Answer & Explanation:
This program is written in C++ and it combines the step 1 and step 2 to create a menu driven program
Each line makes use of comments (as explanation)
Also, see attachment for program file
Program Starts Here
//Put Your Name Here; e.g. MrRoyal
//This program calculates the area of circle, triangle and square; depending on the user selection
//The next line include necessary header file
#include<iostream>
using namespace std;
int main()
{
//The next line defines variable pi as a constant with float datatype
const float pi = 3.14159;
// The next two lines declares all variables that'll be needed in the program
string choice;
float length, base, height, radius, area;
// The next four lines gives an instruction to the user on how to make selection
cout<<"Press 1 to calculate area of a square: "<<endl;
cout<<"Press 2 to calculate area of a circle: "<<endl;
cout<<"Press 3 to calculate area of a triangle: "<<endl;
cout<<"Press 4 to quit: "<<endl;
//This next line prompts user for input
cout<<"Your choice: ";
//This next line gets user input and uses it to determine the next point of execution
cin>>choice;
if(choice == "1") //If user input is 1, then the choice is area of square
{
cout<<"Length: "; //This line prompts user for length of the square
cin>>length; // This line gets the length of the square
area = length * length; //This line calculates the area
cout<<"Area: "<<area; //This line prints the calculated area
}
else if(choice == "2") //If user input is 2, then the choice is area of circle
{
cout<<"Radius: "; //This line prompts user for radius
cin>>radius; //This line gets radius of the circle
area = pi * radius * radius; // This line calculates the area
cout<<"Area: "<<area; //This line prints the calculated area
}
else if(choice == "3") //If user input is 2, then the choice is area of triangle
{
cout<<"Base: "; //This line prompts user for base
cin>>base; //This line gets the base
cout<<"Height: "; //This line prompts user for height
cin>>height; //This line gets the height
area = 0.5 * base * height; //This line calculates the area
cout<<"Area: "<<area; //This line prints the calculated area
}
else if(choice == "4") //If user input is 4, then the choice is to quit
{
//Do nothing and quit
}
else //Any other input is invalid
{
cout<<"Invalid Option Selected";
}
return 0;
}
Determine the total number of votes and the percentage of the total votes by each candidate. The sample output of your program is shown below. It incudes the winner of the election. Use methods from the System.out stream for your output.
The program that yeilds the above output is given as follows.
public class VoteCounter {
public static void main(String[] args) {
int candidate1Votes = 500;
int candidate2Votes = 300;
int candidate3Votes = 200;
int totalVotes = candidate1Votes + candidate2Votes + candidate3Votes;
double candidate1Percentage = (double) candidate1Votes / totalVotes * 100;
double candidate2Percentage = (double) candidate2Votes / totalVotes * 100;
double candidate3Percentage = (double) candidate3Votes / totalVotes * 100;
System.out.println("Total votes: " + totalVotes);
System.out.println("Candidate 1 votes: " + candidate1Votes + " (" + candidate1Percentage + "%)");
System.out.println("Candidate 2 votes: " + candidate2Votes + " (" + candidate2Percentage + "%)");
System.out.println("Candidate 3 votes: " + candidate3Votes + " (" + candidate3Percentage + "%)");
}
}In this program,we have three candidates, and the number of votes for each candidate is given.
We calculate the total votes by summing up the votes for all candidates. Then,we calculate the percentage of votes for each candidate by dividing their votes by the total votes and multiplying by 100.
Finally,we use the System.out.println() method to display the total votes and the votes and percentages for each candidate.
Learn more about program:
https://brainly.com/question/23275071
#SPJ1
With suitable example, illustrate the use of #ifdef and #ifndef.
Partitions are used to divide storage spaces into manageable segments.
Fixed partitions have a predetermined size, and they are used to allocate storage space based on the needs of an application. Fixed partitions are commonly used in mainframe systems, where applications require predictable amounts of storage.
For example, consider an organization that uses a mainframe system to manage its payroll. In this scenario, the organization may use fixed partitions to allocate storage space to the payroll application, ensuring that it has access to a specific amount of storage space at all times.
On the other hand, dynamic partitions allow the operating system to allocate storage space based on the requirements of an application. With dynamic partitions, the size of the partition is not fixed, and it can grow or shrink based on the needs of an application.
For example, consider a personal computer that is used to store and manage different types of data. In this scenario, dynamic partitions are used to allocate storage space to different applications based on their storage requirements.
As new applications are installed, the operating system dynamically allocates storage space to ensure that each application has sufficient storage space to function properly.
To know more about Partitions visit:
brainly.com/question/31672497
#SPJ1
You decide to test the voltages across several of the components. The measured voltages are:
V1 = 0 Volts
V2 = 12 Volts
V3 = 0 Volts
V4 = 12 Volts
These voltages do not correspond with what should be happening if there is current flowing through each device.
Which statement below describes what is happening?
Zero voltage across the fuse indicates that the fuse is the problem.
12 volts across the resistor and no current indicates that the resistor is blown.
Zero volts across the lamp indicates that the light is bad.
The fuse is bad because there is no current.
Zero volts across the lamp indicates that the light is bad. The correct option is C.
What is resistor?A resistor is a passive two-terminal electrical component used in circuits to implement electrical resistance.
Resistors have a variety of purposes in electronic circuits, including lowering current flow, adjusting signal levels, dividing voltages, biassing active components, and terminating transmission lines.
After the light bulb, a test of 0 volts shows that there is no resistance in the ground circuit.
At that time, the battery is receiving all of the circuit's voltage (by the path of least resistance), and no voltage is passing through the metre (0 volt reading).
Thus, the correct option is C.
For more details regarding resistor, visit:
https://brainly.com/question/24297401
#SPJ1
Ali receives an email from a person posing as a bank agent, who asks Ali to share his bank account credentials. Which type of network attack does this scenario indicate?
The network attack in this scenario is . This attack can occur .
Phishing is the type of network attack which this scenario indicates. This type of attack can take place via electronic messages.
What is network attack?
Network attacks are illegal activities on digital assets within an organization's network. Malicious parties typically use network assaults to change, destroy, or steal private data. Network attackers typically target network perimeters in order to obtain access to interior systems. In a network attack, attackers aim to breach the business network perimeter and obtain access to internal systems. Once inside, attackers frequently combine different forms of assaults, such as compromising an endpoint, propagating malware, or exploiting a weakness in a system within the network.
To learn more about network attack
https://brainly.com/question/14980437
#SPJ13
The following pseudocode describes how a bookstore computes the price of an order from the total price and the number of the books that were ordered. Step 1: read the total book price and the number of books. Step 2: Compute the tax (7.5% of the total book price). Step 3: Compute the shipping charge ($2 per book). Step 4: The price of the order is the sum of the total book price, the tax and the shipping charge. Step 5: Print the price of the order. Translate this psuedocode into a C Program. Please write only the main body of the program
Answer:
float bookExamplePrice = 15.25;
float bookTax = 7.5;
float bookShippingPrice = 2.0;
float Test = bookExamplePrice / 100;
float Tax = Test * bookTax;
float FullPrice = Tax + bookExamplePrice + bookShippingPrice;
// I don't know how to remove the numbers after the first two decimals.
// I tested this program. It works!
// The text after the two slashes don't run when you compile them.
printf("Price: $%.6f\n",FullPrice);
Explanation:
intellectual property laws cover software and many other digital creations. Which of the following is an example of a positive impact of intellectual property laws?
Pedram, a student, can always study in any library in the United States for free because US libraries are declared intellectual property.
Pedram, a student, can always study in any library in the United States for free because US libraries are declared intellectual property.
Chanel, a homebuyer, gets a tax break because her house includes an office room which counts as intellectual property.
Chanel, a homebuyer, gets a tax break because her house includes an office room which counts as intellectual property.
Ariel studies real estate laws and uses her knowledge to help low-income families find affordable housing.
Ariel studies real estate laws and uses her knowledge to help low-income families find affordable housing.
Ricardo, a medical researcher, sells a vaccine he discovered and uses the proceeds to fund more research.
Ricardo, a medical researcher, sells a vaccine he discovered and uses the proceeds to fund more research.
Patents are an example of intellectual property rights. names of domains. industry architecture.
What does intellectual personality entail?
Abstract. When people encounter a social, political, religious, historically significant, or economically significant cultural phenomena, they use their feelings, behaviour, beliefs, attitudes, and methods of reasoning, evaluation, and decision-making to decide whether to accept or reject it. What exactly is intellectual haughtiness? A person who is otherwise clever will often be blinded to the truth by a set of traits known as intellectual hubris. Some examples of these are a lack of logical rigour and the use of preconceived assumptions or what one believes he acquired in school rather than rigorous reasoning.
To know more about rights visit:-
https://brainly.com/question/7721379
#SPJ1
Answer:
the answer is Ricardo!
Explanation:
I got it right
Write a 250-word essay on the benefits and dangers of collecting and storing personal data on online databases. Things to consider:
Does the user know their data is being collected?
Is there encryption built into the system?
Is that encryption sufficient to protect the data involved?
Does collecting the data benefit the end user? Or just the site doing the collecting?
Answer:
The collection and storage of personal data on online databases has both benefits and dangers. On the one hand, collecting and storing data can be incredibly useful for a variety of purposes, such as personalized recommendations, targeted advertising, and improved user experiences. However, it's important to consider the risks and potential consequences of this practice, particularly in regards to privacy and security.
One concern is whether or not users are aware that their data is being collected. In some cases, this information may be clearly disclosed in a site's terms of service or privacy policy, but in other cases it may not be as transparent. It's important for users to be aware of what data is being collected and how it is being used, so that they can make informed decisions about whether or not to share this information.
Another important factor is the level of encryption built into the system. Encryption is a way of encoding data so that it can only be accessed by authorized parties. If a system has strong encryption, it can help to protect the data involved from being accessed by unauthorized users. However, if the encryption is weak or flawed, it may not be sufficient to protect the data. It's important to carefully consider the strength and reliability of any encryption used on a system that stores personal data.
Ultimately, the benefits and dangers of collecting and storing personal data on online databases will depend on the specific context and how the data is being used. It's important to weigh the potential benefits and risks, and to carefully consider whether the collection and storage of this data is truly in the best interests of the end user, or if it is primarily benefiting the site doing the collecting.
Explanation:
How has technology influenced space exploration?
Answer:
One of the biggest benefits of machine learning when it comes to space exploration is that programs can sift through the available data more easily than humans, which increases the chance of finding planets just by looking at datasets. It's even thought that AI could be instrumental in locating extra-terrestrial life.
Explanation:
What are vSphere Clusters and how are they utilized in vSphere?
A group of ESXi hosts set up as a vSphere cluster to share resources like processor, memory, network, and storage In vSphere environments, each cluster can hold up to 32 ESXi hosts, each of which can run up to 1024 virtual machines.
What is vSphere Clusters?The Clusters page in the vSphere Infrastructure view lets you see how many more virtual machines (VMs) can be added to each cluster, how many resources are totaled up in each cluster, and how many resources are currently available in each cluster. It also lets you manage the resources of each host that is part of the cluster.
According to the spare cluster capacity, the page shows information about the number of additional VMs that can be added to each cluster, as well as information about the powered-on and running VMs, their CPU and memory utilization, and other information. By changing the settings for the spare VM basis on this page, you can change how the spare VM basis for an average VM is calculated.
The information on this page helps to address important subsystem-related questions like the following by giving a comprehensive picture of cluster memory usage and contention using Memory metrics:
Is my environment's vSphere memory management functioning properly?In my environment, is the vSphere page sharing mechanism being used effectively? What amount of memory is shared?How much memory can you overcommit?Learn more about vSphere
https://brainly.com/question/28787607
#SPJ1
What is the controller in this image know as? Choose one
Answer:
mode dial
Explanation:
What kind of bit is designed to pull itself through as it drill?
A.Spade bit
B. Carbide -tipped bit
C.twist bit
D.auger but
An auger bit is designed to self-feed and pull itself through as it drills into wood or other soft materials. Therefore, the correct option is (D) auger bit.
An auger bit is designed to pull itself through as it drills. This type of bit is often used for drilling holes in wood, where the self-feeding design helps to reduce the amount of effort required by the operator. The auger bit is typically long and cylindrical, with a threaded screw-like tip that helps to pull the bit into the wood as it rotates. As the bit spins, it bores out a hole in the wood, and the waste material is carried up and out of the hole by the spiraled flute design. Auger bits come in a variety of sizes and shapes, and they can be used for a range of applications, including drilling holes for dowels, bolts, and other fasteners. Overall, the self-feeding design of the auger bit makes it a useful tool for any woodworker or DIY enthusiast looking to drill holes quickly and efficiently.For more such questions on Bit:
https://brainly.com/question/30176087
#SPJ8
Changing the color of the text in your document is an example of
Answer:
???????????uhhh text change..?
Explanation:
Answer:
being creative
Explanation:
cause y not?
Which certification does CompTIA recommend a candidate for the CompTIA Network exam already have?
Answer:
normaly a CompTIA A+ and a Cisco CCNA
Explanation:
thses are just some of the basic's i seen comptia list with most network certifications.
Answer:.
Explanation:
Can someone please help me figure this out and let me know what I'm missing. It is on CodeHs and it's 1.3.8 Freely Falling Bodies
The code is in Java.
It calculates the height and velocity of a dropped pebble using the given formulas.
Comments are used to explain the each line.
//FallingBodies.java
public class FallingBodies
{
public static void main(String[] args) {
//Declare the g as a constant
final double g = 9.8;
//Declare the other variables
double t, height, velocity;
//Set the time
t = 23;
//Calculate the height using the given formula
height = 0.5 * g * t * t;
//Calculate the velocity using the given formula
velocity = g * t;
//Print the height and velocity
System.out.println("The height is " + height + " m");
System.out.println("The velocity is " + velocity + " m/s");
}
}
You may read more about Java in the following link:
brainly.com/question/13153130
Declare a Boolean variable named isValidPasswd. Use isValidPasswd to output "Valid" if codeStr contains no more than 4 letters and codeStr's length is less than 9, and "Invalid" otherwise.
Ex: If the input is l7J45s6f, then the output is:
Valid
Ex: If the input is n84xfj061, then the output is:
Invalid
Note: isalpha() returns true if a character is alphabetic, and false otherwise. Ex: isalpha('a') returns true. isalpha('8') returns false.
please help in c++
Answer: #include <iostream>
#include <string>
using namespace std;
int main() {
string codeStr = "l7J45s6f";
bool isValidPasswd = true;
int letterCount = 0;
for (char c : codeStr) {
if (isalpha(c)) {
letterCount++;
}
if (letterCount > 4 || codeStr.length() >= 9) {
isValidPasswd = false;
break;
}
}
if (isValidPasswd) {
cout << "Valid" << endl;
} else {
cout << "Invalid" << endl;
}
return 0;
}
Explanation: In this usage, we to begin with characterize a codeStr variable with the input string, and a isValidPasswd variable initialized to genuine. We at that point circle through each character in codeStr, increasing a letterCount variable in case the current character is alphabetic. In case the letterCount gets to be more noteworthy than 4, or in the event that the length of codeStr is more prominent than or break even with to 9, we set isValidPasswd to wrong and break out of the circle.
At last, we yield "Substantial" in case isValidPasswd is genuine, and "Invalid" something else.
Answer:
c++
Explanation:
Find the EmpId, EmpLName and Status in a table named “Employees” whose status is neither contractor nor consultant.
a) SELECT EmpID, EmpLName, Status FROM Employees WHERE status NOT IN (‘contractor, ‘consultant’)
b) SELECT EmpID, EmpLName, Status FROM Employees WHERE status NOT BETWEEN (‘contractor, ‘consultant)
c) SELECT EmpID, EmpLName, Status FROM Employees WHERE status IN (‘contractor, ‘consultant)
d) SELECT EmpID, EmpLName, Status FROM Employees WHERE status BETWEEN (‘contractor, ‘consultant);
Answer:
a) SELECT EmpID, EmpLName, Status FROM Employees WHERE status NOT IN ('contractor', 'consultant')
Explanation:
This SQL query is selecting the EmpId, EmpLName, and Status columns from the "Employees" table, but it is filtering the results to only include rows where the Status is not equal to "contractor" or "consultant". The keyword "NOT" is used to negate the condition of the "IN" operator, which means the query will return all the rows where the status is not contractor or consultant.
Determine if the statement is true or false. Asymmetrical design can be visually balanced from left to right.
True or false
Answer:
true false asan pala tanong dyan?
It is false that the asymmetrical design can be visually balanced from left to right.
What is asymmetrical design?Asymmetrical balance is the technique of achieving a sense of balance by using different visual elements of unequal weight on both sides of a composition.
If you understand that symmetrical means that both sides of something are identical, it should be simple to understand that asymmetrical means that the two sides are different in some way.
Asymmetrical objects are irregular and crooked, and do not perfectly match up when folded in half.
Asymmetry is the lack of symmetry or equality between your design's halves. While both halves of a symmetrical design are the same (or similar), both halves of an asymmetrical design are distinct.
Thus, the given statement is false.
For more details regarding asymmetrical design, visit:
https://brainly.com/question/14701136
#SPJ5
Question 18
Which of the following is true?
a = 1
b = 10
a
b<= a or a >= b
a>bor a == b
a band a == b
Answer:
None
Explanation:
Logical operators:
'and' indicates that the statement is true if both conditions are true.
'or' indicates that the statement is true if one or both conditions are true.
Given that a = 1 and b = 10:
The first statement is false (1×10 <= 1 is false, 1 >= 10 is also false)
The second statement is false (1>10 is false, a does not equal b)
The third statement is false (a does not equal b)
None of these statements are true.
Hope this helps :)
is Cycle and share electric vehicles is agree or dis agree?why?
Utilizing more energy-efficient vehicles, such as hybrid and electric models, promotes the American economy and contributes to the fleet's diversification.
What are major safety in electric vehicles?Like any latest tech, EVs have been the subject of some scepticism, trepidation, and uncertainty. sometimes, even rumours. Certainly, some individuals are worried about the safety using electric automobiles. Even though there have been some reasons for worry, it's crucial to see the truth through the smoke. While EVs may have a special set of issues, many of them have been resolved because to the significant R&D and industry knowledge hired by OEMs, who daily work to advance EV technology. EV batteries are safeguarded in a tamper- and crash-proof construction. EVs include a technology that immediately disengages the battery during collisions to increase safety.
To know more about major safety in electric vehicles visit:
https://brainly.com/question/28222772
#SPJ1
i need simple app ideas for basic problems
Answer: - scan and convert to pdf app.
- timetable managing app.
- color seeing app (for color-blind people.)
- virtual clothing/jewelry try on.
Explanation:
Observe ,which plunger exerts(produces) more force to move the object between plunger B filled with air and plunger B filled with water?
The plunger filled with water will exert more force to move an object compared to the plunger filled with air.
What is a plunger?Plunger, force cup, plumber's friend, or plumber's helper are all names for the tool used to unclog pipes and drains. It is composed of a stick (shaft) that is often constructed of wood or plastic and a rubber suction cup.
It should be noted that because water is denser than air, meaning it has a higher mass per unit volume. When the plunger is filled with water, it will have a greater overall mass and will thus be able to transfer more force to the object it is trying to move.
Learn more about water on:
https://brainly.com/question/1313076
#SPJ1
Take two equal syringes, join them with plastic tube and fill them with water as illustrated in the figure
Push the plunger of syringe A (input) and observe the movement of plunger B (output).
(a)
Which plunger moves immediately when pressing plunger A, between plunger B filled with air and plunger B filled with water?
Create a file named network.py. The file should be created in the same directory as health_checks.py, i.e., scripts. If you are not present in the scripts directory, navigate to the scripts directory first and then create the file.
Answer:
There is a distinction between where the script exists, given by __file__, and the current working directory (usually the place from which the script was invoked), given by os.getcwd(). It is not entirely clear from the question wording which one was intended, although they are often the same.
The Python code that you can run on your system to create the network.py file in the scripts directory is explained in solution.
Here's a Python code snippet that will create the network.py file in the scripts directory:
import os
# Get the current working directory
current_directory = os.getcwd()
# Check if the current directory is 'scripts'
if not current_directory.endswith('scripts'):
# Navigate to the 'scripts' directory
scripts_directory = os.path.join(current_directory, 'scripts')
os.chdir(scripts_directory)
# Content of the 'network.py' file
network_py_content = """
# Your network.py file content goes here
# You can define your network-related functions and classes in this file.
"""
# Create and write to the 'network.py' file
with open('network.py', 'w') as file:
file.write(network_py_content)
print("File 'network.py' has been created in the 'scripts' directory.")
To use this code, copy and paste it into a Python script (e.g., create_network.py), and run it.
The script will create the network.py file in the scripts directory if you are not already present in that directory.
Learn more about Python code click;
https://brainly.com/question/33331724
#SPJ3
School has opened its administrations for the 11th grade students. They plan to give fee concessions to their 11th grade students based on their 10th grade mark. You being their software consultant have been approached to develop software to implement the functionality to manage school fee.
As a software consultant, the first step in developing software to manage school fees would be to gather information about the school's fee structure, policies, and procedures. This would include understanding how fees are calculated, how fee concessions are awarded, and what information is required from the students to process fee concessions.
What is the software about?Once this information is gathered, the next step would be to design the software system to capture and manage the fee information. The software system would need to be able to store student information, including their marks from 10th grade, as well as the fee structure and concessions policies.
The software system would also need to be able to calculate the fees for each student based on their marks from 10th grade and any applicable fee concessions. This would require programming the software to perform calculations based on the school's fee structure and policies. The software system should also be designed to provide reports and data analytics on fee payments and concessions.
In addition, the software system should be designed to be user-friendly and easy to use for both school administrators and students. This would include a user-friendly interface, clear instructions for entering and updating information, and the ability to generate reports and other data visualizations.
Learn more about software from
https://brainly.com/question/28224061
#SPJ1
Describe two reasons to use the Internet responsibly. Explain what might happen if the Internet use policies were broken at
your school.
Answer: You don't want to download any virus and Chat rooms with stranger can be harmful
Explanation: You can get a virus on your school device, get yourself in harmful situations and your passwords might not be safe
Why we need to interpret the drawing and plans
Technical drawing is essential for communicating ideas in industry and engineering.
How can an IS managers keep up with the endless demand for more software to support new information systems
An IS manager can keep up with the endless demand for more software to support new information systems by thinking outside the box.
To think outside the box, the IS manager should try the following strategies:
Use predetermined application components that are operating on low-code or no-code platforms.Use better software-testing practices and tools that spread programming into small sprints.Engage in shift-left testing, which enables software-testing to be done at every phase of the development process.Involve product managers and business users at the beginning of software development, making them to drive innovation that satisfies their requirements.Finally, the IS manager can utilize AI and Machine Learning to speed up the development of required software, thereby enhancing its qualities and capabilities with reduced time and costs.Thus, the IS manager must realize that there are always solutions to every software problem outside the mainstream box.
Learn more about information systems here: https://brainly.com/question/1521627
How many subnets and host per subnet are available from network 192.168.43.0 255.255.255.224?
It should be noted that the number of subnets and hosts available from network 192.168.43.0 255.255.255.224 is 8 and 32, respectively. Only 30 of the 32 hosts are generally functional.
What is a host in computer networking?A network host is a computer or other device that is connected to a computer network. A host can serve as a server, supplying network users and other hosts with information resources, services, and applications. Each host is given at least one network address.
A computer network is a group of computers that share resources on or provided by network nodes. To communicate with one another, computers use common communication protocols over digital links.
So, in respect to the above response, bear in mind that we may compute the total number of: by putting the information into an online IPv4 subnet calculator.
8 subnets; and30 hosts available for 192.168.43.0 (IP Address) and 255.255.255.224 (Subnet)
Learn more about hosts:
https://brainly.com/question/14258036
#SPJ1
Which tag is used to create number list?
<ol> tag is used to create number list
What is that called…. Ethetnet cable port or what !?
Answer:
The left one is a router or switch or hub (could be any as far as I see).
The right one is a satellite dish.
Explanation:
"A switch transmits data from one device to another in form of frames while a router transmits data from one network to another in form of packets. A hub transmits data from one device to another in form of binary bits." - from section.io
"A satellite dish is a dish-shaped type of parabolic antenna designed to receive or transmit information by radio waves to or from a communication satellite." - Wikipedia
how to find tax rate using VLOOKUP in microsoft excel
To find a tax rate using VLOOKUP in Microsoft Excel, you would set up a table with tax brackets and corresponding rates, and then use the VLOOKUP function to match the income amount and retrieve the corresponding tax rate.
What is VLOOKUP?
When you need to find anything in a table or a range by row, use VLOOKUP. Look for the pricing of an automobile item by its part number, or locate an employee's name by their employee ID.
The VLOOKUP method requires three inputs, in this order: lookup value, table array, and column index number. The lookup value is the value for which you wish to locate matching data and must be in the lookup table's first column; it can be a value, a text string, or a cell reference.
Learn more about VLOOKUP:
https://brainly.com/question/30154536
#SPJ1