I am working on 8.8.6 "Totals of Lots of Rolls" in codeHS javascript and
I do not know what to do can someone help me?

Answers

Answer 1

Using the knowledge in computational language in JAVA it is possible to write a code that rolls a 6-sided die 100 times.

Writting the code:

var counts = [0, 0, 0, 0, 0, 0, 0];

for (var i = 0; i < 100; i++) {

   counts[Math.floor(1 + Math.random() * 6)]++;

}

console.log('You rolled ' + counts[1] + ' ones.');

console.log('You rolled ' + counts[2] + ' twos.');

console.log('You rolled ' + counts[3] + ' threes.');

console.log('You rolled ' + counts[4] + ' fours.');

console.log('You rolled ' + counts[5] + ' fives.');

console.log('You rolled ' + counts[6] + ' sixes.');

See more about JAVA at brainly.com/question/12975450

#SPJ1

I Am Working On 8.8.6 "Totals Of Lots Of Rolls" In CodeHS Javascript And I Do Not Know What To Do Can

Related Questions

what are the benefits of solar installation ?

Answers

Solar installation offers numerous benefits for homeowners and businesses alike. One of the primary advantages is cost savings. By using solar energy, individuals can significantly reduce their electricity bills and save money in the long run. Additionally, solar power is a renewable energy source, which means it is eco-friendly and sustainable. This helps reduce carbon emissions and improve overall air quality.

Another benefit of solar installation is increased property value. Homes and businesses with solar panels installed are considered more valuable due to their reduced energy costs and increased energy efficiency. Additionally, solar panels require very little maintenance, which makes them a reliable and hassle-free investment.

Finally, solar power can provide energy independence. By generating their own electricity, individuals and businesses are not dependent on the grid, which can be especially useful during power outages or other emergencies.

Overall, solar installation is an excellent investment that offers numerous benefits, including cost savings, eco-friendliness, increased property value, and energy independence.

For more such questions on renewable, click on:

https://brainly.com/question/13203971

#SPJ11

The company is especially concerned about the following:

Account management. Where will accounts be created and managed?

How will user authentication be impacted? Will users still be able to use their current Active Directory credentials to sign into their devices and still access resources on the local Active Directory network?

Securing authentication in the cloud.

Address the following based on the given information:

Explain how you can implement a Microsoft Intune device management solution and still allow Tetra Shillings employees to use their existing on premises Active Directory credentials to log onto the local network.

What controls and methods are available Azure Active Directory and Intune for controlling access to resources?

What Methods are available in Intune to detect when user accounts get compromised.

What actions can be taken to prevent compromised credentials from being used to access the network.

Answers

To implement a Microsoft Intune device management solution and still allow Tetra Shillings employees to use their existing on-premises Active Directory credentials to log onto the local network, Azure AD Connect can be used. Azure AD Connect is a tool that synchronizes on-premises Active Directory with Azure AD. This allows users to use their on-premises Active Directory credentials to log into Azure AD and access resources in the cloud. Once the synchronization is set up, users can use their existing credentials to sign into their devices and access resources on the local Active Directory network.
Azure Active Directory and Intune offer various controls and methods for controlling access to resources. Azure AD provides identity and access management capabilities such as conditional access, multi-factor authentication, and role-based access control. Intune allows the administrator to enforce device compliance policies, control access to company data, and secure email and other corporate apps on mobile devices. These controls can be applied to devices enrolled in Intune, ensuring that only authorized users can access company resources.
Intune offers several methods to detect when user accounts get compromised, including:
Conditional access policies: Intune allows administrators to create conditional access policies that can detect when a user account has been compromised based on various conditions such as location, device, and sign-in risk. If a policy violation is detected, the user can be prompted for additional authentication or access can be denied.
Device compliance policies: Intune can check devices for compliance with security policies such as encryption, passcode requirements, and device health. If a device is found to be non-compliant, access can be blocked until the issue is resolved.
Microsoft Defender for Identity: This is a cloud-based service that uses machine learning to detect suspicious activity and potential threats in real-time. It can alert administrators when a user account has been compromised and provide recommendations for remediation.
To prevent compromised credentials from being used to access the network, the following actions can be taken:
Enforce strong password policies: Intune allows administrators to enforce password policies such as length, complexity, and expiration. This can prevent attackers from guessing or cracking weak passwords.
Implement multi-factor authentication: Multi-factor authentication adds an extra layer of security by requiring users to provide additional information, such as a code sent to their phone or biometric data, to verify their identity. This can prevent attackers from using stolen credentials to access resources.
Monitor and respond to security events: Azure AD and Intune provide logs and alerts for security events. Administrators should regularly monitor these events and respond promptly to any suspicious activity.
Educate users: Employees should be educated on the importance of strong passwords, phishing prevention, and other security best practices to prevent attacks on their accounts.

PLEASE HELP ME ANSWER THIS QUESTION. I REALLY REALLY NEED IT.
. According to IEEE, what is software engineering? (A) The study of
approaches (B) The development of software product using scientific
principles, methods, and procedures (C) The application of engineering
to software (D) All of the above

Answers

IEEE (Institute of Electrical and Electronics Engineers) describes software engineering as:

(D) All of the above.

Software engineering encompasses the study of approaches, and the development of software products using scientific principles, methods, and procedures. It also encompasses the application of engineering principles to software. It is a multidisciplinary field that combines technical knowledge, problem-solving skills, and systematic processes to design, develop, and maintain software systems efficiently and effectively.

to restart a device without powering it down

Answers

Answer:

No possibly way of doing this

If the device isn't functioning but is turned on

On android: Hold the power button and either the volume up or down keys at the same time till the screen goes black

On IPhone/IPad/Ipod: hold down the home key and the power button till the screen goes blank

On Newer Apples with no home button, just hold down the power key till the screen goes blank

On PC: Hold the power button on the pc thill the screen goes black

On tablet: Use the steps for android listed above.

Convert the following to CNF: S→SS|AB|B A→aAAa B→ bBb|bb|Ꜫ C→ CC|a D→ aC|bb

Answers

To convert the given grammar into Chomsky Normal Form (CNF), we need to rewrite the rules and ensure that each production has only two non-terminals or one terminal on the right-hand side. Here is the converted CNF grammar:

1. S → SS | AB | B

2. A → AA

3. A → a

4. B → bBb | bb | ε

5. C → CC | a

6. D → aC | bb

Explanation:

1. The production S → SS has been retained as it is.

2. The production A → aAAa has been split into A → AA and A → a.

3. The production B → bBb has been split into B → bB and B → b.

4. The production B → bb has been kept as it is.

5. The production B → ε (empty string) has been denoted as B → ε.

6. The production C → CC has been retained as it is.

7. The production C → a has been kept as it is.

8. The production D → aC has been kept as it is.

9. The production D → bb has been kept as it is.

In summary, the given grammar has been converted into Chomsky Normal Form (CNF), where each production has either two non-terminals or one terminal on the right-hand side. This form is useful in various parsing and analysis algorithms.

For more questions on parsing, click on:

https://brainly.com/question/13211785

#SPJ8

Answer:

Explanation:

To convert the given grammar to Chomsky Normal Form (CNF), we need to follow a few steps:

Step 1: Eliminate ε-productions (productions that derive the empty string).

Step 2: Eliminate unit productions (productions of the form A → B).

Step 3: Convert long productions (productions with more than two non-terminals) into multiple productions.

Step 4: Convert terminals in remaining productions to new non-terminals.

Step 5: Ensure all productions are in the form A → BC (binary productions).

Applying these steps to the given grammar:

Step 1: Eliminate ε-productions

The given grammar doesn't have any ε-productions.

Step 2: Eliminate unit productions

The given grammar doesn't have any unit productions.

Step 3: Convert long productions

S → SS (Remains the same)

S → AB

A → aAAa

B → bBb

B → bb

C → CC

C → a

D → aC

D → bb

Step 4: Convert terminals

No changes are needed in this step as all terminals are already in the grammar.

Step 5: Ensure binary productions

The given grammar already consists of binary productions.

The converted grammar in Chomsky Normal Form (CNF) is:

S → SS | AB

A → aAAa

B → bBb | bb

C → CC | a

D → aC | bb

Note: The original grammar didn't include the production rules for the non-terminals 'S', 'C', and 'D'. I assumed the missing production rules based on the provided information.

check image dont answer if you dont know please

check image dont answer if you dont know please

Answers

Answer:

Explanation:

1-2nd option

2-1st option

3-last option

hope this helps!! have a good rest of ur day!! <3

Longer speeches should be separated into the paragraphs of:
a) About 300 words or 9-12 lines in the transcription tool.
b) About 100 words or 3-4 fines in the transcription tool.
c) About 200 words or 6-8 fines in the transcription tool.
d) About 50 words or 1-3 lines in the transcription tool.

Answers

Answer:

b) About 100 words or 3-4 fines in the transcription tool.

Explanation:

Transcription tools are the software that helps in converting the audio or speeches into texts. Traditionally, the process of transcription was done manually. With teh advancement of technologies and software, transcription software is developed. They help in transcribing the audios and videos into texts. These are useful in many sectors of business, medical, and legal areas.

One of the rules of transcription involves the division of long speeches into paragraphs. It is advised to divide the paragraph into about 100 words or 3-4 lines.

Create a dice game that randomly “rolls” five dice for the computer and five dice for the player. After each random roll, store the result in a computer dice roll list and player dice roll list. The application displays all the values, which can be from 1 to 6 inclusive for each die. Decide the winner based on which player had the largest number of matching dice. For this game, the numeric dice values do not count. For example, if both the player and computer have three of a kind, it is a tie, no matter what the values of the three dice are.


Be sure to review the provided links on generating random integers, and using the Python count() function, as both will be used in this program. To assist you, pseudocode has been provided. Download the file DiceGamePseudocode.py and follow the pseudocode to complete the program.


Program 2 requirements:


The program generates and stores five random dice values each for the player and computer

The program determines the largest number of matching dice for the player and computer

The program displays the dice values for the player and computer

The program displays the largest number of matching dice for the player and computer

The program uses a decision structure to display a message indicating who won the game


And please follow the pseudocode!

Create a dice game that randomly rolls five dice for the computer and five dice for the player. After
Create a dice game that randomly rolls five dice for the computer and five dice for the player. After

Answers

The Python program that can be able to implements the dice game based on the things that are given in the pseudocode is given below.

What is the dice game about?

This python code is known to be program that tends to bring about or make as well as stores five random dice values for the people that is both the player as well as  computer using list comprehensions.

Therefore, it is one that tends to make use the max() function along with the key parameter that is known to be set to the count() method to be able to find the most frequent dice value for all of the player as well as the computer.

Hence The program also shows  the dice values as well as the number of matching dice for all of the player.

Learn more about dice game from

https://brainly.com/question/30028788

#SPJ1

Create a dice game that randomly rolls five dice for the computer and five dice for the player. After

Draw a flowchart to read three positive integers and to determine the largest and print it on the screen.

Answers

The code for the flowchart to read three positive integers and to determine the largest and print it on the screen is in the explanation part.

What is programming?

Computer programming is the process of developing code to assist specific activities in a computer, application, or software programme and giving them instructions on how to accomplish.

Here's a flowchart to read three positive integers and determine the largest:

START

Input integer1

Input integer2

Input integer3

IF integer1 >= integer2 AND integer1 >= integer3 THEN

   largest = integer1

ELSE IF integer2 >= integer1 AND integer2 >= integer3 THEN

   largest = integer2

ELSE

   largest = integer3

Print largest

STOP

Thus, this flowchart assumes that all three integers are positive. If negative integers are allowed, additional steps would need to be added to handle negative values.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ9

Integers numPizzas and dollars are read from input. A pizza costs 5 dollars.

If numPizzas is less than 5, output "numPizzas requires at least 5 to purchase."
If numPizzas is greater than or equal to 5, then declare and initialize int variable totalCost with the product of numPizzas and 5.
If totalCost is less than or equal to dollars, output "Successful purchase!"
Otherwise, output "Not all pizzas purchased."
If numPizzas is greater than 26, output "Now out of stock." Otherwise, output "Item still in stock."
End with a newline.

Ex: If the input is 8 67, then the output is:

Successful purchase!
Item still in stock.

Answers

The program based on the information given is depicted below.

How to write the program

#include <iostream>

using namespace std;

int main() {

  int numPizzas, dollars;

  cin >> numPizzas >> dollars;

 

  if (numPizzas < 5) {

     cout << "numPizzas requires at least 5 to purchase." << endl;

  }

  else {

     int totalCost = numPizzas * 5;

     if (totalCost <= dollars) {

        cout << "Successful purchase!" << endl;

        if (numPizzas > 26) {

           cout << "Now out of stock." << endl;

        }

        else {

           cout << "Item still in stock." << endl;

        }

     }

     else {

        cout << "Not all pizzas purchased." << endl;

     }

  }

 

  return 0;

}

Note: The endl is used to output a newline character at the end of each output message.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Some scientists hypothesize that Earth's ozone layer is being damaged by ____.
a.
ultraviolet radiation
c.
plant life on Earth
b.
chlorofluorocarbons
d.
global warming


Please select the best answer from the choices provided

A
B
C
D

Answers

Some scientists hypothesize that Earth's ozone layer is being damaged by the emission of certain chemical compounds known as ozone-depleting substances (ODS), such as chlorofluorocarbons (CFCs).

b. chlorofluorocarbons

What are ozone-depleting substances (ODS)?

These substances have been widely used in various industrial processes, aerosol propellants, refrigerants, and fire suppression systems. When released into the atmosphere,

CFCs can reach the stratosphere and interact with ozone molecules, leading to their depletion and thinning of the ozone layer. Ultraviolet radiation is a consequence of ozone layer depletion, and global warming, while impacting the Earth's climate, is not directly linked to ozone layer damage.

Plant life on Earth plays a vital role in oxygen production and carbon dioxide absorption but is not a direct cause of ozone layer depletion.

Learn more about ozone layer at

https://brainly.com/question/520639

#SPJ1

“If the information ______________________, then that information (should / should not) be stored because _____________. For example, ____________ (should / should not) be stored.”

Answers

The blanks spaces are filled with the following;

Is confidential, should notThere's risk of information theft on the cloudSocial security number, should not

Confidential information and the storage cloud

According to McGinley, in some cases, storing any type of personal information for one's self or one's customers in the cloud would be a mistake. Information relating to date of birth, Social Security number, passport numbers should not be kept in the cloud.

This follows from the fact that "Cloud providers are no less bulletproof than any of the other previous industry."

Read more on information storage;

https://brainly.com/question/24688176

The answer states that if the information is confidential, it should not be stored. This is because there is a risk of information theft on the cloud.

Given, information regarding storage of data.

The example given is the storage of a Social Security number. It is stated that Social Security numbers should not be stored in the cloud.

This is because cloud providers are not completely immune to security breaches or hacking attempts. Storing sensitive information like Social Security numbers on the cloud can potentially expose it to unauthorized access.

Confidential information should be handled with caution and stored in a secure manner to minimize the risk of unauthorized access or data breaches.

Know more about confidential information,

https://brainly.com/question/16230661

#SPJ3

Every workplace should have an emergency plan of action.


Please select the best answer from the choices provided

T
F

Answers

It is true that every workplace should have an emergency action plan.

What is an emergency action plan (EAP)?

A written document required by specific OSHA standards is an emergency action plan (EAP). [29 CFR 1910.38(a)] An EAP's purpose is to facilitate and organize employer and employee actions in the event of a workplace emergency.

During an emergency, well-developed emergency plans and proper employee training (so that employees understand their roles and responsibilities within the plan) will result in fewer and less severe employee injuries and less structural damage to the facility.

A poorly prepared plan will almost certainly result in a disorganized evacuation or emergency response, causing confusion, injury, and property damage.

So, the correct answer to the question is True (T).

To know more about the emergency action plan, visit: https://brainly.com/question/3238467

#SPJ1

Draw AND, OR, XOR and XNOR gates with truth table and logic gates.

.​

Answers

Answer:

see picture. let me know if you have questions.

Draw AND, OR, XOR and XNOR gates with truth table and logic gates..

A user needs to communicate the same message with 20 people in a company. The message is lengthy with several images included in it. Which communication method would best fit this scenario? Describe the etiquette associated with communicating in this method.

Answers

Since the user needs to communicate the same message with 20 people in a company. The communication method would best fit this scenario is the use of a bulk email message.

What does "mail message" mean?

An email message is a text that is transmitted or received over a computer network and is often short as well as casual. Email communications are often only text messages, but they can also contain attachments (such spreadsheets and graphic files). Multiple people can receive an email message at once.

Therefore, The exchange of communications using electronic devices is known as electronic mail. At a time when "mail" solely referred to physical mail, email was therefore conceptualized as the electronic equivalent of or counterpart to mail.

Learn more about email message from

https://brainly.com/question/6180841
#SPJ1

which are the focus area of computer science and engineering essay. According to your own interest.

Answers

Answer:

Explanation:

While sharing much history and many areas of interest with computer science, computer engineering concentrates its effort on the ways in which computing ideas are mapped into working physical systems.Emerging equally from the disciplines of computer science and electrical engineering, computer engineering rests on the intellectual foundations of these disciplines, the basic physical sciences and mathematics

Question 1 of 10 Which two scenarios are most likely to be the result of algorithmic bias? A. A person is rejected for a loan because they don't have enough money in their bank accounts. B. Algorithms that screen patients for heart problems automatically adjust points for risk based on race. C. The résumé of a female candidate who is qualified for a job is scored lower than the résumés of her male counterparts. D. A student fails a class because they didn't turn in their assignments on time and scored low on tests. ​

Answers

Machine learning bias, also known as algorithm bias or artificial intelligence bias, is a phenomenon that happens when an algorithm generates results that are systematically biased as a result of false assumptions made during the machine learning process.

What is machine learning bias (AI bias)?Artificial intelligence (AI) has several subfields, including machine learning. Machine learning relies on the caliber, objectivity, and quantity of training data. The adage "garbage in, garbage out" is often used in computer science to convey the idea that the quality of the input determines the quality of the output. Faulty, poor, or incomplete data will lead to inaccurate predictions.Most often, issues brought on by those who create and/or train machine learning systems are the source of bias in this field. These people may develop algorithms that reflect unintentional cognitive biases or actual prejudices. Alternately, the people could introduce biases by training and/or validating the machine learning systems using incomplete, inaccurate, or biased data sets.Stereotyping, bandwagon effect, priming, selective perception, and confirmation bias are examples of cognitive biases that can unintentionally affect algorithms.

To Learn more about Machine learning bias refer to:

https://brainly.com/question/27166721

#SPJ9

Which parts of a presentation should be the most general

Answers

Answer:

The introduction is the most important part of your presentation as it sets the tone for the entire presentation. Its primary purpose is to capture the attention of the audience, usually within the first 15 seconds. Make those first few words count! There are many styles you can use to get the audience's attention.

Explanation:

Azure subscription storage1 virtual machines: service endpoint

Answers

Microsoft's cloud storage solution is the Azure Storage platform. Azure Storage offers huge scalability, security, and high availability.

What exactly is a storage service endpoint in Azure?

Endpoints give you the ability to limit access to your vital Azure service resources to just your virtual networks. Service Endpoints makes it possible for private IP addresses in the VNet to access an Azure service's endpoint without the use of a public VNet IP address.

What happens when a service endpoint for Azure storage is enabled?

With the use of virtual network service endpoints, you can completely block public internet access to these resources by securing Azure Storage accounts to your virtual networks. The best routing is provided by service endpoints, which always keep traffic going to Azure Storage on the backbone network of Azure.

To know more about Azure service visit:

https://brainly.com/question/30373354

#SPJ1

((Excel)) please help, 100 points, and brain crown thingy, not only that, i will make several of these so you can get several hundred points just for one question if you find them all, that being said... please help me...


just please..

Answers

Answer:

First you read the question and numbers, then you use the numbers in the correct way and you try reallllyyy hard, you will find your answer! Hope this helps! :D

Describing Education for Accountants
s
Click this link to view O'NET's Education section for Accountants. According to O'NET, what is the most common
level of education required for Accountants?
O master's degree
bachelor's degree
associate degree
high school diploma or its equivalent

Answers

Answer: bachelor's degree

Explanation:Click this link to view ONET's Education section for Accountants. According to ONET, what is the most common level of education required for Accountants? master's degree bachelor's degree associate degree high school diploma or its equivalent

View the accountant education part of o*net by clicking this link. The most typical amount of education needed for accountants, according to o*net, is a bachelor's degree.

What is education?

Education has the deliberate process with certain goals in mind, such as the transmission of knowledge or the development of abilities and moral qualities. The growth of comprehension, reason, kindness, and honesty are a few examples of these objectives.

In order to discern between education and indoctrination, various researchers emphasize the importance of critical thinking. Some theorists demand that education lead to the improvement of the learner, while others favor a definition of the term that is value-neutral.

Education can also refer to the mental states and dispositions that educated people possess, rather than the process itself, in a somewhat different sense. Transmission of cultural heritage from one generation to the next was the original purpose of education. New concepts, such as the liberty of learners, are being included into educational goals.

Therefore, View the accountant education part of o*net by clicking this link. The most typical amount of education needed for accountants, according to o*net, is a bachelor's degree.

Learn more about accountant on:

https://brainly.com/question/22917325

#SPJ7

which type of ethernet framing is used for TCP IP and DEC net​

Answers

Ethernet II
Trust me u will get it right

#define DIRECTN 100
#define INDIRECT1 20
#define INDIRECT2 5
#define PTRBLOCKS 200

typedef struct {
filename[MAXFILELEN];
attributesType attributes; // file attributes
uint32 reference_count; // Number of hard links
uint64 size; // size of file
uint64 direct[DIRECTN]; // direct data blocks
uint64 indirect[INDIRECT1]; // single indirect blocks
uint64 indirect2[INDIRECT2]; // double indirect

} InodeType;

Single and double indirect inodes have the following structure:

typedef struct
{
uint64 block_ptr[PTRBLOCKS];
}
IndirectNodeType;

Required:
Assuming a block size of 0x1000 bytes, write pseudocode to return the block number associated with an offset of N bytes into the file.

Answers

Answer:

WOW! that does not look easy!

Explanation:

I wish i could help but i have no idea how to do that lol

how to find tax rate using VLOOKUP function in microsoft excel?

Answers

Answer: below

Explanation:

To find a tax rate using the VLOOKUP function in Microsoft Excel, follow these steps:

Set up a table that contains the tax rates. The table should have two columns: one column for the income levels or thresholds and another column for the corresponding tax rates. Make sure the income levels are sorted in ascending order.

For example, your table might look like this:

Income Level   Tax Rate

0              0%

10000          10%

20000          15%

30000          20%

In a cell where you want to calculate the tax rate, enter the VLOOKUP formula. The formula syntax for VLOOKUP is as follows:

=VLOOKUP(lookup_value, table_array, col_index_num, [range_lookup])

lookup_value: This is the value you want to lookup, in this case, the income for which you want to find the tax rate.

table_array: This is the range of cells that contains your table, including both the income levels and tax rates.

col_index_num: This is the column number that contains the tax rates within the table. In this case, it would be 2 since the tax rates are in the second column.

[range_lookup]: This is an optional argument. If set to TRUE or omitted, it performs an approximate match. If set to FALSE, it performs an exact match.

For example, if you want to find the tax rate for an income of $25,000 and your table is in cells A1:B5, you can use the following formula:

=VLOOKUP(25000, A1:B5, 2, TRUE)

Press Enter to calculate the formula. The VLOOKUP function will search for the income level closest to $25,000 in the table and return the corresponding tax rate.

Note: Make sure the values you're looking up and the table range are of the same data type (e.g., numbers). Also, ensure that the income levels in the table are sorted in ascending order for the VLOOKUP function to work correctly.

An ATM allows a customer to withdraw maximum amount of 500

Answers

Answer:

true

Explanation:

Algorithm:

Print "Enter the initial amount: $"
Get totalAmount

Repeat the following steps until totalAmount <= 0 or the user wants to exit
Get withdrawAmount

if withdrawAmount > 500
Print "You cannot withdraw amount of $500 per day."
otherwise
serviceCharge = 0

if withdrawAmount > 300
Find the serviceCharge as below
serviceCharge = (withdrawAmount - 300) * 0.04

Find the deductions as below
deductions = withdrawAmount + serviceCharge

if deductions > totalAmount
Print "Insufficient funds!"
Print "Allow with a service charge of $25? (Y/N): "
Get choice

if choice == 'y' or choice == 'Y'
Find the totalAmount as below
totalAmount -= (deductions + 25)
Print "Service charges: $" serviceCharge
Print "Additional charge: $25"
Print "Current balance: $" totalAmount
otherwise
Find the totalAmount as below
totalAmount -= deductions
Print "Service charges: $" serviceCharge
Print "Current balance: $" totalAmount

if totalAmount > 0
Print "Continue to withdraw? (Y/ N): "
Get choice;

if choice != 'y' and choice != 'Y'
Print "Current balance: $" totalAmount
Set repeat = false;

if totalAmount <= 0
Print "You should deposit an amount of money."

-------------------------------------------------------------------------------

Complete Program:

#include
#include
using namespace std;

int main()
{
double totalAmount;
double withdrawAmount;
double deductions;
char choice;
bool repeat = true;

cout << "Enter the initial amount: $";
cin >> totalAmount;

while(totalAmount > 0 && repeat)
{
cout << "\nEnter an amount to withdraw: $";
cin >> withdrawAmount;

if(withdrawAmount > 500)
{
cout << "You cannot withdraw amount of $500 per day." << endl;
}
else
{
double serviceCharge = 0;

if(withdrawAmount > 300)
serviceCharge = (withdrawAmount - 300) * 0.04;

deductions = withdrawAmount + serviceCharge;

if(deductions > totalAmount)
{
cout << "Insufficient funds!" << endl;
cout << "Allow with a service charge of $25? (Y/N): ";
cin >> choice;

if(choice == 'y' || choice == 'Y')
{
totalAmount -= (deductions + 25);

cout << "Service charges: $" << serviceCharge << endl;
cout << "Additional charge: $25" << endl;
cout << "Current balance: $" << totalAmount << endl;
}
}
else
{
totalAmount -= deductions;

cout << "Service charges: $" << serviceCharge << endl;
cout << "Current balance: $" << totalAmount << endl;
}
}

if(totalAmount > 0)
{
cout << "\nContinue to withdraw? (Y/ N): ";
cin >> choice;

if(choice != 'y' && choice != 'Y')
{
cout << "Current balance: $" << totalAmount << endl;
repeat = false;
}
}
}

if(totalAmount <= 0)
cout << "You should deposit an amount of money." << endl;

cout << endl;
system("pause");
return 0;
}

Why was PC-A unable to access R1 via ssh?

Answers

Answer:

It could be that an ssh virtual terminal has not been configured for the port connected to PC-A

Explanation:

The computer network is an interconnection and intercommunication of computer devices to share resources. Intermediate devices like the Router and Switches are used to create physical and virtual connections between networks and nodes.

virtual connections like the default Telnet and the and more secure SSH are used to remotely communicate with intermediate devices for management purposes. For example, to use the ssh, the line vty and the specified virtual port range must be configured with a username, a password, an encryption key and other ssh features before a connection can be made.

Use tools and analysis techniques to study and reason about critical properties of the concurrent systems, including security protocols

Answers

The protocols are everything that you need to know to get yourself and others to safety

Increases security by verifying identity based on two componenets, such as a password and a verification code. It is most useful for verifying logins initiated from a device that was not used previously to log in.Two-Factor authentication

Answers

Two-factor authentication adds an extra layer of security to identity and access management programs. Learn about 2FA benefits, use cases and products.

What is a password?

A password, sometimes called a passcode (for example in Apple devices), is secret data, typically a string of characters, usually used to confirm a user's identity. Traditionally, passwords were expected to be memorized, but the large number of password-protected services that a typical individual accesses can make memorization of unique passwords for each service impractical. Using the terminology of the NIST Digital Identity Guidelines, the secret is held by a party called the claimant while the party verifying the identity of the claimant is called the verifier. When the claimant successfully demonstrates knowledge of the password to the verifier through an established authentication protocol, the verifier is able to infer the claimant's identity.

To know more about password visit:

https://brainly.com/question/28398310

#SPJ4

if cost of 1 kg sugar is 36 find price of 3 kg sugar​

Answers

Answer:

the answer is 108

Explanation:

3×36=108

At what layer in the TCP/IP protocol hierarchy could a firewall be placed to filter incoming traffic by means of:

a) message content
b) source address
c) type of application​​

Answers

The answer is c) type of application

The most significant protocol at layer 3, often known as the network layer, is the Internet Protocol, or IP.The IP protocol, the industry standard for packet routing among interconnected networks, is the source of the Internet's name.  Thus, option C is correct.

What are the TCP/IP protocol hierarchy could a firewall?

Application-layer firewalls operate at the TCP/IP stack's application level (all browser traffic, or all telnet or ftp traffic, for example), and thus have the ability to intercept any packets going to or from an application. They stop different packets (usually dropping them without acknowledgment to the sender).

Firewalls are frequently positioned at a network's edge. An external interface is the one that is located outside the network, while an internal interface is the one that is located inside the firewall.

Therefore, The terms “unprotected” and “protected,” respectively, are sometimes used to describe these two interfaces.

Learn more about TCP/IP here:

https://brainly.com/question/27742993

#SPJ2

Other Questions
which band of miles davis' featured an unusual instrumentation? BRAINLIST?!! HHHHHEEEEELLLLPPPPP MEEEEEE! 1) When is growing season for tomatoes2) How long is growing season for tomatoes3) How long will it take for tomatoes to grow to harvest? help meeeeeeeeeeeeeeeeee Need this by midnight!!!E= [tex]\frac{kQ}{r^{2} }[/tex]Calculate the magnitude of the electric field (in N/C), due to a small charged sphere (Q = + 129 nC), at a point in space that is a distance 5.2 m away.Round to nearest whole number. A tennis ball moving at a speed of 4 m/s, collides with a bowling ball at rest. The tennis ball bounces back in the direction opposite to the initial velocity, and the bowling ball moves very slowly too. Which object experiences the greater magnitude impulse during the collision What are some behavioral adaptations for a lion Luis is taking out a car loan for $5,000. He plans on paying off the car loan in 2 years. At the end of 2 years, Luis will have paid $300 in interest. What is the simple interest rate on the car loan? A company wants to evaluate the effects of a reduction in material cost of 3 percent and an increase in sales of 15 percent on a product with the following current characteristics: labor costs of $1,250,000, material costs of $5,000,000, overhead of $710,000, and sales of $8,000,000. What are the effects on net income with a 3 percent reduction in material costs? What is the effect with a 15 percent increase in sales? The ratio of red pens to blue pens in maxs drawer is 4 to 5 how many red pens and how many blue pens are there in the drawer if there are 342 pens altogether? Can a Sheriff arrest or detain? Give a full expalanation on what you choose and also explain what the sheriff must do of the answer you decide to choose. Use your analysis in Problem 7.2 to compare the monopoly and competitive equilibria. (Ignore price discrimination and incentives to create other devices like X-COR's in future.) (a) Monopoly increases decreases doesn't affect output. what is the incubation period for primary syphillis? What are the things that you should do when you are approaching an intersection? Which of these sentences contains a transition word or phrase? We were sure that we would be the last ones to leave.When we got home, we opened our gifts.Eventually, we found our way home from the park.We had a good time at the birthday party before Thanksgiving. HELPFUL ANSWERS ONLYWhat technologies did the spain empire utilize or develop to establish and maintain their sea-based empire? What diagnosis ofTuberculosis (TB) (Night Sweats DDX) Mrs. lewis has placemats that are in the shape of trapezoids. she knows that the perimeter of each one is 50 inches. she also knows the length of three sides: 12 inches, 12 inches, and 15 inches. what is the length of the fourth side? enter your answer in the box. Which of the following phrases from the quote describes an image that appears again when Elie himself transported out by train and also when he arrives in Auschwitz?A. they cried silentlyB. What do you expect?C. all that was left was thick, dirty smokeD. Standing out the station platform. Two different cross sections are taken parallel to the base of a three-dimensional figure. The two cross sections are the same shape, but are not congruent. Which could be the three-dimensional figure?. Is 24 the correct LCD to use for subtracting 6 3/4 - 1 2/6 ? Why or why not?In your own words, describe how to find the GCF for a set of numbers. Use the numbers 24 and 32 as an example.Subtract and reduce to lowest terms: 9/10 - 3/10.PLEASE HELP ASAP