Write a program that lets the user input two integers. You want to triple both integers together in a separate function (but you can't directly return two values from the function). So pass the integers two ways by reference to the same function. Use one argument by pointer (and triple what the pointer is pointing at - the variable in main) and one argument by a reference variable (a new local name to the variable in main) so we can try both ways without any return. Print the results in main. Include the proper function prototype. Attach your .cpp file and an output .txt file and submit.

Answers

Answer 1

Answer:

Explanation:

#include <iostream>

using namespace std;

//function declaration

void triple(int *a,int *b);

//function implementation which will triple the numbers

void triple(int *a,int *b)

{

  //Tripling the numbers

  *a=(*a)*(*a)*(*a);

  *b=(*b)*(*b)*(*b);

}

int main()

{

//Declaring varibles  

int a,*b,c;

//Getting the First Number entered by the user

cout<<"Enter First number :";

cin>>a;

//getting the second number entered by the user

cout<<"Enter Second number :";

cin>>c;

//Assigning the address of variable 'c' to the pointer variable 'b'

b=&c;

//calling the function by passing the arguments

triple(&a,b);

//Displaying the output after tripling the numbers.

cout<<"After Tripling the numbers are "<<a<<" and "<<*b<<endl;

     

return 0;

}

_____________________________________________

Output:

(image attached)

Write A Program That Lets The User Input Two Integers. You Want To Triple Both Integers Together In A

Related Questions

a stop watch is used when an athlete runs why

Answers

Explanation:

A stopwatch is used when an athlete runs to measure the time it takes for them to complete a race or a specific distance. It allows for accurate timing and provides information on the athlete's performance. The stopwatch helps in evaluating the athlete's speed, progress, and overall improvement. It is a crucial tool for coaches, trainers, and athletes themselves to track their timing, set goals, and analyze their performance. Additionally, the recorded times can be compared to previous records or used for competitive purposes,such as determining winners in races or setting new records.

you can support by rating brainly it's very much appreciated ✅

What is the major difference between the intranet and extranet?
Question 36 options:

Intranets hold more importance

The major difference between the two, however, is that an intranet is typically used internally.

Extranets improve internal communications

None of the above

Answers

Explanation:

Iinternet is hudge graphicla network and intranet is small network as compare to internet

Your professor is advising a new crowd-funding app for women's self-help groups (SHGs) in Latin America on their database architecture. This is the business requirement she has worked on: All campaigns belong to a SHG. An SHG must exist before a campaign is created, and when an SHG is deleted from the database, all its campaigns are deleted. SHGs always belong to a country, and a country must be added to the app before SHGs are added to it. Which of the following is true of the entities defined in the database? Select all that apply.

Question 6 options:

An SHG entity depends on a Campaign entity

A Campaign entity is a depend on the SHG entity

A Country is not dependent on the Campaign entity

An SHG entity is dependent on a Country entity

A Campaign is an Independent entity

Answers

Based on the given information, the following statements are true:

An SHG entity depends on a Country entity.A Campaign entity is dependent on the SHG entity.

What is a country entity?

In the context of database design, a country entity refers to a logical representation of a country within a database system.

It typically stores information related to countries, such as their names, codes, demographics, or any other relevant data.

The country entity serves as a reference point for other entities in the database, such as self-help groups (SHGs) or campaigns, allowing for proper organization and association of data within the system.

Learn more about Entity at:

https://brainly.com/question/29491576

#SPJ1

How can you determine if the story is told in the third person

Answers

Answer:

They use pronouns like They, Them, He, She, It.

Module 7: Final Project Part II : Analyzing A Case
Case Facts:
Virginia Beach Police informed that Over 20 weapons stolen from a Virginia gun store. Federal agents have gotten involved in seeking the culprits who police say stole more than 20 firearms from a Norfolk Virginia gun shop this week. The U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives is working with Virginia Beach police to locate the weapons, which included handguns and rifles. News outlets report they were stolen from a store called DOA Arms during a Tuesday morning burglary.

Based on the 'Probable Cause of affidavit' a search warrant was obtained to search the apartment occupied by Mr. John Doe and Mr. Don Joe at Manassas, Virginia. When the search warrant executed, it yielded miscellaneous items and a computer. The Special Agent conducting the investigation, seized the hard drive from the computer and sent to Forensics Lab for imaging.

