1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
icang [17]
3 years ago
11

#Write a function called is_composite. is_composite should #take as input one integer. It should return True if the #integer is

composite, False if the integer is not not #composite. You may assume the integer will be greater than #2 and less than 1000.
Computers and Technology
1 answer:
malfutka [58]3 years ago
3 0

Answer:

// A optimized school method based C++ program to check  

// if a number is composite.  

#include <bits/stdc++.h>  

using namespace std;  

bool isComposite(int n)  

{  

// Corner cases  

if (n <= 1) return false;  

if (n <= 3) return false;  

// This is checked so that we can skip  

// middle five numbers in below loop  

if (n%2 == 0 || n%3 == 0) return true;  

for (int i=5; i*i<=n; i=i+6)  

 if (n%i == 0 || n%(i+2) == 0)  

 return true;  

return false;  

}  

// Driver Program to test above function  

int main()  

{  

isComposite(11)? cout << " true\n": cout << " false\n";  

isComposite(15)? cout << " true\n": cout << " false\n";  

return 0;  

}

Explanation:

You might be interested in
Explain any one method of creating a presentation.
Arisa [49]

Answer:

Step 1: Analyze your audience

The first step in preparing a presentation is to learn more about the audience to whom you'll be speaking. It's a good idea to obtain some information on the backgrounds, values, and interests of your audience so that you understand what the audience members might expect from your presentation.

Step 2: Select a topic

Next, if possible select a topic that is of interest to the audience and to you. It will be much easier to deliver a presentation that the audience finds relevant, and more enjoyable to research a topic that is of interest to you.

Step 3: Define the objective of the presentation

Once you have selected a topic, write the objective of the presentation in a single concise statement. The objective needs to specify exactly what you want your audience to learn from your presentation. Base the objective and the level of the content on the amount of time you have for the presentation and the background knowledge of the audience. Use this statement to help keep you focused as you research and develop the presentation.

Preparing the Content of Your Presentation

Step 4: Prepare the body of the presentation

After defining the objective of your presentation, determine how much information you can present in the amount of time allowed. Also, use your knowledge about the audience to prepare a presentation with the right level of detail. You don't want to plan a presentation that is too basic or too advanced.

The body of the presentation is where you present your ideas. To present your ideas convincingly, you will need to illustrate and support them. Strategies to help you do this include the following:

Present data and facts

Read quotes from experts

Relate personal experiences

Provide vivid descriptions

And remember, as you plan the body of your presentation it's important to provide variety. Listeners may quickly become bored by lots of facts or they may tire of hearing story after story.

Step 5: Prepare the introduction and conclusion

Once you've prepared the body of the presentation, decide how you will begin and end the talk. Make sure the introduction captures the attention of your audience and the conclusion summarizes and reiterates your important points. In other words, "Tell them what you're going to tell them. Tell them. Then, tell them what you told them."

During the opening of your presentation, it's important to attract the audience's attention and build their interest. If you don't, listeners will turn their attention elsewhere and you'll have a difficult time getting it back. Strategies that you can use include the following:

Make the introduction relevant to the listeners' goals, values, and needs

Ask questions to stimulate thinking

Share a personal experience

Begin with a joke or humorous story

Project a cartoon or colorful visual

Make a stimulating or inspirational statement

Give a unique demonstration

During the opening you want to clearly present your topic and the purpose of your presentation. Clearly articulating the topic and purpose will help the listeners focus on and easily follow your main ideas.

During the conclusion of your presentation, reinforce the main ideas you communicated. Remember that listeners won't remember your entire presentation, only the main ideas. By reinforcing and reviewing the main ideas, you help the audience remember them.

[top of page]

Practicing and Delivering

Step 6: Practice delivering the presentation

Most people spend hours preparing a presentation but very little time practicing it. When you practice your presentation, you can reduce the number of times you utter words and phrases like, "um," "well," and "you know." These habits can easily diminish a speaker's credibility. You can also fine-tune your content to be sure you make your most important points in the time alloted.

In addition to planning the content of your presentation, you need to give advanced thought to how you want to deliver it. Do you want to commit your presentation to memory, use cards to guide you, or read from a script? Or, you might want to use a combination of methods. To help you decide, read the advantages and disadvantages of the four delivery methods described below.

Speaking from Memory

A human brain.

4 0
3 years ago
A service provider recently upgraded one of the storage clusters that houses non-confidential data for clients. The storage prov
VARVARA [1.3K]

Answer:

<em>C. Purging</em>

<em></em>

Explanation:

<em>Data Purging in computer storage is a process that permanently erases and remove data from a storage space</em>.  Data deleting only removes the shortcut to the data but does not remove the data permanently, and can be easily recovered by an expert. <em>Data purging removes data permanently and also frees up the storage or memory space for other uses.</em> Data purging is relatively inexpensive and can be achieved with some special software tool.

Since the storage provider wants the hard drive back in working condition, data purging is the best option.

3 0
3 years ago
Type the correct answer in the box.
qwelly [4]

Answer:

I think the answer you're looking for is "personal gain"

Hope this helped :D

Explanation:

8 0
2 years ago
The rules and guidelines for appropriate computer mediated communication are called ________. A. Social norms b. Etiquette c. Ne
horsena [70]

The rules and guidelines for appropriate computer mediated communication are called Netiquette.

<h3>What is Netiquette?</h3>

Netiquette, which is a  blend of  “net” and “etiquette,” refers to the polite  and appropriate behavior  when communicating with others online.

These rules are important as they help to improve  communication skills, prevent misconceptions, and encourage only socially acceptable behavior when working or  collaborating online.

Some of the DOs of Netiquette among others includes:

  • Being mindful of your tone
  • Use of  emoticons
  • Use of good grammar

Some of the DONTs among others includes:

  • Overuse of abbreviations
  • Unnecessary rants/Flaming
  • Overusing  caps

In conclusion Netiquette involves not doing what you would not do in person.

Learn more about Netiquette here:brainly.com/question/998689

3 0
2 years ago
The vulnerabilities common to the software development process, including buffer overflows, race conditions, input validation at
spayn [35]

Answer:

Aspects of application security includes all except:____.

D. Requirement Assessment.

Explanation:

The requirement assessment is carried out during the initial development stage to meet the user's requirements.  This assessment does not necessarily deal with application security.  However, the other three aspects are security-related.  They focus on the areas where application security is mostly required to reduce errors and technical weaknesses of a software, including authentication, privacy, access control, data segregation, and error handling.

8 0
2 years ago
Other questions:
  • What types of storage can be used to access data from another computer
    8·2 answers
  • Write a function named shareALetter that takes one parameter, wordList – a list of words. Create and return a dictionary in whic
    13·1 answer
  • Solar power plants trap the sun’s energy and convert it into electricity. What is a problem associated with this technology?
    11·1 answer
  • My home PC has IP address 192.168.1.22 and connects to the Internet through a NAT router. Assume I am downloading a web page fro
    5·1 answer
  • I need a free flashdrive can anyone tell me any website links so i can get one for free????​
    11·1 answer
  • Because log-on procedures may be cumbersome and tedious, users often store log-on sequences in their personal computers and invo
    6·1 answer
  • Sequence encryption is a series of encryptions and decryptions between a number of systems, wherein each system in a network dec
    9·1 answer
  • Individual internet users connect to isps through a(n ________.
    11·1 answer
  • X = 10<br> y = 20<br> x &gt; y<br> print("if statement")<br> print("else statement")
    6·1 answer
  • In honor of Black History Month, write an essay about a black person who has inspired YOU in some way. This person does not have
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!