the _ and _ services help us to keep in touch with our family and friends

Answers

Answer 1

Answer:

Internet and communication technology


Related Questions

ink-jet printers produce text and graphics in both black-and-white and color on a variety of paper types.

Answers

On a range of paper types, ink-jet printers output text and images in both black and white and colour.

What is a printer?

A printer is a device that receives text and graphic output from a computer and prints the data on paper, typically on sheets of paper that are standard size, 8.5" by 11".

Ink-jet printers produce text and images in both black and white and colour on a variety of paper types.

Pixels are used to measure how bright an LCD monitor or LCD screen is. When a ribbon with ink is struck by small wire pins on a print head mechanism in a laser printer, printed images are created.

Thus, it is true that ink-jet printers produce text and graphics in both black-and-white and color on a variety of paper types.

For more details regarding printer, visit:

https://brainly.com/question/17136779

#SPJ1

all of the following are true of input data except? put all data fields together use some kind of formating to show that all data fields go together. they can be on a different sheet than the calculated fields they have to be on the same sheet as the calculated fields

Answers

It is a data type that the user has specified. Integer, float, char, string, and other forms of data are among them.

The assertion is untrue. The right answer is "A structure's fields are of different data kinds." A user-defined data type with one or more named attributes, each with its own data type, is referred to as a structured type. Properties that characterize a type instance are called attributes. For instance, a list of Cartesian coordinates could be one of the attributes of a geometric shape. One or more variables, maybe of various types, are grouped together and given a single name as a structure. It is a data type that the user has specified. Integer, float, char, string, and other forms of data are among them. As a result, the assertion is untrue.

Learn more about Structured type here:

https://brainly.com/question/29980987

#SPJ4

Your company plans to run large scale image analysis and processing in Azure.

You need to recommend which Azure compute service to use for the planned solution. The solution must minimize administrative effort.

Which Azure service should you recommend?

Select only one answer.

Azure Batch

Azure Functions

Azure Logic Apps

Azure virtual machines

Answers

The Azure service that should be recommended is A. Azure Batch.

What is Azure Batch ?

Azure Batch enables large-scale parallel and high-performance computing (HPC) batch jobs to be run in Azure with a minimum of administrative effort.

It can run jobs on virtual machines (VMs) that are provided and managed by Azure, and can scale out to thousands of VMs if needed. This makes it ideal for image analysis and processing, which can require significant computing power and resources.

Azure virtual machines can be used for running applications in the cloud, but may require more administrative effort for managing the VMs and scaling them as needed.

Find out more on Azure Batch at https://brainly.com/question/29907647

#SPJ1

John is having trouble keeping track of his daily school schedule. His teacher suggested printing it out where it would be easily readable. Which option would best orgainze the data?

Answers

Answer: A table or chart format would likely be the best option. This format would allow John to easily read and understand the information, and quickly find the information he needs. Another option could be a calendar format, it allows him to see the entire month at a glance and would be helpful in keeping track of deadlines, assignments and test dates. ✅

Explanation:

question 6 a data analyst reviews a database of wisconsin car sales to find the last car models sold in milwaukee in 2019. how can they sort and filter the data to return the last five cars sold at the top of their list? select all that apply.

Answers

By ranking a particular sorted column, the Sort Sheet is used to arrange all of the data in a spreadsheet.

In the column you wish to sort, choose a cell. Click Sort under the Sort & Filter group on the Data tab. Select the column you wish to sort by a custom list in the Sort dialogue box's Column section, under the "Sort by" or "Then by" box. Go to Order and choose Custom List. Placing items from a collection in some form of order is the process of sorting. A list of words, for instance, might be arranged alphabetically or by length. A list of cities might be sorted by region, zip code, or population.

To learn more about Sort Sheet click the link below:

brainly.com/question/28138049

#SPJ4

true or false an integer and float can be argument?

Answers

Answer: TRUE

Explanation:

An integer and a float can both be arguments in a function or method. They are both considered numerical data types in programming, and can be used in mathematical operations.

Now we are going to write our very first runnable JavaScript. Download a1.zip from D2L and extract the a1.html file. Rename it as a1_ Your FirstName.html. Inside the tags add the necessary JavaScript to create a word problem that includes a question and answer. • A sample word problem may look like: Q: John works for 34 weeks in a year and enjoys for the rest of the weeks. For how many weeks John enjoy? The next time the page loads, the numbers should change, so the problem may look like: assume 52 weeks in a year.
Q: John works for 26 weeks in a year and enjoys for rest of the weeks. For how many weeks John enjoy?
A: 26

Answers

To create a word problem that includes a question and answer in JavaScript, you can use the following code attached:

What is the coding  about?

The code above creates a variable called "weeksInYear" that is set to 52, which represents the total number of weeks in a year. It then creates a second variable called "weeksWorked" that is assigned a random number between 0 and 51 (since we're using the Math.floor function, the random number will be a whole number).

The "weeksEnjoyed" variable is calculated by subtracting "weeksWorked" from "weeksInYear" and this tells us the number of weeks that John is enjoying. A variable called "name" is also defined and set to "John", this is used to construct the question.

The question is written to the HTML document using the document.write() method. The question includes the number of weeks worked and the name of the person. The answer is written to the HTML document using the document.write() method as well.

Learn more about coding from

https://brainly.com/question/22654163

#SPJ1

Which of the following actions is NON-DESTRUCTIVE? CHOOSE TWO.

Everything in the Layer > Adjustments menu
The Clone Stamp tool
Converting to Grayscale
Changing the Opacity of a layer
Everything in the Adjustments panel

Answers

The following actions are non-destructive:

Everything in the Layer > Adjustments menu.

These adjustments can be made to a single layer without affecting the underlying layers. This means that you can edit the adjustments or remove them entirely without altering the original image data.

Changing the Opacity of a layer

When you change the opacity of a layer, it simply reduces the visibility of that layer but the original image data is still retained.

The Clone Stamp tool, which is used to copy pixels from one area of an image to another, can be destructive because it overwrites the original pixels.

Converting to Grayscale also discards the color information, which is considered a destructive action.

Everything in the Adjustments panel is not a valid option because it includes both destructive and non-destructive adjustments.

Automatic Updates Of Applications
There's a constant race between hackers, who try to find vulnerabilities in software, and developers, who
work to fix vulnerabilities and improve overall security. This race leads to a steady stream of updates
offered for various operating systems and applications. One way to protect your computer from attack is
to make sure your own applications are as up to date as possible, and modern operating systems offer a
way to automate your updates.
Search online using a phrase like "activate automatic updates for applications to find out how to activate
automatic updates for applications for your preferred OS: Windows OS, Mac OS X, or Linux.
1. Explain how to activate automatic updates for that system's applications (or how to verify that
automatic updates are turned on). Be sure to name the OS you are using for your answer, and
provide a link to the web page where you found your answer.

Answers

Activate the automatic app updates. To access the Store, choose Store from the Start screen. Tap Settings after sliding in from the right edge of the screen.

How do I make System programs update automatically?

The Start screen's Store option should be chosen. In the upper right corner of the Microsoft Store, choose the account menu (the three dots), and then choose Settings. Under App updates, turn on Update apps automatically.

Why is it crucial to have software update automatically?

To fix vulnerabilities detected in an application, piece of software, or operating system, developers publish updates. Automatic updates can assist in plugging security gaps that nefarious actors attempt to exploit.

To know more about automatic visit:-

https://brainly.com/question/29556906

#SPJ1

True or False, managing information on operations, customers, internal procedures and employee interactions is the domain of cognitive science.

Answers

managing information on operations, customers, internal procedures and employee interactions is the domain of cognitive science is false

what is cognitive science?

Cognitive science is study of how the mind works, functions, and behaves. As a scientific field of study, cognitive science requires applying multiple existing disciplines such as philosophy, neuroscience, or artificial intelligence in order to understand how the brain makes a decision or performs task.

Some of most common instances of cognitive study include:

Attention Span and Capacity. ...

Studying the Memory. ...

Problem-Solving, Decision-Making, and Achieving Goals. ...

Learning and Language Processing.

learn more about cognitive science at

https://brainly.com/question/7274615

#SPJ4

Use the drop-down menus to complete each sentence.
If a student wants to participate in an online experiment, she will need to access a digital
If a student wants to watch videos, listen to lectures, and take quizzes for a class, he will access a digital
If a student who is also entering the workforce needs to get some skills training for a new job, she will likely need
access to a digital

Answers

The correct answers are given below:

If a student wants to participate in an online experiment, she will need to access a digital platform or website.

If a student wants to watch videos, listen to lectures, and take quizzes for a class, he will access a digital learning management system (LMS).

If a student who is also entering the workforce needs to get some skills training for a new job, she will likely need access to a digital learning platform or online course.

What is an Online Experiment?

An online experiment refers to research that is conducted over the internet, typically using a web-based platform or website. In order to participate in such an experiment, a student will need to access the digital platform or website where the experiment is being conducted.

A digital learning management system (LMS) is a software application for the administration, documentation, tracking, reporting, and delivery of educational courses, training programs, or learning and development programs.

Read more about digital platform here:

https://brainly.com/question/14242512

#SPJ1

Answer:

1.laboratory

2.classroom

3.office

Explanation:edge

Three notable developments of artificial intelligence in the 3rdgeneration

Answers

Answer:

1. National security

AI plays a substantial role in national defense. Through its Project Maven, the American military is deploying AI “to sift through the massive troves of data and video captured by surveillance and then alert human analysts of patterns or when there is abnormal or suspicious activity.” According to Deputy Secretary of Defense Patrick Shanahan, the goal of emerging technologies in this area is “to meet our warfighters’ needs and to increase [the] speed and agility [of] technology development and procurement.”

2. Criminal justice

AI is being deployed in the criminal justice area. The city of Chicago has developed an AI-driven “Strategic Subject List” that analyzes people who have been arrested for their risk of becoming future perpetrators. It ranks 400,000 people on a scale of 0 to 500, using items such as age, criminal activity, victimization, drug arrest records, and gang affiliation. In looking at the data, analysts found that youth is a strong predictor of violence, being a shooting victim is associated with becoming a future perpetrator, gang affiliation has little predictive value, and drug arrests are not significantly associated with future criminal activity.

3. Transportation

Transportation represents an area where AI and machine learning are producing major innovations. Research by Cameron Kerry and Jack Karsten of the Brookings Institution has found that over $80 billion was invested in autonomous vehicle technology between August 2014 and June 2017. Those investments include applications both for autonomous driving and the core technologies vital to that sector.

SQL Rank films based on number of films released by year

Answers

A relational database's structured query language (SQL) is a programming language used to store and process data.

What is SQL?

In a relational database, data is stored in tabular form, with rows and columns denoting various data qualities and the relationships between the values of those attributes.

To store, update, remove, search for, and retrieve data from the database, utilize SQL statements. SQL can also be used to optimize and maintain database performance.

A well-liked query language that is commonly used in many kinds of applications is structured query language (SQL). SQL is a popular programming language among data analysts and developers because it interfaces well with other programming languages.

Therefore, A relational database's structured query language (SQL) is a programming language used to store and process data.

To learn more about SQL, refer to the link:

https://brainly.com/question/20264930

#SPJ1

Will mark brainliest if correct!
Code to be written in python

A deferred annuity is an annuity which delays its payouts. This means that the payouts do not start until after a certain duration. Notice that a deferred annuity is just a deposit at the start, followed by an annuity. Your task is to define a Higher-order Function that returns a function that takes in a given interest rate and outputs the amount of money that is left in a deferred annuity.

Define a function new_balance(principal, gap, payout, duration) that returns a single-parameter function which takes in a monthly interest rate and outputs the balance in a deferred annuity. gap is the duration in months before the first payment, payout is monthly and duration is just the total number of payouts.

Hint: Note that duration specifies the number of payouts after the deferment, and not the total duration of the deferred annuity. You are NOT ALLOWED to use string formatting and YOU SHOULD USE previous definitions of deposit and balance to answer this question!

def new_balance(principal, gap, payout, duration):
# Complete the function
return

Definitions of previous functions deposit and balance:

def deposit(principal, interest, duration):
total = principal * ((1+ interest )** duration)
return total

def balance(principal, interest, payout, duration):
for i in range(duration): #iterating for duration number of times
principal = principal*(1+interest) #compounding the principat
principal = principal-payout #subtracting payout from principal
return principal

How to run your code?
# e.g.
# test_balance = new_balance(1000, 2, 100, 2)
# result = test_balance(0.1)

Test Case:
new_balance(1000, 2, 100, 2)(0.1)
output: 1121.0

Answers

Using the knowledge in computational language in python it is possible define a function new_balance that returns a single-parameter function which takes in a monthly interest rate and outputs the balance in a deferred annuity.

Writting the code:

def new_balance(principal, gap, payout, duration):

'''

Function to calculate the balance in a deferred annuity.

principal: the amount deposited at the start

gap: the duration in months before the first payment

payout: monthly payout

duration: the number of payouts after the deferment

'''

# define the inner function

def balance(rate):

 '''

 Function to calculate the balance, given the monthly interest rate

 '''

 # first calculate the interest earned during the deferment period

 interest = principal * (1 + rate) ** gap - principal

# then calculate the balance after the first payout

 balance = interest + principal - payout

# then loop through the remaining payouts, calculating the balance after each one

 for i in range(duration - 1):

  balance = balance * (1 + rate) - payout

 # finally, return the balance

 return balance

return balance

test_balance = new_balance(1000, 2, 100, 2)

result = test_balance(0.1)

print("{:.1f}".format(result))

See more about python at brainly.com/question/18502436

#SPJ1

Where is an intrusion protection system usually placed?
Outside of the network
Between the company servers and the internet
Between users
After the company servers

Answers

Answer:

between the company's internal network and the internet

Explanation:

An intrusion protection system is usually placed between the company's internal network and the internet, to protect the network from external threats. This is known as a perimeter firewall

when this setting is enabled, this account can only access content that is appropriate for all audiences. additionally, communication settings will be set to off.
a. true
b. false

Answers

The second adage states that we must provide the appropriate quantity of information, neither more nor less.

According to H. Paul Grice, when we connect with other individuals, communication is successful because of the cooperative principle. To ensure that we are cooperating and have a mutual acceptance to interpret the other in a particular way, Grice devised a set of maxims. The first axiom states that we must tell the truth or anything that can be verified by facts. The second adage states that we must provide the appropriate quantity of information, neither more nor less. The third rule states that we must provide a response that is relevant to the topic at hand. The fourth rule is that we must express ourselves clearly.

Learn more about Communication  here:

https://brainly.com/question/17372112

#SPJ4

Identify the examples of goals. Select three options

Answers

1. To increase company profits by 10% over the next quarter

2. To run a marathon in under 4 hours

3. To become fluent in French within the next year

What is a requirement?

Answers

The correct answer is a desired or required thing: necessity. Production was insufficient to meet military demands. : a prerequisite for the occurrence or presence of another thing: condition.

A prerequisite is a trait or attribute you must possess in order to engage in an activity or qualify for a position. Commonly accepted requirements are divided into three groups: functional requirements, non-functional requirements, and domain requirements. Functional requirements, according to IEEE, are "a task that a system or component must be able to do." A description of the characteristics the bespoke product must offer, the environment in which it must operate, and the functional specification of the system are established through the requirements process.

To learn more about prerequisite click the link below:

brainly.com/question/19504182

#SPJ4

how can i make money while i sleep?

Answers

Answer:

look below

Explanation:

you can make money while you sleep by starting a business that is fully automated by your employees (preferably online) so you don’t have to do any work. it should be online because people from different time zones can order your products.

Prepare Mounthly Payroll to xy Company which Calculate Tax, Pension Allowance, over time and Vet for each employce​

Answers

Make a payroll calculation using ADP® Payroll. Get 3 Months of Payroll Free! ADP® Payroll makes the payroll process quicker and simpler. Get ADP® Payroll Started Today! Time and presence. IRS tax deductions.

