A drink costs 4 dollars. a pizza costs 8 dollars. given the number of each, compute total cost and assign to totalcost. ex: 2 drinks and 3 pizzas yields totalcost of 32.

let drinkquantity = 2; // code tested with values: 2 and 4
let pizzaquantity = 3; // code tested with values: 3 and 7

let totalcost = 0;

this is javascript not math!!!!!! do not give me some form of math answer

Answers

Answer 1

The drink cost, pizza cost, drink quantity, and pizza quantity, you can compute the total cost and assign it to the variable totalcost.

Here's the JavaScript code:
javascript
let drinkCost = 4;
let pizzaCost = 8;
let drinkQuantity = 2;
let pizzaQuantity = 3;
let totalCost = 0;

totalCost = (drinkCost * drinkQuantity) + (pizzaCost * pizzaQuantity);

console.log("Total cost:", totalCost);

In this example, 2 drinks and 3 pizzas yield a total cost of 32 dollars.

Learn more about JavaScript visit:

https://brainly.com/question/30713776

#SPJ11


Related Questions

What is the correct HTML element to define emphasized text?A) B) C) D)

Answers

The correct HTML element to define emphasized text is <em>.

The <em> element is used to indicate emphasis on text, typically displayed as italicized text. This can be used to highlight a word or phrase that is important in the context of the surrounding text.For example, the following code could be used to display a sentence with an emphasized word:

<p>The <em>quick</em> brown fox jumps over the lazy dog.</p>

In this example, the word "quick" is emphasized using the <em> element and is displayed in italics. The rest of the sentence is displayed in the default font style.It is important to note that the <em> element should not be used solely for visual styling purposes, such as making text italic. It should only be used to indicate semantic emphasis on text within the content.

To learn more about  HTML element  click on the link below:

brainly.com/question/4571566

#SPJ11

1 identify two real world examples of problems whose solutions do scale well

Answers

A real world examples of problems whose solutions do scale well are

To determine which data set's lowest or largest piece is present: When trying to identify the individual with the largest attribute from a table, this is employed. Salary and age are two examples.

Resolving straightforward math problems :  The amount of operations and variables present in the equation, which relates to everyday circumstances like adding, determining the mean, and counting, determine how readily a simple arithmetic problem can be scaled.

What are some real-world examples of issue solving?

To determine which data set's lowest or largest piece is present, it can be used to determine the test taker with the highest score; however, this is scalable because it can be carried out by both humans and robots in the same way, depending on the magnitude of the challenge.

Therefore, Meal preparation can be a daily source of stress, whether you're preparing for a solo meal, a meal with the family, or a gathering of friends and coworkers. Using problem-solving techniques can help put the dinner conundrum into perspective, get the food on the table, and maintain everyone's happiness.

Learn more about scaling  from

https://brainly.com/question/18577977
#SPJ1

Authentication is concerned with determining _______.

Answers

Authentication can be described as the process of determining whether someone or something is, in fact, who or what it says it is. Authentication technology serves us to access control for systems by checking to see if a user's credentials match the credentials in a database of authorized users or in a data authentication server.

There are three basic kind of authentication. The first is knowledge-based — something like a password or PIN code that only the identified user would know. The second is property-based, meaning the user possesses an access card, key, key fob or authorized device unique to them. The third is biologically based.

You can learn more about authentication at https://brainly.com/question/28398310

#SPJ4

Which computer program offers a comprehensive collection of tools for creating digital art by using a variety of shapes, lines, and letters which can be easily measured and formatted?​

Answers

Answer:

LibreOffice Draw

Explanation:

Answer:

A

Explanation:

How is computer and internet helping in the current situation of lockdown?

Answers

It is helping by providing online schooling for children and helping people keep updated on the news

What is the quickest way to remove all filters that have been applied to a worksheet?

Answers

Answer:

Click the Filter button in the Sort & Filter group.

Explanation:

Quizlet

Go to the filter option, click sort/filter and unfilter.

If wearing protective gloves, there's no need to wash your hands after exposure to blood.

Answers

Answer:

No, still wash hands

Explanation:

Answer: wash hands

Explanation: if you don't then you could probably get hurt by the chemicals.

solve the expression 4*3/ (5+2) 7%4

Answers

Answer:

36/7

Explanation:

First, multiply 4 and 3 then add 5 and 2 the answer you will get is 12/7, and then calculate 7%4 answers you will get is 3 now multiply 12/7 and 3 your answer will be 36/7

What statements best describe total rows? Check all that apply.

Their values are not stored in a database.
Their values are stored on the top row in a database.
Their values update when changes are made in a table.
Their values update only when they are manually refreshed.
Their values are automatically totaled when a total row is added.

Answers

Answer:

A- Their values are not stored in a database

C- their values update when changes are made in a table.

Explanation:

Just took it.

The statements which best describe total rows are: option A and C.

What are total rows?

Total rows can be defined as a special row in a Microsoft Excel table that is designed and developed to provide end users with a selection of aggregate functions that are useful for performing various operations on the numerical data in a database.

In Microsoft Excel, the statements which best describe total rows include the following:

The numerical values of total rows are not stored in a database.The numerical values of total rows are automatically updated when changes are made in a table.

Read more on total rows here: https://brainly.com/question/9830945

#SPJ2

The following code is supposed to return the sum of the numbers between 1 and n inclusive, for positive n. An analysis of the code using our "Three Question" approach reveals that:

int sum(int n){

if (n == 1)

return 1;

else

return (n + sum(n - 1));

}

A) it fails the base-case question.

B) it fails the smaller-caller question.

C) it fails the general-case question.

D) it passes on all three questions and is a valid algorithm.

E) None of these is correct.

in java

Answers

The given code is a recursive function that computes the sum of integers from 1 to n inclusive, where n is a positive integer. The code checks the base case where n equals 1, and in this case, it returns 1.

Using the "Three Question" approach for recursive functions, we can evaluate whether the code satisfies the following questions:Does the function correctly solve the base case?Does the function make a smaller recursive call towards the base case?Does the function combine the result of the recursive call with the current value to obtain the final result?In this case, the code correctly solves the base case, which is when n equals 1. So, it passes the first question.

To learn more about integer click the link below:

brainly.com/question/16003649

#SPJ11

Design a Java Animal class (assuming in Animal.java file) and a sub class of Animal named Cat (assuming in Cat.java file). The Animal class has the following protected instance variables: boolean vegetarian, String eatings, int numOfLegs, java.util.Date birthDate and the following publi instance methods: constructor without parameters: initialize all of the instance variables to some default values constructor with parameters: initialize all of the instance variables to the arguments SetAnimal: assign arguments to the instance variables of vegetarian, eatings, numOfLegs Three "Get" methods which retrieve the respective values of the instance variables: vegetarian, eatings, numOfLegs toString: Returns the animal's vegetarian, eatings, numOfLegs Ind birthDate information as a string The Cat class has the following private instance variable: String color and the following public instance methods: constructor without parameters: initialize all of the instance variables to some default values. including its super class - Animal's instance variables constructor with parameters: initialize all of the instance variables to the arguments, including its super class Animal's instance variables SetColor: assign its instance variable to the argument GetColor: retrieve the color value overrided toString: Returns the cat's vegetarian, eatings, numOfLegs, birthDate and color information as a strine Please write your complete Animal class, Cat class and a driver class as required below a (32 pts) Write your complete Java code for the Animal class in Animal.java file b (30 pts) Write your complete Java code for the Cat class in Cat.java file c (30 pts) Write your test Java class and its main method which will create two Cat instances: e1 and e2, e1 is created with the default constructor, e2 is created with the explicit value constructor. Then update e1 to reset its vegetarian, eatings, numOfLegs and color. Output both cats' detailed information. The above test Java class should be written in a Jaty file named testAnimal.java. d (8 pts) Please explain in detail from secure coding perspective why Animal.java class's "set" method doesn't assign an argument of type java.util.Date to birthDate as well as why Animal.java class doesn't have a "get" method for birthDate.

Answers

a) Animal class.java fileThe solution to the given question is shown below:public class Animal {    protected boolean vegetarian;    protected String eatings;    protected int numOfLegs;    protected java.util.Date birthDate;    public Animal() {    }    public Animal(boolean vegetarian, String eatings, int numOfLegs, java.util.Date birthDate) {

      this.vegetarian = vegetarian;      

this.eatings = eatings;        

this.numOfLegs = numOfLegs;      

 this.birthDate = birthDate;    }  

 public void setAnimal(boolean vegetarian, String eatings, int numOfLegs) {        this.vegetarian = vegetarian;        this.

eatings = eatings;      

 this.numOfLegs = numOfLegs;    }    

public boolean isVegetarian() {        return vegetarian;    }    public void setVegetarian(boolean vegetarian) {        this.vegetarian = vegetarian;    }    

public String getEatings() {        return eatings;    }    public void setEatings(String eatings) {        this.eatings = eatings;    }    public int getNumOfLegs() {        return numOfLegs;    }    public void setNumOfLegs

(int numOfLegs) {        this.numOfLegs = numOfLegs;    }    public java.util.Date getBirthDate() {        return birthDate;    }    public void setBirthDate(java.util.Date birthDate) {        this.birthDate = birthDate;    }    public String toString() {        return

Animal.java class's set method doesn't assign an argument of type java.util.Date to birthDate because birthDate variable is declared with private access modifier which means it can only be accessed within the Animal class. Therefore, a "get" method for birthDate is not needed for accessing the variable as the variable is accessed using the class's toString method.The secure coding perspective is one that focuses on designing code that is secure and reliable. It is essential to ensure that the code is designed to prevent attackers from exploiting any vulnerabilities. This is done by implementing security measures such as encryption and data validation.

To know more about class visit:

https://brainly.com/question/13442783

#SPJ11

object-oriented modeling is based on the concepts of: group of answer choices objects and relationships. class and inheritance. objects and inheritance. tables and relationships. classes and objects.

Answers

Object-oriented modeling is a popular approach used in software development that revolves around the idea of modeling the real-world entities in the form of objects.

The foundation of object-oriented modeling is built upon two important concepts, which are objects and relationships. Objects are the fundamental building blocks of an object-oriented model that represent real-world entities and encapsulate their attributes and behaviors. Relationships, on the other hand, define how objects interact with each other and can be of different types such as composition, aggregation, and inheritance. In summary, object-oriented modeling is primarily based on the concepts of objects and relationships. It provides a powerful way to model complex systems and is widely used in software development. Additionally, class and inheritance are also important concepts in object-oriented modeling, which further enhance the flexibility and reusability of the code.

To learn more about Object-oriented modeling, visit:

https://brainly.com/question/32082458

#SPJ11

There is one clear definition of IT. True False

Answers

Answer:

That is False. it has more definitions not only one.

In casting the rhs, what happens if the casted output (rhs) is of a higher level than the assigned variable (lhs)?

Answers

In Java, when you assign a value of one data type to a variable of another data type, it is called a type cast. The process of casting can lead to two scenarios: widening or narrowing.

If you are casting a value to a higher level than the assigned variable, which is called widening, the value will be converted to a larger data type, and no loss of precision will occur. For example, when you cast an int to a long, the int value is promoted to a long value, which has a higher range.

Here's an example of widening:

int i = 10;

long l = i; // no explicit cast needed, implicit widening

In this case, the int value 10 is automatically widened to a long value, and no explicit cast is needed.

On the other hand, if you are casting a value to a lower level than the assigned variable, which is called narrowing, the value will be converted to a smaller data type, and there may be a loss of precision. For example, when you cast a double to an int, the decimal portion of the value will be truncated.

Here's an example of narrowing:

double d = 3.14;

int i = (int) d; // explicit cast needed, narrowing may occur

In this case, the double value 3.14 is explicitly cast to an int value, which may cause a loss of precision, as the decimal portion is truncated.

So, to summarize, if you are casting a value to a higher level than the assigned variable, no problem occurs. However, if you are casting a value to a lower level than the assigned variable, you may lose precision or even experience an overflow or underflow error if the value is outside the range of the assigned variable.

Learn more about java here:

https://brainly.com/question/30699846

#SPJ11

keyboards for mobile devices contain the same number of keys as desktop keyboards.
true or false

Answers

The statement "keyboards for mobile devices contain the same number of keys as desktop keyboards" is false. Keyboards for mobile devices typically do not have the same number of keys as desktop keyboards.

Mobile device keyboards are designed to be compact and space-efficient due to the limited size of mobile devices such as smartphones and tablets. As a result, they often have fewer keys compared to desktop keyboards.

Desktop keyboards usually have a standard layout with a full set of alphanumeric keys, function keys, number pad, arrow keys, and additional keys for specialized functions. On the other hand, mobile device keyboards often have a condensed layout with fewer keys. They may exclude certain keys, combine functions on a single key, or rely on touchscreen input methods like virtual keyboards.

While the exact number and arrangement of keys on mobile device keyboards can vary, they typically have a smaller number of keys compared to traditional desktop keyboards. This difference in key count allows for a more compact and portable design suitable for mobile devices.

Learn more about keyboards visit:

https://brainly.com/question/14313428

#SPJ11

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

identity theft

corporate espionage

software piracy

sale of trade secrets

Answers

Answer:Sale of trade secrets

Explanation:

Just took it

Answer:

sale of trade secrets

Explanation:

Just took it edgen 2020 is correct

A web developer overhears an executive’s username and password, and then uses it to download the company’s secret chocolate-chip cookie recipe. He makes the cookies at home and posts the recipe on his blog.

trade

/trād/

the action of buying and selling goods and services.

A web developer overhears an executives username and password, and then uses it to download the companys

range-based loops are not possible in which of the following languages?

Answers

In a CPU with a k-stage pipeline, each instruction is divided into k sequential stages, and multiple instructions can be in different stages of execution simultaneously. The minimum number of cycles needed to completely execute n instructions depends on the pipeline efficiency and potential hazards.

In an ideal scenario without any hazards or dependencies, each instruction can progress to the next stage in every cycle. Therefore, the minimum number of cycles required to execute n instructions is n/k.However, pipeline hazards such as data hazards, control hazards, and structural hazards can stall the pipeline and increase the number of cycles needed to complete the instructions. These hazards introduce dependencies and conflicts, forcing the processor to wait for certain conditions to be resolved.Therefore, in a real-world scenario with pipeline hazards, the minimum number of cycles required to execute n instructions on a k-stage pipeline would generally be greater than n/k, depending on the specific hazards encountered during execution.

To learn more about simultaneously  click on the link below:

brainly.com/question/29462802

#SPJ11

Which phrase is the best definition of sparklines in Excel 2016?

A. a type of graphic that users can insert into a worksheet
B. a type of mini chart that users can insert into a worksheet
C. a simple image that is displayed in Excel
B. a link to an outside source that is referenced in a worksheet

Answers

Answer:

The correct answer is:

B. a type of mini chart that users can insert into a worksheet

Explanation:

Microsoft excel is a spreadsheet software that is used for calculations and making payrolls.

Excel provides many visual features to display the data in graphical form. One of them is Spark lines.

Spark lines are used to show trends and variations in the collected data. Spark lines are just like mini charts.

So,

From the given options the best option is: B. a type of mini chart that users can insert into a worksheet

Hence,

The correct answer is:

B. a type of mini chart that users can insert into a worksheet

1. Read the following scenario. What type of business letter do you think is required in this situation? (1 point)
Melissa and Melrose are both first-year students at a local community college. They both have interest in volunteering with a nonprofit organization. They decided to reach out to nonprofit organizations to ask about the steps they need to take in order to volunteer.

Answers

Answer:

It requires a formal letter.

Answer:

This would require a formal business letter, the type being a cover letter or inquiry.

Explanation: yes

A digital computer has a memory unit with 26 bits per word. The instruction set consists of756 different operations. All instructions have an operation code part (opcode) and anaddress part (allowing for only one address). Each instruction is stored in one word ofmemory.

Answers

Answer:

hello your question is incomplete attached below is missing part of the  question

Determine how many bits are needed for the opcode

answer : 7 bits

Explanation:

Given data:

memory unit = 26 bits per word

Instruction set consists = 756 different operations

Determine how many bits are needed for the opcode

First we determine The number of bits required to represent 756 operations

= \(Log^{756} _{2}\) = 9.56 ≈  10 bits

finally the number of bits needed for the opcode can be determined by

\(2^9 = 512 ,\)   and \(2^{10} = 1024\)

since 2^10 > 756 hence the number of bits will be 10 bits

Which statement describe the advantages of using XML? more than one answer can be correct

A-it saves file space
B-it allows for data storage in a separate file
C-it is hardware dependent
D-it is software independent
E-it facilitates the transport of data

Answers

Answer:

The statements that describe the advantages of using XML are;

B-It allows for data storage in a separate file

D-It is software independent

E-It facilitates the transport of data

Explanation:

XML data can be stored in separate file such that the layout and display can designed in HTML whereby the data in the XML file can be changed without changing the HTML

XML is both software and hardware independent thereby it is possible to use the same XML to carry information to different computers and software

XML is used for data transport.

Complete this assignment in a Microsoft Word document, APA formatted and then submit it by midnight, Day 7 . Your assignment should be about 2-3 pages, double spaced. A computer company produces affordable, easy-to-use home computer systems and has fixed costs of $250. The marginal cost of producing computers is $700 for the first computer, $250 for the second, $300 for the third, $350 for the fourth, $400 for the fifth, $450 for the sixth, and $500 for the seventh. - Create a table that shows the company's output, total cost, marginal cost, average cost, variable cost, and average variable cost. - At what price is the zero-profit point? At what price is the shutdown point? - If the company sells the computers for $500, is it making a profit or a loss? How big is the profit or loss? Sketch a graph with AC, MC, and AVC curves to illustrate your answer and show the profit or loss. - If the firm sells the computers for $300, is it making a profit or a loss? How big is the profit or loss? Sketch a graph with AC, MC, and AVC curves to illustrate your answer and show the profit or loss.

Answers

The relationship between marginal cost and average cost is that the marginal cost represents the additional cost incurred for producing one more unit, while the average cost represents the cost per unit produced.

What is the relationship between marginal cost and average cost in the context of the computer company's production?

1. Table with Cost Analysis:

  Output | Total Cost | Marginal Cost | Average Cost | Variable Cost | Average Variable Cost

  -------------------------------------------------------------------------------------------

  1      | $950       | $700          | $950         | $700           | $700

  2      | $1,200     | $250          | $600         | $500           | $250

  3      | $1,500     | $300          | $500         | $800           | $266.67

  4      | $1,850     | $350          | $462.50      | $1,150         | $287.50

  5      | $2,250     | $400          | $450         | $1,600         | $320

  6      | $2,700     | $450          | $450         | $2,050         | $341.67

  7      | $3,200     | $500          | $457.14      | $2,550         | $364.29

2. Zero-Profit Point: The zero-profit point occurs when the price equals the average total cost (ATC). In this case, the zero-profit point is $457.14.

3. Shutdown Point: The shutdown point occurs when the price falls below the average variable cost (AVC), indicating that the company should temporarily cease production. In this case, the shutdown point is $320.

4. Selling Computers for $500: If the company sells the computers for $500, it is making a profit. To determine the profit, we need to calculate the difference between the total revenue and the total cost. Without knowing the quantity sold, we cannot provide an exact profit or loss amount.

5. Selling Computers for $300: If the company sells the computers for $300, it will incur a loss. To calculate the loss, we would need the quantity sold and subtract the total cost from the total revenue. Without these details, we cannot determine the exact profit or loss amount.

Learn more about marginal cost

brainly.com/question/14923834

#SPJ11

A company borrowed money from a local bank. The note the company signed requires five annual installment payments of $12,000 not due for four years. The interest rate on the note is 7%. What amount did the company borrow? Amount borrowed Students: The scratchpad area is for you to do any additional work you need to solve this question or can be used to she

Answers

The company borrowed an amount of $48,773.76 from the local bank. Each installment payment is $12,000, and the interest rate on the loan is 7%. The payments are not due for four years, and there are five installment payments in total.

To calculate the amount borrowed, we can use the present value formula for an ordinary annuity. The formula is:
PV = PMT × [(1 - (1 + r)^(-n)) / r]
Where PV is the present value (amount borrowed), PMT is the payment amount, r is the interest rate per period, and n is the number of periods.
Plugging in the given values, we have:
PV = $12,000 × [(1 - (1 + 0.07)^(-5)) / 0.07]
  = $12,000 × [(1 - 0.6139137) / 0.07]
  = $12,000 × (0.3860863 / 0.07)
  = $48,773.76
Therefore, the company borrowed an amount of $48,773.76 from the local bank. Each installment payment is $12,000, and the interest rate on the loan is 7%. The payments are not due for four years, and there are five installment payments in total.

learn more about Installment here

https://brainly.com/question/31292411



#SPJ11

Which tab would you click to find the document protection features?
C
File
Home
References
Insert
Read Question

Answers

Answer:

File

Explanation:

You can also go to the Review tab, in the Protect group, click Protect Document, and then click Restrict Formatting and Editing.

Larry has created a web page using HTML 4.01. He hasn’t included the declaration in the file. When he opens the page in a browser, Larry sees a page load error. Why does Larry need to use the declaration in an HTML file?
A.
to define the HTML version in which the page is written
B.
to define the web language in which the page is written
C.
to tell the browser what the content is
D.
to check whether the code is error-free

Answers

Answer:

To define the html version in which the page is written.

Larry has created a web page using HTML 4.01. He hasnt included the declaration in the file. When he

Write down the difference between Sub... end sub and function... end function statement.
any 3 points, please ​

Answers

A sub does something but doesn't give something back. A function provides a value representing the tasks completed. Subs come in many different types and can be recalled from anywhere in the program.

What is sub and end sub in VBA?

A Sub procedure is a collection of Visual Basic statements that are delimited by the Sub and End Sub statements and that carry out tasks without producing a result. A calling procedure may give constants, variables, or expressions as inputs to a sub process.

Various processes are used in Visual Basic, including: Sub Procedures carry out tasks but do not provide the calling code with a value in return. Sub procedures known as "event-handling procedures" run in response to an event triggered by a user action or by a program occurrence.

Thus, A sub does something but doesn't give something back.

For more information about sub and end sub in VBA, click here:

https://brainly.com/question/26960891

#SPJ1

The range of port 1024 to port 4999 is the usual range for ________ port numbers. Group of answer choices well-known ephemeral both A and B neither A nor B

Answers

The range of port 1024 to port 4999 is the usual range for EPHEMERAL port numbers. It is a communication endpoint.

What is an ephemeral port?

An ephemeral port can be defined as an endpoint for transporting a layered protocol of the IP suite.

The ephemeral port is always employed during a very short interval of time in a given session.

Some number examples of ephemeral ports include, among others, HTTPS = 443, HTTP = 80, and RPC = 13.

Learn more about ephemeral ports here:

https://brainly.com/question/2663754

In ten sentences, briefly describe Artificial Intelligence

Answers

artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. The term is frequently applied to the project of developing systems endowed with the intellectual processes characteristic of humans, such as the ability to reason, discover meaning, generalize, or learn from past experience. Since the development of the digital computer in the 1940s, it has been demonstrated that computers can be programmed to carry out very complex tasks—as, for example, discovering proofs for mathematical theorems or playing chess—with great proficiency. Still, despite continuing advances in computer processing speed and memory capacity, there are as yet no programs that can match human flexibility over wider domains or in tasks requiring much everyday knowledge. On the other hand, some programs have attained the performance levels of human experts and professionals in performing certain specific tasks, so that artificial intelligence in this limited sense is found in applications as diverse as medical diagnosis, computer search engines, and voice or handwriting recognition.

A local university keeps records of their students to track their progress at the institution. The name, student number, sponsorship number, physical address and phone, postal address, date of birth, gender, study mode (full time, part time, distance), faculty (Computing and Informatics, Engineering and Built Environment, Commerce and Human Sciences) and degree programme (Bachelor, Honours, masters, PhD) are recorded. The system used in the finance department requires the students’ physical address to clearly specify the erf number, location, street and city name. The students are uniquely identified by their student number and the sponsorship number. Each faculty is described by a name, faculty code, office phone, office location and phone. The faculty name and code have unique values for each faculty. Each course has a course name, description, course code, number of hours per semester, and level at which it is offered. Courses have unique course codes. A grade report has a student name, programme, letter grade and a grade (1,2,3,4). A faculty offers many courses to many students who are registered for a specific programme

Answers

The university keeps track of students, faculties, and courses through a well-organized system that records essential information. This system helps the institution monitor students' progress and manage academic programs efficiently.

The given scenario is about a local university that maintains records of its students, faculties, and courses. The university collects specific data about students, including their personal and academic information. Faculties are defined by their name, code, and other attributes, while courses are distinguished by their unique course codes. Finally, grade reports display the student's academic performance.

1. Student records include their name, student number, sponsorship number, contact information, date of birth, gender, study mode, faculty, and degree program.
2. The finance department requires a physical address that specifies the erf number, location, street, and city name.
3. Students are uniquely identified by their student number and sponsorship number.
4. Faculties have unique names and codes, along with their office phone, office location, and phone.
5. Courses are characterized by their course name, description, course code, number of hours per semester, and the level at which they are offered. They have unique course codes.
6. Grade reports contain the student's name, program, letter grade, and a numerical grade.
7. Faculties offer multiple courses to many students who are registered for a specific program.

To know more about attributes visit:

https://brainly.com/question/30169537

#SPJ11

Text,Audio and graphic is entered into the computer using
a)A cpu
b)Output
C)Input
ICT Question​ asap pls help

Answers

Answer:

I think it's input, not sure tho

Other Questions
Kaylie Is Writing A Program To Determine The Largest Number In A List Of Numbers. She Comes Up With The Following Algorithm. Step 1: Create A Variable Max And Initialize It To 0. Step 2: Iterate Through List Of Integer Values. Step 3: If An Element's Value Is Larger Than Max, Set Max To That Element's Value. For Which Of The Following Lists Will Kaylie'sKaylie is writing a program to determine the largest number in a list of numbers. She comes up with the following algorithm.Step 1: Create a variable max and initialize it to 0.Step 2: Iterate through list of integer values.Step 3: If an element's value is larger than max, set max to that element's value.For which of the following lists will Kaylie's algorithm work?A. [0,7,2,11]B. [3,2,1]C. [2,1,0,5]D. Both A and C. To determine if the information provided was sufficient to obtain informed consent, the element of _____ is required.a. Possible alternative payment plansb. Description of possible complicationsc. Costs associated with the procedured. Treatment, payment, operations Directions: Complete each proof using the properties of equality. Not all rows be used. insurance is the way a person or business is protected from :losing interestlosing moneylosing valuelosing investments A. For a sine function with amplitude A=0.75 and period T=10, what is y(4)?B.For a cosine function with amplitude A=0.75 and period T=10, what is y(4)? Create an expression with 6 terms which when simplified is an algebraic expression with 3 terms. simplify your expression to prove that you are correct. Although ________ satellites are the most expensive to build and launch, they also have the longest orbital life of many years. Can someone help with this question? a central, overriding point about leadership is that effective leaders _______________________________ asserts that our genes set the boundaries within which we can operate, and our environment interacts with the genes to determine where in that range we will fall. How did the Great Migration affect the population of the North? A series RLC circuit driven by a source with an amplitude of 120.0 V and a frequency of 50.0 Hz has an inductance of 792 mH, a resistance of 278 , and a capacitance of 44.3 F.(a) What are the maximum current and the phase angle between the current and the source emf in this circuit?Imax=A=Your response differs significantly from the correct answer. Rework your solution from the beginning and check each step carefully.(b) What are the maximum potential difference across the inductor and the phase angle between this potential difference and the current in the circuit?VL, max=V=(c) What are the maximum potential difference across the resistor and the phase angle between this potential difference and the current in this circuit?VR, max=V=(d) What are the maximum potential difference across the capacitor and the phase angle between this potential difference and the current in this circuit?VC, max=V= Trini Inc. bases its manufacturing overhead budget on budgeted direct labor-hours. The direct labor budget indicates that 8,800 direct labor-hours will be required in May. The variable overhead rate is $2.10 per direct labor-hour. The company's budgeted fixed manufacturing overhead is $107,440 per month, which includes depreciation of $9,610. All other fixed manufacturing overhead costs represent current cash flows. The May cash disbursements for manufacturing overhead on the manufacturing overhead budget should be: $116,310. $18,480. $97,830. $125,920. Certified individuals are usually required to obtain continuing education units (ceus) to retain certification in the credentialing organization. True or false which of the following is the study of tissues and groups of specialized cells and cell products that work together to perform specific functions? As the fruit develops, why do the petals, stamen, and sepals fall off? A. The fruit absorbs them, which gives the fruit its color. B. They have served their purpose and are no longer needed by the plant. C. The material in the petals, stamen, and sepals become the skin of the fruit. D. The flower has become dehydrated. What tuberculosis means " Question 1 Consider the function f(x) = 2 5x^2, -3 x 2. The absolute maximum value iand this occurs at x = The absolute minimum value is and this occurs at x = helpp on 3 and 4 you have to divide on the 3 one and it will give you a whole number. (will mark brainiest) even when raised separately, identical twins may develop similar phobias. this best illustrates the impact of ________ on anxiety disorders. group of answer choices