In this exercise, you will write a class that represents how you spend your time during the week The class should have four double instance variables . . sleep fun School sports These variables will track the number of hours you spend doing each of these activites in a single day, respectively The class should also have the following methods • A constructor that has no parameters public void setsleept double hours Sleep) public vold setFun(double hourstun public void set School(double hours School) public void set Sports (double hours Sports) mbate vota print Total) The constructor should initialize all of the instanco variables to 0 The methods that begin with "set" set the values of the corresponding instance variables to the value of the parameter The last method should print the total number of hours per week you spend doing each of these activities Note you will have to calculate the weekly hours by using the daily hours stored in the instance variables. It should also print the . . . . public void set School Buble hours School) Dublic void set Sports (double hours Sports) Dublic vota print Total The constructor should initialize all of the instance valables to o The methods that begin with "set" set the values of the corresponding instance variables to the value of the parameter The last method should point the total number of hours per week you spend doing each of these activities Note you will have to calculate the weekly hours by using the daily hours stored in the instance variables it should also print the total number of hours in the week accounted for and how many hours are left over Here is an example of the output of print Totate 3, chool - 8 = 2 and sports = 3 Weekly Totais STED School Dort Funt Ora Tot turto 0

Answers

Answer 1

Answer:

Answered below

Explanation:

# Program is written in Java

class WeekHours{

double school;

double fun;

double sleep;

double sports;

WeekHours( ){

school = 0.0;

fun = 0.0;

sleep = 0.0;

sports = 0.0;

}

public void setSchool ( double x){

school = x;

}

public void setFun( double y){

fun = y;

}

public void setSleep( double w){

sleep = w;

}

public void setSports( double z){

sports = z;

}

public void totalHours(){

double tHours = school + fun + sleep + sports;

System.out.print(tHours);

}

}


Related Questions

Create a program which takes two integers as input from the command line. In your code, allocate space for a 2D array dependent on user input. For example, if they enter 30 40 then your program should allocate space using double **. Once the memory is allocated, initialize the data by setting the value at index (i, j) equal to its position a

Answers

Answer:

In C:

#include <stdio.h>

#include <stdlib.h>

int main() {

int r,c;

printf("Row: "); scanf("%d", &r);

printf("Cols: "); scanf("%d", &c);  

double *myarr = (int *)malloc(r * c * sizeof(int));

double inputs = 0.0;

for (int rww = 0; rww < r; rww++){

for (int ccl = 0; ccl < c; ccl++){

 inputs= inputs+1.0;

 *(myarr + rww*ccl + ccl) = inputs; }}

return 0;}

Explanation:

This declares the rows and columns as integers

 int r,c;

This gets the number of rows

printf("Row: "); scanf("%d", &r);

This gets the number of columns

printf("Cols: "); scanf("%d", &c);  

This dynamically allocate space for array myart

double *myarr = (int *)malloc(r * c * sizeof(int));

This initializes the inputs to the array to 0.0

double inputs = 0.0;

This iterates through the array and initializes each element of the array by its index

for (int rww = 0; rww < r; rww++){

for (int ccl = 0; ccl < c; ccl++){

 inputs= inputs+1.0;

 *(myarr + rww*ccl + ccl) = inputs; }}

Write a program whose input is two integers. Output the first integer and subsequent increments of 10 as long as the value is less than or equal to the second integer. Ex: If the input is: -15 30 the output is: -15 -5 5 15 25

Answers

Answer:

Explanation:

The following program is written in Python. It asks the user for two number inputs. Then it creates a loop that prints the first number and continues incrementing it by 10 until it is no longer less than the second number that was passed as an input by the user.

number1 = int(input("Enter number 1: "))

number2 = int(input("Enter number 2: "))

while number1 < number2:

   print(number1)

   number1 += 10

Write a program whose input is two integers. Output the first integer and subsequent increments of 10

Infringement Less than 13km/h over the speed limit At least 13km/h but not more than 20km/h over the speed limit More than 20km/h but not more than 30km/h over the speed limit More than 30km/h but not more than 40km/h over the speed limit More than 40km/h over the speed limit Penalty amount $177 $266 $444 $622 $1.245 Demerit points 1 3 4 6 8 Note: the way the government website has written this (and we've copied it) is NOT efficient in terms of decision structures. This written for each condition to stand alone (if, if, if) but we can tell its mutually exclusive and so know a better tool for the job don Avoid a 6-month suspension by writing a program to ask for the user's: • speed and the • speed limit
program in python?​

