Suppose a class consists of 3 sophomores, 4 juniors, and 2 seniors (no freshmen). We want one person from each of the class years to do a presentation. How many different sets of presenters are there?

Answers

Answer 1

Answer:

There are 24 different sets of presenters.

Explanation:

We have:

3 sophmores

4 juniors

2 seniors

The presentation has the following format:

So - J - Sr

Since there are 3 sophmores, 4 juniors and 2 seniors, we have that:

For each sophmore, 4 juniors can present.

For each junior, 2 seniors can present

There are 3 sophmores

So there are

[tex]3*4*2 = 24[/tex]

There are 24 different sets of presenters.


Related Questions

Useful open source applications include the popular Web browser Mozilla Firefox, the e-mail application Thunderbird, the relational database management server MySQL, and the powerful programming language ____.

C++

PERL

XML

RPG

Answers

Answer:

C++

Explanation:

C ++ is an object-oriented programming language that takes the basis of the C language.

C ++ is a programming language designed in the mid-80s by Bjarne Stroustrup. The intention of its creation was to extend to the successful programming language C with mechanisms that allowed the manipulation of objects. In that sense, from the point of view of object-oriented languages, C ++ is a hybrid language. Subsequently, generic programming facilities were added, which added to the other two paradigms that were already admitted (structured programming and object-oriented programming). This is why it is often said that C ++ is a multiparadigma programming language.

At present, C ++ is a versatile, powerful and general language. His success among professional programmers has led him to occupy the first position as an application development tool. The C ++ maintains the advantages of the C in terms of operator wealth and expressions, flexibility, conciseness and efficiency. In addition, it has eliminated some of the difficulties and limitations of the original C.

Answer:

PERL

Explanation:

PERL (Practical Extraction and Report Language) :This is an Open Source software, that is licensed under its Artistic License, or the GNU General Public License (GPL).

Perl is a popular programming language that carries out a lot of functions and applicable in many applications, it was initially developed for just manipulation of text but is currently being used for a whole lot more, it used for a multiple tasks like web development and network programming.

. You have implemented file permissions on a file so that unauthorized persons cannot modify the file. Which of the following security goals has been fulfilled? A. Accountability B. Privacy C. Integrity D. Accountability

Answers

Answer: C)Integrity

Explanation: Integrity is the function that maintains the completeness and originality of information.It assures that the data is not manipulated or modified through any unauthorized access.This helps in keeping the system and data accurate.

Other options are incorrect because accountability is referred as the liability and privacy is only selected user can access the data but they can modify it.Thus, the correct option is option(c) .

Why is String final in Java?

Answers

Answer:

string objects are cached in string pool.

Explanation:

Strings in Java are immutable or final because the string objects are cached in String Pool.As we know multiple clients share the string literals so there exists a risk of one client's action affecting all other clients.

For ex:-The value of string is "Roast" and client changed it to "ROAST" so all other clients will see ROAST instead of Roast.

What is ‘Black-Box’ testing?

Answers

Answer:

 Black-box testing is the technique which is basically use to reduce the number of the possible cases of the test and also maintain the test coverage. This type of testing is used in the functional and the non functional requirement of the system.

It is type of testing that majorly focus on the functional requirement. There are many types of black box testing that are:

BVA (Boundary value analysis)Error guessingDecision table testing

What are the most important features to consider before purchasing a PC?

Answers

Answer: There are several features that should be considered before buying personal computer(PC).Some of the main factors are:-

Capacity of hard-drive is important to determine the storage space of the system so that it can hold data like files, videos , images etc as per the requirement.RAM(Random access memory) and processor of the personal computer is important for the fast processing and execution of the tasks and functionsSize of the personal computer should also be considered as main feature because compact size make it portable otherwise large sized PC are bulky.Brand is also a important feature because some PC and some other gadgets have already established popularity and reliability.Price point is also a must because there are all types of computer available in the market from low to high cost.But the PC should be according to the budget of individual .

Write a program that will ask the user to enter personal information and then will display it back to the user.

First, the program will ask the user to enter name. Then it will ask the user to enter address. Then it will ask the user to enter phone number. Then it will ask the user to enter email. At the end, it will display the user

Answers

Final answer:

A simple Python program prompts the user to enter personal information such as name, address, phone number, and email, then displays it back. It's essential to handle personal data responsibly and to check privacy policies in real applications.

Explanation:

The question is asking for a simple program that collects and displays personal information. Here is an example of how such a program can be written in Python:

# Ask for personal information
name = input('Please enter your name: ')
address = input('Please enter your address: ')
phone_number = input('Please enter your phone number: ')
email = input('Please enter your email: ')

# Display the information back to the user
print('\nHere is the information you entered:')
print('Name:', name)
print('Address:', address)
print('Phone Number:', phone_number)
print('Email:', email)

This program will prompt the user to enter their name, address, phone number, and email. It will then display this information back to the user. Remember to handle personal information responsibly and refer to privacy policies when handling such data in real applications.

Another ball dropped from a tower A ball is again dropped from a tower of height h with initial velocity zero. Write a program that asks the user to enter the height in meters of the tower and then calculates and prints the time the ball takes until it hits the ground, ignoring air resistance. Use your program to calculate the time for a ball dropped from a 100 m high tower

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

   // variable

   double height;

   // gravitational acceleration

   double g=9.8;

   cout<<"Please enter initial height:";

   cin>>height;

   // h=ut+(gt^2)/2

   // here u, initial velocity is 0

   // after simplification

   double t=sqrt(2*height/g);

   // print the time

   cout<<"time taken by ball to hit the ground is:"<<t<<" seconds"<<endl;

   

return 0;

}

Explanation:

Read the initial height from user. Declare and initialize the earth gravitational acceleration "g=9.8" .Then the equation is h=ut+(gt^2)/2, here u is initial velocity which is 0.Then after simplify the equation t=sqrt(2*h/g). Put the values in the  equation and find the time taken by ball to hit the ground.

Output:

Please enter initial height:100

time taken by ball to hit the ground is:4.51754 seconds

Final answer:

A Python program calculates the time a ball takes to reach the ground when dropped from a given height, illustrating basic principles of free fall in physics. For a 100 m tower, the time is approximately 4.51 seconds.

Explanation:

A student has asked to write a program that computes the time it takes for a ball to hit the ground when dropped from a tower of height h meters, assuming no air resistance. The formula to calculate the time t is derived from physics: t = √(2h/g), where g is the acceleration due to gravity, approximately 9.81 m/s². Using this formula, we candevelop a program in Python to ask the user for the height h and then compute and print the time t. To demonstrate, if the program is used with a tower height of 100 meters, the calculated time for the ball to reach the ground would be approximately 4.51 seconds.

Example Python Program

import math

def drop_time_from_height(height):
   g = 9.81  # Gravity in m/s²
   time = math.sqrt(2 * height / g)
   return time

height = float(input("Enter the height of the tower in meters: "))
time = drop_time_from_height(height)
print("The ball takes", round(time, 2), "seconds to hit the ground.")

This program illustrates a straightforward approach to solving problems related to free fall and physics calculations, enhancing the understanding of concepts such as gravity and acceleration.

Convert hexadecimal number 1AF2 to a decimal number.

Answers

Answer:

6898

Explanation:

Given that 1AF2 is a hexadecimal number.

We have in hexadecimal, the digits are 0,1,2,3...9, A,B,C,D,E,F for the 16 digits used.

