Dr Shah is a highly superstitious fellow. He is such a nutjob, he pays visits to his numerologist every month! The numerologist is a troll and gives Dr Shah random advice upon every visit and charges him a bomb. Once the numerologist gave him two digits m & n and recommended that Dr Shah should avoid all numbers that contain these two digits. This essentially means Dr Shah avoid Tickets, currency notes, listing calls from such phone numbers, boarding vehicles etc that have these numbers on them!! For Dr Shah, a number is called a favorable number if it does not contain the digits m & n. For example, suppose m = 3, n = 2 45617 would be a favourable number, where as 49993 and 4299 are not. In fact, the first 20 numbers that do not contain m = 3, n = 2 are: 1, 4, 5, 6, 7, 8, 9, 10, 11, 14, 15, 16, 17, 18, 19, 40, 41, 44, 45, 46 we say 46 is the 20th favorable number for m = 3, n = 2. Write a C program that take values for s m & n and N as inputs, and outputs the Nth favorable number. Example 1: Input: 34 300 where: m = 3, n = 4, N = 300 Output: 676 Explanation: because 676 is 300th number that does not contain 3 or 4. E

Answers

Answer 1

Here is a C program that takes values for s, m, n and N as inputs and outputs the Nth favorable number:

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

int main()

{

   int s, m, n, N;

   scanf("%d %d %d %d", &s, &m, &n, &N);

   int count = 0;

   int i = 1;

   while (count < N)

   {

       int num = i;

       int flag = 0;

       while (num > 0)

       {

           if (num % 10 == m || num % 10 == n)

           {

               flag = 1;

               break;

           }

           num /= 10;

       }

       if (!flag)

       {

           count++;

           if (count == N)

           {

               printf("%d", i);

               break;

           }

       }

       i++;

   }

   return 0;

}

Here is an explanation of how the program works:

The program takes four integer inputs: s, m, n and N. It initializes two variables: count and i. It enters a while loop that continues until count is equal to N. Inside the loop, it checks if the current number (i) contains the digits m or n. If it does not contain either digit, it increments count by 1. If count is equal to N, it prints the current number (i) and exits the loop. If count is not equal to N, it increments i by 1 and repeats the loop.

For example, if s = 34, m = 3, n = 4 and N = 300, then the output of the program would be:

676

This is because 676 is the 300th number that does not contain either digit 3 or digit 4.

LEARN MORE ABOUT C program here: brainly.com/question/23866418

#SPJ11


Related Questions

What is burning in Computers and technology

Answers

The reason the term "burn" is used is because the CD-writer, or burner, literally burns the data onto a writable CD. The laser in a CD-writer can be cranked up to a more powerful level than an ordinary CD-ROM laser. This enables it to engrave thousands of 1's and 0's onto a CD.

So that is why people talk about "burning" songs or files to CDs. They could just say they are "writing" the data to a CD, and it would make sense, but people seem to think "burning" sounds cooler.

Answer:

Burn-in is a test in which a system or component is made to run for an extended period of time to detect problems. Burn-in may be conducted to ensure that a device or system functions properly before it leaves the manufacturing plant or may be part of a repair or maintenance routine.

Explanation:

hope this helps

how can online presence help others?

Answers

Answer:

Online Presence helps others who might be naturally introverted, stuck in a precarious situation, or even by allowing someone company who desperately needs it.

Explanation:

Complete the sentence.
A computer consists of two or more computers connected to each other.


network
switch
server
router

Answers

Answer:

its a network

Explanation:

that is how it is called

what makes the young love tec

Answers

On their computers or mobiles. There essential communication and ind info tools.

Answer:

because it distracts them from realitiy plus its entertaining

Explanation:

The aat-100 automatic antenna tuner covers which requency range?.

Answers

The AAT-100 Automatic Antenna Tuner is designed to cover the frequency range from 1.8 to 54 MHz. It is a high-performance automatic tuner capable of matching a wide range of antennas, feedlines, and transceivers.

The AAT-100 Automatic Antenna Tuner is a versatile and easy-to-use device that provides fast and accurate tuning across a wide frequency range. It uses advanced circuitry and algorithms to automatically match the impedance of your antenna to the impedance of your transceiver, ensuring maximum power transfer and minimum loss.The AAT-100 Automatic Antenna Tuner is capable of handling a wide range of input power levels, from 5 to 200 watts, making it suitable for use with a variety of amateur radio transceivers.

It also features a built-in SWR meter and automatic bypass function, which allows you to quickly switch between tuned and untuned modes without having to manually adjust your tuner settings.With its compact design, intuitive interface, and advanced performance features, the AAT-100 Automatic Antenna Tuner is a must-have accessory for any amateur radio operator looking to optimize their antenna system and maximize their signal strength.

To know more about Antenna visit:

https://brainly.com/question/31248626

#SPJ11

why can’t the pm use the organization’s current information system for project monitoring and reporting?

Answers

PM needs to provide regular updates to stakeholders who require concise and actionable information. In such cases, the PM may have to invest in a dedicated system that is specifically designed for project monitoring and reporting.

There are several reasons why the project manager (PM) may not be able to use the organization’s current information system for project monitoring and reporting. These reasons are discussed below:Lack of Compatibility:One of the primary reasons why the PM may not be able to use the organization’s current information system is due to a lack of compatibility between the system and the project’s requirements.

The current system may not have the necessary features or functions to monitor and report on the project’s progress. As such, the PM may have to invest in a new system that is specifically designed for project monitoring and reporting.Cost:The cost of purchasing and implementing a new system can be a significant obstacle for many organizations. Even if the current system is not suitable for the project’s needs, the organization may be unwilling or unable to invest in a new system.

To know more about stakeholders  visit:-

https://brainly.com/question/30241824

#SPJ11

how to find radius of the base examples ​

Answers

Answer:radius is half the diameter

Explanation:

1. What is an AUP? (1 point)
O the abbreviation for the school administrator in an online education environment
a document outlining what is acceptable behavior when using the Internet for schoolwork
a policy outlining the proper formatting to use in Microsoft Office documents for online education
O a short course students can take to understand the school's policies better

Answers

The term AUP is option B: a document outlining what is acceptable behavior when using the Internet for school work.

What is an AUP?

An Acceptable Use Policy (AUP) is a set of rules and guidelines that outline the appropriate and responsible use of a school's computer equipment, networks, and other digital resources. It is designed to protect the school's technology infrastructure, as well as the privacy and security of students, teachers, and other users.

An AUP may include guidelines for a variety of activities, such as:

Accessing and using the school's computer networks and equipmentUsing the Internet for schoolwork, research, and communicationProtecting personal privacy and security onlineUsing social media and other online communication toolsDownloading and installing software and apps

Therefore, based on the context of the above, i can say that an AUP may also specify the consequences for violating the terms of use, which can include disciplinary action, revocation of access to digital resources, and other penalties.

Learn more about Acceptable Use Policy from

https://brainly.com/question/24951641
#SPJ1

what is the full form for OMR?

Answers

Answer:

The full form of OMR is Optical Mark Recognition

Which of the following is a country that cruise ships commonly sail under the flag of?
O United States
O Canada
O Panama
O South Africa
< Previous

Answers

Answer:

Panama

hope this helps!

which server would a client/server network include to ensure only authorized users are logging onto the network

Answers

To answer in a client/server network, the server that ensures only authorized users are logging onto the network is called an "authentication server." This server manages user credentials and verifies them before granting access to the network resources. Here's a step-by-step explanation of how it works:

1. A user attempts to log onto the network by providing their username and password.
2. The client device sends the login credentials to the authentication server.
3. The authentication server checks the provided credentials against its database of authorized users.
4. If the credentials match an authorized user, the server grants access to the network.
5. If the credentials do not match, the server denies access and may send an error message to the client device.

By utilizing an authentication server, a client/server network can effectively control access and ensure that only authorized users are granted access to the network resources.

What is network server? https://brainly.in/question/40796054

#SPJ11

Ryan is designing an app that needs to quickly send low quality photos between users. Most smartphones take much higher quality photos than Ryan needs for his app. Which answer best describes the type of compression Ryan should choose and why?
A. Lossless compression since it ensures perfect reconstruction of the photo.
B. Lossy compression since it ensures perfect reconstruction of the photo.
C. Lossless compression since it typically results in smaller data sizes.
D. Lossy compression since it typically results in smaller data sizes.

Answers

Answer:

D. Lossy compression since is typically results in smaller data sizes.

Explanation:

You could use C, but it technically wouldn't work since Ryan wants to design an app that sends low-quality photos. A or B won't work either because perfect reconstruction of the photo is not important.

Things Explained: Digital Citizenship

Answers

...a person who has the knowledge and skills to effectively use digital technologies to communicate with others...

in planning your multimedia, whether you chose to use powerpoint or a more sophisticated programs with scaling features, be sure to

Answers

In planning your multimedia, whether you chose to use PowerPoint or a more sophisticated programs with scaling features, be sure to A: limit the number of words per slide.

What is the multimedia about?

When planning multimedia presentations, it is important to limit the amount of text on each slide to ensure that the audience can easily read and comprehend the information being presented. Slides should be visually appealing and use images to support the message, but not overwhelm it.

Using multiple font styles, sizes, and colors can make the presentation look cluttered and distracting, and it's generally best to stick to a consistent font style and size throughout the presentation.

Finally, it's important to avoid putting everything you have to say on a slide, as this can cause the audience to focus on reading the slide instead of listening to the presenter. Instead, use the slides to support and enhance the spoken message.

Read more about multimedia here:

https://brainly.com/question/24138353

#SPJ1

See full question below

In planning your multimedia, whether you chose to use PowerPoint or a more sophisticated programs with scaling features, be sure to

Multiple Choice

limit the number of words per slide.

utilize lots of images.

make sure you have plenty of special effects.

use multiple font styles, sizes, and colors.

put everything you have to say on a slide.

Submit your definitions for the words below:

gigabyte
intranet
pixel
telecommunication
modem
raster graphic
vector graphic
digital
GUI

Answers

Answer:

1. gigabyte- Technology branded as GIGABYTE or sometimes GIGA-BYTE; formally GIGA-BYTE Technology Co., Ltd. it is a Taiwanese manufacturer and distributor of computer hardware. Gigabyte's principal business is motherboards.

2. intranet-a computer network for sharing information, collaboration tools, operational systems, and other computing services within an organization, usually to the exclusion of access by outsiders.

3.  pixel-a minute area of illumination on a display screen, one of many from which an image is composed.

4. telecommunication-the transmission of information by various types of technologies over wire, radio, optical or other electromagnetic systems.

5. modem- a  combined device for modulation and demodulation, for example, between the digital data of a computer and the analog signal of a phone line.

6. raster graphic-In computer graphics and digital photography, a raster graphic or bitmap image is a dot matrix data structure that represents a generally rectangular grid of pixels (points of color), viewable via a bitmapped display (monitor), paper, or other display medium.

7.  vector graphic-computer graphics images that are defined in terms of points on a Cartesian plane, which are connected by lines and curves to form polygons and other shapes.

8.  digital-expressed as series of the digits 0 and 1, typically represented by values of a physical quantity such as voltage or magnetic polarization.GUI-a system of interactive visual components for computer software.

9. GUI- displays objects that convey information, and represent actions that can be taken by the user. The objects change color, size, or visibility when the user interacts with them.punineep and 15 more users found this answer helpful4.0(6 votes)

Explanation:

clicking what button in cengagenowv2 will allow you to quickly evaluate the work you have attempted without submitting the assignment (assuming your instructor has made this option available)?

Answers

In CengageNowv2, the button that allows you to quickly evaluate the work you have attempted without submitting the assignment (if your instructor has enabled this option) is the "Check My Work" button.

The "Check My Work" button is typically located near the question or task you are working on. By clicking this button, you can receive immediate feedback on your response or solution. It helps you verify if your answer is correct or if there are any mistakes or errors that need to be addressed.

This feature allows you to self-assess your progress and make necessary adjustments before submitting the assignment. It promotes a better understanding of the material and provides an opportunity for self-correction. It can also help you identify areas where you may need additional study or practice.

It's important to note that the availability of the "Check My Work" button depends on your instructor's settings for the specific assignment, so it may not be available for all assignments or in all courses

Learn more about instructor here

https://brainly.com/question/30130277

#SPJ11

what type of loop? A For Loop?

Answers

Answer:

A for loop is one type of loop commonly used in programming languages. It allows you to execute a code block a specified number of times, typically using a counter variable to keep track of the loop iterations.

Other loops include while loops, which continue to execute a block of code as long as a specific condition is accurate, and do-while loops, which are similar to while loops but consistently execute the block of code at least once.

There are also other specialized loops, such as for each loop, which is used to iterate over elements in a collection, and range-based loops, which iterate over a range of values.

The choice of loop type depends on the specific task and the program's requirements.

Explanation:


Computer Systems Servicing

what are the steps in 5s program​

Answers

you can just search that up on googl and it will show up

\hope I helped :)

Gps has fostered many benefits in our society, but have also added some risks. What is a risk of gps?

Answers

GPS is a global positioning system that tells direction and routes. Some risks that come along with GPS are inaccuracy, distraction, and lack of knowledge.

What is GPS?

GPS is a radio navigation system based on the satellite and is used to navigate the directions with the help of the signals. Though it has many benefits also has disadvantages. It sometimes does not show accurate routes and direction that is too long.

The navigation system causes distraction during driving and may cause an accident. Too much reliance on GPS causes a lack of knowledge in remembering the directions and places. It may sometimes lead to crime as the saved information and be leaked.

Therefore, GPS has advantages and disadvantages too.

Learn more about GPS here:

https://brainly.com/question/6905079

#SPJ4

A(n) _____, such as microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Answers

A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

What is a personal information manager PIM software?

A personal information manager (PIM) is known to be a kind of a software application that is known to function by the use of  tools to help one or computer users to be able to handle and monitor contacts, calendars, tasks, appointments as well as other forms of personal data.

Therefore, A(n) option b. ​personal information manager (PIM), such as Microsoft outlook, includes a private calendar, a to-do list, and powerful contact management features.

Learn more about ​personal information manager (PIM) from

https://brainly.com/question/23664875

#SPJ1

A(n) _____, such as Microsoft Outlook, includes a private calendar, a to-do list, and powerful contact management features.

a. swim lane

b. ​personal information manager (PIM)

c. ​fact-finding application

d. ​enterprise architecture

Define function print_popcorn_time() with parameter bag_ounces. If bag_ounces is less than 3, print "Too small". If greater than 10, print "Too large". Otherwise, compute and print 6 * bag_ounces followed by "seconds". End with a newline. Remember that print() automatically adds a newline.

Answers

Answer:

In Python:

def print_popcorn_time(bag_ounces):

   if bag_ounces < 3:

       print("Too small")

   if bag_ounces > 10:

       print("Too large")

   else:

       print(str(6 * bag_ounces)+" seconds")

       

Explanation:

This defines the function

def print_popcorn_time(bag_ounces):

This checks if bag_ounces < 3

   if bag_ounces < 3:

If yes, it prints too small

       print("Too small")

This checks if bag_ounces > 10

   if bag_ounces > 10:

If yes, it prints too big

       print("Too large")

If otherwise,

   else:

Multiply bag_ounces by 6 and print the outcome

       print(str(6 * bag_ounces)+" seconds")

Answer:

Explanation:

def print_popcorn_time(bag_ounces):

  if bag_ounces < 3:

      print("Too small")

  elif bag_ounces > 10:

# Use of 'if' for this portion, will only yield a test aborted for secondary tests

      print("Too large")

  else:

      print(str(6 * bag_ounces)+" seconds")

user_ounces = int(input())

print_popcorn_time(user_ounces)

A data breach is the protection of secure data in an unsecured environment.
True
False

Answers

Answer: i think its true

Explanation: have a good day!

Explain the major difference between the least effective hierarchy of controls and the other four controls. Why is it the least effective? Be specific in your response, and include examples of your work environment.
Your response must be at least 200 words in length.

Answers

Hierarchy of controls refers to the systematic elimination of workplace hazards to reduce or eliminate risks associated with these hazards.

The hierarchy of control measures follows a systematic approach of identifying, assessing, and controlling workplace hazards to promote safety in the workplace. There are five main types of the hierarchy of controls, including elimination, substitution, engineering controls, administrative controls, and personal protective equipment (PPE).

The elimination of hazards is the most effective control measure, while the least effective control measure is PPE. PPE is the last line of defense in the hierarchy of control measures, as it is not designed to eliminate or minimize workplace hazards. Instead, PPE is designed to protect workers from workplace hazards once all other control measures have been implemented and have failed to reduce the risk of exposure.

To know more about systematic visit :

https://brainly.com/question/28609441

#SPJ11

Which file attribute identifies the file as having been modified since the last backup?.

Answers

Archive File Definition

The meaning of the word Archive in the Online Computer Dictionary is used to make a copy of a backup file with the aim of protecting the original copy from damage.

How to Archive Files Into 1 File

If you want to send a large number of files, you can make the file into 1 archive file format with .zip, .tar, or .rar format first.  This method is also quite easy and fast.

First, make sure your computer has programs such as winzip, winrar.  This program is needed to archive files.

Second, you can select the file you want to archive, then right-click on the file.  The example below shows 2 files to be archived

The third step, you can directly select Add to “folder name.rar” to directly create archive files automatically.  If you want to do some settings, it can be done by selecting the Add to archive option. The Add to archive option allows you to choose the save format of the file, divide or create the archive into several parts (part 1, part 2, etc.), to create a password.  With the password, before the file can be extracted, it is necessary to enter the password first.

In addition to files, you can also archive folders directly along with the contents of the files in it.  Keep in mind, how fast the process of archiving this file will depend on how many or large files to be archived.

Learn more about archive files athttps://brainly.com/question/15355917.

#SPJ4

GUIDING QUESTIONS
1. What are two ways to effectively reach customers/clients?

Answers

Answer:

phone calls

Explanation:

when a customer comes and u keep their data and information.incase of anything u can likely reach them on phone

Will give Brainliest 100 points answer only if you know
What are the four main components of programming languages, and why is each one needed?

Answers

Answer:

The four main components of programming languages are variables, control structures, data structures, and syntax.

Explanation:

The four main components of programming languages are variables, control structures, data structures, and syntax. The variables are used to store information that can be stored and manipulated in a computer program. They provide a way of labeling data with a descriptive name, so our programs can be understood more clearly. Control structures are the building blocks of computers programs. They are commands that enable a program to “take decisions.” Data structures is a data organization, management, and storage format that enables efficient access and modification. More precisely, a data structure is a collection of data values. Syntax of a computer language is the set of rules that defines the combinations of symbols that are considered to be correctly structured statements or expressions in that language. Syntax therefore refers to the form of the code.

Hope this helped :)

Please like this and rate it 4 or 5 stars.

a drive-by attack cannot install malicious software as long as you do not click on any links on the website visited? true

Answers

The given statement is false.

A drive-by attack can install malicious software even without clicking on any links on the visited website. Drive-by attacks exploit vulnerabilities in web browsers, plugins, or the underlying operating system to silently download and execute malicious code. This can happen through malicious scripts or exploit kits embedded in web pages. Simply visiting a compromised website can be enough for the attack to occur, without any user interaction like clicking on links. Drive-by attacks highlight the importance of keeping software and systems up to date with the latest security patches to mitigate potential vulnerabilities.

To know more about malicious software click here,

https://brainly.com/question/14309905

#SPJ11

write a reflection on what you have learned for this week. write your answer on the space inside the cloud.(Minimum of 30 words)​

Answers

Answer:

“I think it’s about putting yourself in the students’ shoes and seeing how a first-time student, maybe someone who hasn’t even taken chemistry before, is looking at it.”

—Valerie Taraborelli, undergraduate chemistry student, University of Arizona

What feature enables you to share information with the authors of documents

Answers

Comments enables you to share info with authors?

what are the methods of gilding

nonsense will be immediately reported. ​

Answers

Methods of gilding include hand application and gluing, typically of gold leaf, chemical gilding, and electroplating, the last also called gold plating. Parcel-gilt (partial gil) objects are only gilded over part of their surfaces.
Other Questions
kinetic energy is energy that an object possesses because of its For which values of A, B, and C will AX +BY=C be a vertical line through the point (8,6) A. A=1, B=0, C=6B. A=1, B=0, C=8C. A=0, B=1, C=6D. A=0, B=1, C=8 How did you know that ordered pair satisfies the linear inequality in two variables? Which state of matter is being described below? it can be squashed easily, spreads out slowly, has low density, 4. suppose that the index of prices received by farmers for 2015 was 0.97 and the base year of this index was 2000. then, a. relative to 2015, farm prices were 97% higher in 2000. b. relative to 2000, farm prices were 3% lower in 2015. c. relative to 2015, farm prices were 3% lower in 2000. d. relative to 2000, farm prices were 97% higher in 2015. Read the passage below. When I first saw my friends playing soccer at recess, I was not sure I wanted to play. I had never played soccer before and, therefore, was not sure I would be very good at it. I decided to observe the game for a while before deciding, so I sat on the bench and watched my friends run around, laugh, and cheer for each other. They all appeared to be having a great time. Finally, I decided to get on the field and give the game of soccer a try. Which signal word indicates what event happened the last? What was the capital city of the Byzantine empire?A.AlexandriaB.Constantinople C.DamascusD.Rome Raz cuadrada de 955 ecuacin porfaaaaaa es para hoyyyyy Property to find the sum or product identify the property you used 6 x 43 help asap please! working out is not required^^ Background information: In 1917, Vladimir Leningave a speech in which he expressed his feelingsabout the provisional government.According to Lenin, why should the people be unhappywith the provisional government? Check any that apply. What facts can we learn from the testimony of josephus? Batalla, desarrollada en la Pennsula Ibrica, quecontuvo el avance musulmn.a) Poitiersb) Guadaletec) Laguna Juradad) Covadongae) Chalons 2) Find the area. *7 points12 cm2 cm4 cm6 cm24O 123648 At Cals Computer Warehouse, Cal wants to know the probability that a customer who comes into his store will buy a computer or a printer. He collected the following data during a recent week: 327 customers visited the store, 196 purchased computers, 72 purchased printers, and 87 made no purchase Kevin collects rain water in a container shaped like a rectangular prism. After a thunderstorm, he notices the container is two-thirds of the way full. How much rain water is in the container? jabaris cat has a mass of 4.2 kg the cat needs 0.224 mg of medicine for each kilogram of its mass what is the total of medicine the cat needs pls help its timed pls be fr Answer this please? A hockey net is 1.8 m wide. A player is 6 m from one goal post and 6.7 m from the other. WithinWhat angle must she Keep her shot in order to score a goal?