Answer:
an object's methods are the tasks or functions that the object performs when it receives a command to do so
Answer: C. Methods
Explanation:
Drivers are concerned with the mileage their automobiles get. One driver has kept track of several tankfuls of gasoline by recording the miles driven and gallons used for each tankful. Develop a C# application that will input the miles driven and gallons used for each tankful. The application should calculate and display the miles per gallon obtained for each tankful and display the total combined miles per gallon obtained for all tankfuls up to this point. Additionally, the application should categorize and display the consumption rate of gasoline as follows: Low, if the total miles per gallon is greater than 30. • Normal, if the total miles per gallon is between 20 and 30. High, if the total miles per gallon is less than 20. All averaging calculations should produce floating-point results. Display the results rounded to the nearest hundredth. c# program
To solve this problem with the help of C++ programing language, you must know concepts like variables, data type, if-else and while loop.
Step-by-step coding for the problem:
using System;
namespace GasOfMiles
{
public class Gas
{
static void Main(string[] args)
{
int miles; // miles for one tankful
int gallons; // gallons for one tankful
int totalMiles = 0; // total miles for trip
int totalGallons = 0; // total gallons for trip
double milesPerGallon; // miles per gallon for tankful
double totalMilesPerGallon; // miles per gallon for trip
// prompt user for miles and obtain the input from user
Console.Write("Enter miles (-1 to quit): ");
miles = Convert.ToInt32(Console.ReadLine());
// exit if the input is -1 otherwise, proceed with the program
while (miles != -1)
{
// prompt user for gallons and obtain the input from user
Console.Write("Enter gallons: ");
gallons = Convert.ToInt32(Console.ReadLine());
// add gallons and miles for this tank to totals
totalMiles += miles;
totalGallons += gallons;
// calculate miles per gallon for the current tank
if (gallons != 0)
{
milesPerGallon = (double)miles / gallons;
Console.WriteLine("MPG this tankful: {0:F}",
milesPerGallon);
} // end if statement
if (totalGallons != 0)
{
// calculate miles per gallon for the total trip
totalMilesPerGallon = (double)totalMiles / totalGallons;
Console.WriteLine("Total MPG: {0:F}\n", totalMilesPerGallon);
} // end if statement
// prompt user for new value for miles
Console.Write("Enter miles (-1 to quit): ");
miles = Convert.ToInt32(Console.ReadLine());
} // end while loop
Console.ReadKey();
}
}
}
To learn more about C++ Programming, visit: https://brainly.com/question/13441075
#SPJ9
identify 4 benefit of managing
mediate correctly
Some benefits of managing mediate correctly are:
1. Improved communication between parties
2. Increased clarity and understanding of issues
3. More effective and efficient decision making
4. Greater satisfaction with the process and outcome
What is mediate?
Mediation is a systematic, interactive procedure in which an unbiased third party supports disputing parties in resolving dispute using specialised communication and negotiation strategies. All mediators are encouraged to actively participate in the process. Mediation is a "party-centered" technique in that it is primarily concerned with the parties' needs, rights, and interests. The mediator employs a number of tactics to steer the process in a constructive direction and to assist the parties in reaching their best settlement.
To learn more about mediate
https://brainly.com/question/28199664
#SPJ1
Richman is considering buying insurance for each smartphone. Use the ALE to determine the usefulness of this safeguard. For example, Richman could purchase insurance for each device for $25 per year. The safeguard value is $25 X 1,000 devices, or $25,000. It is estimated that if the insurance is purchased, the ARO will decrease to 5. Should the company purchase the insurance?
Using knowledge in computational language in SQL it is possible to write a code that Richman is considering buying insurance for each smartphone.
Writting the code:SLE = $500 (this is total loss expected )
ARO = 75 ( this is number of times the incident can happen in an year)
ALE = SLE*ARO (calculation of ALE from SLE and ARO)
ALE= 500*75 = $37,500
Current ALE = $37,500(After calculation current ALE)
ARO with control = 5 (This value given in question)
(ALE with control can be calculated by multiplying SLE with (ARO with control))
ALE with control = SLE*ARO with control = 500*5 = $2500
Savings with control=Current ALE-ALE with control
Savings with control = $37500 – $2500 = $35000
Safeguard value = $25000
Realized savings=Savings with control-safeguard value
Realized savings = $35000 – $25000 = $10,000
See more about SQL at brainly.com/question/18502436
#SPJ1
conditional_snakes.py - snake_input = int
Following is the code for conditional snakes:
input = int(input(" Count the number of snakes>"))
if input == 0:
print("There are no snakes !")
elif input == 1:
print("There is [input] snake and it is fine")
elif input > 1:
print("There are [input] snakes! RUN!")
else:
print ("Snakes cant be negative enter 0 or positive number of snakes")
What is a conditional statement?
A conditional statement is used in your program to deal with conditions, as its name suggests. In making decisions based on the circumstances it encounters, the program is guided by these statements. You should be familiar with Python's three main conditional statements: statement if, else, else if
Hence above program is the conditional snake program in python
To know more about conditional statements follow this link
https://brainly.com/question/27021213
#SPJ1
A pop-up window is a small web browser window that
opens without your permission after opening a
website.
True
False
Answer:
Yes, that's true
Explanation:
Answer: Yes, this is true.
This machine can perform all four of the basic arithmetic operations and could multiply numbers of up to 5 and 12 digits to give a 16-digit operand. What is it?
The machine that can perform all four of the basic arithmetic operations and could multiply numbers of up to 5 and 12 digits to give a 16-digit operand is the stepped reckoner,
What is the stepped reckoner?The stepped reckoner, also known as the Leibniz calculator, was a mechanical calculator invented around 1672 by the German mathematician Gottfried Wilhelm Leibniz and completed in 1694. The name is derived from the German term for its operating mechanism, Staffelwalze, which translates as "stepped drum." It was the first calculator capable of carrying out all four arithmetic operations.
Its intricate precision gearwork, on the other hand, was a little beyond the fabrication technology of the time; mechanical issues, as well as a design flaw in the carry mechanism, prevented the machines from working reliably.
Learn more about machine on:
https://brainly.com/question/388851
#SPJ1
Could so please help me
Answer: For?
Explanation:
what do you need help with?
A typical executive information system (EIS) offers which of the following capabilities?
A capability which a typical executive information system (EIS) offers include the following: b. slice-and-dice.
What is an information system?An information system (IS) can be defined as a collection of computer systems and Human Resources (HR) that is used by a business organization (firm or company) or manager to obtain, store, compute, and process data, as well as the dissemination of information, knowledge, and the distribution of digital products from one location to another.
Generally speaking, there are three (3) main kinds of information system (IS) that allow information to be accessed and shared internally among employees;
Executive Information System (EIS)Corporate PortalIntranetIn conclusion, drill-down, consolidation, and slice-and-dice are the three most common and typical capabilities that are being offered in an executive information system (EIS), in order to view information in a business firm from different perspectives.
Read more on information system here: brainly.com/question/24944623
#SPJ1
Complete Question:
A typical executive information system (EIS) offers which of the following capabilities? O a. video conferencing O b. slice-and-dice O c. collaboration d. messaging
The state department that issues driver's licenses would like a police officer to be able to scan the driver's license and instantly view outstanding tickets and warrants. In one to two sentences, describe the emerging technology the state could use.
Answer:
The state could use a QR code scanner that would allow the officer to scan the code and view the outstanding tickets and warrants.
Activity 1
the visual basic program to sort the following strings for array named "Place"
(Pacific, Atlantic, Indian, Black, Red, North, Caspian, Caribbean
Visual basic program to sort the following strings for array:
Public Class Form1
Private Sub Button1_Click(sender As Object, e As EventArgs) Handles
Button1.Click
Dim Place() As String = {"Pacific", "Atlantic", "Indian",
What is array?
An array is a significant subject that falls within the umbrella of computer science. Additionally, you must thoroughly examine each angle of the array while preparing for a competitive exam like the GATE. All of the subjects pertinent to the array have been covered in this article. We hope the CSE topic notes will assist your understanding of this subject. An array is a collection of identical elements or data items stored at adjacent memory locations. In plain English, we can say that arrays are typically used in computer programming to organise the same kind of data.