Answers

The example of the program in Python to help one to calculate the penalty amount as well as the demerit points based on the speed and speed limit provided by the user is given in the code below

What is the program?

python

def calculate_penalty(speed, speed_limit):

   penalty_amount = 0

   demerit_points = 0

   if speed <= speed_limit:

       return penalty_amount, demerit_points

   overspeed = speed - speed_limit

   if overspeed <= 13:

       penalty_amount = 177

       demerit_points = 1

   elif overspeed <= 20:

       penalty_amount = 266

       demerit_points = 3

   elif overspeed <= 30:

       penalty_amount = 444

      demerit_points = 4

   elif overspeed <= 40:

       penalty_amount = 622

       demerit_points = 6

   else:

       penalty_amount = 1245

       demerit_points = 8

   return penalty_amount, demerit_points

# Get user input

speed = int(input("Enter the recorded speed (in km/h): "))

speed_limit = int(input("Enter the speed limit (in km/h): "))

# Calculate penalty and demerit points

penalty, points = calculate_penalty(speed, speed_limit)

# Display the results

print("Penalty amount: $", penalty)

print("Demerit points: ", points)

Read more about python here:

https://brainly.com/question/30113981

#SPJ1

ers. ADOMS TRONSK To Find the sum, differnce, multiplication, division and modular division of given two numbers.​

ers. ADOMS TRONSK To Find the sum, differnce, multiplication, division and modular division of given

Answers

Answer:

Adam trunks

Explanation:

You just bought a new router to replace your old one.
Your Laptop is able to connect to your router
wirelessly BUT you're not able to browse the internet,
download or even send email.
In what order would you arrange these steps for a
sequential reboot?
1. Connect the laptop wirelessly and try
browsing again
2. Power up the router
3. Turn off both modem and the router
4. Reset the Network cable between the router
and the modem; check for other loosecables
5. Power up the modem

Answers

The orders that you would you to arrange these steps for a sequential reboot are;

Power up the router.Power up the modem.Reset the Network cable between the router and the modem; check for other loose cables. Turn off both modem and the router.Connect the laptop wirelessly and try browsing again.

What does a router work for?

A router is known to function by putting communication in place  between computer networks.

Note that a  router often takes data packets from devices and moves them to the right place and the steps above is the right steps.

Learn more about router from

https://brainly.com/question/14449935

Answer: 3, 5, 2, 4, 1

Explanation:

First, you turn both router and modem off.

The modem gets turned on first followed by the router. Reset the network cables to establish successful routing, next you turn on the router. and lastly, you connect laptop and try browsing again.

Use the drop-down menus to complete statements about how to use the database documenter

options for 2: Home crate external data database tools

options for 3: reports analyze relationships documentation

options for 5: end finish ok run

Use the drop-down menus to complete statements about how to use the database documenteroptions for 2:

Answers

To use the database documenter, follow these steps -

2: Select "Database Tools" from   the dropdown menu.3: Choose "Analyze"   from the dropdown menu.5: Click on   "OK" to run the documenter and generate the desired reports and documentation.

How is this so?

This is the suggested sequence of steps to use the database documenter based on the given options.

By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.

Learn more about database documenter at:

https://brainly.com/question/31450253

#SPJ1

I don't know who to do this assignment
An employee’s total weekly pay equals the hourly wage multiplied by the total number of regular hours plus any overtime pay. Overtime pay equals the total overtime hours multiplied by 1.5 times the hourly wage. Write a program that takes as inputs the hourly wage, total regular hours, and total overtime hours and displays an employee’s total weekly pay.

Answers

Python:

wage=int(input("What the hourly wage?: "))

total_reg_hours=int(input("Enter total regular hours: "))

total_over_hours=int(input("Enter total overtime hours: "))

#Calculate the weekly pay.

print("The weekly pay of this employee is ",(total_reg_hours*wage)+(total_over_hours*(1.5*wage)))

C++:

#include <iostream>

int main(int argc, char* argv[]) {

   int wage,t_reg,t_over;

   std::cout << "Enter wage: "; std::cin>>wage;

   std::cout << "\nEnter total regular hours: "; std::cin>>t_reg;

   std::cout << "\nEnter total overtime hours: "; std::cin>>t_over;

   

   //Calculate the weekly pay.

   std::cout << "The weekly pay of this employee is " << (t_reg*wage)+(t_over*1.5*wage) << std::endl;

   return 0;

}

by identifying the fields within a bin by identifying the fields with a tooltip incorrect tooltips are text boxes that appear when hovering over a mark on a sheet, to provide more information. by identifying the fields that each sheet has in common by identifying the fields within a crosstab

Answers

To access the Tooltip Editor in the source sheet, click the Tooltip button in the Marks card. In the Tooltip Editor, select Insert from the menu. Choose Sheets from the Insert menu, then pick a target sheet.

In Tableau, which of the following approaches is appropriate for bolding the tooltip content?

Right-click, select Format, and then, beneath the worksheet's normal formatting, select Tooltip and Bold. Choose bold under Analysis, Tooltip choices.

In Tableau, how do I add a tooltip to a text box?

By choosing the Tooltip option from the Marks shelf, you may add a tooltip. Place the visual you made for this blog post above the relevant textbox on the dashboard where you want the tooltip to appear. You  should now have a textbox with a tooltip that appears when you hover over it.

To know more about Tooltip visit:-

https://brainly.com/question/9409585

#SPJ4

Qa Defind Networking and its importance to an organization. ​

Answers

Networking is crucial for an organization as it enables effective communication, collaboration and resource sharing among employees and external stakeholders.

Why is networking important for organizational success?

Networking plays a vital role in organizational success by fostering connections and facilitating the flow of information and resources. It allows employees to collaborate, share knowledge, and leverage each other's expertise leading to increased productivity and innovation.

But networking extends beyond the organization, enabling partnerships, customer acquisition, and business opportunities. By establishing a robust network, organizations can tap into a diverse pool of talents, stay updated with industry trends and build a strong reputation within their respective sectors.

Read more about Networking

brainly.com/question/1326000

#SPJ1

Pseudocode finding the sum of the number 12, 14, 16

Answers

Answer:

Pseudocode:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Iterate over each number in the 'numbers' array.

  3.1 Add the current number to the 'sum' variable.

4. Print the value of 'sum'.

Alternatively, here's an example of pseudocode using a loop:

1. Initialize a variable named 'sum' and set it to 0.

2. Create an array named 'numbers' containing the numbers 12, 14, and 16.

3. Initialize a variable named 'index' and set it to 0.

4. Repeat the following steps while 'index' is less than the length of the 'numbers' array:

  4.1 Add the value at the 'index' position in the 'numbers' array to the 'sum' variable.

  4.2 Increment 'index' by 1.

5. Print the value of 'sum'.

Explanation:

1st Pseudocode:

1. In the first step, we initialize a variable called 'sum' and set it to 0. This variable will be used to store the sum of the numbers.

2. We create an array named 'numbers' that contains the numbers 12, 14, and 16. This array holds the numbers you want to sum.

3. We iterate over each number in the 'numbers' array. This means we go through each element of the array one by one.

3.1 In each iteration, we add the current number to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

2nd Pseudocode using a loop:

1. We start by initializing a variable called 'sum' and set it to 0. This variable will store the sum of the numbers.

2. Similar to the first pseudocode, we create an array named 'numbers' containing the numbers 12, 14, and 16.

3. We initialize a variable called 'index' and set it to 0. This variable will be used to keep track of the current index in the 'numbers' array.

4. We enter a loop that will repeat the following steps as long as the 'index' is less than the length of the 'numbers' array:

4.1: In each iteration, we add the value at the 'index' position in the 'numbers' array to the 'sum' variable. This way, we accumulate the sum of all the numbers in the array.

4.2: We increment the 'index' by 1 to move to the next position in the array.

5. Finally, we print the value of the 'sum' variable, which will be the sum of the numbers 12, 14, and 16.

Write an application that combines several classes and interfaces.

