what is arts and creativity literacy in your own idea
Answer:
Art is the skill that include skill and Talend to create fine painting, drawing and sculptures creatively is the skill of using your imagination to create and solve
Explanation:
Art includes painting, drawing and sculptures
And you do not need to be creative to de and artist or be an artist to create a stuff
C-PROGRAMING
You are to create 3 Random numbers from 0-100 for the first person.
You are then to ask the user to input 3 numbers from 0-100 for the second person.
Tell me who has the bigger "average".
DISPLAY the GRADES, AVERAGES and the LETTER GRADE of each person.
You are to display the averages with only 1 place after the decimal point.
int main() {
int p1[3], p2[3]; // arrays to store the 3 numbers for each person
float p1_avg, p2_avg; // variables to store the average of each person
char p1_grade, p2_grade; // variables to store the letter grade of each person
// generate 3 random numbers from 0-100 for the first person
srand(time(NULL)); // seed the random number generator with current time
for (int i = 0; i < 3; i++) {
p1[i] = rand() % 101; // generate a random number from 0-100
}
// ask the user to input 3 numbers from 0-100 for the second person
printf("Enter 3 numbers from 0-100 for the second person:\n");
for (int i = 0; i < 3; i++) {
scanf("%d", &p2[i]); // read the input number
}
// calculate the average of each person
p1_avg = (p1[0] + p1[1] + p1[2]) / 3.0;
p2_avg = (p2[0] + p2[1] + p2[2]) / 3.0;
// determine the letter grade of each person based on their average
if (p1_avg >= 90) {
p1_grade = 'A';
} else if (p1_avg >= 80) {
p1_grade = 'B';
} else if (p1_avg >= 70) {
p1_grade = 'C';
} else if (p1_avg >= 60) {
p1_grade = 'D';
} else {
p1_grade = 'F';
}
if (p2_avg >= 90) {
p2_grade = 'A';
} else if (p2_avg >= 80) {
p2_grade = 'B';
} else if (p2_avg >= 70) {
p2_grade = 'C';
} else if (p2_avg >= 60) {
p2_grade = 'D';
} else {
p2_grade = 'F';
}
// display the grades, averages, and letter grades of each person
printf("Person 1 Grades: %d %d %d\n", p1[0], p1[1], p1[2]);
printf("Person 1 Average: %.1f\n", p1_avg);
printf("Person 1 Letter Grade: %c\n", p1_grade);
printf("Person 2 Grades: %d %d %d\n", p2[0], p2[1], p2[2]);
printf("Person 2 Average: %.1f\n", p2_avg);
printf("Person 2 Letter Grade: %c\n", p2_grade);
}
Hope I helped :)
What are the Difference between turbo C++ and Java programing?
**Difference between Turbo C++ and Dev C++
Answer:
1. Turbo C++ (TC) :
It is a compiling software used for C and CPP Language. The initial release was in May 1990 but the first stable version released in September 2008. It takes more memory and time to load as compared to Dev C++. Turbo C++ is the compiler from which most of us start our coding life in school/college.
2. Dev C++ :
Dev C++ is also used for C and CPP Language. The first stable release was in April 2015. It is fast as compared to Turbo C++. Dev C++ is very much similar to Online Compilers which we used in Coding Competitions.
Which of the following options can you set when you create or edit a data bar conditional formatting rule? Select all the options that apply.
1.) how to display negative values
2.) value used for the longest data bar
3.) font color of the text
4.) fill color of the data bars
When creating data bar using conditional formatting, you can fill color of the data bars and select the display of negative values.
Microsoft Excel
Conditional formatting is done to automatically apply formatting using colors, icons, and data bars to cells based on their value.
Conditional formatting makes it easy to select cells or ranges of cells.
When creating data bar using conditional formatting, you can fill color of the data bars and select the display of negative values.
Find out more on Microsoft Excel at: https://brainly.com/question/1538272
What is a foreign key? a security key to a database that stores foreign data a security key to a database located in another country a field in a table that uniquely identifies a record in a relational database a field in a table that links it to other tables in a relational database
Answer: a field in a table that links it to other tables in a relational database
A - a security key to a database that stores foreign data
explain why analogue to digital conversion is needed when computers are used in monitoring and measuring
I need a long and detailed answer for this please
Answer: When computers are built, they are put together and shipped to who ever. Now, with analogue is used for information and data storage, and typically, the motherboard is supposed to keep the computer from obtaining viruses, but just in case, the analogue acts as a substitution. Therefore, the analytics of computers are far more advanced than what you may think. Monitoring is an example of a running computer, if the computer is up and running and nothing is wrong, then the monitor and screens are all in check. Suppose you have a computer that malfunctions. What you can determine is that the analogue is being messed with. In a way, the analogue also functions like sensors. Sensors will indicate if something goes wrong with the computer and how to act upon the situation.
The reason Why analogue to digital conversion is needed when computers because Sensors feedback analogue data but computers can only function with digital/binary data.
Why move from analog to digital?A digital signal is one that can take more information than an analog signal, and as such, more sound and video options can move to one's TV set.
Therefore, The reason Why analogue to digital conversion is needed when computers because Sensors feedback analogue data but computers can only function with digital/binary data.
Learn more about analog from
https://brainly.com/question/26307469
#SPJ6
What is the main reason for assigning roles to members of a group?
It speeds up the time it takes to do a task.
It provides a way for the group to meet on a regular basis.
It allows one person acting in the role of the facilitator to take charge and do all the work.
It creates leadership and direction for the team, making it easier to work together for a common purpose.
Answer: it creates leadership and direction for the team, making it easier to work together for a common purpose.
Explanation:
The reason for assigning roles to members of a group is that it creates leadership and direction for the team, making it easier to work together for a common purpose.
When roles are delegated to the members of a group, each person gets his or her own part of the job or project. This makes it easier to work together and as a team. It also ensures that the project is handled well and faster as it creates a direction.
Answer:
D. It creates leadership and direction for the team, making it easier to work together for a common purpose.
Explanation:
Match the feature to its function.
1. Normal View
provide rows of icons to perform different tasks
2. Notes View
displays thumbnails
3. Slide Pane
place where information for handouts can be added
4. Title Bar
provides filename and Minimize icon
5. Toolbars
working window of a presentation
The Matchup of the feature to its function are:
1. Normal view the place where creating and editing occurs .
2. Notes view an area in which information for handouts can be added.
3. Slide pane the place where the slide order can be changed.
4. Menu bar contains lists of commands used to create presentations
5. toolbars provide rows of icons to perform different tasks.
What is the normal view?Normal view is known to be the view that is seen or used in editing mode and this is where a person can work a lot of items so that they can create their slides.
Note that Normal view is one that shows slide thumbnails on the left, that is a large window that depicts the current slide, and also has a section that is often seen below the current slide.
The Matchup of the feature to its function are:
1. Normal view the place where creating and editing occurs .
2. Notes view an area in which information for handouts can be added.
3. Slide pane the place where the slide order can be changed.
4. Menu bar contains lists of commands used to create presentations
5. toolbars provide rows of icons to perform different tasks.
Learn more about Normal View from
https://brainly.com/question/14596820
#SPJ1
how i want to be good in coding for subject c programming? anyone has a suggestion?
Answer:
Get more details about Standard Library Functions in C.
Use logical variable names to avoid any confusion.
Don't forget to check a complete guide for Variables in C.
Explore how Escape Sequence in C make your coding better.
1.
_______touchscreens detect changes in
electrical currents to register input.
Answer: Capacitive Touch Screen
Explanation: That is what they are called.
Suppose a company A decides to set up a cloud to deliver Software as a Service to its clients through a remote location. Answer the following [3] a) What are the security risks for which a customer needs to be careful about? b) What kind of infrastructural set up will be required to set up a cloud? c) What sort of billing model will such customers have?
Answer:
perdonnosee
Explanation:
Looking at the code below, what answer would the user need to give for the while loop to run?
System.out.println("Pick a number!");
int num = input.nextInt();
while(num > 7 && num < 9){
num--;
System.out.println(num);
}
9
2
7
8
The number that the user would need for the whole loop to run would be D. 8.
What integer is needed for the loop to run ?For the while loop to run, the user needs to input a number that satisfies the condition num > 7 && num < 9. This condition is only true for a single integer value:
num = 8
The loop will only run if the number is greater than 7 and less than 9 at the same time. There is only one integer that satisfies this condition: 8.
If the user inputs 8, the while loop will run.
Find out more on loops at https://brainly.com/question/19344465
#SPJ1
e requirements of Phase 3 are as follows:
In this third phase, you will be obtaining the case, power supply, and monitor for your computer. You will also include a printer.
Case:
Analyze the specifications for the case. Discuss what stood out to you about your choice. For example, "Why did you choose this specific component?" What stood out to you (price, specifications, etc.)?
What are the specifications, source, and price of the case? How did each of these components influence your decision to select it?
Power Supply:
Analyze the specifications for the power supply. Discuss what stood out to you about your choice. For example, "Why did you choose this specific component?" What stood out to you (price, specifications, etc.)?
What are the specifications, source, and price of the power supply? How did each of these components influence your decision to select it?
Monitor:
Analyze the specifications for the monitor. Discuss what stood out to you about your choice. For example, "Why did you choose this specific component?" What stood out to you (price, specifications, etc.)?
What are the specifications, source, and price of the monitor? How did each of these components influence your decision to select it?
Printer:
Analyze the specifications for the printer. Discuss what stood out to you about your choice. For example, "Why did you choose this specific component?" What stood out to you (price, specifications, etc.)?
What are the specifications, source, and price of the printer? How did each of these components influence your decision to select it?
References:
List references used.
References should relate to decision-making articles in addition to a website where one could purchase the product.
All references must be in APA format.
Any images used must be cited properly.
Format:
APA formatted cover page as well as the entirety of the document.
Paragraphs are coherently organized, including the use of proper grammar and correct spelling.
Clearly organized using graphics and tables (where appropriate).
Acronyms are spelled out on first use.
Because this is a research that should b carried out, I will guide you on how to do same. Pay attention to the requirement on APA Formatting.
How can the above research be executed?In order to make an informed decision on each component, it is imperative that you conduct thorough research on their specifications, source and price.
Reliable sources of information such as reputable tech review websites should be utilized in the comparison of features and prices for each option available.
Proper citation using APA format will need to be observed together with inclusion of any images used. Organizing your document with clear and coherent structure will further enhance readability- utilizing tables and graphics where applicable.
Learn more about APA Formatting:
https://brainly.com/question/12548905
#SPJ1
when reading input using a scanner object, if the type of input does not match the expected type, the compiler will issue an error message. True or False
This kind of error is caused by a compiler assertion failure. Only the location of the error in the compiler code can be determined using the error number. Thus, it is false.
What compiler will issue an error message?A compilation error occurs when a compiler is unable to translate a piece of source code for a computer program, either because of flaws in the code or, less frequently, because of faults in the compiler itself.
Debugging the source code can help programmers fix compilation mistakes quite frequently. This warning may have been generated by a compiler problem or a source-code error that the compiler is unable to handle correctly.
Therefore, it is false that when reading input using a scanner object, if the type of input does not match the expected type, the compiler will issue an error message.
Learn more about compiler here:
https://brainly.com/question/28232020
#SPJ4
It is used to test the functionality of computer ports.
Therefore, a multimeter can be used to test the integrity of circuits and the quality of electricity in computer components, as well as to test the functionality of computer ports. Overall, a multimeter is a useful tool for diagnosing and troubleshooting issues with computer hardware.
Answer:
i dont know what you mean can you give me more evidence of the question
Explanation:
Your company has been assigned the 194.10.0.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 60 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use in CIDR notation?
To accommodate 60 hosts per subnet while maximizing the number of available subnets, we need to use a subnet mask that provides enough host bits and subnet bits.
How to calculateTo calculate the subnet mask, we determine the number of host bits required to accommodate 60 hosts: 2^6 = 64. Therefore, we need 6 host bits.
Subsequently, we determine the optimal quantity of subnet bits needed to increase the quantity of accessible subnets: the formula 2^n >= the amount of subnets is used. To account for multiple subnets, the value of n is set to 2, resulting in a total of 4 subnets.
Therefore, we need 2 subnet bits.
Combining the host bits (6) and subnet bits (2), we get a subnet mask of /28 in CIDR notation.
Read more about subnet mask here:
https://brainly.com/question/28390252
#SPJ1
If you use a pen down block to instruct a sprite to go to random position and then move 100, what happens? A. The sprite teleports randomly and creates a single line 100 units long. B. The sprite creates a 100-unit line between its starting point and a random location. C. The sprite draws a line to a random position, then creates another line 100 units long. D. The program does not run because these commands can’t be combined.
Answer:
C
Explanation:
The sprite draws a line to a random position, then creates another line 100 units long
What is social displacement? Question 22 options: the gained efficiency in being able to communicate through technology , the act of moving files from your computer to an external site , the risk of being "unfriended" by someone on social media , the reduced amount of time we spend communicating face to face
Answer: The Answer should be D
Explanation: It's the definition.
A common technique for masking contents of messages or other information traffic so that opponents can not extract the information from the message is __________ . Group of answer choices analysis integrity masquerade encryption
what are business rules
Answer:
defines or constrains some aspect of business and always resolves to either true or false. It specifically involves terms, facts and rules
Explanation:
Set up a python program
Use the randint function to generate 100 3-digit
random numbers and put them in a list.
Then write a guessing routine which keeps guessing
numbers until it guesses one of the numbers in the list.
Count how many guesses it takes.
A
Do not use prepacked functions such as index or find
and do not use the "in" operator. Write a sequential
search that uses a loop and comparison to search for
numbers.
Answer:
# Import the randint function from the random module
from random import randint
# Create an empty list to store the numbers
numbers = []
# Generate 100 random 3-digit numbers
for i in range(100):
numbers.append(randint(100, 999))
# Set the initial number of guesses to 0
num_guesses = 0
# Keep guessing numbers until a number in the list is found
while True:
# Increment the number of guesses
num_guesses += 1
# Guess a number
guess = randint(100, 999)
# Search for the guess in the list using a loop and comparison
found = False
for num in numbers:
if num == guess:
# The guess was found in the list
found = True
break
# If the guess was found in the list, print the number of guesses and end the loop
if found:
print("Found a number in the list after %d guesses." % num_guesses)
break
What is the best way to deal with a spam
Simply ignoring and deleting spam is the best course of action. Avoid responding to or engaging with the spam communication because doing so can let the sender know that your contact information is still live and invite additional spam in the future. Additionally, it's critical to mark the email as spam using your email program or by reporting it to the relevant authorities. Make careful to report the spam to the proper authorities for investigation if it appears to be a phishing scheme or contains hazardous content.
Dote what are the examples of operating system and windows?
Answer:
LinuxMac AndroidIosAll the generations of windowsWhich of the following sorting algorithms could be implemented on a doubly-linked list WITHOUT making the asymptotic worst-case complexity even worse? You must perform the sorting in-place, you CANNOT just copy to an array and then use the normal algorithm
I. Bubble sort
Il. Selection sort
IlI. Insertion sort
IV. Quicksort
V. Heapsort
A. I, II, and IlIl only
B. IV and V only
C. I and II only
D. Iand Il only
E. All except V
Answer:
C. I and II only
Explanation:
Doubly-linked list is used for sorting algorithms. To sort doubly-linked lists first sort the nodes current and nodes index then compare the data of current and index node. Bubble sort and Selection sort can be used for algorithm sorting without asymptotic complexity. Bubble sort can be created when adjacent nodes are in ascending order.
Drones are considered as a? A.trendy,but unnecessary product B.great innovation C.Disruptive technology D.product concept
Answer:
Great innovation
Explanation:
because they're important for cinematic uses
Within the manufacturing industry, there are fourteen subindustries. Which of the
following is one of these subindustries?
A) Shipping and warehousing.
B) Petroleum and coal products.
C) Automobile manufacturing.
D) Concrete and steel.
Answer: A or B i done this before but my memorys quite blurry i rekon doing A
Explanation:
Match the components of a blog to their descriptions.
1. entry title
2. permalink
3. entry date
4. comment
place where a blog posting is located
when the posting became available
allows users to add to the conversation
name of the posting
Answer:
Entry title - Name of the posting.
Permanent link - Place where a posting blog is located.
entry date - when the posting became available
comment allows users to add to the conversation.
Entry title - Name of the posting.
Permanent link - Place where a posting blog is located.
entry date - when the posting became available
comment allows users to add to the conversation.
What is blogging site?A blogging site is a social media platform where users post news items and hold conversations on specified topics.Item can refer to a variety of different things. In terms of physical objects, an item is a distinct unit that can be counted or measured.
It may refer to a physical product, such as a piece of furniture, a toy, or a piece of clothing. In the business world, item may refer to a unit of inventory, a product for sale, or a service that is available for purchase. In accounting, an item is an individual entry on a financial statement.
In computing, an item is a distinct piece of data stored in a database, such as a document, an image, or a video. Finally, item may also refer to a task or piece of work that has been assigned to an individual.
To learn more about item on
brainly.com/question/2040044
#SPJ2
What can you anticipate having to "give up or do" in order to attain the "things" you want?
There are many things to "give up or do" to attain the "things" you want. Some of them include giving up your time and your temporary pleasure.
Let assume you want to be successful in life, with money, family, and a good career; here are the things you can do to attain them:
Getting a good education to at least a degree level.Plan your life according to how you want it. If you want to become a medical doctor, study medicine and surgeryInvest in profitable business.Do both short-term and long-term investments.Save for rainy days.Acquire appreciable properties.Marry someone whose objective aligns with your goals in life, etc.Hence, in this case, it is concluded that to have what you want in life, it takes a plan, dedication, and willingness to go according to the set-out plan.
Learn more here: https://brainly.com/question/13132465
You want to deploy an existing app to microsoft azure. The app requires a microservice architecture. What should you use to host the app?.
Two well-liked services that may be used to host an existing app that needs a microservice architecture on Microsoft Azure are Azure App Service and Azure Kubernetes Service (AKS).
How can I install an already-built app on Azure?Use the Azure App Service Deploy task to deploy to any Azure App service, including web apps for Windows, Linux, containers, Function apps, and web jobs. When you select one of the ready-made deployment templates for Azure App Service deployment, this task is automatically added to the release pipeline.
Where in Azure can we deploy microservices?You must establish an Azure Container Registry and attach it to a resource group in the same area as your services are installed in order to deploy your microservices. You'll control your registry container instances that will be deployed to a Kubernetes cluster.
To know more about Microsoft visit:-
https://brainly.com/question/26695071
#SPJ1
Create a new Java program called Flip. Write code that creates and populates an array of size 25 with random numbers between 1-50. Print the original array. Print array in reverse.