1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alchen [17]
3 years ago
6

Type a statement using srand() to seed random number generation using variable seedVal. Then type two statements using rand() to

print two random integers between (and including) 0 and 9. End with newline. Ex:
5
7
Computers and Technology
1 answer:
jek_recluse [69]3 years ago
5 0

Answer:

The solution code is written in C language.

  1.    srand(seedVal);
  2.    printf(" %d \n", rand() % 9);
  3.    printf(" %d \n", rand() % 9);

Explanation:

srand() is a C library function which seeds the random number generator. The srand() function will take one unsigned integer, <em>seedVal</em>, as input parameter (Line 1).

We can print random integer between (and including) 0 and 9 by calculating the random number modulus by 9 (Line 2-3). This will ensure the final random number will also be between 0 and 9.

You might be interested in
Will give brainliest!<br> Who created binary, and does anyone have any idea how?
Sphinxa [80]

Answer:

Gottfried Leibniz created it and Leibniz was trying to find a system that converts logic's verbal statements into a pure mathematical one.

6 0
3 years ago
File Sales.java contains a Java program that prompts for and reads in the sales for each of 5 salespeople in a company. It then
myrzilka [38]

Answer:

import java.util.Scanner;

public class Sales

{

public static void main(String[] args) {

   

    int sum;

    Scanner input = new Scanner(System.in);

   

    System.out.print("Enter number of salespeople: ");

    int salespeople = input.nextInt();

    int[] sales = new int[salespeople];

       

    for (int i=0; i<sales.length; i++)

    {

     System.out.print("Enter sales for salesperson " + (i+1) + ": ");

     sales[i] = input.nextInt();

    }

    System.out.println("\nSalesperson   Sales");

    System.out.println("--------------------");

    sum = 0;

       int maxSale = sales[0];

       int minSale  = sales[0];

       int minId=1;

       int maxId=1;

    for (int i=0; i<sales.length; i++)

    {

               System.out.println("     " + (i+1) + "         " + sales[i]);

 sum += sales[i];

  if(maxSale < sales[i])

           {

               maxSale = sales[i];

               maxId = i+1;

           }

           if(minSale > sales[i])

           {

               minSale = sales[i];

               minId = i+1;

           }

   }

System.out.println("Total sales: " + sum);

       System.out.println("The average sale is: " + sum / salespeople );

       System.out.println("Salesperson "+ maxId + " had the highest sale with "+ maxSale + ".");

       System.out.println("Salesperson "+ minId + " had the lowest sale with "+ minSale + ".");

       

       int amount = 0;

       int counter = 0;

       System.out.print("Enter an amount: ");

       amount = input.nextInt();

       for (int i=0; i<sales.length; i++)

    {

     if(sales[i] > amount) {

         counter++;

         System.out.println("Salesperson "+ (i+1) + " exceeded given amount. (Number of sales: " + sales[i] +")");

     }

    }

       System.out.println("Number of salespeople exceeded given amount is: "+ counter);

}

}

Explanation:

- Ask the user for the number of salesperson

- According to entered number, create an array called sales to hold sale number for each person

- In the first for loop, assign the given sales numbers

-  In the second for loop, print all the sales people with sales, calculate the total sales. Also, find the minimum and maximum sales numbers with associated individuals.

- Print total, average, highest, and lowest sales.

- Ask user enter an amount

- In the third for loop, find the sales people who exceeded this amount.

- Print number of sales people who exceeded the amount.

8 0
3 years ago
Is Naab a system of an accounting system? A factory operations system? or both? explain your answer
KonstantinChe [14]

Answer:

accounting system

Explanation:

The most common response variable modeled for cropping systems is yield, whether of grain, tuber, or forage biomass yield. This yield is harvested at a single point in time for determinate annual crops, while indeterminate crops and grasslands may be harvested multiple times. Although statistical models may be useful for predicting these biological yields in response to some combination of weather conditions, nutrient levels, irrigation amounts, etc. (e.g., Schlenker and Lobell, 2010, Lobell et al., 2011), they do not predict responses to nonlinearities and threshold effects outside the range of conditions in data used to develop them.

In contrast, dynamic cropping and grassland system models may simulate these biological yields and other responses important to analysts, such as crop water use, nitrogen uptake, nitrate leaching, soil erosion, soil carbon, greenhouse gas emissions, and residual soil nutrients. Dynamic models can also be used to estimate responses in places and for time periods and conditions for which there are no prior experiments. They can be used to simulate experiments and estimate responses that allow users to evaluate economic and environmental tradeoffs among alternative systems. Simulation experiments can predict responses to various climate and soil conditions, genetics, and management factors that are represented in the model. “Hybrid” agricultural system models that combine dynamic crop simulations with appropriate economic models can simulate policy-relevant “treatment effects” in an experimental design of climate impact and adaptation (Antle and Stockle, 2015).

5 0
2 years ago
Which part of the ethernet address is assigned to vendors to identify the equipment?
Nitella [24]

First three bytes of the ethernet address exists assigned to vendors to identify the equipment.

<h3>What is Ethernet address?</h3>

A media access control address stands for a unique identifier allocated to a network interface controller for usage as a network address in communications within a network segment. This use exists as standard in most IEEE 802 networking technologies, including Ethernet, Wi-Fi, and Bluetooth.

This address exists as the identifying mark that allows a networked computer to communicate with the Internet. The ethernet address exists how we can associate an “IP address” to an individual computer — without this– number, there's no form to access any servers, websites, email, etc.

The first three bytes (pairs of hexadecimal characters) of any unicast address include that vendor address component of the MAC address. The staying three bytes carry the serial number of that vendor's interface card. Dell, Inc. Apple, Inc.

Hence, first three bytes of the ethernet address exists assigned to vendors to identify the equipment.

To learn more about Ethernet address refer to:

brainly.com/question/7284219

#SPJ4

4 0
1 year ago
How to disable iCloud music library? When I go into settings or music or even iTunes the iCloud music library switch doesn’t pop
Komok [63]
It may be a glitch in the settings, or it may a parental block
8 0
3 years ago
Other questions:
  • Which of the following characters at the beginning of a cell signifies to Excel that it should perform a calculation for the val
    13·1 answer
  • Describe the following software process models using your own words .Your explanation should also provide an example of a softwa
    12·1 answer
  • Write 3 things that can't be done without technology. write your opinion?
    14·2 answers
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
  • Ania has written this SimpleStopwatch class. In which line is she measuring the elapsed time?
    13·1 answer
  • What makes a source credible?
    9·2 answers
  • 2. How much did John Jones have in his account on the first day of the
    5·1 answer
  • Simple Java programming
    15·2 answers
  • What type of malicious software technology is used to download and install software without the user's interaction?
    12·1 answer
  • // This pseudocode is intended to describe
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!