What is the output of the
given program if the user
enters 20?
A. A lot of fun
B. some fun
C. no fun
Consider the following
segment:
Scanner
Scanner(System.in);
input
System.out.print("Please
value");
int value =
fun");
}
else
{
input.nextInt();
if (value >= 30 )
{
program
enter
System.out.println("A
lot
new
a
of
5

What Is The Output Of Thegiven Program If The Userenters 20?A. A Lot Of FunB. Some FunC. No FunConsider

Answers

Answer 1

if(value_ 30)

Explanation:

es igual 30 espero que te sirva


Related Questions

How artifical intelligence will have more effect on our day to day life ? ​

Answers

Answer:

Artificial intelligence can dramatically improve the efficiencies of our workplaces and can augment the work humans can do. When AI takes over repetitive or dangerous tasks, it frees up the human workforce to do work they are better equipped for—tasks that involve creativity and empathy among others.

Question One
a) The research department of De-mod Limited has developed a software at a cost of ten million cedi that is a game changer. In other to ensure total ownership and control of the software, you have been consulted to provide an advice on what De-mod Limited can do to maintain absolute ownership and control of the newly developed software.
With the knowledge you have acquired in this course, examine at least three protections for developers of computer software, stating the merits and demerits of each EV(7Marks)

Answers

The three protections for developers of computer software, are:

Patents Copyright and Trade secretsTrademarks.

What are the different kinds of protection of computer software?

The principal modes of protection of software is known to be copyright and patents. Copyright is said to be used a lot so as to protect computer program, this is due to the fact that writing of a code is one that tends to be similar to any other kinds of literary work.

Patents are known to be exclusive right of a person to make or produce, use their  invention and thus The three protections for developers of computer software, are:

Patents Copyright and Trade secretsTrademarks.

Note that the use of patent and copyright benefits a person as it tends to give them the power over their products and services.

Learn more about computer software from

https://brainly.com/question/1538272

#SPJ1

Write a program in c# that simulates the roll of two six sided dice.
The program should ask the user to guess the total sum of the dice. The user has to
keep guessing until they get the total correct, and the program should tell them how
many tries it took.

An example of the expected output is shown below.
What do you think the total of two six-sided die will be? 6
The total was 8. Try again!
What do you think the total of two six-sided die will be? 4
The total was 11. Try again!
What do you think the total of two six-sided die will be? 10
The total was 10. Congratulations! It took you 3 tries to guess successfully.

Answers

Answer:

using System;

class Program

{

   public static void Main(string[] args)

   {

       Random rnd = new Random();

       int tries = 0;

       while (true)

       {

           tries++;

           Console.Write("What do you think the total of two six-sided die will be? ");

           int guess = int.Parse(Console.ReadLine());

           int total = rnd.Next(1, 7) + rnd.Next(1, 7);

           Console.Write($"The total was {total}. ");

           if (total == guess)

           {

               Console.WriteLine($"Congratulations! It took you {tries} tries to guess successfully.");

               break;

           }

           else

           {

               Console.WriteLine("Try again!");

           }

       }

   }

}

Explanation:

Worst case you could be guessing forever...

How can structure of a table change in sql. What general types of changes are possible

Answers

One can structure of a table change in sql and the general types of changes that are possible is that:

One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

How can we modify the structure of a table in SQL?

The SQL ALTER TABLE command is known to be the tool that is often used to alter the structure of an existing table.

Note that it is one that can helps to add or delete columns, make or destroy indexes, alter the type of existing columns, and others.

Hence, One can structure of a table change in sql and the general types of changes that are possible is that:

One can use the  MODIFY STRUCTURE to alter the structure of the current table that one is in and this is done by adding or deleting fields.One can also change or alter a field name, width, or that of the data type and this is done by Issuing the MODIFY STRUCTURE command that tends to opens the Table designer, an interactive place in which a person can create or change the structure of a table.

