The correct option is d. You can’t modify existing line item targeting at the insertion order level.
How to modify line item targeting?The reason why the campaign is still item targeting mobile in-app despite removing the mobile in-app targeting at the insertion order level could be because you cannot modify existing line item targeting at the insertion order level.
In Display & Video 360, once a line item is assigned to a campaign, its targeting settings become locked. Even if you remove or modify the targeting settings at the insertion order level, it will not affect the already assigned line items. The line items retain the targeting settings they were initially assigned with.
In this case, since the targeting was set to mobile in-app by mistake and then removed at the insertion order level, the line item's targeting was not updated accordingly.
To change the targeting for the line item, you need to directly edit the line item settings and modify the targeting options there. Modifying the insertion order targeting will not have any impact on the targeting settings of existing line items.
Therefore, to resolve the issue and change the targeting to exclude mobile in-app, you need to edit the line item settings specifically and adjust the targeting parameters accordingly.
Learn more about item targeting
brainly.com/question/20974098
#SPJ11
CHOOSE THE CORRECT CONTINUOUS TENSES( PRESENT CONTINUOUS,PAST CONTINUOUS AND FUTURE CONTINUOUS) : 1. I saw a snake while I ____________________ in the forest. am walking was walking will be walking will walk
Answer:
Explanation:
joe biden>
You are creating a story map about Mexico. After configuring the web app template, you launch the app to test it. When the app opens, the map is zoomed to the whole world, instead of to Mexico. What actions will fix the problem
true or false. when chrome stores user login information, usernames and passwords, it hashes the values and stores the hash digests. this is done to protect the usernames and passwords and prevent them from being revealed to anyone with access to the chrome user files.
TRUE: Chrome hashes the data and stores their hash digests while storing user login information, including usernames and passwords.
Explain the working of Chrome?The open source Chrome browser can be used to execute web-based applications and access the Internet.
This open source Chromium project serves as the foundation for the Chrome web browser. Launched Chrome in 2008 & updates it frequently. Get tailored search results which appear as away as you type using the Chrome browser. Sync settings and bookmarks between all of your devices. Utilize the tools from Workspace, including Docs, Worksheets, Slides, and more.TRUE: Chrome hashes the values then stores their hash digests for storing usernames, passwords, and login information for users.
Thus, the passwords and usernames are shielded in this way so that they can't be divulged to anyone who has access to a chrome user files.
To know more about the Chrome, here
https://brainly.com/question/16898264
#SPJ4
Solve the following activity in pairs . Eldar uses a controller with a circuit to light 16 LED lamps which are labeled from 1 to 16 . When the controller a gives signal to a LED lamp , it changes its state (ON or OFF ) . In the beginning, all the LEDs are swi hed OFF . Eldar has found a sequence of lightning: On the 1st second controller lights ON all LED lamps . ( 1 .... 2 ... 3 .....) On the 2nd it lights ON the LEDs that are even in the circuit. ( 2 ... 4 ... 6 .... ) On 3rd second it lights every third LED in the circuit. ( 3...6...9...) And so it continues in similar way... Which LEDs must be switched ON after the 16th second
Answer:
Non of the LED lamps present will be switched on after the 16th second
Explanation:
From the question, the operation of the controller with time are;
The LED lamp the controller lights up on the 1st second = All LED lamps
The LED lamps the controller lights up on the 2nd second = All even numbered LED lamps = Every other lamp with a number which is a multiple of 2
The LED lamps the controller lights up on the 3rd second = Every other LED lamp with a number which is a multiple of 3
Given that the LED lamps continues in that way, the LED lamps the controller lights up on the 16th = The 16th LED lamp which is a multiple of 16
Therefore, the LED lamp(s) the controller lights up after the 16th second = The 17th or more LED lamp = Non of the LED lamps present will be switched on after the 16th second
What does a hanging indent look like?
The right and left edges of the paragraph are evenly lined up.
The first line of a paragraph is perfectly lined up with the lines below it.
The first line of a paragraph starts farther to the left than the lines below it.
The first line of a paragraph is indented more to the right than the lines below it.
Answer:
Option C, The first line of a paragraph starts farther to the left than the lines below it.
Explanation:
In a hanging indent (which is opposite of the normal paragraph), the first line of the paragraph is lined up with the left margin while the lines below the first line will indent one-half inch from the left margin.
Hence, option C is correct
in event-driven programming, sending an event is called firing the event.
"In event-driven programming, sending an event is called firing the event". This statement is True.
In event-driven programming, sending an event is commonly referred to as firing the event. When an event occurs, such as a user interaction or a system event, the corresponding event is "fired" or triggered. This means that the event is generated and propagated to the appropriate event handlers or listeners that have registered to receive and respond to that specific event.
By firing an event, the program signals that a certain action or condition has occurred, allowing other parts of the program to respond accordingly. Event-driven programming revolves around the concept of events and their handlers, where events trigger the execution of associated code or functions.
Therefore, in event-driven programming, it is correct to say that sending an event is called firing the event.
To learn more about Event-driven Programming, visit:
https://brainly.com/question/31036216
#SPJ11
HELP!!!
To see the shortcuts on the ribbon in MS Word, hold down the _____ keys at the same time. A) CTRL & X B) Shift & Alt C) Shift & Delete D) CTRL & ALT
To see the shortcuts on the ribbon in MS Word, hold down the D) CTRL & ALT keys at the same time.
How can I display keyboard shortcuts in Word?When you hit Alt, tabs or Quick Access buttons on the ribbon display letters or KeyTips. To open ribbon tabs, use the keyboard shortcuts shown in this table. There may be more KeyTips visible depending on the tab you choose.
Therefore, Control+Alt+Delete is seen as the combination of the Ctrl key, the Alt key, and the Del key that a user can press simultaneously on a personal computer running the Microsoft Windows operating system to end an application task or restart the operating system.
Learn more about shortcuts keys from
https://brainly.com/question/28223521
#SPJ1
application of ai in agriculture
Answer:
Robots for Agriculture: Businesses are creating and programming autonomous robots to perform crucial agricultural tasks, such as harvesting crops more quickly and in greater quantities than human laborers.Crop and Soil Monitoring: Businesses are using computer vision and deep-learning algorithms to process data obtained from drones and/or software-based technology to keep track of the health of their crops and soil.Machine learning (ML) models are being developed to monitor and forecast the effects of various environmental factors, such as weather changes, on crop yield.Emerging AI-driven technologies are addressing industry issues like crop yield, soil health, and herbicide resistance while also helping to increase efficiency. Robotic farming is set to become a highly regarded application of artificial intelligence. It's also conceivable that soon, agricultural robots will be created to carry out a wide range of tasks.
i hope this works......i literally went through the books to find those...lol
Answer:
eriuhewfiuefwuieqwb
Explanation:
Write a function (in matlab) called Chance2BHired to estimate the probability of an applicant being hired based on GPA. The input is a numeric called GPA and the output is chanceHired, equal to the probability of an applicant based on the following table.
GPA >= 3.5 Probability 90%
3.0 <= GPA < 3.5 Probability 80%
2.5 <= GPA < 3.0 Probability 70%
2.0 <= GPA < 2.5 Probability 60%
1.5 <= GPA < 2.0 Probability 50%
GPA < 1.5 Probability 40%
function chanceHired= Chance2BHired( GPA )
Code to call your function
chanceHired= Chance2BHired( GPA )
Certainly! Here's a MATLAB function called Chance2BHired that estimates the probability of an applicant being hired based on their GPA:
function chanceHired = Chance2BHired(GPA)
if GPA >= 3.5
chanceHired = 0.9;
elseif GPA >= 3.0
chanceHired = 0.8;
elseif GPA >= 2.5
chanceHired = 0.7;
elseif GPA >= 2.0
chanceHired = 0.6;
elseif GPA >= 1.5
chanceHired = 0.5;
else
chanceHired = 0.4;
end
end
To call this function and obtain the chanceHired value , you can use following code:
GPA = 3.2; % Example GPA value
chanceHired = Chance2BHired(GPA);
disp(chanceHired);
Replace GPA with the desired GPA value you want to evaluate. The function will return the corresponding chanceHired probability based on the GPA input. Finally, disp(chanceHired) will display the result in the MATLAB console.
Learn more about MATLAB here -: brainly.com/question/30883675
#SPJ11
in ICT what is the difference between Save and Save As
Answer:
Save updates the files that are already created.
Save as creates a new file or store the existing file in a new location.
How are procedural and object-oriented programming approaches similar?
Both approaches focus on calling attributes and behaviors to write programs.
Both approaches focus on functions, modules, and processes to write programs.
Both approaches are used when writing programs.
Both approaches require little planning in order to write completed programs.
What is one benefit of using object-oriented programming?
Inherited traits
Minimal planning
Distinct procedures
Top-down design
How are procedural and object-oriented programming approaches similar?
Both approaches focus on calling attributes and behaviors to write programs.
Both approaches focus on functions, modules, and processes to write programs.
Both approaches are used when writing programs.
Both approaches require little planning in order to write completed programs.
Question 1
C. Both approaches are used when writing programs.
Question 2
A. Inherited traits
Question 3
This is the same as Question 1.
C. Both approaches are used when writing programs.
Procedural and object-oriented programming approaches similar are both approaches are used when writing programs. Inherited traits is one benefit of using object-oriented programming. Hence option C and A is correct.
What is object-oriented programming?Object-oriented programming is defined as an approach to computer programming that centers the creation of software around data or objects rather than on logic and operations. Encapsulation, polymorphism, and inheritance are the three traits that distinguish object-oriented languages, and they are the foundation of object-oriented approach.
Inherited traits are defined as a trait or variations that are encoded in DNA and transmitted during reproduction from parent to child. The laws of Mendelian genetics govern inheritance. Successful features are passed down more frequently and shift through time between species. An organism can adapt to a certain environment and boost its chances of survival by changing its features.
Thus, procedural and object-oriented programming approaches similar are both approaches are used when writing programs. Inherited traits is one benefit of using object-oriented programming. Hence option C and A is correct.
To learn more about object-oriented programming, refer to the link below:
https://brainly.com/question/26709198
#SPJ5
A run is a sequence of adjacent repeated values. Write a
program that generates a sequence of 50 random die tosses in
an array and prints the die values, making the runs by including
them in parentheses, like this:
1 2 (5 5) 3 1 2 4 3 (2 2 2 2) 3 6 (5 5) 6 3 1
Add a method alternatingSum() that returns the sum of the
alternating elements in the array and subtracts the others. For
example, if your array contains:
1 4 9 16 9 7 4 9 11
Then the method should compute:
1-4+9-16+9-7+4-9+11 = -2
I am having trouble with this code can someone please help me?
Answer: yeet
Explanation:
liker up
The required program illustrates an array, outputs the die values with runs in parenthesis, and computes the alternating sum of the array's elements.
What is the array?An array is a type of data structure that holds a collection of elements. These elements are typically all of the same data type, such as an integer or a string.
Here is a program that generates a sequence of 50 random die tosses in an array, prints the die values with runs in parentheses, and computes the alternating sum of the elements in the array:
import java.util.Random;
public class Main {
public static void main(String[] args) {
// Create a random number generator
Random rand = new Random();
// Create an array to store the die tosses
int[] tosses = new int[50];
// Generate the random die tosses
for (int i = 0; i < tosses.length; i++) {
tosses[i] = rand.nextInt(6) + 1;
}
// Print the die tosses with runs in parentheses
System.out.print(tosses[0]);
for (int i = 1; i < tosses.length; i++) {
if (tosses[i] == tosses[i - 1]) {
System.out.print(" (" + tosses[i]);
while (i < tosses.length - 1 && tosses[i] == tosses[i + 1]) {
System.out.print(" " + tosses[i]);
i++;
}
System.out.print(") ");
} else {
System.out.print(" " + tosses[i]);
}
}
System.out.println();
// Compute and print the alternating sum of the array elements
System.out.println("Alternating sum: " + alternatingSum(tosses));
}
public static int alternatingSum(int[] array) {
int sum = 0;
for (int i = 0; i < array.length; i++) {
if (i % 2 == 0) {
sum += array[i];
} else {
sum -= array[i];
}
}
return sum;
}
}
The alternatingSum() method computes the alternating sum of the elements in the array by adding the elements at even indices and subtracting the elements at odd indices.
To learn more about the arrays click here:
brainly.com/question/22364342
#SPJ2
How You Plan to manage the presentation and lead the discussion (technology usage plan [ppt, videos links etc.]).
Effective management of a presentation and leading a discussion involves careful planning, incorporating technology tools such as PowerPoint slides and video links, encouraging audience engagement, and facilitating meaningful discussions. Providing additional resources further enhances participants' learning experience.
To effectively manage a presentation and lead a discussion, it is important to have a technology usage plan that includes PowerPoint (PPT) slides, video links, and other relevant tools. Here is a step-by-step guide on how to manage the presentation and lead the discussion using technology:
1. Plan and prepare: Start by outlining the main points and objectives of your presentation. Determine the key topics you want to cover and gather the necessary materials such as slides, videos, and other multimedia resources that support your content.
2. Create an engaging PowerPoint presentation: Use PowerPoint to create visually appealing slides that complement your content. Keep the slides concise and easy to read, using bullet points, images, and charts to illustrate your ideas. Avoid overcrowding the slides with excessive text or complex visuals.
3. Incorporate video links: Embed relevant video links within your presentation to enhance the learning experience. Videos can be used to provide real-life examples, demonstrations, or explanations that reinforce the concepts being discussed. Ensure that the videos are of high quality, relevant to the topic, and add value to the presentation.
4. Practice and time your presentation: Practice delivering your presentation to ensure a smooth flow of ideas and seamless transitions between slides and videos. Time yourself to ensure that the presentation fits within the allocated time frame, allowing for questions and discussions.
5. Encourage audience engagement: During the presentation, actively involve the audience by asking questions, soliciting opinions, or initiating discussions. Use interactive tools such as live polling or online discussion boards to encourage participation and gather feedback. This can be done through platforms like Mentimeter or Forms.
6. Facilitate discussion: After the presentation, lead a discussion by encouraging participants to share their thoughts, ask questions, and provide feedback. Use open-ended questions to spark meaningful conversations and promote critical thinking. Encourage participants to express their opinions and engage in respectful debates.
7. Provide additional resources: Share relevant links to further reading materials, websites, or online resources that can deepen participants' understanding of the topic. This can be done through email or by creating a shared document or webpage where participants can access the resources at their convenience.
To learn more about presentation
https://brainly.com/question/30647242
#SPJ11
PLS HELP ASAP) Omar is using the web to do research on diabetes. he needs to ensure that all of the information he finds regarding medications, treatments, and diets are accurate. the first websites he finds has a lot of information about a diet plan to help diabetic live healthy lifestyle. Omar can't figure out who the author of the site is and he notices that matches the one described on the website. Which of these are red flags that he should continue doing more research elsewhere? choose the right answer
a. the content is biased towards a particular diet plan that the site is advertising
b. Omar cant find the author so there is no proof that the writer can be trusted to provide medical advice.
c. both A and B
d. none of the above. the website can be trusted.
Nikolas is doing research on U.S visas for a school project. he has found conflicting information on two sites. the first site is travel.state.gov and the other is traveldocs.com which site should Nikolas trust more? choose the answer
a. Travel.state.gov
b. Traveldocs.com
Answer: 1. C. both A and B.
2. Travel.state.gov
Explanation: i took the test!
at the request of management, a senior server engineer deploys a proxy server for all users in the organization. the proxy provides many benefits for a uniform user experience and for it management. of the choices, which statements describe features the proxy provides? (select all that apply.)
Content Filtering and caching of Web Contents describe the features the proxy provides.
What are the features of proxy?
A proxy server is an intermediary server between the client and the internet.
Proxy servers offer the following basic functionalities:
Firewall and network data filtering.Network connection sharing.Data cachingWhat is the purpose of proxy and content filtering?
Proxy and content filtering use programs or even firewalls to screen traffic coming and going on the network in an effort to block access to objectionable, questionable, or explicit content.
Which is the purpose of web caching on a proxy server?
Web proxy caching stores copies of frequently accessed Web objects (such as documents, images, and articles) close to users and serves this information to them. Internet users get their information faster, and Internet bandwidth is freed for other tasks.
Thus, content filtering and caching of web content are the correct option.
To know more about proxy server:
https://brainly.com/question/24115426
#SPJ4
How do you access the
internet in your school and at home?
SXXSSSSSSSSSZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ
Answer:
okkkk
Explanation:
MARK ME BRAINLIEST PLZZZZZZZZZZZZZZZZZZZZZZZZzzzzzzzzzzzzzzzzzzzzhow do i stop my computer from automatically connecting to a wireless network
Answer:
:p
Explanation:
Should be in wireless network settings.
or
If you have a home wifi or network, lock into that (via connecting and clicking connect automatically or clicking stay connected- depending on the network band and type as well as your computer model and make)
Hope this helps :P
Have a nice day (or night)
100 POINTS. DO NOT SPAM. OR I WILL REPORT.
Write about various image degradation function.(minimum 5)
Answer:
Explanation:
In digital image processing, degradation is a process of introducing defects to the image. Understanding the degradation function will allow restoration of the original image.
There are many different causes for image degradation such as motion blur, digital noise and lens off-focus. In cases like motion blur, it is possible to come up with an very good estimate of the actual blurring function and "undo" the blur to restore the original image. For digital noise, a statistical model can be set up to compensate for the degradation it caused. Similarly lens focus can be compensate by an optical model if the mis-focus is known.
The above are three degradations that I could find. A lot more information can be found about restoration functions. If you search for image degradation online, you will find a discussion on Quora and an interesting introduction from Rice University. Good luck!
Answer:
Explanation:
image degradation function helps 2 understand how a digital image has degraded n how 2 restore it
to come up w the function, start by observing the degraded image. look 4 areas w less degradation n use them as reference of the original
if equipment used 2 take the degraded image is available, try finding the exact conditions which produce the same degradation. dat will provide clues for restoration
if the degraded image can be scanned, it can be manipulated digitally w various pre-programmed functions n look 4 any improvement
one of the above should help in restoring the degraded image
Effective nonverbal communication can cause tension.
True or False
Explanation:
When your nonverbal signals match up with the words you're saying, they increase trust, clarity, and rapport. When they don't, they can generate tension, mistrust, and confusion.
Answer:
False
Explanation:
what is the best combos for Nix in Brawlhalla (PS4)?
Answer:
sycthe is simple. Do down light and then turn them around. Then do chase dodge to neutral air. its an infinite combo
Explanation:
If you would like to give another user permissions on your mailbox or to particular folders within your mailbox, which role should you configure?
Assignee
Client
Delegate
Manager
Answer:
I think it's B, Delegate
Explanation:
Cause the other options didn't seem to fit as the answer.
I really don't know though.
A delegate is someone who has been granted permission by another user to access. The correct answer would be an option (C).
What is a mailbox?A computer-simulated mailbox that stores email messages. Mailboxes are saved on a disc as a message file or a message database.
A delegate is someone who has been granted permission by another user to access and manage their mailbox, including sending and responding to email messages on their behalf.
When you grant delegate access to another person, you are giving them the ability to access specific folders within your mailbox and perform specific actions, such as reading, sending, and deleting email messages.
Assignee, client, and manager are not terms typically used in the context of delegate access in email systems.
Thus, the correct answer would be option (C).
Learn more about the mailbox here:
https://brainly.com/question/28430685
#SPJ6
Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters. Which typeface should he use?
A.
old style
B.
geometric sans-serifs
C.
transitional and modern
D.
humanist sans
E.
slab serifs
The type of typeface that Derek should use is option D: humanist sans.
What is an typeface?A typeface is known to be a kind of a design tool that is used for lettering and it is one that is made up of variations in regards to its size, weight (e.g. bold), slope and others.
What defines a humanist font?The “Humanist” or “Old Style” is known to be a kind of a historical classification that is used for any typefaces that have its inspiration from Roman lettering and also that of the Carolingian minuscule as it often include forms that looks like the stroke of a pen.
Since Derek is designing a logo for a toy store. He wants to use a font that looks like handwritten letters, The type of typeface that Derek should use is option D: humanist sans.
Learn more about typeface from
https://brainly.com/question/11216613
#SPJ1
Which 3 file formats can be used for importing lists directly into quickbooks online?.
Answer:
Explanation:
QBO
IIF
QBJ
The name of 3 file formats that can be used for importing lists directly into QuickBooks online are,
1. Excel (XLS, XLSX)
2. CSV (Comma-Separated Values)
3. IIF (Intuit Interchange Format)
Given that,
To find names of 3 file formats that can be used for importing lists directly into QuickBooks online.
Now, Here are three commonly used file formats:
1. Excel: QuickBooks Online allows you to import lists such as customers, vendors, and products using Excel spreadsheets.
2. CSV (Comma-Separated Values): CSV files are widely used for data import/export. QuickBooks Online supports importing lists in CSV format.
3. IIF (Intuit Interchange Format): While not as commonly used as Excel or CSV, QuickBooks Online also supports importing lists using the IIF file format.
IIF files are specific to QuickBooks and provide a way to import various types of data, including lists.
To learn more about QuickBooks visit:
https://brainly.com/question/24441347
#SPJ4
A ____ is a question, or, in database terms, a request for specific information from the database
A query is a question, or, in database terms, a request for specific information from the database.
Explanation:
A query is a question or request for specific information from a database. Queries are used to retrieve data from a database that meets certain criteria, and they can be very specific or very general, depending on the needs of the user.
To create a query, the user needs to specify what information they want to retrieve and from which table(s) in the database. They can then apply filters or conditions to the query to narrow down the results to the specific information they need. This is done using a query language, such as SQL (Structured Query Language), which is designed specifically for working with databases.
Once the query is created, the user can execute it and the database will return the results based on the specified criteria. The results can be displayed on the screen, printed out, or saved to a file, depending on the user's needs.
Queries are an important part of database management, as they allow users to easily retrieve and analyze data without having to manually search through large amounts of information. They are used in a wide range of applications, from business and finance to scientific research and healthcare.
Know more about the SQL click here:
https://brainly.com/question/20264930
#SPJ11
Takes a 3-letter String parameter. Returns true if the second and
third characters are “ix”
Python and using function
Answer:
def ix(s):
return s[1:3]=="ix"
Explanation:
1. What is the Internet and what is the difference between the Internet \& World Wide Web (WWW)? 2. What is IT/intemet law? 3. Compare Easterbrook's arguments with Lessig's. Is there a role for IT law
1. The Internet is a global network of interconnected computer networks, while the World Wide Web (WWW) is a subset of the Internet that allows access to web pages.
2. IT/internet law refers to the legal principles and regulations governing technology, the Internet, and digital information.
3. Easterbrook and Lessig present different perspectives on regulating cyberspace, with Easterbrook highlighting challenges and Lessig advocating for a balanced legal approach. IT law plays a vital role in establishing legal frameworks for the digital realm.
1. The Internet is a global network of interconnected computer networks that enables communication and sharing of information across the world. It provides various services such as email, file transfer, and access to websites.
On the other hand, the World Wide Web (WWW) is a subset of the Internet that allows users to access and navigate web pages through the use of browsers. The WWW consists of interconnected documents and resources (web pages) that are linked through hyperlinks.
2. IT/internet law, also known as cyber law or information technology law, refers to the legal principles and regulations that govern the use of technology, the Internet, and digital information. It encompasses various legal issues related to data protection, online privacy, intellectual property rights, electronic commerce, cybercrime, and more.
IT/internet law aims to provide a legal framework for resolving disputes, ensuring compliance, and protecting the rights and interests of individuals and organizations in the digital realm.
3. Easterbrook's arguments primarily focus on the challenges of regulating cyberspace due to its global and borderless nature. He suggests that traditional legal frameworks may not be sufficient in addressing the complexities of the Internet.
On the other hand, Lessig emphasizes the importance of developing a balanced and flexible legal approach that considers both regulation and protection of individual freedoms.
Both Easterbrook and Lessig acknowledge the need for regulation in cyberspace, but their viewpoints differ. Easterbrook highlights the difficulties of regulating the Internet, while Lessig emphasizes the importance of adapting legal frameworks to the digital environment.
Considering the role of IT law, it plays a crucial role in establishing legal guidelines and frameworks to address various issues arising from technology, the Internet, and digital information. It aims to provide legal protections, ensure privacy and security, promote fair competition, and govern online behavior.
As technology continues to advance and shape our lives, IT law becomes increasingly relevant in facilitating a harmonious and regulated digital society.
Learn more about Internet here:
https://brainly.com/question/14823958
#SPJ11
Give 3 advantages of using shortcut key, especially in MS Office.
Answer:
Efficient and time-saving. Using shortcuts makes you more efficient at doing certain tasks on your computer. ...
Multi-tasking. Being a multi-tasker is sometimes required in life. ...
Health benefits.
2) What are two reasons we analyze algorithms?
a) make decisions about what algorithms to use
b) ease of coding
c) sorting data
d) predict performance
Answer:
Make decisions about what algorithms to use
Explanation:
Project Stem 7.4 Code Practice: Question 2
Picture of needed is attached
using the knowledge of computational language in JAVA it is possible to write a code that illustrates the use of conditional statements.
Writting the code:def GPAcalc(g,w):
if g == "a" or g == "A":
return 4+ w
elif g == "B" or g == "b":
return 3+ w
elif g == "C" or g == "c":
return 2+ w
elif g == "D" or g == "d":
return 1+ w
elif g == "F" or g == "f":
return 0+ w
else:
return "Invalid"
grade = input("Enter your Letter Grade: ")
weight = int(input("Is it weighted?(1 = yes, 0 = no) "))
gpa = GPAcalc(grade,weight)
print("Your GPA score is: " + str(gpa))
def GPAcalc(g):
if g == "a" or g == "A":
return 4
elif g == "B" or g == "b":
return 3
elif g == "C" or g == "c":
return 2
elif g == "D" or g == "d":
return 1
elif g == "F" or g == "f":
return 0
else:
return "Invalid"
grade = input("Enter your Letter Grade: ")
gpa = GPAcalc(grade)
print("Your GPA score is: " + str(gpa))
See more about JAVA at brainly.com/question/29897053
#SPJ1