The statement "An array name is a pointer constant because the address stored in it cannot be changed during runtime" is a true statement.
Arrays are a group of consecutive data types of same size and type. They are stored at contiguous locations in memory, so there is no need to have individual variable names for every data, instead, we can use array names. These array names are actually the starting address of the array which is why they are called pointer constants. In an array, the address stored in it cannot be changed during runtime, which means it is a pointer constant.
Hence the correct option is True.
Learn more about pointer:
brainly.com/question/20553711
#SPJ11
match the image-editing tools with their features.
The main tools with which a user may manage, improve, and change images are graphic software programmes, which can be roughly categorised as vector graphics editors, raster graphics editors.
What kinds of features exist in images?In computer vision and image processing, a feature is a piece of information about an image's content. It often pertains to whether a certain section of the image possesses particular characteristics.
What is a sample photo feature?A feature image is a news image that provides more in-depth coverage for a news story or recent news story but has no compelling reason to appear alongside the top stories.
To know more about software visit:-
https://brainly.com/question/985406
#SPJ1
is a variable a number
Answer:
No
Explanation:
A variable is like a symbol like a letter, that it used to describe a number.
Jake is a network administrator for a hospital. There is medical equipment that relies on having uninterrupted internet connectivity. Which of the following types of routing protocols should Jake focus on to ensure that the hospital's network connectivity remains reliable?
A. Interior dynamic routing protocols
B. Exterior dynamic routing protocols
C. Link state routing protocols
D. Distance vector routing protocols
In order to ensure that the hospital's network connectivity remains reliable, Jake should focus on A. Interior dynamic routing protocols.
Interior dynamic routing protocols are used by a router to transfer data within the same autonomous system (AS). The routing table of the router is modified by dynamic routing protocols based on the real-time scenario of the network. OSPF and EIGRP are examples of interior dynamic routing protocols. The dynamic routing protocols that are used for routing traffic between different autonomous systems (AS) are called exterior dynamic routing protocols. The protocols are designed for routers to communicate with other routers on a network. They allow information about the network topology to be shared between routers.
Learn more about network connectivity: https://brainly.com/question/28342757
#SPJ11
jordan, a software engineer, is responsible for maintaining the private piece of his company's internet network that is accessible to clients by means of a unique password. this piece of the company's network is known as the .
Jordan, as a software engineer, is responsible for maintaining the private piece of his company's internet network that is accessible to clients by means of a unique password. This piece of the company's network is known as the client portal or client access portal.
It is crucial that Jordan ensures the security and confidentiality of the information stored within this portal, and he must take all necessary measures to protect it from unauthorized access. This includes enforcing strong password policies, regularly updating passwords, and monitoring access to the portal to prevent any potential breaches.
The term "user account" refers to the distinct pairing of username and related password. One of the best methods for authenticating a user to grant access to the system and use of resources is that.
In a database, a username and password are always saved together. A user account is the name given to the combination of the two that constitutes it. Each user is uniquely identified by their user account, which also gives them access to the system.
A computer system might be configured with several user accounts, each with a unique username and password. Only through their unique user account, which is made up of their username and password, can the specific user access the computer system.
Learn more about unique password here
https://brainly.com/question/28565376
#SPJ11
recursive algorithms are usually less efficient than iterative algorithms? explain with the help of at least one example:
Iterative algorithms typically outperform recursive algorithms in terms of efficiency. Recursive methods don't need code to stop them from repeating, unlike loops.
Do recursive algorithms outperform iterative ones in terms of efficiency?Recursive algorithms are typically less effective than iterative algorithms. Divide and conquer and self-similarity are two essential problem-solving ideas that are the foundation of recursion. Recursive solutions work by resolving a smaller version of the original issue.
Why is iteration more effective than recursion?Recursion is significantly more expensive than iteration. Because every function calls must be saved in a stack to enable the return to the calling routines, it is typically much slower. There is no such overhead during iteration.
To know more about algorithms visit:-
https://brainly.com/question/22984934
#SPJ1
what is hackerrank election problem sql?
SQL is an industry-standard query language that works with relational databases. Unlike some earlier systems, queries are performed at server and only the results are passed to a client. This resulted in ability to work with large databases efficiently over a network.
HackerRank supports Microsoft SQL, MySQL, Oracle, and DB2 databases
I've recently started the SQL problems on the hackerrank and I've been happy with them so far. They've been a great way to get more practice in with SQL and learn bit more too
That will also help your SQL code challenges journey
It took me bit more than two weeks (on and off between work, workout, and taking the kid to day school, etc.) to finish all 58 SQL challenges on the site, and I gained quite some insights from journey (and having quite some fun doing that
Many of HackerRank cheaters are university students, says Ravisankar. "They are young and desperate to get job, and they want to share questions." But cheating risks getting you disqualified from the recruitment process entirely.
learn more about SQL at
https://brainly.com/question/25694408
#SPJ4
comple with correct answer
Simply select cell H2, click on the tiny square in its lower-right corner, and drag it down to cell H7 to duplicate the formula in cell H2 in the range H3:H7.
How can a formula from one cell be copied to a group of cells?To fill a formula, first pick the cell containing the formula, then select the cells below it, and then hit Ctrl+D. To fill the formula to the right in a row, hit Ctrl+R as well.
If you duplicate a formula What will Excel do when the formula is copied to a new cell?Using the mouse, select the formula in the cell, and then hit Ctrl + C to copy it.
To know more about cell visit:-
https://brainly.com/question/8029562
#SPJ1
There are six methods that can be used to enter functions. Many other tasks in Excel can be carried out in a variety of ways. Why does Microsoft give so many options, rather than just offering one way to do each task? Do multiple methods make things more confusing or less confusing? What has your experience been like, carrying out tasks in Excel (and other applications) in more than one way? Is it best to experiment with many methods, or stick with the first one you learn?
Microsoft provides multiple methods to perform tasks in Excel to accommodate users' different preferences and skill levels.
What is the explanation for the above ?Multiple methods can be helpful, allowing users to choose the one that suits their needs best.
However, too many methods can be overwhelming. Experimenting with different methods can be useful, but sticking with a tried-and-true method can also be efficient.
Skill level refers to a person's level of proficiency or expertise in a particular task or field, often based on their experience, training, and knowledge. It can vary from beginner to expert.
Learn more about Microsoft on:
https://brainly.com/question/26695071
#SPJ1
describe the two types of files that the linker works with in order to create an executable file. in your own words describe what happens when a user attempts to run the executable file
The two types of files that the linker works with to create an executable file are object files and library files. When a user attempts to run the executable file, the operating system loads it into memory, resolves any remaining external references, and starts executing the program from its entry point.
1. Object files: These are generated by the compiler after translating the source code into machine code. They contain the compiled code, data, and information about external references that need to be resolved.
2. Library files: These are collections of precompiled code that can be shared among multiple programs. They provide reusable functionality and help reduce the overall size of the executable.
When a user attempts to run an executable file:
1. The operating system loads the executable file into memory.
2. The operating system resolves any remaining external references (e.g., function calls or variables) in the executable file by looking up their addresses in the library files.
3. Once all external references are resolved, the operating system starts executing the program from its entry point (usually the "main" function).
4. The program runs and performs its intended tasks until it exits, either successfully or with an error.
Learn more about machine code here:
https://brainly.com/question/17041216
#SPJ11
Consider an application that transmits data at a steady rate (for example, the sender generates an N-bit unit of data every k unites of time, where k is sand fixed). Also, when such an application starts, it will continue running for a relatively long period of time. Answer the following questions, briefly justifying your answer: a) Would a packet-switched network or a circuit-switched network be more appropriate for this application? Why? b) Suppose a packet-switched network is used and the only traffic in this network comes from applications like that describe above. Furthermore, assume that sum of the application data rates is less than the capacities of each and every link. Is some form of congestion control needed? Why? What advantages does packet switching have over circuit switching?
For an application that transmits data at a steady rate over a long period, a circuit-switched network is more appropriate due to its dedicated and uninterrupted transmission.
How is this so?In a packet-switched network with such traffic, congestion control is still necessary to prevent network congestion.
Packet switching offers advantages of increased efficiency, flexibility, and cost-effectiveness by utilizing network resources more effectively, allowing shared usage, and eliminating the need for dedicated circuits.
Learn more about circuit-switched network at:
https://brainly.com/question/23179429
#SPJ4
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?
Assignee
Client
Delegate
Manager
Answer:
assignee
Explanation:
the expression single.tryparse("12.5", sngnbr) performs which of the following?
The expression attempts to parse the string "12.5" as a single precision floating-point number and stores the result in the variable sngNbr.
How does the expression Single.TryParse("12.5", sngNbr) work?The expression Single.TryParse("12.5", sngNbr) is a method call that attempts to parse the string "12.5" as a Single data type and stores the result in the variable sngNbr. Specifically, it uses the TryParse method of the Single data type to attempt to convert the input string to a Single value.
If the parsing is successful, the method returns true and assigns the converted value to the sngNbr variable. If the parsing fails, the method returns false, and the sngNbr variable is assigned the default value of 0.
Therefore, the expression attempts to parse the string "12.5" as a single precision floating-point number and stores the result in the variable sngNbr.
Learn more about expression
brainly.com/question/28170201
#SPJ11
How to draw a 3d isometric drawing for a grain crusher
To draw a 3D isometric drawing of a grain crusher, follow these steps: Start by drawing the base shape of the grain crusher. Draw a rectangular prism on your paper or canvas. This will be the foundation of the crusher.
Add depth and dimension to the base shape by drawing diagonal lines from the corners of the front face of the prism towards a vanishing point. This creates the isometric perspective. Sketch the top part of the grain crusher. Depending on the design, it could include a hopper, crushing mechanism, and discharge chute. Use basic geometric shapes and lines to represent these elements. Continue adding details to the crusher, such as knobs, switches, or buttons. Remember to maintain the isometric perspective by drawing lines at a 30-degree angle.
learn more about 3D isometric drawing here:
https://brainly.com/question/28244293
#SPJ11
Using the sort feature in a table sorts selected content in what order?.
The sort feature in a table sorts selected content in ascending or descending order. It rearranges data in either alphabetical order (for text) or numerical order (for numbers).
Sorting a table helps in finding specific information quickly and easily. For example, if you are working with a large table, you can sort it based on a column that contains the required information. Sorting is usually applied to the whole table, but it is also possible to apply it to a specific part of the table.
In Microsoft Excel, the sorting tool can be found in the Home tab. Once you have selected the column that you want to sort, click on the "Sort A to Z" or "Sort Z to A" buttons. A to Z will sort in ascending order, and Z to A will sort in descending order.Sorting is an essential tool when working with large datasets and is a simple way to organize data in a more manageable way.
To know more about table visit:
https://brainly.com/question/14231889
#SPJ11
Which of the following statements is TRUE?
Joining tables or using a subquery may produce the same result.
The degree of a relationship is the number of attributes that are associated with it.
The E-R model is used to construct a logical model.
The DELETE TABLE command is used to remove a table from the database.
The statement that is TRUE is: Joining tables or using a subquery may produce the same result.
Joining tables and using subqueries are both techniques used in SQL to retrieve data from multiple tables based on certain conditions. Joining tables involves combining columns from two or more tables based on a common column, while subqueries involve using a query inside another query to retrieve data from one or more tables.
In some cases, the result of joining tables and using subqueries may be the same, although the underlying mechanics of the queries are different. Joining tables is generally more efficient for large datasets, while subqueries may be more appropriate for smaller datasets or when more complex logic is required.
The other statements in the options are not true:
The degree of a relationship is not the number of attributes associated with it, but rather the number of entities that participate in the relationship.
The E-R model is used to construct a conceptual model, not a logical model.
The DELETE TABLE command is used to remove a table's data and structure from the database, not just the table itself. The correct command to remove a table from the database is DROP TABLE.
The true statement among the given options is: "Joining tables or using a subquery may produce the same result."
So, the correct answer is C.
Both joining tables and using a subquery are methods to retrieve data from multiple tables in a database. They can achieve similar outcomes depending on the specific requirements of the query.
The other statements have inaccuracies: the degree of a relationship refers to the number of entities involved, the E-R model is used to create a conceptual model, and the correct command to remove a table from the database is "DROP TABLE."
Hence the answer of the question is C.
Learn more about subquery at
https://brainly.com/question/30169182
#SPJ11
write a c program that reads this file and creates a normal human-readable text file from its contents. the new file should be called grades.txt. in this file, the data should appear in the same order, one record per line, but neatly aligned into fixed-width columns.
FILE *in_file = fopen("name_of_file", "r"); // read only
FILE *out_file = fopen("name_of_file", "w"); // write only
if (in_file == NULL || out_file == NULL)
{
printf("Error! Could not open file\n");
exit(-1); // must include stdlib.h
}
fprintf(file, "this is a test %d\n", integer);
fprintf(stdout, "this is a test %d\n", integer);
printf( "this is a test %d\n", integer);
fscanf(file, "%d %d", &int_var_1, &int_var_2);
fscanf(stdin, "%d %d", &int_var_1, &int_var_2);
scanf( "%d %d", &int_var_1, &int_var_2);
C Programming :
C is a programming language for general-purpose computers. Dennis Ritchie invented it in the 1970s, and it is still widely used and influential today. C's features are designed to accurately reflect the capabilities of the targeted CPUs. C, the successor to the programming language B, was created by Ritchie at Bell Labs between 1972 and 1973 to build utilities that ran on Unix. It was used to re-implement the Unix operating system's kernel. C gradually gained popularity during the 1980s. C compilers are available for almost all modern computer architectures and operating systems, making it one of the most widely used programming languages. Since 1989, ANSI (ANSI C) and the International Organization for Standardization have standardised C.
C is an imperative procedural language with a static type system that supports structured programming, lexical variable scope, and recursion. It was created to be compiled in order to provide low-level memory access and language constructs that map efficiently to machine instructions, all while requiring minimal runtime support. Despite its low-level capabilities, the language was designed to promote cross-platform development. With few changes to its source code, a standards-compliant C programme written with portability in mind can be compiled for a wide range of computer platforms and operating systems.
To learn more about c program refer :
https://brainly.com/question/15683939
#SPJ4
C is a programming language for general-purpose computers. Dennis Ritchie invented it in the 1970s, and it is still widely used and influential today.
What is mean by C Programming ?C is a programming language for general-purpose computers. Dennis Ritchie invented it in the 1970s, and it is still widely used and influential today. C's features are designed to accurately reflect the capabilities of the targeted CPUs. C, the successor to the programming language B, was created by Ritchie at Bell Labs between 1972 and 1973 to build utilities that ran on Unix. It was used to re-implement the Unix operating system's kernel. C gradually gained popularity during the 1980s. C compilers are available for almost all modern computer architectures and operating systems, making it one of the most widely used programming languages. Since 1989, ANSI (ANSI C) and the International Organization for Standardization have standardised C.
FILE *in_file = fopen("name_of_file", "r"); // read only
FILE *out_file = fopen("name_of_file", "w"); // write only
if (in_file == NULL || out_file == NULL)
{
printf("Error! Could not open file\n");
exit(-1); // must include stdlib.h
}
fprintf(file, "this is a test %d\n", integer);
fprintf(stdout, "this is a test %d\n", integer);
printf( "this is a test %d\n", integer);
fscanf(file, "%d %d", &int_var_1, &int_var_2);
fscanf(stdin, "%d %d", &int_var_1, &int_var_2);
scanf( "%d %d", &int_var_1, &int_var_2);
C is an imperative procedural language with a static type system that supports structured programming, lexical variable scope, and recursion. It was created to be compiled in order to provide low-level memory access and language constructs that map efficiently to machine instructions, all while requiring minimal runtime support. Despite its low-level capabilities, the language was designed to promote cross-platform development. With few changes to its source code, a standards-compliant C programme written with portability in mind can be compiled for a wide range of computer platforms and operating systems.
To learn more about c program refer to :
brainly.com/question/15683939
#SPJ4
the use of technology to transmit payments electronically eliminates the labor-intensive practices and delays involved in processing checks.
Due to the use of technology to transmit payments electronically, Banks both in the US and the UK are keen to drastically reduce the usage of cheques to save costs for themselves and for their business customers.
Online Payment Importance and benefits:
Electronic payment advancements have created numerous opportunities for businesses to grow faster. Electronic payments have constantly advanced, making them a smooth, quick, and easy way to make payments. You are no longer required to visit a bank to deposit your payments.
Here are five more advantages of online payments:
1. Immediate Payment
Online payments are faster than traditional methods of payment such as cash or check. When it comes to online payment, there are no time or location constraints. You can make the payment at any time from anywhere in the world.
2. Increased Security
Tokenisation, encryption, SSL, and other security measures are available to make online payments more secure. Customers no longer have to enter their credit card information every time they make a purchase.
3. Ease of use
Online payments can assist businesses in providing a convenient payment experience to their customers. Customers can purchase goods on credit and pay for them later.
4. Reduces processing costs.
In exchange for a high fixed cost, the processor provides you with the payment gateway for processing.
5. No contact
Contactless payments result in faster transactions and shorter lines in stores. To avoid contact when accepting online payments, use contactless POS terminals in your business. In this system, the payee simply holds their phone near the terminal, and the payment is processed automatically.
To learn more about Electronic/Digital payment, visit: https://brainly.com/question/13719256
#SPJ4
which command is used to list all columns in ms sql server? a. describe b. select c. show d. list e. all of the above f. none of the above
The "Select" command is often used in Microsoft SQL Server to query and retrieve data from a table. Therefore, the correct option is B.
You can choose which columns to include in the result set by specifying them. You can retrieve all columns from a table, either by using the wildcard symbol (*) or by specifically specifying column names in a "select" query.
Additionally, you can filter, sort, and transform data using various clauses such as WHERE, ORDER BY, GROUP BY, JOIN, and more. A key element of SQL queries, the "Select" command is essential for getting specific column data from tables in Microsoft SQL Server.
Therefore, the correct option is B.
Learn more about Microsoft SQL Server, here:
https://brainly.com/question/30389939
#SPJ4
A threat actor programs an attack designed to invalidate memory locations to crash target systems. Which statement best describes the nature of this attack?
a. The attacker created a null pointer file to conduct a dereferencing attack.
b. The attacker programmed a dereferencing attack.
c. The attacker programmed a null pointer dereferencing exception.
d. The attacker created a race condition to perform a null pointer dereferencing attack.
The best answer that describes the nature of that attack is C. The attacker programmed a null pointer dereferencing exception.
A buffer overflow attack happened if an attacker exploits a known vulnerability in an application (for example, an error in an application that permitted that application to write to an area of memory (that is, a buffer) dedicated to a different application), which could cause another application to crash. There are three kinds of hackers in the world of information security: black hats, white hats and grey hats.
You can learn more about the nature of attack at https://brainly.com/question/28527128
#SPJ4
what is the name of a short-range wireless technology used for interconnecting devices like a cell phone and speakers? radio frequency id far field connectivity zigger bluetooth
The name of the short-range wireless technology used for interconnecting devices like a cell phone and speakers is Bluetooth.
Bluetooth technology allows for wireless communication between devices over short distances. It operates on radio frequency and is commonly used for connecting various devices such as smartphones, tablets, speakers, headphones, and other peripherals. Bluetooth provides a convenient and reliable wireless connection for audio streaming, file transfer, and device control, making it widely adopted in consumer electronics and IoT applications.
Bluetooth allows for seamless audio streaming, file sharing, and device synchronization without the need for physical cables. The technology operates on radio frequency and provides a convenient and reliable means of wireless connectivity between compatible devices.
To know more about Bluetooth, visit:
brainly.com/question/28258590
#SPJ11
Why is compression important for video
streaming?
Oto increase the number of frames per second
so that motion appears smooth
Oto watch video without waiting for it to
download
O to improve image quality
O to increase file size
DONE✔
Question
Compression, important for video streaming to watch video without waiting for it to download.
The technique of compressing a video file such that it takes up less space than the original file and is simpler to send across a network or the Internet is known as video compression.
Since compression makes it possible for video data to be transferred over the internet more effectively, it is crucial for video streaming. The video files are often huge, they would take an extended period to download or buffer before playback if they weren't compressed.
Learn more about video, here:
https://brainly.com/question/9940781
#SPJ1
How much of a song can I use in a project?
Well, if it's for a YT video then you can only use royalty-free songs for example, Jazzy Frenchy or The Elevator Bossa Nova. You can't really use major artist's songs or else you'll get copyright claimed. As long as you give credit to the royalty-free songs you'll be fine.
I don't know what you're using to make a project, but from my point of view if you're making a Scratch project then you can use any song (royalty-free or not) as long as you give credit.
It really just depends on what you're using to make the project and make sure to read the rules on copyright-claimed songs and to make sure that you can use them.
What are the two pre defined anti-spyware policies?
The two pre-defined anti-spyware policies are generally referred to as "Basic" and "Advanced" policies. These policies are designed to provide a starting point for organizations to protect their systems from spyware and other potentially unwanted software.
The Basic policy focuses on detecting and blocking commonly known spyware and potentially unwanted applications (PUAs). This policy aims to provide a good balance between protection and performance, as it detects a broad range of threats without causing a significant impact on system resources.
The Advanced policy, on the other hand, offers a more comprehensive level of protection. It is designed to detect and block a wider range of spyware, including less common and emerging threats, as well as potentially unwanted applications that may have a negative impact on system performance or user privacy. This policy may result in more false positives, but it provides an increased level of security for organizations with higher risk profiles or sensitive data.
Both Basic and Advanced anti-spyware policies are pre-defined, meaning they are ready to be deployed without extensive customization. However, organizations can also create their own custom policies based on their specific needs and threat landscape. It is crucial for organizations to keep their anti-spyware policies up to date and continuously monitor the effectiveness of their chosen policy to maintain a high level of protection against evolving threats.
Learn more about anti-spyware here:
https://brainly.com/question/12859638
#SPJ11
what is this answer?
Answer:
ITS ALL ABOUT C
Explanation:
READ IT CAREFULLY
What is the main difference between structured and unstructured data?
Answer:
answer is 4.
Explanation:
for an instance let's say you've got to make list of students who would stay after school for sports.then you have to collect data such as Student name _gender _the sport he or she will attend to. Then you get three columns of table to do that when you write those you can get a clear information seeing those data..
Why does the evolving technology help the entrants more than the incumbents? 1) Because the incumbents do not have the means to use the new technology 2) Because the entrants can create technology faster than incumbents 3) Because incumbents do not like new technology and neither do their customers 04) Because the entrants can use the technology to target customers that do not currently have solutions 5) Because the incumbents already have a strong customer base and do not see the point of adding new technology Which one of the following factors contributes to enterprises becoming successful in the long run? 1) By leveraging the technological core and their business model. 2) The ability to understand the consumer better and create products that solve their consumers' job. 3) Plan and forecast based on correlated data. 4) By keeping all of the elements of servicing the customer under their control. Which statement best describes the "Theory of Disruptive Innovation"? 1) Disruptive Innovation is the process by which technology eliminates friction and improves efficiency within various e-commerce, retail, and commercial banking transactions. 2) Disruptive Innovation is the process by which technology enables entrants to launch inexpensive and more accessible products and services that gradually replace those of established competitors. 3) Disruptive Innovation is the process by which technology generates data for. and executes instructions from, Al-enabled systems within retail and manufacturing industries. Disruptive Innovation is the process by which technology enables entrants to launch inexpensive and more accessible products that work collectively with today's comparable market offerings. 5) None of the above. 4)
Evolution of technology helps the entrants more than the incumbents because entrants can use technology to target customers that do not currently have solutions. Entrants can create technology faster than incumbents, and they are not limited by legacy systems that incumbents are stuck with.
They have the agility to innovate and change direction as necessary to keep pace with technological advances. The incumbents are at a disadvantage because they have already established customer bases and a strong reputation, and they are unlikely to be willing to risk losing that by adopting new technology that may not be as reliable as what they already have. So, the evolving technology helps the entrants to compete with the incumbents.
One of the factors that contributes to enterprises becoming successful in the long run is the ability to understand the consumer better and create products that solve their consumers' job. By leveraging the technological core and their business model, businesses can ensure that their products are meeting the needs of their customers. Plan and forecast based on correlated data is another important factor in the success of enterprises.
Learn more about Evolution of technology: https://brainly.com/question/7788080
#SPJ11
What does this say in morse code?
-. . ...- . .-. / --. --- -. -. .- / --. .. ...- . / -.-- --- ..- / ..- .--.
Answer:
That it is time for lunch?
Explanation:
Answer:
Never gonna give you up
Explanation:
can't believe I fell for that
Which optional features are available when creating a new appointment? Check all that apply.
location
agenda
reminder
categorize
Quick Print
Answer:
A. Location
C. Reminder
D. Categorize
Hope this helps! :D
Answer:
A C D
Explanation:
If anyone can help with this I will be forever grateful.
The assignment is to design a modular program using pseudocode and a flowchart displaying a person's BMI using the formula weight x 703/height^2. I have been trying to make corrections (because I accidentally wrote in python code). Here is what I have so far...
If someone could help with the code, I will be able to figure out the flowchart much easier. Thank you!
Answer:
Following is the program given in C++ language.
All the necessary comments are added into the program to make the concept clear.
I hope it will help you!
Explanation:
Given a gvdie object and an integer that represents the total sum desired as parameters, complete function roll total() that returns the number of rolls needed to achieve at least the total sum. note: for testing purposes, the gvdie object is created in the main() function using a pseudo-random number generator with a fixed seed value. the program uses a seed value of 15 during development, but when submitted, a different seed value will be used for each test case.
The rollTotal() function returns the number of rolls needed to achieve at least the total sum given a gvdie object and the total sum desired as parameters.
The equation to solve for the number of rolls needed is (total sum desired / gvdie object result) rounded up to the nearest integer. For example, if the total sum desired is 8 and the gvdie object result is 3, then the number of rolls needed is 3 (8/3 = 2.667 rounded up to 3).
Thus, the formula for solving for the number of rolls needed is ceil(total sum desired / gvdie object result). Where ceil is the ceiling function that rounds the number to the nearest integer.
For more questions like Function click the link below:
https://brainly.com/question/16201524
#SPJ4