What year was html released?

Answers

Answer 1

2007 because I said so

Answer 2

Answer:

1999

Explanation:


Related Questions

Which of the following is included in an employee medical record?

Answers

Medical and employment questionnaires or histories. Results of medical examinations and laboratory tests. recommendations. are those any of the choices?

Which core business etiquette is missing in Jane

Answers

Answer:

As the question does not provide any context about who Jane is and what she has done, I cannot provide a specific answer about which core business etiquette is missing in Jane. However, in general, some of the key core business etiquettes that are important to follow in a professional setting include:

Punctuality: Arriving on time for meetings and appointments is a sign of respect for others and their time.

Professionalism: Maintaining a professional demeanor, dressing appropriately, and using appropriate language and tone of voice are important in projecting a positive image and establishing credibility.

Communication: Effective communication skills such as active listening, clear speaking, and appropriate use of technology are essential for building relationships and achieving business goals.

Respect: Treating others with respect, including acknowledging their opinions and perspectives, is key to building positive relationships and fostering a positive work environment.

Business etiquette: Familiarity with and adherence to appropriate business etiquette, such as proper introductions, handshakes, and business card exchanges, can help establish a positive first impression and build relationships.

It is important to note that specific business etiquettes may vary depending on the cultural and social norms of the particular workplace or industry.

Write a function called tacos containing both concatenation and a return that would calculate a person's number of tacos times three with the phrase "I want _ many tacos"

Answers

Using the knowledge in computational language in python it is possible to write a code that called tacos containing both concatenation and a return that would calculate a person's number of tacos times three with the phrase "I want _ many tacos".

Writting the code:

input_string = """I want _ many tacos"""

def string_split_ex(unsplit):

   results = [Tacos]

   # Bonus points for using splitlines() here instead,

   # which will be more readable

   for line in unsplit.split('\n')[1:]:

       results.append(line.split(',', maxsplit=2))

   return results

print(string_split_ex(input_string))

See more about python at brainly.com/question/12975450

#SPJ1

Write a function called tacos containing both concatenation and a return that would calculate a person's

Help...! Why might you trace an image
A. To edit an image
B. To make drawing easier

Answers

Answer:

the answer is b

Describe how communication strengthens relationship at work and, as a result, increases your productivity

Answers

Answer:

because it helps them understand their contributions and obligations towards the organisation.

Explanation:

In an organizational setup, the need for healthy and effective communication among employees and employers is a crucial element for the overall success of the organisation. Healthy and effective communication helps in the productivity of the employees because it helps them understand their contributions and obligations towards the organisation.

Good communication improves the employees' morality and sincerity as it helps them feel responsible and as an important member of the organisation. Hence, strengthening their relationships and, as a result, increasing their productivity and efficiency.

We can sell the Acrobat Reader software to the other users”. Do you agree with this statement? Justify your answer.

Answers

No, as a User, one CANOT sell Acrobat Reader software to the other users.

What is Adobe Reader?

Acrobat Reader   is a software developed by Adobe and is generally available as a free   PDF viewer.

While individuals can use Acrobat Reader for free,selling the software itself would be in violation of   Adobe's terms of use and licensing agreements.

Therefore, selling Acrobat Reader to other users would not be legally permissible or aligned with Adobe's distribution model.

Learn more about Adobe Reader at:

https://brainly.com/question/12150428

#SPJ1

Consolidated Supplies is a medium-sized distributor of restaurant supplies that operates in Canada and several northern U.S. states. They have 12 large warehouses spread across both countries to service their many customers. Products arrive from the manufacturers and are stored in the warehouses until they are picked and put on a truck for delivery to their customers. The networking equipment in their warehouses is old and is starting to give them problems; these problems are expected to increase as the equipment gets older. The vice president of operations, Pat McDonald, would like to replace the existing LANs and add some new wireless LAN technology into all the warehouses, but he is concerned that now may not be the right time to replace the equipment. He has read several technology forecasts that suggest there will be dramatic improvements in networking speeds over the next few years, especially in wireless technologies. He has asked you for advice about upgrading the equipment.
Should Consolidated Supplies replace all the networking equipment in all the warehouses now, should it wait until newer networking technologies are available, or should it upgrade some of the warehouses this year, some next year, and some the year after, so that some warehouses will benefit from the expected future improvements in networking technologies?

