1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Cerrena [4.2K]
3 years ago
12

Write a program that produces the following output:

Computers and Technology
1 answer:
Bess [88]3 years ago
3 0

Answer:

ccccccccc+ccccc

Explanation:

uhh idk

You might be interested in
A company database consists of 10,000 sorted names, 40% of whom are known as good customers and who together account for 60% of
vladimir2022 [97]

Answer:

The answer is "binary search= 5.111 and Linear seacrch= 6400".

Explanation:

Following are the description of this question:

  • Binary Search-The performance with single arrays is log 10000 = 4, through the use of two arrays (60/100)*log4000 + (40/100)*(log4000 + log6000) = 5.111.  
  • In the linear search: while doing static searches, 10000 would be performed, and (60/100)*4000 + (40/100)*6000 = 6400 will be used with two arrays.  
  • It's a special case, that will be used in one of the arrays in a binary search. Whereas good case uses linear frames, two frames are used, as indicated above.
7 0
3 years ago
Effective resource management: a. Locks out unauthorized access and can work to prevent changes to resources by internal users n
alexgriva [62]

Answer:

c. Enables a security administrator to control user and resource access from individual machines rather than from a central location.

Explanation:

Effective resource management requires that network resources or databases be accessed securely or protected from unauthorized users. A company with an effective resource management policy like Amazon cloud services and Google cloud services allows for an administrator to Grant access to a group of users with configured individual devices.

6 0
4 years ago
python Consider this data sequence: "3 11 5 5 5 2 4 6 6 7 3 -8". Any value that is the same as the immediately preceding value i
Vika [28.1K]

int firstNumber,secondNumber = -1, duplicates = 0;

do {

cin >> firstNumber;

if ( secondNumber == -1) {

secondNumber = firstNumber;

}else {

if ( secondNumber == firstNumber )

duplicates++;

else

secondNumber = firstNumber;

}

} while(firstNumber > 0 );

cout << duplicates;

7 0
4 years ago
6. Larger Than n In a program, write a function that accepts two arguments: a list, and a number n. Assume that the list contain
Reika [66]

Answer:

The solution code is written in Python

  1. def largerThanN(myList, n):
  2.    output = ""
  3.    for x in myList:
  4.        if(x > n):
  5.            output += str(x) + " "
  6.    
  7.    print(output)
  8. l = [5, 12, 11, 4, 56, 32]
  9. n = 15
  10. largerThanN(l, n)

Explanation:

Firstly, create a function largerThanN that accepts two arguments, a list (myList) and a number (n) (Line 1).

Next, create a output variable to hold the string of numbers in the list that are greater than the input number n (Line 2).

Create a for loop to traverse through each number in the list and then check if the current x is bigger than n. If so concatenate the x to output string along with a single space " " (Line 4 -6)

After the loop, print the output string (Line 8)

We test the function by using a sample list and n = 15 (Line 10 - 12). The program will display 56 32 .

6 0
3 years ago
For this project, you have to write 3 functions. C++
JulsSmile [24]

Find the given attachments

4 0
4 years ago
Other questions:
  • Develop an EER model for the following situation using the traditional EER notation, the Visio notation, or the subtypes inside
    8·1 answer
  • We may think of relationships in the E/R model as having keys, just as entity sets do. Let R be a relationship among the entity
    14·1 answer
  • SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and
    12·1 answer
  • How long is the latency time of a typical hard-disk drive spinning at 360 revolutions per second?
    6·1 answer
  • The use of IDPS sensors and analysis systems can be quite complex. One very common approach is to use an open source software pr
    9·2 answers
  • Which of the following SNSs has been associated with art work display?
    14·2 answers
  • Give three reasons why Black hats hack?
    8·2 answers
  • Rita wants to know the size of each image in a folder. Which view will help her find this information quickly?
    13·1 answer
  • Please help to question 16 and 17 please
    10·1 answer
  • Why is internet download speed slower on a computer vs phone
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!