Answer:
The program is written in C++ language and given below in explanation section. All bold faced words are C++ keywords and symbols. Nested if-else decision branch is used to determine smallest number of all three integers. First of all you have input three integers then the program prints smallest integer of all
Explanation:
#include <iostream>
using namespace std;
int main() {
int num1,num2,num3;
cout<<"enter first integers"<<endl;
cin>>num1;
cout<<"enter second integers"<<endl;
cin>>num2;
cout<<"enter the third integers"<<endl;
cin>>num3;
if(num1<num2){
if(num1<num3){
cout<<"Smallest integer is "<<num1<<endl;
} else{
cout<<"Smallest integer is "<<num3<<endl;
}
}else {
if(num2<num3){
cout<<"Smallest integer is "<<num2<<endl;
} else{
cout<<"Smallest integer is "<<num3<<endl;
}
}
return 0;
}
If a system's instruction set consists of an 8-bit opcode, what is the maximum number of output signal lines required for the control unit?
A) 8 B) 64C) 128 D) 256
Answer:
D. 256
Explanation:
Given
[tex]Instructions = 8\ bit[/tex]
Required
Determine the maximum number of output
To get the required value, we make use of the following:
[tex]Maximum = 2^n[/tex]
Where n is the bits of the opcode.
i.e.
[tex]n = 8[/tex]
Substitute 8 for n in [tex]Maximum = 2^n[/tex]
[tex]Maximum = 2^8[/tex]
[tex]Maximum = 256[/tex]
Hence, option D answers the question
Will, there be any presents this year
Answer:
no why
Explanation:
use the drop-down menus to complete the statements about using column breaks in word 2016
Answer: layout, section, number, more options
Explanation:
Just did it on edge 2020
Answer:layout
Section
Number
More options
Explanation: got an A on the test
Write a Python program that uses function(s) for writing to and reading from a file:
a. Random Number File Writer Function
Write a function that writes a series of random numbers to a file called "random.txt". Each random number should be in the range of 1 through 500. The function should take an argument that tells it how many random numbers to write to the file.
b. Random Number File Reader Function
Write another function that reads the random numbers from the file "random.txt", displays the numbers, then displays the following data:
The total of the numbers
The number of random numbers read from the file
c. Main Function
Write a main function that asks the user about how many random number the user wants to generate. It them calls the function in a. with the number the user wants as an argument and generates random numbers to write to the file. Next, it calls the function in b.
import random
def random_number_file_writer(nums):
f = open("random.txt", "w")
i = 0
while i < nums:
f.write(str(random.randint(1,500))+"\n")
i += 1
f.close()
def random_number_file_reader():
f = open("random.txt", "r")
total = 0
count = 0
for x in f.readlines():
total += int(x)
count += 1
print("The total of the numbers is "+str(total))
print("The number of random numbers read from the file is "+str(count))
def main():
random_number_file_writer(int(input("How many random numbers do you want to generate? ")))
random_number_file_reader()
main()
I hope this helps!
Explain how files can be identified as entities on the magnetic surface?
Answer:
Data is stored on a hard disk drive as a result of magnetism. A file or data is represented in bits on a disk, with 1 representing a magnetized entity and 0 for an unmagnetized surface.
Explanation:
A hard disk drive (HDD) is an electro-magnetic tool for storing data in computing. It is made of moving parts like a platter and read/write head for reading and writing data to the disk.
To read or write data on a disk, the platter spins at a very high speed ( 5000 RPM to 10000 RPM), and the head, at the right surface, writes or reads a bit 1 as a magnetized surface and 0 as unmagnetized.
One of the First-Generation Computer built in 1942 during the Second World War and fully utilized to compute Military Artillery by the United States Army.
Computer Hardware and Maintenance
Question 1 of 5
A protocol for maintaining technology and supplies may answer
questions such as:
What is the replacement life for each piece of equipment?
All of these answers
What should supplies be ordered?
When will security updates and enhancements be applied?
Submit Ansv
Answer:
All of these answers
Explanation:
A computer's physical components must be inspected, updated, and maintained over time to keep them functioning at their best. This process is known as hardware maintenance. Thus, option B is correct.
What is the best way for hardware Maintenance?Regular hardware maintenance typically aids companies in avoiding unforeseen problems like device damage and severe data loss.
Regular hardware repair of servers and other physical parts enables businesses to retain their operational integrity and keep a stable IT infrastructure.
While corrective maintenance entails replacing or repairing a system or its components after they have already failed, preventive maintenance encompasses actions that can be taken to keep the system operating.
Therefore, Preventive and corrective maintenance are the two key elements of system upkeep.
Learn more about Hardware here:
https://brainly.com/question/28146743
#SPJ2
select all the apply. Effective presentations
Answer:are influenced by their setting, are consistent in their message, and are tailored to their audience.
Explanation:
Correct on Edge 2020
Give a recursive definition of the set of positive integer powers of 3.That is the set {3,9,27,81,...}
Answer:
We have set A,
3 ∈ S
n*3 if n ∈ S
Explanation:
A recursion can be defined as a way of defining objects in terms of itself or as parts of itself.
Lets say we a set that is defined as A,
Then the recursive definition of the sets of positive integers with the powers of 3 in A is given as
3 ∈ S
n*3 if n ∈ S
This tells us that 3 is an element of S such that if n is an element of S then in general we would have n*3 to be an element of S
Who designed the Apple I computer in 1976?
Answer:
Steve Wozniak
Answer:
Steve Wozniak
Explanation:
Edhesive Intro to CS Code Practice 1.8
I am pretty sure I got it right. But it keeps telling me that I have an EOF error on the E input.
Questions:
CS Code Practice 1.8 Question 1:
Write a code that accepts the user's age as an input, then print their age in 10 years.
CS Code Practice 1.8 Question 2:
Write a code that accepts a whole number as an input, subtracts 5 and print the answer
Answer:
Question 1:
currentage = int(input("Enter your age: "))
print("Your age in 10 years is "+str(currentage + 10))
Question 2:
userinput = int(input("Enter a whole number: "))
print(str(userinput)+" - "+str(5)+" = "+str(userinput - 5))
Explanation:
There are two questions in this category and I don't know which of them you need; So, I answered both.
Question 1:
This line prompts user for age
currentage = int(input("Enter your age: "))
This line adds 10 to user input and prints the result
print("Your age in 10 years is "+str(currentage + 10))
Question 2:
This line prompts user for a whole number
userinput = int(input("Enter a whole number: "))
This line subtracts 5 from the whole number and prints the result
print(str(userinput)+" - "+str(5)+" = "+str(userinput - 5))
Best of Luck
for your work and
d
Best wishes for you
.
oh, why thank you same to you
Write a Python program segment, using a loop, to calculate and print the sum of the odd integers from 20 to 120. (Hint: 21 23 25 . . . 117 119)
Answer:
for x in range(20,120):
if x % 2 == 0:
continue
print(x)
Explanation:
in a range of 20 to 120 it does the following, if x is divisible by two as an int, then try again with a new number. If not, print that number.
5.14 Describe how the compare and swap() instruction can be used to provide mutual exclusion that satisfies the bounded-waiting requirement. (15 pts)
Answer:
Explained below
Explanation:
Compare and Swap(C&S) is simply an atomic operation whereby the compare and swap operations are automatically executed.
Now compare and Swap basically needs 3 arguments namely:
- 2 old values which we will label X and Y
- 1 new value which is written in X that we will call Z
Thus, we now have; C & S = {X, Y, Z}
To explain this well, let X be a variable where X has a value of 7.
Now, if a programmer gives a program me that X be multiplied by 2,then what C&S operation will do is;
I) Y = X where Y is a new variable.
II) Result = C&S(X, Y, X*7)
Variable X is global and this means that mere than one process and more than 1 thread can see the variable X.
Now, if a process named P1 wants multiply the variable X by 7 using C&S operation, it will first make a local copy of variable X (which in this case is now the new variable Y). After that it will atomically compare X & Y and if they are equal, it will replace X with 10X.
However, if they are not equal, P1 will re-read value of X into Y and carry of C&S instruction again.
Starting at time 0, a new process p of length 3 arrives every 4 time units. Starting at time 1, a new process q of length 1 arrives every 4 time units. Determine the ATT under FIFO, SJF, and SRT.
Answer:
A.T= Arrival Time B.T= Burst Time C.T= Completion Time T.T = Turn around Time = C.T - A.T W.T = Waiting Time = T.T - B.T ATT=sum of all Turn-around time / total no of process FIFO (first in first o
A software developer is creating a variable to hold whole numbers and will perform numeric operations on the values stored in that
variable. Which of the following data types is the BEST for this purpose?
Answer:
blue 80 Omaha a set hut
Explanation:
Which TWO objects are likely to have SSD chips in them?
office access card
bank debit card
food service token
discount coupon
business card
Answer:
Bank card and discount coupon
Explanation:
Describe two circumstances where access services might get implemented by organizations please.
Answer:
Answered below
Explanation:
Remote access enables access to an organisations network from remote places. Certain conditions require such access. An organisation might require their workforce to work from home especially in this coronavirus health pandemic situation. Therefore remote access is necessary.
Also attending to customers needs, virtual meetings and connections to workers and clients all over the world, can only be made possible by the implementation of secured remote access, by the organisation.
The digital EGR valve used on GM 3800 engines allows for how many different EGR flow rates?
Answer:
Is this an engine
Explanation:
Write the HTML for a paragraph that uses inline styles to configure the background color of green and the text color of white.
Answer:
The full form of HTML is Hyper Text markup Language
Explanation:
HTML stands for Hyper Text Markup Language. It is a programming language. It is a standard markup language that is designed for the documents to be displaced in the web browser. It is used to structure the content of a web page.
The HTML is
<html>
<body>
<p style="bg-color:green;" "color=white;">This is paragraph study</p>
</body>
</html>
How do entrepreneurs traditionally use computers? check all of the boxes that apply.
Answer:
to manage financial records
to e-mail clients
to communicate with clients on social networking sites
to catalog tax records
Explanation:
These are the options;
apply.
to manage financial records
to create advertisements
to communicate with clients on social networking sites
to catalog tax records
to e-mail clients
to complete taxes automatically
to create invoice
A computer which is a machine that make use of instructions to carry out operation in a arithmetic or logical ways through computer programming. Computer is of many help to business today because it can carry out many tasks.Entrepreneurs can traditionally use computers in different ways such as in;
✓ management of financial records
✓e-mailing of clients
✓ communicating with clients on social networking sites
✓ cataloging tax records
What solidity data type is useful for storing a list of specific values, such as the days of the week?
Answer:
Arrays
Explanation:
Solidity is a feature in blockchain smart contracts. It is used in a program to create an interface for transacting with users of an application.
Just like in other programming concepts, the solidity environment has several data types like the unsigned integer and signed integers.
The array is a data type or structure in solidity used to hold values of similar data types.
Explain how to invoke a superclass method from a subclass method for the case in which the subclass method overrides a superclass method and the case in which the subclass method does not override a superclass method.
Answer:
Throughout the description section underneath the overview and according to the question given summarized.
Explanation:
This could be achieved and then using the keyword (super) throughout java since the compiler considers 'this' keyword, which also declares the method specified throughout the subclass mostly in the absence including its super keyword. People, therefore, need prefix the takes place in the framework with 'super' to render the method (super class). Both methods including class A are implicitly available in class B whenever class A is expanded by class B. Perhaps we can name the method under concern explicitly as if it was specified throughout the subclass.Is data science the sexiest job in 21st century according to Harvard business review?
Answer:
yuppp
Explanation:
i looked it up lol
lits q4 plz help...in the end i'll mark brainiest
Visual Design includes 4 elements: shapes, texture, lines and form.
Question 6 options:
True
False
Answer:
Explanation:
The answer is false
Because the 4 elements are shapes texture colour and size
You are building your own computer, and you are ready to select
the software that provides the interface between the user and
the hardware. Which of these tabs should you click on at the
online store you are visiting?
A
hardware
B
data mining
с
application software
D
systems software
Answer:
D
Explanation:
It's because you need a system software so the user can understand what the hardware is saying because the hardware only uses binary codes.
Write a value function called sugarScaled with the following three parameters: A real-number scale that defaults to 1.7.
A whole-number naturalSugarLevel that is a sugar amount in grams.
A whole-number artificialSugarLevel that is a sugar amount in grams.
The function adds the two sugar levels, multiplies the sum by the scale, and returns that value from the function.
Explanation:
const double scale = 1.7;
int sugarScaled(double scale, int naturalSugarLevel, int artifiialSugarLevel){
return scale * (naturalSugarLevel + artifiialSugarLevel);
}
1) Create python code to compute the circumference of a circle with a given radius. (formula is 2 pi R) (pi can be set at 3.14). Include a print statement such as (A circle with Radius of 10 has a Circumference of 62.8
Answer:
pi = 3.14
r = float(input("Enter radius: "))
circumference = 2 * pi * r
print("A circle with Radius of {} has a Circumference of {:.1f}".format(r, circumference))
Explanation:
Initialize the pi as 3.14
Ask the user to enter the r
Calculate the circumference using the given formula
Print the result as requested format
(Note that I used .format() to format the output. The values in the {}'s will be the ones in the format() method, r and circumference respectively)
1. Write a high level algorithm for cooking a cheeseburger.
2. Write a detailed algorithm for cooking the same cheeseburger.
Answer:
1. A high level algorithm for cooking a cheeseburger could be:
Heat fry panCook one side of the hamburgerWaitTurn hamburger upside downPut cheese over hamburgerWaitCut hamburger bread in halfPut cooked hamburger inside breadEnd (eat)2. A detailed algorithm for cooking a cheeseburger could be:
Place fry pan over the stove heaterTurn on heater (max temp)IF fry pan not hot: wait, else continuePlace raw hamburger on fry panIF hamburger not half cooked: Wait X time then go to line 5, else continueTurn hamburger upside downPut N slices of cheese over hamburgerIF hamburger not fully cooked: Wait X time then go to line 8, else continueTurn off heaterCut hamburger bread in half horizontally Put cooked hamburger on one of the bread halves.Put second bread half on top of hamburgerEnd (eat)Explanation:
An algorithm is simply a list of steps to perform a defined action.
On 1, we described the most relevant steps to cook a simple cheeseburger.
Then on point 2, the same steps were taken and expanded with more detailed steps and conditions required to continue executing the following steps.
In computational terms, we used pseudo-code for the algorithm, since this is a list of actions not specific to any programming language.
Also we can say this is a structured programming example due to the sequential nature of the cooking process.