3. Write the qbasic program for following:
[10]
a) To find square of 3.
b) To print and display square and cube of 4.
c) To print and display simple interest where principle is 4000 rs, time is 2 years and
rate is 5%.
d) To find sum, subtract, product and division of 8 and 4
e) To find and print sum and product of two input numbers.


it's a really important assignment and I will need all the answer. I will follow, give 5 star and a heart for the first person who gives the answer. please be quick. it is important​

Answers

Answer 1

Answer:

Hi there!!!

I hope it helps you...

3. Write The Qbasic Program For Following:[10]a) To Find Square Of 3.b) To Print And Display Square And
3. Write The Qbasic Program For Following:[10]a) To Find Square Of 3.b) To Print And Display Square And
3. Write The Qbasic Program For Following:[10]a) To Find Square Of 3.b) To Print And Display Square And
3. Write The Qbasic Program For Following:[10]a) To Find Square Of 3.b) To Print And Display Square And

Related Questions

What is the function of a primary key in a table? (A.)to uniquely identify each record in the table,(B.)to uniquely identify foreign keys in the table,(C.)to secure table data,(D.)to secure the foreign keys in the table

Answers

Answer:

A. To uniquely identify each record in the table

Explanation:

From the list of given options, the option that best describe the primary key is A.

For better understanding of what primary key is all about, I'll make use of the following illustration.

Take for instance; the following relational table fields and records

SN ----- Name ----- Age

1 ------- John ---------15

2------- Peter ------- 17

3 ----- Ruth ----------16

If I've set the primary key of the above table to be SN, this means that no two records can have the same SN because each SN value is unique to every row.

Similarly,if I've set the primary key as Name, then there can only be one occurrence of John, Ruth or Peter because each of these are unique to their rows.

Answer

A.)

Explanation:

hope this helps

Which statement about comments is false? Select one: a. Lengthy comments can cause poor execution-time performance. b. Comments do not cause any machine language object code to be generated. c. Comments may begin and end with /* and */, respectively. d. Programmers insert comments to document programs and improve program readability.

Answers

Answer:

The answer is "Option a".

Explanation:

In programming, the Comment is also known as the description of the source code or the program, which increases the readability of the programmer.  It aims to facilitate understanding of it's code to humans, and when we this code the compilers and interpreters typically avoid it, and correct choices can be defined as follows:

In choice b, There is no use of comments in the compilation.  In choice c, the multiple line comment starts with starts and ends with /* and */.   In choice d, it increases the program readability.

BP measuring machine is an example of __________

A)Computing device
B)Medical device
C)Embedded machine
D)None of these​

Answers

Answer:

I think it is a Medical device.

BP = blood pressure

Explanation:

Research on the possibility of “AI technology” in various field of mathematics education

Answers

Answer:

In the last few years, there have been many initiatives to integrate AI technology to improve education.

Explanation:

For example, in Uruguay, the Plan Ceibal developed the “Mathematics Adaptive Platform”, which produces personalized feedback based on an analysis of the student´s skills, and has already shown a positive result on the learning process. The advantages perceived were the immediate response, independence of the students, easy corrections, and the promotion of group work.

In Ecuador, evaluations in language and mathematics were used to develop personalized lessons through AI software in the project “Más Tecnología”, also with positive outcomes.

In Kenya, Maths-Whizz also provides a personalized AI tutor that shapes the learning experience based on the student´s abilities.

Finally, China´s Next Generation Artificial Intelligence Plan aims to make that country the world’s capital of AI technology by 2030 by increasing enrolment in AI studies and integrating it into the study of different disciplines such as mathematics.

"PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a ______."

Answers

Answer:  cookie

Explanation:

A cookie is a small welcome file contains the information in the form og letters and numbers.It is downloaded on to a computer when a website is visited.

Hence, if a company uses a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site to generate a personalized welcome message to its visitors. This small file is called a cookie.

Vulnerabilities and risks are evaluated based on their threats against which of the following?This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9. A Data usefulness B Due care C Extent of liability D One or more of the CIA Triad principles

Answers

Answer:

The answer is "Option D".

Explanation:

The CIA Trilogue is a model for interpretation of security policies within an organization that is designed for direct confidentiality, integrity, and availability. This design is also sometimes related to it as the AIC triad, which avoids overlap with the central intelligence community.

In option A, it is used to process and analyze the data, that's why it is wrong. In option B, It is wrong because it tracks the measurement of financial assets, determines risks in an organization, and focus on areas for further study. In option C, It is wrong because it is regulated by contracts.

You're the network administrator for a company that has just expanded from one floor to two floors of a large building, and the number of workstations you need has doubled from 50 to 100. You're concerned that network performance will suffer if you add computers to the existing LAN. In addition, new users will be working in a separate business unit, and there are reasons to logically separate the two groups of computers. What type of network should you configure?

Answers

Answer:

Internetwork

Explanation:

Internetwork refers to the interconnection between the multiple networks of the computer through which the message could be exchanged with one another and in this,  no hardware network is required. The other word of the internetwork is internet

Therefore in the question it is mentioned that you want to double the workstations i.e 50 to 100. Also, new peoples would be work in a distinct unit of business

So this situation represents the internetwork

Jason's cellphone company allows him to use his smartphone as a wireless hotspot with his laptop when traveling. Jason notices that if he runs a speed test from his smartphone, the cellular connection is 8761 kbps. If he runs the same speed test connection from his laptop which is connected to his cellphone over its wireless hotspot,the speed drops to 243 kbps. Which of the following is the MOST likely cause for the drop in the speed test results?
Explanation
a) The smartphone's RFID signal is low
​b) The wireless hotspot feature is throttling the cellular connection speed
​c) The SSID for the wireless hotspot is not being broadcast
d) The laptop is out of range of the smartphone's hotspot

Answers

Answer:

b) The wireless hotspot feature is throttling the cellular connection speed.

Explanation:

The wireless hotspot feature allows phone to share cellular data with other network creating a Wi-Fi network. Cellular data is connected with other devices or laptops. Jason's cellphone company is allowing him to use his smart phone as a wireless hotspot with his laptop. He notices that cellular connection speed differs when he uses wireless hotspot with laptop. This is because hotspot is throttling cellular connection speed.

You work in the Accounting department and have been using a network drive to post Excel workbook files to your file server as you complete them. When you attempt to save a workbook file to the drive, you see the error message: "You do not have access to the folder 'J:\'. See your administrator for access to this folder." What should you do first

Answers

Answer:

The answer is: Saving the workbook to another available drive or a flash drive to protect data, then contact with the system administrator to get access to the J folder.

Explanation:

Interactive sites where users write about personal topics and comment to a threaded discussion are called?
A. chat rooms.
B. networking sites.
C. forums
D. messaging sites.

Answers

Answer:

C. forums

Explanation:

Forums are internet sites where users can meet to discuss different topics through the use of messages thereby forming chat rooms. An internet forum can be in form of a question and answer site. Most websites have internet forums where users can meet and discuss or ask questions. Sometimes there may be moderators that ensure that the posted messages are acceptable based on guidelines.

Which of the given features are the features of ATX?
(choose all that apply)

a. have CPU sockets for the CPU

b. have mostly integrated CPUs

c. can be 60mm by 60mm in size

d. can be 244mm by 244mm in size.

e. used in home theater systems and gaming gadgets

Answers

Answer:

e,d and a not sure though

To see the non-printing characters in Writer press ________ + ________keys, together.

Answers

Answer:

Ctrl + *

Explanation:

Non-printing characters are the characters that are not displayed at the time of printing of an document or a spreadsheet. This is used for designing a content

The few are examples like non-breaking space, the pilcrow etc

The shortcut to show or hide the non-printing characters is Ctrl + * i.e Contorl + Star

So press these two keys we can see the non-printing characters

Answer:

Ctrl+F10, is the keys to see the non printing characters in Open Office Writer

Explanation:

A technician has a client’s laptop that is randomly shutting down. Which of the following is the FIRST step of the troubleshooting theory that the technician will perform to resolve the laptop’s issue?
A. Document finding, actions, and outcomes
B. Identify the problem
C. Establish a theory
D. Establish a plan of action to resolve the problem

Answers

Answer:

B

.Identify the problem

Which of the following statements is true? a. Predicate methods typically test a condition and modify the object on which they're called. b. Predicate methods typically do not test a condition and do not modify the object on which they're called. c. Predicate methods typically test a condition and do not modify the object on which they're called. d. Predicate methods typically do not test a condition and modify the object on which they're called.

Answers

Answer:

C

Explanation:

Predicate methods typically test a condition and do not modify the object on which they're called.

convert binary Fraction to decimal:(11011. 101)​

Answers

Answer:

27.625

Explanation:

every binary digit is a power of 2, after the decimal point they become negative:

1·2⁴ + 1·2³ + 0·2² + 1·2¹ + 1·2⁰ + 1·2⁻¹ + 0·2⁻² + 1·2⁻³ = 27.625

You are instructing a user on how to properly use a new laptop. He asks about the special function keys that are used to perform tasks such as toggling the display or adjusting the display brightness. Which key should the user strike in combination with the special function keys

Answers

Answer:

The Fn key.

Explanation:

In this scenario, you are instructing a user on how to properly use a new laptop. He asks about the special function keys that are used to perform tasks such as toggling the display or adjusting the display brightness.

The user should strike the "Fn" key in combination with the special function keys.

In Computer science, the special function keys found on the top row of a keyboard are the F1, F2, F3, F4, F5, F6, F7, F8, F9, F10, F11, and F12 keys. Each of the special function keys just like their name suggests are used to perform different tasks respectively as defined by the operating system of a computer.

Fn is an acronym for function. In order to use the special function keys, a user must first hold down the Fn key before pressing the specific special function key which then triggers functions configured to use this key.

For instance, "Fn+F2" is to reduce brightness on the Windows operating system. Also, "Fn+F12" is to increase audio volume on the Mac operating system.

I’m trying to get answers from Brainly and it’s not showing up. I’ve been refreshing the browser, but it’s the same. I’ve never had this problem before can someone help me out here?

Answers

Answer:

We are having the same problem

Explanation:

What are green skills .Write about some of the areas in which green skills contribute to the sustainable development?

Answers

Answer:

Green skills also known as skills for sustainability are the combination of knowledge, values, attitudes, technical skills required in order to promote sustainable societies and economies as well as to protect the environment in daily endeavors including industrial, business and communal activities to meet environmental regulations and reduce the impact of climate change

Explanation:

The development of alternative wind, water, and solar power supply to support fossil fuel based power generation is shaping the energy economy dynamics in developing countries that have lower penetration of commercial electricity and had to make use of environmentally unfriendly and expensive power generating sets with limited power supply duration

Green kills has improved power penetration to very remote locations in such economies as well as promoted the attainment of sustainable development goals.

what is the base number of binary, decimal and octal?​

Answers

Answer:

Explanation:

Answer:

0 and 1

Explanation:

One excellent diagnostic tool is a digital agent, a software routine that performs an action when a specified event occurs. It can interact with customers to provide solutions, take customers on a tour of a company’s web site, or escalate customers from self-services to assisted service channels. Group of answer choices

Answers

Answer:

The given statement is true.

Explanation:

Diagnostic Tool seems to be a convenient and effective tool that allows management strategies continues to drive designed to access fix any technical errors that only the drive might well display.They arrive from several of the trusted companies and also have important advantages. Those other scanners would then encourage you to make a diagnosis a multitude of functionality, and that in deployment they are indeed very consistent, precise as well as accurate.

So that the above is the right answer.

What is question tags What is interjection Explain the meaning of consumer goods State the consumer rights What is the meaning of database Explain the meaning of digital divide

Answers

Answer:

The clause that turns a statement into question is called question tag. It consists of the statement, a comma and the question clause

 e.g You are Richa, aren't you?

Here aren't you is a question tag, it turns the statement into a question.

The words that is used to express strong emotion is called interjection. It can express emotion of excitement, joy, sorrow, pain and so on.The goods used by the consumers to fulfill their current demand rather that using it to produce another good. They are the end result of the production and manufacturing. You see these goods in showrooms, shops or stores. The law that is related with the things that a producer of goods must do to protect customers from harm is called consumer rights. These rights and laws came into existence through various legal disputes. Right to choose, right to be informed, right to safety and right to be heard are consumer rights. The organized collection of structured information that is stored electronically on a computer is called database. Most of the databases use structured query language to write and query data, databases are controlled by database management system. The divide between the people who have ready access to the internet and computer and those who do not is called digital divide.

A network administrator has statically configured the LMI type on the interface of a Cisco router that is running Cisco IOS Release 11.2. If the service provider modifies its own LMI type in the future, what step must the network administrator take

Answers

Answer:

The answer is "The LMI model should be compatible with the supplier dynamically for the network manager".

Explanation:

The term LMI stands for the "Local Management Interface", it is a Cisco technology, in which the signaling protocol was used in between routers and transmission frame switches to share data in timekeepers, global addressing, multipathing as well as the present state of virtual socks for various purposes, in which it is mainly used for "dynamically setting, in which the network administrator provides compatibility with the service provider".

Tom walks into the accounting department and walks into a mess! User A can't access the Internet, User B has forgotten her password, User C's system is overheating to the point of smoking and the administrator is worried there might be a virus on all the systems. Whose system should he address first

Answers

Answer:

User C.

Explanation:

As per the given details, the problem of user C's system must be addressed first due to the seriousness of his case. His computer is excessively overheating up to the smoking point and if his problem is not addressed soon, it will damage the vital parts of the computer or may also explode. The other users having the problem of inability to access the internet or issue of forgotten password can be addressed later as these are minor problems that do not have as such consequences. Thus, user C is the correct answer.

Several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of MWI problems. Some have new messages, but their lamp is not lit; others complain that their lamp is on, but there are no new messages. You suspect that the server is not making MWI calls. How can you quickly check whether or not this is the case

Answers

Answer:

You should run the port activity report.

Explanation:

In this scenario, several days a week, usually between 8:00 a.m. and 9:00 a.m., users complain of message waiting indicator (MWI) problems. Some have new messages, but their lamp is not lit; others complain that their lamp is on, but there are no new messages. You suspect that the server is not a making message waiting indicator (MWI) calls.

In order to quickly check whether or not this is the case, you should run the port activity report.

A message waiting indicator (MWI) can be defined as a Cisco proprietary lamp, flashing liquid crystal display (LCD) panel, or special dial tone installed on the phones of a user which enables him or her to know a voice message waiting. When a message is waiting, the phone system is notified by the Cisco Unity Connection to activate the message waiting indicator on the user's phone.

The procedure for running the port activity report are;

1. Click on "reports" in the tool menu of the Cisco Unity Connection Serviceability.

2. Then click on "port activity report" on the serviceability report page.

3. Select the necessary options and lastly, click on "generate report."

What is the output of the following code fragment? int i = 1; int sum = 0; while (i <= 11) { sum = sum + i; i++; } System.out.println("The value of sum is " + sum); The value of sum is 65. The value of sum is 66. The value of sum is 55. The value of sum is 56.

Answers

Answer:

The value of sum is 66

Explanation:

i = 1

sum = 0

while (i <= 11) {  

sum = sum + i;

i++;  

}

i = 1

sum = sum + isum = 0 + 1sum = 1

i = 2

sum = sum + isum = 1 + 2sum = 3

i = 3

sum = sum + isum = 3 + 3sum = 6

i = 4

sum = sum + isum = 6 + 4sum = 10

i = 5

sum = sum + isum = 10 + 5sum = 15

i = 6

sum = sum + isum = 15 + 6sum = 21

i = 7

sum = sum + isum = 21 + 7sum = 28

i = 8

sum = sum + isum = 28 + 8sum = 36

i = 9

sum = sum + isum = 36 + 9sum = 45

i = 10

sum = sum + isum = 45 + 10sum = 55

i = 11

sum = sum + isum = 55 + 11sum = 66

i = 12 --> does not comply with the condition "i < = 11", the while loop is over

Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.
Which of the following steps can be taken to limit access to the computers?
A. Configure logon time restrictions.
B. Set the BIOS to automatically power off the computers at closing time.
C. Disable Microsoft account resources.
D. Change the user account passwords.

Answers

Answer:

A. Configure log on time restrictions.

Explanation:

Organizational heads can monitor when users can connect to the network using the logon hours function such as controlling user operation restricting unauthorized user and restricts users from network exposure beyond regular working hours.this feature helps to regulate the working hours during which one wish to allow or curtail user access, determine the selected domain, define the users to whom one wishes to extend the permit for this logon hours and make the required changes.  This option allows us to assign or limits logon access to different users in an efficient way.

Thanks to the availability of computers, mobile devices and ISs, information flowing through companies is almost always available to executives, managers, and workers who no longer struggle to find information they need to make sound decisions or do their jobs.
a. True
b. False

Answers

Answer:

False

Explanation:

The advent of computers, mobile devices and ISs, information flowing through companies is almost always available to executives, managers, and workers who no longer struggle to find information they need to make sound decisions or do their jobs.

It has made information flowing through companies to be readily available to executives, managers and workers. It helps workers to make sound decisions and discharge their duties effectively.

Scenario: The Internet Explorer 8 browser is being used to display a web page with an audio player but the audio element displays nothing on the page. Read the following code snippet and select the reason for the incorrect display from the choices below.
width="160" height="150">


Sparky the Dog (.mov)

A. The controls attribute should be controls="yes"
B. There are too many source elements.
C. The file extension .ogg is incorrect.
D. The MIME type values are incorrect.

Answers

Answer:

nose

Explanation:

a small storage device that can be carried in a pocket​

Answers

Answer:

USB is a small storage device that can be carried in a pocket

Suppose that instead of swapping element A[i] with a random element from the subarray A[i..n], we swapped it with a random element from anywhere in the array: PERMUTE-WITH-ALL (A) 1, n = A.length 2, for i = 1 to n 3, swap A[i] with A[RANDOM(1, n)] Does this code produce a uniform random permutation? Why or why not?

Answers

Answer:

The answer to this question can be defined as follows:

Explanation:

Its Permute-with-all method, which doesn't result in a consistent randomized permutation. It takes into account this same permutation, which occurs while n=3. There's many 3 of each other, when the random calls, with each one of three different values returned and so, the value is=  27. Allow-with-all trying to call possible outcomes as of 3! = 6  

Permutations, when a random initial permutation has been made, there will now be any possible combination 1/6 times, that is an integer number m times, where each permutation will have to occur m/27= 1/6. this condition is not fulfilled by the Integer m.

Yes, if you've got the permutation of < 1,2,3 > as well as how to find out design, in which often get the following with permute-with-all  chances, which can be defined as follows:

[tex]\bold{PERMUTATION \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ PROBABILITY}[/tex]

[tex]\bold{<1,2,3> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 4/27= 0.14 }\\\bold{<1,3,2> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}\\[/tex]

[tex]\bold{<2,1,3> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}\\\bold{<2,3,1>\ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 5/27=0.18}[/tex]

[tex]\bold{<3,2,1> \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ \ 4/27=0.14}[/tex]

Although these ADD to 1 none are equal to 1/6.

Other Questions
A broker-dealer and its associated persons may be subjected to sanctions for violations of FINRA and SEC rules. Which of the following penalties can be levied against both the member firm AND its associated persons?A. CensureB. Limits placed on activitiesC. ImprisonmentD. Loss of SIPC coverage Read the excerpt from "A Modest Proposal." A very worthy person, a true lover of his country, and whose virtues I highly esteem, was lately pleased, in discoursing on this matter, to offer a refinement upon my scheme. He said, that many gentlemen of this kingdom, having of late destroyed their deer, he conceived that the want of venison might be well supply'd by the bodies of young lads and maidens. The underlined portions of the excerpt are examples of verbal irony because this man truly is virtuous and patriotic, so Swift is surprised by the mans support of eating children to solve the poverty issue. anyone who is truly virtuous or patriotic would not suggest using children for food, so Swift means the opposite of what he says. this man is a close friend of Swifts, so Swift is just expressing his personal thoughts and feelings about the mans character. anyone who tries to better his country must be virtuous and patriotic, so Swift is simply explaining what is already obvious to the reader. A screen is placed 43 cm from a single slit which is illuminated with 636 nm light. If the distance from the central maximum to the first minimum of the diffraction pattern is 3.8 mm, how wide is the slit in micrometer which following pairs of body functions are normally involuntary actions but can be controlled voluntary for a short periods of time A researcher measures job satisfaction among married, single, and divorced employees to determine whether marital status can influence job satisfaction. Based on the following description in APA format, state the value for k, N, and n. A one-way analysis of variance showed that job satisfaction did not vary by marital status, F(2, 24) = 1.93, p > 0.05.a. k = _____b. N = _____c. n = _____ Which of the following prohibits consumers from taking cash from manufacturers, suppliers, or their representatives for making recommendations, reviews, or endorsements, unless full disclosure is provided?A. The world of mouth Marketing association's ethics code.B. The fourth principle of IMCC. The American associations of advertising agencies creative For each of the following system of linear equations, state the number of solutions without solving the system. a) -x+3y=9, -4x+12y=12 b) 2x-y-4=0,6x=3y+12 Which equation represents the vertical asymptote of the graph? a curve asymptotic to y equals 0 from negative x to negative y near x equals 12. A curve asymptotic to y equals 0 from positive x to positive y near x equals 12. x = 0 y = 0 x = 12 y = 12 Una tractomula se desplaza con rapidez de 69 km/h. Cuando el conductor ve una vaca atravesada enmedio de la carretera, acciona los frenos y se detiene 4 s despus. Si la vaca estaba a 25 m de la tractomulacuando el conductor pis el freno. atropell la vaca? Justifique su respuesta. A six sided number cube is rolled twice. What is the probability that the first roll is an even number and the second roll is a number grater than 4? 1 (4/6 - 27) (4/6 +21)Please tell the answer? I bought a tv for 532.50 including the 6%sales tax. What was the original price of the tv without the sales tax? Simplify the expression . 39*x / 13 Importance of taking correct body measurement.... PLEASE HELP! 10 POINTS Write the equation of the function graphed. Graph of an abolute value function shifted 4 units to the left. f(x) = |x + 4| f(x) = |x| 4 f(x) = |x 4| f(x) = |x| + 4 Which equation satisfies all three pairs of a and b values listed in the table ? A) a-3b=10B) 3a+ b=10C) 3a-b=10D) a+ 3b=10 A current liability is a debt that is reasonably expected to be paid a. out of cash currently on hand b. within one year c. out of currently recognized revenues d. between 6 months and 18 months Is the given triangle scalene, isosceles, or equilateral? The Vertices are T(1,1), V(4,0), S(3,5) Search on internet to find more about the Modernization Plan of the British in India after On November 1, Alan Company signed a 120-day, 10% note payable, with a face value of $27,000. What is the maturity value of the note on March 1