Use a one-dimensional array to solve the following problem: A company pays its salespeople on a commission basis. The salespeople receive $200 per week plus 9% of their gross sales for that week. For example, a salesperson who grosses $5,000 in sales in a week receives $200 plus 9% of $5,000, or a total of $650. Write an app (using an array of counters) that determines how many of the salespeople earned salaries in each of the following ranges (assume that each salesperson's salary is an integer). a) $200–299
b) $300–399
c) $400–499
d) $500–599
e) $600–699
f) $700–799
g) $800–899
h) $900–999
i) $1000 and over
Summarize the results in tabular format.

Answers

Answer 1

Answer: Provided in the explanation section

Explanation:

import java.util.Scanner;

public class commission

{

   public static void main(String[] args) {

      Scanner input = new Scanner(System.in);

        int totals[]={0,0,0,0,0,0,0,0,0};          

      int n,sales,i,index;

       double salary;

        System.out.print("how many salesmen do you have? ");                          

      n=input.nextInt();

        for(i=1;i<=n;i++)

           {System.out.print("Salesman "+i+" enter sales: ");

            sales=input.nextInt();

            salary=200+(int)(.09*sales);

               System.out.printf("Salary=$%.2f\n",salary);

            index=(int)salary/100-2;

            if(index>8)

                index=8;

            totals[index]++;

            }

        System.out.println("SUMMARY\nSALES\t\tCOUNT");

        for(i=0;i<8;i++)

           System.out.println("$"+(i*100+200)+"-"+(i*100+299)+"\t"+totals[i]);

        System.out.println("$1000 and over\t"+totals[i]);

       }                                

   }

 

cheers i  hope this helped !!      


Related Questions

Write a program that reads a list of words. Then, the program outputs those words and their frequencies. Ex: If the input is: hey hi Mark hi mark the output is: hey 1 hi 2 Mark 1 hi 2 mark 1

Answers

Answer:

#Declare variable to get the input

#list from the user

input_list = input()

#split the list into words by space

list = input_list.split()

#Begin for-loop to iterate each word

#to get the word frequency

for word in list:

#get the frequency for each word

frequency=list.count(word)

#print word and frequency

print(word,frequency)

Explanation:

This program that we are told to write will be done by using python programming language/ High-level programming language.

The question wants us to write a program in which the output will be as below;

hey 1

hi 2

Mark 1

hi 2

mark 1

Just by imputing hey hi mark hi mark.

Just copy and run the code below.

#Declare variable to get the input

#list from the user

input_list = input()

#split the list into words by space

list = input_list.split()

#Begin for-loop to iterate each word

#to get the word frequency

for word in list:

#get the frequency for each word

frequency=list.count(word)

#print word and frequency

print(word,frequency)

In this exercise we have to use the knowledge in computational language in python to write the following code:

We have the code can be found in the attached image.

So in an easier way we have that the code is

input_list = input()

list = input_list.split()

for word in list:

frequency=list.count(word)

print(word,frequency)

See more about python at brainly.com/question/18502436

In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure, including the interruption of service, restoration of data from backups, and notification of appropriate individuals?
a. Full-interruption
b. Desk check
c. Simulation
d. Structured walk-through

Answers

Answer:Full-interruption--A

Explanation:  The Full-interruption is one of the major steps for  a Disaster Recovery Plan, DRP which ensures businesses are not disrupted by saving valuable resources during a disaster like a data breach from fire or flood.

Although expensive and very risky especially in its simulation of a disruption, this thorough  plan ensures that when a disaster occurs, the  operations are shut down at the primary site and are transferred to the recovery site allowing Individuals follow every procedure, ranging from the interruption of service to the restoration of data from backups, also with the notification of appropriate individuals.

Create a program that asks the user to enter grade scores. Use a loop to request each score and add it to a total. Continue accepting scores until the user enters a negative value. Finally, calculate and display the average for the entered scores.

Answers

Answer:

total = 0

count = 0

while(True):

   grade = float(input("Enter a grade: "))

   if grade < 0:

       break

   else:

       total += grade

       count += 1

       

average = total/count

print("The average is: " + str(average))

Explanation:

*The code is in Python.

Initialize the total and count as 0

Create a while loop that iterates until a specific condition is met inside the loop

Inside the loop, ask the user to enter a grade. If the grade is smaller than 0, stop the loop. Otherwise, add the grade to the total and increment the count by 1.

When the loop is done, calculate the average, divide the total by count, and print it

What is a manifold on a vehicle

Answers

Answer:

the part of an engine that supplies the fuel/air mixture to the cylinders

Explanation:

There is also an exhaust manifold that collects the exhaust gases from multiple cylinders into a smaller number of pipes

Consider a recurrent neural network that listens to a audio speech sample, and classifies it according to whose voice it is. What network architecture is the best fit for this problem

Answers

Answer:

Many-to-one (multiple inputs, single output)

Explanation:

Solution

In the case of a recurrent neural network that listens to a audio speech sample, and classifies it according to whose voice it is, the RNN will listen to the audio and will give result by doing classification.

There will be a single output, for the classified or say identified person.

The RNN will take a stream of input as the input is a audio speech sample.

Therefore, there will be multiple inputs to the RNN and a single output, making the best fit Architecture to be of type Many-to-one(multiple inputs, single output).

In 1987, Congress passed the Computer Security Act (CSA). This was the first law to address federal computer security. Under the CSA, every federal agency had to inventory its IT systems. Agencies also had to create security plans for those systems and review their plans every year.
A. True
B. False

Answers

Answer:

A.) True is the answer hope it helps

Probability of theft in an area is 0.03 with expected loss of 20% or 30% of things with probabilities 0.55 and 0.45. Insurance policy from A costs $150 pa with 100% repayment. Policy with B, costs $100 pa and first $500 of any loss has to be paid by the owner. Which data mining technique can be used to choose the policy?

