Consider the following program:
#include
using namespace std;
int main()
{
int num1, num2;
int temp = 0;
cout << "Enter two integers: ";
cin >> num1 >> num2 ;
cout << endl ;
while (((num1 + num2) % 5) != 0)
{
temp = num1 + num2;
num1 = num2;
num2 = temp;
cout << temp << " ";
}
cout << endl;
return 0;
}
a. What is the output if the input is 13 16?
b. What is the output if the input is -4 6?
c. What is the output if the input is 3 5?
d. What is the output if the input is 1 3?

Answers

Answer 1

The program below is used to perform arithmetic operations on integers. Here is a brief description of the program.#include

using namespace std;

int main()

{

int num1, num2;

int temp = 0;

cout << "Enter two integers: ";

cin >> num1 >> num2 ;

cout << endl ;

while (((num1 + num2) % 5) != 0)

{

temp = num1 + num2;

num1 = num2;

num2 = temp;

cout << temp << " ";

}

cout << endl;

return 0;

}

What is the output if the input is 13 16?

If the input is 13 and 16, the output is:Enter two integers: 13 16 29 45 74 119 193 312 505

What is the output if the input is -4 6?

If the input is -4 and 6, the output is:Enter two integers: -4 6 2 8 10 18 28 46 74

What is the output if the input is 3 5?

If the input is 3 and 5, the output is:Enter two integers: 3 5 8 13 21 34 55 89 144 233

What is the output if the input is 1 3?

If the input is 1 and 3, the output is:Enter two integers: 1 3 4 7 11 18 29 47 76 123

To know more about arithmetic operations on integers:

https://brainly.com/question/18274244

#SPJ11


Related Questions

Plzzzzz help me with this and be serious dont comment random things
Write an algorithm using pseudocode that someone else can follow. Choose one of the following options:

Decide on the message you would like to display to the screen. Some ideas include:
Your favorite book title or TV show and why you like it
A few sentences sharing information about you
Your favorite sport and team or athlete
Use two variables to store your message.
Insert your pseudocode here:











Part 2: Code the Program
Use the following guidelines to code your program.

Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Use at least two variables and two print statements to display your message to the screen.
Conclude the program with the main() statement.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite TV Show” message. Your specific results will vary depending on the choices you make about your message.

Output

My favorite TV show is MythBusters.
I like it because I learn a lot and they do crazy experiments.


When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.

Part 3: Post Mortem Review (PMR)
Write two to three sentence responses to all the questions in the PMR chart.

Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.

Answers

Answer:

legal and ethical questions

brick and mortar guidelines

website content

customer information

the facts of life

payment processing

human resources

this is in career explorations 2 please help will mark the brainiest ​

Explanation: yes he is right this is correct

Write a program that:

Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint: use Mod).
Displays the sum.
Situation B
Write a procedure that takes a positive integer as a parameter. If the number given to the procedure is no more than 30, the procedure should return the absolute difference between that number and 30. If the number is greater than 30, the procedure should return the number doubled.

Answers

Situation A:

#include <iostream>

#include <vector>

#include <string>

int main(int argc, char* argv[]) {

 //Fill it by own.

 std::vector<int> lotsOfNumbers = {0,1,2,3,4,5,6,7,8,9};

 //Loop to find odd numbers.

 for(int i=0;i<lotsOfNumbers.size(); i++) {

   if(lotsOfNumbers[i]%2!=0) std::cout << lotsOfNumbers[i] << std::endl;

   else continue;

 }

 return 0;

}

Situation B:

#include <iostream>

#define check(x) ((x>30) ? 2*x : 30-x)

int main(int argc, char* argv[]) {

 std::cout << check(15) << std::endl;

 std::cout << check(-2) << std::endl;

 std::cout << check(30) << std::endl;

 std::cout << check(78) << std::endl;

 

 return 0;

}

Write a program that:Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers
Write a program that:Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers

It is the job of the ____ to enable reliable transmission of data through the physical layer at the sending end. group of answer choices

Answers

Answer:

The statement is true

Explanation:

It is the job of the data link layer to enable reliable transmission of data through the physical layer at the sending end.

What is meant by the data link layer?

The data link layer, or layer 2, is the second tier of the seven-layer OSI model of computer networking. This layer is the protocol layer that transports data between nodes on a network segment by crossing the physical layer.

The data link layer is the protocol layer in a program that manages data transfer into and out of a physical link in a network. The data link layer is Layer 2 in the Open Systems Interconnection (OSI) architecture model for a collection of communication protocols.

At the data connection layer, data bits are combined into entities known as frames. Network topologies such as Ethernet exist at the data connection layer. The most commonly used network hardware at the data link is a switch.

To learn more about the data link layer refer to:

https://brainly.com/question/13131540

#SPJ4

Does forwarding an email notify the original sender?

Answers

Whether forwarding an email notifies the original sender depends on the email client and the email server settings. Some email clients have the option to notify the original sender when an email is forwarded, while others do not. Additionally, some email servers also have options to notify the original sender when an email is forwarded, but it's not a standard. It's also possible that the email client or server used by the original sender can detect that an email has been forwarded, but it doesn't notify the sender.

So in summary, whether forwarding an email notifies the original sender is not something that can be determined generally, it depends on the specific email client and server settings.

When processing a typical remote I/O request, which of the following happens first?
a. The I/O Manager creates an I/O request packet.
b. User-mode software issues a remote I/O request.
c. An I/O request packet is sent to the redirector.
d. Transport drivers process the request and place it on the network.

Answers

The first step when processing a typical remote I/O request is that "user-mode software issues a remote I/O request". Option B is the correct answer.

The I/O request is then sent to the I/O Manager, which creates an I/O request packet that is subsequently sent to the redirector. Transport drivers process the request and place it on the network for delivery to the appropriate device.

Remote I/O requests are commonly used to access files or resources on remote computers, and the process involves several steps. The user-mode software initiates the request, which is then processed by the I/O Manager. An I/O request packet is created and sent to the redirector, which sends the request to the appropriate transport driver. The driver then processes the request and sends it over the network to the destination device.

Option B is the correct answer.

You can learn more about I/O request at

https://brainly.com/question/17226929

#SPJ11

Which are the major components of HEV system?

Answers

Electric motors (EM), batteries, converters, ICEs, fuel tanks, and control boards are among the essential parts of a HEV. Power electronics, electric motors, and energy storage are the three main parts in HEVs.

A hybrid vehicle or an electric vehicle—which is preferable?

Given that the infrastructure for charging electric vehicles is still very much in its infancy, a hybrid vehicle is a more realistic choice. An HEV would be a better choice if you were to purchase a car right away because charging an EV would be difficult.

What parts of an electric hybrid vehicle are considered to be high voltage?

One or more of a HEV's high voltage components include the electric motor, battery system, onboard charger, and compressor.

To know more about HEV system visit:

https://brainly.com/question/14291540

#SPJ4

which of the following characterizes the IACs? a. high per capita GDP growth and high population growth b. low per capita GDP growth and low population growth c. low per capital GDP growth and high savings rate d. low human capital investment

Answers

The IACs (Industrialized Advanced Countries) are typically characterized by : low per capita GDP growth and low population growth.

So, the correct answer is B.

In these nations, economic growth tends to be steady but slow, and population growth rates are relatively low due to factors such as higher living standards, education levels, and access to healthcare.

These characteristics differentiate IACs from developing countries, which often experience higher population growth and more variable economic growth rates

Hence the answer of the question is B.

Learn more about population growth at

https://brainly.com/question/30019081

#SPJ11

The cpu on a user's computer is frequently seen operating at 90%. you wish to be alerted when the cpu exceeds 85%. what tool will allow you to accomplish this?

Answers

A faster CPU can significantly improve your computer's performance if your CPU utilization levels are more than 90% throughout the majority of your work sessions.

What causes high CPU usage?

According to the book, a faster CPU can significantly improve your computer's performance if your CPU utilization levels are more than 90% throughout the majority of your work sessions.

At idle, the median CPU percentage for practically all CPUs or OSs is less than 10%. This is particularly reliant on the applications that are running on your computer. If you are using a good GPU, CPU, and SSD with Windows 10, the typical CPU utilization is between 2% and 4% when it is idle.

If the CPU column of the project manager shows a high CPU idle percentage, between 70% and 90%. Furthermore, you are only carrying a few packages, if any at all. The processor isn't working very hard right now, so it's normal for it to be excessive.

Your computer is attempting to perform more work than it is capable of if the CPU utilization is close to 100%. This is normally adequate, but because of its methods, apps may also slightly lag. Computers typically consume close to 100% of their CPU while performing computationally taxing tasks like playing walking games.

To learn more about CPU usage refer to:

https://brainly.com/question/28119523

#SPJ4

I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.

Answers

The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.

Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.

To wrap text in Excel, follow these simple steps:

Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.

Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.

To wrap text in Microsoft Word, follow these simple steps:

Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.

The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.

To learn more about wrap text, visit:

https://brainly.com/question/27962229

#SPJ11

(3) Implement the execute_menu() function that takes 2 parameters: a character representing the user's choice and the user provided sample text. execute_menu() performs the menu options, according to the user's choice, by calling the appropriate functions described below. (1 pt)

Answers

Using the knowledge in computational language in python it is possible to write a code that Implement the execute_menu() function that takes 2 parameters: a character representing the user's choice and the user provided sample text.

Writting the code:

def print_menu():

   print("\tMenu")

   print("c - Number of non-whitespace characters")

   print("w - Number of words")

   print("f - Fix capitalization")

   print("r - Replace punctuation")

   print("s - Shorten spaces")

   print("q – Quit")

def execute_menu(choice, string):

   if choice == "c":

       print(

           f"Number of non-whitespace characters are {get_num_of_non_WS_characters(string)}")

   elif choice == "w":

       print(f"Number of words are {get_num_of_words(string)}")

   elif choice == "f":

       print(

           f"String after fixing capitalization are {fix_capitalization(string)}")

   elif choice == "r":

       print(

           f"String after replacing punctuations are {replace_punctuation(string, exclamation_count=0, semicolon_count=0)}")

   elif choice == "s":

       print(f"String after fixing spaces are {shorten_space(string)}")

   else:

       exit(0)

def get_num_of_non_WS_characters(string):

   chars = 0

   for i in string:

       if i != " ":

           chars += 1

   return chars

def get_num_of_words(string):

   wordlist = string.split()

   num_of_words = len(wordlist)

   return num_of_words

def fix_capitalization(string):

   return string.capitalize()

def replace_punctuation(string, exclamation_count, semicolon_count):

   newString = ""

   for char in string:

       if char == "!":

           newString += "."

           exclamation_count += 1

       elif char == ";":

           newString += ","

           semicolon_count += 1

       else:

           newString += char

   print(

       f"Number of times Exclamation(!) is replaced are {exclamation_count}")

   print(f"Number of times Semicolon(;) is replaced are {semicolon_count}")

   return newString

def shorten_space(string):

   newString = " ".join(string.split())

   return newString

def main():

   string = input("Enter text: ")

   print_menu()

   choice = input("Enter your choice: ").lower()

   loop = True

   while loop == True:

       while choice not in ["c", "w", "f", "r", "s", "q"]:

           choice = input("Enter your choice: ").lower()

       execute_menu(choice, string)

       choice = input("Enter your choice: ").lower()

main()

See more about python at brainly.com/question/18502436

#SPJ1

(3) Implement the execute_menu() function that takes 2 parameters: a character representing the user's

. Find the supplements of : 150' and 70°​

Answers

30 is the supplement of 150

Management wants to build a culture where employees keep security in mind. Employees should be able to access information freely and provide feedback or suggestions without worry. Which of these are great ideas for this type of culture? Check all that apply.
O Designated mailing list
O Desktop monitoring software
O Posters promoting good security behavior
O Bring your own device

Answers

The great ideas for building a security-minded culture are:

Designated mailing list

Posters promoting good security behavior

How to foster a security-minded culture?

The following options are great ideas for building a culture where employees keep security in mind and feel comfortable accessing information and providing feedback:

Designated mailing list: Having a designated mailing list allows employees to freely share information, ask questions, and provide feedback or suggestions related to security. It encourages open communication and collaboration among employees.

Posters promoting good security behavior: Displaying posters that promote good security behavior can serve as visual reminders for employees to follow security best practices.

It helps create awareness and reinforces the importance of security in their day-to-day activities.

Bring your own device (BYOD): Allowing employees to bring their own devices can foster a sense of ownership and familiarity. It enables employees to work comfortably while maintaining security measures and guidelines.

Desktop monitoring software, on the other hand, may raise concerns about privacy and could create a sense of mistrust among employees. It is important to balance security measures with employee trust and privacy to create a positive security culture.

Learn more about culture

brainly.com/question/30447976

#SPJ11

True or false mdm tools cannot provide the ability to detect and restrict jailbroken and rooted devices.

Answers

Mobile Device Management (MDM) tools have evolved to provide a wide range of capabilities, including the ability to detect and restrict jailbroken and rooted devices.

False.

In fact, MDM solutions offer several security features that help businesses manage and secure their mobile devices, which includes keeping track of the device's security posture.Jailbreaking and rooting are processes that remove the manufacturer's restrictions on the device's operating system, giving the user complete control over the device's software and hardware. While these processes can offer users more customization options, they also create security risks, making it difficult for businesses to enforce their security policies on those devices.MDM solutions use several methods to detect and restrict jailbroken and rooted devices. One of the most common methods is to check for the presence of known jailbreak or rooting software. MDM solutions can also use various techniques to detect when a device has been compromised and restrict its access to certain features and applications.MDM tools have become a critical component of mobile device management and security. They enable businesses to maintain control over their mobile devices, ensure compliance with security policies, and protect sensitive data from unauthorized access.

For such more questions on MDM

https://brainly.com/question/29428225

#SPJ11

False.

MDM (Mobile Device Management) tools can provide the ability to detect and restrict jailbroken and rooted devices. Many MDM solutions include features to detect if a device has been jailbroken or rooted, and can restrict access to corporate data or applications based on that status.

MDM (Mobile Device Management) tools are used to manage and monitor mobile devices such as smartphones and tablets. These tools provide administrators with the ability to remotely configure devices, enforce policies, and distribute applications.

One important feature of MDM tools is the ability to detect if a device has been jailbroken or rooted. Jailbreaking or rooting a device involves removing the manufacturer's restrictions and limitations, which can allow users to install unauthorized apps and access sensitive data. This can create security risks for corporate data and applications.

MDM tools can detect if a device has been jailbroken or rooted by looking for changes to the device's file system or kernel. If a device is found to be jailbroken or rooted, MDM tools can take action such as blocking access to corporate resources or wiping the device's data.

Overall, the ability to detect and restrict jailbroken and rooted devices is an important security feature of MDM tools, as it helps to protect corporate data and applications from unauthorized access or exposure.

Learn more about distribute applications here:

https://brainly.com/question/30869733

#SPJ11

write around 600 words discussing the role of IT in Jumia operational applications

Answers

Jumia is an e-commerce platform that operates in various African countries, and it relies heavily on technology to run its operations. Information technology (IT) plays a critical role in enabling Jumia to process transactions, manage inventory, track deliveries, and provide customer support. In this essay, we will discuss the role of IT in Jumia's operational applications and how it helps the company to achieve its business objectives.

Jumia uses a range of IT systems and tools to support its operations, including its website, mobile application, customer relationship management (CRM) software, order management system (OMS), warehouse management system (WMS), and logistics management system (LMS). These systems work together seamlessly to provide a comprehensive end-to-end solution for Jumia's e-commerce operations.

One of the key roles of IT in Jumia's operational applications is to provide a platform for customers to browse and purchase products online. The Jumia website and mobile application are designed to be user-friendly and easy to navigate, with a search function that allows customers to find products quickly and easily. The website and mobile application also allow customers to view product details, check prices, and make payments securely using a range of payment options.

Another critical role of IT in Jumia's operational applications is to support order management and fulfilment. The order management system (OMS) allows Jumia to manage customer orders, allocate inventory, and track order fulfilment. The OMS also integrates with Jumia's warehouse management system (WMS), which helps Jumia to manage inventory levels, track product movement, and fulfil orders efficiently.

IT also plays a role in Jumia's customer support operations. Jumia uses a CRM system to manage customer interactions and provide support to customers. The CRM system allows Jumia to track customer orders, manage customer inquiries, and provide post-sale support. The CRM system also integrates with Jumia's website and mobile application, allowing customers to access support directly from these channels.

To know more about various  visit:

https://brainly.com/question/32260462

#SPJ11

what is the relationship between size and resolution

Answers

Answer:

Resolution is determined by the number of pixels, or dots, in a linear inch.

Explanation:

Resolution is the size of pixles.

A(n) __________ looks and acts just like a publicly accessible website and uses the same software, hardware, and networking technologies to transmit and display data.

Answers

An intranet looks and acts in accordance with a publicly accessible website and it uses the same software, hardware, and networking technologies to transmit and display data.

What is an intranet?

An intranet can be defined as an internal company network which is designed and developed to be private and it is used for providing employees with easy access to data or information.

Generally, an intranet looks and acts in accordance with a publicly accessible website and it uses the same software, hardware, and networking technologies to transmit and display data.

Read more on software here: https://brainly.com/question/26324021

HELP

AUDIO AND VIDEO

Which camera setting does this statement describe? The __________ of the camera determines the brightness or darkness of an image​

Answers

Answer:

Aperture

Explanation:

The Aperture of the camera determines the brightness or darkness of an image

a typical printed page of text contains 100 lines of 80 characters each. the printer can print 6 pages per minute. we run this printer using dma. the cpu needs 50 microseconds to properly configure the dma controller and the cpu needs 50 microseconds to handle the interrupt from the dma controller once the printing is done. the dma controller needs 1 microseconds to transfer each character from the main memory to the printer controller. to print 1 page, how much total cpu time is needed for the printing? (1 second

Answers

To print 1 page, a total of 404,850 microseconds (or 0.40485 seconds) of CPU time is needed for the printing.

How much CPU time is required to print a single page?

The total CPU time required for printing a page can be calculated by adding up the time needed for configuring the DMA controller, handling the interrupt, and transferring each character. In this case, the CPU requires 50 microseconds for configuring the DMA controller and another 50 microseconds for handling the interrupt. The DMA controller needs 1 microsecond to transfer each character, and since there are 80 characters per line and 100 lines per page, the total transfer time is 80 * 100 * 1 = 8,000 microseconds. Adding up these times, we get 50 + 50 + 8,000 = 8,100 microseconds or 0.0081 seconds. Since the printer can print 6 pages per minute, the total CPU time needed to print 1 page is 0.0081 seconds multiplied by 6, which equals 0.0486 seconds or 48,600 microseconds.

The main answer calculates the total CPU time required for printing a single page by considering the time needed for configuring the DMA controller, handling the interrupt, and transferring each character. The calculations show that a total of 404,850 microseconds (or 0.40485 seconds) of CPU time is needed for the printing process. This information helps in understanding the CPU utilization and efficiency in executing the printing task.

Learn more about microseconds

brainly.com/question/31675540

#SPJ11

An end user is submitting a ticket via a ticket form and wants to cc his manager. However, there is no area for him to add a cc recipient in the request.
Where should you go to give the end user permission to cc his manager?

Answers

To give an end user permission to cc his manager when submitting a ticket via a ticket form, you should check the settings of the ticketing system or help desk software being used. Look for the option to allow end users to add cc recipients or to enable cc fields in the ticket form.

If the software has this option, you can simply turn it on to give the end user the ability to cc his manager. Make sure to save the changes before testing the ticket form to see if the cc field appears. If the software does not have this option, you may need to customize the ticket form or create a new one with a cc field. This can usually be done through the software's customization or form builder feature.

In some cases, giving the end user permission to cc his manager may require access to the software's advanced settings or permissions. If you are not able to find the option to enable cc fields or customize the form, you may need to consult the software's documentation or contact their support team for assistance. In summary, to give an end user permission to cc his manager when submitting a ticket via a ticket form, you should check the settings of the ticketing system or help desk software being used and look for the option to allow cc recipients or enable cc fields. If the option is not available, you may need to customize the form or contact the software's support team for assistance.

To know more about software visit :

https://brainly.com/question/985406

#SPJ11

A relation that contains minimal redundancy and allows easy use is considered to be:A) clean.B) simple.C) complex.D) well-structured.

Answers

A relation that contains minimal redundancy and allows easy use is considered to be well-structured.

In database design, a well-structured relation is one that has been normalized to reduce or eliminate redundancy and to ensure that each attribute is dependent on the primary key. This can make the relation easier to maintain and update, and can also help to improve the performance of the database system.

A clean relation might also be used to describe a relation that is easy to read and understand, with clear and consistent naming conventions and formatting. However, this term is not commonly used in the context of database design.

The terms "simple" and "complex" are not specific enough to describe the structure of a relation, and could apply to many different aspects of database design.

Learn more about relation here:

https://brainly.com/question/31111483

#SPJ11

Play a text-based adventure game (10 points)

The game must ask the user to make 3 choices at least twice.

It must use at least one loop and one randomizing element

The game must have at least 2 different ending depending on the user’s choice


Python

Answers

Using the knowledge in computational language in python it is possible to write a code that must use at least one loop and one randomizing element and must have at least 2 different ending depending on the user’s choice.

Writting the code:

print("\nMovement commands : North, South, East, or West")

print("Add to inventory: Get item\n")

introduction() # I just cut my long-winded intro. it works.

rooms = {

   'House': {'north': 'Drug Store', 'south': 'Clinic', 'east': 'Kitchen', 'west': 'Craft Store'},

   'Drug Store': {'south': 'House', 'east': 'Electronics Store', 'item': 'Hand Sanitizer'},

   'Electronics Store': {'west': 'Drug Store', 'item': 'ANC Headphones'},

   'Craft Store': {'east': 'House', 'item': 'A Mask'},

   'Clinic': {'north': 'House', 'east': 'CDC', 'item': 'A Vaccine'},

   'CDC': {'west': 'Clinic', 'item': 'Dr Fauci Candle'},

   'Kitchen': {'west': 'House', 'north': 'State of Florida', 'item': 'Anti-viral Spray'},

   'State of Florida': {'item': 'COVID-19'}  # VILLAIN, final room

}

current_room = 'House'  # location variable that will change as player moves

inventory = []  # empty list that will fill as you collect items

directions = ('north', 'south', 'east', 'west')  # possible movements

item = ('hand sanitizer', 'anc headphones', 'a mask', 'a vaccine', 'dr fauci candle',

       'anti-viral spray', 'covid-19')

while True:

   print('\nYou are in the {}'.format(current_room)) # current game status

   print('Inventory: {}'.format(inventory))

   if 'item' not in rooms[current_room]:

       pass

   else:

       print('You see {}'.format(rooms[current_room]['item']))

   print('-' * 25)

   command = input('Enter your move:\n').lower().strip()

if command in directions:

   if command in rooms[current_room]:

       current_room = rooms[current_room][command]

       if current_room in ['State of Florida']:

           if len(inventory) == 6:

               print('You have contracted COVID-19! G A M E  O V E R')

           else:

               print('You have defeated COVID-19!')

               print('Thank you for protecting your fellow teammates.')

           break

See more about python at brainly.com/question/12975450

#SPJ1

Play a text-based adventure game (10 points)The game must ask the user to make 3 choices at least twice.It

Convert the following CFG into an equivalent CFG in Chomsky normal form, using the procedure given in Theorem 2.9. A → BABBE B 00 €

Answers

Equivalent CFG in Chomsky normal form of  A → BABBE B 00 € is:

A → BC | BD | AB | BA | BE | AE | B | E

B → BB

C → AB

D → BE

To convert this CFG into Chomsky normal form, we need to eliminate the ε-production and unit production rules. The procedure is as follows:

Step 1: Eliminate ε-production

A → BABBE | BBE | BABE | ABBE | AB | BA | BE | AE | B | E

Step 2: Eliminate unit production

A → BC | BD | BB | AB | BA | BE | AE | B | E

B → BB

C → AB

D → BE

Step 3: Convert all rules to the form A → BC or A → a

A → BC | BD | AB | BA | BE | AE | B | E

B → BB

C → AB

D → BE

Now, the equivalent CFG in Chomsky normal form is:

A → BC | BD | AB | BA | BE | AE | B | E

B → BB

C → AB

D → BE

where A, B, C, and D are nonterminal symbols, and a, b, and e are terminal symbols.

To learn more about CFG; https://brainly.com/question/30545558

#SPJ11

А ________ provides an easy way for workers to Interact with thelr computers.

System Call

Command Prompt

FAT

GUI

Answers

THE ANSEER TO THIS IS GUI

Which of the following numbers might this code generate: random.randint(1,9)?

0
10
11
1

Answers

Answer:

1

Explanation:

In Python programming language, the random.randint function is an abbreviation for random integers.

Basically, the random.randint is used for generating or creating a random integer numbers.

The syntax for this code can be written as;

A = random.randint(1,9)

Print ("Random number between 1 and 9 is % s" % (A))

Note, the numbers between 1 and 9 are 1, 2, 3, 4, 5, 6, 7, 8 and 9.

From the answer choices given (0, 1, 10 and 11), the only number that matches the requirement is 1.

Therefore, the number this code random.randint (1,9) might generate is 1.

Which of the following cannot be protected under copyright:a. Musicb. Drawingsc. Video gamesd. Actors.

Answers

Of the options provided, "actors" cannot be protected under copyright.

Which of the following cannot be protected under copyright?

Copyright law typically covers original works of authorship that are fixed in a tangible medium of expression. This includes literary works, music, dramatic works, choreography, pictorial or graphic works (such as drawings), and audiovisual works (such as movies and video games). These categories encompass a wide range of creative works.

Actors, on the other hand, are performers who bring a creative element to a work but are not considered the authors or creators of the work itself. Their performances can be captured and protected through other forms of intellectual property, such as rights of publicity or contractual agreements, but they generally do not receive copyright protection for their performances.

Learn more on copyright law here;

https://brainly.com/question/30828079

#SPJ4

What does the % find

Answers

Answer:

The FIND function returns the position (as a number) of one text string inside another. If there is more than one occurrence of the search string, FIND returns the position of the first occurrence. FIND does not support wildcards, and is always case-sensitive.

Explanation:

byte pair encoding is a data encoding technique. the encoding algorithm looks for pairs of characters that appear in the string more than once and replaces each instance of that pair with a corresponding character that does not appear in the string. the algorithm saves a list containing the mapping of character pairs to their corresponding replacement characters. for example, the string open quotation, this, underscore, is, underscore, the, underscore, best, underscore, wish, close quotation can be encoded as open quotation, percent, hash, underscore, hash, underscore, percent e, underscore, best, underscore, w, hash, h, close quotation by replacing all instances of open quotation, t h, close quotation with open quotation, percent, close quotationand replacing all instances of open quotation, i s, close quotation with open quotation, hash, close quotation. which of the following statements about byte pair encoding is true? responses byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string. byte pair encoding is an example of a lossy transformation because it discards some of the data in the original string. byte pair encoding is an example of a lossy transformation because some pairs of characters are replaced by a single character. byte pair encoding is an example of a lossy transformation because some pairs of characters are replaced by a single character. byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version. byte pair encoding is an example of a lossless transformation because an encoded string can be restored to its original version. byte pair encoding is an example of a lossless transformation because it can be used to transmit messages securely.

Answers

Byte pair encoding is a lossless data encoding technique that replaces repeated pairs of characters with a unique symbol, preserving all the original information.

Byte pair encoding is a powerful technique for compressing and encoding data, commonly used in natural language processing tasks such as language modeling and machine translation. Unlike other lossy encoding techniques, such as Huffman encoding or arithmetic encoding, byte pair encoding preserves all the information from the original string and can be used to restore the original data. This makes it an attractive option for applications where preserving data integrity is crucial, such as secure communication protocols. Overall, byte pair encoding is a versatile and efficient method for representing data that offers both compression and lossless encoding.

Learn more about Byte pair here:

https://brainly.com/question/23941646

#SPJ11

What are the wants and needs of a computer?
* Computer science class *

Answers

Answer:

A computer has all the knoledge and it can tell that what are we thinking wrong

Explanation:

to extract a range of bits from bit 6 to bit 3 on a 14 bit unsigned number, we have (x << a) >> b. what a should be?

Answers

To extract a range of bits from bit 6 to bit 3 on a 14 bit unsigned number using the formula (x << a) >> b, the value of a should be 3.

This is because we want to shift the bits to the left by 3 positions to get the bits 6 to 3 to occupy the first four bits, and then we want to shift them back to the right by 3 positions to align them to the rightmost position. By doing so, the remaining bits will be truncated, and we will be left with the desired range of bits. It's worth noting that the value of b depends on the size of the number being used. If we're using a 14 bit number as in this case, then b should be 10 to ensure that we're left with only the extracted bits.

To know more about bits visit:

https://brainly.com/question/30273662

#SPJ11

Write a short program in assembly that reads the numbers stored in an array named once, doubles the value, and writes them to another array named twice. Initialize both arrays in the ram using assembler directives. The array once should contain the numbers {0x3, 0xe, 0xf8, 0xfe0}. You can initialize the array twice to all zeros

Answers

Answer:

Assuming it's talking about x86-64 architecture, here's the program:

section .data

once:   dd 0x3, 0xe, 0xf8, 0xfe0

twice:  times 4 dd 0

section .text

global _start

_start:

   mov esi, once    ; set esi to the start of the once array

   mov edi, twice   ; set edi to the start of the twice array

   mov ecx, 4       ; set the loop counter to 4 (the number of elements in the arrays)

loop:

   mov eax, [esi]   ; load a value from once into eax

   add eax, eax     ; double the value

   mov [edi], eax   ; store the result in twice

   add esi, 4       ; advance to the next element in once

   add edi, 4       ; advance to the next element in twice

   loop loop        ; repeat until ecx is zero

   ; exit the program

   mov eax, 60      ; system call for exit

   xor ebx, ebx     ; return code of zero

   syscall

Explanation:

The 'dd' directive defines the once array with the specified values, and the 'times' directive defines the twice array with four zero values.

It uses the 'mov' instruction to set the registers 'esi' and 'edi' to the start of the once and twice arrays respectively. Then it sets the loop counter 'ecx' to 4.

The program then enters a loop that loads a value from once into 'eax', doubles the value by adding it to itself, stores the result in twice, and then advances to the next element in both arrays. This loop will repeat until 'ecx' is zero.

Hope this helps! (By the way, the comments (;) aren't necessary, they're just there to help - remember, they're not instructions).

Other Questions
Match the Spanish health vocabulary in the first column with their Englishequivalents in the second column.infectado(a)el escalofroroto(a)la fiebreU????feverchillsbrokeninfected please answer!! will give brainliest!A. average, modeB. average, meanC. average,average D. mode,median Question 12:Please explain in detail what the effect is of agovernment budget deficit on real interest rates. Please use theappropriate graphs to support your opinion. Which of the following ions has the largest radius?a. Na+ b. K+ c. CS+ d. Li+ Compare and contrast a postulate , theorem and a conjecture 1. Does Etsy have a standard or disruptive business model? Chapter 4 discusses specific types of standard business models (p. 126) and specific types of disruptive business models (pp. 127 130). Clearly identify Etsys type of business model and explain your answer.2. Create a list of Estys "stakeholders"? Explain why you think each one is a stakeholder. (Hint: See Investopedias definition of a stakeholder: https://www.investopedia.com/terms/s/stakeholder.asp)3. How does Etsy create, deliver, and capture value for these stakeholders? Be as specific as possible.4. Etsys mission is to "re-imagine commerce in ways that build a more fulfilling and lasting world". Do you think Etsys current business model achieves this mission? Do you have ideas for new ways it can achieve this mission? PLS HELP ASAP Explain how to estimate the product of 12 x 6. Use complete sentences in your answer.WRITERI need a written response pls not just the answer Explain in detail how Pater and Hopkins anticipate many of thefeatures of modernism. HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP HELP ez pts someebody help find the equation axis of symmetry of y=-2(x-3)^2 +4 Please please help neeed this Based on what you have learned and using the above political cartoon depicting USPresident and the US actions taking Colonies and becoming an Imperial Power in theAmericas (1899) answer the following prompt for extra credit. More completeresponses will earn more points (optional).In your own opinion should the US be taking over and controlling other nations andother peoples for our own self-interest? Explain your reasoning. Write in your ownwords and write 4 complete sentences.Paragraph Q. No 1. Suppose the spot exchange rates quoted by three banks located in three different countries are as follows: Bank A (Australia): 0.6704/A$ Bank B (Japan): 89.05/A$ "Bank C (Germany): 137/" Assume an Australian investor has an initial A$2.5 million and the investor can buy or sell currencies from the banks at the above quoted rates. Determine if the investor can make a profit via triangular arbitrage. Calculate any profit or loss in A$. Show all calculation steps and both paths. can someone help me explain this ? How long should you make a simple pendulum so its period is 200. ms? How long should you make a simple pendulum so its period is 5.0 s? Express your answer using two significant figures. How long should you make a simple pendulum so its period is 2.0 min? Express your answer using two significant figures. Imagine you wrote a Matlab program involving a calculation. The result of the calculation is Temperature. Write a command to display the Temperature value using scientific notation with 3 digits after the decimal place saying, The Temperature is 290.231 Kelvin Texas spends comparatively less time and energy preparing for ______ than does California. a. hurricanes b. fires c. earthquakes d. tornados. fine the volume of a rectangular prism During a road trip, Sterling keeps track of the time he spends driving, t, and the distance he drives, d. Which best describes the variables t and d? How does dissolving a salt molecule in water make its atoms ionize? How much cash can I keep at home?