what factors determine which metric or metrics a customer can use to help make meaningful cost–benefit decisions of proposed features for a system to be built?

Answers

Answer 1

Business Goals and Objectives: The metrics used to evaluate proposed features must be aligned with the business goals and objectives of the organization.


Customer Needs and Expectations: The metrics used must also be relevant to the needs and expectations of the customers. For example, if the system is being built for a healthcare organization, then metrics related to patient outcomes, such as readmission rates or mortality rates, would be more relevant.

Technical Feasibility: The metrics used must be technically feasible to measure. For example, if a proposed feature requires a significant amount of data to be collected and analyzed, then it may not be feasible to measure the metric accurately.

To know more about organization visit:-

https://brainly.com/question/1615955

#SPJ11


Related Questions

A support technician uses the ping utility on a system that is online, yet no response is received. What should be allowed through a firewall, for ping to operate correctly?

Answers

Answer:

Internet Control Message Protocol (ICMP) Echo Requests

Explanation:

A system that has Windows Firewall or antivirus or other third party antivirus enabled with their configuration setting set to default, ping command from another device will not be able to see if the device with an enabled firewall is alive.

The ping command sends Internet Control Message Protocol (ICMP) Echo Request to a destination device after the destination device will reply with a Reply packet. However, by default, firewalls, such as Windows firewall blocks ICMP Echo Requests from the external network and pinging will  work when the firewall is disabled or an exception is created that lets ICMP Echo Requests pass through the firewall.

The Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

ICMP (Internet Control Message Protocol) is a protocol that produces error messages to the Internet protocol address.

This error reporting protocol (ICMP) is used for diagnostics and network management.

Any network device using TCP/IP can send, receive, and/or process ICMP messages.

In conclusion, the Internet Control Message Protocol (ICMP) should be allowed through a firewall, for ping to operate correctly.

Learn more in:

https://brainly.com/question/6265069

If your computer is running slowly, which of the following is most likely to solve the problem?
Scanning, cleaning, and optimizing your hard drive
Checking to make sure all of the computer’s cords are plugged in
Reentering the serial numbers of the software programs the computer is running
Searching the hard drive for missing DLL files

Answers

Answer:

Purchase Anti-virus

Explanation:

Delete old files.

clear your temp

update to a ssd

Answer:

A. Scanning, cleaning and optimizing your hard drive

Explanation:

IM A DIFFERENT BREEED!

also... when your computer is slow, you usually scan and clean your computer files and delete unnecessary files you don't need so that your computer can run more smoothly and faster.

Which kind of a person will you be if you prove to be accountable for your actions?

Answers

Answer: You would be a person of integrity.

Explanation: Look up Integrity for details.

Given the situation below: You have two new applications that will run on servers attached to an enterprise storage solution with only (10) 500 GB drives available. After meeting with the application teams separately for these new applications they provide you with the amount of storage that they want allocated for their application. For application 1: The team requests 3 TB of storage on one volume. They claim that for the first year as the application is rolled out to users they will only need 1-2 TB of storage, but they want to be allocated 3 TB of storage initially. For application 2: The team requests 4 TB of storage on one volume. They admit that it is difficult for them to assess the amount of storage required for their new application so this is the reason for a large initial allocation of storage. In your own words describe how thin provisioning can assist for the situation above:

Answers

Thin provisioning is a storage management technique that allows for efficient utilization of available storage capacity by allocating storage space on-demand rather than upfront. In the situation described above, thin provisioning can be beneficial in the following ways:

Optimal utilization: With thin provisioning, the storage administrator can allocate the requested 3 TB and 4 TB volumes to application 1 and application 2, respectively, without immediately consuming the full physical capacity of the enterprise storage solution. The actual physical allocation of disk space is done dynamically as the applications consume data. This helps in efficient utilization of the available 500 GB drives.

Flexibility and scalability: Thin provisioning provides flexibility in storage allocation. It allows for overprovisioning of storage capacity to meet the initial requirements of the applications while avoiding the immediate allocation of physical storage. This flexibility allows for easy scalability, as additional storage can be allocated on-demand as the application's storage needs grow over time.