You are to conduct a forensic examination of the image to determine if any relevant electronic files exist, that may help with the case. The examination process must preserve all evidence.
Your Job:
Forensic analysis of the image suspect_ImageLinks to an external site. which is handed over to you
The image file suspect_ImageLinks to an external site. ( Someone imaged the suspect drive like you did in the First part of Final Project )
MD5 Checksum : 10c466c021ce35f0ec05b3edd6ff014f
You have to think critically, and evaluate the merits of different possibilities applying your knowledge what you have learned so far. As you can see this assignment is about "investigating” a case. There is no right and wrong answer to this investigation. However, to assist you with the investigation some questions have been created for you to use as a guide while you create a complete expert witness report. Remember, you not only have to identify the evidence concerning the crime, but must tie the image back to the suspects showing that the image came from which computer. Please note: -there isn't any disc Encryption like BitLocker. You can safely assume that the Chain of custody were maintained.
There is a Discussion Board forum, I enjoy seeing students develop their skills in critical thinking and the expression of their own ideas. Feel free to discuss your thoughts without divulging your findings.
While you prepare your Expert Witness Report, trying to find answer to these questions may help you to lead to write a conclusive report : NOTE: Your report must be an expert witness report, and NOT just a list of answered questions)
In your report, you should try to find answer the following questions:

What is the first step you have taken to analyze the image
What did you find in the image:
What file system was installed on the hard drive, how many volume?
Which operating system was installed on the computer?
How many user accounts existed on the computer?
Which computer did this image come from? Any indicator that it's a VM?
What actions did you take to analyze the artifacts you have found in the image/computer? (While many files in computer are irrelevant to case, how did you search for an artifacts/interesting files in the huge pile of files?
Can you describe the backgrounds of the people who used the computer? For example, Internet surfing habits, potential employers, known associates, etc.
If there is any evidence related to the theft of gun? Why do you think so?
a. Possibly Who was involved? Where do they live?
b. Possible dates associated with the thefts?
Are there any files related to this crime or another potential crime? Why did you think they are potential artifacts? What type of files are those? Any hidden file? Any Hidden data?
Please help me by answering this question as soon as possible.

Answers

In the case above it is vital to meet with a professional in the field of digital forensics for a comprehensive analysis in the areas of:

Preliminary StepsImage Analysis:User Accounts and Computer Identification, etc.

What is the Case Facts?

First steps that need to be done at the beginning. One need to make sure the image file is safe by checking its code and confirming that nobody has changed it. Write down who has had control of the evidence to show that it is trustworthy and genuine.

Also, Investigate the picture file without changing anything using special investigation tools. Find out what type of system is used on the hard drive. Typical ways to store files are NTFS, FAT32 and exFAT.

Learn more about affidavit from

https://brainly.com/question/30833464

#SPJ1

Explain what it means when industry leaders indicate that they are moving their organization from knowledge-centered support to knowledge-centered service. Also describe some of the implications for this movement towards knowledge centered service. What are some of the struggles employees may face?

Answers

Organizational support teams may find it difficult to keep up, but Knowledge Centered Service is changing that. Knowledge is emphasized as a crucial asset for providing service and support in the knowledge-centered service model, or KCS

What are some of the benefits of using KCS methodology?Businesses that employ KCS methodology discover that it offers a variety of advantages. It gradually enhances customer satisfaction, lowers employee turnover, and shortens the time required for new hires to complete their training. Ursa Major is working to set up a program with these features in order to achieve those benefits.The goal of the content standard is to formally document or use a template that outlines the choices that must be made regarding the structure and content of KCS articles in order to promote consistency. KCS articles come in two varieties: - Close the loop since articles are produced in response to customer demand.Digital is a way of life in the twenty-first century, particularly inside any business or organization. It seems that support functions can hardly keep up with the significant changes in innovation and productivity. Now that technical support is a daily part of customer interactions, it is no longer the internal, back-office division that customers never saw. Organizational support teams may find it difficult to keep up, but Knowledge Centered Service is changing that.

