Write a program that prints the following patterns. Use for loops to generate the patterns. All asterisks (*) should be printed by a single printf statement of the form printf( "*" ); (this causes the asterisks to print side by side).

Make sure you include a sentinel Value in your program
Do you wish to Exit the program? Enter q to exit or any number to Continue...

Answers

Answer 1

This software asks the user to select one of three patterns to print (1, 2, or 3), and then prints each pattern using nested for loops. A simple triangle of asterisks makes up the first design.

How can a numerical pattern be made in C?

If you are comfortable with looping constructs like the for and while loops, creating programmes that use number patterns in C is simple. Most of the time, two nested loops are needed to display number pattern programmes in C. The inner loop specifies what will put in each row, while the outer loop establishes the number of rows.

'#include stdio.h'

do printf("Choose a pattern to print (1, 2, or 3), or q to quit: "); scanf("%d", &choice); int main() int choice;

switch(choice) Case 1 is as follows: for(int I = 1; I = 5; i++) for(int j = 1; j = I j++) Case 2: printf("*"); printf("n"); break; Case 3: Case 4: printf("*"); printf("n"); break Case 5: printf("*"); printf("n"); break Case 6: printf("*"); printf("n"); break Case 7: printf("*"); printf("*"); else printf(" "); printf("n"); break Case 'q': printf(" "); printf("n"); break"Exiting program...n"); break; default: printf("Invalid choice, please try again.n"); while(choice!= 'q');

returning 0;

To know more about software  visit:-

https://brainly.com/question/985406

#SPJ1


Related Questions

A laptop was stolen from the car of an employee. The laptop contained PHI on 6,500 patients and included Social Security numbers. The employee who left the laptop in the car notified you immediately when the breach occurred. The data were not encrypted but the laptop is password protected

Answers

Note that the kind of security violation that occurred is data breach violation.

What is data breach security violation?

A personal data breach is defined as a security breach that results in the unintentional or illegal destruction, loss, modification, unauthorized disclosure, or access to personal data. This encompasses breaches caused by both unintentional and intentional reasons.

A data breach occurs when sensitive, protected, or confidential data is copied, communicated, viewed, stolen, altered, or utilized by someone who is not allowed to do so. Unintentional information exposure, data leak, information leakage, and data spill are other words.

As a result, the above case is an example of a data breach.

Learn more about data breach on:

https://brainly.com/question/30321388

#SPJ1

Full Question:

Although part of your question is missing, you might be referring to this full question:

A laptop was stolen from the car of an employee. The laptop contained PHI on 6,500 patients and included Social Security numbers. The employee who left the laptop in the car notified you immediately when the breach occurred. The data were not encrypted but the laptop is password protected.

What privacy and security violations have occurred?

Write an assembly code
Read 1 byte number (between 0 and 9). Write a program that prints:

It's ODD

if input is odd and prints

It's EVEN if input is even

Answers

; Read input byte

MOV AH, 01h ; Set up input function

INT 21h ; Read byte from standard input, store in AL

; Check if input is even or odd

MOV BL, 02h ; Set up divisor

DIV BL ; Divide AL by BL, quotient in AL, remainder in AH

CMP AH, 00h ; Compare remainder with zero

JNE odd ; Jump to odd if remainder is not zero

JMP done ; Jump to done if remainder is zero

odd: ; Odd case

MOV DX, OFFSET message_odd ; Set up message address

JMP print

even: ; Even case

MOV DX, OFFSET message_even ; Set up message address

print: ; Print message

MOV AH, 09h ; Set up output function

INT 21h ; Print message

done: ; End of program

Integer userIn is read from input. Write a while loop that reads integers from input until the integer 10 is read. Then, find the sum of all integers read. Integer 10 should not be included in the sum.

