mention two strategies of collecting data​

Answers

Answer 1
Types of quantitative and qualitative data collection methods include surveys and questionnaires, focus groups, interviews, and observations and progress tracking.

Related Questions

Which of the following terms describes an attacker walking or driving through business areas and neighborhoods to identify unprotected wireless networks from the street using a laptop or a handheld computer?
A. Wi-Fi stealing.
B. Wi-Fi trolling.
C. Wi-Fi jacking.
D. Wi-Fi hacking.

Answers

Answer:

C. Wi-Fi jacking

Explanation:

Answer: yessir b

Explanation:

Which statement describes data-sharing in a blockchain?

Answers

Answer:

wheres the statement

Explanation:

Choose all that Apply: Which of the following steps should be performed by the CIS for creating a part dispatch for systemboard through Tech Direct?
a) Enter the customer's contact and email address into the primary contact fields when requesting a systemboard through TechDirect
b) Logging fusion ticket to request DPK via DDL
c) Access the customer's DDL account to retrieve DPK and activate the os for the customer
d) Verify the customer email address

Answers

Answer:

The steps that should be performed by the CIS for creating a part dispatch for system board through TechDirect are:

a) Enter the customer's contact and email address into the primary contact fields when requesting a system board through TechDirect

b) Logging fusion ticket to request DPK via DDL

c) Access the customer's DDL account to retrieve DPK and activate the os for the customer

d) Verify the customer email address

Explanation:

The four steps given above must be performed in the CIS if you want to create a part dispatch for the system board through TechDirect.  TechDirect is a support system that enables one to manage all Dell technologies from a single location. After creating the part dispatch, the customer's contact and email address are entered into the primary contact fields to enable the verification of the customer's email address  through the TechDirect.

uuhdcnkhbbbbhbnbbbbnnnnnnnnnfddjkjfs

Answers

Answer:

The answer is "Option c"

Explanation:

In PHP to remove all the session variables, we use the session_destroy() function. It doesn't take any argument is required and then all sessions variables could be destroyed by a single call. If a particular clinical variable is now to be destroyed, the unset() function can be applied to unset a session variable. Its session doesn't unset or unset the session cookie by either of the local variables associated with it.

In the forward chaining technique, used by the inference engine component of an expert system, the _____ condition is evaluated first.

Answers

Answer:

"if" is the right response.

Explanation:

Forward chaining is being utilized just to split the logical sequential order down as well as operate throughout every component once the preceding one is accomplished, from start to finish.Its whole algorithm begins with proven information that activates all the rules, which are fulfilled as well as makes established realities even more complete.

You've arrived on site to a WAN installation where you will be performing maintenance operations. You have been told the WAN protocol in use allows multiple Layer 3 protocols and uses routers that use labels in the frame headers to make routing decisions. What WAN technology is in use

Answers

Answer:

The answer is "MPLS".

Explanation:

The MPLS stands for Multiprotocol Label Switching. This packet switching method facilitates the generation of easier personal backbones using a less physical channel, which sends information from one source to its destination with labels rather than IP addresses. Many of these WAN services are sold through huge companies. It is also a technology for data transfer that boosts speed and regulates network traffic flow. The information is directed with this technology via a label rather than needing complicated surveys at every stop in a route cache.

What does 32mb SVGA do

Answers

Answer:

hope it helps PLZ MARK ME BRAINLIEST,,!

Explanation:

They stabilize your grpahic image.

A cashier distributes change using the maximum number of five-dollar bills, followed by one-dollar bills. Write a single statement that assigns num_ones with the number of distributed one-dollar bills given amount_to_change. Hint: Use %.
Sample output with input: 19
Change for $ 19
3 five dollar bill(s) and 4 one dollar bill(s)
1 amount_to_change = int(input())
2
3 num_fives amount_to_change // 5
4
5 Your solution goes here
6 I
7 print('Change for $, amount_to_change)
8 print(num_fives, 'five dollar bill(s) and', num_ones, 'one dollar bill (s)')

Answers

Answer:

Explanation:

The code that was provided in the question contained a couple of bugs. These bugs were fixed and the new code can be seen below as well as with the solution for the number of one-dollar bills included. The program was tested and the output can be seen in the attached image below highlighted in red.

amount_to_change = int(input())

num_fives = amount_to_change // 5

#Your solution goes here

num_ones = amount_to_change % 5

print('Change for $' + str(amount_to_change))

print(num_fives, 'five dollar bill(s) and', num_ones, 'one dollar bill (s)')

Trace the evaluation of the following expressions, and give their resulting values. Make sure to give a value of the appropriate type (such as including a .0 at the end of a double or quotes around a String).
4 + 1 + 9 + "." + (-3 + 10) + 11 / 3
8 + 6 * -2 + 4 + "0" + (2 + 5)
1 + 1 + "8 - 2" + (8 - 2) + 1 + 1
5 + 2 + "(1 + 1)" + 4 + 2 * 3
"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)

Answers

Answer:

[tex](a)\ 14"."43[/tex]

[tex](b)\ 0"0"7[/tex]

[tex](c)\ 2"8 - 2"611[/tex]

[tex](d)\ 7"(1 + 1)"46[/tex]

[tex](e)\ "1"23"4"30"7"17[/tex]

Explanation:

Required

Evaluate each expression

The simple rules to follow are:

(1) All expressions in bracket will be evaluated based on its data type

(2) Divisions will return only integer values

(3) Integers immediately after string values will be concatenated (not added)

So, the results are as follows:

[tex](a)\ 4 + 1 + 9 + "." + (-3 + 10) + 11 / 3[/tex]

Evaluate till a string is encountered

[tex]4 + 1 + 9 = 14[/tex]

Followed by "."

Then:

[tex](-3 + 10) = 7[/tex]

[tex]11/ 3 = 3[/tex]

[tex]"." + (-3 + 10) + 11/3 = "."73[/tex] -- because expressions after string operations are concatenated.

So, we have:

[tex]4 + 1 + 9 + "." + (-3 + 10) + 11 / 3 = 14"."43[/tex]

[tex](b)\ 8 + 6 * -2 + 4 + "0" + (2 + 5)[/tex]

Evaluate till a string is encountered

[tex]8 + 6 * -2 + 4 =0[/tex]

[tex]"0" + (2 + 5) ="0"7[/tex]

So, we have:

[tex]8 + 6 * -2 + 4 + "0" + (2 + 5) = 0"0"7[/tex]

[tex](c)\ 1 + 1 + "8 - 2" + (8 - 2) + 1 + 1[/tex]

Evaluate till a string is encountered

[tex]1 + 1 = 2[/tex]

[tex]"8 - 2" + (8 - 2) + 1 + 1 = "8 - 2"611[/tex]

So, we have:

[tex]1 + 1 + "8 - 2" + (8 - 2) + 1 + 1 = 2"8 - 2"611[/tex]

[tex](d)\ 5 + 2 + "(1 + 1)" + 4 + 2 * 3[/tex]

Evaluate till a string is encountered

[tex]5 + 2 =7[/tex]

[tex]"(1 + 1)" + 4 + 2 * 3 = "(1 + 1)"46[/tex] --- multiply 2 and 3, then concatenate

So, we have:

[tex]5 + 2 + "(1 + 1)" + 4 + 2 * 3= 7"(1 + 1)"46[/tex]

[tex](e)\ "1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9)[/tex]

Since a string starts the expression, the whole expression will be concatenated except the multiplication and the expressions in bracket.

So, we have:

[tex]"1" + 2 + 3 + "4" + 5 * 6 + "7" + (8 + 9) = "1"23"4"30"7"17[/tex]

In the file BankAccount.java, build a class called BankAccount that manages checking and savings accounts. The class has three private member fields: a customer name (String), the customer's savings account balance (double), and the customer's checking account balance (double).
Implement the following Constructor and instance methods as listed below:
public BankAccount(String newName, double amt1, double amt2) - set the customer name to parameter newName, set the checking account balance to parameter amt1 and set the savings account balance to parameter amt2. (amt stands for amount)
public void setName(String newName) - set the customer name
public String getName() - return the customer name
public void setChecking(double amt) - set the checking account balance to parameter amt
public double getChecking() - return the checking account balance
public void setSavings(double amt) - set the savings account balance to parameter amt
public double getSavings() - return the savings account balance
public void depositChecking(double amt) - add parameter amt to the checking account balance (only if positive)
public void depositSavings(double amt) - add parameter amt to the savings account balance (only if positive)
public void withdrawChecking(double amt) - subtract parameter amt from the checking account balance (only if positive)
public void withdrawSavings(double amt) - subtract parameter amt from the savings account balance (only if positive)
public void transferToSavings(double amt) - subtract parameter amt from the checking account balance and add to the savings account balance (only if positive)

Answers

Answer:

Explanation:

The following code is written in Java and creates the BankAccount class with all of the requested methods, including the constructor, getter and setter methods, withdraw methods, and even the transferToSavings method. A preview can be seen in the attached image below.

class BankAccount {

   private String customerName;

   private double savingsBalance, checkingsBalance;

   public BankAccount(String newName, double amt1, double amt2) {

       this.customerName = newName;

       this.checkingsBalance = amt1;

       this.savingsBalance = amt2;

   }

   public String getCustomerName() {

       return customerName;

   }

   public void setCustomerName(String customerName) {

       this.customerName = customerName;

   }

   public double getSavingsBalance() {

       return savingsBalance;

   }

   public void setSavingsBalance(double savingsBalance) {

       this.savingsBalance = savingsBalance;

   }

   public double getCheckingsBalance() {

       return checkingsBalance;

   }

   public void setCheckingsBalance(double checkingsBalance) {

       this.checkingsBalance = checkingsBalance;

   }

   public void depositChecking(double amt) {

       if (amt > 0) {

           this.checkingsBalance += amt;

       }

   }

   public void depositSavings(double amt) {

       if (amt > 0) {

           this.savingsBalance += amt;

       }

   }

   public void withdrawChecking(double amt) {

       if (amt > 0) {

           this.checkingsBalance -= amt;

       }

   }

   public void withdrawSavings(double amt) {

       if (amt > 0) {

           this.savingsBalance -= amt;

       }

   }

   public void transferToSavings(double amt) {

       if (amt > 0 ) {

           this.checkingsBalance -= amt;

           this.savingsBalance += amt;

       }

   }

}

Answer:

public class BankAccount {

  private String customerName;

  private double savingsBalance;

  private double checkingsBalance;

  public BankAccount(String newName, double amt1, double amt2) {

     this.customerName = newName;

     this.checkingsBalance = amt1;

     this.savingsBalance = amt2;

  }

  public void setName(String newName) {

     this.customerName = customerName;

  }

 

     public String getName() {

     return customerName;

  }

  public void setChecking(double checkingsBalance) {

     this.checkingsBalance = checkingsBalance;

  }

 

  public double getChecking() {

     return checkingsBalance;

  }

  public void setSavings(double savingsBalance) {

     this.savingsBalance = savingsBalance;

  }

  public double getSavings() {

     return savingsBalance;

  }

  public void depositChecking(double amt) {

     if (amt > 0) {

        this.checkingsBalance += amt;

     }

  }

  public void depositSavings(double amt) {

      if (amt > 0) {

         this.savingsBalance += amt;

     }

  }

  public void withdrawChecking(double amt) {

     if (amt > 0) {

        this.checkingsBalance -= amt;

     }

  }

  public void withdrawSavings(double amt) {

      if (amt > 0) {

        this.savingsBalance -= amt;

     }

  }

  public void transferToSavings(double amt) {

     if (amt > 0 ) {

        this.checkingsBalance -= amt;

        this.savingsBalance += amt;

     }

  }

}

Java !!!
A common problem in parsing computer languages and compiler implementations is determining if an input string is balanced. That is, a string can be considered balanced if for every opening element ( (, [, <, etc) there is a corresponding closing element ( ), ], >, etc).
Today, we’re interested in writing a method that will determine if a String is balanced. Write a method, isBalanced(String s) that returns true if every opening element is matched by a closing element of exactly the same type. Extra opening elements, or extra closing elements, result in an unbalanced string. For this problem, we are only interested in three sets of characters -- {, (, and [ (and their closing equivalents, }, ), and ]). Other characters, such as <, can be skipped. Extra characters (letters, numbers, other symbols) should all be skipped. Additionally, the ordering of each closing element must match the ordering of each opening element. This is illustrated by examples below.
The following examples illustrate the expected behaviour:
is Balanced ("{{mustache templates use double curly braces}}") should return true
is Balanced("{{but here we have our template wrong!}") should return false
is Balanced("{ ( ( some text ) ) }") should return true
is Balanced("{ ( ( some text ) } )") should return false (note that the ordering of the last two elements is wrong)
Write an implementation that uses one or more Stacks to solve this problem. As a client of the Stack class, you are not concerned with how it works directly, just that it does work.

Answers

Answer:

Explanation:

import java.util.*;

public class BalancedBrackets {

// function to check if brackets are balanced

static boolean isBalanced(String expr)

{

Stack<Character> stack = new Stack<Character>();

for (int i = 0; i < expr.length(); i++)

{

char x = expr.charAt(i);

if (x == '(' || x == '[' || x == '{')

{

// Push the element in the stack

stack.push(x);

continue;

}

if (stack.isEmpty())

return false;

char check;

switch (x) {

case ')':

check = stack.pop();

if (check == '{' || check == '[')

return false;

break;

case '}':

check = stack.pop();

if (check == '(' || check == '[')

return false;

break;

case ']':

check = stack.pop();

if (check == '(' || check == '{')

return false;

break;

}

}

// Check Empty Stack

return (stack.isEmpty());

}

public static void main(String[] args)

{

Scanner scan = new Scanner(System.in);

System.out.println("\nEnter the expression to check is balanced or not !");

String expr = scan.nextLine();

boolean output;

output = isBalanced(expr);

System.out.println(output);

if (output)

System.out.println("Balanced ");

else

System.out.println("Not Balanced ");

scan.close();

}

}

what type of slab and beam used in construction of space neddle​

Answers

Answer:

Pyramidal Space Frame Glamorizes Swimming Pool 15. News Briefs 16 ... to use every pound of steel with no sacrifice in safety or ... form of steel trusses in an inverted coni- ... be embedded in the concrete slab when.

Explanation:

I HOPE THIS HELPS

List and explain the type of networking​

Answers

Answer:

Used for everything from accessing the internet or printing a document to downloading an attachment from an email, networks are the backbone of business today. They can refer to a small handful of devices within a single room to millions of devices spread across the entire globe, and can be defined based on purpose and/or size.

We put together this handy reference guide to explain the types of networks in use today, and what they’re used for.

 

11 Types of Networks in Use Today

 

1. Personal Area Network (PAN)

The smallest and most basic type of network, a PAN is made up of a wireless modem, a computer or two, phones, printers, tablets, etc., and revolves around one person in one building. These types of networks are typically found in small offices or residences, and are managed by one person or organization from a single device.

 

2. Local Area Network (LAN)

We’re confident that you’ve heard of these types of networks before – LANs are the most frequently discussed networks, one of the most common, one of the most original and one of the simplest types of networks. LANs connect groups of computers and low-voltage devices together across short distances (within a building or between a group of two or three buildings in close proximity to each other) to share information and resources. Enterprises typically manage and maintain LANs.

