In a class hierarchy A. The more general classes are toward the bottom of the tree and the more specialized are toward the top B. The more general classes are toward the top of the tree and the more specialized are toward the bottom C. The more general classes are toward the left of the tree and the more specialized are toward the right D. The more general classes are toward the right of the tree and the more specialized are toward the left

Answers

Answer 1

Answer:

Option B

Explanation:

Option A is rejected because the general behavior of the objects are the reason that the classes concept was introduced and thus the general class should be on the top.

Option B is selected because down the hierarchy the common behavior in classes are reduced and thus they became more specialized and thus the specialized classes should be bottom to the general ones.

Option C is rejected because hierarchy works from top to bottom not from left to right.

Option D is not answer because hierarchy has nothing to do with left and right.


Related Questions

Pick two programming languages. Please describe: - The major differences between those two languages; and - If you were assessing an application and determining what language would be best for the programming, why you would choose each language.

Answers

First language : JAVA

Second Language : C++

Major Difference :

1. Platform Dependency :

Java is platform independent which means that its code can be run on any machine. It uses JVM ( Java virtual machine ) which converts the code in byte form and then run it which makes it flexible enough to be used on any system. So .exe file can run on any OS.

C++ is not platform independent and thus its .exe file  cannot be run on different OS.

2. Objects

In JAVA everything is reference typed and is inherited from the class objects that are predefined in it.

In C++ not everything is class or reference typed.

3. Garbage Collector

Java has built in garbage collector when we use classes in java.

C++ make developer to collect garbage when he uses reference types like pointers.

Why choose Java and C++ ?

People are very confused about the platform in-dependency of JAVA, so i decided to choose Java and compared that concept with c++ which is mother of all languages.

Given a int variable named yesCount and another int variable named noCount and a char variable named response, write the necessary code to read a value into response and then carry out the following: if the character typed in is a y or a Y then increment yesCount and print out "YES WAS RECORDED" if the character typed in is an n or an N then increment noCount and print out "NO WAS RECORDED" If the input is invalid just print the message "INVALID" and do nothing else.

Answers

// reading the value in response variable

cout<<"Enter the value :";

cin>>response;

// checking the value and printing the results

if(response == 'y' || response == 'Y')

{

yesCount+=1;

cout<<"YES WAS RECORDED";

}else if(response == 'n' || response == 'N')

{

noCount+=1;

cout<<"NO WAS RECORDED";

}else

cout<<INVALID";

Final answer:

To record yes or no responses, the code reads a char input, then increments corresponding counters based on the input value, and prints out a message. The counters maintain a count and total of the responses.

Explanation:

To handle the described scenario in a programming task, we would need to write a code block that checks the value of the char variable named response and, based on its value, increments either yesCount or noCount. Let's assume we're working with a language like Java, the following code snippet would achieve the desired functionality:

Scanner scanner = new Scanner(System.in);
char response = scanner.next().charAt(0);
if (response == 'y' || response == 'Y') {
   yesCount++;
   System.out.println("YES WAS RECORDED");
} else if (response == 'n' || response == 'N') {
   noCount++;
   System.out.println("NO WAS RECORDED");
} else {
   System.out.println("INVALID");
}

The code starts by waiting for the user to input a character. If the character is 'y' or 'Y', yesCount is incremented and a message is printed out. Similarly, if the character is 'n' or 'N', noCount is incremented and a corresponding message is issued. If the input is neither of these, the input is deemed invalid and an "INVALID" message is printed. This process helps in maintaining a count and total of the 'yes' and 'no' responses.

Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value is considered a consecutive duplicate. In this example, there are three such consecutive duplicates: the 2nd and 3rd 5s and the second 6. Note that the last 3 is not a consecutive duplicate because it was preceded by a 7. Write some code that uses a loop to read such a sequence of non-negative integers , terminated by a negative number. When the code finishes executing, the number of consecutive duplicates encountered is printed. In this case, 3 would be printed. Assume the availability of a variable, stdin, that references a Scanner object associated with standard input. That is, stdin = new Scanner(System.in); is given.

Answers

// Variable to keep track of array size

int length = 0;

// Array itself

int array[] = {};

// while loop will take input in the array until a negative number is entered

while(input>=0){

stdin = new Scanner(System.in);

array[length] = stdin;

length +=1;

}

// int variable to terminate while loop

int i =0;

// keep track of index of output array

int y =0;

while(arr[i] != length){

// making output array

int output[]={}; bool flag;

// put the element in out put array considering if it the desired one

output[y] = array [i];

// Now check if it was the desired?

for(int z=1;z<=length;z++){

if(array[i+z]!=output[y]){

 flag = true;

}

else

{

 output[y]=0;

 y+=1;

}

if(array[i+z+1]=output[y] && flag == true){

output[y] = array[i];

y+=1;

}

}

//output the array

for(int o=0;o<y;o++)

System.out.println(output[o];

Final answer:

To solve this problem, use a loop to read the sequence of non-negative integers terminated by a negative number. Compare each number with the previous number and increment a counter if they are the same. Print the value of the counter representing the number of consecutive duplicates encountered.

Explanation:

To solve this problem, we can use a loop to read the sequence of non-negative integers terminated by a negative number. We can keep track of the consecutive duplicates encountered by comparing each number with the previous number. If they are the same, we increment a counter. If they are different, we continue with the next number. Finally, we print the value of the counter, which represents the number of consecutive duplicates encountered.

Given a String variable named line1 and given a Scanner reference variable stdin that has been assigned a reference to a Scanner object, read the next line from stdin and save it in line1. (Do not concern yourself with any possible exceptions here-- assume they are handled elsewhere.)

Answers

Answer:

Scanner stdlin = new Scanner(System.in);

line1 = stdlin.readline();

Explanation:

1.stdlin is the referenced input variable made by using built in Scanner class of Java language.

2.Than in line1 the next line from the console will be assigned by using readline function.

Joan owns a dog walking business and read a blog post that explained search engines are a great place to generate ideas on what people are searching for. Joan starts off her research by typing in 'dog walking tip' to see what insight she can find. Fill in the blank: Joan notices that when she types in 'dog walking tip' the search engine offers some helpful suggestions on popular searches, like 'dog walking tips and tricks.' This is known as _________.

related searches
autocomplete
suggestion finder
Google search queries

Answers

Answer: autocomplete

Explanation:

autocomplete is a feature of the search engine whereby it it able to complete sentences we type based on our browsing or surfing experiences. It has a database that store all related words and phrases people use and when we type any words it provides us hints in respect of what we type next.

Which statement is NOT CORRECT?

In a file approach to data management, the data definitions are included in each application separately.
The file approach to data management causes the same information to be stored separately for different applications.
In a file approach to data management, a change in the structure of a data file is easily handled because each application has its own data files.
In a file approach to data management, different applications could be using older and newer versions of the same data."

Answers

Option C is not correct because in file system there is problem of using same data at different place with old and new updated versions and thus change in the data on one file is not reflected on the other related files implicitly rather we will have to change the data in each file manually which is indeed not easy task. In fact that is one of the biggest drawback of file system.

Option A is correct because the files of different data has separate definitions of the topics they are about.

Option B is correct because has no reversibility and thus same data can be present on different files.

Option D is correct because because of no reversibility the files can have same records with new or old versions

The 3rd generation programming language that most students learned when most computers used MS DOS was ___ . It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

Answers

Answer:

Basic

Explanation:

The 3rd generation programming language that most students learned when most computers used MS DOS was basic. It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

Final answer:

The 3rd generation programming language widely learned during the dominance of MS-DOS was C. It remains a popular language due to its safety in using third-party code and its compatibility with other languages.

Explanation:

The 3rd generation programming language that most students learned when most computers used MS-DOS was C. C language remains a safe programming language for using third-party code and provides a coding standard that integrates easily with other programming languages. This language is widely recognized for its efficiency and control. It's also notable for its capability to produce programs that are more compact and run faster than those written in other languages.

Learn more about Programming Languages here:

https://brainly.com/question/32924876

#SPJ2

Which of the following is a communications device that connects multiple computers together and transmits data to its correct destination on a network?

A. A router
B. An Ethernet card
C.A network card
D. A modem

Answers

Answer: Router

Explanation:

Given an int variable n that has been initialized to a positive value and, in addition, int variables k and total that have already been declared, use a for loop to compute the sum of the cubes of the first n whole numbers, and store this value in total. Thus if n equals 4, your code should put 1*1*1 + 2*2*2 + 3*3*3 + 4*4*4 into total. Use no variables other than n, k, and total.

Answers

Explanation & answer:

We do not know which language you are using, so a pseudocode will be given, it will be similar to java or C/C++.  For other languages, you can adapt to the syntax of the target language.

int n=5;

//

total = 0  // initialize  variable to store total value, already declaired.

// k will be used as a dummy variable, already declared

for (k=1; k<=n; k++){

   total+=k*k*k;  // k*k*k works for almost all languages.  adapt as needed

   }

print(n, total)


One who is capable of identifying existing and predictable hazards in the surroundings, or working conditions
which are unsanitary, hazardous, or dangerous to employees, and who has authorization to take prompt
corrective measures to eliminate them is a/n
O A. Competent person
O B. OSHA Compliance Officer
O C. Qualified person
O DOSHA Outreach Trainer

Answers

Answer:

A: Competent Person

Explanation:

An OSHA “competent person”, by way of training and/or experience, has knowledge of applicable standards and authority to stop work deemed hazardous or that may cause harm to an employee. He/she has the authority, given from above, to correct workplace hazards. Such authority sets OSHA’S competent person apart from OSHA’S qualified person.

Assume that name has been declared suitably for storing names (like "Misha", "Emily" and "Sofia") Write some code that reads a value into name then prints the message "Greetings, NAME" where NAME is replaced the value that was read into name.

Answers

// i am writing c++ code for the given problem...

// taking input

cout<< " Enter the name : ;

cin>>name;

// printing the message

cout << " Greetings, " << name << endl;

Pete is designing a web page for a clothing company. He wants to show the different types of clothing lines available through a video. He wishes to use Adobe Flash Player to play the videos on the website.​Pete wants to set the playback quality parameter of the movie where the display quality of the video is favored over the playback speed. Which of the following values of the quality parameter must he apply to accomplish this?​false​true​low​high

Answers

Final answer:

Pete should set the quality parameter of the video to 'high' in Adobe Flash Player to prioritize display quality over playback speed.

Explanation:

Pete is designing a web page and wants to use Adobe Flash Player to play videos with a focus on display quality over playback speed. To achieve this, Pete should set the quality parameter of the video to 'high'. When the quality parameter is set to high, it ensures that the video will be displayed with the best quality possible, even if this means that the video might buffer or play back with less speed on slower internet connections or less capable devices. This setting prioritizes the visual experience for users who want to see the clothing lines with the highest image clarity and detail.

After stating your thesis, follow up by demonstrating the importance of the topic, and explain why the audience or future audience should care about the topic. This why statement is often referred to as ______.

Answers

Answer: audience relevance

Explanation:

Most importantly when stating a thesis we should show and present how the work in the thesis is relevant to the audience. In this way we would be able to connect our research work more to the people and the audience. We should be able to state how our work is going to benefit them, what the people should do in this regard and all the dos and don't must be mentioned clearly while stating our thesis.

Clunker Motors Inc. is recalling all vehicles from model years 1995-1998 and 2004-2006. A boolean variable named recalled has been declared. Given a variable modelYear write a statement that assigns true to recalled if the value of modelYear falls within the two recall ranges and assigns false otherwise. Do not use an if statement in this exercise!

Answers

//Making a variable bool to save answer

bool recalled = false;

//Making the modelyear variable

int modelYear = 0;

//taking input from user

Scanner input = new Scanner(System.in);

modelYear = input.nextInt();

//check statement to see if the input is in range

if((modelYear >=1995 && modelYear <=1998) || (modelYear <=2004 && modelYear <=2006 )

{

recalled = true;

}else{

recalled = false ;

}

Write an if/else statement that adds 1 to the variable minors if the variable age is less than 18, adds 1 to the variable adults if age is 18 through 64, and adds 1 to the variable seniors if age is 65 or older.

Answers

Answer:

Explanation:

data is a statement like

data 10,20, 30 , 40 , 50, 60 , 70, 80

\\the numbers represent ages.

For x := 1 to end of data do a[x]:=read(data)

\\ This is a comment. You could do this much easier if you just use three if statements rather than the if then else.

minor:=0;adult:=0;senior:=0;

while a[x] <> 0 do begin

age:= a[x]

if age < 19 then minor:=minor + 1;

If age > 18 then if age < 65 the adult:=adult + 1;

if age > 64 then senior := senior + 1;

end;

I have not declared the variables anywhere. That depends on what language you are using. The key step you  want are the three if statements. How you find out what's in them is another matter.

What is drill-down capability?
Multiple Choice
a. Involves the aggregation of information and features simple roll-ups to complex groupings of interrelated information.
b. The ability to look at information from different perspectives.
c. Finds the inputs necessary to achieve a goal, such as a desired level of output.
d. Enables users to get details, and details of details, of information.

Answers

Answer:

Enables the users to get details ,and details if details ,of information.

Explanation:

Drill - Down Capability is the capability that lets user to see more information by pointing and clicking on the specific element.For example - a report that displays literacy rate by state can allow the user to select a state and by clicking on it and user can see the literacy rate by county or city within that state.

Hence we conclude that option d is the correct answer that is  

What is the most downloaded iphone application of all time?

Answers

Answer:

You

Tube is the most popular.

The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program. __________

Answers

Answer: This Information Security Handbook assist and guide managers to establish and implement an information security program.

Explanation:

The handbook looks to implement adequate security programs and also to demonstrate their effectiveness.

a) True, The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program.

This handbook is published by the National Institute of Standards and Technology (NIST). Offers comprehensive advice and strategies on:

Creating effective information security policiesMaintaining effective information security practicesIntended to assist organizations in protecting their information systems

Provides detailed recommendations on:

Security controls Risk managementOther critical aspects of information security

The NIST SP 800-100 Information Security Handbook provides technical guidance for the establishment and implementation of an information security program.

a) True

b) False

1. You want to find if TCP/IP Services are working properly on your Computer, you would use which command? a. PING LOCALHOST b. IPCONFIG /STATUS c. NETSTAT LOOPBACK

Answers

Answer:

Option A

Explanation:

Option B is rejected because it is used to get the startup network settings, processes extra features used by the network.

Option C is rejected because it is used to check the stats like ping,fps of the network by using a loop back.

Option A is selected because PING command is used to check the data packets transfer rate between two ends using ICMP protocol. Local host means that you are specifying the one end as your side. If the packets are there then it is working else the IP service is down.

Write a method named lastFirst that accepts a string as its parameter representing a person's first and last name. The method should return the person's last name followed by the first initial and a period. For example, the call lastFirst("Marla Singer") should return "Singer, M." . You may assume that the string passed consists of exactly two words separated by a single space.

Answers

I'm going to assume this is Java, because you said "method" meaning it will be some sort of object oriented language, and Java's really common. Here would be the full program, but you can just take the method out isolated if you need it.

package lastname;

public class LastName {

   public static void main(String[] args) {

       // Example usage:

       String name = LastName.lastName("Garrett Acord");

       System.out.println(name);

       // Output: Acord G.

   }

   public static String lastName(String fullName)

   {

       String[] splitName = fullName.split(" ");

       return String.format("%s %s.", splitName[1], splitName[0].substring(0,1) );

       

   }

   

}

Final answer:

The method 'lastFirst' takes a full name as input and returns a string with the last name, followed by the first initial and a period. This can be implemented in a programming language like Java, and calling 'lastFirst("Marla Singer")' will return 'Singer, M.'.

Explanation:

The method lastFirst is designed to take a string input representing a person's first and last name, and return a formatted string with the last name followed by a comma, a space, the first initial of the first name, and a period. Here is how you could implement the method in Java:

public String lastFirst(String fullName) {
   int spaceIndex = fullName.indexOf(" ");
   String firstName = fullName.substring(0, spaceIndex);
   String lastName = fullName.substring(spaceIndex + 1);
   return lastName + ", " + firstName.charAt(0) + ".";
}

For example, when you call lastFirst("Marla Singer"), the method will return "Singer, M."

What type of slide show is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer? A. Photo album B. OLE C. Office Clipboard D. Brochure

Answers

Answer:

C. Office Clipboard

Explanation:

An Office Clipboard is a type of slide show that is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer.

Answer:

A:Photo album

Explanation:

Organizing photos into a slide show is an effective technique for a business to showcase its products and services. Rather than a static brochure, a slide show is a dynamic and eye-catching way to familiarize potential customers with what your company has to offer. Photo album slide shows can be presented at a conference booth, online, or distributed through email.

Write a loop that reads positive integers from standard input and that terminates when it reads an integer that is not positive. After the loop terminates, it prints out, on a line by itself and separated by spaces, the sum of all the even integers read, the sum of all the odd integers read, a count of the number of even integers read, and a count of the number of odd integers read, all separated by at least one space. Declare any variables that are needed.

Answers

Answer:

The loop for the given scenario is shown.

while( num >= 0 )

   {

          if( num%2 == 0 )

       {

           sum_even = sum_even + num;

           count_even = count_even + 1;

       }

       else

       {

           sum_odd = sum_odd + num;

           count_odd = count_odd + 1;

       }

      cout << "Enter a positive number." << endl;

       cin >> num;

   }

Explanation:

The program uses three variables to hold the user input, sum and count of even numbers and odd numbers.

int sum_even, sum_odd, count_even, count_odd, num;

The sum variables are initialized.

   sum_even = 0;

   sum_odd = 0;

   count_even = 0;

   count_odd = 0;

Only positive input from the user needs to be considered as per the question, hence, while loop is used.

This loop will execute only if the user inputs valid number. Upon entering the negative number which is less than 0, the loop terminates.

Following this, the sum and count of even numbers is displayed followed by the sum of negative numbers.

cout << sum_even << " " << sum_odd << " " << count_even << " " << count_odd << endl;

The c++ program for the given problem statement is as follows.

#include <iostream>

using namespace std;    

int main()  

{      

   // variables declared for sum and input

   int sum_even, sum_odd, count_even, count_odd, num;    

   // sum initialized to 0

   sum_even = 0;

   sum_odd = 0;

   count_even = 0;

   count_odd = 0;

   

   cout << "This program calculates the sum and count of even and odd numbers which are positive. This program will end on invalid input." << endl;

   cout << "Enter a positive number." << endl;

   cin >> num;    

   // loop will terminate if the user inputs negative number

   while( num >= 0 )

   {

       // for even numbers, input is added to sum_even else sum_odd

       if( num%2 == 0 )

       {

           sum_even = sum_even + num;

           count_even = count_even + 1;

       }

       else

       {

           sum_odd = sum_odd + num;

           count_odd = count_odd + 1;

       }            

       cout << "Enter a positive number." << endl;

       cin >> num;

   }    

   cout << sum_even << " " << sum_odd << " " << count_even << " " << count_odd << endl;    

   return 0;    

}

OUTPUT

This program calculates the sum of even and odd numbers which are positive. This program will end on invalid input.            

Enter a positive number.                                                                                                        

23                                                                                                                              

Enter a positive number.                                                                                                        

56                                                                                                                              

Enter a positive number.                                                                                                        

78                                                                                                                              

Enter a positive number.                                                                                                        

91                                                                                                                              

Enter a positive number.                                                                                                        

-4                                                                                                                              

134 114 2 2

To accomplish the student's task, we can use a while loop to continuously read integers and accumulate sums/counters for even and odd numbers, terminating the loop when a non-positive integer is encountered. The resulting sums and counts are then printed out.

To write a loop that reads positive integers from standard input and terminates when a non-positive integer is read, we can use a while loop in a programming language such as Python. Below is an example of how this could be achieved:

sum_even = 0
sum_odd = 0
count_even = 0
count_odd = 0

while True:
   number = int(input("Enter a positive integer (or a non-positive integer to quit): "))
   if number \<= 0:
       break
   if number % 2 == 0:
       sum_even += number
count_even += 1
   else:
       sum_odd += number
count_odd += 1

print(sum_even, sum_odd, count_even, count_odd)

In this code, we initialize the variables sum_even and sum_odd to keep track of the total sum of even and odd numbers respectively. Similarly, count_even and count_odd are used to keep a count of even and odd numbers. The while loop continues to prompt the user for a number and checks if it is even or odd, updating the sums and counts accordingly. The loop breaks when a non-positive number is entered, after which it prints the sum of even numbers, the sum of odd numbers, the count of even numbers, and the count of odd numbers, all separated by spaces.

Write a switch statement that tests the value of the char variable response and performs the following actions: if response is y, the message Your request is being processed is printed if response is n, the message Thank you anyway for your consideration is printed if response is h, the message Sorry, no help is currently available is printed for any other value of response, the message Invalid entry; please try again is printed.

Answers

// Here is the required switch statement on response character

switch(response){

case 'y': // case to check if the response is y

cout<<" Your request is being processed ";

case 'n': // case to check for n

cout<<" Than you, anyway for your consideration";

case 'h': // case to check for h

cout<<"Sorry \, no help is currently available.";

default : // default case

cout<< Invalid entry: please try again.";

}

Which major NIMS Component describes systems and methods that help to ensure that incident personnel and other decision makers have the means and information they need to make and communicate decisions?

Answers

Answer:

1.Communication Management

2.Information Management

Explanation:

NIMS has introduced COMMUNICATION management system that determines if the decision makers has the ways to communicate decisions. It has standards that defines the ways that can be used by the personnel to communicate the decisions in a better and efficient manner.

NIMS has also a system which is primarily introduced to check the the personnel has the information to make and communicate decisions called Information management. Again, it also has the templates that defines that how information should be spread considering the confidentiality of the information.

Communications and Information Management is the major NIMS (National Incident Management System) Component that describes systems and methods ensuring that incident personnel and other decision-makers have the means.

Who: Incident personnel and decision-makers involved in managing an emergency or disaster situation.

What: Communications and Information Management deals with the systems, tools, and methodologies used to gather, organize, manage, and disseminate information effectively. This ensures that all participants have access to the accurate and timely information required to make informed decisions and coordinate efforts.

When: Effective communication and information management need to be in place at every stage of an incident, from the initial response through to recovery. This helps in maintaining a coordinated and efficient response effort throughout the incident.

Where: These systems and methods are applied wherever an incident or emergency situation occurs. This can include local, state, and national levels, and sometimes even international scenarios, depending on the nature and scope of the incident.

Why: The primary purpose of this component is to ensure seamless information flow among incident personnel, helping to support decision-making processes and enhance overall incident management. This ultimately leads to a more efficient and effective response and recovery effort.

How: Communications and Information Management involves using various tools and technologies, such as incident command systems, public information systems, alert and warning systems, and interoperable communication systems. These tools help ensure that critical information is shared accurately and timely among all relevant stakeholders.

Which black inventor patented fifty different devices, most of them dealing with the lubrication of machines, and successfully contested claims against the genuineness of his designs?

Answers

Answer:

American engineer Elijah McCoy was born in Canada but became US citizen very young, and and made vital contributions in the United States after the Civil War such as in the progress of locomotives design and railroads in America, the automatic lubrication systems for steem engines and many other inventions among his 57 U.S. patents that made train travel more efficient.

Explanation:

Write three separate code which would use a while loop, for loop and do ..while loop to output integers 200 down to 50 with their squares listed besides the integers which increments by steps of -10

Answers

Answer:

The c++ program using for loop is given below.

#include <iostream>

using namespace std;

int main() {

   int sq, i;    

   cout<<"Integer"<<"\t"<<"Square"<<endl;    

   for(i=200;i>=50;i=i-10)

   {

       cout<<i<<"\t"<<"\t";

       sq=i*i;

       cout<<sq<<endl;

   }

   return 0;    

}

 

The c++ program using do-while loop is given below.

#include <iostream>

using namespace std;

int main() {

   int sq, i=200;    

   cout<<"Integer"<<"\t"<<"Square"<<endl;    

   do

   {

       cout<<i<<"\t"<<"\t";

       sq=i*i;

       cout<<sq<<endl;

       i=i-10;

   }while(i>=50);    

   return 0;

}

 

The c++ program using while loop is given below.

#include <iostream>

using namespace std;

int main() {

   int sq, i=200;    

   cout<<"Integer"<<"\t"<<"Square"<<endl;    

   while(i>=50)

   {

       cout<<i<<"\t"<<"\t";

       sq=i*i;

       cout<<sq<<endl;

       i=i-10;

   }    

   return 0;

}

 

OUTPUT

Integer  Square

200  40000

190  36100

180  32400

170  28900

160  25600

150  22500

140  19600

130  16900

120  14400

110  12100

100  10000

90  8100

80  6400

70  4900

60  3600

50  2500

Explanation:

The integer variables sq and i are declared to hold the square and the integer respectively. The square of an integer is also a square hence, it is also declared as integer and not float.

The variable i is initialized to 200 as required by the question. All the three loops continue till value of i reaches 50. Once, the value goes below 50, loop is discontinued.

In for loop initialization, condition and decrement, all are done simultaneously.

for(i=200;i>=50;i=i-10)

In do-while and while loops, variable declaration and initialization are done simultaneously. The condition and decrement logic is contained within the loop.

This loop executes once irrespective whether the condition is satisfied or not. From the second execution onwards, the condition is taken into account.

   do

   {

       cout<<i<<"\t"<<"\t";

       sq=i*i;

       cout<<sq<<endl;

       i=i-10;

   }while(i>=50);    

The while loop is similar to do-while loop except that the while loop executes only if the condition is satisfied.

The output for all the three loops is the same hence, output is shown only once.

On which tab are import and export commands located in Access? A. Home B. Database Tools C. External Data D. Create

Answers

Answer:

C. External Data

Explanation:

On the External Data tab, you can find import and export commands located in Access.

An administrator has initiated the process of deploying changes from a sandbox to the production environment using the Force IDE. What information must be supplied to the IDE during this process? Choose 3 answers: - The environment into which the changes was deployed - The related change set connection Information - The username and password of the destination environment - The data of the fields which are being deployed - The metadata components that need to be deployed

Answers

Option A because the environment should be selected for which the changes are to be applied. In a time Force IDE has many project environments for example maybe a java project and C++ project would be there on sandbox, so the environment selection is important.

Option B because the related changed sets should be specified so that other developers that have access to the project can see the changes being made.

Option D The data fields that are needed to be deployed should also be provided so that the updated version can be seen by other developers.

Rejected Options :

Option C user name and password has nothing to do with the production environment because if the user has it only then it can come and make changes.

You are building a small network in the office. You will need to connect two different network segments that have different network addresses. What device will you use to connect them?

Answers

Answer:

Router device

Explanation:

whenever there is need to connect two networks with different IP addresses over the internet, they are connected by routers which has the ability to define these networks uniquely over the internet.

You decide to start a landscaping business called Trim Grass. You created a Web site, but it doesn’t seem to be attracting any clients. So, you decide to explore advertising on the Web. Which of the following advertising methods probably would not be beneficial?

Answers

What are the following advertising methods?

Other Questions
Question 1 with 11 blanks Hola, ngel: Qu tal? (Yo) (1) esta carta (this letter) en la biblioteca. Todos los das (2) aqu y (3) un buen libro. Yo (4) que es importante leer por diversin. Mi compaero de apartamento no (5) por qu me gusta leer. l slo (6) los libros de texto. Pero nosotros (7) unos intereses. Por ejemplo, los dos somos atlticos; por las maanas nosotros (8) . Tambin nos gustan las ciencias; por las tardes (9) a nuestra clase de biologa. Nosotros (10) en un apartamento que est cerca del laboratorio.Y t, cmo ests? (T) (11) mucho trabajo (work)? The following lots of a particular commodity were available for sale during the year Beginning inventory 10 units at $52.00 First purchase 19 units at $50.00 Second purchase 55 units at $59.00 Third purchase 14 units at $63.00 The firm uses the periodic system, and there are 27 units of the commodity on hand at the end of the year. What is the amount of inventory at the end of the year according to the LIFO method? Select the correct answer. A child throws a ball with an initial speed of 8.00 m/s at an angle of 40.0 above the horizontal. The ball leaves her hand 1.00 m above the ground and experience negligible air resistance. (a) How far from where the child is standing does the ball hit the ground? Bone is an ancient tissue (evolved +/- 500 million years ago) and is present only in Chordates.a. Trueb. False Which of the following best describes the foreign policy of Japan during the 1930s? A. Unfailing support for the League of Nations B. Focused on trade, not military power C. A peaceful approach to dealing with neighbors What cell makes ribosomes A line passes through the point (-2,7) and has a slope of -5 Solve the system of equations.2x + 2y + 3z = 56x + 3y + z = 63x + 4y + 4z = 9a. (x = 0, y = 1, z = 0)b. (x = 1, y = 0, z = 3)c. (x = -2, y = 3, 2 = 2)d. (x=-1, y = 2,2 = 1) Managing complex projects often involves use of multidisciplinary teams (MTs) including personnel from a. different college majors. b. different organizations including subcontractors. c. different work units within the organization. d. various combinations of college majors, work units, subcontractors, and industry partners. What is the value of x of angle A if angle B is 67 degrees and angle C is 52 degrees? Bina kept a list of her expenses and income for one month. If she started the month with no money, how much money did she have left at the end of the month? With theuse of which of the following, we reason from a generalization to aspecific conclusion?a- Analogyb- Logicc- Inductiond- Deduction Macroeconomics deals with which of the following? A. Inflation B. Income C. Profits D. Production 2x^2+y^2=8xy, find the dy/dx. Which side did most Native Americans support in the American Revolution?A. The BritishB. The FrenchC. The AmericansD. Most were neutral. Which statements describe S Waze check all that apply the move side to side they arrive after P waves they travel through solids they travel through liquids their current earth surface Which occurs first following tissue injury?A) Pain is felt in the area of the injuryB) Substances are released that produce vasodilation and increased permeability of capillary wallsC) Injured tissue becomes reddenedD) Phagocytes migrate to the area of injury true or false, Polar orbiting satellites offer the advantage of imaging clouds directly below their orbit, rather than at an angle such as experienced by a geostationary satellite. How were Greco- Roman and Jewish ideas similar Read the excerpt from Enriques Journey. Enriques head throbs. The sun reflects off the metal. It stings his eyes, and his skin tingles. It drains the little energy he has left. He moves around the car, chasing patches of shade. For a while, he stands on a narrow ledge at the end of a fuel tanker. It is just inches above the wheels. He cannot let himself fall asleep; one good shake of the train, and he would tumble off. What is the authors purpose in this biography excerpt? to tell when and where the story takes place to explain how difficult it is to travel in some climates to show how dangerous it is to leave Honduras to introduce the main character and describe his traits