Ex: If the input is 3 9 -23 -40 10, then the output is:
-51

import java.util.Scanner;

public class SumCalculator {
public static void main(String[] args) {
Scanner scnr = new Scanner(System.in);
int userIn;
int result;

result = 0;
userIn = scnr.nextInt();

/* Your code goes here */

System.out.println(result);
}
}

Answers

Answer:

Here's the modified code that reads integers from input until the integer 10 is read and then finds the sum of all integers read, excluding 10:

Explanation:

import java.util.Scanner;

public class SumCalculator {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       int userIn;

       int result = 0;

       userIn = scnr.nextInt();

       while (userIn != 10) {

           result += userIn;

           userIn = scnr.nextInt();

       }

       System.out.println(result);

   }

}

1. What are the differences and similarities between a local area network (LAN) and a wide area
network (WAN)?
2. As the different network types have evolved, careers in the Network Systems pathway have
changed over time. Discuss an example of how network system careers have changed and how
those changes have impacted society.
3. What is an Internet Service Provider? Describe at least two types of ISP connections.
4. Explain two ways that you can stay safe while working in the Network Systems career pathway.
5. There are many different careers available within the Network Systems career pathway, but they all
have some similar characteristics. What are two of these characteristics?

Answers

Answer: a LAN  only supports devices such as wireless headphones but WAN can support things like cctv cameras.


Explanation:

A local area network, or LAN, is a network of computers created within a restricted area, like a home, business, or group of buildings. A wide-area network (WAN), on the other hand, is a type of computer network.

What distinguishes a Local Area Network (LAN) from a Wide Area Network (WAN) and how are they similar?

A sort of network that links a few structures together, such as a few homes or offices, is known as a local area network, or LAN. A WAN, or wide area network, on the other hand, is a network that covers a wider geographic area and can even span the entire world.

What distinguishes the internet from a wide area network?

Theoretically, any huge network that stretches out over a vast geographic area is a WAN.

To know more about LAN visit:-

https://brainly.com/question/13247301

#SPJ1

What is the dark web?​

Answers

Answer:

DARK WAVE IS MOST DANGEROUS WEB SITE

Answer:

dark web is a place where there is bad things obviously

what is the full form of
ABC
BBC
IC
GUI​

Answers

Please make me brainalist and keep smiling dude I hope you will be satisfied with my answer:-)

ABC -American Broadcasting Company

ABC -American Broadcasting CompanyBBC -British Broadcasting Corporation

ABC -American Broadcasting CompanyBBC -British Broadcasting Corporation IC- Integrated Circuit.

ABC -American Broadcasting CompanyBBC -British Broadcasting Corporation IC- Integrated Circuit. GUI -Graphical user interface

I’m AWS there are multiple storage options available to customers. What are some use-cases that have specific service offerings and price models oriented around the expected usage?

Answers

AWS provides a variety of storage choices with unique service and pricing patterns for various use cases. RDS for relational database storage and S3 for object storage, for instance.

What are the various AWS storage options?

The three fundamental types of cloud storage are object storage, file storage, and block storage. Each has particular benefits and applications.

How do the various Amazon storage options for block and file storage differ from one another?

Block storage divides data into arbitrarily ordered, uniformly sized volumes; file storage organises and represents data as a hierarchy of files in folders; and object storage manages data and connects it to related metadata. Containers offer tremendous scale and flexibility for how software and storage are delivered.

To know more about database  visit:-

https://brainly.com/question/3804672

#SPJ1

the difference between browser and search engine​

Answers

A browser is a program that displays web pages, while a search engine is a program that helps users find information on the internet.


What is a web browser?
A web browser is a software program that enables users to access, retrieve, and view information on the World Wide Web. It allows users to navigate between web pages, follow hyperlinks, and interact with various forms of multimedia content, such as images and videos. .


A browser is a software application that allows users to access and display web pages on the internet. It is a program that runs on your computer or mobile device and enables you to navigate and interact with websites.

On the other hand, a search engine is a website or application that helps users find information on the internet. It is a program that searches and indexes web pages and other content on the internet, and then presents the results to users based on their search queries.

In summary, a browser is a tool that enables you to access and interact with websites, while a search engine is a tool that helps you find specific information on the internet. However, most web browsers also come with a built-in search engine, which allows users to search for information directly from the browser's search bar.