Answers

Answer:

Decision trees

Explanation:

Decision trees mainly include categorization and estimation. It is often used as a measure of selection. This also encourages the usage and choice of particular data within the overall structure.

In the given situation, we should choose Policy A has cost $150 as it has 100% repayment while on the other hand Policy B has cost $100 and the first $500 of loss would be paid by the owner

So for choosing the policy,  we use the decision tree data mining technique as we have to take the decision with respect to minimizing the cost

Data mining technique which can be used to choose the policy is decision tree.

The data mining technique that can be used are as follows,

Categorization and estimate are the two major functions of decision trees,Decision tree frequently used as a selection criterion. This promotes the use and selection of specific data within the broader framework.

According to given data,

We should pick Policy A, which costs $150 and has a 100% payback rate.Whereas, the owner would be responsible for the first $500 of loss under Policy B, which costs $100.

Here choosing the correct policy, decision tree is used.

Learn more: brainly.com/question/15247828

The following numbers are inserted into a linked list in this order:
10, 20, 30, 40, 50, 60
What would the following statements display?
pCur = head->next;
cout << pCur->data << " ";
cout << pCur->next->data << endl;
a) 20 30
b) 40 50
c) 10 20
d) 30 40

Answers

Answer:

A. 20 30

Explanation:

Given

Linked list: 10, 20, 30, 40, 50, 60

Required

The output of the following code segment

pCur = head->next;

cout << pCur->data << " ";

cout << pCur->next->data << endl;

A linked list operates by the use of nodes which begins from the head to the next node, to the next, till it reaches the last;

The first line of the code segment; "pCur = head->next; " shifts the node from the head to the next node

The head node is the node at index 0 and that is 10;

This means that the focus has been shifted to the next at index 1 and that is 20;

So, pCur = 20

The next line of the code segment; cout << pCur->data << " "; prints pCur and a blank space

i.e. "20 " [Take note of the blank space after 20]

The last line "cout << pCur->next->data << endl; " contains two instructions which are

1. pCur = next->data;

2. cout<<pCur->data;

(1) shifts focus to the next node after 20 ; This gives pCur = 30

(2) prints the value of pCur

Hence, the output of the code segment is 20 30

Suppose that class OrderList has a private attribute double cost[100] which hold the cost of all ordered items, and a private attributes int num_of_items which hold the number of items ordered. For example, if num_of_items is 5, then cost[0], cost[1], ..., cost[4] hold the cost of these 5 items. Implement the member function named total_cost which returns the total cost of this OrderList.

Answers

Answer:

OrderList.java

public class OrderList {    private double cost[];    private int num_of_items;        public OrderList(){        cost = new double[100];    }    public double total_cost(){        double total = 0;        for(int i=0; i < num_of_items; i++){            total += cost[i];        }        return total;    } }

Main.java

public class Main {    public static void main(String[] args) {        OrderList sample = new OrderList();        double totalCost = sample.total_cost();    } }

Explanation:

Firstly, define a class OrderList with two private attributes, cost and num_of_items (Line 1-3). In the constructor, initialize the cost attribute with a double type array with size 100. Next, create another method total_cost() to calculate the total cost of items (Line 9-15). To implement the total_cost member function, create an OrderList instance and use that instance to call the total_cost() and assign it to totalCost variable.

What program is best for teaching young people code?

Answers

I’d probably say scratch, Its great for young people to learn how to code. Lots of things you can do and make with it.

7d2b:00a9:a0c4:0000:a772:00fd:a523:0358 What is IPV6Address?

Answers

Answer:

From the given address:  7d2b:00a9:a0c4:0000:a772:00fd:a523:0358

We can see that:

There are 8 groups separated by a colon.Each group is made up of 4 hexadecimal digits.

In general, Internet Protocol version 6 (IPv6) is the Internet Protocol (IP) which was developed to deal with the expected anticipation of IPv4 address exhaustion.

The IPv6 addresses are in the format of a 128-bit alphanumeric string which is divided into 8 groups of four hexadecimal digits. Each group represents 16 bits.

Since the size of an IPv6 address is 128 bits, the address space has [tex]2^{128}[/tex] addresses.

The new Director of Information Technology has asked you to recommend a strategy to upgrade the servers on their network. Recommendations on server hardware, CPU chip set, speed, and caching are needed. You should also recommend which servers to upgrade first and determine whether any servers are still appropriate to keep.

Answers

Answer:

servers to be upgraded are : APPLICATION AND LOAD BALANCING SERVERS

servers still appropriate to use : DNS AND DHCP SERVERS

Explanation:

The recommendations to be made in line with what the new director of information is asking for includes :

1 ) For the servers to be upgraded : The servers that requires upgrades  includes the APPLICATION SERVER and LOAD BALANCING SERVER. this is because these two servers are critical to the growth/expansion of any business, and they handle large volume of data

Recommendations on the servers upgrade includes:

Hardware : 2.3 GHz Intel Xeon Gold 5118 12-Core

CPU chip set :  Socket: FCLGA3647, Type: NSBM

Speed : processor 3.2 GHz

caching:   > 100 Gb

2)  For servers that do not necessarily need to be upgraded : The servers that do not need immediate upgrade are DNS and DHCP

Compute -ABE16-DF416 using 15’s complement

Answers

Answer:

33600

Explanation:

Let M = ABE16

and N = DF416

In hexadecimal representation: 10 = A, 11 = B, 12 = C, 13 = D, 14 = E, 15 = F

Step 1: Find the 15's complement of N

 F  F  F  F  F

- D  F  4  1  6

2  0  B  E  9

Step 2: Add 15's complement of N to M

  A  B  E  1  6

+ 2  0  B  E  9  

  C  C  9  F  F

Step 3: Find the 15's complement of CC9FF

 F  F   F  F  F

- C  C  9  F  F

 3   3  6  0  0

Therefore, ABE16 - DF416 using 15's complement is 33600

Part 1: For this assignment, call it assign0 Implement the following library and driver program under assign0: Your library will be consisting of myio.h and myio.c. The function prototypes as well as more explanations are listed in myio.h. Please download it and accordingly implement the exported functions in myio.c. Basically, you are asked to develop a simple I/O library which exports a few functions to simplify the reading of an integer, a double, and more importantly a string (whole line). In contrast to standard I/O functions that can read strings (e.g., scanf with "%s", fgets) into a given static size buffer, your function should read the given input line of characters terminated by a newline character into a dynamically allocated and resized buffer based on the length of the given input line. Also your functions should check for possible errors (e.g., not an integer, not a double, illigal input, no memory etc.) and appropriately handle them. Then write a driver program driver.c that can simply use the functions from myio library. Specifically, your driver program should get four command-line arguments: x y z output_filename. It then prompts/reads x many integers, y many doubles, and z many lines, and prints them into a file called output_filename.txt. Possible errors should be printed on stderr.

myio.h file

/*
* File: myio.h
* Version: 1.0
* -----------------------------------------------------
* This interface provides access to a basic library of
* functions that simplify the reading of input data.
*/

#ifndef _myio_h
#define _myio_h

/*
* Function: ReadInteger
* Usage: i = ReadInteger();
* ------------------------
* ReadInteger reads a line of text from standard input and scans
* it as an integer. The integer value is returned. If an
* integer cannot be scanned or if more characters follow the
* number, the user is given a chance to retry.
*/

int ReadInteger(void);

/*
* Function: ReadDouble
* Usage: x = ReadDouble();
* ---------------------
* ReadDouble reads a line of text from standard input and scans
* it as a double. If the number cannot be scanned or if extra
* characters follow after the number ends, the user is given
* a chance to reenter the value.
*/

double ReadDouble(void);

/*
* Function: ReadLine
* Usage: s = ReadLine();
* ---------------------
* ReadLine reads a line of text from standard input and returns
* the line as a string. The newline character that terminates
* the input is not stored as part of the string.
*/

char *ReadLine(void);

/*
* Function: ReadLine
* Usage: s = ReadLine(infile);
* ----------------------------
* ReadLineFile reads a line of text from the input file and
* returns the line as a string. The newline character
* that terminates the input is not stored as part of the
* string. The ReadLine function returns NULL if infile
* is at the end-of-file position. Actually, above ReadLine();
* can simply be implemented as return(ReadLineFile(stdin)); */

char *ReadLineFile(FILE *infile);

#endif

Answers

Answer:

Explanation:

PROGRAM

main.c

#include <fcntl.h>

#include <stdio.h>

#include <stdlib.h>

#include <sys/stat.h>

#include <sys/types.h>

#include <unistd.h>

#include "myio.h"

int checkInt(char *arg);

int main(int argc, char *argv[]) {

  int doubles, i, ints, lines;

  char newline;

  FILE *out;

  int x, y, z;

  newline = '\n';

  if (argc != 5) {

     printf("Usage is x y z output_filename\n");

     return 0;

  }

  if (checkInt(argv[1]) != 0)

     return 0;

  ints = atoi(argv[1]);

  if (checkInt(argv[2]) != 0)

     return 0;

  doubles = atoi(argv[2]);

  if (checkInt(argv[3]) != 0)

     return 0;

  lines = atoi(argv[3]);

  out = fopen(argv[4], "a");

  if (out == NULL) {

     perror("File could not be opened");

     return 0;

  }

  for (x = 0; x < ints; x++) {

     int n = ReadInteger();

     printf("%d\n", n);

     fprintf(out, "%d\n", n);

  }

  for (y = 0; y < doubles; y++) {

     double d = ReadDouble();

     printf("%lf\n", d);

     fprintf(out, "%lf\n", d);

  }

  for (z = 0; z < lines; z++) {

     char *l = ReadLine();

     printf("%s\n", l);

     fprintf(out, "%s\n", l);

     free(l);

  }

  fclose(out);

  return 0;

}

int checkInt(char *arg) {

  int x;

  x = 0;

  while (arg[x] != '\0') {

     if (arg[x] > '9' || arg[x] < '0') {

        printf("Improper input. x, y, and z must be ints.\n");

        return -1;

     }

     x++;

  }

  return 0;

}

myio.c

#include <limits.h>

#include <stdio.h>

#include <stdlib.h>

#include <unistd.h>

char *ReadInput(int fd) {

  char buf[BUFSIZ];

  int i;

  char *input;

  int r, ret, x;

  i = 1;

  r = 0;

  ret = 1;

  input = calloc(BUFSIZ, sizeof(char));

  while (ret > 0) {

     ret = read(fd, &buf, BUFSIZ);

   

     for (x = 0; x < BUFSIZ; x++) {

        if (buf[x] == '\n' || buf[x] == EOF) {

           ret = -1;

           break;

        }

        input[x*i] = buf[x];

        r++;

     }

   

     i++;

   

     if (ret != -1)

        input = realloc(input, BUFSIZ*i);

