1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Serga [27]
3 years ago
5

b. Write a complete program for the following situation related to setting the speed of a car to preset values before starting a

journey: • If speed is less than lower_ set_ speed, display the message "accelerate" to the screen, increase the car's speed to the lower set speed, and output the new speed to the screen. • If speed is greater than upper_set_speed, print the message "apply brake" to the screen, decrease the car's speed to the upper set speed, and output the new speed to the screen. • Give all necessary documentation in the comments, including the file name. • Allow the program to exit at the end. • Output the speed to the screen. • How many different initial speeds will you need to test this code?
Computers and Technology
1 answer:
Orlov [11]3 years ago
3 0

Answer:

U will need 4

Explanation:

You might be interested in
Create a stored procedure named prc_inv_amounts to update the INV_SUBTOTAL, INV_TAX, and INV_TOTAL. The procedure takes the invo
vova2212 [387]

Answer:

The procedure in SQL is created as follows

Explanation:

--creating the procedure

CREATE OR REPLACE PROCEDURE prc_inv_amounts (W_IN IN NUMBER)

AS

--defining variables

W_CK NUMBER := 0;

W_SUBT NUMBER := 0;

W_TAX NUMBER := 0;

BEGIN

--Authentication process of the invoice

SELECT COUNT(*) INTO W_CK FROM INVOICE WHERE INV_NUMBER := W_IN;

--Transaction confirmation

IF W_CK = 1 THEN

SELECT SUM(LINE_TOTAL) INTO W_SUBT FROM LINE

WHERE

--checking the invoice for the desired invoice number

LINE.INV_NUMBER = W_IN;

W_TAX :=W_SUBT * 0.08;

--updating the invoice

UPDATE INVOICE

--setting the new values

SET INV_SUBTOTAL = W_SUBT,

INV_TAX = W_TAX,

INV_TOTAL =W_SUBT + W_TAX

WHERE INV_NUMBER = W_IN;

--ending the if statement

END IF;

--ending the procedure

END;

7 0
3 years ago
The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system.
navik [9.2K]

Answer:

False

Explanation:

The Security Development Life Cycle (SDLC), is a software development which involves traditional approach towards its design such as, waterfall model, Agile, etc.

It can either be referred to as a generic secure development life cycle or a specific one, such as the Microsoft SDL or the Cisco SDL.

Its phases includes,

A1 - Security Assessment

A2 - Architecture

A3 - Design and Development 1

A4 - Design and Development 2

A5 - Ship

PRSA - Post Release

Each phase talks about how a secured software is developed.

The Security Development Life Cycle (SDLC) is a general methodology for the design and implementation of an information system. This statement is false because by definition and attributes Security Development Life Cycle is a traditional approach towards software development and not a general method.

6 0
3 years ago
Using the employment websites, search for part-time jobs that relate to the career fields you are interested in pursuing or to y
arsen [322]

In order to start a part time job first we have to do some research in particular criteria they are Research your degree and occupational information and industry information.

Explanation:

There are many part- time jobs, they are web developer, sales representative, interpreter and translator and content writer.

There are various websites for this kind of jobs. For example in Quicker, Monster and indeed .com are some of the websites.

The we developer job is creating website for the customer based on the requirements. Example school management, library management.

Then comes data entry job it is a simple job that is to enter the captcha and correcting errors in files and copy pasting job.

Content writer is a job in which the different types of questions are answered for the U.S based companies.

7 0
3 years ago
Read 2 more answers
Your organization's network has multiple layers of security devices. When you attempt to connect to a service on the Internet. H
Sindrei [870]

Answer:

The host-based firewall settings are blocking the service

Explanation:

Host-based firewall settings can be configured on each workstation. The firewall can be provided by the operating system itself, or it can be a standalone software package that provides security features and functionality for the device's network connection. If this firewall contains incorrect settings, legitimate services can be blocked, and if so, a message will usually notify the user of such a breach. In these cases, the firewall settings need to be adjusted to make the desired service work.

7 0
3 years ago
Suppose you have a program P and 90 percent of P can be parallelized, but 10 percent of P is inherently sequential and cannot be
EleoNora [17]

Answer:

Means no matter how many processors you use, speed up never increase from 10 times.

Explanation:

If a problem of size W has a serial component Ws,then performance using parallelism:

Using Amdahl's Law:

Tp = (W - Ws )/ N + Ws

Here, Ws = .1,

W - Ws = .9

Performance Tp = (.9 / N) + .1

---------------------------------------------------------

Speed Up = 1 / ( (.9 / N) + .1)

If N -> infinity, Speed Up <= 10

Means no matter how many processors you use, speed up never increase from 10 times.

5 0
3 years ago
Other questions:
  • Nancy would like to configure an automatic response for all emails received while she is out of the office tomorrow, during busi
    13·2 answers
  • An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect t
    8·1 answer
  • You are logged in as a user with limited system privileges, you are the linux system administrator and you have the password to
    5·1 answer
  • Generally speaking, mobile sites are good for acquiring new customers and inspiring new relationships while mobile apps are good
    6·1 answer
  • What are examples of some Exotic currencies?
    14·1 answer
  • Technologies are having a negative impact on businesses.
    8·1 answer
  • To display data in a certain manner, like alphabetical order, is called
    5·2 answers
  • Anybody know this question???
    6·1 answer
  • State the difference between font colour and shading.​
    15·1 answer
  • Question 1
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!