Answers

Answer:

Consolidated Supplies

Consolidated Supplies should upgrade some of the warehouses this year, some next year, and others the year after, so that some warehouses will benefit from the expected future improvements in networking technologies.

Explanation:

Gradual technology upgrade should be the way forward for Consolidated Supplies.  Waiting until newer networking technologies are available is not an option.  Total replacement of all the networking equipment in all the warehouses is not an option, as technology equipment becomes obsolete in no time.  Overall, Consolidated Supplies should never forget the numerous benefits from technology upgrade, including reduction of downtime, increased productivity, and improved customer services and satisfaction.

How can I get more views on my you tube channel "Braeden Eischen" without paying anything
P.S. this is for media-tech so don't report me

Answers

I’m just post video and there

Given a type Money that is a structured type with two int fields, dollars and cents. Assume that an array named monthlySales with 12 elements, each of type Money has been declared and initialized. Assume that a Money variable yearlySales has also been declared. Write the necessary code that traverses the monthlySales array and adds it all up and stores the resulting total in yearlySales. Be sure make sure that yearlySales ends up with a valid value, i.e. a value of cents that is less than 100.

Answers

Answer:

Attached below is the code

Explanation:

using namespace std;

struct Money

{

int dollars;

int cents;

};

int main()

{

struct Money monthlySales[12];

struct Money yearlySales = { 0,0};

for(inti=0; i<12; i++)

{

monthlySales[i].dollars = 0.0;

monthlySales[i].cents = 0.0;

}

for(int i=0; i<12; i++)

{

yearlySales.dollars = yearlySales.dollars + monthlySales[i].dollars;

yearlySales.cents = yearlySales.cents +monthlySales[i].cents;

}

return 0;

}

What is an automatic update and when should you use it

Answers

Answer:)



Automatic updates allow users to keep their software programs updated without having to check for and install available updates manually. The software automatically checks for available updates, and if found, the updates are downloaded and installed without user intervention.

Hope it helps you my dear:)

Which of the following is the MOST important reason for creating separate users / identities in a cloud environment?​

Answers

Answer:

Because you can associate with other

Answer:

Explanation:

To avoid cyberbully

Jump to level 1
Given a string, an integer position, and a character, all on separate lines, find the character of the string in that position and
replace it with the character read. Then, output the result.

Ex: If the input is:

warn
0
e

the output is:

earn

Note: Using a pre-defined string function, the solution can be just one line of code.

I am looking for the code for C++ NOT Python. Thanks

Answers

Answer:

Assuming the input string variable is named `input`, the input int variable is named `index`, and the input char variable is named `ch`:

```

input[index] = ch;

cout << input;

```

Explanation:

In C++, you can change specific elements of a string without having to overwrite the entire string (i.e. in C++, strings are mutable).

Create a console-based computerized game of War named WarCardGameConsole in the Final Project Part 1 folder. This is C#
1. Use an array of 52 integers to store unique values for each card.
2. Write a method named FillDeck() that places 52 unique values into this array.
3. Write another method named SelectCard() that you call twice on each deal to randomly
select a unique card for each player, with no repetition of cards in 26 deals.
4. To pause the play between each dealt hand, use a call to ReadLine().
5. At the end of a play of the game of the 26 deals:
a. display the Computer’s and Player’s final scores
b. display who won the game
c. record the results in a text file (see step 6)
d. give the player the choice of stopping or playing again.
6. Record the results of each game in a text file:
a. The text file should be saved as FirstNameLastName Results.txt in your project
folder. The file will automatically save in WarCardGameConsole\bin\Debug folder.
b. At the beginning of your program you should check to see if your file exists;
 If not, your program will create it
 If it does exist, you program will open it.
c. At the of a play of the game you will record the results
d. When the player indicates they want to stop playing, the program should close the
file.
7. Your program must have meaningful comments, including your name.

Answers

Answer:

Here is a console-based C# program for the card game War:

Explanation:

using System;

using System.IO;

namespace WarCardGameConsole

{

   class WarCardGame

   {

       // Array to hold 52 cards

       int[] deck = new int[52];

       // Player and computer scores

       int playerScore;

       int computerScore;

       // File to record results

       StreamWriter results;

       // Fill deck with cards

       void FillDeck()

       {

           // Add cards to deck

           for (int i = 0; i < deck.Length; i++)

           {

               deck[i] = i;

           }

       }

       // Select random card

       int SelectCard()

       {

           // Generate random index

           Random rand = new Random();

           int index = rand.Next(deck.Length);

           // Remove selected card from deck

           int card = deck[index];

           deck[index] = deck[deck.Length - 1];

           Array.Resize(ref deck, deck.Length - 1);

           // Return selected card

           return card;

       }

       // Play one round of war

       void PlayRound()

       {

           // Select cards for player and computer

           int playerCard = SelectCard();

           int computerCard = SelectCard();

           // Display cards

           Console.WriteLine($"Player card: {playerCard}  Computer card: {computerCard}");

           // Check who has higher card

           if (playerCard > computerCard)

           {

               playerScore++;

               Console.WriteLine("Player wins this round!");

           }

           else if (computerCard > playerCard)

           {

               computerScore++;

               Console.WriteLine("Computer wins this round!");

           }

           else

           {

               Console.WriteLine("Tie! No points awarded.");

           }

           // Pause before next round

           Console.WriteLine("Press any key to continue...");

           Console.ReadKey();

       }

       void PlayGame()

       {

           // Fill deck with cards

           FillDeck();

           // Play 26 rounds

           for (int i = 0; i < 26; i++)

           {

               PlayRound();

           }

           // Display final scores

           Console.WriteLine($"Player final score: {playerScore}");

           Console.WriteLine($"Computer final score: {computerScore}");

           // Determine winner

           if (playerScore > computerScore)

           {

               Console.WriteLine("Player wins the game!");

           }

           else if (computerScore > playerScore)

           {

               Console.WriteLine("Computer wins the game!");

           }

           else

           {

               Console.WriteLine("Tie game!");

           }

           // Record results in file

           results.WriteLine($"{DateTime.Now} - {playerScore} to {computerScore}");

           // Play again?

           Console.Write("Play again? (Y/N) ");

           string input = Console.ReadLine();

           if (input.ToUpper() == "Y")

           {

               // Restart game

               playerScore = 0;

               computerScore = 0;

               PlayGame();

           }

           else

           {

               // Close file and exit

               results.Close();

               Environment.Exit(0);

           }

       }

       static void Main(string[] args)

       {

           // Create game object

           WarCardGame game = new WarCardGame();

           // Check if results file exists

           if (!File.Exists("JohnDoe Results.txt"))

           {

               // Create file

               game.results = File.CreateText("JohnDoe Results.txt");

           }

           else

           {

               // Open existing file

               game.results = File.AppendText("JohnDoe Results.txt");

           }

           // Play game

           game.PlayGame();

       }

   }

}

What kind of software would I be able to build with functional programming language?​

Answers

Answer:

Functional programming languages are specially designed to handle symbolic computation and list processing applications. Functional programming is based on mathematical functions. Some of the popular functional programming languages include: Lisp, Python, Erlang, Haskell, Clojure, etc.

When was the information last updated

Answers

Wait what? I don’t understand

In the 1940s, computers were programmed using punch cards, or pieces of paper that had holes in them that represented binary code. If a mistake was made using this type of primitive programming, which of the following BEST describes what would need to be done to correct the problem?

A.
The entire program of punch cards had to be re-punched.

B.
The entire program of punch cards had to be loaded again and started over.

C.
The entire program needed to be rewritten and a different set of punch cards were used.

D.
The entire program could be fixed by adding or removing a card for the existing stack of papers.

Answers

Answer:

If a mistake was made using punch cards to program computers in the 1940s, the entire program of punch cards had to be re-punched to correct the problem. This was because punch cards were the primary means of input for the computer, and any changes or corrections to the program had to be physically made by punching new cards or modifying existing ones. Once the program was re-punched correctly, it could be loaded into the computer and executed.

Explanation:

What does this button mean in the computer ????????

What does this button mean in the computer ????????

Answers

Answer:

Context menu

Explanation:

If you want to open a context menu this is the one

Alternative is Shift+F10 in most applications to open a context menu. It's basically the same thing as the menu key

Answer:

Context Menu

Explanation:

this button mean in the computer

difference and similarities between Database, DBMS, database application and database system in tabular form​

Answers

Answer:

Here is a tabular comparison of Database, DBMS, database application, and database system:

| Term | Definition | Key Features |

| --- | --- | --- |

| Database | A collection of data that is organized and stored in a computer system | Contains data, metadata, and relationships between data |

| DBMS (Database Management System) | Software used to manage databases and perform operations on data | Provides a way to create, read, update, and delete data; enforces data integrity; controls access to data |

| Database Application | A software application that interacts with a database to perform specific tasks | Provides an interface for users to interact with data; can perform specific tasks such as data entry, querying, reporting, and analysis |

| Database System | A combination of a database and a DBMS, along with hardware and software components that are used to manage and store data | Includes the database, DBMS, hardware, software, and people who interact with the system |

Some similarities and differences between these terms are:

| Term | Similarities | Differences |

| --- | --- | --- |

| Database and DBMS | Both are used to manage data | Database is a collection of data, while DBMS is software used to manage the database |

| DBMS and Database Application | Both involve software applications | DBMS manages databases, while database application interacts with a database to perform specific tasks |

| Database Application and Database System | Both are software applications | Database application is a part of a database system, which also includes a database, DBMS, hardware, software, and people who interact with the system |

In summary, a database is a collection of organized data, while a DBMS is software used to manage and operate on the database. A database application is a software application that interacts with a database to perform specific tasks. A database system is a combination of a database, DBMS, hardware, software, and people that work together to manage and store data.

mark me brilliant

comment fonction l'intelligence artificiel

Answers

Artificial intelligence that is the full meaning of AI. And that’s what we use nowadays to create robots and other stuffs

In Excel, is there a way to have two variables added together like this?

x = x + y where, for example, x=2 y=3
x = 2 + 3
then making cell x = 5 rather than the original 2

Answers

Yes, in Excel, one can perform the above Operation. Note that the instruction must be followed to get the result. See the attached image for the output.

How can this be done?

In separate cells, enter the x and y values. Enter 2 in cell A1 and 3 in cell A2, for example.

Enter the formula "=A1+A2" in another cell. Enter "=A1+A2" in cell A3, for example.

When you press enter or return, the calculation result (5) will appear in cell A3.

If you replace the value of x with the computation formula, it will result in a circular reference error.

A circular reference in Excel indicates that the calculation in a certain cell refers to it's own result once or several times.

Note that x cannot be equal to x + y except y is 0.

Learn more about Excel:
https://brainly.com/question/31409683
#SPJ1

In Excel, is there a way to have two variables added together like this?x = x + y where, for example,

please help me out, 30 pts

please help me out, 30 pts

Answers

The statement that describes what is happening to cause current to flow

B. Voltage is when current flows from higher to lower potential energy

How to explain the information

The difference in electric potential between two places is referred to as voltage. Due to voltage, current in the wire always flows from greater potential to lower potential.

The voltage of the current is high at the electric source, but as it travels along the wire, it loses strength until it reaches the opposite end of the circuit. This is due to the wire's internal resistance, which results in heat energy and some current loss.

Therefore, the correct option is B.

Learn more about voltage on:

https://brainly.com/question/16791395

#SPJ1

Write the SQL to create a Product table with the following columns:

ID - Unsigned integer
Name - Variable-length string with maximum 40 characters
ProductType - Fixed-length string with maximum 3 characters
OriginDate - Year, month, and day
Weight - Decimal number with six significant digits and one digit after the decimal point

Place your CREATE TABLE statement before the INSERT and SELECT statements. Run your solution and verify the result table contains the three inserted rows.

-- Write your CREATE TABLE statement here:

INSERT INTO Product (ID, Name, ProductType, OriginDate, Weight) VALUES
(100, 'Tricorder', 'COM', '2020-08-11', 2.4),
(200, 'Food replicator', 'FOD', '2020-09-21', 54.2),
(300, 'Cloaking device', 'SPA', '2019-02-04', 177.9);

SELECT *
FROM Product;

Answers

The SQL to create a Product table with the following columns is written below.

What is SQL?

Structured Query Language (SQL) is a computer language that is used to manage relational databases and execute various operations on the data contained inside them.

Error 1 : comma was not applied after Date column

Error 2 : Unsigned keyword should be after integer

Product Type CHA-R(3),

originate DATE,

Weight DECIMAL (6, 1)

Product Type CHA-R(3),

originate DATE,

Weight DECIMAL (6, 1)

Query 1 :

CREATE TABLE Product(

ID int,

);

Query 2 :

CREATE TABLE Product(

ID in-t unsigned,

Therefore, the errors and queries in SQL are written above.

To learn more about SQL, refer to the link:

https://brainly.com/question/24180759

#SPJ1

Write pseudocode for a new implementation o BFS that uses an adiacencv matrix instead of an aclacency nst.Find the time complexity of this new version and compare it to the version seen in class. Under what circumstances are they equally efficient?

Answers

Pseudocode for the new implementation of BFS using an adjacency matrix:

```

BFS(adjacency_matrix, start_node):

   Create a queue and enqueue the start_node

   Create a visited array and mark the start_node as visited

   While the queue is not empty:

       Dequeue a node from the queue

       Process the node

       For each adjacent node in the adjacency matrix:

           If the adjacent node is not visited:

               Mark the adjacent node as visited

               Enqueue the adjacent node

```

The time complexity of this new version of BFS using an adjacency matrix is O(V^2), where V is the number of vertices. This is because we need to iterate over each element in the adjacency matrix to check the connections between nodes. In the worst case, we may need to visit every entry in the matrix, resulting in a quadratic time complexity.

In comparison, the version of BFS seen in class using an adjacency list has a time complexity of O(V + E), where V is the number of vertices and E is the number of edges. This version is more efficient because it only visits the nodes and edges that are present in the graph, rather than iterating over all possible connections as in the adjacency matrix implementation.

The two versions are equally efficient when the graph is dense and the number of edges approaches the maximum possible value of V^2. In this scenario, the time complexity of both implementations becomes similar, as the number of iterations required in the adjacency matrix version is comparable to the number of edges in the adjacency list version. However, in most practical cases, where the graph is sparse (fewer edges compared to the total possible connections), the adjacency list version is more efficient.

For more such answers on Pseudocode

https://brainly.com/question/24953880

#SPJ8

2.12.1: LAB: Name format

This is what I have so far:

name_input = input()

name_separator = name_input.split()

if len(name_separator) == 3:

first_name = name_separator[-3]

middle_name = name_separator[-2]

last_name = name_separator[-1]

first_initial = first_name[0]

middle_initial = middle_name[0]

last_initial = last_name[0]

print(last_name + ", " + first_initial + '.' + middle_initial +'.')



elif len(name_separator) == 2:

first_name = name_separator[-2]

last_name = name_separator [-1]

first_initial = first_name[0]

last_initial = last_name[0]

print(last_name + ", " + first_initial + ".")

2.12.1: LAB: Name formatThis is what I have so far:name_input = input()name_separator = name_input.split()if

Answers

A program that reads a person's name in the following format: first name, middle name, last name is given below:

The Program

import java.util.Scanner;

public class LabProgram {

public static void main(String[] args) {

 Scanner scnr = new Scanner(System.in);

 String firstName;

 String middleName;

 String lastName;

 String name;

 name = scnr.nextLine();

 int firstSpace = name.indexOf(" ");

 firstName = name.substring(0, firstSpace);

 int secondSpace = name.indexOf(" ", firstSpace + 1);

 if (secondSpace < 0) {

    lastName = name.substring(firstSpace + 1);

    System.out.println(lastName + ", " + firstName);

 }

 else {

    middleName = name.substring(firstSpace, secondSpace);

    lastName = name.substring(secondSpace + 1);

    System.out.println(lastName + ", " + firstName + " " +     middleName.charAt(1) + ".");

 }

 }

}

Read more about programming here:

https://brainly.com/question/23275071

#SPJ1

Note that common activities are listed toward the top, and less common activities are listed toward the bottom.
According to O*NET, what are common work activities performed by Veterinarians? Check all that apply.

Answers

According to O*NET, common work activities performed by Veterinarians include:

A) documenting/recording information

C) making decisions and solving problems

E) working directly with the public

F) updating and using relevant knowledge

What is the Veterinarians work about?

According to O*NET, common work activities performed by Veterinarians include:

documenting/recording information, such as medical histories and examination resultsmaking decisions and solving problems, such as diagnosing and treating illnesses and injuriesworking directly with the public, such as answering questions and providing information about animal healthupdating and using relevant knowledge, such as staying current with new research and developments in veterinary medicine.

Hence the options selected above are correct.