Cost savings: Thin provisioning helps in reducing the upfront costs associated with provisioning large amounts of storage that may not be immediately utilized. By allocating storage on-demand, organizations can avoid over-provisioning and optimize their storage investments. This can result in cost savings by delaying the need for purchasing additional storage hardware until it is actually required.

Overall, thin provisioning provides flexibility, scalability, and efficient utilization of storage resources, which can be particularly advantageous when dealing with uncertain or changing storage requirements, as in the case of the two new applications described.

Learn more about storage  here

https://brainly.com/question/86807

#SPJ11

For any column whose data type is CHAR, values must be enclosed in ____.​
a. ​ parentheses b. ​ square brackets c. ​ single quotation marks d. ​ double quotation marks

Answers

For any column whose data type is CHAR, values must be enclosed in single quotation marks. This is because CHAR data type is used to store character strings of fixed length. The length of the string is defined when the table is created and any value inserted into the column must be of the same length.

When inserting data into a CHAR column, it is important to enclose the values in single quotation marks. This tells the database system that the value is a character string and not a numeric or other type of data. Double quotation marks can also be used, but they are typically reserved for quoting identifiers such as column names or table names. Using parentheses or square brackets to enclose values in a CHAR column is not valid syntax in SQL. Parentheses are typically used to enclose function arguments or to specify order of operations in complex queries. Square brackets are used in some database management systems, but they are not part of the SQL standard and are not recognized by all systems. In summary, the correct answer to the question is c) single quotation marks. Whenever inserting data into a CHAR column, it is important to use single quotation marks to enclose the values to ensure that the data is correctly interpreted as character strings.

Learn more about character strings here-

https://brainly.com/question/13041398

#SPJ11

Please answer the following questions based on the posted reading "The Web's New Monopolists" by Justin Fox.

1. Contrast and compare the web/network-based monopolies that Fox discusses to traditional monopolies in terms of (a) consumer substitutability, and (b) barriers to entry.

2. Would society gain or lose if these monopolies' practices were regulated in any dimension? Consider issues like overcharging, incentives for innovation, exclusion of competition, and any other ones you think may be important.

Answers

Based on the posted reading "The Web's New Monopolists" by Justin Fox. This means that web-based monopolies are more vulnerable to competition than traditional monopolies.

1. In the article "The Web's New Monopolists," Justin Fox discusses the difference between web-based monopolies and traditional monopolies in terms of consumer substitutability and barriers to entry. In contrast to traditional monopolies, web-based monopolies have a higher level of consumer substitutability because they offer more choices and options for users.  

2. Whether society would gain or lose if these monopolies' practices were regulated in any dimension is a matter of debate. On the one hand, regulation could help prevent overcharging and promote innovation by creating incentives for companies to compete on price and quality. On the other hand, regulation could also stifle innovation by creating barriers to entry and discouraging new companies from entering the market.  

To know more about The Web's New Monopolists visit:
brainly.com/question/9171028

#SPJ11

What does "account information disputed by consumer, meets fcra requirements" mean?

Answers

Answer:

the dispute you filed is in alignment with FCRA (Fair Credit Reporting Act) Requirements.

Explanation:

modern computer systems enable users to work with more than one program at the same time. this technique is known as

Answers

The modern computer systems enable users to work with more than one program at the same time. This technique is known as Multitasking or Multiprogramming .

What is mean by Multitasking?Computer multitasking is the practice of running many tasks concurrently for a predetermined period of time. New tasks can start and stop old ones before they are finished, as opposed to waiting for them to finish. Multitasking is often referred to as multiprocessing.A user can manage numerous computer tasks simultaneously using an operating system's multitasking feature, such as by running application software. When switching between these jobs without losing data, the operating system can keep track of where you are in each of them.Multitasking is the ability to manage several responsibilities at once while focusing on one task and keeping an eye on others.

To learn more about multitasking refer to:

brainly.com/question/12977989

#SPJ4

TRUE / FALSE. Every object in windows 10 has audit events related to it

Answers

False. Not every object in Windows 10 has audit events related to it. Audit events are generated for specific actions or activities that occur within the operating system, such as user logins, file access,

or system changes. While many objects, such as files, folders, and registry keys, can have associated audit events, not all objects have this capability. It ultimately depends on the system configuration and the specific settings defined by the administrator or user. Additionally, audit events can be selectively enabled or disabled for different objects based on the desired level of monitoring and security requirements.

Learn more about windows here:

https://brainly.com/question/13502522

#SPJ11

False. Not every object in Windows 10 has audit events related to it by default.



Auditing is a feature in Windows that allows you to track and log certain activities on a system, such as file access, logon events, or object modifications. However, auditing is not enabled for all objects by default. Administrators can selectively enable auditing for specific objects or actions based on their requirements.


learn more about default here;




Python help!
Input a grade level (Freshman, Sophomore, Junior, or Senior) and print the corresponding grade number [9-12]. If it is not one of those grade levels, print Not in High School.
Hint: Since this lesson uses else-if statements, remember to use at least one else-if statement in your answer to receive full credit
Sample Run 1
What year of high school are you in? Freshman
Sample Output 1
You are in grade: 9
Sample Run 2
What year of high school are you in?
Kindergarten
Sample Output 2
Not in High School

Answers

Answer:

print("What year of high school are you in?")

grade = input()

grade = grade.lower()

if grade == "freshman":

   print("You are in grade: 9")

elif grade == "sophomore":

   print("You are in grade: 10")

elif grade == "junior":

   print("You are in grade: 11")

elif grade == "senior":

   print("You are in grade: 12")

else:

   print("Not in high school")

Explanation:

The first line prints the question. "grade = input()" stores the answer the user will type in the terminal into the variable 'grade'.

grade.lower():

The third line lowercases the entire string ("FreshMan" would turn to "freshman"). Python is case-sensitive.

Then, test the string to see if it matches freshman, sophomore, junior, or senior. If the input string matches print the statement inside the if block. The last statement is the else. It prints if nothing else matches.

Using Python: Control of Flow
[1] Objectives: This assignment aims to practice controlling program flow using several forms of IF statements. We will also practice using a status variable (Boolean and integer) to remember the states.
[2] Description: A thermostat is a device we use to control the room temperature for our comfort in hot and cold weather. It monitors the current temperature and turns on A/C or heater to control the indoor temperature. We simulate this control mechanism in only one instance. Just assume the thermostat takes the temperature once a minute and decides what to turn ON or OFF. However, we do want to remember the state (such as the A/C is ON or OFF) so that the thermostat can make the right decision the next time unit comes.
The thermostat has three exclusive settings: 1-A/C, 2-Heating, 0-None (or standby). The device operates in the following way. Since A/C and Heater work in symmetric ways, we shall describe the A/C, and you can figure out the heater operation.
• If the thermostat is set on A/C mode
o If the current temperature is higher than a "high" value
 If the A/C is OFF, then turn ON the A/C
 If the A/C is ON, then don’t change anything
o If the current temperature is lower than a "high" value
 If the A/C is ON, turn OFF the A/C
 If the A/C is OFF, then don’t change anything
There are many possible cases (3x3x2), but many do not have to be implemented because we don’t need to change anything. There may be 8 (2x2x2) cases that you have to use if-statement to separate them.
Here is what you need to do:
1. Set up the thermostat by choosing the mode, set the low and high temperature, set A/C and heater’s status to ON or OFF (only one can be ON at a time).
2. Read the current temperature.
3. Print all these values out. Make sure you get this part right before going on to the next step. (about 10 lines of mostly input calls)
4. Develop the first nested-if statement for the A/C using the logic above. This part will take about 15 lines of code
5. Test the A/C setting before going on to the next step.
6. Develop the second case for the heater in a similar way. Another 15 lines of code about you can easily edit the first part for this case.
7. Develop the third case, which involves printing a message only. Overall, you should be able to do the assignment with about 50-60 lines of code.
[3] Output: Four sample outputs are given below. Remember, it should work for all possible cases. I will run your program to see if it works properly. The following are four outputs from four execution of the program, not one.

Answers

The task requires writing a Python program to simulate the control mechanism of a thermostat. The thermostat has three exclusive settings: A/C, Heating, and None (standby). The program should take inputs for the mode, low and high temperatures, and the status of the A/C and heater. It should then read the current temperature and make decisions based on the specified logic for each setting.

The program should output the chosen mode, temperature values, and the status of the A/C and heater. The implementation involves nested if statements for the A/C and heater cases, as well as a third case involving message printing. The program should handle all possible cases.

To complete the assignment, you need to write a Python program that simulates the operation of a thermostat. Here's a general outline of the steps you should follow:

Set up the thermostat by taking inputs for the mode, low and high temperatures, and the status of the A/C and heater (ON or OFF).

Read the current temperature.

Print out all the inputs, including the mode, temperature values, and the status of the A/C and heater.

Next, you need to implement the control mechanism for the A/C and heater settings using nested if statements. Here's a high-level description of the logic for each setting:

For the A/C setting:

If the current temperature is higher than the high value:

If the A/C is OFF, turn it ON.

If the A/C is already ON, do nothing.

If the current temperature is lower than the high value:

If the A/C is ON, turn it OFF.

If the A/C is already OFF, do nothing.

Test the A/C setting to ensure it is functioning correctly.

Repeat a similar process for the heater setting, adapting the logic from step 4.

Develop the third case, which involves printing a message. This case might involve specific conditions that trigger the message.

Remember to handle all possible cases by considering different combinations of temperature values and A/C and heater statuses.

By following these steps and implementing the necessary if statements, you should be able to complete the assignment. Aim to write around 50-60 lines of code to fulfill the requirements.

Learn more about Python program here :

https://brainly.com/question/32674011

#SPJ11

what type of cipher can take a character and replace it with another character, working one character at a time?

Answers

A substitution cipher is a kind of cipher that takes one character and replaces it with another character, working one character at a time.

A substitution cipher is a data encryption scheme where units of the plaintext, generally single letters or pairs of letters of ordinary text, are replaced with other symbols or groups of symbols. It means that a substitution cipher substitutes different numbers, letters, or other characters for each character in the original text. The simple example is a simplistic substitution whereby each letter of the alphabet is represented by a numerical value, starting with 1 for A.

You can leran more about substitution cipher at

https://brainly.com/question/28021345

#SPJ4

what does the Data Analysis techniques may involve ?
"

Answers

Data analysis techniques involve various methods and processes to extract insights and patterns from data. These techniques encompass tasks such as data cleaning, exploration, visualization, statistical analysis, machine learning, and predictive modeling.

Data analysis techniques are employed to transform raw data into meaningful information that can guide decision-making and support business objectives. The first step is data cleaning, which involves removing errors, duplicates, and inconsistencies to ensure data accuracy. Exploratory data analysis is then performed to understand the data's structure, relationships, and distribution through summary statistics, histograms, and scatter plots.

Visualization techniques, such as charts, graphs, and dashboards, aid in presenting the data visually for easier comprehension. Statistical analysis involves applying statistical methods like hypothesis testing, correlation analysis, and regression analysis to uncover patterns, relationships, and dependencies within the data.

Machine learning algorithms are employed to develop predictive models that can forecast future outcomes or classify data into different categories. Techniques such as decision trees, random forests, and neural networks are utilized to train and evaluate these models. Additionally, techniques like clustering and dimensionality reduction help identify groups and reduce the complexity of high-dimensional datasets.

Overall, data analysis techniques encompass a range of methods and tools that enable analysts to extract insights, identify trends, and make data-driven decisions, ultimately leading to improved understanding and optimization in various fields, including business, science, and technology.

Learn more about patterns here:

https://brainly.com/question/15115078

#SPJ11

What is the result of the following code fragment?
BigInteger a = new BigInteger ("10");
BigInteger b = new BigInteger ("25");
a.multiply(b);
a.add(b);
System.out.println(a);


A. 10
B. 35
C. 250
D. 275

Answers

Answer:

D

Explanation:

I don't know the language, but it is clear what is going on.

It looks like you are defining a value for a in both commands.

a.multiply(b); looks like you take the value in a (which is 10) multiply it by 25 and put the result back in a. So so far we have 10 * 25 = 250

Note the next command

a.add(b)

looks like you take the current value in a(which is now 250)

and put the value of b (which has not been changed. It is still 25) and put that in a (which is 250).

The result is 250 + 25 = 275

The answer is D. Since I only understand the logic, if this answer is wrong, I wish you'd leave a note.

when the conclusions based upon the unaggregated data can be completely reversed if we look at the aggregated crosstabulation, the occurrence is known as

Answers

when the conclusions based upon the unaggregated data can be completely reversed if we look at the aggregated crosstabulation, the occurrence is known as the Simpsons Paradox.

What metric is employed to establish a link between two variables?

A scale from + 1 to -1 is used to calculate the correlation coefficient. Either + 1 or -1 represents a variable's complete connection with another. The correlation is positive when one variable rises as the other rises; it is negative when one variable falls as the other rises.

What statistical technique is employed to establish the link between two variables measured at intervals?

A bivariate study known as correlation assesses both the strength and the direction of the relationship between two variables.

In basic terms, what is Simpson's paradox?

A statistical phenomenon known as Simpson's Paradox occurs when a population is divided into subpopulations and a correlation between two variables in the population either arises, vanishes, or reverses.

To know more about paradox visit:

https://brainly.com/question/28169268

#SPJ4

Maria and Beth are walking down the street when they see a dead pigeon on the ground. The sight startles both of them. However, Maria knows that Beth will be especially sad about the pigeon because Beth is a huge lover of birds. So, Maria begins talking about how the pigeon probably lived a long, lovely life and that it seemed to have died peacefully. What social regulatory strategy is Maria most likely using

Answers

Maria is most likely using the social regulatory strategy of positive reappraisal.

What social regulatory strategy is Maria likely using when she emphasizes the positive aspects of the pigeon's life and death to comfort Beth?

Maria is likely using the social regulatory strategy of positive reappraisal, where she focuses on the positive aspects of the situation to comfort Beth.

By suggesting that the pigeon had a long, lovely life and died peacefully, Maria aims to shift Beth's perspective towards a more positive outlook, providing emotional support and easing her sadness.

Positive reappraisal involves reframing or finding positive meaning in a situation, which can help individuals cope with distressing events.

In this case, Maria's use of positive reappraisal demonstrates her empathy and understanding of Beth's love for birds, providing a comforting perspective on the unfortunate sight of the dead pigeon.

Learn more about regulatory strategy

brainly.com/question/30166004

#SPJ11

Emails sent or received using a personal or non-official account must be copied or forwarded.a. Trueb. False

Answers

The given statement is true. Emails sent or received using a personal or non-official account must be copied or forwarded to an official account for record-keeping purposes.

This policy is typically put in place by organizations or companies to ensure that all communication related to their business is properly documented and archived. It is important to keep a record of all emails sent and received as they may contain important information that could be required in the future for legal or compliance purposes.In addition to record-keeping, forwarding or copying emails from personal accounts to official accounts also helps to ensure that all employees are adhering to the organization's policies and procedures regarding communication. It can also help to prevent the misuse of personal accounts for business-related purposes, which could potentially lead to security breaches or data loss.It is important to follow your organization's policies regarding the use of personal accounts for business-related communication. By forwarding or copying these emails to an official account, you can help to ensure proper record-keeping and maintain compliance with organizational policies.

For such more questions on Email

https://brainly.com/question/30551604

#SPJ11

Sarah just purchased the newest album by her favorite band. Her friend Molly loves their music as well, so Sarah offers to make a copy for her. Can she do this?

Answers

Answer:

Sarah can use a usb stick to copy the files, abd give Molly the usb stick so she can export the files. OR Sarah can upload the files to the cloud and give Molly permission to download the files from the cloud.

Select the correct answer.

Susan is writing a program that organizes weather data into a table using conditional phrases. If she wants to operate on the results of these conditional phrases, what must she do?

A use Boolean values for the results

B. use the results in more conditional phrases

C. use logical operators on the results

D use either >,<, or =​

Answers

Answer:

B.use the results in more conditional phrases

according to _____, the highest level of personal development is called self-actualization.

Answers

According to Abraham Maslow, the highest level of personal development is called self-actualization.

Abraham Maslow, a renowned psychologist, developed a theory known as the hierarchy of needs, which outlines the stages an individual goes through in their pursuit of psychological growth and fulfillment.

At the base of the hierarchy are basic physiological needs such as food, water, and shelter. As these needs are met, individuals move up the pyramid, focusing on safety, love and belonging, and esteem. Self-actualization is positioned at the top of this hierarchy, representing the highest level of personal development.

Self-actualization is the process of realizing one's full potential, transcending the limitations imposed by society, culture, and personal experiences. It involves developing self-awareness, pursuing personal growth, and cultivating authentic relationships with others. This level of personal development is characterized by autonomy, creativity, and a deep understanding of the world around us.

It is important to note that not everyone achieves self-actualization, as it requires a continuous commitment to personal growth and self-improvement. However, for those who strive to reach this pinnacle of psychological well-being, self-actualization offers a sense of purpose, fulfillment, and true happiness.

Learn more about Abraham Maslow here: https://brainly.com/question/30036515

#SPJ11

CALCULATE THE MECHANICAL ADVANTAGE (MA).

DATA: F= 135 kg; b= 4*a; L=15 m

Answers

The mechanical advantage (MA) of the lever system in this scenario can be calculated by dividing the length of the longer arm by the length of the shorter arm, resulting in an MA of 4.

To calculate the mechanical advantage (MA) of the lever system, we need to compare the lengths of the two arms. Let's denote the length of the shorter arm as 'a' and the length of the longer arm as 'b'.

Given that the longer arm is four times the length of the shorter arm, we can express it as b = 4a

The mechanical advantage of a lever system is calculated by dividing the length of the longer arm by the length of the shorter arm: MA = b / a.

Now, substituting the value of b in terms of a, we have: MA = (4a) / a.

Simplifying further, we get: MA = 4.

Therefore, the mechanical advantage of this lever system is 4. This means that for every unit of effort applied to the shorter arm, the lever system can lift a load that is four times heavier on the longer arm.

For more such question on system

https://brainly.com/question/12947584

#SPJ8

The complete question may be like:

A lever system is used to lift a load with a weight of 135 kg. The lever consists of two arms, with the length of one arm being four times the length of the other arm. The distance between the fulcrum and the shorter arm is 15 meters.
What is the mechanical advantage (MA) of this lever system?

In this scenario, the mechanical advantage of the lever system can be calculated by comparing the lengths of the two arms. The longer arm (b) is four times the length of the shorter arm (a), and the distance between the fulcrum and the shorter arm is given as 15 meters. By applying the appropriate formula for lever systems, the mechanical advantage (MA) can be determined.


According to the test for x-ray film freshness, the film is fresh and has been properly stored and handled when the processed film appears clean with a slight ______ tint.

Answers

According to the test for x-ray film freshness, the film is fresh and has been properly stored and handled when the processed film appears clean with a slight blue tint.

What is an x-ray film?

An x-ray film can be defined as a special photographic film which is designed and developed with a sensitive emulsion layer (single or double) that blackens or darkens in response to the light received from intensifying screens.

Generally, an x-ray film test can be used to measure and determine the freshness of any x-ray film, especially through the use of certain techniques.

In conclusion, an x-ray film is considered to be fresh and has been properly stored and handled when the processed x-ray film appears clean with a slight blue tint in accordance with the proper test for x-ray film freshness.

Read more on x-ray film here: https://brainly.com/question/14318076

#SPJ1

you have installed a windows 10 system. you do not want this system to be visible on the network, and it should not be used for print and file sharing. what should you do?

Answers

If you have installed a Windows 10 system and do not want it to be visible on the network, and it should not be used for print and file sharing, you can take the following steps:

Step 1: First, select Settings > Network & Internet > Ethernet (or Wi-Fi).Step 2: Change the settings to "Off" for "Find Devices and Content" and "Nearby Sharing"Step 3: Then, type "Network and Sharing Center" into the search box and select "Open Network and Sharing Center.

Step 4: To the left of "Change advanced sharing settings," click the down arrow.Step 5: Click the "Turn off file and printer sharing" button on the screen. Step 6: Click on "Save changes" to save your changes.

Learn more about do not want it to be visible on the network at: brainly.com/question/30255931

#SPJ11

Array testgrades contains num_vals test scores. write a for loop that sets sumextra to the total extra credit recieved. full credit is 100, so anything over 100 is extra credit. ex: if testgrades = { 101,83,107,90}, then sumextra = 8, because 1+0+7+0 is 8.




i need help writing the solution

Answers

The loop for the sets sumExtra to the total extra credit received will be written in C++.

The code in C++ is,

#include <iostream>

using namespace std;

int main() {

const int NUM_VALS = 4;

int testGrades[NUM_VALS];

int i;

int sumExtra = -9999; // Assign sumExtra with 0 before your for loop

for (i = 0; i < NUM_VALS; ++i) {

cin >> testGrades[i];

}

/* Your solution goes here */

sumExtra = 0; //sumExtra assigned with 0 before loop

for (i = 0; i < NUM_VALS; ++i)

{

if (testGrades[i]>100)

{

sumExtra += testGrades[i]-100;

}

else

{

continue;

}

}

cout << "sumExtra: " << sumExtra << endl;

return 0;

}

In the code above, we use loop to iterate access each item in array and we also use IF-ELSE to check the condition for extra credit.

The code and another example output in C++ is attached in image.

You question is incomplete, but most probably your full question was

C++

Array testGrades contains NUM_VALS test scores. Write a for loop that sets sumExtra to the total extra credit received. Full credit is 100, so anything over 100 is extra credit. Ex: If testGrades = {101, 83, 107, 90}, then sumExtra = 8, because 1 + 0 + 7 + 0 is 8.

#include <iostream>

using namespace std;

int main() {

const int NUM_VALS = 4;

int testGrades[NUM_VALS];

int i;

int sumExtra = -9999; // Assign sumExtra with 0 before your for loop

for (i = 0; i < NUM_VALS; ++i) {

cin >> testGrades[i];

}

/* Your solution goes here */

cout << "sumExtra: " << sumExtra << endl;

return 0;

}

Learn more about loop here:

brainly.com/question/29716484

#SPJ4

Array testgrades contains num_vals test scores. write a for loop that sets sumextra to the total extra

how to draw a flowchart to compute area of a triangle​

Answers

To draw a flowchart to compute the area of a triangle, you can follow the steps below:

The Steps

Start the flowchart with a start/end symbol.

Ask the user to enter the base and height of the triangle.

Store the values of base and height in variables.

Multiply the base and height and divide the result by 2 to get the area of the triangle.

Display the area of the triangle to the user.

End the flowchart with an end symbol.

The flowchart will look like a series of symbols and arrows, with each symbol representing a different action or decision point in the process.

The symbols used in the flowchart will depend on the specific software or tool you are using to create it, but typical symbols include start/end, input/output, process, decision, and connector symbols.

By following this flowchart, you can easily compute the area of a triangle with just a few simple steps.

Read more about flowcharts here:

https://brainly.com/question/6532130

#SPJ1

3. Choose the statement that best describes a ray. A ray extends forever in both directions. B ray is a part of a line with two endpoints. C ray is an exact location. D ray has one endpoint and continues forever in the opposite direction.

Answers

Answer:

Ray is part of a line that starts at one point and extends forever in one direction.

Explanation:

In geometry, a ray can be defined as a part of a line that has a fixed starting point but no end-point. It can extend infinitely in one direction. On its way to infinity, a ray may pass through more than one point. The vertex of the angles is the starting point of the rays.

Extra

B. A part of a line with two endpoints?

line segment

A line segment has two endpoints. It contains these endpoints and all the points of the line between them. You can measure the length of a segment, but not of a line. A segment is named by its two endpoints, for example, ¯AB.

Answer:

Ray is part of a line that starts at one point and extends forever in one direction.

Explanation:

Manufacturing production systems
can be classified as

Answers

Answer:

Job-shop, Batch, Mass and Continuous production systems.

Answer:

Explanation:

Production systems can be classified as Job-shop, Batch, Mass and Continuous production systems.

The following code is intended to find the average of three numbers entered from the keyboard. What is wrong with the code? print ("Enter 3 numbers: ") n1 = float(input ("Enter a number: ")) n2 = float(input ("Enter a number: ")) n3 = float(input ("Enter a number: ")) print (n1 + n2 + n3 /3)

Answers

Answer:

It is missing ( ) in the last line

Explanation:

Robin has four copies of her midterm paper saved to a single folder on her
Windows computer. She wants to move each of these four files into a
separate folder within the existing one. How can Robin perform this task for
each file?
A. Right click on the folder containing all four files, select "Copy."
Open the same folder, select "Paste." Enter the new folder's title.
B. Open the folder containing all four files, right-click in the folder
window, select "New" enter the new folder's title, click on one file,
drag it into the new folder.
C. Open the folder containing all four files, right-click on one file,
select "New Folder," enter the new folder's title, click on the same
file, drag it into the new folder.
O
D. Open the folder containing all four files, right-click in the folder
window, select "New Folder," enter the new folder's title, click on
one file, drag it into the new folder.

Answers

Answer:

d

Explanation:

i took the test

HELP ASAP!!!
Write a program that asks the p34won to enter their grade, and then prints GRADE is a fun grade. Your program should repeat these steps until the user inputs I graduated.

Sample Run
What grade are you in?: (I graduated) 1st
1st is a fun grade.
What grade are you in?: (I graduated) 3rd
3rd is a fun grade.
What grade are you in?: (I graduated) 12th
12th is a fun grade.
What grade are you in?: (I graduated) I graduated

It's in python

Answers

def func():

   while True:

       grade = input("What grade are you in?: (I graduated) ")

       if grade == "I graduated":

           return

       print("{} is a fun grade".format(grade))

func()

I hope this helps!

Other Questions
convert the code to java#include #include using namespace std;class student{protected:int rno,m1,m2;public:void get( ){coutrno;coutm1>>m2;}};class sports{protected:int sm; // sm = Sports markpublic:void getsm( ){coutsm;}};class statement:public student,public sports{int tot,avg;public:void display( ){tot=(m1+m2+sm);avg=tot/3;cout Determine the moment of resistance (MOR) of a reinforced concrete beam of 300 mm width &600 mm Effective depth, if it is reinforced with 4 bars of 20 mm diameter (use M20 concrete \& fe 415 steel) Write 'T' against a true statement and 'F' against a false one.Sharing or exchanging information, ideas and experiences between personsmeans communication.The process of communication may not always contain a message.Feedback is one of the elements of the process of communication.A traffic police showing a stop sign to the public is a process of communication Based on the information in the text, what do you think would have happened to Brian had he not been rescued when he was? Explain your response. Find evidence from the text to support your answer. (14 2) x 5 + 6{ 3 x (4 + 1) } 5EXPLAIN GIVING BRAINLIEST : What does the phrase pure concentration-camp style suggest about the wall in paragraph 16? Multiply the polynomials (4a3-5a-3) and (2a2-7a+3). Simplify the answer. Which of these expressions have positive values? Select all that apply.2(8)10 12(2)(2)10 (20)6(8)40 (8) b. Find the length of \( \overline{A E} \) to the nearest tenth (without a ruler). (Hint: Think of \( \overline{A E} \) as the hypotenuse of a right. triangle) (2 pts) c. Find the length of \( \overli which of the following is a true statement about how living organisms use energy and chemicals to carry out life's activities? a)Both energy and chemicals cycle within an ecosystem.b)Both energy and chemicals flow through an ecosystem.c)Energy cycles within an ecosystem, but chemicals flow through it.d)Energy flows through an ecosystem, but chemicals cycle within it. 4(n + 5) = 4 + 2nGroup of answer choicesn = 12n = -16n = -7n = -8 How did the Catholic Church deal with heretics? The cost of 15 notebook is Rs 145. find the cost of one such book What trend does the reactivity of most nonmetals show in a periodic table, excluding the noble gases?random changes without any trends on the periodic tablechanges according to trends on the periodic tableincreases from left to right across the periodic tabledecreases from left to right across the periodic table La ____de caf a Los Estados Unidos es muy importante para la economa de colombia The cost of a pack of 12 pens is $3.24. Find the the unit price in dollars per pen. If necessary, round your answer to the nearest cent. Comment automatiquement mettre a jour la playlist installee sur ssiptv. What ship was Captain Cook on in the First Fleet? i'll mark brainliest suppose that a u.s.-based mnc is considering establishing a subsidiary in a foreign country. however, the mnc is concerned about the risk of the host government taking over the subsidiary true or false: all else equal, if the subsidiary hires mostly local labor it will make a host government takeover less likely. true false