Answer:
Hence the correct option is option a) define both structures and then create a data member of the nested structure type within the other structure.
Explanation:
To make Address nested to Employee, we've to define Address structure before and out of doors Employee structure and make an object of Address structure inside Employee structure.
For example, we may need to store the address of an entity employee in a structure.
Differentiate between TCP Reno and TCP Tahoe.
Answer:
They have different words
Explanation:
I hope it helps choose me the brainest
What is the relationship between an organization’s specific architecture development process and the Six-Step Process?
Answer:
It is a method of developing architecture in various stages
Explanation:
The organization-specific architecture developmental process is a tested and repeated process for developing architecture. It made to deal with most of the systems. It describes the initial phases of development. While the six step process is to define the desired outcomes, Endorse the process, establish the criteria and develop alternatives. Finally to document and evaluate the process.Develop a program that will maintain an ordered linked list of positive whole numbers. Your program will provide for the following options: a. Add a number b. Delete a number c. Search for a number d. Display the whole list of numbers At all times, the program will keep the list ordered (the smallest number first and the largest number last).
Answer:
#include <iostream>
using namespace std;
struct entry
{
int number;
entry* next;
};
void orderedInsert(entry** head_ref,entry* new_node);
void init_node(entry *head,int n)
{
head->number = n;
head->next =NULL;
}
void insert(struct entry **head, int n)
{
entry *nNode = new entry;
nNode->number = n;
nNode->next = *head;
*head = nNode;
}
entry *searchNode(entry *head, int n)
{
entry *curr = head;
while(curr)
{
if(curr->number == n)
return curr;
curr = curr->next;
}
}
bool delNode(entry **head, entry *ptrDel)
{
entry *curr = *head;
if(ptrDel == *head)
{
*head = curr->next;
delete ptrDel;
return true;
}
while(curr)
{
if(curr->next == ptrDel)
{
curr->next = ptrDel->next;
delete ptrDel;
return true;
}
curr = curr->next;
}
return false;
}
void display(struct entry *head)
{
entry *list = head;
while(list!=NULL)
{
cout << list->number << " ";
list = list->next;
}
cout << endl;
cout << endl;
}
//Define the function to sort the list.
void insertionSort(struct entry **h_ref)
{
// Initialize the list
struct entry *ordered = NULL;
// Insert node to sorted list.
struct entry *current = *h_ref;
while (current != NULL)
{
struct entry *next = current->next;
// insert current in the ordered list
orderedInsert(&ordered, current);
// Update current
current = next;
}
// Update the list.
*h_ref = ordered;
}
//Define the function to insert and traverse the ordered list
void orderedInsert(struct entry** h_ref, struct entry* n_node)
{
struct entry* current;
/* Check for the head end */
if (*h_ref == NULL || (*h_ref)->number >= n_node->number)
{
n_node->next = *h_ref;
*h_ref = n_node;
}
else
{
//search the node before insertion
current = *h_ref;
while (current->next!=NULL &&
current->next->number < n_node->number)
{
current = current->next;
}
//Adjust the next node.
n_node->next = current->next;
current->next = n_node;
}
}
int main()
{
//Define the structure and variables.
char ch;int i=0;
entry *newHead;
entry *head = new entry;
entry *ptr;
entry *ptrDelete;
//Use do while loop to countinue in program.
do
{
//Define the variables
int n;
int s;
int item;
char choice;
//Accept the user choice
cout<<"Enter your choice:"<<endl;
cout<<"a. Add a number"<<endl
<<"b. Delete a number"<<endl
<<"c. Search for a number"<<endl
<<"d. Display the whole list of numbers"<<endl;
cin>>choice;
//Check the choice.
switch(choice)
{
//Insert an item in the list.
case 'a' :
// cin>>item;
cout<<"Enter the element:"<<endl;
cin>>item;
//To insert the first element
if(i==0)
init_node(head,item);
//To insert remaining element.
else
{
ptr = searchNode(head,item);
//Check for Duplicate data item.
if(ptr==NULL)
{
insert(&head,item);
}
else
{
cout<<"Duplicate data items not allowed";
cout<<endl<<"EnterAgain"<<endl;
cin>>item;
insert(&head,item);
}
}
insertionSort(&head);
i=i+1;
break;
//Delete the item from the list
case 'b' :
int numDel;
cout<<"Enter the number to be deleted :"<<endl;
cin>>numDel;
//Locate the node.
ptrDelete = searchNode(head,numDel);
if(ptrDelete==NULL)
cout<<"Element not found";
else
{
if(delNode(&head,ptrDelete))
cout << "Node "<< numDel << " deleted!\n";
}
break;
//Serach the item in the list.
case 'c' :
cout<<"Enter the element to be searched :";
cout<<endl;
cin>>s;
ptr = searchNode(head,s);
if(ptr==NULL)
cout<<"Element not found";
else
cout<<"Element found";
break;
//Display the list.
case 'd' :
display(head);
break;
default :
cout << "Invalid choice" << endl;
break;
}
//Ask user to run the program again
cout<<endl<<"Enter y to countinue: ";
cin>>ch;
}while(ch=='y'||ch=='Y');
return 0;
}
output:
which of the statement is use to skip the loop and continue woth the next iteration ?
Answer:
C – continue statement with example. The continue statement is used inside loops. When a continue statement is encountered inside a loop, control jumps to the beginning of the loop for next iteration, skipping the execution of statements inside the body of loop for the current iteration.
Explanation:
PLS mark brainliest
hope it helped u
write a java program that prompts the user to enter scores (each number an integer from 0 to 10) and prints the following output: how many scores entered the highest score the lowest score the average of all the scores the average with the highest and lowest score not counted if the user enters less than 3 scores print an error message instead of the output above
Answer:
Explanation:
The following is written in Java. It continues asking the user for inputs until they enter a -1. Then it saves all the values into an array and calculates the number of values entered, the highest, and lowest, and prints all the variables to the screen. The code was tested and the output can be seen in the attached image below.
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Scanner;
class Brainly {
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
int count = 0;
int highest, lowest;
ArrayList<Integer> myArr = new ArrayList<>();
while (true) {
System.out.println("Enter a number [0-10] or -1 to exit");
int num = in.nextInt();
if (num != -1) {
if ((num >= 0) && (num <= 10)) {
count+= 1;
myArr.add(num);
} else {
System.out.println("Wrong Value");
}
} else {
break;
}
}
if (myArr.size() > 3) {
highest = myArr.get(0);
lowest = myArr.get(0);
for (int x: myArr) {
if (x > highest) {
highest = x;
}
if (x < lowest) {
lowest = x;
}
}
System.out.println("Number of Elements: " + count);
System.out.println("Highest: " + highest);
System.out.println("Lowest : " + lowest);
} else {
System.out.println("Number of Elements: " + count);
System.out.println("No Highest or Lowest Elements");
}
}
}
1.which screen appears after the password is typed (welcome, lock)
Answer:
it should be the welcome screen I will hope so lol
Answer:
welcomeyou don't know that much also
Which of these is a tool for creating mobile apps?
Appy Pie
C#
Apple Pie
C++
Answer:
C++
Explanation:
C++ is used in application development
(viii) Word does not allow you to customize margins.
true/false:-
Management of software development consist of?
Chọn một:
a. Process
b. People
c. Project
d. All of the above
Answer:
d. All of the above
Explanation:
A software can be defined as a set of executable instructions (codes) or collection of data that is used typically to instruct a computer how to perform a specific task and to solve a particular problem.
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications.
In Computer science, management of software development consist of;
a. Process: it involves the stages through which a software application is analyzed, designed, developed, tested, etc.
b. People: it refers to the individuals involved in the software development process.
c. Project: it's the entirety of the stages a software goes through before it gets to the end user.
Sites like Zillow get input about house prices from a database and provide nice summaries for readers. Write a program with two inputs, current price and last month's price (both integers). Then, output a summary listing the price, the change since last month, and the estimated monthly mortgage computed as (current_price * 0.051) / 12. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('{:.2f}'.format(your_value))
Answer:
The program in Python is as follows:
current_price = int(input("Current Price: "))
last_price = int(input("Last Month Price: "))
change = current_price - last_price
mortgage = (current_price * 0.051) / 12
print('Change: {:.2f} '.format(change))
print('Mortgage: {:.2f}'.format(mortgage))
Explanation:
This gets input for current price
current_price = int(input("Current Price: "))
This gets input for last month price
last_price = int(input("Last Month Price: "))
This calculates the price change
change = current_price - last_price
This calculates the mortgage
mortgage = (current_price * 0.051) / 12
This prints the calculated change
print('Change: {:.2f} '.format(change))
This prints the calculated monthly mortgage
print('Mortgage: {:.2f}'.format(mortgage))
Answer:
current_price = int(input())
last_months_price = int(input())
change = current_price - last_months_price
mortgage = current_price * 0.051 / 12
print('This house is $', end= '')
print(current_price, end= '. ')
print('The change is $', end= '')
print(change, end= ' ')
print('since last month.')
print('The estimated monthly mortgage is $', end= '')
print(mortgage, end='0.\n')
write a program that keeps taking integers until the user enters in python
int main {
//variables
unsigned long num = 0;
std::string phrase = " Please enter your name for confirmation: " ;
std::string name;
//codes
std::cout << phrase;
std::cin>> name;
while ( serial.available() == 0 ) {
num++;
};
if ( serial.avaliable() > 0 ) {
std::cout << " Thank you for your confirmation ";
};
};
Write a program that lets a user enter N and that outputs N! (N factorial, meaning N*(N-1)*(N-2)*..\.\*2*1). Hint:Use a loop variable i that counts from total-1 down to 1. Compare your output with some of these answers: 1:1, 2:2, 3:6, 4:24, 5:120, 8:40320.
Answer:
The program is as follows:
num = int(input("Number: "))
fact = 1
for i in range(1,num+1):
fact*=i
print(fact)
Explanation:
This gets integer input from the user
num = int(input("Number: "))
This initializes factorial to 1
fact = 1
The following iteration calculates the factorial of the integer input
for i in range(1,num+1):
fact*=i
This prints the calculated factorial
print(fact)
A hammer tool can only be used by one technician at a time to perform hitting. Accordingly, you have developed a Hammer class with a hit method. Objects of class Hammer are used to simulate different hammers, while threads are created to simulate users. Which situation needs to add the synchronized keyword to the hit method
Answer:
Explanation:
The synchronized keyword needs to be active on the hit method at any point where 2 or more threads (users) exists at any given moment. This is in order to prevent two or more users from trying to perform a hammer hit at the same time. This is what the synchronized keyword is used for. It prevents the more than one thread from calling the specific method at the same time. Instead it adds the action to a sequence so that the second thread calls the hit method only after the first thread's hit method finishes.
Assume a TCP sender is continuously sending 1,090-byte segments. If a TCP receiver advertises a window size of 5,718 bytes, and with a link transmission rate 26 Mbps an end-to-end propagation delay of 22.1 ms, what is the utilization
Answer:
for the 5 segments, the utilization is 3.8%
Explanation:
Given the data in the question;
segment size = 1090 bytes
Receiver window size = 5,718 bytes
Link transmission rate or Bandwidth = 26 Mbps = 26 × 10⁶ bps
propagation delay = 22.1 ms
so,
Round trip time = 2 × propagation delay = 2 × 22.1 ms = 44.2 ms
we determine the total segments;
Total segments = Receiver window size / sender segment or segment size
we substitute
Total segments = 5718 bytes / 1090 bytes
Total segments = 5.24587 ≈ 5
Next is the throughput
Throughput = Segment / Round trip
Throughput = 1090 bytes / 44.2 ms
1byte = 8 bits and 1ms = 10⁻³ s
Throughput = ( 1090 × 8 )bits / ( 44.2 × 10⁻³ )s
Throughput = 8720 bits / ( 44.2 × 10⁻³ s )
Throughput = 197.285 × 10³ bps
Now Utilization will be;
Utilization = Throughput / Bandwidth
we substitute
Utilization = ( 197.285 × 10³ bps ) / ( 26 × 10⁶ bps )
Utilization = 0.0076
Utilization is percentage will be ( 0.0076 × 100)% = 0.76%
∴ Over all utilization for the 5 segments will be;
⇒ 5 × 0.76% = 3.8%
Therefore, for the 5 segments, the utilization is 3.8%
10 features of the ribbon in microsoft word
Answer:yes
Explanation:
Yup
Based on the screenshot below which letter do you select to sort the items in an alphabetical order?
Answer:
the smallest number start with the first number of the alphabet
John downloaded the manual for his TV, called manual-of-tv.pdf, from the manufacturer's website. After he clicked twice on the document he was informed by Windows that the file could not be opened. Which software must John install to solve the problem?
Jhon must download third party pdf viewer softwares to open the .pdf file.
For example
Adobe Acrobat Reader
Must click thanks and mark brainliest
Which of the following computer component facilitates internet connection?
A. Utility system
B. Operating system
C. Application system
D. Performance system
Answer:
it should be operating system
Explanation:
I hope this right have an great day
The computer component that facilitates internet connection is the operating system. The correct option is B.
What is an internet connection?Internet connection is the connection of different computers together. This connection is wireless. Internet connects different computer system together and provides and transfer information. We use the internet for many uses. Today students used this for learning, with the internet companies from far countries can join together.
The operating system of the computer is the main part of the computer that operates all its functions. The operating system manages computer software, hardware, and resources.
The internet connection is also operated by the operating system for the computer. Internet is connected by a router of WiFi, and the wired internet has connected to a wire in the CPU.
Thus, the correct option is B. Operating system.
To learn more about internet connection, refer to the link:
https://brainly.com/question/28110846
#SPJ2
A bot can use a _______to capture keystrokes on the infected machine to retrieve sensitive information.
Answer:
keylogger.
Explanation:
A keylogger can be defined as a software program or hardware device designed for monitoring and recording the keystrokes entered by an end user through the keyboard of a computer system or mobile device.
Basically, a keylogger can be installed as a software application or plugged into the USB port of a computer system, so as to illegally keep a record of all the inputs or keys pressed on a keyboard by an end user.
In order to prevent cyber hackers from gaining access to your keystrokes, you should install an anti-malware software application such as Avira, McAfee, Avast, Bitdefender, Kaspersky, etc.
An antivirus utility is a software application or program that's used to scan, detect, remove and prevent computer viruses such as Malware, Trojan horses, keyloggers, botnets, adwares etc.
In conclusion, a bot can use a keylogger to capture keystrokes on the infected machine to retrieve sensitive information.
Write a program that inputs a line of text tokenizing the line with function strtok and outputs the tokens in reverse order i.e. last token in the sentence is printed first and first token is printed last. The user must be able to specify at most 80 characters in the sentence.
Answer and Explanation:
var gettext= prompt("please enter text");
function strtok(gettext){
var splitString = gettext.split("");
if(splitString.length<=80){
var reverseArray = splitString.reverse();
var joinArray = reverseArray.join("");
return joinArray;}
else{
Alert("too many characters");
}
}
/* we first ask for user input using the prompt function. We save this in a variable gettext which we pass to the strtok function. This function first splits the text and makes it an array so we are able to count how many characters the user enters and set an if..else condition to handle characters that may be more than 80. The reverse and join functions are then used respectively to reverse and return the string.*/
3. Using Assume the following list of keys: 36, 55, 89, 95, 65, 75, 13, 62, 86, 9, 23, 74, 2, 100, 98 This list is to be sorted using the quick sort algorithm as discussed in this chapter. Use pivot as the middle element of the list. a. Give the resulting list after one call to the function partition. b. What is the size of the list that the function partition partitioned
Answer:
a. 36, 55, 13, 9, 23, 2, 62, 86, 95, 65,74, 75, 100, 98, 89
b. 15
Explanation:
Write the code for the following problem.
Add a function to problem to display the last name and highest, last name and lowest and average exam score. Hint: for highest initialize a variable to 0 (high_var). If the array value is higher than the high_var then set high_var to the array value and set high_index to the position of the array. Proceed through the array until you get to the end. Do the same for finding the lowest using low_var set to 999 (higher than the highest value). For the average score, sum all the exam scores as you proceed through the loop. Use a for loop to go through each occurrence of the arrays. Note you can do all this with one for loop but if it makes more sense to you to use multiple for loops that is ok too.
Answer:
no
Explanation:
Create union integer with members char c, short s, int i and long b. Write a program that inputs the values of type char, short, int, and long and stores the values in union variables of type union integer. Each union variable should be printed as a char, a short, an int and a long. D the values always print correctly? Also create pseodocode or flowchart.
Here is the feedback that I received when I originally turned this in:
I have the following concerns: You need to save your program file with a .c extension. You should declare your union above the main module and then utilize it from within this portion. You have declared the union and then created a function definition prior to entering the main() function.
Here is the original code provided by homework help: Thanks in advance
#include
union myUnion {
char c;
short s;
int i;
long l;
};
void print(myUnion u) {
printf("As a character: %c\n", u.c);
printf("As a short: %hd\n", u.s);
printf("As an int: %d\n", u.i);
printf("As a long: %ld\n\n", u.i);
}
int main() {
myUnion u;
printf("Please enter a character: ");
scanf("%c", &(u.c));
print(u);
printf("Please enter a short: ");
scanf("%hd", &(u.s));
print(u);
printf("Please enter an int: ");
scanf("%d", &(u.i));
print(u);
printf("Please enter a long: ");
scanf("%ld", &(u.l));
print(u);
return 0;
Answer:
The updated program in C is as follows:
#include <stdio.h>
union myUnion{ char c; short s; int i; long l; };
int main(){
union myUnion inputs;
printf("Character: "); scanf("%c", &inputs.c);
printf("Output: %c", inputs.c);
printf("\nShort: "); scanf("%hd", &inputs.s);
printf("Short: %hd", inputs.s);
printf("\nInteger: "); scanf("%d", &inputs.i);
printf("Output: %d", inputs.i);
printf("\nLong: "); scanf("%ld", &inputs.l);
printf("Long: %ld", inputs.l);
return 0;
}
The pseudocode is as follows:
Function union myUnion {
character; short; int; long
}
main() {
myUnion inputs;
Input inputs.c; Print inputs.c
Input inputs.s; Print inputs.s
Input inputs.i; Print inputs.i;
Input inputs.l; Print inputs.l
}
Explanation:
This defines the union function
union myUnion{ char c; short s; int i; long l; };
The main begins here
int main(){
This calls the union function to main
union myUnion inputs;
This prompts and gets input for character variable
printf("Character: "); scanf("%c", &inputs.c);
This prints the character input
printf("Output: %c", inputs.c);
This prompts and gets input for short variable
printf("\nShort: "); scanf("%hd", &inputs.s);
This prints the short input
printf("Short: %hd", inputs.s);
This prompts and gets input for integer variable
printf("\nInteger: "); scanf("%d", &inputs.i);
This prints the integer input
printf("Output: %d", inputs.i);
This prompts and gets input for long variable
printf("\nLong: "); scanf("%ld", &inputs.l);
This prints the long input
printf("Long: %ld", inputs.l);
return 0;
}
How can a DevOps team take advantage of Artificial Intelligence (AI)?
Answer:
By using AI to collate data from multiple sources and assess existing automation to improve efficiency.
Artificial Intelligence is indeed a technique that allows machines to imitate the conduct of people. Machine Learning, even so, is an AI subset.
AI/ML could indeed help the creativity and innovation of DevOps team members by eradicating inefficient information. By their operations and maintenance life cycle and allowing the staff to collaborate on the quantity, speed, and variability of data. It could lead to automated improvements as well as improved productivity for the DevOps team.Therefore, By using AI, data from various sources is gathered and established automation is assessed to make it more efficient.
Learn more:
brainly.com/question/10054757
So, I need to use an external mic for my phone, but the problem is that I need a "dual mic adapter". My dad gave me an "audio splitter" instead. Can I use the audio splitter instead in order to connect the external mic to my phone???
But you can't use this device alone to connect two microphones to your USB C port and expect it to have usable volume. So the description is somewhat misleading ...
Kamal plans to offer new, more favorable contracts to business customers who are now receiving a discount and use wireless services. Determine whether each customer should receive a new contract as follows:
a. In cell 15, enter a formula using the AND function that tests whether the Wireless value is equal to "Y" and whether the Discount value is equal to "Y".
b. Fill the range 16:118 with the formula in cell 15.
Solution :
'AND" operation is a logical operation and is used in logical connective combining two statements and in truth tables.
Using AND operation verifies whether the outcome P and Q is true only when both the P as well as Q are true. If one of the P or Q is not true, then outcome result will be false.
In the context, Kamal wishes to offer a new and more favorable contracts to the business customers who use a wireless services and receive a discount.
Therefore, using the AND operation of the customers as :
Customer Wireless Discount Outcome
A N N FALSE
B Y N FALSE
C N Y FALSE
D Y Y TRUE
hi, please help me, solution.
Answer:
error: incompatible types
Explanation:
Given
The attached code
Required
The output
Variable "a" is declared as float
While p is declared as a pointer to an integer variable
An error of incompatible types will be returned on line 3, int *p = a;
Because the variables are not the same.
To assign a to p*, we have to use type casting.
Hence, (b) is correct
A light rag is striking the surface of earth. Which factor would make the light ray more likely to be absorbed than reflected?
Answer:
The answer is D.
Explanation:
because the other answers doesn't make sense.
a computer cannot store the data and information for your future use true or false
Chassis intrusion detection is an option that can be enabled/disabled in the BIOS setup utility (if a BIOS comes equipped with this feature).Coupled with a hardware sensor mounted insided the computer case, this functionality can be used to check if the case was opened and display a notification alert during next boot.
a. True
b. False
Answer: True
Explanation:
Chassis intrusion detection is simply a vital security feature which is used typically by large corporate networks. It's simply an intrusion detection method which can be used in alerting a system administrator when there's a situation whereby a person opens a computer case which can then be investigated in order to know if the computer hardware has been tampered with.
It should also be noted that the chassis intrusion detection can then be either enabled or disabled in the BIOS setup utility if a BIOS comes equipped with this feature.
The correct option is True.