Write a C\# program that has the following options in a menu: (1) Register (2) Login (3) Exit 3.

Answers

Answer 1

In C#, a console application can be designed to display a menu with options like Register, Login, and Exit.

Each option can be associated with different actions, and the user can select any option by inputting the corresponding number.

The application starts by displaying the menu options to the user in a loop until the user chooses to exit. When the user selects "Register" or "Login", corresponding methods will be invoked to execute the associated tasks. For instance, "Register" may gather user information and store it, and "Login" could verify the user's credentials. The program exits when the user chooses the "Exit" option.

Learn more about method calling in C# here:

https://brainly.com/question/20216706

#SPJ11


Related Questions

A transport level protocol can use encryption to guarantee that application messages are not read by intruders, even when the network layer cannot guarantee the confidentiality of transport-layer segments.
T/F?

Answers

True. The transport-level protocol can use encryption to ensure that application messages are not read by intruders, even if the network layer cannot guarantee the confidentiality of transport-layer segments. However, encryption at the transport layer is typically used to improve security rather than to ensure confidentiality.

Encryption is a process that involves converting plaintext into ciphertext so that it can be sent over the internet securely. Encryption is the method of encoding messages to keep them secret. By translating the text into a secret code, encryption can help keep your data private from unauthorized parties.

The procedure is used to protect sensitive data, such as credit card numbers, social security numbers, and login credentials, by scrambling the data and then making it unreadable until it is decrypted with the appropriate key.

You can learn more about encryption at: brainly.com/question/17017885

#SPJ11

Write a complete Java program called Rooter that gets a positive integer called "start" from the user at the command line and then finds the squareroot of every number from "start" down to 0. Use a while loop to count down. Print each square root on a separate line. Include data validation to ensure the user provides a positive integer. Assume that the user enters an integer, and for validation, just check to be sure it is positive. If the validation is not passed, provide the user with suitable feedback and stay in the program to let the user try again until valid input is received. Use the Math.sqrt(double a) method to find each square root.

Answers

Answer:

The program in Java is as follows:

import java.util.*;

import java.lang.Math;

public class Rooter{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

 int start;

 System.out.print("Start: ");

 start = input.nextInt();

 while(start<=0){

     System.out.print("Number must be positive\nStart: ");

     start = input.nextInt();  }

 while(start>=0){

     System.out.println(Math.sqrt(start));

     start--;  }

}

}

Explanation:

This declares start as integer

 int start;

This prompts the user for input

 System.out.print("Start: ");

This gets input for start

 start = input.nextInt();

The following is repeated until the user input is valid i.e. positive

 while(start<=0){

     System.out.print("Number must be positive\nStart: ");

     start = input.nextInt();  }

The following while loop prints the square root of each number till 0

 while(start>=0){

     System.out.println(Math.sqrt(start));

     start--;  }

Which file extension indicates the file is a Microsoft Word document?
.doc
.dot
.ppt
.txt

Answers

Answer:

DOC

Extension Format

doc Microsoft Word document before Word 2007

docm Microsoft Word macro-enabled document

docx Microsoft Word document

dot Microsoft Word template before Word 2007

Explanation:

Doc ....... is a document

What strategies can you use to ensure ease of reading in your emails and other digital communications

Answers

Answer:Ways to Ensure Your Emails Get ReadSubject lines: Remember that only 20 percent to 40 percent of your emails will actually get opened, though most of your subject lines will be seen. ... Your tone: Portray yourself as someone that other people can connect to.

Explanation:

Suppose you have the following variables defined: a = 100 b = 50 Write a Python if/else statement to assign the smaller of a and b to the variable m.

Answers

Answer:

a, b = 100, 50

if a < b:

m = a

else:

m = b

The program which assigns the smaller of the values in variable a and b using an if/else statement ls :

a = 100

b = 50

#assign the 100 and 50 to the variables a and b respectively

if a > b :

# the if statement checks if the variable a is greater the value on variable b

m = a

# if true assign the value of a to the variable m

else :

# if otherwise, then b would be greater

m = b

#assign the value of b to m

#the sample run of the program is attached

print(m)

Learn more :https://brainly.com/question/15727806

Suppose you have the following variables defined: a = 100 b = 50 Write a Python if/else statement to

What can organizations use in their computer systems that allow the system to continue to process database transactions after a hard drive failure

Answers

Organizations can utilize technologies such as redundant arrays of independent disks (RAID) and database replication to ensure continued processing of database transactions even after a hard drive failure.

To ensure uninterrupted processing of database transactions in the event of a hard drive failure, organizations can employ redundant arrays of independent disks (RAID) and database replication. RAID technology involves combining multiple physical disks into a single logical unit, which provides increased data redundancy and fault tolerance. Different RAID levels, such as RAID 1 (mirroring) or RAID 5 (parity), offer various levels of redundancy and performance trade-offs.

By implementing RAID, organizations can distribute and replicate data across multiple drives, allowing the system to continue processing transactions even if one or more drives fail. In the case of a hard drive failure, the system can retrieve the necessary data from the redundant drives, ensuring data integrity and minimizing downtime.

Additionally, organizations can employ database replication techniques to further enhance data availability. Database replication involves maintaining multiple copies of the database across different systems or servers. In the event of a hard drive failure, the system can switch to a replica or  secondary database instance, allowing uninterrupted transaction processing. Through replication, organizations can ensure data consistency and provide failover capabilities to handle hardware failures without significant disruption.

In conclusion, technologies such as RAID and database replication enable organizations to maintain the processing of database transactions even after a hard drive failure. These approaches provide data redundancy, fault tolerance, and failover capabilities, ensuring continuous availability and minimizing the impact of hardware failures on the system's operations.

Learn more about RAID here:

https://brainly.com/question/31107356

#SPJ11

When is the possibility of solar weather affecting terrestrial weather the highest?(1 point)

during solar minimum
during solar minimum

during the solar cycle
during the solar cycle

during solar maximum
during solar maximum

during Total Solar Irradiance
during Total Solar Irradiance

Answers

The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.

Does solar weather have an effect on terrestrial weather?

There are different forms of weather on Earth, this is one that ranges from the surface of the planet out unto the outer space.

Note that Space weather as well as terrestrial weather are known to be influenced by the little  alterations that the Sun undergoes during its solar cycle.

Hence, The possibility of solar weather affecting terrestrial weather the highest is option c: during solar maximum.

Learn more about solar weather from

https://brainly.com/question/15279276

#SPJ1

Suppose we have an array defined who's name is nums. The array is supposed to be holding a list of positive integers (including 0). It is a partially-filled array. There will be a single negative number stored in the array to mark where the list of positive integers ends. We want to print the contents of this array to the screen with the following code: int pos = 0; while ( cout << nums[pos] << endl; Fill in the blank for the WHILE loop condition.- Do not put ANY spaces in your line or Canvas will count it as incorrect. Remember Canvas isn't a compiler and so it can't account for every possible way to write a statement like a compiler can. If your answer is marked wrong and you think it should be correct, send a message to the instructor so it can be reviewed Answer: while The variable file has been declared with an ifstream data type, and is properly set up to refer to a file on the hard drive. The file contains a list of integers which should be read into the program and stored into the nums array. t do { if (usedsize < MAXSIZE) { file >> nums[usedsize]; usedsize++; } while (usedsize < MAXSIZE); What is wrong with the code shown here? a) The program should be using file.getline instead of file >> b) A FOR loop should have been used instead of the DO-WHILE loop- c) file should have been declared with an ofstream data type instead of ifstream- d) There is no condition to stop the loop when we reach the end of the file- Write the declaration for a two-dimensional array named temps which is capable of holding up to twelve columns of data, with up to eight rows.- double Do not put ANY spaces in your line or Canvas will count it as incorrect. Remember Canvas isn't a compiler and so it can't account for every possible way to write a statement like a compiler can. If your answer is marked wrong and you think it should be correct, send a message to the instructor so it can be reviewed Refer to the searchAll function defined in the lecture notes, and also seen in the SearchingArrays2.cpp file that was distributed as a class demo file. If you were writing a main program which uses this function to search an array named nums to see if the number 15 was stored in the array, how will you know if the function was NOT able to find any 15's in nums? a) The usedSize parameter will be holding the value o after the function ends b) The foundSize parameter will be holding the value 0 after the function ends c) The found parameter will be holding the valu after the function endse d) The function will return the value true e) The function will return the value false f) The function will return the position number of where 15 was found, or will return -1 if it was not found What is wrong with the following function? bool find(const int nums[], int usedSize, int key) l{ for (int pos = 0; pos <= usedSize; pos++) 1 { if (key == nums[pos]) return true; } return false; } a) If key is not present in the array, the function keeps searching past the end of the arrayu b) The function tries to change the contents of the array, but can't because the array is declared as cons C) The function should be using a variable called count instead of posu d) We can't use == to compare integers, and so the key item will never be found e) The function should be returning the position number of where the item is found, rather than returning true f) The array parameter should not have the word const in front of it-

Answers

A partially-filled array is an array that is not completely filled with elements, but only has a certain number of elements stored in it, while a fully-filled array has all its elements filled with values.