Using the above we say in the given number, we have

2 in units column

F in 16 column

A in 16 square column

and 1 in 16 cube column

Place value[tex]= 2(1) +15(16)+10(16^2)+1(16^3)\\= 2+240+2560+4096\\=6898[/tex]

Hence 1AF2 = 6898 in decimal

By default, client DHCPv6 messages are sent using _____ scope. (Points : 3) the anycast address
router's prefix
the link-local
FF02::0A
None of the above

Answers

Answer: Router's prefix

Explanation: DHCPv6 (Dynamic host configuration protocol version 6) is the protocol used for an IPv6(Internet protocol version 6) network's host,prefixes,address and other such configurations.The prefix is used for sending the messages of DHCPv6 in the default situation.

In default situation the prefix acts as the cluster of the IP address and thus sends the the message to the destination using the address. Other options are incorrect because anycast address, local link and  FF02::0A does not transmit the message in the default situation.Thus the correct option is router's prefix.

What would be the results of executing the following code? StringBuilder str = new StringBuilder("Little Jack Horner "); str.append("sat on the "); str.append("corner"); A. The program would crash. B. str would reference "Little Jack Horner ". C. str would reference "Little Jac Horner sat on the ". D. str would reference "Little Jack Horner sat on the corner".

Answers

Answer:

Correct answer is option(D) that is, str would reference "Little Jack Horner

sat on the corner".

Explanation:

StringBuilder are the objects which can be modified like strings object.It will first create a string builder and initialize with "Little Jack Horner".Then it will append string "sat on the " to initial string. In the last it will append string "corner" to the initial string.So in this way, str will have a string "Little Jack Horner sat on the corner ".

Write a program to calculate the number of seconds since midnight. For example, suppose the time is 1:02:05 AM. Since there are 3600 seconds per hour and 60 seconds per minutes, it has been 3725 seconds since midnight (3600 * 1 + 2 * 60 + 5 = 3725). The program asks the user to enter 4 pieces of information: hour, minute, second, and AM/PM. The program will calculate and display the number of seconds since midnight. [Hint: be very careful when the hour is 12].

Answers

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

int main()

{

   // variables

   int hour,min,sec,tot_sec;

   string str,s="AM";

   cout<<"enter number of hours:";

   // read hour

   cin>>hour;

   cout<<"enter number of minutes:";

   // read minute

   cin>>min;

   cout<<"enter number of seconds:";

   // read seconds

   cin>>sec;

   cout<<"Enter AM or PM:";

   // read AM or PM

   cin>>str;

   if((str.compare(s) == 0 )&& hour==12)

   {

       hour=0;

   }

   // calculate total seconds

   tot_sec=hour*3600+min*60+sec;

   // print the output

   cout<<"total seconds since midnight is : "<<tot_sec<<endl;

   

return 0;

}

Explanation:

Read the value of hour, minute, second and string "AM" or "PM" from user.

Then if string is equal to "AM" then make hour=0.Then multiply hour with

3600, minute with 60 and add them with second.It will give the total seconds

from midnight.

Output:

enter number of hours:12                                                                                                                                                

enter number of minutes:46                                                                                                                                              

enter number of seconds:23                                                                                                                                              

Enter AM or PM:AM                                                                                                                                            

total seconds since midnight is: 2783

Final answer:

The program provided takes user input for hour, minute, second, and period (AM/PM) and calculates the total number of seconds since midnight. Special attention is given to the hour input to correctly adjust for 12-hour time format nuances, ensuring accurate conversion and calculation.

Explanation:

Calculating the number of seconds since midnight involves several steps of time conversion and careful consideration of whether the time is AM or PM, especially in the instance of 12 o'clock. Below is a simple program in Python which prompts the user for the required information and calculates the number of seconds since midnight:

Python Program:
def calculate_seconds(hour, minute, second, period):
   if hour == 12:
       hour = 0
   if period.lower() == 'pm':
       hour += 12
   total_seconds = (hour * 3600) + (minute * 60) + second
   return total_seconds
# User input
hour = int(input('Enter the hour: '))
minute = int(input('Enter the minutes: '))
second = int(input('Enter the seconds: '))
period = input('Enter AM or PM: ')
# Calculation
total_seconds_since_midnight = calculate_seconds(hour, minute, second, period)
print(f'It has been {total_seconds_since_midnight} seconds since midnight.')
This program will correctly convert the given time to the total seconds since midnight using the entered hour, minute, and second values, along with the period of the day.

. The if statement regards an expression with a nonzero value as __________.

Answers

Answer: True

Explanation:

The given if statement respects to the expression with the worth 0 as 'False' and if the statement with the given expression that include a non-zero value is defined as True.

In an if/else proclamation, if the statement is executed then the expression is state as True and then the else part of the given statement is executed as "False".

When the given if statement is evaluated as true, then the inside code of the given block are set as -1 value.

Which of the following is NOT a good idea to do after you change the root password?
(a) Restart the MySQL Service.
(b) Write down the new password in a safe place.
(c) Keep the change password file on the server in case you need to change the password again.

Answers

Answer:

C) Keep the change password file on the server in case you need to change the password again

A functional policy declares an organization's management direction for security in such specific functional areas as email, remote access, and Internet surfing.

True

False

Answers

Answer: True

Explanation:

Functional policies are referred to as a system or units of standardized procedures, processes and guidelines for employees which tends to state how exactly an employee has to provide services and commodities. The stages to go undergo this are usually formalized in organizations guide which usually will describe the respective processes.  It also lies as the ground of franchising and thus tend to guarantee both the adherence to the process and the accomplishment of standards set .

Which of the following statements is/are true? (Points : 5) A. A default constructor is automatically created for you if you do not define one.
B. A static method of a class can access non-static members of the class directly.
C. An important consideration when designing a class is identifying the audience, or users, of the class.
None of the above
Only A and C

Answers

Answer: Only A and C

Explanation: Default constructor is a constructor that has parameters with the values that are default or has no arguments/parameter present. Default constructor is not declared in the class rather it gets generated by itself when not defined.

Class is defined with data members, functions, objects etc are considered as per the requirement given by the user .It is the user defined concept.

Statement (B) is incorrect because static method is used for accessing the static members of the particular class and manipulate the value of it.

Thus, only statement (A) and (C) are correct.

In your opinion, what are the Pros and Cons of employers using Video Surveillance?

Answers

Answer: Video surveillance is the digital system used in the organization for the capturing of the video and storing it for monitoring .It is used for the security purpose of the business. The pros and cons of this system is mentioned as follows:-

Pros:

Providing security in business field Decrements in the crime rateProvides 24x7 monitoring and surveillanceServing real -time information

Cons:

Costly investmentNeeds more devices for installation in large organizationsCreated privacy concernsOverloading of data storage in the form video can happen

Final answer:

Pros of employers using video surveillance include increased security and monitoring productivity. Cons include invasion of privacy and the potential for misuse by employers.

Explanation:

Pros:

Increased security: Video surveillance can help deter theft, vandalism, and other crimes in the workplace.Monitoring productivity: Employers can use video surveillance to ensure employees are working efficiently and following company guidelines.Evidence in legal matters: Video footage can serve as evidence in workplace disputes, accidents, or criminal activities.

Cons:

Invasion of privacy: Video surveillance can infringe on employees' privacy rights and create a sense of constant monitoring.Potential for misuse: Employers may abuse video surveillance by using it for purposes other than security and surveillance.Employee morale: Constant video surveillance may create a negative work environment and lower employee morale.

Write a C program that prints the numbers from 1 to 100, but substitutes the word "fizz" if the number is evenly divisble by 3, and "buzz" if the number is divisible by 5, and if divisible by both prints "fizz buzz" like this: 13 1 14 2 fizz 4 buzz fizz 7 fizz buzz 16 17 fizz 8 fizz buzz 19 buzz ... 11 fizz and so on

Answers

Answer:

// here is code in C.

