a machine administers medication dosage based on weight. write an if-elseif-else statement that assigns the appropriate dosageamount given userweight.

Answers

Answer 1

This type of if-elseif-else statement is useful when you need to choose from a limited number of options based on a specific condition.

Here's an example if-elseif-else statement that assigns the appropriate dosage amount based on user weight:

if (userWeight < 10) {

   dosageAmount = 2.5; // Dosage for weight less than 10 pounds

} else if (userWeight >= 10 && userWeight < 20) {

   dosageAmount = 5.0; // Dosage for weight between 10 and 20 pounds

} else if (userWeight >= 20 && userWeight < 30) {

   dosageAmount = 7.5; // Dosage for weight between 20 and 30 pounds

} else {

   dosageAmount = 10.0; // Dosage for weight 30 pounds or more

}

In this example, the if statement checks if the user's weight is less than 10 pounds, and assigns the dosage amount of 2.5 if true. The first else if statement checks if the user's weight is between 10 and 20 pounds, and assigns the dosage amount of 5.0 if true. The second else if statement checks if the user's weight is between 20 and 30 pounds, and assigns the dosage amount of 7.5 if true. If none of the conditions are met, the else statement assigns the dosage amount of 10.0 for a weight of 30 pounds or more.

To know more about if-elseif-else statement,

https://brainly.com/question/13465146

#SPJ11


Related Questions

channel __________ allow you to be notified about subsequent uploads to a channel you like.

Answers

Channel subscription allow you to be notified about subsequent uploads to a channel you like.

A subscription channel allows a user to subscribe to a channel they like, which means that they will receive notifications whenever new content is uploaded to that channel. This feature is commonly used on platforms like You-Tube, where users can subscribe to channels they enjoy watching to stay up to date with new videos. By subscribing to a channel, users can ensure that they don't miss out on any new content from their favorite creators. Therefore, the correct word that fills the blank is "subscription".

You can learn more about channel subscription at

https://brainly.com/question/31403629

#SPJ11

What is the full form of UNIVAC, QBASIC?​

Answers

UNIVersal Automatic Computer (UNIVAC)

Quick Beginner's All-Purpose Symbolic Instruction Code (QBasic)

Explanation:

UNIVAC:Universal Automatic Computer

QBASIC:Quick Beginner's All-Purpose Symbolic

Instruction Code

Keep smiling and hope u r satisfied with my answer.Have a great day :)

Which of the following are advantages of using WYSIWYG? Check all of the boxes that apply.

You can focus on content.

You can find and debug problems in the code.

You can format text and apply styles without knowing much HTML.

You do not need much knowledge of HTML to create complex web pages.

Answers

Drag the items to the desired positions to alter the layout of a page. 3. Instead of looking for and putting content within HTML elements or utilising a complicated content management system, you can modify content (text or photos) in a WYSIWYG editor.

What are some instances of WYSIWYG?WYSIWYG, or "what you see is what you get," is a sort of editing software that enables users to view and modify information in a format that resembles how it would be presented on an interface, website, slide presentation, or printed document. For instance, a word processor uses the WYSIWYG idea when you write a document on it. When you print or send a document as a PDF, exactly the same information that you type into it will have been edited and formatted (ie. what you created on screen, you get). WYSIWYG (What-You-See-Is-What-You-Get) and manual coding are the two most popular ways to create HTML texts.

To learn more about WYSIWYG, refer to:

https://brainly.com/question/23272442

Answer: ACD-You can focus on content. You can format text and apply styles without knowing much HTML.

You do not need much knowledge of HTML to create complex web pages.

Explanation:

What is the function of the following shape? display result to user get input from user make a decision process information

Answers

Answer:

yep its decision

Explanation:

the buying and selling of goods over the internet is known as

Answers

The buying and selling of goods over the internet is known as E-commerce. E-commerce refers to the buying and selling of goods and services over the internet.

E-commerce includes a wide range of activities such as online retail, electronic payments, internet auctions, and online marketplaces. E-commerce has grown rapidly in recent years, driven by advancements in technology and the increasing use of the internet by consumers. It allows businesses to reach a global audience and operate 24/7, as well as providing consumers with greater convenience and choice. Additionally, e-commerce has opened up new opportunities for entrepreneurs and small businesses to sell their products and services online.

Learn more about E-commerce: https://brainly.com/question/29732698

#SPJ4

Translated in English :
Question #2 :
a. Determine the total resistance.
b. Determine the total current.
c. Determine the voltage drops Va, Vb and Vc.

I need help with the question #2 c.

Translated in English : Question #2 : a. Determine the total resistance. b. Determine the total current.

Answers

Answer:

a

Explanation:

the first step while using an _____ style sheet is to use a text editor to create and save a document with a .css extension.

Answers

The first step while using an external style sheet is to use a text editor to create and save a document with a .css extension.

CSS (Cascading Style Sheets) is a styling language used to describe the presentation of a document written in HTML or XML. There are three main methods of using CSS: inline, internal, and external.

When using an external style sheet, the CSS code is written in a separate file with a .css extension. The first step is to open a text editor (such as Notepad, Sublime Text, or Visual Studio Code) and create a new document. Then, the CSS code is written in this document and saved with a .css extension, such as "styles.css". This file can be referenced by HTML or XML documents to apply the specified styles.

Once the external CSS file is created and saved, it can be linked to the HTML or XML document using the `<link>` tag in the `<head>` section of the HTML document. This allows the styles defined in the CSS file to be applied to the corresponding elements in the HTML or XML document.

To know more about CSS (Cascading Style Sheets)

brainly.com/question/32550212

#SPJ11

true or false? intrusion detection systems record events that match known attack signatures, such as buffer overflows or malicious code execution.

Answers

True. Intrusion Detection Systems (IDS) are security tools that monitor network traffic or system events to identify and alert security teams to potential security threats.

They work by analyzing the traffic or events for patterns that match known attack signatures or abnormal behavior. The signatures are based on previously identified attacks, such as buffer overflows, denial-of-service attacks, and malicious code execution. IDS can also detect new and unknown attacks by analyzing the behavior of the network or system and comparing it to normal patterns.There are two types of IDS: network-based and host-based. Network-based IDS monitor network traffic, while host-based IDS monitor system events. Both types can detect and prevent security breaches, but network-based IDS are more effective in detecting external attacks, while host-based IDS are more effective in detecting internal attacks.Intrusion Detection Systems are essential tools for any organization that wants to protect their network and systems from potential security threats. They provide real-time alerts and detailed reports that help security teams quickly identify and respond to security incidents. IDS are an important part of a comprehensive security strategy and should be used in conjunction with other security tools, such as firewalls, antivirus software, and vulnerability scanners.

For such more question on Network

https://brainly.com/question/21527655

#SPJ11

What is the best CPU you can put inside a Dell Precision T3500?

And what would be the best graphics card you could put with this CPU?

Answers

Answer:

Whatever fits

Explanation:

If an intel i9 or a Ryzen 9 fits, use that. 3090's are very big, so try adding a 3060-3080.

Hope this helps!

Which of the following provides button to facilitate
navigation?
Select one:
a. Status bar
b. Content bar
c. Standard tool bar
d. URL bar

Answers

Answer:

fdsjhvnbldisuacvnndioavndaf vdsieaonvafvno[avinagb difjiiojdfoigp;afdsigadpg;

Explanation:

State 5 differences between an application and a website/webpage

Answers

The differences between an application and a website/webpage are:

Web applications are created for user interaction. Essentially static content can be found on websites. The user of a web application has access to read the content and edit the data.The website visitor can only view the material; they cannot edit it and  Before deployment, the web application site needs to be precompiled.It's not necessary to pre-compile the webpage and A web application performs a variety of complicated tasks.The website's purpose is straightforward and Users of web applications can interact with them.Users cannot interact with a website and A web application involves a lot of browser functionality.

What is a website?

A website is a collection of openly viewable pages including documents, photos, audio, text, or other things that internet users can access.

Therefore, Several pages or only one page might make up a website. A URL must be typed into the search box of the user's web browser in order to access a website.

Learn more about webpage from

https://brainly.com/question/9060926
#SPJ1

What is row and column? class 9​

Answers

Answer:

just click the picture

Explanation:

plz mark me a BRAINLEST plss I just need it

What is row and column? class 9

For Questions 3-5, consider the following code:

stuff = []

stuff.append(1.0)
stuff.append(2.0)
stuff.append(3.0)
stuff.append(4.0)
stuff.append(5.0)

print(stuff)

What data type are the elements in stuff?

Answers

In the above code, the elements in stuff are of type float.

What is the rationale for the above response?

The elements in the stuff list are of type float, which is a numeric data type that represents real numbers with a fractional component.

The values assigned to the stuff list using the append method are all decimal numbers, which are interpreted as float values by Python. Floats are commonly used for scientific and engineering computations because they allow for precision in decimal calculations.

In this code, the print statement outputs the stuff list, which displays the five float values that were added to the list using the append method.

Learn more about code at:

https://brainly.com/question/30429605

#SPJ1

Question :the ubiquitous nature of mobile phones today brings tremendous convenience to our lives, but will misuse of new improvements to this technology result in the loss of that convenience? for instance, camera phones are now banned in many fitness centers, park restrooms, and other similar facilities because some people have used them inappropriately to take compromising photos, and mobile phones are banned in many classrooms because of the disruption of constant text messaging and the use of the phone by dishonest students to cheat on exams. do you think these reactions to mobile phone misuse are justified? is there another way to ensure the appropriate use of mobile phones without banning their use for all individuals? should there be more stringent consequences for those who use technology for illegal or unethical purposes?

Answers

The prevalence of mobile phones has revolutionized the way we communicate and access information. They have become an integral part of our daily lives and have made our lives more convenient in many ways. However, there are also negative consequences associated with their use, such as the misuse of new improvements in technology.

In recent years, we have seen an increase in inappropriate behavior with the use of camera phones and mobile phones, leading to the banning of their use in certain places and situations.The ban on camera phones in fitness centers, park restrooms, and other similar facilities is justified to a certain extent. This is because some individuals have used these devices to take compromising photos of others without their consent. This behavior is not only unethical but also a violation of privacy and can lead to emotional distress for the victim. Therefore, it is important to implement measures that protect individuals' privacy and safety in such settings.
Similarly, mobile phones are banned in many classrooms to prevent cheating during exams and the disruption of constant text messaging. This is understandable because the inappropriate use of mobile phones can affect the quality of education and create an unfair advantage for some students. Therefore, it is important to ensure that students are not using their mobile phones during class time.

To know more about technology visit:

brainly.com/question/26594591

#SPJ11

Rachel is planning on writing code that will have to do computations with very large
numbers. Which of the following is the most important issue she should check
before writing her code?
PLEASE

Answers

Group of answer choices.

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

B. Rachel should reset her machine to store data using hexadecimal values instead of binary.

C. Rachel should run a program to ensure that she has enough memory on her machine to write the program itself.

D. Rachel does not have to worry about the size of the numbers

Answer:

A. Rachel should look up how many bits are used to store integers and floating point numbers in the programming language she is using.

Explanation:

In Computer programming, a bit is a short word for the term binary digit and is primarily the basic (smallest) unit measurement of data or information.

A bit is a logical state which represents a single binary value of either one (1) or zero (0). This ultimately implies that, a single bit in computer science represents a boolean value of;

1. True or ON, which is equal to one (1).

2. False or OFF, which is equal to zero (0).

Additionally, a binary numbering represents all numeric values that are to be written in sequences of ones (1s) and zeroes (0s). Therefore, a binary number refers to any numerical value (number) that is expressed in base-2 numerical system; 0s and 1s.

Also, the total numbers which can be represented with an 8 bit binary (base-2) system is 256.

For all computations that would involve the use of very large numbers, it's important to look up how many bits are used to store integers and floating point numbers.

In this context, Rachel should ensure that she check how many bits the chosen high-level programming language uses to store integers and floating point numbers before writing her codes.

Mail Tips can be displayed on the top of the message address bar for different circumstances, such as
automatic replies when the recipient is
and can refer the sender to another
a moderated group where the message requires
before it can be sent to the recipients.

Answers

Answer:

automatic replies when the recipient is

✔ out of the office

and can refer the sender to another

✔ recipient

.

a moderated group where the message requires

✔ approval

before it can be sent to the recipients.

Explanation:

got it right on edge 2020-2021

Automatic replies when the recipient is out of the office and can refer the sender to another recipient. A moderated group where the message requires approval. Before it can be sent to the recipients.

What are office gestures?

In the workplace, gestures can communicate a lot of information without the speaker ever saying a word. Employees respond to other people's body language as perceived at work.

Interactions at work are influenced by facial expressions, eye contact, and touch. Some refer to it as body language. Some refer to it as kinesics. A gesture is a visible body activity that conveys specific messages in place of or in addition to words. It is a type of nonverbal or nonvocal communication.

Therefore, Automatic responses can direct the sender to another destination if the intended recipient is unavailable. A discussion forum where messages must be approved. Before the recipients can receive it.

To learn more about office gestures, refer to the link:

https://brainly.com/question/25547729

#SPJ2

requirements for word processing in document language

Answers

Answer:

What are the things that you required to perform word processing?

1. Use Keyboard Shortcuts

2. Create and Manage Lists

3.Turn Off Automatic Numbered Lists

4.Find and Replace Text

5.Insert a Table

6.Format a Table

7.Insert a Chart

8.Interact With pictures

9.Track and Manage Changes

10.create and manage paragraph Styles

What does CRM stand for in Big Data Analytics?

Answers

Answer: Customer Relationship management

Explanation: did it last year and it was correct

In the context of html audio and video element attributes, the preload attribute’s type _____ is used to preload only descriptive data about a particular clip.

Answers

In the context of HTML audio and video element attributes, the preload attribute's type "metadata" is used to preload only descriptive data about a particular clip.



The preload attribute is used to specify how the browser should load the media resource. There are three possible values for the preload attribute: "auto", "metadata", and "none".

When the preload attribute is set to "metadata", the browser will only load the metadata of the media resource. This includes information such as the duration, dimensions, and other descriptive data about the clip. The actual media content, such as audio or video, will not be preloaded.

This is useful in situations where you want to display information about the media resource, without actually playing the content. It allows the user to see the metadata of the clip, without having to wait for the entire media file to load.

To use the preload attribute with the type "metadata", you would add it to the HTML audio or video element, like this:

This will instruct the browser to load only the metadata of the video file, improving the loading time and user experience.

To know more about HTML, visit:

https://brainly.com/question/32819181

#SPJ11

a command that creates a reverse image of a picture or object. is called

Answers

Answer:

Explanation:

The command that creates a reverse image of a picture or object is called **"flip"**.

The "flip" command is commonly used in image editing or manipulation software to horizontally or vertically reverse an image. By applying the "flip" command, the pixels of the image are flipped along the specified axis, resulting in a mirror image of the original.

In different software or programming languages, the specific syntax or function name for the flip command may vary. For example, in image editing software like Adobe Photoshop, the flip command is available under the "Edit" menu as "Flip Horizontal" or "Flip Vertical". In programming languages like Python with libraries such as OpenCV, there are functions like "cv2.flip()" to perform image flipping operations.

Learn more about  revrse image here:

https://brainly.com/question/32809600

#SPJ11

Suppose users share a 3 mbps link. also suppose each user requires 150 kbps when transmitting, but each user transmits only 10 percent of the time .

Answers

Each user can transmit data at a rate of 150 kbps on a shared 3 mbps link, with each user transmitting only 10 percent of the time.

In this scenario, the shared link has a capacity of 3 mbps (megabits per second). Each user requires 150 kbps (kilobits per second) when transmitting data. However, each user only transmits 10 percent of the time.

To calculate the maximum number of users that can be supported on this link, we need to consider the effective bandwidth available for each user. Since each user transmits only 10 percent of the time, we can multiply the required bandwidth (150 kbps) by 10 to find the effective bandwidth per user during their transmission periods.

150 kbps * 10% = 15 kbps

Now, we can calculate the maximum number of users using the available link capacity:

3 mbps / 15 kbps = 200 users

Therefore, the shared 3 mbps link can support a maximum of 200 users, with each user transmitting at a rate of 150 kbps during their active periods.

Learn more about transmit data

brainly.com/question/28837869

#SPJ11

When you write code to count the number of times red is the color, what is the index of "red"?
O 2
O 3
0 1
оо

Answers

Answer:

1

Explanation:

Remember it starts with 0. Correct on edge.

Dallas is a 10-year-old boy who has a mental age of 10 years. his iq would be ________.

Answers

Based on the information provided, Dallas's IQ would be 100, which is considered average for his age group.

Dallas, being a 10-year-old boy, has a mental age of 10 years. To determine his IQ, we can use the formula:

IQ = (Mental Age / Chronological Age) x 100

In this case, since Dallas's mental age is equal to his chronological age (both are 10 years), we can substitute these values into the formula:

IQ = (10 / 10) x 100

Simplifying this equation, we find:

IQ = 1 x 100

Therefore, Dallas's IQ would be 100.

The IQ score of 100 is considered to be average. It indicates that Dallas's intellectual abilities are in line with what is typically expected of a 10-year-old child. An IQ score of 100 means that Dallas's performance on intelligence tests is at the average level compared to others his age.

It is important to note that IQ is just one measure of intelligence and does not capture the full range of abilities and talents a person may possess. Additionally, while IQ tests can provide some insight into cognitive abilities, they do not measure other important factors such as creativity, emotional intelligence, or practical skills.

Learn more about Dallas's IQ here:-

https://brainly.com/question/31824872

#SPJ11

To make your brand colors stand out, it is important to implement what with your color scheme?
A. Blacks
B. Grays
C. Whites
D. All of the above.

Answers

Answer:

All of the above

Explanation:

It's better to have a pattern of colors than one single color in you color scheme.

Answer:

D. All of the above

Explanation:

Which step in the software development life cycle involves making improvements based on user feedback?

Coding
Design
Maintenance
Testing

Answers

Answer:

Design Phase

Explanation:

In design phase developers make prototypes. The prototype is the solution without actual implementation. That prototype is shown to the user for the purpose of getting feedback. So design phase of SDLC involves making improvements based on user feedback.

Answer:

Testing

Explanation:

When you test the game to see if it's fun you try to get feedback from users

Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Internet.

Answers

Hello!

The answer would be: firewall.

I hope that this helps you!

1.a computer can create an output based on the input of the user.

process store retrieve communicate personal computer desktop computer laptop computer netbook tablet smartphone server game consoles​

Answers

Answer:

But users are very much aware of the input and output associated with the computer. They submit input data to the computer to get processed information, the output. Sometimes the output is an instant reaction to the input. ... The output is the computer's instant response, which causes the forklift to operate as requested.

plants absorb water through root hairs.How do you think this water is used by the plants?​

Answers

Plants absorb water from the soil by osmosis. They absorb mineral ions by active transport, against the concentration gradient. Root hair cells are adapted for taking up water and mineral ions by having a large surface area to increase the rate of absorption.

(20points)
Why did Jinny get an error when she tried to use the variable 1stName?

Variables should be two words.
Variables cannot begin with a digit.
Variables should start with a number.
Variables should always be camelCase

Answers

Answer:

PLEASE LISTEN TO ME!! THE OTHER ANSWER IS WRONG!

Explanation:

The correct anwer is "Variables cannot begin with a digit"

What is the purpose of a Post Mortem Review? (5 points)

Answers

Answer:

The interpretation of the discussion is characterized throughout the explanation portion below.

Explanation:

A post-mortem investigation, as well widely recognized as the autopsy, has become a post-mortem assessment of that same body. This same goal of some kind of post-mortem should be to investigate what happened. Post-mortems have been performed by pathologists (Physicians specializing in considering the mechanisms as well as tends to cause including its illness).

Other Questions
Suppose that 256.0 J of heat is transferred by conduction from a heat reservoir at a temperature of 405.0 K to another reservoir. Calculate the entropy change if the temperature of the second reservoir is 100.0 K. explain Initially, a population is 500, and it grows by 5% each year. Explain why the population is an exponential function of time. 11. What are the missing reasons in the two column proof?Given: M bisects ZPMN and OM bisects ZPONProve: APMO MANMOStatementsReasons1. MO bisects ZPMN2. ZPMO 3ZNMO3. MOMO4. OM bisects ZPON5. ZPOM ZNOM6. A PMO SANMO1. ?2. ?3. 124. I?5. ?6. ? When Danielle joined her schools soccer team, she made friends with Kyoki. Kyoki is the teams star and high scorer. However, Kyoki never warms up, does not follow a healthful eating plan, and does not cool down when practice or games end. Kyoki has recently begun telling Danielle that she is wasting her time doing those activities. Write a short skit in which Danielle and Kyoki resolve their conflict. these pictures were from cemetaries in the unties states which is in a developed country. in what ways could the data from the 1800s be like a developing country of today A meter is an Sl unit. Which quantity might you measure in meters?OA. temperatureOB.massO c. lengthD.electric current What is the reflection of Point D?(3, -2)(-3, -2)(-3, 2)(3, 2) "NHNO(s)NO(g)+2HO(l) 45.7 g of ammonium nitrate is decomposed. Find the amount of each of the products formed in moles." 1. Find the axial loading impact energy capacity ratio of the two round bars (same material) given below. EK=1.3 K=1.3 u Area = 900mm? Area-comm Larry long kel.5 A A=700mm K=1,3 K-1,3 Was_____ du mit 18 jahren? Mr. Scooby has developed a dry cough after taking a medication. Which medication is most likely responsible for this? Altace Diovan Micardis Tribenzor assume that four polygenic gene pairs are involved in determining phenotypes of f2. how many phenotypic classes are expected? Food poisoning is typically the result of which type of pathogen, which can usually be treated with antibiotics?VirusParasiteFungiBacteria At t=1.0s, a 0.40 kg object is falling with a speed of 6.0 m/s. At t=2.0s, it has a kinetic energy of 25 J.Part AWhat is the kinetic energy of the object at t=1.0s? IN JOULESPart BWhat is the speed of the object at t=2.0s? in m/sPart CHow much work was done on the object between t=1.0s and t=2.0s? IN JOULES .2. Bacteria are prokaryotes.What does this mean? 21 3x = 6321 3(x) = 6?-3x = 6? If A = 1a.-2 6 1b.-59 -6 and B= -2 -7110-99-9-22 30 32-16 -78 4842 24 30-32 72 30-226 -20-5094 -589 64-1find-4A + 6B.C.d.38830-78-406 04258-968 0 -181482 -52 given a sorted list of 64 elements ex: 42 how many distinct list elements are compared for binary search if the search key is greater than all elements in the list? help me plz people never help me How do you make a 4 quadrant line graph in Excel?