Nonverbal codes: (Select one)

(A) consist of symbols and their grammatical arrangement.
(B) are a systematic arrangement of symbols used to create meanings in the mind of another person or persons.
(C) are all symbols that are not words, including bodily movements, the use of space and time, and sounds other than words.
(D) are any interference in the encoding and decoding processes that reduces the clarity of a message.
(E) are the location where communication takes place.

Answers

Answer 1

Answer:

Option C: is the correct answer.

Nonverbal codes are all symbols that are not words, including bodily movements, the use of space and time, and sounds other than words.

Explanation:

As depicted from the word, nonverbal means free of words.

Sometimes, there are situations when instead of conveying anything by the usage of words, codes and gestures are used. These gestures may be provided using hands, eyes, time pauses etc.

So a non-verbal codes can also be defined as:

" A behavioral act that maybe depicted through sounds and body movements instead using words."

i hope it will help you!

Related Questions

What can be used to meet this requirement? The App Builder at Universal Containers has been asked to ensure that the Amount field is populated when the stage is set to Closed Won.
A. Validation Rule
B. Lightning Process Builder
C. Workflow
D. Approval Process

Answers

Answer:

Option C i.e., Workflow is the correct answer to the following question.

Explanation:

The following option is correct because Workflow makes secure that field of amount that is populated when the Close Won stage is set. So, that's why the workflow meets the following necessity.

Option A is not true because there is no rules is validating.

Option B is not true because the following requirement is not meet the process of the Lightning Builder.

Option c is not true because there is not any requirement of process of the approval.

Final answer:

A Validation Rule is the best solution to ensure the Amount field is populated when the opportunity stage is set to Closed Won in Salesforce. It enforces data quality and prevents the record from being saved without meeting the necessary conditions.

Explanation:

The requirement stated that the Amount field must be populated when the stage is set to Closed Won. The best option to meet this requirement is A. Validation Rule. A validation rule in Salesforce can be used to enforce data quality and required fields based on specific conditions, such as a stage being set to Closed Won.

Option B, Lightning Process Builder, is a powerful tool for automating complex business processes, but in this case, it might be an overkill solution for simply ensuring a field is populated. Option C, Workflow, could be used to send alerts or update fields when a record meets certain criteria but cannot prevent a record from being saved without the Amount value. Option D, Approval Process, is typically used to approve records before they can proceed to the next stage and isn't relevant to the requirement of ensuring a field's population.

Create a Python program to solve a simple payroll calculation. Calculate the amount of pay, given hours worked, and hourly rate. (The formula to calculate payroll is pay.

Answers

Answer:

The Python code is given below with appropriate comments

Explanation:

hoursWorked=input("Enter number of hours worked:")   #hours worked

hW=int(hoursWorked)      #to convert the string input to integer

hourlyRate=input("Enter Hourly Rate:")

hR=float(hourlyRate)     #to convert the string input to floating point number

print "Hours Worked=",hW,", Hourly Rate=",hR,", Pay=",hW*hR

The program is a sequential program, and does not require loops and conditions

The payroll program in Python, where comments are used to explain each line is as follows:

#This gets input for the number of hours worked

hours = int(input("Hours worked :"))

#This gets input for the hourly rate

rate=float(input("Hourly Rate :"))

#This calculates the pay

pay = hours * ray

#This prints the pay

print("Pay =",pay)

Read more about payroll calclations at:

https://brainly.com/question/15858747

In the function below, use a function from the random module to return a random integer between the given lower_bound and upper_bound, inclusive. Don't forget to import the random module (before the function declaration). For example return_random_int(3, 8) should random return a number from the set: 3, 4, 5, 6, 7, 8 The whole point of this question is to get you to read the random module documentation.

Answers

Final answer:

To generate a random integer within an inclusive range in Python, use the 'randint' function from the 'random' module. Ensure the 'random' module is imported, then apply 'randint' with the desired range as its arguments.

Explanation:

To return a random integer between the given lower_bound and upper_bound, inclusive, you can use the randint function from Python's random module. Here is how you can implement the return_random_int function:

import random
def return_random_int(lower_bound, upper_bound):
   return random.randint(lower_bound, upper_bound)
Remember to import the random module before you define the function. The randint function will return an integer where the range includes both endpoints (lower_bound and upper_bound).

Codio Challenge Activity PythonWe are passing in a list of numbers. You need to create 2 new lists in your chart, then put all odd numbers in one list put all even numbers in the other list output the odd list first, the even list secondTip: you should use the modulo operator to decide whether the number is odd or even. We provided a function for you to call that does this.Don’t forget to define the 2 new lists before you start adding elements to them.------------------------------------------------------------Requirements:Program Failed for Input: 1,2,3,4,5,6,7,8,9Expected Output: [1, 3, 5, 7, 9][2, 4, 6, 8]------------------------------------------------------------Given Code:# Get our input from the command lineimport sysnumbers = sys.argv[1].split(',')for i in range(0,len(numbers)):numbers[i]= int(numbers[i])def isEven(n) :return ((n % 2) == 0)# Your code goes here

Answers

Answer:

The python code is given below with lists defined.

