) Object-oriented programming generally does NOT focus on _____. (Points : 5) A. separating the interface from the implementation
B. client side access to implementation details
C. information hiding
D. ease of program modifiability
All of the above
None of the above
Only A, C, and D

Answers

Answer 1

Answer: Only A, C, and D

Explanation: Object -oriented programming(OOP) is the programming concept that has data types and functions that are applicable on the data structure.The basic features displayed by the OOPs concepts is encapsulation, polymorphism,abstraction,implementation data etc.

OOPs concept does not consider the factors like hiding of data ,modification factor and separating of interface. Thus option A ,C and D are only options that are not focused by OOPs.


Related Questions

Write a C program that displays your name and address (or if you value your privacy, a frictionless name and address)

Answers

Answer:

Following are the program in c language

#include <stdio.h> // header file

int main() // main method

{

   char name[90]="mantasa"; // storing name

   char add[90]="120 lal bangla mumbai"; // storing address

    printf("\n Name:%s\nAddress:%s",name,add); // print name and address

   return 0;

}

Output:

Name:mantasa

Address:120 lal bangla mumba

Explanation:

In this program we are declaring the two array of char type which will store the name and address . after that we display name and address.

An application specifies a requirement of 200 GB to host a database and other files. It also specifies that the storage environment should support 5,000 IOPS during its peak workloads. The disks available for configuration provide 66 GB of usable capacity, and the manufacturer specifies that they can support a maximum of 140 IOPS. The application is response time- sensitive, and disk utilization beyond 60 percent does not meet the response time requirements. Compute and explain the theoretical basis for the minimum number of disks that should be configured to meet the requirements of the application.

Answers

Answer:

60 minimum number of disks that should be configured to meet the requirements of the application.

Explanation:

Requirement of space for database = 200 GB

Usable Capacity for configuration = 66 GB

so the size requirement can be calculated as below :

Size requirement = 200/66 = 4 Disks

IOPS supported during peak processing cycle = 5000 IOPS

Max No. of IOPS supported = 140 IOPS

AS,The application is response time sensitive, and disk utilization beyond 60 percent does not meet the response time requirements, so,

IOPS requirement can be calculated as

IOPS requirement = 5000 IOPS/ (140x0.6 IOPS) = 60 disks

A systems flowchart:

Select one:

a. must always contain on-page connectors.

b. includes physical as well as electronic flows.

c. requires more than one entity.

d. must always have a data store if there are paper documents involved.

e. must be balanced.

Answers

Answer: (D)  Must always have a data store if there are paper documents involved.

Explanation:

 A system flowchart is basically responsible for displaying the data in the system and also control the flow of data. The system flowchart are basically use various graphic symbol for representing the systematic manner for processing the output.

It basically contain data store in the system if there is data documents present in the system so that it make easy to store the data in the system.

There are basically four symbols that is use to represent in the program flowchart is that are: Firstly start, processing, decision making and then end.

Suppose that a company offers quantity discounts. If up to​ 1,000 units are​ purchased, the unit price is ​$1010​; if more than​ 1,000 and up to​ 5,000 units are​ purchased, the unit price is ​$9.509.50​; and if more than​ 5,000 units are​ purchased, the unit price is ​$5.505.50. Develop an Excel template using the VLOOKUP function to find the unit price associated with any order quantity and compute the total cost of the order.

Answers

Answer:

Ans. Ready to download, please see the file attached to this document

Explanation:

Note. Consider changing the cell in yellow, does not make sense, it could be 10100 instead of 1010

Hi, to design this sheet, I also used the and(...) function of MS excel, in which you declate that in order to select a certain answer, 2 or more conditions must be true, in our case, if a purchase is up to 1000, the price would be $1010 (consider changing this value, maybe to 10100), if the purchase is more than 1000 and less than 5000, the price is $9,509.50, and if is more than 5000 units, the price would be $5,5005.50.

Please check the formula for further clarifications.

