, has been mentoring her to improve her self-efficacy.
What is Computerized system?DNA polymerases create a complementary DNA strand to the initial template strand during DNA replication, which is the process at its most fundamental level.
To produce a replication fork with two single-stranded templates, DNA helicases unwind double-stranded DNA before polymerases do. By using replication techniques, a single DNA double helix can be transformed into two DNA helices, which are subsequently split into daughter cells during mitosis.
The main enzymatic processes that take place at the replication fork are well conserved between prokaryotes and eukaryotes.
Therefore, Nisa, her boss, has been mentoring her to improve her self-efficacy.
To learn more about Self efficacy, refer to the link:
https://brainly.com/question/28215515
#SPJ6
What's better, adventure time or regular show?
Totally Regular Show!!!
Which of the following is an example of effective nonverbal communication?
O presenting information about the status of a project in a team meeting
O an e-mail congratulating a team for attaining their goal
O eye contact and a smile
Opointing, frowning, and turning away
Answer:
Eye contact and a smile
Explanation:
There are only two nonverbal communication options in the list you gave:
eye contact and a smilepointing, frowning, and turning awayPointing, frowning, and turning away would not be effective nonverbal communication because it seems uninviting and disrespectful. Eye contact and a smile is effective nonverbal communication because it shows that you're respectful, paying attention, and understanding.
Shelly uses Fac3book to interact with friends and family online. When is she most likely to express a positive mood on social media?
a.
Sundays
b.
Wednesdays
c.
Fridays
d.
Thursdays
Answer:
Fridays
Explanation:
On record, Fridays are preffered
The correct option is c. Fridays.
What is Social media?Social media refers to the means of relations among people in which they create, share, and/or interact with information and ideas in virtual societies and networks. In today's civilization, the use of social media has evolved into a necessary daily exercise. Social media is commonly used for social relations and credentials to news and information, and determination making. It is a valuable contact tool with others locally and worldwide, as well as to communicate, create, and spread announcements.To learn more about Social media, refer to:
https://brainly.com/question/1163631
#SPJ2
45 POINTS
PLS HURRY
An issue with the automated collection of personal information is _____. Select 2 options.
it does not yet collect data efficiently
it does not yet collect data efficiently
it processes highly sensitive data
it processes highly sensitive data
that people do not trust it enough
that people do not trust it enough
it may lead to inaccurate decisions
it may lead to inaccurate decisions
it uses robust security solutions
it uses robust security solutions
Answer:
2 - It processes highly sensetive data
4- it may lead to inaccurate decisions
Explanation:
It processes highly sensitive data and it may lead to inaccurate decisions.
What is automated collection?The process of automatically collecting and aggregating data or information using computer systems, software, and algorithms without manual intervention is referred to as automated collection.
There are two options:
It handles highly sensitive information.It may result in poor decisions.Automated personal information collection can process highly sensitive data such as medical records, financial information, or legal documents, which can jeopardise privacy and security if not properly safeguarded.
Furthermore, if the algorithms and models used to analyse the data are biassed or flawed, automated collection may result in incorrect decisions.
Thus, this can have serious ramifications, such as discriminatory outcomes or incorrect medical diagnoses.
For more details regarding automated collection, visit:
https://brainly.com/question/14680064
#SPJ3
Pls help xD. In pseudocode or python code please. Will mark best answer brainliest. Thx
Answer:
I'm doing my best to send you my answer,
Explanation:
The coding will be below
I have a question, but it's not a math question. Can anyone give me 5 unblockers for school computers? If you answer this, you will get a hefty point reward. Thanks :)
Answer:
I mean if your talking about games then just try Cool math I will give link in comments
Explanation:
Answer:
I have 4.
Explanation:
DOWNLOAD AVAST SECURELINE VPN. Get it for Android, iOS, Mac.
DOWNLOAD AVAST SECURELINE VPN. Get it for iOS, Android, PC.
INSTALL AVAST SECURELINE VPN. Get it for PC, Mac, iOS.
INSTALL AVAST SECURELINE VPN. Get it for Mac, PC, Android.
Have a great day!
#EquestrianLion
Encoding in the information processing theory is the process of _____
Encoding in the information processing theory is the process of inputting of information into the memory system.
What is encoding?Encoding is an act or a system method that is used in the inputting of information into the computer memory system.
It entails the storage in the retention of encoded information. After encoding is the Retrieval method that is the act of getting the information out of memory.
Learn more about encoding from
https://brainly.com/question/3926211
In information processing theory, encoding is the process of inserting data into a memory system.
What exactly is encoding?Encoding is an act or a systematic method for entering data into a computer memory system.
It involves the storage and retention of encoded data. The Retrieval procedure follows encoding and is the act of retrieving information from memory. The process of converting thoughts into communication is known as encoding in information processing theory.
Learn more about encoding from this website.
brainly.com/question/3926211
#SPJ4
You took a picture of the beach, and there's a seagull sitting in the sand that you want to remove. What do you use to draw and AUTOMATICALLY remove the seagull, replacing it with more sand?
Answer: You can use a special type of editor to remove anything you want, and have that place filled in so its not blank space.
BUT: I am not sure of a specific one.
Answer the questions given below, share your ideas.Use the space for your answer.
Pa answer pi.:^)
Answer:
I would get rid of the machine and well
what are computer networks
Answer:
A computer network is a set of computers sharing resources located on or provided by network nodes. A computer network is a system that connects numerous independent computers in order to share information (data) and resources.
Explanation:
:)
how do I upending friend request? 100 POINTS!!!!
Answer:
If you want to send a friend request, click on their picture. Then scroll down slightly. There should be 3 buttons. The first one says Thank you. The next one is human with a +. Click the 2nd button. That is how to send a friend request.
Explanation:
Have a great day!
#EquestriansLion
Write a sub program to find the factors of a supplied number
Answer:
There are two options I can think of for you,
(Qbasic Code)
To Find the Factors of Given Number:
CLS
INPUT "Enter any number"; n
FOR i = 1 TO n
x = n MOD i
IF x = 0 THEN
PRINT i;
END IF
NEXT i
END
To Find the Factors of Given Number Using COMMON SHARED:
DECLARE SUB factor ()
COMMON SHARED n
CLS
CALL factor
END
SUB factor
INPUT "Enter any number"; n
FOR i = 1 TO n
x = n MOD i
IF x = 0 THEN
PRINT i;
END IF
NEXT i
END SUB
One of the great advantages of ____ references is that you can quickly generate row and column totals without having to worry about revising the formulas as you copy them to new locations.
Answer:
relative
Explanation: