When creating a user generated function, what procedure is followed?
a) create a function prototype before main()
b) create a function definition after main()
c) create a function definition before main()
d) all of the above

Answers

Answer 1

When creating a user-generated function, what procedure is followed d) all of the above.

What are the three factors of user-described characteristic?

A user-described characteristic has 3 essential additives which might be characteristic declarations, characteristic definition and characteristic called.

The characteristic prototypes are used to inform the compiler approximately the variety of arguments and approximately the specified datatypes of a characteristic parameter, it additionally tells approximately the go-back kind of the characteristic. By this information, the compiler cross-assessments the characteristic signatures earlier than calling.

Read more about the prototype :

https://brainly.com/question/7509258

#SPJ1


Related Questions

Which of the following commands appears in the INSERT menu or tab?

Question 4 options:

Table


Bold


Line Spacing


Undo/Redo

Answers

Answer:

Table

Explanation:

Table commands appears in the INSERT menu or tab. Hence option a is correct.

What are commands?

Commands are defined as a request for a computer software to carry out a particular task. It could be sent via a command-line interface, such as a shell, as input to a network service as part of a network protocol, as an event in a graphical user interface triggered by the user selecting an item from a menu, or as a command transmitted over a network to a computer.

The Insert tab allows you to add a variety of components to a document. Tables, word art, hyperlinks, symbols, charts, a signature line, the date and time, shapes, headers, footers, text boxes, links, boxes, equations, and other elements are examples of these. You can enhance your document by adding images, shapes, SmartArt graphics, tables, and more on the INSERT tab.

Thus, Table commands appears in the INSERT menu or tab. Hence option a is correct.

To learn more about commands, refer to the link below:

https://brainly.com/question/14548568

#SPJ2

Declare a character variable letterStart. Write a statement to read a letter from the user into letterStart, followed by statements that output that letter and the next letter in the alphabet. End with a newline. Hint: A letter is stored as its ASCII number, so adding 1 yields the next letter. Sample output assuming the user enters ‘d’: de
#include
int main(void) {
char letterStart;
char letter2;
scanf("%c", &letterStart);
letter2 = (letterStart + 1);
printf("%c%c\n", letterStart, letter2);
return 0;
}

Answers

We have declared a character variable named as letterStart. Now to read a letter from the user into letterStart, this will be followed by statements that output that letter and the next letter in the alphabet. Later we will end with a new line.

The code given below is written in C language.

It should be noted that a letter is stored as its ASCII number, so adding 1 yield the next letter. Also, the sample output assumes the user enters 'd': de.

#include <stdio.h>

#include <conio.h>

int main(void) {

  char letterStart;

  scanf("%c", letterStart);

  printf("%c", letterStart);

  printf("%c", letterStart + 1);

  return 0;

}

Learn more about C language at:

brainly.com/question/26535599

#SPJ4


Which of the following is an example of a pro-social deception

Answers

It is to be noted that the option that speaks to prosocial behavior is "saving puppies from a burning building only because you know the puppies need help"

Lying about a surprise party is also an example of pro-social deception.

How is this so?

Prosocial lying is a typical occurrence in everyday conversation. For example, an employee may tell a colleague that they gave an amazing presentation when they did not, or a gift giver may congratulate them for a gift they would prefer not have gotten.

Prosocial conduct, also known as the purpose to benefit others, is a type of social activity that "benefits other people or society as a whole," such as "helping, sharing, donating, cooperating, and volunteering." Obeying the norms and complying to socially acceptable behaviour are also considered prosocial.

Learn more about pro-social deception at:

https://brainly.com/question/10552505

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

Which of the following is an example of prosocial behavior?

O helping a car accident victim only because you know you will be featured on the 5:00 p.m. news

O erasing the board for Angela (she has two broken arms and can't do it by herself) only because you know you will get extra credit if you help her

O saving puppies from a burning building only because you know the puppies need help

O stopping a fight between other people only because you know you will get in trouble if you don't stop it

O all of these are examples of prosocial behavior

Which of the following is an example of a pro-social deception

How can you compute, the depth value Z(x,y) in
z-buffer algorithm. Using incremental calculations
find out the depth value Z(x+1, y) and Z (x, y+1).
(2)

Answers

The Depth-buffer approach, usually referred to as Z-buffer, is one of the methods frequently used to find buried surfaces. It is a method in image space and pixel.

Thus, The pixel to be drawn in 2D is the foundation of image space approaches and Z buffer. The running time complexity for these approaches equals the product of the number of objects and pixels.

Additionally, because two arrays of pixels are needed—one for the frame buffer and the other for the depth buffer—the space complexity is twice the amount of pixels.

Surface depths are compared using the Z-buffer approach at each pixel location on the projection plane.

Thus, The Depth-buffer approach, usually referred to as Z-buffer, is one of the methods frequently used to find buried surfaces. It is a method in image space and pixel.

Learn more about Z buffer, refer to the link:

https://brainly.com/question/12972628

#SPJ1

Choose the correct term to complete the sentence.
The media is usually repressed in
governments.

Choose the correct term to complete the sentence.The media is usually repressed ingovernments.

Answers

A dictator government  has all power in the hands of one individual/group, suppressing opposition.  The media is usually repressed in dictatorial government

What is the government?

Dictatorships have limited to no respect for civil liberties, including press freedom. Media is tightly controlled and censored by the ruling authority. Governments may censor or control the media to maintain power and promote propaganda.

This includes restricting freedom of speech and mistreating journalists. Dictators control information flow to maintain power and prevent challenges, limiting transparency and public awareness.

Learn more about government from

https://brainly.com/question/1078669

#SPJ1

What are some common options to sort a Mail Merge Recipient list?​

Answers

Answer:

Create and save the main document.

On the Mailings tab, in the Start Mail Merge group, choose Select Recipients→Type a New List.

Click the Customize Columns button.

Select a field that you do not need.

Click the Delete button.

Click Yes in the confirmation dialog box.

Explanation:

Hope it is helpful for you

please follow me and mark me as a brainest

Answer:

a Safe Recipients list or a postmark

Explanation:

discuss advantages and disadvantages of operating system

Answers

Answer and Explanation:

Advantages-

Computing source- Through the operating system, users can communicate with computers to perform various functions such as arithmetic calculations and other significant tasks.Safeguard Of Data- There’s a lot of user data stored on the computer. Windows Defender in Microsoft Windows detects malicious and harmful files and removes them. Also, it secures your data by storing them with a bit to bit encryption.Resource Sharing- Operating systems allow the sharing of data and useful information with other users via Printers, Modems, Players, and Fax Machines. Besides, a single user can share the same data with multiple users at the corresponding time via mails. Also, various apps, images, and media files can be transferred from PC to other devices with the help of an operating system.

Disadvantages-

Expensive- It is costly.System Failure- System failures may occur. If the central operating system fails, it will affect the whole system, and the computer will not work. If the central system crashes, the whole communication will be halted, and there will be no further processing of data.Virus Threats- Threats to the operating systems are higher as they are open to such virus attacks. Many users download malicious software packages on their system which halts the functioning of OS and slow it down.

Answer:

Advantages ) -

1) They have different and unique properties .

2) They function differently and have great experience .

3) They allow us to progress through the life of technology .

Disadvantages ) -

1) Many softwares and programs not function on every OS and we have to use different external and/or 3rd party programs .

2) They have different level and speed of emulations .

how to power clip in corel draw​

Answers

Answer:

Open CorelDRAW and create a new document or open an existing one.Select the object or shape that you want to use as the container for the PowerClip. This object will act as the frame or mask that holds the content.Go to the "Arrange" menu at the top of the screen and choose "PowerClip" from the dropdown menu. Alternatively, you can use the keyboard shortcut Ctrl + K.A PowerClip dialog box will appear. Click on "Place inside container" and then "OK."You will notice that the cursor changes to a small arrow. Click on the object or shape that you want to insert or clip inside the container.The selected object or shape will now be inserted into the container and clipped according to its boundaries.To edit the contents of the PowerClip, double-click on the container object. This will enter the editing mode, where you can move, resize, or modify the clipped object.To exit the editing mode and return to the regular workspace, click outside the container object or press Esc on your keyboard.

Explanation:

hope this helps

These involve browsing the web
1.URL
2.DNS
3.Gopher
4.Address Bar

Answers

URLs are used to locate web pages, DNS resolves domain names into IP addresses, Gopher is an older protocol for browsing the internet, and the Address Bar displays the URL and allows users to navigate to specific web pages.

URL: Uniform Resource Locator (URL) is a web address that is used to locate a web page on the internet. A URL consists of different parts, including the protocol (e.g., http, https), the domain name (e.g., ), and the path to the specific page (e.g., /search).

DNS: Domain Name System ( DNS) is a system that translates domain names into IP addresses. When a user types a domain name in the browser, the browser contacts a DNS server to resolve the domain name into an IP address. The IP address is then used to connect to the web server hosting the website.

Gopher: Gopher is an older protocol that was used for browsing the internet before the World Wide Web (WWW) became popular. Gopher uses a hierarchical structure to organize information and provides a simple interface for users to navigate through the content.

Address Bar: The Address Bar is a part of the web browser interface that displays the URL of the current web page. Users can also type a URL or a search term in the address bar to navigate to a specific web page or conduct a search.

For more such questions on URLs

https://brainly.com/question/17331722

#SPJ11

DYNAMIC COMPUTER PROGRAMS QUICK CHECK

COULD SOMEONE CHECK MY ANSWER PLSS!!

Why were different devices developed over time? (1 point)

A. experiment with new platforms

B. computing and technological advances

C. to integrate connectivity in new devices

D. to use different software

my answer I chose: A

Answers

It’s B because From the 1st generation to the present day, this article talks about the development of computers and how it has changed the workplace.

Suppose the state machine shown below is in State C and receives the string 100010. What is its ending
state?

Suppose the state machine shown below is in State C and receives the string 100010. What is its ending

Answers

The given state machine is in State C and receives the string 100010, the ending state of the state machine will be State B (option B).

What is the state machine? A state machine is a mathematical model of a system. It is an abstract machine that can be in exactly one of a finite number of states at any given time. State machines are often used for stateful entities such as computers, processors, and other electronic devices.

How to solve the problem? We start from the starting state State A and follow the given string 100010.

State A: The first symbol of the string is 1, so we move from state A to state B.

State B: The second symbol of the string is 0, so we move from state B to state D.

State D: The third symbol of the string is 0, so we move from state D to state E.

State E: The fourth symbol of the string is 0, so we move from state E to state F.

State F: The fifth symbol of the string is 1, so we move from state F to state B.

State B: The sixth and last symbol of the string is 0, so we remain in state B, and it's our ending state. Therefore, the ending state of the state machine will be State B.

For more questions on processors, click on:

https://brainly.com/question/614196

#SPJ8

suppose you have a language with only the three letters a; b; c, and they occur with frequencies .9, .09, and .01, respectively. the ciphertext bcccbcbcbc was encrypted by the vigen`ere method (shifts are mod 3, not mod 26). find the plaintext (note: the plaintext is not a meaningful english message.)

Answers

The correct answer is One letter in the ciphertext corresponds to several letters in the plaintext; a character appears in a language. makes frequency analysis more effective...

Cipher, by definition, is an algorithm that transforms plain text into ciphertext. It is the unintelligible result of a cryptographic method. Ciphertext can also sometimes be referred to by the word "cypher." It takes a key to translate ciphertext into plain text before it can be deciphered. The output of encryption techniques, often known as cyphers, is ciphertext. When a person or device lacking the cypher cannot read the data, the data is said to be encrypted. To decode the data, they or it would require the cypher. By the kind of input data, cyphers can be divided into two categories: block cyphers, which encrypt blocks of data with a set size, and stream cyphers, which encrypt streams of data continuously.

To learn more about  ciphertext click on the link below:

brainly.com/question/30143645

#SPJ4

examples of operating system from different families​

Answers

Answer:

windows from Microsoft Mac OS from Apple Ubuntu from chronicle

Machine language library routines are installed on computers Select one: a. because they can come as part of the operating systems b. because we can purchase the library routines and install c. all of these choices d. because they can come as part of the compilers and assemblers

Answers

Answer:

c. all of these choices

Explanation:

all of them are correct. i took a quiz on this like 2 days ago and that was the answer.

hope this helpsssssssss!!!!!!!!!!! :):):)

What do organizations need to implement to ensure their data is trustworthy and reliable?

Answers

A lot of organizations need to implement to ensure their data is trustworthy and reliable though the use of Multi-party computing(MPC) and blockchain.

How do you ensure that data is trustworthy and reliable?

The methods that a person can use to Achieve Trustworthy Data are:

Delete Software Disparity and as such,  Businesses will be said to have a lot of software systems in place to handle a lot of different processes. Improve on the  User Training and Understanding. Do use and  Implement Quality Business Intelligence Tools.

Therefore, A lot of organizations need to implement to ensure their data is trustworthy and reliable though the use of Multi-party computing(MPC) and blockchain.

Learn more about data from

https://brainly.com/question/20263094

#SPJ1

3. (5 pts) write a function recstrlen() which accepts a pointer to a string and recursively counts the number of characters in the provided string, excluding the null character. this function should return the number of characters in the string.

Answers

With the exception of the final null character, the strlen() method calculates the length of a string. The length of the string is returned by the strlen() method.

What is string ?

A string is typically a sequence of characters in computer programming, either as a literal constant or as some sort of variable.

The latter can either be constant in length or allow its elements to alter (after creation).

A string is sometimes implemented as an array data structure of bytes (or words) that contains a succession of elements, typically characters, using some character encoding.

A string is generally thought of as a type of data.

More generic arrays or other sequence (or list) data types and structures may also be referred to by the term "string."

A variable declared to be a string may either result in storage in memory being statically allocated for a preset maximum length or, depending on the programming language and precise data type employed, neither.

According to our question-

int strlen_recursive(char *str1)  // recursively counts

{

static int l=0; // static variable  

  if(*str1==NULL)  // string is equal to NULL

  {

    return(l);  // returning length

     }

  else

      l++; // increased the length

      strlen_recursive(++str1);  // recursive function

    }

}

Hence, With the exception of the final null character, the strlen() method calculates the length of a string. The length of the string is returned by the strlen() method.

learn more about string click here:

https://brainly.com/question/25324400

#SPJ4

9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula using the COUNTIF function and structured references to count the number of students who have been elected to offices in student organizations.

Answers

Let understand that a spreadsheet perform function such as getting the sum, subtraction, averages, counting of numbers on the sheet rows and columns.

Also, the image to the question have been attached as picture.

Here, Lael wants to count the number of students who have been elected to offices in student organizations.

Lael will used the COUNTIF Function in the Spreadsheet to achieve the count because function helps to count cells that contain numbers.

In conclusion, the formulae that Lael should use on the Spreadsheet to count the number of students who are elected is "Q8 = COUNTIF(M2:M31, "Elected")"

Learn more about Excel function here

brainly.com/question/24826456/

9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula

What Causes #### error?​

Answers

Answer:

The answer is below

Explanation:

Causes of ####error in Microsoft Excel can be traced to multiple sources. The major causes of #### error in Microsoft Excel, however, are the following:

1. When the column is not wide enough to show all values or figures of the cell contents.

2. When there are too many decimal places of the figure in a cell

3. When the date value in the cell is negative

4. When the time value in the cell is negative.

Using a for loop in C++
In this lab the completed program should print the numbers 0 through 10, along with their values multiplied by 2 and by 10. You should accomplish this using a for loop instead of a counter-controlled while loop.
Write a for loop that uses the loop control variable to take on the values 0 through 10.
In the body of the loop, multiply the value of the loop control variable by 2 and by 10.
Execute the program by clicking the Run button at the bottom of the screen. Is the output the same?

Answers

Answer:

I hope this helps you out. if you like my answer please give me a crown

Explanation:

The program is an illustration of loops.

Loops are used to perform repetitive and iterative operations.

The program in Python where comments are used to explain each line is as follows:

#This prints the output header

print("Number\tMultiplied by 2\t Multiplied by 10")

#This iterates from 0 to 10

for i in range(0,11):

  #This prints each number, it's double and its product by 10

 print(str(i) + "\t\t" + str(i * 2) + "\t\t" + str(i*10))

Students might earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree with an emphasis in digital communications in order to become a

Answers

Answer: Digital Communications Specialist

Explanation:

Took The Test Myself

Students might earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree with an emphasis in digital communications, in order to become a: Digital Communications Specialist.

What is a bachelor's degree?

A bachelor's degree can be defined as an academic degree that is formally awarded by a tertiary institution (university or college) to a student after the successful completion of his or her high school, and it usually takes about 4 or 5 years to complete a bachelor's degree.

What is a master's degree?

A master's degree can be defined as an academic degree that is formally awarded by a tertiary institution (university or college) to a student after the successful completion of his or her bachelor's degree programme.

In conclusion, students are required to earn either a Master of Arts (M.A.) or a Master of Science (M.S.) degree in digital communications, in order to become a Digital Communications Specialist.

Read more on Digital Communications Specialist here: https://brainly.com/question/27746922

#SPJ1

3
Drag each label to the correct location on the image.
An organization has decided to initiate a business project. The project management team needs to prepare the project proposal and business
justification documents. Help the management team match the purpose and content of the documents.
contains high-level details
of the proposed project
contains a preliminary timeline
of the project
helps to determine the project type,
scope, time, cost, and classification
helps to determine whether the
project needs meets business
needs
contains cost estimates,
project requirements, and risks
helps to determine the stakeholders
relevant to the project
Project proposal
Business justification

Answers

Here's the correct match for the purpose and content of the documents:

The Correct Matching of the documents

Project proposal: contains high-level details of the proposed project, contains a preliminary timeline of the project, helps to determine the project type, scope, time, cost, and classification, helps to determine the stakeholders relevant to the project.

Business justification: helps to determine whether the project needs meet business needs, contains cost estimates, project requirements, and risks.

Please note that the purpose and content of these documents may vary depending on the organization and specific project. However, this is a general guideline for matching the labels to the documents.

Read more about Project proposal here:

https://brainly.com/question/29307495

#SPJ1

What is the ideal "view pattern " of a pattern?


"F" pattern


"Circular" pattern


"T" shape, Top-heavy pattern


"Shallow" Pattern


Answers

"T" shape, Top-heavy pattern  is the ideal "view pattern " of a pattern.

Thus, The language extension ViewPatterns makes view patterns possible. The Wiki page has additional details and illustrations of view patterns.

View patterns can be layered inside of other patterns, similar to how pattern guards can. They offer an easy way to compare patterns to values of abstract kinds.

View patterns extend our ability to pattern match on variables by also allowing us to pattern match on the result of function application.

Thus, "T" shape, Top-heavy pattern  is the ideal "view pattern " of a pattern.

Learn more about View pattern, refer to the link:

https://brainly.com/question/13155627

#SPJ1

Three friends decide to rent an apartment and split the cost evenly. They each paid $640 towards the total move in cost of first and last month's rent and a security deposit. If rent is $650 per month, how much was the security deposit?
a.
$10
b.
$207
c.
$620
d.
$1,270



Please select the best answer from the choices provided

Answers

Answer:

c. $620

Explanation:

To find the cost of the security deposit, we need to subtract the amount paid towards the first and last month's rent from the total move-in cost.

Each friend paid $640 towards the total move-in cost, which includes the first and last month's rent and the security deposit. Since they split the cost evenly, the total move-in cost is 3 times $640, which is $1920.

The monthly rent is $650 per month, so the first and last month's rent combined is 2 times $650, which is $1300.

To find the security deposit, we subtract the first and last month's rent from the total move-in cost:

Security deposit = Total move-in cost - First and last month's rent

Security deposit = $1920 - $1300

Security deposit = $620

Therefore, the security deposit was $620.

Option c. $620 is the correct answer.

You are preparing to communicate to an audience about analysis project. You consider the roles that your audience members play and their stake in the project. What aspect of data story telling does this scenario describes?

Answers

The aspect of data story telling does this scenario describes is audience engagement.

What is Audience engagement?

This is known to be  user engagement and it is a term that connote  the cognitive, emotional, or affective form of experiences that users do get or have with media content or any kind of brands.

Note that in the case above, the aspect of data story telling does this scenario describes is audience engagement.

Learn more about project from

https://brainly.com/question/13374052

#SPJ1

Create the algorithm in a flow chart. Develop an algorithm that reads in three numbers and writes them all in sorted order. Order marches with weighty and measured strides. Disorder is always in a hurry.

Answers

To order an array of strings in alphabetic order, the sorting algorithm should be structured for ascending order.

How to sort the array of strings according to alphabetical order?

This can be carried out by sorting the array manually or by using the to CharArray() method. In the to CharArray() method this can be done by ensuring you have the needed string and then modifying the provided string to a character array with the help of to CharArray() method followed by constructing the gathered array by utilizing the sort() method of the Arrays class.

Then we have to transform the constructed array to String by passing it to the constructor of the String array.

Therefore, To order an array of strings in alphabetic order, the sorting algorithm should be structured for ascending order.

Learn more about  array on:

https://brainly.com/question/13107940

#SPJ1

Critical Thinking
6-1
Devising a DC Strategy
Problem:

This project is suitable for group or individual work. You're the administrator of a network of 500 users and three Windows Server 2016 DCs. All users and DCs are in a single building. Your company is adding three satellite locations that will be connected to the main site via a WAN link. Each satellite location will house between 30 and 50 users. One location has a dedicated server room where you can house a server and ensure physical security. The other two locations don't have a dedicated room for network equipment. The WAN links are of moderate to low bandwidth. Design an Active Directory structure taking into account global catalog servers, FSMO roles, sites, and domain controllers. What features of DCs and Active Directory discussed in this chapter might you use in your design?

Answers

The Active Directory (AD) database and services link users to the network resources they require to complete their tasks.The database (or directory) holds crucial details about your environment, such as how many computers and users there are, as well as who has access to them.

What is the features of DC refer ?

By verifying user identity through login credentials and blocking illegal access to those resources, domain controllers limit access to domain resources.Requests for access to domain resources are subject to security policies, which domain controllers apply. To create and administer sites, as well as to manage how the directory is replicated both within and between sites, utilize the Active Directory Sites and Services console.You can define connections between sites and how they should be used for replication using this tool. All of the information is safeguarded and kept organized by the domain controller.The domain controller (DC) is the container that Active Directory uses to store the kingdom's keys (AD). Administrators and users can easily locate and use the information that Active Directory holds about network objects.A structured data store serves as the foundation for the logical, hierarchical organization of directory data in Active Directory. A networking appliance designed specifically for enhancing the performance, security, and resilience of applications provided over the internet is known as an application delivery controller (ADC). Distributed Control Systems (DCS.   Automatic regulation.    Program (logic) control   Remote control (start, shutdown, change of set points),  Alarms and notifications management,Collection and processing of process and equipment data. Graphic presentation of process and equipment condition data.Applications like production scheduling, preventative maintenance scheduling, and information interchange are made possible by the DCS.The global dispersion of your plant's subsystems is made easier by a DCS.A DCS may effectively monitor or enhance operational qualities like: Efficiency. Industrial processes are controlled by DCS to raise their dependability, cost-effectiveness, and safety.Agriculture is one process where DCS are frequently employed.chemical factories.refineries and petrochemical (oil) industries. The DCS is interfaced with the corporate network in many contemporary systems to provide business operations with a perspective of production.View Next:DCS Wiring Plans.Test on instrumentation.Secure Control System.dustrial communication, automation, and remote function. As the name implies, the DCS is a system of sensors, controllers, and associated computers that are distributed throughout a plant. Each of these elements serves a unique purpose such as data acquisition, process control, as well as data storage and graphical display.

       To learn more about Active Directory refer

      https://brainly.com/question/24215126

       #SPJ1

       

Create Task for AP computer science principles python

Answers

The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Thus, The more comprehensive of the two courses, AP Computer Science Principles teaches students the fundamentals of computer science while emphasizing teamwork.

Although computer science is a useful subject to study, is the exam challenging to pass.

For aspirant AP Computer Science Principles students, it's a good thing that the subject isn't ranked in the top 10 most challenging AP courses. But that doesn't make it any less difficult. Visit our AP Computer Science Principles resource page.

Thus, The AP program offers two computer science courses: AP Computer Science A and AP Computer Science Principles.

Learn more about AP program, refer to the link:

https://brainly.com/question/3121467

#SPJ1

I was opening quite a few tabs, and (i also dropped it yesterday;-; with the protective case) the screen turns to the following images( it is still being used perfectly fine after like half an hour since the drop) so uhm... Help?
It also have really low memory something because it my whole family's laptop...;(....

I was opening quite a few tabs, and (i also dropped it yesterday;-; with the protective case) the screen
I was opening quite a few tabs, and (i also dropped it yesterday;-; with the protective case) the screen

Answers

Based on the news you gave, it's likely that the screen issue you're experiencing had a connection with the drop, and the number of tabs you have open may be dawdling a strain on the desktop computer's thought.

What are possible solutions?

I would desire to continue the desktop computer and observe if the screen issue continues. If it does, try joining an extrinsic monitor to visualize if the question is accompanying the desktop computer screen or extraordinary.

To address the reduced memory issue, you take care of try closing a few of the open tabs or programs that are not being used to permit an action room.

Alternatively, you keep feeling improving the desktop computer's memory in some way or utilizing an outside permanent computer memory to store files to allow scope

Read more about screen problems here:

https://brainly.com/question/13117463
#SPJ1

In Java only please:
4.15 LAB: Mad Lib - loops
Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways.

Write a program that takes a string and an integer as input, and outputs a sentence using the input values as shown in the example below. The program repeats until the input string is quit and disregards the integer input that follows.

Ex: If the input is:

apples 5
shoes 2
quit 0
the output is:

Eating 5 apples a day keeps you happy and healthy.
Eating 2 shoes a day keeps you happy and healthy

Answers

Answer:

Explanation:

import java.util.Scanner;

public class MadLibs {

   public static void main(String[] args) {

       Scanner input = new Scanner(System.in);

       String word;

       int number;

       do {

           System.out.print("Enter a word: ");

           word = input.next();

           if (word.equals("quit")) {

               break;

           }

           System.out.print("Enter a number: ");

           number = input.nextInt();

           System.out.println("Eating " + number + " " + word + " a day keeps you happy and healthy.");

       } while (true);

       System.out.println("Goodbye!");

   }

}

In this program, we use a do-while loop to repeatedly ask the user for a word and a number. The loop continues until the user enters the word "quit". Inside the loop, we read the input values using Scanner and then output the sentence using the input values.

Make sure to save the program with the filename "MadLibs.java" and compile and run it using a Java compiler or IDE.

Re:
What are examples of the major macro actions? Check all that apply.
create new records
djəН
open and close forms
open database objects
o lock databases from changes
prevent users from viewing data
O navigate through records
import and export data

Answers

Answer:

A) create new records

B) open and close forms

C) open database forms

F) navigate through records

G) import and export data

Explanation:

Other Questions
Problem 15.73. Give a combinatorial proof for this identity: n m (0)(...)-("") (" *) k-r r=0 Nelly Newman lives in Melbourne and is a resident for taxation purposes. She worked fulltime in a multinational company and received the following income for the current income tax year. - Salary earned from her full-time job is$75,000- Commission of$10,000for meeting job KPI (Key Performance Indicator, a performance metric) - Rental income earned from her investment property was$24,000- Fully franked dividend income of$7000plus franking credit$3000- Interest earned \$27 from term deposits - \$450 earned from a tax-exempted charitable institute - Assume Nelly did not have any deductions. Required: Advise Nelly on her total "Assessable Income" and explain the main income principles applicable to her case. In your response, you are not required to explain each item separately. However, your response must cover all the main issues, characteristics and principles applicable to all the above information received from Nelly. Find the degree of the monomial 3x4y3 PLS HELP WILL GIVE BRAINIEST!!!!! $6,700 $7,450 $8,000 $7,600$7,450$8,200$7,210What is the mode? An animation of a person standing with their arms extended out to their sides. There are 3 dimensional boxes around the torso of the person showing how to create a shirt. What animation process does the photo above help you visualize? a. Morphing c. Motion capture b. Building 3 dimensional models d. Animation rendering Please select the best answer from the choices provided A B C D What does we have received your refund and it is being processed. Make sure the handwriting is clear, Thank you.Solve the following triangles : = 30, 7 = 95' b = 10 a a = 600 a = 20 = 10 Find the arua of the triangle in I (a) Name The Picture Of Tools And Equipment For Baking Purpose. Kyle is saving for a trip to Spain. He already has $2,000 in the bank, but wants his balance to be at least $3,200 by the end of the month. How much more does he need to save () to reach his goal? according to the information presented in this video, determining how many workers are needed to produce 1,000 units of a product in a given work week is an example of a(n) . question content area bottom part 1 a. structured decision b. workflow decision c. procedural decision d. unstructured decision e. documented decision The ability to get others to do what they wouldn't otherwise choose on their own.EmpowermentPowerMobilityStratification A research study examined the blood vitamin D levels of the entire US population of landscape gardeners. The population average level of vitamin D in US landscapers was found to be 30.8 ng/mL with a standard deviation of 4.371 ng/mL. Assuming the true distribution of blood vitamin D levels follows a normal distribution, if you randomly select a landscaper in the US, what is the likelihood that his/her vitamin D level will be between 36.84 and 39.73 ng/mL Classify the polynomial by its degree: 4m-9x + 10A) 0B) 1stC) 2ndD) 3rdE) 4th Choose two numbers below that are greater than 1/2. Speeches that are researched and planned ahead of time, although the exact wording is not scripted and will vary from presentation to presentation, are calleda. impromptu.b. scripted.c. extemporaneous.d. practiced. If your p-value is .11, and the significance level is .05, what do you conclude? Which front forms widespread clouds, rain, or snow?A.cold frontB.warm frontC.occluded frontD.stationary front Based on The United States in 1824 Map, which nation seems to have an advantage in making a claim to the Oregon Territory, Britain or The United States? PLS HELP ME !!!!! i am terrible at maths.