Best of luck.

Final answer:

To calculate unit prices and total cost in Excel with VLOOKUP for quantity discounts, create a lookup table with quantity thresholds and prices, then use the VLOOKUP formula to find the unit price for any order quantity, and multiply this price by the order quantity to find the total cost.

Explanation:

To develop an Excel template that calculates the unit price using quantity discounts with the VLOOKUP function, you'll first need to set up a table with the quantity thresholds and the corresponding unit prices. This table will act as a lookup table for the VLOOKUP function. You will then create a formula that takes an order quantity as input and returns the appropriate unit price based on the quantity thresholds specified.

Here’s an example of how you might structure your table (note that the actual table should be placed in the Excel sheet):

0 units to 1,000 units - $10.10 per unit1,001 units to 5,000 units - $9.50 per unitMore than 5,000 units - $5.50 per unit

To use the VLOOKUP function, you’ll enter a formula like the following in the cell where you want to display the unit price:

=VLOOKUP(order_quantity, lookup_table, 2, TRUE)

After finding the unit price, you can compute the total cost of the order by multiplying the quantity by the unit price derived from the VLOOKUP result:

=order_quantity * unit_price

Two positive integers are said to be relatively prime if their only common divisor is 1. For example, 8 and 9 are relatively prime, whereas 1 25 and 15 are not (because they have 5 as a common divisor besides 1). Write a function that takes as parameters two positive integers and returns whether they are relatively prime or not. Basic python programming

Answers

Answer:

#code in python.

#function that calulate 2 numbers are relatively prime or not

def fun(x,y):

   while(y):

       x,y=y,x%y

   return x

#user input

a=int(input("enter first number:"))

b=int(input("enter second number:"))

#call the function

if(fun(a,b)==1):

   print(" Both numbers are Relatively prime")

else:

   print("Both numbers are Not relatively prime")

Explanation:

Read two numbers from user.Call the function fun() with parameter "a" & "b". In the function, it will perform Euclid algorithm to find the greatest common divisor.If it is 1 then both are relatively prime else both are not relatively prime.

Output:

enter first number:5

enter second number:125

Both numbers are Not relatively prime

enter first number:8

enter second number:9

Both numbers are relatively prime

.Why is it common practice to use a boot loader?

Answers

Answer:

Bootloader is the program that helps in the revitalizing the micro-controller of the operating system .It makes the operating system self programmable.It's main purpose is loading the tasks or operations to ensure the working interface between software and hardware whenever the system gets booted up.

It is also known as the bootstrap loader.It is necessary and common because it is the first mechanism that works whenever the system gets initialized or booted. Without this feature the reloading of the programs will  not be possible.

. Why use parallel processing for data mining?

Answers

Answer:

 Parallel processing is the type of the processing in the computer program instruction by divide into the multiple processors unit. The parallel processing basically allow the interleaved execution the given program together.  

The parallel processing basically uses the multiple element for processing the solution of the problems simultaneously. it basically divide the problem  into independent parts so that the processing of the elements can execute simultaneously.

Its main objective of the parallel processing is that compile and run the program in short duration or time.  

Minimizing ____ is key to maintaining a competitive edge: it leaves competitors insufficient time to introduce their own products first. ISs can contribute significantly to this effort.

lead time

market time

production time

tracking time

Answers

Answer: Lead time

Explanation:

 Minimizing the lead time is one of the key to maintain the competitive edge. Lead time is basically defined as the time period between production of the product to the product are get manufactured in the market. It is also known as time to market.

it basically gives competitive edge when the lead time is reduced over the other products with the high lead time.

The main advantage of the lead time is to make reduce the lead time so that the organization can provide the fastest and reliable delivery of products and services.

Write pseudocode that demonstrate passes an array of six integers (10, 5, 15, 20, 30, and 25) into three functions called multiple_of_ten(), half(), and sum_and_average(). The multiple_of_ten function should accept a copy of each value in the array and determine whether the value is a multiple of 10. The half function should accept the array and output the first three integers in the array. The sum_and_average function should accept the array and compute the sum and average of all of six integers.

