Answer:
Use the average function for viewer ratings
Use the min function for the earliest airing year
Explanation:
The average function gives the minimum value in a set of data
The min function gives the lowest value in a set of data
Say our confusion matrix is as follows, calculate precision, recall, and accuracy. Interpret the results for the positive class. Show and explain work.
[25 4
3 25]
https://www.celonis.com/solutions/celonis-snap
Using this link
To do this alternative assignment in lieu of Case 2, Part 2, answer the 20 questions below. You
will see on the left side of the screen a menu for Process Analytics. Select no. 5, which is Order
to Cash and click on the USD version. This file is very similar to the one that is used for the BWF
transactions in Case 2, Part 2.
Once you are viewing the process analysis for Order to Cash, answer the following questions:
1. What is the number of overall cases?
2. What is the net order value?
Next, in the file, go to the bottom middle where you see Variants and hit the + and see what it
does to the right under the detail of variants. Keep hitting the + until you see where more than a
majority of the variants (deviations) are explained or where there is a big drop off from the last
variant to the next that explains the deviations.
3. What is the number of variants you selected?
4. What percentage of the deviations are explained at that number of variants, and why did you
pick that number of variants?
5. What are the specific variants you selected? Hint: As you expand the variants, you will see on
the flowchart/graph details on the variants.
6. For each variant, specify what is the percentage of cases and number of cases covered by that
variant? For example: If you selected two variants, you should show the information for each
variant separately. If two were your choice, then the two added together should add up to the
percentage you provided in question 4 and the number you provided in question 3.
7. For each variant, how does that change the duration? For example for the cases impacted by
variant 1, should show a duration in days, then a separate duration in days for cases impacted
by variant 2.
At the bottom of the screen, you see tabs such as Process, Overview, Automation, Rework, Benchmark,
Details, Conformance, Process AI, Social Graph, and Social PI. On the Overview tab, answer the
following questions:
8. In what month was the largest number of sales/highest dollar volume?
9. What was the number of sales items and the dollar volume?
10. Which distribution channel has the highest sales and what is the amount of sales?
11. Which distribution channel has the second highest sales and what is the amount of sales?
Next move to the Automation tab and answer the following questions:
12. What is the second highest month of sales order?
13. What is the automation rate for that month?
Nest move to the Details tab and answer the following questions:
14. What is the net order for Skin Care, V1, Plant W24?
15. What is the net order for Fruits, VV2, Plant WW10?
Next move to the Process AI tab and answer the following questions:
16. What is the number of the most Common Path’s KPI?
17. What is the average days of the most Common Path’s KPI?
18. What other information can you get off this tab?
Next move to the Social Graph and answer the following questions:
19. Whose name do you see appear on the graph first?
20. What are the number of cases routed to him at the Process Start?
1. The number of overall cases are 53,761 cases.
2. The net order value of USD 1,390,121,425.00.
3. The number of variants selected is 7.4.
4. Seven variants were selected because it provides enough information to explain the majority of the deviations.
5. Seven variants explain 87.3% of the total variance, including order, delivery, credit limit, material availability, order release, goods issue, and invoice verification.
10. January recorded the highest sales volume, with 256,384 items sold for USD 6,607,088.00. Wholesale emerged as the top distribution channel, followed by Retail.
12. December stood out as the second-highest sales month,
13. with an automation rate of 99.9%.
14. Notable orders include Skin Care, V1, Plant W24 (USD 45,000.00) and
15. Fruits, VV2, Plant WW10 (USD 43,935.00).
17. The most common path had a KPI of 4, averaging 1.8 days.
18. This data enables process analysis and improvement, including process discovery, conformance, and enhancement.
19. The Social Graph shows Bob as the first name,
20. receiving 11,106 cases at the Process Start.
1. The total number of cases is 53,761.2. The net order value is USD 1,390,121,425.00.3. The number of variants selected is 7.4. The percentage of the total variance explained at 7 is 87.3%. Seven variants were selected because it provides enough information to explain the majority of the deviations.
5. The seven specific variants that were selected are: Order, Delivery and Invoice, Check credit limit, Check material availability, Order release, Goods issue, and Invoice verification.6. Below is a table showing the percentage of cases and number of cases covered by each variant:VariantPercentage of casesNumber of casesOrder57.2%30,775Delivery and Invoice23.4%12,591Check credit limit5.1%2,757
Check material availability4.2%2,240Order release4.0%2,126Goods issue2.4%1,276Invoice verification1.7%9047. The duration of each variant is as follows:VariantDuration in daysOrder24Delivery and Invoice3Check credit limit2Check material availability1Order release2Goods issue4Invoice verification1
8. The largest number of sales/highest dollar volume was in January.9. The number of sales items was 256,384, and the dollar volume was USD 6,607,088.00.10. The distribution channel with the highest sales is Wholesale and the amount of sales is USD 3,819,864.00.
11. The distribution channel with the second-highest sales is Retail and the amount of sales is USD 2,167,992.00.12. The second-highest month of sales order is December.13. The automation rate for that month is 99.9%.14. The net order for Skin Care, V1, Plant W24 is USD 45,000.00.15.
The net order for Fruits, VV2, Plant WW10 is USD 43,935.00.16. The number of the most common path’s KPI is 4.17. The average days of the most common path’s KPI is 1.8 days.18. Additional information that can be obtained from this tab includes process discovery, process conformance, and process enhancement.
19. The first name that appears on the Social Graph is Bob.20. The number of cases routed to Bob at the Process Start is 11,106.
For more such questions deviations,Click on
https://brainly.com/question/24251046
#SPJ8
identify the benefit of modeling to communicate a solution.
Answer:
provides a graphical design or representation of solution with symbols.
Explanation:
Communication models help identify and understand the components and relationship of the communication process being studied. Models represent new ideas and thought on various aspects of communication which helps us to plan for effective communication system.
Answer: D
Explanation:
What is the "Driver's Compact Law"?
Answer:
Explanation:
The Driver License Compact is an interstate compact used by States of the United States to exchange information concerning license suspensions and traffic violations of non-residents and forward them to the state where they are licensed known as the home state.
What is the term given to large values of information collected from various sources?
A.
association
B.
classification
C.
neural networks
D.
big data
The term given to large values of information collected from various sources ; association.
What is the various?The various can refer to a range of different things, depending on context. It could refer to different types of people, cultures, items, or anything else that can be seen as different or distinct from each other. It could also refer to different ways of looking at or doing something. For example, various methods of problem solving, various approaches to studying, various strategies for communication, etc. Ultimately, the various refers to the different options that exist in a given situation.
To learn more about various
https://brainly.com/question/26986135
#SPJ1
Imagine you're an Event Expert at SeatGeek. How would you respond to this customer?
* Hi SeatGeek, I went to go see a concert last night with my family, and the lead singer made several inappropriate comments throughout the show. There was no warning on your website that this show would not be child friendly, and I was FORCED to leave the show early because of the lead singer's behavior. I demand a refund in full, or else you can expect to hear from my attorney.
Best, Blake
By Imagining myself as an Event Expert at SeatGeek.I would respond to the customer by following below.
Dear Ronikha,
Thank you for reaching out to SeatGeek regarding your recent concert experience. We apologize for any inconvenience caused and understand your concerns regarding the lead singer's inappropriate comments during the show.
We strive to provide accurate and comprehensive event information to our customers, and we regret any oversight in this case.
SeatGeek acts as a ticket marketplace, facilitating the purchase of tickets from various sellers. While we make every effort to provide accurate event details, including any warnings or disclaimers provided by the event organizers, it is ultimately the responsibility of the event organizers to communicate the nature and content of their shows.
We recommend reaching out directly to the event organizers or the venue where the concert took place to express your concerns and seek a resolution.
They would be in the best position to address your experience and provide any applicable remedies.
Should you require any assistance in contacting the event organizers or obtaining their contact information, please let us know, and we will be happy to assist you further.
We appreciate your understanding and value your feedback as it helps us improve our services.
Best regards,
Vicky
Event Expert, SeatGeek
For more such questions Event,click on
https://brainly.com/question/30562157
#SPJ8
main circuit board inside personal computers which holds the majority of computer components and provides connectors for peripherals
The main circuit board inside personal computers which holds the majority of computer components and provides connectors for peripherals is motherboard.
What is motherboard?A computer's main board is referred to as the "system board" or "motherboard," while smaller ones that plug into slots on the main board are referred to as "boards" or "cards." See also the terms motherboard, expansion card, and flexible circuit.
The motherboard is the primary wire harness of a computer. It's a thin plate that houses the CPU, memory, hard drive and optical drive connectors, expansion cards to control video and audio, and connections to your computer's ports (such as USB ports).
Thus, the answer is motherboard.
For more details regarding motherboard, visit:
https://brainly.com/question/28329392
#SPJ1
And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase
There were 5 staff members in the office before the increase.
To find the number of staff members in the office before the increase, we can work backward from the given information.
Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.
Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.
Moving on to the information about the year prior, it states that there was a 500% increase in staff.
To calculate this, we need to find the original number of employees and then determine what 500% of that number is.
Let's assume the original number of employees before the increase was x.
If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:
5 * x = 24
Dividing both sides of the equation by 5, we find:
x = 24 / 5 = 4.8
However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.
Thus, before the increase, there were 5 employees in the office.
For more questions on staff members
https://brainly.com/question/30298095
#SPJ8
Next, you begin to clean your data. When you check out the column headings in your data frame you notice that the first column is named Company...Maker.if.known. (Note: The period after known is part of the variable name.) For the sake of clarity and consistency, you decide to rename this column Company (without a period at the end).
Assume the first part of your code chunk is:
flavors_df %>%
What code chunk do you add to change the column name?
Answer:
You can use the rename function to change the column name. Here is an example code chunk:
flavors_df %>%
rename(Company = Company...Maker.if.known.)
This will rename the Company...Maker.if.known. column to Company. Note that the old column name is surrounded by backticks () because it contains a period, which is a special character in R. The new column name, Company`, does not need to be surrounded by backticks because it does not contain any special characters.
Explanation:
Using an input of 10 bytes, print only odd bytes (bytes 1,3,5,7,9). Make sure you print your name on top of your output (hardcode your name in a label).
Example name is John
Sequence ACEGI
Yes, the following Python code carries out this. The b prefix before the input bytes in Python 3 denotes that they are a byte string.
What does the Python string prefix b mean?The b prefix denotes a literal bytes string. The expression creates a bytes object rather than a typical Unicode str object, if you see it used in Python 3 source code.
# Hardcoded name label
print("Output ")
# Input bytes
input_bytes = b'\x01\x02\x03\x04\x05\x06\x07\x08\x09\x0a'
# Select odd bytes and convert to hexadecimal string
output_str = ''.join(f'{b:02x}' for b in input_bytes[1::2])
# Print output string
print(output_str)
Output for :
020406080a
To know more about Python visit:-
https://brainly.com/question/30427047
#SPJ1
Plz help meeee
Erin would like to add a photo to a presentation. However, she only
has the printed copy of the photo. She does not have a digital copy.
What should Erin do?
Answer:
You didn't add any options, so I'll assume this is an open question.
Erin should scan the photo to a digital format using a digital scanner.
python code to perform a transfer app
this a answer, thanks
Which of the following products is most likely to have a long distribution channel?
a. Oil rig b. Jet engine c. Farm produce d. Office stationery
Office stationery is most likely to have a long distribution channel.
What exactly is a Long Distribution channel?The market’s major players provide office stationery and supplies through a variety of distribution channels, including product (paper products, desk supplies, stationery and mailing supplies, computer and printer supplies, and others) and distribution channel (offline and online).
Long distribution channels feature multi-layer distribution, with each tier containing many warehouses and distribution centers, such as producer warehouses, distribution centers, regional centers, local warehouses, and so on. As a result, lengthy distribution systems feature several loops and linkages between them.
The number of intermediaries in a given distribution channel between the producer and the customer is referred to as channel length. A distribution route can be either lengthy or short in length. Long channel- Many intermediates are involved. Short channel- A few intermediaries act in succession to supply items to the customer.
To learn more about Long Distribution refer:
https://brainly.com/question/15774206
#SPJ4
For the sake of maximizing hardware utilization in a multicore system with a many to many threading model, the relationship of the number of user threads U to the number of kernel threads K to the number of CPU cores P should be:
Answer:
"U > K > P" would be the appropriate answer.
Explanation:
When performing or executing the software, user threads (U) could easily be accomplished and therefore are typically wide in the amount to provide excellent or excellent performance. Multiple kernel threads could indeed be appointed to every other core as well as try to emulate the algorithm for scheduling.Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?
Answer: NAT
Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP? One-to-many NAT allows multiple devices on a private network to share a single public IP address.
The following that allows for hundreds of computers all to have their outbound traffic translated to a single IP is the One-to-many NAT. Option C
How does One-to-many NAT works
One-to-many NAT allows hundreds of computers to have their outbound traffic translated to a single IP this is done by designating each computer to a unique port number, that is used to identify the specific device within the the network address transition NAT, where all private network gain access to public network .
The NAT device serves as translator, keeping track of the original source IP and port number in the translation table, translates the source IP address and port number of each outgoing packet to the single public IP address, This allows for a possible multiple devices to share a single IP address for outbound connections.
Learn more about One-to-many NAT on brainly.com/question/30001728
#SPJ2
The complete question with the options
Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?
a. Rewriting
b. Port forwarding
c. One-to-many NAT
d. Preservation
in exchange, what type of file is inserted in the transaction log to mark the last point at which the database was written to disk in order to prevent loss of data?
In exchange, the type of file is inserted in the transaction log to mark the last point at which the database was written to disk in order to prevent loss of data is checkpoint.
Checkpoint files: what are they?The Checkpoint file is a VSAM KSDS and contains checkpoint data produced while a copy operation is being carried out. One record per Process with checkpointing enabled makes up the Checkpoint file's variable-length records. The typical record size is 256 bytes.
Therefore, An on-disk database file's on-disk checkpoint file keeps track of which logged transactions have been written there. When every database page that has been altered by transactions in the transaction logs has been successfully written to disk, the checkpoint has advanced.
Learn more about database from
https://brainly.com/question/518894
#SPJ1
You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job.If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area.
The answer is management. An information technology (IT) expert with a focus on the analysis, design, and implementation of information systems is known as a systems analyst.
An program that allows users to create, modify, collaborate on, publish, and save digital material is known as a content management system (CMS). Enterprise content management (ECM) and web content management are two common uses for CMSes (WCM). A person who builds models that enable artificial intelligence-based apps uses classic machine learning methods like natural language processing and neural networks.
Learn more about program here-
https://brainly.com/question/14618533
#SPJ4
how do I turn it on the orange button isn’t working :,)
Answer:
keep holding it
Explanation:
Case Project 1-2: Upgrading to Windows 10: Gigantic Life Insurance has 4,000 users spread over five locations in North America. They have called you as a consultant to discuss different options for deploying Windows 10 to the desktops in their organization.
Most of the existing desktop computers are a mix of Windows 7 Pro and Windows 8.1 Pro, but one office is running Windows 8 Enterprise. They have System Center Configuration Manager to control the deployment process automatically. They want to begin distributing applications by using App-V.
Can you identify any issues that need to be resolved before the project begins? Which edition of Windows 10 should they use? Which type of activation should they use?
The best approach for deploying Windows to the desktops at Gigantic Life Insurance will depend on several factors, including the number of desktops, existing hardware.
How much storage is recommended for Windows?While 256GB of storage space is appropriate for many people, gaming enthusiasts will need a lot more. Most experts recommend that you get a minimum of 512GB if you're going to load a few games, but you'll need 1TB of storage if you're planning to load several AAA games.
What are 3 types of installation methods for Windows 10?
The three most common installation methods of Windows are DVD Boot installation, Distribution share installation , image based installation
To know more about Windows visit:-
https://brainly.com/question/28847407
#SPJ1
a stop watch is used when an athlete runs why
Explanation:
A stopwatch is used when an athlete runs to measure the time it takes for them to complete a race or a specific distance. It allows for accurate timing and provides information on the athlete's performance. The stopwatch helps in evaluating the athlete's speed, progress, and overall improvement. It is a crucial tool for coaches, trainers, and athletes themselves to track their timing, set goals, and analyze their performance. Additionally, the recorded times can be compared to previous records or used for competitive purposes,such as determining winners in races or setting new records.
you can support by rating brainly it's very much appreciated ✅
a customer wants to increase his storage capacity by 25gb
The answer is "SSD-25GB", and its further calculation can be defined as follows:
The current generation of computer storage devices is a hard drive (SSD).It uses a flash memory that is substantially faster than a conventional mechanical disc.The user does not require Storage or GPU, Video Card cannot be used.RAM is a memory volatile that cannot be utilized as storage media.SSD is better than magnetic HDD in terms of speed and performance.SSD has become substantially quicker than USB 3.0.That's why the answer is "SSD-25GB".
Learn more:
brainly.com/question/14411313
create a powerpoint presentation on various e commerce websites. compare them and write which one is your favourite and why
The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.
Thus, By providing information via various website services, you can raise audience engagement and knowledge. Internet stores Ppt Images and Graphics.
You can deliver information in stages using this template. Using this PPT design, you may also show information on products, exclusive discounts, and strong online websites. This style is entirely changeable, so personalize it right away to satisfy the demands of your audience.
A lousy PowerPoint presentation can detract from the excellent content you're providing with team stakeholders because of poor color choices or unclear slides.
Thus, The e-commerce websites created for online shopping are shown on this slide, along with how customers may utilize them to compare prices and make purchases and PPT.
Learn more about PPT, refer to the link:
https://brainly.com/question/31676039
#SPJ1
What is social displacement? Question 22 options: the gained efficiency in being able to communicate through technology , the act of moving files from your computer to an external site , the risk of being "unfriended" by someone on social media , the reduced amount of time we spend communicating face to face
Answer: The Answer should be D
Explanation: It's the definition.
Errors can be syntax errors or logic errors (the code works, but not as intended).
Which of the following statements contains an error?
I. String firstInitial = firstName.subString(0,3);
II. String lastName = in.nextLine();
III. String name = firstInitial + ". " + lastName;
I only
II only
III only
I and II only
II and III only
Answer:
I. String firstInitial = firstName.subString(0,3);
Explanation:
I - The first initial should always be the first character and not a substring from 0 to 3. For example the substring 0 to 3 of Daniel would be "Dani" and not "D". So, it is a logic error.
I am assuming the name variable needs to be like "D. lastName" and not "Dani. lastName"
In an ancient land, the beautiful princess Eve (or handsome prince Val) had many suitors. Being royalty, it was decided that a special process must be used to determine which suitor would win the hand of the prince/princess. First, all of the suitors would be lined up one after the other and assigned numbers. The first suitor would be number 1, the second number 2, and so on up to the last suitor, number n. Starting at 4 the suitor in the first position, she/he would then count three suitors down the line (because of the three letters in his/her name) and that suitor would be eliminated and removed from the line. The prince/princess would then continue, counting three more suitors, and eliminate every third suitor. When the end of the line is reached, counting would continue from the beginning. For example, if there were 6 suitors, the elimination process would proceed as follows:_____.
12456 Suitor 3 eliminated; continue counting from 4.
1245 Suitor 6 eliminated; continue counting from 1.
125 Suitor 4 eliminated; continue counting from 5.
15 Suitor 2 eliminated; continue counting from 5.
1 Suitor 5 eliminated; 1 is the lucky winner.
Write a program that creates a circular linked list of nodes to determine which position you should stand in to marry the princess if there are n suitors. Your program should simulate the elimination process by deleting the node that corresponds to the suitor that is eliminated for each step in the process.
Explanation:
public class CircularLinkedListTest
{
private Node head;
private int size;
private class Node
{
private int num;
private Node next;
public Node(int n)
{
num = n;
next = null;
}
public int getNum()
{
return num;
}
public void setNext(Node n)
{
this.next = n;
}
public Node getNext()
{
return next;
}
}
public CircularLinkedListTest ()
{
head = null;
int numNodes = 0;
}
public void add(int num)
{
int numNodes = 0;
if(head == null)
{
head = new Node(num);
head.setNext(head);
numNodes++;
}
else
{
Node temp = head;
while(temp.getNext() != head)
temp = temp.getNext();
temp.setNext(new Node(num));
temp.getNext().setNext(head);
numNodes++;
}
}
public int size()
{
int numNodes = 0;
return numNodes;
}
public int get(int index)
{
Node t = head;
for(int i = 0; i < index; i++)
t= t.getNext();
return t.getNum();
}
public int remove(int index)
{
if(index < 0 || index >= size)
{
System.out.println("Error, index out of Qbounds.");
System.exit(0);
}
Node temp = head;
if(index == 0)
{
while(temp.getNext() != head)
temp = temp.getNext();
int value = head.getNum();
if(size > 1)
{
head = head.getNext();
temp.setNext(head);
}
else
head = null;
size--;
return value;
}
else
{
for(int i = 0; i < index - 1; i++)
temp = temp.getNext();
int answer = temp.getNext().getNum();
temp.setNext(temp.getNext().getNext());
size--;
return answer;
}
}
public static void main(String args[])
{
CircularLinkedListTest suitors = new CircularLinkedListTest ();
for(int i = 1; i <= 6; i++)
suitors.add(i);
int currentIndex = 0;
while(suitors.size() != 1)
{
for(int i = 1; i <= 2; i++)
{
currentIndex++;
if(currentIndex == suitors.size())
currentIndex = 0;
}
suitors.remove(currentIndex);
if(currentIndex == suitors.size())
currentIndex = 0;
for(int i = 0; i < suitors.size(); i++)
System.out.print(suitors.get(i) + " ");
System.out.println();
}
}
}
Which development approach was used in the article, "Protecting American Soldiers: The Development, Testing, and Fielding of the Enhanced Combat Helmet"? Predictive, adaptive or Hybrid
The sequential and predetermined plan known as the waterfall model is referred to as the predictive approach.
What is the development approachThe process entails collecting initial requirements, crafting a thorough strategy, and implementing it sequentially, with minimal flexibility for modifications after commencing development.
An approach that is adaptable, also referred to as agile or iterative, prioritizes flexibility and cooperation. This acknowledges that needs and preferences can evolve with time, and stresses the importance of being flexible and reactive to those alterations.
Learn more about development approach from
https://brainly.com/question/4326945
#SPJ1
The development approach that was used in the article "Protecting American Soldiers: The Development, Testing, and Fielding of the Enhanced Combat Helmet" is Hybrid approach. (Option C)
How is this so?The article "Protecting American Soldiers: The Development, Testing, and Fielding of the Enhanced Combat Helmet" utilizes a hybrid development approach,combining aspects of both predictive and adaptive methods.
Predictive development involves predefined planning and execution, suitable for stable projects,while adaptive methods allow for flexibility in adapting to changing requirements and environments.
Learn more about development approach at:
https://brainly.com/question/4326945
#SPJ1
Keplez Informatics is headquartered in Sydney, Australia, and has smaller branch offices spread across the world. The RODC in one of the branch offices gets stolen. Shannon is the system administrator at Keplez Informatics. What is the appropriate security measure that Shannon should take
The appropriate security measure that Shannon should take is
to delete the RODC computer name and reset all cached
account password.
What is RODC?This is referred to as read-only domain controller and is a server
that hosts an active directory database's read-only partitions.
It also responds to security authentication requests which is
why when stolen it must be deleted and all cached password
reset to prevent unauthorized access.
Read more about Domain controllers here https://brainly.com/question/25664001
Write a program whose input is two integers. Output the first integer and subsequent increments of 10 as long as the value is less than or equal to the second integer. Ex: If the input is: -15 30 the output is: -15 -5 5 15 25
Answer:
Explanation:
The following program is written in Python. It asks the user for two number inputs. Then it creates a loop that prints the first number and continues incrementing it by 10 until it is no longer less than the second number that was passed as an input by the user.
number1 = int(input("Enter number 1: "))
number2 = int(input("Enter number 2: "))
while number1 < number2:
print(number1)
number1 += 10
I need a C++ program to ask the user to put in different numbers until zero is pressed then the program counts the numbers that are put in and finds the sum of the numbers and the negative numbers.
Answer:
#include <iostream>
using namespace std;
int main()
{
int input = 0;
int count = 0;
int sum = 0;
int sumNegative = 0;
while (true) {
cout << "Enter a number: ";
cin >> input;
if (input == 0) break;
count++;
sum += input;
if (input < 0) {
sumNegative += input;
}
}
cout << "Count of the numbers: " << count << endl;
cout << "Sum of all the numbers: " << sum << endl;
cout << "Sum of the negative numbers: " << sumNegative << endl;
}
Explanation:
Your requirements regarding the sum and the negative numbers was a bit vague so I just did something you can probably adjust easily to your liking.
Students are often asked to write term papers containing a certain number of words. Counting words in a long paper is a tedious task, but the computer can help. Write a program WordCount.java that counts the number of words, lines, and total characters (not including whitespace) in a paper, assuming that consecutive words are separated either by spaces or end-of-line characters.
Answer:
Explanation:
The following code is written in Java. It is a function that takes the file name as a parameter. It then reads the file and counts the lines, words, and characters (excluding whitespace), saves these values in variables and then prints all of the variables to the console in an organized manner.
import java.io.File;
import java.io.FileNotFoundException;
import java.util.ArrayList;
import java.util.Scanner;
public static void countText(String fileName) throws FileNotFoundException {
int lines = 0;
int words = 0;
int characters = 0;
File myObj = new File(fileName);
Scanner myReader = new Scanner(myObj);
while (myReader.hasNextLine()) {
String data = myReader.nextLine();
lines += 1;
for (int x = 0; x < data.length(); x++) {
if (data.charAt(x) != ' ') {
characters += 1;
} else {
words += 1;
}
}
System.out.println(data);
}
System.out.println("File Contains:");
System.out.println(lines + " Lines");
System.out.println(words + " Words");
System.out.println(characters + " Characters");
myReader.close();
}
Following are Java Programs to count words, characters, and lines from the file.
Program to Count words into the file:import java.io.*;//import package
import java.util.*;//import package
public class WordCount//defining the class WordCount
{
public static void main(String[] a) throws IOException //defining main method that uses the throws keyword for catch Exception
{
int wordCount=0,totalChar=0,lineCount = 0;//defining integer vaiable
String sCurrentLine;//defining String vaiable
File f = new File("words.txt");//creating the file class object
if(f.exists())//defining if block that checks file
{
Scanner sa = new Scanner(f);//creating Scanner class object that takes file as input
while (sa.hasNextLine())//defining loop that checks elements in file
{
sCurrentLine = sa.nextLine();//using String vaiable that holds input value
lineCount++;//incrementing the lineCount value
String words[] = sCurrentLine.split("\\s+");//defining String vaiable as array that holds split value of sCurrentLine vaiable
wordCount = wordCount + words.length;//ussing wordCount vaiable to hold length value
for(int i=0; i<words.length; i++)//defining loop that counts total length and store its value in totalChar
{
totalChar = totalChar + words[i].length();//holding length in totalChar vaiable
}
}
System.out.println("Total lines = "+lineCount);//printing the line values
System.out.println("Total words = "+wordCount);//printing the words values
System.out.println("Total chars = "+totalChar);//printing the Character values
}
}
}
Output:
Please find the attached file.
Program:
import packageDefining the class "WordCount."Inside the class defining the main method, we use the throws keyword to catch exceptions.Inside the method, three integer variables ("wordCount," "totalChar," and "lineCount"), and one string variable ("sCurrentLine") is declared.In the next line, File class and Scanner, a class object is created, which uses an if block that checks the file value and uses a Scanner class object that takes a file as input.In the next line, a while loop is declared that that counts and holds file value in line, character, and word form and uses another for loop that prints its values.Find out more about the file handling here:
brainly.com/question/6845355