 

Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely transfer data.

 

3. Wireless Local Area Network (WLAN)

Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically seen in the same types of applications as LANs, these types of networks don’t require that devices rely on physical cables to connect to the network.

 

4. Campus Area Network (CAN)

Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types of networks are typically seen in universities, large K-12 school districts or small businesses. They can be spread across several buildings that are fairly close to each other so users can share resources.

 

5. Metropolitan Area Network (MAN)

These types of networks are larger than LANs but smaller than WANs – and incorporate elements from both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a campus). Ownership and maintenance is handled by either a single person or company (a local council, a large company, etc.).

 

6. Wide Area Network (WAN)

Slightly more complex than a LAN, a WAN connects computers together across longer physical distances. This allows computers and low-voltage devices to be remotely connected to each other over one large network to communicate even when they’re miles apart.

 

The Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the public.

 

7. Storage-Area Network (SAN)

As a dedicated high-speed network that connects shared pools of storage devices to several servers, these types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the network and place them into their own high-performance network. SANs can be accessed in the same fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and unified SANs.

 

8. System-Area Network (also known as SAN)

This term is fairly new within the past two decades. It is used to explain a relatively local network that is designed to provide high-speed connection in server-to-server applications (cluster environments), storage area networks (called “SANs” as well) and processor-to-processor applications. The computers connected on a SAN operate as a single system at very high speeds.

 

9. Passive Optical Local Area Network (POLAN)

As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into structured cabling to overcome concerns about supporting traditional Ethernet protocols and network applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals to serve users and devices.

 

10. Enterprise Private Network (EPN)

These types of networks are built and owned by businesses that want to securely connect its various locations to share computer resources.

 

11. Virtual Private Network (VPN)

By extending a private network across the Internet, a VPN lets its users send and receive data as if their devices were connected to the private network – even if they’re not. Through a virtual point-to-point connection, users can access a private network remotely.

Why is OS important in every data processing system?
Please Answer Fast! ​

Answers

Answer:

Functions of an operating system. An operating system provides three essential capabilities: It offers a UI through a CLI or GUI; it launches and manages the application execution; and it identifies and exposes system hardware resources to those applications -- typically, through a standardized API.

Explanation:

9. Which of the following prefixes which relate to bytes are arranged from the smallest to the largest? a) mega, giga, tera, kilo b) meqa tera, giga, kilo c) kilo, mega, giga, tera d) kilo, giga, mega, tera​

Answers

Answer:

Explanation:

C

kilo = 1000

mega = 1,000,000

giga = 1 billion = 1 000 000 000

tera = 1 trillion = 1 000 000 000  000

Type the correct answer in the box. Use numerals instead of words. If necessary, use / for the fraction bar.
PH
var num2 = 32;
var num1 = 12;
var rem=num2 % numi;
while(rem > 0)
{
num2 = num1;
num1 = rem;
rem = num2 % num1;
}
document.write(num1);
The output of the document.write statement at the end of this block is

Answers

Answer:

4

Explanation:

Given

The attached code segment

Required

The output

The first and second lines initialize num2 to 32 and num1 to 12, respectively.

Next, the remainder is calculated on line 3

[tex]rem = 32\%12[/tex]

[tex]rem = 8[/tex]

Then the while loop is repeated as long as rem > 0.

At first, we have:

[tex]num2 = 32[/tex]

[tex]num1 = 12[/tex]

[tex]rem = 8[/tex]

The first iteration gives:

[tex]num2 = 12[/tex]

[tex]num1 = 8[/tex]

[tex]rem = 12\%8 = 4[/tex]

Is 4 > 0? Yes; The loop is executed again.