Learn more about table structure from

https://brainly.com/question/26125587

#SPJ1

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world's finest artisanal, hand-crafted widgets. They've hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

An external website permitting users to browse and purchase widgets

An internal intranet website for employees to use

Secure remote access for engineering employees

Reasonable, basic firewall rules

Wireless coverage in the office

Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don't want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you'll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization's requirements and the following elements should be incorporated into your plan:

Authentication system

External website security

Internal website security

Remote access solution

Firewall and basic rules recommendations

Wireless security

VLAN configuration recommendations

Laptop security configuration

Application policy recommendations

Security and privacy policy recommendations

Intrusion detection or prevention for systems containing customer data

Answers

The authentication can be done by using user id and password, social sign-in or by using the biometrics.  

How to explain the information?

Authentication works as follows:  

Prompting the user to enter the credentials.  Send credentials to the authentication server.  Match the credentials.  Authorize the user and grants the acces

External Website security:  

Use of firewall.  Implement the access control.  Use of MVC (Model View Controller) Use of encryption.  Use of SSL certificate.Use of security plugins.  Use of network monitoring team.  

Internal Website security:  

Use of authentication to identify the user identity.  Use of authorization to provide different user with the specific privileges and access.  Encrypt or hide sensitive web pages.  By implementing IT policies.  Educate the user about the website.  

Remote Access Solution:  

Remote access provides better security, cost efficiency, ease of management, and increased availability.  

Remote access can be deployed by using the RAS gateway.  

Firewall and Basic rules recommendations:  

Firewall is important for managing the traffic and providing external website security.  Rules to prevent SQL injection and XSS.  Allow only the specific type of traffic.  Use access rules for IP security.  Implement certain IT policies.  

Wireless Security:  

Wifi is being used in every organization and it prevents the network from malicious access.  

Wireless security can be provided by usin encryption, decryption, and authorization.  

VLAN configuration:  

VLAN are important for traffic filtering and providing the logical division of the network.  

VLAN can be configured for web interface and can provide web filtering.  

VLAN can be configured between router and firewall that passes the network.  

Laptop Security Configuration:  

Use of password, VPN and the registering the laptop will provide laptop security. .  

Application policy recommendations:  

Application policy includes integration, use of cookies access control, and implanting other organization and IT rules.  

Security and privacy policy recommendations:  

It includes listin of security methods to be implemented for traffic filtering, user authentication and other specific policy for the website.  

Intrusion detection or prevention for systems containing customer data:  

IPS is implemented behind firewall and it matches the incoming traffic against the security policies.

Learn more about security infrastructure on:

https://brainly.com/question/5939963

#SPJ1

Given main(), complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a car (SetPurchasePrice(), GetPurchasePrice()), and to output the car's information (PrintInfo()). Ex: If the input is: 2011 18000 2018 where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, the output is: Car's information: Model year: 2011 Purchase price: 18000 Current value: 5770

Answers

The C++ program to show and complete the Car class (in files Car.h and Car.cpp) with member functions to set and get the purchase price of a car is:

Car.h

#ifndef CARH

#define CARH

class Car{

private:

int modelYear;

 

int purchasePrice;

int currentValue;

public:

void SetModelYear(int userYear);

int GetModelYear() const;

void SetPurchasePrice(int purchasePrice);

int GetPurchasePrice() const;

void CalcCurrentValue(int currentYear);

void PrintInfo();

};

#endif // CARH

Car.cpp

#include<iostream>

#include<math.h>

#include "Car.h"

using namespace std;

void Car::SetModelYear(int userYear){

modelYear=userYear;

}

int Car::GetModelYear() const{

return modelYear;

}

void Car::SetPurchasePrice(int userPrice){

purchasePrice = userPrice;

}

int Car::GetPurchasePrice() const{

return purchasePrice;

}

void Car::CalcCurrentValue(int currentYear){

double depreciationRate = 0.15;

int carAge = currentYear- modelYear;

currentValue = (int)round(purchasePrice*pow((1-depreciationRate),carAge));

}

void Car::PrintInfo(){

cout<<"Car's information:\n";

cout<<"\t\tModel Year : "<<GetModelYear();

cout<<"\n\t\tPurchase price: "<<GetPurchasePrice();

cout<<"\n\t\tCurrentValue: "<<currentValue;

}

Read more about C++ programs here:

https://brainly.com/question/20339175

#SPJ1

Input a list of employee names and salaries and store them in parallel arrays. End the input with a sentinel value. The salaries should be floating point numbers Salaries should be input in even hundreds. For example, a salary of 36,510 should be input as 36.5 and a salary of 69,030 should be entered as 69.0. Find the average of all the salaries of the employees. Then find the names and salaries of any employee who's salary is within 5,000 of the average. So if the average is 30,000 and an employee earns 33,000, his/her name would be found. Display the following using proper labels. Save your file using the naming format LASTNAME_FIRSTNAME_M08 FE. Turn in your file by clicking on the Start Here button in the upper right corner of your screen. 1.Display the names and salaries of all the employees. 2. Display the average of all the salaries 3. Display all employees that are within 5,000 range of the average.

Answers

Using the knowledge in computational language in JAVA it is possible to write the code being Input a list of employee names and salaries and store them in parallel arrays

Writting the code in JAVA:

BEGIN

DECLARE

employeeNames[100] As String

employeeSalaries[100] as float

name as String

salary, totalSalary as float

averageSalary as float

count as integer

x as integer

rangeMin, rangeMax as float

INITIALIZE

count = 0;

totalSalary =0

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

//Read Employee data

WHILE name != “*” AND count < 100

employeeNames [count] = name

DISPLAY“Enter salary for “ + name + “.”

READ salary

employeeSalaries[count] = salary

totalSalary = totalSalary + salary

count = count + 1

DISPLAY “Enter employee name. (Enter * to quit.)”

READ name

END WHILE

//Calculate average salary with mix , max range

averageSalary = totalSalary / count

rangeMin = averageSalary - 5

rangeMax = averageSalary + 5

DISPLAY “The following employees have a salary within $5,000 of the mean salary of “ + averageSalary + “.”

For (x = 0; x < count; x++)

IF (employeeSalaries[x] >= rangeMin OR employeeSalaries[x] <= rangeMax )

DISPLAY employeeNames[x] + “\t” + employeeSalaries[x]

END IF

END FOR

END

See more about JAVA at brainly.com/question/12978370

#SPJ1

A large banking client recently completed migrating their entire organization to
cloud. They need Accenture to help them assess how secure they are.
What benefit would the client get from involving/utilizing Accenture's security
team?
O implement physical security services to protect access to the Cloud data centers
O industry regulations and legal constraints keep Accenture from helping banks move to the Cloud
avoid only bank specific attacks such as money laundering
assess existing Cloud security policies and processes, protect data, and identify security improvements
O I don't know this yet.

Answers

Explanation:

industry regulations and legal contraints keep accenture from helping banks move to the cloud avoid only bank specific attacks such as money laundering.......and identify

security improvements.

The benefit that the client gets from involving/utilizing Accenture's security team is industry regulations and legal constraints keep Accenture from helping banks move to the Cloud. The correct option is B

What is Accenture's security?

Accenture is a client data security program. They provide governance to the company, how a company work, architecture, etc. They protect the data of the clients.

Accenture is a company that provides software to protect data and information. The fundamental principles of a data security company are confidentiality, integrity, and availability. So the benefits of joining with Accenture security team will be the safety of the data of the company.

Thus, the correct option is B, industry regulations and legal constraints keep Accenture from helping banks move to the Cloud.

To learn more about Accenture's security, refer to the link:

https://brainly.com/question/27808005

#SPJ2

How has 5G become more energy efficient?

