how to write a program in c language

Answers

Answer 1

INT PRI () Every programme written in C begins with the main() function. Printing data to the console is done using the printf() function.

What exactly are the fundamentals of the C programming language?The programming language C is all-purpose for computers. Dennis Ritchie came up with it back in the '70s, and it's still heavily utilised and important today. The features of C, by design, accurately mirror the capabilities of the CPUs it is intended to run on. The structural or procedural programming language C was utilised for system applications and low-level programming applications. C++, on the other hand, is an object-oriented programming language with some additional features like encapsulation, data hiding, data abstraction, inheritance, polymorphism, etc.At Bell Labs in 1972, Dennis Ritchie developed the general-purpose computer language C. Despite being ancient, it is a relatively common language. Due to its development for the UNIX operating system, C has a close connection to UNIX.

To learn more about C language, refer to:

https://brainly.com/question/26535599

Answer 2

Answer:

Martin Fowler once said:

“ Any fool can write code that a computer can understand. Good programmers write code that humans can understand. ”

Explanation:

Header file: #include<stdio.h>

Main function: int main(){

   //code here;

printing statement: printf("format string");

printing statement: printf("format string", specifiers if used);

user input statement: scanf("format specifiers", &variable);

// Format Specifiers Type of Output

   %d or %i A decimal integer or signed integer

   %c         Signed character

   %f         Signed float

   %e         A floating-point number

   %s                A string

}

Example program:

#include<stdio.h>

int main(){

    int i, j, a;

    printf("enter two values:");

    scanf("%d %d", &i, &j);

    a=i*j;

    printf("area: %d", a);

    //return 0;

}


Related Questions

Write a program that asks the user the speed of a vehicle (in miles per hour) and
how many hours it has traveled. The program will display the total distance traveled
at the end of each hour of the period. (Python)

Answers

Answer:

Here's a Python program that calculates and displays the total distance traveled by a vehicle over a period of time, using functions to validate the user's input:

def get_integer_data(prompt):

   while True:

       try:

           value = int(input(prompt))

           if value <= 0:

               print("Please enter a positive integer.")

           else:

               return value

       except ValueError:

           print("Please enter a valid integer.")

def main():

   speed = get_integer_data("What is the speed of the vehicle in mph: ")

   hours = get_integer_data("How many hours has it traveled? ")

   print("\nDistance Traveled Summary")

   print("Hour\tDistance Traveled (miles)")

   for hour in range(1, hours+1):

       distance = speed * hour

       print(f"{hour}\t{distance}")

main()

Explanation:

Here's how the program works:

First, a function named get_integer_data is defined that takes a prompt as an argument and asks the user to enter a positive integer value. If the user enters a non-positive or invalid value, the function will prompt the user again until a valid input is given.

Then, the main function is defined. It calls the get_integer_data function twice to get the speed and hours traveled from the user.

After that, the program displays a summary of the distance traveled at each hour of the period. A for loop is used to iterate over each hour from 1 to hours. Inside the loop, the distance traveled is calculated by multiplying the speed by the hour. The f-string syntax is used to format and print the hour and distance values in a table.

Note that the program assumes that the speed is constant over the entire period. If this is not the case, the program would need to be modified to take this into account.

You would like to completely shut down a system 10 minutes after notifying all users of your intent.

Which of the following commands should you enter at the shell prompt?

A) shutdown -h +10 message
B) shutdown 10 -h message
C) shutdown -p 10 message
D) shutdown -r +10 message

Answers

The correct answer is A) shutdown -h +10 message.

Explanation:

The 'shutdown' command is used to shut down or reboot a system. The '-h' option tells the system to shut down and power off (halt) after shutting down, while the '-r' option tells the system to shut down and reboot (restart) after shutting down. The '-p' option tells the system to power off immediately without performing a graceful shutdown.

In this case, we want to shut down the system 10 minutes after notifying all users of our intent, so we should use the '+10' option to specify a delay of 10 minutes before shutting down. We should also include a message to notify users of the impending shutdown. Therefore, the correct command is:

shutdown -h +10 message

Option B is incorrect because it specifies the delay before shutting down as a number of seconds rather than a time interval. Option C is incorrect because it tells the system to power off immediately without waiting 10 minutes after notifying users. Option D is incorrect because it tells the system to restart after shutting down rather than power off.

A'(B+C')do minterm and maxterm

Answers

The minterm for A'(B+C') is m(1, 3) and the maxterm is M(0, 2).


The expression A'(B+C') can be simplified using De Morgan's laws:

A'(B+C') = A'B + A'C

This expression can be represented as a sum of products (SOP) or minterm:

A'B + A'C = m(1, 3)

The expression can also be represented as a product of sums (POS) or maxterm:

(A+B')(A+C) = M(0, 2)

where M represents the maxterm.

Note that minterms are products of literals, with each literal representing a variable or its complement, and they correspond to a specific combination of inputs that results in an output of 1. Maxterms, on the other hand, are sums of literals, with each literal representing a variable or its complement, and they correspond to a specific combination of inputs that results in an output of 0.


To know more about expression visit:
https://brainly.com/question/28637270
#SPJ1

How to make an console application in which the first version of a system that will allow users to post messages and photos that other users can view and like in C sharp

Answers

To make the console application in C#, open a new project, define the classes for the objects and images, implement the command-line interface and then use the output for the display

How to make a console application

To create a console application in C#, you can follow these steps:

Open Visual Studio and create a new Console Application project.Define classes to represent your message and photo objects.Implement a way to store the messages and photos, such as using a list or database.Implement a command-line interface that allows users to post messages and photos, view them, and like them.Handle user input and perform the appropriate actions based on the user's choice.Use console output to display messages and photos to the user.

Keep in mind that a console application may have limited capabilities in terms of user interface and interactivity, so you may want to consider developing a graphical user interface in the future.

Read more about console application at: https://brainly.com/question/27031409

#SPJ1

Examine trends in emergence of computer from 1936_1985 and its relevance to education industry in nigeria

Answers

From Konrad Zuse's first programmable computer through the emergence of personal computers like the Apple II, the development of computers made tremendous strides between 1936 and 1985.

What role does technology play in the educational system?

The usage of computers is possible for online learning and research. Students can utilise the internet to find pertinent information about their projects and assignments as well as to acquire helpful support from other researchers if they preserve and organise their research materials on computers.

What technological advancements in education have there been historically in Nigeria?

Simple British teaching aids were utilised to help with instruction in Nigeria in 1932, marking the start of the usage of educational technology there. In Lagos, a radio network was constructed.

To know more about programmable visit:-

https://brainly.com/question/30307771

#SPJ1

Write an assembly code
Read 1 byte number (between 0 and 9). Write a program that prints:

It's ODD

if input is odd and prints

It's EVEN if input is even

Answers

; Read input byte

MOV AH, 01h ; Set up input function

INT 21h ; Read byte from standard input, store in AL

; Check if input is even or odd

MOV BL, 02h ; Set up divisor

DIV BL ; Divide AL by BL, quotient in AL, remainder in AH

CMP AH, 00h ; Compare remainder with zero

JNE odd ; Jump to odd if remainder is not zero

JMP done ; Jump to done if remainder is zero

odd: ; Odd case

MOV DX, OFFSET message_odd ; Set up message address

JMP print

even: ; Even case

MOV DX, OFFSET message_even ; Set up message address

print: ; Print message

MOV AH, 09h ; Set up output function

INT 21h ; Print message

done: ; End of program

Claire still has trouble locating the home row on a keyboard without looking. What fundamental is she struggling with

Answers

Answer: Understanding finger placement.

Explanation: Its clear to see that she MOST LIKELY knows where all the keys are, she just might have trouble remembering where to press and where to keep her hands. It can be confusing sometimes, with all these other keys in the way.

Commenced business with cash Rs. 10,000

Answers

when the cash comes in, we debit the Cash A/c and Credit the capital A/c adhering to the rules of Real Account and Personal Account which says” Debit what comes in whereas credit the giver.

Cash A/c Dr. 10,000

  To Capital A/c    10,000

Bank A/c Dr. 15,000

  To Cash A/c    15,000

Furniture A/c Dr. 3,000

 To Cash A/c        3,000

Cash A/c Dr. 2,500

  To Sales A/c 2,500

Purchases A/c Dr. 2,000

  To X's A/c             2,000

Y's A/c Dr. 3,000

  To Sales A/c 3,000

Cash A/c Dr. 2,000

  To Y's A/c     2,000

X's A/c Dr. 1,000

  To Cash A/c   1,000

Cash A/c Dr. 50

  To Commission Received A/c 50

Bank A/c Dr. 1,000

  To Cash A/c   1,000

Advertisement A/c Dr. 500

  To Cash A/c          500

Purchases A/c Dr. 800

  To Cash A/c    800

Cash A/c Dr. 1,500

  To Sales A/c    1,500

Salary A/c Dr. 500

  To Cash A/c    500

This is the required answer.

learn more about credit/debit here:

https://brainly.com/question/12269231

#SPJ1

complete question:

1. Commenced business with cash Rs. 10,000

2.

Deposit into bank Rs. 15,000.

3. Bought office furniture Rs. 3,000.

4. Soled goods for cash Rs. 2,500.

5. Purchase goods from Mr. Xon credit Rs. 2,000.

6.

Soled goods to Mr. Yon credit Rs.3.000.

7. Received cash from Mr. Y on account Rs. 2,000.

8. Paid cash to Mr. X Rs. 1,000.

9. Received commission Rs. 50

10. Received cash on bank deposit Rs. 100

11. Paid into bank Rs. 1,000

12. Paid for advertisement Rs. 500

13. Purchase goods for cash Rs. 800

14. Sold goods for cash Rs. 1,500

15.

Paid salary Rs. 500

Journalize the following Transactions using the Debit and credit give

At which stage of problem solving should you discuss the problem with colleagues?

Answers

The stage of problem solving one should discuss the problem with a colleague is defining the problem.

How to explain the information

To begin developing a problem-solving approach, it's critical to recognize the issue at hand. It will be more difficult to determine a solution if you can't collectively recognize the issue.

Although each phase in the problem-solving process is critical, defining the problem comes first since without it, the other processes are meaningless.

The stage of problem solving one should discuss the problem with a colleague is defining the problem.

Learn more about problem on

https://brainly.com/question/7507783

#SPJ1

Define resident monitor in os

Answers

In computing, a resident monitor is a type of system software program that was used in many early computers from the 1950s to 1970s. It can be considered a precursor to the operating system. The name is derived from a program which is always present in the computer's memory, thus being "resident".

match each vocabulary word to its definition. 1. blacklist place where an item on the internet is located 2. ethics 1 e-mail addresses or domains suspected of spamming 3. thread text at the end of an e-mail message that identifies the sender 4. signature standards of right and wrong 5. web address one or more messages on the same topic

Answers

A blacklist is a list of banned items, ethics are moral principles that guide behavior, a thread is a sequence of related messages, a signature is a block of text or image appended to an email, and a web address is a unique identifier for a resource on the internet.

1. Blacklist: A list of people, companies, or items that are considered undesirable or unacceptable and are thus excluded from certain privileges or opportunities.

2. Ethics: A set of moral principles and values that guide individuals or organizations in their decision-making and behavior, and that are based on notions of right and wrong.

3. Thread: A sequence of messages or posts on a particular topic or subject that are connected and displayed in chronological order, often on an online discussion forum or social media platform.

4. Signature: A block of text, usually at the end of an email message, that contains the sender's name, contact information, and/or a personal message.

5. Web address: A unique identifier for a website or web page, consisting of a protocol (e.g. http or https), a domain name, and a path to the specific page or resource being requested.

To know more about Blacklist click here:

brainly.com/question/30360318

#SPJ4

A laptop was stolen from the car of an employee. The laptop contained PHI on 6,500 patients and included Social Security numbers. The employee who left the laptop in the car notified you immediately when the breach occurred. The data were not encrypted but the laptop is password protected

Answers

Note that the kind of security violation that occurred is data breach violation.

What is data breach security violation?

A personal data breach is defined as a security breach that results in the unintentional or illegal destruction, loss, modification, unauthorized disclosure, or access to personal data. This encompasses breaches caused by both unintentional and intentional reasons.

A data breach occurs when sensitive, protected, or confidential data is copied, communicated, viewed, stolen, altered, or utilized by someone who is not allowed to do so. Unintentional information exposure, data leak, information leakage, and data spill are other words.

As a result, the above case is an example of a data breach.

Learn more about data breach on:

https://brainly.com/question/30321388

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

A laptop was stolen from the car of an employee. The laptop contained PHI on 6,500 patients and included Social Security numbers. The employee who left the laptop in the car notified you immediately when the breach occurred. The data were not encrypted but the laptop is password protected.

What privacy and security violations have occurred?

BMD
a positive and respecte corpose and share in this discussion forum Al students will share and have the opportunity to leam from each other. Everyone is expected to be positive and respectful, with comments that help at leamers write effectively. You are required to provide
comment on one of your classmate's posts
For your discussion assignment, follow this format
Tople Sentence: With growing online social media presence cyberbullying is at an all-dime high because
Concrete detail Cyberbullying has steadly been on the rise because
4
Commentary: Looking at some of my (or include the name of the famous person that you chose) most recent social media posts I can see how one could misinterpret my posting because
Concluding Sentence: To help lower the growth rate of cyberbullying, we can...
Respond to Classmate: Read other students' posts and respond to at least one other student. Your response needs to include a spects comment

Answers

This prompt is about the topic sentence  "With growing online social media presence, cyberbullying is at an all-time high because of the anonymity it provides"

What is the writeup?


