EduEureka
Home
Search
Login
Search
Computers and Technology
Computers And Technology
High School
Enumerate a couple of reasons why it would be impracticable for the external devices to be connected directly to the processor or the system bus
Computers And Technology
College
What does an operating system provide so you can interact with a device
Computers And Technology
High School
BRAINLIEST WILL BE GIVEN which technique can you use on your pages to improve ratings in search enginesa. on-pageb. search review c. off-paged. off-site
Computers And Technology
College
The UNIX cal command prints out the calendar of the month/year that the user enters. Type in the following, one at a time, and observe the output: cal 3 2014 cal 2014 cal 1 1 To learn more about this command, type in man cal for help. Write a program named cal.c that prints out the following (which is the output when you type in cal 10 2018 in UNIX). Note that you are not asked to implement the cal command. You can assume that you know October 1 is a Monday. You will need to use loops and the % operator. October 2018 Su Mo Tu We Th Fr Sa 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Computers And Technology
College
5.27 LAB*: Program: Soccer team roster (Vectors)This program will store roster and rating information for a soccer team. Coaches rate players during tryouts to ensure a balanced team.(1) Prompt the user to input five pairs of numbers: A player's jersey number (0 - 99) and the player's rating (1 - 9). Store the jersey numbers in one int vector and the ratings in another int vector. Output these vectors (i.e., output the roster). (3 pts)Ex:Enter player 1's jersey number:84Enter player 1's rating:7Enter player 2's jersey number:23Enter player 2's rating:4Enter player 3's jersey number:4Enter player 3's rating:5Enter player 4's jersey number:30Enter player 4's rating:2Enter player 5's jersey number:66Enter player 5's rating:9ROSTERPlayer 1 -- Jersey number: 84, Rating: 7Player 2 -- Jersey number: 23, Rating: 4...(2) Implement a menu of options for a user to modify the roster. Each option is represented by a single character. The program initially outputs the menu, and outputs the menu after a user chooses an option. The program ends when the user chooses the option to Quit. For this step, the other options do nothing. (2 pts)Ex:MENUa - Add playerd - Remove playeru - Update player ratingr - Output players above a ratingo - Output rosterq - QuitChoose an option:(3) Implement the "Output roster" menu option. (1 pt)Ex:ROSTERPlayer 1 -- Jersey number: 84, Rating: 7Player 2 -- Jersey number: 23, Rating: 4...(4) Implement the "Add player" menu option. Prompt the user for a new player's jersey number and rating. Append the values to the two vectors. (1 pt)Ex:Enter a new player's jersey number:49Enter the player's rating:8(5) Implement the "Delete player" menu option. Prompt the user for a player's jersey number. Remove the player from the roster (delete the jersey number and rating). (2 pts)Ex:Enter a jersey number:4(6) Implement the "Update player rating" menu option. Prompt the user for a player's jersey number. Prompt again for a new rating for the player, and then change that player's rating. (1 pt)Ex:Enter a jersey number:23Enter a new rating for player:6(7) Implement the "Output players above a rating" menu option. Prompt the user for a rating. Print the jersey number and rating for all players with ratings above the entered value. (2 pts)Ex:Enter a rating:5
Computers And Technology
High School
Describe an association or rhyming phrase you have used to remember information. Was this a useful technique for you? Why or why not?
Computers And Technology
High School
Which of the following best explains how messages are typically transmitted over the Internet? The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipients device. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipients device. A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipients device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipients device. B The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipients device. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipients device. C The message is transmitted as a single file and received in whole by the recipients device.
Computers And Technology
High School
What happens once the Insert tab is used in PowerPoint to insert a chart into a presentation?A separate data sheet opens in which to enter data for the chart.The user is prompted to link to an external Excel spreadsheetThe user can edit the chart directlyNothing happens
Computers And Technology
High School
Which of the following traversals would print all of the elements in the 2D array of integers numsin column-major order?
Computers And Technology
College
The vulnerabilities common to the software development process, including buffer overflows, race conditions, input validation attacks, authentication attacks, authorization attacks, and cryptographic attacks, and how we might mitigate these by following secure coding guidelines. Besides protecting O S software on hosts, there is a need to protect applications that run on these devices. Aspects of application security includes all except:____.A. Application development security.B. Secure coding techniques.C. Code testing.D. Requirement Assessment.
Computers And Technology
High School
What are some other sites similar to brainly? By similar I mean being able to ask a question and answer them based on categories.
Computers And Technology
High School
1-DESIGN TAB....................2-LAYOUT TAB . 1-wordart styles,2-table size,1-Table styles,2-alignment,1-draw borders,2-rows and columns
Computers And Technology
College
What is the name for the last word on a dictionary page?a. Final wordc. First guidewordb. Second guidewordd. None of thesePlease select the best answer from the choices providedABXOOO
Computers And Technology
High School
you would use conditional formatting on a cell when you want to _____
Computers And Technology
High School
C++Assume the existence of a Window class with integer data members width and height. Overload the
Computers And Technology
College
Which program enables different computers to transmit data to each other?A. simple message transfer protocolB. Hypertext transfer protocolC. Interactive file transfer protocol D. Transmission control protocol/Internet protocol
Computers And Technology
College
write a c++ program that accept student information
Computers And Technology
College
Briefly explain how Riboflavin deficiency lead to disease state.
Computers And Technology
College
What is the output of the following code?int num=25;if (num > 5)System.out.print(num + " ");num += 10;}if (num > 30){System.out.print(num + " ");num += 5;}if (num > 45 ) {System.out.print(num);}
Computers And Technology
High School
In addition to assessing whether each of your independent variables has an effect on the dependent variable, a factorial ANOVA also allows you to:A) use multiple dependent measures in a single analysis.B) control for a third variable that might be related to your dependent measure prior toinvestigating the independent variable of interest.C) determine whether the effects of one factor depend on the other factor.D) partition out the variability due to individual differences and the variability due tomeasurement error.
Computers And Technology
College
Do you think renewable energy can power the world? If so, why?
Computers And Technology
High School
Choose the correct option that completes the sentence.Cybersecurity measures should promote theand of data.
Computers And Technology
High School
grouping keywords into separate lists for different sections for a website is known asa. researching b. comparingc. organizingd. brainstorming
Computers And Technology
College
what is the output of int s; in c programming?m
« Previous
Page 2
Next »