This gives:

[tex]num2 = 8[/tex]

[tex]num1 = 4[/tex]

[tex]rem = 8\%4=0[/tex]

Is 0 > 0? No; The loop is executed

The last statement prints the last value of num1;

In the last loop, we have:

[tex]num1 = 4[/tex]

Hence, the output is 4

Answer:

Below is correct, the answer is 4.

Explanation:

PLATO

Select the true statement about network protocols.
A. Communication cannot take place unless the protocol is executed in the same way on all devices.
B. One function of a protocol is to decompress data when it is delivered to the receiving computer.
C. Using a protocol other than TCP/IP can result in data loss.
D. Computers that are distributed across a large geographic area need a special protocol to resolve errors.

Answers

The statement that is true about network protocols is that:

Using a protocol other than TCP/IP can result in data loss.

What are network protocols?

A network protocol is a system of principles that governs how data is delivered between devices on the same network.

Primarily, it enables linked devices to interact with one another despite variations in internal operations, architecture, or design.

The way this is done is true the use of Transmission-control protocol/Internet protocol (TCP/IP).

TCP/IP is the primary protocol or communication language of the Internet. Therefore, using a protocol other than TCP/IP can result in data loss.

Learn more about network protocol here:

https://brainly.com/question/17820678

The computer that is used in scientific research is ........​

Answers

Answer:

supercomputers are the computer that is used in scientific research.

Answer:

super computer is the right answer

Write a recursive function that calculates the sum 11 22 33 ... nn, given an integer value of nin between 1 and 9. You can write a separate power function in this process and call that power function as needed:

Answers

Answer:

The function in Python is as follows:

def sumDig(n):

if n == 1:

 return 11

else:

 return n*11 + sumDig(n - 1)

Explanation:

This defines the function

def sumDig(n):

This represents the base case (where n = 1)

if n == 1:

The function returns 11, when it gets to the base case

 return 11

For every other value of n (n > 1)

else:

This calculates the required sum recursively

 return n*11 + sumDig(n - 1)

Create a variable in php to store your university information and parse using jQuery Ajax and print your name. The variable must contain information about name, roll no, department and CGPA.

Answers

AnswLab giya j ty dy dio:

Explanation:

View "The database tutorial for beginners" and discuss how database management systems are different from spreadsheets. Describe one experience you have had working with data.

Answers

Answer and Explanation:

A spreadsheet is an interactive computer application for the analysis and storage of data. The database is a collection of data and accessed from the computer system. This is the main difference between spreadsheets and databases. The spreadsheet is accessed by the user and the database is accessed by the user. The database can store more data than a spreadsheet. The spreadsheet is used for tasks and used in enterprises to store the data. Spreadsheet and database are two methods and the main difference is the computer application that helps to arrange, manage and calculate the data. The database is a collection of data and organized to access easily. Spreadsheet applications were the first spreadsheet on the mainframe. Database stores and manipulates the data easily. The database maintains the data and stores the records of teachers and courses. The spreadsheet is the computer application and analyzing the data in table form. The spreadsheet is a standard feature for productive suite and based on an accounting worksheet.

Una persona decide comprar un número determinado de quintales de azúcar, ayúdele a presentar el precio de venta al público por libra, considerando un 25% de utilidad por cada quintal.

Answers

I need help with this problem also %


Please help us

Select the correct statement(s) regarding DCE and DTE interfaces.

a. DTE and DCE describes the device types (e.g., computers, switches, routers, etc.)
b. distinguishing between DTE and DCE is only required for half-duplex communications
c. DTE and DCE describes the interface and direction of data flow between devices; a single device may have both types of interfaces
d. all statements are correct

Answers

Answer:

The correct statement regarding DCE and DTE interfaces is:

c. DTE and DCE describes the interface and direction of data flow between devices; a single device may have both types of interfaces.

Explanation:

DTE stands for Data Terminal Equipment.  It is a device that initiates or controls a device's serial connection. The term DCE stands for Data Communications Equipment.  It is a device that is used to a modem or other communication interfaces to the DTE device.  DTE is a communication receptor, while DCE is a communication broadcaster or distributor.

9.17 LAB: Acronyms An acronym is a word formed from the initial letters of words in a set phrase. Write a program whose input is a phrase and whose output is an acronym of the input. If a word begins with a lower case letter, don't include that letter in the acronym. Assume there will be at least one upper case letter in the input.

Answers

Answer:

Hence the code is given as follows,

import java.util.Scanner;

public class LabProgram {

   public static String createAcronym(String userPhrase){

       String result = "";

       String splits[] = userPhrase.split(" ");

       for(int i = 0;i<splits.length;i++){

           if(splits[i].charAt(0)>='A' && splits[i].charAt(0)<='Z')

               result += splits[i].charAt(0);

       }

       return result;

   }

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       String s = scan.nextLine();

       System.out.println(createAcronym(s));

   }

}

LAB: Count multiples (EO)
Complete a program that creates an object of the Count class, takes three integers as input: low, high, and x, and then calls the countMultiples() method. The countMultiples() method then returns the number of multiples of x between low and high inclusively.
Ex: If the input is:
1 10 2
countMutiples() returns and the program output is:
5
Hint: Use the % operator to determine if a number is a multiple of x. Use a for loop to test each number between low and high.
Note: Your program must define the method:
public int countMultiples(int low, int high, int x)
Count.java
1 import java.util.Scanner;
2
3 public class Count {
4
5 public int countMultiples(int low, int high, int x) {
6 /* Type your code here. */
7
8 }
9
10 public static void main(String[] args) {
11 Scanner scnr = new Scanner(System.in);
12 /* Type your code here. */
13 }
14)
15

Answers

Following are the Java Program to the given question:

import java.util.Scanner; //import package for user-input

public class Count  //defining a class Count  

{

   public static int countMultiples(int low,int high,int x)//defining a method countMultiples that takes three integer parameters

   {  

       int c=0,i; //defining integer variables that hold value

       for(i=low;i<=high;i++)//defining loop that iterates value between low and high  

       {  

           if(i%x==0)//defining if block that uses % operator to check value

           {

               c+=1; //incrementing c value

           }

       }

       return c; //return c value

   }

   public static void main(String[] args)//main method  

   {  

       int l,h,x;//defining integer variable

       Scanner scnr=new Scanner(System.in); //creating scanner class object  

       l=scnr.nextInt(); //input value

       h=scnr.nextInt();//input value

       x=scnr.nextInt();//input value

       System.out.println(countMultiples(l,h,x)); //calling method and print its value

   }

}

Output:

Please find the attached file.

Program Explanation:

Import package.Defining a class "Count", and inside the class two method "countMultiples and main method" is declared.In the "countMultiples" method three integer parameter that are "low, high, and x".Inside this method a for loop is declared that uses the parameter value and use conditional statement with the % operator and check and return its values.Inside the main method three integer variable is declared that uses the scanner class to input the value and pass to the method and print its calculated value.  

Learn more:

brainly.com/question/16106262

Answer to this problem

Answers

Answer:

hi..,.................................................

A strategy that adopts interface standards that are defined by and widely used throughout industry to facilitate the update of components with new technology is __________. Open systems Non-developmental items Software-embedded systems Automated Information Systems

Answers

Answer:

The right approach is Option d (Automated information systems).

Explanation:

A technology that collects as well as disseminates knowledge or material throughout a range or variety of computerized systems, they are determined as an Automated information system.Oftentimes virtually minimal individual personal interference is necessary except perhaps construction as well as services.

Other choices aren't related to the given scenario. So the above is the appropriate one.

Which devices are managed through device management?

Device management is the process of managing
________devices.

Answers

Answer:

organization

Explanation:

The answer is organization I am thinking.

What are the LinkedIn automation tools you are using?

Answers

Answer:

Well, for me I personally use LinkedCamap to drive more LinkedIn connections, hundreds of leads, sales, and conversions automatically.

Some other LinkedIn automation tools are;

ExpandiMeet AlfredPhantombusterWeConnectLinkedIn Helper

Hope this helps!

Giải thích mục đích của các thao tác open() và close().

Answers

Answer:

Which lan is it

Answer:

Đang học năm nhất trường TDT đúng k bạn :D

Explanation:

Other Questions
What is life like in a cave camp? Do you think you would like to experience this? Why or why not? The area of the rectangular sandbox at Dave's school is 117 square feet. The sandbox has a width of 9 feet as shown in the diagram. What is the perimeter of the sandbox? explain in your own words the three mechanisms that cause air to be displaced into the atmosphere Q2: 8,15,22,29,36,............ A sequence of numbers is shown above. a) Find the 10th term of the sequence. *This is a required questionb) Find the nth term of the sequence. *c) Which term of the sequence is equal to 260. * Can anyone answer these 4 questions? If an electrical component with a resistance of 53 Q is connected to a 128-V source, how much current flows through the component? A simple pendulum takes 2.00 s to make one compete swing. If we now triple the length, how long will it take for one complete swing help pls I need it badly Expand 5(2x-1) please I need it for homework. 9. Isotherms are lines that connect points of equalpressureelevationtemperaturelatitude rewrite 1/6 and 2/11 so they have a common denominator then use to order If charge on only one object is tripled, determine the new force between them: Which sentence would best fit in the recommendations paragraph of a report on ocean pollution?This report proposes an investment in technologies aimed at preventing plastic from entering the oceans.x Ocean cleanup companies have developed new technologies that can be used to remove garbage from the seaOne key finding in this report is that plastic pollution in the oceans is on pace to double in the next ten years.This report will examine the impact of ocean pollution on climate change while examining what can be done tocombat it. What does Angelica want to know ?She wants to know if Antonio is going to class.She wants to know what class Antonio is going to.She wants to know where the biology class is.She wants to know what time biology class starts. *Why is Cindy so happy this morning ?Because she got a good grade in a dancing class.Because she is learning to dance. *Because she is learning to play in instrument.Because Gloria is her friend.When is Cindy learning to dance ? Por las mananas A mediodiaPor las noches Por las tardes *According to this paragraph, What does Luis do every morning ?Va a las olimpiadas.Hace su tarea.Corre todas las mananas. *Duerme hasta las diez. According to Marisa, When does the movie start ?A las nueve.A las ocho. *Despues de las ocho.Despues de las nueve.I GOT 100% ~~~NEED HELP ASAP~~~Please solve each section and show all work for each section. 1) Convert the following:I) 65 kg into gii) 87570 seconds into houriii) 7.5 km into m A rectangular box has a square base with an edge length of x cm and a height of h cm. The volume of the box is given by V = x2h cm3. Find the rate at which the volume of the box is changing when the edge length of the base is 10 cm, the edge length of the base is increasing at a rate of 3 cm/min, the height of the box is 5 cm, and the height is decreasing at a rate of 1 cm/min. A.The volume of the box is decreasing at a rate of 200 cm3/min.B.The volume of the box is increasing at a rate of 400 cm3/min.C.The volume of the box is decreasing at a rate of 400 cm3/min.D.The volume of the box is increasing at a rate of 200 cm3/min. Mr. Tanaka is making Miso soup for his family. The recipe calls for 350 ml of Dashi. Mr. Tanaka plans to make a smaller batch using 280 ml of dashi. He wants to know what percent of the stock he will use compared to the original recipe. PLSS HELPPPPPPP Quick An electron moving in the y direction, at right angles to a magnetic field, experiences a magnetic force in the -x direction. The direction of the magnetic field is in the CAN SB HELP ME !! Use the image and your knowledge of the isosceles triangle to find the value of x