To learn more about array
https://brainly.com/question/24275089
#SPJ1
The cost of a customers electricity bill is based on the number of units of electricity the customer uses. For the first 25 units of electricity the cost is 5 per unit for units of electricity after the first 25, the cost is 7 per unit which of the following code segments correctly sets the value of the variable cost to the cost in dollars of using numUnits units of electricity
The code segment that correctly sets the value of the variable cost to the cost, in dollars, of using numUnits units of electricity is:
IF numUnits ≤ 25
cost ← numUnits * 5
ELSE
cost ← 25 5 + (numUnits -25) 7
What is a code segment?A code segment, often known as a text segment or just text, is a section of an object file or the equivalent piece of the program's virtual address space that includes executable instructions in computing.
Note that a code segment, often known as a text segment or simply text in the area of computing, is a section of a computer file that contains object code or an analogous section of the program's address space that contains executable instructions and directives information.
It should be mentioned that a segment can have a minimum size of 16 bytes and a maximum value of 64 kB.
Learn more about code segment:
https://brainly.com/question/20063766
#SPJ1
Full Question:
The cost of a customer's electricity bill is based on the number of units of electricity the customer uses.
- For the first 25 units of electricity, the cost is $5 per unit.
- For units of electricity after the first 25, the cost is $7 per unit.
Which code segments correctly sets the value of the variable cost to the cost, in dollars, of using numUnits units of electricity?
Which of the following is something computer scientist would do
Hi, I need this URGENTLY. Thank you
1) Turing proposed a rudimentary computational model that became the definition of computable. A function is deemed computable if and only if it can be computed using Turing's computation model.
Hartmanis and Stearns utilized the Turing model to create complexity classes, which was a significant step forward. This then formalized the intuitive concept of polynomial time algorithms. It aided in the development of asymptotic complexity as a method for comparing algorithm performance.
Another significant innovation was the Turing model's introduction of the concepts of an extremely rapid description of computation and a valid computation. An instantaneous definition is a string that fully explains a computation at a single point in time. A correct calculation is a series of immediate descriptions. Despite the fact that Turing's model was fairly simple, it was this simplicity that led to significant achievements in computer science.
2) The Turing test, invented by Alan Turing in 1950 as the imitation game, is a test of a machine's capacity to demonstrate intelligent behavior comparable to, or unrecognizable from, that of a person.
Put differently, the Turing Test is a way of testing whether or not a machine is able to reason like a human being in artificial intelligence (AI).
3) Electrostatic discharge (ESD) occurrences can cause damage to electronic components within your computer. ESD may accumulate on your body or an object, such as a device, and then discharge into another element, like as your computer, under specific conditions.
Touching a metal-grounded item (such as an exposed surface of the metal on your computer's I/O panel) before interacting with anything electrical will guard against ESD and discharge static energy from your body.
What is the Turing Machines?The Turing machine is a hypothetical computer system proposed by English mathematician and logician Alan M. Turing in 1936.
Today, Turing is most known for his work as a computer scientist. In 1936, he devised the Universal Turing Machine, which served as the foundation for the first computer. In 1950, he created an artificial intelligence test that is still in use today.
Learn more about Turing Model:
https://brainly.com/question/28648571
#SPJ1
Guys I should write the program in C++
Can u help me?
Write a program which reads numbers from keyboard in a loop and checks if the given number is even.
The program ends when a negative number is input.
#include <iostream>
int main(int argc, char const* argv[]) {
while(1) {
std::cout << ">> "; int x; std::cin>>x;
if(x<0) break;
else if(x%2==0) {std::cout << "\nThis is even number.\n";}
else std::cout << "\nThis is odd number.\n";
}
return 0;
}
which of the following can be considered both a secondary source and tertiary
source
The option that can be considered both a secondary source and tertiary source is option D: dictionaries.
Are secondary and tertiary similar?The term secondary source' is another term for secondary information. Any information that takes place after secondary source is referred to as tertiary source.
