1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
xenn [34]
3 years ago
5

A restaurant recorded the ages of customers on two separate days. You are going to write a program to compare the number of cust

omers in their twenties (ages 20 to 29). What is the missing line of code to count the number of customers in their twenties? customerAges = [13, 3, 11, 24, 35, 25, 15, 18, 1] count20s = 0 if 20 <= item <= 29: count20s = count20s + 1
Computers and Technology
1 answer:
nikklg [1K]3 years ago
4 0

Answer:

You will need to implement a for loop ( I am assuming this is java)

Explanation:

int count20s = 0;

for(int x =0; x< customerAges.length;x++){

if(20 <= customerAges[x] && customerAges[x] <= 29){

     count20s++;

}

You might be interested in
Imagine you are building an ATM system; list at least 6 application domains for the system. That is, in which context is the sys
Anvisha [2.4K]

Answer:

Six applications domains for the ATM was listed below in the explanation section below

The main aim of the ATM is cash collection, user information update.

The users of the ATM are people, staff, customers/clients.

Explanation:

Solution

Given that

The Application domain for the system is given below:

  • The System is going to verify the details entered
  • Update the database on the server side
  • Calculation of cash Available
  • Count the Cash and Identify the note in the Machine
  • Troubleshooting of the ATM machine (system)
  • Backup of the system and Operating system /Software installed on the ATM machine.

The ATM is going to be used for the purpose of collecting cash, updating user information, cashing cheques etc and is used by all the Bank customers.

Who are the users of ATM:

  • Customers at the bank
  • Individuals /people
  • Staff of the Bank
3 0
3 years ago
A university wants to install a client-server network. Which feature do you think is important for them as they set up the netwo
DENIUS [597]
The answer would be b andc
7 0
3 years ago
What is one benefit of Powerpoint Online?
VashaNatasha [74]

Answer:

for edge users

anyone with the url

Explanation:

6 0
3 years ago
Read 2 more answers
List and describe two of the four generally recognized security positions.
Llana [10]
CISO: This person reports directly to the CIO and is responsible for assessing, managing, and implementing security.
Security Technician: Entry-level position and provides technical support to conFgure security hardware, implement security software, and diagnose and troubleshoot <span>problems</span>
8 0
4 years ago
John works for Internal Computer Specialists, a company that focuses on helping small business owners resolve MIS infrastructure
Romashka-Z-Leto [24]

Answer:

Hardware.

Explanation:

John is operating with Internal Computer Professionals, an organization committed to assisting sector owners to overcome MIS technology problems. John's duties include maintaining and repairing motherboards, wires, and parts of inner devices including DVDs and hard disks. Although John's appointed for hardware fixation.

3 0
3 years ago
Other questions:
  • Which of the following is not a standard method called as partof the JSP life cycle?
    5·1 answer
  • Why is sequencing important in coding
    8·2 answers
  • What does ADF means????
    13·2 answers
  • You want to discard your old computer but want to securely erase the data from your hard drive, what can Use to do this?
    5·1 answer
  • Write a function that, given an array of integers and its size, reverses the elements in the array. For example, if the original
    13·1 answer
  • Which feature of a word processing program enables you to represent an text information in the form of a diagram?
    14·2 answers
  • Mr. O would like to purchase a new computer for his home business. Mr. O's current computer runs very slow when he is running e-
    5·2 answers
  • How does our behavior change when we know we're being watched?
    14·1 answer
  • - Discuss the input-process-output model as it relates to program development.
    12·1 answer
  • A network administrator is importing a list of certificates from an online source, so that employees can use a chain of trust an
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!