Answer: Provided in the explanation section
Explanation:
The question tells us to;
Complete the PizzaCaloriesPerSlice() function to compute the calories for a single slice of pizza. A Pizza Calories() function returns a pizza's total calories given the pizza diameter passed as an argument. A PizzaSlices() function returns the number of slices in a pizza given the pizza diameter passed as an argument.
The answer to this goes like this:
1.
totalCalories= pizzaCalories(pizzaDiameter);
Explanation: As mentioned in question pizzaCalories method will return total calories.
2.
caloriesPerSlice = totalCalories/pizzaSlices(pizzaDiameter);
Explanation: As mentioned in question pizzaSlices will return number of pizza slices . so dividing total calories by pizzaSlices() will give us caloriesPerSlice.
what is a data source in OLE?
Answer:
OLE DB Driver for SQL Server uses the term data source for the set of OLE DB interfaces used to establish a link to a data store, such as SQL Server. Creating an instance of the data source object of the provider is the first task of an OLE DB Driver for SQL Server consumer.
Explanation:
hope it helps you and give me a brainliest
5.4.2: While loop: Print 1 to N. Write a while loop that prints from 1 to user_num, increasing by 1 each time. Sample output with input: 4 1 2 3 4
Answer:
import java.util.Scanner;
class Main {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
System.out.println("Enter a number");
int user_num = in.nextInt();
int n = 1;
while(n <= user_num){
System.out.print(n+" ");
n++;
}
}
}
Explanation:
Import Scanner to receive user numberCreate and initalize a new variable (n) to be printed outSet the while condition to while(n <= user_num)Print the value of n after each iteration and increment n by 1Answer:
Written in Python:
i = 1
user_num = int(input()) # Assume positive
while i <= user_num:
print(i)
i += 1
Explanation:
What is the best way to delete a program that you downloaded that says that its open but its not opened in your screen? I will give Brainliest to whoever gets it right. Or whoever gets 10 votes and 5 thanks.
Answer:
Ctrl+Alt+Del and open Task Manager. Right-click and select End Process. Proceed with uninstalling the program as normal, now that the program has been closed.
Explanation:
Why was PC-A unable to access R1 via ssh?
Answer:
It could be that an ssh virtual terminal has not been configured for the port connected to PC-A
Explanation:
The computer network is an interconnection and intercommunication of computer devices to share resources. Intermediate devices like the Router and Switches are used to create physical and virtual connections between networks and nodes.
virtual connections like the default Telnet and the and more secure SSH are used to remotely communicate with intermediate devices for management purposes. For example, to use the ssh, the line vty and the specified virtual port range must be configured with a username, a password, an encryption key and other ssh features before a connection can be made.
Poor infrastructure hampers growth because it
Select one:
a. Reduces the mobility of labor
b. All are correct
c. Reduces the ability of export businesses
d. Causes higher costs and delays for businesses.
Answer:
B. All are correctExplanation:
Poor infrastructure causes higher supply costs and delays for businesses. It reduces labour mobility and hurts the ability of exporters to get products to global markets.
A customer comes into a computer parts and service store. The customer is looking for a device to provide secure access to the central server room using a retinal scan. What device should the store owner recommend to accomplish the required task?
Answer:
The owner should recommend facial ID or retinal scanner
In comparison to other biometric methods like fingerprint or retinal scans, it is quicker and more practical. Comparing facial recognition to typing passwords or PINs, there are also fewer touchpoints. Multifactor authentication is supported for a second layer of security check.
What secure access to central server room, a retinal scan?The topic of facial recognition has always caused controversy. The technology, according to its proponents, is a useful tool for apprehending criminals and confirming our identities. Critics argue that it violates privacy, may be inaccurate and racially prejudiced, and may even lead to unjustified arrests.
Simpleness of use and implementation. Once put into practice, both approaches are simple to utilize. However, facial recognition is basically possible with any camera (although a higher quality camera will be more accurate). Iris scanning is impossible with a standard camera, and the technology can be very expensive.
Therefore, The owner should recommend facial ID or retinal scanner.
Learn more about scan here:
https://brainly.com/question/24319849
#SPJ2
During which part of an examination are various body parts and organs touched and felt?
O Auscultation
Palpation
Inspection
Percussion
The correct answer is B. Palpation
Explanation:
In a medical exam or similar, the palpation involves touching different parts of the body to feel the organs and structures in this. This process is essential in diagnosis because palpation can reveal inflammation, pain in certain areas, or abnormalities. Additionally, palpation requires a broad knowledge of anatomy that allows health professionals to understand the structures of the body when they touch these and how to determine abnormalities. Thus, the part of an examination in which body parts are touched and felt is palpation.
Help , I need help with this question
The tag that has been discontinued in HTML5 is A. <basetext.
How to explain the informationThe <basefont> tag has been discontinued in HTML5. This tag was used to specify the base font size, face, and color for a web page.
In HTML5, it is recommended to use CSS to define the font styles instead of using deprecated font tags such as <basefont>. The <basetext> tag and <selects> tags are not valid HTML tags. However, the <textarea> tag is still a valid HTML tag in HTML5 and is used to create a multi-line text input field.
Learn more about html on
https://brainly.com/question/22241341
#SPJ1
5) Write a program to read text to end-of-file, and print a count of word lengths, i.e. the total number of words of length 1 which occurred, the number of length 2, and so on. Define a word to be a sequence of alphabetic characters. You should allow for word lengths up to 25 letters. A typical output should be like this: length 1 : 10 occurrences length 2 : 19 occurrences length 3 : 127 occurrences length 4 : 0 occurrences length 5 : 18 occurrences
Answer:
Explanation:
The following code is written in Python. It is a function that takes in the name of the file to be read and the size of the word. Then the function reads the file, removes whitespace and commas, splits the text into words, and scans the words for all the words that have the same length as the number passed. It counts all those words and prints out the number of occurrences of words of that length.
def countOccurrences(file_name, word_size):
f = open(file_name, 'r')
text = f.read()
text = text.replace(',', '')
split_text = text.split(' ')
occurrences = 0
for word in split_text:
if len(word) == word_size:
occurrences += 1
print("Length 1: " + str(occurrences) + " occurrences")
Jamal wants to download a software program that is free to use. What should he do?
Jamal should download the software from ??? and should then ???.
The Free website] install the software]
a reputable website] scan the download for viruses]
the first pop-up] copy the download on a flesh drive]
please just please help me
Answer:
The Free website] install the software]
a reputable website] scan the download for viruses]
THIS is the correct answer I think
I really need help with coderZ does anyone kno?
Answer:
Easy-to-use virtual robotics and STEM platform tailored to serve every student at every level!
CoderZ is a powerful, award-winning online platform.
Explanation:
CoderZ is a powerful, award-winning online platform through which students learn valuable STEM skills such as coding, robotics, and physical computing. CoderZ is highly flexible and designed for use in the classroom or through a wide range of remote learning environments. Computers and technology are everywhere. Studying science, technology, engineering and math gives kids valuable skills for the future and develop life-skills like computational thinking, critical thinking and problem-solving as well.
STEM and CS education focuses on how to approach complex problems, break down the challenges into small pieces and approach resolving them in a logical manner – critical skills for any career path.
online activities among businesses
Some of the online activities among businesses are:
SEO consultant. ...Web designer or web developer. ...Blogger. ...Virtual assistant. ...Affiliate marketer, etcWhat are Online Activities?This refers to the various activities that are done on the world wide web and is usually used by businesses to increase visibility, and in turn, revenue.
Hence, we can see that the use of online activities by businesses are important because the products and services for sale by businesses are advertised to target audiences through some of the aforementioned activities.
Read more about online activities among businesses here:
https://brainly.com/question/27172895
#SPJ1
QUESTION 9
Alex wants to center the title and his name on his cover page. Which of the following buttons should he press?
Alex if he wants to center the title and his name on his cover page, he has to press centered.
What are cover page?Cover pages is known to be the page that is made up of the title of sny article, books etc. It also include the name of your school, course name, etc.
Therefore, Alex if he wants to center the title and his name on his cover page, he has to press centered so as to be in the middle top of the document.
Learn more about cover page from
https://brainly.com/question/3602860
#SPJ1
following the 2012 olympic games hosted in london. the uk trade and envestment department reported a 9.9 billion boost to the economy .although it is expensive to host the olympics,if done right ,they can provide real jobs and economic growth. this city should consider placing a big to host the olympics. expository writing ,descriptive writing, or persuasive writing or narrative writing
The given passage suggests a persuasive writing style.
What is persuasive Writing?Persuasive writing is a form of writing that aims to convince or persuade the reader to adopt a particular viewpoint or take a specific action.
The given text aims to persuade the reader that the city being referred to should consider placing a bid to host the Olympics.
It presents a positive example of the economic benefits brought by the 2012 Olympic Games in London and emphasizes the potential for job creation and economic growth.
The overall tone and content of the text are geared towards convincing the reader to support the idea of hosting the Olympics.