  }

  if (r == 0)

     return NULL;

  input[r] = '\0';

  input = realloc(input, r+1);

  return(input);

}

int ReadInteger() {

  char *input;

  int go, num, x;

  go = 0;

  do {

     go = 0;

   

     printf("Input an integer\n");

     input = ReadInput(STDIN_FILENO);

     for (x = 0; x < INT_MAX; x++) {

        if (x == 0&& input[x] == '-')

           continue;

        if (input[x] == 0)

           break;

        else if (input[x]> '9' || input[x] < '0') {

           go = 1;

           printf("Improper input\n");

           break;

        }

    }

  } while (go == 1);

  num = atoi(input);

  free(input);

  return num;

}

double ReadDouble(void) {

  int dec, exp;

  char *input;

  int go;

  double num;

  int x;

  do {

     go = 0;

     dec = 0;

     exp = 0;

   

     printf("Input a double\n");

     input = ReadInput(STDIN_FILENO);

     for (x = 0; x < INT_MAX; x++) {

        if (x == 0&& input[x] == '-')

           continue;

        if (input[x] == 0)

           break;

        else if (input[x] == '.' && dec == 0)

           dec = 1;

        else if (x != 0&& (input[x] == 'e' || input[x] == 'E') && exp == 0) {

           dec = 1;

           exp = 1;

        }

        else if (input[x]> '9' || input[x] < '0') {

           go = 1;

           printf("Improper input\n");

           break;

        }

     }

  } while (go == 1);

  num = strtod(input, NULL);

  free(input);

  return num;

}

char *ReadLine(void) {

  printf("Input a line\n");

  return(ReadInput(STDIN_FILENO));

}

char *ReadLineFile(FILE *infile) {

  int fd;

  fd = fileno(infile);

  return(ReadInput(fd));

}

myio.h

#ifndef _myio_h

#define _myio_h

/*

* Function: ReadInteger

* Usage: i = ReadInteger();

* ------------------------

* ReadInteger reads a line of text from standard input and scans

* it as an integer. The integer value is returned. If an

* integer cannot be scanned or if more characters follow the

* number, the user is given a chance to retry.

*/

int ReadInteger(void);

/*

* Function: ReadDouble

* Usage: x = ReadDouble();

* ---------------------

* ReadDouble reads a line of text from standard input and scans

* it as a double. If the number cannot be scanned or if extra

* characters follow after the number ends, the user is given

* a chance to reenter the value.

*/

double ReadDouble(void);

/*

* Function: ReadLine

* Usage: s = ReadLine();

* ---------------------

* ReadLine reads a line of text from standard input and returns

* the line as a string. The newline character that terminates

* the input is not stored as part of the string.

*/

char *ReadLine(void);

/*

* Function: ReadLine

* Usage: s = ReadLine(infile);

* ----------------------------

* ReadLineFile reads a line of text from the input file and

* returns the line as a string. The newline character

* that terminates the input is not stored as part of the

* string. The ReadLine function returns NULL if infile

* is at the end-of-file position. Actually, above ReadLine();

* can simply be implemented as return(ReadLineFile(stdin)); */

char *ReadLineFile(FILE *infile);

Output values below an amount
Write a program that first gets a list of integers from input. The input begins with an integer indicating the number of integers that follow. Then, get the last value from the input, and output all integers less than or equal to that value.
Ex: If the input is 5 50 60 140 200 75 100, the output is:
For coding simplicity, follow every output value by a space, including the last one.
Such functionality is common on sites like Amazon, where a user can filter results.
LAB
ACTIVITY
8.3.1: LAB: Output values below an amount
0 / 10
Submission Instructions
These are the files to get you started.
main.cpp
Download these files
Compile command
g++ main.cpp -Wall -o a.out
We will use this command to compile your code

Answers

Answer:

def output_ints_less_than_or_equal_to_threshold(user_values, upper_threshold):

  for value in user_values:

      if value < upper_threshold:

          print(value)  

def get_user_values():

  n = int(input())

  lst = []

  for i in range(n):

      lst.append(int(input()))

  return lst  

if __name__ == '__main__':

  userValues = get_user_values()

  upperThreshold = int(input())

  output_ints_less_than_or_equal_to_threshold(userValues, upperThreshold)

Explanation:

Write a program that lets the Michigan Popcorn Company keep track of their sales for seven different types of popcorn they produce: plain, butter, caramel, cheese, chocolate, turtle and zebra. It should use two parallel seven-element arrays: an array of strings that holds the seven popcorn names and an array of integers that holds the number of bags of popcorn sold during the past month for each popcorn flavor. The names should be stored using an initialization list at the time the flavors array is created. The program should prompt the user to enter the number of bags sold for each flavor. Once the popcorn data has been entered, the program should produce a report for each popcorn type, total sales, and the names of the highest selling and lowest selling products. Be sure to include comments throughout your code where appropriate. Complete the C++ code using Visual Studio or Xcode, compress (zip) and upload the entire project folder to the Blackboard assignment area by clicking on the Browse My Computer button or by dragging the file inside the Attach Files box g

Answers

Answer:

#include <iostream>using namespace std;int main(){    // declare and initialize popcorn name array    string popcorn_name[7] = {"plain", "butter", "caramel", "cheese", "chocolate", "turtle", "zebra"};    // declare and initialize sales array with 7 elements    int sales[7];        // A loop to prompt user to enter sales for each popcorn    for(int i=0; i < 7; i++){        cout<<"Enter number of sales for " + popcorn_name[i] + " :";        cin>>sales[i];    }        // Find maximum sales    int max = sales[0];    int maxIndex = 0;    for(int j=1; j < 7; j++){        if(max < sales[j]){            max = sales[j];            maxIndex = j;        }    }        // Find minimum sales    int min = sales[0];    int minIndex = 0;    for(int k=1; k < 7; k++){        if(min > sales[k]){            min = sales[k];            minIndex = k;        }    }        // Print popcorn name and sales    for(int l=0; l < 7 ; l++){        cout<<popcorn_name[l]<<"\n";        cout<<"Sales: "<< sales[l]<<"\n\n";    }        // Print popcorn name with maximum and minimum sales    cout<<"Highest selling: "<< popcorn_name[maxIndex]<<"\n";    cout<<"Lowest selling: "<<popcorn_name[minIndex]<<"\n";    return 0;}

Explanation:

Create two arrays to hold the list of popcorn name and their sales (Line 5-8). Next prompt user to input the sales for each popcorn (Line 10-14). Get the maximum sales of the popcorn (Line 17-24) and minimum sales (Line 27-34). Print the popcorn name and sales (Line 37-40) and the popcorn name with highest and lowest selling (Line 43-44).

Which one of these is not a way of identifying that a website is secure?

a) Message on website
b) URL begins 'https://'
c) Colour of address bar
d) Padlock symbol

Answers

Answer:

B

Explanation:

all url's begin with https://

You acquire a network vulnerability-scanning tool and try it out on a network address segment belonging to people at your university of business. The scanner identifies one computer named Prince Hal that has many serious vulnerabilities. You deduce to whom the machine belongs. Explain the ethical implication of:________.
a. telling the owner what you have found,
b. telling you local administrator or security officer what you have found
c. exploiting one of the relatively minor vulnerabilities to show the owner how serious the exposure is
d. exploiting a relatively minor vulnerability as a prank without telling the owner,
e. telling the owner what you have found and the demanding money for details on the vulnerabilities
f. using one of the vulnerabilities to acquire control of the machine, downloading and installing patches and changing settings to address all the vulnerabilities, and never telling anyone what you have done.

Answers

Answer and Explanation:

The speculates on either the morality of transmitting vulnerabilities to an individual over all the internet. The node is a very possible target of a criminal charge, these are highly recommended in terms of the problem not just ethical.The question argues the etiquette of telling a compromised network infrastructure to something like a domain admins or security guard. Throughout this case the primary admin issue is power. Informing individuals about both the potential problem is prudent or legal, which is also preferable to recommend the future course of action.The speculates on either the moral values of leveraging the infrastructure for a mild vulnerability. This same proprietor including its node is truly likely to be victims of a prospective infringement, and therefore it is advantageous to notify him including its problem that the equitable access is considered to become an ethical manipulate susceptibility for possessor data as well as potential threats to understanding.The theories a small flaw throughout the channel's ethics. The device's leader is the likely guilty party of even a future offense to notify him of both the actual problem. The law is ridiculous as well as comparable to trying to hack without permission vulnerability it's immoral vulnerability.The content upon the ethical principles of manipulating the channel's small susceptibility. The device's owner seems to be the likely casualty of such a future offense to instruct him including its subject. As well as trying to sell him much farther documents socially responsible borders. It's the holder who has so far notified the weakness she perhaps she has just one option to obtain products and services. Having clear data on the sale still seems to be ethical.The issue argues mostly on ethics with repairing security flaws without channel assent. Although the controlled variable of the modules has been the true likely target of such a future infringement, exploiting susceptibility without permission is appropriate as well as unethical, this same objective being honorable as well as noble.

Create a Python program that: Allows the user to enter a person's first name and last name. The user should be able to enter as many names as they desire. Create a function that takes the first name and last name, puts them together with the last name first, followed by the first name; with the names separated by commas. Take the result from the function, and place the resulting name in a list. Once the user finishes entering names, sort the contents of the list. Write the sorted names from a list into a text file. When you create the text file, allow the user to enter a name for the file to be created. After you finish writing names to the file, close the file and end the program.

Answers

Answer:

#main function start

def main():

#list to store names entered by user

name_list=[]

#variable to take input from user to keep rotating the loop and take input from user again and again

ch='y'

fname=""

lname=""

while ch=='y' or ch=='Y':#keep the loop taking input from user till user do not want to enter more

#take input from user

name=[]

fname=input("Enter first name: ")

lname=input("Enter last name: ")

name.append(fname)

name.append(lname)

 

#append the previously input first and last name in main list

name_list.append(name)

ch=input("Do you want to continue: (y/Y for yes)")

#main function end

#get file name from user

filename=input("Enter output file name")

#open file in write mode

file=open(filename,"w")

#keep loop add data in file till main list 'name_list' have

for i in name_list:

#Write data in file

file.write("%s, %s\r\n" % (i[0],i[1]))

#close the file

file.close()

#call main function

main()

Explanation:

input the above code and see output

What is an accessory?
A.a security setting that controls the programs children can use
B.a tool that provides proof of identity in a computing environment
C.a set of programs and applications that help users with basic tasks
D.a set of gadgets and widgets that makes it easier to create shortcuts

Answers

Answer:

C

Explanation:

Accessories are in Microsoft windows, a set of programs and applications that help users with some basic tasks

Write a program that keeps track of where cars are located in a parking garage to estimate the time to retrieve a car when the garage is full. This program will demonstrate the following:_________.
How to create a list for use as a stack,
How to enter and change data in a stack.

Answers

Answer: Provided in the explanation section

Explanation:

Code to use;

# Define the main() function.

def main():

   # Declare the required variables.

   stack_cars = []

   move_time = 1

   retrieve_time = 2

   # Start the loop to display the menu.

   while True:

       # Display the choices to the user.

       print("\n\t\t\t Car Stack Menu")

       print("\n1. Add a car")

       print("2. Retrieve a car")

       print("3. Show the car stack")

       print("4. Exit")

       # Prompt the user to enter the input.

       choice = input("\nEnter your choice: ")

       # Append the car in the stack if the choice is 1.

       if choice == '1':

           car = input("Enter the car name to add: ")

           stack_cars.append(car)

       

       # Remove the car from the stack if the choice is 2.

       elif choice == '2':

           car = input("Enter the car name to retrieve: ")

           # Display the error message if the car is not present.

           if car not in stack_cars:

               print(car + " is not present in the stack.")

           # Otherwise, compute the time to retrieve a car.

           else:

               # Declare a temp stack to move the cars.

               temp = []

               x = stack_cars.pop()

               count = 0

               # Start the loop to pop the cars from the stack

               # until the car to be retrieved is found.

               while x != car:

                   count += 1

                   # Store the car in the temp stack.

                   temp.append(x)

                   x = stack_cars.pop()

               # Start the loop to move the cars back in the

               # original stack.

               while len(temp) != 0:

                   stack_cars.append(temp.pop())

               # Compute and display the total time.

               total_time = move_time * count + retrieve_time

               print("Total time to retrieve", car, "=", total_time)

       

       # Display the stack if the choice is 3.

       elif choice == '3':

           print("Car stack =", stack_cars)

       # Return from the funtion if the choice is 4.

       elif choice == '4':

           print("Exiting from the program...")

           return

       

       # Display the message for invalid input.

       else:

           print("Error: Invalid choice!")

# Call the main() function.

if __name__ == "__main__":

   main()

For this assignment, you will create flowchart using Flow gorithm and Pseudocode for the following program example: Hunter Cell Phone Company charges customer's a basic rate of $5 per month to send text messages. Additional rates apply as such:The first 60 messages per month are included in the basic billAn additional 10 cents is charged for each text message after the 60th message and up to 200 messages.An additional 25 cents is charged for each text after the 200th messageFederal, state, and local taxes add a total of 12% to each billThe company wants a program that will accept customer's name and the number of text messages sent. The program should display the customer's name and the total end of the month bill before and after taxes are added.

Answers

Answer:

The pseudocode is as given below while the flowchart is attached.

Explanation:

The pseudocode is as follows

input customer name, number of texts  

Set Basic bill=5 $;

if the number of texts is less than or equal to 60

Extra Charge=0;

If the number of texts is greater than 60 and less than 200

number of texts b/w 60 and 200 =number of texts-60;

Extra Charge=0.1*(number of texts b/w 60 and 200);

else If the number of texts is greater than 200

number of texts beyond 200 =number of texts-200;

Extra Charge=0.25*(number of texts beyond 200)+0.1*(200-60);

Display Customer Name

Total Bill=Basic bill+Extra Charge;

Total Bill after Tax=Total Bill*1.12;

What is a digital security risks?

Answers

Answer:

A digital security risk is an action that could result in damage to a computer or similar device's hardware, software, data etc.

what is computer aided design​

Answers

Computer-aided design (CAD) is the use of computers (or workstations) to aid in the creation, modification, analysis, or optimization of a design.[1] CAD software is used to increase the productivity of the designer, improve the quality of design, improve communications through documentation, and to create a database for manufacturing. hope this helps!!!

Write an INSERT statement that adds these rows to the Invoice_Line_Items table:
invoice_sequence: 1 2
account_number: 160 527
line_item_amount: $180.23 $254.35
line_item_description: Hard drive Exchange Server update
Set the invoice_id column of these two rows to the invoice ID that was generated
by MySQL for the invoice you added in exercise 4.

Answers

Answer:

Insertion query for first row :

INSERT into Invoice_Line_Items (invoice_sequence, account_number, line_item_amount, line_item_description) Values (1, 160, '$180.23', "Hard drive Exchange");

Insertion query for second row :

INSERT into Invoice_Line_Items (invoice_sequence, account_number, line_item_amount, line_item_description) Values (2, 527, '$254.35', "Server update");

Explanation:

* In SQL for insertion query, we use INSERT keyword which comes under DML (Data manipulation Language).

* Statement is given below -

INSERT into Table_name  (column1, column2, ....column N) Values (value1, value2, .....value N);

* With the use of INSERT query we can insert value in multiple rows at a same time in a table which reduces our work load.

An introduction to object-oriented programming.
Write a GUI program named EggsInteractiveGUI that allows a user to input the number of eggs produced in a month by each of five chickens. Sum the eggs, then display the total in dozens and eggs. For example, a total of 127 eggs is 10 dozen and 7 eggs.

Answers

Answer:

The csharp program is given below.

using System;

using System.Collections.Generic;

using System.ComponentModel;

using System.Data;

using System.Drawing;

using System.Linq;

using System.Text;

using System.Threading.Tasks;

using System.Windows.Forms;

namespace WindowsFormsApplication1

{

   public partial class Form1 : Form

   {

       public Form1()

       {

           InitializeComponent();

      }

       private void button6_Click(object sender, EventArgs e)

       {

           int total = (Convert.ToInt32(textBox1.Text) +  Convert.ToInt32(textBox2.Text) + Convert.ToInt32(textBox3.Text) + Convert.ToInt32(textBox4.Text) + Convert.ToInt32(textBox5.Text));

           int dozen = total / 12;

           int eggs = total % 12;

           textBox6.Text = dozen.ToString();

           textBox7.Text = eggs.ToString();

       }

       private void button7_Click(object sender, EventArgs e)

       {

           textBox1.Text = "";

           textBox2.Text = "";

           textBox3.Text = "";

           textBox4.Text = "";

           textBox5.Text = "";

           textBox6.Text = "";

           textBox7.Text = "";

       }

        private void button8_Click(object sender, EventArgs e)

       {

           Close();

       }

    }

}

Explanation:

1. The integer variables are declared for total eggs, number of dozens and number of eggs.

2. The input of each text box is converted into integer by using the Convert.ToInt32() method on the value of that particular text box.

3. All the inputs are added and the sum is assigned to variable, total.

4. The number of dozens are obtained by dividing total by 12 and assigning the value to the variable, dozen.

5. The number of extra eggs are obtained by taking the modulus of total and 12 and the value is assigned to the variable, eggs.

6. The integer values in the variables, dozen and eggs, are converted into string using the ToString() function with that particular value.

dozen.ToString();

eggs.ToString();

7. The text boxes are assigned the respective values of dozens and number of eggs.

textBox6.Text = dozen.ToString();

textBox7.Text = eggs.ToString();

8. Two additional buttons, clear and exit, are also added.

9. The clear button erases the contents of all the text boxes. The Text property of each textbox is set to “” thereby clearing all the text fields.

10. The exit button closes the application using Close() function.

11. The program is made in visual studio and the output is attached.

You are a network technician for a small corporate network that supports 1000 Mbps (Gigabit) Ethernet. The manager in the Executive Office says that his network connection has gone down frequently over the past few days. He replaced his Ethernet cable, but the connection problem has continued. Now his network connection is either down or very slow at all times. He wants you to install a new 1000 Mbps Ethernet network card in his workstation to see if that solves the problem.
If the new card does not resolve the issue, you will need to perform troubleshooting tasks to find the cause of the issue and confirm that the problem is fixed after you implement a solution. Following are some troubleshooting tasks you can try:
• Use the Network and Sharing Center and the ipconfig command on the Exec workstation to check for a network connection or an IP address.
• Look at the adapter settings to see the status of the Ethernet connection.
• Use the ping command to see if the workstation can communicate with the server in the Networking Closet. (See the exhibit for the IP address.)
• View the network activity lights for all networking devices to check for dead connections. In this lab, your task is to complete the following:
1. Install a new Ethernet adapter in one of the open slots in the Exec workstation per the manager's request.
2. Make sure that the new adapter is connected to the wall outlet with a cable that supports Gigabit Ethernet.
3. Resolve any other issues you find using the known good spare components on the Shelf to fix the problem and restore the manager's internet connection.
After you replace the network adapter and resolve the issues you found while troubleshooting, use the Network and Sharing Center to confirm that the workstation is connected to the network and the internet
If necessary, click Exhibits to see the network diagram and network wiring schematics.

Answers

Answer:

The step by step explanation

Explanation:

Before doing anything, the first thing to do is to select the 100BaseTX network adapter and reconnect the Cat5e cable. The 100BaseTX network adapter supports Fast

Ethernet which is all that is required.

Now do the following steps:

Step one

In Office 2, switch to the motherboard view of the computer (turning off the workstation as necessary).

Step two

On the Shelf, expand the Network Adapters category.

Step three

Identify the network adapter that supports Fast Ethernet 100BaseTX. Drag the network adapter from the Shelf to a

free PCI slot on the computer.

Step four

To connect the computer to the network, switch to the back view of the computer.

Step five

Drag the Cat5 cable connector from the motherboard's NIC to the port of the 100BaseTX network adapter.

Step six

To verify the connection to the local network and the Internet, switch to the front view of the computer.

Step seven

Click the power button on the computer case.

Step eight

After the workstation's operating system is loaded, click the networking icon in the notification area and click

Open Network and Sharing Center. The diagram should indicate an active connection to the network and the

Internet.

For one to be able to confirm the speed of the connection, it can be done by clicking the Local Area Connection link in the Network and

Sharing Center.

Write a program in python that can compare the unit (perlb) cost of sugar sold in packages with different weights and prices. The program prompts the user to enter the weight and price of package 1, then does the same for package 2, and displays the results to indicate sugar in which package has a better price. It is assumed that the weight of all packages is measured in lb. The program should check to be sure that both the inputs of weight and price are both positive values.

Answers

Answer:

weight1 = float(input("Enter the weight of first package: "))

price1 = float(input("Enter the price of first package: "))

weight2 = float(input("Enter the weight of second package: "))

price2 = float(input("Enter the price of second package: "))

if weight1 > 0 and price1 > 0 and weight2 > 0 and price2 > 0:

   unit_cost1 = price1 / weight1

   unit_cost2 = price2 / weight2

   

   if unit_cost1 < unit_cost2:

       print("Package 1 has a better price.")

   else:

       print("Package 2 has a better price.")

else:

   print("All the entered values must be positive!")

Explanation:

*The code is in Python.

Ask the user to enter the weight and the price of the packages

Check if the all the values are greater than 0. If they are, calculate the unit price of the packages, divide the prices by weights. Then, compare the unit prices. The package with a smaller unit price has a better price.

If all the entered values are not greater than 0, print a warning message

Devon keeps his commitments, submits work when it's due, and shows up when scheduled. What personal skill does Devon
demonstrate?
Attire
Collaboration
Dependability
Verbal


It’s D

Answers

Answer:

dependability

Explanation:

devon keeps his commitment

The personal skill that's demonstrated by Devin is dependability.

Dependability simply means when an individual is trustworthy and reliable. Dependability simply means when a person can be counted on and relied upon.

In this case, since Devon keeps his commitments, submits work when it's due, and shows up when scheduled, it shows that he's dependable.

It should be noted that employers love the people that are dependable as they can be trusted to have a positive impact on an organization.

Read related link on:

https://brainly.com/question/14064977

When implementing a physical database from a logical data model, you must consider database performance by allowing data in the database to be accessed more rapidly. In order to increase data availability, the DBA may break up data that are accessed together to be stored together. Which method will improve the performance of this structure when running queries? What are advantages and disadvantages of this method?

Answers

Answer:

A method  used to improve the performance of structure when running queries is known as Partitioning indexes.

The advantages of partitioning indexes are, It enables data management operations for example,  index creation and rebuilding, It increases query performance.

The disadvantages are, one cannot define the primary index of partitioned table to be unique unless the whole partitioning column set is part of the primary index definition.

Explanation:

Solution

Partitioning indexes are known as b -tress indexes that shows hon how to break up the index into separate or different partitions.

Partitioning is usually done to enhance the performance and increased availability. when data are spread over  multiple partitions, one can be able to operate on one partition  without affecting others. i.e to run utilities, or to take data offline.

Almost all DBMS products support partitioning, but in various ways. we must be sure to know the nuances of an individual a particular DBMS execution before partitioning.

The advantages of Partitioned indexes are as follows:

It enables data management operations for example,  index creation and rebuilding

It increases  performance of query

It can significantly the impact of schedule downtime for maintenance operations

Disadvantages:

The primary index of partitioned table cannot be described to be unique except if  the whole partitioning column set is part of the primary index definition.

Other Questions
Describe surrealism in your own words ?? Help ! For a moving object, the force acting on the object varies directly with the objects acceleration. When a force of 24N acts on a certain object, the acceleration of the object is 3m/s^2. If the acceleration of the object becomes 10m/s^2, what is the force Whats the answer to this question? When given a graph, the vertical line test can be used to determine functionality. Describe the vertical line test and explain the reasons why a graph would, or would not, represent a function. What happened on the following dates to aid regional integration?a) 1958b) 1962c) 1965d) 1973 1) Simplify 16x 7y - 19x - 4y i cant get the symbold so i had to do it like this :) What was the significance of the Battle of Queenston hieghts on Canadian history? 1. Which best summarizes the effectiveness of the Freedmens Bureau?A.It successfully redistributed land to all former slaves, but it did not teach them how to farm the land.B. It built schools and hospitals for former slaves, but a lack of funding prevented it from doing more.C. It gave cholera vaccines to former slaves, but it failed to provide basic medical needs beyond that.D. It distributed clothing to former slaves, but it left them illiterate and without an education.2. Why did Congress impeach President Andrew Johnson in 1868?A. Congress and Johnson disagreed on the powers of the Supreme Court.B. Congress and Johnson disagreed about Reconstruction legislation.C. Congress and Johnson disagreed over America's purchase of Alaska.D. Congress and Johnson disagreed on whether slavery should be legal.3. Why did many white Southerners oppose the Fourteenth Amendment?A. The amendment placed the blame for starting the Civil War on the South.B. The amendment granted equal rights as citizens to African Americans.C. The amendment forced Southern states to extend voting rights to women.D. The amendment abolished the practice of slavery in the South forever.4. Why did Congress divide the South into military districts?A. Republicans in Congress wanted to redraw state borders to prevent future attempts at secession.B. Republicans in Congress did not trust white southerners to adopt reforms giving rights to freed slaves.C. Both parties in Congress wanted a reason to increase the federal military budget.D. Both parties in Congress believed districts would make it easier to return escaped slaves to their owners.5. Which statement is true about African Americans in government during early Reconstruction?A. Many African Americans in the South were elected to Congress and state legislatures.B. African Americans were not allowed to vote in the former Confederate states.C. Congress banned African Americans from serving in state legislatures.D. An African American became governor in every one of the former Confederate states. Determine whether the geometric series 192 + 48 + 12 + ... converges or diverges, and identify the sum if it exists. A.) Converges: 768B.) DivergesC.) Converges; 64D.) Converges; 256 HELP ASAP!!!! There is a clip below. Plz help me with my maths question!Xx How many solutions does the nonlinear system of equations graphed below have? A. Zero B. One C. Two D. Four What does the table show about how Congress voted for the Civil Rights Act of 1957? Check all that apply. The majority of both parties opposed the bill. More Republicans than Democrats opposed the bill. More Democrats than Republicans opposed the bill. The majority of both parties voted in favor of the bill. All Senate Republicans voted in favor of the bill. Light ray A moves from air to water. Part of ray A is reflected at the air-water boundary. Which arrow in the image is the reflected ray?EOA. BOB.OC.DOD. E In light-dependent reactions, the oxygen leaves the plants through the ________. *A. stomataB. veinC. cuticle The average math SAT score is 511 with a standard deviation of 119. A particular high school claims that its students have unusually high math SAT scores. A random sample of 55 students from this school was selected, and the mean math SAT score was 528. Is the high school justified in its claim? Explain. No Yes , because the z-score ( nothing) is unusual not unusual since it does not lie lies within the range of a usual event, namely within 1 standard deviation 2 standard deviations 3 standard deviations of the mean of the sample means. (Round to two decimal places as needed.) The United States and The soviet Union Point M divides AB such that AM:MB = 1:4. If A has coordinates (-4, 3) and B has coordinates (6, 8). What are the coordinates of M? Which of the following is an example of a chemical change