Learn more about Veterinarians from

https://brainly.com/question/7982337

#SPJ1

See full question below

Note that common activities are listed toward the top, and less common activities are listed toward the bottom.

According to O*NET, what are common work activities performed by Veterinarians? Check all that apply.

A) documenting/recording information

B) repairing electronic equipment

C) making decisions and solving problems

D) operating large vehicles

E) working directly with the public

F) updating and using relevant knowledge

If you have a line that is 2.5 inches in decimal, what is that in fraction form?

2 5/16 inches

2 1/4 inches

2 3/4 inches

2 1/2 inches

If you are asked to measure 9/16th on a ruler how many lines would you have to count?

Answers

Answer: 2 1/2 inches; 9 lines

Explanation:

If one has a line that is 2.5 inches in decimal, this in fraction form will be written as:

= 2.5 inches = 2 5/10 inches.

When we reduce 5/10 to its lowest term, this will be 1/2. Therefore 2.5 inches = 2 1/2 inches.

Since each mark on a ruler is 1/16, therefore 9/16 will be (9/16 ÷ 1/16) = (9/16 × 16/1) = 9 lines

Referring to narrative section 6.4.1.1. "Orders Database" in your course's case narrative you will:
1. Utilizing Microsoft VISIO, you are to leverage the content within the prescribed narrative to develop an Entit
Relationship Diagram (ERD). Make use of the 'Crow's Foot Database Notation' template available within VISIC
1.1. You will be constructing the entities [Tables] found within the schemas associated with the first letter of
your last name.
Student Last Name
A-E
F-J
K-O
P-T
U-Z
1.2. Your ERD must include the following items:
All entities must be shown with their appropriate attributes and attribute values (variable type and
length where applicable)
All Primary keys and Foreign Keys must be properly marked
Differentiate between standard entities and intersection entities, utilize rounded corners on tables for
intersection tables

.
Schema
1 and 2 as identified in 6.4.1.1.
1 and 3 as identified in 6.4.1.1.
1 and 4 as identified in 6.4.1.1.
1 and 5 as identified in 6.4.1.1.
1 and 6 as identified in 6.4.1.1.
.

Answers

The following is a description of the entities and relationships in the ERD  -

CustomersProductOrdersOrder Details

 How is  this so?

Customers is a standard entity that stores information about customers, such as their   name, address,and phone number.Products is a standard entity that stores information about products, such as their name, description, and price.Orders is an intersection   entity that stores information about orders, such as the customer who placed the order,the products that were ordered, andthe quantity of each product that was ordered.Order Details is an   intersection entity that stores information about the details of each order,such as the order date, the shipping address, and the payment method.

The relationships between the entities are as follows  -

A Customer   can place Orders.An Order can contain Products.A Product can be included inOrders.

The primary keys and foreign keys are as follows  -

The primary key for   Customers is the Customer ID.The primary key for Products is the Product ID.The primary key for Orders is the Order ID.The foreign key for   Orders is the Customer ID.The foreign key for Orders is theProduct ID.The foreign key for Order Details is the Order ID.The foreign key for Order Details is the Product ID

Learn more about ERD at:

https://brainly.com/question/30391958

#SPJ1

true/false. the most common hybrid system is based on the diffie-hellman key exchange, which is a method for exchanging private keys using public-key encryption.

Answers

The given statement "The most common hybrid system is based on the diffie-hellman key exchange, which is a method for exchanging private keys using public-key encryption." is False because the most common hybrid system is based on RSA encryption.

The most common hybrid system is based on RSA encryption, which is a public-key encryption method for exchanging private keys. Diffie-Hellman key exchange, on the other hand, is a key exchange algorithm used to establish a shared secret between two parties over an insecure communications channel. To create secure communication between two parties, encryption, and decryption methods are used.

The RSA encryption algorithm is the most commonly used public-key encryption method. The RSA algorithm is named after its inventors, Ron Rivest, Adi Shamir, and Leonard Adleman. It is based on the difficulty of factoring large numbers. The security of RSA encryption is based on the fact that it is difficult to factor large numbers into their prime factors.

Know more about RSA encryption here :

https://brainly.com/question/27116296

#SPJ11

Write a method that converts a time given in seconds to hours, minutes and seconds using the following header:

public static String convertTime(int totalSeconds)

The method returns a string that represents the time as hours:minutes:seconds.

Write a test program that asks the user for the time in seconds and then display the time in the above format.

Answers

Answer:

hope this helps.

Explanation:

import java.util.*;

class Timeconvert{ //class nane

public static String convertTime(int totalSeconds) /* fn to convert seconds to hh:mm:ss format */

{

int sec = totalSeconds; // a copy of totalSeconds is stored in sec

int m=sec/60; //to find the total min which obtained by doing sec/60

int psec=sec%60; //psec store remaining seconds

int hrs=m/60; //stores hr value obtained by doing m/60

int min=m%60; //stores min value obtained by m%60

return (hrs + ":" + min+ ":" +psec);// returning that string

}

}

public class Main

{

  public static void main(String[] args) {

  Timeconvert t = new Timeconvert();

  Scanner in = new Scanner(System.in); //Scanner class

System.out.println("Enter the number of seconds:");

int sec = in.nextInt(); //to input number of seconds

System.out.println("hours:minutes:seconds is " + t.convertTime(sec)); //result

 

  }

}

When an external device becomes ready to be serviced by the processor the device sends a(n) _________ signal to the processor? A) accessB) haltC) handlerD) interrupt

Answers

When an external device becomes ready to be serviced by the processor the device sends a access.

What is processor?

A processor is an integrated electronic circuit that performs the calculations that run a computer. A processor performs arithmetical, logical, input/output (I/O) and other basic instructions that are passed from an operating system (OS). Most other processes are dependent on the operations of a processor.

The terms processor, central processing unit (CPU) and microprocessor are commonly linked as synonyms. Most people use the word “processor” interchangeably with the term “CPU” nowadays, it is technically not correct since the CPU is just one of the processors inside a personal computer (PC).

The Graphics Processing Unit (GPU) is another processor, and even some hard drives are technically capable of performing some processing.

To know more about computer

https://brainly.com/question/614196

#SPJ4

Other Questions
Identify the zeros of the following function. f(h)=h(h-2)(2h-1) what is the relative frequency of students speaking spanish? Cultural differences combined with fear of strangers led to the stigmatization of Irish immigrants in the mid-19th century.Why were the Irish immigrants themselves blamed for cholera in the early part of the 19th century? (Think in terms of interactions between host characteristics and environmental factors.)Can you think of any parallels to modern-day racism? Question 12The average mass of Jeremy, Mark and Zack is 28 kg. If Jeremy and Zack's average mass is29kg. How heavy is Mark? How did Mansa Musas hajj influence the worlds perception of West Africa? Large biological molecules are synthesized by removing. Which sentence is written in the active voice? joaquin called the bank to report fraud on his debit card. joaquin was put on hold by the bank for a full 30 minutes. joaquin's debit card number was used by someone in another country. joaquin's debit card was canceled by his bank to stop any more fraud. Which business buying decision factor would include political forces, economic factors, and technological changes Graph the equation shown below by transforming the given graph of the parent function. If a bucket is 720 g and 5 1/2 of water is added, what is the total mass? 3...because you feel what they are doing is wrong. 'a) What is the grammatical name of the above expression? what is socail engineering? what is the setting in the book powerless Solve the following equation for x using inverse operations 7x-15=1 which of the following is considered essential in order to achieve a successful resolution? the parties consider their relationship to be the most important factor. the parties have experience with conflict resolution processes. the parties have a sense of investment in the process. the parties are on speaking terms with one another. if the heating value of coal (heat that is realeased when 1 kg of coal is burned) is 30 mj/kg , determine the rate of consumption of coal in tons(us)/day . assume that 100 % of heat released goes to the cycle. Which of these postsecondary degrees comes after a master's degree (goingfrom lowest to highest)?A. Bachelor's degreeB. Associate degreeC. PhDD. High school diploma at the top of the autonomic nervous system hierarchy, the _______ controls most of the autonomic nervous system functions via the reticular formation. Given that a function, g, has a domain of -20 x 5 and a range of -5 g(x) 45 and that g(0) = -2 and g(-9) = 6, select the statement that could be true for g.A. g(-4) = -11B. g(7) = -1C. g(-13) = 20D. g(0) = 2 Derive the three-dimensional transformation matrix for scaling an object by a scaling factor s in a direction defined by the direction cosines alpha , beta , gamma