Answers

Answer:

multiple_of_ten(x):

eval_x = []

for i in x:

  if (i%10) == 0:

    eval_x.append('it is multiple of 10')

  else:

    eval_x.append('it is not multiple of 10')

 return eval_x

half(x):

 half = len(x)//2

 return x[:half]

sum_and_average(x):

  sum = 0

  for i in x:

    sum = sum + i

  avg = sum/len(x)

  return sum,avg

Explanation:

Function multiple_of_ten():

In this function, first you create an empty array in which you will store your results (evaluation messages in this case). Then you evaluate every element of the array in a for loop, by using the modulo operation.

The Modulus is the remainder of the division of one number by another. % is called the modulo operation.

For instance, 10 divided by 5 equals 2 and it remains 0. Any multiple of 10 will get a 0 remainder.

Therefore, every time you apply the modulo operation to an element in the array, and get a zero, you get a message 'it is multiple of 10', and a message 'it is not multiple of 10' otherwise.

Yo store the message you obtain per each number into the empty array you created at the beginning and you return that array as output of the function.

Function half():

In this function, you calculate the length of the array and apply floor division. Floor division returns the quotient(answer or result of division) in which the digits after the decimal point are removed.

For instance, 6 is the length of the array. you divide 6 by 2 and floor division will give you 3 as a result. This floor division will help you when the length of your array is odd.

Finally you return the array from the beginning till the number in the position given by floor division (in our example, 3), as output of the function.

Function sum_and_average():

In this function, you create a variable that will store your sum result. you initialize this variable as 0. then you use a for loop to sum up every element of your array to the variable you created.

Once you sum up all the elements you use that result and divide it by the length of your array in order to calculate the average.

Finally you return both the sum and the average as outputs of the function.

Create a program that will automatically add the fees and sales tax to a new car.Create a program to find the subtotal andd then total including sales tax. The program should receive a keyboard input representing the vale of the price of the car and the fees as well as the sales tax for the city the car is purchased in. San Francisco, Eurica, Concord California.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variables

double price,fee,tax;

double total;

cout<<"enter the price of car:";

// read the price of car

cin>>price;

cout<<"enter the fee:";

// read the fee

cin>>fee;

cout<<"enter the tax (in %):";

// read the tax

cin>>tax;

a

// total cost

total=price+fee+(price*tax)/100;

// print the cost

cout<<"total cost is: "<<total<<endl;

return 0;

}

Explanation:

Read the price of the car from user and assign it to variable "price",read fee and assign it to variable "fee" and tax to variable "tax".Then calculate the total cost of the car by adding the fee and tax of car to the price of car.

Output:

enter the price of car:1000

enter the fee:50

enter the tax (in %):10

total cost is: 1150

Write a C++ program that allows the user to enter double values. Display one of two messages: "The first number you entered is larger", "The second number you entered is larger". Save file as LargerorNot.cpp

Answers

Answer:

Following are the program in c++

#include <iostream> // header file

using namespace std; // namespace

int main() // main function

{

double a,b; // variable declaration

cout<<"Enter the first number and second number : \n";

cin>>a>>b; // input the number

if(a>b) // check first number greater than second number

{

cout<<"The first number you entered is larger";

}

else

{

cout<<"The second number you entered is larger";

}

return 0;

}

Output:

Enter the first number and second number :

45.5

687.8

The second number you entered is larger

Explanation:

In this program we have declared two variable i.e a and b of double type. After that check the condition if(a>b) if this condition is true then display  the message "The first number you entered is larger " otherwise display the message  "The second number you entered is larger".