To learn more about KCS methodology refer to:

https://brainly.com/question/28656413

#SPJ1

Using WEKA software, answer the following questions based on the Phishing dataset provided.
a) Draw a simple confusion matrix (general one, not from WEKA) of the possible data scenarios for this
Phishing dataset. (0.5 Mark)
b) Draw a table that will outline the Accuracy, Precision, Recall, F-Measure, ROC Area of the following
Rules based algorithms; RIPPER (JRip), PART, and Decision Table (2 Marks)
c) Use Decision Trees algorithms (Random Forest, Random Tree) and Artificial Neural Network
(Multilayer Perceptrol) to compare with the results in part b) above. Do you have better prediction
accuracy with these in this dataset? (2 Marks)
d) What is your conclusion in these experiments pertaining to ML algorithms used? (0.5 Mark)

Answers

Answer:

This isn’t a difficult question, its a task

Explanation:

Using WEKA software, answer the following questions based on the Phishing dataset provided.a) Draw a

a simple structured program in c++ to calculate average of n items​

Answers

Answer:

#include <iostream>

using namespace std;

int main ()

{

 int n, i;

 float sum = 0.0, average;

 cout << "Enter the number of items:";

 cin >> n;

 float num[n];

 for(i = 0; i < n; ++i)

 {

   cout << "Enter a number: ";

   cin >> num[i];

   sum += num[i];

 }

 average = sum / n;

 cout << "Average = " << average;

 return 0;

}

Explanation:

OK, I let ChatGPT write this one, but it is a proper solution. You can simplify it by not storing each number in an array element. This is because other than adding it to the sum, you don't need these numbers.

Please help! I need to submit this quick!

Please help! I need to submit this quick!

Answers

Answer:

B, C, A

Explanation:

i think those are right

Sarah is a detail-oriented programmer. While testing her program, what other skill would she have to apply in order to detect all bugs?
A.
troubleshooting
B.
business skills
C.
managerial skills
D.
concentration
E.
time management

Answers

Answer:

A. troubleshooting

Explanation:

Troubleshooting is the process of trying to detect problems with a software or hardware component so as to apply solutions to it.

Therefore, Sarah would need troubleshooting skills to help her test her program to detect all bugs and fix it.

What is Information Privacy

Answers

Answer:

It is just a way to keep things like your address and I.P safe

Explanation:

Relationship between the collection and dissemination of data, technology and the public expectation of privacy, and the legal and political issues surrounding them. It’s is also known as data privacy or data protection

How many input configurations does the Boolean expression (x AND Y) OR (NOT x
AND NOT y) have?
4
6
8
10
CAN SOMEONE PLSEASEEE HELP ME

Answers

Answer:

4

Explanation:

There are only 2 inputs, X and Y, and the number of different input configurations will be 2-to-the-power-of the number of inputs.

2² = 4

In other words, XY can be 00,01,10 or 11 and that's it. Four combinations.

BTW, (x AND Y) OR (NOT x AND NOT y) is allso called XNOR. See picture.

How many input configurations does the Boolean expression (x AND Y) OR (NOT xAND NOT y) have?46810 CAN

A career action plan is used to:
organize career-related thoughts and goals
interview people with jobs one is interested in.
begin the self-assessment process.
None of these choices are correct

Answers

A career action plan is typically used to: A. organize career-related thoughts and goals.

What is a career action plan?

A career action plan can be defined as a planning document which is developed, owned and managed by an individual, so as to help him or her to organize and reflect on his or her increased career development learning.

This ultimately implies that, a career action plan is typically used by an individual to organize career-related thoughts, clear vision and goals.

Read more on career action plan here: https://brainly.com/question/6947486

#SPJ1

write a program that takes in a positive integer as input, and output a string of 1's and 0's representing the integer in binary. for an integer x; the algothm is as long as x is greater than 0 output x % (remainder is either 0 or 1 . x=x/2 in coral language

Answers

Answer: Provided in the explanation section

Explanation:

The full questions says:

write a program that takes in a positive integer as input, and output a string of 1's and 0's representing the integer in binary. for an integer x; the algothm is as long as x is greater than 0 output x % (remainder is either 0 or 1 . x=x/2 in coral language. Note: The above algorithm outputs the 0's and 1's in reverse order.

Ex: If the input is:

6

the output is:

011

CODE:

#include <stdio.h>

int main() {

   int n;

   scanf("%d", &n);

   while (n > 0) {

       printf("%d", n % 2);

       n /= 2;

   }

   printf("\n");

   return 0;

}

2

#include <stdio.h>

int main() {

   int n;

   scanf("%d", &n);

   while (n > 0) {

       printf("%d", n % 2);

       n /= 2;

   }

   return 0;

}

cheers i hope this helped !!

Which of the following is not a term used as a synonym for module?
O a. procedure
O b. object
O c. subroutine
O d. method

Answers

C is correct I hope you get A

QUESTION NO-1: The Highest quality printer is dot-matrix True False Prev​

Answers

It is false that the Highest quality printer is basically dot-matrix.

What is dot-matrix?

A dot matrix is a patterned 2-dimensional array used to represent characters, symbols, and images.

Dot matrices are used to display information in most types of modern technology, including mobile phones, televisions, and printers. The system is also used in the textile industry for sewing, knitting, and weaving.

Dot-matrix printers are an older technology that uses pins to strike an ink ribbon in order to print characters and images on paper.

While dot-matrix printers are capable of producing multi-part forms and have low operating costs, they are generally regarded as having lower print quality when compared to more modern printer technologies.

Thus, the given statement is false.

For more details regarding dot-matrix, visit:

https://brainly.com/question/4953466

#SPJ9

What can toxic substances do to your body?
Select all that apply.

Answers

Answer:

burn you, affect your whole body

Explanation:

hope this helps :) !!!

How do you remove split panes in a work sheet you are working on

Answers

To remove split panes in a worksheet, go to the "View" tab, locate the "Split" button, and click on it. This will remove the split panes and restore a single-pane view.

Here is how you can do it by following these steps:

Open the Worksheet: Open the worksheet in which you want to remove the split panes. Make sure you are working in the appropriate Excel application.

Identify Split Panes: Look for the split panes in your worksheet. Split panes divide the worksheet into separate sections, allowing you to view different parts simultaneously.

Navigate to the View Tab: In Excel, navigate to the "View" tab located at the top of the window. The "View" tab contains various options to modify the display settings of your worksheet.

Locate the Split Button: In the "View" tab, locate the "Split" button in the "Window" group. The "Split" button has an icon resembling a window divided into panes.

Click on the Split Button: Click on the "Split" button to remove the split panes from your worksheet. When you click the button, the split panes will be removed, and the worksheet will return to a single pane view.

Adjust Scroll Bars (if necessary): After removing the split panes, you may need to adjust the scroll bars to view the entire worksheet. Use the scroll bars located at the right and bottom of the window to navigate through the worksheet.

By following these steps, you can remove split panes and revert to a single-pane view in your Excel worksheet. This allows you to work with a more traditional, uninterrupted view of your data. Remember that these steps apply to the desktop version of Microsoft Excel, and the interface may vary slightly in different versions or platforms.

For more questions on split panes in a worksheet

https://brainly.com/question/31578129

#SPJ11

Write code in MinutesToHours that assigns totalHours with totalMins divided by 60

Given the following code:

Function MinutesToHours(float totalMins) returns float totalHours
totalHours = MinutesToHours(totalMins / 60)
// Calculate totalHours:
totalHours = 0

Function Main() returns nothing
float userMins
float totalHours

userMins = Get next input
totalHours = MinutesToHours(userMins)

Put userMins to output
Put " minutes are " to output
Put totalHours to output
Put " hours." to output

Answers

Answer:

Function MinutesToHours(float totalMins) returns float totalHours

   // Calculate totalHours:

   totalHours = totalMins / 60

   return totalHours

End Function

Can someone help me with the following logical circuit, perform two actions. FIRST, convert the circuit into a logical
statement. SECOND, create a truth table based on the circuit/statement. (20 pts. each for statement and
truth table.

Can someone help me with the following logical circuit, perform two actions. FIRST, convert the circuit

Answers

Creation of Truth Table Based on the logical statement, we can create a truth table as shown below:

A B (not A) (not A) and B (not A) and B or A A or (not A) and B 0 0 1 0 1 0 0 1 0 0 1 0 1 1 0 1 1 0 1 1 1 0 1 1 0 1 1 0 1 1 1

The first two columns show the input values, the next column shows the output of the NOT gate, then the output of the AND gate, then the output of the OR gate and finally the output of the logical statement.

We can observe that the output of the logical statement is the same as the output of the OR gate.

Given the logical circuit, we are required to perform two actions on it. Firstly, convert the circuit into a logical statement. Secondly, create a truth table based on the circuit/statement. Let's understand how to do these actions one by one:Conversion of Circuit into Logical Statement.

The given circuit contains three components: NOT gate, AND gate and OR gate. Let's analyze the working of this circuit. The two input variables A and B are first passed through the NOT gate, which gives the opposite of the input signal.

Then the NOT gate output is passed through the AND gate along with the input variable B. The output of the AND gate is then passed through the OR gate along with the input variable A.We can create a logical statement based on this working as: (not A) and B or A. This can also be represented as A or (not A) and B. Either of these statements is correct and can be used to construct the truth table.

Creation of Truth Table Based on the logical statement, we can create a truth table as shown below:

A B (not A) (not A) and B (not A) and B or A A or (not A) and B 0 0 1 0 1 0 0 1 0 0 1 0 1 1 0 1 1 0 1 1 1 0 1 1 0 1 1 0 1 1 1

In the truth table, we have all possible combinations of input variables A and B and their corresponding outputs for each component of the circuit.

The first two columns show the input values, the next column shows the output of the NOT gate, then the output of the AND gate, then the output of the OR gate and finally the output of the logical statement.

We can observe that the output of the logical statement is the same as the output of the OR gate.

For more such questions on Truth Table, click on:

https://brainly.com/question/13425324

#SPJ8

PLEASE HURRY!!
Look at the image below!

PLEASE HURRY!!Look at the image below!

Answers

answer.capitalize() is the missing line.

write principles of information technology

Answers

Here are some principles of information technology:

Data is a valuable resourceSecurity and privacy

Other principles of information technology

Data is a valuable resource: In information technology, data is considered a valuable resource that must be collected, stored, processed, and analyzed effectively to generate useful insights and support decision-making.

Security and privacy: Ensuring the security and privacy of data is essential in information technology. This includes protecting data from unauthorized access, theft, and manipulation.

Efficiency: Information technology is all about making processes more efficient. This includes automating tasks, reducing redundancy, and minimizing errors.

Interoperability: The ability for different systems to communicate and work together is essential in information technology. Interoperability ensures that data can be shared and used effectively between different systems.

Usability: Information technology systems should be designed with usability in mind. This means that they should be intuitive, easy to use, and accessible to all users.

Scalability: Information technology systems must be able to grow and expand to meet the changing needs of an organization. This includes the ability to handle larger amounts of data, more users, and increased functionality.

Innovation: Information technology is constantly evolving, and new technologies and solutions are emerging all the time. Keeping up with these changes and being open to innovation is essential in information technology.

Sustainability: Information technology has an impact on the environment, and sustainability must be considered when designing and implementing IT systems. This includes reducing energy consumption, minimizing waste, and using environmentally friendly materials.

Learn more about information technology at

https://brainly.com/question/4903788

#SPJ!

Explain and give examples of Cryptocurrency and Bitcoins?​

Answers

Cryptocurrencies:

Bitcoin (Of course)

Ethereum

Tether

Binance USD

Cardano

Bitcoin is a form of currency as well, along with other examples like Dogecoin and Litecoin.

Which of the following if statements uses a Boolean condition to test: "If you are 18 or older, you can vote"? (3 points)

if(age <= 18):
if(age >= 18):
if(age == 18):
if(age != 18):

Answers

The correct if statement that uses a Boolean condition to test the statement "If you are 18 or older, you can vote" is: if(age >= 18):

In the given statement, the condition is that a person should be 18 years or older in order to vote.

The comparison operator used here is the greater than or equal to (>=) operator, which checks if the value of the variable "age" is greater than or equal to 18.

This condition will evaluate to true if the person's age is 18 or any value greater than 18, indicating that they are eligible to vote.

Let's analyze the other if statements:

1)if(age <= 18):This statement checks if the value of the variable "age" is less than or equal to 18.

However, this condition would evaluate to true for ages less than or equal to 18, which implies that a person who is 18 years old or younger would be allowed to vote, which is not in line with the given statement.

2)if(age == 18):This statement checks if the value of the variable "age" is equal to 18. However, the given statement allows individuals who are older than 18 to vote.

Therefore, this condition would evaluate to false for ages greater than 18, which is not correct.

3)if(age != 18):This statement checks if the value of the variable "age" is not equal to 18.

While this condition would evaluate to true for ages other than 18, it does not specifically cater to the requirement of being 18 or older to vote.

For more questions on Boolean condition

https://brainly.com/question/26041371

#SPJ8

Can someone give me an example of code of any cartoon character using java applet please help me i need to make my project please☹️​

Answers

The Java code for a cartoon character using java applet is

import java.applet.Applet;

import java.awt.*;

public class CartoonCharacter extends Applet implements Runnable {

   Thread t;

   int x = 0;

   int y = 100;

   

   public void init() {

       setSize(500, 500);

       setBackground(Color.white);

   }

   

   public void start() {

       if (t == null) {

           t = new Thread(this);

           t.start();

       }

   }

   

   public void run() {

       while (true) {

           x += 10;

           repaint();

           try {

               Thread.sleep(100);

           } catch (InterruptedException e) {}

       }

   }

   

   public void paint(Graphics g) {

       g.setColor(Color.red);

       g.fillOval(x, y, 50, 50);

   }

}

How does the code work?

Note that the cartoon character is made like a red circle that navigates accross the screent.

The init() method sets the size of the applet and its background color,    while the      start( ) method creates a new thread and starts the animation loop in the run() method

Learn more about Java Code at:

https://brainly.com/question/29897053

#SPJ1

Which of the following would allow for the QUICKEST restoration of a server into a warm recovery site in a case in which server data mirroring is not enabled?a. Full backupb. incremental backupc. Differential back upd. Snapshot

Answers

Answer: C. Differential backup

Explanation: There are several ways od ensuring the preservation and storage of data even cases of disaster, one of such ways is data data mirroring which allows data to be replicated or copied in real time and several backup options. In cases where there there is need to restore a server, the warm recovery site provides a data or disaster recovery option used to mitigate the effect of data loss on organization. In the absence of data mirroring, differential backup option, provides the quickest recovery option as it only requires changes in the data stored after the last full backup. These speed experieced should be expected due to the relatively low data been dealt with rather than the entire data.

Who is least likely to be treated with somatropin?
A 3-year-old cow on a dairy farm
A 4-year-old girl with an XO genetic genotype
A 44-year-old boy with chronic renal failure and gronih deficiency
A 10-year-old boy with polydipsia and polyuria​

Answers

A 10-year-old boy with polydipsia and polyuria​ would likely not be treated with somatropin.

This is because somatropin is often used for growth issues and even short bowel syndrome, but from what I could find, nothing about polydipsia or polyuria​.

A 3-year-old cow on a dairy farm could need somatropin, specifically Bovine Somatotropin (bST) to increase milk production or fix growth issues

A 4-year-old girl with an XO genetic genotype would get somatropin because it is used to treat Turner syndrome (Same as XO genetic genotype)

A 44-year-old boy with chronic renal failure and growth deficiency would get somatropin because it is used to treat growth issues even in adults and chronic renal failure

How serious are the risks to your computer security?
Why is it important to protect a Wi-Fi network? What should you do to protect your Wi-Fi network?

Answers

The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

What are the risk results for information and computer security?

The term “information security risk” is known to be those  damage that occurs due to  an attacks against IT systems. IT risk is made up of a wide range of potential events, such as data breaches, regulatory enforcement actions, financial costs, and a lot more.

Some Examples of malware are viruses, worms, ransomware, spyware, and a lot others.

Hence, The seriousness of  the risks to your computer security is not to be a severe one. This is because Computer security risks  are due to the handwork of  malware such as, bad software, that can infect a  computer, and make the hacker to destroy your files, steal your data, or even  have access to your system without one's knowledge or authorization.

Learn more about computer security from

https://brainly.com/question/12010892

#SPJ1

____must cooperate with each other to neutralize the global threat of information censorship. Select 3 options.
The media
The web brigade
Bot armies
Civil society
The private sector​

Answers

The media must cooperate with each other to neutralize the global threat of information censorship. The correct option is the A.

What is the media?

The media is the group that collect information about the world and then provide it to the public. It is the main medium to get information about what is going on in the world.

Thus, the correct option is A.

Learn more about the media

https://brainly.com/question/21333773

#SPJ1

Answer:

the private sector

civil society

the media

Explanation:

took the test

Can you use Python programming language to wirte this code?
Thank you very much!

Can you use Python programming language to wirte this code?Thank you very much!

Answers

Using the knowledge of computational language in python it is possible to write code for reading temperature in Celsius degrees, then write code that converts it into Fahrenheit degrees.

Writting the code:

temp = input("Input the  temperature you like to convert? (e.g., 45F, 102C etc.) : ")

degree = int(temp[:-1])

i_convention = temp[-1]

if i_convention.upper() == "C":

 result = int(round((9 * degree) / 5 + 32))

 o_convention = "Fahrenheit"

elif i_convention.upper() == "F":

 result = int(round((degree - 32) * 5 / 9))

 o_convention = "Celsius"

else:

 print("Input proper convention.")

 quit()

print("The temperature in", o_convention, "is", result, "degrees.")

f = int(input('Please type in a temperature (F): '))

c = ((f - 32) * 5) / 9

print(f'{f} degrees Fahrenheit equals {c} degrees Celsius')

if c < 0:

   print("Brr! It's cold in here!")

See more about python at brainly.com/question/18502436

#SPJ1

Can you use Python programming language to wirte this code?Thank you very much!
Other Questions
Some people are better than others at detecting slight variations in the tastes of various blends of coffee. This best illustrates the importance of. a circle is drawn through (3,2),(-1,-2) and (5,-4).find the:(a) coordinates of the centre of the circle,(b) radius of the circle,(c) equation of the circle,showing working. Which argument might have been successfully used by an advocate of parliamentary reform inGreat Britain in 1830-1832? Define Protestant christians 11. Find the solutions of x^2 - x - 30 = 0.please look at photo and give detailed steps!! will give brainliest! thank you Find the value of x. Round your answer to the nearest tenth, if needed.2018 Which one of these are possible results?Group of answer choicesSeeing the flowers on a plantCounting the leaves on a plantThe actual number of new leaves on a plantHow much sunlight you put the plant inHow often you watered the plantSeeing the pretty leaves on a plantPlease answer QUICKLY!! to whom should a medical assistant provide the negative pregnancy test results for a 15-year-old patient? 2. Organs or structural parts that appear to have a common evolutionary origin are called______structures. These structures aresimilar in_____but are not always similar in_______ who is most likely to have trouble performing the antisaccade task. When People believe they have control over events in their lives, they have an external locus of control. 1. True 2. False when 18.0 ml of a 4.51e-4 m nickle nitrate solution is combined with 25.0 ml of a 7.59e-4 m sodium cyanide solution does a precipitate form? the ksp of nickle cyanide is 3.0e-23. (yes or no) for these conditions the reaction quotient, q, is equal to Which of the following models have inputs that vary according to a probability distribution, so the outcomes differ every time the model is run?A) SIR modelsB) Compartmental modelsC) Deterministic modelsD) Stochastic models Order these fractions from the biggest to the smallest, 2/3, 1/3, 5/3, 3/3, 4/3 If a bag contains 12 apples 4 bananas and 8 oranges what is the part - to- whole ratio of apple to all fruit I need some assistance with my marketing merch. practice,please. And please show the work for me to bettergrasp the concept1. For the spring season last year, sales of the women's better dresses department were \( \$ 550,000 \). A \( 5 \% \) increase in sales is expected for this spring season because of pent-up demand. W assume z is a standard normal random variable. what is the value of z if the area between -z and z is 0..754 a baker is making bread dough. He uses 4 cups of flour every 3 ounces of water. How many ounces of water will he use if he uses 96 cups of flour We need to use the Cr-Au galvanic cell to power a 75.0-watt light bulb. Please determine how long (in min) the galvanic cell will power the light bulb before running out power. The galvanic cell uses the following solutions: 0.810 L 1.50 M Cr2(SO4)3 solution and 1.20 L 0.860 M Au(NO3)3 solution. power(W) = electric potential(V) x current(A); charge(C)= current(A) x time(s); 1 mol of electrons = 96485 C Ania has read 3/5 of a book. She has read 60 pages so far. How many pages are in thewhole book?