Answer:
b(ii) prices[1]= 20.50; // do not declare with double again
b (iii) scanf("%lf", &prices[4]); //prices[4] is last element
d) See below
Explanation:
/* This program uses the string.h header file
The strncat() function in this file concatenates two strings. It takes three arguments, dest and source strings and number of characters to concatenate
*/
#include <stdio.h>
#include <string.h>
int main() {
char s1[10] = "Happy";
char s2[10] = " Birthday";
char s3[10]="";
strncat(s3, s1, 5); //concatenate 5 characters of s1 to end of s3 and
//store result in s3; s = "Happy"
strncat(s3, s2, 10); //concatenate s2 with current contents of s3
//s3 becomes "Happy Birthday
printf("%s", s3);
return 0;
}
What is the Occupational Outlook Handbook?
A.
a personality test and self-assessment that job seekers often take
B.
a book of job listings and promotion requirements for different regions
C.
a collection of salary information and job descriptions gathered by the government
D.
a training manual for guidance counselors and career counselors
Explanation:
a
a personality test and self assessment that job seeker often take
Use the concepts and terms that you learned in this unit to describe the composition of this photograph
The Elements of Composition in the above Photograph are:
ShapeFormTextureColorSpaceLighteningWhat is the composition in the photograph?The photograph is made up of Geometric shapes which are known to be a wonderful example of a photography composition.
An image's texture is how it appears to the eye. In photography, texture is emphasized by using shadow.
Note that Three factors: hue, value, as well as saturation, define a color. Hence, Coloring describes the color's hue.
Learn more about Photography from
https://brainly.com/question/897676
#SPJ1
Which of the following correctly describes an external attack?
Your content is missing, I haven't seen what you mentioned
Select the correct answer.
Hari has purchased a new computer. Which software will start running the moment he turns on his system?
O A. word processor
О в. disk cleaner
O C. operating system
O D. data recovery utility
Answer:
I think operating system
Explanation:
can anyone help me please
Answer:
See images below for code
Note the warning I have provided about program (c)
Explanation:
Note that I have given complete programs. But you are asked to only write the C segments corresponding to that problem.
In the third program, I have used the syntax
case 100 ... 102:
printf("Paid\n");
break;
This means that if the number lies in the range 100 -102 the corresponding statement will execute.
However, this is not recognized by all C compilers!
You can explain to the professor that you found this on the internet (stackoverflow.com is a great site for programing resources)
Otherwise you will have to split up that into 3 separate case statements as follows:
switch(inv)
{
case 100:
printf("Paid\n");
break;
case 101:
printf("Paid\n");
break;
case 102:
printf("Paid\n");
break;
Hope that helps you out
To develop a website you can use the following technologies Except
To develop a website you can use the following technologies except search engine
This is because when creating a website, you need to use certain important things and programming languages such as HTML which means Hypertext Markup Language, and CSS, which means Cascading Style Sheets, Databases, Libraries, etc.
Hence, the use of a search engine is not used in the development of a website.
What is a Website?This refers to the place where information is stored on the world wide web that can be accessed by anyone with internet access from anywhere around the world.
Hence, we can see that a search engine is used to find things on the internet and such is not used to create a website as there is the use of PHP which is known as Hypertext Preprocessor as it handles the security of the site and then CSS for the beautification of the website.
Read more about websites here:
https://brainly.com/question/25817628
#SPJ1
Question 8 of 10
Which words would best complete this if-then statement?
If you are taking Computer Science Essentials:
A. Then you
dislike computers.
B. Then you are a student.
C. Then you dislike programming.
D. Then you are a teenager.
The words that would best complete this if-then statement is option B. Then you are a student.
What is if-then statement in computer?A statement with a hypothesis and a conclusion is known as a conditional statement (also known as an If-Then Statement). "If this happens, then that will happen" is another approach to define a conditional statement. The initial clause, or "if," of a conditional statement is the hypothesis.
Note that the hypothesis is a prediction of what will transpire in your experiment. The terms "IF" and "THEN" are frequently used when writing the hypothesis. For instance, "I will fail the exam if I don't read." Your independent and dependent variables are reflected in the "if" and "then" statements.
Therefore, it is an expression in a high-level programming language that compares two or more sets of data and evaluates the outcomes. The THEN instructions are followed if the results are accurate; otherwise,
Learn more about if-then statement from
https://brainly.com/question/4322377
#SPJ1
People and things around you have (a) ________________ impact on you.
People who are happier are more sociable, have stronger immune systems, have more fulfilling relationships, are more productive, live longer, and are generally more successful in life.
What is the impact of surrounding people on happiness?Positive emotions increase a person's sense of interpersonal connection. As a result, there are better relationships at work, which promote inspiration, creativity, and productivity as well as personal development.
Psychology research does support the idea that being around green, natural areas enhances mental health.
The mechanisms include a decrease in stress, an increase in happy feelings, cognitive recovery, and beneficial benefits on self-control.
Numerous studies indicate that social relationships increase happiness. In addition to making people happy, satisfying relationships are also linked to improved health and even longer lifespans.
Therefore, People and things around you have happiness on you.
Learn more about happiness here:
https://brainly.com/question/4783978
#SPJ2
Group the data according to age such that:
a. ages 0-19 will be grouped as Minor
b. 20-40 will be grouped as Young Adults
c. 41-60 Will be grouped as Old Adults
d. Above 60 will be grouped as elderly
Group the data according to age such that option d. Above 60 will be grouped as elderly.
How are age groups categorized in research?The way to express test results that is known to often takes into account the typical age at which they are collected is said to be age data categorization.
The age groups that should be considered for risk stratification are as follows: 0–14 years (pediatric group), 15–47 years (young group), 48–63 years (middle age group), and 64 years (elderly group).
Note that:
Young adults (18-35 years; n = 97)Middle-aged adults (36-55 years; n = 197)Older adults (65 years and older).Note that the United Nations is one that states that everyone over the age of 60 to be an older person that is an elder. However, there is found to be some additional sociocultural indicators, such as family status (grandparents), physical appearance, etc., that are frequently used by families as well as communities to define age.
Learn more about Data grouping from
https://brainly.com/question/27417438
#SPJ1
A home user connects to the Internet. The ISP provides hard drive space for the user's web page. Is this a network? Why or why not?
No, it is not a network because ISPs provide clients with access and presence, which are both necessary services. Access services give customers an account that enables them to send and receive email as well as access the Internet.
What is the role of an ISP?Network access points, which are open networks on the Internet backbone, connect all ISPs to one another. The growth of the said commercial Internet services as well as applications contributed to the Internet's quick commercialization.
Since Customers can access the internet through ISPs, who also offer extra services like email, domain registration, as well as web hosting. ISPs might also offer various forms of internet connectivity, like fiber and cable.
Additionally, connections may be non-broadband or high-speed broadband.
Learn more about ISP from
https://brainly.com/question/25558216
#SPJ1
Search for files and folders on Local Disk (C:) that were modified today. How many files or folders were found?
2. Search for files and folders on Local Disk (C:) that were modified since your last birthday. How many files or folders were found?
Answer:
1. Answer will vary
2. Answer will vary
Explanation:
how many files a person modifies cannot be predicted so search result will vary for each person
If you research the average salary for certain jobs or careers, you’ll find that the actual salaries can be higher than the averages. Why would that happen?
A.
There may be many applicants competing for each position, which drives the salaries higher.
B.
If the average salary and the actual salary differ, then companies are breaking the law.
C.
Some areas have higher employment levels, so companies have to offer workers more money.
D.
Some types of jobs have high turnover—people quit them more often than other jobs.
If you research the average salary for certain jobs or careers, you’ll find that the actual salaries can be higher than the averages. The reason it happen is option D. Some types of jobs have high turnover—people quit them more often than other jobs.
Why would a business have a high rate of turnover?Many of the leading causes of turnover is as a result of poor pay or work-life balance, little training, and few opportunities for career advancement and it also depend on the manager.
Hence HR teams sometimes find supervisors who are blatantly unqualified to manage people and either transition them to new roles or offer assistance and training.
The reason for difference in wages are due to
Level of Credentials. The level of Experience and skill. Industry or employer. Nature of Job tasks. The Geographic location. Success and performance.Learn more about salary from
https://brainly.com/question/12241195
#SPJ1
jamie plans to sell his pottery designs through his website. if he also wants to launch a mobile app to reach more people, which type of app should he launch?
Since Jamie plans to sell his pottery designs through his website, if he also wants to launch a mobile app to reach more people, the type of software application which he should launch is an M-commerce app.
What is e-commerce?E-commerce is also referred to as an online sale and it can be defined as a type of business model which is designed and developed to involve the buying and selling of goods (products) over the Internet and on websites.
Basically, e-commerce technologies are designed and developed to comprises software and information technology (IT) systems which typically support safe and secure transactions over an active network and the Internet, so as to make e-commerce possible.
What is an M-commerce app?In Computer technology, an M-commerce app is a short abbreviation for mobile commerce application and it can be defined as a type of software application that is designed and developed to enhance and facilitate the buying and selling of goods (products) over the Internet and on websites, by availing end users (customers) the opportunity.
Read more on e-commerce here: brainly.com/question/23369154
#SPJ1
A bit (select all that apply)
Is short for binary digit
Is a 0 or a 1
Means on or off to a computer
Is really just an on/off switch
Eight of them make up a byte
Is why computers are called digital
Is a collection of bytes
Stands for Binary Information Tidbit
Answer:
Is short for binary digit: yes
Is a 0 or a 1: yes
Means on or off to a computer: yes
Is really just an on/off switch: hmm... no not really
Eight of them make up a byte: yes
Is why computers are called digital: yes
Is a collection of bytes: NO
Stands for Binary Information Tidbit: NO
Explanation:
The switch analogy is used often, but a bit itself is not a switch i.m.o.
Analyze the (generic) concept of “windows” used on PCs and MACs as part of a user-friendly GUI interface(i.e. What are they? What are they used for? What do they look like? Do they move, and if so, how? Why do you think they were named “windows”?)
Microsoft adopted the name "Windows" because it allows different jobs and applications to run at the same time. Because a popular term like "Windows" cannot be trademarked, it is officially known as "Microsoft Windows." Microsoft Windows 1.0, launched in 1985, was the initial version of the operating system.
What is a Graphic User Interface Used for?A graphical user interface (GUI) is computer software that allows a human to communicate with a computer.
The phrase "graphical user interface" (GUI) or simply "graphical interface" refers to a user interface that employs a mouse, icons, and windows. The name was coined to contrast with command line interfaces and full-screen character interfaces.
GUIs are important because they are:
Simple to useUsers can readily recognize, classify, and browse alternatives because data is represented by symbols, forms, and icons.Provide Data visualization which is recognized faster than words.Attractive.Shortcuts are provided.Multitasking is possible.Learn more about Windows:
https://brainly.com/question/25243683
#SPJ1
Write a single function called main() that accepts a string as an input from the user and prints the largest and smallest value character.
Your output should look like mine. Pay close attention to how the output looks. Don't forget the quote marks!
```
Please enter a sentence: I am the Keymaster
The largest character is "y" and the smallest character is " ".
A single function called main() that accepts a string as an input from the user and prints the largest and smallest value character is given below
The Program// C++ program to find largest and smallest
// characters in a string.
#include <iostream>
using namespace std;
// function that return the largest alphabet.
char largest_alphabet(char a[], int n)
{
// initializing max alphabet to 'a'
char max = 'A';
// find largest alphabet
for (int i=0; i<n; i++)
if (a[i] > max)
max = a[i];
// returning largest element
return max;
}
// function that return the smallest alphabet
char smallest_alphabet(char a[], int n)
{
// initializing smallest alphabet to 'z'
char min = 'z';
// find smallest alphabet
for (int i=0; i<n-1; i++)
if (a[i] < min)
min = a[i];
// returning smallest alphabet
return min;
}
// Driver Code
int main()
{
// Character array
char a[]= "GeEksforGeeks";
// Calculating size of the string
int size = sizeof(a) / sizeof(a[0]);
// calling functions and print returned value
cout << "Largest and smallest alphabet is : ";
cout << largest_alphabet(a,size)<< " and ";
cout << smallest_alphabet(a,size)<<endl;
return 0;
}
The OutputThe largest and smallest alphabet is : s and E
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Lowell Thomas produced 4,000 units during his 40 hour workweek. Thomas's regular rate of pay is $0.12 per unit; he is paid an incentive bonus of four cents for each unit produced over 3,000. Thomas's overtime rate is a.$13.00 per hour b.$20.75 per hour c.$19.50 per hour d.$22.75 per hour
When Lowell Thomas produced 4,000 units during his 40 hour workweek and his regular rate of pay is $0.12 per unit, the overtime pay is C. $19.50 per hour.
What is overtime?The number of hours a worker works in excess of what is required for a typical workweek is calculated as their overtime rate. Depending on how overtime is defined by the labor laws of each country and jurisdiction, this rate may have various implications in each.
The overtime premium or the overtime rate of pay are typical names for overtime compensation. The most common overtime rate is time and a half, which is 50% more than the employee's hourly pay. It means that you will receive 1.5 times your regular hourly rate for every hour of overtime worked.
The overtime will be calculated thus:
Multiply $0.12 4,000 = $480
Multiply regular pay, $0.04 1,000 = $40
Add: Bonus pay, $480 + $40 = $520,
Divide $520/40 = $13.00/hr
Multiply the rate: $13.00 * 1.5 = $19.50/hr.
Therefore, the overtime is $19.50.
Learn more about overtime on:
https://brainly.com/question/901346
#SPJ1
What do Advanced Placement courses and International Baccalaureate courses have in common?
A.
Both focus on career training and technical fields rather than college material.
B.
They teach remedial study skills to students who find high school courses challenging.
C.
They provide a way for students to enter the workforce right after high school.
D.
Both allow high school students access to college-level material.
The thing that Advanced Placement courses and International Baccalaureate courses have in common is option D. Both allow high school students access to college-level material.
What is Advanced Placement courses and International Baccalaureate courses about?Both the AP and IB programs, which are geared toward high school students, provide access to college-level coursework and the chance to receive college credit.
The AP program places a greater emphasis on subject-specific ability than the IB program does on encouraging students' creativity, critical thinking, and writing abilities. IB courses are more popular worldwide, but AP courses are far more accessible in US high schools.
Note that Both the AP and IB are excellent programs that colleges and universities take into account when deciding which students to admit. Even if you are enrolled in IB classes, you are still allowed to take AP courses and/or exams.
Learn more about Advanced Placement from
https://brainly.com/question/1193163
#SPJ1
which of the following provides attestation and is signed by a trusted platform module
The terms that provides attestation and is signed by a trusted platform module (TPM) is b: Measured boot
What is the trusted platform moduleA trusted platform module (TPM) is a piece of physical equipment that helps protect your computer and its information. One of its functions is to give proof and confirmation of its security.
Attestation means showing proof or evidence that a system is honest and set up correctly. When a TPM creates an attestation, it usually makes a digital certificate signed by the TPM. So A special certificate that is signed by a trusted part of a computer.
Read more about trusted platform module here:
https://brainly.com/question/1604812
#SPJ1
See full text below
Which of the following provides attestation and is signed by a trusted platform module (TPM)?
Endpoint detection and response (EDR)
Measured boot
Host intrusion prevention system (HIPS)
Secure cookies
A small coffee shop business owner wants to hire you as a developer for a point-of-sales application to be used onsite. The owner expects that the project will be completed in 3 weeks in preparation for the store's soft opening. Preliminary requirements gathering was done on your end and noted that it would be a basic point-of-sale where sales are monitored daily, weekly, and monthly. Top performing products will also be presented by the system.
As a developer, and from your point of view:
1. Kindly discuss the programming paradigm that you will use in the development of the POS system.
2. What will be the necessary activities needed in order for you to develop the system? List the key activities and provide a brief description.
3. What are the challenges that you will encounter in developing this system?
It is to be noted that the programming paradigm that I will use in the development of the Point of Sale (POS) System is Object-oriented programming (OOP).
The three key activities that will be required to develop the system are:
The programmer creates classes that describe the items that will be used by the program when it runs.The programmer creates a class that includes the static main() function, which is used to launch the application.These two fall under the activity category labeled "Creating the Program"
The core challenges that are related to developing a system that is based on Object Oriented programming are:
Data storage.Common procedures.Defining objects.Hierarchy.What is OOP?Object-oriented programming (OOP) is a programming style that centers software design on data rather than operations and logic. An object is a data field with discrete characteristics and behavior.
OOP concepts are categorized as follows:
PolymorphismAbstraction Encapsulation; and Inheritance.Object-oriented programming languages simplify understanding of how a program works by combining data and its action (or method) into a single bundle known as an "object."
Functional programming is a programming approach that involves performing operations, or functions, on static data.
Learn more about programming paradigm:
https://brainly.com/question/28736751
#SPJ1
can anyone please help me really need help
Answer:
Provided code for (b) and (c) in attached images
Explanation:
Please let me know if you have further questions
Use the concepts and terms that you learned in this unit to describe the composition of this photograph 10pts
The Elements of Composition in the above Photograph are:
LighteningTextureColorLighteningWhat is the composition in the photograph?The photograph is made up of Geometric shapes which are known to be a wonderful example of a photography composition.
An image's texture is how it appears to the eye. In photography, texture is emphasized by using shadow.
Note that the use of color as well as lightening is one that is seen in the image attached. Therefore, Coloring tells more about the color's hue.
Learn more about Photography from
https://brainly.com/question/897676
#SPJ1
Write a SELECT statement that answers this question: What is the total quantity
purchased for each product within each category? Return these columns:
The category_name column from the category table
The product_name column from the products table
The total quantity purchased for each product with orders in the Order_Items
table
Use the WITH ROLLUP operator to include rows that give a summary for each
category name as well as a row that gives the grand total.
Use the IF and GROUPING functions to replace null values in the category_name
and product_name columns with literal values if they’re for summary rows.
Based on the complete question, the following information is provided:
SELECT product _ name, SUM ( ( item _ price - discount _ amount ) * quantity ) AS Total _ quanity _ purchased
FROM products p
JOIN order _ items ori ON p.product _ id = ori . product _ id \
GROUP BY product _ name WITH ROLLUP
The SELECT statementSELECT
if( c . category _ name is null, 'All Categories', c.category_name) Category,
if( p . product _ name is null, 'All Products', p.product_name ) Product,
SUM( ori . quantity ) as Total _ Qty _ Purchased,
SUM(( ori.item _ price - ori.discount _ amount) * ori.quantity)
AS Total _ Purchase _ Sales
FROM
products p
JOIN Category c
on p.category _ id = c.category _ id
JOIN order _ items ori
on p.product_id = ori.product_id
GROUP BY
c.category _ name ,
p.product _ name ,
WITH ROLLUP
Read more about SQL here:
https://brainly.com/question/25694408
#SPJ1
which of the following is not a feature of formula menu of the macabacus excel add in
Answer:
the answer is A par
Explanation:
what is multiplexer ?and types of multiplexer.
[tex] \\ \\ \\ \\ \\ \\ [/tex]
tysm ~
Answer: In electronics, a multiplexer, also known as a data selector, is a device that selects between several analogs or digital input signals and forwards the selected input to a single output line. The selection is directed by a separate set of digital inputs known as select lines.
Types of multiplexers:
-Time Division Multiplexer.
-Statistical Multiplexer.
-Inverse Multiplexer.
-Space Division Multiplexer.
-Frequency Division Multiplexer.
-Wavelength Division Multiplexer.
When a new encryption method is invented, you might think that it is kept secret so no one knows how to decode it. This actually isn’t the case; when someone invents a new encryption method, they publish the process and people begin trying to crack it. Why wouldn’t someone try to keep their encryption method secret? Explain your answer. Please help me!
Answer:
To test if the encryption method is effective.
Explanation:
If you kept a new encryption method secret, then when you use it hackers can try to crack it and whatever the encryption is protecting will be compromised. If you publish it beforehand while its not protecting anything, then you will know if its safe.
Use the concepts and terms that you learned in this unit to describe the composition of this photograph:
The Elements of Composition in the above Photograph are:
FormTextureColorSpaceLighteningWhat is the composition in the photograph?The photograph is made up of Geometric shapes which are known to be a wonderful example of a photography composition.
An image's texture is how it appears to the eye. In photography, texture is emphasized by using shadow.
Note that Three factors such as hue, value, as well as saturation, define a color. Hence, Coloring describes the color's hue.
Learn more about Photography from
https://brainly.com/question/897676
#SPJ1
Write algorithm On how to Cook
Rice and beans.
Algorithm on how to Cook Rice and beans are:
Pick the beans, rinse, and cook for 40-45 minutes on medium-high heat, or until tender but not mushy.
Cover with water and add the diced onions.
Cook for 40-45 minutes on medium-high heat, or until the beans are almost done.
When it is almost soft, you will know it is almost done.
Rinse the rice several times until the water is clear, then add it to the beans.
Season with butter/oil and salt to taste.
Cook until everything is done.
Serve with a sauce, soup, or stew of your choice.
What is algorithm?
In computer science, an algorithm is a finite sequence of rigorous commands that is generally used to solve a class of specific problems or to operate a computation. Algorithms are specifications for performing calculations as well as data processing.
To learn more about algorithm
https://brainly.com/question/24953880
#SPJ9
what is computer fundamental ?
If you are also reading this then we are friends
helppppppppppppp please
Answer:
It is derived from the Latin word "computare" which means to calculate. Our Computer fundamentals tutorial includes all topics of Computer fundamentals such as input devices, output devices, memory, CPU, motherboard, computer network, virus, software, hardware etc
Whats the differences between texting and emailing, and why the latter (emailing) is more common in professional communication.
What are common problems that people seem to encounter while emailing?
The primary distinction between texting and email is that texting requires cellular data, whereas email requires a consistent internet connection.
What is email?E-mail, or electronic mail, refers to messages sent and received by digital computers via a network.
An e-mail system allows computer users on a network to communicate with one another by sending text, graphics, sounds, and animated images.
People prefer email for business communication because it is easily accessible on a mobile phone. It's simpler, and they believe they're more adaptable during the day.
To receive email, the recipient must have internet access. Viruses are easily transmitted through email attachments, and most email providers will scan your emails for viruses on your behalf.
Thus, email is more common in professional communication.
For more details regarding email, visit:
https://brainly.com/question/14666241
#SPJ1