#include <stdio.h>

int main(void) {

int num;

 // loop run 100 times

for(num=1;num<=100;num++)

{

 //check divisibility by 3 and 5

    if(num%15==0)

    {

    printf("fizz buzz ");

    }

     // check divisibility by 5 only

    else if(num%5==0)

    {

        printf("buzz ");

    }

     // check divisibility by 3 only

    else if(num%3==0)

    {

        printf("fizz ");

    }

    else{

        printf("%d ",num);

    }

}

return 0;

}

Explanation:

Run a for loop from 1 to 100. Check the divisibility of number by 15, if it is divisible print "fizz buzz", if it is not then Check the divisibility by 5 only.if it returns true then print "buzz". if not then check for 3 only,if returns true, print "fizz". else print the number only.

Output:

1 2 fizz 4 buzz fizz ........buzz fizz 97 98 fizz buzz

What is character referencing and why is it used?

Answers

Answer: Character reference is the tool usually followed in the business world.It is defined as the recommendation that is provided by organization employee that has a relation with the candidate(individual) outside of the work. This also known as the personal reference. The candidate can be friend family or any other known person whose reference is being given.

This is used in the business field for revealing about the personality and character of the candidate apart from the skills and working abilities. It also helps in the hiring of the candidate easily when the description is good in the character reference.

What is a foreign key and how does it provide referential integrity?

Answers

Answer:

By definition a foreign key of table A is a primary key of another table B, thereby establishing a link between them.

To provide referential integrity you can use these referential actions:

Cascade: If rows in table B are deleted, the matching foreign key columns in table A are deleted. Set Null: If rows in table B are deleted, the matching foreign key columns in table A are set to null. Set Default: If rows in table B are deleted, the matching foreign key columns in table A are set with the default value of the column. Restrict: A value in table B cannot be deleted or updated while as it is referred to by a foreign key in table A.

Explain what happens if you try to open a file for reading that does not exist.

Answers

Answer:

Exception is thrown and the file is created with 0 length.

Explanation:

While opening a file there is an error occur which shows the file does not exist that means an  exception is thrown.

And this error can be occur when the size of the file is very very low means the file is a size of 0 length. So to avoid this error we have to exceed its length from the zero length.

how to import any csv from internet in phyton 3 and R ?

Answers

Answer:

Jgthj

Explanation:

T to it t urd864rb. I5f. 8rfb 75gj

List at least three benefits of automated testing?

Answers

Answer:

Always available to run: You can run the tests 24/7, when you are at work, when you leave the office or if you working remote, you can run the test. They can be run virtually unattended, leaving the results to be monitored towards the end of the process.

Fewer human resources: You can reduce the people advocated on testing, you would need a QA automation to write your scripts to automate your tests, instead of people doing manual tests. In addition, once automated, the test library execution is faster and runs longer than manual testing.

Reusability and reliability: The scripts are reusable, a script could be used hundreds of times before need changes. It allows you to test exactly the same, without forgetting any steps this is why is more reliable and way quicker than manual test where people may cause.  

When we want to remove an element from an array, and have the removed element available for our usage, this is called.

pulling

discarding

appending

popping

Answers

Answer:

Popping.

Explanation:

When remove an element from an array and the element is available for our usage is called popping.pop() is a function in function in javascript arrays.The pop() function in javascript removes the last element from the array and return the value of the popped element so it is available for usage.

Hence the answer is popping.

Convert (123)5 to hexadecimal.

Answers

Answer:

[tex]26_{16}[/tex]

Explanation:

We can obtain the hexadecimal value using an indirected way, first we will convert it to decimal:

[tex](1*5^2+2*5^1+3*5^0)=38_{10}[/tex]

having the decimal number we have to divide that number multiple times by 16 and get a record of the quotient and reminder, until the quotient is equal to zero.

[tex]38| 16[/tex]

[tex]quotient_1=2\\remainder_1=6[/tex]

[tex]2| 16[/tex]

[tex]quotient_2=0\\remainder_2=2[/tex]

Now we will take the remainders and get the hexadecimal value and put them together. (remember, the hexadecimal number are defined from 0 to F, being A=10, B=11, C=12, D=13, E=14, F=15)

[tex]remainder_1=6\\hex_1=6[/tex]

[tex]remainder_2=2\\hex_2=2[/tex]

The hexadecimal number is 26

The "A" in the CIA triad stands for "authenticity". True False

Answers

Answer: False, the "A" in the CIA triad stands for availability.

The CIA triad also know as the Confidentiality, integrity and availability triad, is known as a model which is designed in order to implement and enforce policies in regards to information security. This model is also referred as the availability, integrity and confidentiality model i.e AIC triad. This is done in order to avoid confusion with Central Intelligence Agency i.e. CIA.

A(n) _____ of an class is where the services or behaviors of the class is defined. (Points : 6) operation
attribute
class
object
abstract class

Answers

Answer:

Operation the correct answer for the given question.

Explanation:

An operation is a template that is used as a template parameter .An operation defined the services and behaviors of the class .The operation is directly invoked on instance .

Attribute define the property of an entity it is not defined the services and behaviors of the class. so this option is incorrect.

Class is the class of variable of method it is not defined the services and behaviors of the class  so this option is incorrect.

Object are the rub time entity .object are used access the property of a class it is not defined the services and behaviors of the class  so this option is incorrect.

Abstract class is the class which have not full implementation of all the method .it is not defined the services and behaviors of the class  so this option is incorrect.

So the correct answer is operation.

The answer to the question is the 'operation' of a class, where the behaviors or services are defined. Operations, also known as methods, are what allow objects of a class to perform actions and interact with other parts of a program. They are distinguished from attributes, which define a class's properties.

A operation of a class is where the services or behaviors of the class are defined. In object-oriented programming, a class is a blueprint for creating objects (a particular data structure), providing initial values for state (member variables or attributes), and implementations of behavior (member functions or methods, in other words, operations). The operations are essential to the functionality of a class as they enable the objects of that class to perform tasks and respond to messages.

Operations, which can also be referred to as methods or functions, define what actions can be performed on the data within an object. While attributes determine the properties and characteristics of a class instance, it is the operations that define how an instance of a class can interact with other parts of the program.

Consider a simple example of a class 'Car'. The attributes of the 'Car' class might include 'color', 'brand', and 'horsepower', but the operations might include 'startEngine()', 'stopEngine()', and 'accelerate()'. These operations are the behaviors that the 'Car' objects can exhibit.

The first step in building a sequence diagram is to _____. (Points : 6) analyze the use case
identify which objects will participate
set the lifeline for each object
add the focus of control to each object's lifeline

Answers

Answer: Set the lifeline of each object

Explanation:

 The sequence diagram is the efficient way that use in the system requirement document for the system design.

The sequence diagram is useful in many system that shows the interaction of the logic between the each object in the system.

The first step for building the sequence diagram is that set the lifeline of the each object in the system and it allow the main specification in the run time scenarios in the graphical manner. Therefore, it enhance the performance of the system.

Write Java code to implement the Euclidean algorithm for finding the greatest common factor of two positive integers.Must use recursion!

Answers

Answer:

/* here is code in java to find greatest common

divisor with Euclidean algorithm */

import java.util.*;

// class definition

class Main

{

   // recursive method to find gcd

public static  int Euclidean(int nm1, int nm2)

   {

   // base case

if (nm1 == 0)

 return nm2;

   // recursive call

return Euclidean(nm2 % nm1, nm1);

   }

   // driver method

public static void main (String[] args) throws java.lang.Exception

{

   try{

       // scanner object to read input

    Scanner scr=new Scanner(System.in);

    System.out.print("enter first number:");

   //  read first number

       int n1=scr.nextInt();

       System.out.print("enter second number:");

       //read second number

       int n2=scr.nextInt();

       // call the method and print the gcd

       System.out.println("greatest common factor of both number is: "+Euclidean(n1,n2));

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read two number from user with scanner object and assign them to variables "n1" & "n2". Call the method Euclidean() with parameter "nm1"& "nm2".According to Euclidean algorithm, if we subtract smaller number from the larger one the gcd will not change.Keep subtracting the smaller one then we find the gcd of both the numbers.So the function Euclidean() will return the gcd of both the numbers.

Output:

enter first number:12

enter second number:39

greatest common factor of both number is: 3

Your employer's right to electronically monitor you is an issue of ____.

consumer privacy

employee privacy

freedom of speech

online annoyances

Answers

Answer: Employee privacy

Explanation:

 Employers can electronically monitor property, computer and electronic devices under the their rights in the organization but there is issue of employee privacy. As, employee has the right to privacy in the organization or workplace.

In some organization phones and email address are provided by the company so that they can electronically monitor the employee properly. In this case, some employee feel that monitoring is the violation of their personal  and privacy rights.

Write a program that asks the user to enter five different, integer numbers. The program then reports the largest number and the smallest number.

Use the if statement, but no loops.

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

  int minn=INT_MAX;

   int maxx=INT_MIN;

   int n1,n2,n3,n4,n5;

   cout<<"enter five Numbers:";

   //read 5 Numbers

   cin>>n1>>n2>>n3>>n4>>n5;

   // find maximum

   if(n1>maxx)

    maxx=n1;

    if(n2>maxx)

    maxx=n2;

    if(n3>maxx)

    maxx=n3;

    if(n4>maxx)

    maxx=n4;

    if(n5>maxx)

    maxx=n5;

   // find minimum

   if(n1<minn)

    minn=n1;

    if(n2<minn)

    minn=n2;

    if(n3<minn)

    minn=n3;

    if(n4<minn)

    minn=n4;

    if(n5<minn)

    minn=n5;

   // print maximum and minimum

   cout<<"maximum of five numbers is: "<<maxx<<endl;

   cout<<"minimum of five numbers is: "<<minn<<endl;

return 0;

}

Explanation:

Declare two variables "minn" & "maxx" and initialize them with INT_MAX and INT_MIN respectively.Then read the five number from user and compare it with "minn" & "maxx" ,if input is greater than "maxx" then update "maxx" or if input is less than "minn" then update the "minn". After all the inputs, "minn" will have smallest and "maxx" will have largest value.

enter five Numbers:5 78 43 55 12

maximum of five numbers is: 78

minimum of five numbers is: 5

Other Questions
DRIVER EDIn order to assure safe operation of a vehicle, a good pre-trip inspection should include?A.an exterior walk around the vehicle.B.an interior check of all mirror adjustments.C.a check of the ground under the motor for fluids.D.all the above Cuales son las causas de la anorexia Please help me 80 points for who answers :) What treatment option is shared for high blood pressure, arteriosclerosis, atherosclerosis, and coronary heart disease? A hawk flying at 38 m/s emits a cry whose frequency is 440 Hz. A wren is moving in the same direction as the hawk at 17 m/s. (Assume the speed of sound is 343 m/s.) (a) What frequency does the wren hear (in Hz) as the hawk approaches the wren? Hz (b) What frequency does the wren hear (in Hz) after the hawk passes the wren? A race car driver on the Flats first heads north for 6.71 km, then makes a sharp turn and heads southwest for 1.33 km, then makes another turn and heads east for 3.67 km. How far is she from where she started? What is an equation of a line perpendicular to 5x+8y=16 and passed through (-5,7) Which of these structures is not a part of the glottis? a. True vocal cords b. Rima glottidisc. False vocal cordsd. Both B and C 1. Which of the following is true regarding the graph of y = 1/x ?a. The domain is all real numbers.b. There are horizontal and vertical asymptotes.C. The graph intersects the x-axis in two places.d. The range is 0 < y Which two elements have properties that are the most similar? A C and FB He and NeC Al and Si D N and S Which devices can be used to input an image in print form Mike works two part time jobs while going to college. He works 8 and half hours a week at the ice-cream store for $10.55 per hour and 7 hours a week at the movie theater for 13.85 per hour. Work each of the following problems in decimal form.1. How much does Mike earn a week before taxes are taken out of his paycheck?2. If 22 percent of Mikes paycheck is withheld for taxes, how much money is left for Mike?3. At which Job does Mike earn the most before taxes, how much more?4. If Mike spends $50 a week on entertainment, what percent of Mikes paycheck is left after he pays taxes? In decimal form. The story's exposition:A. is the moment when the audience learns what happens to thecharacters.B. introduces readers to the main characters, setting, and conflict.c. is the main struggle or problem that causes the events in the storyto progressD. drives the plot toward the climax. What is character referencing and why is it used? Use the quote to answer the question.The Americans have tarred and feathered your subjects, plundered your merchants, burnt your ships, denied all obedience to your laws and authority; yet so clement and so long forbearing has our conduct been that it is incumbent on us now to take a different course. Whatever may be the consequences, we must risk something; if we do not, all is over. Lord NorthThis quote most clearly supports an argument in favor of what?A.British officials and the Coercive ActsB.Native Americans and the Proclamation LineC.Parliament and the Declaratory ActD.Sons of Liberty and the Boston Tea PartyWhy was Thomas Paines Common Sense considered radical?A.Its arguments about taxation were new and groundbreaking.B.Its rejection of the monarchy was controversial for the time.C.Its ideas about religion were controversial for the era.D.Its opposition to republicanism was opposed by patriots.Use the passage to answer the question.Governments are instituted among Men, deriving their just Powers from the Consent of the Governed, that whenever any Form of Government becomes destructive of these Ends, it is the Right of the People to alter or abolish it.What theory is reflected in this portion of the Declaration of Independence?A.anti-federalismB.social contractC.bicameralismD.natural rightsUse the passage to answer the question."Our States have now a solid Support for their Liberty and Independence in their Alliance with France, which will be certainly followed by that of Spain and the whole house of Bourbon, and probably by Holland and the other Powers of Europe who are interested in the Freedom of Commerce and in keeping down the Power of Britain. Our People are happy in the Enjoyment of their new Constitutions of Government [and] Will be so in their extended Trade and Navigation, unfettered by English Acts and Customhouse Officers." excerpt from a letter by Benjamin Franklin, written in 1778How does Franklin anticipate the alliance with France will help the United States?A.Frances participation will persuade Britain to surrender.B.Britains forces will be bogged down fighting a war in Europe.C.Britain will need to fight on too many fronts in North America.D.Spain and other nations will decide to help the United States too. My First Day on the JobThe complicating incident is when the narrators editor has a family emergency.Which event is a result of the complicating incident?A The narrator decides that journalism is the right career for her.B The narrator learns a great deal about journalism over the next few months.C The narrator needs to do all her reporting, as well as write her story, in one day.D The narrator must complete her first news story without much guidance. What Is The Most Important Thing That Guys Should Understand About The Girl, And It Seems To You That They Do Not Understand Which of the following is not a part of adaptive immunity? a. Inflammation and fever. b. Antibodies. c. Cell-mediated immunity. d. B lymphocytes. e. Humoral immunity Air enters the compressor of an ideal cold air-standard Brayton cycle at 100 kPa, 300 K, with a mass flow rate of 6 kg/s. The compressor pressure ratio is 7, and the turbine inlet temperature is 1200 K. For constant specific heats with k = 1.4 and Cp = 1.005 kJ/kg, calculate the percent thermal efficiency (enter a number only) Air enters an insulated turbine operating at steady state at 8 bar, 500K, and 150 m/s. At the exit the conditions are 1 bar, 320 K, and 10 m/s. There is no in elevation. Determine the work developed and the exergy destruction, each in kJ/kg of air flowing. Let To=300K and po=1bar significant change