1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
r-ruslan [8.4K]
2 years ago
7

A combined counting and logical looping statement may be needed in the following situations: (a). The values stored in a linked

list are to be moved to an array, where values are to be moved until the end of the linked list is found or the array is filled, whichever comes first. (b). A list of values is to be read into an array, where the reading is to terminate when either a prescribed number of values have been read or some special value is found in the list. (c). A list of values is to be added to a SUM, but the loop is to be exited if SUM exceeds some prescribed value. (d). The combination will always mess up since they are different types of variables.
Computers and Technology
1 answer:
sergejj [24]2 years ago
5 0

Answer:

a i think

Explanation:

You might be interested in
Write a program that determines the value of the coins in a jar and prints the total in dollars and cents. Read integer values t
Shalnov [3]

Answer:

The programming language is not stated. To answer this question, I'll make use of python programming language.

<em>The following units of conversions is used in this program</em>

<em>1 quarter = $0.25</em>

<em>1 dime = $0.10</em>

<em>1 nickel = $0.05</em>

<em>1 penny = $0.01</em>

<em>$1 = 100 cents</em>

This program makes use of few comment (See explanation for line by line explanation)

Having listed the above, the program is as follows:

#prompt user for inputs

quarters = int(input("Number of Quarters: "))

dimes = int(input("Number of Dimes: "))

nickels = int(input("Number of Nickels: "))

pennies = int(input("Number of Pennies: "))

#Convert coins to dollars

dollar = 0.25 * quarters + 0.10 * dimes + 0.05 * nickels + 0.01 * pennies

print("Dollar Equivalent")

print(str(round(dollar,2))+" dollars")

cent = dollar * 100

print("Cent Equivalent")

print(str(round(cent,2))+" cents")

Explanation:

This first line is a comment

#prompt user for inputs

This line prompts user for value of quarters in the jar

quarters = int(input("Number of Quarters: "))

This line prompts user for value of dimes in the jar

dimes = int(input("Number of Dimes: "))

This line prompts user for value of nickels in the jar

nickels = int(input("Number of Nickels: "))

This line prompts user for value of pennies in the jar

pennies = int(input("Number of Pennies: "))

Using the coin conversion listed in the answer section, the user inputs is converted to dollars in the next line

dollar = 0.25 * quarters + 0.10 * dimes + 0.05 * nickels + 0.01 * pennies

The string "Dollar Equivalent" is printed using the next line

print("Dollar Equivalent")

This line prints the dollar equivalent of the converted coins

print(str(round(dollar,2))+" dollars")

Using the coin conversion listed in the answer section, the user inputs is converted to cents in the next line

cent = dollar * 100

The string "Cent Equivalent" is printed using the next line

print("Cent Equivalent")

This line prints the cent equivalent of the converted coins

print(str(round(cent,2))+" cents")

Please note that the dollar and cent equivalents are rounded to two decimal places. Even though, it's not a requirement of the program, it's a good programming practice

7 0
4 years ago
What has the dogo argentino been bred to do?​
Law Incorporation [45]

Answer:

it was bred for big-game hunting. the bred is known for its bravery and is willingness to protect its human companion.

3 0
4 years ago
John have subscribed to a cloud-based service to synchronize data between your mobile device and your PC. Before allowing the da
xeze [42]

Answer: Mutual authentication

Explanation: Mutual authentication could be referred to a vetting process where the two entities in communication authenticate each other, it could also be referred to as a two-way authentication.

In the scenario above, the cloud service or server authenticates itself with the client and the client authentication itself with the cloud service server by verifying or vetting the certificates of both communicating entities before a secure encrypted connection would be established or created.

8 0
3 years ago
Read 2 more answers
What term describes a wireless network topology in which access points work as peer devices on the same network?
kumpel [21]
Mesh WLAN wireless mesh network WMN describes a wireless network topology in  access points work as peer devices on the same network.
<span />
7 0
3 years ago
At each layer of the OSI model, data is appended to the original message and then sent on to the next lower layer. What is this
Makovka662 [10]

Answer:

Encapsulation

Explanation:

There are seven layers in the OSI network model. These layers are, application, presentation, session, transport, network, data-link and physical layer.

Each layer of the OSI model has a PDU or protocol data unit. These PDUs are form by encapsulation.

The application, presentation and session data. When it moves to the transport layer, it is encapsulated within the transport header. This new pdu is called segment.

This process continues in network and data-link to give packet and frame PDUs respectively.

5 0
3 years ago
Other questions:
  • Which of the following is NOT an example of systems software?
    9·1 answer
  • Write a C++ program that reads students' names followed by their test scores. The program should output each students' name foll
    9·1 answer
  • Whaat was the first sound recording machine
    12·2 answers
  • In Windows 2000 and later, the ____ command shows you the file owner if you have multiple users on the system or network.
    15·1 answer
  • Which entity might hire a computer systems analyst to help catch criminals?
    14·2 answers
  • Which internet resource can you use to publicly describe an adventure trip you recently made?
    6·2 answers
  • When using a file name you have to use only lower case letters<br>true or false
    11·1 answer
  • What are two ways you can open an application?
    11·2 answers
  • Jenny has entered data about models of laptops from company A and company B in a worksheet. She enters model numbers of laptops
    10·1 answer
  • What are the nuclear codes?
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!