Explanation:

import sys

def isEven(n) :

 return ((n % 2) == 0)  //for even items

numbers = sys.argv[1].split(',')

for i in range(0,len(numbers)):

 numbers[i]= int(numbers[i])

even = []

odd = []

for i in numbers:

   if isEven(i):

       even.append(i)  #adds i to even list if it is even

   else:

       odd.append(i)  #adds i to odd list if not even (odd)

print(odd)

print(even)

What security counter measures could be used to monitor your production SQL databases against injection attacks?

Answers

Answer:

Take a close watch on your SQl databases, to get rid of abnormal or unauthorized SQL injections.

Print "Censored" if userInput contains the word "darn", else print userInput. End with newline. Ex: If userInput is "That darn cat.", then output is:


Censored


Ex: If userInput is "Dang, that was scary!", then output is:


Dang, that was scary!


Note: If the submitted code has an out-of-range access, the system will stop running the code after a few seconds, and report "Program end never reached." The system doesn't print the test case that caused the reported message.


#include


#include


using namespace std;


int main() {


string userInput;


getline(cin, userInput);


int isPresent = userInput.find("darn");


if (isPresent > 0){


cout << "Censored" << endl; /* Your solution goes here */


return 0;


}

Answers

Answer:

if(userInput.indexOf("darn") != -1) {

        System.out.println("Censored");

     }

     else {

        System.out.println(userInput);

     }

Explanation:

The code segment is written in C++ and it must be completed in C++.

To complete the code, we simply replace  /* Your solution goes here */ with:

}

else{

   cout<<userInput;

}

The missing code segments in the program are:

The end curly brace of the if-conditionThe else statement that will print userInput, if string "darn" does not exist in the input string.

For (1), we simply write } at the end of the 9th line of the given code segment.

For (2), the else condition must be introduced, and it must include the statement to print userInput.

The complete code where comments are used to explain each line is as follows:

#include<iostream>

#include<string>

using namespace std;

int main() {

//This declares userInput as string

string userInput;

//This gets input for userInput

getline(cin, userInput);

//This checks if "darn" is present in userInput

int isPresent = userInput.find("darn");

//If isPresent is 0 or more, it means "darn" is present

if (isPresent >= 0){

//This prints Censored

   cout << "Censored" << endl;}

//If otherwise

else{

//The userInput is printed

cout<<userInput;

}

return 0;

} // Program ends here

See attachment for the complete code and a sample run

Read more about C++ programs at:

https://brainly.com/question/12063363

Last year the major search engine stopped providing the keyword data when they forwarded the organic users who clicked over from their search results page. What this means is that the site receiving the visitor no longer could determine the performance of users and the specific keywords they used on the search engine to get to the site. In other words, the site's visibility of visitor history was significantly decreased.What effect do you think this had on the volume of traffic?

Answers

Answer:

This action by major search engine  would reduced the volume of traffic for site receiving the users from the search engine.

Explanation:

In order to get a better understanding of the answer above let first understand, what a keywords are.

Keywords are ideas and topics that define what the content of your website is about. In terms of SEO (Search Engine Optimization:it is the process that organizations go through to help make sure that their site ranks high in the search engines for relevant keywords and phrases) they're the words and phrases that searchers enter into search engines. These keyword are important because they are like a bridge between what people are searching for and the content you are providing to fill that need.

When this major search engine stopped providing this keyword data it meant that for those website who relied on those keywords to optimize their website in other to be top ranked on this major search engine and gain more traffic would no longer be able to gain access to these keyword and hence would fall in ranking on this major search engines and this in turn this would reduce the traffic to their website.    

sing your knowledge of the employees table, what would be the result of the following statement:

DELETE FROM employees;

a. Nothing, no data will be changed.
b. All rows in the employees table will be deleted if there are no constraints on the table.
c. The first row in the employees table will be deleted.
d. Deletes employee number 100.

Answers

Answer:

b. All rows in the employees table will be deleted if there are no constraints on the table.

Explanation:

This is a MySql command.

DELETE FROM table_name [WHERE Clause]

If the where clause is not estabilished, as it happens in this example, the entire table will be deleted. The where clause is the constraint, that is, whichever row you want to delete.

The correct answer is:

b. All rows in the employees table will be deleted if there are no constraints on the table.

What tools you need to use to migrate Metadata to Two Different Production Orgs?

A. Force.Com Migration Tool
B. Change Set
C. Force.Com IDE
D. Data Loader
E. Unmanaged Package

Answers

Answer:D.

Explanation:I just did this and d is right

The principal advantage of wireless technology is _____________ .

Answers

Answer:

The principal advantage of wireless technology is increased mobility.

Explanation:

The principal advantage is increased mobility, which means that you can access the network from wherever you are, as long you are in the network range.

For example, the wireless conection may be in the living room for example, and you may access the network from your bedroom, just a simple example.

So:

The principal advantage of wireless technology is increased mobility.

The smallest signed integer number, base 16, that can be store in a variable of type BYTE is__________.

Answers

Answer:

The correct answer is ushort

How do the principles behind the Agile Manifesto suggest approaching architecture?A. Architecture emergesB. Architecture is not important, but functionality is importantC. Architecture is defined and planned up frontD. Architecture is defined and implemented in the first iterations

Answers

The principle behind the Agile Manifesto suggests that Architecture emerges in regard to approach architecture.

Explanation:

Based on the Agile Manifesto's principles or the Manifesto for the best architecture, designs and requirements emerge from self-organizing teams.The principles deal with changing requirements even late in development. Agile processes harness change for customer satisfaction.Business people and developers working throughout the project exposes the fact that both functionality and architecture is important.Agile software development is defined as the development through which requirements and solutions evolve through collaboration and cross-functional terms.Architecture is used in this Manifesto for the following reasons. Adaptable to change Minimized risk Maximized business value

The correct answer is A. Architecture emerges.

According to the Agile Manifesto and its underlying principles, architecture is not strictly defined or planned upfront. Instead, it evolves over time through collaboration, continuous improvement, and iteration.

The principles behind the Agile Manifesto emphasize responding to change and facilitating collaboration among self-organizing teams. One of the twelve principles explicitly states: "The best architectures, requirements, and designs emerge from self-organizing teams." This approach aligns with Agile's focus on adaptability and iterative development rather than rigid, upfront architectural planning.

Division by frequency, so that each caller is allocated part of the spectrum for all of the time, is the basis of TDMA.a. True b. False

Answers

Answer:

False is the correct answer for the above question

Explanation:

Multiplexing is used to combine the many signals into one signal which can be transferred by one wired and the signals are divided by the help of De-multiplexer at the destination end. There are three types of multiplexing in which FDM(Frequency Division Multiplexing) and TDM(Time-division Multiplexing) are the two types.

Frequency division is used to divide the signals on the basis of frequency or signals whereas Time-division frequency is used to divide the signals on the basis of Time.

The above question states about the Frequency division but the name suggests of Time division hence it is a false statement.

The statement is false. TDMA divides the available time into time slots for different users instead of dividing the frequency spectrum. FDMA uses frequency division for this purpose.

The provided statement, 'Division by frequency, so that each caller is allocated part of the spectrum for all of the time, is the basis of TDMA' is False. TDMA (Time Division Multiple Access) allocates different time slots to different users on the same frequency channel, rather than dividing the frequency spectrum itself.

In contrast, FDMA (Frequency Division Multiple Access) assigns individual frequency bands to each user. Therefore, the definition of TDMA involves time division, not frequency division.

Write a program that first gets a list of integers from input (the first integer indicates the number of integers that follow). That list is followed by two more integers representing lower and upper bounds of a range. Your program should output all integers from the list that are within that range (inclusive of the bounds). For coding simplicity, follow each output integer by a space, even the last one. If the input is: then the output is: (the bounds are 0-50, so 51 and 200 are out of range and thus not output). To achieve the above, first read the list of integers into a vector. # include < iostream > # include < vector >

Answers

Answer:

The C program is given below. The code follows the instructions of the question. Follow both as you program for better understanding

Explanation:

#include <stdio.h>

int main()

{

   int n, min, max, i;

   int arr[20];

   

   scanf("%d",&n);

   

   for(i=0;i<n;i++){

       scanf("%d",&arr[i]);

   }

   

   scanf("%d",&min);

   scanf("%d",&max);

   

   for(i=0;i<n;i++){

       if(arr[i]>=min && arr[i]<=max){

           printf("%d ",arr[i]);

       }

   }

   

   return 0;

}

Final answer:

To write a program that outputs integers from a list within a given range, follow these steps: read the integers into a vector, specify the lower and upper bounds of the range, and loop through the vector to check if each integer is within the range.

Explanation:

To write a program that outputs integers from a list within a given range, you can follow these steps:

Read the first integer from the input, which represents the number of integers to followRead the remaining integers into a vectorRead the lower and upper bounds of the rangeLoop through the vector and check if each integer is within the rangeIf an integer is within the range, output it followed by a space

For example, if the input is [7, 12, 25, 51, 200, 5, 8, 40] and the range is 0-50, the program should output: 12 25 5 8 40

Write a program that computes and prints the average of the numbers in a text file. You should make use of two higher-order functions to simplify the design.




An example of the program input and output is shown below:




Enter the input file name: numbers.txt




The average is 69.83333333333333



______________________________________




Filename: numbers.txt




45 66 88



100 22 98

Answers

Answer:

Following is the program code as required.

Comments are given inside the code.

Explanation:

(=> Defining the main function)

def main():

(=> Getting input from user)

file = input("What is name of file?")

(=>Storing text from file in variable data )

data = open(file, "r")

(=> read the file and then split it)

info = data.read().split()

(=> Generating array named numbers)

numbers = []

for line in info:

(=>numbers will be appended from in format to list format)

numbers.append(int(line))

data.close()

(=> Average will be found by dividing sum of numbers to length of array)

avg = float(sum(numbers))/len(numbers)

(=> Printing calculation of average)

print("Calculated average is",avg)

main()

i hope it will help you!

