Which of the following is supported by a primary key?

Changeable over time
May be null
Unique
Updateable

Answers

Answer 1

Answer:

Unique.

Explanation:

Unique is supported by a primary key because of primary key we can uniquely identify the tuple so the attribute which has been set as primary key must contain values that are unique and these values cannot be null.These values should not be changeable over time and updateable because there is a chance if these values are manipulated a copy of it may be present in that attribute.So the primary key won't be able to uniquely identify the tuple.


Related Questions

Continuous data

are measured in integer values.
cannot be subdivided into meaningful information.
could be subdivided into smaller and smaller units.
describe classifications or categories.

Answers

Answer: Could be subdivided into smaller and smaller units.

Explanation:

 The continuous data are basically measured in the small units and can be easily subdivided into smaller parts without changing their actual meaning.

The continuous data also contain numeric value and can be divided into smaller and finer meaningful parts.

The continuous data can be measured according to the precision of the system. The size and volume are the example of the continuous data.

g Design a Boolean function called isPrime, that accepts an integer as an argument and returns True if the argument is a prime number, or False otherwise. Use the function in a program that prompts the user to enter a number and then displays a message indicating whether the number is prime. The following modules should be written

Answers

Answer:

#include <bits/stdc++.h>

using namespace std;

bool isPrime(int n)

{

   for(int j=2;j<=n-1;j++)  //loop to check prime..

   {

       if(n%j==0)

       return false;

   }

   return true;

}

int main(){

   int n;

   cout<<"Enter the integer"<<endl;//taking input..

   cin>>n;

   if(isPrime(n))//printing the message.

   {

       cout<<"The number you have entered is prime"<<endl;

   }

   else

   {

       cout<<"The number is not prime"<<endl;

   }

return 0;

}

Output:-

Enter the integer

13

The number you have entered is prime

Explanation:

The above written program is in C++.I have created a function called isPrime with an argument n.I have used a for loop to check if the number is prime or not.In the main function I have called the function isPrime for checking the number is prime or not.

Final answer:

A Boolean function called isPrime checks whether an integer is a prime number and is implemented in a Python program that prompts the user for a number and displays a corresponding message. The function returns True for prime numbers and False otherwise.

Explanation:Boolean Function to Determine if a Number is Prime

To design a Boolean function called isPrime, which checks whether a given integer is a prime number, you need to ensure that the function meets certain criteria. A prime number is an integer greater than 1 that has no positive divisors other than 1 and itself. The isPrime function should return True if the number is prime and False otherwise. Here is a simple implementation in Python:

 def isPrime(number):
     if number <= 1:
         return False
     for i in range(2, int(number**0.5) + 1):
         if number % i == 0:
             return False
     return True

To incorporate this function into a program that prompts the user for a number and displays whether it is prime, you could use:

 number = int(input('Enter a number: '))
 if isPrime(number):
     print(f'{number} is a prime number.')
 else:
     print(f'{number} is not a prime number.')

Note that the above program uses a simple loop to check all possible divisors up until the square root of the number, since a larger divisor would necessarily mean a smaller dividend that would have already been checked.

Which is not one of the characteristics or objectives of data mining?
a. The miner is often an end user.
b. Business sections that most extensively use data mining are manufacturing.
c. Data mining tools are readily combined with spreadsheets.
d. Sophisticated tools help to remove the information buried in corporate files.

Answers

Answer:b) Business sections that most extensively use data mining are manufacturing.

Explanation: Data mining is the digging and extraction of the data from the large data sets or databases.The data is analyzed according to various parameters and categories and then extracting process works. It helps in the businesses for making decision ,efficient working, discovery of data etc.

Data mining is usually done by the clients. It extracts the unnecessary information also to remove it and can be combined with spreadsheets.The only incorrect option is option(B) because data mining is mostly used by end users or data mining experts in the business field.

Write a program that takes the length and width of a rectangular yard and the length and width of a rectangular house situated in the yard. Your program should compute the time required to cut the grass at the rate of two square feet a second.

Answers

Answer:

// here is code in c++.

#include <bits/stdc++.h>

using namespace std;

// main function

int main()

{

// variables

int y_len,y_wid;

int h_len,h_wid;

// read the length and width of yard

cout<<"Enter the legth of yard:";

cin>>y_len;

cout<<"Enter the width of yard:";

cin>>y_wid;

// read the length and width of house

cout<<"Enter the legth of house:";

cin>>h_len;

cout<<"Enter the width of house:";

cin>>h_wid;

// calculate grass area

int g_area=(y_len*y_wid)-(h_len*h_wid);

// find the time

int t=g_area/2;

// print the time

cout<<"time required to cut the grass is: "<<t<<" seconds."<<endl;

return 0;

}

Explanation:

Read the length and width of the yard. Then read the length and width of house from user.Calculate the area of grass by subtracting the area of house from area of yard.Then divide the area of grass by rate of 2 square feet per second.

Output:

Enter the legth of yard:25

Enter the width of yard:20

Enter the legth of house:15

Enter the width of house:12

time required to cut the grass is: 160 seconds.

Final answer:

To calculate the mowing time, subtract the house's area from the yard's, then divide by the cutting rate of 2 square feet per second. The code provided demonstrates a simple Python function to perform these calculations.

Explanation:

The question requires writing a program to calculate the time needed to cut grass that is left after a house is subtracted from a rectangular yard. The cut rate is two square feet per second. To solve this, you first calculate the total area of the yard and the house, then subtract the house's area from the yard's area to get the grassy area that needs cutting. Finally, you divide this area by the cut-rate to obtain the time required.

Here is a basic program outline in Python:

def calculate_mowing_time(yard_length, yard_width, house_length, house_width):

   yard_area = yard_length * yard_width

   house_area = house_length * house_width

   grass_area = yard_area - house_area

   mowing_time_seconds = grass_area / 2

   return mowing_time_seconds

Call this function with the specific dimensions to get the time required.

. Assign the value 7.5 to diameter. h. Assign 3.14159265359 to PI. i. Create a single line comment that says ""Calculating circumference and area of the circle"".

Answers

Answer:

float diameter =7.5;

float PI=3.14159265359 ;

// Calculating circumference and area of the circle

Explanation:

Here we declared two variable diameter and PI of float type  and assigning  the value 7.5,3.14159265359 respectively after that we making a single line comment by using //(forward) slash.

#include<iostream> //header file

using namespace std; // namespace

int main() // main method

{

float diameter =7.5; // Assign the value 7.5 to diameter

float PI=3.14159265359 ;//Assign 3.14159265359 to PI

// Calculating circumference and area of the circle.

return(0);

}

A statement that highlights an organization's key ethical issues and identifies the overarching values and principles that are important to the organization and its decisions making is defined as

Business ethics
Common good practice
Code of ethics
Common good approach

Answers

Answer: Code of ethics

Explanation: Code of ethics in professional field or organizational field is referred as the principles that are responsible for the correct conduct of business organization by governing its functioning and decisions.It is a major key of business field as it maintains right practices,handles issues, provides guidance etc.

Other options are incorrect because business ethics cannot be implemented as principle for the governing the organization working and employees. Common good practice and approach is the basic good conduct and approaching but these factors don't govern the business.

For all the following assignments, you must define one or more functions in C (1) Write a program which asks the user for the value of N, the program will print out the sum of Sum = 1 + 2 + + N Try your program with N = 100 and 1000, 000

Answers

Answer:

// here is code in C.

#include <stdio.h>

// main function

int main(void) {

 // variable

 long long int n;

printf("Enter the value of N:");

 // read the value of n

scanf("%llu",&n);

 // calculate the sum from 1 to N

long long int sum=n*(n+1)/2;

 // print the sum

printf("\nsum of all number from 1 to %llu is: %llu",n,sum);

return 0;

}

Explanation:

Read the value of n from user.Then find the sum of all number from 1 to N with the formula sum of first N natural number.That is (n*(n+1)/2). This will give the sum from 1 to N.

Output:

Enter the value of N:100

sum of all number from 1 to 100 is: 5050

Enter the value of N:1000000

sum of all number from 1 to 1000000 is: 500000500000

The jackpot of a lottery is paid in 20 annual installments. There is also a cash option, which pays the winner 65% of the jackpot instantly. In either case 30% of the winnings will be withheld for tax. Design a program to do the following. Ask the user to enter the jackpot amount. Calculate and display how much money the winner will receive annually before tax and after tax if annual installments is chosen. Also calculate and display how much money the winner will receive instantly before and after tax if cash option is chosen. GRADING RUBRIC FOR EACH PROBLEM

Answers

Answer:

// here is code in java.

import java.util.*;

// class defintion

class Main

{

// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object to read input string

       Scanner s=new Scanner(System.in);

        // variables

   double amount;

   int ch;

   double bef_tax, aft_tax;

   System.out.print("Please enter the jackpot amount:");

   // read the amount from user

   amount=s.nextDouble();

   System.out.print("enter Payment choice (1 for cash, 2 for installments): ");

   // read the choice

   ch=s.nextInt();

// if choice is cash then calculate amount before and after the tax

   if(ch==1)

   {

       bef_tax=amount*.65;

       aft_tax=(amount*.70)*.65;

       System.out.println("instantly received amount before tax : "+bef_tax);

       System.out.println("instantly received amount after tax : "+aft_tax);

   }

// if choice is installment then calculate amount before and after the tax

   else if(ch==2)

   {

       bef_tax=amount/20;

       aft_tax=(amount*.70)/20;

       System.out.println("installment amount before tax :  "+bef_tax);

       System.out.println("installment amount after tax : "+aft_tax);

   }

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read the jackpot amount from user.Next read the choice of Payment from user. If user's choice is cash then calculate 65% instantly amount received by user before and after the 30% tax.Print both the amount.Similarly if user's choice is installments then find 20 installments before and after 30% tax.Print the amount before and after the tax.

Output:

Please enter the jackpot amount:200                                                                                                                          

enter Payment choice (1 for cash, 2 for installments): 2                                                                                                      

installment amount before tax :  10.0                                                                                                                        

installment amount after tax : 7.0

Write a function to output an array of ints on a single line. Funtion Should take an array and an array length and return a void. It should look like this {5,10,8,9,1}

Answers

Answer:

void printarr(int nums[],int n)

{

   cout<<"{";//printing { before the elements.

   for(int i=0;i<n;i++) // iterating over the array.

   {

       cout<<nums[i];//printing the elements.

       if(i==n-1)//if last element then come out of the loop.

       break;

       cout<<",";//printing the comma.

   }

   cout<<"}"<<endl;//printing } at the end.

}

Output:-

5

1 2 3 4 5

{1,2,3,4,5}

Explanation:

I have created a function printarr of type void which prints the array elements in one line.I have used for loop to iterate over the array elements.Everything else is mentioned in the comments.

Dicuss why you would or would not use Javadoc in your own software development company.

Answers

Answer:

  The javadoc is the type of the tool which accompanies JDK and it is utilized for producing code of the java documentation in the  HTML design from the source code of the java, that basically required documentation in the predefined code format.

Most of the software development company does not use javdoc because the files of the javadoc are light in weight and it can be easily traceable by using the different types of the tools.

In case of the Public javadoc, while make changing in the API system the javadoc an easily be tracked.

What is the purpose of a constructor?

Answers

Answer:

 The main purpose of the constructor in the computer science is to initialize the object of the class. The constructor is basically called after the allocation of the memory in the object. When the object is created, the constructor are basically used to initialize as default value.  

Constructor is also known as special type of the member function. The compiler called the constructor whenever the object has been create and the construction has similar name of the given class.

Example:

 Class test() {

   int p, r;   // variable declaration

   public:

           // constructor

           // Assigning value in the constructor

     p=5;

     r=10;

Cout<<" Constructor value\n";

}

What are the disadvantages of using pointers?

Answers

Explanation:

The pointer is the variable that will store the address of the other variable of the same datatype.

Following are the disadvantages of using a pointer.

1. Pointer sometimes causes a segmentation fault in the program.

2. Sometimes pointer leads to a memory leak.

3. A pointer variable is slower than normal variable.

4. Sometimes the program is crash if we using pointer because sufficient memory is not allocated during runtime.

5. If we using pointer it is difficult to find the error in the program.

In an IPv.4 addressing scheme the router works at layer 3 on which addressing layer?

a. protocol b. data link c. transport d. network

Answers

Answer: d) Network

Explanation: IPv4(internet protocol version 4) is the decimal-digit numeric value  for the internet protocol.It helps in the identification of the hosts  through logical addresses. The functioning of  IPv4 helps in the routing of the information over the network.

The network layer contains router that is responsible for the routing of message between the nodes of the path.Router functions with internet protocol.Other options are incorrect because protocol is the set of riles,data link layer works for managing the movement of data and  transport layer monitors the transmission of data.Thus ,correct option is option(d)

Analyst is investigating proxy logs and found out that one of the internal user visited website storing suspicious java scripts. After opening one of them he noticed that it's very hard to understand the code and all code differs from typical java script. What is the name of this technique to hide the code and extend analysis time?

Answers

Answer:

Obfuscation

Explanation:

The fact that the analyst can open the Javascript code means that the code is not encrypted. It simply means that the data the analyst is dealing with here is hidden or scrambled to prevent unauthorized access to sensitive data. This technique is known as Data Obfuscation and is a form of encryption that results in confusing data. Obfuscation hides the meaning by rearranging the operations of some software. As a result, this technique forces the attacker to spend more time investigating the code and looking for encrypted parts.

Create a float variable named diameter. This variable will hold the diameter of a circle. d. Create a float variable named PI.

Answers

Answer:

float diameter=2*r; //hold the diameter of a circle

float PI; // float variable named PI.

Explanation:

Here we have declared two variable i.e diameter and PI of type float. The variable diameter will hold the diameter of a circle i.e  2*r  where r is the radius of a circle.

Following are the program in c++

#include <iostream> // header file

using namespace std; // namespace

int main() // main function

{

   float r=9.2; // variable declaration

float diameter=2*r; //hold the diameter of a circle

float PI=3.14; // float variable named PI hold 3.14

cout<<"diameter IS :"<<diameter<<endl<<"PI IS :"<<PI; // display value

  return 0;

}

Output:

diameter IS :18.4

PI IS :3.14

___ technologies, the software that links Web pages with databases, automate much of the business activity with business partners.
Dynamic IP
Dynamic page
Page link
System link

Answers

Answer: Page link

Explanation:

 Page link is the type of the technology that usually found in the website and it used to link the web pages with the databases. The page link basically contain the list of the web page link of the organization.

Then, the linked page of the data is basically the web page which describe the various hyper data links.

The page link basically used linking the one post to another easily and it automatically linked the various business activity with the business partner.  

The correct answer is Dynamic page.

Dynamic pages link web pages with databases, allowing user interaction and automatic updates to content. This technology supports complex business applications and enhances user experience.
In modern web development, technologies like PhP, Javascript, and database connector strings are used to create dynamic pages that link web pages with databases. These pages allow users to interact with the website, and the content on the page can change based on user input, automating much of business activity with business partners.

For example, when a user submits a form on a dynamic web page, the data can be immediately stored in a database, making it easier to manage and retrieve information. This approach enhances both functionality and user experience, as well as supports complex business applications.
The correct answer is Dynamic page.

In 4-bit sign magnitude representation, what is the binary encoding of the number -5?

a) 1011
b) 1010
c) 1101
d) 0101

Answers

Answer:B
Step-by-step explanation:

Suppose a group consists of 5 students. Three students are selected at random to do a presentation. How many different sets of presenters are possible?

Answers

Answer:

The number of presentation groups of 3 students that can be selected from a group of 5 students equals 10.

Explanation:

The number of different presenters equals the no of possible combinations of 3 students from a pool of 5 students.

Thus the number of possible combinations equals

[tex]\binom{5}{3}=\frac{5!}{(5-3)!\times 3!}=10[/tex]

Which statement best describes when Variable Substitution (expansion) can occur?

a) inside of single quotes
b) inside of double quotes
c) inside of backquotes
d) B & C

Answers

Answer: d) B & C

Explanation: Variable substitution is the method through which the command substitution is done for the other form of command and regains its value or meaning.

This value substitution is done with the help of double quotes("...") which are inverted as well when a new form of command is to be introduced and it is   known as back quotes. Other given options are incorrect because it is not determined in single quotes.Thus the correct option is option (d).

Answer: (A) Inside of single quotes

Explanation:

 The variable substitution or we can say that expansion occur inside the single quotes because the generation of the file name typically happened inside the single quotes only.

When we enclosing the character and different types of variable with the single quotes ( ' ) then, it basically represent the actual value of the characters. In this way, the estimation of any factor can't be perused by single statement and a solitary statement can't be utilized inside another single quote statements.

 

What is the binary representation of the following hexadecimal numbers?

a. A4693FBC

b. B697C7A1

-

Answers

Answer:

Corresponding Binary numbers are as following:

A4693FBC=10100100011010010011111110111100.

B697C7A1 = 10110110100101111100011110100001.

Explanation:

A single digit hexadecimal number is a 4 bit binary number.So for each hexadecimal bit we have to find the corresponding 4 bit binary number.

A=1010

4=0100

6=0110

9=1001

3=0011

F=1111

B=1011

C=1100

and write them in the same sequence of their hexadecimal number.

A4693FBC=10100100011010010011111110111100.

B=1011

6=0110

9=1001

7=0111

C=1100

7=0111

A=1010

1=0001

B697C7A1 = 10110110100101111100011110100001.

Why is voice encryption an important digital security measure?

Answers

Answer: Voice encryption is the end to end encryption/encoding of the the communication taking place through the telephone or mobile devices. The encryptors of voice turn the communication conversation into the digital form which result in stream of bits.

Digital security is the protection and securing of the  devices related with the mobile and online technology. It is important to maintain the security of the information conveyed through the communication. It maintains the protection from the online stealing of the data and fraud.

Voice encryption is essential for protecting communications over the internet by converting voice data into an encrypted, indecipherable form. It ensures that only individuals with the proper decryption keys can access the information, thereby maintaining its confidentiality and integrity, while also safeguarding against interception and tampering. Establishing secure key exchange is crucial for privacy on insecure channels.

Voice encryption is a crucial digital security measure that serves to protect sensitive information communicated over voice channels. In the digital world, information can be easily intercepted, modified, or stolen. Encryption acts as a barrier that only allows access to information for those who have the correct key. The process involves converting the voice data into a scrambled form that is nearly impossible to understand without the proper decryption key. This is vital for maintaining the confidentiality, integrity, and authenticity of the communication.

Protection of encryption keys is fundamental to the security of encrypted data. Modern cryptographic protocols rely on the secrecy of keys, as most encryption methods themselves are publicly known. Applications like Signal protect users by keeping encryption keys secure on their own devices. For secure online communication and end-to-end encryption, it is essential to have a system for verifying encryption keys to establish trustworthiness, and to prevent Man in the Middle attacks, where a malicious entity intercepts and potentially alters the messages.

Authentication plays a significant role in ensuring that communication comes from a genuine source, especially online where impersonation is easier. Digital encryption also helps protect certain metadata from eavesdroppers, though not all types of metadata can be shielded. Without encryption, all voice and digital communication would risk exposure to unwanted parties, like hackers or government agencies. Hence, establishing a secure method to exchange encryption keys is vital for privacy over insecure channels, like the internet.

The Python MySQL Connector library:
(a) come pre-installed with Linux
(b) comes pre-installed with the installation of MySQL8.
(c) comes pre-installed with the installation of Python3.
(d) must be downloaded and installed as a separate package.

Answers

Answer: (D) Must be downloaded and installed as a separate package.

Explanation:

  The python MySQL (Structured query language) connector library ought to be downloaded and introduced as separate package. It is utilized to interface MySQL database from python.

The MySQL Installer can introduce and deal with numerous, separate MySQL server occurrences on a similar host simultaneously.

MySQL Installer doesn't allow server updates among major and minor form numbers, however permits redesigns inside a discharge arrangement

Which option is a benefit of implementing a client/server arrangement over a peer-to-peer arrangement?


(A) Client/server networks can easily scale, which might require the purchase of additional client lisences.

(B) Client/server networks can cost more than peer-to-peer network. for example, client/server network might require the purchase of dedicated server hardware and a network OS with an appropriate number of lisences.

(C) peer-to-peer network can be very difficult to install.

(D) peer-to-peer networks typically cost more than client/server networks because there is no requirement for dedicated server resources or advance NOS software.

Answers

Answer: (A) Client/server networks can easily scale, which might require the purchase of additional client licences.

Explanation:

The client server model are easily scalable as it makes the system more efficient and has high ability to make the program for scale.

The Client /server local area networks (LANs) offer improved security for shared assets, more easily execution, expanded reinforcement effectiveness for system based information, and the potential for the utilization of excess power supplies and RAID drive exhibits.

A server is intended to share its assets among the customer PCs on the system. Commonly, servers are situated in verified zones, for example, bolted storage rooms or server farms (server rooms), since they hold an association's most profitable information and don't need to be gotten to by administrators consistently.

Write a function that counts and returns the number of vowels in the input, up to the next newline or until the input is done, whichever comes first. Your function should have the following prototype:

int count_vowels();

Answers

Answer:

// here is code in C++.

#include <bits/stdc++.h>

using namespace std;

// function that return the number of vowels in the input string

int count_vowels()

{

// variable

   string str;

   int v_count=0;

   cout<<"enter the string:";

   // read the string

   cin>>str;

   // fuind the length

   int len=str.length();

   // check for vowel

   for(int x=0;x<len;x++)

   {

       char ch=str[x];

       if(ch=='a'||ch=='e'||ch=='i'||ch=='o'||ch=='u'||ch=='A'||ch=='E'||ch=='I'||ch=='O'|ch=='U')

       {

           v_count++;

       }

   }

   // return the count

   return v_count;

}

// driver function

int main() {

// call the function and print the result

cout<<"number of vowels in string is : "<< count_vowels()<<endl;

return 0;

}

Explanation:

In the function count_vowels(), read a sting and then find its length.Then check each character of the string is vowel or not.If it is vowel then Increment the v_count. After the loop return the count to main function and print it.

Output:

enter the string: welcometoprogramming

number of vowels in string is : 7

The security option in MySQL, that when enabled, limits where a file can be loaded from when using the LOAD DATA INFILE command is called:
(a) secure_file_location
(b) secure_file_priv
(c) safe_file_load
(d) safe_file_location

Answers

Answer:b) secure_file_priv

Explanation: MYSQL database is the SQL data collection where the command LOAD DATA INFILE is used for the transporting the data-file from the local server to the MYSQL server. This command helps the reading the file's data or text of the client server at rapid speed

The secure_file_priv is the option that is raised from the LOAD DATA INFILE for the limited loading of files from the directories and also makes it secure. Other options are incorrect because they are used for the location and loading.Thus the correct option is option(b).

ERP packages are always quite simple.

True

False

Answers

Answer:

False

Explanation:

Enterprise Resource Planning (ERP) packages can be complicated. For example: ERP applications such as SAP, Peoplesoft are fairly wide in scope and quite complicated in terms of implementation. Then there are certain desktop versions of ERP which are not so complicated. There are large number of ERP solutions available from different vendors and their complexity is variable but can be quite complex as well.

A(n) ____ is software that can be used to block access to certain Web sites that contain material deemed inappropriate or offensive.

Trojan horse
Virus
Internet filter
Worm

Answers

Answer: Internet filter

Explanation:

Internet filters are referred to as software which prevents individuals from accessing certain kind of websites. These filters are predominantly used in order to block content that might be considered inappropriate for some users. These filters are widely used in public library and computers used by schools and colleges.

