1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
nordsb [41]
3 years ago
10

Trainers at Tom’s Athletic Club are encouraged to enroll new members. Write an application that allows Tom to enter the names of

each of his 25 trainers and the number of new members each trainer has enrolled this year. Output is the number of trainers who have enrolled 0 to 5 members, 6 to 12 members, 13 to 20 members, and more than 20 members.
Computers and Technology
1 answer:
Blababa [14]3 years ago
5 0

Answer:

The applicatiion and its program output are given below

Explanation:

start

    declaration:

  int numberOfMember,totalNumber,j=0

string array05[totalNumber],array612[totalNumber],array1320[totalNumber],arrayMore20[totalNumber]

string trainerName;

Loop start:

           for i=0-totalNumber

                    totalNumber=number of trainers

                    trainerName=name of trainer

                   numberOfMember=number of memberas added

                    if numberOfMember=0-5

                                  array05[j]=trainerName;

                       elseif numberOfMember=6-12

                                      array612[j]=trainerName;

                       elseif numberOfMember=13-20

                                      array1320[j]=trainerName;

                        else

                                 arrayMore20[j]=trainerName;      

                   j+=1;

end loop

Output:

for i=0-j

print    array05[i]    array612[i]    array1320[i]      arrayMore20[i]

End

You might be interested in
Consider what fact-finding techniques you would use to identify the important facts needed to develop a database system. Please
8090 [49]

Answer:

Examples of Fact-finding techniques includes:

  1. Prototyping
  2. Questionnaires
  3. Research and sites visit
  4. Interviews

Explanation:

It is important to note that a database system is a tool that allows users to define, create, maintain, and control access to a collection of logically related data and description of these data, designed to meet the information needs of an organization.

<u>Prototyping </u>

<em>Advantage:</em>  enables testing and understanding of the system in advance before final implementation of solution, while requiring less time for research.

<em>Disadvantage:</em> Training and Development cost consumes resources.

<u>Research and site visit </u>

<em>Advantage :</em> better time management if the problem has been researched upon before.

<em>Disadvantage:</em> appropriate permission is often needed before using research materials.

<u> Questionnaires </u>

<em>Advantage: </em>This technique is not expensive, and responses can be calculated and analysed quickly.

<em>Disadvantage:</em> There may be Incomplete answers received from users and body language of user cannot be observed.

<u>Interviews</u>

<em>Advantage:</em> The body language of interviewees is been perceived.

<em> Disadvantage: </em>Interviewing is time consuming and costly.

3 0
3 years ago
1. Why does a computer have different types of ports?
iren2701 [21]

Answer:

Computer ports are classified into two types based on the protocols used. A protocol is a set of rules and standards to be followed during data transfer and communication. Usually, data is transmitted in a particular pattern.

Explanation:

3 0
2 years ago
Read 2 more answers
In learning information security, it is important to understand that threats to your company's information assets are present 24
coldgirl [10]

1. Acts of human error

<u>Explanation:</u>

Insecurity their are many threats that make a desktop or workstation or laptop.  Normally end users have to update operating systems and virus signature updates by periodic scheduling task moreover to avoid threats end-user also have to do periodic scheduling scanning. And the virus cleaning. Download the third-party malware and spyware and then the cleaning process.

End-users have made sure all required service is activated and running in the organization.

The team has to make sure any software threats are found in PC or workstation or laptop or desktop or LAN and try to remove make system up running without any threats.

8 0
3 years ago
Before creating a brief to design a product, what is needed
castortr0y [4]

Answer:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

Explanation:

A good design brief often begins with some information about the client and what their brand stands for. Including this helps to connect an individual project with the bigger picture. Aim to capture key points about what the company does, how big they are, and what their key products or services are.

8 0
3 years ago
The procurement department of an organization helps to program software. <br> A)True<br> B)False
valina [46]
I think it is true absolutely
8 0
3 years ago
Read 2 more answers
Other questions:
  • How to reset your password if you changed your email and dont remember password?
    6·1 answer
  • How is IT related to new business initiatives?
    6·1 answer
  • How do I learn coding??? ​
    5·2 answers
  • How do you measure objects and re-size them in tinkercad? I need it in steps.
    7·1 answer
  • In regard to protective actions for explosive devices, the area where the blast originates is referred to as ___________ perimet
    8·1 answer
  • The Internet is considered a WAN. *<br><br> True<br> False
    9·1 answer
  • Good ways to increase sales on phone accesories?
    10·2 answers
  • I need some asap pls
    9·2 answers
  • PLS HELP ME!! WILL GIVE BRAINLIEST
    7·2 answers
  • What are the parts of a file?​
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!