How do you calculate Monthly Payroll ?

You're ready to determine the employee's pay and the amount of taxes that must be deducted once you've set up your employees (and your firm, too). Making appropriate deductions for things like health insurance, retirement benefits, or garnishments, and, if necessary, adding back reimbursements for expenses. Going from gross compensation to net pay is the technical word for this.

Feel free to jump to the step you're searching for if you're having trouble understanding a particular one: First, determine your gross pay. Step 2: Determine the employee tax with holdings for 2019 or earlier and 2020 or later. Add any expense reimbursements in step four. Step 5: Compile everything.

To learn more about Payroll refer to :

https://brainly.com/question/30086703

#SPJ1

homework: monte carlo estimation in preparation for the lab, carefully review the code below and answer these questions. what does this program do? what is the program output if the user enters 10000 when prompted for the number of points? how would your answer to the above question change if the test in line 15 used

Answers

A set of signs or symbols used in communication: a set of signs, such as letters or numerals, that stand for preset, frequently unspoken meanings.

A mumbo jumbo number generator is available in the Random component; it generates numbers that are 0.1 apart and outputs a mumbo jumbo number that is between 0.0 and 1.0. A set of signs or symbols used in communication: a set of signs, such as letters or numerals, that stand for preset, frequently unspoken meanings. Text written in a programming language by a computer programmer is referred to as code, often known as source code. Examples include the programming languages C, C#, Java, Perl, and PHP. Less formally, content written in markup or style languages like HTML and CSS is also referred to as "code."

Learn more about Source code here:

https://brainly.com/question/30298780

#SPJ4

question 7 you are using tableau public to create a data visualization. in order to keep your visualization hidden from other users, you click the show/hide icon.
a. true
b. false

Answers

To generate a data visualization, you are working using Tableau Public.Click the show/hide icon if you want to keep your visualization private.

The method of graphically presenting information and data is known as data visualization. By utilizing visual elements like charts, graphs, and maps, data visualization tools provide a simple method for identifying trends, outliers, and patterns in data. Big data technologies and tools are essential for processing enormous amounts of data and for making data-driven decisions. With Tableau Public, you can explore, make, and share data visualizations online for no cost. Learning about data is simple because to Tableau Public's accessibility to the world's greatest library of data visualizations for educational purposes. By building an online portfolio of your work and gaining knowledge from an inexhaustible supply of data, you may advance your analytics profession.

Learn more about Data visualization here:

https://brainly.com/question/30328970

#SPJ4

After entering the sympathetic chain, preganglionic nerve fibers may do which of the following? Select all that apply.

Answers

Preganglionic nerve fibres may synapse with postganglionic neurons after entering the sympathetic chain, which will then deliver the impulse to a target organ or tissue.

The spinal cord's sympathetic chain, a network of nerves, is in charge of triggering the body's "fight or flight" reaction. Preganglionic nerve fibres are bundles of nerve cells in the sympathetic chain that emerge from the spinal cord and go to the sympathetic ganglia. The postganglionic nerve fibres that these fibres synaptically connect with subsequently move to the target organs to initiate the sympathetic response. Preganglionic nerve fibres have a variety of effects, such as speeding up heartbeat, widening pupils, and boosting blood flow to muscles. The sympathetic chain, in its entirety, is essential for triggering the body's reaction to stress or danger, preparing the body for physical activity or to defend against a potential threat.

To know more about Never fiber Please click on the given link:

https://brainly.com/question/29929000

#SPJ4

programming assignment: create a program searchnewbooks.cc that given as command line input newbooks.dat and request.dat and a method of search either binary or linear, creates a file of the number of books found from the request list $searchnewbooks newbooks.dat request.dat //run program $choice of search method ([l]inear, [b]inary, [r]ecursivebinary)? b cpu time: 10.777 microseconds $cat found.dat 1

Answers

This program is designed to search for books from a given list and a request list.

What is program?