Which of these software packages is not open source software (OSS)? (1 point) (Points : 1.5) Microsoft Windows
Mozilla Firefox Web browser
Apache Web server
a Linux operating system

Answers

Answer:

Microsoft Windows

Explanation:

Open Source Software is a software which is accessible to the public. we can modify or extend the code .In the given options Microsoft windows is not an open source operating system. User don't have access to source code where as Linux is an open source software where you can't limit to the functionality which they provided. you can control and extend the source code which they given for this OS

you need to extract data from the system your predecessor created. you discover tables have been created according to the third normal form. you find the needed data in three different tables. what SQL syntax allows you to garner this data?
a. union
b. join
c. Select
d. Having

Answers

Answer:

b. join

Explanation:

Correct answer:

Join: It allow join(paste) two tables by one or more commun columns

Example in the image attached

Bad answer:

Union: it only allow paste two tables with the same structure

select: it only allow get information from 1 table if not use join

having: it only allow get filtered information with a condition

A cybercrime: Select one: a. Is the act of defaulting on a properly signed agreement entered into upon the internet. b. Can be committed if a computer is the object of a crime, the subject of a crime, or the instrument of a crime. c. Always requires intent to commit a bad act in order to be prosecuted. d. Is synonymous with cyber terrorism

Answers

The answer is B because cyber crime is when a computer is used to commit criminal activities.

Polymorphism means (Points : 2) many forms
inheritance
driver
many birds

Answers

Answer:

many forms

Explanation:

Polymorphism is a construct in object oriented programming which means multiple forms.For example: Suppose I have a function which performs the add operation on two integers and another function with the same name which concatenates 2 given strings:

int add ( int a, int b);string add ( string a , string b)

The two functions represent polymorphic forms of the add function. The function to be invoked at runtime is determined by the runtime argument type.

For example , add (2,3) will invoke int add ( int a, int b);

Similarly, add("hello","world") will invoke string add ( string a , string b);

. What physical characteristic does a retinal scan biometric device measure?

A. The amount of light reaching the retina

B. The amount of light reflected by the retina

C. The pattern of light receptors at the back of the eye

D. The pattern of blood vessels at the back of the eye.

Answers

Answer: D)The pattern of blood vessels at the back of the eye.

Explanation: The retinal scan is the techniques which is used in the bio-metric mechanism.The scanning of the retina's blood vessel pattern is capture by the scanner is the unique technique which is used for bio-metric purpose.

Blood vessel pattern is capture because it is present in unique form for every person and will help in distinguishing a person from another person while scanning.

Other options are incorrect because light reflection or reaching near retina and light pattern are not the unique way for identification while scanning a person.Thus the correct option is option(D).

Write a CPP Program to read an integer number. Use a pointer to display this numbe

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

   int n,*p;

   cin>>n;//taking input.

   *p=n;//passing the address of n to pointer.

   cout<<*p<<endl;//printing the number using the dereferncing operator.

return 0;

}

Explanation:

The above written program in in C++.This program takes input of the integer n and stores the address of the integer in the pointer p. For printing the value of the to which the pointer is pointing we need to used the dereferencing  operator * .

_________ Code that you write is called primary code, and code that the compiler produces after processing the primary code is called runtime code

Answers

Answer:

The correct answer for the given question is  "source code"

Explanation:

When you writing a code in any programming language that code is known as  source code.The source code is also known as primary code, when source code is compiles it produce runtime code.

The source code is created by the compiler it can be easily understood by the human being.

for example in c language we write a source code after compilation it produces object code .

Answer:

The correct answer for the given question is  "source code"

Explanation:

When you writing a code in any programming language that code is known as  source code.The source code is also known as primary code, when source code is compiles it produce runtime code.

The source code is created by the compiler it can be easily understood by the human being.

for example in c language we write a source code after compilation it produces object code .

Are there any output differences between floats and doubles?

Answers

Explanation:

The precision in double values is twice as compared to float values.Hence double have smaller rounding errors as compared to float variables .A double is of 64 bits and float is of 32 bits usually hence floats have more rounding errors and on more number than doubles.Double has 15 decimal digits of precision and float has only 7 decimal digits for precision.

The if statement regards an expression with the value 0 as __________.

Answers

Answer:

The answer to this question is "false".

Explanation:

In this question, the answer is wrong because in computer science. Except for the binary language, It didn't understand any language. In computer 1 stands for true value and 0 stands for false value. In If-else statement if block executes true value is that is 1. and else block execute false value that is 0. In this question, if the value is 1 then the answer is true. But the answer to this question is false.

Only a third of all Americans have broadband service at home. Among telecommuters, the proportion is 87 percent.

True

False

Answers

Answer:

True.

Explanation:

The statement is true that only a third of all the Americans have broadband service present at their home and this percentage is 87 percent among the telecommuters.

America has made significant progress in the expansion of high -speed internet access in past several years but 19 million american still don't have broadband.

Data aggregates

are used to perform calculations on individual records in a table or query.
cannot be used in a report.
perform calculations on entire columns of data.
return multiple values.

Answers

Answer: Perform calculations on entire columns of data

Explanation:

 Data aggregate is the process that gather the information and express into the form of summary. It basically used in the statistical analysis for calculating the entire column of the data.

The main purpose pf the data aggregate is that it collect more data or information about the specific variable of the given data. The data is basically available in the form of aggregate.

The data aggregate function easily produced the summarized data in the database.

. Consider the problem of finding the largest element in a list of n elements. What will be the basic operation of an algorithm to solve this problem?

assignment

addition

looping

comparesn

Answers

Answer:

Comparison.

Explanation:

When we have to find a largest in a list of n elements.First we have to iterate over the list so we can access all the elements of the list in one go.Then to find the largest element in the list we have to initialize a variable outside the loop with the minimum value possible and in the loop compare each element with this value,if the element is greater than the variable assign the element to the variable.Then the loop will find the largest element and it will be the variable.

Placeholders are used to defend against what kind of hacking attack?

a

SQL Injection

b

Key stroke logging

c

Phishing

d

Denial of Service

Answers

Answer: (A) SQL injection

Explanation:

 Th SQL ( Structured query language) injection is the code injection method or technique that is basically used in data driven attack various applications. The SQL injections are basically used by hackers for attacking on various websites.

The SQL injection are used by the hackers to insert the malicious structured query language statement in the input state for the execution process in the database.  

When we use the SQL injection during that process, the attacker can easily access and modify the database.

In networking, what addressing type is used in sending an email to someone?

A) Broadcast B) Multicast C) Unicast

Answers

Answer: (C) Unicast

Explanation:

 According to the question, if we sending an email to someone individually then, uni-cast addressing type is used. The unit addressing is basically used to represent the single local area network interface.

The unit-cast frame sent only to the specific devices not to the group of the devices. The unitcast basically use between the one source to the one destination.

On the other hand, multicast and broadcast are incorrect because the frame sent to the group of the devices not the specific devices. Therefore, Option (C) is correct.

Answer:

for edge users

a microsoft account

Explanation:

.Consider the following sine wave: s(t) = 4sin(2π3t + π)

a.What is the amplitude?

b.What is the frequency?

c.What is the phase?

Answers

Answer:

a. 4

b. 3

c. pi

Explanation:

Generic formula of a sine wave: s(t) = Amp * sin ( 2*pi*freq*t + phase)

where, Amp => Amplitude

freq => frequency

phase => phase

Given sine wave: s(t) = 4sin(2π3t + π)

Comparing it with the generic form , we can identify that :

a. Amplitude : 4

b. Frequency : 3

c. Phase : pi

Amplitude measures peak displacement from origin, Frequency is the number of cycles per second and phase is the relative positioning of the wave with respect to the origin.

Answer:

1) Amplitude = 4

2) Frequency  =[tex]1Hz[/tex]

3) Initial phase = [tex]\pi [/tex]

Explanation:

The general equation of wave is

[tex]y(t)=Asin(\omega t+\phi )[/tex]

where

A is the amplitude of the wave

[tex]\omega [/tex] is the angular frequency of the wave

[tex]\phi [/tex] is the initial phase of the wave

The given wave function is

[tex]s(t)=4sin(2\pi t+\pi )[/tex]

Comparing with the standard function we get

1) Amplitude = 4

2) Frequency  =[tex]\frac{\omega }{2\pi }=\frac{2\pi }{2\pi }=1Hz[/tex]

3) Initial phase = [tex]\pi [/tex]

Who developed one of the first mathematical models of a multilevel security computer system?

A. Diffie and Hellman

B. Clark and Wilson

C. Bell and LaPadula

D. Gasser and Lipner

Answers

Answer:

C. Bell and LaPadula

Explanation:

The first mathematical models of multilevel security computer system was developed by Bell and Lapadula. Their full names are David Elliot Bell and Leonard J. Lapadula. Their model used to define the concept of modes of access,secure state machine and outlined the rules of access.

Write a program that takes an integer n as a parameter and sums all of the multiples of 2 or 5 from 1 to n. For example, if n = 11, the result would be 2 + 4 + 5 + 6 + 8 + 10 = 35.

Answers

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main() {

// variable

int num;

int tot_sum=0;

cout<<"enter a number: ";

// read the value of n

cin>>num;

// check the multiple of 2 or 5 from 1 to n

for(int x=1;x<=num;x++)

{

// if multiple of 2 or 5 then add them

   if(x%2==0 ||x%5==0)

   {

       tot_sum=tot_sum+x;

   }

}

// print the sum

cout<<"sum of multiple of 2 or 5 is:"<<tot_sum<<endl;

return 0;

}

Explanation:

Read the number "n" from user.Check every number from 1 to n, if it is a multiple of 2 or 5 then add them to "tot_sum".When the for loop end, "tot_sum" will have sum of all the number which are either multiple of 2 or 5.Print the sum.

Output:

enter a number:11

sum of multiple of 2 or 5 is:35

Simplify the following Boolean expressions using algebraic manipulation.

a. F(a,b) = a’b’ + ab + ab'

b. F(r,s,t) = r’ + rt + rs’ + rs’t’

c. F(x,y) = (x + y)’(x’ + y’)’

d. F(a,b,c) = b'+ bc + ab + a'bc'

e. F(a,b,c,d) = ac + b'd + a'bc + b'cd'

Answers

Answer:

Simplification of the expressions:

a) a’b’ + ab + ab' = a +b'

b) r’ + rt + rs’ + rs’t’ = r' + s' + t

c) (x + y)’(x’ + y’)’ = False

d) b'+ bc + ab + a'bc' = True

e) ac + b'd + a'bc + b'cd' = c + b'd

Explanation:

The step by step solution for each expression will use the following laws of Boolean Algebra:

Idempotent Law:

aa=a

a+a=a

Associative Law

:

(ab)c=a(bc)

(a+b)+c=a+(b+c)

Commutative Law

:

ab=ba

a+b=b+a

Distributive Law

:

a(b+c)=ab+ac

a+(bc)=(a+b)(a+c)

Identity Law

:

a*0=0   a*1=a

a+1=1   a+0=a

Complement Law

:

aa'=0

a+a'=1

Involution Law

:

(a')'=a

DeMorgan's Law

:

(ab)'=a'+b'

(a+b)'=a'b'

Absorption  Law:

a+(ab)=a

a(a+b)=a

(ab)+(ab')=a

(a+b)(a+b')=a

a+(a'b)=a+b

a(a'+b)a*b

Step by step Solution:

a) F(a,b)  = a’b’ + ab + ab'

a(b+b')+a'b'  Commutative Law

a+a'b  Complement Law

F(a,b)=a+b' Absorption  Law

b) F(r,s,t) = r’ + rt + rs’ + rs’t’

