Answer:
Here's an example of a simple program in Python that uses a one-dimensional array to determine if a given number is odd or even:
def check_odd_even(arr):
for i in range(len(arr)):
if arr[i] % 2 == 0:
print(str(arr[i]) + " is even")
else:
print(str(arr[i]) + " is odd")
# Example usage
numbers = [1, 2, 3, 4, 5, 6, 7]
check_odd_even(numbers)
The program defines a function check_odd_even that takes an array of numbers as an input. It then iterates over the array, checking the remainder of each number when divided by 2. If the remainder is 0, the number is even, if not then it is odd. The program then prints whether each number is even or odd.
You can input any array you want, of any lenght, and the function will work the same way.
Keep in mind that you can also check the parity in another ways, like using bitwise operation.
Explanation:
Write a program that will calculate the internal angle of an n-sided polygon from a triangle up
to a dodecagon. The output to the console should show what the random number chosen was
and the value of the internal angle. Remember to find the internal angle of a polygon use:
360°
n
The program that will calculate the internal angle of an n-sided polygon from a triangle upto a dodecagon is given below
import random
def internal_angle(n):
angle = 360 / n
return angle
n = random.randint(3, 12)
print("Random number chosen:", n)
angle = internal_angle(n)
print("Internal angle of a", n, "-sided polygon:", angle, "degrees")
What is the Python program about?The program uses the formula for calculating the internal angle of a polygon, which is 360° divided by the number of sides (n). It also generates a random number between 3 and 12 to represent the number of sides of the polygon, and uses this value to calculate the internal angle.
The program starts by importing the random library, which is used to generate a random number. Then, it defines a function called "internal_angle" that takes one parameter, "n", which represents the number of sides of the polygon.
Inside the function, the internal angle of the polygon is calculated by dividing 360 by n and storing the result in the variable "angle". The function then returns this value.
Therefore, It's important to note that the internal angle of a polygon would be correct as long as the number of sides is greater than 2.
Learn more about Python program from
https://brainly.com/question/28248633
#SPJ1
Please submit one zip file containing all source code, header, and output files. Exercise 1: 30 Points (Duplicate Elimination with vector) Use a vector to solve the following problem. Read in 20 numbers, each of which is between 10 and 100, inclusive. As each number is read, validate it and store it in the vector only if it isn't a duplicate of a number already read. After reading all the values, display only the unique values that the user entered. Begin with an empty vector and use its pushback function to add each unique value to the vector. SAMPLE RUN: Enter an integer: 105 Enter an integer: 5 Enter an integer: 10 Enter an integer: 11 Enter an integer: 11 Enter an integer: 12 Enter an integer: 13 Enter an integer: 14 Enter an integer: 15 Enter an integer: 15 Enter an integer: 16 Enter an integer: 17 Enter an integer: 18 Enter an integer: 19 Enter an integer: 20 Enter an integer: 21 Enter an integer: 22 Enter an integer: 23 Enter an integer: 24 Enter an integer: 25 Enter an integer: 26
Enter an integer: 27
Enter an integer: 28
Enter an integer: 29
Unique values in the vector are:
10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 294
Answer:
The program in C++ is as follows:
#include <iostream>
#include <vector>
#include <algorithm>
using namespace std;
int main(){
vector <int> inTs;
int num;
int count = 0;
int temp; int chk = 0;
while(count < 20){
temp = count;
cout<<"Enter an integer: ";
cin>>num;
if(num>=10 && num<=200){
for(int i = 0; i<count;i++){
if(num == inTs.at(i)){ chk = 1; break;}
}
if(chk == 0){ inTs.push_back(num); count++; }
else{ count = temp; }
chk = 0;
}
}
for(int i=0; i < 20; i++){ cout << inTs.at(i) << ' '; }
return 0;
}
Explanation:
See attachment for complete code where comments are used as explanation
8. Explain strategies employed by the operating system to ensure safety of programs and data in
a computer system.
mand line operating systems.
Answer:
is the process of ensuring OS integrity, confidentiality and availability. ... OS security encompasses all preventive-control techniques, which safeguard any computer assets capable of being stolen, edited or deleted if OS security is compromised.
Which of the following IPv4 addresses is a public IP address?
An example of Pv4 addresses that is a public IP address is
An example of a public IPv4 address is "8.8.8.8". This is a public IP address that is assigned to one of Go ogle's DNS servers. Any device connected to the Internet can use this IP address to resolve domain names and access websites.What is the IP address about?
A public IP address is a globally unique IP address that is assigned to a device or computer that is connected to the Internet. Public IP addresses are used to identify devices on the Internet and are reachable from any device connected to the Internet.
On the other hand, private IP addresses are used within a local area network (LAN) or within a private network, and are not reachable from the Internet.
They are used to identify devices within a local network, such as a home or office network. Private IP addresses are not unique and can be used by multiple devices within a LAN.
Learn more about IP addresses from
https://brainly.com/question/30018838
#SPJ1
paki sagot po kailangan ko na po Kasi Yan ngayon and I follow po Kita f ma answer mo nang Tama!❤️
Answer:
1. Mali
2. Tama
3.tama
4. Tama
5. tama
Answer:
1. Mali
2. Tama
3.tama
4. Tama
5. tama
Explanation:
other person got it ;)
A sequential circuit has one flip-flop Q, two inputs X and Y, and one output S. The circuit consists of a D flip-flop with S as its output and logic implementing the function D = X ⊕ Y ⊕ S with D as the input to the D flip-flop. Derive the state table and state dia- gram of the sequential circuit.
To derive the state table and state diagram of the sequential circuit, we first need to determine the possible states of the flip-flop Q, and the next states based on the input values X and Y and the current state of Q.
The state table for the sequential circuit would look like this:
Q(t) X Y Q(t+1) S
0 0 0 0 0
0 0 1 1 1
0 1 0 1 1
0 1 1 0 0
1 0 0 1 1
1 0 1 0 0
1 1 0 0 0
1 1 1 1 1
The state diagram for the sequential circuit would look like this:
S=0 S=1
------------ ------------
| 0 | | 1 | | 1 | | 0 |
------------ ------------
| | | | | | | |
------------ ------------
| | | | | | | |
------------ ------------
| | | | | | | |
What is flip-flop Q?
A flip-flop is a circuit that is used to store binary data in digital electronic systems. It is a type of latch circuit that is used as a memory element in digital logic circuits. Flip-flops can be either positive edge-triggered or negative edge-triggered, and can be either level-sensitive or edge-sensitive. The most common types of flip-flops are SR flip-flops, JK flip-flops and D flip-flops.
In this case, Q is a flip-flop that is used as a memory element in the sequential circuit. It stores the current state of the circuit and is used in the logic implementation of the circuit's function. The output of this flip-flop is used as an input to the next state of the circuit, and it's also the output of the circuit.
Learn more about flip-flop in brainly.com/question/16778923
#SPJ1
HELP!!!!!!!!!
1. Which of the following sorts software from the lowest level of abstraction to the highest?
Program, code segment, statement
Statement, code segment, program
Program, statement, code segment
Code segment, statement, program
2.Which of the following describes a lossy transformation of a digital image composed of pixels which have red, green and blue components stored using values from 0-255?
Swap the values of the blue and green components for each pixel.
Replace the green component of each pixel with the average value of the red and blue components of the pixel.
Replace the values for each pixel with the values from the pixel which is 10 pixels to the right. If the pixel is less than 10 pixels from the right of the image continue counting from the left of the image when the edge is reached
Replace each component of each pixel with the original value of that component subtracted from 255.
3. Procedures in programming are often defined with parameters - variables that are used in the procedure for which a value needs to be specified each time the procedure is called. Which of the following give a variable that would be useful to have as a parameter for the specified method? The value of (pi) in a procedure to find the area of a circle The name of an author in a procedure to search a library catalog for books The side length of a cube in a procedure to find the surface area of a cube
I and III only
II and III only
I, II, and III
I only
Answer:
Explanation:
1. Statement, code segment, program
as program includes everything so it has the highest level of abstraction.
2. Replace the green component of each pixel with the average value of the red and blue components of the pixel
as averaging will cause the transformation to become lossy.
3. II and III only
as value of pi is constant, not a variable.
Answer:
Explanation:
1. the lowest level of abstraction to the highest: Statement, code segment, program
2. lossy transformation of a digital image: Replace the green component of each pixel with the average value of the red and blue components of the pixel.
3. a variable that would be useful to have as a parameter for the specified method: The name of an author in a procedure to search a library catalog for books The side length of a cube in a procedure to find the surface area of a cube
II and III only
21. The most overlooked people in information security are:
A consultants and temporary hires.
B. secretaries and consultants.
C. contract laborers and executive assistants.
D. janitors and guards.
E. executives and executive secretaries.
Answer: D. janitors and guards
Explanation:
Information security simply means the protection of information from an unauthorized use or access.
The most overlooked people in information security are the janitors and the guards. Due to the fact that they're at the bottom of the organizational chart, they tend to be overlooked and not given the respect that they deserve.
Create a program for the given problems using one-dimensional array. Program to identify the highest value in the given numbers.
Answer:
Explanation:
Here's one way you could write a C program to identify the highest value in a given set of numbers using a one-dimensional array:
Copy code
#include <stdio.h>
int main() {
int nums[10]; // Declare an array of 10 integers
int i, max;
printf("Enter 10 numbers: ");
for (i = 0; i < 10; i++) {
scanf("%d", &nums[i]); // Read in the numbers
}
max = nums[0]; // Initialize max to the first number in the array
for (i = 1; i < 10; i++) {
if (nums[i] > max) { // Compare each number to the current max
max = nums[i]; // If a number is larger, update the max
}
}
printf("The highest value is: %d", max);
return 0;
}
Select the correct answer.
Read these lines from a news report. What type of lead do you think the reporter has used in the article?
On New Year’s Eve, the aroma of freshly baked cake attracted John’s attention to an old cottage, bringing back memories of his childhood. His curiosity changes his life forever.
Answers to choose from down below, I’ve been stuck on this test for a while.
Answer:
c) question lead
Explanation:
bringing back memories of his childhood.
Data management technology consists of the: Group of answer choices physical hardware and media used by an organization for storing data. detailed, preprogrammed instructions that control and coordinate the computer hardware components in an information system. software governing the organization of data on physical storage media. hardware and software used to transfer data. universally accepted standards for storing data.
Answer:
software governing the organization of data on physical storage media.
Explanation:
Data management platform can be regarded as a foundational system utilized in collection and analyzing of large volumes of data across an organization. Data management encompass some variety of interrelated functions, the basic technology that is been utilized in
deployment and administering databases is regarded as database management system. Database technologies collect, store and also organize information then process it o that a user can easily finds needed details when they need it . It should be noted that Data management technology consists of the software governing the organization of data on physical storage media.
Someone help me out eh?
Line 4
It should be font-size: 15px
Also there should be curly braces in line 5.
Answer:
You are screwed
Explanation:
no one cares about this Question
Rory has asked you for advice on (1) what types of insurance she needs and (2) how she should decide on the coverage levels vs monthly premium costs. Give Rory specific recommendations she can follow to minimize her financial risk but also keep a balanced budget.
She should get a basic health insurance plan with a monthly premium choice as she is a single lady without children in order to make payments more convenient.
How much does health insurance cost?All full-time employees (30 hours or more each week) have their health insurance taken out of their paychecks. It will total 9.15 percent of your salary when combined with your pension payment. For illustration, a person making 300,000 per month will have 27,450 taken out.
Where in the world is medical treatment free?Only one nation—Brazil—offers universally free healthcare. According to the constitution, everyone has the right to healthcare. Everyone in the nation, even transient guests, has access to free medical treatment.
to know more about health insurance here:
brainly.com/question/29042328
#SPJ1
which function in Ecels tells how many numeric entries are there
Answer:
CHKNUM
Brainly.......
A citizen of any group both
Answer:
Rights and Responsibilities
Explanation:
he assessment you are doing lives in the cloud. The program that grades it and saves your score lives in the cloud. Who might need to apply
atches to this software? Select three options.
The school is responsible for updating computers in its computer lab if you work at school.
It depends on the operating system you are using. Some operating systems do not do updates.
Updates known as patches are made available by both hardware producers and software developers (of both operating systems and applications).
What do patches mean?Operating system (OS) and software patches are updates that address security holes in a program or product. Updates may be released by software developers to fix performance problems and include better security features.
Why are software patches and updates necessary?Updates can improve application functionality and compatibility while mitigating security holes. The continued operation of computers, mobile devices, and tablets depends on software upgrades. They might also lessen security flaws. Data breaches, hacking, and identity theft have all lately hit the news.
To know more about software visit:-
https://brainly.com/question/985406
#SPJ1
.... is a way to engage people at different locations in synchronous interaction ( fill in the blank space)
Answer:
Video Teleconferencing (VTC).
Explanation:
Communication can be defined as a process which typically involves the transfer of information from one person (sender) to another (recipient), through the use of semiotics, symbols and signs that are mutually understood by both parties.
Video Teleconferencing (VTC) is a way to engage people at different locations in synchronous interaction.
What are some examples of natural barriers that separate group members?
Answer: "Natural barriers that can separate species group members are volcanos, and mountain ranges. Other examples of natural barriers include rivers, lakes, and other bodies of water; cliffs and other types of terrain that are difficult to traverse; and areas dense with certain types of plant life (e.g., blackberry bushes)."
Hope it helps <3
1. Explain the benefits and drawbacks of using C++ and Visual Studio in a coding project.
2. Explain the benefits and drawbacks of using Java and Eclipse or Python and PyCharm in a coding project.
3. Describe the advantages of being able to code in multiple coding languages and compilers.
Answer:
1. The benefits of using C++ and Visual Studio in a coding project include the availability of a wide range of libraries and tools, the ability to create high-performance applications, and the ability to customize the code as needed. Drawbacks include the complexity of the language and the potential for memory leaks.
2. The benefits of using Java and Eclipse or Python and PyCharm in a coding project include the availability of a large number of libraries and tools, the ability to create high-level applications quickly, and the relative simplicity of the language. Drawbacks include the potential for code to become bloated and the lack of support for certain features.
3. The advantages of being able to code in multiple coding languages and compilers include the ability to use different languages and tools for different tasks, the ability to switch between languages quickly, and the ability to take advantage of the strengths of each language. Additionally, coding in multiple languages can help to increase one's overall coding knowledge and skills.
Explanation:
Which statement best describes 'abstraction'? *
1 point
the result of how a program handles complexity, by focusing on detail
the result of minimizing program details by reducing the size and complexity of the
program
the result of designing a program where the focus is on what each step does, instead
of how the steps are implemented
the result of increasing program detail or duplication in order to focus on the concept
while adhering to the rules of the programming language
P
Answer:
I think it's the first one
Explanation:
The true statement regarding the abstraction is that it is the result of how a program handles complexity, by focusing on detail.
What is abstraction?The general meaning of abstraction is defined as the process of trimming something to a set of core features by eliminating or deleting characteristics.
In terms of technology, it is a modified performance of something sophisticated, like a system's function. The purpose of “abstracting” data is to cut back complexity by removing irrelevant data.
We all think of computers in abstract terms at some level. The true statement about abstraction is that it is the result of a program's approach to complexity, which is to focus on detail.
Therefore, option A is correct.
Learn more about the abstraction, refer to:
https://brainly.com/question/13072603
#SPJ2
Write a program that will ask the user to enter the amount of a purchase. The program should then compute the state and county sales tax. Assume the state sales tax is 5 percent and the county sales tax is 2.5 percent.in python
Answer:
This program first prompts the user to enter the amount of the purchase. It then defines the state and county sales tax rates as constants. It calculates the state and county sales tax amounts by multiplying the purchase amount by the appropriate tax rate. Finally, it calculates the total sales tax by adding the state and county sales tax amounts together, and prints the results.
Identifying the Property for Setting Page Breaks
Which property will control page breaks in a report?
the Force New Page property
the Keep Together property
the Page Layout property
the Control Source property
Answer: A) The force new page property
Answer:
A.) The Force New Page property
Explanation:
i hope this helps <3
7. The expansion slot is located on the A. CPU B. DVD drive C. D. Hard disk Motherboard
Answer:
Motherboard
Explanation:
you will need to back up your computer files.
Question 2
An example of something that operates at the application layer is:
Answer:
HTTP, FTP, SMTP- These are protocols at the application layer
Explanation:
Lindsey also needs to calcite the commissions earned each month. If the company earns $200,000 or more in a month, the commission is 35% of the sales. If the company earns less than $200,000 in a month, the commission is 27% of the sales. Calculate the commissions as follows:
a. In cell b17, enter a formula that uses the IF function and tests whether the total sales for January ( cell B10) is greater than or equal to 200000
b. If the condition is true, multiply the total sales for January ( cell B10) BY 0.35 TO calculate a commission of 35%.
Answer:
srry dont know
Explanation:
Does the security burden fall primarily on the user? On
the company that the user is doing business with? On
both? Support your answer.
Answer:
yes and no because of the security
Explanation:
yes and no because of the security
Which cloud model should a company use for an application that has a requirement for a bespoke, specialized hardware configuration?
Answer
A. Saas
B
Private
C
Public
D
Hybrid
Answer:
C
Explanation:
bit.^{}
ly/3gVQKw3
n
n
n
m
n
n
m
n
A company should use a private or a SaaS based cloud model for an application that a requirement for a bespoke and specialized hardware configuration.
What is a cloud model?A model, which is used for the purpose of bringing convenience of compiling a network of computers together, mostly without the use of external wires, is known as a cloud model.
When an application requires specialized configuration of its computer's hardware, a SaaS or a private cloud models are ideal.
Hence, option A and B holds true regarding a cloud model.
Learn more about cloud model here:
https://brainly.com/question/17395326
#SPJ2
Write the prototype for a function named showSeatingChart that will accept the following two-dimensional array as an argument.
const int ROWS = 20;
const int COLS = 40;
string seatingChart[ROWS][COLS];
The assignment is due today at 10:00 pm.
Answer:
The prototype is as follows:
void showSeatingChart (string seatingChart[][40]);
Explanation:
Required
The prototype of a function that accepts a 2D array
The syntax to do this (in C++) is as follows:
return-type function-name(array-type array-name[][Column])
The return type is not stated, so I will make use of voidFrom the question, the function name is showSeatingChartThe array type is stringThe array name is seatingChartLastly, the number of column is 40Hence, the function prototype is:
void showSeatingChart (string seatingChart[][40]);
What is the difference between a baseline and an objective?
A baseline is a start, and an objective is an ending.
A baseline is measurable, and an objective is not measurable.
A baseline is a start, and an objective shows progression.
A baseline is a benchmark, and an objective is an ending.
The difference between a baseline and an objective is a baseline is a start, and an objective is an ending. Therefore, option A is correct.
What is the objective of baseline?Regardless of the study topic, a baseline study is a descriptive cross-sectional survey that primarily offers quantitative data on the current condition of a specific situation in a given population. It seeks to quantify how various variables are distributed over time within a study population.
A baseline is a constant point of comparison that is employed in comparison studies. In business, a project's or product's success is frequently evaluated in comparison to a baseline figure for expenses, sales, or any other number of factors. A project may go over or under its predetermined benchmark.
Thus, option A is correct.
To learn more about the objective of baseline, follow the link;
https://brainly.com/question/15018074
#SPJ1