1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
marusya05 [52]
3 years ago
5

Andrew is graduating from high school and is very interested in computers and programming. Based on the programming language mar

ket, which of the following would be good advice?
A. Identify the most intricate languages to provide the most experience.


B. Identify the most popular languages to determine highest job demand.


C. Identify the languages most compatible with other languages for added skills.

D. Identify the languages that follow the Turing completeness test to meet programming criteria.
Computers and Technology
1 answer:
Anika [276]3 years ago
5 0

Answer:

B. Identify the most popular languages to determine the highest job demand.

Explanation:

You are not here to gain just experience or identify the language that is most compatible with various other languages for various skills. And these programming languages are standards, and hence you are not required to check them for turning completeness tests to meet various programming criteria. The correct option for you will be to identify the most popular languages to determine the highest job demand. And hence, B. is the right option for this question.

You might be interested in
You are creating a story map about Mexico. After configuring the web app template, you launch the app to test it. When the app o
navik [9.2K]
Nbdjsksjsidjdjwkwejd
3 0
3 years ago
Write a function called countstuff () that takes as a parameter a character array, and returns an int. The prototype must be:
PSYCHO15rus [73]

Answer:

Please kindly go to the explanation part.

Explanation:

The required function is written in Raw code below.

Function:

#include<stdio.h>

#include<ctype.h> //including required libraries

int countstuff(char s[]){ //Function countstuff

int cntUp=0,cntLow =0,cntDigits = 0,i=0,value; //declaring required variables

for(i=0;s[i]!='\0';i++){ //loop to iterate over the characters of string

if(isupper(s[i])){

cntUp++; //incrementing count of uppercase if it is uppercase character

}

else if(islower(s[i])){

cntLow++; //incrementing count of lowercase if it is lowercase character

}

else if(isdigit(s[i])){

cntDigits++; //incrementing count of digits if it is digit

}

}

value = cntUp*1000000 + cntLow*1000 + cntDigits; //counting value using formula given in question

return value; //returning the value

}

void main(){

char string[1000]; //declaring required variables

int value;

printf("Enter a String:");

scanf("%[^\n]s",string); //taking string as input

value = countstuff(string); //calling function

printf("The Value is : %d\n",value); //printing result

}

5 0
3 years ago
Please write down your student id. take the last digit of your student id as m.
solmaris [256]
Now why in the world anyone would want to do that....



Really!!!!
7 0
3 years ago
1) If a robot has a 3 bit instruction set and needs 20 instructions to reach its destination, how many bits of memory are requir
mariarad [96]

Answer:

Explanat500,000ion:

8 0
3 years ago
Given a floating-point formal with a k-bit exponent and an n-bit (fraction, write formulas for the exponent E, significant M, th
ANEK [815]

Answer:

A) Describe the number 7.0 bit

The exponential value ( E ) = 2

while the significand value ( M ) = 1.112  ≈ 7/4

fractional value ( F )  = 0.112

And, numeric value of the quantity ( V )  = 7

The exponent bits will be represented  as :  100----01.

while The fraction bits will be represented  as : 1100---0.

<u>B) The largest odd integer that can be represented exactly </u>

The integer will have its exponential value ( E ) = n

hence the significand value ( M )

=  1.11------12 = 2 - 2-n

also the fractional value ( F ) =  

0.11------12 = 1 – 2-n

Also, Value, V = 2n+1 – 1

The exponent bits  will be represented  as follows:  n + 2k-1 – 1.

while The bit representation for the fraction will be as follows: 11---11.

<u>C) The reciprocal of the smallest positive normalized value </u>

The numerical value of the equity ( V ) = 22k-1-2

The exponential value ( E )  = 2k-1 – 2

While the significand value ( M )  = 1

also the fractional value ( F ) = 0

Hence The bit representation of the exponent will be represented as : 11---------101.

while The bit representation of the fraction will be represented as : 00-----00.

Explanation:

E = integer value of exponent

M = significand value

F = fractional value

V = numeric value of quantity

A) Describe the number 7.0 bit

The exponential value ( E ) = 2

while the significand value ( M ) = 1.112  ≈ 7/4

fractional value ( F )  = 0.112

And, numeric value of the quantity ( V )  = 7

The exponent bits will be represented  as :  100----01.

while The fraction bits will be represented  as : 1100---0.

<u>B) The largest odd integer that can be represented exactly </u>

The integer will have its exponential value ( E ) = n

hence the significand value ( M )

=  1.11------12 = 2 - 2-n

also the fractional value ( F ) =  

0.11------12 = 1 – 2-n

Also, Value, V = 2n+1 – 1

The exponent bits  will be represented  as follows:  n + 2k-1 – 1.

while The bit representation for the fraction will be as follows: 11---11.

<u>C) The reciprocal of the smallest positive normalized value </u>

The numerical value of the equity ( V ) = 22k-1-2

The exponential value ( E )  = 2k-1 – 2

While the significand value ( M )  = 1

also the fractional value ( F ) = 0

Hence The bit representation of the exponent will be represented as : 11---------101.

while The bit representation of the fraction will be represented as : 00-----00.

8 0
3 years ago
Other questions:
  • During an experiment, if you purpose change the temperature to test a hypothesis the temperature is called what??
    6·1 answer
  • Which of the following Google tools support collaboration? Docs Sheets Slides All of the Above
    13·1 answer
  • Company-wide systems that connect one or more local area networks (LANs) or wide area networks (WANs) are called _____. a) legac
    15·1 answer
  • One form of e-mail attack that is also a DoS attack is called a mail spoof, in which an attacker overwhelms the receiver with ex
    14·1 answer
  • Define a method printFeetInchShort, with int parameters numFeet and numInches, that prints using ' and " shorthand. End with a n
    7·2 answers
  • What is project scope? a. Quantifiable criteria that must be met for the project to be considered a success b. Products, service
    5·1 answer
  • Which search engine does not track users? Choose the answer.
    10·2 answers
  • An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that c
    8·2 answers
  • Có n chiếc kẹo và m em bé. Hãy viết chương trình nhập vào hai số nguyên dương n, m và kiểm tra n chiếc kẹo có chia đều được cho
    11·1 answer
  • Fictional Corp has a data center that runs multiple internal applications. However, they want to migrate their email to a cloud
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!