Assume you have taken another square picture with the 25-megapixel digital camera discussed in the previous question. This time around you decide to view the picture on your computer screen that can display 2000 pixels by 1000 pixels. What fraction of the image is viewable on the screen? Tnoo

Answers

Answer 1

Answer:

8% of the picture

Explanation:

Given:

Square picture pixels = 25 MP

Pixels that can be displayed by the computer = 2000 pixels by 1000 pixels

or

Pixels that can be displayed by the computer = 2000000 pixels

Now,

The fraction of picture viewable on the screen = [tex]\frac{\textup{2MP}}{\textup{25MP}}[/tex]

or

The fraction of picture viewable on the screen = 0.08

or

The fraction of picture viewable on the screen = 8% of the picture


Related Questions

Complete the following conversions. You MUST show all of your work to receive full credit.

Convert the following decimal numbers to binary.

a. 357

b. 67

c. 252

d. 65000

e. 5795

Answers

Answer:

a. 101100101

b. 1000011

c. 11111100

d. 1111110111101000

e. 1011010100011

Explanation:

To convert any decimal number to binary you need to make a succession of divisions by 2, in the image I provide, you can see how the process was done, every time you divide your number by 2 you'll have a remainder, being this 0 or 1, this will become your binary number. It's important to notice that using this method you'll divide from right to left, but you'll take your remainders in the opposite direction (right to left) to form your binary number.

Hope you find this information useful! Good luck!

Final answer:

To convert decimal numbers to binary, divide by 2 and record the remainders until the quotient is zero. The binary representation is then read from the bottom up. This method is applied to convert the given decimal numbers to their binary equivalents.

Explanation:

Converting decimal numbers to binary requires dividing the number by 2 and recording the remainder until the quotient is 0. Here's how you can convert the given decimal numbers to binary:

a. 357 in binary: Divide 357 by 2, remainder is 1, quotient is 178. Continue this process until the quotient is 0. The binary number will be the remainders read in reverse order: 101100101.b. 67 in binary: Same process as above, resulting in 1000011.c. 252 in binary: Following the same steps, we arrive at 11111100.d. 65000 in binary: This larger number follows the pattern, converting to 1111110110010000.e. 5795 in binary: After converting, the binary equivalent is 1011010010011.

Suppose a class consists of 3 sophomores, 4 juniors, and 2 seniors (no freshmen). We want one person from each of the class years to do a presentation. How many different sets of presenters are there?

Answers

Answer:

There are 24 different sets of presenters.

Explanation:

We have:

3 sophmores

4 juniors

2 seniors

The presentation has the following format:

So - J - Sr

Since there are 3 sophmores, 4 juniors and 2 seniors, we have that:

For each sophmore, 4 juniors can present.

For each junior, 2 seniors can present

There are 3 sophmores

So there are

[tex]3*4*2 = 24[/tex]

There are 24 different sets of presenters.

Define and implement a method that takes a string array as a parameter and returns the length of the shortest and the longest strings in the array

Answers

Answer:

#HERE IS CODE IN PYTHON

#function to find length of shortest and longest string in the array

def fun(list2):

   #find length of shortest string

   mn=len(min(list2))

   #find length of longest string

   mx=len(max(list2))

   #return both the value

   return mn,mx

#array of strings

list2 = ['Ford', 'Volvo', 'BMW', 'MARUTI','TATA']

# call the function

mn,mx=fun(list2)

#print the result

print("shortest length is:",mn)

print("longest length is:",mx)

Explanation:

Create an array of strings.Call the function fun() with array as parameter. Here min() function will find the minimum string among all the strings of array and then len() function will find its length and assign to "mn". Similarly max() will find the largest string and then len() will find its length and assign to "mx". Function fun() will return "mn" & "mx".Then print the length of shortest and longest string.

Output:

shortest length is: 3

longest length is: 5

Final answer:

The problem involves writing a Java method to find the lengths of the shortest and longest strings in an array. The method iterates through each string to update and find the minimum and maximum lengths. It returns these lengths as an integer array.

Explanation:

To tackle the problem of finding the lengths of the shortest and longest strings in an array, we'll use a programming approach. Let's assume we are using Java for this solution. The method will iterate through the array, comparing the lengths of each string to find the minimum and maximum lengths.

Here is a simple Java method that accomplishes this:

public static int[] findShortestAndLongestStringLen(String[] array) {
   if (array == null || array.length == 0) return new int[] {-1, -1}; // Handle empty or null array    
   int minLength = Integer.MAX_VALUE;
   int maxLength = Integer.MIN_VALUE;
   for (String str : array) {
       if (str.length() < minLength) {
           minLength = str.length();
       }
       if (str.length() > maxLength) {
           maxLength = str.length();
       }
   }
   return new int[] {minLength, maxLength};
}

This method initializes two variables, minLength and maxLength, with the maximum and minimum values an integer can have, respectively. It iterates through each string in the array, updating these values based on the length of each string. Finally, it returns an array of two integers: the shortest length found (minLength) and the longest (maxLength).

What is a milestone? Provide a few examples of milestones.

Answers

Answer:

A milestone is a significant progress point within your project. Milestones' main purpose is to set goals you have to achieve in order to succeed and complete your project

Explanation:

-Example 1-

You have to write a report for your project. This report contains introduction, problem background, results, and recommendations. The milestones for writing your report could be:

Milestone 1: introduction section is completed

Milestone 2: problem background section is completed

Milestone 3: results section is completed

Milestone 4: recommendations section is completed

-Example 2-

You have to design a webpage that allows the user to login, enters his/her name, and logout. The milestones in this case could be:

Milestone 1: login functionality is completed

Milestone 2: text field for typing the name is placed

Milestone 3: submit name button functionality is completed

Milestone 4: logout button functionality is completed

Milestone 5: all components of the webpage are fully integrated

You might think the goals in these examples can be set differently, and that is true. The definition of the milestones is in general subjective and it depends on how you design the steps you want to follow to complete your project. You might also want to add these milestones to a timeline so you have an estimated schedule of the development of your project.

A milestone is a significant event or stage that marks progress in development, used to evaluate skill or project achievement. Examples include motor skills like walking, language development like the first word, and project management deliverables.

A milestone is a significant event or point in development that marks an important stage in a project, process, or a person's life. They often serve as indicators of progress and can be used to evaluate achievement or skill level in various domains.

Examples of Milestones:

Motor milestones: These refer to crucial developmental steps in an individual's motor skills, like sitting up, crawling, and walking.

Language milestones: These are critical steps involved in the development of language skills, such as the onset of babbling, the first word, and the combining of words.

Project milestones: These might include deliverables established, a timeline for when remaining work will be completed, and noting any problems that may affect project scope or direction.

Milestones are also used in different contexts, such as educational achievements (like graduating from school), professional development (like receiving a promotion), or personal growth (like buying a first home). In project management, they often involve establishing a direct reference to milestones or deliverables, scheduling the completion of remaining tasks, and identifying any issues that could impact the project's trajectory. Effective use of milestones helps in keeping projects on track and allows for the evaluation of progress over time, which is crucial for success.

supppose we already have a list called words, containing all the words(i.e., string).Write code that produce a sorted list with all duplicate words removed. For example, if words ==['hello', 'mother','hello','father','here','i','am','hello'], your code would produce the list ['am','father','hello','here','i','mother'].

Answers

Answer:

I will code in Javascript.

//define and initialize both arrays.

var words = ['hello', 'mother','hello','father','here','i','am','hello'];

var sortedList = [];

 

 for ( var i = 0;  i < words.length ; i++ ){  //loop used to go throght the words

   var duplicated = false;  // boolean used for detect duplicates

   for ( var j = i + 1;  j < words.length ; j++ ) {  //loop used to compare with other words

     if( words[i] == words[j] ) {  //if the word is duplicated, duplicated becomes true.

       duplicated = true;

       break;

     }

   }

   if (! duplicated) {  //if at the end of the loop of each word duplicated is false, then the element is pushed into sortedList.

     sortedList.push(words[i]);    

   }

 }

 sortedList.sort(); //when the loop is finished, use the Javascript method to sort an array.

Which part of the cable is used to carry data?

Answers

Answer:Inner conductor of cable

Explanation: The cable used for the transmission of data maintains the communication between the devices. The layer is made up the layers like jacket layer which is the outermost layer for the protection of wiring in cable .

A shield is also present on the inner conductor of the cable for the protection of the data from interference. The inner conductor is the part which transmits the data. Various types of the metal and alloys are used for making the conductor.It is a very sensitive part so it is protected with jackets of layer.

Discuss trends in cellular data transmission speeds

Answers

Answer:

  There are various types of cellular data with the different transmission speeds that are: 1G,2G,3G and 4G.

1st generation network:

The 1st generation network is known as cellular network data transmission that contain analog system. It has 2.4kbps speed range. It is widely used in various services like public voice.

 2nd generation network:

The second generation network is basically based on the digital system. The global positioning system (GSM) is one of the important service in the 2nd generation network. It basically provide different types of services that are:

    GSM provide upto 2.5G range of speed and GSM EDGE upto 23kbps services.

 3rd generation network:

 It the wireless service that is basically based on the digital system. It provide various types of services like mobile interne, video calling and wireless type of telephones.

  4th generation network:

 It is one of the high digital data transmission rate and it is basically represented as the LTE.  The 4G provide many types of services like  multimedia services and telephone and gaming services.

Answer:

   Worldwide, operators and manufacturers like Samsung, Xiaomi, LG, Motorola, ZTE or Huawei are adapting equipment to offer consumers this kind of revolutionary connectivity that comes to the market.

   The expectation that we are facing a technological breakthrough is because 5G has the potential to change the way we use the internet.

   If 4G and its variations allowed us to connect people, 5G will allow us a much broader connection to the things around us. Your phone, for example, will probably be faster than your home's wifi.

   The speed of 4G, which is probably within your grasp right now, is 1 Gbps per second. The new network, at its full potential, will be able to deliver a standard speed of 20 Gbps per second, according to UK regulator Ofcom.

   What does this mean in practice? How long does it take to download a 5G video? And watch a movie in streaming?

Downloading a 1-hour playlist on Spotfy took about 7 minutes with 3G, 20 seconds with 4G, and with 5G that time would be 0.6 seconds.

   If you want to take a movie to watch while you're on the go - offline - service offered by platforms like Amazon Premium or Netflix - it will take you 3.7 seconds to download it while spending about 2 minutes on 4G .

   The popular Fortnite game takes 14 minutes to download using 4G technology and the expectation is that with 5G it will take 24 seconds.

   In terms of speed, one of the key factors is called latency, ie the network's responsiveness to a request.

   With 5G, it will be reduced to one millisecond - a significant gain compared to the 20 seconds of the 4G network.

   It's an essential factor "for activities such as broadcasting a live game in virtual reality or for a surgeon in New York to control a pair of robotic arms performing a procedure in Santiago," explains the next-generation networking optics expert, Abraham Valdebenito in an article.

   In short, we can send and receive data almost instantly.

What is the difference between frontend and backend web development?

Answers

Answer:

 Front- end web development:

  The front end web development is basically focused on the client side and it manage the web designing of the web browser.

 It basically responsible for analyzing the code, designing and debugging various types of web applications. The front end developers basically design the architecture of the site.

 The front end refers in the web development what the users actually see first in the web browser.  

Back- end web development:

In back end web development the code is basically run in the server opposed the client. The back end developer are not basically understand the programming and coding language. It only deals with the outside architecture of the web applications.  

It is usually divided into three parts that is:  

ServerApplication Database

Write a function that receives an integer list from STL and returns the sum of even numbers in the list (return zero if no even number is in the list)

Answers

Answer:

int sumeven(int lis[],int n)

{

   int sum_e=0;//integer variable to store the sum.

   for(int i=0;i<n;i++)

       {

           if(lis[i]%2 == 0)//if the number is even adding to sum_e.

           sum_e=sum_e+i;

       }

   return sum_e;//retuning the sum.

   

}

Explanation:

The above written function is in C++.This function find the sum of even numbers in the list provided.It loops over the array and if the number is even adds to the variable sum_e finally return sum_e which having the sum of even numbers now.

What is the reason of non-deterministic (indeterminate) behavior of concurrent programs?

Answers

Answer: Concurrent programs are the programs that execute at the same point of time. They are simultaneous in nature with other concurrent programs.They are executed with the help of threads  to achieve the concurrency without the issue of scheduling. They are consider long running programs.

The program that has the low execution time compared with all other programs gets executed first.If the case of no progress is seen then another thread is executed.This type of execution gives the non- deterministic situation in which the possibility of leading completion of any particular program cannot be determined.

What are the disadvantages of cloud computing?

Answers

Answer: Cloud computing is the service that helps the usage of the services of the computer system parts (hardware and software) over a network .The disadvantages of the cloud computing are as follows:-

Cloud hacking-there are cases of the cloud hacking which is a incident against the security of the cloud computing devices.Technical problem-there is no quick fix provision for the mending the technical issue in the cloud computing network .Restricted features:-there are limitation on the number of features that are found in the different cloud computing such as accessibility , security, space.etc.

The ________ maps the software architecture created in design to a physical system architecture that executes it. (Points : 3) architectural diagram
sequence diagram
deployment diagram
state chart diagram

Answers

Answer:Deployment diagram

Explanation: Deployment diagram is the diagram that is used for displaying the hardware parts upon which the software architecture works.The main purpose of the diagram is showing the function and operations taking place through the deployment of the software system with the hardware.

These diagrams are made up of the nodes , interface, artifacts and other components. Other given options are incorrect because architectural diagram is for designing of the architecture of a system,sequence diagram is used for the sequential order display of system components and  state chart diagram is the diagram that shows the status of the parts of the operating system.

Therefore, the correct option is deployment diagram.

What is back propagation?

Answers

Answer:

 Back propagation is the algorithm which is basically used o improve the accuracy in the machine leaning and data mining. It is one of the most important tool in the mathematics to check the prediction with high accuracy.

The back propagation is also known as backward propagation and it is mainly used in the ANN (Artificial neural network).

The important features of the back propagation is that it has high efficiency for improving the networks. It is also recursive and iterative methods and ability to perform various tasks.  

Final answer:

Back propagation is an algorithm used to train neural networks by minimizing the output error through gradient descent. It involves adjusting the weights of neurons based on the error gradient, which is calculated using the chain rule. The process leverages activation functions to allow the learning of complex patterns.

Explanation:

Back propagation is a fundamental algorithm used in the training of artificial neural networks. It is a supervised learning technique that adjusts the weights of the neurons in the network. The main goal of back propagation is to minimize the error in the output of the neural network by propagating the error backward through the network and updating the weights accordingly.

The process begins by feeding the network an input and letting it pass through the layers to produce an output. This output is then compared with the desired output, and the difference between them is the error. Back propagation takes this error and calculates the gradient of the loss function with respect to each weight in the network using the chain rule of calculus. The weights are then adjusted in the opposite direction of the gradient to reduce the error. This is typically done using an optimization algorithm like gradient descent.

An important component of back propagation is the use of activation functions which add non-linear properties to the network, allowing it to learn more complex patterns. During back propagation, derivatives of these activation functions are vital as they are involved in calculating the gradients.

Overall, back propagation is an iterative process, where multiple epochs of training may be necessary to reach the desired level of accuracy.

. The __________ logical operator works best when testing a number to determine if it

is outside a range.

Answers

Answer:

The OR logical operator works best when testing a number to determine if it  is outside a range

Explanation:

The answer to this statement is:

The OR logical operator works best when testing a number to determine if it  is outside a range

The concept of logical operators is simple. They allow a program to make a decision based on multiple conditions

The AND (&&) operator is used to determine whether both operands or conditions are true

The NOT (!) operator is used to convert true values to false and false values to true. In other words, it inverts a value

The OR ( || ) operator is used to determine whether either of the conditions is true. If the first operand of the || operator evaluates to true, the second operand will not be evaluated.

What is the value of y when this code executes?

def foo(x) :
if x >= 0 :
return 6 * x

y = foo(-10)

y = None

y = 60

y = -60

y = 20

Answers

Answer:

The operation of 6*x only executes if x is greater or equal to 0, since x=-10 and -10 is less than 0, the operation does not execute. For this reason,  the value of y using this code is None.

Explanation:

In python a function is defined with the syntaxis:  

def function(x):  

the operation to execute (x)

value to return

In this case, the function is foo and the parameter is x:  

def foo(x):

  if x>= 0:

     return 6*x

The code starts by assigning a value to x. Then, the code asks if the value of x is grater or equal to 0, if this condition is meet, then the code returns the value of 6 times x, if not, then the code does not return a value. In this case, x is -10 and this value is not grater or equal to 0. Given that the condition is not met, then the code stops executing and the value of y is none.

The IllegalArgumentException class extends the RuntimeException class, and is therefore:

a.) a checked exception class b.) an unchecked exception class c.) never used directly d.) None of these

Answers

Answer:

b.) an unchecked exception class

Explanation:

The IllegalArgumentException is a subclass of the RuntimeException class. As such it represents an unchecked exception. An unchecked exception is one which need not necessarily be thrown or caught within the method body. In contract, a checked exception (e.g., IOExeption ) needs to be declared in either the throws clause or needs to be handled in a try-catch block as part of the method.

Every element in an array always has the same data type. Necessary ?

Answers

Answer:

False.

Explanation:

Every element in the array is always have same data type.

Array is the collection of items of same data type stored in contiguous memory location.

So as the definition suggests that array elements always have same data type.

But it is not necessary there are some languages that can allow array elements to be different types such as javascript,python.But traditional languages such as C,C++,Java does not allow this.

Convert (65.125)10 to octal.

Answers

Answer:

101.1

Explanation:

Keep in mind that octal has 8 numbers

Step 1: Split your number in 2 parts (integer part and decimal part):

integer part 65decimal part 0.125

Step 2: Convert the decimal part. For this step you need to multiply your decimal part and 8 (8 correspond the octal base) and get the integer part until you need it:

      0.125 * 8 =  1

So your decimal part correspond to number 1 in octal = (1)8

Step 3: Convert integer part: for this step you need to divide your integer part by 8 until you can and get the remainder

      65 / 8 = 8 remainder 1

        8 / 8 = 1 remainder 0

         1 / 8 = 0 remainder 1

Step 4: join the remainders from bottom to top and get the integer part

            101

Step 5: join the integer part and the decimal part to get the octal convertion

              101.1

What is the difference between a class and an object?

Answers

Explanation:

The difference between a class and an object is very simple a class is a template for objects.A class contains objects,methods,constructors,destructors. While an object is a member  of the class or an instance of the class. for ex:-

#include<iostream>

using namespace std;

class car

{

    public:

  string color;

  int numgears;

  int engine capacity_cc;

  bool ispetrol;

car(string color,int numgears,int engine capacity_cc,bool ispetrol)

{

  this->color=color;

  this->numgears=numgears;

  this->capacity_cc=capacity_cc;

  this->ispetrol=ispetrol;

}

};

int main()

{

car volvo = new car("red",6,2500,false);

return 0;

}

In the example we have class car and it's object is volvo.

Final answer:

In object-oriented programming, a class is a blueprint for creating objects that share similar properties and behaviors. An object, on the other hand, is an instance or a specific occurrence of that class. It represents a real-world entity and holds the values for the attributes defined in the class.

Explanation:

In object-oriented programming, a class is a blueprint for creating objects (instances) that share similar properties and behaviors. It defines the attributes (data) and methods (functions) that objects of that class will have. A class is like a template or a cookie cutter, while an object is an instance or a specific occurrence of that class. It represents a real-world entity and holds the values for the attributes defined in the class.

Let's take a car as an example. The class for a car would define its properties, such as color, brand, and year, as well as its behaviors, such as accelerating, braking, and turning. An object of this car class would be a specific car, like a red Toyota Camry from 2020, which has its unique values for the properties defined in the class.

