Problem You Need to Solve for This Lab:

You are asked to write an app to keep track of a relatively small music library. The app should load song information from a data file once the app is started. It should allow user to view, add, remove, and search for songs. The app should save the data back to the same data file when the program exits.

What Your Program Should Do:

Write an interactive text based menu interface (using a loop) that will allow the user to

ï‚· Enter information for a new song

ï‚· Display information for all the songs in the database with index for each song

ï‚· Remove a song by index

ï‚· Search for songs by a certain artist

ï‚· Search for songs by a certain album

ï‚· Quit

For each song, you need to keep track of:

title

artist

duration

album

Allow the program to keep looping until user wants to quit. When the program starts, it should load the tasks from external file ("songs.txt") into memory. When user enters information about the new song, the program needs to read them in, save them in memory and eventually write them to the external data file ("songs.txt"). The file format could look like:

Stereo Hearts;Gym Class Heroes;3;34;The Papercut Chronicles II
Counting Stars;OneRepulic;4;17;Native
The ';' is used as a delimiter or field separator. Each record ends with a new line character.

Some Implementation Requirements:

Write at least four functions WITH arguments for this assignment.

Use struct named Song to model each song

Use array of structs to model the collection of songs.

Hint: In this assignment, some data fields may have multiple words in it. Therefore,

you now SHOULD read using the 3 argument version of get.

Watch out. When using the 3 argument version of get you need to make sure to

remove the delimiter or newline. Therefore, anytime you read (even a confirmation

message), make sure to eat the newline using cin.ignore(...)!

Make sure to have a delimiter written between each item in the file – like a newline.

This will be important when you read the information back from the file.

For submission, your data file should contain a sufficient set of test data. It should have test cases for same artist with multiple songs and same album with multiple songs in it.

Do-Not List:

No Global Variables (you can have global constants)

Do not use Classes or Linked Lists

You must use cstring and char arrays. (do not use )

No use of the stdio library (use iostream and fstream)

Instead of the string class, you will be using arrays of characters and the cstring library

No STL containers such as vector. You must implement your own array for this class.

Answers

Answer 1

Answer:

Write questions properly

Explanation:

Then it is easy to say answer


Related Questions

data are collected and gather from the __





Answers

Answer:

hard drive

Explanation:

At the Network layer, what type of address is used to identify the receiving host?

Answers

Answer:

IP Address

Explanation:

At the Network layer, the IP address is used to identify the receiving host. It identifies the senders and receivers of data in a network.

IP Address is used to assign every node in a network which is used to identify them. Its two main purposes are 1. Address location 2. Identification of network interface.

An entrepreneur wants to make an app to show what breeds of dogs are similar to each other. She wants to look at factors such as weight and energy level in her comparison. In the end, she wants each breed of dog to belong to a certain category based on these characteristics. What would be a sensible approach to solving this problem using clustering?

Answers

Answer

Dog breeds = observations, Average weight and energy level for each breed = variables. Each cluster is a category.

Explanation:

Using a method of clustering, she would be putting the dog breeds that are more similar together and in order to do this she has to look at various factors such as observation which are the dog breeds, and the average weight and energy level of the breeds, which represents variables. Every one of these clusters would be a category.

You are required to install a printer on a Windows 7 Professional x86 workstation. Which print driver do you need to complete the installation?

Answers

Answer:

It depends on the model of the printer you want to install. Recent printers when connected to the computer install themselves searching for the drivers needed on the internet. Anyway, you can always google the word "driver" plus the model of your printer and it will surely appear the driver you need from the the company's website of the printer

The print driver that you will need to complete the installation of a printer on Windows 7 Professional x86 workstation is; 32 bit driver

In windows 7 Professional, an x86 name architecture simply denotes a 32 - bit CPU and operating system while x64 will refer to a 64-bit CPU and operating system.

Thus, since we want to install a printer on a Windows 7 Professional x86 workstation, it means we have to use a print driver that is 32 - bit.

Read more about 32 bits at; https://brainly.com/question/19667078

How does the computer know whether an address contains an instruction to be executed, or data to be used in an instruction?

Answers

They have a built-in senser that will notify and trigger the computer to tell you that something is wrong.

If you have a really good picture of your friend, it is okay to post without asking because they allowed you to take it in the first place. O True O False​

Answers

false-you shouldn’t post anything with other peoples consent.
The correct answer is false.

https://www.celonis.com/solutions/celonis-snap

Using this link

To do this alternative assignment in lieu of Case 2, Part 2, answer the 20 questions below. You
will see on the left side of the screen a menu for Process Analytics. Select no. 5, which is Order
to Cash and click on the USD version. This file is very similar to the one that is used for the BWF
transactions in Case 2, Part 2.
Once you are viewing the process analysis for Order to Cash, answer the following questions:
1. What is the number of overall cases?
2. What is the net order value?
Next, in the file, go to the bottom middle where you see Variants and hit the + and see what it
does to the right under the detail of variants. Keep hitting the + until you see where more than a
majority of the variants (deviations) are explained or where there is a big drop off from the last
variant to the next that explains the deviations.
3. What is the number of variants you selected?
4. What percentage of the deviations are explained at that number of variants, and why did you
pick that number of variants?
5. What are the specific variants you selected? Hint: As you expand the variants, you will see on
the flowchart/graph details on the variants.
6. For each variant, specify what is the percentage of cases and number of cases covered by that
variant? For example: If you selected two variants, you should show the information for each
variant separately. If two were your choice, then the two added together should add up to the
percentage you provided in question 4 and the number you provided in question 3.
7. For each variant, how does that change the duration? For example for the cases impacted by
variant 1, should show a duration in days, then a separate duration in days for cases impacted
by variant 2.
At the bottom of the screen, you see tabs such as Process, Overview, Automation, Rework, Benchmark,
Details, Conformance, Process AI, Social Graph, and Social PI. On the Overview tab, answer the
following questions:
8. In what month was the largest number of sales/highest dollar volume?
9. What was the number of sales items and the dollar volume?
10. Which distribution channel has the highest sales and what is the amount of sales?
11. Which distribution channel has the second highest sales and what is the amount of sales?
Next move to the Automation tab and answer the following questions:
12. What is the second highest month of sales order?
13. What is the automation rate for that month?
Nest move to the Details tab and answer the following questions:
14. What is the net order for Skin Care, V1, Plant W24?
15. What is the net order for Fruits, VV2, Plant WW10?
Next move to the Process AI tab and answer the following questions:
16. What is the number of the most Common Path’s KPI?
17. What is the average days of the most Common Path’s KPI?
18. What other information can you get off this tab?
Next move to the Social Graph and answer the following questions:
19. Whose name do you see appear on the graph first?
20. What are the number of cases routed to him at the Process Start?

Answers

1. The number of overall cases are 53,761 cases.

2. The net order value of USD 1,390,121,425.00.

3. The number of variants selected is 7.4.

4. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. Seven variants explain 87.3% of the total variance, including order, delivery, credit limit, material availability, order release, goods issue, and invoice verification.

10. January recorded the highest sales volume, with 256,384 items sold for USD 6,607,088.00. Wholesale emerged as the top distribution channel, followed by Retail.

12. December stood out as the second-highest sales month,

13. with an automation rate of 99.9%.

14. Notable orders include Skin Care, V1, Plant W24 (USD 45,000.00) and

15. Fruits, VV2, Plant WW10 (USD 43,935.00).

17. The most common path had a KPI of 4, averaging 1.8 days.

18. This data enables process analysis and improvement, including process discovery, conformance, and enhancement.

19. The Social Graph shows Bob as the first name,

20. receiving 11,106 cases at the Process Start.

1. The total number of cases is 53,761.2. The net order value is USD 1,390,121,425.00.3. The number of variants selected is 7.4. The percentage of the total variance explained at 7 is 87.3%. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. The seven specific variants that were selected are: Order, Delivery and Invoice, Check credit limit, Check material availability, Order release, Goods issue, and Invoice verification.6. Below is a table showing the percentage of cases and number of cases covered by each variant:VariantPercentage of casesNumber of casesOrder57.2%30,775Delivery and Invoice23.4%12,591Check credit limit5.1%2,757

Check material availability4.2%2,240Order release4.0%2,126Goods issue2.4%1,276Invoice verification1.7%9047. The duration of each variant is as follows:VariantDuration in daysOrder24Delivery and Invoice3Check credit limit2Check material availability1Order release2Goods issue4Invoice verification1

8. The largest number of sales/highest dollar volume was in January.9. The number of sales items was 256,384, and the dollar volume was USD 6,607,088.00.10. The distribution channel with the highest sales is Wholesale and the amount of sales is USD 3,819,864.00.

11. The distribution channel with the second-highest sales is Retail and the amount of sales is USD 2,167,992.00.12. The second-highest month of sales order is December.13. The automation rate for that month is 99.9%.14. The net order for Skin Care, V1, Plant W24 is USD 45,000.00.15.

The net order for Fruits, VV2, Plant WW10 is USD 43,935.00.16. The number of the most common path’s KPI is 4.17. The average days of the most common path’s KPI is 1.8 days.18. Additional information that can be obtained from this tab includes process discovery, process conformance, and process enhancement.

19. The first name that appears on the Social Graph is Bob.20. The number of cases routed to Bob at the Process Start is 11,106.

For more such questions deviations,Click on

https://brainly.com/question/24251046

#SPJ8

Which of the following describes evolution in the SDLC model?

modifying steps that need to be changed

the active process of measuring results

completing requirement analysis

preparing a plan or process

Answers

Completing the requirements analysis is the evolutionary step of the Software development life cycle (SDLC). Hence option 3

What is the software development life cycle?

The SDLC is a method for evaluating and improving the development process. It enables a fine-grained study of each process phase. As a result, firms are able to maximize efficiency at each level.

SDLC aids in the achievement of these objectives by detecting inefficiencies and increased costs and resolving them so that everything runs smoothly.

Thus, Initial needs and architecture planning must be completed and are considered as an evolution in the SDLC model

Learn more about SDLC:

brainly.com/question/26366977

#SPJ1

what is a web browser

Answers

Answer:

A web browser takes you anywhere on the internet, letting you see text, images, and video from anywhere in the world. The web is a vast and powerful tool. Over the course of a few decades, the internet has changed the way we work, the way we play and the way we interact with one another. Depending on how it’s used, it bridges nations, drives commerce, nurtures relationships, drives the innovation engine of the future and is responsible for more memes than we know what to do with.

Explanation:

Developers must avoid using data that ______ select 3 options

1. Are based on historic inequalities

2. do not represent the people it bill be used for

3. Favor majority groups

4. Are inaccurate or incomplete in any way

5. Are based on their assumptions or knowledge

Answers

Developers must avoid using data that:

1. Are based on historic inequalities

2.do not represent the people it will be used for

3.Are inaccurate or incomplete in any way

y Program
A diagrammatic representation of an algorithm is called
58.
A. Parallelogram
B. Diagram
Flowchart
D. Symbols
denotes a direction of logical flow in a
program,
A. Arrow
G
B. Line
C. Flow line
D. Logic line
59,​

Answers

Answer:

1.C) Flowchart

2.C)Flowline

difference and similarities between Database, DBMS, database application and database system in tabular form​

Answers

Answer:

Here is a tabular comparison of Database, DBMS, database application, and database system:

| Term | Definition | Key Features |

| --- | --- | --- |

| Database | A collection of data that is organized and stored in a computer system | Contains data, metadata, and relationships between data |

| DBMS (Database Management System) | Software used to manage databases and perform operations on data | Provides a way to create, read, update, and delete data; enforces data integrity; controls access to data |

| Database Application | A software application that interacts with a database to perform specific tasks | Provides an interface for users to interact with data; can perform specific tasks such as data entry, querying, reporting, and analysis |

| Database System | A combination of a database and a DBMS, along with hardware and software components that are used to manage and store data | Includes the database, DBMS, hardware, software, and people who interact with the system |

Some similarities and differences between these terms are:

| Term | Similarities | Differences |

| --- | --- | --- |

| Database and DBMS | Both are used to manage data | Database is a collection of data, while DBMS is software used to manage the database |

| DBMS and Database Application | Both involve software applications | DBMS manages databases, while database application interacts with a database to perform specific tasks |

| Database Application and Database System | Both are software applications | Database application is a part of a database system, which also includes a database, DBMS, hardware, software, and people who interact with the system |

In summary, a database is a collection of organized data, while a DBMS is software used to manage and operate on the database. A database application is a software application that interacts with a database to perform specific tasks. A database system is a combination of a database, DBMS, hardware, software, and people that work together to manage and store data.

mark me brilliant

What is the function of a primary key in a table? to uniquely identify each record in the table to uniquely identify foreign keys in the table to secure table data to secure the foreign keys in the table

Answers

Answer:

A. To uniquely identify each record in the table

brainliest pls?

Discuss the term internal control​

Answers

Answer:

Internal controls are procedural measures an organization adopts to protect its assets and property. Broadly defined, these measures include physical security barriers, access restriction, locks and surveillance equipment. They are more often regarded as procedures and policies that protect accounting data.

PLEASE MARK ME BRAINLIEST


Which statement, if any, about Boolean is false?
a. They are all true.
b. Boolean is one of the four data types.
c. All expressions in python have a Boolean value.
c. The Boolean values are True and False.

Answers

Answer:

A.

Explanation:

Which of the following groups might sign a non-disclosure agreement between them?

the local government and its citizens

a group of employees or contractors

a company and an employee or contractor

two competing businesses or companiesc​

Answers

Answer: I believe the right answer is between a company and employee or contractor.

Explanation: I think this is the answer because a non-disclosure is a legal contract between a person and a company stating that all sensitive. information will be kept confidential.

Answer:a

Explanation:

By using the cloud to support their application or website, developers have access to services like that increases the capacity of the system automatically, with preset limits. Cloud solutions also offer which divides the tasks between network resources based on traffic and their individual capacities.

load balancing
autoscaling​

Answers

Answer:

Autoscaling, loud balancing.

Explanation:

By using the cloud to support their application or website, developers have access to services like autoscaling that increases the capacity of the system automatically, with preset limits. Cloud solutions also offer loud balancing, which divides the tasks between network resources based on traffic and their individual capacities.

Good luck on any future assignments!

Developers that use the cloud to support their application or website have access to services like autoscaling, which automatically increases system capacity within certain boundaries. Loud balancing, another feature of cloud solutions, allocates duties to network resources according to traffic and their particular capacity.

What is Load Balancing and autoscaling?

The major networking method used in a server farm to distribute traffic among its several machines is load balancing. Applications' responsiveness and availability are improved by load balancers, which also guard against server overload. The position of each load balancer is between the client devices and the backend servers. It receives incoming requests and then distributes them to any available and competent server.

A cloud computing technique for dynamically assigning computational resources is called autoscaling, sometimes known as autoscaling, auto-scaling, and occasionally automatic scaling. The number of servers that are active will normally change automatically as user needs change, depending on the demand on a server farm or pool.

Because an application often scales based on load balancing serving capacity, autoscaling and load balancing go hand in hand. In other words, the autoscaling policy is shaped by a number of parameters, including the load balancer's serving capacity and CPU utilization from cloud monitoring.

To get more information about Load Balancing and autoscaling :

https://brainly.com/question/27252527

#SPJ2

QUESTION 5 OF 30
Burnout can happen quickly when
working with multiple sysadmins
working overtime
working as the sole sysadmin

Answers

Answer:

Burnout can happen quickly when working with multiple sysadmins, working overtime, or working as the sole sysadmin.

Explanation:

When you create a calculated item for a field in a PivotTable, it appears as a new item within the field. Question 4 options: True False

Answers

When you create a calculated item for a field in a PivotTable, it appears as a new item within the field is a false statement.

What is a calculated item in a pivot table?

A Calculated Item is known to be a kind of custom formula that is seen in an Excel pivot table.

It is known to be one that can use the sum of other items in the same field. For example, when a person calculate the sum of 2 other items in a field. Note that Calculated items are not depicted or shown in the PivotTable Field List.

Learn more about PivotTable from

https://brainly.com/question/15214258

The _________ shortcut keys underline words, and not spaces

Answers

CTRL+SHIFT+W

Have a nice day :}

TRUE/FALSE. computer forensic examiners secure the crime scene and any electronic devices and ensure no one tampers with or modifies evidence during the collection phase of an investigative process.

Answers

The statement " computer forensics examiners secure the crime scene and any electronic devices and ensure no one tampers with or modifies evidence during the collection phase of an investigative process" is False.

What is computer forensics?

The study of evidence discovered on computers and other digital storage devices is known as computer forensics, a subfield of digital forensic science. Computer forensics aims to detect, preserve, recover, analyze, and provide facts and views about digital information by carefully examining digital media in a forensically sound manner.

A branch of technology known as computer forensics uses investigative methods to locate and preserve digital data. Finding evidence that could be utilized in court is frequently done via computer forensics.

Information from computers and other digital storage devices is helped to be retrieved by computer forensic investigators. The retrieved information can then be utilized in criminal investigations or as proof in cybercrime cases.

To learn more about computer forensics, use the link given
https://brainly.com/question/14405745
#SPJ4

In C programing please. Write a function fact_calc that takes a string output argument and an integer input argument n and returns a string showing the calculation of n!. For example, if the value supplied for n were 6, the string returned would be 6! 5 6 3 5 3 4 3 3 3 2 3 1 5 720 Write a program that repeatedly prompts the user for an integer between 0 and 9, calls fact_calc and outputs the resulting string. If the user inputs an invalid value, the program should display an error message and re-prompt for valid input. Input of the sentinel -1 should cause the input loop to exit.

Note: Don't print factorial of -1, or any number that is not between 0 and 9.

In C programing please. Write a function fact_calc that takes a string output argument and an integer

Answers

Answer:

#include <stdio.h>

#include <stdlib.h>

#include <string.h>

void fact_calc(char* output, int n) {

   int i;

   int factorial = 1;

   sprintf(output, "%d! ", n);

   for (i = n; i >= 1; i--) {

       factorial *= i;

       sprintf(output + strlen(output), "%d ", i);

   }

   sprintf(output + strlen(output), "%d", factorial);

}

int main() {

   int user_num;

   char output[50];

   while (1) {

       printf("Enter an integer between 0 and 9 (-1 to quit): ");

       scanf("%d", &user_num);

       if (user_num == -1) {

           break;

       } else if (user_num < 0 || user_num > 9) {

           printf("Invalid input. Please try again.\n");

           continue;

       }

       fact_calc(output, user_num);

       printf("%s\n", output);

   }

   return 0;

}

Explanation:

The fact_calc function takes a string output argument and an integer input argument n, and calculates n! while building a string to display the calculation. It uses the sprintf function to append the intermediate steps of the calculation to the output string.

The main function repeatedly prompts the user for input and calls the fact_calc function with the user's input. If the user enters an invalid value, an error message is displayed and the program re-prompts for input. The program exits when the user enters -1.

Transmissions in wireless networks do not allow for collision detection but try to avoid collision. Briefly describe this process and explain why it is termed as unreliable.

Answers

Transmissions in wireless networks do not allow for collision detection but try to avoid collision and also  It is especially crucial for wireless networks since wireless transmitters desensing (turning off) their receivers during packet transmission prevents the option of collision detection using CSMA/CD.

What are the different types of wireless transmission?

Wireless transceivers are unable to send and receive on the same channel simultaneously, hence they are unable to identify collisions. This is because the send power (which is typically around 100mw) and the receive sensitivity have such a huge disparity (commonly around 0.01 to 0.0001mw).

Therefore, Infrared, broadcast radio, cellular radio, microwaves, as well as communications satellites are examples of wireless transmission media that are used in communications. Infrared (IR), which is a wireless transmission medium that uses infrared light waves to transmit signals, was covered previously in the chapter.

Learn more about collision detection  from

https://brainly.com/question/14775265

#SPJ1

To fill the entire background of a container use ___, it enlarges until it fills the whole element


repeat:both


full


cover


fill

Answers

Answer:

cover

Explanation:

How have advancements in technology and social media impacted communication and relationships in our society?

Answers

Answer:The advancement of technology has changed how people communicate, giving us brand-new options such as text messaging, email,  and chat rooms,

Explanation:

Answer: the answer will be they allow faster and more efficient communication and can help build relationships.

Explanation:

Which is a software application used to analyze an organization’s data to improve decision making?

Answers

The software application used to analyze an organization’s data to improve decision making is said to be Business intelligence software.

What is Business intelligence?

Business intelligence is known to be a kind of app that has been set up and it is known to have a set of data analysis applications that has been made to meet a lot of information needs.

Business intelligence are known to be a kind of procedural and technical input that takes , stores, and analyzes the data made by a company's activities.

Learn more about Business intelligence from

https://brainly.com/question/13339276

Which part of the Result block should you evaluate to determine the needs met rating for that result

Answers

To know the "Needs Met" rating for a specific result in the Result block, you should evaluate the metadata section of that result.

What is the  Result block

The assessment of the metadata section is necessary to determine the rating of "Needs Met" for a particular outcome listed in the Result block.

The metadata includes a field called needs_met, which evaluates the level of satisfaction with the result in terms of meeting the user's requirements. The needs_met category usually has a score between zero and ten, with ten implying that the outcome entirely fulfills the user's demands.

Learn more about Result block from

https://brainly.com/question/14510310

#SPJ1

References inserted initially as footnotes can be converted to endnotes through an option in the software.

A. True

B. False

Answers

The answer is A. True

The answer is: A) True

DSL full form in computer
please give me answer fast​

Answers

Answer:

Digital subscriber line

Hi!
i want to ask how to create this matrix A=[-4 2 1;2 -4 1;1 2 -4] using only eye ones and zeros .Thanks in advance!!

Answers

The matrix A=[-4 2 1;2 -4 1;1 2 -4] can be created by using the following code in Matlab/Octave:

A = -4*eye(3) + 2*(eye(3,3) - eye(3)) + (eye(3,3) - 2*eye(3))

Here, eye(3) creates an identity matrix of size 3x3 with ones on the diagonal and zeros elsewhere.

eye(3,3) - eye(3) creates a matrix of size 3x3 with ones on the off-diagonal and zeros on the diagonal.

eye(3,3) - 2*eye(3) creates a matrix of size 3x3 with -1 on the off-diagonal and zeros on the diagonal.

The code above uses the properties of the identity matrix and the properties of matrix addition and scalar multiplication to create the desired matrix A.

You can also create the matrix A by using following code:

A = [-4 2 1; 2 -4 1; 1 2 -4]

It is not necessary to create the matrix A using only ones and zeroes but this is one of the way to create this matrix.

Other Questions
Can someone please help me with this? Analyze the different claims in "ValedictorianAddress at Anacostia High School" and thePoint/Counterpoint essays from "Methods ofMotivation." Explain what each author has to sayabout culture and the pursuit of goals. What inspired the American revolution TRUE/FALSE. A moral principle cannot serve as the basis of a decision procedure in trying to reach correct moral verdicts about the rightness and wrongness of actions. what would be the effect on the equilibrium of a reduction in demand if the supply curve is perfectly inelastic? In this equation, what shows that transmutation has taken place?242. 238. 496Cm 94 Pu +2 HeA. There is conservation of both nucleons and atoms.B. The nucleus of an atom changes.C. The number of atoms is conserved, but the number of nucleons isnot.D. It involves more than one element. after collecting the data, shawn finds that the monthly number of take-out orders at a restaurant is normally distributed with mean 132 and standard deviation 6. what is the probability that a randomly selected month's number of orders is more than 150? Why were missions established in Mexico? An electric clock is stopped by a power failure. what is the probability of the event that he second hand is stopped between the 3 and 4? A(n) __________ is one who is entrusted to care for, or act on behalf of, another. A Pitot static tube is used to measure the velocity of an aircraft. If the air temperature and pressure are 5C and 90kPa respectively, what is the aircraft velocity in km/h if the differential pressure is 250mm water column. Problem 4: A Pitot static tube is used to measure the velocity of water flowing in a pipe. Water of density p = 1000 kg/m is known to have a velocity of v=2.5 m/s where the Pitot static tube has been introduced. The static pressure is measured independently at the tube wall and is 2 bar. What is the head developed by the Pitot static tube if the manometric fluid is mercury with density equal to p = 13600 kg/m. 5. If you combine 15.6 g Mg with 13.9 g of Br, what is the percent composition of eachelement in the mixture. 37. Perform the following binary multiplications, assuming unsigned integers: a) 1011 x 101 Question 2 of 10 Based only on the information given in the diagram, it is guaranteed that PQR~ STU. A. True B. Falseplease!? thanks! * Last known person(s) to see or speak to Ichabod before his disappearance? An advantage of centralized routing is:_______ a) What is the maximum torque on a 150-turn square loop of wire 18.0 cm on a side that carries a 50.0-A current in a 1.60-T field?(b) What is the torque when is 10.9? Suppose Jarrod wants to find out about Lonnie Johnson. He would find most of his information? A stereotype is best characterized as a type of in propeller driven planes with two propellers, the propellers will rotate in opposite directions. why is this?