The program is an illustration of file manipulations

File manipulations are used to read from and write into a file

The program in Python where comments are used to explain each line is as follows:

#This gets input for the filename

file = input("Filename: ")

#This initializes the sum and count to 0

sum = 0; count = 0

#This opens the file

fopen = open(file, "r")

#This splits the contents of the file

content = fopen.read().split()

#This iterates through the content of the file

for line in content:

   #This calculates the sum of the numbers

   sum +=int(line)

   #This keeps count of the numbers

   count+=1

   #This closes the file

fopen.close()

#This calculates the average

average = float(sum)/count

#This prints the calculated average

print("Average:",average)

Read more about similar programs at:

https://brainly.com/question/20595337

Write a MATLAB function named mag_force Inputs: (No input validation is required) 1. a scalar value representing charge 2. a 1x3 vector representing velocity 3. a 1x3 vector representing a magnetic field. 4. a 1x3 unit vector representing an axis. Output: 1. a scalar value calculated by taking the the charge times the cross product of velocity and magnetic field and then taking the dot product of that result with the unit vector of the axis F=q(v x B) Force = F . u Example: clc; format compact; e e]) mag_force (6, [1 2 3],[-2 0 1],[1 Should display this in the command window ans = 12 Your code should work for any set of inputs. Do not include test cases, clear all, etc as part of your submission.

Answers

Answer:

The implementation was done with 5 lines of codes given below

Explanation:

mag_force(6, [1 2 3], [-2 0 1], [1 0 0])

function Force = mag_force(q, v, B, u)

F = q .* cross(v, B);

Force = dot(F, u);

end %This brings an end to the program

% This display ans = 12 on the MATLAB command window

% indicating a right implementation

Universal containers has included its orders as an external data object in to Salesforce. You want to create a relationship between Accounts and the Orders object (one-to-many relationship) leveraging a key field for account which is on both external object and Account. Which relationship do you create?

Answers

Answer:

Indirect Lookup Relationship

Explanation:

We can use Indirect Lookup Relationship, where there are external data without ID, en Salesforce.

Make sure the field can distinguish between uppercase and lowercase When defining the custom field of the main object.

For example:

We have contact records with the main object, and we have a list related to social media in the external object with matching social bookmarks.

Which of the following creates an array of 25 components of the type int?
(i) int[] alpha = new[25];
(ii) int[] alpha = new int[25];

Answers

Answer:

(ii) int[] alpha = new int[25];

Explanation:

In JAVA in order to create an array;

int name[];

name = new int[size];

can be written like above, however, to make it shorter can be written like below;

int[] name = new int[size];

Well, name is the array name you assign, int is the type of an array as integer and size you assign for an array, in that sense (ii) is the correct answer

(ii) int[] alpha = new int[25];

alpha is the name of an array

int is the type of array as an integer

25 is the size of an array

Final answer:

The correct syntax to create an array of 25 integer components is 'int[] alpha = new int[25];', whereas option (i) is incorrect due to a syntax error.

Explanation:

The correct way to create an array of 25 components of the type int in Java is option (ii): int[] alpha = new int[25];. This line of code initializes an array named 'alpha' with 25 elements, all of which are integers. Each element in the array is automatically initialized to 0, the default value for int types. Option (i) has a syntax error because it does not specify the type of the array after the new keyword. Remember that the correct syntax requires specifying the type of the array elements when using the new operator.

What is displayed on the console when running the following program?

1. Welcome to Java, then an error message.
2. Welcome to Java followed by The finally clause is executed in the next line, then an error message.
The program displays three lines:

a. Welcome to Java,
b. Welcome to HTML,
c. The finally clause is executed, then an error message.
d. None of these.

Answers

I guess there should be the program code in your question. I presume that the complete version of your question is the following:

What is displayed on the console when running the following program?

public class Test {

 public static void main(String[] args) {

   try {

     System.out.println("Welcome to Java");

     int i = 0;

     int y = 2 / i;

     System.out.println("Welcome to HTML");

   }

   finally {

     System.out.println("The finally clause is executed");

   }

 }

}

A.  Welcome to Java, then an error message.

B.  Welcome to Java followed by The finally clause is executed in the next line, then an error message.

C.  The program displays three lines: Welcome to Java, Welcome to HTML, The finally clause is executed, then an error message.

D.  None of the above.

Answer to the complete question with explanation:

B.     Welcome to Java followed by The finally clause is executed in the next line, then an error message

After entering try/catch block program will output "Welcome to Java".

Then ArithmeticException will be raised at line:

int y = 2 / i;

The reason is division by 0 because i = 0.

After that finally clause will be executed despite exception thrown which will output "The finally clause is executed".

There could be a chance that you have modified answers to your question. In that case:

Answer to the original question:

a. Welcome to Java,

c. The finally clause is executed, then an error message.

Discuss why it is common for XML to be used in interchanging data over the Internet. What are the advantages of using XML in data interchanging?