To know more about software visit:
https://brainly.com/question/985406
#SPJ1

4. Assertive communication employs
O A. theories.
B. sympathy.
C. facts.
D. accusations.

Answers

Answer:

C Assertive communication employs facts

Explanation:

Assertive communication involves expressing oneself in a clear and direct manner while also respecting the rights and opinions of others. Assertive communication is based on facts and clear expressions of feelings and needs, rather than making accusations or using sympathy or theories. It involves expressing oneself in a confident and respectful manner and using specific examples to illustrate one's points. By using assertive communication, individuals can convey their message effectively, maintain their self-respect and self-esteem, and avoid unnecessary conflicts.

A page with a malware warning

Answers

False, A page cant be a malware warning. Thus, option B is correct.

What is malware?

Malware, οr maliciοus sοftware, is a blanket term fοr any kind οf cοmputer sοftware with maliciοus intent. Mοst οnline threats are sοme fοrm οf malware. Malware can take many fοrms, including viruses,  and spyware.

The twο mοst cοmmοn ways that malware accesses yοur system are the Internet and email. Sο basically, anytime yοu’re cοnnected οnline, yοu’re vulnerable.

Malware can enter yοur cοmputer when yοu surf thrοugh websites, dοwnlοad infected files, install prοgrams οr apps frοm unfamiliar prοvide, οpen a maliciοus email attachment, οr pretty much everything else yοu dοwnlοad frοm the web οn tο a device that lacks a quality anti-malware security applicatiοn.

Learn more about Malware

https://brainly.com/question/14276107

#SPJ1

Complete question:

In binary, there's just no numeral that represents that value "3."
True
False

Answers

Answer:

False.

Explanation:

In binary, each digit can only have a value of 0 or 1. When counting in binary, the numbers progress as follows:

0, 1, 10, 11, 100, 101, 110, 111, 1000, 1001, ...

So the binary numeral for 3 is 11, since it represents the value of one "two" plus one "one." Similarly, the binary numeral for 4 is 100, since it represents the value of one "four" and zero "twos" and zero "ones."

In this way, any positive integer can be represented in binary using combinations of the binary numerals for 1, 2, 4, 8, 16, 32, and so on.

What role does the team member who says, "I love to create to-do lists!" most likely
play?
taskmaster
caretaker
chair
director

Answers

The team member who says "I love to create to-do lists!" most likely plays the role of a taskmaster.

Who is called a taskmaster?
A taskmaster is a person who supervises and directs the work of others, often in a strict or authoritarian manner. The term can be used to refer to a supervisor or manager who is responsible for overseeing the work of employees or contractors, and who is often focused on meeting specific goals or deadlines. The term can also be used more broadly to refer to anyone who is known for being demanding or pushing others to work hard and achieve their goals.

The taskmaster is someone who is highly organized and enjoys managing tasks and timelines to ensure that projects are completed efficiently and effectively. They often create to-do lists, set deadlines, and track progress to ensure that everyone on the team stays on track and meets their goals.

To know more about employees visit:
https://brainly.com/question/30247729
#SPJ1


What must happen before a confusion matrix algorithm, like a decision tree, can be used?

Answers

Before a confusion matrix algorithm like a decision tree can be used, it must be trained on a dataset with input features and corresponding target values, and evaluated using a testing set and performance metrics.

Explain the process before using a confusion matrix algorithm.

Before a confusion matrix algorithm, such as a decision tree, can be used, it must be trained on a dataset that includes both input features and the corresponding target values. The training data is used to build the algorithm by identifying patterns in the data and creating a model that can make predictions on new data. Once the algorithm is trained, it can be tested on a separate set of data called the testing or validation set. The confusion matrix algorithm can then be evaluated using metrics such as accuracy, precision, recall, and F1 score, which are calculated from the results of the confusion matrix. The confusion matrix provides a summary of the performance of the algorithm by comparing the predicted values to the actual values in the testing set. It shows the number of true positives, true negatives, false positives, and false negatives, which are used to calculate the performance metrics.

To learn more about confusion matrix, visit:

https://brainly.com/question/31361987

#SPJ1

Deliver: write about your design

Answers

Deliverables are the materials required to record the various stages of the design process in web design.

With examples, define design.

To design anything also means to plan it with a certain objective in mind. Both a verb and a noun, "design" can also have various meanings. To design something is to make a rough draft and create a layout showing how the final product will look and work. For instance, before actually building a new bridge, the government will commission its design from a team.

What is a deliverable example?

Deliverables include things like the budget report, the progress report, the beta product, the test result report, and any other measurable project components that signify completion.

To know more about design visit:-  

https://brainly.com/question/28062051

#SPJ1

Examine trends in emergence of computer from 1936_1985 and its relevance to education industry in nigeria

Answers

From Konrad Zuse's first programmable computer through the emergence of personal computers like the Apple II, the development of computers made tremendous strides between 1936 and 1985.

What role does technology play in the educational system?

The usage of computers is possible for online learning and research. Students can utilise the internet to find pertinent information about their projects and assignments as well as to acquire helpful support from other researchers if they preserve and organise their research materials on computers.

What technological advancements in education have there been historically in Nigeria?

Simple British teaching aids were utilised to help with instruction in Nigeria in 1932, marking the start of the usage of educational technology there. In Lagos, a radio network was constructed.

To know more about programmable visit:-

https://brainly.com/question/30307771

#SPJ1

At which stage of problem solving should you discuss the problem with colleagues?

Answers

The stage of problem solving one should discuss the problem with a colleague is defining the problem.

How to explain the information

To begin developing a problem-solving approach, it's critical to recognize the issue at hand. It will be more difficult to determine a solution if you can't collectively recognize the issue.

Although each phase in the problem-solving process is critical, defining the problem comes first since without it, the other processes are meaningless.

The stage of problem solving one should discuss the problem with a colleague is defining the problem.

Learn more about problem on

https://brainly.com/question/7507783

#SPJ1

suppose you are to design an airline ticketing system. you choose to use dictionary for efficient mapping of ticket information. which of the following can be chosen as your dictionary key? passenger first and last name passenger age and date of birth boarding bar code route code

Answers

A dictionary key that can be chosen for this purpose include the passenger's first and last name, passenger age and date of birth, boarding bar code, and route code.Each of these key options has its advantages and disadvantages.

However, the passenger's first and last name are the most commonly used keys in airline ticketing systems. This is because it is easy to remember and is the standard method used in passenger identification.The disadvantage of using the passenger's name is that it is not always unique, and sometimes passengers have similar names or may even share the same name. When this happens, there can be confusion during ticketing or flight check-in processes.Therefore, additional information, such as date of birth, can be included to ensure that the correct passenger is identified.The passenger's age and date of birth is also a valid key option. It is unique and can be used to verify a passenger's identity. However, it is not as commonly used as the passenger's name because not all passengers may be willing to provide their date of birth during the booking process.The boarding bar code is another key option that can be used in airline ticketing systems. This code is unique to each ticket and can be scanned at the airport during check-in and boarding processes. However, it is not as user-friendly as using a passenger's name or date of birth because it is more difficult to remember or recognize.Finally, the route code is another option that can be used as a dictionary key in an airline ticketing system. This code identifies the flight route and can be used to filter or sort information. However, it is not as useful for passenger identification purposes as the other options mentioned above.In summary, when designing an airline ticketing system using a dictionary, the most commonly used key is the passenger's first and last name. However, additional information such as date of birth can be included to ensure passenger identification. Other key options include the passenger's age and date of birth, boarding bar code, and route code.

for more such question on airline

https://brainly.com/question/29579489
#SPJ11

java 9.20 lab: print student roster (eo) complete the course class by implementing the printroster() method, which outputs a list of all students enrolled

Answers

To print the student roster in Esperanto, you can use the following code:

class Kursanto:

 def __init__(self, nomo, id):

   self.nomo = nomo

   self.id = id

class Klaso:

 def __init__(self):

   self.kursantoj = []

 

 def enmeti_kursanton(self, kursanto):

   self.kursantoj.append(kursanto)

 

 def printroster(self):

   print("Listo de Kursantoj:")

   for kursanto in self.kursantoj:

     print(kursanto.nomo + " (ID: " + str(kursanto.id) + ")")

# Ekzemplo de uzado:

k1 = Kursanto("Johano", 123)

k2 = Kursanto("Maria", 456)

k3 = Kursanto("Antono", 789)

klaso = Klaso()

klaso.enmeti_kursanton(k1)

klaso.enmeti_kursanton(k2)

klaso.enmeti_kursanton(k3)

klaso.printroster()

What is the function of the code?

This code defines two classes, Kursanto and Klaso. Kursanto represents a student and has two attributes: nomo (name) and id (identification number). Klaso represents a course and has a list of Kursanto objects as its attribute kursantoj (students). The method enmeti_kursanton adds a Kursanto object to the list, and the method printroster prints the list of students with their names and IDs.

To use this code, you can create Kursanto objects for each student, add them to a Klaso object using enmeti_kursanton, and then print the roster using printroster.

Learn more about printroster() method, here: https://brainly.com/question/29557707

#SPJ1

Write a program that asks the user the speed of a vehicle (in miles per hour) and
how many hours it has traveled. The program will display the total distance traveled
at the end of each hour of the period. (Python)

Answers

Answer:

Here's a Python program that calculates and displays the total distance traveled by a vehicle over a period of time, using functions to validate the user's input:

def get_integer_data(prompt):

   while True:

       try:

           value = int(input(prompt))

           if value <= 0:

               print("Please enter a positive integer.")

           else:

               return value

       except ValueError:

           print("Please enter a valid integer.")

def main():

   speed = get_integer_data("What is the speed of the vehicle in mph: ")

   hours = get_integer_data("How many hours has it traveled? ")

   print("\nDistance Traveled Summary")

   print("Hour\tDistance Traveled (miles)")

   for hour in range(1, hours+1):

       distance = speed * hour

       print(f"{hour}\t{distance}")

main()

Explanation:

Here's how the program works:

First, a function named get_integer_data is defined that takes a prompt as an argument and asks the user to enter a positive integer value. If the user enters a non-positive or invalid value, the function will prompt the user again until a valid input is given.

Then, the main function is defined. It calls the get_integer_data function twice to get the speed and hours traveled from the user.

After that, the program displays a summary of the distance traveled at each hour of the period. A for loop is used to iterate over each hour from 1 to hours. Inside the loop, the distance traveled is calculated by multiplying the speed by the hour. The f-string syntax is used to format and print the hour and distance values in a table.

Note that the program assumes that the speed is constant over the entire period. If this is not the case, the program would need to be modified to take this into account.

Write a query to display (product_class_desc, product_id, product_desc, product_quantity_avail ) and Show inventory status of products as below as per their available quantity: a. For Electronics and Computer categories, if available quantity is <= 10, show 'Low stock', 11 <= qty <= 30, show 'In stock', >= 31, show 'Enough stock' b. For Stationery and Clothes categories, if qty <= 20, show 'Low stock', 21 <= qty <= 80, show 'In stock', >= 81, show 'Enough stock' c. Rest of the categories, if qty <= 15 – 'Low Stock', 16 <= qty <= 50 – 'In Stock', >= 51 – 'Enough stock' For all categories, if available quantity is 0, show 'Out of stock'. Hint: Use case statement.

Answers

Answer:

Assuming we have the following tables:

products: contains information about products

product_classes: contains information about product classes and their descriptions

inventory: contains information about the inventory status of each product

Here is the SQL query to display the requested information:

Explanation:

SELECT pc.product_class_desc, p.product_id, p.product_desc, i.product_quantity_avail,

 CASE pc.product_class_desc

   WHEN 'Electronics' THEN

     CASE

       WHEN i.product_quantity_avail = 0 THEN 'Out of stock'

       WHEN i.product_quantity_avail <= 10 THEN 'Low stock'

       WHEN i.product_quantity_avail <= 30 THEN 'In stock'

       ELSE 'Enough stock'

     END

   WHEN 'Computer' THEN

     CASE

       WHEN i.product_quantity_avail = 0 THEN 'Out of stock'

       WHEN i.product_quantity_avail <= 10 THEN 'Low stock'

       WHEN i.product_quantity_avail <= 30 THEN 'In stock'

       ELSE 'Enough stock'

     END

   WHEN 'Stationery' THEN

     CASE

       WHEN i.product_quantity_avail = 0 THEN 'Out of stock'

       WHEN i.product_quantity_avail <= 20 THEN 'Low stock'

       WHEN i.product_quantity_avail <= 80 THEN 'In stock'

       ELSE 'Enough stock'

     END

   WHEN 'Clothes' THEN

     CASE

       WHEN i.product_quantity_avail = 0 THEN 'Out of stock'

       WHEN i.product_quantity_avail <= 20 THEN 'Low stock'

       WHEN i.product_quantity_avail <= 80 THEN 'In stock'

       ELSE 'Enough stock'

     END

   ELSE

     CASE

       WHEN i.product_quantity_avail = 0 THEN 'Out of stock'

       WHEN i.product_quantity_avail <= 15 THEN 'Low stock'

       WHEN i.product_quantity_avail <= 50 THEN 'In stock'

       ELSE 'Enough stock'

     END

 END AS inventory_status

FROM products p

JOIN product_classes pc ON p.product_class_id = pc.product_class_id

JOIN inventory i ON p.product_id = i.product_id;

Match the external pricing factor with an example of that factor.

Question 3 options:

People who are concerned with their image will be more willing to spend money on the latest fashion.


If the minimum wage is raised, then you would need to price your items to cover the cost of the increase.


4
People will buy coffee from my stand because my drinks are $.50 less than the other coffee shop in town.


Cruise sales are at an all-time high because people can spend money on luxuries like vacations.


I can charge more for my services as I am one of the few salons in town that offers all-organic hair care products.

1.
Target market

2.
Supply and demand

3.
Government regulations

4.
Economy

5.
Competitors' prices

Answers

After matching the external pricing factor with an example of that factor, the answer is given below:

What is pricing factor?

Pricing factor is a factor which is used to determine the cost of a product or service. It takes into account a variety of elements such as the cost of production, market demand, competition, and any additional costs or taxes associated with the product or service.

A. People who are concerned with their image will be more willing to spend money on the latest fashion:Target market.

B. If the minimum wage is raised, then you would need to price your items to cover the cost of the increase: Government regulations.

C. 4 People will buy coffee from my stand because my drinks are $.50 less than the other coffee shop in town: Competitors' prices.

D. Cruise sales are at an all-time high because people can spend money on luxuries like vacations: Economy.

E. I can charge more for my services as I am one of the few salons in town that offers all-organic hair care products: Supply and demand.

To learn more about pricing factor

https://brainly.com/question/30488802

#SPJ1

Suppose you have been appointed by your local school principal as a network technician. You are tasked with setting up a computer lab with 30 desktop computers. Write a detailed report to the principal and the school governing body, entailing the system software and all the basic application software/s you will be installing. Justify your choice of the software’s

Answers

Report on the system and application software that will be installed in a computer lab with 30 desktops, along with arguments for the decisions made, in accordance with the guidelines given by the school's.

Which computer software is most commonly used?

Application software, sometimes known as applications, is the most popular kind of computer programme since it enables end users to carry out their activities. The person using the device is referred to as an end-user. These programmes may also be referred to as optional software by users.

An illustration of a desktop application is what is a desktop application list?

A desktop application is a piece of software that may be used by an end user to carry out a particular task on a standalone computer. Many desktop programmes, including word processors, photo editors, and media players.

To know more about software visit:-

https://brainly.com/question/985406

#SPJ1

A'(B+C') do minterm maxterm

Answers

Assuming that A', B, and C' are Boolean variables, the expression A'(B+C') can be simplified using Boolean algebra rules:

[tex] \rm A'(B+C') = A'B + A'C'[/tex]

This expression is in the form of the sum of two products (or minterms), where the first minterm is A'B and the second minterm is A'C'.

To convert this expression to a maxterm, we can use De Morgan's theorem, which states that the complement of a product is equal to the sum of the complements of its terms. Therefore:

[tex] \rm \: A'(B+C') = A'B + A'C'[/tex]

[tex] \rm \: = (A'+B') + (A'+C')[/tex]

This expression is in the form of the sum of two sums (or maxterms), where the first maxterm is (A'+B') and the second maxterm is (A'+C').

A'(B+C')do minterm and maxterm

Answers

The minterm for A'(B+C') is m(1, 3) and the maxterm is M(0, 2).


The expression A'(B+C') can be simplified using De Morgan's laws:

A'(B+C') = A'B + A'C

This expression can be represented as a sum of products (SOP) or minterm:

A'B + A'C = m(1, 3)

The expression can also be represented as a product of sums (POS) or maxterm:

(A+B')(A+C) = M(0, 2)

where M represents the maxterm.

Note that minterms are products of literals, with each literal representing a variable or its complement, and they correspond to a specific combination of inputs that results in an output of 1. Maxterms, on the other hand, are sums of literals, with each literal representing a variable or its complement, and they correspond to a specific combination of inputs that results in an output of 0.


To know more about expression visit:
https://brainly.com/question/28637270
#SPJ1

Define resident monitor in os

Answers

In computing, a resident monitor is a type of system software program that was used in many early computers from the 1950s to 1970s. It can be considered a precursor to the operating system. The name is derived from a program which is always present in the computer's memory, thus being "resident".

Other Questions
study the timeline of russian history, and read the passage from chapter 1 of animal farm. they were so delighted with the song that they sang it right through five times in succession, and might have continued singing it all night if they had not been interrupted. unfortunately, the uproar awoke mr. jones, who sprang out of bed, making sure that there was a fox in the yard. he seized the gun which always stood in a corner of his bedroom, and let fly a charge of number 6 shot into the darkness. the pellets buried themselves in the wall of the barn and the meeting broke up hurriedly. which historical event is this passage most reminiscent of? Find dy/dx for y=4sin(3x) During a trial, an attorney asks the defendant a question. The defendant replies, "I plead the fifth. What does this mean?The defendant is admitting to the crime.The defendant is refusing to testify against themselves.The defendant is asking to be read their Miranda rights.The defendant is suggesting that double jeopardy applies. If producers believe that the economy is strong so that investment spending increases, we would expect to seean increase in the demand for money.a decrease in the demand for money.an increase in the quantity of money demanded.a decrease in the quantity demanded of money.no change in the demand for money. what should the nurse teach the client with peripheral vascular disease and intermittent claudication about exercise? Which feature of epic poetry does this excerpt most clearly show f(x) = 16, x = * f(x) = x - 6x + 9 Multiple choice: Finding: x values-7 7 1-1 the ph of a 1.00 m solution of caffeine, a weak organic base, is 12.300. calculate the ka of protonated caffeine. Work out he area of this circle. Take pi to be 3. 142 and give your answer to 1 decimal place How is communication important in a science experiment? (simple but detailed answer) blue corporation's standards call for 3,750 direct labor-hours to produce 1,250 units of product. during may 950 units were produced and the company worked 1,150 direct labor-hours. the standard hours allowed for may production would be: Consider a circle whose equation is x2 + y2 2x 8 = 0. Which statements are true? Select three options. The radius of the circle is 3 units. The center of the circle lies on the x-axis. The center of the circle lies on the y-axis. The standard form of the equation is (x 1) + y = 3. The radius of this circle is the same as the radius of the circle whose equation is x + y = 9. comparative genomics involves which two of the following types of analysis? multiple select question. in silico translation of nucleic acids metabolomics protein-protein sequence comparisons dna-dna sequence comparisons The Mitchell family and the Garcia family each used their sprinklers last summer. The Mitchell family's sprinkler was used for 35 hours. The Garcia family's sprinkler was used for 25 hours. There was a combined total output of 1075L of water. What was the water output rate for each sprinkler if the sum of the two rates was 35L per hour? A series of crosses performed with fruit flies to examine inheritance of the genes which court decision held that the basic elements of procedural due process must be present when decisions are made concerning the disciplining of an inmate? an rai/mds and care plan are found in records of patients in Addison wanted to know if there was a connection between her coffee consumption and howwell she slept that night. For weeks, Addison recorded how many cups of coffee she drank inthe morning and how many hours she slept that night.0 cups of coffee1 cup of coffee6 hours 7 hours1554What is the probability that a randomly selected day is one when she drank exactly 1 cup ofcoffee and is one when she slept about 6 hours?Simplify any fractions. a continuing education nurse in a long-term care facility is discussing wound healing in older adult clients. because older adult clients are more likely to have comorbidities like problems with mobility, diabetes, or vascular problems, the nurse should assess the clients for which condition(s)? select all that apply. psyc chapter 8 during discrimination training, operant behavior occurring in the presence of a discriminative stimulus is said to be: