These are some instructions to recharge a mobile phone:
You need to have a phone charger.Connect your phone charger to your phone.Then connect it to the electricity.Wait for the mobile phone to charge fully.Disconnect your phone from the phone charger and the electricity.How do you give instructions?In this exercise, you have to give instructions to charge a mobile phone.
When you have to give instructions it is helpful to explain every action using a specific order so it is easier for the other person to understand the instructions.
Check more information about mobile phones here https://brainly.com/question/9447658
A browser is an example of a. :
general-purpose application
specialized
program
system application
utility program
y'+2y = 5-e^(-4x), y(0)=-11
Use Euler's Method with a step size of h = 0.1 to find approximate values of the solution as x= 0.1, 0.2, 0.3, 0.4, and 0.5. Compare them to the exact values of the solution at these points.
Answer:
see attached
Explanation:
A differential equation solver says the exact solution is ...
y = 5/2 -14e^(-2x) +1/2e^(-4x)
The y-values computed by Euler's method will be ...
y = ∆x·y' = 0.1(5 - e^(-4x) -2y)
The attached table performs these computations and compares the result. The "difference" is the approximate value minus the exact value. (When the step size is decreased by a factor of 10, the difference over the same interval is decreased by about that same factor.)
what command in cisco IOS allows the user to see the routing table
Answer:
show ip route [[ipAddress [mask]] [bgp | connected | mpls [ipAddress] [ipAddress/PrefLen] [ipAddress mask] [detail] | isis | ospf | static | summary | multicast |unicast]
Explanation:
the show ip route command will show the entire ip route table. If you put in no arguments it will display them all.
Rosa is building a website for a multimedia company. She wants to add a drop-down menu functionality to the website's main page. Which
markup language or technology will allow Rosa to add this element?
OA. HTML
OB. Semantic HTML
OC. DHTML
OD. XML
Answer:
The correct answer is C. DHTML.
Explanation:
I got it right on the Edmentum test.
Where can a client identify the instant deposit options for their QuickBooks Payments account?
Deposits tab
Account and Settings
Invoices tab
Create Invoice screen
Banking Center
Answer:
Banking centre
.
.
..
.
.
.
.
.
.
.
The cost of a postsecondary education increases with the length of time involved in the program.
True
False
False it stays the same hope this helps :)
What is Memory Card? Explain?
A memory card is basically a card that holds memory. The card can be removed at anytime and put into any other device. It is mainly used for extra storage and to transport videos, pictures, etc. to other devices
Hope this helps. : )
What are differences between manual formatting and formatting in word
processor?
Which type(s) of license(s) allow the underlying software code to be viewed?
a. Freeware
b. Free software
Answer:
The correct answer is B. Free software.
Explanation:
Free software is a term used for software that the holder can use, copy, read, modify and distribute with or without modification at will. Software that falls under this category includes software that is not protected by copyright laws or software that is licensed to be used in this way.
Motives for developing free software can be technical, economic or social. What is significant for developers is the desire to develop as producers of programs by learning from other producers. The desire to help others is also a major motive.
(20 points). Some matrixes have very special patterns, for example, in the following matrix, the numbers in the first row are equal to the number of their respective column; the numbers in the first column are equal to the square of the number of their respective row; when the row number equals to the column number, the elements are equal to 1; the rest elements are the sum of the element just above them and the one to their left. Write a user-defined function program in the program, you need to use while loops), and then use the function you write to create the following matrix (show the command you use). 1 4 9 16 2 1 10 26 3 4 1 27 4 5 8 13 9 22 1 23
Answer:
#include <iostream>
using namespace std;
void matrix(){
int row = 5, col = 6;
int myarr[row][col];
for (int i = 0; i < 5; i++){
for (int x = 0; x < 6; x++){
if (i == 0){
myarr[i][x] = (x+1)*(x+1);
}else if ( x == 0){
myarr[i][x] = (i+1)*(i+1)*(i+1);
} else if ( i == x){
myarr[i][x] = (i+1);
} else{
myarr[i][x] = myarr[i-1][x] + myarr[i][x-1];
}
}
}
for (int i = 0; i < 5; i++){
for (int x = 0; x < 6; x++){
cout<< myarr[i][x] << " ";
}
cout<< "\n";
}
}
int main(){
matrix();
}
Explanation:
The C++ source code defines a two-dimensional array that has a fixed row and column length. The array is a local variable of the function "matrix" and the void function is called in the main program to output the items of the array.
Add a clause for identifying the sibling relationship. The predicate on the left handside of the rule should be sibling(X, Y), such that sibling(alice, edward) should be true, and X, Y do not need to be different.
Answer:
following are the solution to this question:
Explanation:
For Siblings (X,Y);
Alice(X),
Edward(Y),
parent(Edward,Victoria,Albert) //Albert is the father F
parent(Alice,Victoria,Albert) //Victoria is the Mother M
Therefore,
X is siblings of Y when;
X is the mother M and father is F, and Y is the same mother and father as X does, and satisfing the given condition.
It can be written as the following prolog rule:
Siblings_of(X,Y):
parents(X,M,F)
parents(Y,M,F)
Siblings_of(X,Y): parents(X,M,F), parents(Y,M,F)
|? - sibling_of(alice,edward).
yes
|? - Sibling_of(alice,X).
X=Edward
|? - Sibling_of(alice,alice).
yes
Write a C++ program that tests whether the array has four consecutive numbers with the same values. bool isConsecutive(int values[], int size) In the main() program you should prompt the user to enter a series of integers and display if the series contains four consecutive numbers with the same value. Your program should first prompt the user for the number of integers in the list or number of values in the series. Assume the maximum array size is 20. No global variables may be used Use a function prototype for said function The function can not do any cin or cout The main() function will do all the cin and cout You may assume the list contains positive integers only Sample runs (bolded text is output) : Enter the number of values: 6 Enter a value: 3 Enter a value: 4 Enter a value: 5 Enter a value: 5 Enter a value: 5 Enter a value: 5 The list has consecutive four numbers! Enter the number of values: 9 Enter a value: 3 Enter a value: 4 Enter a value: 5 Enter a value: 50 Enter a value: 5 Enter a value: 6 Enter a value: 5 Enter a value: 5 Enter a value: 6 The list has no consecutive fours numbers!
Answer:
#include <iostream>
using namespace std;
bool isConsecutive(int values[], int size){
bool r = false;
int count=0;
for(int i=0;i<size;i++){
if(values[i]==values[i+1]){
count++;
if(count==3)
r=true;
}
else{
count=0;
}
}
return r;
}
int main() {
// Write C++ code here
int size;
cout<<"enter the number of integer in list"<<endl;
cin>>size;
int arr[size];
for(int i=0;i<size;i++){
cout<<"enter the value of number"<<endl;
cin>>arr[i];
}
bool result= isConsecutive(arr,size);
if(result){
cout<<"The list has consecutive fours numbers!"<<endl;
}
else{
cout<<"The list has no consecutive fours numbers!"<<endl;
}
return 0;
}
Explanation:
Above program is written in C++ language.
All bold-faced words and letters are C++ keywords.
After reading through the code, what will happen when you click run?
Answer:
B.) Laurel will try to collect treasure when there is not any and it causes an error
Explanation:
Laurel is at the top right corner of the map. When you click run, laurel moves 1 step ahead. This spot is right above the coordinate of the very first diamond. There is no treasure at this spot.
Therefore, when the next command calls for collecting, there will be an error, as there is no treasure at the spot right above the first diamond.
Suppose that we want to enhance the processor used for Web serving. The new processor is 10 times faster on computation in the Web serving application than the original processor. Assuming that the original processor is busy with computation 40% of the time and is waiting for I/O 60% of the time, what is the overall speedup gained by incorporating the enhancement
Answer:
The overall speedup gained by incorporating the enhancement is 1.563
Explanation:
Using Amdahl's Law;
The overall speedup [tex](N) =\dfrac{1}{(1-P) + ( \dfrac{P}{n})}[/tex]
where;
P = Fraction Enhanced for Old Processor
n = speedup enhancement as a result of the new processor
P = 40% = 0.40 and n = 10
∴
The overall speedup (N) is:
[tex]=\dfrac{1}{(1-0.4) + ( \dfrac{0.4}{10})}[/tex]
[tex]=\dfrac{1}{(0.6) + ( 0.04)}[/tex]
[tex]=\dfrac{1}{0.64}[/tex]
= 1.563
Thus, the overall speedup gained by incorporating the enhancement is 1.563
What will be result of below if statement.
if (Grade >= 90)
puts("A");
What’s the answer?
Explanation:
pls check it ur answer hp u understand this
write a technical term for following statements
1.The method applied to increase the life of computer and its assets.
2.The power regulating device this supplies constant power to the computer from its backup system.
3.The software used to scan, locate and detect the disk for viruses.
Answer:
1. Hardware Maintenance
2. Uninterrupted Power Supply (UPS)
3. Antivirus software
Explanation:
Antivirus software, or Anti-virus software (also known as AV software), otherwise called anti malware, is a PC program used to forestall, distinguish, and eliminate malware.
Antivirus software was initially evolved to identify and eliminate PC infections, thus the name. Be that as it may, with the expansion of different sorts of malware, antivirus software began to give security from other PC dangers. Specifically, current antivirus software can shield clients from: noxious program criminals.
A few items additionally incorporate security from other PC dangers, for example, tainted and noxious URLs, spam, trick and phishing assaults, online identity (privacy), web based financial assaults, social engineering techniques, advanced persistent threat (APT).
You have been asked to write a program that involves animals. Some animals are herbivores. Within this program, any animal that is not a herbivore is a carnivore. Which set of class definitions is most appropriate for this program
Incomplete question. The options:
class Animal :
class Herbivore(Animal):
class Carnivore(Herbivore) :
class Animal (Herbivore, Carnivore) :
class Herbivore :
class Carnivore
class Animal
class Herbivore (Animal) :
class Carnivore (Animal) :
class Animal:
class Carnivore (Animal) :
class Herbivore (Carnivore) :
Answer:
class Animal
class Herbivore (Animal) :
class Carnivore (Animal) :
Please!! I need help, this is due by tonight!!!
Answer:
sorry if it is too late but I think it is d
Explanation:
Use the drop-down menus to select the software term being described. The is what the user interacts with when operating a computer. The is the most important computer software. The is the software located within the hardware.
Answer:
1.) A. application software
2.) C. operating system
3.) B. basic input/output system
Answer:
All of his are correct :)
Explanation:
what command in cisco IOS allows the user to see the routing table
Answer:
Show IP route command
Explanation:
________ reveals functional requirements regarding the exchange of data and services between systems.
a. Observations
b. User interface analysis
c. Document analysis
d. System interface analysis
Explain the concept of Informed Consent?
Requests to retrieve data written in a language such as SQL are called…
A. Data
B.queries
A hacker posing as a potential customer has connected to your network and has discovered that a server running Windows Server has a configuration that a misconfiguration on a Windows Server that exposes the PowerShell prompt. The hacker executes a script to log valuable information about the server. Which vulnerabilities did the hacker exploit
Answer:
Lack of ips
Insecure configuration
Explanation:
Lack of IPS
This is fully known as intrusion prevention softwares this works by enabling the firewall and protecting the computer system from unauthorised users and potential attackers and it prevents data from being stolen by identifying potential attacks. It monitors the network continuously, thereby looking for possible malicious threats and also capturing informations about these threats.
Insecure configuration
Obviously if you have power shell enabled then you would have a secure configuration. Attackers can easily access your system in the presence of this flaw.
what is output? x=-2 y=-3 print (x*y+2)
Answer:
=8
Aaaaaaaaaansjxjdjsaaaaaaa
Explanation:
-2*-3=6+2=8
Consider the following declaration: (1, 2) double currentBalance[91]; In this declaration, identify the following: a. The array name b. The array size Copyright 2018 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. WCN 02-200-203 8 Exercises | 593 c. The data type of each array component d. The range of values for the index of the array e. What are the indices of the first, middle, and the last elements
Answer:
Following are the solution to the given choices:
Explanation:
Given:
double currentBalance[91];//defining a double array
In point a:
The name of the array is= currentBalance.
In point b:
91 double values could be saved in the array. It requires 8bytes to hold a double that if the array size is 91*8 = 728
In point c:
Each element's data type is double.
In point d:
The array index range of values is between 0 and 90 (every array index starts from 0 and ends in N-1, here N=91).
In point e:
To access first element use currentBalance[0], for middle currentBalance[91/2] , for last currentBalance[90]
Which file extension indicates a text document? .ppt .tst .pdf .txt
Answer:
The answer is .txt
Explanation:
Answer:
.txt
Explanation:
odesseyware 2021
Calculate the heat energy required to raise the temperature of 5 kg of water from 20℃ to
40℃. Specific heat capacity of water is 4200 J kg-1 k-1
Given that,
Mass of water, m = 5 kg
The temperature increases from 20℃ to 40℃.
Specific heat capacity of water is 4200 J kg⁻¹ k⁻¹
To find,
Heat energy required to raise the temperature.
Solution,
The formula for the heat energy required to raise the temperature is given by :
[tex]Q=mc\Delta T\\\\=5\times 4200\times (40-20)\\\\=420000\ J\\\\=420\ kJ[/tex]
So, the heat energy required is 420 kJ.
Write a program that declares a two-dimensional array named myFancyArray of the type double. Initialize the array to the following values: 23 14.12 17 85.99 6.06 13 1100 0 36.36 90.09 3.145 5.4 1. Create a function that will return the sum of all elements in the array. Call this function from main and print out the result. 2. Create a function that will use a nested loop to display all the elements in the array to the screen. Call this function from main.
Answer:
This solution is provided in C++
#include <iostream>
using namespace std;
double sumFancyArray(double myarr[][6]){
double sum = 0.0;
for(int i = 0;i<2;i++) {
for(int j = 0;j<6;j++){
sum+=myarr[i][j];
}}
return sum;
}
void printFancyArray(double myarr[][6]){
for(int i = 0;i<2;i++) {
for(int j = 0;j<6;j++){
cout<<myarr[i][j]<<" ";
}
}
}
int main(){
double myFancyArray[2][6] = {23, 14.12, 17,85.99, 6.06, 13, 1100, 0, 36.36, 90.09, 3.145, 5.4};
cout<<sumFancyArray(myFancyArray)<<endl;
printFancyArray(myFancyArray);
return 0;
}
Explanation:
This function returns the sum of the array elements
double sumFancyArray(double myarr[][6]){
This initializes sum to 0
double sum = 0.0;
This iterates through the row of the array
for(int i = 0;i<2;i++) {
This iterates through the column
for(int j = 0;j<6;j++){
This adds each element
sum+=myarr[i][j];
}}
This returns the sum
return sum;
}
This method prints array elements
void printFancyArray(double myarr[][6]){
This iterates through the row of the array
for(int i = 0;i<2;i++) {
This iterates through the column
for(int j = 0;j<6;j++){
This prints each array element
cout<<myarr[i][j]<<" ";
}
}
}
The main starts here
int main(){
This declares and initializes the array
double myFancyArray[2][6] = {23, 14.12, 17,85.99, 6.06, 13, 1100, 0, 36.36, 90.09, 3.145, 5.4};
This calls the function that returns the sum
cout<<sumFancyArray(myFancyArray)<<endl;
This calls the function that prints the array elements
printFancyArray(myFancyArray);
return 0;
}
Write a java program to read an array of positive numbers. The program should find the difference between the alternate numbers in the array and find the index position of the smallest element with largest difference. If more than one pair has the same largest difference consider the first occurrence.
Answer:
int s;
int[] num= new int[s];
Scanner sc = new Scanner(System.in);
System.out.printIn("Enter array size");
size = sc.nextInt();
for (i = 0; i < s; i++){
num[i] = sc.nextInt();
}
int[] difference;
int count = 0;
for (i = 0; i < num.length(); i= i + 2){
if (num[i] > num[i+1]){
difference[count] = num[i] -num[i+1];
}else{
difference = num[i+1] - num[i];
}
}
int max = 0;
for (int i : difference) {
if ( i > max){
max = i;
}
}
int result = Arrays.stream(difference).boxed().collect(Collectors.toList().indexOf(max);
System.out.printIn(result);
Explanation:
The Java source code uses procedural method to execute a task. The program prompts for user inputs for the array size and the items in the array. Assuming the array has an even length, the adjacent items of the array are subtracted and stored in another array called difference. The index of the maximum value of the difference array is printed on screen.