For this assignment, you will create flowchart using Flowgorithm and Pseudocode for the following program example:
Hunter Cell Phone Company charges customer's a basic rate of $5 per month to send text messages. Additional rates apply as such:
The first 60 messages per month are included in the basic bill
An additional 10 cents is charged for each text message after the 60th message and up to 200 messages.
An additional 25 cents is charged for each text after the 200th message
Federal, state, and local taxes add a total of 12% to each billThe company wants a program that will accept customer's name and the number of text messages sent. The program should display the customer's name and the total end of the month bill before and after taxes are added.

Answers

Answer 1

Answer:

The pseudocode is as given below in the explanation while the flow diagram is attached herewith

Explanation:

The pseudocode is as follows

input cust_name, num_texts  

Set Main_bill=5 $;

if the num_texts is less than or equal to 60

Excess_Charge=0;

If the num_texts is greater than 60 and less than or equal to 200

num_text60200 =num_texts-60;

Excess_Charge=0.1*(num_text60200);

else If the num_texts is greater than 60

num_texts200 =num_texts-200;

Excess_Charge=0.25*(num_texts200)+0.1*(200-60);

Display cust_Name

Total_Bill=Main_bill+Excess_Charge;

Total_Bill_after_Tax=Total_Bill*1.12;

For This Assignment, You Will Create Flowchart Using Flowgorithm And Pseudocode For The Following Program

Related Questions

Answers must be correct. Or else it will be flagged. All of these sub parts need to be answered with step by step process showing all work and reasoning.
DISCRETE STRUCTURES:
1.a. Truth value of a propositional statement For this exercise, it is easier not to use truth tables.
1. Suppose that A → ((BAC)-D) is false. What are the truth values of A, B, C, and D?
2. Suppose that (A-B) v (CA (DAE)) → F) is false.
What are the truth values of A, B, C, D, E, and F?
1.b. Logical equivalence Prove the equivalences below without using truth tables. Instead, use the rules of logical equivalence given in class. Justify your reasoning.
1.c. Inference Formalize the following argument and show that it is valid.
If Jose took the jewellery or Mrs. Krasov lied, then a crime was committed. Mr. Krasov was not in town. If a crime was committed, then Mr. Krasov was in town. Therefore Jose did not take the jewellery

Answers

Note: The complete part of question 1b is attached as a file

Answer:

1ai) A = true, B = true, C = true, D = false

Check the attached files for the answers of the remaining parts

Explanation:

The detailed solutions of all the sections of the question are contained in the attached files

C++ Problem: In the bin packing problem, items of different weights (or sizes) must be packed into a finite number of bins each with the capacity C in a way that minimizes the number of bins used. The decision version of the bin packing problem (deciding if objects will fit into <= k bins) is NPcomplete. There is no known polynomial time algorithm to solve the optimization version of the bin packing problem. In this homework you will be examining three greedy approximation algorithms to solve the bin packing problem.

- First-Fit: Put each item as you come to it into the first (earliest opened) bin into which it fits. If there is no available bin then open a new bin.

- First-Fit-Decreasing: First sort the items in decreasing order by size, then use First-Fit on the resulting list.

- Best Fit: Place the items in the order in which they arrive. Place the next item into the bin which will leave the least room left over after the item is placed in the bin. If it does not fit in any bin, start a new bin.

Implement the algorithms in C++. Your program named bins.cpp should read in a text file named bin.txt with multiple test cases as explained below and output to the terminal the number of bins each algorithm calculated for each test case. Example bin.txt: The first line is the number of test cases, followed by the capacity of bins for that test case, the number of items and then the weight of each item. You can assume that the weight of an item does not exceed the capacity of a bin for that problem.

3

10

6

5 10 2 5 4 4

10

20

4 4 4 4 4 4 4 4 4 4 6 6 6 6 6 6 6 6 6 6

10

4

3 8 2 7

Sample output: Test Case 1 First Fit: 4, First Fit Decreasing: 3, Best Fit: 4

Test Case 2 First Fit: 15, First Fit Decreasing: 10, Best Fit: 15

Test Case 3 First Fit: 3, First Fit Decreasing: 2, Best Fit: 2

Answers

xekksksksksgBcjqixjdaj

For this project, you have to write 3 functions. C++

1. remove_adjacent_digits. This takes in 2 arguments, a std::vector, and a std::vector of the same size. You need to return a std::vector, where each of the strings no longer has any digits that are equal to, one more, or one less, than the corresponding integer in the 2nd vector.

2. sort_by_internal_numbers. This takes in a single argument, a std::vector, and you need to return a std::vector, which is sorted as if only the digits of each string is used to make a number.

3. sort_by_length_2nd_last_digit. This takes in a std::vector>. It returns a vector of the same type as the input, which is sorted, first by the length of the string in the pair, and if they are the same length, then the second last digit of the int.

See the test cases for examples of each of the above functions.

You need to submit a single file called main.cpp that contains all these functions. You can (and should) write additional functions as well. There is no need for a main function.

No loops (for, while, etc) are allowed. You must use only STL algorithms for this project.

Answers

Find the given attachments

Managers can use __ software to discuss financial performance with the help of slides and charts

Answers

Answer:

presentation

Explanation:

Software like Google Slides and Microsoft Powerpoint can be utilized to present financial performances through the use of slides and charts.

Which of the following statements about CASE is not true?CASE tools provide automated graphics facilities for producing charts.CASE tools reduce the need for end user participation in systems development.CASE tools have capabilities for validating design diagrams and specifications.CASE tools support collaboration among team members.CASE tools facilitate the creation of clear documentation

Answers

Answer:

CASE tools reduce the need for end user participation in systems development.

Explanation:

CASE is an acronym for Computer-aided Software Engineering and it comprises of software application tools that provide users with automated assistance for Software Development Life Cycle (planning, analysing, designing, testing, implementation and maintenance). The CASE tools helps software developers in reducing or cutting down of the cost and time of software development, as well as the enhancement of the software quality.

Some other benefits of using the CASE tools are;

- CASE tools provide automated graphics facilities for producing charts.

- CASE tools have capabilities for validating design diagrams and specifications.

- CASE tools support collaboration among team members.

- CASE tools facilitate the creation of clear documentation.

- CASE tools checks for consistency, syntax errors and completeness.

The CASE tools can be grouped as, requirement and structure analysis, software design, test-case and code generation, reverse engineering, and document production tools.

Examples of CASE tools are flowchart maker, visible analyst (VA), dreamweaver, net-beans, microsoft visio, adobe illustrator and photoshop etc.

Pretend that your mother is a real estate agent and that she has decided to automate her daily tasks by using a laptop computer. Consider her potential hardware and software needs and create a hardware and software specification that describes them. The specification should be developed to help your mother buy her hardware and software on her own.

Answers

TJ life was the way to get

The specification should be developed to help your mother buy her hardware and software on her own is hardware.

Which is hardware?

Hardware refers back to the computer's tangible additives or shipping structures that shop and run the written commands furnished through the software program. The software program is the intangible a part of the tool that shall we the consumer have interaction with the hardware and command it to carry out unique tasks.

A few automatic software programs could ship messages, alert and notifications to the customer in addition to the owner.The pc need to be of respectable potential and processing pace three. Video calling software program to have interaction with the clients. Softwares like Excel to keep the information and all An running gadget of right here convenience 4.320 to 500 GB difficult drive three.2.2 GHz of processor. Long battery life Software: three GB RAM.

Read more about the hardware :

https://brainly.com/question/3273029

#SPJ2

What is a digital security risks?

Answers

Answer:

A digital security risk is an action that could result in damage to a computer or similar device's hardware, software, data etc.

Assume passwords are selected from four character combinations of 26 lower case alphabetic characters. Assume an adversary is able to attempt passwords at a rate of 1 per second. Assuming feedback to the adversary flagging an error as each incorrect character is entered, what is the expected time to discover the correct password

Answers

Answer:

Given:

Passwords are selected from 4 characters.

Character combinations are 26 lower case alphabetic characters.

Passwords attempts by adversary is at rate of 1 second.

To find:

Expected time to discover the correct password

Explanation:

Solution:

4 character combinations of 26 alphabetic characters at the rate of one attempt at every 1 second = 26 * 4 = 104

So 104 seconds is the time to discover the correct password. However this is the worst case scenario when adversary has to go through every possible combination. An average time or expected time to discover the correct password is:

13 * 4 = 52

You can also write it as 104 / 2 = 52 to discover the correct password. This is when at least half of the password attempts seem to be correct.

Mikayla wants to create a slide with a photograph of a car and the car horn sounding when a user clicks on the car. Which
feature should she use, and why?
a. She should use the Action feature because it allows a user to embed a hyperlink for an Internet video on the car.
b. She should use the Video from Website feature because it allows a user to embed a hyperlink for an Internet video on the car.
c. She should use the Action feature because it allows a user to place an image map with a hotspot on the car.
d. She should use the Video from Website feature because it allows a user to place an image map with a hotspot on the car.

Answers

Answer: A

Explanation: edge :)

Answer:

C

Explanation:

What is an accessory?
A.a security setting that controls the programs children can use
B.a tool that provides proof of identity in a computing environment
C.a set of programs and applications that help users with basic tasks
D.a set of gadgets and widgets that makes it easier to create shortcuts

Answers

Answer:

C

Explanation:

Accessories are in Microsoft windows, a set of programs and applications that help users with some basic tasks

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet capture, next generation.

(a) .packcng
(b) .paccapnextg
(c) .pcnextgen
(d) .pcapng

Answers

Answer:

Option (d) is correct

Explanation:

Previously saved capture files can be read using Wireshark. For this, select the File then open the menu. Then Wireshark will pop up the “File Open” dialog box.

Wireshark capture files, like the DemoCapturepcap file found in this lab, have a .pcapng extension, which stands for packet capture, next generation.

Paul has opened a bespoke tailoring shop. He wants to work online to keep a database of all his customers, send emails when garments are ready, create designs, and maintain financial records using software. Which productivity suite should he consider?

a. Prezi, G suite
b. G suite, Zoho
c. OpenOffice, G suite
d. Zoho, Apple iWork

Answers

Answer:

c. OpenOffice, G suite

Explanation:

The main advantage of OpenOffice is that it is free and obviously keeps your costs down. It has a lot of features that can help Paul (and really anyone else). It offers decent word processing, spreadsheets, databases and graphics, which can cover most, if not all, of Paul's needs.  

Google's G Suite also offers cheap plan's that can satisfy Paul's needs regarding emails, CRM features and cloud storage. Even though it is not free, Paul would probably need only the most basic plan at just $6 per month.

The productivity suite Paul should consider is OpenOffice. Therefore, the correct answer is option C.

The primary benefit of OpenOffice is that it is cost free, which obviously lowers your expenses. Paul can benefit mostly from its many features. The majority if not all of Paul's demand may be met by its decent word processing, spreadsheets, databases, and graphical features.  

Therefore, the correct answer is option C.

Learn more about the OpenOffice here:

https://brainly.com/question/4463790.

#SPJ6

Write a class called Triangle that can be used to represent a triangle. It should include the following methods that return boolean values indicating if the particular property holds: a. isRight (a right triangle) b. isScalene (no two sides are the same length) c. isIsosceles (exactly two sides are the same length) d. isEquilateral (all three sides are the same length).

Answers

Answer:

Explanation:

import java.io.*;

class Triangle

{

  private double side1, side2, side3; // the length of the sides of

                                       // the triangle.

  //---------------------------------------------------------------

  // constructor

  //

  // input : the length of the three sides of the triangle.

  //---------------------------------------------------------------

  public Triangle(double side1, double side2, double side3)

  {

      this.side1 = side1;

      this.side2 = side2;

      this.side3 = side3;

  }

  //---------------------------------------------------------------

  // isRight

  //

  // returns : true if and only if this triangle is a right triangle.

  //---------------------------------------------------------------

  boolean isRight()

  {

      double square1 = side1*side1;

      double square2 = side2*side2;

      double square3 = side3*side3;

      if ((square1 == square2 + square3) ||

          (square2 == square1 + square3) ||

          (square3 == square1 + square2))

          return true;

      else

          return false;

  }

  // isValid

  // returns : true if and only if this triangle is a valid triangle.

  boolean isValid()

  {

      if ((side1 + side2 < side3) ||

          (side1 + side3 < side2) ||

          (side2 + side3 < side1))

          return false;

      else

          return true;

  }

  // isEquilateral

  //

  // returns : true if and only if all three sides of this triangle

  // are of the same length.

  boolean isEquilateral()

  {

      if (side1 == side2 && side2 == side3)

          return true;

      else

          return false;

  }

  // isIsosceles

  //

  // returns : true if and only if exactly two sides of this triangle

  // has the same length.

  boolean isIsosceles()

  {

      if ((side1 == side2 && side2 != side3) ||

          (side1 == side3 && side2 != side3) ||

          (side2 == side3 && side1 != side3))

          return true;

      else

          return false;

  }

  // isIsosceles

  // returns : true if and only if exactly no two sides of this

  // triangle has the same length.

  boolean isScalene()

  {

      if (side1 == side2 || side2 == side3 || side1 == side3)

          return false;

      else

          return true;

  }

}

//-------------------------------------------------------------------

// class Application

//

// This class is the main class of this application. It prompts

// the user for input to construct a triangle, then prints out

// the special properties of the triangle.

//-------------------------------------------------------------------

public class Application

{

  //---------------------------------------------------------------

  // getInput

  //

  // input : stdin - BufferedReader to read input from

  //         msg - message to prompt the user with

  // returns : a double value input by user, guranteed to be

  //           greater than zero.

  //---------------------------------------------------------------

  private static double getInput(BufferedReader stdin, String msg)

      throws IOException

  {

      System.out.print(msg);

      double input = Double.valueOf(stdin.readLine()).doubleValue();

      while (input <= 0) {

          System.out.println("ERROR : length of the side of triangle must " +

              "be a positive number.");

          System.out.print(msg);

          input = Double.valueOf(stdin.readLine()).doubleValue();

      }

      return input;

  }

  //---------------------------------------------------------------

  // printProperties

  //

  // input : triangle - a Triangle object

  // print out the properties of this triangle.

  //---------------------------------------------------------------

  private static void printProperties(Triangle triangle)

  {

      // We first check if this is a valid triangle. If not

      // we simply returns.

      if (!triangle.isValid()) {

          System.out.println("This is not a valid triangle.");

          return;

      }

      // Check for right/equilateral/isosceles/scalene triangles

      // Note that a triangle can be both right triangle and isosceles

      // or both right triangle and scalene.

     

      if (triangle.isRight())

          System.out.println("This is a right triangle.");

      if (triangle.isEquilateral())

          System.out.println("This is an equilateral triangle.");

      else if (triangle.isIsosceles())

          System.out.println("This is an isosceles triangle.");

      else

          // we do not need to call isScalene here because a triangle

          // is either equilateral/isosceles or scalene.

          System.out.println("This is an scalene triangle.");

  }

  // main

  // Get the length of the sides of a triangle from user, then

  // print out the properties of the triangle.

  public static void main(String args[]) throws IOException

  {

      BufferedReader stdin = new BufferedReader

          (new InputStreamReader(System.in));

      double side1 = getInput(stdin,

          "What is the length of the first side of your triangle? ");

      double side2 = getInput(stdin,

          "What is the length of the second side of your triangle? ");

      double side3 = getInput(stdin,

          "What is the length of the third side of your triangle? ");

      System.out.print("Pondering...\n");

      printProperties(new Triangle(side1, side2, side3));

  }

}

Write a program that accepts any number of homework scores ranging in value from 0 through 10. Prompt the user for a new value if they enter an alphabetic character. Store the values in array. Calculate the average excluding the lowest and highest scores. Display the average as well as the highest and lowest score that were discarded.

Answers

Answer:

This program is written in C++

Note that the average is calculated without the highest and the least value.

Comments are used for explanatory purpose

See attachment for .cpp file.

Program starts here

#include<iostream>

using namespace std;

int main()

{

int num;

cout<<"Enter Number of Test [0-10]: ";

//cin>>num;

while(!(cin>>num) || num > 10|| num<0)

{

cout << "That was invalid. Enter a valid digit: "<<endl;

cin.clear(); // reset the failed input

cin.ignore(123,'\n');//Discard previous input

}

//Declare scores

int scores[num];

//Accept Input

for(int i =0;i<num;i++)

{

cout<<"Enter Test Score "<<(i+1)<<": ";

cin>>scores[i];

}

           //Determine highest

           int max = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] > max)

               {

                   max = scores[i];

               }

           }

           //Determine Lowest

           int least = scores[0];

           for (int i = 1; i < num; i++)

           {

               if (scores[i] < least)

               {

                   least = scores[i];

               }

           }

           int sum = 0;

           //Calculate total

           for(int i =0; i< num;i++)

           {

               sum += scores[i];

           }

           //Subtract highest and least values

           sum = sum - least - max;

           //Calculate average

           double average = sum / (num - 2);

           //Print Average

           cout<<"Average = "<<average<<endl;

           //Print Highest

           cout<<"Highest = "<<max<<endl;

           //Print Lowest

           cout<<"Lowest = "<<least;

return 0;  

}

Write a program that takes in an integer in the range 10 to 100 as input. Your program should countdown from that number to 0, printing
the count each of each iteration After ten numbers have been printed to the screen, you should start a newline. The program should stop
looping at 0 and not output that value
I would suggest using a counter to cổunt how many items have been printed out and then after 10 items, print a new line character and
then reset the counter.
important: Your output should use %3d" for exact spacing and a space before and after each number that is output with newlines in order
to test correctly. In C please

Answers

Answer:

The program written in C language is as follows

#include<stdio.h>

int main()

{

//Declare digit

int digit;

//Prompt user for input

printf("Enter any integer: [10 - 100]: ");

scanf("%d", &digit);

//Check if digit is within range 10 to 100

while(digit<10 || digit >100)

{

printf("Enter any integer: [10 - 100]: ");

scanf("%d", &digit);

}

//Initialize counter to 0

int counter = 0;

for(int i=digit;i>0;i--)

{

 printf("%3d", i); //Print individual digit

 counter++;

 if(counter == 10) //Check if printed digit is up to 10

 {

  printf("\n"); //If yes, print a new line

  counter=0; //And reset counter to 0

 }

}

}

Explanation:

int digit; ->This line declares digit as type int

printf("Enter any integer: [10 - 100]: "); -> This line prompts user for input

scanf("%d", &digit);-> The input us saved in digit

while(digit<10 || digit >100) {

printf("Enter any integer: [10 - 100]: ");

scanf("%d", &digit); }

->The above lines checks if input number is between 10 and 100

int counter = 0; -> Declare and set a counter variable to 0

for(int i=digit;i>0;i--){ -> Iterate from user input to 0

printf("%3d", i); -> This line prints individual digits with 3 line spacing

counter++; -> This line increments counter by 1

if(counter == 10){-> This line checks if printed digit is up to 10

printf("\n"); -> If yes, a new line is printed

counter=0;} -> Reset counter to 0

} - > End of iteration

The common field cricket chirps in direct proportion to the current tem­perature. Adding 40 to the number of times a cricket chirps in a minute, then dividing by 4, gives us the temperature (in Fahrenheit degrees). Write a program that accepts as input the number of cricket chirps in fifteen seconds, then outputs the current temperature

Answers

Answer:

This program is written in Java programming language;

First, you should understand that:

The formula given in the question implies that the current temperature can only be calculated using measurement of time in minutes;

Given that the number of chirps is directly proportional to the temperature.

If the cricket made n chirps in 15 seconds, it will make n * (60/15) chirps in 1 minutes;

n * (60/15) = n * 4

Base on this analysis, the program is as follows

import java.util.*;

public class cricket

{

public static void main(String []args)

{

 //Declare number of chips in 1 minutes

 int num;

 Scanner input = new Scanner(System.in);

 //Prompt user for input

 System.out.print("Number of chirps (in 15 seconds): ");

 num = input.nextInt();

 //Calculate temperature  (multiply temperature by 4 to get number of chirps in minutes

 double temp = (num * 4+ 40)/4;

 //Print temperature

 System.out.print("Current Temperature = "+temp+" F");

}

}

Bill downloaded an antivirus software from the Internet. Under the Uniform Commercial Code (UCC), the software is a: Select one: a. good. b. service. c. good-faith warranty. d. mixture of goods and services.

Answers

Answer:

a. good

Explanation:

According to the Uniform Commercial Code (UCC), It deals with all the contracts that also involves the sale of the goods,

Here goods include those things or items that are movable in a nature and also consist of manufactured goods that are specialized in nature

Therefore, as per the given situation, the bill downloaded an antivirus software so here the software is treated as a good

is brainly down? Cant search anything

Answers

You need to have WIFI

Which of the following are true of trademarks?
Check all of the boxes that apply.
They protect logos.
They protect fabric.
They show who the maker of the item is.
They can be registered with the government.

Answers

Answer:

A, C, D

They protect logos

They show who the maker of the item is.

They can be registered with the government

Explanation:

The following are true of trademarks:

They protect logos.  

They show who the maker of the item is.

They can be registered with the government.

A trademark is a type of intellectual property consisting of a recognizable sign, design, or expression which identifies products or services of a particular source from those of others.  A trademark exclusively identifies a product as belonging to a specific company and recognizes the company's ownership of the brand.

Trademarks protect logos, show who the maker of the item is and can be registered with the government.

Find out more on trademark at: https://brainly.com/question/11957410

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

Answers

Answer: provided in the explanation section

Explanation:

The question says:

Write a short assembly language program in either our 8088 SCO DOSBox or 80386+ MASM Visual Studio 2017 environment that demonstrates data storage and retrieval from memory. As an example consider some value which is either 16 or 32 bits, after instantiating as an immediate value transfer to and retrieve from memory using assembly language instructions.

The Answer:

multi-segment executable file template. data segment ; add your data here! pkey db "press any key...$" ends stack segment dw 128 dup(0) ends code segment start: ; set segment registers: mov ax, data mov ds, ax mov es, ax ; add your code here mov cx,4 input: mov ah,1 int 21h push ax loop input mov dx,13d mov ah,2 int 21h mov dx,10d mov ah,2 int 21h mov cx,4 output: pop bx mov dl,bl mov ah,2 int 21h loop output exit: lea dx, pkey mov ah, 9 int 21h ; output string at ds:dx ; wait for any key....

mov ah, 1 int 21h mov ax, 4c00h ; exit to operating system. int 21h ends end start ;

set entry point and stop the assembler.

Cheers I hope this helps!!!

Seth would like to make sure as many interested customers as possible are seeing his business’s website displayed in their search results. What are a few things he could pay attention to in order to achieve this?

Answers

Answer:

Hi! Make sure that the website has a few things. Proper Keywords, the pages have the proper tags, a form on the website, contact information, CIty State, Etc., Then a phone number. Social media icons that link properly to the social media pages.

Explanation:

. The total processing speed of microprocessors (based on clock rate and number of circuits) is doubling roughly every year. Today, a symmetric session key needs to be 100 bits long to be considered strong. How long will a symmetric session key have to be in 30 years to be considered strong?

Answers

Answer:

130 bits

Explanation:

If the length of a key = N bits

Total number of key combinations = [tex]\frac{2^{N} }{2}[/tex]

For a key length of 100, the total number of key combinations will be  [tex]\frac{2^{100} }{2} = 2^{99}[/tex] combinations. This is a whole lot and it almost seems impossible to be hacked.

The addition of  one bit to the length of the symmetric key in 1 year is sufficient to make the key strong, because even at double its speed, the processor can still not crack the number of combinations that will be formed.

Therefore, if a bit is added to the key length per year, after 30 years, the length of the symmetric session key will be 130 bits.

Write a calling statement for the following code segment in Java: public static int sum(int num1, int num2, String name) { int result = num1 + num2; System.out.println("Hi " + name + ", the two numbers you gave me are: " + num1 + " " + num2); return result; } Function Integer sum(Integer num1, Integer num2, String name) Integer result = num1 + num2 Display "Hi " + name + ", the two numbers you gave me are: ", num1, " ", num2 Return result End Function Write a calling statement to the function in Java or Pseudocode. You may use any value of appropriate data samples to demonstrate your understanding.

Answers

Answer:

Following are the calling of the given question

public static void main(String[] args) // main function

{

int store; // variable declaration

store = sum(32,15,"san"); // Calling of sum()

System.out.println(" TheValue returned by sum() : "+store); // display

}

Explanation:

Following are the description of the above statement

Here is the name of function is sum() In the sum() function definition there are 3 parameter in there signature i.e  two "int" type and 1 is "string" type .In the main function we declared the variable store i,e is used for storing the result of sum() it means it storing the result of value that is returning from the definition of sum() function .After that calling the function by there name and passing three parameter under it  sum(32,15,"san"); and store in the "store" variable.Finally print the value by using system.out.println ().

Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private attributes int num_of_items which hold the number of items ordered. For example, if num_of_items is 5, then cost[0], cost[1], ..., cost[4] hold the cost of these 5 items. Implement the member function named total_cost which returns the total cost of this OrderList.

Answers

Answer:

OrderList.java

public class OrderList {    private double cost[];    private int num_of_items;        public OrderList(){        cost = new double[100];    }    public double total_cost(){        double total = 0;        for(int i=0; i < num_of_items; i++){            total += cost[i];        }        return total;    } }

Main.java

public class Main {    public static void main(String[] args) {        OrderList sample = new OrderList();        double totalCost = sample.total_cost();    } }

Explanation:

Firstly, define a class OrderList with two private attributes, cost and num_of_items (Line 1-3). In the constructor, initialize the cost attribute with a double type array with size 100. Next, create another method total_cost() to calculate the total cost of items (Line 9-15). To implement the total_cost member function, create an OrderList instance and use that instance to call the total_cost() and assign it to totalCost variable.

It's inventiveness, uncertainty futuristic ideas typically deal with science and technology.what is it?

Answers

Answer:

Engineering and Science

Explanation:

Consider the following skeletal C-like program:
void fun1(void); /* prototype */
void fun2(void); /* prototype */
void fun3(void); /* prototype */
void main() {
int a, b, c;
. . .
}
void fun1(void) {
int b, c, d;
. . .
}
void fun2(void) {
int c, d, e;
. . .
}
void fun3(void) {
int d, e, f;
. . .
}
Given the following calling sequences and assuming that dynamic scoping is used, what variables are visible during execution of the last function called? Include with each visible variable the name of the function in which it was defined
a. main calls funl; funl calls fun2; fun2 calls fun3
b. main calls fun1; fun1 calls fun3
c. main calls fun2; fun2 calls fun3; fun3 calls funl
d. main calls fun1; funl calls fun3; fun3 calls fun2.

Answers

Answer:

In dynamic scoping the current block is searched by the compiler and then all calling functions consecutively e.g. if a function a() calls a separately defined function b() then b() does have access to the local variables of a(). The visible variables with the name of the function in which it was defined are given below.

Explanation:

a. main calls fun1; fun1 calls fun2; fun2 calls fun3

Solution:

Visible Variable:  d, e, f         Defined in: fun3Visible Variable: c                  Defined in: fun2 ( the variables d and e of fun2 are not visible)Visible Variable: b                  Defined in: fun1 ( c and d of func1 are hidden)Visible Variable: a                  Defined in: main (b,c are hidden)

b. main calls fun1; fun1 calls fun3

Solution:

Visible Variable:  d, e, f          Defined in: fun3 Visible Variable:  b, c              Defined in: fun1 (d not visible)Visible Variable:  a                 Defined in: main ( b and c not visible)

c. main calls fun2; fun2 calls fun3; fun3 calls fun1

Solution:

Visible Variable:  b, c, d         Defined in: fun1 Visible Variable:  e, f              Defined in: fun3 ( d not visible)Visible Variable:  a                 Defined in: main ( b and c not visible)

Here variables c, d and e of fun2 are not visible .

d. main calls fun1; fun1 calls fun3; fun3 calls fun2

Solution:

Visible Variable: c, d, e        Defined in: fun2Visible Variable:  f                Defined in: fun3 ( d and e not visible)Visible Variable:  b              Defined in: fun1 ( c and d not visible)Visible Variable: a                Defined in: main ( b and c not visible)

Francis has designed a picture book appropriate for third graders. He wants teachers across the world to freely download use, and distribute his work, but he would still like to retain his copyright on the content. What type of license should he u for his book?

Answers

Answer:

The correct answer will be "Project Gutenberg".

Explanation:

Project Gutenberg continues to obtain lots of requests for authorization for using printed books, pictures, as well as derivatives from eBooks. Perhaps some applications should not be produced, because authorization would be included in the objects provided (as well as for professional usages).You can copy, hand it over, or m actually-use it underneath the provisions including its license that was included in the ebook.

So that the above is the right answer.

In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and notification of appropriate individuals?
a. Full-interruption
b. Desk check
c. Simulation
d. Structured walk-through

Answers

Answer:Full-interruption--A

Explanation:  The Full-interruption is one of the major steps for  a Disaster Recovery Plan, DRP which ensures businesses are not disrupted by saving valuable resources during a disaster like a data breach from fire or flood.

Although expensive and very risky especially in its simulation of a disruption, this thorough  plan ensures that when a disaster occurs, the  operations are shut down at the primary site and are transferred to the recovery site allowing Individuals follow every procedure, ranging from the interruption of service to the restoration of data from backups, also with the notification of appropriate individuals.

A number of LC-3 instructions have an "evaluate address" step in the instruction cycle, in which a 16-bit address is constructed and written to the Memory Address Register via the MARMUX. List all LC-3 instructions that write to the MAR during the evaluate address phase of the instruction cycle, with the Register Transfer description of each.

Answers

Answer: you want to list all LC structers

Explanation:

a. A programmer wrote a software delay loop that counts the variable (unsigned int counter) from 0 up to 40,000 to create a small delay. If the user wishes to double the delay, can they simply increase the upperbound to 80,000?
b. If the code contains a delay loop and we noticed that no delay is being created at run-time. What should we suspect during debugging?

Answers

Answer:

Explanation:

The objective here is to determine if the programmer can simply increase the upperbound to 80,000.

Of course Yes, The programmer can simply increase the delay by doubling the upperbound by 80000. The representation can be illustrated as:

( int : i = 0;  i <  40,000; i ++ )

{

  // delay code

}

Which can be modified as:

( int : i = 0;  i <  80,000; i ++ )

{

  // delay code

}

b)  If the code contains a delay loop and we noticed that no delay is being created at run-time. What should we suspect during debugging?

Assuming there is no delay being created at the run-time,

The code is illustrated as:

For ( int : i = 0 ; i < 0 ; i ++ )

{

  // delay code which wont

  //execute since code delay is zero

}

we ought to check whether the loop is being satisfied or not.  At the Initial value of loop variable, is there any break or exit statement is being executed in between loop. Thus, the  aforementioned delay loop wont be executed since the loop wont be executed for any value of i.

Other Questions
Block 1, of mass m1 = 2.50 kg , moves along a frictionless air track with speed v1 = 27.0 m/s. It collides with block 2, of mass m2 = 33.0 kg , which was initially at rest. The blocks stick together after the collision.A. Find the magnitude pi of the total initial momentum of the two-block system. Express your answer numerically.B. Find vf, the magnitude of the final velocity of the two-block system. Express your answer numerically.C. what is the change deltaK= Kfinal- K initial in the two block systems kinetic energy due to the collision ? Express your answer numerically in joules. g Using a calculator, find the actual error in measuring volume if the radius was really 6.5 cm instead of 6 cm, and find the actual error if the radius was actually 5.5 cm instead of 6 cm. Compare these errors to the answer you got using differentials You pick a card at random, put it back, and then pick another card at random.2 3 4 5 What is the probability of picking a number greater than 3 and then picking a 5? Find the mean absolute deviation of {16, 19, 22, 27, 33, 19, 25}. f(x)=x^2-2x+3; f(x)=-2x+28 What are chemical contaminants?Homemade soapsRestaurant grade cleanersAlcoholRecreational drugs Which relationship is the BEST example of the Law of Supply?A)The quantity of a good supplied rises as the price rises.B)The quantity of a good supplied rises as the price falls.C)The quantity of a good supplied falls as the price rises.D)The quantity of a good supplied is not impacted by price. please help you will get 20 points and explain your answer please What is 1/2 convert to 6? A. 6B. 12C. 3 Hellllp someone please n an experiment, 39.26 mL of 0.1062 M NaOH solution was required to titrate 37.54 mL of \ v unknown acetic acid solution to a phenolphthalein end point. Calculate the molarity of the acetic acid solution, and the percent (by weight) of acetic acid in the solution (assuming its density to be 1.00 g/mL). What helps mitochondria make proteins by itself? 1. Presence of membrane 2. Presence of ATP 3. Presence of Ribosomes 4. All of the above I need help plzzzzzz Critique the statutory mathematical disbursement of estate any person who dies intestate under the intestate succession law 1985(PNDCL 111) Select all statements that are true for Sn1 reactions. (a) Formation of the carbocation is the rate-determining step (RDS) (b) The reaction rate depends upon the concentration of both the nucleophile and the electrophile (c) Reactions at chiral carbons proceed with inversion of stereochemistry (d) None of these statements are true for Sn1 reactions (e) Carbocation rearrangements are never observed If X to the second power equals 30, what is the value of X? William James developed the idea of _______ which looked at the causes and consequences of behavior. determine whether the forces in the pair are pulling at right angles to each other for the values. a-3.4 and b=2.6, which are legs of a right triangle, find c, the hypotenuse, to the nearest tenth If Takeshi adds his weight to 250 pounds, he gets 403 pounds. How much does Takeshi weigh? what do you think of all the twilight movies? me personally i looove them so much.