Answers

Answer:

Explanation:

The following program is written in Java and it combines several classes and an interface in order to save different pet objects and their needed methods and specifications.

import java.util.Scanner;

interface Animal {

   void animalSound(String sound);

   void sleep(int time);

}

public class PetInformation {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       String petName, dogName;

       String dogBreed = "null";

       int petAge, dogAge;

       Pet myPet = new Pet();

       System.out.println("Enter Pet Name:");

       petName = scnr.nextLine();

       System.out.println("Enter Pet Age:");

       petAge = scnr.nextInt();

       Dog myDog = new Dog();

       System.out.println("Enter Dog Name:");

       dogName = scnr.next();

       System.out.println("Enter Dog Age:");

       dogAge = scnr.nextInt();

       scnr.nextLine();

       System.out.println("Enter Dog Breed:");

       dogBreed = scnr.nextLine();

       System.out.println(" ");

       myPet.setName(petName);

       myPet.setAge(petAge);

       myPet.printInfo();

       myDog.setName(dogName);

       myDog.setAge(dogAge);

       myDog.setBreed(dogBreed);

       myDog.printInfo();

       System.out.println(" Breed: " + myDog.getBreed());

   }

}

class Pet implements Animal{

   protected String petName;

   protected int petAge;

   public void setName(String userName) {

       petName = userName;

   }

   public String getName() {

       return petName;

   }

   public void setAge(int userAge) {

       petAge = userAge;

   }

   public int getAge() {

       return petAge;

   }

   public void printInfo() {

       System.out.println("Pet Information: ");

       System.out.println(" Name: " + petName);

       System.out.println(" Age: " + petAge);

   }

   //The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it

   Override

   public void animalSound(String sound) {

       System.out.println(this.petName + " says: " + sound);

   }

//The at (email symbol) goes before the Override keyword, Brainly detects it as a swearword and wont allow it

  Override

   public void sleep(int time) {

       System.out.println(this.petName + " sleeps for " + time + "minutes");

   }

}

class Dog extends Pet {

   private String dogBreed;

   public void setBreed(String userBreed) {

       dogBreed = userBreed;

   }

   public String getBreed() {

       return dogBreed;

   }

}

Write an application that combines several classes and interfaces.

1. Which tab on the ribbon includes tools for customizing pages in your document.

A. HOME
B. INSERT
C. LAYOUT
D. DESIGN

Answers

Answer:

the Font group on the Home tab contains commands for formatting text in your document

Explanation:

list down four ways to start word 2010​

Answers

1Locate the Word icon on the Start button's All Programs menu. Don't click to start Word now!
2Right-click the Microsoft Word 2010 menu item. A pop-up menu appears.
3Choose Send To→Desktop (Create Shortcut).
4Press the Esc key to hide the Start button menu and view the desktop.

Citi bike is an example of which arena of technology

Answers

Citi bike is an example of the arena of technology called Lyft.

What is Citi Bike?

Citi Bike is a privately owned public bicycle-sharing system that operates in the Bronx, Brooklyn, Manhattan, and Queens boroughs of New York City, as well as Jersey City and Hoboken, New Jersey.

It was managed by Motivate (previously Alta Bicycle Share), with former Metropolitan Transportation Authority CEO Jay Walder as CEO, until September 30, 2018, when the firm was bought by Lyft. Lyft technology is used in the system's bikes and stations.

The system surpassed 50 million rides in October 2017 and will reach 100 million rides in July 2020.

Learn more about Lyft:
https://brainly.com/question/28547867
#SPJ1

please note, my working hours may be different than yours. please don't feel obligated to respond outside of your normal business hours unless necessary.

Answers

A statement "please note, my working hours may be different than yours. please don't feel obligated to respond outside of your normal business hours unless necessary." this means that more benefit to change to flexible work.

What is flexible work?

Individual behavior describes the behaviors, responses, reactions, and ways in which a person behaves when they are in a certain situation. It consists of a variety of reactions to both internal and external stimuli. Individual habits and actions are frequently linked, either because of time restraints, resource accessibility, social connections, or biological inclinations. For instance, drinkers are more likely to smoke than non-drinkers, and physically unfit people are also less likely to make an effort to prepare meals at home.

Learn more about flexible work: https://brainly.com/question/29316477

#SPJ4

The following do-while loop is suppose to ask for the price for a gallon of gas. The price must a positive number. The price can be an integer value or a double value. for example the price can be 3 or 3.0 or 3.5.

To create a robust program, we must do the data validation and as long as the user is entering a negative value or a String, the program must keep asking the user to enter a valid input.

in this program you need to use some of the scanner methods listed here, make sure to use the proper ones: hasNextInt(), hasNextDouble(), hasNextLine(), hasNext(), nextInt(), nextDouble(), nextLine()

Must flush the buffer at the proper locations in the code

Answers

Answer:

import java.util.Scanner;

public class qs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       double price;

       do {

           System.out.print("Enter the price for a gallon of gas: ");

           while (!input.hasNextDouble()) {

               System.out.println("That's not a number!");

               input.next(); // this is important!

           }

           price = input.nextDouble();

       } while (price < 0);

       System.out.println("The price is " + price);

   }

}

The main issues covered by IT law are: Hardware licensing Data privacy Department security True False

Answers

The main issues covered by IT law are: Hardware licensing, Data privacy, Department security is a true statement.

What topics are addressed by cyber law?

There are three main types of cyberlaw:

Human-targeted crimes (e.g.: harassment, stalking, identity theft) Vandalism of property (e.g.: DDOS attacks, hacking, copyright infringement) The theft from the govt (e.g.: hacking, cyber terrorism)

Cyber law includes provisions for intellectual property, contracts, jurisdiction, data protection regulations, privacy, and freedom of expression. It regulates the online dissemination of software, knowledge, online safety, and e-commerce.

Note that some Internet security issues that must be considered are:

Ransomware Attacks. IoT Attacks. Cloud Attacks. Phishing Attacks.Software Vulnerabilities, etc.

Learn more about IT law from

https://brainly.com/question/9928756
#SPJ1  

Ranjan have received an email saying that he won a free gift project to climb the gift voucher Ranjana give some personal details suggest Bank account number Bank name exact graph which type of security threat is indicated in the mail? should he answer the mail?​

Answers

Response is a response everyone wants but sometimes don’t because they lie ahead

The company is especially concerned about the following:

Account management. Where will accounts be created and managed?

How will user authentication be impacted? Will users still be able to use their current Active Directory credentials to sign into their devices and still access resources on the local Active Directory network?

Securing authentication in the cloud.

Address the following based on the given information:

Explain how you can implement a Microsoft Intune device management solution and still allow Tetra Shillings employees to use their existing on premises Active Directory credentials to log onto the local network.

What controls and methods are available Azure Active Directory and Intune for controlling access to resources?

What Methods are available in Intune to detect when user accounts get compromised.

What actions can be taken to prevent compromised credentials from being used to access the network.

Answers

To implement a Microsoft Intune device management solution and still allow Tetra Shillings employees to use their existing on-premises Active Directory credentials to log onto the local network, Azure AD Connect can be used. Azure AD Connect is a tool that synchronizes on-premises Active Directory with Azure AD. This allows users to use their on-premises Active Directory credentials to log into Azure AD and access resources in the cloud. Once the synchronization is set up, users can use their existing credentials to sign into their devices and access resources on the local Active Directory network.
Azure Active Directory and Intune offer various controls and methods for controlling access to resources. Azure AD provides identity and access management capabilities such as conditional access, multi-factor authentication, and role-based access control. Intune allows the administrator to enforce device compliance policies, control access to company data, and secure email and other corporate apps on mobile devices. These controls can be applied to devices enrolled in Intune, ensuring that only authorized users can access company resources.
Intune offers several methods to detect when user accounts get compromised, including:
Conditional access policies: Intune allows administrators to create conditional access policies that can detect when a user account has been compromised based on various conditions such as location, device, and sign-in risk. If a policy violation is detected, the user can be prompted for additional authentication or access can be denied.
Device compliance policies: Intune can check devices for compliance with security policies such as encryption, passcode requirements, and device health. If a device is found to be non-compliant, access can be blocked until the issue is resolved.
Microsoft Defender for Identity: This is a cloud-based service that uses machine learning to detect suspicious activity and potential threats in real-time. It can alert administrators when a user account has been compromised and provide recommendations for remediation.
To prevent compromised credentials from being used to access the network, the following actions can be taken:
Enforce strong password policies: Intune allows administrators to enforce password policies such as length, complexity, and expiration. This can prevent attackers from guessing or cracking weak passwords.
Implement multi-factor authentication: Multi-factor authentication adds an extra layer of security by requiring users to provide additional information, such as a code sent to their phone or biometric data, to verify their identity. This can prevent attackers from using stolen credentials to access resources.
Monitor and respond to security events: Azure AD and Intune provide logs and alerts for security events. Administrators should regularly monitor these events and respond promptly to any suspicious activity.
Educate users: Employees should be educated on the importance of strong passwords, phishing prevention, and other security best practices to prevent attacks on their accounts.

Which of the following acronyms refers to a network or host based monitoring system designed to automatically alert administrators of known or suspected unauthorized activity?
A. IDS
B. AES
C. TPM
D. EFS

Answers

Answer:

Option A (IDS) is the correct choice.

Explanation:

Whenever questionable or unusual behavior seems to be detected, another alarm is sent out by network security equipment, which would be considered as Intrusion Detection System.SOC analysts as well as occurrence responders can address the nature but instead, develop a plan or take steps that are necessary to resolve it predicated on such notifications.

All other three alternatives are not related to the given query. So the above option is correct.

Given class Triangle (in file Triangle.java), complete main() to read and set the base and height of triangle1 and of triangle2, determine which triangle's area is larger, and output that triangle's info, making use of Triangle's relevant methods. Ex: If the input is: 3.0 4.0 4.0 5.0 where 3.0 is triangle1's base, 4.0 is triangle1's height, 4.0 is triangle2's base, and 5.0 is triangle2's height, the output is: Triangle with larger area: Base: 4.00 Height: 5.00 Area: 10.00

Answers

Answer:

The Triangle.java file is not provided; However, the program is as follows;

Comments are used for explanatory purpose

Also see attachment for Triangle.java program file

import java.util.*;

public class triangle

{

public static void main(String [] args)

{

 Scanner input = new Scanner(System.in);

 //Declare variables

 double base1, height1, base2, height2;

 //Prompt user for inputs

 System.out.println("Provide values for the base and height of the two triangles");

 System.out.print("Base of Triangle 1: ");

 base1 = input.nextDouble();

 System.out.print("Height of Triangle 1: ");

 height1 = input.nextDouble();

 System.out.print("Base of Triangle 2: ");

 base2 = input.nextDouble();

 System.out.print("Height of Triangle 2: ");

 height2 = input.nextDouble();

 //Compare and Print Results

 if(0.5 *base1 * height1 > 0.5 * base2 * height2)

 {

  System.out.print("Triangle with larger area: Base: "+base1+" Height: "+height1+" Area: "+(0.5 * base1 * height1));

 }

 else

 {

  System.out.print("Triangle with larger area: Base: "+base2+" Height: "+height2+" Area: "+(0.5 * base2 * height2));

 }

}

}

which refers to the sets of rules that outline specification of dimensions design of operation materials and performance or describe quality of materials products or systems?​

Answers

Answer:

Standards

Explanation:

STANDARDS can simply be defined as a set of guideline, rules or laydown rules to follow either during a manufacturing process or production process among others.

For Example A company or an organization that want to produce a quality goods or products has to have a laydown STANDARDS which will serve as a guideline during the production process such as the quality and quantity of materials they are to use , specification of the materials to use, the type and description of materials to use which will inturn enable them to produce quality goods due to the already lay down STANDARDS or rules which the company or organization followed.

2. How can recovery handle transaction operations that do not affect the database, such as the printing of reports by a transaction?

Answers

Answer:

Explanation:

great question but dont know

What is the concept of Object Oriented Programming?

Answers

Answer:

concept of "objects", which can contain data and code

Explanation:

Object-oriented programming (OOP) is a programming paradigm based on the concept of "objects", which can contain data and code: data in the form of fields (often known as attributes or properties), and code, in the form of procedures (often known as methods).

As for this type of definition question, you can find many related questions on the Internet.

Which of the following is a predefined procedure that returns a value?

A. Clipboard
B. mode indicator
C. Function

Answers

A predefined procedure that returns a value is called a: C. Function

A function can be defined as a set of commands (instructions) which can be run on a computer by calling it by its name. Thus, you can run series of command (instruction) as a function by calling its name.