. Which of the following is a command in MySQL for creating a database called 'game_data'?
(a) INSERT DATABASE game_data;
(b) CREATE DATABASE game_data;
(c) MAKE DATABASE game_data;
(d) NEW DATABASE game_data;

Answers

Answer:

The correct option for the following question is option(b) i.e CREATE DATABASE game_data;

Explanation:

The CREATE  command is used to create the database in MySQL .The syntax for creating a database is given as  

Create database database name ;

Here database name is game_data

So the query is CREATE DATABASE game_data;

Insert command is used for inserting the value into database not for creating the database .so option(a) is wrong .

MAKE and NEW  are not any command so these both the option are wrong.

Therefore the correct answer is option(b);

c++ 2.30 LAB: Phone number breakdown Given a long long integer representing a 10-digit phone number, output the area code, prefix, and line number, separated by hyphens. Ex: If the input is: 8005551212 the output is: 800-555-1212 Hint: Use % to get the desired rightmost digits. Ex: The rightmost 2 digits of 572 is gotten by 572 % 100, which is 72. Hint: Use / to shift right by the desired amount. Ex: Shifting 572 right by 2 digits is done by 572 / 100, which yields 5. (Recall integer division discards the fraction). For simplicity, assume any part starts with a non-zero digit. So 999-011-9999 is not allowed. LAB

Answers

Answer:

#include <iostream>

using namespace std;

int main()

{

   //declare variable to store phone numbers,its area code, prefix and line number.

   long phone_number;

   int area_code, prefix,line_number;

   cout<<"Enter 10-digit phone number:"<<endl;

   //input 10-digit phone number

   cin>>phone_number;

   //logic to find area_code, prefix, and line_number.

   area_code = phone_number/10000000;

   prefix = (phone_number/10000)%1000;

   line_number = phone_number%10000;

   //output phone number in asked format.

   cout<<area_code<<"-"<<prefix<<"-"<<line_number<<endl;

   return 0;

}

Output:

Enter 10-digit phone number:

8005551212

800-555-1212

Explanation:

In the above program 10 digit phone number entered by user will be stored in the variable phone_number.

Then using this phone_number variable area_code, prefix, and line number are calculated using the following logic:

area_code = phone_number/10000000;

prefix = (phone_number/10000)%1000;

line_number = phone_number%10000;

Finally these area_code, prefix, and line_number are displayed with hyphen in between using cout statement.

The C++ program reads a 10-digit phone number, then extracts and prints its area code, prefix, and line number, separated by hyphens. It uses division and modulo operations to isolate the desired digits, ensuring non-zero starting digits for simplicity.

Here's a C++ solution for your problem:

```cpp

#include <iostream>

using namespace std;

int main() {

   long long phoneNumber;

   cout << "Enter a 10-digit phone number: ";

   cin >> phoneNumber;

   int areaCode = phoneNumber / 10000000;

   int prefix = (phoneNumber / 10000) % 1000;

   int lineNumber = phoneNumber % 10000;

   cout << "Phone number breakdown: " << areaCode << "-" << prefix << "-" << lineNumber << endl;

   return 0;

}

```

This C++ program reads a 10-digit phone number as a long long integer. It then extracts the area code, prefix, and line number using the given hints and prints them separated by hyphens.

How many strings of eight lower-case English letters are there that contain the two letters bg, in that order, with the further constraint that no letters can be repeated?

Answers

Answer:  678,363,840

Explanation:

Hi!

The "bg" part of the string could be in 7 possible positions within the string. If we number the characters in the string from 0 to 7, the "b" of "bg" could be in positions 0 to 6.

We need to count the possibilities for the other 6 characters. They can be any of the 26 lower-case letters, but not b nor g, because no letters can be repeated. So we can choose 6 letters from 24 letters, without repetition, and the order is important. The number of such combinations is:

[tex]n = 24,\; m = 6\\\frac{n!}{(n-m)!} = \frac{24!}{18!} = 96,909,120[/tex]

For the total number of strings, we have to multiply with the 7 possible position of "bg". Then, the final number is 678,363,840

An instance of an object is (Points : 2) a block of COBOL code
one occurrence of the object
very small
a large number of input records

Answers

Answer: One occurrence of the object

Explanation:

 The instance of the object is the one occurrence of an object in the given class. The common statement of an object with respect to the instance means that there is single occurrence of an object.

When the process run at each time it is known as instance of program given specific values and variables. An instance of the object is also known as class instance.

It is basically defined as specific realization in an object and also the object varies in different number of the ways in the object oriented programming (OOPs).

CRM systems provide an organization with an important element: all employees of the company who directly or indirectly serve a customer are "____."
in the same category
in the same department
in the same division
on the same page

Answers

Answer: On the same page

Explanation:

 The CRM is basically stand for the customer relationship management that are design to support all the relationship with the customers. It basically analysis the data about the customers to improve the relationship and growth in the organization.

All the employees in the organization are directly and indirectly server the customers are basically o the Same page by the individual computers.

The CRM approach are basically compile the given data from the different communication source such as company website, email and telephone.

 

Write a program that has a while loop to print out the first five multiples of 15, 43, and 273 between the numbers of 3168 and 376020. Put each of the three sets of multiples on a new line.

Answers

Answer:

#include <iostream>

using namespace std;

void printmultiples(int n) //function to print first five multiples between 3168 and 376020

{

   int a =3168,c=1;

   cout<<"First five multiples of "<<n<<" are : ";

   while(a%n!=0 && a<=376020) //finding first mutiple of n after 3168.

   {

       a++;

   }

   while(c<6)//printing multiples.

   {

       cout<<a<<" ";

       a+=n;

       c++;

   }

   cout<<endl;

}

int main() {

   int t,n;

   cin>>t;//How many times you want to check.

   while(t--)

   {

       cin>>n;

       printmultiples(n);//function call..

   }

return 0;

}

Input:-

3

15

43

273

Output:-

First five multiples of 15 are : 3180 3195 3210 3225 3240  

First five multiples of 43 are : 3182 3225 3268 3311 3354  

First five multiples of 273 are : 3276 3549 3822 4095 4368

Explanation:

I have used a function to find the first five multiples of the of the numbers.The program can find the first five multiples of any integer between 3168 and 376020.In the function I have used while loop.First while loop is to find the first multiple of the integer n passed as an argument in the function.Then the next loop prints the first five multiples by just adding n to the first multiple.

In the main function t is for the number of times you want to print the multiples.In our case it is 3 Then input the integers whose multiples you want to find.

If your database is in archivelog mode, how can you force an archive?


A. Issue an alter database switch logfile command.


B. Issue an alter system switch logfile command.


C. Issue an alter system log_archive_start command.


D. There is no command to force an archive; they happen automatically.

Answers

Answer: (B) Issue an alter system switch logfile command.

Explanation:

 When the database is in the archive log mode then, the issue in the alter system switch logfile command force the particular switch. It basically produce achieve redo log which is smaller in the size by the dedicated size of the parameter log buffer.

It also govern the particular size of the RAM (Random access memory) buffer by redo log.  This command is basically faster to return in the program by the use of redo log.

On the other hand, all the options are incorrect as this command only alter the system and does not alter the database. Therefore, Option (B) is correct.

 

Examine the class definition. How many members does it contain?

class clockType
{
public:
void setTime(int, int, int);
void getTime() const;
void printTime() const;
bool equalTime(const clockType&) const;
private:
int hr;
int min;
int sec;
};
(Points : 5) 7
3
4
None of the above

Answers

Answer:

7

Explanation:

The class clockType consists of three member variables marked as private:

int hr; int min; int sec;

It also contains four public member functions:

void setTime(int, int, int); void getTime() const; void printTime() const; bool equalTime(const clockType&) const;

So in total it contains seven members. The member variables constitute attributes or state of the object while the member functions represent possible operations on the object.

Write a program which asks the user his/ her last name, stores it in a variable called lname, then asks What is your age? and stores it in a variable called age. After this, the program displays a userid, for example as follows: What is your last name? Jones What is your age? 20 Your user id is: Jones20

Answers

Answer:

// program in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

   int age;

   string lname;

   cout<<"Enter your last name:";

   // read last name

   cin>>lname;

   cout<<"Enter your age:";

   // read age

   cin>>age;

  // print user id

   cout<<"Your user id is: "<<lname<<" "<<age<<endl;

return 0;

}

Explanation:

Read last name from user and assign it to variable "lname".Then read age from user and assign it to variable "age".After this print the user id as last name followed by age.

Output:

Enter your last name:singh

Enter your age:24

Your user id is: singh 24

Immediate address is determined by a value in a register.

True

False

Answers

Answer: False

Explanation:

 The given statement is false as, in the immediate addressing the value of operand is basically store in the instruction.

In the register addressing the address filed is basically denote as the register which contain the operand.

In the immediate addressing, the mode of the data is the specific part of the instruction and the operand is basically specify in instruction of the immediate addressing itself.

The essence of strategy is ____, so competitive advantage is often gained when an organization tries a strategy that no one has tried before.

change

innovation

moving

work

Answers

Answer: Innovation

Explanation: Strategy is the planning for the execution of any task so that objective can be achieved. The strategy in organization is made for the long term goals which involves the participation of the the organizational elements from each level.

Innovation is the change in the organization in order to increase the creativity which is considered as the essence of organization. This helps in gaining the benefits such as increasing productivity, competitive advantage.

Other options are incorrect because change can be negative or positive for the organization, moving is the execution of the business work and work is the tasks of the organization.thus, the correct answer is innovation.

Other Questions
An unknown substance is dissolved in water. The solution is corrosive,conducts electricity, and has a higher concentration of H+ ions than OH-ions. What kind of solution does this unknown substance form?A. An acidic solutionB. A basic solutionC. A neutral solutionD. There is no way to tell whether it is an acid or a base. Am I right about this or..? A team of writers is just beginning a new documentation project. On their last project, the client complained that the completed document kept switching from active to passive voice and that the design of the headings was not visually consistent. Which of the following is the teams best approach for avoiding such problems on the current project?a.) Discuss cultural differencesb.) Create a style sheetc.) Choose a group leader with strong editing skillsd.) Establish clear work procedures Combinatorics problem. A web site was hit 300 times over a period of 15 days Show that over some period of 3 consecutive days, it was hit at least 60 times. PLEASE HURRY! DUE TOMORROW! Please answer all of these. Floor stands, shelf talkers, dump bins, and door signs are types of what kind of advertising? Can somebody please help me Considering the world economic outlook for the coming year and estimates of sales and earning for the pharmaceutical industry, you expect the rate of return for Lauren Labs common stock to range between -20 percent and +40 percent with the following probabilities:ProbabilityPossible Returns.10-.20.15-.05.20.10.25.15.20.20.10.40Compute the expected rate of return E(Ri) for Lauren Labs. How many milliequivalents of sodium chloride are contained with 3 L of normal saline? Which of the following probability distributions is visualized by a histogram? a. continuous c. geometric b. discrete d. uniform Dcrivez votre musicien pref: Apply your knowledge of Texas' economic development and geographic regions to explainwhere in Texas you would convince a large tech company to locate Explain why you wouldsteer them away from other regions of the state.(4 points)I will mark branlist The midpoint of segment XY is (6, -3). The coordinates of one endpoint are X(-1, 8). Find the coordinates of endpoint Y. During the year, credit sales amounted to $ 820 comma 000$820,000. Cash collected on credit sales amounted to $ 760 comma 000$760,000, and $ 18 comma 000$18,000 has been written off. At the end of the year, the company adjusted for bad debts expense using the percentminusofminussales method and applied a rate, based on past history, of 2.52.5%. The ending balance of Accounts Receivable is ________. Which is the largest fraction? 7/13 or 6/13 What are the three chemical molecules that make up the subunits of DNA?a, b, c, or d? Define inference and explain how it is used to form conclusions A series RLC circuit has a resistance of 44.0 and an impedance of 71.0 . What average power is delivered to this circuit when Vrms = 210 V? What type of molecules can easily move through the phospholipid bilayer? What is a Barr body, and where is it found in a cell? b) Define the Lyon hypothesis.