Answer:
14
Explanation:
Write a program using integers user_num and x as input, and output user_num divided by x three times. Ex: If the input is: 2000 2 Then the output is: 1000 500 250
Answer:
Soory! I can't tell please tell clearly
Answer:
user_num = int(input("Number: "))
x = int(input("x: "))
for i in range(1,4):
user_num = user_num/x
print(user_num," ")
Explanation:
Choose the appropriate computing generation.
: artificial intelligence
: integrated circuits
: microprocessors
: parallel processing
the awsers for them are 5th generation 3rd generation 4th generation i really need help guys
The appropriate computing generation for each of theese are:
Artificial intelligence is 5th generation
Integrated circuit is 3rd generation
Microprocessor are 4th generation
Parallel processors is 5th generation
What is a computing generation?
There are five computing generations, they are defined from the technology and components used: valves, transistors, integrated circuits, microprocessors and artificial intelligence, respectively.
Each generation of computers refers to a period when a technology with similar capabilities and characteristics is launched on the market and produced on a large scale.
Since the first tube computers, computers have preserved the same fundamental architecture: data processor, main memory, secondary memory and data input and output devices.
See more about computing at: brainly.com/question/20837448
#SPJ1
Transmissions in wireless networks do not allow for collision detection but try to avoid collision. Briefly describe this process and explain why it is termed as unreliable.
Transmissions in wireless networks do not allow for collision detection but try to avoid collision and also It is especially crucial for wireless networks since wireless transmitters desensing (turning off) their receivers during packet transmission prevents the option of collision detection using CSMA/CD.
What are the different types of wireless transmission?Wireless transceivers are unable to send and receive on the same channel simultaneously, hence they are unable to identify collisions. This is because the send power (which is typically around 100mw) and the receive sensitivity have such a huge disparity (commonly around 0.01 to 0.0001mw).
Therefore, Infrared, broadcast radio, cellular radio, microwaves, as well as communications satellites are examples of wireless transmission media that are used in communications. Infrared (IR), which is a wireless transmission medium that uses infrared light waves to transmit signals, was covered previously in the chapter.
Learn more about collision detection from
https://brainly.com/question/14775265
#SPJ1
do you think film is a great media in exposing information?
Answer:I think film is a great media in exposing information
Explanation:Films are great for exposing information for many reasons. Films are long, which increases the chance the watcher will remember, also it makes the watcher more involved and more interactive
Performance assessments are conducted periodically and .
Performance assessments are conducted periodically and systematically.
What are performance assessments ?Periodic and structured evaluations are essential to maintain accurate assessments of performance. These reviews usually occur regularly, such as once or twice a year, and follow a systematic process designed to examine an individual's job-related skills consistently using objective standards.
A typical appraisal procedure generally includes establishing clear aims and goals for the employee, offering regular coaching along with feedback throughout the appraisal term, compiling data related to their task progress, and then conducting a comprehensive review at the end of that period to analyze and assess it thoroughly.
Find out more on performance assessments at https://brainly.com/question/1532968
#SPJ1
Gary is unable to log in to the production environment. Gary tries three times and is then locked out of trying again for one hour. Why? (D3, L3.3.1)
Answer:
Gary is likely locked out of trying to log in again for one hour after three failed login attempts as part of a security measure to prevent unauthorized access or brute force attacks in the production environment. This policy is often implemented in computer systems or applications to protect against malicious activities, such as repeatedly guessing passwords or using automated scripts to gain unauthorized access to user accounts.
By locking out an account for a certain period of time after a specified number of failed login attempts, the system aims to deter potential attackers from continuously attempting to guess passwords or gain unauthorized access. This helps to enhance the security of the production environment and protect sensitive data or resources from unauthorized access.
The specific duration of the lockout period (one hour in this case) and the number of allowed failed login attempts may vary depending on the security settings and policies configured in the system. It is a common security practice to implement account lockout policies as part of a comprehensive security strategy to protect against unauthorized access and ensure the integrity and confidentiality of data in the production environment.
Upon returning from a year long working holiday, Alberta, the youngest of 4 sisters, announced her whirlwind marriage. Her 3 sisters, Carla, Paula, and Roberta,
were amazed by her husband's name.
• The 4 men are Albert, Carl, Paul, and Robert. Their last names are Albertson, Carlson, Paulson, and Robertson.
• No woman's husband has a first name that consists of her first name without the final "a"; no woman's last name consists of her first name without the final
"a" and with "son" on the end; and, no man's last name consists of his first name with "son" added at the end.
• Paul is not married to Roberta, and Robert is not married to Paula.
• No husband and wife have "bert" in both their first names, but there is a man who has "bert" in his first and last names.
Carl's last name is not Paulson.
Work out Alberta's husband's first and last name, as well as Carla's, Paula's, and Roberta's husbands' first and last name
The couples, considering the patterns in the problem, are listed as follows:
Carla and Robert Paulson.Paula and Albert Robertson.Alberta and Paul Carlson.Roberta and Carl Albertson.What are the couples?We use the information from the bullet points to find the couples.
The first information is:
No woman's husband has a first name that consists of her first name without the final "a".
Hence:
Alberta is married to either Carl, Paul or Robert.Carla is married to either Albert, Paul or Robert.Paula is married to either Albert, Carl or Robert.Roberta is married to either Albert, Carl or Paul.The second information is:
Paul is not married to Roberta, and Robert is not married to Paula.
Hence:
Roberta is married to either Albert or Carl.Paula is married to either Albert or Carl.No husband and wife have "bert" in both their first names, hence:
Roberta is married to Carl.Paula is married to Albert.Alberta is married to Paul.Carla is married to Robert.No woman's last name consists of her first name without the final "a" and with "son" on the end, and no man's last name consists of his first name with "son" added at the end, hence:
Roberta and Carl are either Albertson or Paulson.Paula and Albert are either Carlson or Robertson.Alberta and Paul are either Carlson or Robertson.Carla and Robert are either Albertson or Paulson.There is a man who has "bert" in his first and last names, hence either of these two can be couples.
Carla and Robert Albertson.Paula and Albert Robertson.Carl's last name is not Paulson, hence a couple is:
Carla and Robert Paulson.
Then Carla and Robert are Paulson, and the couples are:
Carla and Robert Paulson.Paula and Albert Robertson.Alberta and Paul Carlson.Roberta and Carl Albertson.More can be learned about patterns at https://brainly.com/question/18941199
#SPJ1
What is something you can setup within your email account to prevent potentially harmful emails making their way to your inbox?.
The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:
Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.Which feature helps to prevent spam messages from being sent to your inbox?To avoid spam in one's email, one of the best thing to do is to Run your inbox through spam filter and virus filter.
Hence, The thing that one need to setup within their email account to prevent potentially harmful emails making their way to your inbox are:
Set Up Filters.Block unwanted Email Addresses.Report Spam Directly.Do Unsubscribe from Email Lists, etc.Learn more about Email from
https://brainly.com/question/24688558
#SPJ1
What is your biggest concern when it comes to purchasing a used phone or laptop?
Answer:
quality
Explanation:
if i know about the phone or laptop quality and quantity then i can know which is important if i buy.
i can give you example by laptop. For example i want to get buy laptop. i should know about the quantity and quality. then if i choose quantity i can buy so many laptops if they are more than 3 laptops and i get it in low price. then i take it and i try to open the laptops for some other thing to do but they cant opened so it means it has lowest quality.
and if i choose the quality. may be i can't buy more than 1 laptops but the qulaity of the laptops is high so when i open the laptop it opened
Notequality is the superiority or the quality level of a things.
quantity is the abundance or the quantity level of a thing
As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.
Answer:
A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.
First, let's convert -9/2 to a decimal number: -9/2 = -4.5
Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:
1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM
Sign bit: Since the number is negative, the sign bit is 1: 1
Mantissa and exponent: Convert -4.5 into binary and normalize it:
-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2
Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)
Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101
Now, put the sign, exponent, and mantissa together: 1101 0010
So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.
B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.
To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:
Sign bit: 1
Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)
Mantissa: Smallest mantissa is 0000
The 8-bit representation is 1001 0000. Converting this to decimal:
-1 * 2^{-2} * 1.0000 which is -0.25.
The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.
C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.
To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:
Sign bit: 0
Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)
Mantissa: Largest mantissa is 1111
The 8-bit representation is 0110 1111. Converting this to decimal:
1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.
The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.
Explanation:
Excel
Please explain why we use charts and what charts help us to identify.
Please explain why it is important to select the correct data when creating a chart.
1) We use chart for Visual representation, Data analysis, Effective communication and Decision-making.
2. It is important to select the correct data when creating a chart Accuracy, Credibility, Clarity and Relevance.
Why is necessary to select the correct data in chart creation?Accuracy: Selecting the right data ensures that the chart accurately represents the information you want to convey. Incorrect data can lead to misleading or incorrect conclusions.
Relevance: Choosing the appropriate data ensures that your chart focuses on the relevant variables and relationships, making it more useful for analysis and decision-making.
Clarity: Including unnecessary or irrelevant data can clutter the chart and make it difficult to interpret. Selecting the correct data helps to maintain clarity and simplicity in the chart's presentation.
Credibility: Using accurate and relevant data in your charts helps to establish credibility and trust with your audience, as it demonstrates a thorough understanding of the subject matter and attention to detail.
Find more exercises related to charts;
https://brainly.com/question/26501836
#SPJ1
When creating a user generated function, what procedure is followed?
a) create a function prototype before main()
b) create a function definition after main()
c) create a function definition before main()
d) all of the above
When creating a user-generated function, what procedure is followed d) all of the above.
What are the three factors of user-described characteristic?
A user-described characteristic has 3 essential additives which might be characteristic declarations, characteristic definition and characteristic called.
The characteristic prototypes are used to inform the compiler approximately the variety of arguments and approximately the specified datatypes of a characteristic parameter, it additionally tells approximately the go-back kind of the characteristic. By this information, the compiler cross-assessments the characteristic signatures earlier than calling.
Read more about the prototype :
https://brainly.com/question/7509258
#SPJ1
Directions: Arrange the jumbled letters to make/form a new word. Then give a
short description of those words that can be related to the topic which is Cleaning
and Lubricating Machines. Write your answers in your journal
. wens in
Name of materials
Words
Description
1. HEINCMA ILO-MACHINE OIL
2. CHOLT MADP-CLOTH DAMP
3. NIEMHAC WINSEG-MACHINE SEWING
4. SONAPLER- PERSONAL PROTECTIVE EQUIPMENT
VETICETPORT
QUIPTEMPEN
5. EEENDL ISEZ- NAEEDLE SIZE
6. MALLS NIB- SMALL BIN
7. BINNOB DREWIN-?????
8. NILT BURSH- LINT BRUSH
9. BONBIB KOHO- BOBBIN HOOK
10. DELENE LLAPTE - NEEDLE PLATE
Answer:
1. Heincma Ilo- Machine Oil
2. Cholt Madp- Damp Cloth
3. Niemhac Winseg- Sewing Machine
4. Sonapler- Personal Protective Equipment Veticetport Quiptempen
5. Eeendl Isez- Needle Size
6. Malls Nib- Small Bin
7. Binnob Drewin- Bobbin Winder
8. Nilt Bursh- Lint Brush
9. Bonbib Koho- Bobbin Hook
10. Delene Llapte - Needle Plate
Explanation:
Machine Oil: This is used to lubricate the sewing machine gear, prevents/ reduces wear, tear, and rust of the parts which are made of metal;Damp Cloth: This is used to remove tough stains on the machine without leaving too much moisture on it. When water or moisture reacts with the iron and oxygen, it forms rust which is not good for the machine.Sewing Machine: This is used to putting or sewing fabric togetherPersonal Protective Equipment: These are equipment that a tailor or sewing factor worker must put on when at work to prevent or minimize the risk of injuries. They include but are not limited to:FacemasksHand glovesEye Protection5. Needle Size: Various sizes of needles are needed to sew different kinds of fabric;
6. Small Bin: This is mostly for ensuring good home keeping. Good home-keeping means managing the waste in the factory area. By collecting them in a bin, they are easy to dispose of.
7. Bobbin Winder: This is used to wind the thread around a bobbin evenly.
8. Lint Brush: This is used to remove lint. Lint is simply a collection of accumulated fibers from textile and non-textile materials.
9. Bobbin Hook: This term is used to describe the part which extends outwards like a finger that encircles the bobbin case.
10. Needle Plate: This is present in all sewing machines. It is installed to guide one as they sew and also covers the bobbin compartment.
Cheers!
How to change the display of subtotals to Show all subtotals at top of group in pivotTable?
To change the display of subtotals to Show all subtotals at top of the group in PivotTable follow these steps:
A pivot table is a statistics tool that summarizes and reassembles chosen columns and rows of data in a spreadsheet or database table to produce the required report.
The tool does not alter the spreadsheet or database; rather, it "pivots" or rotates the data to examine it from various angles.
Learn more about PivotTable:
https://brainly.com/question/27813971
#SPJ1
WHICH OF THE FOLLOWING TASKS ARE PART OF THE SOFTWARE EVALUATION PROCESS?
TESTERS...
With regard to software evaulation, note that the correct options are -
Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.How is this so?The tasks that are part of the software evaluation process include -
Testers check that the code is implemented according to the specification document.A specification document is created.Any issues with the software are logged as bugs.Bugs are resolved by developers.Tasks not directly related to the software evaluation process are -
Software developers writing code line by line.Creating a design for the software program.Learn more about software evaluation at:
https://brainly.com/question/28271917
#SPJ1
Full Question:
Although part of your question is missing, you might be referring to this full question:
Choose all that apply: Which of the following tasks are part of the software evaluation process?
testers check that the code is implemented according to the specification document
an specification document is created
software developers write code line by line
any issues with the software are logged as bugs
bugs are resolved by developers
a design for the software program is created
You have n warehouses and n shops. At each warehouse, a truck is loaded with enough goods to supply one shop. There are m roads, each going from a warehouse to a shop, and driving along the ith road takes d i hours, where d i is an integer. Design a polynomial time algorithm to send the trucks to the shops, minimising the time until all shops are supplied.
Following are the steps of the polynomial-time algorithm:
Split the routes according to their categorizationAssuming that mid = di of the middle road, low = road with the least di, and high = road with the highest di, we may do a binary search on the sorted list.All shops must be approachable only using these roads for every road, from low to mid.Check if all shops can be reached from\(\bold{ low \ to\ mid+1}\) using only these roads.There is a solution if every shop can be reached by road only up to \(\bold{mid+1}\), but not up to mid.You can \(\bold{set \ low = mid+1}\) if all businesses aren't accessible using both \(\bold{mid\ and\ mid+1}\) roads.If every shop could be reached using both mid and mid+1, then set high to mid-1.With these layouts of businesses and roads, no response can be given because \(\bold{ low > high}\)You can do this by \(\bold{set\ mid = \frac{(low + high)}{2}}\)The new low, mid, and high numbers are used in step (a).In a minimum amount of time, this algorithm will determine the best strategy to supply all shops.
Learn more:
polynomial-time algorithm: brainly.com/question/20261998
Which key(s) will launch the Spelling Checker dialog box? F8 F7 Ctrl+H F2
Answer:
F7
Explanation:
Mostly in MS Office products, although a lot of other products will mimic the same well known key sequences as a way of enticing you to their platform.
Answer:The answer to your question is F7
Explanation:
What is the advantage of entering metadata for electronic records that you create
Answer:
allows users to locate and evaluate data without each person having to discover it anew with every use.
Explanation:
here you go hope it helps!
A ____________________ machine is used to gather or arrange in their proper sequence.
Answer:
A collating machine is used to gather or arrange in their proper sequence.
Explanation:
What is the default layout position for images added to a Word 2016 document?
A) square, where the text wraps around an image around a square border
B) through, where the text wraps around an image with irregular borders
C) in front of the text, where the image is placed over the text
D) in-line, with the text where the text stays with the image
Answer:
D
Explanation:
Hope it works
Answer:
D) in-line, with the text where the text stays with the image
Explanation:
Just did it in ED.
Why dose enginuty suck like really
Answer:
if you don't like it why u doin it?
Explanation:
Submit your three to five page report on three manufacturing careers that interest you.
Answer:
Manufacturing jobs are those that create new products directly from either raw materials or components. These jobs are found in a factory, plant, or mill. They can also exist in a home, as long as products, not services, are created.1
For example, bakeries, candy stores, and custom tailors are considered manufacturing because they create products out of components. On the other hand, book publishing, logging, and mining are not considered manufacturing because they don't change the good into a new product.
Construction is in its own category and is not considered manufacturing. New home builders are construction companies that build single-family homes.2 New home construction and the commercial real estate construction industry are significant components of gross domestic product.3
Statistics
There are 12.839 million Americans in manufacturing jobs as of March 2020, the National Association of Manufacturers reported from the Bureau of Labor Statistics.4 In 2018, they earned $87,185 a year each. This included pay and benefits. That's 21 percent more than the average worker, who earned $68,782 annually.5
U.S. manufacturing workers deserve this pay. They are the most productive in the world.6 That's due to increased use of computers and robotics.7 They also reduced the number of jobs by replacing workers.8
Yet, 89 percent of manufacturers are leaving jobs unfilled. They can't find qualified applicants, according to a 2018 Deloitte Institute report. The skills gap could leave 2.4 million vacant jobs between 2018 and 2028. That could cost the industry $2.5 trillion by 2028.
Manufacturers also face 2.69 million jobs to be vacated by retirees. Another 1.96 million are opening up due to growth in the industry. The Deloitte report found that manufacturers need to fill 4.6 million jobs between 2018 and 2028.9
Types of Manufacturing Jobs
The Census divides manufacturing industries into many sectors.10 Here's a summary:
Food, Beverage, and Tobacco
Textiles, Leather, and Apparel
Wood, Paper, and Printing
Petroleum, Coal, Chemicals, Plastics, and Rubber
Nonmetallic Mineral
Primary Metal, Fabricated Metal, and Machinery
Computer and Electronics
Electrical Equipment, Appliances, and Components
Transportation
Furniture
Miscellaneous Manufacturing
If you want details about any of the industries, go to the Manufacturing Index. It will tell you more about the sector, including trends and prices in the industry. You'll also find statistics about the workforce itself, including fatalities, injuries, and illnesses.
A second resource is the Bureau of Labor Statistics. It provides a guide to the types of jobs that are in these industries. Here's a quick list:
Assemblers and Fabricators
Bakers
Dental Laboratory Technicians
Food Processing Occupations
Food Processing Operators
Jewelers and Precious Stone and Metal Workers
Machinists and Tool and Die
Medical Appliance Technicians
Metal and Plastic Machine Workers
Ophthalmic Laboratory Technicians
Painting and Coating Workers
Power Plant Operators
Printing
Quality Control
Semiconductor Processors
Sewers and Tailors
Slaughterers and Meat Packers
Stationary Engineers and Boiler Operators
Upholsterers
Water and Wastewater Treatment
Welders, Cutters, Solderers
Woodworkers11
The Bureau of Labor Statistics describes what these jobs are like, how much education or training is needed, and the salary level. It also will tell you what it's like to work in the occupation, how many there are, and whether it's a growing field. You can also find what particular skills are used, whether specific certification is required, and how to get the training needed.11 This guide can be found at Production Occupations.
Trends in Manufacturing Jobs
Manufacturing processes are changing, and so are the job skills that are needed. Manufacturers are always searching for more cost-effective ways of producing their goods. That's why, even though the number of jobs is projected to decline, the jobs that remain are likely to be higher paid. But they will require education and training to acquire the skills needed.
That's for two reasons. First, the demand for manufactured products is growing from emerging markets like India and China. McKinsey & Company estimated that this could almost triple to $30 trillion by 2025. These countries would demand 70 percent of global manufactured goods.12
How will this demand change manufacturing jobs? Companies will have to offer products specific to the needs of these very diverse markets. As a result, customer service jobs will become more important to manufacturers.
Second, manufacturers are adopting very sophisticated technology to both meet these specialized needs and to lower costs.
You're a short-order cook in a pancake restaurant, so you need to cook pancakes as fast as possible. You have one pan that can fit capacity pancakes at a time. Using this pan you must cook pamCakes pancakes. Each pancake must be cooked for five minutes on each side, and once a pancake starts cooking on a side it has to cook for five minutes on that side. However, you can take a pancake out of the pan when you're ready to flip it after five minutes and put it back in the pan later to cook it on the other side. Write the method, minutes Needed, that returns the shortest time needed to cook numCakes pancakes in a pan that holds capacity pancakes at once.
Answer:
Explanation:
The shortest time needed means that we are not taking into account the amount of time it takes to switch pancakes, flip them, or take them out of the pan, etc. Only cooking them. Therefore, written in Java would be the following...
public static int minutesNeeded (int numCakes, int panCapacity) {
int minutesNeededtoCook = 0;
while (numCakes != 0) {
if (numCakes > panCapacity) {
numCakes -= panCapacity;
minutesNeededtoCook += 10;
} else {
numCakes = 0;
minutesNeededtoCook += 10;
}
}
return minutesNeededtoCook;
}
The code takes in the amount of pancakes and the pan capacity, then compares them and adds 10 minutes (5 on each side) per pancake batch that is being made until all the pancakes are made.
what connects data center to your device?
My answer to the question is ISP(Internet Service Provider).
PLEASE HELP
Find five secure websites. For each site, include the following:
the name of the site
a link to the site
a screenshot of the security icon for each specific site
a description of how you knew the site was secure
Use your own words and complete sentences when explaining how you knew the site was secure.
The name of the secure websites are given as follows:
Each of the above websites had the security icon on the top left corner of the address bar just before the above domain names.
What is Website Security?The protection of personal and corporate public-facing websites from cyberattacks is referred to as website security.
It also refers to any program or activity done to avoid website exploitation in any way or to ensure that website data is not accessible to cybercriminals.
Businesses that do not have a proactive security policy risk virus spread, as well as attacks on other websites, networks, and IT infrastructures.
Web-based threats, also known as online threats, are a type of cybersecurity risk that can create an unwanted occurrence or action over the internet. End-user weaknesses, web service programmers, or web services themselves enable online threats.
Learn more about website security:
https://brainly.com/question/28269688
#SPJ1
mips Write a program that asks the user for an integer between 0 and 100 that represents a number of cents. Convert that number of cents to the equivalent number of quarters, dimes, nickels, and pennies. Then output the maximum number of quarters that will fit the amount, then the maximum number of dimes that will fit into what then remains, and so on. If the amount entered is negative, write an error message and quit. Amounts greater than 100 are OK (the user will get many quarters.) Use extended assembly instructions and exception handler services.
Answer:
Explanation:
The following code is written in python and divides the amount of cents enterred in as an input into the correct amount of quarters, dimes, nickels and pennies. Finally, printing out all the values.
import math
#First we need to define the value of each coin
penny = 1
nickel = 5
dime = 10
quarter = 25
#Here we define the variables to hold the max number of each coin
quarters = 0
dimes = 0
nickels = 0
pennys = 0
cents = int(input("Please enter an amount of money you have in cents: "))
if cents > 0 and cents <= 100:
if cents >= 25:
quarters = cents / quarter
cents = cents % quarter
if cents >= 10:
dimes = cents/dime
cents = cents % dime
if cents >= 5:
nickels = cents /nickel
cents = cents % nickel
if cents > 0:
pennys = cents / penny
cents = 0
print("The coins are: "
"\nQuarters", math.floor(quarters),
"\nDimes", math.floor(dimes), "\nNickels", math.floor(nickels), "\nPennies", math.floor(pennys))
else:
print("wrong value")
QUESTION 4 Developing practical thinking skills often involves O using common sense o learning from experience and building emotional intelligence mixing collaboration with private time evaluating whether examples support ideas
Answer:
The answer is "mixing collaboration with private time".
Explanation:
In this question, the development of practical thinking abilities, training often involves resolved everyday struggles. It also helps students, are already used to develop communication skills, in particular, to resolve mostly based on critical thinking, everyday life issues at different layers of difficulty.
how does such editing affect courtrooms where visual evidence is often presented?
Using Python Write an expression using Boolean operators that prints "Special number" if special_num is -99, 0, or 44.
Sample output with input: 17
Not special number
special_num = int(input())
if special_num == -99 or special_num == 0 or special_num == 44:
print("Special number")
else:
print("Not special number")
I wrote the code so that the user enters a number of their choice. Best of luck.
What
are the
Contituent of a c p u
It consists of an arithmetic and logic unit (ALU), a control unit, and various registers. The CPU is often simply referred to as the processor. The ALU performs arithmetic operations, logic operations, and related operations, according to the program instructions.