1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Delicious77 [7]
3 years ago
14

Suppose that you want to write a program that inputs customer data and displays a summary of the number of customers who owe mor

e than $1000 each, in each of 12 sales regions. Customer data variables include name, zip-Code, balance Due, and region Number. At some point during record processing, you would add 1 to an array element whose subscript would be represented by _____. a. name
b. zip Code
c. balance Due
d. region Number
Computers and Technology
1 answer:
Allushta [10]3 years ago
3 0

Answer:

The correct option is D = regionNumber

Explanation:

In this scenario we want to know customers who owe more than $1000 each, in each of 12 sales regions. And the customer data variables include name, zip-code, balanceDue and regionNumber; based on the customer data variables names and zip-code will not really affect our output. It is based on balanceDue that we increment the number of customer owing in a particular region (regionNumber).

Therefore, we would add 1 to an array element whose subscript would be represented by regionNumber since we are interested to know the number of customer owing in each of the 12 sales regions.

You might be interested in
____ a device receiving a process variable
Tanya [424]

Answer:

Transmitter

Maybe this is the answer or the question is wrong.

Explanation:

In the world of process control, a Transmitter is a device that converts the signal produced by a sensor into a standard instrumentation signal representing a process variable being measured and controlled.

6 0
3 years ago
Which term describes an event where a person who does not have the required clearance or access caveats comes into possession of
notka56 [123]

Answer:

The answer is "compromise"

Explanation:

In computer science, the comprised system is used to describe as any technological resource, that has been negatively affected by an untrustworthy source for nondisclosure, integrity or accessibility either deliberately or inadvertently.

  • In this, the mechanical interaction from the unauthorized source or technological progress can result in compromise.
  • This helps you and the partner to meet each other's interests by taking into consideration both the positions and the solution to the main problem.

4 0
3 years ago
Read 2 more answers
Free points ♡
forsale [732]

Answer:

dax and dear god, also my heart hurts

Explanation:

they are great so is he u should listen to him

4 0
3 years ago
Read 2 more answers
The node of a doubly linked list contains _____.
meriva

Answer:

Hi!

The correct answer is one data field and two links fields.

Explanation:

The node of a doubly-linked list contains one data field, and two links fields that references to the next node on the list and another one link field that references to the previous node in the sequence of nodes).

3 0
3 years ago
A ribbon is broken into 3 parts - name them. (From Microsoft Word 2016)
BARSIC [14]

Answer:

The Ribbon is composed of three parts: Tabs, Groups, and Commands.

4 0
3 years ago
Other questions:
  • If you use a surrogate key, you must ensure that the candidate key of the entity in question performs properly through the use o
    5·1 answer
  • Changing the user name in the word application is completed through the __.
    10·2 answers
  • The ____ function sums the numbers in the specified range and then divides the sum by the number of cells with numeric values in
    14·1 answer
  • There are several factors that can substantially affect the consumer search process. Match the factor with an example of how the
    5·1 answer
  • You have just driven to the Hewlett-Packard site in Corvallis to field-interview a programmer. You sit down in a conference room
    6·1 answer
  • Suppose we are performing a binary search on a sorted array called numbers initialized as follows: // index 0 1 2 3 4 5 6 7 8 9
    9·1 answer
  • What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
    11·1 answer
  • Write an algorithm that receives a number from the user (you can store the number in a variable called N). Then the algorithm sh
    8·1 answer
  • The tag that describes the content of the web page is ________________
    5·1 answer
  • Can you anyone please help me​
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!