1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
WARRIOR [948]
3 years ago
6

Write a function nexthour that receives one integer argument, which is an hour of the day, and returns the next hour. This assum

es a 12-hour clock; so, for example, the next hour
after 12 would be 1. Here are two examples of calling this function:

>> fprintf('The next hour will be %d.\n',nexthour(3))The next hour will be 4.>> fprintf('The next hour will be %d.\n',nexthour(12))The next hour will be 1.
Computers and Technology
1 answer:
Vinvika [58]3 years ago
5 0

Answer:

The function in C is as follows:

int nexthour(int tme){

   tme = tme%12 + 1;

   return tme;

}

Explanation:

This defines the function

int nexthour(int tme){

Ths calculates the next hour using % operator

   tme = tme%12 + 1;

This returns the next hour

   return tme;

}

You might be interested in
Im new what are points
Nesterboy [21]

You earn points to ask questions, the higher your level the more you can hold I'm guessing

8 0
3 years ago
Read 2 more answers
John works for Internal Computer Specialists, which focuses on helping small business owners resolve MIS infrastructure issues.
natali 33 [55]

Answer:

A) Hardware

Explanation:

The hardware component of the computer refers to the physical parts of the computers that can be see and touched this contrasts the sofware component of the computer that are programs (sets of instruction). All the coponents listed in the question are physical parts of the computer and belong to the hardware component.

5 0
3 years ago
Give two reasons why network security is the most important issue regarding data centers.
deff fn [24]
Three key concepts of security are integrity, confidentiality, and availability.

Network firewalls are the first line of defense, intended to keep intruders out. Once a system is compromised, all of its data can be accessed, and if a bad actor gains access to one system, they effectively have access to all of the systems. This touches on both system integrity and data confidentiality.

Security is also related to availability, or uptime. If your network is compromised, it may be inaccessible to those who need to use it, making it useless. If I'm working from an office in Chicago, and the company's main DC is in Atlanta, I need the network to remain available to access critical files.
7 0
3 years ago
Write the constructor for the Theater class. The constructor takes three int parameters, representing the number of seats per ro
sp2606 [1]

Answer:

See explaination

Explanation:

class Seat {

private boolean available;

private int tier;

public Seat(boolean isAvail, int tierNum)

{ available = isAvail;

tier = tierNum; }

public boolean isAvailable() { return available; }

public int getTier() { return tier; }

public void setAvailability(boolean isAvail) { available = isAvail; } }

//The Theater class represents a theater of seats. The number of seats per row and the number of tier 1 and tier 2 rows are

//determined by the parameters of the Theater constructor.

//Row 0 of the theaterSeats array represents the row closest to the stage.

public class Theater {

private Seat[][] theaterSeats; /** Constructs a Theater object, as described in part (a). * Precondition: seatsPerRow > 0; tier1Rows > 0; tier2Rows >= 0 */

public Theater(int seatsPerRow, int tier1Rows, int tier2Rows) {

theaterSeats= new Seat[tier1Rows+tier2Rows][seatsPerRow];

}

public boolean reassignSeat(int fromRow, int fromCol, int toRow, int toCol) {

if(theaterSeats[toRow][toCol].isAvailable()) {

int tierDestination =theaterSeats[toRow][toCol].getTier();

int tierSource =theaterSeats[fromRow][fromCol].getTier();

if(tierDestination<=tierSource) {

if(tierDestination==tierSource) {

if(fromRow<toRow) {

return false;

}else {

theaterSeats[toRow][toCol].setAvailability(false);

theaterSeats[fromRow][fromCol].setAvailability(true);

return true;

}

}

theaterSeats[toRow][toCol].setAvailability(false);

theaterSeats[fromRow][fromCol].setAvailability(true);

return true;

}else {

return false;

}

}else {

return false;

}

}

public static void main(String[] args) {

//Lets understand it with simple example

Theater t1 = new Theater(3,1,2);

//Our threater has 3 seat in each row and we have one tier 1 row and 1 tier 2 row

//total no of seat will be 9.

//Lets create our seat

t1.theaterSeats[0][0] = new Seat(true,1);

t1.theaterSeats[0][1] = new Seat(false,1);

t1.theaterSeats[0][2] = new Seat(true,1);

t1.theaterSeats[1][0] = new Seat(true,2);

t1.theaterSeats[1][1] = new Seat(true,2);

t1.theaterSeats[1][2] = new Seat(true,2);

t1.theaterSeats[2][0] = new Seat(false,2);

t1.theaterSeats[2][1] = new Seat(false,2);

t1.theaterSeats[2][2] = new Seat(true,2);

//Lets print out theater and see which seat is available or which is not

System.out.println("Theater===>");

for(int i=0;i<3;i++) {

for(int j=0;j<3;j++) {

System.out.print("["+i+"]"+"["+j+"] : "+t1.theaterSeats[i][j].isAvailable()+" ");

}

System.out.println();

}

System.out.println("(2,1) want to change seat to (0,0)");

System.out.println("["+2+"]"+"["+1+"]"+"===>"+"["+0+"]"+"["+0+"]");

t1.reassignSeat(2, 1, 0, 0);

for(int i=0;i<3;i++) {

for(int j=0;j<3;j++) {

System.out.print("["+i+"]"+"["+j+"] : "+t1.theaterSeats[i][j].isAvailable()+" ");

}

System.out.println();

}

}

}

5 0
4 years ago
________ is used to install and update software, backup, and restore mobile devices, wipe employer software and data from device
erastovalidia [21]

Answer: MDM softwares

Explanation:

Here MDM refers to mobile device management software which provides people with the facilities of updating, installing creating backup of various mobile devices within an organisation. Moreover these software's provides tools for proper monitoring and to report their usage across various independent mobile device users. MDM is often used or interconnected with the term BYOD(Bring your own device), whereby employees of an organisation bring their own mobile devices and they are being managed by a MDM software centrally.

8 0
4 years ago
Other questions:
  • Using the College Registration example from Section 6.7.3 as a starting point, do the following:
    5·1 answer
  • Which data table display compares report metrics to the website average?
    6·1 answer
  • What should you remember about typography while creating your résumé?​
    14·1 answer
  • Which of the following is an example of a word processing program?
    11·2 answers
  • For Java, a program is converted from a text file of code into an executable file by the process of ?
    11·1 answer
  • What is a feature of audio editing software
    11·1 answer
  • Distancelearning has got a boost due to the ___________.
    5·1 answer
  • Design a class named Employee. The class should keep the following information in member variables:
    5·1 answer
  • Write a function in Java to implement the following logic:
    13·1 answer
  • What is the output of the following code:
    12·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!