Answer:
#include<iostream>
using namespace std;
int main(){
int n1, n2, n3;
cout<<"Enter any three numbers: ";
cin>>n1>>n2>>n3;
if(n1>=n2 && n1>=n3){
cout<<n1<<" is the maximum";}
else if(n2>=n1 && n2>=n3){
cout<<n2<<" is the maximum";}
else{
cout<<n3<<" is the maximum";}
return 0;
}
Explanation:
The program is written in C++ and to write this program, I assumed the three variables are integers. You can change from integer to double or float, if you wish.
This line declares n1, n2 and n3 as integers
int n1, n2, n3;
This line prompts user for three numbers
cout<<"Enter any three numbers: ";
This line gets user input for the three numbers
cin>>n1>>n2>>n3;
This if condition checks if n1 is the maximum and prints n1 as the maximum, if true
if(n1>=n2 && n1>=n3){
cout<<n1<<" is the maximum";}
This else if condition checks if n2 is the maximum and prints n2 as the maximum, if true
else if(n2>=n1 && n2>=n3){
cout<<n2<<" is the maximum";}
If the above conditions are false, then n3 is the maximum and this condition prints n3 as the maximum
else{
cout<<n3<<" is the maximum";}
return 0;
what type of file is created when you save your word processing document
Answer:
When documents are saved in a word processing program they are typically saved in the word processing program's default proprietary file format. For example, Open Office documents are saved in . odf format and WordPerfect documents are saved in the . wpd format.
I hope this helps! :}
Explanation:
write an algorithm to sumn of even numbers from 1 to 10
Answer:
1. Start
2. Evensum = 0
3. For I = 1 to 10
3.1 If I % 2 == 0
3.1.1 Evensum = Evensum + I
4. Print Evensum
5. Stop
Explanation:
The line by line explanation is as follows:
[The algorithm starts here]
1. Start
[This initializes Evensum to 0]
2. Evensum = 0
[This iterates from 1 to 10, inclusive]
3. For I = 1 to 10
[This checks if current number is even number]
3.1 If I % 2 == 0
[If yes, this adds the even number]
3.1.1 Evensum = Evensum + I
[This prints the sum after the sum]
4. Print Evensum
[This ends the algorithm]
5. Stop
Computer science students typically get hands-on experience in all of the following EXCEPT:
writing code
testing programs
creating a blueprint for a house
fixing program errors
Answer:
C. Creating a blueprint for a house.
Creating a blueprint for a house is not a typical activity within the curriculum of computer science students.
Hence the correct answer is C.
Computer science students typically get hands-on experience in writing code, testing programs, and fixing program errors.
These activities are fundamental to learning programming and software development.
However, creating a blueprint for a house is not a typical activity within the curriculum of computer science students. This task is more closely related to fields such as architecture or civil engineering, where professionals design physical structures.
Creating a blueprint for a house involves architectural design and planning, which is not typically part of a computer science curriculum. While some computer science concepts can be applied to architectural design software, the two fields have distinct focuses and skill sets.
Hence the correct answer is C.
Learn more about computer science click;
https://brainly.com/question/35123324
#SPJ3
Which of these are illegal activities? Check all that apply.
running a pyramid scheme
offering free gifts
threatening to harm property
downloading a virus
hacking a computer
Answer:
Offering free gifts
Explanation:
Answer:
ace
Explanation:
Why should you study media critically? (4 reasons)
Answer:
Media provides a framework for understanding the media and helps enable us to interpret and evaluate media messages for ourselves. Media literacy skills are closely related to critical thinking skills, as they challenge us to think more deeply about not only what we see, but what we know. Like geography, because the media define for us our own place in the world. Like science and technology, the media help us to learn technology by adopting the leading edge of modern technological innovation.
Explanation:
Your company just installed a new web server within your DMZ. You have been asked to open up the port for secure web browsing on the firewall. Which port should you set as open to allow users to access this new server?
Answer:
The port that should be set open to allow users to access this new server is:
TCP port.
Explanation:
Ports are openings or entrance doors through which data packages have access to a PC or server. TCP and UDP are transport protocols with port numbers. TCP means Transmission Control Protocol. They are used to connect two devices over the internet and other networks. UDP means User Datagram Protocol. They are used to connect applications and to speed the transfer of data. Comparatively, UDP is faster, simpler, and more efficient than TCP. TCP enables retransmission of lost data packets, which UDP cannot do.
What is power point?
Answer:
PowerPoint is an electronic presentation program that helps people present a speech using a collection of slides.
Explanation:
Answer:
Power point is a presentation program released in 1987
Explanation:
What is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Management solution will comply with?
Answer:
Acceptable use policy.
Explanation:
An acceptable use policy also known as fair use policy can be defined as a set of rules and guidelines defined by the original owner or administrator in charge of a service, website, web resources or network in order to regulate privileges, control the way the resources are used and to prevent any unauthorized access or usage by others.
Hence, an acceptable use policy is a common practice that enterprise organizations will implement to ensure the users of a network and a Mobile Device Management solution will comply with.
Generally, acceptable use policy are used in various organizations, schools, public spaces to ensure every users comply with it.
.NET
It is considered the College database.
1. Create a console application to display the information
from the Teacher table.
2. Create a Windows Forms application for
entering the information in the Teacher table
3. For the Teacher table:
a) create its XML representation;
b) display the representation in a Windows application
Forms in alphabetical order by teacher name (
without idprof);
c) Display each name and surname of each teacher
together with the department to which he belongs.
Please help, need at least the first 2 exercises.
Answer:
This is called contradiction cloud responsibility (CCR)
Explanation:
Press the
What are the two main parts to any VR experience?
A prototypes
B
screens
C code
D
hardware
E software
The two main parts to any VR experience are:
SoftwareHardwareWhat hardware is used for virtual reality?There are different kinds of hardware. A common method to make or create any form of a realistic 3D depiction of a virtual world is to use a small computer monitor in front of all of the human eye.
Note that all the monitor shows is the perspective that is said to be matching or corresponding eye would be able to see in an actual environment.
Note that that kind of system is said to be called a binocular head-mounted display (HMD).
Therefore, based on the above, one can say that the two main parts to any VR experience are:
SoftwareHardwareLearn more about VR experience from
https://brainly.com/question/28224061
#SPJ1
Write a grammar for the language consisting of strings that have n copies of the letter a followed by the same number of copies of the letter b and the the same number of copies of the letter c, where n >0. For example, the strings abc, aaaabbbbcccc, and aaaaaaaabbbbbbbbcccccccc are in the language but a, abbc, bac, and aaabbbcc are not
Answer:
def language(mystring, n):
if n > 0:
string_list = [x for x in mystring]
string_cont = ""
for character in string_list:
string_cont += character * n
print(string_cont)
Explanation:
When n is equal to 0, that is, n=0, The python program multiplies the characters of the string "mystring" by the integer variable "n" to output a string with all characters with the same count.
To solve the difficulty of scaling memory organization, memories are physically organized into a ____-dimensional organization.
A) one
B) two
C) three
D) multi
I have no idea what I’m doing and this is due in 45 minutes
Answer:
Not enough info...
Explanation:
g The method of mapping where each memory locationis mapped to exactly one location in the cache is
Answer:
Direct Mapped Cache
Explanation:
Given that a Direct Mapped Cache is a form of mapping whereby each main memory address is mapped into precisely one cache block.
It is considered cheaper compared to the associative method of cache mapping, and it is faster when searching through it. This is because it utilizes a tag field only.
Hence, The method of mapping where each memory location is mapped to exactly one location in the cache is "Direct Mapped Cache"
why is operating system important software for computer?give 3 reasons
Answer: See explanation
Explanation:
The operating system of a computer is required to manage both the hardware components and the computer's software.
Also, it helps in managing the processes and the memory or the computer.
Lastly, it helps in communication as well as the detection of errors. It should be noted that the operating system of a computer is a very important tool.
True or False
1. Phishing is the act of sending multiple emails to multiple users in hope of having
2. Spoofing is the act of obtaining unauthorized access to data from a computer
network.
3. Extortion is the act of using the internet to threaten or damage someone's
reputation to extort money or anything else of value.
4. In late 2014, LimeWire was raided for the second time due to years of pirating
movies, music, games, books and other software.
5. Electronic harassment is also referred to as cyberbullying.
6. Non-delivery of service is the act of devising a scheme wherein a culprit posts an
item or service for sale over the internet, and once the transactions have been done, does not
give the item or service.
7. Encryption is the process of converting raw to data code.
8. In piracy, trackers are used to identify IP addresses currently sharing a pirated
file.
9. Wager Gambling is the act of betting on any sports event over the internet.
10. Most email services today have spam or bulk folder that automatically puts
these suspicious emails to that folder.
1. This true. phishing is the act of sending multiple emails with the hope that the users of these emails would reveal sensitive information to you.
2. This is false. Hacking is having unauthorized access. Spoofing is obtaining access to a computer network through acts of impersonation.
3. This is the true. Cyber extortation happens when criminals hold sensitive data that belongs to you and they threaten to damage your reputation until you meet their demands.
4. This is true. This is a discontinued peer to peer platform where software used to be shared
5. This is true. Harrassing people through computer systems and social media platforms is cyberbullying.
6. This is true. Non delivery of service is when a person refuses to deliver a merchandise or product that he put up for sale.
7. This is true. Encryption happens when there is a conversion of data into a code.
8. This is true. Trackers are capable of collecting data from you.
9. This is true. Sports betting is an example. It is betting on an event to win something over a desirable outcome.
10. This is true. Spam folders are used to send suspicions emails.
https://brainly.com/question/13979277?referrer=searchResults
PYTHON HW PLEASE HELP. I NEED THE ACTUAL CODE!!! 100 POINTS AND BRAINLIEST. REPORTING IF YOU DON'T ANSWER
Question 1:
Design a BankAccount Class with the following requirements:
1. Class variables
- Overdraft Fee = 20 (Overdraft fee is subtracted from the account when account balance is negative after a withdraw)
2. Object variables
- Balance (Balance is the amount of money an account has left)
3. Methods
- deposit(amount): Accepts an argument amount of type number, adds this amount to account's balance
- withdraw(amount): Accepts an argument amount of type number, subtract this amount to account's balance, if the resulting balance is negative, apply an Overdraft Fee on the account balance
Test your class to see if it works:
- Scenario 1:
- Create a new account called "college_checking", assign 1000 dollars to the initial balance.
- Withdraw 200 dollars
- Withdraw 500 dollars
- Deposit 100 dollars
- Withdraw 600 dollars
- Check your remaining balance, it should be -220 dollars of balance, because $1000 - $200 - $500 + $100 - $600 - $20(overdraft) = $-220
- Scenario 2:
- Create a new account called "europe_trip_fund", assign 0 dollars to the initial balance.
- Deposit 250 dollars
- Deposit 220 dollars
- Deposit 530 dollars
- Withdraw 721 dollars
- Check your remaining balance, it should be $279 dollars of balance, because $0 + $250 + $220 + $530 - $721 = $279
Question 2:
Design a OverdraftProtectionAccount that inherits from BankAccount Class with the additional requirements:
1. Methods
- withdrawal(amount): Accepts an argument amount of type number, subtract this amount to account's balance, if the resulting balance is negative, log an error message:
"There's insufficient funds in your account to complete this transaction"
to the terminal and stop the transaction so that your balance isn't overdrafted.
Test your OverdraftProtectionAccount class to see if it works:
- Scenario 3:
- Create a new account called "personal_checking", assign 100 dollars to the initial balance.
- Withdraw 20 dollars
- Withdraw 50 dollars
- Deposit 12 dollars
- Withdraw 60 dollars
- Check your remaining balance, it should be 42 dollars of balance, because $100 - $20 - $50 + $12 = $42, the last withdrawal didn't go through because that would leave your account balance negative.
Answer:
Here maybe this will help you
Explanation:
the following section of psudo code inputs a number n, multiplies together 1 x 2 x 3 x ..... x n, calculates input number/sum and output result of the calculations.
locate 3 errors and suggest a corrected piece of code.
INPUT n
FOR mult = 1 TO n
sum = 0
sum = sum * mult
result = n / sum
NEXT
PRINT result
Answer:
INPUT n
sum = 1
FOR mult = 1 TO n
sum = sum*mult
NEXT
result = n/sum
PRINT result
Explanation:
sum should not be defined inside the for loop because it will reset to the initial number after every loop iteration which is not what is desired. Sum should not be 0 if it is being multiplied then divided. This will cause an error. Result should be calculated after sum has settled on a final number, after the loop has finished.
why was the keyboard invented, write a paragraph and you can get a crown and 50 points
Answer:
The keyboard was invented for the alphabet and numbers so people can talk to others and work on essays, and have a way to communicate to human beings and for stuff like i'm doing right now, writing paragraphs for stuff like this and for school, really the keyboard was invented for anything, you can use it for anything in the whole world.
Explanation:
Hope this helps!!
Suppose you have n classes that you want to schedule in rooms. Each class has a fixed time interval at which it is offered, and classes whose times overlap cannot be scheduled in the same room. There are enough rooms to schedule all the classes. Design a O(n log n) time algorithm to find an assignment of classes to rooms that minimizes the total number of rooms used.
Answer:
Function schedule( list of tuple of start and end times, class available)
class_list = create list of class from class available
for items in time_list:
if items is not same range as time_list[-1]:
newdict[items] = class_list[0]
print class time: class venue
elif items is same range as time_list[-1]:
used_class = newdict.values
index = class_list.index(used_class[-1])
new_dict[items] = class_list[index + 1 ]
print class time: class venue
Explanation:
The algorithm above describe a program with a time complexity of O(n log n). The function defined accepts two parameters, an array of start and end time tuple and the number of class available for use. The algorithm uses a quick sort to compare the time interval of the items in the list and schedule new classes for classes that overlaps with others.
Question # 2
Multiple Select
Which statements are true? Select 4 options.
An instance of a class cannot be changed after it is created.
Variables defined in the constructor of a class can be accessed by the main program that uses instances of the class.
Functions defined in a class are called methods.
A class variable can be a different type of class.
A class variable can be a list of instances of a different class.
Answer:
An instance of a class cannot be changed after it is created. IS THE WRONG ONE. Everything else is right.
Explanation:
An instance of a class cannot be changed after it is created is false . Hence option 2, 3, 4 and 5 is correct.
What is statement?Statement is defined as a sentence that expresses to the reader a concept, an assertion, or a fact. An concept, assertion, or fact is communicated to the reader through a statement sentence, sometimes referred to as a declarative phrase. They are one of the four categories of sentence construction and the one that people utilize the most.
Direct access to instance variables and methods is made possible through instance methods. Through instance methods, class variables and class methods are easily available. Class methods provide direct access to class variables and class methods. When an object is generated, instance variables are created that are available to all of the constructors, methods, and blocks in the class. The instance variable can be given access modifiers.
Thus, an instance of a class cannot be changed after it is created is false. Hence option 2, 3, 4 and 5 is correct.
To learn more about statement, refer to the link below:
https://brainly.com/question/2285414
#SPJ3
_________________ component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.
Answer:
Authorization component defines the correct granularity for access controls and oversees the relationships between identities, access control rights, and IT resource availability.
Explanation:
Access control is a security technique that verifies the permission that a person or device has to enter an area and to what extent. This function is within the identity and access management of a company. Authorization is the definition of what a specific user can do within an application, that is, to what information and operations they have access, in other words, it refers to the management of access to protected resources and the process of determining whether a user is authorized to access a particular resource. Authorization and access control are ways of enforcing access policies. Authorized persons may access certain resources for their job functions and identify and audit the accesses made.
. What is a one-dimensional basic component in art and geometry
Answer:
a straight line
Explanation:
Anything one dimensional can only be a line
Which of the following are most likely to be members of the technical crew for a production?
A)producers
B)bookkeepers
C)camera operators
D)actors
Answer:
C: camera operators
Explanation:
edg2021
Producers and actors are the only other two in the film industry, and they are separate from the technical crew
It is desirable to provide a degree of __________ __________ among classes so that one class is not adversely affected by another class of traffic that misbehaves.
Answer:
The right approach is "Traffic isolation ".
Explanation:
A significant amount of those same traffic insulation is necessary. Therefore one class isn't influenced by yet another traffic class which makes a mistake. Then maybe the packages throughout the traffic could collapse. This also eliminates uncertainty with people operating the infrastructure. If you don't need the VLANs to speak to one another because you could implement anything about this illustration as well as add it to certain VLANs.java Toll roads have different fees based on the time of day and on weekends. Write a method calcToll() that has three parameters: the current hour of time (int), whether the time is morning (boolean), and whether the day is a weekend (boolean). The method returns the correct toll fee (double), based on the chart below.
The program for the toll calculation is illustrated below.
How to illustrate the program?TollCalculation.java :
//class
public class TollCalculation {
//method that calculate tolll
public double calcToll(int hour, boolean isMorning, boolean isWeekend) {
//this variable store toll amount
double tollAmount=0;
//checking isWeekend
if(isWeekend==false)
{
if(hour<7 && isMorning==true)
{
//when weekday in the morning before 7.00 am then
tollAmount=1.15;
}
else if(hour>=7 && hour<=9.59 && isMorning==true)
{
//when weekday in the morning in between 7.00 am and 9.59 am then
tollAmount= 2.95;
}
else if(hour>=10 || hour<=2.59 && (isMorning==true || isMorning==false))
{
//when weekday in between 10.00 am and 2.59 pm then
tollAmount= 1.90;
}
else if(hour>=3 && hour<=7.59 && isMorning==false)
{
//when weekday in evening between 3.00 am and 7.59 pm then
tollAmount= 3.95;
}
else if(hour>=8 && isMorning==false)
{
//when weekday in evening starting 8.00 pm then
tollAmount= 1.40;
}
}
else {
if(hour<7 && isMorning==true)
{
//when weekend in the morning before 7.00 am then
tollAmount=1.05;
}
else if(hour>=7 || hour<=7.59 && (isMorning==true || isMorning==false))
{
//when weekend in the morning in between 7.00 am and 7.59 pm then
tollAmount= 2.15;
}
else if(hour>=8 && isMorning==false)
{
//when weekend in evening starting 8.00 pm then
tollAmount= 1.10;
}
}
//return tollAmount
return tollAmount;
}
//main() method
public static void main(String[] args) {
//This is instance of TollCalculation class
TollCalculation tollObj = new TollCalculation();
// Test the three samples from the specification.
System.out.println(tollObj.calcToll(7, true, false));
System.out.println(tollObj.calcToll(1, false, false));
System.out.println(tollObj.calcToll(5, true, true));
Learn more about programs on:
https://brainly.com/question/26642771
#SPJ1
Toll roads have different fees based on the time of day and on weekends. Write a method calcToll() that has three parameters: the current hour of time (int), whether the time is morning (boolean), and whether the day is a weekend (boolean). The method returns the correct toll fee (double), based on the chart below.
Weekday Tolls
Before 7:00 am ($1.15)
7:00 am to 9:59 am ($2.95)
10:00 am to 2:59 pm ($1.90)
3:00 pm to 7:59 pm ($3.95)
Starting 8:00 pm ($1.40)
Weekend Tolls
Before 7:00 am ($1.05)
7:00 am to 7:59 pm ($2.15)
Starting 8:00 pm ($1.10)
Ex: The method calls below, with the given arguments, will return the following toll fees:
calcToll(7, true, false) returns 2.95
calcToll(1, false, false) returns 1.90
calcToll(3, false, true) returns 2.15
calcToll(5, true, true) returns 1.05
Write a program to determine what change a cashier should return to a customer. The program will ask how much an item being purchased costs, and then how much the customer paid. The program will return what change should be given.
Enter the item cost: 7.12
Enter what customer paid: 20.00
The total number of cents to be returned is: 1288
Change given should be
Number of 10 dollar bills: 1
Number of 5 dollar bills: 0
Number of 1 dollar bills: 2
Number of quarters: 3
Number of dimes: 1
Number of nickels: 0
Number of pennies: 3
it needs to be in c++ not java
Using the knowledge in computational language in C++ it is possible to write a code that determine what change a cashier should return to a customer.
Writting the code:#include <iostream>
using namespace std;
int main() {
// your code goes here
cout << "Enter the item cost : ";
double cost;
cin >> cost;
cout << "\nEnter what customer paid : ";
double paid;
cin >> paid;
double ret;
ret = paid - cost;
cout << "\nThe total number of cents to be returned is : " << ret;
cout << "\nChange given should be";
int ten,five,one;
ten = ret/10;
ret = ret - (10*ten);
five = ret/5;
ret = ret - (5*five);
one = ret/1;
cout << "\nNumber of 10 dollar bills : " << ten;
cout << "\nNumber of 5 dollar bills : " << five;
cout << "\nNumber of 1 dollar bills : " << one;
return 0;
}
See more about C++ at brainly.com/question/12975450
#SPJ1
If the old and new systems are operated side by side until the new system has proven itself, this type of system conversion plan is parallel implementation. True or false?
Answer:
True
Explanation:
Discuss TWO changes in ICMP that took place with the development of IPV6 and indicate why those changes were made.
Answer:
Over and above basic medication signaling, but instead of signaling, ICMPv6 could be used for other objectives. It could be utilized for the below description.
Explanation:
That falls into the same category even though IPv4 does through ARP.
Neighbor Discovery:Used mostly for control of hosts but instead multichannel interface setup.
Router Discovery:Trying to manage Handheld IPv6 hand-offs.
Throughout IPv6, within a week of negligible and sometimes more broadcast group, this same ICMPv6 response can begin. The whole last extension connector before another ICMPv6 connector contains a 58-value new Header field.
Your supervisor has asked you if it is possible to monitor servers for potential port scans via SNMP. What two OIDs can you provide to your supervisor that may show when a port scan is in progress
Explanation:
The two OIDs can you provide to your supervisor that may show when a port scan is in progress are:
UdpNoPorts
TcpOutRsts
UdpNoPorts and TcpOutRsts may show when a port scan is in progress.