please help me and solution in c language​

Please Help Me And Solution In C Language

Answers

Answer 1
Ummmm the solution is ummm brb

Related Questions

what are the content and salient features of a sound policy suitable in safeguarding information in health institution?​

Answers

A security policy, also known as an information security policy or an IT security policy, is a document that outlines the guidelines, objectives, and general strategy that an organization utilizes to preserve the confidentiality, integrity, and availability of its data.

What is health institution?Any location where medical care is offered qualifies as a health facility. From tiny clinics and doctors' offices to huge hospitals with extensive emergency rooms and trauma centers, healthcare facilities range in size from small clinics and urgent care facilities to these. Any hospital, convalescent hospital, health maintenance organization, health clinic, nursing home, extended care facility, or other institution dedicated to the treatment of sick, infirm, or elderly people shall be included in the definition of "health care institution."These organizations' main goal is to offer the targeted demographic, typically people who are underprivileged and lack access to other healthcare options, care in an acceptable and highly skilled manner.Institutional examples include laws, regulations, social standards, and rules.

To learn more about health institution refer to:

https://brainly.com/question/24147067

#SPJ1

This program will output a right triangle based on user specified height triangle_height and symbol triangle_char.
(1) The given program outputs a fixed-height triangle using a * character. Modify the given program to output a right triangle that instead
uses the user-specified triangle_char character. (1 pt)(2) Modify the program to use a loop to output a right triangle of height triangle_ height. The first line will have one user-specified character.
such as % or *. Each subsequent line will have one additional user-specified character until the number in the triangle's base reaches
triangle_height. Output a space after each user-specified character, including a line's last user-specified character. (2 pts)

Answers

The program illustrates the use of loops;

Loops are program statements that are used to perform repetitions

The program in Python

The python program where comments are used to explain each line of the program is as follows:

#This gets input for the triangle height

triangle_height = int(input())

#This gets input for the triangle character

triangle_char = input()

#This iterates through the triangle height

for i in range(triangle_height+1):

   #This iterates through each row

   for i in range(0,i):

       #This prints each character

       print(triangle_char,end='')

   #This prints a new line

   print()

Read more about python programs at:

https://brainly.com/question/26497128

#SPJ1

Database systems are exposed to many attacks, including dictionary attack, show with implantation how dictionary attack is launched?(Java or Python) ?

Answers

A type of brute-force attack in which an intruder uses a "dictionary list" of common words and phrases used by businesses and individuals to attempt to crack password-protected databases.

What is a dictionary attack?

A Dictionary Attack is an attack vector used by an attacker to break into a password-protected system by using every word in a dictionary as a password for that system. This type of attack vector is a Brute Force Attack.

The dictionary can contain words from an English dictionary as well as a leaked list of commonly used passwords, which, when combined with common character replacement with numbers, can be very effective and fast at times.

To know more about the dictionary attack, visit: https://brainly.com/question/14313052

#SPJ1

Write a program that will ask the user to input how many numbers are in a list. A loop is used to load the list
beginning with number 1. The user is then asked to enter a number between 0 and the biggest number in the list.
The original list is displayed. A function is then called that accepts 2 arguments (the list and the number entered
by the user) and then displays all numbers from the original list that are larger than the number entered by the
user. (!!IMPORTANT: a main function MUST be used for this program – the main function MUST call the display
larger function, passing the list and input value as arguments to determine and display numbers larger than the
number input by the user)

Answers

The program that will ask the user to input how many numbers are in a list is given below.

How to explain the program

Lst is the original empty list

# number of elements as input

n = int(input("How many numbers will be added to original list : "))

# iterating till the range

for i in range(0, n):

   ele = int(input())

   lst.append(ele) # adding the element

n1 = int(input("Enter a number Between 0 and "+str(n)+":")) // enter smaller number elememts

print("The list number smaller than "+str(n1)+" are :")

print(lst[0:n1])  

Learn more about program on

https://brainly.com/question/26642771

#SPJ1

A manufacturing company produces products. The following product information is stored: product name, product ID and quantity on hand. These products are made up of many components. Each component can be supplied by one or more suppliers. The following component information is kept: component ID, name, description, suppliers who supply them, and products in which they are used. Create an ERD to show how you would track this information.Show entity names, primary keys, attributes for each entity, relationships between the entities and cardinality.

Assumptions:
A supplier can exist without providing components.
A component does not have to be associated with a supplier.
A component does not have to be associated with a product.
Not all components are used in products.
A product cannot exist without components

Required:
Analyze the above scenario and assumptions and create an ERD to show how you would track ali the above information.

Answers

I couldn't read all, it was too long.

Explanation:

Nah, I gave up

A database of manufacturing companies contains: Relational Database Schema ER Diagram

What is database?

Database is defined as an ordered grouping of data that has been arranged and is usually stored electronically in a computer system.  They make it possible to manipulate and store data digitally. Databases make data administration easy. Computer databases are frequently used to collect and store data records or files comprising information such as sales transactions, customer information, financial data, and product information.

Choose the Entities for Your ERD. Each Entity Should Have Attributes. Explain the connections between the entities. Completion and saving of your ERD Initially, just one instance of each entity is needed. Usually used in pairs from each associated entity's point of view, define the relationship.

Thus, a database of manufacturing companies contains: Relational Database Schema ER Diagram.

To learn more about database, refer to the link below:

https://brainly.com/question/29412324

#SPJ2

Give a command that will create a file named listing.dat, in your current (commandsAsst) directory, containing a list of all the files in your fileAsst directory. I need to use redirection, and have tried almost every variation of ls -a < ~/UnixCourse/fileAsst. > listing.dat Primarlily the error I get is that I did not create the 'listing.dat file with ALL of the files located in ../fileAsst/ When I run the same command in another terminal window, then verify with ls -a I can see that I did indeed create the listing.dat file. Can someone tell me what it is I am missing?

Answers

Answer:

Following are the command to this question:

"ls -a ~/UnixCourse/fileAsst > listing.dat"

Explanation:

The above-given code will create a file, that is "listing.dat", and this file will be created in your current directory, which will include the list of all files in the file-asst directory.

In this, Is command is used that uses the directory that is "UnixCourse/fileAsst" and inside this, it will create the "dat" file that is "listing".

Why does Homework exist? Why is it so important?

Answers

Answer:

Homework exist because it give you extra work and practice to learn more. It important because it better your grade.

In this lab, you use what you have learned about searching an array to find an exact match to complete a partially prewritten C++ program. The program uses an array that contains valid names for 10 cities in Michigan. You ask the user to enter a city name; your program then searches the array for that city name. If it is not found, the program should print a message that informs the user the city name is not found in the list of valid cities in Michigan.

The file provided for this lab includes the input statements and the necessary variable declarations. You need to use a loop to examine all the items in the array and test for a match. You also need to set a flag if there is a match and then test the flag variable to determine if you should print the the Not a city in Michigan. message. Comments in the code tell you where to write your statements. You can use the previous Mail Order program as a guide.

Instructions
Ensure the provided code file named MichiganCities.cpp is open.
Study the prewritten code to make sure you understand it.
Write a loop statement that examines the names of cities stored in the array.
Write code that tests for a match.
Write code that, when appropriate, prints the message Not a city in Michigan..
Execute the program by clicking the Run button at the bottom of the screen. Use the following as input:
Chicago
Brooklyn
Watervliet
Acme

Answers

Based on your instructions, I assume the array containing the valid names for 10 cities in Michigan is named michigan_cities, and the user input for the city name is stored in a string variable named city_name.

Here's the completed program:

#include <iostream>

#include <string>

int main() {

   std::string michigan_cities[10] = {"Ann Arbor", "Detroit", "Flint", "Grand Rapids", "Kalamazoo", "Lansing", "Muskegon", "Saginaw", "Traverse City", "Warren"};

   std::string city_name;

   bool found = false;  // flag variable to indicate if a match is found

   std::cout << "Enter a city name: ";

   std::getline(std::cin, city_name);

   for (int i = 0; i < 10; i++) {

       if (city_name == michigan_cities[i]) {

           found = true;

           break;

       }

   }

   if (found) {

       std::cout << city_name << " is a city in Michigan." << std::endl;

   } else {

       std::cout << city_name << " is not a city in Michigan." << std::endl;

   }

   return 0;

}

In the loop, we compare each element of the michigan_cities array with the user input city_name using the equality operator ==. If a match is found, we set the found flag to true and break out of the loop.

After the loop, we use the flag variable to determine whether the city name was found in the array. If it was found, we print a message saying so. If it was not found, we print a message saying it's not a city in Michigan.

When the program is executed with the given input, the output should be:

Enter a city name: Chicago

Chicago is not a city in Michigan.

Enter a city name: Brooklyn

Brooklyn is not a city in Michigan.

Enter a city name: Watervliet

Watervliet is a city in Michigan.

Enter a city name: Acme

Acme is not a city in Michigan.

Read more about programs here:

https://brainly.com/question/26134656

#SPJ1

Using the guidelines below, prepare a spreadsheet to determine if you owe the Federal government or the Federal government owes you. Open a spreadsheet and in cell A1 enter Income Tax Return. In cell A3, enter Wages, Salaries, and Tips and in cell B3, enter $16200.89. In cell A4, enter Taxable Interest and in cell B4, enter 111.90. In cell A5, enter Unemployment Compensation and in cell B5, enter 0. In cell A6, enter Adjusted Gross Income and in cell B6, enter a formula to find the total of B3, B4, and B5. In cell A7, enter Single and in cell B7 enter $8750. In cell A8, enter Taxable Income and in cell B8, enter a formula to subtract the amount in cell B7 from the Adjusted Gross Income. In cell A9, enter Federal Income Tax Withheld and in cell B9, enter $1567.94. In cell A10, enter Earned Income Credit and in cell B10, enter 0 In cell A11, enter Total Payments and in cell B11, enter a formula to add Federal Income Tax Withheld and Earned Income Credit. Next you would use the tax table in the tax booklet to look up the corresponding value for your taxable income. The value from the tax table is $758. In cell A12, enter Tax and in cell B12, enter $758. Since the total payments in cell B11 are greater than the tax in cell B12, you will be receiving a refund. In cell A13, enter Refund and in cell B13, enter a formula to subtract the tax from the total payments. Let's check your answer. In cell B13, you should have $809.94.

Answers

Answer:

Open the Pdf :)

Explanation:

hopefully i got it right

Fill in the blank: To keep your content calendar agile, it shouldn’t extend more than ___________.

two weeks

one month

three months

six month

Answers

To keep your content calendar agile, it shouldn’t extend more than three months.

Thus, A written schedule for when and where content will be published is known as a content calendar.

Maintaining a well-organized content marketing strategy is crucial since it protects you from last-minute crisis scenarios and enables you to consistently generate new material and calender agile.

As a result, after the additional three months, it was unable to maintain your content calendar's agility.

Thus, To keep your content calendar agile, it shouldn’t extend more than three months.

Learn more about Calendar, refer to the link:

https://brainly.com/question/4657906

#SPJ1

organizational behavioural aspects

Answers

Answer:

Organizational behavior aspects are the points of view represented by external environments, including people and technology. We can make improvements to our physical aspects by using this particular aspect to understand how everyday elements interact with one another.

The way we deal with people snooping on internet connections is..
Select one:

a.
We don't send sensitive information over the internet.


b.
We avoid routers and use direct connections.


c.
We depend on the routers to vary routes a lot to confuse listeners.


d.
We secure our communication by encrypting it.

Answers

I’m torn between B and D!
D if we want to prevent snooping
B if we want to have a direct connection — as in one computer to one computer

Maybe go with B?

Question 10 of 10
What information system would be most useful in determining what direction
to go in the next two years?
A. Decision support system
B. Transaction processing system
C. Executive information system
D. Management information system
SUBMIT

Answers

Answer: C. Executive information system

Explanation: The information system that would be most useful in determining what direction to go in the next two years is an Executive Information System (EIS). An EIS is designed to provide senior management with the information they need to make strategic decisions.

An Executive Information System (EIS) would be the most useful information system in determining what direction to go in the next two years. So, Option C is true.

Given that,

Most useful information about determining what direction to go in the next two years.

Since Executive Information System is specifically designed to provide senior executives with the necessary information and insights to support strategic decision-making.

It consolidates data from various sources, both internal and external, and presents it in a user-friendly format, such as dashboards or reports.

This enables executives to analyze trends, identify opportunities, and make informed decisions about the future direction of the organization.

EIS typically focuses on high-level, strategic information and is tailored to meet the specific needs of top-level executives.

So, the correct option is,

C. Executive information system

To learn more about Executive information systems visit:

https://brainly.com/question/16665679

#SPJ6

What was the Internet originally created to do? (select all that apply)

Answers

The Internet was initially constituted for various purposes. it is was   originally created to options a, c and d:

share researchcommunicateshare documentsWhat is Internet

Communication: The Internet was planned to aid ideas and data exchange 'tween analysts and chemists. It proposed to combine various calculating and networks to authorize logical ideas and cooperation.

Research and Development: The Internet's production was driven for one need to share research verdicts, experimental dossier, and possessions among academies, research organizations, and administration institutions.

Read more about Internet here:

https://brainly.com/question/21527655

#SPJ4

You have read about the beginnings of the Internet and how it was created. What was the Internet originally created to do? (select all that apply)

share research.

Play games.

Communicate.

Share documents.

Sell toys

80. A .......... is used to read or write data.
A. CD B. VDU C. ROM D. RAM​

Answers

Answer:

Depending on exactly what they mean by read and write, both A and D are valid.  In fact, if you read that as "read or write" as being a logical OR and not the logical AND that the sentence probably intends, then all four answers could be correct.

What they probably mean to say though is "..... is used as a read/write storage medium", in which case A is the correct answer.

A.  Data can be written to or read from a CD.  This is probably the "right" answer

B. A human can "read" data from a Visual Display Unit, and the computer "write" it.  That of course is not the intended meaning though.

C.  Data can be read from Read Only Memory, but not written to.

D. Data can be both read and written to Random Access Memory, but not retained after the computer is powered off.

TP1. लेखा अभिलेखको अर्थ उल्लेख गर्नुहोस् । (State the mea
TP2. लेखाविधिलाई परिभाषित गर्नुहोस् । (Define accounting.
TP 3. लेखाविधिको कुनै तीन महत्वपूर्ण उद्देश्यहरू लेख्नुहोस्
accounting.)​

Answers

Explanation:

TP1. लेखा अभिलेख भनेको ज्ञानको त्यस्तो शाखा हो, जुन व्यवसायको आर्थिक कारोबारहरूलाई नियमित, सु-व्यवस्थित र क्रमबद तरिकाले विभिन्न पुस्तिकाहरूमा अभिलेख गर्ने कार्यसँग सम्बन्धित छ।

Use the class below to determine IF there is an error or if some part of the code is missing.

public class acceptInput {
public static void main (String[ ] args) {

Scanner scan = new Scanner (System.in);
System.out.println("How old are you? ");
int age = scan.nextInt();
System.out.println("Wow you are " + age + " years old. ");

}
}

- Scanner object has been declared incorrectly
- .nextInteger() should be used to accept an integer from the user.
- Age variable is not correctly printed in the sentence
- import java.util.Scanner; is missing
- Program runs as expected

Answers

Based on the given class below:

public class acceptInput {

public static void main (String[ ] args) {

Scanner scan = new Scanner (System.in);

System.out.println("How old are you? ");

int age = scan.nextInt();

System.out.println("Wow you are " + age + " years old. ");

}

}

The error that can be seen here is that the Scanner object has not been created

What is Debugging?

This refers to the term that is used to describe finding errors in a given program or system that prevents a code from properly executing and involves certain steps and processes.

Hence, it can be seen that the error in the code above is that there is the use of the Scanner object, but it is yet to be created which would return errors when the program is being run.

Read more about debugging here:

https://brainly.com/question/15079851

#SPJ1

PLEASE HELP IN JAVA

A contact list is a place where you can store a specific contact with other associated information such as a phone number, email address, birthday, etc. Write a program that first takes as input an integer N that represents the number of word pairs in the list to follow. Word pairs consist of a name and a phone number (both strings), separated by a comma. That list is followed by a name, and your program should output the phone number associated with that name. Output "None" if name is not found. Assume that the list will always contain less than 20 word pairs.

Ex: If the input is:

3 Joe,123-5432 Linda,983-4123 Frank,867-5309 Frank

the output is:
867-5309

Your program must define and call the following method. The return value of getPhoneNumber() is the phone number associated with the specific contact name.
public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize)

Hint: Use two arrays: One for the string names, and the other for the string phone numbers.

Answers

Answer: import java.util.Scanner;

public class ContactList {

   public static void main(String[] args) {

       Scanner scnr = new Scanner(System.in);

       

       // Read the number of word pairs in the list

       int n = scnr.nextInt();

       scnr.nextLine(); // Consume the newline character

       

       // Read the word pairs and store them in two arrays

       String[] names = new String[n];

       String[] phoneNumbers = new String[n];

       for (int i = 0; i < n; i++) {

           String[] parts = scnr.nextLine().split(",");

           names[i] = parts[0];

           phoneNumbers[i] = parts[1];

       }

       

       // Read the name to look up

       String name = scnr.nextLine();

       

       // Call the getPhoneNumber method to look up the phone number

       String phoneNumber = getPhoneNumber(names, phoneNumbers, name, n);

       

       // Print the phone number, or "None" if the name is not found

       if (phoneNumber != null) {

           System.out.println(phoneNumber);

       } else {

           System.out.println("None");

       }

   }

   

   public static String getPhoneNumber(String[] nameArr, String[] phoneNumberArr, String contactName, int arraySize) {

       // Search for the name in the array and return the corresponding phone number

       for (int i = 0; i < arraySize; i++) {

           if (nameArr[i].equals(contactName)) {

               return phoneNumberArr[i];

           }

       }

       // If the name is not found, return null

       return null;

   }

}

Explanation: The program inputs the number of word sets, stores them in two clusters (names and phoneNumbers), and looks up a title by calling the getPhoneNumber strategy to return the comparing phone number. Prints phone number or "None" in the event that title not found. getPhoneNumber strategy takes nameArr, phoneNumberArr, contactName, and arraySize as contentions. The strategy looks for a title and returns the phone number in case found, something else invalid.

Write a program that prompts a user to enter the number of elements to store in an array. Then prompt the user to enter all the numbers stored in the array.
The program should then cycle through the array to see if any numbers are divisible by 5. If any number is divisible by 5 print out which ones are and identify them in the output.

Answers

Answer:

Here's an example of a program that does what you've described:

# Get the number of elements in the array

n = int(input("Enter the number of elements to store in the array: "))

# Initialize the array

arr = []

# Get the elements of the array from the user

print("Enter the elements of the array:")

for i in range(n):

   arr.append(int(input()))

# Print out which numbers are divisible by 5

print("The following numbers are divisible by 5:")

for i, x in enumerate(arr):

   if x % 5 == 0:

       print(f"{i}: {x}")

This program will first prompt the user to enter the number of elements in the array. It then initializes an empty array and prompts the user to enter each element of the array. Finally, it loops through the array and prints out the index and value of any element that is divisible by 5.

Explanation:

What is referential integrity

Answers

The association between tables is referred to as referential integrity. A primary key is required for each table in a database and can appear in other tables as a result of its connection to the data in those other tables. Foreign keys are used when a primary key from one table appears in another table.

Fiona is creating a presentation with PowerPoint Online about how pencils are made. She would like to type an explanation about each slide to remind her what she wants to say when she is presenting. How can Fiona do this? Put everything she wants to say on the slide in her presentation. Remove the bullet points and type a paragraph on the slide for her audience to read. Select Add Notes under the slide she wants to type an explanation for. Select the New Note command in the Insert ribbon.
WHO EVER GETS THE ANSWER RIGHT WILL GET BRAINLYEST

Answers

Answer:

The answer is A

Explanation:

i was doing the test and one i used A it was correct

Fiona can type an explanation about each slide to remind her what she wants to say when she is presenting by: A. Put everything she wants to say on the slide in her presentation.

What is slide view?

Slide view is also referred to as Normal view and it can be defined as the main working window of a presentation when using Microsoft PowerPoint.

A presentation application is a type of computer application which is designed and developed to avail its end users an ability to create various slides that contains both textual and multimedia information, which are typically used during a presentation.

In conclusion, we can reasonably infer that Fiona should place everything she wants to say on the slide in her presentation.

Read more on slides and Master view here: brainly.com/question/25931136

#SPJ6

What is the DWT algorithm used for, while working with an EEG (a non-invasive brain-computer interface)?

Answers

Answer:

used to analyze the signals in time-frequency domain

Explanation:

Which type of photographer documents plants and weather in their natural habitat?

a
Portrait

b
Nature

c
Product

d
Scientific

Answers

B, plants and weather are part pf nature.

Write pseudocode for a program that allows a user to enter 20 numbers, then displays all of the numbers, the largest number, the smallest, the total and the average.

Answers

Answer:

set array of size 20

set larger_no to 0

set smallest_no to 0

for loop 20 times:

  asks for input for each input from user

  insert each value in array

run for loop 20 times again:

   display each number in array

   Inside for loop check IF number > larger_no then

    set larger_no=number

  Inside for loop check ELSE IF number <smallest_no THEN

     smallest_no=number

Write  smallest_no

Write larger_no

Perfrom traceroute of an ip address in Australia

Answers

How to perform a typical traceroute on an IP address using CMD command is given below:

The Steps

In case you're striving to perform a traceroute operation on an IP address, either using Windows or Mac computer systems, the following guidelines will provide assistance.

Windows users may select the Windows key and R simultaneously, enter "cmd," hit Enter. In comparison, users operating with the Mac OS should navigate through Finder by visiting Applications -> Utilities and double-clicking Terminal.

To get started with the procedure, insert the word "traceroute," and proceed by entering the specific IP address that you desire to locate. Even if searching for information on 203.0.113.1, simply input "traceroute 203.0.113.1." At this stage, submit and wait until the validation is done.

This method ascertains the path taken by packets across the network. It indicates the number of jumps made, along with their response time at every stage. One aspect to bear in mind is some routers/firewalls may block access thereby leading to incomplete outcomes.

Read more about Ip addresses here:

https://brainly.com/question/14219853

#SPJ1

Need help with Python coding...
2.14 LAB: Using math functions
Given three floating-point numbers x, y, and z, output the square root of x, the absolute value of (y minus z) , and the factorial of (the ceiling of z).

Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('%0.2f %0.2f %0.2f' % (your_value1, your_value2, your_value3))

Ex: If the input is:

5.0
6.5
3.2
Then the output is:

2.24 3.30 24.00

Answers

Answer:

6.5

24.00

it think it's my answer

You have been called in to consult for a company that is running 15 Windows 10 computers, two Linux computers, and three macOS computers. Your boss wants all these computers to be able to share files. What file sharing protocol do you recommend and why? Should you configure this network as a peer-to-peer network or as a client/server network? Explain your answer.

Answers

Based on the above, the file sharing protocol that I will recommend  is the Samba file or simply say the SMB sharing protocol or the use of Internxt. The reason I choose it is because it is of good quality, large space and can save to cloud.

What is SMB sharing protocol ?

The  SMB sharing protocol  is known to be a kind of a network file sharing protocol often called Server Message Block (SMB) and this is one that enables applications on a computer to read and write files and ask server software in a computer network for services.

On top of the TCP/IP protocol or other network protocols, the SMB protocol is one that  can be utilized.

Therefore, the file sharing protocol that I will recommend  is the Samba file or simply say the SMB sharing protocol or the use of Internxt. The reason I choose it is because it is of good quality, large space and can save to cloud.

Learn more about file sharing protocol from

https://brainly.com/question/28486886
#SPJ1

110001 OR 011101 is _____.

Answers

Answer:

is what I don't understand

Explanation:

is this binary numbers

For the following code please:

1. Keep scanning from user until user enters -1
2. Store the numbers in ascending order as the user enters
3. Have a loop to check if the number where the number should be and insert it in that index
4. Print out the final array.
import java.util.ArrayList;
import java.util.Scanner;
public static void main(String ​[] args) {
ArrayList numbers = new ArrayList ();
System.out.println(“Enter numbers one after another. Once done enter -1”);
}

Answers

import java.util.ArrayList;
import java.util.Scanner;

public class Main {
public static void main(String [] args) {
ArrayList numbers = new ArrayList<>();
System.out.println("Enter numbers one after another. Once done enter -1");
Scanner scan = new Scanner(System.in);
int num = scan.nextInt();
while (num != -1) {
int index = 0;
for (int i = 0; i < numbers.size(); i++) {
if (numbers.get(i) < num) {
index++;
}
}
numbers.add(index, num);
num = scan.nextInt();
}
System.out.println("The final array is: " + numbers);
}
}

The rectangular symbol in flowchart
is used to denote dash

Answers

Answer:

The rectangular symbol in flowchart is process box which is used to process the data.

Hope its helpful :-)

If so, please mark me as brainlist :-)

Other Questions
A water wave travels a distance of 30m in 15s. What is the wave's speed in m/s? Hi! Can someone solve and tell me all the steps so I could understand how to do this? The current ratio of company x is 3. 0 times. company x has working capital of $20,000. total current assets for company x are:____. What is the slope of the line y =- 3x 1 3? What are the 20 structure of amino acid? Multiple Choice: Choose the letter of the correct answer. Write it on the space provided beforeeach number1. It is also called PING-PONG and has similar principle to Lawn Tennis.a.Badminton b. Table tennisc. Tennis d. Beach Volleyball2. Played using strung rackets and a feathered shuttlecock by two or four players on arectangular court.a. Badminton b. Table tennisC. Tennis d. Beach Volleyball3. It is a shot done with the stroke below the head about waist-level, the ball travelling upa. Serveb. Pushc. Lobd. Smash4. A shot done with the stroke above the head and the ball travelling down with power andspeed.a. Serveb. Pushc. Lobd. Smash5. A short stroke in table tennis wherin the rackets is moved in a slight horizontal plane,striking the ball on the buttom portion of the racket.a. Serveb. Pushc. Lobd. Smash6. It is the important part of sports participation.a. Warm-up b. cool downc game proper d. footwork7. When playing table tennis, it is important that you practice gooda. Warm-up b. cooldown c. game proper d. footwork8. It is also called Lawn Tennis in which two opposing players(singles) or pairs odplayer(doubles)use rackets to hit a ball over a net on a rectangular courta. Badminton b. Table Tennis c. Tennisd. Beach Volleyball9. A rally of which the result is scored.a. Letb. Pointc. Received. Serve10. A stroke to reply to a serve.a. Letb. Pointc. Received. Serve Use the chain rule of differentiation to find the derivative with respect to t of g(t)=cos(t) dtdg=a.cos(t) b.sin(wt) c. 0 e.sin(wt) f.tsin(t) in paragraph 5 what does the pharse " held our breath " suggest about the narrator and josh Inflationary pressure is a growing problem for the economy. Therefore, the Federal Reserve decides to pursue a policy to reduce the inflationary pressure. Which policy changes by the Fed would reinforce each other to achieve that objective?Group of answer choicesA. Decreasing the overnight reverse repurchase agreement and decreasing the discount rate.B. Purchasing government securities and decreasing the discount rate.C. Decreasing the federal funds rate and decreasing the interest on reserve balances rate.D. Increasing the federal funds rate and increasing the interest on reserve balances rate. solve for x : -17 = -x - 7 which is a common site for metastasis that the nurse should include in the plan of care for a patient who is diagnosed with thyroid cancer? In which two ways were early blues recordings categorized?A. Detroit and urbanB. Rural (country) and urbanC. Rural (country) and mountainD. Memphis and Chicago in the context of job design, _____ allows companies to retain the economic benefits of specialized work because employees simply switch from one specialized job to another. How are words built or formed? RefugeeJosef's father wanted to attend what ceremony on the boat a. birthday partyb. bar mitvahc. funerald. banquet According to the Vienna Convention on Diplomatic Relations (1961), what is a Diplomatic Pouch / Diplomatic Bag ? What is is used for ? What are the rules governing the use of a Diplomatic Pouch and Courier ? What can be carried in a Diplomatic Pouch and what cannot be carried ? Who is allowed to handle a Diplomatic Pouch? Can a Diplomatic Pouch be detained or seized in transit or by the host Government? Explain in 600 words. The average price for a world series ticket in philadelphia has skyrocketed to more than?. If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?Spyware The working capital is the length of time between the purchase of raw materials and the sale of finished goods. It ensures the smooth running of every business; the finance managers must strategically manager their working capital. A company's manager must strike a balance between overcapitalisation and overtrading. Required: (a) Explain three importance of maintaining adequate working for the business. (7.5 marks) (b) Explain three causes for the under-mentioned situations: (i) Overcapitalised (3.5 marks) (3.5 marks) (ii) Overtrading (15 marks) Many not-for-profit (NFP) organizations are charitiesthat collect funds for special purposes. An example would be aresearch foundation that seeks a cure for cancer. To protectinvestors, business or