The program that calculates and then prints interest earned on a bank balance is given below:
The Program#include <bits/stdc++.h>
using namespace std;
int main()
{
double principle = 10000, rate = 5, time = 2;
/* Calculate compound interest */
double A = principle * (pow((1 + rate / 100), time));
double CI = A- principle;
cout << "Compound interest is " << CI;
return 0;
}
Read more about programming here:
https://brainly.com/question/23275071
#SPJ1
Given the snippet of codes, identify the passing mechanism used for x (in function) void func(int *x, int y) {
*x = *x + y; y = 2;
}
call-by-name call-by-value call-by-reference call-by-address
The passing mechanism used for x in the given snippet of codes is "call-by-address".
The passing mechanism used for x in the given function is call-by-address. What is a passing mechanism? A passing mechanism is a method for passing parameters to a function. It determines the technique used to provide values to a function call's formal parameters, which are its local variables. Depending on the programming language and compiler, different passing mechanisms may be used. Given the snippet of codes, the passing mechanism used for x (in function)void func(int *x, int y) {
*x = *x + y; y = 2;
}The code is utilizing a call-by-address method because the variable "x" is being passed as a pointer in the function. When a pointer is used, instead of the actual value, the function gets the address of the variable being passed. This means that the function will modify the value of the variable passed, and the changes will be permanent.
learn more about coding here:
https://brainly.com/question/17204194
#SPJ11
A pop up blocker is a web browser feature that?
Answer:
blocks websites so you cant do them if your taking a test some of them wont allow pop up blockers and you will not be able to take the test or a website that does not accpet pop up blockers
Explanation:
Answer: prevents unwanted advertisements
Explanation:
New forensics certifications are offered constantly. Research certifications online and find one not discussed in this chapter. Write a short paper stating what organization offers the certification, who endorses the certification, how long the organization has been in business, and the usefulness of the certification or its content. Can you find this certification being requested in job boards?
Answer:
Computer forensics is gathering information or evidence from a computer system in order to use it in the court of law. The evidence gotten should be legal and authentic.
These organization gives certifications for computer forensics
1. Perry4law: they provide training to students, law enforcement officers. There services includes forensics training, research and consultancy.
2. Dallas forensics also offers similar services
3. The New York forensics and electronic discovery also teach how to recover files when deleted, how to get information from drives and how to discover hidden information.
I lost the charger. How do I charge this camera without the charger?
Answer:
possibly a new battery????
Answer:
See below
Explanation:
This is from the manual for your camera:
(just plug the larger USB into a USB power source/brick/computer to charge the battery )
What can you do using the start menu in windows 10
Answer:
The start menu in windows 10 has similarities.
Explanation:The windows 10 is start menu and start screen. Installed windows 10 on a PC, the start button after windows appear start menu.Windows app you can access windows apps right the menu. click the left display all apps installed your personal computer. click right to open a window app NEWS,MAIL, or CALENDAR. POWER button at the bottom of the left side, and display the to shut down and restart.
Right click your account name at the top the menu.You add files explorer to taskbar.Simply click the option you needed
Explain how you would find a book on a given subject in the library.
Answer:
In case I am looking for a specific book in a library, the way in which I would try to find it would be through consulting the library guide, or through inspection of the different books of the specific sector with which the book I'm looking for is listed, or by asking the library staff to help me with my search.
What will the operator 1 AND 1 return ?
The operator 1 AND 1 return will be Basic Binary Math" module for a refresher as CIDR simplifies how routers and different community gadgets want to consider the elements of an IP address.
What is the operator ?In arithmetic and on occasion in pc programming, an operator is an individual that represents an action, as for instance, x is a mathematics operator that represents multiplication.
The 1 and 1 return 1 if the least good sized little bit of x is 1 else zero . 1 & 1 = 1 , zero & 1 = zero . That's how the operator is defined. Any bit besides the ultimate one is zero due to the fact it is zero in 1.
Read more about operator:
https://brainly.com/question/25974538
#SPJ2
Q1: Which of the following three is the
strongest password?
1 starwars
2 1qaz2wsx
3 trEEGCV-
Answer:
2
Explanation:
It has a lot of different alphabets and numbers
Among the given ones, the most strong password is trEEGCV-. The correct option is 3.
What is password?Passwords are character sequences used to authenticate and gain access to a computer system, application, or online account.
A strong password should be unique, complex, and difficult to guess. It is typically made up of upper and lowercase letters, numbers, and symbols.
It is a secret word or expression used by authorized individuals to demonstrate their right to access, information, and so on.
The strongest password is "trEEGCV-," which contains a mix of upper and lowercase letters, numbers, and special characters. It is also longer than the other two passwords, making cracking it more difficult.
Thus, the correct option is 3.
For more details regarding password, visit:
https://brainly.com/question/30482767
#SPJ2
What’s the output of the following code?
The output for the given program is 3.
What is a Computer Program?This refers to the set of instructions that a programmer gives to a computer that is converted from the source code to machine-readable format in order to perform a specific task.
Hence, it can be seen that from the given code:
C = 1
sum = 0
Then, the conditional statement while ( c < 10), is given which means that the next lines of code are valid if the values of c ranges from 1 to 9.
But if it is from 10 and above, it would terminate at that line.
Then, c= c + 2
Which means the value of c would be added to 2
Which is 1 + 2 = 3
Then sum is sum + the value of c which is 3
Recall that sum = 0
Thus, 0 + 3 is 3
Read more about computer programs here:
https://brainly.com/question/23275071
#SPJ1
Which level of abstraction in computing systems uses a series of switches
that can be turned on and off?
A. Communication systems
OB. Applications
OC. Data
OD. Programming
Answer: C. Data
Explanation:
Identify the class of the address, the number of octets in the network part of the address, the number of octets in the host part of the address, the network number, and the network broadcast address g
Answer:
1.
190.190.190.190
Class B
Number of octets in the network part of the address: 2
Number of octets in the host part of the address: 2
Network number: 190.190.0.0/16
Network broadcast address: 190.190.255.255
2.
200.1.1.1
Class C
Number of octets in the network part of the address: 3
Number of octets in the host part of the address: 1
Network number: 200.1.1.0/24
Network broadcast address: 200.1.1.255
Explanation:
What word can you type using only the left home row keys and the right reach keys?
Band
Hands
Finds
Kind
Answer:
bands or hand is your answer
The word that can be typed using only the left home row keys and the right reach keys is "Hands".
Given,
Words.
Here,
''Hands'' : This word can be typed by placing your left hand on the ASDF keys (the left home row keys) and reaching your right hand to the JKL; keys (the right reach keys).
By doing so, you can type the word "Hands" without having to move your hands from the home row position.
Know more about keyboard typing,
https://brainly.com/question/6603125
#SPJ4
Difference between Extended partition and logical partition
The difference between extended partition and logical partition is extended partition creates four types of partition and the partition created by extended partition are called logical partition.
What is logical partition?A logical partition (LPAR) is a type of computer division of memory, processor, and storage into several compartments so that each of one can be operated individual.
Thus, the difference between extended partition and logical partition is extended partition creates four types of partition and the partition created by extended partition are called logical partition.
Learn more about logical partition
https://brainly.com/question/4671389
#SPJ1
java an array of ints, arr, has been declared and initialized. write the statements needed to reverse the elements in the array. so, if the elements were originally 5, 13, 4, 97 then after your code executes they would be 97, 4, 13, 5.
Java allows you to use a straightforward loop to swap the first and last elements, the second and second-to-last elements, and so on until the array's middle is reached.
What if the elements were 5 13 4 97 at first?As a result, if the elements were initially 5, 13, 4, 97, they would become 97, 4, 13, 5 after your code had run.
INT(ARR) = 5, 13, 4, 97;
Use a loop for (int I = 0; I arr.length / 2; i++) to swap the components. Integer temp equals arr[i], arr[i] equals arr[arr.length - 1 - I and arr[arr.length - 1 - I equals temp.
System.out.println(Arrays.to String(arr)); / Display the array in reverse. / Output: [97, 4, 13, 5]
To know more about Java visit:-
https://brainly.com/question/29897053
#SPJ1
What is wrong with the following circuit?
Nothing. This circuit has no mistakes.
The NOT gate should only two input.
There should be only one output from the OR gate.
The AND gate should have one input and two outputs.
How are special characters added to a Word document
Answer:
through symbols
Explanation:
you have to press insert, symbols, more and then scroll until you find your symbol
The symbols thing might look like ♎
Identify and describe the three basic operations used to extract useful sets of data from a relational database?
The select operation, The join operation, The project operation are the three basic operations used to extract useful sets of data from a relational database.
Describe the three basic operations used to extract useful sets of data from a relational database?The select operation generates a subset from the table's records (rows) that satisfy the specified criteria. Relational tables are joined together to offer the user access to more data than is contained in each table alone. The project procedure generates a subset of the table's columns, enabling the user to construct new tables that only include the necessary data.
What actions are performed in a relational DBMS?Relational algebra has five fundamental operations: Set Difference, Union, Cartesian Product, and Selection. Most required data retrieval activities are carried out by them.
To know more about database visit
brainly.com/question/29412324
#SPJ4
T/F - Performing regular system backups and identifying potential problem areas are examples of reactive maintenance.
False. Performing regular system backups and identifying potential problem areas are examples of proactive maintenance.
What is proactive maintenance?
Proactive maintenance involves taking preventative measures to reduce the likelihood of equipment failures or other issues. It can include activities such as performing regular system backups to protect against data loss, identifying potential problem areas and addressing them before they cause issues, and performing routine inspections and maintenance to keep equipment in good working order.
What is reactive maintenance?
Reactive maintenance, on the other hand, involves repairing equipment or addressing issues after they have already occurred. It is a more reactive approach that focuses on fixing problems as they arise, rather than taking preventative measures to avoid them.
To learn more about System maintenance, visit: https://brainly.com/question/13484623
#SPJ4
Describe how customer facing and technical data roles differ in their approach to data security policies.
Customer-facing data roles as well as the technical data roles are those that often differ in terms of their method to data security policies and this is as a result of their different responsibilities as well as functions inside of an organization.
What is the data security policies?In terms of Customer-facing data roles, the Customer-facing data roles is one that entails interacting with customers or any kind of clients as well as managing their data.
Therefore , In the area of data security policies, customer-facing data roles can have focus on : Data privacy as well as Access control:
Learn more about data security policies from
https://brainly.com/question/29790745
#SPJ1
Represent the following code in using Flowchart:
Using while loop, write a Python program that will print on the screen numbers from 1 till 100.
Answer:
n=100
while n>0:
print(n)
n=n-1
Explanation:
you'll substact 1 from n(which is 100) until n is equal to 0
Click on three software applications that you can use to create a resume?
The three software applications that are applied for creating the resume are the word, writer, and the pages.
The information related to the resume is as follows:
It is a formal document made by the applicant for applying to the job. It should be along with the cover letter where the applicant shows interest in the particular job. Also, three types of software applications should be used for developing the resume i.e. word, writer, and the pages.
Therefore we can conclude that the three software applications that are applied for creating the resume are the word, writer, and the pages.
Learn more about the resume here: brainly.com/question/22931067
Some commands listed in a menu cannot be selected.
True or False
Answer:
Explanation:
it is true
Your point of view regarding the comparison of G suite vs MS Office 365
Easy-to-use online versions of Office 365's well-known programs, including Word, Excel, Outlook, and PowerPoint, are available. G Suite provides online versions of its well-known applications.
How do Drive and Microsoft Office 365 differ from one another?For Outlook, Word, Excel, PowerPoint, and OneNote, Microsoft 365, formerly known as Office 365, offers web, desktop, and mobile programs. To access files and documents and save them safely, use Drive, a cloud storage and backup platform.
How do Microsoft 365 and Microsoft Suite differ from one another?Products included in the Office 365 suite are referred to as "Microsoft Office 365." Microsoft has made a set of teamwork tools called the Office 365 suite available to help with business. These include Microsoft Teams, OneDrive, Microsoft Word, and Microsoft Exchange.
To know more about MS Office 365 visit:-
https://brainly.com/question/13785978
#SPJ1
Select the correct answer.
Hari has purchased a new computer. Which software will start running the moment he turns on his system?
O A. word processor
О в. disk cleaner
O C. operating system
O D. data recovery utility
Answer:
I think operating system
Explanation:
Write a program in Java to implement a recursive boolean function verify that returns True if the given array contents remain the same when array is reversed, i.e., when last element is equal to the first element, second last element is equal to the second element and so on. Otherwise function verify must returns False. Examples: Input: arr[] = {12, 32, 67, 32, 12} Output: True Input: arr[] = {1, 2, 3, 4, 5} Output: False
Answer:
class Main {
public static boolean verify(int[] a) {
for(int i=0;i<a.length/2;i++) {
if (a[i] != a[a.length-i-1]) {
return false;
}
}
return true;
}
public static void main(String[] args) {
int arr1[] = {12, 32, 67, 32, 12};
int arr2[] = {1, 2, 3, 4, 5};
System.out.println("arr1: " + (verify(arr1) ? "True" : "False"));
System.out.println("arr2: " + (verify(arr2) ? "True" : "False"));
}
}
Explanation:
This is called a palindrome.
On line two, you take a string, word, as input. Then, using that string...
1. In the first line of your output, print the third character of this string.
2. In the second line, print the second to last character of this string.
3. In the third line, print the first five characters of this string.
4. In the fourth line, print all but the last two characters of this string.
5. In the fifth line, print all the characters of this string with even indices
(remember indexing starts at 0, so the characters are displayed starting
with the first)
6. In the sixth line, print all the characters of this string with odd indices
(1.e. starting with the second character in the string).
7. In the seventh line, print all the characters of the string in reverse order.
8. In the eighth line, print every second character of the string in reverse
order starting from the last one.
9. In the ninth line, print the length of the given string,
Answer:
7
Explanation:
This one obtains results that the others in particular do not have, whether it is even one more word or another initial sentence
What is output if the user enters -5?
What is the output if the user enters 7? Edhesive 7.4 Lesson Practice
Answer:
for question 3 answer : 4 question4: its 28
Explanation:
x+7*2
The output if the user enters -5 is 4, while the output if the user enters 7 is 28. Both of these outputs will eventually depend on the program which is executed by a specific language.
What is the significance of the output of programming language?Programming languages use classes and functions that control commands. The reason that programming is so important is that it directs a computer to complete these commands over and over again, so people do not have to do the task repeatedly. Instead, the software can do it automatically and accurately.
According to the context of this question, the actual number is the first output is found to be 1 and when -5 is added into it, it gives an output of 4. The same principle is applied in the second question as well but the actual number, in this case, would be different to it determines a different output.
Therefore, the output if the user enters -5 is 4, while the output if the user enters 7 is 28. Both of these outputs will eventually depend on the program which is executed by a specific language.
To learn more about Programming languages, refer to the link:
https://brainly.com/question/16936315
#SPJ2
ITIL 4: Which of the following TRUE with respect to Practices in ITIL®?
A Practices are independents activities outside SVC
B: practice is just a new name given for process
C: practices support multiple activities within Value chain
D: every practice is tightly linked to a specific activity within value chain
Answer:
m
Explanation:
it would be c cause i take the test
The option that is true with respect to Practices in ITIL is that its practices support multiple activities within Value chain.
What are ITIL practices?ITIL is known to be the background of all the best methods used for delivering IT services.
Conclusively, the key element in the ITIL SVS is known to be the Service Value Chain as it uses an operating model for service delivery. Its practices aids the use of different activities within Value chain.
Learn more about Practices from
https://brainly.com/question/1147194
Write a SELECT statement to create a lesson schedule for Feb 1, 2020 with the lesson date/time, student's first and last names, and the horse's registered name. Order the results in ascending order by lesson date/time, then by the horse's registered name. Make sure unassigned lesson times (student ID is NULL) appear in the results.
SELECT statement are used to retrieve data from a database table
The SELECT statement that creates the lesson schedule is:
SELECT LessonDateTime, HorseID, FirstName, LastName FROM LessonSchedule JOIN Student ON LessonSchedule.StudentID = Student.ID ORDER BY LessonDateTime ASC, HorseID
How to determine the SELECT statementTo write the select statement, we start by writing the following query that retrieves Lesson date/time, horse ID, first name, and last name from the lesson schedule table.
So, we have:
SELECT LessonDateTime, HorseID, FirstName, LastName FROM LessonSchedule
Next, the query would confirm the presence of a student ID in the lesson schedule table and the student table using the JOIN statement
JOIN Student ON LessonSchedule.StudentID = Student.ID
From the question, we understand that:
The result should be sorted in ascending order by lesson date/time.
This is represented as:
ORDER BY LessonDateTime ASC, HorseID
Hence, the complete query is:
SELECT LessonDateTime, HorseID, FirstName, LastName FROM LessonSchedule JOIN Student ON LessonSchedule.StudentID = Student.ID ORDER BY LessonDateTime ASC, HorseID
Read more about database at:
https://brainly.com/question/24223730
What is the software of Apple