discuss 5 ways in which computer has influence typography and lettering​

Answers

Answer 1

Answer:

Five ways in which computer has affected typography and lettering are discussed below;

1. Introduction of unconventional typeface: Computers have introduced unconventional typeface texts to typography and lettering by offering a wide range of typeface and fonts that the user can choose from, depending on the type of typing job at hand. Some of these fonts are suitable for aesthetic purpose, and some have official rating. These fonts and type faces range from the Times New Roman, Gothic, Serif, etc.

2. Size and legibility: Computers now allows different sizes of character sizes in typography. These sizes can be chosen easily to suite the degree of readability of the intended message.

3. Specialization: Computer has opened up typography and lettering to lay users and people not specialized in typography. Prior to the digital age, typing jobs were limited to specialist typists who have been trained in typography. Nowadays, anybody with access to a computer can easily learn solo, and be employed as a typist.

4. General layout: The arrangement and layout of text and lettering in typing can now be easily manipulated with a computer, by just selecting from a wide choice of arrangement available on the typing platform.

5. Minimization of errors: The use of computer in typography and lettering has greatly reduced the incidence and occurrence of error in typing. Most computers have built in prediction tools, and auto-correcting software that reduces and sometimes prevent grammatical and spelling errors.


Related Questions

What is an electronic tool that stores large amounts of data in one place in a systematic, logical way? A Database B Platform C Query D Software

Answers

Answer:

Database: An integrated collection of logically related records or files. A database consolidates records previously stored in separate files into a common pool of data records that provides data for many applications. The data is managed by systems software called database management systems (DBMS). The data stored in a database is independent of the application programs using it and of the types of secondary storage devices on which it is stored.

Create a Java program that asks the user for three test
scores. The program should display the average of the
test scores, and the letter grade (A, B, C, D or F) that
corresponds to the numerical average. (use dialog boxes
for input/output)

Answers

Answer:

there aren't many points so it's not really worth it but here

kotlin

Copy code

import javax.swing.JOptionPane;

public class TestScoreGrader {

 public static void main(String[] args) {

   double score1, score2, score3, average;

   String input, output;

   input = JOptionPane.showInputDialog("Enter score 1: ");

   score1 = Double.parseDouble(input);

   input = JOptionPane.showInputDialog("Enter score 2: ");

   score2 = Double.parseDouble(input);

   input = JOptionPane.showInputDialog("Enter score 3: ");

   score3 = Double.parseDouble(input);

   average = (score1 + score2 + score3) / 3;

   output = "The average is " + average + "\n";

   output += "The letter grade is " + getLetterGrade(average);

   JOptionPane.showMessageDialog(null, output);

 }

 public static char getLetterGrade(double average) {

   if (average >= 90) {

     return 'A';

   } else if (average >= 80) {

     return 'B';

   } else if (average >= 70) {

     return 'C';

   } else if (average >= 60) {

     return 'D';

   } else {

     return 'F';

   }

 }

}

Explanation:

Which of the following terms is best described as
the choice of colors, fonts, and formatting to give
your presentation an overall look and feel?
Oslide view
Oslide master
Oslide show
O design theme

Which of the following terms is best described asthe choice of colors, fonts, and formatting to giveyour

Answers

Design theme is the term is best described as the choice of colors, fonts, and formatting to give your presentation an overall look and feel.

What are the themes in PowerPoint?A theme is a collection of predetermined colours, fonts, and visual effects that you apply to your presentations to give them a uniform, polished appearance. Using a theme makes your presentation seem cohesive with little work.A theme is a coordinated combination of colours, fonts, effects, and backdrops you may use to make a presentation that has a polished appearance and a unified design. 2010's PowerPoint comes with a tonne of pre-built themes.Click the Design tab, select a theme, then check out how it appears on the slide to discover a theme to use in your presentation. By altering the fonts, colours, and background colours under the Design tab, you may further personalise the theme.

Learn more about themes in PowerPoint refer to :

https://brainly.com/question/22505414

#SPJ4

Write a program that prompts the user to enter: The cost of renting one room The number of rooms booked The number of days the rooms are booked The sales tax (as a percent). The program outputs: The cost of renting one room The discount on each room as a percent The number of rooms booked The number of days the rooms are booked The total cost of the rooms The sales tax The total billing amount. Your program must use appropriate named constants to store special values such as various discounts.

Answers

Answer:

Written in Python

cost = float(input("Cost of one room: "))

numrooms = int(input("Number of rooms: "))

days = int(input("Number of days: "))

salestax = float(input("Sales tax (%): "))

print("Cost of one room: "+str(cost))

print("Discount: 0%")

print("Number of rooms: "+str(numrooms))

print("Number of days: "+str(days))

totalcost = numrooms * cost

print("Total cost: "+str(totalcost))

salestax = salestax * totalcost/100

print("Sales tax: "+str(salestax))

print("Total Billing: "+str(salestax + totalcost))

Explanation:

The next four lines prompts user for inputs as stated in the question

cost = float(input("Cost of one room: "))

numrooms = int(input("Number of rooms: "))

days = int(input("Number of days: "))

salestax = float(input("Sales tax (%): "))

The following line prints cost of a room

print("Cost of one room: "+str(cost))

The following line prints the discount on each room (No information about discount; So, we assume it is 0%)

print("Discount: 0%")

The following line prints number of rooms

print("Number of rooms: "+str(numrooms))

The following line prints number of days

print("Number of days: "+str(days))

The following line calculates total cost of rooms

totalcost = numrooms * cost

The following line prints total cost

print("Total cost: "+str(totalcost))

The following line calculates sales tax

salestax = salestax * totalcost/100

The following line prints sales tax

print("Sales tax: "+str(salestax))

The following line calculates and prints total billings

print("Total Billing: "+str(salestax + totalcost))

Will AI technology replace most jobs held by employees?

Answers

Short Answer:

Yes, it will replace many jobs but not all. You do not have to pay AI wages or for working overtime. AI will never complain for the workload and generally doesn't have feelings unless programmed to. Computers work faster than humans and more efficiently (less mistakes). AI will not replace all jobs since a lot of them can only be completed with the conscious of a human.

Which topic would be included within the discipline of information systems

Answers

, , , , , are only a few of the subjects covered within the study area of information systems. Business functional areas like business productivity tools, application programming and implementation, e-commerce, digital media production, data mining, and decision support are just a few examples of how information management addresses practical and theoretical issues related to gathering and analyzing information.

Telecommunications technology is the subject of communication and networking. Information systems is a branch of computer science that integrates the fields of economics and computer science to investigate various business models and the accompanying algorithmic methods for developing IT systems.

Refer this link to know more- https://brainly.com/question/11768396

Will meaning of a query may change over time?

Answers

Yes, throughout time, the meaning of a query may alter due to linguistic shifts, societal changes, and technology developments, among other things.

Does a question vary from a query?

This distinction, which is frequently subtle and may also rely on context, carries over to the noun form. In more formal contexts, asking a question has a stronger connotation of "investigating" or "looking into," whereas asking a query has a stronger connotation of "doubting" or "challenging."

What is a query's advantage?

All of the fields are visible when you open a table. A query is a useful tool for saving a number of fields. Note that a query does not actually save data; it just links to data.

To know more about technology  visit:-

https://brainly.com/question/20414679

#SPJ1

Which of the following best describes an insider attack on a network?
OA. an attack by someone who uses fake emails to gather information related to user credentials
OB. an attack by someone who becomes an intermediary between two communication devices in an organizatio
OC. an attack by a current or former employee who misuses access to an organization's network
O D. an attack by an employee who tricks coworkers into divulging critical information to compromise a network

Answers

An attack by a current or former employee who misuses access to an organization's network ca be an insider attack on a network. The correct option is C.

An insider attack on a network refers to an attack carried out by a person who has authorized access to an organization's network infrastructure, either as a current or former employee.

This individual intentionally misuses their access privileges to compromise the network's security or to cause harm to the organization.

Option C best describes an insider attack as it specifically mentions the misuse of network access by a current or former employee.

The other options mentioned (A, B, and D) describe different types of attacks, but they do not specifically involve an insider with authorized access to the network.

Thus, the correct option is C.

For more details regarding network, visit:

https://brainly.com/question/29350844

#SPJ1

Select the feature in Windows Server 2016 that has the ability to support resource records of a type unknown to the DNS server on Windows Server 2016.
a. advanced record support
b. primary record support
c. unknown record support
d. secondary record support

Answers

On Windows Server 2016, there is a feature known as "unknown record support" that allows for resource records of a type the DNS server is unaware of to be supported.

Which DNS security feature in Windows Server 2016 can be set up to permit source port randomization for DNS queries?

When a DNS server executes DNS queries, source port randomization is made possible by the security feature of the DNS socket pool.

Which DNS resource record type is employed to provide the IP address for the email server for a zone?

Name Server records (NS Record) specify that a DNS Zone, like "example.com," is assigned to a particular Authoritative Name Server and indicate the name server's address.

To know more about DNS server  visit :-

https://brainly.com/question/13852466

#SPJ4

Someone help me with 5.8.1 Ghosts from codehs

Answers

In this problem, you are given a list of integers called "ghosts" that represents the positions of ghosts on a game board. Your task is to count the number of ghosts that are next to each other and have the same value.

To solve this problem, you can use a loop to iterate through the list of ghosts. Inside the loop, you can compare each ghost with the next one using an if statement.
Here is a step-by-step explanation of how you can solve this problem:
1. Start by initializing a variable called "count" to 0. This variable will keep track of the number of pairs of adjacent ghosts with the same value.
2. Use a for loop to iterate through the list of ghosts. You can use the range function to generate the indices of the ghosts.
3. Inside the loop, compare the current ghost with the next one using an if statement. You can use the index variable to access the current ghost and the index variable plus 1 to access the next ghost.
4. If the current ghost is equal to the next ghost, increment the count variable by 1.
5. After the loop finishes, the count variable will contain the number of pairs of adjacent ghosts with the same value.
6. Return the value of the count variable as the answer.
Here is the code that solves the problem:
def count_adjacent_ghosts(ghosts):
   count = 0
   for i in range(len(ghosts) - 1):
       if ghosts[i] == ghosts[i + 1]:
           count += 1
   return count
You can call this function with a list of integers representing the positions of ghosts, and it will return the number of pairs of adjacent ghosts with the same value.
For more such questions ghosts,Click on

https://brainly.com/question/10534475

#SPJ8

1. Human to ____Human____
2. _Human________ to machine
3. Machine to ______Machine
4. _______________ to machine

Answers

Answer:

uhmmm human machine whaT?

Explanation:

Answer:

4 is Machine to machine

Select all that apply
Select all the parts of an information system.

Answers

Answer:A,B,C

Explanation:Did it already

What is the main difference between structured and unstructured data?

Answers

Answer:

Please mark Brainliest, Look Down

Explanation:

Structured data vs. unstructured data: structured data is comprised of clearly defined data types with patterns that make them easily searchable; while unstructured data – “everything else” – is comprised of data that is usually not as easily searchable, including formats like audio, video, and social media postings.

Answer:

Structured data is data that appears in pre-defined models. It is organized and fits into templates and spreadsheets, making it easy to analyze. In contrast, unstructured data is not predefined and the data has no form or system to follow. It can come in the form of images, videos, text, and audio, and can be challenging to analyze.

Between structured and unstructured data, there is semi-structured data. Semi-structured data is a combination of organized data and unorganized text. For example, email is considered semi-structured because the body within the email can be unstructured but the email itself can be organized into different folders.

Explanation:

https://www.celonis.com/solutions/celonis-snap

Using this link

To do this alternative assignment in lieu of Case 2, Part 2, answer the 20 questions below. You
will see on the left side of the screen a menu for Process Analytics. Select no. 5, which is Order
to Cash and click on the USD version. This file is very similar to the one that is used for the BWF
transactions in Case 2, Part 2.
Once you are viewing the process analysis for Order to Cash, answer the following questions:
1. What is the number of overall cases?
2. What is the net order value?
Next, in the file, go to the bottom middle where you see Variants and hit the + and see what it
does to the right under the detail of variants. Keep hitting the + until you see where more than a
majority of the variants (deviations) are explained or where there is a big drop off from the last
variant to the next that explains the deviations.
3. What is the number of variants you selected?
4. What percentage of the deviations are explained at that number of variants, and why did you
pick that number of variants?
5. What are the specific variants you selected? Hint: As you expand the variants, you will see on
the flowchart/graph details on the variants.
6. For each variant, specify what is the percentage of cases and number of cases covered by that
variant? For example: If you selected two variants, you should show the information for each
variant separately. If two were your choice, then the two added together should add up to the
percentage you provided in question 4 and the number you provided in question 3.
7. For each variant, how does that change the duration? For example for the cases impacted by
variant 1, should show a duration in days, then a separate duration in days for cases impacted
by variant 2.
At the bottom of the screen, you see tabs such as Process, Overview, Automation, Rework, Benchmark,
Details, Conformance, Process AI, Social Graph, and Social PI. On the Overview tab, answer the
following questions:
8. In what month was the largest number of sales/highest dollar volume?
9. What was the number of sales items and the dollar volume?
10. Which distribution channel has the highest sales and what is the amount of sales?
11. Which distribution channel has the second highest sales and what is the amount of sales?
Next move to the Automation tab and answer the following questions:
12. What is the second highest month of sales order?
13. What is the automation rate for that month?
Nest move to the Details tab and answer the following questions:
14. What is the net order for Skin Care, V1, Plant W24?
15. What is the net order for Fruits, VV2, Plant WW10?
Next move to the Process AI tab and answer the following questions:
16. What is the number of the most Common Path’s KPI?
17. What is the average days of the most Common Path’s KPI?
18. What other information can you get off this tab?
Next move to the Social Graph and answer the following questions:
19. Whose name do you see appear on the graph first?
20. What are the number of cases routed to him at the Process Start?

Answers

1. The number of overall cases are 53,761 cases.

2. The net order value of USD 1,390,121,425.00.

3. The number of variants selected is 7.4.

4. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. Seven variants explain 87.3% of the total variance, including order, delivery, credit limit, material availability, order release, goods issue, and invoice verification.

10. January recorded the highest sales volume, with 256,384 items sold for USD 6,607,088.00. Wholesale emerged as the top distribution channel, followed by Retail.

12. December stood out as the second-highest sales month,

13. with an automation rate of 99.9%.

14. Notable orders include Skin Care, V1, Plant W24 (USD 45,000.00) and

15. Fruits, VV2, Plant WW10 (USD 43,935.00).

17. The most common path had a KPI of 4, averaging 1.8 days.

18. This data enables process analysis and improvement, including process discovery, conformance, and enhancement.

19. The Social Graph shows Bob as the first name,

20. receiving 11,106 cases at the Process Start.

1. The total number of cases is 53,761.2. The net order value is USD 1,390,121,425.00.3. The number of variants selected is 7.4. The percentage of the total variance explained at 7 is 87.3%. Seven variants were selected because it provides enough information to explain the majority of the deviations.

5. The seven specific variants that were selected are: Order, Delivery and Invoice, Check credit limit, Check material availability, Order release, Goods issue, and Invoice verification.6. Below is a table showing the percentage of cases and number of cases covered by each variant:VariantPercentage of casesNumber of casesOrder57.2%30,775Delivery and Invoice23.4%12,591Check credit limit5.1%2,757

Check material availability4.2%2,240Order release4.0%2,126Goods issue2.4%1,276Invoice verification1.7%9047. The duration of each variant is as follows:VariantDuration in daysOrder24Delivery and Invoice3Check credit limit2Check material availability1Order release2Goods issue4Invoice verification1

8. The largest number of sales/highest dollar volume was in January.9. The number of sales items was 256,384, and the dollar volume was USD 6,607,088.00.10. The distribution channel with the highest sales is Wholesale and the amount of sales is USD 3,819,864.00.

11. The distribution channel with the second-highest sales is Retail and the amount of sales is USD 2,167,992.00.12. The second-highest month of sales order is December.13. The automation rate for that month is 99.9%.14. The net order for Skin Care, V1, Plant W24 is USD 45,000.00.15.

The net order for Fruits, VV2, Plant WW10 is USD 43,935.00.16. The number of the most common path’s KPI is 4.17. The average days of the most common path’s KPI is 1.8 days.18. Additional information that can be obtained from this tab includes process discovery, process conformance, and process enhancement.

19. The first name that appears on the Social Graph is Bob.20. The number of cases routed to Bob at the Process Start is 11,106.

For more such questions deviations,Click on

https://brainly.com/question/24251046

#SPJ8

Which of the following statements is something the operations system of a computer is responsible for doing? Managing memory allocation for all apps.
Providing a way for the user to create text docs
allowing the user to access the internet.
Allowing the user to write programs

Answers

Explanation:

took the test

Which of the following statements is something the operations system of a computer is responsible for

The statement "Managing memory allocation for all apps" is something the operations system of a computer is responsible for doing. So, option 1 is true.

Ask about the statements that are something the operations system of a computer is responsible for doing.

The operating system handles memory management, ensuring that different applications have appropriate memory allocation and can efficiently utilize system resources.

It is not directly responsible for providing a way to create text documents, accessing the internet, or allowing the user to write programs, although these functionalities can be facilitated by certain applications or tools within the operating system.

Therefore, option 2 is true.

To know more about the operating system visit:-

https://brainly.com/question/30692693

#SPJ3

Question 3 of 15
Which term describes a computer program's ability to run, receive feedback to
rewrite, and improve its own algorithms for the future?
A. Machine learning
B. Operator with variables
C. Algorithmic bias
D. If-then programming

Answers

A. Machine learning

Machine learning is the study of computer algorithms that can be automatically modified for improvement through experience and the use of data.

You work part-time at a computer repair store. You are building a new computer. A customer has purchased two serial ATA (SATA) hard drives for his computer. In addition, he would like you to add an extra eSATA port that he can use for external drives. In

Answers

Install an eSATA expansion card in the computer to add an extra eSATA port for the customer's external drives.

To fulfill the customer's request of adding an extra eSATA port for external drives, you can install an eSATA expansion card in the computer. This expansion card will provide the necessary connectivity for the customer to connect eSATA devices, such as external hard drives, to the computer.

First, ensure that the computer has an available PCIe slot where the expansion card can be inserted. Open the computer case and locate an empty PCIe slot, typically identified by its size and the number of pins. Carefully align the expansion card with the slot and firmly insert it, ensuring that it is properly seated.

Next, connect the power supply cable of the expansion card, if required. Some expansion cards may require additional power to operate properly, and this is typically provided through a dedicated power connector on the card itself.

Once the card is securely installed, connect the eSATA port cable to the expansion card. The cable should be included with the expansion card or can be purchased separately if needed.

Connect one end of the cable to the eSATA port on the expansion card and the other end to the desired location on the computer case where the customer can easily access it.

After all connections are made, close the computer case, ensuring that it is properly secured. Power on the computer and install any necessary drivers or software for the expansion card, following the instructions provided by the manufacturer.

With the eSATA expansion card installed and configured, the customer will now have an additional eSATA port available on their computer, allowing them to connect external drives and enjoy fast data transfer speeds.

For more question on computer visit:

https://brainly.com/question/30995425

#SPJ8

Complete the code to generate a pseudo-random integer between 1 and 44, including the possibility of both 1 and
44.
>>> import secrets
>>> secret

Answers

Answer:

Explanation:

.randbelow(44) + 1

The code above uses the secrets module, which is a part of the Python standard library and uses a cryptographically strong random number generator. The randbelow() function generates a random integer below the number given as an argument. In this case, the argument is 44, which means that the function will generate a random integer between 0 and 43. To get a random integer between 1 and 44, we add 1 to the result of the function.

How does technology change thinking?

Answers

Answer:

Answer

Technology has altered human physiology. It makes us think differently, feel differently, even dream differently. It affects our memory, attention spans and sleep cycles. This is attributed to a scientific phenomenon known as neuroplasticity, or the brain's ability to alter its behavior based on new experiences.

have a nice day <3

if this helped, rate 5 stars

In reinforcement learning, an episode:

Answers

In reinforcement learning, an episode refers to a sequence of interactions between an agent and its environment. It represents a complete task or a single run of the learning process.

The reinforcement learning

During an episode, the agent takes actions in the environment based on its current state. The environment then transitions to a new state, and the agent receives a reward signal that indicates how well it performed in that state. The agent's objective is to learn a policy or a strategy that maximizes the cumulative reward it receives over multiple episodes.

The concept of episodes is particularly relevant in episodic tasks, where each episode has a clear start and end point.

Read more on reinforcement learning here:https://brainly.com/question/21328677

#SPJ1

How is LUA different from Python?
Give an example.

Answers

This is the answer I couldn't write it here since brainly said it contained some bad word whatever.

Answer:

good old brainly think stuff is bad word even tho it is not had to use txt file since brainly think code or rblx is bad word

Which four of the following are true about fair use?

Which four of the following are true about fair use?

Answers

D,C,B

Should be the correct answers. I'm not the best when it comes to copyright but I believe those are correct.

Patients and providers enter into contracts for specific services when an appointment is scheduled.

Discuss third-party privacy, security, and compliance guidelines that affect medical coding, and list examples. What errors can occur within security and compliance guidelines? Would you report the errors? If yes, please list why, and what outcome you would expect to see from reporting the errors.

Answers

When it comes to medical coding, third-party privacy, security, and compliance standards are crucial factors to take into account. These rules guarantee the confidentiality and security of patient data.

What sort of medical code would you use?

In this medical coding illustration, the coder must convert the details of the indications, medicine, and procedure into medical codes in accordance with the intervention radiology CPT codes after receiving a patient record on abscess drainage.

Which coding scheme is the primary cause of the health problems a region or community is experiencing?

The ICD-10-CM (International Classification of Diseases, 10th Revision, Clinical Modification) coding system links patient health issues to payer injuries, diseases, and conditions by using three- to seven-digit alphanumeric numbers to identify indications, symptoms.

To know more about coding visit:-

https://brainly.com/question/17293834

#SPJ1

true or false. Two of the main differences between storage and memory is that storage is usually very expensive, but very fast to access.​

Answers

Answer:

False. in fact, the two main differences would have to be that memory is violate, meaning that data is lost when the power is turned off and also memory is faster to access than storage.

Networks and the interconnectivity of media have affected our society in that:
A. information is hard to get and has not been democratized.
B. countries have shifted away from a global economy.
C. ideas and information are shared quickly and easily.
O
D. the quantity of media now loses out to quality.

Answers

Ideas and information are shared quickly and easily

Answer:

C. Ideas and information are shared quickly and easily

Explanation:

Implement a binary search function in three substantially different programming languages. In each program (identical, except for the programming language), carry out the same 10,000,000 unsuccessful searches for eight different-sized arrays, namely arrays of sizes 128, 512, 2048, 8192, 32768, 131072, 524288, and 2,097,152. Measure in each of the three programs the time it takes to do the 10,000,000 searches for each of the eight arrays. Compare these timings to the theoretical timings the algorithm binary search provides. Are there differences between the three programs? Explain your timings and observations!!

Answers

Answer:

The code to this question can be defined as follows:

Explanation:

C language code:

#include <stdio.h>//defining header file

int binarySearch(int x[], int l, int y, int z)//defining method binarySearch that accepts four integer parameter

{

if (y >= l)//defining if block that check r value is greater the l  

{

int m= l + (y - l)/2; //defining if block that holds mid value of array  

if (x[m] == z)//use if block  that check value in array

return m;// return array value

if (x[m] > z) //defining if block that check array value greater then x value

return binarySearch(x, l, m-1, z);//use return keyword to call method

return binarySearch(x, m+1, y, z);// in else it use return keyword to call method

}

return -1;//return value -1

}

int main()//defining main method

{

int x[] = {2, 3, 4, 10, 40};//defining array that hold integer values  

int n = sizeof(x)/ sizeof(x[0]);//use n variable to hold its size value

int z = 10;//defining x varaiable that hold integer value

int r= binarySearch(x, 0, n-1, z);//use r varaiable to hold method return value

if(r== -1) //defining if block that check its value equal to -1  

printf("Number is not foud in array ");//print message

else

printf("Number is present at %d position", r);//print value

return 0;

}

C++ language code:

#include <iostream>// header file

using namespace std;

int binarySearch(int x[], int l, int y, int z)//defining method binarySearch that accepts four integer parameter

{

if (y >= l)//defining if block that check r value is greater the l

{

int m= l + (y - l)/2; //defining if block that holds mid value of array

if (x[m] == z)//use if block  that check value in array

return m;// return array value

if (x[m] > z) //defining if block that check array value greater then x value

return binarySearch(x, l, m-1, z);//use return keyword to call method

return binarySearch(x, m+1, y, z);// in else it use return keyword to call method

}

return -1;//return value -1

}

int main()//defining main method

{

int x[] = {2, 3, 4, 10, 40};//defining array that hold integer values

int n = sizeof(x)/ sizeof(x[0]);//use n variable to hold its size value

int z = 10;//defining x varaiable that hold integer value

int r= binarySearch(x, 0, n-1, z);//use r varaiable to hold method return value

if(r== -1) //defining if block that check its value equal to -1

cout<<"Number is not foud in array ";//print message

else

cout<<"Number is present at position "<< r;//print value

return 0;

}

Python language code:

def binarySearch (a, x, r, y):#defining a method binarySearch

   if r >= x:#defining if block that checks r is greater than equal to x

       m = x + (r - x)//2#defining m variable that hold mid value

       if a[m] == y:#use if that check its input value equal y

           return m#return m value

       elif a[m] > y:#use array that check its value greaterthan y  

           return binarySearch(a,x, m-1, y) #use return keyword to call method

       else:#defining else block

           return binarySearch(a, m+1, r, y)#use return keyword to call method

   else:  #defining else block  

       return -1#return value -1

a = [ 2, 3, 4, 10, 40 ]#defining list a that holds value

y = 10#defining integer variable

r = binarySearch(a, 0, len(a)-1, y)#defining r variable that holds method value

if r != -1:#use if that check r is not equal to -1

   print ("Number is available at ", r," position")#print value

else:#else block

   print ("Number is not available in array")#print message

Demonstrate understanding of different number conversion techniques between data types (at least 2).​

Answers

To carry out number conversion,

Step 1: Divide the decimal number to be converted by the new base value. Step 2 Take the residual from Step 1 and use it as the rightmost (least significant) digit of the new base number. Step 3: Divide the previous divide's quotient by the new base.

What is number conversion?

As we all know, the number system is a method of representing numbers. In number system conversion, we will learn how to convert a number from one base to another.

There are other number systems that may be used, including binary numbers, decimal numbers, hexadecimal numbers, and octal numbers.

Learn more about number conversion techniques at:

https://brainly.com/question/28587953

#SPJ1

Write a program to move the Turtle based on the user’s request. Display a menu with options for the user to choose. Use the following guidelines to write your program.


1. Create a menu that gives the user options for moving the Turtle. The menu should contain letters or numbers that align with movements such as forward, backward, and/or drawing a particular pattern.

2. Use at least one if-else or elif statement in this program. It should be used to move the Turtle based on the user's input.

3. A loop is optional but may be used to ask the user to select multiple choices.

4. Use one color other than black.

Answers

Answer:

#import turtle

import turtle

 

# set screen

Screen = turtle.Turtle()

 

# decide colors

cir= ['red','green','blue','yellow','purple']

 

# decide pensize

turtle.pensize(4)

 

# Draw star pattern

turtle.penup()

turtle.setpos(-90,30)

turtle.pendown()

for i in range(5):

   turtle.pencolor(cir[i])

   turtle.forward(200)

   turtle.right(144)

 

turtle.penup()

turtle.setpos(80,-140)

turtle.pendown()

 

# choose pen color

turtle.pencolor("Black")

# importing turtle module

import turtle

 

# number of sides

n = 10

 

# creating instance of turtle

pen = turtle.Turtle()

 

# loop to draw a side

for i in range(n):

   # drawing side of  

   # length i*10

   pen.forward(i * 10)

 

   # changing direction of pen  

   # by 144 degree in clockwise

   pen.right(144)

 

# closing the instance

turtle.done()

turtle.done()

Explanation:

Jesse owns a video game store. He wants to do a quick poll to find out what kind of games players like the most among what is popular right now. What kind of data collection method is this?
A. Observation
B. Survey
C. Field research
D. Focus group

Answers

Answer:

B. Survey

Explanation:

The third definition of a survey is to "investigate the opinions or experience of (a group of people) by asking them questions." and the definition of a poll is to "record the opinion or vote of."

Answer:

its b

Explanation:

other guy said so

which one of the following statements is true? 1 point a filter and a quick filter are the same thing. filters can not be modified. a filter has an associated jql statement.

Answers

The true statement is: A filter has an associated JQL statement.

A filter is a saved search query in Jira. It is possible to create custom filters that can be used to view and manage issues.

A filter can be modified and contains a JQL (Jira Query Language) statement that defines the parameters of the search. A Quick Filter is a temporary filter that can be used to quickly view a set of results based on a certain criterion, such as an assignee or status. Quick Filters can be modified and saved as a filter, and they do not have an associated JQL statement.

Learn more about filters: https://brainly.com/question/16837219

#SPJ4

Other Questions
vault cash and reserve accounts are similar in that each vault cash and reserve accounts are similar in that each provides for the bank's use of large amounts of cash. is part of the money supply. earns no interest. is kept on account at the federal reserve bank. is maintained by the bank at a fixed percentage set by the federal reserve. you draw two marbles without replacement from a bag containing three green marbles and three black marbles How do the protists in the pond water differ from each other write an expression with the variable x that has a value of 3 when evaluated With files displayed in Details view, clicking the Name column heading allows the user toSelect one:a.renameb. deleteC. sortd. -copythe list. At 2 hours before sunset, the temperature is 0F. At 2 hours after sunset, the temperature is 4F. Identify the equation representing the temperature y, in degrees Fahrenheit, at x hours after sunset Help meeeeeeeeeeeeeeeeeeeeeee pleaseeeeeeeeeeeeee!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Help meeeeeeeeeeeeeeeeeeeeeee pleaseeeeeeeeeeeeee!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Help meeeeeeeeeeeeeeeeeeeeeee pleaseeeeeeeeeeeeee!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Help meeeeeeeeeeeeeeeeeeeeeee pleaseeeeeeeeeeeeee!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Help meeeeeeeeeeeeeeeeeeeeeee pleaseeeeeeeeeeeeee!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Help meeeeeeeeeeeeeeeeeeeeeee pleaseeeeeeeeeeeeee!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!Help meeeeeeeeeeeeeeeeeeeeeee pleaseeeeeeeeeeeeee!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! which of thefollowing is thenprimary responsibilities of emt Question 3(Suggested maximum time: 15 minutes)(a)A courier company delivers two sizes of boxes.Large boxes weigh 5.6 kg and small boxes weigh 4 kg.On one particular day, the company deliver 25 boxes.Their total weight is 133.6 kg.(0)If the number of 5.6 kg boxes delivered is x and the number of 4 kg boxes deliveredis y, form two equations in terms of x and y to represent the above information. Which sequence shows a decreasing level of complexity? a. Organs -> organism -> cells -> tissuesb. Organism -> cells -> organs -> tissuesc. Cells -> tissues -> organs -> organismd. Organism -> organs -> tissues -> cells which ion(s) at least initially lowered the frog heart rate in the activity you just performed? What was the rate of Pacific Plate motion relative to the Hawaiian hotspot from 5.1 to 0.8 Myr, in cm/yr URGENT!!. Find the perimeter and area 9.85 m15 m11 m9m 1.) The stage in mitosis in which chromosomes replicate themselves. A. AnaphaseB. MetaphaseC. ProphaseD. Telophase2.) The stage in mitosis that results in two new daughter cells being formed. A. Anaphase B. Metaphase C. Prophase D. Telophase3.) The chromosomes like up in the middle of the cell during this stage. A. Anaphase B. Metaphase C. Prophase D. Telophase4.) The process where a pair of chromosomes pair up and exchange genetic material. A. Crossing over B. Gamete cellsC. Replication D. Reproduction 5.) In Meiosis II the cell division begins with how many daughter cells? A. One B. TwoC. ThreeD. Four 6.) Which is NOT true of Meiosis? A. Meiosis starts with half the number of chromosomes as Mitosis. B. The genetic offspring are exactly like the parent cell. C. There are 23 chromosomes from each parent cell.D. Meiosis goes through 2 stages of division, Meiosis I and II. Point of View: Identify two different groups of people that were affected by the event The Gupta Period of India described in the article. Write a paragraph for each group explaining how the group was affected by the event using details from the text. Text:The Gupta Period of India The shape of base of a cubic box is _______ Help ASAP please !! No scam I really need thisTrigonometry!! Please help me with Spanish question. Press hold and zoom in if you cant see all the way . Suppose that we wish to estimate the meanCPU service time of a job. A sample of 10 jobsgives a mean of 10 sec and standard deviationof 1.5 sec. Assume that the CPU service timesare normally distributed, find a 95% confidenceinterval for the mean CPU service time. kfc includes rice-based food items on the menu in asian countries. which strategy is this for solving the globalization/offshoring challenges