Answer:
Check the explanation
Explanation:
1.
void func(void){
int a,b,c; /*definition 1*/
/////* a,b,c for definition 1 are visible */
//// d, e are not visible
while(...){
int b, c, d; /* definition 2*/
////*
a from definition 1 is visible
b, c, d from definition 2 are visible
*/ ///
while(...){
int c, d, e;/* definition 3*/
////*
a from definition 1 is visible
b from definition 2 is visible
c, d, e from definition 3 are visible
*/ ///
}
////*
a from definition 1 is visible
b, c, d from definition 2 are visible
e not visible
*////
}
/////* a,b,c for definition 1 are visible */
///// d, e are not visible
}
java
Type two statements using nextInt() to print two random integers between 0 and 9. End with a newline. Ex:
5
7
Note: For this activity, using one statement may yield different output (due to the compiler calling nextInt() in a different order). Use two statements for this activity.
import java.util.Scanner;
import java.util.Random;
public class DiceRoll {
public static void main (String [] args) {
Random randGen = new Random();
int seedVal = 0;
randGen.setSeed(seedVal);
/* Your solution goes here */
return;
}
}
Answer:
Here are the two statements which use nextInt() to print two random integers between 0 and 9:
System.out.println(randGen.nextInt(10));
System.out.println(randGen.nextInt(10));
Explanation:
Here is the complete program:
import java.util.Scanner; //to accept input from user
import java.util.Random; // use to generate random numbers
public class DiceRoll { //class definition
public static void main (String [] args) {//start of main function
Random randGen = new Random(); // creates a Random class object randGen
int seedVal = 0; //sets starting point for generating random numbers
randGen.setSeed(seedVal); //sets the seed of random number generator
System.out.println(randGen.nextInt(10)); //generates and prints the first random integer between 0 and 9 (10 is the range from 0 to 9) using nextInt method, which is used to get next random integer value from the sequence of random number generator
System.out.println(randGen.nextInt(10)); //generates and prints the second random integer between 0 and 9 (10 is the range from 0 to 9) using nextInt method
return; } }
Another way to write this is to initialize two int variables:
int integer1;
int integer2;
Now use two print statements to print these random integers between 0 and 9 as:
System.out.println(integer1= randGen.nextInt(10));
System.out.println(integer1= randGen.nextInt(10));
Another way to write this is:
Set the value of integer1 to a random number from 0 to 9 and same for integer2
int integer1 = randGen.nextInt(10);
int integer2 = randGen.nextInt(10);
Now use two print statements to print these random integers between 0 and 9 as:
System.out.println(integer1);
System.out.println(integer2);
What tool does a programmer use to produce Python source code?
Answer:
Cog is a simple code generation tool written in Python. We use it or its results every day in the production of Kubi. Kubi is a collaboration system embodied in a handful of different products.
What allows an individual to avoid capital outlay?
paying cloud by the month
paying cloud by the year
paying cloud by the hour
paying cloud by the day
The daily payment for cloud services would be most reasonable. Hence option A is correct.
Capital Outlay refers to the expenditure or payment for the acquisition cost of capital assets.
In this case, the assets whose cost of purchase is being avoided by expenditure on cloud services is IT Server Hardware and Software which can be outsourced to companies that provide Cloud as a Service.
Cloud Services is the provision of Cloud computing services on a pay-per-use basis.
One of the advantages of this service is that it mostly consists of self-service on-demand. Hence, no need for the physical asset which usually is very costly.
Learn more about Capital Outlay in the link below:
https://brainly.com/question/832717
In Python what is the input() feature best described as?
Answer:
Explanation:
In python, the input features are best described as a built-in features. It can come from a database, mouse clicks, keyboard or an internet. It is accessible to the end users.
There are multiple built-in functions in the python that are always available for use. Print function in the python is built in function example.
what are two features accessible Through the Windows 10 operating system
Answer:
New Start Menu. Microsoft has brought back the Start Menu. ...
Cortana Integration. ...
Microsoft Edge Web Browser. ...
Virtual Desktops. ...