It takes two command line arguments: newbooks.dat which contains the list of books, and request.dat which contains the list of books to search for. It also takes a method of search, either linear, binary or recursive binary. The program then searches the list of books in newbooks.dat and finds the books from the request list in request.dat. It then creates a file called found.dat which contains the number of books found from the request list.

The program starts by reading in the two files and storing the data in data structures. It then checks the user's choice of search method and performs the appropriate search. If the user chooses linear search, the program will iterate through the list of books until it finds the requested book. If the user chooses binary search, the program will first sort the list of books, then use a binary search algorithm to find the requested book. If the user chooses recursive binary search, the program will use a recursive binary search algorithm to find the requested book.

Once the requested book is found, the program will increment a counter that keeps track of the number of books found. The program will also keep track of the CPU time used for the search. Finally, the program will output the number of books found and the CPU time used to found.dat.

In summary, this program is designed to search a list of books and find the requested books from a request list. It takes two files, newbooks.dat and request.dat, and a search method as command line input. It then creates a file called found.dat which contains the number of books found from the request list and the CPU time used.

To learn more about program
https://brainly.com/question/27359435
#SPJ4

help, describe a typical Consultants relationship of change

like an it consultant and how they deal with change and how often things change​

Answers

A consultant's relationship with change is often characterized by a high degree of flexibility. They are typically able to quickly adjust to new situations and rapidly adapt to changing conditions. They are often comfortable with the idea of change, and are able to quickly identify and analyze potential changes in the environment. They are also often able to anticipate changes in the environment and adjust their strategies accordingly. Consultants are also often able to provide valuable insight into how changes may affect their clients, as well as how to best manage and implement those changes. In addition, consultants are often comfortable with the idea of change and are able to quickly identify and analyze potential changes in the environment.

Prasana has been hired by a book author to listen to record interviews and type them into documents. what is her job?
A: Transcriptionist
B: Data entry clerk
C: Writer
D: Receptionist

Answers

The solution is option A, or transcriptionist, based on the facts provided in the question.

What does a clerk who enters data do?

Refreshing the database by including up-to-date information about customers and accounts. source data is organized by gathering and sorting data to get it ready for computer entry. establishes the order of entries. By checking the data for errors, customer and accounts source documents are processed.

How can someone without experience begin data entry?

You require a high school graduation or the equivalent, together with the capacity to exhibit attention to detail, to work as a clerk for data entry without prior experience. Without prior expertise, employers recruit data entry clerks and train people on the data tools they use.

To know more about Data entry clerk visit:

https://brainly.com/question/14856993

#SPJ1

Correct the formula in cell H5 by making cell F12 an absolute reference. Copy the formula to the range H6:H11.

Answers

The  formula in cell H5 that has been corrected is given below

To correct the formula in cell H5 by making cell F12 an absolute reference, the formula would be modified as follows:

Original formula: =SUM(F5:F11)*F12

Modified formula: =SUM(F5:F11)*$F$12

What is the correct formula about?

To copy the modified formula to the range H6:H11, you would need to select the cell H5, and then drag the fill handle (the small square in the bottom-right corner of the cell) to the range H6:H11.

The modified formula will be copied to all the cells in the range H6:H11, and the reference to cell F12 will remain an absolute reference, so it will not change when the formula is copied.

Also, you can also use the "Paste Special" method. In which you can copy the cell H5, right-click on the cell H6, select "Paste Special" and then select "Formulas" and then click OK. This will copy the formula to the range H6:H11.

Learn more about  absolute reference from

https://brainly.com/question/23944876

#SPJ1

An unordered list can use one of four different bullet options: disc, square, circle, or triangle.
TRUE OR FALSE

Answers

False. An unordered list can use different types of bullet options, but the specific options you mentioned (disc, square, circle, triangle) are not the only possible options. Unordered list bullet styles can vary depending on the specific implementation and the medium in which they are used (e.g. HTML, CSS, Word Processing software), but the common bullet styles are bullet point, circle and square.

4.2.5 Text Messages Messages.java 1 public class Messages extends ConsoleProgram 2 - { 3 public void run() 4- 5 6 7 8

public void run()
{
// The first text is from bart to Lisa says, "Where are you?" The second text message is from Lisa to Bart and says,"I'm at school"//
}

Answers

Thus, maintaining one public class per source file allows for a more effective lookup of the source and generated files during linking, which speeds up compilation (import statements).

Can there be only one public class in Java?

The number of classes that can be used in a single Java program is not limited. However, there should only be one class specified with a public access specifier in any Java program. In a single Java application, there can never be two public classes. A member's access can be made public by using the Java keyword public.

All other classes can see public members. Any other class can now access a public field or method, according to this. he said so, therefore! so that the class definition may be quickly found by the compiler. Compiling is simpler that way. No, you must ensure that just one class out of any multiple classes defined in a Java file is public.

To learn more about java programming refer to :

https://brainly.com/question/25458754

#SPJ1

Write C program and use typedef to create a structure called twoDShape that contains
character arrays name[20], an integer numberOfEdges, and two float radius and
area. The program then reads a list of 2D shapes from the user (up to 10 shapes).
Remember a circle needs radius instead of edges.
Using a pointer shapePtr that points to the list of shapes, display the information back
to the users together with the area of the shape. For triangle you need to ask for values
of the height(h) and base(b), while for square and circle use your own common-sense.
Use the formula below for triangle. All values are of type float and π = 3.14159

Answers

#include <stdio.h>

typedef struct {

   char name[20];

   int numberOfEdges;

   float radius;

   float area;

} twoDShape;

int main() {

   twoDShape shapeList[10];

   twoDShape *shapePtr;

   shapePtr = shapeList;

   for (int i = 0; i < 10; i++) {

       printf("Enter name of shape: ");

       scanf("%s", shapePtr->name);

       printf("Enter number of edges (or -1 for a circle): ");

       scanf("%d", &shapePtr->numberOfEdges);

       if (shapePtr->numberOfEdges == -1) {

           printf("Enter radius of circle: ");

           scanf("%f", &shapePtr->radius);

           shapePtr->area = 3.14159 * (shapePtr->radius * shapePtr->radius);

       } else if (shapePtr->numberOfEdges == 3) {

           float h, b;

           printf("Enter value of height: ");

           scanf("%f", &h);

           printf("Enter value of base: ");

           scanf("%f", &b);

           shapePtr->area = (h * b) / 2;

       } else if (shapePtr->numberOfEdges == 4) {

           float l;

           printf("Enter value of length: ");

           scanf("%f", &l);

           shapePtr->area = l * l;

       }

       shapePtr++;

   }

   shapePtr = shapeList;

   for (int i = 0; i < 10; i++) {

       printf("Shape: %s\n", shapePtr->name);

       printf("Number of edges: %d\n", shapePtr->numberOfEdges);

       printf("Area: %f\n", shapePtr->area);

       shapePtr++;

   }

   return 0;

}

Other Questions
evelyn has 80 pens 15 pens are black and the other pens are bluewhat is the probability of a black pen a. Apply the bottom-up dynamic programming algorithm to the followinginstance of the knapsack problem:item weight value1 3 $252 2 $203 1 $154 4 $405 5 $50, capacity W = 6.b. How many different optimal subsets does the instance of part (a) have?c. In general, how can we use the table generated by the dynamic programming algorithm to tell whether there is more than one optimal subsetfor the knapsack problems instance? calculate the density, in g/l, of sf6 gas at 27c and 0.5 atm determine the expression of k in terms of a in order to achieve zero steady-state error to a unit step input. (10 points) low-income women of all ethnicities may be less likely to marry because they A 2003 study looking at misperceptions about the Iraq war concluded that the frequency with which those beliefs were held varied dramatically depending on ______. which category of software would programming languages fall into? group of answer choices A. application software B. system software C. development software D. all of the above Give the basic units that are used in surveying for length, area, volume, and angles in (a) The English system of units. (b) The SI system of units. An organizations most important resource is the people who work in that organization. The quality of the people who work in an organization, that is, the overall value they bring to the organization, is based on the ability of the Human Resources Department to find the right people, bring them into the organization, get them in the right positions, support their continued growth and professional development, and to ensure they are fairly compensated in return for the investment of their skill set into the organization. Explain the HRM process. In particular explain why each stage in the process is critical, what happens if any part of the process is neglected, and what happens when the HRM process works well and consistently What is the value of the variable result after the following statement has been executed?int result = 1+2 * 3+4;a. 21b. 15c. 13d. 11e. None of the Above Your current CD matures in a few days. You would like to find an investment with a higher rate of return than the CD. Stocks historically have a rate of return between 10% and 12%, but you do not like the risk involved. You have been looking at bond listings in the newspaper. A friend wants you to look at the following corporate bonds as a possible investment. If you buy three of the ABC bonds with $10 commission for each, how much will it cost?a. $3142. 50b. $1047. 50c. $3172. 50d. $1077. 50 While listening to a lecture on persuasive communications, you hear your professor use the term "logos." Which of the following examples might be used to illustrate logos? Bill Gates is often cited as one of the most respected people in the world. He has tremendous credibility, delivering on his promise to donate at least 50% of his wealth to charitable causes, and his philanthropic expertise is unrivaled. When talking about the importance of meeting customer needs, David Ber, the CEO of Dollar General, tells a story about the time he was visiting a Dollar General store. A shopper at the store took him to see another Dollar General store, which was run down and dirty. "This store is only a few blocks from my house,' she told him. 'But I drive an extra 10 minutes to get to the other one, because 1 don't like sthopping at this one.... that extra 10 minutes is time 1 don't have, It's time away from my kids, who get far too little of my time as it ls." The Australian Preventative Task. Force issues a report calling for Australians to decrease their consumption of alcohol because "At higher levels of drinking, the lifetime risk of alcohol-related disease increases more dramatically for women, and the lifetime risk of alcoholrelated injury increases more dramatically for men." Corey Maggette, the oldest player on the Detroit Pistons basketball team, sees Brandon Knight, a second-year point guard, as the leader of the team. Referring to Knight, Maggette says, "It starts with Brandon Knight. He is the key to this team..II think he's going to step up very well to lead this team." the process of identifying and encouraging as many applicants as possible to apply for a position refers to employee recruiting. A local doughnut shop reduced the price of its doughnuts from $4 per dozen to $3.50 per dozen, and as a result, the daily sales increased from 300 to 400 dozen. this indicates that the price elasticity of demand for the doughnuts was: a. indeterminate; more information is needed to determine the price elasticity of demand. b. inelastic. c. elastic. d. unitary elastic. an oppressive national governmentWhich of the following factors did NOT play a significant role in building support for replacing the Articles of Confederation with a different instrument of government? Let S be the surface defined by the unit sphere x^2 + y^2 + z^2 = 1, and let S be oriented with outward unit normal. Find the flux of the vector field F(x, y, z) = zk across S. Consider the following sample regression equation: yhat=17+5x1+3x2. Interpret the value 5. For a unit increase in x1, the average value of y will increase by 5 units, holding x2 constant. The estimated linear regression equation is yhat=-15+3x. The interquartile range is IQR = 03 Q1. Thus, it can be thought of as Multiple Choice the 75% interquartile range_ the quartile or 25% of the variable: the middle 50% of the variable. the incorporation of all observations a. Provide an equation for the acid-catalyzed condensation of ethanoic (acetic) acid and 3- methylbutanol (isopentyl alcohol). Please use proper condensed structural formulas. Compare this product with the ester that you would isolate from the esterification of 4-methylpentanoic acid with methanol. Provide an equation for this reaction as well. Are these products isomers and if so what type of isomer are they?b. Plan how you will do this organic synthesis, i.e. what is the limiting reactant (acetic acid or isopentyl alcohol) and what would be in excess. To begin, consult the Reagents Table in the lab experimental section and determine which compound is the limiting reactant. Show work for any necessary calculations to receive full credit. tunneling can be used to prevent eavesdropping by encrypting the packets exchanged. true or false