1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
lapo4ka [179]
3 years ago
15

Write an if/else statement that compares the value of the variables soldYesterday and soldToday, and based upon that comparison

assigns salesTrend the value -1 or 1. -1 represents the case where soldYesterday is greater than soldToday; 1 represents the case where soldYesterday is not greater than soldToday.
Computers and Technology
1 answer:
jenyasd209 [6]3 years ago
7 0

Answer:

if(soldYesterday > soldToday){

salesTrend = -1;

} else if(soldToday > soldYesterday){

salesTrend = 1;

}

Explanation:

The if/else statement is more explicit. The first if condition check if soldYesterday is greater than soldToday, if true, then -1 is assigned to salesTrend.

Else if soldToday is greater than soldYesterday, if true, then 1 is assigned to salesTrend.

You might be interested in
simplify the expression below and state the value of m for which the simplified expression is not defined 2m² + m - 15/ m² - 9​
motikmotik

Answer:

  • The simplified expression is: \frac{2m-5}{m-3}
  • The simplified expression is undefined for m=3

Explanation:

The given expression is:

\frac{2m^2+m-15}{m^2-9}

The numerator can be siplified by using factorization and denominator will be simplified using the formula

a^2-b^2 = (a+b)(a-b)

So,

= \frac{2m^2+6m-5m-15}{(m)^2-(3)^2}\\=\frac{2m(m+3)-5(m+3)}{(m-3)(m+3)}\\=\frac{(2m-5)(m+3)}{(m-3)(m+3)}\\=\frac{2m-5}{m-3}

A fraction is undefined when the denominator is zero. In order to find the value of m on which the simplified fraction will be undefined we will put denominator equal to zero.

So,

m-3 = 0 => m = 3

Hence,

  • The simplified expression is: \frac{2m-5}{m-3}
  • The simplified expression is undefined for m=3
7 0
3 years ago
Online library catalogs can direct you to your closest library. (1 point)<br> True<br> False
Kitty [74]

Answer:

True

Explanation:

8 0
3 years ago
6.An organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network
Sauron [17]

Answer:

Challenge-Handshake Authentication Protocol (CHAP).

Explanation:

In Computer technology, authentication can be defined as the process of verifying the identity of an individual or electronic device. Authentication work based on the principle (framework) of matching an incoming request from a user or electronic device to a set of uniquely defined credentials.

Basically, authentication ensures a user is truly who he or she claims to be, as well as confirm that an electronic device is valid through the process of verification.

In this scenario, an organization wants to implement a remote dial-in server to ensure that personnel can connect to the organization's network from remote locations. The authentication protocol must include encryption to prevent hackers from accessing the network.

Hence, the protocol which should be used is Challenge-Handshake Authentication Protocol (CHAP).

A Challenge-Handshake Authentication Protocol (CHAP) can be defined as a standard network access control protocol in which a client program dials in to a network access server to receive a random value and identification number that can only be used once.

5 0
3 years ago
A medium is a:
Nostrana [21]
C is a medium. And the answer
4 0
4 years ago
Read 2 more answers
What is computer hacking? describe some examples
Naily [24]
Computer hacking<span> refers to the practice of modifying or altering </span>computer<span> software and hardware to accomplish a goal that is considered to be outside of the creator's original objective.
</span>
“bot,” is a computer under the control of a hacker <span>without the knowledge of the computer user.</span>

3 0
4 years ago
Other questions:
  • What characters cannot be used in a filename?
    15·1 answer
  • Why do we need IP Addresses in order for the Internet to function properly?
    7·1 answer
  • You need to update both the DEPARTMENT_ID and LOCATION_ID columns in the EMPLOYEES table using one UPDATE statement. Which claus
    5·1 answer
  • What should you do if you forget your root password for MySQL?
    13·1 answer
  • Whats a field in databases?
    5·1 answer
  • Once the CPU has fetched the data requested, what are the next steps in the process?
    15·1 answer
  • I need help 50 points and brainiest if you answer
    10·2 answers
  • Can i have help for a ggogle class room
    14·1 answer
  • What is the primary way that social networks work? Multiple Choice providing a security system for communication online connecti
    5·1 answer
  • When Brittany practiced her presentation, she gave a trusted adult a presentation checklist to use to critique her each time she
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!