Answers

Answer:

Gives a clear structure for storing data

Explanation:

XML provide files that are clear to read and simple to produce, data are stored in form of text and in turn it is used as a transfer mechanism that defines how the structure or model should look like. XML is also usually described as a format that describes itself, and it is easy to learn and use.

Create an array of doubles with 5 elements. In the array prompt the user to enter 5 temperature values (in degree Fahrenheit). Do this within main. Create a user defined function called convert2Cels. This function will not return any values to main with a return statement. It should have parameters that include the temperature array and the number of elements. The function should convert the values for Fahrenheit to Celsius and save them back into the same array. Celsius=(F-32)*5/9 From main, print the modified temperature array in a single column format similar to one shown below: Temperatures(Celsius) 37.78 65.56 100.00 0.00 21.11 Test your program with the following values: 100 150 212 32 70

Answers

Answer:

The solution code is written in Java.

import java.util.Scanner; public class Main {    public static void main(String[] args) {        double myArray [] = new double[5];        Scanner reader = new Scanner(System.in);        for(int i=0; i < myArray.length; i++){            System.out.print("Enter temperature (Fahrenheit): ");            myArray[i] = reader.nextDouble();        }        convert2Cels(myArray, 5);        for(int j = 0; j < myArray.length; j++){            System.out.format("%.2f \n", myArray[j]);        }    }    public static void convert2Cels(double [] tempArray, int n){        for(int i = 0; i < n; i++){            tempArray[i] = (tempArray[i] - 32) * 5 / 9;        }    } }

Explanation:

Firstly, let's create a double-type array with 5 elements, myArray (Line 6).

Next, we create a Java Scanner object to read user input for the temperature (8).

Using a for-loop that repeats iteration for 5 times, prompt user to input temperature in Fahrenheit unit and assign it as the value of current element of the array. (Line 11 - 12). Please note the nextDouble() method is used to read user input as the data type of input temperature is expect in decimal format.

At this stage, we are ready to create the required function convert2Cels() that takes two input arguments, the temperature array,  tempArray and number of array elements, n (Line 23).  Using a for-loop to traverse each element of the tempArray and apply the formula to convert the fahrenheit to celcius.  

Next, we call the function convert2Cels() in the main program (Line 15) and print out the temperature (in celsius) in one single column (Line 17-19). The %.2f in the print statement is to display the temperature value with 2 decimal places.

Using Python

You have been hired by a small software company to create a "thesaurus" program that replaces words with their synonyms. The company has set you up with a sample thesaurus stored in a Python dictionary object. Here's the code that represents the thesaurus:

# define our simple thesaurus
thesaurus = {
"happy": "glad",
"sad" : "bleak"
}
The dictionary contains two keys - "happy" and "sad". Each of these keys holds a single synonym for that key.

Write a program that asks the user for a phrase. Then compare the words in that phrase to the keys in the thesaurus. If the key can be found you should replace the original word with a random synonym for that word. Words that are changed in this way should be printed in UPPERCASE letters. Make sure to remove all punctuation from your initial phrase so that you can find all possible matches. Here's a sample running of your program:

Enter a phrase: Happy Birthday! exclaimed the sad, sad kitten
GLAD birthday exclaimed the BLEAK BLEAK kitten

Answers

Answer:

#section 1

import re

thesaurus = {

   "happy" : "glad",

   "sad" : "bleak",

   }

text =input('Enter text: ').lower()

#section 2

def synomReplace(thesaurus, text):

# Create a regular expression  from the dictionary keys

 regex = re.compile("(%s)" % "|".join(map(re.escape, thesaurus.keys())))

 

 # For each match, look-up corresponding value in dictionary

 return regex.sub(lambda x: thesaurus[x.string[x.start():x.end()]].upper(), text)

print(synomReplace(thesaurus, text))

Explanation:

#section 1

In this section, the regular expression module is imported to carry out special string operations. The thesaurus is initialized as a dictionary. The program then prompts the user to enter a text.

#section 2

In the section, we create a regular expression that will search for all the keys and another one that will substitute the keys with their value and also convert the values to uppercase using the .upper() method.

I have attached a picture for you to see the result of the code.

Suppose that you have been running an unknown sorting algorithm. Out of curiosity, you once stopped the algorithm when it was part-way done and examined the partially sorted array. You discovered that the first K elements of the array were sorted into ascending order, but the remainder of the array was not ordered in any obvious manner.

Based on this, you guess that the sorting algorithm could likely be:

Shell's Sort

heapsort

quicksort

merge sort

insertion sort

Answers

The sorting algorithm could likely be: insertion sort.

Insertion Sort

Explanation:

There are may sort is available in programming languages, in this situation  Insertion sort method is used. Here, in insertion sort, the array elements are compared with each other cells and find the smallest value from cells pushed front thus, forming a sorted ascending ordered array.

If we stop the algorithm midway, we would get a sorted array till where the iteration is stopped and the other elements are not sorted or ordered in any way. This sort is only used to find a small number from the array, thus it is easier sorting technique than others.

Create a program with a script that calls the following functions: getinput, calculateGPA, createBor, and printResults. The program is to ask the user how many semesters they have received grades in college. It will then will ask for each semesters GPA and number of units taken. Be sure to include an error check to ensure that all GPA's are between 0.00 and 4.00. 3. The script will then call the function, calculateGPA, to find the cumulative GPA for the user. Next, make a function, createBar, that creates a bar graph showing each GPA entered by semester. Please note that units do not need to be included/displayed. Finally, be sure to print the results to the screen in a user-friendly manneralhiv When printing the results, depending on the cumulative GPA, provide a comment based on how they are progressing through college. -3 your are averag How many semesters in Coege what was your semester 1 &PA, How many mids did yow tke tor semester 1 ?

Answers

Answer:

The script is given below

Explanation:

%%driver

[grades , num_semester ] = getInput( ) ;

gpa = calculateGPA(grades , num_semester) ;

printResult( gpa) ;

createBar( num_semester , grades ) ;

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

function [grades , no_semester] = getInput()

no_semester = input("How many semesters in college " );

for i = 1: no_semester

grades(i) = input( " Enter semester GPA ") ;

if( grades(i) > 4 && grades(i) < 0 )

disp( " Entered Grades are out Of Bounds ") ;

end

 

end

end

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

function GPGA = calculateGPA(grades , no_semester )

sum = 0 ;

for i = 1 : no_semester

 

sum = sum + grades(i) ;

 

end

 

GPGA = sum/( no_semester);

 

 

end

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

function bargraph = createBar( semester_num , grades )

 

bargraph = bar( grades, semester_num) ;

end

%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

function f = printResult( gpga )

 

fprintf( " Your GPGA is : %d \n " , gpga);

 

if( gpga >= 3 && gpga <=4 )

fprintf( " exception good work ") ;

 

end

if( gpga >= 2 && gpga <= 3)

fprintf( " You are average " ) ;

end

if( gpga >= 1 && gpga <= 2 )

fprintf( " you FAIL" ) ;

end

end

The Account class contains a definition for a simple bank account class with methods to withdraw, deposit, get the balance and account number, and return a String representation. Modify the file as follows:1. Overload the constructor as follows:a. public Account (double initBal, String owner, long number) - initializes the balance, owner, and account number as specified.b. public Account (double initBal, String owner) - initializes the balance and owner as specified; randomly generates the account number.c. public Account (String owner) - initializes the owner as specified; sets the initial balance to 0 and randomly generates the account number.2. Overload the withdraw method with one that also takes a fee and deducts that fee from the account.

Answers

Answer:

I've updated the Account class as per the instructions. The instructions mention "the constructor for this class creates a random account number" although I didn't find where that was. As a result, I created a simple method to generates the account number (located at the bottom of the class). Be sure you understand the changes (highlighted in yellow) and feel free to ask follow-up questions:

Explanation:

//*******************************************************

// Account.java

//

// A bank account class with methods to deposit to, withdraw from,

// change the name on, and get a String representation

// of the account.

//*******************************************************

import java.util.Random;   // Used for Random # generator

public class Account

{

      private double balance;

  private String name;

     private long acctNum;

      //----------------------------------------------

 //Constructor -- initializes balance, owner, and account number

  //----------------------------------------------

 public Account(double initBal, String owner, long number)

{

        balance = initBal;

               name = owner;

            acctNum = number;

}

// !!!!!! New Constructor !!!!!!

public Account(double initBal, String owner)

     {

        balance = initBal;

               name = owner;

            acctNum = generateAccountNumber();

       }

  // !!!!!! New Constructor !!!!!!

 public Account(String owner)

     {

        balance = 0;

             name = owner;

            acctNum = generateAccountNumber();

       }

   //----------------------------------------------

 // Checks to see if balance is sufficient for withdrawal.

// If so, decrements balance by amount; if not, prints message.

  //----------------------------------------------

 public void withdraw(double amount)

      {

        if (balance >= amount)

                balance -= amount;

               else

                     System.out.println("Insufficient funds");

}

 // !!!!!! New withdraw() method !!!!!!

   public void withdraw(double amount, double fee)

  {

        double amountWithFee = amount + fee;

               if (balance >= amountWithFee)

                 balance -= amountWithFee;

        else

                     System.out.println("Insufficient funds");

}

   //----------------------------------------------

 // Adds deposit amount to balance.

       //----------------------------------------------

 public void deposit(double amount)

       {

        balance += amount;

       }

  //----------------------------------------------

 // Returns balance.

      //----------------------------------------------

 public double getBalance()

       {

        return balance;

  }

    //----------------------------------------------

 // Returns a string containing the name, account number, and balance.

    //----------------------------------------------

 public String toString()

 {

        return "Name:" + name +

          "\nAccount Number: " + acctNum +

         "\nBalance: " + balance;

 }

 // !!!! NEW PRIVATE HELPER METHOD TO GENERATE ACCOUNT NUMBERS !!!!!

//-------------------------------------------------------

// Returns a random account number between 10000 - 99999

 //--------------------------------------------------------

       private long generateAccountNumber()

     {

        Random r = new Random();        // Seed the random number genertor with the system time

         return 10000 + r.nextInt(89999);        // .nextInt(89999) will return a value between 0 and 89999)

      }

}

4.15 LAB: Mad Lib - loops Mad Libs are activities that have a person provide various words, which are then used to complete a short story in unexpected (and hopefully funny) ways. Write a program that takes a string and integer as input, and outputs a sentence using those items as below. The program repeats until the input is quit 0. Ex: If the input is: apples 5 shoes 2 quit 0 the output is: Eating 5 apples a day keeps the doctor away. Eating 2 shoes a day keeps the doctor away.

Answers

Final answer:

The question involves writing a Mad Libs program using loops in Computers and Technology to generate sentences from user inputs until 'quit 0' is entered. The program requires understanding of loops and string manipulation in programming.

Explanation:

The subject of your question relates to creating a Mad Libs program using loops, which falls under the category of Computers and Technology. A Mad Lib is a phrasal template word game where one player prompts others for a list of words to substitute for blanks in a story before reading aloud. The goal of your lab exercise is to write a program that takes a string and an integer as input, then generates a sentence using these inputs in a humorous way. The program should continue to prompt for inputs until the user enters 'quit 0'. For example:

Input: apples 5

Output: Eating 5 apples a day keeps the doctor away.

Input: shoes 2

Output: Eating 2 shoes a day keeps the doctor away.

To achieve this, you will need to master the use of loops to repeatedly ask for input and utilize string concatenation or formatting to construct the output sentences.

Final answer:

A Mad Lib program requires a loop that prompts for a string and an integer, constructs a sentence with them, and repeats until 'quit 0' is entered. The challenge is to avoid an infinite loop and only run based on user input. It practices programming essentials like loops, input handling, and conditional operations.

Explanation:

The subject of the question is about writing a Mad Lib program using loops. A Mad Lib involves creating a story by filling in blanks with different categories of words such as nouns, adjectives, verbs, etc. The specific task is to write a program that repeatedly asks for a string and an integer, creating humorous sentences until the user inputs 'quit 0'. It's important to note that the program should not create an infinite loop; rather, it should execute the loop based on user input and terminate when instructed to do so. Incorporating elements like loops, user input, and conditional termination is crucial in this program's design.

Cyberwar is a potential threat to America's security, both physically and psychologically. This thesis statement is most likely for a speech about a(n):_______A) organization. B) object. C) concept. D) process. E) event.

Answers

Answer:

Option C i.e., concept is the correct option.

Explanation:

The following option is true because cyberwar is the threat that is a potential attack on the internet for the purpose to damage the security and the information of the national and the international organizations by the DoS(Denial of service attack) and virus and also to steal the confidential data.

Suppose that some company has just sent your company a huge list of customers. You respond to that company with a strongly worded note because you only wanted the phone number of one customer, Mike Smith. They, in turn, reply to you suggesting that you simply find him quickly using binary search. Explain why it might not, in fact, be possible to use binary search on the huge list.

Answers

Answer:

Explanation:

Actually this is possible

First sort the list of all names in ascending order based on string comparison (ASCII value)

The middle can be found as we have total number of contacts

Binary search can be applied by comparing the name string

If any of these is not given or time bound then binary search can not be applied.

In what way are class c mutual fund shares unique?

Answers

Answer:

The Class c shares a class of the mutual fund share which are  divided  by the load of level that includes the annually charges, marketing fund charges,distribution charges and the servicing etc.

Explanation:

In the class c the level load defined as it is an fee periodic paid by the investor during the time he or she owns the investment. It means the total amount which pays by the investor i.e servicing charges ,marketing fund distribution etc  in the mutual fund shares .

(Complete the Problem-Solving discussion in Word for Programming Challenge 2 on page 404. Your Problem-Solving discussion should include Problem Statement, Problem Analysis, Program Design, Program Code and Program Test in Words Document.) Create a program that will find and display the largest of a list of positive numbers entered by the user. The user should indicate that he/she has finished entering numbers by entering a 0.

Answers

Answer:

The approach to the question and appropriate comments are given below in C++

Explanation:

Problem statement:

Write a program that will find and display the largest of a list of positive numbers entered by the user. The user should indicate that he/she has finished entering numbers by entering a 0.

Problem Analysis:

It can be completed in worst-case O(n) complexity, best case O(1) (if the first number is maxed element)

Program Design:

1. Start

2. Take the list of positive numbers for the user until he/she enter 0.

3. store the entered numbers in an array

4. find the max number from it.

5. Print the output

6. End

Program Code:

#include<iostream>

using namespace std;

int main(){

  int num = 0, *array = NULL, i= 0, counter = 0, max = 0;

 

  cout<<"Enter a list of positive numbers to find the maximum out of it and if you enter 0 that is the last number: \n";

  array = new int;

 

  /*Taking input from user until he/she enters 0*/

  while(1){

      cin>>num;

      array[i] = num;

      i++;counter++;

      if(num == 0)

          break;  

  }

 

  cout<<"Print user input numbers: \n";

  for(int i=0;i<counter;i++)

      cout<<"list["<<i<<"] --> "<<array[i]<<"\n";

  cout<<"\n";

 

  /*Find max element*/

  max = array[0];

  for(int i=0;i<counter;i++){

      if(array[i] > max)

          max = array[i];  

  }

  cout<<"Max number = "<<max<<"\n";      

  delete array;  

  return 0;

}

Other Questions
why was Dag Hammarskjold's body intact and everyone else's burned after his plane crashed? Construct the graph of the equation y=kx if it is known that the point B belongs to the graph. The graph of which of these two equations goes through point M(10, 15)?B(2, 3)B(3 1/3, -2)WILL AWARD BRAINLIEST AS USUAL!! DEPENDS ON MY GRADE!! HELP FAST IM IN CLASSWhich of the following best describes the rate of motion of a glacier?Very quicklySame as turbidity currentsVery slowlySame as the speed as continental drift Read the sentence. Tension erupted in the room when it was revealed that the villain knew that the spy withholding information. Which is the best revision of the sentence? a.Tension will erupt in the room when it was revealed that the villain knew that the spy withholding information. b.Tension erupted in the room when it reveals that the villain knew that the spy withholding information. c.Tension erupted in the room when it was revealed that the villain will know that the spy withholding information. d.Tension erupted in the room when it was revealed that the villain knew that the spy withheld information. in countries with high rates of poverty and low levels of education there has been a significant increase in the number of young children who have died because of:__________ According to Steinbeck, when ex-soldiers do not talk about their battle experience they are described as:________. Selling insurance without a license without misappropriating premium funds is a ________. When sales situations call for gathering standardized information on customers, but no relationship building is necessary, then: Select which option best completes the following statement: In pure Scrum, the team reports to the____________.Select one:a. Scrum Masterb. No Onec. Project Managerd. Product Owner How many degrees of freedom does the chi-square test statistic for a goodness of fit have when there are 10 categories? a. 9 b. 7 c. 62 d. 74 A compressed spring in a toy is used to launch a 5.00-gram ball. If the ball leaves the toy with an initial horizontal speed of 5.00 meters per second, the minimum amount of potential energy stored in the compressed spring was: a) 0.0125 J b) 0.0250 J c) 0.0625 J d) 0.125 J Jennifer, Martin, and Edsel form a limited liability company called Big Apple, LLC, to operate a bar in New York City. Jennifer, Martin, and Edsel are member-managers of the LLC. One of Jennifers jobs as a member-manager is to drive the LLCs truck and pick up certain items of supply for the bar each Wednesday. On the way back to the bar on Wednesday after picking up the supplies for that week, Jennifer negligently runs over a pedestrian, Tilly Tourismo, on a street in Times Square. Tilly is severely injured and sues Big Apple, LLC to recover monetary damages for her injuries. Who is liable? Why? From 1980-1990, the population of a country was increased by 20%. From 1990-2000, the population of the country was increased by 20%. From 2000-2010, the population of the country was increased by 20%. Population (in percentage) of the country from 1980-2010 was increase byplease I need a good step by step explanation I try to resolved it but I can't do it An ecosystem contains A. only the biotic (living) components of the environment B. only the abiotic (nonliving) components of the environment C. only the energy flow components of an environment D. both the living organisms and the abiotic components of the environment E. only the food relationships found in an environment Enter your answer and show all the steps that you use to solve this problem in the space provided.Explain how mental math can be used to estimate a 15% tip on a taxi ride that costs $23.25. Find the tip using that method. State park officials recently released a report urging hikers in Rockridge Mountain Park to exercise caution during the months of April and May. According to the report, the number of mountain lion sightings in the park reaches its peak in the months of April and May.All of the following could account for the increased number of mountain lion sightings EXCEPTA. During April and May, which feature the best hiking weather of the year, more people visit the park than during any other time of year.B. Throughout the year, local newspapers report any mountain lion sightings, and most reports come during the months of April and May.C. The red-tailed deer, the mountain lions primary food source, is most abundant during these months and tends to favor hiking trails.D. In spring, the trail conditions are best for mountain bikers, who, because they make less noise than hikers, are more likely to startle mountain lions.E. Creek beds high in the mountains tend to dry up in spring, so mountain lions often descend into the lower elevations, where hikers are more common. describe the personality characteristics of president Johnson that led many members of Congress to view Johnson as a creature of disgust PLEASE HELPFind the volume of the prism.50 yd3250 yd3200 yd320 yd3 Which of the following are "Best Practices" that may be appropriate for software intensive programs? (Select all that apply)Possible Answers (Please comment if you have the answer, Thank You):Consider the risks of reusing existing softwareUse metrics to manage and monitor riskTo speed development, only test software at completionGenerate new code whenever possible Which one of the following is not an advantage of "early and continuous delivery of valuable software?a. Working software is a good measure of progress. b. Allows for customer to see software early and provide feedback. c. % Complete is an effective and accurate measure of project completion in large projects. d. Failing early is better than failing late. Steam Workshop Downloader