What is a partially-filled array and how is it different from a fully-filled array?

Partially-filled array: An array that is not completely filled with elements, but only has a certain number of elements stored in it.

Positive integers: Whole numbers greater than zero.

Parameter: A value or reference passed into a function or method as input.

While loop condition: The condition that must be true for a while loop to continue iterating.

Declaration of a two-dimensional array named temps: double temps[8][12];

If the searchAll function was used to search for the number 15 in the array named nums and it was not found, the foundSize parameter will be holding the value 0 after the function ends.

The following function has an error: bool find(const int nums[], int usedSize, int key) { for (int pos = 0; pos <= usedSize; pos++) { if (key == nums[pos]) return true; } return false; }

The error is that if key is not present in the array, the function keeps searching past the end of the array. The condition in the for loop should be "pos < usedSize" instead of "pos <= usedSize".

Learn more about partially-filled array

brainly.com/question/6952886

#SPJ11

what is the first thing you should check if you discover that domain names are not resolving into ip addresses on a pc or workstation?

Answers

The first thing you should check if you discover that domain names are not resolving into IP addresses on a PC or workstation is the DNS server settings. DNS (Domain Name System) servers are responsible for resolving domain names into IP addresses, so if there is an issue with these settings, it can result in domain names not resolving into IP addresses.

To check the DNS server settings on a Windows PC, follow these steps:

Click the Windows Start button and select "Control Panel".Click "Network and Internet" and then "Network and Sharing Center".Click "Change adapter settings" on the left side of the window.Right-click on the network adapter you are using and select "Properties".Scroll down to "Internet Protocol Version 4 (TCP/IPv4)" and select it.Click the "Properties" button.Make sure that "Obtain DNS server address automatically" is selected. If it is not, select it and click "OK".

If this does not resolve the issue, you may need to contact your network administrator or internet service provider for further assistance.

Learn more about DNS server: https://brainly.com/question/18274277

#SPJ11

1byte= ________ bits
1 nibble= __________ bits
1 MB= _________ bits
1PB= ____________ TB
1 ZB= ___________ EB

Answers

Explanation:

1 byte=8bits

1 nibble = 4bits

1MB= 8000000bits

1PB= 1000TB

1ZB= 1000000000000EB

Write a python program using "Nested if statement" that will

ask the users to enter their age and if they are registered to

vote. Then print a message informing them that they can vote,

or a message explaining why they cannot vote (underage or not.

registered)

They can vote only if they are over 17 years of age and

registered to vote.

o

O

Answers

The Python program using nested if statements that will ask the user for their age and if they are registered to vote. The program will then print a message to inform them if they can vote or not.

The program first asks the user to input their age as an integer using the `input()` function and converting it to an integer using the `int()` function. The program then asks if the user is registered to vote using the `input()` function. The program uses a nested if statement to check if the user is eligible to vote.

The outer if statement checks if the user is 18 years or older. If the user is 18 years or older, the inner if statement checks if the user is registered to vote. If the user is registered to vote, the program prints a message informing them that they can vote. If the user is not registered to vote, the program prints a message explaining why they cannot vote.

To know more about program visit:

https://brainly.com/question/11023419

#SPJ11



Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display only those numbers that are palindrome

Answers

Using the knowledge of computational language in JAVA it is possible to write a code that  input N numbers from the user in a Single Dimensional Array .

Writting the code:

class GFG {

   // Function to reverse a number n

   static int reverse(int n)

   {

       int d = 0, s = 0;

       while (n > 0) {

           d = n % 10;

           s = s * 10 + d;

           n = n / 10;

       }

       return s;

   }

   // Function to check if a number n is

   // palindrome

   static boolean isPalin(int n)

   {

       // If n is equal to the reverse of n

       // it is a palindrome

       return n == reverse(n);

   }

   // Function to calculate sum of all array

   // elements which are palindrome

   static int sumOfArray(int[] arr, int n)

   {

       int s = 0;

       for (int i = 0; i < n; i++) {

           if ((arr[i] > 10) && isPalin(arr[i])) {

               // summation of all palindrome numbers

               // present in array

               s += arr[i];

           }

       }

       return s;

   }

   // Driver Code

   public static void main(String[] args)

   {

       int n = 6;

       int[] arr = { 12, 313, 11, 44, 9, 1 };

       System.out.println(sumOfArray(arr, n));

   }

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

Write a program in java to input N numbers from the user in a Single Dimensional Array .Now, display

Pedro has written a program in a high-level language to do some calculations for a friend. His friend needs to use the program immediately on his laptop. Pedro does not know what software is available on the laptop. Also, his friend's internet connection is very slow. Explain which type of translator Pedro should use for his program. Give reasons why this is the best choice in this case.​

Answers

In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

Why do you need to translate a program written in a high-level language into machine language?

Programming languages are known to be easy for humans to read and understand.

Note that The program (source code) need to be translated into machine language so that the computer can be able to carryout the program.

Therefore, In the case above, a Compilers is the best translator for a program that is said to be changed or written in a high-level language into machine code.

Learn more about machine language from

https://brainly.com/question/23275071

#SPJ1

Earth’s axis is tilted to one side. Which phenomenon would cease to exist in the absence of this axial tilt?

Answers

The Earth rotation axis is inclined (or tilted) approximately 23.5º with respect to the plane of the orbit that it describes around the Sun.

If this inclination did not exist and the axis of the Earth were exactly perpendicular to the plane of its orbit around the Sun, day and night would always last twelve hours and every day of the year would be a perfect repetition of the previous one.

Therefore, the solstices (maximum difference in duration between day and night) or seasons would not exist.

Answer:

solstice

Explanation:

Plato correct answer!

what are some examples of physical security measures you can implement to protect your network?

Answers

There are several physical security measures that can be implemented to protect a network. Some examples include:


1. Access controls: Limiting access to the physical space where the network equipment is located can prevent unauthorized individuals from tampering with the network.
2. Surveillance cameras: Installing surveillance cameras can help monitor the physical space where the network equipment is located, and can serve as a deterrent to potential intruders.
3. Alarms: Setting up an alarm system can alert security personnel if there is an unauthorized attempt to access the network equipment.
4. Secure storage: Keeping network equipment in a locked cabinet or room can prevent unauthorized individuals from accessing the equipment.
5. Environmental controls: Ensuring that the physical space where the network equipment is located is properly cooled and ventilated can prevent overheating and other environmental damage.


By implementing these physical security measures, organizations can help protect their network from physical threats and ensure the integrity and availability of their data.

To know more about Surveillance cameras, click here:

https://brainly.com/question/12419047

#SPJ11

Can Anybody answer this

Can Anybody answer this

Answers

Motherboard is the answer for da question

What special signal is issued periodically from an Access Point and contains the network transmission rate and service set identifier (SSID), as well as other information needed for a computer to associate with the AP

Answers

Answer:

beacon frame  

Explanation:

Beacon frame is a management frame In computer networks, known to be in IEEE 802.11 based WLANs. These frames are transmitted periodically and they contain all the  information a station will require before it can rightly transmit a frame.  

When it comes to announcing the presence of devices in a wireless computer network (WLAN), Beacon frames are used, and they can also be used in the synchronization of the devices and services

TRUE / FALSE. grouper software classifies patients for ms-ltc-drg assignments using principal diagnosis, additional diagnoses, procedures performed, sex of the patient, age, and discharge status.

Answers

Grouper software classifies patients for MS-LTC-DRG assignments using principal diagnosis, additional diagnoses, procedures performed, sex of the patient, age, and discharge status is true(Option A).

The Grouper software, commonly used for Medicare prospective payment systems, is primarily utilized for classifying patients into Medicare Severity Long-Term Care Diagnosis-Related Groups (MS-LTC-DRGs). The classification is based on the principal diagnosis, additional diagnoses, procedures performed, age, sex of the patient, and discharge status.

for further information on software visit:

https://brainly.com/question/9538617

#SPJ11

Sans serif typeface is a good choice for
a. printed documents
b.document headings
c. document text
d. document content

Answers

Answer: A Sans-serif font is a good choice for headings and small text where clarity and readability are paramount. A Serif font is good to use on larger blocks of printed text like on a flyer.

Explanation:

What is misleading about the term “overdraft protection”?

Answers

Answer:

it makes it sound beneficial but it will take money from you.