Universal Apps.
Explanation:
The most recent version of Windows is called Windows 10. One of Microsoft's most widely used operating systems is this one.
What is operating system?The most crucial piece of software that runs on a computer is the operating system.
It controls the memory, operations, software, and hardware of the computer. You can converse with the computer using this method even if you don't understand its language.
Windows 10 is the most recent iteration of the operating system. This is one of Microsoft's most popular operating systems.
The Windows Store is included with Windows 10. There are millions of applications in that. Additionally, Windows 10 has a brand-new notification panel and a fresh user interface.
Thus, these are the features accessible through the Windows 10 operating system.
For more details regarding operating system, visit:
https://brainly.com/question/6689423
#SPJ1
Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.
Explanation:
Predictive, prescriptive, and descriptive analytics are three key approaches to data analysis that help organizations make data-driven decisions. Each serves a different purpose in transforming raw data into actionable insights.
1. Descriptive Analytics:
Descriptive analytics aims to summarize and interpret historical data to understand past events, trends, or behaviors. It involves the use of basic data aggregation and mining techniques like mean, median, mode, frequency distribution, and data visualization tools such as pie charts, bar graphs, and heatmaps. The primary goal is to condense large datasets into comprehensible information.
Example: A retail company analyzing its sales data from the previous year to identify seasonal trends, top-selling products, and customer preferences. This analysis helps them understand the past performance of the business and guide future planning.
2. Predictive Analytics:
Predictive analytics focuses on using historical data to forecast future events, trends, or outcomes. It leverages machine learning algorithms, statistical modeling, and data mining techniques to identify patterns and correlations that might not be evident to humans. The objective is to estimate the probability of future occurrences based on past data.
Example: A bank using predictive analytics to assess the creditworthiness of customers applying for loans. It evaluates the applicants' past financial data, such as credit history, income, and debt-to-income ratio, to predict the likelihood of loan repayment or default.
3. Prescriptive Analytics:
Prescriptive analytics goes a step further by suggesting optimal actions or decisions to address the potential future events identified by predictive analytics. It integrates optimization techniques, simulation models, and decision theory to help organizations make better decisions in complex situations.
Example: A logistics company using prescriptive analytics to optimize route planning for its delivery truck fleet. Based on factors such as traffic patterns, weather conditions, and delivery deadlines, the algorithm recommends the best routes to minimize fuel consumption, time, and cost.
In summary, descriptive analytics helps organizations understand past events, predictive analytics forecasts the likelihood of future events, and prescriptive analytics suggests optimal actions to take based on these predictions. While descriptive analytics forms the foundation for understanding data, predictive and prescriptive analytics enable organizations to make proactive, data-driven decisions to optimize their operations and reach their goals.
A company is developing an on-premises app that authenticates with Azure Active Directory (Azure AD). The app will be deployed on computers that do not have a web browser. You need to allow users to authenticate on the app using a web browser on a different computer. Which solution should you use?
Answer:
Explanation:
The best solution for this scenario is to use the Azure Active Directory Authentication Library (ADAL). ADAL is an authentication library that allows applications to authenticate with Azure AD using a web browser on a different computer. ADAL is designed to work with applications that are deployed on-premises, and it supports a variety of authentication methods, including OAuth 2.0, OpenID Connect, and Windows Live Connect. ADAL also provides support for multi-factor authentication, which can help to enhance the security of the authentication process.
The solution that should be used here is in order to increase the security of the login process, ADAL additionally supports multifactor authentication.
What is Azure Active Directory (Azure AD)?The Azure Active Directory Authentication Library is the best option in this situation (ADAL). Using a web browser on a remote machine, programs can log in with Azure AD thanks to the authentication library called ADAL.
OAuth 2.0, OpenID Connect, and Windows Live Connect are just a few of the different types of authentication that are supported by ADAL, which is built to operate with applications that are deployed on-premises.
Therefore, the appropriate course of action in this situation is to employ ADAL's enhanced support for multifactor authentication to increase the security of the login process.
To learn more about (Azure AD), refer to the link:
https://brainly.com/question/30143542
#SPJ2
What are the reasons why organizations opt for a certificate
issued by third party commercial certification authorities to
secure their web server? [Choose two that applyl.
To secure browsing of social media sites.
To secure data transfer, transactions and logins to the
website.
To securely redirect a customer to a third party
a
website.
lling
To run a trusted web site that conduct business with
the general public.
The reasons that organizations opt for a certificate issued by third party commercial certification authorities to secure their web server are option B and D:
To secure data transfer, transactions and logins to the website.To run a trusted web site that conduct business with the general public.What Is a Certification Authority?A certificate authority is a third-party organization that operating systems and web browsers trust to generate and distribute digital certificates.
However, they must perform this task for businesses and websites that they have vetted, which is why CAs are crucial to modern digital security (and internet security). These certificates are essentially short data files with verified organization identification information.
What we now usually refer to as a certificate authority or a CA was originally known as a "certification authority." Therefore, you may occasionally encounter them referred to by these many names.
Therefore, When a product is third-party certified, it signifies that an independent body has examined the product's production process and has independently found that the final product complies with certain safety criteria.
Learn more about certification authorities from
https://brainly.com/question/17011621
#SPJ1
After you've completed a basic analysis and technical research into the
scope of feasibility of a project, you are able to project which of the
following?
O
how many people are likely to buy your product
the general timeline and development costs
how much profit you can expect from your product
how much people who buy your product will like it
How much profit you can expect from your product is what you are able to project. Hence option C is correct.
What is product?Product is defined as anything that can be supplied to a market to satiate a customer's need or desire is referred to as a product, system, or service that is made accessible for consumer use in response to consumer demand.
Profit is defined as the sum of revenue and income after all costs have been deducted by a business. Profitability, which is the owner's primary interest in the income-formation process of market production, is measured by profit.
Thus, how much profit you can expect from your product is what you are able to project. Hence option C is correct.
To learn more about product, refer to the link below:
https://brainly.com/question/22852400
#SPJ1
Dan is working on a printing project. Which important points must he consider while printing? document size texture printing stock color mode He must print in CMYK because that color mode retains all the colors. arrowRight He must keep the font size at 12 points to maintain proper readability. arrowRight He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. arrowRight He must avoid printing on colored stock to avoid distortion of the ink color.
Answer:
Down below
Explanation:
Color Mode - He must print in CMYK because that color mode retains all the colors.
Document Size - He must keep the font size at 12 points to maintain proper readability.
Texture - He must use paper that’s glossy on one side and uncoated on
the other to produce fine-quality prints.
Printing Stock - He must avoid printing on colored stock to avoid distortion of the ink color.
Colour Mode—He must print in CMYK because that colour mode retains all the colours. Document Size—He must keep the font size at 12 points to maintain proper readability. Texture—He must use paper that’s glossy on one side and uncoated on the other to produce fine-quality prints. Printing Stock—He must avoid printing on coloured stock to avoid distortion of the ink colour.
What is Texture?Felt-textured papers are frequently described as soft and having a woven or textile-like appearance.
In menus, stationery, and when searching for an artistic flourish to go with a design or image, the paper's surface can be employed to great effect when printing images.
Thus, the statement are matched above.
For more details about textured, click here:
https://brainly.com/question/14989874
#SPJ5
Which of the following is another name for Windows Security permissions that enforce the proper access controls for security groups? a. NTFS permissions b. SMB permissions c. Special permissions d. Explicit permissions
NTFS permission are the following is another name for Windows Security permissions that enforce the proper access controls for security groups.
What is Windows security permission?
Choose Properties from the context menu when you right-click the file. Select the Security tab. Click Edit next to any user names or groups. You can view and modify permissions for each listed user or group by choosing them in the following box.
Launch Settings by choosing Start > Privacy & security. Choose which applications can access a particular app permission (like location, for example). Apps that have full access to the system's resources won't be included on the Privacy page. The features that these apps can use cannot be restricted using the privacy settings.
all can read, write, and execute at 777 (full access). 755: Owner can read, write, and execute; group members and others can as well. 644 – Owner can read and write; group or others can only read. Several instances of directory permissions 777 – All can read, write, and search.
Read more about Windows security permission:
https://brainly.com/question/30245801
#SPJ4
Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?
Answer: NAT
Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP? One-to-many NAT allows multiple devices on a private network to share a single public IP address.
The following that allows for hundreds of computers all to have their outbound traffic translated to a single IP is the One-to-many NAT. Option C
How does One-to-many NAT works
One-to-many NAT allows hundreds of computers to have their outbound traffic translated to a single IP this is done by designating each computer to a unique port number, that is used to identify the specific device within the the network address transition NAT, where all private network gain access to public network .
The NAT device serves as translator, keeping track of the original source IP and port number in the translation table, translates the source IP address and port number of each outgoing packet to the single public IP address, This allows for a possible multiple devices to share a single IP address for outbound connections.
Learn more about One-to-many NAT on brainly.com/question/30001728
#SPJ2
The complete question with the options
Which of the following allows hundreds of computers all to have their outbound traffic translated to a single IP?
a. Rewriting
b. Port forwarding
c. One-to-many NAT
d. Preservation
some context free languages are undecidable
Write a short quiz program which asks three true/false questions and stores the user's answers as booleans. At the end the program it should print the user's answers with the correct answers.
Note: you should use the same quiz questions and correct answers as the sample run below.
Sample run:
Java is a programming language, true or false?
true
Only numbers can be stored by variables in Java, true or false?
true
There are only 2 possible values which can be held by a boolean variable, true or false?
false
Question 1 - Your answer: true. Correct answer: true
Question 2 - Your answer: true. Correct answer: false
Question 3 - Your answer: false. Correct
AP CS A Unit 1: Lesson 3 - Coding Activity 3
this answering question interface is bleh
The concept of boolean variables is that; variables declared as boolean type can only take any of two values. The variable can either be true or false. Such variable cannot take any other value apart from these two.
The short quiz program is as follows.
Please note that comments are used to explain difficult lines.
import java.util.*;
public class shortQuiz{
public static void main(String[] args) {
Scanner input = new Scanner(System.in);
//This declares the variables that represent correct answers as boolean data type; the variables are also initialized
boolean q1 = true, q2 = false, q3 = true;
//This declares the response to each question as boolean data type
boolean q1response, q2response, q3response;
//This prints the first question
System.out.print("Java is a programming language, true or false? ");
//This gets input for the first response
q1response = input.nextBoolean();
//This prints the second question
System.out.print("Only numbers can be stored by variables in Java, true or false? ");
//This gets input for the second response
q2response = input.nextBoolean();
//This prints the third question
System.out.print("There are only 2 possible values which can be held by a boolean variable, true or false? ");
//This gets input for the third response
q3response = input.nextBoolean();
//This prints your first response, alongside the correct answer to the first question
System.out.println("Question 1 - Your answer: "+q1response+". Correct answer: "+q1);
//This prints your second response, alongside the correct answer to the second question
System.out.println("Question 2 - Your answer: "+q2response+". Correct answer: "+q2);
//This prints your third response, alongside the correct answer to the third question
System.out.println("Question 3 - Your answer: "+q3response+". Correct answer: "+q3);
//The program ends here
}
}
See attached image for program sample run.
The above program initializes the correct answers using boolean variables. The correct answers are then printed, after the user answers the three questions.
Read more about boolean variables at:
https://brainly.com/question/16843003
pls pls pls pls pls pls pls pls plks
Answer:
Want to begin introduction?.......
The following diagram shows a close-up of the surface of a CD. Which of the following would allow for more data to be stored on a CD?
The overlapping pits making more room for data to be stored on a CD.
How is data stored on a CD?A CD is burned by merely laying a pattern of pits and lands across the polycarbonate layer. On the other hand, the burning process must be exceedingly precise because the data must be precisely encoded on such a small scale. The data on a CD is written (burned) using a CD burner. It includes a "Write Laser," a moving laser that looks a lot like a CD player. The Write Laser, which is more potent than the "Read Laser," can change the surface of the CD rather than just reflecting the laser light off of it. The Write Laser bounces a light beam over the surface of the CD during the burning process, creating a series of pits in accordance with the data (binary values).
Learn more about Compact disk here:
brainly.com/question/14555020
#SPJ1
What characteristics are common among operating systems
The characteristics are common among operating systems are User Interface,Memory Management,File System,Process Management,Device Management,Security and Networking.
Operating systems share several common characteristics regardless of their specific implementation or purpose. These characteristics are fundamental to their functionality and enable them to manage computer hardware and software effectively.
1. User Interface: Operating systems provide a user interface that allows users to interact with the computer system. This can be in the form of a command line interface (CLI) or a graphical user interface (GUI).
2. Memory Management: Operating systems handle memory allocation and deallocation to ensure efficient utilization of system resources. They manage virtual memory, cache, and provide memory protection to prevent unauthorized access.
3. File System: Operating systems organize and manage files and directories on storage devices. They provide methods for file creation, deletion, and manipulation, as well as file access control and security.
4. Process Management: Operating systems handle the execution and scheduling of processes or tasks. They allocate system resources, such as CPU time and memory, and ensure fair and efficient utilization among different processes.
5. Device Management: Operating systems control and manage peripheral devices such as printers, keyboards, and network interfaces. They provide device drivers and protocols for communication between the hardware and software.
6. Security: Operating systems implement security measures to protect the system and user data from unauthorized access, viruses, and other threats.
This includes user authentication, access control mechanisms, and encryption.
7. Networking: Operating systems facilitate network communication by providing networking protocols and services. They enable applications to connect and exchange data over local and wide-area networks.
These characteristics form the foundation of operating systems and enable them to provide a stable and efficient environment for users and applications to run on a computer system.
For more such questions characteristics,click on
https://brainly.com/question/30995425
#SPJ8
I'm doing a VHDL program in Vivado, using a zyboz7 20, which would have 2 teams, each of them with different buttons and led lights. The idea is to use one button to obtain when a team scores a goal, so it will be displayed in the 7 segment-display (for example, if the button is pressed once, the display will show a one, and so on). When any of the team gets to 3, the led light given to that team will turn on.
Right now, I just have one team in the program and the constraints. Also, I have trouble understanding the debouncing of the button, I don't know if I'm using the wrong algorithm to attack the debounce issue, but it's as if the clock was delayed or it's not taking some of the input, I have been looking to a lot of tutorials but I can't find a way in which the programs can work without any issue. I will show my code here and the constraint, I will also explain the code so it will be easier to modify it if anyone can help me with the debounce issue.
Program's code:
library IEEE;
use IEEE.STD_LOGIC_1164.ALL;
use IEEE.STD_LOGIC_UNSIGNED.ALL;
use IEEE.NUMERIC_STD.ALL;
entity sevenSementDis is
Port (
C : out STD_LOGIC;
won1: out STD_LOGIC;
team1, clk,reset: in STD_LOGIC;
SevenSD: out STD_LOGIC_VECTOR (6 downto 0));
end sevenSementDis;
architecture Behavioral of sevenSementDis is
type statetype is (Init,Gol,AnotherGol,victory);
signal state, nextstate: statetype;
signal clk_bit : INTEGER := 4;
signal clk_bit2 : INTEGER := 4;
signal count : STD_LOGIC_VECTOR (4 downto 0) := "00000";
signal clk_div : STD_LOGIC_VECTOR (4 downto 0) := "00000";
signal count_reset : STD_LOGIC_VECTOR (4 downto 0) := "00000";
signal clk_reset : STD_LOGIC_VECTOR (4 downto 0) := "00000";
begin
C<='0';
process (clk)
begin
if (clk='1' and team1='1') then
clk_div <= clk_div + '1';
end if;
end process;
process (clk_div)
begin
if (clk='1' and clk_div(clk_bit) = '1') then
count <= count + '1';
end if;
end process;
process(clk)
--variable Count : natural range 0 to 5 := 0;
begin
if rising_edge(clk) then
case(nextstate) is
when Init =>
SevenSD<="0111111";
won1<='0';
if count="00010" then
nextstate<=Gol;
else
nextstate<=Init;
end if;
when Gol =>
SevenSD<= "0000110";
if count="00011" then
nextstate<=AnotherGol;
else
nextstate<=Gol;
end if;
when AnotherGol =>
SevenSD<= "1001011";
if count="00100" then
nextstate<=victory;
else
nextstate<=AnotherGol;
end if;
when victory =>
SevenSD<= "1001111";
won1<= '1';
end case;
end if;
end process;
end Behavioral;
Explanation:
The ports: Won1 is the led light assigned to team 1. team1 is the button that I want to use when team 1 scores. The reset is also a button but I haven't been implemented. SevenSD is the 7-segment display. Clk is the clock and C is another led light that hasn't been implemented.
There are 4 states, Init(where the code starts), Gol (the team scores the first goal, which would also change the display), AnotherGol(team scores again and the display changes), and Victory (the display changes one last time and led light turns on). There are also state (which would take the actual state) and nextstate(which will tell the next state).
count is an integer that will be added when the button is 1 and the clk_div is also 1, it's the one that determines when to move to the next state. clk_bit is just the bits of the clock. clk_div is diving the clock to try to attack the debouncing issue. clk_bit2, count_reset,clk_reset are not implemented, they were created when trying to add the reset button, but when I erase them, the code just stops working at all.
the rest are some process to fight the debounce and the last one is the actual code, which goes around the different states until the victory state.
Answer:
como lo echo es echo si no tengo un pájaro es
Explanation:
un pájaro azul
A client has the right to receive ethically conducted research. Discuss this statement with examples.
A client has the right to receive ethically conducted research. This means that the researcher should adhere to the principles of scientific research, which includes honesty, objectivity, integrity, and respect for human subjects. In addition, the researcher should ensure that the research is conducted in a safe and responsible manner.
What is research?
Research is defined as "creative and methodical activity done to improve the body of knowledge." It entails the objective gathering, organising, and analysis of data in order to improve comprehension of a subject or issue. A research effort could build on prior contributions to the field. Research may duplicate portions of earlier projects or the project as a complete to verify the accuracy of instruments, processes, or experiments.
Documentation, discovery, interpretation, as well as the research and development (R&D) of methods & systems again for advancement of human knowledge are the main goals of basic research (as opposed to applied research). Research methodologies are based on epistemologies, which differ greatly within and between the humanities and sciences.
To learn more about research
https://brainly.com/question/25257437
#SPJ13
Which three statements about RSTP edge ports are true? (Choose three.) Group of answer choices If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status. Edge ports can have another switch connected to them as long as the link is operating in full duplex. Edge ports immediately transition to learning mode and then forwarding mode when enabled. Edge ports function similarly to UplinkFast ports. Edge ports should never connect to another switch.
Answer:
Edge ports should never connect to another switch. If an edge port receives a BPDU, it becomes a normal spanning-tree port. Edge ports never generate topology change notifications (TCNs) when the port transitions to a disabled or enabled status.Where should a photographer place lights for a headshot? Headshot lighting is more important with darker backgrounds. The light should be at a 45-degree angle from the subject. The light should be in front of the subject. The third light should be the subject to form a ring of light around the subject’s hair.
Answer:
Headshot lighting is more important with darker backgrounds. The
(key) light should be at a 45-degree angle from the subject. The
(fill) light should be in front of the subject. The third light should be
(behind) the subject to form a ring of light around the subject’s hair.
Explanation:
i searched it up individually and thats what i got
This code is giving no error but is not printing my "goal." Which is to print a year of highschool when a number is input. Instead the code is only printing "Not in High School" every time, every number. Can someone please explain to me what I did wrong?
grade_number = input("What year of high school are you in? ")
if grade_number == 9:
print("Freshman")
elif grade_number == 10:
print("Sophomore")
elif grade_number == 11:
print("Junior")
elif grade_number == 12:
print("Senior")
else:
print("Not in High School")
Answer:
You must convert your input to an integer before the if statements.
Explanation:
input() returns a string, which should be converted to your desired type, OR you should compare against string literals.
See below for working code.
In which of the following scenarios would it be best to use a for loop?
1. When you need to stop looping based on input from the user
2. When you need to check that a user's input is valid.
3. When you want to ask the user for 10 numbers
4. When you need to be able to use the block of code in many places in your program
Answer:
I would say 3 is the most likely answer ("When you want to ask the user for 10 numbers").
You use for loops to perform a task x times usually.
You’re a project manager of a small team looking to hire. You have received many resumes to review, and while most of them look well qualified, two of the resumes are very poorly formatted and use wacky fonts and graphics. Would you consider these individuals as qualified candidates and be willing to interview them? Please justify your answer by briefly summarizing the discussion you might have with these candidates. Consider the following prompts as you develop your post: Explain why professional formatting matters on a resume or explain why it doesn’t. Argue whether we can infer anything about a candidate’s ability to work in a professional environment based on his or her resume’s formatting. Compare how you would address a resume with wacky fonts to how you would respond to grammatical errors in a resume.
No, you never consider those resumes that use wacky fonts and graphics. This is because it is the primary criterion that candidates have to fulfill in the hiring process.
What is the responsibility of a project manager?Project managers are responsible for planning, organizing, and directing the completion of specific projects for an organization while ensuring these projects are on time, on budget, and within scope.
Professional formatting justifies the capabilities and strength of candidates with respect to their qualifications. It increases your chances for the hiring process with the selection of your resumes.
A candidate’s ability to work in a professional environment based on his or her resume’s formatting is significantly based on their curiosity and willingness to do work in the same culture.
To learn more about Professional formatting, refer to the link:
https://brainly.com/question/17971683
#SPJ1
working with the tkinter(python) library
make the window you create always appear on top of other windows. You can do this with lift() or root.attributes('-topmost', ...), but this does not apply to full-screen windows. What can i do?
To make a tkinter window always appear on top of other windows, including full-screen windows, you must use the wm_attributes method with the topmost attribute set to True.
How can I make a tkinter window always appear on top of other windows?By using the wm_attributes method in tkinter and setting the topmost attribute to True, you can ensure that your tkinter window stays on top of other windows, even when they are in full-screen mode.
This attribute allows you to maintain the window's visibility and prominence regardless of the current state of other windows on your screen.
Read more about python
brainly.com/question/26497128
#SPJ1
The nth Fibonacci number Fn is defined as follows: F0 = 1, F1 = 1 and Fn = Fn−1 + Fn−2 for n > 1.
In other words, each number is the sum of the two previous numbers in the sequence. Thus the first several Fibonacci numbers are 1, 1, 2, 3, 5, and 8. Interestingly, certain population growth rates are characterized by the Fibonacci numbers. If a population has no deaths, then the series gives the size of the poulation after each time period.
Assume that a population of green crud grows at a rate described by the Fibonacci numbers and has a time period of 5 days. Hence, if a green crud population starts out as 10 pounds of crud, then after 5 days, there is still 10 pounds of crud; in 10 days, there is 20 pounds of crud; in 15 days, 30 pounds of crud; in 20 days, 50 pounds of crud, and so on.
Write a program that takes both the initial size of a green crud population (in pounds) and some number of days as input from the keyboard, and computes from that information the size of the population (in pounds) after the specified number of days. Assume that the population size is the same for four days and then increases every fifth day. The program must allow the user to repeat this calculation as long as desired.
Please note that zero is a valid number of days for the crud to grow in which case it would remain at its initial value.
You should make good use of functions to make your code easy to read. Please use at least one user-defined function (besides the clearKeyboardBuffer function) to write your program.
basically I've done all the steps required except the equation in how to get the final population after a certain period of time (days). if someone would help me with this, I'll really appreciate it.
In Python, it can be expressed as follows. Using the recursive function type, we find the sum of the previous term and the sum of the two previous terms.
Python:x=int(input("Initial size: "))
y=int(input("Enter days: "))
mod=int(y/5)-1
def calc(n):
gen_term = [x,2*x]
for i in range(2, n+1):
gen_term.append(gen_term[i-1] + gen_term[i-2])
return gen_term[n]
if(mod==0):
print("After",y,"days, the population is",x)
else:
print("After",y,"days, the population is",calc(mod))
Present an example that uses correctly a local variable inside a function to mask (hide) it from a global variable. Explain the purpose of masking the variable, how it should be declared, and how it is used. Show as much C/C++ code as needed to explain your example.
The code example that uses correctly a local variable inside a function to mask (hide) it from a global variable is:
int i = 5;
void function (){
...
for(int i = 0; i < 13; i++)
}
What are local and global variables?Local variables are variables that have the scope only inside the function that it was declared.
Global variables are variables that have an entire program as a scope.
If a global variable is "re-declared" inside a function, then the scope is only the function, meaning that the local variable inside the function hides it from the global variable.
This is the case in the code we gave for this problem, in which:
The global variable i is declared with a value of 10.Inside the function function(), another variable i is declared, this time with a scope only inside the function f, masking it from the global variable.More can be learned about local and global variables at https://brainly.com/question/13109296
#SPJ1
Look at the following Polygon class:
public class Polygon
{
private int numSides;
public Polygon()
{
numSides = 0;
}
public void setNumSides(int sides)
{
numSides = sides;
}
public int getNumSides()
{
return numSides;
}
}
Write a public class named Triangle that is a subclass of the Polygon class. The Triangle class should have the following members:
a private int field named base
a private int field named height
a constructor that assigns 3 to the numSides field and assigns 0 to the base and height fields
a public void method named setBase that accepts an int argument. The argument's value should be assigned to the base field
a public void method named setHeight that accepts an int argument. The argument's value should be assigned to the height field
a public method named getBase that returns the value of the base field
a public method named getHeight that returns the value of the height field
a public method named getArea that returns the area of the triangle as a double.
Use the following formula to calculate the area: Area = (height * base) / 2.0
The Triangle class should consist of the following components: - a base-named private int field Create a Triangle public class that is a subclass of the Polygon. Creating a hierarchy between our classes is the first step in inheritance.
What are polygons and their types?Any two-dimensional shape made of straight lines is called a polygon. Polygons include shapes like triangles, quadrilaterals, pentagons, and hexagons. The shape's number of sides is indicated by the name. A quadrilateral has four sides, whereas a triangle has three.The description of a closed, two-dimensional area inside of a coordinate space is included in the Polygon class. An arbitrary number of line segments, each of which is a side of the polygon, encircle this area.figuring out a triangle's area by using its base and height Java formula area = (Ax(By -Cy)) to return the area of a triangle using its vertices.To learn more about Polygon refer to:
https://brainly.com/question/26583264
#SPJ1
3. In relationship to the four ways of knowing, explain how "authority" and "science" may simultaneously operate.
Answer:
The summary of given question is summarized in the below segment.
Explanation:
Authority was among the most prevalent means of information acquisition. It entails the development of innovative concepts that the appropriate authorities have said are correct.
Individuals prefer to trust knowledge like this one that no one has any time to investigate every deep understanding we choose to gain via authoritative autonomously.
Numerous scientists' hypotheses were affirmed to be true. But when such statements are proven to be incorrect, they merely lead to misconceptions and therefore also impede the growth of these kinds of fields.
Use the drop-down menus to complete statements about the two formats for importing contacts.
The PST file format can only be imported into contacts by the ________
program.
The CSV file type can be created from a document or _________
and can be imported by multiple email programs.
Answer:
The PST file format can only be imported into contacts by the outlook
program.
The CSV file type can be created from a document or spreadsheets
and can be imported by multiple email programs.
Explanation:
Answer:
yes he is right
Explanation: