=SUM(b4:b6) If it doesn't show the $ sign just make sure it's in currency :) I hope this helped!! Good Luck!!! :)
Answer:
public class Main
{
// required method
public static void fizzBuzz(){
// looping through 1 to 100
for(int i = 1; i <= 100; i++){
//if number is evenly divisible by both 3 and 5
if(i%3 == 0 && i%5 == 0){
System.out.println("fiz buzz");
}
// if number is divisible by 3
else if (i%3 == 0){
System.out.println("fizz");
}
// if number is divisible by 5
else if (i%5 == 0){
System.out.println("buzz");
}
// if number is not divisible by both 3 and 5
else {
System.out.println(i);
}
}
}
// main method
public static void main(String[] args) {
//calling function
fizzBuzz();
}
}
Explanation:
Answer:
The function written in C++
int str(string word)
{
int count = 1;
for(int i =0; i<word.length();i++)
{
if(word[i] == ' ')
{
count++;
}
}
return count;
}
Explanation:
This line defines the function
int str(string word)
{
This line initializes count to 1
int count = 1;
This line iterates through the input string
for(int i =0; i<word.length();i++)
{
This line checks for blank space
if(word[i] == ' ')
{
Variable count is incremented to indicate a word count
count++;
}
}
return count;
}
<em>See attachment for full program</em>
Answer: Cyber warfare is a real threat since being able to hack another computer especially a countries computer with lots of info in their weaknesses can lead to their downfall. Since they can even possibly if their skilled enough hack their entire data base system and leak it to the public and that wouldn't be good for them not in a single possible way. That's the reason it's dangerous not only that but also because they can access their servers; which can let them access anything online from the whole country including banking information military info which can let them know which area there gonna go to next equipment there gonna bring and where they're gonna launch missiles, bombs, even nukes if they decide to launch one. And being able to hijack the computer that launches the nukes can make the hacker launch the nuke to a different place or launch the nuke on the country trying to launch the nuke.
Explanation:
Answer: E) The CPU executes the instruction by performing ALU operations.
Explanation: The execution cycle is of three stages namely; fetch, decode and execute. These are the functions that the CPU carries out from the time of boot-up up until it's shut down.
At the fetch stage, the computer retrieves program instructions from its memory register, at the decode stage; the decoders interprets the instructions from the instructions register and then the next stage will be the executions, at this stage; the interpreted instructions are then passed to relevant function units of the CPU to carry out the required instructions.
E.g mathematical and logic functions are passed on the ARITHMETIC AND LOGIC UNIT(ALU) to perform.