Define a function ComputeNum0 that takes two integer parameters and returns the result of subtracting the second parameter from the product of 2 and the first parameter. Ex: If the input is 46 , then the output is: 2 1 Uinclude ciostreams 2 using namespace std; 3 4 5 6 6 int main() I 6 int main() 1 int input1, input2: 8 int result; 10. cin → inputi; 11 cin ≫> input2; 12 result = conqutekun ( input 1 , input 2) 13 result = computekun (input1, inputz); 15 cout « result « endi; 17 return 8;

Answers

Answer 1

The function ComputeNum0 takes two integer parameters as input and returns the result of subtracting the second parameter from the product of 2 and the first parameter. This can be achieved using a simple formula: result = 2 * input1 - input2 Where input1 is the first parameter and input2 is the second parameter. This formula multiplies the first parameter by 2 and then subtracts the second parameter from it.

To implement this function in the provided code, you can add the following function definition before the main function: int ComputeNum0(int input1, int input2) { int result; result = 2 * input1 - input2; return result; } This function takes two integer parameters input1 and input2 and returns the computed result as an integer. To use this function, you can call it in the main function as follows:

result = ComputeNum0(input1, input2); This will calculate the result using the ComputeNum0 function and store it in the result variable. Finally, you can output the result using the cout statement: cout << result << endl; This will print the result to the console. The entire updated code would look like this: #include using namespace std; int ComputeNum0(int input1, int input2) { int result; result = 2 * input1 - input2; return result; } int main() { int input1, input2, result; cin >> input1; cin >> input2; result = ComputeNum0(input1, input2); cout << result << endl; return 0; }

Learn more about integer here-

https://brainly.com/question/15276410

#SPJ11


Related Questions

Find solutions for your homework
engineering
computer science
computer science questions and answers
this is python and please follow the code i gave to you. please do not change any code just fill the code up. start at ### start your code ### and end by ### end your code ### introduction: get codes from the tree obtain the huffman codes for each character in the leaf nodes of the merged tree. the returned codes are stored in a dict object codes, whose key
Question: This Is Python And Please Follow The Code I Gave To You. Please Do Not Change Any Code Just Fill The Code Up. Start At ### START YOUR CODE ### And End By ### END YOUR CODE ### Introduction: Get Codes From The Tree Obtain The Huffman Codes For Each Character In The Leaf Nodes Of The Merged Tree. The Returned Codes Are Stored In A Dict Object Codes, Whose Key
This is python and please follow the code I gave to you. Please do not change any code just fill the code up. Start at ### START YOUR CODE ### and end by ### END YOUR CODE ###
Introduction: Get codes from the tree
Obtain the Huffman codes for each character in the leaf nodes of the merged tree. The returned codes are stored in a dict object codes, whose key (str) and value (str) are the character and code, respectively.
make_codes_helper() is a recursive function that takes a tree node, codes, and current_code as inputs. current_code is a str object that records the code for the current node (which can be an internal node). The function needs be called on the left child and right child nodes recursively. For the left child call, current_code needs increment by appending a "0", because this is what the left branch means; and append an "1" for the right child call.
CODE:
import heapq
from collections import Counter
def make_codes(tree):
codes = {}
### START YOUR CODE ###
root = None # Get the root node
current_code = None # Initialize the current code
make_codes_helper(None, None, None) # initial call on the root node
### END YOUR CODE ###
return codes
def make_codes_helper(node, codes, current_code):
if(node == None):
### START YOUR CODE ###
pass # What should you return if the node is empty?
### END YOUR CODE ###
if(node.char != None):
### START YOUR CODE ###
pass # For leaf node, copy the current code to the correct position in codes
### END YOUR CODE ###
### START YOUR CODE ###
pass # Make a recursive call to the left child node, with the updated current code
pass # Make a recursive call to the right child node, with the updated current code
### END YOUR CODE ###
def print_codes(codes):
codes_sorted = sorted([(k, v) for k, v in codes.items()], key = lambda x: len(x[1]))
for k, v in codes_sorted:
print(f'"{k}" -> {v}')
Test code:
# Do not change the test code here
sample_text = 'No, it is a word. What matters is the connection the word implies.'
freq = create_frequency_dict(sample_text)
tree = create_tree(freq)
merge_nodes(tree)
codes = make_codes(tree)
print('Example 1:')
print_codes(codes)
print()
freq2 = {'a': 45, 'b': 13, 'c': 12, 'd': 16, 'e': 9, 'f': 5}
tree2 = create_tree(freq2)
merge_nodes(tree2)
code2 = make_codes(tree2)
print('Example 2:')
print_codes(code2)
Expected output
Example 1:
"i" -> 001
"t" -> 010
" " -> 111
"h" -> 0000
"n" -> 0001
"s" -> 0111
"e" -> 1011
"o" -> 1100
"l" -> 01100
"m" -> 01101
"w" -> 10000
"c" -> 10001
"d" -> 10010
"." -> 10100
"r" -> 11010
"a" -> 11011
"N" -> 100110
"," -> 100111
"W" -> 101010
"p" -> 101011
Example 2:
"a" -> 0
"c" -> 100
"b" -> 101
"d" -> 111
"f" -> 1100
"e" -> 1101

Answers

Get codes from the treeObtain the Huffman codes for each character in the leaf nodes of the merged tree.

The returned codes are stored in a dict object codes, whose key (str) and value (str) are the character and code, respectively. make_codes_helper() is a recursive function that takes a tree node, codes, and current_code as inputs. current_code is a str object that records the code for the current node (which can be an internal node). The function needs be called on the left child and right child nodes recursively. For the left child call, current_code needs increment by appending a "0", because this is what the left branch means; and append an "1" for the right child call.CODE:import heapq
from collections import Counter
def make_codes(tree):
   codes = {}
   ### START YOUR CODE ###
   root = tree[0] # Get the root node
   current_code = '' # Initialize the current code
   make_codes_helper(root, codes, current_code) # initial call on the root node
   ### END YOUR CODE ###
   return codes
def make_codes_helper(node, codes, current_code):
   if(node == None):
       ### START YOUR CODE ###
       return None # What should you return if the node is empty?
       ### END YOUR CODE ###
   if(node.char != None):
       ### START YOUR CODE ###
       codes[node.char] = current_code # For leaf node, copy the current code to the correct position in codes
       ### END YOUR CODE ###
   ### START YOUR CODE ###
   make_codes_helper(node.left, codes, current_code+'0') # Make a recursive call to the left child node, with the updated current code
   make_codes_helper(node.right, codes, current_code+'1') # Make a recursive call to the right child node, with the updated current code
   ### END YOUR CODE ###
def print_codes(codes):
   codes_sorted = sorted([(k, v) for k, v in codes.items()], key = lambda x: len(x[1]))
   for k, v in codes_sorted:
       print(f'"{k}" -> {v}')
       
Test code:
# Do not change the test code here
sample_text = 'No, it is a word. What matters is the connection the word implies.'
freq = create_frequency_dict(sample_text)
tree = create_tree(freq)
merge_nodes(tree)
codes = make_codes(tree)
print('Example 1:')
print_codes(codes)
print()
freq2 = {'a': 45, 'b': 13, 'c': 12, 'd': 16, 'e': 9, 'f': 5}
tree2 = create_tree(freq2)
merge_nodes(tree2)
code2 = make_codes(tree2)
print('Example 2:')
print_codes(code2)

To know more about Huffman codes visit:

https://brainly.com/question/31323524

#SPJ11

rachel is the cybersecurity engineer for a company that fulfills government contracts on top secret projects. she needs to find a way to send highly sensitive information by email in a way that won't arouse the suspicion of malicious parties. if she encrypts the emails, everyone will assume they contain confidential information. what is her solution?

Answers

Her solution If she encrypts the emails and everyone assumes they contain confidential information would be to Hide messages in the company's logo within the email.

The technique of encrypting a secret logo with the use of an encryption algorithm just so unauthorized people cannot access it is what is meant by the term "logo encryption." Even though it seems difficult to perform, this procedure is quite efficient, adding another feather to the advantages of logo encryption with CBC inclusion. The final output, or cipher text, can be further modified well with aid of the key in order to picture a far more visually appealing logo for the hacker, which, when fully examined, need not consider leaving a single mention of the randomization which has been created toward the logo. This would be true despite the fact that logo and data encryption is entirely distorted as well as uncertain. Analysis reveals that this idea promotes.

Learn more about logo encryption here: https://brainly.com/question/14492376

#SPJ4

A qué escala está dibujado el plano del Instituto si sabemos que la puerta principal de entrada tiene un ancho 3,40 metros y en el plano hemos medido con la regla 68mm

Answers

Answer:

\(\dfrac{1}{50}\)

Explanation:

\(3.4\ \text{m}\) es equivalente a

\(68\ \text{mm}\)

\(=68\times 10^{-3}\ \text{m}\) en el plan.

\(1\ \text{m}\) del plan es equivalente a

\(\dfrac{68\times 10^{-3}}{3.4}\)

\(=\dfrac{1}{50}\)

Esto significa que el plan es \(\dfrac{1}{50}^{\text{th}}\) de la dimensión real.

Por lo tanto, la escala del plan es \(\dfrac{1}{50}\)

Jonah has finished his assignment and now wants to save his work with the title "Renaissance."
Which steps should Jonah follow to accomplish this?
navigate to the Quick Access bar, click the Save icon
navigate to the backstage view, click the Save As icon
click the File tab, click Save, type in the title, click Save
click the File tab, click Save As, type in the title, click Save

Answers

Answer:

Your answer is D.click the File tab, click Save As, type in the title, click Save

Explanation:

Jonah has finished his assignment and now wants to save his work with the title "Renaissance."Which steps

Answer:

C

Explanation:

took the quiz

many tools are created to review logs, analyze traffic, and perform surveillance. these are best described as which type of controls? detective controls deterrent controls preventive controls corrective controls

Answers

The tools that are created to review logs, analyze traffic, and perform surveillance are best described as A: detective controls.

Detective controls are security measures that are used to detect or discover security breaches, unauthorized access, or other security-related events that have already occurred. These controls are used to identify potential security incidents and help organizations respond to them in a timely manner.

Examples of detective controls include security monitoring systems, intrusion detection systems, security information and event management (SIEM) systems, and security audits or reviews. These controls are typically used in combination with other security controls, such as preventive controls and corrective controls, to provide a comprehensive security strategy.

Therefore, the correct answer option is A: "detective controls".

You can learn more about detective controls at

https://brainly.com/question/28163142

#SPJ11

Which concept, when applied in an algorithm, allows the computer to make
decisions?
A. Sequencing
B. Storage
C. Selection
D. Iteration

Answers

The data and statistical analyses used by algorithmic or automated decision systems are classified as individuals to estimate their entitlement to benefit or penalty.

They are used also in the public sector, such as the delivery, sentence, and parole judgments in criminal justice.It is the limited series of well-defined instructions for computers implementation, generally for solving a class or completing a calculation of specific issues. Algorithms are always unambiguous and are used as computations, processing data, automated simplification as well as other duties.A sequencing notion allows a computer to pass judgment if implemented in an algorithm.

Therefore, the final answer is "Option A".

Learn more:

brainly.com/question/19565052

Answer:

C. Selection

Explanation:

had to learn the hard way

When you execute this block in Scratch, your computer is actually doing several things: retrieving values from memory representing the direction and position of the sprite, performing an algorithm to update these values, and changing the display in the window to match the updated state of the program. All of these actions are represented by just one single block.

Which of the following terms names the phenomenon which is best described by this statement?

a) Iteration
b) Sequencing
c) Compilation
d) Abstraction

Answers

Sequencing is the term that names the phenomenon which is best described by the given statement.

Sequencing refers to the order of logical arrangement whereby an instruction is executed in the proper order. This means that one process must be completed before the next command becomes valid and executes.

From the given statement, the computer is performing various operations in sequence which are:

Retrieving values from memoryPerforming algorithmChanging the display

These functions are done by order, using a single block.

Read more here:

https://brainly.com/question/18744767

explain the following joke: “There are 10 types of people in the world: those who understand binary and those who don’t.”

Answers

It means that there are people  who understand binary and those that do not understand it. That is, binary is said to be the way that computers are known to express numbers.

What is the joke about?

This is known to be a popular  joke that is often  used by people who are known to be great savvy in the field of mathematics.

The joke is known to be one that makes the point that a person is implying that the phrase is about those who only understands the decimal system, and thus relies on numbers in groups of 10.

The binary system is one that relies on numbers that are known to be  in groups of 2.

Therefore, If the speaker of the above phrase is one who is able to understand binary, that person  would  be able to say that that the phrase  is correctly written as  "there are 2 types of people that understand binary".

Learn more about binary from

https://brainly.com/question/21475482

#SPJ1

What different mechanisms could make the grain crusher work?

Answers

The post-cyclic behavior of biogenic carbonate sand was evaluated using cyclic triaxial testing through a stress control method under different confining pressures between 50 to 600 kPa

What are 3 similarities and 3 differences between live theatre and film/videos -Drama Class

Answers

Differences-
1. Theatre is live. Film has been captured in the past. We only see after the making process is done.

2.You have chance for improvement in each theatre shows but its impossible in Films. Once film is done its done.

3.Normally Theatre is cheaper, films are costly.

Similarities-

1.Theatre and films both are arts, so many varieties of arts melt into theatre or film to make it happen.

2.Theatre and films both are very effective medium of communication.

3.Theatre and films both are considered as great form of Entertainment.

I used a walmart MoneyCard and now it says its prepaid. Its my dad's card.

Answers

Answer:

oh- Did he find out-

Explanation:

Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the Ruler option to achieve this. On which tab is the Ruler option found?

choose *View got a 100%

Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the
Allan needs to ensure that an object is in a very precise location on a slide. He decides to use the

Answers

Answer:

view

Explanation: post protected

the drive: FIGURE 7-28 Synchrono belt drive for Example Problem 7-3 20pts) Looking at figure 7-28 the following is known about this new system. The driver sprocket is a P24-8MGT-30 and is attached to a Synchronous AC Motor with a nominal RPM of 1750rpm. The driven sprocket should turn about 850RPM and is attached to a Boring Mill that will run about 12 hours per day. The sprocket should have a center distance as close to 20" without going over. a. What sprocket should be used for the driver sprocket 2 b. What is a the number of teeth and pitch diameter of both sprockets What is the RPM of the driven sprocket

Answers

The RPM of the driven sprocket is calculated as 10.4kp. RPM stands for reels per nanosecond and is also shortened rpm. The cycle of the RPM is calculated as 174.9.

The calculations are attached in the image below:

This is a unit which describes how numerous times an object completes a cycle in a nanosecond. This cycle can be anything, the pistons in a internal combustion machine repeating their stir or a wind turbine spinning formerly all the way around.

Utmost wind turbines try to spin at about 15 RPM, and gearing is used to keep it at that speed. Gearing is also used with the crankshaft of a vehicle in order to keep the RPM reading in a range( generally 2000- 3000 RPM). Some racing motorcycles will reach further than 20,000 RPM.

Learn more about RPM cycle here:

https://brainly.com/question/32815240

#SPJ4

the drive: FIGURE 7-28 Synchrono belt drive for Example Problem 7-3 20pts) Looking at figure 7-28 the

Discuss how file and process ownership can pose a threat to the security of a computer system.

Answers

File and Process ownership can pose a threat to the security of a computer system by making changes to the system files.

File and Process ownership refers to the sole ownership and administration-like privileges of a user to a file and process in a computer system which gives access to be able to modify some things that could adversely affect the computer system.

Conversely, when an unauthorized user makes use of this to make changes, it can lead to:

Loss of personal dataMisuse of administrator privilege Hackings

Therefore, the threat this can pose to the security of a computer system is enormous and safeguards should be put in place to ensure such lapses never occur.

Read more here:

https://brainly.com/question/17063426

By placing you cursor over any value in a Pivot Table, it will display the: Cell format Cell information Cell address Defined Name

Answers

By placing your cursor over any value in a Pivot Table, it will display the cell information.

A pivot table is a table of statistics that summarizes the data of a more comprehensive table. It is used to categorize, sort, group, and summarize large amounts of data. It enables data in a spreadsheet to be compared, analyzed, and used to generate reports.

A Pivot Table has the following components:

Values: Numeric values that are summed, counted, or averaged.

Columns: Fields that are located in the horizontal area of the pivot table.

Rows: Fields that are placed in the vertical area of the pivot table.

Filters: Fields that are used to filter the data that are displayed in the pivot table.

Subtotals: Intermediate calculations performed for each field.

Cell Information is a feature in Excel that displays data about the cell you're looking at in a small box next to the cell. The cell information tool can show you the formula or format of the cell, as well as the cell reference, column, and row. When you hover over a value in a pivot table, Excel displays the cell information, which includes the underlying data and summary functions used in the pivot table.

Learn more about Pivot Table: https://brainly.com/question/29786921

#SPJ11

when you can click a button on a website to run code to change the font size, the code that changes the font size dynamically probably is an example of _________.

Answers

Overall, the code that changes the font size dynamically on a website by clicking a button exemplifies the client-side scripting approach, leveraging JavaScript to manipulate the DOM and provide real-time updates to the webpage's visual elements.

What type of scripting involves changing font size dynamically on a website when a button is clicked?

The code that changes the font size dynamically when a button is clicked on a website is an example of client-side scripting.

Client-side scripting refers to the execution of code on the user's device or web browser. In this scenario, when the button is clicked, the code runs directly on the client's browser without requiring a round-trip to the server.

The code manipulates the Document Object Model (DOM) of the webpage, specifically targeting the relevant HTML elements to modify the font size.

The code responsible for changing the font size dynamically typically utilizes JavaScript, which is a popular programming language for client-side scripting.

By using JavaScript, the font size can be adjusted based on predefined rules or user preferences. This allows for a more interactive and customized user experience, as users can easily control the appearance of the webpage without needing to reload the entire page or communicate with the server.

Learn more about client-side scripting

brainly.com/question/32926620

#SPJ11

Create your own Dog Class.
(java code only)


As a minimum, include:

- At least three (3) PIVs

- At least two (2) constructors (one no-argument constructor, one two-argument)

- At least four (4) methods (at least 2 getters, and at least 2 setters)

- .toString()

- 2 static methods ( .P() and .PLN() )


Demonstrate with running code:

- Hardcode creation of at least 2 Dog objects, demonstrating both constructors

- Use each method at least once in your program.

- Use .toString() to print out the state of both objects after creation (use your static methods, e.g., .PLN() ).


Submit as .java source code

Answers

The following java code will be:

public class Dog {    

   // PIVs

   private String name;

   private int age;

   private String breed;    

   // constructors

   public Dog() {        

   }    

   public Dog {

       this.name = name ;

       this.age = age;

   }    

   // methods

   public String getName() {

       return this.name;

   }    

   public void setName {

       this.name = name;

   }    

   public int getAge() {

       return this.age;

   }    

   public void setAge {

       this.age = age;

   }  

   public String getBreed() {

       return this.breed;

   }    

   public void setBreed {

       this.breed = breed;

   }    

   public String toString() {

       return "Name: " + this.name + "\n" + "Age:

What is java?

Java is a class-based, object-oriented programming language with few implementation dependencies. Java applications are frequently compiled to bytecode, allowing them to operate on any Java virtual machine (JVM), irrespective of computer architecture.

To learn more about Java
https://brainly.com/question/26789430

#SPJ1

A user calls to report that she’s unable to log on to e-mail, and you ask a couple of questions. Because you know that no one else is using the network right now, you can’t determine whether the problem is unique to her machine or affects the entire network. Probing further, you learn that she’s also unable to print. You decide this problem is probably easier to troubleshoot from the user’s computer. Using the eight-step problem-solving process, outline the items you must check and the questions you must ask when you arrive at the user’s office. B. Based on the possible responses to your questions, describe the actions you will take to correct potential causes of this problem

Answers

The outline of items that one must check is first to know or clarify the issue, break the issue down, etc.

What is troubleshooting?

This is known to be a step by step approach to problem handling that is often used to know and handle issues with systems etc.  

Others includes:

Set one's target in working on the issue, Analyze the main cause, Develop any form of Countermeasures.Then you Implement the Countermeasures made Monitor the Results that was givenGo through the Process to Standardize it and tell the user that it is solved.

Conclusively, By following the steps, one can know the issue and solve it.

Learn more about troubleshoot from

https://brainly.com/question/14394407

Find the total cost of a $125 coat purchased in Los Angeles County where the sales tax is 9%. Use the expression c + 0.09c
A
$11.25
B
$112.50
c
$126.25
0 $136.25

Answers

The answer is B I believe

what is the program name for the system information utility

Answers

The program name for the system information utility varies depending on the operating system. Some common names for system information utilities are:

- Windows: "System Information" or "msinfo32.exe"

- macOS: "System Information"

- Linux: "lshw" (short for "list hardware"), "dmidecode" (reads the DMI table), or "inxi" (a versatile system information script)

The system information utility is a software tool that provides detailed information about the hardware, software, and configuration of a computer system. It allows users to gather information about the processor, memory, storage devices, network adapters, installed software, and various system settings.

On Windows, the built-in utility is called "System Information" or can be accessed by running "msinfo32.exe" from the Run dialog or Command Prompt.

On macOS, the system information utility is simply named "System Information." It can be found in the Utilities folder within the Applications folder, or it can be accessed through Spotlight search.

On Linux, there are several utilities available depending on the distribution and user preferences. "lshw" is a popular command-line utility that provides detailed information about the hardware configuration. "dmidecode" reads the DMI (Desktop Management Interface) table and provides system information. "inxi" is a versatile system information script that can be installed and used across various Linux distributions.

The program name for the system information utility depends on the operating system being used. On Windows, it is called "System Information" or "msinfo32.exe," on macOS it is called "System Information," and on Linux, utilities such as "lshw," "dmidecode," or "inxi" can be used to gather system information.

To know more about operating system, visit

https://brainly.com/question/22811693

#SPJ11

a content-filtering technique where the software that performs the filtering task is placed on individual users' computers is called

Answers

The content-filtering technique where the software that performs the filtering task is placed on individual users' computers is called client-based filtering.

Content filtering can be done in several ways. It can be done by blocking specific sites, keywords, or IP addresses. It can also be done using a content filter, which can be server-based or client-based.

The filtering technique in which filtering is performed by installing filtering software on individual users' computers is known as client-based filtering.

Client-based filtering is a content-filtering technique in which filtering software is installed on individual users' computers. The client-based filtering approach has some advantages over the server-based filtering approach.

It provides more control over user access to the internet and can be configured to filter content based on user profiles. In addition, client-based filtering can be used to enforce internet usage policies in a corporate or educational setting

Client-based filtering is a content-filtering technique in which filtering software is installed on individual users' computers.

It is a useful technique in a corporate or educational setting because it provides more control over user access to the internet and can be configured to filter content based on user profiles.

To know more about content-filtering visit:

https://brainly.com/question/31217498

#SPJ11

Imagine you are a team leader at a mid-sized communications company. One of your fellow team leaders is considering setting up a cloud computing system for their team to store and share files. They have begun to question the wisdom of this move, as someone has told them that security might be an issue. Security concerns aside, what would you say in order to convince them that cloud computing is a good idea? Mention at least three advantages that would benefit their team

Answers

Users can launch their applications rapidly by developing in the cloud. Data security: Because of the networked backups, hardware failures do not cause data loss.

What exactly is cloud computing in simple terms?

Cloud computing can be defined as the provision of computer services over the Internet ("the cloud"), including servers, storage, databases, networking, software, analytics, and intelligence, in order to give scale economies, faster innovation, and flexible resources.

Which of the following encapsulates cloud computing the best?

Instead of purchasing and installing the components on their own computers, organizations and people who use cloud computing rent or lease computing resources and software from third parties across a network, such as the Internet.

To know more about loud computing visit:-

https://brainly.com/question/29737287

#SPJ4

which function could be used to validate an entry for a user's chosen name that must be between 4 and 12 characters?

Answers

A function which could be used to validate an entry for a user's chosen name that must be between 4 and 12 characters include the following: C. length.

What is a function?

In Computer programming and technology, a function can be defined as a set of statements that comprises executable codes and can be used in a software program to calculate a value or perform a specific task on a computer.

In Computer programming, there are two (2) things that must be included in a function definition and these include the following:

A function name.Function variables.

In this context, we can reasonably infer and logically deduce that function length is a criterion that can be used to validate an entry for an end user's chosen name that should be between 4 and 12 characters.

Read more on a function here: brainly.com/question/19181382

#SPJ1

Complete Question:

Which function could be used to validate an entry for a user's chosen name that must be between 4 and 12 characters?

O isString

O random

O length

O toUpper

The creation of OSHA provided this important right to workers:
a) The right to equal employment opportunities. b) The right to privacy. c) The right to pension benefits. d) The right to a safe and healthful workplace.

Answers

The creation of OSHA provided this important right to workers: d) The right to a safe and healthful workplace.

What is OSHA?

OSHA is simply an abbreviation for occupational safety and health administration that was created under the Occupational Safety and Health Act, so as to develop work-safety standards for workers and providing precautionary measures against all workplace hazards.

Generally, OSHA is an agency of the federal government which is saddled with the following responsibilities of developing work-safety standards for employees and providing precautionary measures against all workplace hazards.

In this context, we can infer and logically deduce that the creation of OSHA provided this important right to workers the right to a safe and healthful workplace.

Read more on OSHA here: brainly.com/question/17199752

#SPJ1

“Click” is a type of user input the onEvent code checks for in order to perform actions like going to another screen. List at least 3 other user inputs onEvent can check for.

Answers

Answer:

typing, commands, scrolling. hope this helps

You modify a document that is saved on your computer.

Answers

Answer:

Yes it will save if you pres save or it will save by it self

what percentage of teen social media users report observing cyberbullying online?

Answers

Answer:

59%

Explanation:

59% of teen i think thats the answer

how to print the output of "WELCOME" by using python codes with arrays.

Answers

Answer:

Following are the code to this question:

arr=['WELCOME']#defining list arr and assign string value

print (str(arr)[2:-2])#use print method that uses slicing to remove bracket and quotes

Output:

WELCOME

Explanation:

The Array data type is used to store the same type of value, but in python, the array is not used, instead of using an array we use the list, that stores multiple data types.

In the above code "arr", that is list is declared, that store a string value.    

To print its value, we use the print method, inside this, we use slicing to remove brackets and quotes.

The portion of the IoT technology infrastructure that focuses on how to transmit data is a. hardware. b. applications.

Answers

Answer:

The correct answer is not among the two options listed above (hardware, and applications). The correct answer is "connectivity"

Explanation:

The answer would have been "hardware" if the portion of the IoT technology infrastructure focuses on sensors that take note of the changes in the environment the technology is used. I would have also been "applications" once it focuses on controlling what and how information is captured.

The IoT (Internet of Things) uses sensors, computer applications, and hardware to make devices interact processing and sending large data between computers, collecting data from their surroundings to update the system, and it also uses connectivity to transmit data. This technology is employed in so many fields like health care, Automobile industries, and so more. An example is Self-driving cars which allow devices to be connected to a cloud system.

     

 

If one of the resistors is turned off (I.e. , a light bulb goes out), what happens to the other resistors (light bulbs) in the circuit? Do they remain on? (I.e., lit)?

Answers

Answer:

No, they don't remain on because If any of bulbs in a series circuit is turned off from its socket, then it is observed that the other bulbs immediately go out. In order for the devices in a series circuit to work, each device must work. If one goes out, they all go out.

Other Questions
which two Macromolecules are involved in energy A cell phone company offers a contract that costs $14.99 plus $0.06 per minute. Find the total number of minutes used if the bill for October was $20.21. The anerobic conversion of 1 mole of glucose to 2 mol of lactaet by fermentation is accompanied by 12Which point is a solution to the system of inequalities graphed above?A. (4,2)B. (5,-2)C. (0,3)D. (-2,0) I WILL GIVE YOU BRAINLIEST IF YOU HELP me How did the West impact the shift in Japanese politics during this time ? Find domain of the following functions Liz flips a coin 70 times. The coin lands heads up 42 times and tails up 28 times. Complete each statement Which detail best supports the central idea that clover is disappointed with the farm? there was no thought of rebellion or disobedience in her mind. whatever happened she would remain faithful, work hard, carry out the orders that were given to her. but still, it was not for this that she and all the other animals had hoped and toiled. such were her thoughts, though she lacked the words to express them. Valerie took a job that paid $14 per hour after a pay raise she earned $15.05 per hour find the percent of increase AtoX =38EyouDCThe image above shows a rhombus. Solve for angles x and y.N which of the following is a correctional policy that stipulates that prisons are meant to punish, not coddle, inmates?A. No frills policyB. Hard-hitting coreectionsC. Robust rehabilitationD. Stringent sentencing I have been curious about this question my whole life. What is 2+2? Is it 22 or 4?? A company can invest funds in a floating rate bond with a maturity of five years and a coupon rate of LIBOR plus 100 basis points. The five-year fixed rate on a LIBOR swap is 4%. What fixed rate of interest can the company earn by using the bond and the swap?A. 1%B. 3%C. 4%D. 5% how many 5s are in 2,207 Please help me with this socrates distinguishes his earlier accusers from the later accusers. identify each. which does he consider harder to defend against? why? and what are their accusations? convert this rational number to its decimal format and round to the nearest thousand 6/7? can l go to the party (to, too ,two) Round to 4 significant figures 4,567,985