#include
void main()
{
int m=45,first,last;
first=m/10;
last=m%10;
printf("%d",first);//line 1
printf("\n%d",last);//line 2
printf("\nSum=%d",first*last);//line 3
printf("\n%d",first*last);//line 4
printf("\n%d",last*last);//line 5
printf("\nCube=%d",first*first*first);//line 6
}


Select the correct output for line 1 ~
1 point
4
5
0

Answers

Answer 1

Answer:

4

Explanation:

45 divided by 10 using integer division is 4

I ran the program, output is below.

#includevoid Main(){ Int M=45,first,last; First=m/10; Last=m%10; Printf("%d",first);//line 1 Printf("\n%d",last);//line

Related Questions

Today we see the advantages as well as disadvantages of a wired network. In comparison what technology would you recommend Wired Ethernet or a Wireless network technology for home and what would you recommend for business? Explain your answer

Answers

Answer:

wired network

Explanation:

Wired networks are generally much faster than wireless networks. ... This is mainly because a separate cable is used to connect each device to the network with each cable transmitting data at the same speed. A wired network is also faster since it never is weighed down by unexpected or unnecessary traffic.

hope that helps your welcome

What is the grooming process as it relates to online predators

Answers

the process by which online predators lure in minors to get close enough to hurt them.

computer Graphics:
B. Arbitrary reference point:
1) Apply a rotation by 60° on the Pivot Point (-10, 10) and display it.
2) Apply a rotation by 270° on the Pivot Point (10, 0) and then translate it by tx
= -20 and ty = 5. Display the final result.

Answers

Thanks hope it helps

Fill in the blank: _____ data are statistical and numerical facts about a project.
Subjective



Quantitative



Mathematical



Qualitative

Answers

Quantitative data are statistical and numerical facts about a project that can be counted, measured or expressed using numbers.

Quantitative data is statistical and its nature is usually structured, it uses numbers and values that are most suitable for the analysis of a project.

The collection of quantitative data offers the possibility of statistical analysis.

This type of data allows you to easily measure and quantify facts in an organized and accessible way within relational databases.

Therefore, we can conclude that quantitative data is data that comes from numerical information, quantities, percentages, proportions and statistics.

Learn more about quantitative data here: https://brainly.com/question/96076

What are two drawbacks of using netbook ?

Answers

Answer: They are becoming obsolete and they are usually low-performance. Also a 32-bit system.

Would appreciate brainly <3

Answer:

Laptop computers are difficult to repair, upgrade or modify due to their closed and integrated design. While storage drives and RAM are usually accessible because these are the things you will most likely upgrade, it is often difficult to modify or replace your CPU, graphics chip or motherboard. These jobs will usually require professional equipment and tools–or a hired professional technician. Additionally, while in a desktop computer the possible configurations are almost unlimited, laptop configurations are limited to those provided by laptop manufacturers. Some software may also be incompatible with laptop hardware, and installations of different operating systems than those bundled with the laptop may result in hardware failures.

what is the different sheets in excel

Answers

Answer:

By clicking the sheet tabs at the bottom of the Excel window, you can quickly select one or more sheets. To enter or edit data on several worksheets at the same time, you can group worksheets by selecting multiple sheets. You can also format or print a selection of sheets at the same time.

Explanation:

hope this helps

Queries are questions true or false?

Answers

Answer:

true

Explanation:

in the dictionary they mean the same thing

True or False. When FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software.

Answers

The File Transfer Protocol is commonly called FTP. FTP users authenticate with an FTP server, the sign-in process can be decoded by a protocol analyzer or network sniffer software is a true statement.

There are some element that often specifies the authentication settings for FTP sites. The authentication settings are known to be wired or configured at only the site-level. They can also be configured per URL.

The File Transfer Protocol (FTP) is known simply as a standard communication protocol that is often employed for the movement of computer files from a server to a client using a computer network.

It uses the client–server model architecture via different control and data connections between the client and the server.

Learn more from

https://brainly.com/question/20602197

Imagine that you have an image that is too dark or too bright. Describe how you would alter the RGB settings to brighten or darken it. Give an example.

Answers

turn the brightness up

Write a function predict_wait that takes a duration and returns the predicted wait time using the appropriate regression line, depending on whether the duration is below 3 or greater than (or equal to) 3.

Answers

The appropriate function which could be used to model the scenario can be written thus ; The program is written in python 3 ;

y = 3x + 3.5

#since no data is given ; using an hypothetical regression equation expressed in slope - intercept format ; where, x = duration and y = Predicted wait time.

def predict_wait(x) :

#initialize a function named predict_wait and takes in a certain duration value, x

y = 3*x + 3.5

#input the x - value into the regression equation to calculate y

return y

#return y

Learn more : https://brainly.com/question/25556810

explain how you activate window explore​

Answers

Answer:

Win+R -> Type "explorer.exe" -> Press enter

In your own words, explain the process undertaken while testing the significance of a multiple linear regression model parameter Indicating clearly the hypothesis considered, test statistics used rejection criteria and conclusion.​

Answers

Multiple Linear Regression Analysis consists of more than just fitting a linear line through a cloud of data points. It consists of three stages: 1) analyzing the correlation and directionality of the data, 2) estimating the model, i.e., fitting the line, and 3) evaluating the validity and usefulness of the model.

1. Fill in the blanks with appropriate word. 5°1-5 is a collection of raw unprocessed facts, figures, and symbols ​

Answers

Answer:

e

Explanation:

e

The system tray contains _____.
A. the battery life
B. the computer's hard drive
C. the operating system
D. Quick Launch

Answers

[tex]⇒[/tex]

the operating system

The notification area (also called the "system tray") is located in the Windows Taskbar, usually at the bottom right corner. It contains miniature icons for easy access to system functions such as antivirus settings, printer, modem, sound volume, battery status, and more.

Answer:

A BATTERY LIFEExplanation: The person said it and it was right I believed them, and they made me get a 100% thank you sir/madam and as you can see, I have proof so your welcome and thank you.

I Wouldn't just say the letter like A or C because everyone's quiz is different, and it changes but either way whatever your welcome and again thank you.

discuss the communicatin process giving detailed explanation on each process​

Answers

Communications is fundamental to the existence and survival of humans as well as to an organization. It is a process of creating and sharing ideas, information, views, facts, feelings, etc. among the people to reach a common understanding. Communication is the key to the Directing function of management.

A manager may be highly qualified and skilled but if he does not possess good communication skills, all his ability becomes irrelevant. A manager must communicate his directions effectively to the subordinates to get the work done from them properly.

Communications Process

Communications is a continuous process which mainly involves three elements viz. sender, message, and receiver. The elements involved in the communication process are explained below in detail:

1. Sender

The sender or the communicator generates the message and conveys it to the receiver. He is the source and the one who starts the communication

2. Message

It is the idea, information, view, fact, feeling, etc. that is generated by the sender and is then intended to be communicated further.

Browse more Topics under Directing

Introduction, Meaning, Importance & Principles of DirectingElements of DirectionIncentivesLeadership

3. Encoding

The message generated by the sender is encoded symbolically such as in the form of words, pictures, gestures, etc. before it is being conveyed.

4. Media

It is the manner in which the encoded message is transmitted. The message may be transmitted orally or in writing. The medium of communication includes telephone, internet, post, fax, e-mail, etc. The choice of medium is decided by the sender.

5. Decoding

It is the process of converting the symbols encoded by the sender. After decoding the message is received by the receiver.

6. Receiver

He is the person who is last in the chain and for whom the message was sent by the sender. Once the receiver receives the message and understands it in proper perspective and acts according to the message, only then the purpose of communication is successful.

7. Feedback

Once the receiver confirms to the sender that he has received the message and understood it, the process of communication is complete.

8. Noise

It refers to any obstruction that is caused by the sender, message or receiver during the process of communication. For example, bad telephone connection, faulty encoding, faulty decoding, inattentive receiver, poor understanding of message due to prejudice or inappropriate gestures, etc.

Which of the following is NOT a function of a Web Browser?
O Provide a platform that users can use to access web pages and sites
O Access a Web server and request a page on the Internet so the right information shows up
O Crawl through the World Wide Web searching for words and terms to index in Web Databases
O Interpret Web page's HTML tags and display the Web page's information in a way that is intended/easily readable for you

Answers

A web browser is used to gain access to the contents of a website, displaying the information in a readable and easily understandable format. Hence, an option which isn't a function of a web browser is Crawl through the World Wide Web searching for words and terms to index in Web Databases

A web browsers allows users to access web pages and sites, by accessing web servers and requesting access to display the contents.

Web pages are written in Hypertext Markup Language (HTML). Browsers interpret these document format and tags so that it is displayed in an understandable format.

Learn more : https://brainly.com/question/17130932

Leon wants an output from his tablet. What should he look at? A. the memory chip B. the processor C. the screen D. the power button

Answers

Answer:

he should look at the screen

Answer:

C. The screen

Explanation:

got it on edge

what don't you like about creating a new document using Microsoft office button​

Answers

It takes too long to load sometimes.

Assume that the speed of new computers costing a certain amount of money grows exponentially over time, with the speed doubling every 18 months. Suppose you need to run a very time consuming program and are allowed to buy a new computer costing a fixed amount on which to run the program. If you start now, the program will take 7 years to finish. How long should you delay buying the computer and starting the program so that it will finish in the shortest amount of time from now

Answers

Therefore, in order to run the program in the shortest time, you should delay for 3 years

Given that the speed of new computers costing a certain amount of money grows exponentially over time, with the speed doubling every 18 months.

Exponential equation as a function of time can be expressed as

P(t) = [tex]P_{0}[/tex][tex]R^{t/T}[/tex]

Quantity P will be increasing exponentially when R > 1. And it will decrease exponentially when R < 1.

Suppose you need to run a very time consuming program and are allowed to buy a new computer costing a fixed amount on which to run the program. If you start now, the program will take 7 years to finish.

Let the time required to run and complete a program for time t years be P(t).

If the speed doubling every 18 months, which is 3/2 years. This will eventually cause the running time to decrease by half (0.5)

P(t) = 7[tex](1/2)^{3t/2}[/tex] = 7[tex](2)^{-3t/2}[/tex]

The total time T will be sum of the delay time t and the time of running the program. That is

T(t) = t + P(t)

T(t) = t + 7[tex](2)^{-3t/2}[/tex]   .......... (2)

We can calculate the minimum time t by differentiating the above equation and make it equal to zero.

dT/dt = 1 + 14/3[tex](2)^{-3t/2}[/tex](ln0.5) = 0

14/3[tex](2)^{-3t/2}[/tex](ln0.5) = -1

[tex](2)^{-3t/2}[/tex](ln0.5) = -3/14

[tex](2)^{-3t/2}[/tex] = -3/14ln0.5

Log (natural logarithm) both sides

-3t/2ln2 = ln(3/14ln2)

make t the subject of formula

t = - 3ln(3/14ln2) ÷ 2ln2

t = 2.5 approximately

To know how long you should delay buying the computer and starting the program so that it will finish in the shortest amount of time from now, substitute t into equation 2

T(2.5) = 2.5 + (7)[tex]2^{-3(2.5)/2}[/tex]

T(2.5) = 2.5 + 0.5202

T(2.5) = 3.02 years

T (2.5) = 3 years approximately

Therefore, in order to run the program in the shortest time, you should delay for 3 years

Learn more here: https://brainly.com/question/6497099

The ______ Works on a single variable or constant. *​

Answers

Answer:

man

Explanation:

ARAT ML MGA LODS
ID:426667817 ​

Answers

What? If this is an online video ch at thing, then count me out lol sorry I just think that this is dangerous I dk
Nooo stop posting these they aren’t safe

What's computer hardware ​

Answers

the physical components that a computer system requires to function

hope it helps

Computer hardware includes the physical parts of a computer, such as the case, central processing unit, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard. By contrast, software is the set of instructions that can be stored and run by hardware.

WORTH 75 POINTS!!
Which best describes the video encoding process?

converting analog video into digital video

filming a video at 30 frames per second

saving a digital video in a specific file format

watching a video while the file downloads

Answers

Answer:

To watch a digital video, you must use the codec that was used to encode the video file. Most videos are compressed.

Answer:

Why is compression important for video streaming?

to increase the number of frames per second so that motion appears smooth

to watch video without waiting for it to download(this one)

to improve image quality

to increase file size

Explanation:

1. Where did the Industrial Revolution start and why did it begin there?​

Answers

Answer:

The first Industrial Revolution began in Great Britain in the mid-to-late 1700s, when innovation led to goods being produced in large quantities due to machine manufacturing.

This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain's economic development from 1760 to 1840.

Answer:

This process began in Britain in the 18th century and from there spread to other parts of the world. Although used earlier by French writers, the term Industrial Revolution was first popularized by the English economic historian Arnold Toynbee (1852–83) to describe Britain’s economic development from 1760 to 1840  

Historians have identified several reasons for why the Industrial Revolution began first in Britain, including: the effects of the Agricultural Revolution, large supplies of coal, geography of the country, a positive political climate, and a vast colonial empire.

Explanation:

3. Elaborate why and how you use “Output” command in Python Programming Language, write the syntax of output command?​

Answers

Answer:

Explanation:

you use print() to output something

so it would be like this:

print("What is up, gamer?")

so the syntax is print() with whatever is in the parentheses being what you want to output

Name a type of malware designed to provide unauthorized, remote access to a user's computer​

Answers

Answer:

spyware

Explanation:

your welcome;)

Answer:

trojan horse

Explanation:

or just trojan

Problem: For multi access control, there are two approaches, those based on channel partitioning, and those based on random access. In packet switching, there are two rather similar approaches as well, namely, circuit switching and package switching. Discuss the similarities and differences in these two problem domains and the corresponding approaches g

Answers

The similarity between the two systems is the ability to connect many different communication devices and transfer data between a sender and a receiver. The main difference is the need for a connection for both to work.

We can arrive at this answer because:

Circuit and package quotation is very important for the connections of different communication devices.Furthermore, these two systems are used efficiently when a data transfer is required.However, even being used for the same purposes, they have many differences between them.The biggest difference is the need for a connection, as package switching is done without the need for a connection, while circuit switching needs a connection to act.

In addition, circuit switching is more widely used because of its ability to transfer data from one point to another via message transfer, while package switching is used when circuit switching is not available as it does the sending data more slowly across one drive.

More information:

https://brainly.com/question/7227504

What type of rules specify user privileges to select, insert, update, and delete data for different tables and views

Answers

Based on SQL analysis, the type of rules that specify user privileges to select, insert, update, and delete data for different tables and views is called DML.

What is DML Command in MySql?

DML is an acronym for Data Manipulation Language.

DML commands are typically applied to make all changes in the SQL database.

Different types of DML Commands

InsertDeleteUpdate

Hence, in this case, it is concluded that the correct answer is "DML (Data Manipulation Language)."

Learn more about SQL commands here: https://brainly.com/question/25694408

What is the difference between a computer’s RAM and its hard disk?
A. RAM is not volatile, which means that it is more reliable than a hard disk. A hard disk is volatile, which means that it is vulnerable to electronic interference.

B. RAM is volatile, which means that it does not retain information in memory after powering down. A hard is not volatile, which means that it retains information in memory after powering down.

C. RAM is not volatile, which means that it retains information in memory after powering down. A hard disk is also not volatile, which means that it retains information in memory after powering down.

D. RAM is volatile, which means that it must be handheld with care when removed or replaced. A hard disk is not volatile, which means that it is much more resistant to movement during removal or replacement.

Answers

Answer:

D. RAM is volatile, which means that it must be handheld with care when removed or replaced. A hard disk is not volatile, which means that it is much more resistant to movement during removal or replacement.

Explanation:

Most RAM (random access memory) used for primary storage in personal computers is volatile memory. Volatile memory contrasts with non-volatile memory, which does not lose content when power is lost. Non-volatile memory has a continuous source of power and does not need to have its memory content periodically refreshed.

Answer:

Explanation:

RAM can be accessed faster than hard drive. – Any changes made to the file will be present in RAM while once the changes are saved it is copied to the hard drive permanently. – RAM needs power to store data, hard drives do not.

We can find out how robots work by looking in detail at the smaller parts. What do we call this?

Answers

Answer: This can be called the engineering.

Explanation:

Because the small parts is the bearings inside the robot

Other Questions
Martin puts his weekly paycheck into his checking account. In which column should he write the value of his paycheck? A checking account has columns check number, debits, deposits, balance. Deposits Balance Debit Check number Question 10 of 10What example does Alan Weisman give to show that nature has little concernfor things that humans find important?O A. Turtles on Staten IslandB. Paintings in museumsO C. Squirrels in the BronxO D. Mail in post officesSUBMIT Solve for x5-3x - 1 = 25 Evaluate the equation. d - 4.12 = 12.8 A) d = 8.58B) d = 8.68 C) d = 16.92 D) d = 17.02 Is the number of women in congress important? If Don drives 60 miles per hour, can he make it to the beach (200 miles away) in 3 1/2 hours? Which of the following object has the MOST kinetic energy?A bowling ball sitting on top of a refrigerator.A 1,000 pound boulder resting on the ground.A golf ball rolling slowly down a gentle slope.A cookie jar resting on the edge of a kitchen counter. Carley beat the school record for the 400 meter run by 1.3 seconds. If she ran in 55.7 seconds, what was the record? Simplify 6^-3/6^5answers: 6^8 6^-2 1/6^8 1/6^2 Do you think the events of 1919 justified Palmers actions? Why or why not?. write a paragraph Rewrite the proportion 7:21 = 3:9 as a proportion using fractions. Rana loves to eat, but she tries not to eat too much please help and show work Slove system of equation.2x - 6y = 8-3x + 9y = 12 Which of the following was not a part of the"Big Three" at the Potsdam Conference?A GermanyB. USSRC. Britain make y the subject of the formulax=13(t-4y) over y 6. (4. 1) and (1, 4) are on the line In Agile projects, detailed risk planning occurs during iteration planning, daily-up meetings, and retrospectives. True False Giovanni can read 100 words per minute. If there are approximately 400 words on a page, about how many pages can he read in 2 hours? Use the drop-down menu to complete each statementUS national security policy seeks toCongress has the power toThe US government hasto support national securityV