write a C++ program that ask the user for the number of cookies eaten and display the calorie consumption

Answers

Answer 1

Answer:

#include <iostream>

using namespace std;

int main()

{

   int cookies;

   cin >> cookies;

   cout << "The calorie consumption is: " << cookies * 142 << endl;

   return 0;

}

Explanation:

First line: include basic library of C++(input and output).

using namespace std;

Says to compiler we are using std.

int main() Main function

int cookies, cookies variable, of int type

cin >> cookies

get the number of the cookies from user

cout Print the text and calories(one cookie have 142 calories)

Have a nice day ;)


Related Questions

A user clicks. such as option buttons and check boxes in a dialog box to provide information

Answers

Answer:

It's an input,

Topology in networking essentially just means how the computers are interconnected with one another.

Answers

Answer:

Network topology is the arrangement of the elements of a communication network. Network topology can be used to define or describe the arrangement of various types of telecommunication networks, including command and control radio networks, industrial field buses and computer networks.

There are five types of topology in computer networks:

Mesh Topology.

Mesh topology is a type of networking where all nodes cooperate to distribute data among each other. This topology was originally developed 30+ years ago for military applications, but today, they are typically used for things like home automation, smart HVAC control, and smart buildings.

Star Topology.

A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that if a cable fails, only one node will be brought down.

Bus Topology.

A bus topology is a topology for a Local Area Network (LAN) in which all the nodes are connected to a single cable. The cable to which the nodes connect is called a "backbone". If the backbone is broken, the entire segment fails.

Ring Topology.

A ring topology is a network configuration in which device connections create a circular data path. Each networked device is connected to two others, like points on a circle. Together, devices in a ring topology are referred to as a ring network.

Hybrid Topology.

A hybrid topology uses a combination of two or more topologies. Hybrid networks provide a lot of flexibility, and as a result, they have become the most widely used type of topology. Common examples are star ring networks and star bus networks. Tree topology is one specific example of a star bus network.

.

.

.

Please mark as brainliest.

Answer: In network layout, in terms of drafting RFP's, how computers are interconnected with each other physically, is a physical topology. In terms of how everything is connected to each other with the cables, on paper, that is a logical topology.

Explanation: Physical Topology is related to how the network actually appears as if you were in the room, looking at it. While logical topology, is usually a schematic on paper, showing how all of the devices are connected, which ports are they connected to, what are the Ip's, Mac addys, and such.

Assume a 2^20 byte memory:

a) What are the lowest and highest addresses if memory is byte-addressable?

b) What are the lowest and highest addresses if memory is word-addressable, assuming a 16-bit word?

c) What are the lowest and highest addresses if memory is word-addressable, assuming a 32-bit word?

Answers

a) Lowest address: 0, Highest address: (2^20) - 1. b) Lowest address: 0, Highest address: ((2^20) / 2) - 1. c) Lowest address: 0, Highest address: ((2^20) / 4) - 1.

a) If memory is byte-addressable, the lowest address would be 0 and the highest address would be (2^20) - 1.

This is because each byte in the memory requires a unique address, and since there are 2^20 bytes in total, the highest address would be one less than the total number of bytes.

b) If memory is word-addressable with a 16-bit word, each word would consist of 2 bytes.

Therefore, the lowest address would be 0 (representing the first word), and the highest address would be ((2^20) / 2) - 1.

This is because the total number of words is equal to the total number of bytes divided by 2.

Subtracting 1 gives us the highest address, as the addresses are zero-based.

c) If memory is word-addressable with a 32-bit word, each word would consist of 4 bytes.

In this case, the lowest address would still be 0 (representing the first word), and the highest address would be ((2^20) / 4) - 1.

Similar to the previous case, the total number of words is equal to the total number of bytes divided by 4.

Subtracting 1 gives us the highest address.

For more questions on address

https://brainly.com/question/30273425

#SPJ8

Write a Python 3 script in PyCharm that will simulate the game of "Rock, Paper, Scissors": Display a header and the simple rules of RPS Prompt player_1 for their move To make sure player_2 can't see what player_1's move was, insert: print('*** NO CHEATING ***\n\n' * 20) Prompt player_2 for their move Design and develop an IF-ELSE structure to play the game IF player_1's move equivalent to player_2's move, "It's a tie" "rock" beats "scissors" "scissors" beats "paper" "paper" beats "rock" Make sure you test for valid input!!

Answers

Answer:

'''

Rock, Paper, Scissors:

The Rules:

If player1's move equivalent to player2's move, "It's a tie".

"rock" beats "scissors", "scissors" beats "paper", and "paper" beats "rock"

'''

player_1 = input("Player 1's move: ")

print('*** NO CHEATING ***' * 20)

player_2 = input("Player 2's move: ")

if player_1 or player_2 not in ["rock", "paper", "scissors"]:

 print("Invalid input!")

if player_1 == player_2:

   print("It's a tie")

else:

   if player_1 == "rock":

       if player_2 == "scissors":

           print("Player 1 won")

       elif player_2 == "paper":

           print("Player 2 won")

   elif player_1 == "scissors":

       if player_2 == "paper":

           print("Player 1 won")

       elif player_2 == "rock":

           print("Player 2 won")

   elif player_1 == "paper":

       if player_2 == "rock":

           print("Player 1 won")

       elif player_2 == "scissors":

           print("Player 2 won")

Explanation:

In the comment part, put the header and the rules of the game

Ask the user to enter the player1's move

Print the asterisks

Ask the user to enter the player2's move

If any of the input is not "rock", "paper", "scissors", state that the input is invalid

Check the inputs. If they are equal, print that it is a tie. Otherwise:

If player1's move is rock. Check player2's move. If it is "scissors", player1 wins. If it is "paper", player2 wins

If player1's move is scissors. Check player2's move. If it is "paper", player1 wins. If it is "rock", player2 wins

If player1's move is paper. Check player2's move. If it is "rock", player1 wins. If it is "scissors", player2 wins

Where are the kidneys located?
a) Attached to the bladder
b) Lower back
c) Upper back
d) Middle back
e) Chest cavity
f the following is acian of health

Answers

Answer:

B

Explanation:

Your kidneys are fist-sized organs shaped like beans that are located at the back of the middle of your trunk, in the area called your flank. They are under the lower part of your ribcage on the right and left sides of your backbone.

Provide your SQL commands for the following statements
1. Create an alphabetical list of names (first and last, alphabetized by last) of customers in Minnesota. Sort the data by last name in descending order.
2. Give full names of customers that have a 'D' as the third character in their last names. Make your query is case insensitive. Eliminate duplicates.
3. Give the sales data (all sales information) for sales where sales tax was charged and total of tax and shipping is less than $15.
4. Give date and the sum of tax and shipping for each sale from December 20th through December 25th of 2015. (use BETWEEN). Name (alias) the calculated column as SUM. Name (alias) the date as "Date of Sale".
5. Give names of manufacturers and their cities that are located in cities with names starting with 'C'.

Answers

1. SELECT DISTINCT firstname, lastname SQL commands:

  FROM customers

  WHERE state = 'Minnesota'

  ORDER BY lastname DESC;

What is SQL command?

SQL (Structured Query Language) is a programming language used to manage data stored in a relational database. SQL commands are used to create, query, update, and delete data. Examples of SQL commands include SELECT to retrieve data from a database, INSERT to add a record to a database, UPDATE to modify existing records, and DELETE to delete records from a database.

2. SELECT DISTINCT firstname, lastname

  FROM customers

  WHERE lastname LIKE '_d%' COLLATE UTF8_GENERAL_CI;

3. SELECT *

  FROM sales

  WHERE tax > 0

  AND (tax + shipping) < 15;

4. SELECT DATE(date_of_sale) AS "Date of Sale", SUM(tax + shipping) AS SUM

  FROM sales

  WHERE date_of_sale BETWEEN '2015-12-20' AND '2015-12-25'

  GROUP BY date_of_sale;

5. SELECT m.name, c.name

  FROM manufacturers m

  INNER JOIN cities c

  ON m.city_id = c.id

  WHERE c.name LIKE 'C%';

To learn more about SQL command
https://brainly.com/question/29436443
#SPJ1

How to get passed administrattor on macbook air to get games and stuff.

Answers

Answer:

You need to use the name and password of the main owner of the computer/the account you made when you first got it. Then, you should be able to download apps and use it if you have your apple ID set up.

Explanation:

Which of the following is not linen? A. Face towel B.Make up sign C. Flat sheet D. Bed cover

Answers

Answer:

d

Explanation:

The spoken version of your company's purpose is called
A An elevator pitch
B. A vision statement
C. Your values
D. Differentiation

Answers

Answer:

The answer to this question is given below in the explanation section. The correct answer is A

Explanation:

The spoken version of the company's purpose is also called an elevator pitch. because it has to be short enough to fit into a conversation that takes place on an elevator.

however the other options are not correct that tells the purpose of a company, because the vision statement shows what you will be at what stage in next coming year (in terms of growth, product /services etc). Your values are about what uniqueness you have in your product/service etc that you are providing to your customers/clients. While differentiation is not a spoken version of your company.

Answer:

A

Explanation:

You're the network administrator for a consulting firm. Your network consists of the following:
• 30 laptops in the sales department
10 computers for HR
• 5 laptops for management
• 20 computers in marketing
• 15 computers in IT
You're using Microsoft Intune to manage the company's devices. You've configured an update ring named Management and
enrolled the ring in the Semi-Annual Servicing Channel. You've also set updates to be delayed for 30 days, which gives you ample
time to test them before they're rolled out to the user machines. However, you want to make sure you can rollback a feature
update if a problem comes up after the update has been installed on the user machines.
What is the maximum number of days you can configure a feature update uninstallation period for?

Answers

Answer:

anytime

Explanation:

as far as i know you can manage in real time meaning add or remove any hardware or software anytime but im not sure once its rewritten each is considered version 1.0 but uninstallation happens each time you reinstall so uninstallation is actualy anytime

last i checked all tho trial activation is usualy one week or one month so 7 or 30 days till installation but uninstall is anytime unless it service or updates

list four classification of computer based on their size ​

Answers

There are different sizes like-mini computers, microcomputer, mainframe computer and super computer.

Count operation Lucky twos
Lucky Twos determines and displays the number of digits that are 2s in a whole number. For example, the number of 2s in 3487 is 0, while the number of 2s in 272521 is 3. Note: whole numbers are non-negative integers starting at zero 0, 1, 2, 3, 4.
Assume that the fractional part is discarded in the division:
10 / 4 = 2
8 / 5 = 1
20 / 3 = 6
Read number
set count to 0
while number > 0
If the number module 10 is Then add
1 to count
End If
Compute number as number / 10
End while
Display count.
Let n be the number of digits of the whole number. What is the number of operations that are executed in the code in terms of n?

Answers

Answer:

Following are the solution to this question:

Explanation:

Its complexity of both the pseudo-code described is indeed proportional to the number of digits. So, how often number there are in this specific number is the query. Whenever a number is considered, the d digit would be between \(10^{(d-1)}.\) inclusive exclusive \(10^d\) That would be as, let d become the number of digits at N, and the inequalities, They can tell

\(10^{(d-1)} \leq N < 10^d\)

We get, we take a logarithm,

\(d-1 \leq \log(N) < d\)

The increase of 1 to the left inequality, \(d \leq \log(N)+1\), and Combining the previous outcome, we got, \(\log(N) < d \leq \log(N) + 1\). That's would be to say, that number of number d by \(O(\log(N))\) is higher and lower. Consequently, the number of transactions in the code is \(O(\log(N))\)

We have that the number of operations that are executed in the code in terms of n  is mathematically given as

The quantity of operations done in the code is O(log(N))

Operation

Generally the equation for the   is mathematically given as

If we think about a number,

with d digits is between 10^(d-1) inclusive and 10^d exclusive.

Let d be the wide variety of digits in N

10^(d-1) <= N < 10^d

d-1 <= log(N) < d

d <= log(N) + 1,

The Inequality

log(N) < d <= log(N) + 1.

Therefore

The quantity of operations done in the code is O(log(N))

For more information on Inequality visit

https://brainly.com/question/19491153

If a large organization wants software that will benefit the entire organization—what's known as enterprise application software—the organization must develop it specifically for the business in order to get the functionality required.

Answers

Answer:

Hello your question lacks the required options which is : True or False

answer : TRUE

Explanation:

If a large organization wants to develop a software that will benefit the entire organization such software will be known as an enterprise application software and such application software must be developed in such a way that it meets the required purpose for which the organization is designed it for.

An enterprise application software is a computer software developed specially to satisfy the specific needs of an entire  organization inside of the individual needs of the people working in the organization.

Use this website to answer the question being asked.

Use this website to answer the question being asked.

Answers

G;;gle Cloud products used in healthcare are those digital products that are used for the purpose of managing data within the healthcare sector.

What are G;;gle Cloud products?

G;;gle Cloud products consist of materials that are used for the purpose of analyzing data to make operations smoother within the health sectors and other key industries.

For instance, there is a product for managing data analytics, API, and operational platforms. These products make work easier and also allow for cooperation and interactions within the workplace.

Learn more about G;;gle Cloud Products here:

https://brainly.com/question/14376058

#SPJ1

How Charles Babbage Concept of
Computer has help the modern
Computer​

Answers

English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine. Although it was never completed, the Analytical Engine would have had most of the basic elements of the present-day computer.

what are logic gates ?​

Answers

Explanation:

idealized model of computation or physical electronic device implementing a Boolean function, a logical operation performed on one or more binary inputs that produces a single binary output. 

A logic gate is an idealized model of computation or physical electronic device implementing a Boolean function, a logical operation performed on one or more binary inputs that produces a single binary output.

New forensics certifications are offered constantly. Research certifications online and find one not discussed in this chapter. Write a short paper stating what organization offers the certification, who endorses the certification, how long the organization has been in business, and the usefulness of the certification or its content. Can you find this certification being requested in job boards?

Answers

Answer:

Computer forensics is gathering information or evidence from a computer system in order to use it in the court of law. The evidence gotten should be legal and authentic.

These organization gives certifications for computer forensics

1. Perry4law: they provide training to students, law enforcement officers. There services includes forensics training, research and consultancy.

2. Dallas forensics also offers similar services

3. The New York forensics and electronic discovery also teach how to recover files when deleted, how to get information from drives and how to discover hidden information.

alle Mbawah: Attempt 1 How does a bystander become an advocate? By harassing the bully until he or she stops the harmful activity By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 (5 points) alle Mbawah : Attempt 1 How does a bystander become an advocate ? By harassing the bully until he or she stops the harmful activity By taking action in either reporting the bully or otherwise supporting the victim By ignoring the situation By becoming a victim him- or herself to show concern Question 3 ( 5 points )what is the ans​

Answers

Answer:By reporting the bully or supporting the victim that's what I would do

Explanation:

A bystander becomes an advocate by taking action in either reporting the bully or otherwise supporting the victim. Thus, the correct option for this question is B.

What is an Advocate?

An advocate may be characterized as a type of person that supports another person in order to help you express your views and wishes, and help you stand up for your rights. It is the one who pleads with another's cause, who helps another by defending or comforting him.

According to the context of the story, a bystander has their own responsibilities in case of any harmful activities going out in their surroundings. They are required to take action in either reporting the bully or otherwise supporting the victim. In this case, harmful activities reduce from our surroundings. Everything required some actions and initiations.

Therefore, the correct option for this question is B.

To learn more about Advocate, refer to the link:

https://brainly.com/question/26054678

#SPJ2

If you research the average salary for certain jobs or careers, you’ll find that the actual salaries can be higher than the averages. Why would that happen?

A.
There may be many applicants competing for each position, which drives the salaries higher.

B.
If the average salary and the actual salary differ, then companies are breaking the law.

C.
Some areas have higher employment levels, so companies have to offer workers more money.

D.
Some types of jobs have high turnover—people quit them more often than other jobs.

Answers

If you research the average salary for certain jobs or careers, you’ll find that the actual salaries can be higher than the averages. The reason it happen is option D. Some types of jobs have high turnover—people quit them more often than other jobs.

Why would a business have a high rate of turnover?

Many of the leading causes of turnover is as a result of poor pay or work-life balance, little training, and few opportunities for career advancement and it also depend on the manager.

Hence HR teams sometimes find supervisors who are blatantly unqualified to manage people and either transition them to new roles or offer assistance and training.

The reason for difference in wages are due to

Level of Credentials. The level of Experience and skill. Industry or employer. Nature of Job tasks. The Geographic location. Success and performance.

Learn more about salary from

https://brainly.com/question/12241195
#SPJ1

How does a file reader know where one line starts and another ends?

Every line in a text file has a hidden EOL (end of line) set of characters.

Python knows how many characters to expect in a line.

The last item in a line of data does not have a comma after it.

Every line starts with a BOL (beginning of line) character.

Answers

Answer:

Every line in a text file has a hidden EOL (end of line) set of characters.

Explanation:

The EOL characters are CR+LF, a.k.a. carriage return (13) + line feed (10).

Some text files only use LF characters to denote a line ending.

What is the difference between copy- paste and cut-paste​

Answers

Answer:

Copy/ Paste - In the case of Copy/paste, the text you have copied will appear on both the locations i.e the source from where you copied the text and the target where you have pasted the text.

Cut/paste- In the case of Copy/paste, the text you have copied will appear on only one location i.e the target where you have pasted the text. The text will get deleted from the original position

The Microsoft Assessment and Planning (MAP) Toolkit is used to: verify that the domain controller has no software applications installed on the system. configure the software applications on a remote server. install other software applications on a domain controller. limit access to various resources.

Answers

Answer:

verify that the domain controller has no software applications installed on the system.

Explanation:

Microsoft Assessment and Planning (MAP) Toolkit is described as an automated medium for multi-product planning and assessment between different servers and desktops. It can be used by Data Administrators to obtain vital information about a client's server.

MAP Toolkit can also be used to verify the software information in a domain.

An early attempt to force users to use less predictable passwords involved computer-supplied passwords. The passwords were eight characters long and were taken from the character set consisting of lowercase letters and digits. They were generated by a pseudorandom number generator with 215possible starting values. Using technology of the time, the time required to search through all character strings of length 8 from a 36-character alphabet was 112 years. Unfortunately, this is not a true reflection of the actual security of the system. Explain the problem.

Answers

Answer:

Recently, with the new and advanced hacking algorithms and affordable high-performance computers available to adversaries, the 36 character computer suggested passwords can easily be insecure.

Explanation:

The 8 length passwords generated pseudo-randomly by computers are not secure as there are new algorithms like the brute force algorithm that can dynamically obtain the passwords by looping through the password length and comparing all 36 characters to get the right one.

And also, the use of high-performance computers makes these algorithms effective

In the winter, municipal snowplows must plow both sides of city streets that are bidirectional
(two-way traffic) but they only make a single pass over unidirectional (one-way) streets. We can
represent city streets as the edges in a graph using nodes for intersections. Of course, it is a
requirement that every street be plowed appropriately (once in each direction for bidirectional
streets and only once in the proper direction for unidirectional streets). Write a program that
uses integers to represent nodes, and tuples (pairs of integers enclosed in parentheses, e.g., (4
7), to represent a street from node 4 to node 7, and a second tuple, (7 4) to represent the fact
that this is a bidirectional street). Assume that there is but a single snowplow and it must start
and return to node 1. Your program must read a collection of tuples from a file and then
produce driving instructions for the snowplow operator telling the sequence of intersections
(nodes) to visit so that all the streets are appropriately plowed. If it is impossible to perform a
correct plowing (some street would be left unplowed or some street would be plowed twice)
your program must report this fact. Your program should repeatedly read collections of tuples
and processes the information until an end-of-file is encountered. Your program will lose a
significant number of points if your algorithm fails to work properly for cities (graphs)
containing both bidirectional and unidirectional streets.
Your solution must include the data file that it uses for input. Remember NOT to use an
absolute path to access the data file – use a relative path. Be certain your data describes several
different city street situations so that your program can demonstrate that it meets all the
requirements.

Answers

Using the knowledge in computational language in python it is possible to write a code that represent city streets as the edges in a graph using nodes for intersections.

Writting the code:

#include <cv.hpp>

#include <opencv2/highgui/highgui.hpp>

#include "caliberate.h"

#include <iostream>

#include <ctime>

#include <cmath>

using namespace std;

using namespace cv;

VideoCapture capture; //The capture class captures video either from harddisk(.avi) or from camera

Mat frameImg;

Mat g_image;

double dist(Point2i x1, Point2i x2)

{

return sqrt( pow((x1.x-x2.x),2) + pow((x1.y-x2.y),2) );

}

int main()

{

string fileName = "traffic.avi";

capture.open(fileName);

if( !capture.isOpened() )

{

cerr<<"video opening error\n"; waitKey(0); system("pause");

}

Mat frameImg_origSize; //image taken from camera feed in original size

namedWindow( "out" , CV_WINDOW_AUTOSIZE); //window to show output

namedWindow( "trackbar", CV_WINDOW_AUTOSIZE); //Trackbars to change value of parameters

resizeWindow( "trackbar", 300, 600); //Resizing trackbar window for proper view of all the parameters

capture>>frameImg_origSize;

if( frameImg_origSize.empty() ) { cout<<"something wrong"; }

resize(frameImg_origSize, frameImg, SMALL_SIZE, 0, 0, CV_INTER_AREA); //Resize original frame into smaller frame for faster calculations

g_image = Mat(SMALL_SIZE, CV_8UC1); g_image.setTo(0); //Gray image of frameImg

Mat roadImage = Mat(SMALL_SIZE, CV_8UC3); //Image of the road (without vehicles)

roadImage = findRoadImage();

calibPolygon(); //Polygon caliberation: Select four points of polygon (ROI) clockwise and press enter

Mat binImage = Mat(SMALL_SIZE,CV_8UC1); //white pixel = cars, black pixel = other than cars

Mat finalImage = Mat(SMALL_SIZE, CV_8UC3); //final image to show output

time_t T = time(0); //Current time

float fps = 0, lastCount = 0; //frames per second

int thresh_r = 43, thresh_g = 43, thresh_b = 49; //Threshold parameters for Red, Green, Blue colors

createTrackbar( "Red Threshold", "trackbar", &thresh_r, 255, 0 ); //Threshold for Red color

createTrackbar( "Green Threshold", "trackbar", &thresh_g, 255, 0 ); //Threshold for Green color

createTrackbar( "Blue Threshold", "trackbar", &thresh_b, 255, 0 ); //Threshold for Blue color

int dilate1=1, erode1=2, dilate2=5; //Dilate and Erode parameters

Mat imgA = Mat(SMALL_SIZE, CV_8SC3); //Used for opticalFlow

int win_size = 20; //parameter for opticalFlow

int corner_count = MAX_CORNERS; //no of points tracked in opticalFlow

vector<Point2i> cornersA, cornersB;

frameImg.copyTo(imgA);

int arrowGap = 5; //distance between consecutive tracking points (opticalFlow)

createTrackbar("dilate 1","trackbar", &dilate1, 15, 0);

createTrackbar("erode 1","trackbar", &erode1, 15, 0);

createTrackbar("dilate 2","trackbar", &dilate2, 15, 0);

See more about python at brainly.com/question/18502436

#SPJ1

In the winter, municipal snowplows must plow both sides of city streets that are bidirectional (two-way

Write or convert this code into .hla high level assembly program known as (HLA).
; Dollar ValueMenu
; Written by [Your Name Here]

.include "hla.h"

.data
; data storage declarations

.code
main proc

mov (type word ; Declare a working variable
; to hold the user's input
; from the keyboard.
;
; This will be a 16-bit value
; packed with information
; about the order.
stdout ;
; Tell HLA which output device
; you want to use for output.
;
mov (eax, 0) ; Clear the EAX register.
;
mov ebx, type ; Move the address of the
; type variable into EBX.
;
stdout.put
;
; Print out the prompt to
; get the user's input.
;
"Feed me your order as 4 hex digits: "
;
stdin.get ; Get the user's input.
;
; The input will be a 16-bit
; value in packed form, so
; we'll read it in as a word.
;
mov (type, eax) ; Store the user's input

Answers

The given code is not complete and contains errors. However, I can provide you with an example of how to write a high-level assembly (HLA) program to accomplish the task of storing user input as a 16-bit value in HLA.

assembly:

program DollarValueMenu;

#include("stdlib.hhf")

static

   userInput: word ; Declare a working variable to hold the user's input

begin DollarValueMenu;

   stdout.put("Feed me your order as 4 hex digits: ")

   stdin.geti16(userInput) ; Get the user's input as a 16-bit value

   mov(type, userInput) ; Store the user's input in the "type" variable

   stdout.put("User input: ")

   stdout.puti16(userInput, nl) ; Display the user's input

end DollarValueMenu;

In this HLA program, we declare a `userInput` variable of type `word` to hold the user's input as a 16-bit value. We use the `stdin.geti16` function to read the input from the user and store it in the `userInput` variable. Then, we use the `stdout.puti16` function to display the user's input on the output screen.

Please note that the code assumes that you have the necessary HLA libraries and setup to compile and run the program.

For more questions on HLA, click on:

https://brainly.com/question/31365734

#SPJ8

a technician is replacing a cable modem. the cable from the cable company has an inner solid wire conductor and an outer mesh conductor separated by pvc plastic insulation. which of the following network cable types is being used?

Answers

The network cable type that is being used by the technician is a coaxial cable. Coaxial cables are typically used in cable television systems, office buildings, and other work-sites for local area networks.

These cables are designed with an inner solid wire conductor and an outer mesh conductor, which are separated by PVC plastic insulation.

The inner conductor is responsible for carrying the signal, while the outer conductor serves as a shield to protect the signal from interference. The PVC plastic insulation helps to further protect the cable and prevent any signal loss. Therefore, the technician is replacing a coaxial cable in this scenario.

Learn more about plastic insulation: https://brainly.com/question/28443351

#SPJ11

What kind of image does this photograph represent?


A.
group portrait photograph
B.
architecture photograph
C.
portrait photograph
D.
still-life photograph
E.
action photograph

What kind of image does this photograph represent?A. group portrait photographB. architecture photographC.

Answers

Answer:

D

Explanation:

Write pseudocode for a program that allows a user to enter 20 numbers, then displays all of the numbers, the largest number, the smallest, the total and the average.

Answers

Answer:

set array of size 20

set larger_no to 0

set smallest_no to 0

for loop 20 times:

  asks for input for each input from user

  insert each value in array

run for loop 20 times again:

   display each number in array

   Inside for loop check IF number > larger_no then

    set larger_no=number

  Inside for loop check ELSE IF number <smallest_no THEN

     smallest_no=number

Write  smallest_no

Write larger_no

Discuss at least 1 Miscrosoft Windows security features that could protect data.

Answers

Answer:

Virus & threat protection.

Explanation:

Monitor threats to your device, run scans, and get updates to help detect the latest threats.

Answer:

User account control.

Explanation:

prevents malware damage. Helps organizations deploy a better-managed desktop.

Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.

Answers

Answer:

Here's an example of a program that does what you've described:

# Get the number of elements in the array

n = int(input("Enter the number of elements to store in the array: "))

# Initialize the array

arr = []

# Get the elements of the array from the user

print("Enter the elements of the array:")

for i in range(n):

   arr.append(int(input()))

# Print out which numbers are divisible by 5

print("The following numbers are divisible by 5:")

for i, x in enumerate(arr):

   if x % 5 == 0:

       print(f"{i}: {x}")

This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.

Explanation:

Other Questions
Someone help im so confused T-T Basic life functions, such as the breathing and basic cardiac functions, depend primarily on activity in the Hunter syndrome is a rare genetic disorder in which large sugar molecules called glycosaminoglycans build up in body tissues. Hunter syndrome causes abnormalities in many organs, including the skeleton, heart, and respiratory system. In severe cases, this leads to death during the teenage years. Hunter syndrome is caused by a recessive gene on the X chromosome. If a woman who is normal (but had a father with the disease) marries a normal man, what are the chances of having a daughter affected by the disease A bicycle and rider going 14 m/s approach a hill. answer fast and get brain listed pls help everyone this is due tomorrow at 8 am Risk Swans Sportswear is considering bringing out a line of designer jeans. After market research, the firm has established the expectations shown in the following shown in the following table about the annual rate of return. Use the table to calculate the expected value of return for the line.Market acceptance Probability Annual rate of returnVery poor 0.06 0.004Poor 0.21 0.033Average 0.47 0.089Good 0.21 0.159Excellent 0.05 0.225The expected return for the line is ___% hello beautiful souls~help me with these questions What did Odysseus advise Penelope to do when he left?remarry when Telemachus could grow a beardremarry after twenty yearsswear to wait for him no matter whatremarry after ten years Where is protective ozone located? Where is harmful ozone located? a knowledge of styles helps put a musical work in the context of its creation. a. medium b. historical c. jazz Which group would need protection from a Klan rally in a small town ? Given that the point (-24, 7) is on the terminal side of an angle, theta , find the exact value of the following: sin()= cos()= tan()= csc()= sec()= cot()= A variable is approximately normally distributed. If you draw a histogram of the distribution of the variable, roughly what shape will it have? Choose the correct answer below.A. The histogram of the distribution of the variable would be roughly bell shaped.B. The histogram of the distribution of the variable would have one peak and a long tail to the left.C. The histogram of the distribution of the variable would have one peak and a long tail to the rightD. The histogram of the distribution of the variable would depend on the values of the data.E. There is insufficient information to determine the shape of the histogram of the distribution of the variable. it is the response of the body and mind to unpleasant events in life How are predictions used in the scientific process? a to help scientists test hypotheses b to help scientists communicate results c to help scientists analyze data d to help scientists formulate theories How did the action of Commodore Perry help Japan in 1854?Perry helped the Japanee create a trong naval defene. Perry helped the Japanee make contact with the outide world. Perry helped the Japanee defend themelve from invader. Perry helped the Japanee tart diplomatic relation with European countrie Gold, silver, cooper, iron. Identity nouns Le fils de l' lnstituteur Security safeguards that involve vulnerabilities in hardware and software are referred to as ________ safeguards.