With overdraft protection, if you don't have enough money in your checking account, checks will clear and ATM and debit card transactions will still go through. If you don't have enough overdraft protection to cover a shortfall, transactions won't go through, and fees may be high.

The thing which is misleading about the term “overdraft protection” is it sounds beneficial but does not provide protection to the user.

What is an overdraft?

When an account reaches zero, a bank will provide the customer money through an overdraft to cover taxes and other expenditures called overdrafts. This loan amount is provided to customers at a certain charge.

The term "overdraft protection" is misleading because it does not prevent you from paying it back rather it only permits you to do so when your bank account is insufficient to cover the outstanding balance so that you won't look foolish if your card is rejected.

It means that the amount is just provided as a loan on a certain charge not as a free amount as benefits to the customer. In the end, customers have to pay back the withdrawn amount.

Learn more about Overdraft, here:

https://brainly.com/question/1739416

#SPJ6

Which three individuals were involved in creating programming languages?
A. Kathleen Booth
B. Charles Babbage
C. John G. Kemeny
D. Grace Hopper

Answers

The three individuals that were involved in creating programming languages are:

A. Kathleen Booth

C. John G. Kemeny

D. Grace Hopper

What is a software?

A software can be defined as a set of executable instructions that is typically used to instruct a computer system on how to perform a specific task and proffer solutions to a particular problem.

What is programming?

Programming can be defined as a process through which software developer and computer programmers write a set of instructions (codes) that instructs a software on how to perform a specific task on a computer system.

Based on historical information and records, we can infer and logically deduce that the three individuals that were involved in creating programming languages are:

Kathleen Booth John G. KemenyGrace Hopper

Read more on programming languages here: brainly.com/question/26497128

#SPJ1

What are the most important considerations when comparing computer systems? Check all of the boxes that apply.

the type of mouse
the type of keyboard
computer speed
amount of storage

Answers

C and D



Explanation:




CUAL ES LA FUNCION EN LA TECNOLOGIA ACTUAL, DE LAS TARJETAS DE DESARROLLO?

Answers

Las tarjetas de desarrollo juegan un papel fundamental en la tecnología actual, ya que son capaces de brindar seguridad y confidencialidad a la información contenida en la memoria, haciendo que los procesos sociales y organizacionales sean más sencillos y seguros.

Un circuito integrado de tarjeta es capaz de actuar como microprocesador, donde se ejecuta la lógica programada, con diversas aplicaciones como:

Tarjetas de control de accesoTarjetas de identificación de alta seguridadTarjeta de crédito

Por tanto, las tarjetas de desarrollo son capaces de almacenar información y proteger datos mediante cifrado, siendo un recurso que combina funcionalidad y seguridad para diversas capacidades técnicas y aplicaciones.

Aprende más aqui:

https://brainly.com/question/10571894

Why are programming languages like Java and Python ideal for rapid development?

Answers

Because Java, as well as Python, are high-level programs that don't need generating or parsing, they are perfect for quick development. This implies that engineers can code a program without testing it first and then publishing it.

What are programming languages?

A method of nomenclature for creating software applications is known as a computer program. The majority of formal programming are text-based, though they can also be graphical.

A substantial rise in the use of Python for machine learning and data analysis supports its status as the programming with the biggest growth. Python is a programming language with dynamic typing, while Java is a structured query and compiler language. Java is faster at play and simpler to debug thanks to this one difference, while Python is simpler to utilize and read.

Learn more about programming languages, Here:

https://brainly.com/question/12696037

#SPJ5

Increasingly, firms are turning to supply chain management and enterprise systems software applications to?

Answers

Increasingly, firms are turning to supply chain management and enterprise systems software applications to Standardize their business processes on a global basis and to create coordinated global supply chains.

What is meant by business processes?

A business process is an activity or set of activities that accomplish a specific organizational goal. Business processes should have purposeful goals, be as specific as possible and produce consistent outcomes.

What is good business process?

A business process should exist for one reason, and serve one purpose: to deliver value to both the customer and the organisation. In order to do this, it should be carefully aligned not only with customer requirements and customer satisfaction, but with the business' values and strategy.

To learn more about business process, refer

https://brainly.com/question/14476382

#SPJ4

In an "and" operator only ONE value has to be true to activate the if block
Yes or No
(Scratch Coding)

Answers

If the "and" operator is present, BOTH conditions must be True in order for the if block to be activated.

Answer:

No

Explanation:

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

In Python: Write a program to input 6 numbers. After each number is input, print the smallest of the numbers entered so far.

Sample Run:
Enter a number: 9
Smallest: 9
Enter a number: 4
Smallest: 4
Enter a number: 10
Smallest: 4
Enter a number: 5
Smallest: 4
Enter a number: 3
Smallest: 3
Enter a number: 6
Smallest: 3

Answers

Answer:

python

Explanation:

list_of_numbers = []
count = 0
while count < 6:
   added_number = int(input("Enter a number: "))
   list_of_numbers.append(added_number)
   list_of_numbers.sort()
   print(f"Smallest: {list_of_numbers[0]}")
   count += 1

How are the waterfall and agile methods of software development similar?

Answers

The waterfall and agile methods of software development are similar in that they both aim to develop software in an organized and efficient manner. However, they differ in the approach they take to achieve this goal.

The waterfall method is a linear, sequential method of software development. It follows a defined process with distinct phases, such as requirements gathering, design, implementation, testing, and maintenance. Each phase must be completed before the next phase can begin, and changes to the software are not allowed once a phase is completed.

On the other hand, Agile method is an iterative and incremental approach to software development. It emphasizes on flexibility, collaboration, and customer satisfaction. Agile method encourages regular inspection and adaptation, allowing for changes and improvements to be made throughout the development process. Agile methodologies, such as Scrum and Kanban, follow an incremental approach, where the software is developed in small chunks called iterations or sprints.

Both Waterfall and Agile approach have their own advantages and disadvantages and are suitable for different types of projects and teams. It is important to choose a method that aligns with the specific needs and goals of the project and the team.

What are like arms surrounding all the other code blocks?
A. chevrons
B. curly braces
C. square braces
D. parentheses

Answers

Answer:

Parenthesis

Explanation:

I code

Answer:

Its curly braces.

Your welcome!

Other Questions
T/Fwhen a brand team defines the target market of consumers for their product, they do not worry about identifying many smaller subsets of consumers within their broad market. Sketch a graph of f. f(x)=3x Use the graphing tool to graph the equation. _____ involves deciding how to approach and plan the risk management activities for the project.a. Identifying risksb. Planning risk managementc. Performing qualitative risk analysisd. Performing quantitative risk analysis Give correct short answers of both in 30 mins i will thumb up " 9. Is the following statement correct, wrong or partially correc? Why? "As preferred stocks have guaranteed dividends, they have lower risk than common stocks." 10. Banks usually quote saving rates using effective annual rate (EAR) and debt borrowing rates using annual percentage rate (APR). If the 1-year fixed saving account has a 2.5% interest rate, calculate the "non-arbitrage" rate for a 1-year quarterly paid personal debt. In real life, do you expect the real debt rate would be higher or lower than this "non-arbitrage" rate? 5/4 (3 1/4 I NEED HELP What percentage of gases that make up the atmosphere are found in the troposphere and atmosphere combined? Do you lose your license immediately after a DUI in Florida?. which Bantu migration extended the farthest south? write the system of government practice in Nigeria Write the function removeEnds() that removes the first and last element in the array, except that, if the array size is odd, it removes the first two elements along with the last element. The function takes 2 arguments: PLSS HELPWhy are people addicted to mobile legends(4 sentence) In WXY, y = 3.6 inches, w = 6 inches and X=147. Find the length of x, to the nearest 10th of an inch. gravity is an example of a central force that acts along the line connecting two spherical masses. hint (a) as a planet orbits its sun, how much torque does the sun's gravitational force exert on the planet? Why is the vietnam war sometimes understood as a proxy war? a typical asteroid in the asteroid belt is closest to the size ofa. the planet Mercury. b. the state of Montana. c. a boulderd. the United States. Find the simple interest owed for the loan. $3,300 at 8% for 1 year Ram and Hari both are good Swimmer and can Swim with same speed in still water, they set off across the river at the same time. Ram moves straight across and Hari is pulled downstream by the current somewhat. Hari head upstream at angle so as to arrive at a point directly opposite to straight point. Who will cross the river first? Comment. 3. How have predators changed the light and dark-colored micepopulations over time? Hello can someone please answer this question i will mark you the Brainliest A lot of pointsHow do performance standards best promote ethical behavior?A. They focus on measurements such as the biggest reward for thegreatest sales.B. They force employees to get along with each other.C. They use measurements employees understand.D. They use measurements that managers can interpret as they wish.