Topic Sentence: With growing online social media presence, cyberbullying is at an all-time high because of the anonymity it provides.

Concrete Detail: Cyberbullying has steadily been on the rise because individuals can easily hide behind a screen and say things they would not normally say in person.

Commentary: Looking at some of my most recent social media posts, I can see how one could misinterpret my posting and leave hurtful comments. It is important to remember that social media is a public platform and everything posted can have an impact on someone's mental health. It is crucial that we are mindful of what we post and how it may affect others.

Concluding Sentence: To help lower the growth rate of cyberbullying, we can start by spreading awareness and educating individuals on the harmful effects of cyberbullying. We can also encourage social media platforms to implement stricter policies and consequences for cyberbullying behaviors.

Learn more about Cyberbullying;
https://brainly.com/question/28809465
#SPJ1

java 9.20 lab: print student roster (eo) complete the course class by implementing the printroster() method, which outputs a list of all students enrolled

Answers

To print the student roster in Esperanto, you can use the following code:

class Kursanto:

 def __init__(self, nomo, id):

   self.nomo = nomo

   self.id = id

class Klaso:

 def __init__(self):

   self.kursantoj = []

 

 def enmeti_kursanton(self, kursanto):

   self.kursantoj.append(kursanto)

 

 def printroster(self):

   print("Listo de Kursantoj:")

   for kursanto in self.kursantoj:

     print(kursanto.nomo + " (ID: " + str(kursanto.id) + ")")

# Ekzemplo de uzado:

k1 = Kursanto("Johano", 123)

k2 = Kursanto("Maria", 456)

k3 = Kursanto("Antono", 789)

klaso = Klaso()

klaso.enmeti_kursanton(k1)

klaso.enmeti_kursanton(k2)

klaso.enmeti_kursanton(k3)

klaso.printroster()

What is the function of the code?

This code defines two classes, Kursanto and Klaso. Kursanto represents a student and has two attributes: nomo (name) and id (identification number). Klaso represents a course and has a list of Kursanto objects as its attribute kursantoj (students). The method enmeti_kursanton adds a Kursanto object to the list, and the method printroster prints the list of students with their names and IDs.

To use this code, you can create Kursanto objects for each student, add them to a Klaso object using enmeti_kursanton, and then print the roster using printroster.

Learn more about printroster() method, here: https://brainly.com/question/29557707

#SPJ1

What is the output for the code?

Answers

Answer:

8

Explanation:

c is less than a (c = 3; a = 4)

c is also less than b (c = 3; b =8)

the else if (c<a && c<b) has arguments that are met. hence the output being 8.

How do I write a security guard CV?

Answers

Here are some tips on how to write a security guard CV:

Start with a professional summary: Begin your CV with a brief summary that highlights your experience, skills, and qualifications for the job. This section should be tailored to the specific job you are applying for, and should grab the attention of the employer.Highlight your experience: In the experience section, list your previous security guard roles, including the name of the employer, job title, and dates of employment. Provide details of your duties and responsibilities in each role, focusing on any relevant skills or achievements.Emphasize your skills: Security guards require a range of skills, such as excellent communication, observational skills, and the ability to work under pressure. Make sure to highlight these skills in your CV, along with any other relevant skills such as first aid training, conflict resolution skills, or knowledge of security systems.Provide details of your qualifications: Security guards are typically required to have a high school diploma or equivalent, and many employers may also require additional training or certifications. List your qualifications in your CV, including any relevant licenses, training courses, or certifications.Include any relevant achievements: If you have received any awards or recognition for your work as a security guard, make sure to include these in your CV. This can help to demonstrate your dedication and commitment to the role.Use a professional format: Your CV should be clear and easy to read, with a professional layout and formatting. Use bullet points to organize your information, and make sure to proofread your CV carefully before submitting it.

Overall, your security guard CV should highlight your relevant experience, skills, and qualifications for the job, and should demonstrate your ability to work effectively in a security role

1. Choose the correct format and layout

Select an appropriate format and layout to ensure your CV is easy to read and navigate. Use the reverse-chronological order so that the employer reads your most recent qualifications and experience first. Set margins at one inch around the whole document and leave a space between paragraphs. Choose a font that's easy to understand and keep the font size between 11pt and 12pt.

2. List your contact details

Start writing your CV by listing your contact details. Place these details across the top of the document or in the header. Doing so makes it easier for hiring managers to contact you for more information or to discuss the next stages of the application process. Include your full name, contact number, email address and home address. Make sure you use a professional email address and double-check all information to avoid any mistakes.

3. Write a professional summary

Otherwise known as a career profile or objective, a professional summary is a brief statement at the top of your CV that highlights your main skills and accomplishments. The summary is approximately two to three lines and helps hiring managers gauge whether or not to continue reading the document. Include your most relevant experience and qualifications that are pertinent to the role

4. Outline your previous experience

Using the reverse-chronological format, outline your work experiences related to the job. Make sure to include the job title, employer name, location and dates of employment for each experience. Include five bullet points underneath your most recent position detailing the primary responsibilities of the role and any accomplishments you achieved. Phrase your responsibilities in a way that allows you to include keywords contained in the job description. Only include three bullet points for subsequent job entries.

Alongside keywords, use strong action words at the beginning of each achievement or responsibility to add impact. Include different metrics to those you included in the professional summary to refine your CV. If you've had several jobs over the years, only include those that align with the role you're applying for. Alternatively, if you have little experience, consider referencing any internships, apprenticeships or summer jobs you've completed relevant to the position. For a security guard, this may include an International Professional Security Association (IPSA) internship or on-the-job experience.

5. List relevant skills

Include a skills section and list five to 10 skills or competencies that qualify you for a security guard position. Put them in bulleted format for easy readability. Make sure to include a combination of soft and hard skills and only include those that you're proficient in. Look to the job description again for guidance on what skills to include. Some skills that hiring managers look for amongst security guards include:

patrolling skills

conflict resolution skills

surveillance equipment monitoring

physical strength

reporting skills

communication skills

IT or computer skills

6. Include your education history

The education requirements to become a security guard usually vary depending on whether you want to work in front-line security, CCTV operating or guarding transit valuables. Employers usually require candidates to have a Security Industry Authority (SIA) licence for agency and contractor jobs. List your education achievements in reverse-chronological order. State the qualification name before detailing the institution name, location and dates of attendance. Consider listing any awards or accomplishments you earned while completing your studies if they're relevant to the position.

CV template for a security guard position

Here's a CV template for a security guard position to get you started:

[First name] [Last name]

[Phone number] | [Email address] | [Location]

Professional Summary

[Two to three sentences that highlight years of experience, relevant skills, education or certifications and achievements as a professional].

Experience

[Job Title] | [Employment dates]

[Company Name] | [City]

(Strong verb) + what you did (more detail) + reason, outcome or quantified results.

1. When you evaluate a website for authority, you are checking to see who
the author is and if this person is qualified to write about the topic you
are reading about. * (1 Point)
(a) True
(b) False

Answers

True. Verifying the author's credentials to write about the subject being covered is a necessary step in determining the authority of a website.

How can you assess a website's authority?

Engaging comments. The authority of a website is largely determined by metrics, rankings, and the quality of its material, as well as by audience involvement. Websites that receive a lot of audience participation are more authoritative than those that receive little user participation.

What factors should you take into account when assessing a website's author?

While assessing any website, the following six (6) factors should be used: authority, accuracy, objectivity, currency, coverage, and appearance.

To know more about website visit:-

https://brainly.com/question/19459381

#SPJ1

A page with a malware warning

Answers

False, A page cant be a malware warning. Thus, option B is correct.

What is malware?

Malware, οr maliciοus sοftware, is a blanket term fοr any kind οf cοmputer sοftware with maliciοus intent. Mοst οnline threats are sοme fοrm οf malware. Malware can take many fοrms, including viruses,  and spyware.

The twο mοst cοmmοn ways that malware accesses yοur system are the Internet and email. Sο basically, anytime yοu’re cοnnected οnline, yοu’re vulnerable.

Malware can enter yοur cοmputer when yοu surf thrοugh websites, dοwnlοad infected files, install prοgrams οr apps frοm unfamiliar prοvide, οpen a maliciοus email attachment, οr pretty much everything else yοu dοwnlοad frοm the web οn tο a device that lacks a quality anti-malware security applicatiοn.

Learn more about Malware

https://brainly.com/question/14276107

#SPJ1

Complete question:

Integer userIn is read from input. Write a while loop that reads integers from input until the integer 10 is read. Then, find the sum of all integers read. Integer 10 should not be included in the sum.

Ex: If the input is 3 9 -23 -40 10, then the output is:
-51

import java.util.Scanner;

public class SumCalculator {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int userIn;
int result;

result = 0;
userIn = scnr.nextInt();

/* Your code goes here */

System.out.println(result);
}
}

Answers

Answer:

Here's the modified code that reads integers from input until the integer 10 is read and then finds the sum of all integers read, excluding 10:

Explanation:

import java.util.Scanner;

public class SumCalculator {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       int userIn;

       int result = 0;

       userIn = scnr.nextInt();

       while (userIn != 10) {

           result += userIn;

           userIn = scnr.nextInt();

       }

       System.out.println(result);

   }

}

Match the external pricing factor with an example of that factor.

Question 3 options:

People who are concerned with their image will be more willing to spend money on the latest fashion.


If the minimum wage is raised, then you would need to price your items to cover the cost of the increase.


4
People will buy coffee from my stand because my drinks are $.50 less than the other coffee shop in town.


Cruise sales are at an all-time high because people can spend money on luxuries like vacations.


I can charge more for my services as I am one of the few salons in town that offers all-organic hair care products.

1.
Target market

2.
Supply and demand

3.
Government regulations

4.
Economy

5.
Competitors' prices

Answers

After matching the external pricing factor with an example of that factor, the answer is given below:

What is pricing factor?

Pricing factor is a factor which is used to determine the cost of a product or service. It takes into account a variety of elements such as the cost of production, market demand, competition, and any additional costs or taxes associated with the product or service.

A. People who are concerned with their image will be more willing to spend money on the latest fashion:Target market.

B. If the minimum wage is raised, then you would need to price your items to cover the cost of the increase: Government regulations.

C. 4 People will buy coffee from my stand because my drinks are $.50 less than the other coffee shop in town: Competitors' prices.

D. Cruise sales are at an all-time high because people can spend money on luxuries like vacations: Economy.

E. I can charge more for my services as I am one of the few salons in town that offers all-organic hair care products: Supply and demand.

To learn more about pricing factor

https://brainly.com/question/30488802

#SPJ1

Write a program that prints the following patterns. Use for loops to generate the patterns. All asterisks (*) should be printed by a single printf statement of the form printf( "*" ); (this causes the asterisks to print side by side).

Make sure you include a sentinel Value in your program
Do you wish to Exit the program? Enter q to exit or any number to Continue...

Answers

This software asks the user to select one of three patterns to print (1, 2, or 3), and then prints each pattern using nested for loops. A simple triangle of asterisks makes up the first design.

How can a numerical pattern be made in C?

If you are comfortable with looping constructs like the for and while loops, creating programmes that use number patterns in C is simple. Most of the time, two nested loops are needed to display number pattern programmes in C. The inner loop specifies what will put in each row, while the outer loop establishes the number of rows.

'#include stdio.h'

do printf("Choose a pattern to print (1, 2, or 3), or q to quit: "); scanf("%d", &choice); int main() int choice;

switch(choice) Case 1 is as follows: for(int I = 1; I = 5; i++) for(int j = 1; j = I j++) Case 2: printf("*"); printf("n"); break; Case 3: Case 4: printf("*"); printf("n"); break Case 5: printf("*"); printf("n"); break Case 6: printf("*"); printf("n"); break Case 7: printf("*"); printf("*"); else printf(" "); printf("n"); break Case 'q': printf(" "); printf("n"); break"Exiting program...n"); break; default: printf("Invalid choice, please try again.n"); while(choice!= 'q');

returning 0;

To know more about software  visit:-

https://brainly.com/question/985406

#SPJ1

What is the dark web?​

Answers

Answer:

DARK WAVE IS MOST DANGEROUS WEB SITE

Answer:

dark web is a place where there is bad things obviously

Select the best answer for the question
15. Earning which of the following certifications is a means of renewing a technician's A+ certification?
O A. CTT+
B. Network+
O C. ITF+
O D. Linux+

Answers

Your CompTIA A+ credential can be renewed by earning Continuing Education Units (CEUs) or by retaking the current version of the exam.

In 1982, the Association of Better Computer Dealers (CompTIA) was founded. (ABCD).[3] The Computing Technology Industry Association later adopted the moniker ABCD.[4]

In a site in Downers Grove, Illinois, CompTIA relocated its corporate offices in 2010.In April 2014, the CompTIA portal switched to a hybrid open-access approach with special material for members who pay dues.[6][7] Within a year, CompTIA's membership increased from 2,050 to more than 50,000 in 2015. The move broadened the organisation's reach to engage a wider, more diverse group of members.[8] The organisation had more than 100,000 members globally by the end of 2016.[Reference needed]

learn more about CompTIA A+ here:

https://brainly.com/question/28746291

#SPJ1

the difference between browser and search engine​

Answers

A browser is a program that displays web pages, while a search engine is a program that helps users find information on the internet.


What is a web browser?
A web browser is a software program that enables users to access, retrieve, and view information on the World Wide Web. It allows users to navigate between web pages, follow hyperlinks, and interact with various forms of multimedia content, such as images and videos. .


A browser is a software application that allows users to access and display web pages on the internet. It is a program that runs on your computer or mobile device and enables you to navigate and interact with websites.

On the other hand, a search engine is a website or application that helps users find information on the internet. It is a program that searches and indexes web pages and other content on the internet, and then presents the results to users based on their search queries.

In summary, a browser is a tool that enables you to access and interact with websites, while a search engine is a tool that helps you find specific information on the internet. However, most web browsers also come with a built-in search engine, which allows users to search for information directly from the browser's search bar.

To know more about software visit:
https://brainly.com/question/985406
#SPJ1

Deliver: write about your design

Answers

Deliverables are the materials required to record the various stages of the design process in web design.

With examples, define design.

To design anything also means to plan it with a certain objective in mind. Both a verb and a noun, "design" can also have various meanings. To design something is to make a rough draft and create a layout showing how the final product will look and work. For instance, before actually building a new bridge, the government will commission its design from a team.

What is a deliverable example?

Deliverables include things like the budget report, the progress report, the beta product, the test result report, and any other measurable project components that signify completion.

To know more about design visit:-  

https://brainly.com/question/28062051

#SPJ1

Convert (DAD)16 number to octal equivalent number

Answers

It is to be noted that the octal equivalent of (DAD)16 is (3265)8.

What is the explanation of the above response?

To convert a hexadecimal number to octal, we can first convert the hexadecimal number to binary and then convert the binary number to octal. Here are the steps to convert (DAD)16 to its octal equivalent:

Write down the hexadecimal number (DAD)16

Convert each hexadecimal digit to its 4-bit binary equivalent:

D = 1101

A = 1010

D = 1101

Group the binary digits into groups of 3, starting from the right:

011 010 110 101

Convert each group of 3 binary digits to its octal equivalent:

3 2 6 5

Write down the octal digits from left to right:

(DAD)16 = (3265)8

Therefore, the octal equivalent of (DAD)16 is (3265)8.

Learn more about octal equivalent number on:

https://brainly.com/question/17033977

#SPJ1

what is the full form of
ABC
BBC
IC
GUI​

Answers

Please make me brainalist and keep smiling dude I hope you will be satisfied with my answer:-)

ABC -American Broadcasting Company

ABC -American Broadcasting CompanyBBC -British Broadcasting Corporation

ABC -American Broadcasting CompanyBBC -British Broadcasting Corporation IC- Integrated Circuit.

ABC -American Broadcasting CompanyBBC -British Broadcasting Corporation IC- Integrated Circuit. GUI -Graphical user interface

Math Machine Code:
Convert strings to numbers.
Initialize and use the Random number generator.
Perform several Math class operations.
Display a value in hexadecimal format.

Answers

Answer:

import random

# Convert strings to numbers

string_num1 = "123"

string_num2 = "456"

num1 = int(string_num1)

num2 = int(string_num2)

# Initialize and use the Random number generator

random_num = random.randint(1, 100)

print("Random Number:", random_num)

# Perform several Math class operations

sum = num1 + num2

product = num1 * num2

power = num1 ** num2

sqrt = num1 ** 0.5

# Display a value in hexadecimal format

hex_value = hex(random_num)

# Display the results

print("Num1:", num1)

print("Num2:", num2)

print("Sum:", sum)

print("Product:", product)

print("Power:", power)

print("Square Root of Num1:", sqrt)

print("Hexadecimal Value of Random Number:", hex_value)

Explanation:

In this code, we first convert two string numbers (string_num1 and string_num2) to integers using the int() function. Then, we use the random module to generate a random number and perform various Math class operations such as addition, multiplication, exponentiation, and square root. Finally, we use the hex() function to convert the random number to hexadecimal format.

Systems study involves which of the following option ?

a.
Design of system

b.
Determination of system requirements

c.
System testing

d.
All of the options​

Answers

d. All of the options are involved in systems study:

a. Design of system: This involves creating a plan or blueprint for how the system will be constructed, including its components, processes, and interactions.

b. Determination of system requirements: This involves identifying the needs and constraints of the system, including the functional and non-functional requirements, as well as any legal or ethical considerations.

c. System testing: This involves evaluating the system to ensure that it meets the requirements and functions correctly, including performance testing, security testing, and usability testing.

All of these options are critical to a comprehensive systems study, as they help ensure that the system is designed, built, and tested to meet the needs and expectations of its users.

Discuss Internet communications, including social networking, blogs, microblogs, webcasts, podcasts, wikis, client-based and web-based e-mail, and messaging.

Answers

Answer:

Internet communications-Internet communication refers to the sharing of information, data, ideas, or words over the internet. The internet comprises worldwide connected networks that transmit data thru packet switching using the standardized Internet Protocol Suite

social networking-involves the use of online social media platforms to connect with new and existing friends, family, colleagues, and businesses.

blogs- an informational website published on the World Wide Web consisting of discrete, often informal diary-style text entries (posts).

Explanation:

Other Questions
What were the similarities and differences in the causes of war in Western Europe and Asia?The causes of war in Asia were based off of Japan feeling isolated and unsatisfied, just like how Germany felt in Europe. However, the war in Asia was started by the Japanese realizing that their population was growing and that they were two dependent on states that opposed them. This led them to realize that they needed to gain territory rich in resources to sustain themselves, causing wars. In Europe however, the war was mainly caused by the fact that the treaty of Versailles was too severe and that Germans wanted to rectify these losses which process may affect the evolution of color patterns in poeciliids? A tangent segment is a line segment that has a point on the tangent line and on the center of the circle. The function F is defined by F(x) = 12/x+1/2. Find each value of the function.F(k) = Britney is mapping out a new running path around her local park. She is going to run west for 2.1 km, before turning 105" to the night and running another 3.3 km From there, she will run in a straight line back to her starting position. How far will Britney run in total? Give your answer correct to the nearest meter. What is the equivalent?Drag the answer into the box to match the fragative. what explains the differences among the four illustrations? is there anything that confirms or contradicts the order in which you arranged the illustrations? Suppose on your 21st birthday you begin saving $500 quarterly into an account that pays 12% compounded quarterly. If you continue the savings until your 51st birthday (30 years), how much money will be in the account?Please help!! Will mark brainliest What is the axis of symmetry?x= L1.2.4 Quiz: Give an Informal TalkQuestion 6 of 10Which visual aid makes the most sense to use if you want to show audiencemembers a graph along with your informal talk?A. Audio clip describing the graphB. Video clip that shows each section of the graph up closeC. Phone with the graph on it that you can pass aroundD. Full-color handout (5140364)-3-BACKGROUND INFORMATIONYou are the manager of SMK Civil Engineering Group and your company is located inMidrand. The workforce consists of both permanent and temporary employees. Yourhuman resources and finance departments are the driving force of your company.QUESTION 1: PRCISContent10Write a prcis of not more than 100 words about the article on the ADDENDUM(attached) that appeared in the Saturday Star. Use a different heading from the one inthe article and write down the number of words you used at the end of your paragraph.Language4Coherence4N990(E) (N14-Heading1Words1 Summarise it 21.Ada Mae bought a pen for $1.50 and 3 DVDs that each cost the same amount. She spent $22.50in all. Which equation models the situation?A, 1.5+3d=22.5B. 3(1.5) +d=22.5C. 3d-1.5=22.5D. 1.5=22.5+3d weight loss x runs a number of weight reduction centers within a large city. from the historical data it was found that the weight of the participants is normally distributed with a mean of 175 lbs and a standard deviation of 35 lbs. calculate the standard error of the average sample weight when 15 participants are randomly selected for the sample? enter your answer rounded to two decimal places. for example, if your answer is 12.345 then enter as 12.35 in the answer box. Which statement about credit reports is not true? true or false: first mover advantages are especially important in industries where the global market can profitably support only a limited number of firms. bank 1 lends funds at a nominal rate of 7% with payments to be made semiannually. bank 2 requires payments to be made quarterly. if bank 2 would like to charge the same effective annual rate as bank 1, what nominal interest rate will they charge their customers? round your answer to three decimal places. do not round intermediate calculations. a cannonball and a marble roll without slipping from rest down an incline. which gets to the bottom first? A 1450 car having a speed of 25.2 collides with a 7.5 truck moving in the same direction at 20.0 . Velocity of the car after the collision changed to 15.0 in the initial direction. What is the velocity of the truck after the collision? how long did yoy have to be a resident of arkansas to be govbever in 1836? the nurse is administering propranolol to a client on a telemetry unit. what will the nurse monitor the client for?