In Computer programming, a group of organized, reusable series of command (instruction) that are written to instruct a computer for the performance of a particular task is generally referred to as a function.

Generally, a function is characterized by the following;

A function accepts data as an input.A function processes data.It returns a single output or a set of results depending on the code.

In conclusion, a function is a predefined procedure that returns a value or series of value and it can be used to perform a single but related action.

Read more: brainly.com/question/23838498

A small office providing television services in Chicago has contacted Mark, a network administrator, to set up a network connection for their operations. The total strength of devices will not exceed 10, and so Mark decides that a LAN connection is all that is required for their functionality. Mark, however, wants to ensure that the devices are connected centrally, and for this purpose he plans on installing a central switch. Analyze which physical topology is best suited for this purpose.

Answers

The physical topology which is best suited for this network connection is a star topology.

What is a topology?

A topology can be defined as the graphical representation of the various networking devices that are used to create and manage a network connection.

The types of topology.

In Computer networking, there are six main types of topology and these include the following:

Bus topologyTree topologyHybrid topologyRing topologyMesh topologyStar topology

A star topology refers to a type of topology in which each networking device is physically connected to a central node such as a hub, router, or switch, which are typically acting as connecting nodes.

Read more on topology here: https://brainly.com/question/17036446

a place where people study space​

Answers

Answer:

a place where people study space is a Spacey agent

Explain IoT Protocol stack?

Answers

Explanation:

IoT stands for the Internet Of Things. We are very good at many communication technologies, such as WIFI, BLUETOOTH, 3G/2G/4 G, and now 5 G is coming in the market, but there are several fresh waves networking choices on the market. The IoT system can only operate and transfer data online if the two devices are linked securely from the communication network. What makes it possible for such a link? IoT standards and protocols consist of an unseen language that allows physical objects to “speak” among themselves. General protocols used for computers, smartphones or tablets may not meet IOT-based solutions ‘ specific conditions.

What is the name of a coding sequence that is executed multiple times in a program?

Answers

Answer:

Loop, or Iterator

Explanation:

For example, a "for" loop or a "while" loop to create a block of code that will execute a certain number of times.

Answer:

C - a loop

Explanation:

on edge pls mark brainiest

A LinkedIn profile is required to be able to share your work experience and qualifications with potential employers.

True
False

Answers

Answer:

False

Explanation:

A LinkedIn profile is not required.

Other Questions
1. What seem to be the key ideas in Adichie's narrative? What turning points do you see? 12 5 x-10 what is the value of x The Indian population began to dwindle because of disease so the Catholic priests moved the people to _______ Moving to another question will save this response. Question 2 Compare and contrast the new direct marketing model with the traditional direct marketing model. For the toolbar, press ALT+F10 (PC) or A Why did Macbeth kill Duncans guards after killing Duncan? In the play Macbeth Mrs. Mack teaches three art classes, and there are 30 students in each dass. She has a supplyof 150 sheets of paper. For an upcoming project each student will use one sheet of paper. What fraction of the paper will be used by all three classes? Jason sends an email to Tyson using his smartphone, who reads it on his tablet PC. Which of the following best explains how the email travelled from Jasons smartphone to Tysons tablet PC?Answer: A. Jasons smartphone - network interface card - router - network interface card - Tysons tablet PC Find the least number which when divided by 12,20 and 36 leaves a remainder 11 in each case? Which section organizes assigns and supervisors tactical response resources? What are human emotions test? The following question references the novel The Three Musketeers by Alexandre Dumas.Trifle- a matter, affair, or circumstance of little importance or significance. D'Artagnan reported to Athos that he had saved the Queen, been rewarded with a ring, and received favor from Madame Bonacieux. Athos replied "Trifles, nothing but trifles". D'Artagnan attributed this attitude to the fact that Athos had never been in love. Knowing that Athos had once been in love with and married to Milady, why do you think he reacted so nonchalantly to D'Artagnan? How much work does the electric field do in moving a -6.4x10-6 charge from ground to a point whose potential is 92 V higher? From the mid-1950s until 1975, a war raged in the Southeast Asian country of Vietnam. U.S. involvement in that conflict divided America. Some people supported the war, while others were fiercely against it. More than fifty-eight thousand U.S. troops and other military personnel died in Vietnam. Those who survived often felt disrespected when they came home. By the late 1970s, however, people began to recognize that no matter how they felt about the war, the bravery and sacrifice of those who fought should be recognized. In 1979, Vietnam veterans Jan Scruggs and Robert Doubek started the Vietnam Veterans Memorial Fund (VVMF). They wanted to create a memorial to honor those who had fought in the war and to provide a space for Americans to grieve and heal. The memorial design was chosen through a contest. The contest rules stated that the designs should not contain political statements and that they should include the names of all Americans who had died in the war or remained missing. The judges were well-known architects, city planners, and other professionals. Designs were submitted "blindly," meaning that the judges didn't know who the designers were. To many people's surprise, the winner of the contest was a twenty-one year old student named Maya Lin. At the time, Lin was still studying architecture and was not yet a professional designer. At first glance, Lin's design seemed simple: it was a V-shaped wall made of smooth, dark granite, inscribed with the name of every American who had died or gone missing in the war. Lin wanted the memorial to be a symbol of the great loss of life during the war. She also envisioned a place where people could come to remember, reflect, and feel a sense of peace. The Vietnam Memorial Wall that Maya Lin designed was installed in Constitution Gardens in Washington, D.C. One arm of the wall extends toward the Lincoln Memorial, while the other points toward the Washington Monument. The center of the wall is over ten feet high, while the farthest ends of the arms rise just eight inche Solve for p.19 < 1(p + 1) many vegetable oils contain large amounts of: short-chain fatty acids. saturated fatty acids. omega-6 polyunsaturated fatty acids. omega-3 polyunsaturated fatty acids. In the market for a product, there are 100 identical competitive firms, each firm having the cost function c(q)=72+8q+0.5q2 where q is the quantity of output in tons produced by each firm. The market demand curve is given by Qd=3200100p (a) Find the market equilibrium price p and quantity produced by each firm, q. (b) The government imposes a tax of $2 per unit of output produced on each seller. What will be the market equilibrium price in the long run, plr, after entry or exit following the tax? (c) How many firms will enter or exit? i have another question which ive been stuck for out of 35 questions Respond by (1) Identifying the type of syllogism below (Categorical, Disjunctive, Conditional) and (2) explain, in your own words, why the structure of the syllogism may be correct, but the conclusion could be false.Major Premise: If the sidewalk is wet, then it must have just rained.Minor Premise: The sidewalk is wet.Conclusion: Therefore, it just rained. ANSWER FOR BRAINLIST!!! PLEASEEEE. Which of the following are an advantage and disadvantage of hydrogen energy use?A. Advantage: Hydrogen is easy to store.Disadvantage: Hydrogen is scarce.B. Advantage: Hydrogen is easy to transport.Disadvantage: Hydrogen emits pollution.C. Advantage: Hydrogen is an efficient form of energy.Disadvantage: Hydrogen is expensive.D. Advantage: Hydrogen fuel has established infrastructure.Disadvantage: Hydrogen is scarce. Read the following passage and answer the (four) items that follow:The transfer of heat and water vapor from the ocean to the air above it depends on disequilibrium at the interface of the water and the air. Within about a millimeter of the water, air temperature is close to that of the surface water and the air is nearly saturated with water vapor. But the differences, however small, are crucial, and the disequilibrium is maintained by air near the surface mixing with air higher up, which is typically appreciably cooler and lower in water-vapor content. The air is mixed by means of turbulence that depends on the wind for its energy. As wind speed increases, so does turbulence, and thus the rate of heat and moisture transfer. Detailed understanding of this phenomenon awaits further study. An interacting and complicating phenomenon is wind-to-water transfer of momentum that occurs when waves are formed. When the wind makes waves, it transfers important amounts of energyenergy that is therefore not available to provide turbulenceQ28. The passage suggests that if on a certain day the wind were to decrease until there was no wind at all which of the following would occur?(a) The air closest to the ocean surface would become saturated with water vapor(b) The air closest to the ocean surface would be warmer than the water.(c) The amount of moisture in the air closest to the ocean surface would decrease.(d) The air closest to the ocean would be at the same temperature as air higher up.