1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
MAXImum [283]
3 years ago
13

Not all output display data for humans to read explain why​

Computers and Technology
1 answer:
Vadim26 [7]3 years ago
8 0

Answer:

The eye has a very focused view that is optimised for perceiving movement.Human cannot see clearly outside an -5 degree cone of foveal vision.

You might be interested in
Among the list of ways workers can protect themselves when working on or near any construction zone, is to _________________.
Kryger [21]
B for shure........................
3 0
3 years ago
Read 2 more answers
What is ‘verification’?
aev [14]

Answer: Verification in the terms of the computer field is defined as the process which is for testing of the consistency and the accuracy of the information, algorithm, data, etc. Verification is carried out by the approval or disapproval method after the checking process.

This techniques helps in verifying whether the function,algorithm ,data that has been accessed in the system is complete and precise or not so that it can properly function in the operating system.

5 0
4 years ago
Write a SQL statement to display course name, course number, and the average capacity of all sectionsof each course, rounded to
icang [17]

Answer:

SELECT C. DESCRIPTION, C. COURSE_NO, ROUND(AVG(CAPACITY), 4) AS AVERAGECAPACITY

FROM COURSE C, SECTION S

WHERE C. COURSE_NO = S. COURSE_NO

GROUP BY C. COURSE_NO

HAVING AVG(CAPACITY)<25

8 0
3 years ago
The single-cycle datapath conceptually described in this section must have separate instruction and data memories, because:_____
Amiraneli [1.4K]

Answer:

C. The processor operates in one cycle and cannot use a single-ported memory for two different accesses within that cycle

Explanation:

Processors require instructions and data which are retrieved from data memories for processing, but it cannot access two or receive two both processes as only a port is used for accessing data and another for receiving instructions. In fact, a single-cycle or single-clock processor cannot use a resource more than once.

3 0
3 years ago
g 4.16 Write a program that takes any number of non-negative integers as input, and outputs the average and max. A negative inte
pashok25 [27]

Answer:

import java.util.ArrayList;

import java.util.Scanner;

import java.util.Collections;

public class num4 {

   public static void main(String[] args) {

       int sum = 0;

       Scanner in = new Scanner(System.in);

       System.out.println("Enter number");

       int num = in.nextInt();

       ArrayList<Integer> list = new ArrayList<>();

       while (num >= 0){

       list.add(num);

       System.out.println("Enter another positive number, enter a negative to stop");

       num = in.nextInt();

       }

       int maximum = Collections.max(list);

       int listSize = list.size();

       for(int i:list){

           sum = sum+i;

       }

       double average = (double) sum/listSize;

       System.out.println("Maximum number entered is "+maximum);

       System.out.println("Average of the number is "+average);

   }

}

Explanation:

In this program:

  • A Scanner class is used to receive user input and store in a variable
  • A while loop with the condition while (num >= 0) is used to ensure only non-negative numbers are entered
  • An ArrayList is created and used to store all the user's valid entries
  • The Max Method in the Collections class is used to find the maximum value entered
  • To find the average, a for loop is used to add all elements in the list and divide by the size of the list
  • Finally the Average and maximum is printed out
8 0
4 years ago
Other questions:
  • which programming paradigm do programmers follow to write code for event driven applications? a. object oriented programming. b.
    9·1 answer
  • Implement the RC4 stream cipher in C++. User should be able to enter any key that is 5 bytes to 32 bytes long. Be sure to discar
    7·1 answer
  • When entering a formula into a cell, you begin with are calculations a spreadsheet program applies to data. are preset calculati
    9·1 answer
  • Another area where the Internet and the Web have had a huge influence is the workplace environment. How different do you think i
    15·1 answer
  • Pleases Help ME An example of a _________________ impact is when a product is back ordered and the business contacts the custome
    5·1 answer
  • Henry is planning to visit Spain for a vacation. He wants to learn Spanish, but he prefers to do it in a fun way. He searches on
    8·2 answers
  • Suppose we are now working with memory words of length 8. We have already calculated that we need 4 check bits, and the length o
    8·1 answer
  • For what three media types can Photoshop optimize images? ​
    10·1 answer
  • Scripting languages are unique computer languages with a specialized function. explain what scripting languages do, and how this
    7·1 answer
  • Execute and explain this program using // in Layman's language. Thank you!
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!