Integers on average... If a=1.3, create a program that finds the greatest possible number using a while loop. The task is done by a double for loop.
How can I determine the two greatest numbers in an array?Start two variables with a value of zero. Run a comparison between each integer in the array's elements after iterating through the array's elements. MaxOne = number and maxTwo = maxOne if current number is more than maxOne.
How do you arrive at the biggest number?The maximum possible number doesn't exist. No matter how many there are, there will always be more. (For instance, to make a greater number, you could always add 1).
To know more about double visit:-
https://brainly.com/question/23083586
#SPJ4
Can someone help me with this ?
Answer:
I assume you want to set the opacity (0-100) depending on the mouse's coordinate on the screen. The variables indicating the mouse's coordinates are mouseX and mouseY.
To achieve this, you will need to divide the mouseX/mouseY (whichever you choose) by 4 to what's called "normalize" it. If your mouse was at 320 for example... Dividing it by four would give you 80, and this works because the bounds that the opacity can be set to is 0-100.
normalized = mouseX / 4
Circle(mouseX, mouseY, 50, fill='navy', opacity=normalized)
...or if you want to do it in one line...
Circle(mouseX, mouseY, 50, fill='navy', opacity=mouseX / 4)
What would game programmers do when decomposing a task in a modular program?
When decomposing a task in a modular program, game programmers follow a structured approach to break down the task into smaller, more manageable components.
This process is crucial for code organization, maintainability, and reusability. Here's an outline of what game programmers typically do:
1. Identify the task: The programmer begins by understanding the task at hand, whether it's implementing a specific game feature, optimizing performance, or fixing a bug.
2. Break it down: The task is broken down into smaller subtasks or functions that can be handled independently. Each subtask focuses on a specific aspect of the overall goal.
3. Determine dependencies: The programmer analyzes the dependencies between different subtasks and identifies any order or logical flow required.
4. Design modules: Modules are created for each subtask, encapsulating related code and functionality. These modules should have well-defined interfaces and be independent of each other to ensure reusability.
5. Implement and test: The programmer then implements the modules by writing the necessary code and tests their functionality to ensure they work correctly.
6. Integrate modules: Once individual modules are tested and verified, they are integrated into the larger game program, ensuring that they work together seamlessly.
By decomposing tasks into modules, game programmers promote code organization, readability, and ease of maintenance. It also enables parallel development by allowing different team members to work on separate modules simultaneously, fostering efficient collaboration.
For more such questions on programmers,click on
https://brainly.com/question/30130277
#SPJ8
1. You will need to add data to the tables in your design that matches the data in the supplied Excel documents. If your database design doesn't accommodate a given piece of data you must modify your design and implementation to ensure that all data provided in the spreadsheet can be added. a. You may any other data you wish and as your design requires. If your design is such that the needed data is not supplied in the spreadsheet you will need to simply "mock" up some sample data and add it into your database. b. Important: Your instructor cannot provide you with specific information how to complete this step. Each person's database design will be different and therefore, how data must be entered will be different from person to person.
Answer:
is all about knowing what to do with the data
Explanation:
determine what to do with your data
Your job is to protect your company's information assets. What security objectives
should you address?
1) Assets, liabilities, and threats
2) Common vulnerabilities and exposures
3) Confidentiality, integrity and availability
4) Risks, threats and vulnerabilities
Answer:3
Explanation: The CIA Triangle is the basis of all Security related needs.
Write a function named replaceSubstring. The function should accept three string object arguments entered by the user. We want to look at the first string, and every time we say the second string, we want to replace it with the third. For example, suppose the three arguments have the following values: 1: "the dog jumped over the fence" 2: "the" 3: "that" With these three arguments, the function would return a string object with the value "that dog jumped over that fence". Demonstrate the function in a complete program. That means you have to write the main that uses this.
Answer:
public class Main{
public static void main(String[] args) {
System.out.println(replaceSubstring("the dog jumped over the fence", "the", "that"));
}
public static String replaceSubstring(String s1, String s2, String s3){
return s1.replace(s2, s3);
}
}
Explanation:
*The code is in Java.
Create function called replaceSubstring that takes three parameters s1, s2, and s3
Use the replace function to replace the s2 with s3 in s1, then return the new string
In the main:
Call the replaceSubstring function with the given strings and print the result
Imagine you're an Event Expert at SeatGeek. How would you respond to this customer?
* Hi SeatGeek, I went to go see a concert last night with my family, and the lead singer made several inappropriate comments throughout the show. There was no warning on your website that this show would not be child friendly, and I was FORCED to leave the show early because of the lead singer's behavior. I demand a refund in full, or else you can expect to hear from my attorney.
Best, Blake
By Imagining myself as an Event Expert at SeatGeek.I would respond to the customer by following below.
Dear Ronikha,
Thank you for reaching out to SeatGeek regarding your recent concert experience. We apologize for any inconvenience caused and understand your concerns regarding the lead singer's inappropriate comments during the show.
We strive to provide accurate and comprehensive event information to our customers, and we regret any oversight in this case.
SeatGeek acts as a ticket marketplace, facilitating the purchase of tickets from various sellers. While we make every effort to provide accurate event details, including any warnings or disclaimers provided by the event organizers, it is ultimately the responsibility of the event organizers to communicate the nature and content of their shows.
We recommend reaching out directly to the event organizers or the venue where the concert took place to express your concerns and seek a resolution.
They would be in the best position to address your experience and provide any applicable remedies.
Should you require any assistance in contacting the event organizers or obtaining their contact information, please let us know, and we will be happy to assist you further.
We appreciate your understanding and value your feedback as it helps us improve our services.
Best regards,
Vicky
Event Expert, SeatGeek
For more such questions Event,click on
https://brainly.com/question/30562157
#SPJ8
Ctrl-C, Ctrl-V and Ctrl-Z are examples of commands that appear in multiple
applications.
True
False
Choose the word to make the sentence true. The ____ function is used to display the program's output.
O input
O output
O display
The output function is used to display the program's output.
Explanation:
As far as I know this must be the answer. As tge output devices such as Monitor and Speaker displays the output processed.
The display function is used to display the program's output. The correct option is C.
What is display function?Display Function Usage displays a list of function identifiers. It can also be used to display detailed usage information about a specific function, such as a list of user profiles with the function's specific usage information.
The displayed values include the prefix, measuring unit, and required decimal places.
Push buttons can be used to select functions such as summation, minimum and maximum value output, and tare. A variety of user inputs are available.
A display is a device that displays visual information. The primary goal of any display technology is to make information sharing easier. The display function is used to display the output of the program.
Thus, the correct option is C.
For more details regarding display function, visit:
https://brainly.com/question/29216888
#SPJ5
Following Aristotle,man by nature is a political animal,justify the above claim in the light of the Russian invasion of Ukraine
Following Aristotle, man by nature is a political animal using the claim in the light of the Russian invasion of Ukraine is that:
Aristotle stated that State is natural due to the fact that nature has not made man to be in a self-sufficient state. But Man has a lot of -different type of needs which they want them to be fulfilled. Russian need and Ukraine need differs and as such, man is fighting to satisfy their needs.What is the quote about?In his Politics, Aristotle was known to be a man who believed man to be a "political animal" due to the fact that he is a social creature that is said to have the power of speech and also one that has moral reasoning:
He sate that man is a lover of war and as such, Aristotle stated that State is natural due to the fact that nature has not made man to be in a self-sufficient state. But Man has a lot of -different type of needs which they want them to be fulfilled. Russian need and Ukraine need differs and as such, man is fighting to satisfy their needs.
Learn more about Aristotle from
https://brainly.com/question/24994054
#SPJ1
Which algorithm steps correctly solve the problem: How many occurrences of 2 exist in the array?
(1) increment counter if 2 is found (2) loop through array (3) inspect each array element
(1) inspect each array element (2) loop through array (3) increment counter if 2 is found
(1) loop through array (2) increment counter if 2 is found (3) inspect each array element
(1) loop through array (2) inspect each array element (3) increment counter if 2 is found
The correct algorithm steps to solve the problem "How many occurrences of 2 exist in the array?" is:
(1) loop through array(2) inspect each array element(3) increment counter if 2 is foundTherefore, option (4) is the correct sequence of steps:
Why is this correct?This is because you need to traverse the entire array and inspect each element to check if it is equal to 2. If an element is equal to 2, then you increment the counter.
1) loop through array
(2) inspect each array element
(3) increment counter if 2 is found
Read more about algorithm here:
https://brainly.com/question/24953880
#SPJ1
Our goal is to develop a very simple English grammar checker in the form of a boolean function, isGrammatical(wordList). To begin, we will define a sentence to be grammatical if it contains three words of form: determiner noun verb. Thus
[“the”, “sheep”, “run”] is grammatical but [“run”, “the”, “sheep”] is not grammatical nor is
[“sheep”, “run”]. By tagging convention, determiners are tagged as DT, nouns as NN, verbs as VB, and adjectives (which we discuss later) as JJ. The tagSentence function from the tagger module will help you convert your wordlist to tags; a challenge is that some words (such as swing) have multiple definitions and thus multiple parts of speech (as swing is a noun and swing is a verb). Carefully examine the results returned by tagSentence when defining the logic of isGrammatical.
Note that by our current definition, we are not concerned with other aspects of grammar such as agreement of word forms, thus “an sheep run” would be considered as grammatical for now. (We will revisit this concern later.)
[3 points]
Add the words “thief”, “crisis”, “foot”, and “calf” to the lexicon.txt file, and modify wordforms.py so that it generates their plural forms correctly (“thieves”, “crises”, “feet”, “calves”). In terms of categories for the lexicon.txt, thief is a person, crisis and feet are inanimates. Interestingly, ‘calf’ might be an animal (the young cow) but might be an inanimate (the part of the body).
We are not yet using plurals in our sentences, but you should be able to add additional tests within the wordforms.py file to validate that these new words and forms are handled properly.
[3 points]
The original lexicon includes singular nouns such as cat but not plural forms of those nouns such as cats, and thus a sentence such as “the cats run” is not yet deemed as grammatical. However, the wordforms module does include functionality for taking a singular noun and constructing its plural form.
Modify the code in tagger.py so that it recognizes plural forms of nouns and tags them with NNS. We recommend the following approach:
update the loadLexicon function as follows. Every time you encounter a word that is a noun from the original lexicon.txt file, in addition to appending the usual (word,label), add an extra entry that includes the plural form of that noun, as well as a label that adds an ‘s’ to the original label. For example, when encountering ‘cat’ you should not only add (‘cat’,’animal’) to the lexicon but also (‘cats’,’animals’).
Then update the the labelToTag function to return the new tag NNS when encountering one of those plural labels such as ‘animals’.
Test your new functionality on sentences such as “the cats run” as well as with your new plurals such as “thieves”.
[2 points]
The original lexicon includes verbs such as run but not 3rd person singular forms of those verbs that end in -s such as runs, and thus a sentence such as “the cat runs” is not yet deemed as grammatical. As you did with nouns in the previous step, modify the software so that 3rd person singular verbs are added to the lexicon and tagged as VBZ. Test this new functionality on sentences such as “the cat runs” and
“the sheep runs”.
[2 points]
Now we have both plural nouns and 3rd person singular verbs, however the grammar checker currently doesn’t match them and thus accepts sentences like
“the cat run” and “the cats runs”, neither of which is truly grammatical. Update the rules so that it requires the tag VBZ on the verb if the noun has the singular tag NN, and requires the tag VB on the verb if the noun has the plural tag NNS. Add some test cases to ensure the program is working as intended. Include tests with unusual forms such as the noun “sheep” that can be singular or plural; thus “the sheep runs” and “the sheep run” are grammatical. Make sure to update any previous tests to conform to these new expectations.
[2 points]
Update your grammar to allow any number of optional adjectives between the determiner and noun in a sentence, thereby allowing sentences such as
“the big sheep run” and “the big white sheep run”, though disallowing sentences such as “the cat sheep run”.
Using the knowledge in computational language in python it is possible to write a code that form of a boolean function, isGrammatical(wordList). To begin, we will define a sentence to be grammatical if it contains three words of form: determiner noun verb.
Writting the code:# importing the library
import language_tool_python
# creating the tool
my_tool = language_tool_python.LanguageTool('en-US')
# given text
my_text = 'A quick broun fox jumpps over a a little lazy dog.'
# correction
correct_text = my_tool.correct(my_text)
# printing some texts
print("Original Text:", my_text)
print("Text after correction:", correct_text)
See more about python at brainly.com/question/18502436
#SPJ1
How many ways can you save in MS Word?
Answer:
three waves
Explanation:
You can save the document in Microsoft word in three ways: 1. You can save by clicking File on top left corner and then click save as. After that browse the location where exactly you want to save in your computer.
write a code for a program in which the parent had to ask from user that how many child user wants to create and then it should fork that many Childs?
Answer:
//same program different code
#include<stdio.h>
#include<unistd.h>
#include<stdlib.h>
int main()
{
int pid;
pid=fork();
if(pid<0)
{
printf("\n Error ");
exit(1);
}
else if(pid==0)
{
printf("\n Hello I am the child process ");
printf("\n My pid is %d ",getpid());
exit(0);
}
else
{
printf("\n Hello I am the parent process ");
printf("\n My actual pid is %d \n ",getpid());
exit(1);
}
}
Explanation:
Following are the program to the given question:
Program Explanation:
Include header file.Defining the main method.Defining an integer variable "n, i", after defining this use "n" to the input value.In the next step, a loop is declared that uses if block that checks fork value equal to 0, in which it calls the sleep method and prints its value.At the last, it calls the wait method.Program:
#include<stdio.h>//header file
#include<sys/types.h>
#include<sys/wait.h>
#include<unistd.h>
int main()//defining the main method
{
int n,i;//defining an integer variable
printf("Enter the number of child to be created:"); //print message
scanf("%d", &n);//input value in n
for(i=0;i<n;i++) // defining a loop that use if block with the frok method to print value
{
if(fork() == 0)//use if that check fork method value equal to 0
{
sleep(3);//calling sleep method
printf("[child] pid %d from [parent] pid %d\n",getpid(),getppid());//print message
}
}
wait(NULL);//calling wait method
return 0;
}
Output:
Please find the attached file.
Learn more:
brainly.com/question/17925458
Is it true or false? Just have been stuck on this for a bit about CNC milling.
host a and host b are on the same local network. host a sends a communication to host b. local address resolution is a five-step process, and some of the steps are listed below. select the fourth step that will occur as local address resolution takes place.
If Host B recognizes its own address, it responds to Host A by updating its cache with Host A's Media Access Control MAC address.
Which OSI reference model layers are host-to-host layers?Physical, OSI Model; The Transport, Session, Presentation, and Application layers are end-to-end or host-to-host layers, whereas the Datalink and Network layers are hop-to-hop layers.
What is TCP IP's host-to-host layer?Layer of Host-to-Host Transport. The host-to-host layer is the protocol layer just above the network layer. It is accountable for data integrity from beginning to end. The Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP) are the two most crucial protocols utilized at this layer.
To know more about MAC address visit :-
https://brainly.com/question/27960072
#SPJ4
If you had to make a choice between studies and games during a holiday, you would use the _______ control structure. If you had to fill in your name and address on ten assignment books, you would use the ______ control structure.
The answers for the blanks are Selection and looping. Saw that this hasn't been answered before and so just wanted to share.
The missing words are "if-else" and "looping".
What is the completed sentence?If you had to make a choice between studies and games during a holiday, you would use the if-else control structure. If you had to fill in your name and address on ten assignment books, you would use the looping control structure.
A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.
Learn more about looping:
https://brainly.com/question/30706582
#SPJ1
Suppose that a 64MB system memory is built from 64 1MB RAM chips. How many address lines are needed to select one of the memory chips
Answer:
6 address lines
Explanation:
The computation of the number of address lines needed is shown below:
Given that
Total memory = 64MB
= \(2^6MB\)
=\(2^{26} bytes\)
Also we know that in 1MB RAM the number of chips is 6
So, the number of address lines is \(2^{26} address\) i..e 26 address lines
And, the size of one chip is equivalent to 1 MB i.e. \(2^{20} bytes\)
For a single 1MB chips of RAM, the number of address lines is
\(\frac{2^{26}}{2^{20}} \\\\= 2^6 address\)
Therefore 6 address lines needed
Write a method that computes the sum of the digits in an integer. Use the following method header: public static int sumDigits(long n) For example, sumDigits(234) returns 9 the result of 2 3 4. (Hint: Use the % operator to extract digits, and the / operator to remove the extracted digit. For instance, to extract 4 from 234, use 234 % 10, which is 4. To remove 4 from 234, use 234 / 10, which is 23. Use a loop to repeatedly extract and remove the digit until all the digits are extracted.
Answer:
The java program for the given scenario is shown below.
import java.util.*;
import java.lang.*;
public class Test
{
//variables to hold the number, digits and sum of the digits
//variable to hold number is assigned any random value
static long num=123;
static int sum=0;
static int digit;
static int s;
//method to add digits of a number
public static int sumDigits(long n)
{ do
{
digit=(int) (n%10);
sum=sum+digit;
n=n/10;
}while(n>0);
return sum;
}
public static void main(String[] args) {
s = sumDigits(num);
System.out.println("The sum of the digits of "+num+ " is "+s); }
}
OUTPUT
The sum of the digits of 123 is 6
Explanation:
1. The variables to hold the number is declared as long and initialized.
2. The variables to store the digits of the number and the sum of the digits are declared as integer. The variable, sum, is initialized to 0.
3. The method, sumDigits(), is defined which takes a long parameter and returns an integer value. The method takes the number as a parameter and returns the sum of its digits.
4. Inside method, sumDigits(), inside the do-while loop, the sum of the digits of the parameter is computed.
5. Inside main(), the method, sumDigits(), is called. The integer value returned by this method is stored in another integer variable, s.
6. The sum of the digits is then displayed to the console.
7. All the variables are declared outside main() and at the class level and hence declared static. The method, sumDigits(), is also declared static since it is to be called inside main().
8. In java, the whole code is written inside a class since java is a purely object-oriented language.
9. In this program, object of the class is not created since only a single class is involved having main() method.
10. The program can be tested for any value of the variable, num.
11. The file is saved as Test.java, where Test is the name of the class having main() method.
The data science team created a machine learning model to group together customers with similar purchases, and divides those customers based on customer loyalty. How would you describe this machine learning approach?
Answer: This machine learning approach can be described as a clustering algorithm that groups customers based on their purchasing patterns and then further divides them based on their loyalty.
What is the first step in finding a solution to a problem
Java Eclipse Homework Challenge Project
Package: challQ1
Class: FantasyRPG
Task: Create a program to generate new RPG Characters and all of their traits. The user should have several choices to make and some numbers should be generated randomly. Once the entire character has been generated print out to the console all of the character information and the stats.
Ideas for the Program:
• User generated name
• Character Class (mage, monk, warrior, thief, ranger, etc...)
• Personal characteristics (hair / eye color, height, weight...)
• Randomly generated Stats ( Strength, wisdom, intelligence, dexterity, constitution... etc.)
Requirements: // These are the things I need to see mastery of
• correct use of variables: String, int, double, char
• use of Scanner and DecimalFormat
• decision using if or switch statement
• use of loops (for, while, do-while)
• use of a random number generator
• correct use of commenting code
------- OR -------
Develop your own "choose your own adventure game."
Include a story with many different decisions for the user to follow. There should be many different paths and endings and some events randomly generated or determined.
Same requirements as above:
I included the code in the text file. I hope this helps!
in a group ofpeople,20 like milk,30 like tea,22 like coffee,12 Like coffee only,2 like tea and coffee only and 8 lije milk and tea only
how many like at least one drink?
In the given group of people, a total of 58 individuals like at least one drink.
To determine the number of people who like at least one drink, we need to consider the different combinations mentioned in the given information.
First, we add the number of people who like each drink separately: 20 people like milk, 30 people like tea, and 22 people like coffee. Adding these values together, we get 20 + 30 + 22 = 72.
Next, we need to subtract the overlapping groups. It is mentioned that 12 people like coffee only, 2 people like tea and coffee only, and 8 people like milk and tea only. To find the overlap, we add these three values: 12 + 2 + 8 = 22.
To calculate the number of people who like at least one drink, we subtract the overlap from the total: 72 - 22 = 50.
Therefore, in the given group, 58 individuals like at least one drink. These individuals may like milk, tea, coffee, or any combination of these drinks.
For more questions on group
https://brainly.com/question/32857201
#SPJ8
what are the characteristics of a computer system
Answer:
A computer system consists of various components and functions that work together to perform tasks and process information. The main characteristics of a computer system are as follows:
1) Hardware: The physical components of a computer system, such as the central processing unit (CPU), memory (RAM), storage devices (hard drives, solid-state drives), input devices (keyboard, mouse), output devices (monitor, printer), and other peripherals.
2) Software: The programs and instructions that run on a computer system. This includes the operating system, application software, and system utilities that enable users to interact with the hardware and perform specific tasks.
3) Data: Information or raw facts that are processed and stored by a computer system. Data can be in various forms, such as text, numbers, images, audio, and video.
4) Processing: The manipulation and transformation of data through computational operations performed by the CPU. This includes arithmetic and logical operations, data calculations, data transformations, and decision-making processes.
5) Storage: The ability to store and retain data for future use. This is achieved through various storage devices, such as hard disk drives (HDDs), solid-state drives (SSDs), and optical media (CDs, DVDs).
6) Input: The means by which data and instructions are entered into a computer system. This includes input devices like keyboards, mice, scanners, and microphones.
7) Output: The presentation or display of processed data or results to the user. This includes output devices like monitors, printers, speakers, and projectors.
8) Connectivity: The ability of a computer system to connect to networks and other devices to exchange data and communicate. This includes wired and wireless connections, such as Ethernet, Wi-Fi, Bluetooth, and USB.
9) User Interface: The interaction between the user and the computer system. This can be through a graphical user interface (GUI), command-line interface (CLI), or other forms of interaction that allow users to communicate with and control the computer system.
10) Reliability and Fault Tolerance: The ability of a computer system to perform consistently and reliably without failures or errors. Fault-tolerant systems incorporate measures to prevent or recover from failures and ensure system availability.
11) Scalability: The ability of a computer system to handle increasing workloads, accommodate growth, and adapt to changing requirements. This includes expanding hardware resources, optimizing software performance, and maintaining system efficiency as demands increase.
These characteristics collectively define a computer system and its capabilities, allowing it to process, store, and manipulate data to perform a wide range of tasks and functions.
Hope this helps!
8. Give regular expressions with alphabet {a, b} for
a) All strings containing the substring aaa
b) All strings not containing the substring aaa
c) All strings with exactly 3 a’s.
d) All strings with the number of a’s (3 or greater) divisible by 3
Answer:
i think its C
Explanation:
Pretend you work with a lot of different documents in an internship with a software development company. What kinds of actions can you take to keep your files, folder names, folder structure, and yourself organized? Be thorough in your answer.
In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in fast time and i will also use descriptive file names.
The ways that i will use in the file management are:
I will use a single place for all kinds of documents. I will make a Folders in a kind of Logical Hierarchy. I will also Nest Folders inside Folders. I will use the File Naming Conventions, etc.What is file structure?A file structure is known to be the ways or combination of depiction for data in files.
Hence, In the case above, I will categories my files and also my folders using as names and structures. The file name will help me to know identify the file in fast time.
Learn more about files from
brainly.com/question/1178560
#SPJ1
What are parts that require a system outage during installation called?
Note that parts that require a system outage during installation are called: ""disruptive" components." This means that they required the system to be taken offline in order for the system to be completely installed.
What are examples of disruptive components?The following are some examples of disruptive components that often necessitate a system outage during installation:
Changing or upgrading the central processing unit (CPU)Memory or storage replacement or upgradeNetwork interface or switch replacement or upgradeChanging the operating system or the firmwarePower supply or cooling system replacement or upgradeThe motherboard or other system boards must be replaced or upgraded.It should be noted that depending on the individual system and the architecture of the update, some upgrades can be completed with minimum disturbance.Learn mroe about system outage:
https://brainly.com/question/15172767
#SPJ1
Can someone help me out I don't understand how to do this problem at all
---------------------------------------------------------------------------------------------------------------------------
Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is:
As long as x is greater than 0
Output x % 2 (remainder is either 0 or 1)
x = x / 2
Your program must define and call the following two functions. The IntegerToReverseBinary() function should return a string of 1's and 0's representing the integer in binary (in reverse). The ReverseString() function should return a string representing the input string in reverse.
string IntegerToReverseBinary(int integerValue)
string ReverseString(string userString)
----------------------------------------------------------------------------------------------------------------------------
here is the general format it gave:
#include
using namespace std;
/* Define your functions here */
int main() {
/* Type your code here. Your code must call the functions. */
return 0;
}
Answer:
#include <bits/stdc++.h>
#include <string>
using namespace std;
string IntegerToReverseBinary(int integerValue)
{
string result;
while(integerValue > 0) {
result += to_string(integerValue % 2);
integerValue /= 2;
}
return result;
}
string ReverseString(string userString)
{
reverse(userString.begin(), userString.end());
return userString;
}
int main() {
string reverseBinary = IntegerToReverseBinary(123);
string binary = ReverseString(reverseBinary);
cout << binary << endl;
return 0;
}
Explanation:
The string reverser uses a standard STL function. Of course you could always write your own, but typically relying on libraries is safer.
Describe producing any four (4) methods output. o
Outputs are final products or services that are given to the client. These outputs come from the processes that are used to transform the inputs into a business.
Thus, In other words, the output method counts the accomplishments. An entity must first estimate how many outputs will be required to fulfill the contract before implementing the output method.
The entity then monitors the development of the contract by comparing the total estimated outputs required to fulfill the performance obligation with the outputs that have already been produced and Bussiness.
Quantifying outputs can be done in a variety of ways and is easily adaptable to a contract. Examples of production measures are finished tables, units delivered, homes built, or miles of track constructed and outputs.
Thus, Outputs are final products or services that are given to the client. These outputs come from the processes that are used to transform the inputs into a business.
Learn more about Bussiness, refer to the link:
https://brainly.com/question/30762888
#SPJ1
The tag
sets content aside from the page content
sets a user-invoked command button
sets a container for an external application
isolates text that is formatted in a different direction
The tag is isolates text that is formatted in a different direction.
What does the tag do?Tags are small pieces of data that represent information on a document, web page, or other digital item. They are typically one to three words long. Tags provide information about an object and make it simple to find related products with the same tag.An HTML tag is a particular word or letter that is surrounded by angle brackets, >, and Tags are used to build HTML components such as paragraphs and links. A p (paragraph) element, for example, has a p> tag, followed by the paragraph text, followed by a closing /p> tag.To learn more about HTML Tag refer,
https://brainly.com/question/9069928
#SPJ1
Write a python program that gets a number using keyboard input. If the number is positive, the program should call countdown
Answer:
def countdown():
print("This is countdown")
number = int(input("Enter number: "))
if (number > 0):
countdown()
Explanation:
This is literally what you asked, but what is the purpose?