1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
V125BC [204]
3 years ago
8

Which of the following tasks could be implemented as a filter using only a constant amount of memory (e.g., a couple of int or d

ouble variables and no arrays)? Mark all that apply.
For each, the input comes from standard input and consists of n real numbers between 0.0 and 1.0.

Print the sum of the squares of the n numbers
Print the maximum and minimum values of the n numbers
Print the percentage of numbers greater than the average of the n numbers
Print the median of the n numbers
Print the average of the n numbers
Print the n numbers in uniformly random order
Print the n numbers in increasing order
Computers and Technology
1 answer:
Nesterboy [21]3 years ago
4 0

Answer:

Print the sum of the squares of the n numbers

Print the percentage of numbers greater than the average of the n numbers

Print the median f n numbers

Explanation:

The computer programs have different configurations based on the assigned tasks. The constant amount of memory is used by the cache. This is the new technology in the computer software which consumes only small amount of memory and activates once the task is assigned to it.

You might be interested in
"which term is used to describe the process of encasing one protocol or packet inside another protocol or packet
svlad2 [7]
<span>tunneling Term used 
process of encasing one protocol or packet inside another protocol or packet</span>
7 0
4 years ago
When inviting more than one person to a calendar,
Makovka662 [10]
B) Comma. is the answer
8 0
3 years ago
How was the addition of
lozanna [386]

Answer:

How was the addition of an improvement over early web design? Webpages could finally incorporate tables into the design

6 0
3 years ago
Which term refers to the deliberate falsification of information?.
gulaghasi [49]

Answer:

The term misinformation refers to the deliberate falsification of information.

Explanation:

6 0
2 years ago
Research why the features in Excel are important for business and personal use. Provide a list of at least three important featu
GuDViN [60]

Answer and Explanation:

1) The three important features are:

Graphical representation of data-Data can be represented in the form of pie char,bar char,etc

Data Validation-Particular data type can be assigned to a column so that only that data type can be entered such as int,float and character

Aggregate Functions can be used such as count,sum,average,max,min,etc

2)Professions which require excel are:

Auditor-These people are brought into the frame of a accounting during a specific event or generally quarterly or annual

Accountant-Accountants require the excel very much for maintaining records and perform calculations quickly

Sales Manager-He may need to calculate the growth rate of the company in terms of sales for which he can use excel

3)Yes there are some tasks of excel which can be done in word or power-point.If used just to enter data in tabular format then word or power-point can be used to represent the data in tabular format.

Benefits:

Word and PowerPoint offer better multimedia support than excel

PowerPoint offers better chart choices than excel

Limitations

if there are any mathematical calculations then it is not possible in word or PowerPoint

6 0
3 years ago
Other questions:
  • Which of the following is a valid call for the generic method declared below? and why?
    9·2 answers
  • Identify the six components of an information system. Which are most directly affected by the study of computer security? Which
    8·1 answer
  • Im trying to learn c# for unity does anyone know any good sources
    10·1 answer
  • How can a PowerPoint user add a shadow to a table
    12·1 answer
  • Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of ________.
    6·1 answer
  • 6. Consider a circle of diameter d cm.
    11·1 answer
  • What is TLB for? Why TLB? Given the following number, what is theeffective memory access time?
    11·1 answer
  • In researching his history report about the Civil War, why is Ariq most likely to use secondary data than primary data? Secondar
    12·2 answers
  • Explain information technology ?
    10·1 answer
  • What options are available for storing backups, physically?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!