(r'+rs')+rt+rs't' Absorption  Law

r'+s'+rt+rs't' Distributive Law

r'+s'+rt+s' Absorption  Law

r'+s'+rt Absorption  Law

F(r,s,t) = r'+s'+t Absorption  Law

c) F(x,y) = (x + y)’(x’ + y’)’

(x'y')(x''y'') DeMorgan's Law

(x'y')xy Involution Law

x'(y'x)y  Associative Law

x'(xy')y  Commutative Law

(x'x)(y'y)  Associative Law

(0)(0) Complement Law

F(x,y)=False

d) F(a,b,c) = b'+ bc + ab + a'bc'

b'+c+b(a+a'c')  Absorption  Law

b'+c+b(a+c')  Absorption  Law

b'+c+ba+bc'  Distributive Law

(b'+ba)+(c+bc')  Associative Law

b'+a+c+b  Absorption  Law

1+a+c  Complement Law

F(a,b,c)=True

e) F(a,b,c,d) = ac + b'd + a'bc + b'cd'

ac+a'bc+b'd+b'cd'  Commutative Law

c(a+a'b)+b'(d+cd')   Associative and Distributive Law

c(a+b)+b'(d+c)  Absorption  Law

ac+bc+b'd+b'c  Distributive Law

ac+(bc+b'c)+b'd  Associative and Commutative Law

ac+c(b+b')+b'd  Associative and Distributive Law

ac+c*1+b'd  Complement Law

c(a+1)+b'd  Distributive and Identity Law

F(a,b,c,d)=c+b'd

Answer:

Explanation:

a) De Morgan's law: i) a * b = '(a' + b)

                                 ii) a + b = '('a + 'b)

b) Associativity: (r * s') + (s * t) + ( t' * r)

c) Commutativity: i) x + y = y + x

                             ii) x * y = y * x

d) Distributivity: a * ( b + c) = (a * b) + (a + c)

Write a program that inputs the number of hours you are taking this semester and outputs how much time outside of class you should spend studying. (Hint: every 1 credit hour = 2-3 hours spent outside of class).

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

   int a,b,c;

   //ask to enter semester hours

   cout<<"Enter the number of hours in the semester:";

   // read the semester hours

  cin>>a;

  //print the semester hours

  cout<<"You have taken "<<a<<" hours in semester."<<endl;

  // find the time spend outside of the class

  b=a*2;

  c=a*3;

  // print the time outside class

  cout<<"you should spend "<<b<<"-"<<c<<" hours outside of class"<<endl;

return 0;

}

Explanation:

Read the hours taken in the semester from user and assign it to "a".

Then find its 2 and 3 time.This will be the time user should spend outside

of the class.

Output:

Enter the number of hours in the semester:15

You have taken 15 hours in semester.

you should spend 30-45 hours outside of class  

If you were looking for the answer to this

A student is studying for a social studies test, and he is also writing a paper and reading a novel for his language arts class. Which statement represents a well-written SMART goal that the student has written for himself for one study session?

Spend time studying for social studies and language arts by the end of the semester.

Spend time today on social studies, and spend time tomorrow on language arts.

Spend one hour reviewing chapter six for social studies, one hour writing the paper, and four hours reading the novel.

Spend 30 minutes reviewing section one of chapter six for social studies, one hour writing an outline for language arts, and 30 minutes reading the novel by 9 p.m. today.

The answer is D :)

Because when you look up this question this one pops up so im posting this so people can find the answer.

