1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Julli [10]
3 years ago
5

We want to make a row of bricks that is goal inches long. We have a number of small bricks (1 inch each) and big bricks (5 inche

s each). Return true if it is possible to make the goal by choosing from the given bricks. This is a little harder than it looks and can be done without any loops.
Computers and Technology
1 answer:
Lunna [17]3 years ago
3 0

Answer and Explanation:

This is little harder than it looks and can be done without using loops. Lets take Bricks method to make a program.

Bricks ( 3 ,1 , 8)

Bricks ( 3 , 1 , 9 )

Bricks ( 3, 2 , 10 )

public  boolean Bricks ( int small , int big , int goal ) {

if (goal > big * 5 + small)

return false;

if ( goal % 5 > small)

return false:

}

OR

public  make_bricks( int small, int big, int goal):

  if (goal % 5) < =  big:  

      if (goal % 5) <= small:  

        return True

      else:  

        return False

  if (goal % 5) > = big:

      if (goal - (big*5)) <= small:

        return True

      else:

        return False

You might be interested in
Which keyboard shortcut can you use to copy data from a cell? HURRY UP PLZ RIGHT NOW HURRY.
Romashka-Z-Leto [24]
The keyboard shortcut used to copy data from a cell is A.) Ctrl + c command +C

I hope this helped!! :)
7 0
3 years ago
Read 2 more answers
You have 5 salespersons who work out of your office and who frequently leave their laptops laying on their desk in their cubicle
kati45 [8]

There are different ways to ensure safety of devices. The best protection to implement to address your concerns is to use cable locks to chain the laptops to the desks.

  • The use of laptop locks is as good as when compared to bicycle chain locks. One can do this by looking for a big, immovable object, such as one's desk, and thereafter you wrap the metal cable around it and then insert the lock into your laptop's lock slot.

With this, your computer becomes theft-proof.

Thia will give you piece of mind as you will not be restless anymore.

Learn more about Laptop security from

brainly.com/question/24956493

3 0
3 years ago
What are 3 things that can make cyberbullying especially harmful​
motikmotik

Answer:

Anxiousness and depression

Suicidal Thoughts

Anger

Explanation:

Three major side affects of cyber bullying are

  1. Anxiousness and depression
  2. Suicidal Thoughts
  3. Anger

Anxiousness and depression

Cyber bullying takes away self esteem and self confidence.Lack of self esteem makes person to feel bad about him/her self and lack of confidence makes taking daily life decision very difficult which all adds up to stress

Anger

Some people might feel powerless while others strike back on the bullies in anger.Unchecked anger can be very dangerous.Burning in the flames of anger a person will plot revenge and can go to any means for this. This starts a never ending bully-victim cycle

Suicidal Thoughts

Depression if not cured can lead to suicidal thoughts. When a person is felling low and have no self confidence death seems an easy way out.

3 0
3 years ago
Graphic design has as its goal the communication of some __________ message to a group of people.
Aleks [24]
Graphic design has as its goal the communication of some specific message to a group of people.

Specific is your answer.
3 0
3 years ago
Please help me 30pts to someone who has done this correctly and to where I can understand it.
RUDIKE [14]
Marie could use a word processor for her documents of school writings to store important writing , help with test , and it would benefit her by knowing the important points of her documents . Could also benefit her by correcting mistakes , saving work to come back to , spelling and grammar checks , good formatting usage . hope this helps
6 0
3 years ago
Other questions:
  • Assume that nextWord is a String variable that has been given a String value consisting entirely of letters. Write some Java cod
    6·1 answer
  • Provide Java code to illustrate how to create an array, reference an array, and address an element of an array.
    13·1 answer
  • What is the output of the following code snippet? double income = 45000; double cutoff = 55000; double minIncome = 30000; if (mi
    14·1 answer
  • Which of the following statements is true?
    12·1 answer
  • To what extent can u justify that computer is not the only ICT tool?​
    9·1 answer
  • You open the home page for www.alpineskihouse. On the home page, you see a link for the weather report. You want to view the wea
    6·1 answer
  • PlZZZZZZZ help will give Brainliest
    8·2 answers
  • At the start of the school year, Brianna’s history teacher announces that students’ final grades will be weighted based on how t
    8·2 answers
  • If a company uses multimedia applications in addition to normal file and database sharing, which transmission is more efficient?
    9·1 answer
  • What are the 3 attributes of information?
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!