The changing of values for an object through a system is represented by the _____. (Points : 6) communication diagram
object diagram
use case diagram
None of these

Answers

Answer:

The correct option is communication diagram

Explanation:

The communication diagram represents the change of values for an item by a system.

A communication diagram is an expansion of the diagram of objects showing the objects together with the texts traveling from one to another. Besides the connections between objects, the communication diagram demonstrates the messages that the objects send to one another.

The correct option is a) communication diagram

. A possible data for source that could be used when completing a mail merge could be a(n)… : *
a. Excel worksheet
b. Outlook contacts list
c. Access database table
d. all the above

Answers

Answer: d) All of the above

Explanation: Mail merge is the technique in which the emails are combined with the predefined labels so that it could be mass mailed. This tool is helpful for sending a mail to several people at one time. Data source that is used in the mass mailing is known as the database that holds a column for variables present in templates.

Therefore, outlook contact list, excel sheet access database table,word table etc can be used as the source of data at the time of mail merge.These tools acts as data source to connect with the templates.Data source is the source that contains the information about the recipient such as address etc.

Thus all the options mention in the question are correct.

A possible data for source that could be used when completing a mail merge could be all the above.

d. all the above

Explanation:

Mail merge allows one to send a particular document to different individuals.

It is generally used in office environment where some information is to be communicated  to a number of people. The information is attached by adding the data sources.

The information source is a report, spreadsheet or database that contains customized data, for example, names, locations, and telephone numbers.

Write a program that prompts the user to enter the minutes (e.g., 1 billion), and displays the number of years and days for the minutes. For simplicity, assume a year has 365 days. Here is a sample run: Enter the number of minutes: 1000000000 1000000000 minutes is approximately 1902 years and 214 days

Answers

Answer:

// here is code in java.

import java.util.*;

// class definition

class Solution

{

// main method of the class

public static void main (String[] args) throws java.lang.Exception

{

   try{

    // scanner object to read innput

       Scanner s=new Scanner(System.in);

        // variables

       long  min,years,days;

          long  temp;

          System.out.print("Please enter minutes:");

          // read minutes

          min=s.nextLong();

          // make a copy

temp=min;

 // calculate days

days=min/1440;

 // calculate years

years=days/365;

 // calculate remaining days after years

days=days%365;

 // print output

System.out.println(temp+" minutes is equal to "+years+" years and "+days+" days");

   }catch(Exception ex){

       return;}

}

}

Explanation:

Read the number of minutes from user and assign it to variable "minutes" of long long int type.Make a copy of input minutes.Then calculate total days by dividing the input minutes with 1440, because there is 1440 minutes in a day.Then find the year by dividing days with 365.Then find the remaining days and print the output.

 Output:

 please enter the minutes:1000000000

 1000000000 minutes is equal to 1902 years and 214 days.

Other Questions
Order the following elements based upon their electronegativity, highest to lowest: carbon, flourine, hydrogen, nitrogen, oxygen, and sodium. A news service conducted a survey of 1019 adults ages 18 years or older in a certain country, August 31 September 2, 2015. The respondents were asked, "Of every tax dollar that goes to the federal government, how many cents of each dollar would you say are wasted?" Of the 1019 individuals surveyed, 36% indicated that 51 cents or more is wasted. The news service reported that 36% of all adults in the country 18 years or older believe the federal government wastes at least 51 cents of each dollar spent, with a margin of error of 6% and a 99% level of confidence. Complete parts (a) through (e) below (a) What is the research objective? A. To determine the number of adults in the country paying their taxes to the federal governmentB. To determine the number of adults in the country who believe the federal government wastes 51 cents or more of every dollar C. To determine the number of adults in the country (b) What is the population? O A. The country's federal government O B. The 1019 adults in the country that were surveyed OC. Adults in the country aged 18 years or older O D. Adults in the world aged 18 years or olderc) What is the sample? A. Adults in the country aged 18 years or older. B. The country's federal government.C. Adults in the world aged 18 years or older.D. The 1019 adults in the country that were surveyed. A student mixes two clear liquids together. After a few minutes, a white powdery solid can be seen settling on the bottom of the test tube. Which of the following is a conclusion that the student can draw based on these observations?A:The two liquids are toxic and should be handled with extreme caution.B:The two liquids were pure substances before they were mixed.C:The two liquids have been stored too long and are no longer good.D:The two liquids have gone through a chemical change in which a new substance called a precipitate was produced. Daltons completing an investigation in the science lab. He observes that a sample of liquid turns to gas at 135C. Whats this temperature called? A. boiling point B. freezing point C. melting point D. room temperature E. standard temperature Nick bought a music player. The price was $172, and the sales tax rate was 7 percent. How much sales tax did Nick pay when he bought themusic player?A.$7.20B. $12.04C.$12.45 ConsequencesJust Ahead2. The artist used the image to convey a message. What message does thisimage present?11 poirThere are consequences for your actions.Do not worry about consequences for your actions. Just have fun.There are never any consequences for actions. The next town off of the highway is called Consequences. When the preoperative client tells the nurse that he cannot sleep because he keeps thinking about the surgery, an appropriate reflection of the statement by the nurse is:A. "Sounds as if your surgery is a pretty scary procedure." B. "You have a great surgeon. You have nothing to worry about."C. "The thought of having surgery is keeping you awake."D. "You shouldn't be nervous. We perform this procedure every day." A woman at an airport is towing her 20.0-kg suitcase at constant speed by pulling on a strap at an angle above the horizontal. She pulls on the strap with a 35.0-N force, and the friction force on the suitcase is 20.0 N. What is the magnitude of the normal force that the ground exerts on the suitcase? Give the names for each of the elements between atomic numbers 1 and 86 that has a symbol starting with "C".Identify the family each element belongs to. If the element does not belong to a family, identify it as a metal or non-metal.2. In your own words, define the following terms. a. Element b. Atom c. Molecule d. Compound 3. How many oxygen atoms are in one molecule (or formula unit) of each of the following compounds? NO3 Al(OH)3 Ca(NO3)2 Ba(OCN)2 A police car at rest, passed by a speeder traveling at a constant 120 km/h, takes off in hot pursuit. The police officer catches up to the speeder in 750 m, while maintaining a constant acceleration. Calculate (a) how long it took the police car to overtake the speeder, (b) the required police acceleration, and (c) the velocity of the police car at the moment it reaches the speeder. Esmeralda is 20 years of age and a full-time student living with her parents. She had wages of $500 ($50 of income tax withholding) for 2018. Can Esmeralda file a tax return to claim her $50 of income tax withholding even though she is a dependent of her parents? Yoon, who sells designer jeans, has a mobile app to help women determine what leg style looks best on their body type. What could she do to bring in more prospective customers? a. Add a mobile-app extension to her ad b. Use sitelink extensions. c. Add a call-only extension to her ad d. Include a link to her mobile website in her ad. There are 10 workers in Thailand and each can produce either 4 computers or 60 tons of rice. There are 20 workers in the United States and each can produce either 10 computers or 80 tons of rice. Draw the production possibilities curve for each country. Define the following and give an example for each: ( a) cytokine b)interleukin c) chemokine d) chemoattractant Which of the molecules shown in question 5 has an asymmetric carbon? Which carbon is asymmetric? Enter an inequality that represents the graph in the box.Help please? Many elements combine with hydrogen(valence = 1) to give compounds called hydrides. Use the position of an element in the periodic table to deduce its valence. Write formulas for these hydrides without using subscripts, for example XH3. If no hydride forms, write "none". What is the formula of the hydride formed by sulfur? What is the formula of the hydride formed by potassium ? || If light travels 1% times faster in air than in water, what is the n of water? Show your work. Should players take a page from the referees and ignore fans? Spacetime interval: What is the interval between two events if in some given inertial reference frame the events are separated by: (a) 7.5 x 10 m and 3s? (b) 5x10 m and 0.58? (c) 5x 10"m and 58?