Other Questions
A ball is thrown straight up from the edge of the roof of a building. A second ball is dropped from the roof a time of 1.03 s later. You may ignore air resistance. A-If the initial speed of the first ball is v0 = 8.90 m/s what must the height h of the building be for both balls to reach the ground at the same time?B-If v0 is greater than some value vmax, a value of h does not exist that allows both balls to hit the ground at the same time. Solve for vmaxC-if v0 is less than some value vmin, a value of h does not exist that allows both balls to hit the ground at the same time. Solve for vmin. In most states, the winner of the popular vote ___________________.Question 18 options:gets most of the electoral votesgets a proportionate number of electoral votesgets none of the electoral votesgets all of the electoral votes This table shows the distance traveled by a car and the cars average speed on different days. A three column table with six rows. The first column, Day, has the entries 3, 4, 5, 6, 7. The second column, Average Speed in miles per hour, has the entries, 55, 58, 63, 65, 68. The third column, Distance in miles, has the entries, 495, 660, 825, 990, 1,155. Given that the days are the independent variable, which dependent variable has a constant rate of change? What is the constant rate of change? To get the most accurate results on the security posture of a system, which of the following actions should the security analyst do prior to scanning?A) Log all users out of the systemB) Patch the scannerC) Reboot the target hostD) Update the plugins The reaction of carboxylic acids with alcohol in the presence of an acid catalyst yields Select one: amides O esters O no reaction occurs O aldehydes If you feed 100 kg of N2 gas and 100 kg of H2 gas into areactor. What is the excess reactant? Whenever Caroline goes more than a day without drinking, she begins to experience severe headaches, irritability, nausea, cramping, and shaking. Caroline is experiencing symptoms of ______. Why did merchants decide to use money instead of bartering?Money was easier to carry and handle than goods.Money was accepted anywhere and could be used again.It was difficult to exchange the exact value of goods in barter.all of the above When Spencer was 5, he was 28 inches tall. Today he is 5 feet 3 inches tall. What is the percent increase in Spencers height?I appreciate any help! Thank you! Describe the "blender experiments" of Hershey and Chase and what they revealed about DNA versus protein. A concert loudspeaker suspended high off the ground emits 31 W of sound power. A small microphone with a 1.0 cm^2 area is 42 m from the speaker. What is the sound intensity at the position of the microphone? (include units)What is the sound intensity level at the position of the microphone? (in dB) rewrite equation to solve for m 4n-6m=-2 The highest temperature recorded in the same city during the past year was 304.89 K. What was the temperature in degrees Celsius? An important benefit of "flat" organizational structures is that ________. a. employees work fewer hours b. decision makers can react more quickly to market changes c. face-to-face meetings are unnecessary d. all operations can remain in the same country A solid cylinder of cortical bone has a length of 500mm, diameter of 2cm and a Youngs Modulus of 17.4GPa. Determine the spring constant k. Please explain. As the owner of a small restaurant, you purchase 5 boxes of napkins for $75.00 every 3 months. Each box contains 525 napkins. To the nearest hundredth, what is the cost for each individual napkin?As the owner of a small restaurant, you purchase 5 boxes of napkins for $75.00 every 3 months. Each box contains 525 napkins. To the nearest hundredth, what is the cost for each individual napkin?A) 0.01 B) 0.02 C) 0.03 D) 0.05 Sarah Grimke's "Letters on the Equality of the Sexes," argues that women are educated from childhood to regard themselves as inferior creatures and thus do not develop self respect.True / False. What are the main types of tests used to examine the learners' comprehension skills? Suppose in a society where there are equal numbers of men and women. There is a 50% chance for each child that a couple gives birth to is a girl and the genders of their children are mutually independent. Suppose in this strange and primitive society every couple prefers a girl and they will continue to have more children until they get a girl and once they have a girl they will stop having more children, what will eventually happen to the gender ratio of population in this society? The manager of an ice-cream parlor decides to introduce a new ice-cream flavor in his Dallas, TX based restaurants to compare the sales of these restaurants to the ones with no new flavors. She decides to run a difference in difference approach. Which of the following is true? (A) The first difference would be the difference in the sales of the Dallas stores before and after the introduction (B) The second difference would be the difference in the sales in other stores before and after the Dallas stores introduced the new flavor (C) The second difference would be the difference between the post introduction sales in the Dallas stores and the control group (D) Only A&B