4 事️Hello, I am Ali​

4 Hello, I Am Ali

Answers

Answer 1

Answer:

Do not post these types of things.

Explanation:


Related Questions

Observe ,which plunger exerts(produces) more force to move the object between plunger B filled with air and plunger B filled with water?

Answers

The plunger filled with water will exert more force to move an object compared to the plunger filled with air.

What is a plunger?

Plunger, force cup, plumber's friend, or plumber's helper are all names for the tool used to unclog pipes and drains. It is composed of a stick (shaft) that is often constructed of wood or plastic and a rubber suction cup.

It should be noted that because water is denser than air, meaning it has a higher mass per unit volume. When the plunger is filled with water, it will have a greater overall mass and will thus be able to transfer more force to the object it is trying to move.

Learn more about water on:

https://brainly.com/question/1313076

#SPJ1

Take two equal syringes, join them with plastic tube and fill them with water as illustrated in the figure

Push the plunger of syringe A (input) and observe the movement of plunger B (output).

(a)

Which plunger moves immediately when pressing plunger A, between plunger B filled with air and plunger B filled with water?

Complete the FoodItem class by adding a constructor to initialize a food item. The constructor should initialize the name to "None" and all other instance attributes to 0.0 by default. If the constructor is called with a food name, grams of fat, grams of carbohydrates, and grams of protein, the constructor should assign each instance attribute with the appropriate parameter value.

The given program accepts as input a food item name, fat, carbs, and protein and the number of servings. The program creates a food item using the constructor parameters' default values and a food item using the input values. The program outputs the nutritional information and calories per serving for both food items.

Ex: If the input is:

M&M's
10.0
34.0
2.0
1.0
where M&M's is the food name, 10.0 is the grams of fat, 34.0 is the grams of carbohydrates, 2.0 is the grams of protein, and 1.0 is the number of servings, the output is:

Nutritional information per serving of None:
Fat: 0.00 g
Carbohydrates: 0.00 g
Protein: 0.00 g
Number of calories for 1.00 serving(s): 0.00

Nutritional information per serving of M&M's:
Fat: 10.00 g
Carbohydrates: 34.00 g
Protein: 2.00 g
Number of calories for 1.00 serving(s): 234.00

Answers

```python

class FoodItem:

def __init__(self, name="None", fat=0.0, carbs=0.0, protein=0.0):

self.name = name

self.fat = fat

self.carbs = carbs

self.protein = protein

def get_calories(self, num_servings):

calories = (self.fat * 9 + self.carbs * 4 + self.protein * 4) * num_servings

return calories

def print_info(self, num_servings):

print("Nutritional information per serving of {}:".format(self.name))

print("Fat: {:.2f} g".format(self.fat))

print("Carbohydrates: {:.2f} g".format(self.carbs))

print("Protein: {:.2f} g".format(self.protein))

print("Number of calories for {:.2f} serving(s): {:.2f}".format(num_servings, self.get_calories(num_servings)))

# Main program

food_item1 = FoodItem()

food_item2 = FoodItem(input(), float(input()), float(input()), float(input()))

food_item1.print_info(1)

food_item2.print_info(float(input()))

```

what is document formatting?​

Answers

Answer:

Document formatting refers to the process of designing and arranging the content, layout, style, and structure of a document to make it more readable, visually appealing, and professional-looking. Document formatting involves applying different formatting techniques such as setting margins, adding page numbers, adjusting font size and style, indenting paragraphs, adding headings and subheadings, using bullet points and numbered lists, and incorporating images, tables, and charts to enhance the presentation of the document.

Explanation:

In this c++ assignment, add an undo feature to a list of strings.


Here's a working class called Stringlist that implements a simple string list as a dynamic array. Stringlist_test.cpp has tests for all the methods in Stringlist.


Stringlist has one unimplemented method:

// Undoes the last operation that modified the list. Returns true if a

// change was undone, false otherwise.

//

bool undo()

{

cout << "Stringlist::undo: not yet implemented\n";

return false;

}

Your job is to implement undo, thus making Stringlist an undoable list.


Your implementation must follow these rules:


Do not delete any methods, or change the signatures of any methods, in Stringlist. You can change the implementation of existing methods if necessary. But they should still work the same way: your finished version of Stringlist with undo implement must still pass all the tests in Stringlist_test.cpp.

You can add other helper methods (public or private), functions, and classes/structs to Stringlist.h if you need them.

You must implement undo() using a private stack that is accessible only inside the Stringlist class. Implement the stack yourself as a linked list. Do not use arrays, vectors, or any other data structure for your stack.

Do not use any other #includes or #pragmas in Stringlist.h other than the ones already there.

When it's done, you'll be able to write code like this:


#include "Stringlist.h"

#include


using namespace std;


int main() {

Stringlist lst;

cout << lst << endl; // {}


lst.insert_back("one");

lst.insert_back("two");

lst.insert_back("three");

cout << lst << endl; // {"one", "two", "three"}


lst.undo();

cout << lst << endl; // {"one", "two"}


lst.undo();

cout << lst << endl; // {"one"}


lst.undo();

cout << lst << endl; // {}

}


Designing the Undo Stack


As mentioned above, you must implement undo() using at least one private stack implemented as a linked list inside the Stringlist class. You can modify Stringlist only as described at the start of this assignment.


examples of how specific methods should work.


Undoing insert_before


In code:


// lst == {"dog", "cat", "tree"}


lst.insert_before(3, "hat");

// lst == {"dog", "cat", "tree", "hat"}


lst.undo();

// lst == {"dog", "cat", "tree"}


lst.insert_before(1, "shoe");

// lst == {"dog", "shoe", "cat", "tree"}


lst.undo();

// lst == {"dog", "cat", "tree"}

Undoing set


For set, suppose that lst is {"yellow", "green", "red", "orange"}, and so lst.get(2) returns "red". If you call lst.set(2, "cow"), then you should push the operation set location 2 to "red" onto the undo stack, and then over-write location 2 with "cow".


In code:


// lst == {"yellow", "green", "red", "orange"}


lst.set(2, "cow");

// lst == {"yellow", "green", "cow", "orange"}


lst.undo();

// lst == {"yellow", "green", "red", "orange"}

Undoing remove_at


For remove_at

In code:


// lst == {"dog", "cat", "tree"}


lst.remove_at(1);

// lst == {"dog", "tree"}


lst.undo();

// lst == {"dog", "cat", "tree"}

Undoing operator=


For operator=,

In code:


// lst1 == {"dog", "cat", "tree"}

// lst2 == {"yellow", "green", "red", "orange"}


lst1 = lst2;

// lst1 == {"yellow", "green", "red", "orange"}

// lst2 == {"yellow", "green", "red", "orange"}


lst1.undo();

// lst1 == {"dog", "cat", "tree"}

// lst2 == {"yellow", "green", "red", "orange"}

As this shows, when you undo operator=, the entire list of strings is restored in one call to undo().


Important notes:


If lst1 and lst2 are different objects, then when lst2 is assigned to lst1 just the underlying string array of lst2 is copied to lst1. The lst1 undo stack is updated so that it can undo the assignment. The undo stack of lst2 is not copied, and lst2 is not modified in any away.


Self-assignment is when you assign a list to itself, e.g. lst1 = lst1;. In this case, nothing happens to lst1. Both its string data and undo stack are left as-is.


Undoing remove_all


For remove_all,

In code:


// lst == {"dog", "cat", "tree"}


lst.remove_all();

// lst == {}


lst.undo();

// lst == {"dog", "cat", "tree"}

Note that it should work the same way when lst is empty:


// lst == {}


lst.remove_all();

// lst == {}


lst.undo();

// lst == {}

Undoing Other Methods


undo() should undoall the other methods in Stringlist that are marked as "undoable" in the source code comments.


As mentioned above, undo() is not undoable. There is no "re-do" feature in this assignment.


Each method in Stringlist.h marked "undoable" should work correctly with undo(). This also includes the correct behaviour for the Stringlist copy constructor (which should not copy the undo stack).

The markers tests should run correctly, including with no memory leaks according to valgrind.

Answers

To implement the undo feature in the Stringlist class, you will need to modify the existing class and add a private stack implemented as a linked list. Here are the steps to follow:

How to write the program code

1. In the Stringlist class in Stringlist.h, add a private struct called `UndoNode` to represent each node in the undo stack. Each node should store the necessary information to undo an operation (e.g., the method name, the arguments, and any other relevant data).

```cpp

private:

   struct UndoNode {

       std::string method;  // The method name

       // Add other necessary data for the specific method being undone

       // ...

       UndoNode* next;  // Pointer to the next node in the stack

       UndoNode(const std::string& m) : method(m), next(nullptr) {}

   };

```

2. Add a private member variable `undoStack` of type `UndoNode*` to the Stringlist class to keep track of the undo stack.

```cpp

private:

   // Other private member variables

   UndoNode* undoStack;

```

3. Modify the undoable methods in the Stringlist class to push the necessary information onto the undo stack before performing the operation. For example, in the `insert_before` method:

```cpp

void insert_before(size_t index, const std::string& str) {

   // Push the operation onto the undo stack

   UndoNode* undoNode = new UndoNode("insert_before");

   // Add necessary data to the undoNode (e.g., index and str)

   // ...

   // Perform the actual operation

   // ...

   // Add the undoNode to the top of the stack

   undoNode->next = undoStack;

   undoStack = undoNode;

}

```

4. Implement the `undo` method to pop the top node from the undo stack and perform the undo operation based on the stored information. You will need to handle each operation individually in the `undo` method.

```cpp

bool undo() {

   if (undoStack == nullptr) {

       std::cout << "Undo stack is empty." << std::endl;

       return false;

   }

   UndoNode* undoNode = undoStack;

   undoStack = undoStack->next;

   // Perform the undo operation based on the stored information in undoNode

   if (undoNode->method == "insert_before") {

       // Undo the insert_before operation

       // ...

   } else if (undoNode->method == "set") {

       // Undo the set operation

       // ...

   }

   // Handle other operations...

   delete undoNode;

   return true;

}

```

Remember to handle memory deallocation appropriately and update other methods marked as "undoable" accordingly.

Read more on Java codes here https://brainly.com/question/25458754

#SPJ1

Write a program that determines the change to be dispensed from a vending machine.
An item in the machine can cost between 25 cents and 1 dollar, in 5-cent increments
(25, 30, 35, . . . , 90, 95, or 100), and the machine accepts only a single
dollar bill to pay for the item.

- int variable itemPrice

- int variables quarters, dimes, nickels

- Scanner object

Program accepts itemPrice, which is a price for the item you would like to purchase.

Positive behaviour:

Please follow the example:

-If the Item price was entered 95: need to display message: Your change is 0 quarters, 0 dimes, and 1 nickels.
-If the Item price was entered 60: need to display message: Your change is 1 quarters, 1 dimes, and 1 nickels.

Note: Implement a program that calculates the minimum number of coins required to give a user change.

Negative behaviour:

If itemPrice is less than 25 or more than 100 cents, then display error message:

Invalid price!

If itemPrice is not divisible by 5, then also display error message:

Invalid price!

use (itemPrice % 5 == 0) expression to find it is divisible by 5.

Answers

The program that determines the change to be dispensed from a vending machine is illustrated below

How to depict the program?

import java.util.Scanner;  //to accept input from user

public class Main {   //class name

 public static void main(String[] args) {  //start of main function

Scanner input =new Scanner(System.in);  // creates Scanner class object

int amount, quarters, dimes, nickels, pennies,change;   //declare variables

System.out.println("Enter the price of the(from 25 cents to a dollar, in 5-cent increments): ");  //prompts user to enter the price

amount=input.nextInt();   //reads amount from user

change= 100-amount;   //computes change

System.out.println("You bought an item for " + amount+" cents and gave me a dollar, so your change is :");  

quarters=change/25;  //computes quarters

change=change%25;  //computes quarter remaining

if(quarters == 1)   // if quarter is equal to 1

System.out.println(quarters+ " quarter");   //prints quarter value in singular

else if (quarters>1)   // if value of quarters is greater than 1

System.out.println(quarters+" quarters");     //prints plural quarters value

dimes=change/10;  //computes dime

if(dimes == 1)   // if value of dime is equal to 1

System.out.println(dimes+ " dime");   //prints single value of dimes

else if (dimes>1)   //if value of dimes is greater than 1

System.out.println(dimes+" dimes");  //prints plural value of dimes

change=change%10;   //computes dimes remaining

nickels=change/5;  //computes nickels

if(nickels == 1)   //if value of nickels is equal to 1

System.out.println(nickels+ " nickel");   //prints single value of nickels

else if (nickels>1)   //if value of nickels is greater than 1

System.out.println(nickels+" nickels");   //prints plural value of nickels

change=change%5;    //computes nickels remaining

pennies=change;  //computes pennies

if(pennies == 1)   //if value of pennies is equal to 1

System.out.println(pennies+ " penny");   //prints single value of pennies

else if (pennies>1)    //if value of pennies is greater than 1

System.out.println(pennies+" pennies");     } }  //prints plural value of pennies

Learn more about program on:

https://brainly.com/question/1538272

#SPJ1

When hand tracing, drawing a line through the value stored in a variable means that _______________.

Answers

Answer:

The value stored there has changed to something new

Explanation:

Given that Hand-tracing is a term in computer science that describes a form of miniature execution of codes. This is carried out through instructions and defined steps. Hand-tracing is done to cancel out the former value and depict the new value below it when there is a change in a variable.

Hence, during the process of Hand tracing, drawing a line through the value stored in a variable demonstrates that the value stored there has changed to something new.

What is a real-life example of a Microsoft Access Query?

Answers

Explanation:

Microsoft Access is an information management tool that helps you store information for reference, reporting, and analysis. Microsoft Access helps you analyze large amounts of information, and manage related data more efficiently than Microsoft Excel or other spreadsheet applications.

A real-life example of a Microsoft Access Query is a table that stores the names of new customers at a supermarket.

What is Microsoft Access?

Microsoft Access is a database management software application designed and developed by Microsoft Inc., in order to avail its end users an ability to create, store and add data to a relational database.

In Microsoft Access, the options that are available on the File tab include the following:

Opening a database.

Selecting a template.

Creating a new database.

In conclusion, a database is an element in Microsoft Access which is an ideal data source and a query would always obtain, generate, or pick information from it.

Read more on Microsoft Access here: brainly.com/question/11933613

#SPJ2

a triangular number is a number that is the sum of the integers from 1 to some integer n. thus 1 is a triangular number because it is the sum of the integers from 1 to 1; 6 is a triangular number because 1 + 2 + 3 = 6.given the non-negative integer n, create a list of the first n triangular numbers. thus if n was 5, the list would be: {1, 3, 6, 10, 15}.assign the list to variable traingulars

Answers

Answer:

def triangular_numbers(n):

triangulars = []

sum = 0

for i in range(1, n+1):

sum += i

triangulars.append(sum)

return triangulars

# Test the function

print(triangular_numbers(5)) # Output: [1, 3, 6, 10, 15]

Explanation:

To create a list of the first n triangular numbers, you can use a for loop to iterate from 1 to n, and for each iteration, add the current number to the sum of the previous numbers.

This function will create a list of the first n triangular numbers and return it. You can then assign the returned list to the variable triangulars.

Despite a wide variety of workplaces for those working in Human Services, all workplaces include

Answers

Answer:

employees and a computer

Explanation:

Mary needs someone to make sure her podcast is of high quality and sounds polished. Which of the following professionals should she hire?
A. Graphic Designer
B. Game Designer
C. Digital Audio Producer
D. Video Production Specialist​

Answers

Answer:

C. Digital Audio Producer

Explanation:

C. is the only option where the professial deals specifically with sound/audio.

Mary needs someone to make sure her podcast is of high quality and sounds polished. The professional should she hire is Digital Audio Producer. Thus the correct option is C.

What is A professional?

A professional is referred to as an individual who has sound knowledge of any profession and holds expertise in order to fulfill the wishes of clients based on their requirements.

In the given case, it is highlighted that Mary needs someone to make sure her podcast is of high quality and polished Sounds. So she hired a professional Digital Audio Producer.

A Digital Audio Producer is referred to as an individual who chooses the sound style of the composition, organizes vocals and instruments, and sets up musical equipment.

Therefore, option C is appropriate.

Learn more about Professionals, here:

https://brainly.com/question/14353881

#SPJ2

In java Please

3.28 LAB: Name format
Many documents use a specific format for a person's name. Write a program whose input is:

firstName middleName lastName

and whose output is:

lastName, firstInitial.middleInitial.

Ex: If the input is:

Pat Silly Doe
the output is:

Doe, P.S.
If the input has the form:

firstName lastName

the output is:

lastName, firstInitial.

Ex: If the input is:

Julia Clark
the output is:

Clark, J.

Answers

Answer:

Explanation:

import java.util.Scanner;

public class NameFormat {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       

       System.out.print("Enter a name: ");

       String firstName = input.next();

       String middleName = input.next();

       String lastName = input.next();

       

       if (middleName.equals("")) {

           System.out.println(lastName + ", " + firstName.charAt(0) + ".");

       } else {

           System.out.println(lastName + ", " + firstName.charAt(0) + "." + middleName.charAt(0) + ".");

       }

   }

}

In this program, we use Scanner to read the input name consisting of the first name, middle name, and last name. Based on the presence or absence of the middle name, we format the output accordingly using if-else statements and string concatenation.

Make sure to save the program with the filename "NameFormat.java" and compile and run it using a Java compiler or IDE.

being the server administrator how often will you conduct a server maintenance?

Answers

Weekly server checks

Nonetheless, a weekly check is essential. Another check you should do weekly or even every two weeks is your disk usage. Again, disk usage rarely suddenly changes so it's not something you need to check every day. However running out of disk space can mean that your server breaks down.

Draw the truth table for the combinational logic below.

Draw the truth table for the combinational logic below.

Answers

In this truth table, F5 is true when there are an odd number of true inputs (x, y, and z).

How to solve

The circuit for the given expression A'BC + B'CD + BC'D:

Use three AND gates:

AND1: Connect A' (A inverted), B, and C

AND2: Connect B', C, and D

AND3: Connect B, C', and D

Use an OR gate:

OR1: Connect outputs of AND1, AND2, and AND3

The output of OR1 represents the given expression: A'BC + B'CD + BC'D.

Suppose that F5 can only be true when an odd number of inputs (x, y, and z) are true in the combinational logic that produces F5. This can be demonstrated using both an XOR gate and an AND gate.

F5 = (x ⊕ y) ⊕ z

Truth table:

x | y | z | F5

--+---+---+---

0 | 0 | 0 | 0

0 | 0 | 1 | 1

0 | 1 | 0 | 1

0 | 1 | 1 | 0

1 | 0 | 0 | 1

1 | 0 | 1 | 0

1 | 1 | 0 | 0

1 | 1 | 1 | 1

In this truth table, F5 is true when there are an odd number of true inputs (x, y, and z).

Read more about truth tables here:

https://brainly.com/question/28605215

#SPJ1

Patients and providers enter into contracts for specific services when an appointment is scheduled.

Discuss third-party privacy, security, and compliance guidelines that affect medical coding, and list examples. What errors can occur within security and compliance guidelines? Would you report the errors? If yes, please list why, and what outcome you would expect to see from reporting the errors.

Answers

When it comes to medical coding, third-party privacy, security, and compliance standards are crucial factors to take into account. These rules guarantee the confidentiality and security of patient data.

What sort of medical code would you use?

In this medical coding illustration, the coder must convert the details of the indications, medicine, and procedure into medical codes in accordance with the intervention radiology CPT codes after receiving a patient record on abscess drainage.

Which coding scheme is the primary cause of the health problems a region or community is experiencing?

The ICD-10-CM (International Classification of Diseases, 10th Revision, Clinical Modification) coding system links patient health issues to payer injuries, diseases, and conditions by using three- to seven-digit alphanumeric numbers to identify indications, symptoms.

To know more about coding visit:-

https://brainly.com/question/17293834

#SPJ1

Demonstrate the condition of a while loop that runs no more than five times using the variable x, which is initialized at x = 1.

Answers

Answer:

Python Code:

x = 1

while x <= 5:

# do something

x += 1 # then incriment

Java Code:

int x = 1;

do {

System.out.println(i);

x++;

}

while (x <= 5);

From the options given below, choose the lead that provides the most direct transverse plane view of the interventricular septum of the heart.
a. lead V1
b. lead V3
c. lead V5
d. lead V7

Answers

The interventricular septum of the heart can be seen most clearly in the transverse plane through lead V1.

Which leads track the electrical activity of the heart's frontal plane?

The strength of the electrical signal is measured in certain directions inside the frontal plane by the standard and augmented limb leads. The unipolar chest leads measure the potential difference between the chest's surface and an unrelated composite electrode.

Which precordial lead offers a transverse view of the anterior wall of the left ventricle?

Groups of the precordial chest leads can be used to see various parts of the heart. The anterior leads, also known as leads V1, V2, V3, and V4, collectively provide a clear view of the anterior region of the heart. Together, leads V5 and V6 scan the left ventricle's lateral wall.

To know more about transverse visit:-

https://brainly.com/question/13618693

#SPJ4

kali linux os and window os who is the best​

Answers

Answer:

Windows

Explanation:

It is down to preference. I prefer windows due to its large compatibility with a wide range of apps.

Answer:

It is only what you prefer

Explanation:

im doing programming with kali and i have no problems. although windows is more user friendly and what people use on a day to day, kali is for pentsters mostly.

can the charger of my laptop get infected with viruses also when it was connected to it?​

Answers

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

WHICH OF THESE COMMANDS ALLOWS YOU TO NAVIGATE TO THE OUTLINE FILE THAT WILL BE INTEGRATED INTO A PRESENTATION?

Answers

The question seems to be asking about commands that allow you to navigate to an outline file for integration into a presentation.

How to go about this?

However, without specific information about the software or tools being used, it is difficult to provide a specific command.

Generally, in presentation software like Microsoft PowerPoint, you can navigate to an outline file by going to the "File" menu, selecting "Open," and choosing the appropriate file.

Other presentation tools may have similar options to navigate to and open an outline file.

Learn more about command at:

https://brainly.com/question/25808182

#SPJ1

Using 5 bits to represent each number, write the representations of 7 and —7 in l's complement, signed magnitude, and 2's complement integers.

Answers

If every number is represented by five bits, then 7 = 00111 in each of the three systems, -7 = 11000 (1's complement), -10111 (signed magnitude), and 11001 (2's complement).

What is the signed binary equivalent of the number seven?

Binary 7 equals 111. With a binary number system, we only use the digits 0 and 1 to represent a number, as opposed to the decimal number system, which uses the digits 0 to 9. (bits).

What does the number 7 look like in the 2 complement?

Its possible values with 7 bits of 2's complement are -64 to 63. (Traditionally, 7 bits can only be used to represent data up to 2n-1, or 128; however, since the MSB is reserved for the sign, we could use 6 bits instead.) There will be 64 favourable results.

To know more about bits visit:-

https://brainly.com/question/30273662

#SPJ4

If you had to make a choice between studies and games during a holiday, you would use the _______ control structure. If you had to fill in your name and address on ten assignment books, you would use the ______ control structure.



The answers for the blanks are Selection and looping. Saw that this hasn't been answered before and so just wanted to share.

Answers

The missing words are "if-else" and "looping".

What is the completed sentence?

If you had to make a choice between studies and games during a holiday, you would use the if-else control structure. If you had to fill in your name and address on ten assignment books, you would use the looping control structure.

A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.

Learn more about looping:
https://brainly.com/question/30706582
#SPJ1

In this lab, you complete a partially written C++ program that includes a function that returns a value. The program is a simple calculator that prompts the user for two numbers and an operator ( +, -, *, or / ). The two numbers and the operator are passed to the function where the appropriate arithmetic operation is performed. The result is then returned to the main() function where the arithmetic operation and result are displayed. For example, if the user enters 3, 4, and *, the following is displayed: 3 * 4 = 12


The source code file provided for this lab includes the necessary variable declarations and input and output statements. Comments are included in the file to help you write the remainder of the program.


Instructions

1. Write the C++ statements as indicated by the comments.

2. Execute the program by clicking the Run button at the bottom of the screen.


The output works but I get 5 errors. I get a declared performOperation() error, and then I'm getting a Division, Multiplication, Addition and Subtraction error.

Code:

// Calculator.cpp - This program performs arithmetic, ( +. -, *. / ) on two numbers.

// Input: Interactive

// Output: Result of arithmetic operation


#include

#include


using namespace std;


// Write performOperation() function declaration here


int performOperation(double numberOne, double numberTwo, string op);

int main()

{

double numberOne, numberTwo;

string operation;

double result;

cout << "Enter the first number: ";

cin >> numberOne;

cout << "Enter the second number: ";

cin >> numberTwo;

cout << "Enter an operator (+.-.*,/): ";

cin >> operation;


// Call performOperation method here


result = performOperation(numberOne,numberTwo,operation);

cout << numberOne;

cout << " " << operation << " ";

cout << numberTwo;

cout << " = ";

cout << result << endl;

return 0;

} // End of main() function


// Write performOperation function here

int performOperation(double numberOne, double numberTwo,std::string(op)){

double result;

if (op == "+")

result = numberOne + numberTwo;

else if (op == "-")

result = numberOne - numberTwo;

else if (op == "*")

result = numberOne*numberTwo;

else if (op == "/")

result = numberOne/numberTwo;

else

cout<<"Wrong input. Please try again.";

return result;

}

Answers

Using the knowledge in computational language in C++ it is possible to write a code that  is a simple calculator that prompts the user for two numbers and an operator. The two numbers and the operator are passed to the function where the appropriate arithmetic operation is performed.

Writting the code:

#include <iostream>

#include <string>

using namespace std;

double performOperation(double num1, double num2,

string opt);

int main()

{

double numberOne, numberTwo;

string operation;

double result;

cout << "Enter the first number: ";

cin >> numberOne;

cout << "Enter the second number: ";

cin >> numberTwo;

cout << "Enter an operator (+.-.*,/): ";

cin >> operation;

result = performOperation(numberOne, numberTwo,

operation);

cout << numberOne;

cout << " " << operation << " ";

cout << numberTwo;

cout << " = ";

cout << result << endl;

return 0;

}

double performOperation(double num1, double num2,

string opt)

{

double res = 0.0;

if(opt == "+")

{

res = num1 + num2;

}

else if(opt == "-")

{

res = num1 - num2;

}

else if(opt == "*")

{

res = num1 * num2;

}

else if(opt == "/")

{

res = num1/num2;

}

return res;

}

See more about C++ at brainly.com/question/19705654

#SPJ1

In this lab, you complete a partially written C++ program that includes a function that returns a value.
In this lab, you complete a partially written C++ program that includes a function that returns a value.

which is a legal term which indicates an idea process or physical creation that come from the work of the mind

Answers

Answer:

copy right

Explanation:

don't copy right any major companys

Answer:

Intellectual property

Explanation:

Someone who expects other team members to work long hours is possibly from a _________ culture.

Participative
Competitive
Cooperative

Answers

Answer:

I'm pretty sure cooperative is the answer.

I hope this helps...

Have a nice day <3

Which of the following is NOT a criticism of the SMCR model of communication?

A. Communication is not a one way process.

B. There is no room for noise.

C. It is a rather complex model.

D. It is a linear model of communication.


Subject- media and information literacy

Answers

The transactional model of communication differs from the linear model in such a way that the transactional model. Therefore, C is the correct option.

What is communication?

Communication has been the way of communicating and interacting with another person in order to convey one’s thoughts on some topic. Communication is one of the most important soft skills for people in order to become socially intelligent.

Build stronger and more reliable relationships. There are a few models of communication which define different types of communication. The linear model sees it as a one-way process from sender to receiver.

Therefore, C is the correct option.

Learn more about socially intelligent on:

https://brainly.com/question/30458666

#SPJ9

One of the systems analysts on the project team thought that he did a good job of designing the company’s tech support webpage, but his supervisor isn’t so sure. His supervisor is concerned that the design is very similar to a page used by the company’s major competitor, and she asked him whether he had used any HTML code from that site in his design. Although the analyst didn’t copy any of the code, he did examine it in his web browser to see how they handled some design issues. The supervisor asked the analyst to investigate webpage copyright issues and report back to her. In his research, the analyst learned that outright copying would be a copyright violation, but merely viewing other sites to get design ideas would be permissible. What is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your opinion on this question: Even if no actual copying is involved, are there ethical constraints on how far you should go in using the creative work of others? How would you answer?

Answers

Explanation:

Although the system analyst only viewed the HTML code as a major competitor not outrightly copying their code, however, since there are relatively few legal frameworks on this matter, it important to note some ethical issues or constraints that may arise:

Copying the design pattern of the competitors' webpage may result in legal fillings by the competitors which may claim the other company stole its intellectual designs without permission.Such actions may result in other competitors carrying out the same strategy on the company.

A value is always positioned in what way in a cell

Answers

Answer:

=MATCH() returns the position of a cell in a row or column. Combined, the two formulas can look up and return the value of a cell in a table based on vertical and horizontal criteria.

Wendy Patel is entering college and plans to take the necessary classes to obtain a degree in architecture. Research the programs and apps that Wendy might use in her degree program and recommend a computer with sufficient hardware specifications to adequately support her through the degree program. Provide a link to the computer you locate and justify why you feel the computer will best meet her needs. Why did you choose the central processing unit

Answers

Answer:

Follows are the solution to this question:

Explanation:

If Windy needs to study and be a specialist in graphic designing for machines, I'm going to provide a windy link of the machine with such a 64 bit, 3-GHz Intel or AMD processor with an 8 GB  RAM, an OpenGL 4.1 chip, an inter-button cursor, a right thumbstick, or a storage drive with GB at least.  

All above description for the computer is suitable for windy because you would well be aware throughout the graphic designing, that may be learned through iRhino 3D (iOS), Autocad, Magical Plan, Morphoio trace, etc if you'd like to graduation in architecture. They require fast internet for each application, that can also be installed and installed, that  often requires a profile of all technical support programs as well as a web-only storage license.  As many of the above applies also runs through an AMD or six-bit intel, but not on the ARM processor or instance  iRhino 3D (iOS) isn't consistent with an Embedded system, I will select the processor like an Intel or 3GHz AMD processor.

A diagram of a ten-node network that uses ten routers

Answers

The diagram of the of a ten-node network that uses ten routers is given in the image attached.

What is a node in a network?

A network node is known to be be seen as the kind of connection point that is seen amidst some network devices such as routers, printers, etc.

Note that they are known to often receive and send data from one network or endpoint to another.

Therefore, The diagram of the of a ten-node network that uses ten routers is given in the image attached.

Learn more about routers from

https://brainly.com/question/24812743

#SPJ1

A diagram of a ten-node network that uses ten routers
A diagram of a ten-node network that uses ten routers

Accessing a computer system by using several words is known as​

Answers

Answer:

answer below

Explanation:

Multitasking is a common feature of computer operating systems. It allows more efficient use of the computer hardware; where a program is waiting for some external event such as a user input or an input/output transfer with a peripheral to complete, the central processor can still be used with another program.

Other Questions
write a tail recursive function sumtailrec : tree > int that sums up the node values. (hint: use an auxiliary function of type int > tree list > int ). ___________ describes a systematic, organized series of objective steps used for the purposes of research. Olive Garden:Chicken Alfredo + Soda Drink +Breadsticks + Dessert of YourChoiceTotal CaloriesTotal Grams of CarbsTotal Grams of SaltTotal Grams of FatTotal Grams of Protein Find x(will give brainlest) Write an equation that represents the graph it has been found that various types of mental health disorders may prove to be a predictor for the onset and development of substance abuse or addiction. Hemispheric specialization makes having a stroke on the ________ side of the brain _________ to recover from than the opposite side. which are not examples of indirect acquisition costs? multiple choice question. business disruption costs employee downtime costs hardware costs PLEASE HELP: In your sock drawer, you have 12 blue socks and 12 yellow socks. It is dark in the morning when you are getting dressed, and you can't see the color of the socks. What is the probability of randomly picking a blue sock? Which of these is Eliza's thesis statement? A car is traveling in a race. The car went from the initial velocity of 35 m/s to the final velocity of 65 m/s in 5 seconds. What is the acceleration? 0-13 m/s2 0-6 m/s2 0.6 m/s2 O 13 m/s2 The length of a rectangle is 4 in longer than its width.If the perimeter of the rectangle is 40 in, find its area. HELPPPPPPPPPPPPPPPPPPPPPPP find x and y pls help Which athlete from either in Canada or abroad would yourecommend as an ambassador for today's youth? When erosion or deformities occur to a rock layer and then new rock layers are laid on top, the boundary between the deformed layer and the new layer is called a(n)________.A. absolute dateB. unconformityC. igneous intrusionD. relative datePlease help me Place these events from "Let George Do It!" in the right sequence by choosing the correct step from each blue box.A strange feeling developed in his stomach."George, come with us for a ride," the boys called.They looked toward the shore and saw the large sand dunes."George, do you want to be like this always?"Tall, lanky George walked along the dusty path in Alderdale, Washington.George reached the boys, and with one quick jump, leaped into the boat.They were now approaching home.first: second: third: fourth: fifth: sixth: seventh: The product of two rational numbers I need help with my math work. what questions do you still have about trees and their relationship with carbon dioxide (co2 ) in the atmosphere?Please help