Therefore, Note that Secondary sources explain, interpret, or analyze data from primary sources (often primary sources). Numerous books, textbooks, and academic review articles are examples of secondary sources. Secondary sources are compiled and largely summarized in tertiary sources.
Learn more about secondary source from
https://brainly.com/question/896456
#SPJ1
Letters,
diaries,
artifacts,
dictionaries
What feature would you use to enhance a text box? Shape Styles, Adjust slide layout, Insert new format, or Add-ons?
Answer:
I believe add-ons are used for that
Explanation:
Complete the sentence. Privacy is about having (BLANK) our personal data.
O secrecy adout
O control over
O access to
Privacy is about having secrecy about our personal data. Hence, option A is correct.
What is secrecy about of personal data?These data also contain genetic, biometric, and health data in addition to personal information revealing racial and ethnic origin, political beliefs, religious or ideological views, or union membership.
Any processing of personal data need to be legitimate, equitable, and open. People should understand how their personal information is collected, used, consulted, or processed in any other way, as well as how much processing is taking place or will be taking place.
Thus, option A is correct.
For more information about secrecy about of personal data, click here:
https://brainly.com/question/28234534
#SPJ1
Answer:
secrecy about
Explanation:
Write a program that inputs numbers and keeps a running sum. When the sum is greater than 200, output the sum as well as the count of how many numbers were entered.
Sample Run
Enter a number: 50
Enter a number: 11
Enter a number: 66
Enter a number: 23
Enter a number: 53
Sum: 203
Numbers Entered: 5
Hint: If you get an EOF error while running the code you've written, this error likely means you're asking for too many inputs from the user.
Using the knowledge in computational language in python it is possible to write a code that inputs numbers and keeps a running sum.
Writting the code:totalsum=0
count=0
while(totalsum<=200):
num=int(input("Enter a number: "))
totalsum=totalsum+num
count=count+1
print("Sum:",totalsum)
print("Numbers Entered:",count)
See more about python at brainly.com/question/12975450
#SPJ1
Why do you think so many companies continue to invest in new analytics tools without implementing governance programs that ensure data consistency?
Answer:This is a weird
quision because the world is not bobo
Explanation:
You work for a university and your colleague Mikhail sent you a spreadsheet with student information on it. It has the total number of credit hours they are taking, how many years they’ve been at the school, their email addresses, and their student ID number. In hidden columns it has their social security number and names; Mikhail says this is so no one reading the document can know which name goes with which information. Mikhail is planning on sharing the document with several people in and outside of your department and believes he has taken proper steps to secure students’ private information and keep them anonymous. Do you agree? What mistakes has Mikhail made, or what could he do to be more conscientious about sensitive information?
I do not agree with Mikhail plan on sharing the document with several people in and outside of your department and believes he has taken proper steps to secure students’ private information and keep them anonymous.
The mistakes that Mikhail made is not removing those information before sharing it and the thing that he can do is to lock that folder from been access by anyone.
What exactly does data security mean?Data security is the process of guarding digital data against unauthorized access, corruption, and theft throughout all stages of its life.
Note that Data security refers to safeguarding digital information, such as that contained in a database, against obnoxious users and destructive forces, such as cyberattacks and data breaches.
Therefore, for safety, Place all sensitive data in a safe location. Never leave it unattended on your desk or anywhere that unauthorized people could easily access it. The best place for it to be kept is in a locked file cabinet or drawer. All confidential information may be requested back, or the owner may choose to have it destroyed.
Learn more about data security from
https://brainly.com/question/25720881
#SPJ1
Consider a logic function with three inputs A,B, and C, and three outputs D, E, and F. The function is defined as follows:
D is TRUE if at least one input is TRUE, E is TRUE if exactly two inputs are TRUE, and F is TRUE only if all three inputs are TRUE. Design the logic circuit for the function.
The truth table will contain 2^3 = 8 entries. The image of truth table is attached below. The function will be defined on D is TRUE if at least one input is TRUE, E is TRUE if exactly two inputs are TRUE, and F is TRUE only if all three inputs are TRUE.
What is a Logic Circuit?
Computers frequently chain logic gates together by using the output of one gate as the input to another. That is referred to as a logic circuit.
Circuits allow computers to perform more complex operations than they could with a single gate.
A chain of two logic gates is the smallest circuit.
What is a Logic gate?
Logic gates are the fundamental components of any digital system. It is an electronic circuit with one or more inputs and one output. A logic governs the relationship between the input and the output. Based on this, logic gates are labeled as AND gates, OR gates, NOT gates, and so on.
To learn more about Logic Circuit, visit: https://brainly.com/question/26661878
#SPJ9
What is the purpose for the Information systems?
Communication control devices play a very important role in computer networks. For example, a _____ provides access to the internet through an internet service provider.
router
client
modern
Answer:
Hello i think it is client
good luck<3!
Which of the following formatting options adjusts the row height to include all text for all cells in a row?
AutoFit Column Width
O AutoFit Row Height
O Default Width
Row Height
The formatting option AutoFit Row Height adjusts the row height to include all text for all cells in a row.
What is the use of row height in Excel?
The Excel "ROWS" function, to put it simply, returns the count of the number of rows that have been selected in the range. As opposed to the ROW function, which provides the row number for the specified cell, it is distinct. The ROWS function, on the other hand, accepts an array of a row as an input and returns the number of rows in that array.
12.75 points serve as the standard row height (17 pixels). Text in font sizes of 10 and 12 points can be seen at this height. The horizontal lines that divides the row can really have their ends adjusted using the mouse. It's pretty similar to changing the width of a column to changing the height of a row.
To learn more about row in excel, use the link given
https://brainly.com/question/26573829
#SPJ1
Answer:
B
Explanation:
i just did it
Programming paradigms
A paradigm is a strategy for tackling a challenge or completing a task. Programming paradigms are ways to solve problems using a programming languages, or you could say they are ways to use tools and techniques that are already at our disposal to solve problems in a certain way.
What is a Programming Paradigm?
Programming paradigms are various organizational structures that can be used with a particular program or programming language. Each paradigm has a unique set of structures, attributes, and ideas about how to approach typical programming issues.
The reason why there are numerous programming paradigms is comparable to the reason there are numerous programming languages. It makes sense to use different paradigms for various projects because different paradigms are better suited for various types of problems.
What a Programming Paradigm is Not?
Languages and tools are not what programming paradigms are. With a paradigm, nothing can be "built." They resemble a set of ideals and principles that have been accepted, followed, and developed upon by numerous individuals.
To know more about Prograaming Paradigm, visit: https://brainly.com/question/28736751
#SPJ9
Which of the following PC twos record data fastest
Answer:
Explanation:I believe none are good at all go out and play
Question #4
Fill in the Blank
Fill in the blank to complete the sentence.
the users site.
is used to store and process data
over the Internet using computers that are not located at
The users site.
Answer:
cloud computing
Explanation:
Processing devices are the components responsible for the processing of information within the computer system. This includes devices such as the CPU, memory and motherboard. Storage devices are components which allow data to be stored within a computer system.
How can spreadsheets be useful to buisnesses
Answer: A lot of businesses uses spreadsheets to identify trends and organize and sort data into different categories.
Explanation:
For example, they can record sales that happens, stocks and inventory, sorting worked hours, employee profiles and expenses, etc.
You take a loan from a friend and need to calculate how much you will owe him after 3 months.
The loan was for $100 and the interest rate is 10%.
What do you mean by loan?
A loan is the lending of money by one or more persons, organisations, or other entities to other individuals, organisations, or other entities in finance. The recipient (i.e., the borrower) incurs a debt and is typically required to pay interest on that loan until it is repaid, in addition to repaying the primary amount borrowed. The paper demonstrating the loan (for example, a promissory note) will often indicate the principal amount borrowed, the interest rate charged by the lender, and the date of repayment.
$100 + ($100 × (10/100))
= $110
To learn more about loan
https://brainly.com/question/25696681
#SPJ1
External hackers have some access to a company's website and made some changes. Customers have submitted multiple complaints via email for wrong orders and inappropriate images on the website. The Chief Information Officer (CIO) is now worried about the distribution of malware. The company should prepare for which of the following other issues or concerns?
Answer:
-Domain reputation
-URL redirections
Explanation: