Write code to complete doublepennies()'s base case. sample output for below program: number of pennies after 10 days: 1024 note: these activities may test code with different test values. this activity will perform three tests, with startingpennies = 1 and userdays = 10, then with startingpennies = 1 and userdays = 40, then with startingpennies = 1 and userdays = 1. see "how to use zybooks". also note: if the submitted code has an infinite loop, the system will stop running the code after a few seconds, and report "program end never reached." the system doesn't print the test case that caused the reported message.

Answers

Answer 1
int resultPennies = startingPennies;
for (int i = 0; i < userDays; i++) {
    resultPennies *= 2;
}
return resultPennies;


The above code should do. You will need to adapt this code to your desired language, as you never specified a language.

Related Questions

Your company is trying to get out of the responsibility of purchasing and hosting its own hardware so it won’t have to finance or manage a datacenter anymore. Your boss has told you that you need to install an operating system on all of the cloud-based servers. This is an example of what type of cloud computing?

Answers

Answer:

Software as a Service (SaaS).

Explanation:

   SaaS has been a strong trend in the business world. It is an acronym for Software as a Service, which means in our language software as a service.

    That is, they are online applications that can be used on your computer, tablet or mobile phone simply and remotely.

    It is a program that is not installed and that is used as a service by connecting to the Internet.

    As a service, it means that the customer does not purchase a license for a product but the right to enjoy the service offered.

    Therefore, all work related to the software is in the vendor's hands.

    Making a product available in SaaS format is a way of distributing content or technology solution in a more accessible and secure way.

    Software as a service may also be known by other names, such as web-based, on-demand, or hosted software.

    Netflix is a notorious example of SaaS that has gained prominence worldwide.

Answer these questions and label each answer with the correct number.

1. List the stages in the technology design process.
2. What are prototypes used to test?
3. Why do engineers redesign a product after testing a prototype?
4. To whom do engineers communicate the solution?

Thanks!

Answers

1) Goals, specifications, model, and then public opinion about the product
2) Prototypes are used to test whether the product works like it is is supposed to, and for the public to be convinced that they are not wasting money on a product that does not work
3) Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product
4) Engineers communicate with the company that hired them, or the government if applicable.

he technology design process, like scientific inquiry, does not always follow rigid steps. Often, engineers follow a common process: They identify a need, research the problem, design a solution, build and evaluate a prototype, troubleshoot and redesign, and communicate the solution.

A prototype is an early sample, model, or release of a product built to test a concept or process or to act as a thing to be replicated or learned from. ... A prototype is generally used to evaluate a new design to enhance precision by system analysts and users.

Engineers fix flaws and any other problems that they could have came across. Also, redesigning can lead to improvements of the product

Engineers find solutions to the problems faced by the society . Once the solution has been devised the engineers communicate it to the laborers and the workers so the implement it on field or on the work stations.

A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of:

Answers

The answer is Event.  A user logging on, an application server connecting to a database server, an authentication server rejecting a password, or an antivirus scanner reporting a suspected virus are all examples of Event.

When a windows computer starts, it initiates the stateless address autoconfiguration process, during which it assigns each interface a link-local unicast address. what is the order of steps involved in this autoconfiguration process?

Answers

1) The IPv6 implementation on the system construct a link-local address for
     each interface by using the fe80::/64 network address
2)  Using IPv6 Neighbor Discovery protocol, the system check if the
     address is a duplicate 
3) Knowing the link-local address is unique, it configures the interface to use
    that address
4) The system uses the Neighbor Discovery protocol to transmit Router
     Solicitation messages to the all routers multicast address 
5) The router on the link uses the ND protocol to relay Router
     Advertisement messages to the system 
6) By using the information it receives from the router, the system produce
    a routable address and configures the interface to use it 

A dns query failure is referred to a higher level domain name server under what condition

Answers

Within the Flags detail is a flag titled recursion desired. This flag shows whether or not the local DNS should continue to query other DNSs if it is not able to resolve the current query. As DNS is local, it may or may not have the enough information to allow the address to be resolved. If the recursion flag is set, the local DNS will continue to query higher level DNSs until it is able to resolve the address.  In short, the condition is when a flag is raised and it doesn’t have enough information to allow the request.

A DNS query (also known as a DNS request) is a demand for information sent from a user's  computer (DNS client) to a DNS server. In most cases a DNS request is sent, to ask for the IP  address associated with a domain name. An attempt to reach a domain is actually a DNS client  querying the DNS servers to get the IP address, related to that domain.

Further Explanation:

The server at www.bleepingcomputer.com can't be found, because the DNS lookup  failed. DNS is the network service that translates a website's name to its Internet address. This  error is most often caused by having no connection to the Internet or a mis-configured network  Condition of DNS query failure is referred to a higher level Domain Name  Server  The condition is when a flag is raised and it doesn't have enough information to allow  the request. Within the Flags detail is a flag titled recursion desired. This flag shows whether or not the  local DNS should continue to query other DNSs if it is not able to resolve the current query. As DNS is  local, it may or may not have the enough information to allow the address to be resolved. If the recursion  flag is set, the local DNS will continue to query higher level DNS until it is able to resolve the address.in  short “The condition is when a flag is raised and it doesn't have enough information to allow  the request”.

Learn more:

What type of dns record is used to delegate a dns zone?

        brainly.com/question/6583162

Keywords: DNS, query, domain, server, IP adress, flags

Brittany is looking to advance in her current career. She is creating a plan to help strengthen and increase her skills. What question should she ask herself? What areas do I need to improve? What should I wear when I interview? When should I apply for a new job? Who do I know that can give me a better job?

Answers

Answer:

The correct answer is What area's do I need to improve.

Explanation:

This will help her alot

Answer:

A) What areas do I need to improve?

Explanation:

To strengthen her skills she needs to improve and be better.

12. Which of the following is CourseBit®? (1 point)

an online class focused on drawing for architectural purposes

a leading Moodle™ development and hosting provider that focuses on highly customized systems

an icon in Blender® that allows you to easily switch between screens

a widget with which all animators should be familiar



13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around? (1 point)

non-blocking

non-overlapping

non-modal

non-confrontational

Answers

12. Which of the following is CourseBit®? 
a leading Moodle™ development and hosting provider that focuses on highly customized systems

13. In Blender®, which interface principle corresponds to the user interface that allows a user to view all options and tools at a glance with pushing or dragging editors around?
non-overlapping

Hope this helps.

Which type of graph is useful to record scientific experiments that require the analysis of varying or multiple changes?

Answers

It's a Scatter Plot Graph

The scatter plot graph has points to relate two sets of data along the two axes. These graphs are useful to record scientific experiments to analyze varying or multiple changes. For example, you can plot the relationship between humidity in the atmosphere and temperature change.

Scatter Plots is useful to record scientific experiments that require the analysis of varying or multiple changes.

What is Scatter Plots?

A scatter plot is a form of plot or mathematical diagram that uses Cartesian coordinates to display values for typically two variables for a collection of data.

It is also known as a scatter graph, scatter chart, scattergram, or scatter diagram.

In an effort to demonstrate the degree to which one variable is influenced by another, scatter plots are used to plot data points on a horizontal and vertical axis.

The values of the columns set on the X and Y axes determine the position of the marker that represents each row in the data table.

Thus, the link between two separate continuous variables is assessed using scatter plots. These graphs compare simultaneous changes in two distinct variables.

For more details regarding Scatter Plots, visit:

https://brainly.com/question/29231735

#SPJ3

Describe five different ways databases can be processed

Answers

The five different ways databases can be processed are :
1) Queries, Forms and Reports
2) Application Programs
3) Stored Procedures
4) Triggers
5) Web Applications

12. Good digital citizenship includes keeping in mind who has access to the internet and who does not. (1 point)

true

false



13. In 2013, which of the following did Google® think would be the new direction in technology? (1 point)

Google Glasses®

Google virtual reality

Google self-driving cars

Google Maps® 3-D

Answers

12. Good digital citizenship includes keeping in mind who has access to the internet and who does not. (1 point)

true

The focus of digital citizenship is how Internet users should manage online relationships, provide personal protection from online attacks and show accountability for posted online viewpoints and opinions.

13. In 2013, which of the following did Google® think would be the new direction in technology? 
Google Maps® 3-D
true | Good digital citizenship includes keeping in mind who has access to the internet and who does not, as there are situations in which people or business assume there is always an internet connection but it is not always like that. Forr example, in a contact card it could be useful to include a phone number, as someone may not having access to mail.

Google Glasses® | Google Glasses® was a technology developed by Google, which included the portability of the Google technology on a glass lens. However, the project failed, and the glasses have not made the huge breakout expected. There is a new version in elaboration now that seems to be more promising. 

You can upgrade a cpu by adding registers and cache memory to it.
a. True
b. False

Answers

False, to upgrade a CPU, you need to replace the CPU with a better CPU.

the five steps in the fetch/execute cycle and how do they correspond to a restaurant

Answers

The five steps in the fetch/execute cycle are : 
1) Instruction Fetch (IF) - This starts with the moving from the memory to
     the control unit which is given by the program counter. The control unit
     can then access the data immediately from the memory.
2) Instruction Decode (ID) - what task the system has to do, where the
     results is to be stored and what operation is to be performed by which
     data.
3) Data Fetch (DF) - it gets the value from the memory.
4) Instruction Execute (IE) - The particular instruction is executed.
5) Result Return (RR) - The Result Value is restored in a
    particular memory location.  The return of new data resulting from
    (EX) that is put back into memory.

Stealing passwords by using software code to run through various password schemes with numbers, symbols, capital letters, and characters until a match occurs is known as ________.

Answers

The answer is Brute forcing.

When a switch is closed, completing an lr series circuit, the time needed for the current to reach one half its maximum value is _____ time constants?

Answers

The answer is 0.693 .  When a switch is closed, completing an LR series circuit, the time needed for the current to reach one half its maximum value is 0.693   

e^(-t/T) = 0.5 
-t/T = ln(0.5) = -0.693 

____ data updates in your destination document if there are changes to the source data
A) integrated
B) embedded
C) linked
D) field

Answers

I think its D (Field) I'm not sure but seems better than others.

If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, what will be the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent?

Answers

The answer is : CLIENT will have 7 records  AGENT will have 4 records.  If a dbms enforces a delete restrict option on the referential integrity constraint between client and agent in the happy insurance database, the outcome after a user tries to delete the last record (a4, james, 3, 90, 2010, a3) from agent is CLIENT will have 7 records  AGENT will have 4 records.       

The expanded needham-schroeder protocol can be shortened to a 6-message protocol without loss of security by merely removing the 7thmessage. why is this true? (hint: the purpose of the 7thmessage is to prove to bob that he is talking to alice, but he already knows that. why?)

Answers

This is true since the ticket issued by KDC is enciphered by Alice's key, KAlice, so the one who can decrypt the fourth message and get the ticket to Bob is Alice only, which means that the one who is sending the ticket to Bob is Alice and nobody else.. (No one can get the ticket from the fourth message.)

ISO’s primary standard for crisis management, ____, is labeled as incident response, but is intended to help organizations respond to disasters, social disruptions, or other significant events.

Answers

ISO 22301, is a management system standard which can be used by organizations of all sizes and types.

how long does the Splunk search job remain active

Answers

When you run a new search job, the job is retained in the system for a period of time, called the job lifetime. f the job is not accessed within the specified lifetime, the job expires and is removed from the system. There are two lifetime settings, 10 minutes and 7 days. The lifetime starts from the moment the job is run.

Including AND in an IF statement means more than one condition can be included in the statement. exactly one condition can be included in the statement. the result may be both true and false at the same time. a new spreadsheet is generated using only data that meets the conditions in the statement

Answers

A. Just took the test.

Answer:

more than one condition can be included in the statement.

Explanation:

For example, if your mom tells you:

"You can only go out tonight if you do your homework and clean up your room"

The word and in the if condition is used to add another condition to the existant one, so the use of the word and in If statements is used to add more than one condition to the statement.

When processor designers consider a possible improvement to the processor datapath?

Answers

When processor designers consider a possible improvement to the processor data path, the decision usually lean on on the cost/performance arrangement. 

2. Because technology is always changing, there are new applications being developed constantly. (1 point)

true

false



3. What does it mean if something is a public domain? (1 point)

It is a work or invention that is the result of creativity, including manuscripts or design.

It is available for use by the public.

It has expected standards of behavior.

It has a license allowing the public to use images without paying licensing fees.

Answers

true because we need new tech

Answer:

2. answer is true

3. answer is It is available for use by the public

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier? (1 point)

virtual reality

email marketing

video conferencing

social media



15. One of the elements that make the internet such a significant development is its ability to do which of the following? (1 point)

connect people all around the world

stream movies

offer ecommerce

share photos

Answers

14. Which now-established technology went through the “emerging” phase in the early 2000s and makes the sharing of ideas much easier?
The correct answer is: social media

15. One of the elements that make the internet such a significant development is its ability to do which of the following? 
The correct answer is: connect people all around the world

Questions on blender
2. Which of the following is a special mode for making changes to a object? (1 point)

edit mode

mesh mode

landscape mode

drawing mode



3. Which of the following do extrusion tools duplicate while keeping the geometry connected with the original vertices? (1 point)

vertices

edges

faces

circles

Answers

I believe the answer for 2 is Edit mode and the answer for 3 is edges. But im not 100%. I hope this helps if not i hope you find the correct answer. 

In the launch of the Space shuttle Discovery what does "auto sequence start" mean?

Answers

The countdown clock before a rocket launches is one of the most remarkable timepieces in the world. As indicated by the "T-minus" mark, the hours and minutes tick down to launch. “Auto sequence start” is a breakdown of some of the big milestones leading up to that final moment. If there are no technical issues, at T-minus 31 seconds, the ‘go’ command will be given “Auto sequence start” which means the Ground launch sequencer will hand off primary control. It will be handed off to the shuttle’s onboard computers.

You have a usb storage device that you cannot get working. you have enabled all appropriate usb options in the latest 2.2 kernel but still cannot get your device working. what is most likely the source of the problem?

Answers

the device might have a problem eg: a faulty usb port , or maybe you stick requires 3.0 usb ports

While in an interactive nslookup session, you'd use the ______ keyword to change the DNS server you're using

Answers

The answer is DMNNAMSVR.  While in an interactive nslookup session, one would use the DMNNAMSVR keyword to change the DNS server one is using.

The key requirement in selection of the facilitator is one who is the end-user.

Answers

The answer is False.  Key requirement in the  selection of the facilitator is independence. The key requirement in the selection of the facilitator is that they have no direct involvement or direct interest in the project.    

An encrypted vpn link guarantees that the other end of the vpn connection is secure.
a. True
b. False

Answers

A-True
I hope this helps! :)

Answer:

The correct answer is letter "B": False.

Explanation:

Encrypted Virtual Private Networks (VPN) encode information so that only one computer with the correct decoder can read it so use it. The fact that one VPN is encoded does not imply that the VPN from where other user attempts to use it is encoded and secure. At least the encrypted VPN is safe but the other end is not unless encoded.

What type of device is characteristic of an enterprise environment?

Answers

A workstation used at an engineering firm.
Other Questions
Meryl needs to add enough water to 11 gallons of an 18% detergent solution to make a 12% detergent solution. Which equation can she use to find g, the number of gallons of water she should add? PQ bisects SPY. mSPQ =[tex] \frac{11}{2} [/tex] x-5 and mYPQ= 4x- [tex] \frac{5}{2} [/tex]Solve for x and find mSPY A vertical polarizing filter is used on the lens of a camera. Which waves do not strike the lens? What is the value of k used to find the coordinates of a point that partitions a segment into a ratio of 5:3? 500 words:1. What specific restrictions were placed on slaves? Were the same restrictions placed on free blacks? 2. How did free blacks respond to the slave codes? 3. What did abolitionists do in response to the slave codes? 4. When and how did the codes change? When and how were slave codes eliminated? What does the absolute value of a number tell you A stock bottle of concentrated hydrochloric acid is a 37% (w/w) hcl solution. what is the molarity of this solution? how many moles of hcl are in a 10 ml sample of this concentrated acid? the density of 37% hcl is 1.19 g/ml. How many legal actions does the united states approach in a year? The ability to attract an electron for bonding is called: A. Electrostatic attraction B. Electronegativity C. Delocalized electron attraction D. Polar bonding how to solve -6 Justices best friend is sexually involved with multiple partners at the same time. She discusses her stories with Justice excitedly. What perceptions might Justice develop about sex based on these conversations? It is dangerous to have multiple sexual partners. It is wrong to be involved in any sexual relationship as a teenager. It is fun and exciting to have multiple sexual partners. It is wrong to discuss sexual relationships with friends. what natural resources makes many nations of this region wealthy ? 1. diamond 2. oil 3. salt 4. uranium What type of information is recorded in a trace fossil rate of 33.00 for 11 pounds of meat A bargain bin contains classical and rock and CDs. There are 60 CDs in the bin. Choosing a rock CD have the same number of favorable outcomes. How many rocks CDs are in the bin Hasty generalization,false dichotomy,and ad hominem are all examples of : Bias Argument Perspective Logical fallacies PLZ HELP ASAP CIRCLES What two things must an organism be successful at in order to pass on its genes? choosing and selecting surviving and choosing selecting and reproducing surviving and reproducing Please help!Answer the below question in a paragraph.1. Describe the plants and animals that would be found at the Young Forest Stage of a forest ecosystem?2. Crocodiles are one of the oldest species on the planet. They have adaptations that allow them to exploit many niches. Explain what behavioral and structural adaptations have contributed to their success. what is the y-coordinate of the vertex of the function y=2x^2+5x-8