1. by creating cross channel wavelengths
2. by utilizing beamforming and multiple-input multiple-output (MIMO)
3. by converting to all solar power
4. by utilizing more energy efficient access points

Answers

Option 4. The way that 5G is more efficient is that is is able to  utilize more energy efficient access points.

What is the 5G?

This is the term that is used to refer to the fifth generation mobile network. This is the latest generation of networks and it is known to be a faster way and a more efficient way of connecting to the internet when we compare it to the others that came before it.

This is known to have lower latency when we compare it to the 4G network. It is 100 times said to be faster than the 4G and more efficient for businesses and the people that use them. Hence the The way that 5G is more efficient is that is is able to  utilize more energy efficient access points.

Read more on 5G network here: https://brainly.com/question/24664177

#SPJ1

fill in the blanks

a:………was the main component in the first generation computer

Answers

Answer:

vaccum tube

Explanation:

mark me brainlist!!

Explain how will you process identify and use texts according to the
function you wish for it to serve in the particular industry

Answers

The texts have different objectives that can be identified with the following tips:

Identify the major ideas.Identify the author's purpose.

What is a text?

A text is a term to refer to the set of phrases and words contained coherently to be interpreted and to share the ideas of an author (emitter or speaker).

Texts can have a variety of topics counting on the author's intention. For example:

Scientific texts: They are the texts that have the purpose of sharing scientific knowledge with exact data and results of experiments or others.Literary texts: They are the best known texts that stand out for including a variety of topics, they are marked by telling an in-depth story.News texts: They are the texts that reveal all the details of a news story and have the goal of objectively reporting.According to the above, to identify a text it is necessary to read it and remember the main ideas and the purpose of its author when writing it. Additionally, the texts are tools for different professions to teach crafts, knowledge and techniques counting on the requirement.

To learn more about  texts, refer

https://brainly.com/question/25862883

#SPJ9

For a computer, it is a minimum system requirement that the video card supports directx 9 graphics with ____________________ 1.0 or higher driver.

Answers

Answer:

With 0.5,0.7,0.9 drivers

Design a class Dog, making sure it is appropriately encapsulated. The class will have the properties 'name' and 'breed' (both Strings), a constructor, and getters/setters for both fields (called getName, et cetera). Use the constructor and setters to validate input for both properties so that they always have the first letter capital and no others. If the input is invalid, change it into valid format before proceeding. TESTS NEED FIXING

Answers

Using the knowledge in computational language in JAVA it is possible to write a code that Design a class Dog, making sure it is appropriately encapsulated

Writting in JAVA:

public class Dog {

private String Name,Breed;

public Dog(String N,String B)

{

SetName(N);

SetBreed(B);

}

private String FirstCapitalLetter(String N)

{

String first = N.substring(0, 1);

String second = N.substring(1);

first = first.toUpperCase();

String finalStr = first + second;

return finalStr;

}

public Dog()

{

}

public void SetName(String N)

{

this.Name = FirstCapitalLetter(N);

}

public void SetBreed(String B)

{

this.Breed = FirstCapitalLetter(B);

}

public String getName()

{

return this.Name;

}

public String getBreed()

{

return this.Breed;

}

public static void main(String[] args) {

Dog MyObj = new Dog("tommy","zebraDog");

System.out.println(MyObj.getName()+" "+MyObj.getBreed());

}

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

At north wind headquarters, where were penguins first reported missing on the giant TV screen? And what did the penguins react?

Answers

Answer:

Berlin zoo

The penguins reacted that they must respond with action ASAP

Answer:

Berlin zoo, the penguins reacted that "It's time to go".

This means that the penguins care about each other and must rescue each other.

In cell N2, enter a formula using the IF function and structured references as follows to determine which work tier Kay Colbert is qualified for:
a. The IF function should determine if the student's Post-Secondary Years is greater than or equal to 4, and return the value 2 if true or the value 1 if false.

Answers

The IF Function based formula that can be entered into cell N2 that will return 2 if true, and 1 if false is =IF(M2 >=4, 2, 1).

How is the IF function used?

An IF function allows us to be able to sort through data by analyzing data to find out if it conforms to a certain characteristic that we are looking for.

If the data corresponds, the IF function will return a value that means True, but if it doesn't, the value returned would be false.

After typing in the IF function, the next thing to do is specify the cell where the data you want to analyze is. In this case that data is in cell M2. You immediately follow this up by the parameter being compared.

In this case, we want to know if the figure in cell M2 is greater or equal to 4 so the next entry is M2>=

The next entry is the return if the comparison is true. In this case, the number for true is 2 and the one for false is 1. The full formula becomes:

=IF(M2 >=4, 2, 1).

In conclusion, the function is =IF(M2 >=4, 2, 1).

Find out more on the spreadsheets at https://brainly.com/question/1429504.

#SPJ1

Find a regular grammar that generates the language L(aa*(ab+a)*)

Answers

Answer:

S → aAB

A → a | ɛ

B → abB | aB | ɛ

Explanation:

Long time ago I did this, but I think this does the job?

Regular grammar for language L(aa*(ab+a)*):

S -> aA, A -> aA | B, B -> ab | a | ε.

We have,

To construct a regular grammar that generates the language

L(aa*(ab+a)*), we need to break it down into its basic components and then define the production rules for each part.

The language L(aa*(ab+a)) consists of strings that start with one or more 'a's (aa), followed by either the string "ab" or just "a" (ab+a)*.

Note that the "ab+a" part can repeat zero or more times.

Here is the regular grammar:

- Start with the initial non-terminal S.

- The production rules are as follows:

S -> aA

A -> aA | B

B -> ab | a | ε

- Explanation of the production rules:

S -> aA: The string starts with an 'a', followed by A.

A -> aA: If the string contains more 'a's, it remains in A and continues adding 'a's.

A -> B: If the string contains "ab" or just "a", it goes to B.

B -> ab: The string contains "ab".

B -> a: The string contains only "a".

B -> ε: The string is empty.

This grammar generates strings in the language L(aa*(ab+a)*).

The notation "ε" represents an empty string (i.e., the production rule does not add any symbols to the string).

Thus,

Regular grammar for language L(aa*(ab+a)*):

S -> aA, A -> aA | B, B -> ab | a | ε.

Learn more about regular grammar for languages here:

https://brainly.com/question/31423942

#SPJ3

How to enter Data into cells in excel

Answers

Answer:

u can enter data into excel by either copy pasting by right clicking or typing It manually in the Fx box located at the top

c) In business, an ethical issue is identifiable problem, situation, or opportunity that requires a person to choose from among several actions that may be evaluated as ethical or unethical. Such a choice often involves weighing monetary profit against what a person considers appropriate conduct. The best way to judge the ethics of a decision is to look at a situation from a customer or competitor’s viewpoint.
As a professional ethics consultant, you are required to discuss in detail, ethical issues in business in the context of their relation to conflicts of interest, fairness and honesty, communications, and business associations.

Answers

The ethical issues in business in the context of their relation to conflicts of interest, fairness and honesty, communications are:

The case of Harassment and Discrimination in regards to the Workplace. The issue of Health and Safety in the Workplace. Ethics in regards to Accounting Practices. The issue of Nondisclosure and that of Corporate Espionage.The issues in regards to Technology and Privacy Practices.

What are Ethical issues?

The term  Ethical issues is known to be if a given decision, event or activity is said to have made a conflict with a society's moral principles.

Note that Both individuals and businesses are known to be one that can be involved in all of the conflicts, since any of those activities can be put to question from the point of ethical view.

Hence, The ethical issues in business in the context of their relation to conflicts of interest, fairness and honesty, communications are:

The case of Harassment and Discrimination in regards to the Workplace. The issue of Health and Safety in the Workplace. Ethics in regards to Accounting Practices. The issue of Nondisclosure and that of Corporate Espionage.The issues in regards to Technology and Privacy Practices.

Learn more about ethical issues from

https://brainly.com/question/13969108

#SPJ1

You are in process of writing a class definition for the class Book. It has three data attributes:
book_title, book_author, and book_publisher. The data attributes should be private.
In Python, write an initializer method that will be part of your class definition. The attributes will
be initialized with parameters that are passed to the method from the main program.
Note: You do not need to write the entire class definition, only the initializer method

Answers

Using the knowledge in computational language in python it is possible to write a code that uses  process of writing a class definition for the class Book.

Writting the code in python:

class Book:

   # a constructor for this class.

   # The constructor should accept an argument for each of the fields.

   def __init__(self, book_title, book_author, book_publisher):

       self.book_title = book_title

       self.book_author = book_author

       self.book_publisher = book_publisher

def main():

   b = Book("title1", "author1", "publisher1")

   print(b.book_title)

   print(b.book_author)

   print(b.book_publisher)

main()

See more about python at brainly.com/question/18502436

#SPJ1

You are investigating a problem between two wireless bridges and you find that signal strength is lower than expected. Which of the following could cause the problem?

A. Wrong SSID

B. Incorrect 802.11 standard

C. Incorrect encryption key

D. Wrong antenna type

Answers

The most likely problem that led to the signal strength is lower than expected is a D. Wrong antenna type

What is a Computer Network?

This refers to the inter-connectivity between wireless bridges to connect a computer system to the world wide web.

Hence, we can see that based on the fact that there is troubleshooting going on about two wireless bridges where the signal strength is lower than expected, the most likely problem that led to the signal strength is lower than expected is a D. Wrong antenna type

Read more about computer networks here:

https://brainly.com/question/1167985

#SPJ1

Capgemini
Which among the following statements are not true?
RPA automates business process service activities by utilising the
presentation layer.
ITPA involves connecting the application servers, databases, operating
system and other components at the IT layer and automates the
process flow and creates the scripts and schedule them at the
scheduler in the Orchestrator.
RPA is completely rule based and works on structured data . It isn't
compatible to be applied on unstructured data.
Cognitive systems self learn from the processes based on historical
patterns.

Answers

Answer:

RPA is completely rule based

TensorFlow and Pytorch are examples of which type of machine learning platform?

Answers

Both TensorFlow and PyTorch are examples of a robust machine learning library.

Saira is having a crisis. For some reason she cannot find a number of products that she knows for a fact she has entered with their details in the worksheet. She has not deleted anything either. Where could have data gone?

Answers

Answer:

Unfortunately, if the power goes out or you accidentally choose “No” when Excel prompts you to save the file, entered but unsaved data disappears from the spreadsheet. Turning on the AutoSave or AutoRecover feature can help recover some data. This feature periodically saves entered data without being prompted.

Python Programming
Create a Dictionary for a bank customer that contains: First Name, Last Name, Account Number, Savings amount and Checking amount. Minimum 3 customer. (each must be different)

Create a Dictionary for a Bank ATM that is made up of the customers from above.

When your program runs it should prompt the user for an account number (must be one in your dictionary).

The user can then select the following options. (stay in a loop until the user ends the session)

Review account information. (Print all the information for that account)

Deposit money to Savings or Checking. (Add amount to account)

Withdraw from Savings or Checking. (Subtract amount from the account. Can’t go below $0).

End session with ATM. (Print a farewell message)

Answers

The python program that creates a Bankaccount class for a Bank ATM that is made up of the customers and has a deposit and withdrawal function is given below:

Python Code

# Python program to create Bankaccount class

# with both a deposit() and a withdraw() function

class Bank_Account:

def __init__(self):

 self.balance=0

 print("Hello!!! Welcome to the Deposit & Withdrawal Machine")

def deposit(self):

 amount=float(input("Enter amount to be Deposited: "))

 self.balance += amount

 print("\n Amount Deposited:",amount)

def withdraw(self):

 amount = float(input("Enter amount to be Withdrawn: "))

 if self.balance>=amount:

  self.balance-=amount

  print("\n You Withdrew:", amount)

 else:

  print("\n Insufficient balance ")

def display(self):

 print("\n Net Available Balance=",self.balance)

# Driver code

# creating an object of class

s = Bank_Account()

# Calling functions with that class object

deposit()

s.withdraw()

s.display()

Read more about python programming here:

https://brainly.com/question/26497128

#SPJ1

Task 03
Write C# code which starts with the number 1 and then displays the result of halving
the previous number until the result is less than 0.001.
The expected output should be:
1.0
0.5
0.25
0.125
0.0625
0.03125
0.015625
0.0078125
0.00390625
0.001953125

Answers

Answer:

class Program {

 public static void Main (string[] args) {

   double number = 1.0;

   while(number >= 0.001) {

     Console.WriteLine (number);

     number /= 2;

   }    

 }

}

Explanation:

Always think carefully about what is in the condition of the while statement. In this case, you want the loop to be executed as long as the number is larger than or equal to 0.001.

Mention and discuss specific professional ethics related to augmented reality, artificial intelligence, and the internet of things?

Answers

Specific professional ethics related to augmented reality, artificial intelligence, and the internet of things are:

OpacityBiasEmploymentPrivacySingularityAutonomous systems

What are the professional ethics of AI systems?

Artificial intelligence often has some dilemma that confronts people who are in this field of duty. Some of the daily challenges that they must face are the ones mentioned above. Opacity is a challenge that even the end-users must face. Often, there is the challenge of not knowing how the program came about.

There is a worry about end-users participating in the process of developing some of these systems. People want to be more involved but since machine learning is not easy, many might not know how the results are generated.

Bias is another problem that augmented reality and the other mentioned fields face. Since the output is predictive in nature, there is often the worry that the machine might generate data that impede human freedom.

Learn more about the professional ethics of AI systems here:

https://brainly.com/question/28158916

#SPJ1

Help!

Write the declaration for a gradient. It may be either gradient type, and consist of any colors.

Answers

Answer:

it may be linear gradient.

Please solve this in JAVA

Please see the attachment

Answers

Answer:

I'm going to do it but you should try these things for yourself or else you won't learn.

Explanation:

-First create a project (I'm using Netbeans 14 and the project is a Maven, but the code should work on any IDE)


-Name the project 'ShoppingCartPrinter' and leave the package name as it is. This is the main class so the main method is gonna be there already.

-Then you will create a second class named 'ItemToPurchase'. So I'll leave the code in the attachment (at the bottom of my answer it's written 'Download txt') or else brainly will think it's some sort of redirection to another websites because of the 'dots' and won't let me post it.






write a pseudocode to accept the item name , price and quantity from a user and display the item name and its total value​

Answers

A pseudocode to accept the item name , price and quantity from a user and show the item name and its total value​

1. start

2. get item title, price, quality

3. set total weight = price * quality

4. print total value, item name

5. stop

What is a pseudocode with example?

Pseudocode is an unnatural and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) configuration tool. The rules of Pseudocode are reasonably clear. All statements showing "dependency" are to be indented.

How is pseudocode used in programming?

Pseudocode is an everyday way of programming description that does not require any strict programming language syntax or underlying technology reviews. It is used for making an outline or a rough draft of a program. Pseudocode outlines a program's flow, but bans underlying details.

To learn more about Pseudocode, refer

https://brainly.com/question/24953880

#SPJ9

Question 1
Write C# code which generates and displays 10 random (integer) numbers between 0 and
50, note that each time this program runs the results are different.

Question 2
Repeat your code from the previous exercise.
In addition to generating the 10 random numbers, display the lowest of the 10 numbers.

Question 3
Repeat your code from the previous exercise.
In addition to the lowest number, display the highest and the average of the 10
numbers.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that generates and displays 10 random (integer) numbers between 0 and 50.

Writting the code in C++

 class SecureRandom : Random

   {

       public static byte[] GetBytes(ulong length)

       {

           RNGCryptoServiceProvider RNG = new RNGCryptoServiceProvider();

           byte[] bytes = new byte[length];

           RNG.GetBytes(bytes);

           RNG.Dispose();

           return bytes;

       }

       public SecureRandom() : base(BitConverter.ToInt32(GetBytes(4), 0))

       {

       }

       public int GetRandomInt(int min, int max)

       {

           int treashold = max - min;

           if(treashold != Math.Abs(treashold))

           {

               throw new ArithmeticException("The minimum value can't exceed the maximum value!");

           }

           if (treashold == 0)

           {

               throw new ArithmeticException("The minimum value can't be the same as the maximum value!");

           }

           return min + (Next() % treashold);

       }

       public static int GetRandomIntStatic(int min, int max)

       {

           int treashold = max - min;

           if (treashold != Math.Abs(treashold))

           {

               throw new ArithmeticException("The minimum value can't exceed the maximum value!");

           }

           if(treashold == 0)

           {

               throw new ArithmeticException("The minimum value can't be the same as the maximum value!");

           }

           return min + (BitConverter.ToInt32(GetBytes(4), 0) % treashold);

       }

   }

See more about C++ code at brainly.com/question/19705654

#SPJ1

Other Questions
Why should outside analysts and investors consider how effectively management has managed the company's tax exposures? Who are primarily responsible for the initial recognition of an opportunity or a problem in marketing research? In a local shop some items are being sold at a third off. They now cost the following amounts. What was the original full price? 40 POINTS AND BRAINLIEST 1.6.462.58.243.114.284.12.505.10.86 A frequently discussed topic in HR is whether organizations need to hire from within (theirown existing employees) or rely on external candidates (new applicants) for managerial roles.What do you think? What may be some cons and pros of each strategy? How successionmanagement can be used as a tool to improve talent retention and employee engagement?Based on the material covered, what would you suggest organizations do? The majority of the nutrients inthe ocean comes from whichsource?A. from tsunamisB. from nutrients that wash into the ocean from the continentsC. from the atmosphere if x = 1/r + 1 then solve the equation xr + 2/3 = 2r (show your work) What can help this rescue dog and firefighters find fearful people and pets stuck in buildings that are on fire? [10] About how many total atp equivalents are generated by the complete oxidation of one molecule of acetyl coa? A(n) _______ statute is intended to protect a state's agricultural, dairy, or beef industries. Why is it necessary to heat the samples prior to collection of the headspace samples? Use the formula to find the standard error of the distribution of differences in sample means, x1-x2. Samples of size 100 from Population 1 with mean 90 and standard deviation 11 and samples of size 85 from Population 2 with mean 71 and standard deviation 15 Round your answer for the standard error to two decimal places. standard error = Enter your answer in accordance to the question statement some crypto exchanges allow their customers to employ leverage and why is this not a good idea , acording to Fool proof what best decribes this sentence Find the surface area of the figure. Round to the nearest hundredth of a unit. Let a = 1.9,b = 0.1, and c = 2 what is the nature of ions formed by different atoms. Scientists who study evolutionary medicine are mainly concerned about bacteria that have become? When mites or fleas live in a dog's fur, what type of relationship is it?A. PredatoryB. ParasiticC. MutualisticD. Monogamous amplitudefrequencytroughwavelength Choose the most appropriate pair of words from the options given below to complete the sentence.She could not ____ the thought of _____ the election to her bitter rival.A) bear, loosing B) bear, losingC) bare, loosing D) bare, losing What have critics suggested regarding piagets understanding of childrens early abilities? As a manager or owner, what insight can accounting information about accounts receivable and bad debts provide you to help make business decisions?