Learn more about persuasive writing :
https://brainly.com/question/25726765
#SPJ1
Full Question:
Following the 2012 Olympic Games hosted in London, the UK Trade and Investment Department reported a 9.9 billion boost to the economy. Although it is expensive to host the Olympics, if done right, they can provide real jobs and economic growth. This city should consider placing a bid to host the Olympics.
What kind of writing style is used here?
A) expository writing
B) descriptive writing
C) persuasive writing
D) narrative writing
10. in cell r9, enter a formula using the averageif function and structured references to determine the average number of years of experience for lifeguards.
The given formula uses the AVERAGEIF function to calculate the average of the "Years of Experience" column in the "LifeguardData" table, but only for the rows where the "Job Title" column equals "Lifeguard".
What is formula for the AVERAGEIF?
Assuming that the data for the lifeguards is in a structured table with the column headers "Years of Experience" and "Job Title", and that the structured table is named "LifeguardData".
you can use the following formula in cell R9 to determine the average number of years of experience for lifeguards:
= AVERAGEIF(LifeguardData[Job Title], "Lifeguard", LifeguardData[Years of Experience])
This formula uses the AVERAGEIF function to calculate the average of the "Years of Experience" column in the "LifeguardData" table, but only for the rows where the "Job Title" column equals "Lifeguard".
The structured references LifeguardData[Job Title] and LifeguardData[Years of Experience] refer to the specific columns in the table, and make the formula more readable and easier to maintain.
To know more about excel, visit: https://brainly.com/question/24749457
#SPJ4
Which word-processing feature provides a quick way to execute commands without using your mouse?
Print Preview
Keyboard Shortcuts
Find and Replace
Spelling and Grammar
The word-processing feature that provides a quick way to execute commands without using your mouse are Keyboard Shortcuts. The correct option is B.
What are keyboard shortcuts?A hot key is a key or combination of keys on a computer keyboard that, when pressed all at once, performs a task (such as starting an application) faster than a mouse or other input device.
Hot keys are also known as shortcut keys. Many operating systems and applications support hot keys.
Click to start the selection, then hold down the left mouse button and drag the pointer over the text you want to select.
Click twice anywhere in the word. Click after moving the pointer to the left of the line until it changes to a right-pointing arrow.
Thus, the correct option is B.
For more details regarding keyboard shortcuts, visit:
https://brainly.com/question/12531147
#SPJ1
Answer:
its B Keyboard Shortcuts Explanation: i did the test ;/
If you delete search results, you will a. clear the history on the computer. b. delete files from our computer. c. modify the results. d. be unable to search again.
Answer:
a. clear the history on the compute
Explanation:
Corrine is writing a program to design t-shirts. Which of the following correctly sets an attribute for fabric? (3 points)
self+fabric = fabric
self(fabric):
self = fabric()
self.fabric = fabric
The correct option to set an attribute for fabric in the program would be: self.fabric = fabric
What is the programIn programming, defining an attribute involves assigning a value to a particular feature or property of an object. Corrine is developing a t-shirt design application and intends to assign a characteristic to the t-shirt material.
The term "self" pertains to the specific object (i. e the t-shirt) which Corrine is currently handling, as indicated in the given statement. The data stored in the variable "fabric" represents the type of material used for the t-shirt.
Learn more about program from
https://brainly.com/question/26134656
#SPJ1
A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose.
The physical topology which is best suited for this network connection is a star topology.
What is a topology?A topology can be defined as the graphical representation of the various networking devices that are used to create and manage a network connection.
The types of topology.
In Computer networking, there are six main types of topology and these include the following:
Bus topologyTree topologyHybrid topologyRing topologyMesh topologyStar topologyA star topology refers to a type of topology in which each networking device is physically connected to a central node such as a hub, router, or switch, which are typically acting as connecting nodes.
Read more on topology here: https://brainly.com/question/17036446
Your network uses basic authentication that centers on usernames and passwords. However, you have two ongoing problems: Usernames and passwords are frequently lost by negligent users, and hackers have, on occasion, fooled employees into giving up their authentication information. Identify two things you can do to strengthen the use of basic username and password authentication.
The use of simple username and password authentication can be strengthened by utilizing a one-time password OTP and three-factor authentication.
How are users recognized and authenticated by operating systems?Passwords, physical identification, and biometrics are the three methods that operating systems often employ to identify and authenticate users. The explanations for these are provided below. Passwords: The most popular and widely used authentication method is password verification.
Why is a login and password required?It's likely that you've been prompted to choose a username and password each time you joined up for a website. Some users may set up their accounts without giving the credentials they chose much care because this procedure is so commonplace now.
To learn more about authentication visit:
brainly.com/question/29752591
#SPJ1
Which four of the following are true about fair use?
D,C,B
Should be the correct answers. I'm not the best when it comes to copyright but I believe those are correct.
You have a Direct Mapped cache with following parameters
Cache Data Size (C) 128
Block Size (b) 4
After partitioning the address, which is 32 bits big, into Tag, Set, and Offset, how many bits will be in each field?
Write a program that prompts the user to enter two points (x1, y1) and (x2, y2) and displays their distance between them. The formula for computing the distance is: Square root of ((x2 - x1) squared + (y2 - y1) squared) Note that you can use pow(a, 0.5) to compute square root of a.
Answer:
x1 = input("enter x value of first number: ")
y1 = input("enter y value of first number: ")
x2 = input("enter x value of second number: ")
y2 = input("enter y value of second number: ")
ans = (float(x2)-float(x1))**2 + (float(y2)-float(y1))**2
ans = pow(ans, 0.5)
print(ans)
Write a function called line_numberthat takes as parameters two strings representing file names. Assume these are text files. The function reads the file indicated by the first parameter and writes its lines prefixed by the line number to the file represented by the second parameter.The function must have a proper docstring and annotations. Use try/except and in case of an error print a user-friendly message to the terminal and re-raise the exception.
Answer:
yeah i have no clue
Explanation:
In Java Please
4.24 LAB: Print string in reverse
Write a program that takes in a line of text as input, and outputs that line of text in reverse. The program repeats, ending when the user enters "Done", "done", or "d" for the line of text.
Ex: If the input is:
Hello there
Hey
done
the output is:
ereht olleH
yeH
The program that takes in a line of text as input, and outputs that line of text in reverse is given
The Programimport java.util.Scanner;
public class ReverseString {
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
String line;
do {
line = input.nextLine();
if (!line.equalsIgnoreCase("done") && !line.equalsIgnoreCase("d")) {
String reversed = reverseString(line);
System.out.println(reversed);
}
} while (!line.equalsIgnoreCase("done") && !line.equalsIgnoreCase("d"));
}
public static String reverseString(String text) {
StringBuilder reversedText = new StringBuilder();
for (int i = text.length() - 1; i >= 0; i--) {
reversedText.append(text.charAt(i));
}
return reversedText.toString();
}
}
Read more about programs here:
https://brainly.com/question/30783869
#SPJ1
Create a program that will read in a Salesperson name, employment status (1=Full-time AND 2=Part-time) and the sales amount.
In the Output, display the salesperson name along with the commission amount earned. The commission rate for full-time is 4% while for part-time is 2%.
Lastly, your program must also display the text “You have exceeded the sales quota!” if the following conditions are met:
Full-time and sales is over 1000
Part-time and sales is over 500
Use the Console for the Input and Output.
Answer:
Written using Python
name = input("Name: ")
print("1 for Full time and 2 for Part time")
status = int(input("Status: "))
sales = float(input("Sales Amount: "))
if status == 1:
commission = 0.04 * sales
else if status == 2:
commission = 0.02 * sales
print(name)
print(commission)
if status == 1 and sales>1000:
print("You have exceeded the sales quota!")
if status == 2 and sales>500:
print("You have exceeded the sales quota!")
Explanation:
I've added the full source code as an attachment where I used comments to explain some lines
The material to be broadcast and the way it's arranged is called __________. (10 letters)
Answer:
journalism
Explanation:
The material to be broadcast and the way it's arranged is called bulletin or news highlights.
What is News broadcasting about?This is known to be a way that is often used in the sharing or broadcasting of different kinds of news events through the television, radio, etc.
Conclusively, Note that the content can be material or bulletins that pertains to sports coverage, weather forecasts etc. that are often reported.
Learn more about broadcast from
https://brainly.com/question/9238983
#SPJ1
How would I set up the code in c++ to read a txt file and store the data? I have the math and the array set up, just not that bit.
In C++, we use the ifstream class to open the file "example.txt". We then use a while loop to read each line of the file into the line variable. Finally, we print each line using the cout statement.
How can C++ be used to read a txt file and store the data?To read a text file and store the data in C++, you can use the following steps:
Include the necessary libraries: #include <iostream> and #include <fstream>Declare a file stream object: std::ifstream file;Open the file: file.open("filename.txt");Check if the file is open: if (!file.is_open()) { //handle error }Declare variables to store the data from the file: int number; or std::string word;Read the data from the file using a loop: while (file >> number) { //store data } or while (std::getline(file, word)) { //store data }Close the file: file.close();Learn more about C++ at: https://brainly.com/question/28959658
#SPJ1
he ________ feature, located on the Ribbon, allow you to quickly search for commands or features.
Answer:
The Quick Access Toolbar feature, located on the Ribbon, allow you to quickly search for commands or features.
.
The Quick Access Toolbar feature, located on the Ribbon, allow you to quickly search for commands or features.
Where is the Quick Access toolbar?Shortcuts to frequently used features, options, actions, or option groups are gathered in the Quick Access Toolbar. In Office programs, the toolbar is typically buried beneath the ribbon, but you can opt to reveal it and move it to appear above the ribbon.
Note that a toolbar that may be customized and contains a set of actions that are not dependent on the tab that is now shown is called the Quick Access Toolbar (QAT). It can be found in one of two locations: left upper corner, over the ribbon (default location) under the ribbon in the upper-left corner.
Learn more about Quick Access Toolbar from
https://brainly.com/question/13523749
#SPJ1
A Quicksort (or Partition Exchange Sort) divides the data into 2 partitions separated by a pivot. The first partition contains all the items which are smaller than the pivot. The remaining items are in the other partition. You will write four versions of Quicksort:
• Select the first item of the partition as the pivot. Treat partitions of size one and two as stopping cases.
• Same pivot selection. For a partition of size 100 or less, use an insertion sort to finish.
• Same pivot selection. For a partition of size 50 or less, use an insertion sort to finish.
• Select the median-of-three as the pivot. Treat partitions of size one and two as stopping cases.
As time permits consider examining additional, alternate methods of selecting the pivot for Quicksort.
Merge Sort is a useful sort to know if you are doing External Sorting. The need for this will increase as data sizes increase. The traditional Merge Sort requires double space. To eliminate this issue, you are to implement Natural Merge using a linked implementation. In your analysis be sure to compare to the effect of using a straight Merge Sort instead.
Create input files of four sizes: 50, 1000, 2000, 5000 and 10000 integers. For each size file make 3 versions. On the first use a randomly ordered data set. On the second use the integers in reverse order. On the third use the
integers in normal ascending order. (You may use a random number generator to create the randomly ordered file, but it is important to limit the duplicates to <1%. Alternatively, you may write a shuffle function to randomize one of your ordered files.) This means you have an input set of 15 files plus whatever you deem necessary and reasonable. Files are available in the Blackboard shell, if you want to copy them. Your data should be formatted so that each number is on a separate line with no leading blanks. There should be no blank lines in the file. Even though you are limiting the occurrence of duplicates, your sorts must be able to handle duplicate data.
Each sort must be run against all the input files. With five sorts and 15 input sets, you will have 75 required runs.
The size 50 files are for the purpose of showing the sorting is correct. Your code needs to print out the comparisons and exchanges (see below) and the sorted values. You must submit the input and output files for all orders of size 50, for all sorts. There should be 15 output files here.
The larger sizes of input are used to demonstrate the asymptotic cost. To demonstrate the asymptotic cost you will need to count comparisons and exchanges for each sort. For these files at the end of each run you need to print the number of comparisons and the number of exchanges but not the sorted data. It is to your advantage to add larger files or additional random files to the input - perhaps with 15-20% duplicates. You may find it interesting to time the runs, but this should be in addition to counting comparisons and exchanges.
Turn in an analysis comparing the two sorts and their performance. Be sure to comment on the relative numbers of exchanges and comparison in the various runs, the effect of the order of the data, the effect of different size files, the effect of different partition sizes and pivot selection methods for Quicksort, and the effect of using a Natural Merge Sort. Which factor has the most effect on the efficiency? Be sure to consider both time and space efficiency. Be sure to justify your data structures. Your analysis must include a table of the comparisons and exchanges observed and a graph of the asymptotic costs that you observed compared to the theoretical cost. Be sure to justify your choice of iteration versus recursion. Consider how your code would have differed if you had made the other choice.
The necessary conditions and procedures needed to accomplish this assignment is given below. Quicksort is an algorithm used to sort data in a fast and efficient manner.
What is the Quicksort?Some rules to follow in the above work are:
A)Choose the initial element of the partition as the pivot.
b) Utilize the same method to select the pivot, but switch to insertion sort as the concluding step for partitions that contain 100 or fewer elements.
Lastly, Utilize the same method of pivot selection, but choose insertion sort for partitions that are of a size equal to or lesser than 50 in order to accomplish the task.
Learn more about Quicksort from
https://brainly.com/question/29981648
#SPJ1