give one advantage of saving file in the same folder

Answers

Answer 1

Answer:

it's easier to find

Explanation:

things are much more organized

Answer 2
So you don’t have to go through many files

Related Questions

Which of the following is true for creating a new file?

a. ifstream objects do not create a new file.
b. create a file with the same name as an existing file, you will be prompted to rename your new file.
c. files cannot be created using the fstream library
d. None

Answers

Answer:

create a file with the same name as an existing file ,you will be prompted to rename your new file

similarities between inline css and internal css​

Answers

Answer:

CSS can be applied to our website's HTML files in various ways. We can use an external css, an internal css, or an inline css.

Inline CSS : It can be applied on directly on html tags. Priority of inline css is greater than inline css.

Internal CSS : It can be applied in web page in top of the page between heading tag. It can be start with

Write a program that prompts the user to input an integer that represents cents. The program will then calculate the smallest combination of coins that the user has. For example, 27 cents is 1 quarter, 0 nickel, and 2 pennies. That is 27=1*25+0*5+2*1.
Example program run 1:
Enter number of cents: 185
Pennies: 0
Nickels: 0
Dimes: 1
Quarters: 7
Example program run 2:
Enter number of cents: 67
Pennies: 2
Nickels: 1
Dimes: 1

Answers

Answer:

The program in Python is as follows:

cents = int(input("Cents: "))

qtr = int(cents/25)

cents = cents - qtr * 25

dms = int(cents/10)

cents = cents - dms * 10

nkl = int(cents/5)

pny = cents - nkl * 5

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

Explanation:

The program in Python is as follows:

cents = int(input("Cents: "))

This calculate the number of quarters

qtr = int(cents/25)

This gets the remaining cents

cents = cents - qtr * 25

This calculates the number of dimes

dms = int(cents/10)

This gets the remaining cents

cents = cents - dms * 10

This calculates the number of nickels

nkl = int(cents/5)

This calculates the number of pennies

pny = cents - nkl * 5

The next 4 lines print the required output

print("Pennies: ",pny)

print("Nickels: ",nkl)

print("Dimes: ",dms)

print("Quarters: ",qtr)

A function that uses the binary search algorithm to search for a value in an array a. repeatedly divides the elements into the number of segments you specify and discards the segments that don’t have the value until the value is found and a pointer to the element is returned b. repeatedly divides the elements in half and discards the half that doesn't have the value until the value is found and a pointer to the element is returned c. repeatedly divides the sorted elements in half and discards the half that doesn't have the value until the value is found and the index of the element is returned d. repeatedly divides the elements into the number of segments you specify and discards the segments that don’t have the value until the value is found and the index of the element is returned

Answers

Answer:

c. repeatedly divides the sorted elements in half and discards the half that doesn't have the value until the value is found and the index of the element is returned.

Explanation:

When binary search is used for algorithm search then the work is searched in the sorted array. There arrays are divided in half and then half of the elements are discarded who does not have value. The search does not completes until it founds the value and index of the element.

Define a class named Payment that contains an instance variable of type double that stores the amount of the payment and appropriate get and set methods. Also, create a method named paymentDetails that outputs an English sentence to describe the payment amount. Next, define a class named CashPayment that is derived from Payment. This class should redefine the paymentDetails method to indicate that the payment is in cash. Include appropriate constructor(s). Define a class named CreditCardPayment that is derived from Payment. This class should contain instance variables for the name on the card, expiration date, and credit card number. Include appropriate constructor(s). Finally, redefine the paymentDetails method to include all credit card information. Define a class named PaymentTest class that contains the main() method that creates two CashPayment and two CreditCardPayment objects with different values and calls paymentDetails for each. (5 pts)

Answers

Answer:

The code is given below:

class Payment

{

private double amount;  

public Payment( )          

{

   amount = 0;

}

public Payment(double amount)

{

  this.amount = amount;

}

public void setPayment(double amount)

{

    this.amount = amount;

}

public double getPayment( )

{

   return amount;

 }

public void paymentDetails( )

{

   System.out.println("The payment amount is " + amount);

}

}

class CashPayment extends Payment

{

       public CashPayment( )

       {

             super( );

       }

      public CashPayment(double amt)

     {

      super(amt);

      }

     public void paymentDetails( )

    {

     System.out.println("The cash payment amount is "+ getPayment( ));

     }

}

class CreditCardPayment extends Payment

{

       private String name;

       private String expiration;

       private String creditcard;

       public CreditCardPayment()

      {

             super( );

            name = " ";

             expiration = " ";

              creditcard = "";

      }

       public CreditCardPayment(double amt, String name, String expiration, String creditcard)

      {

             super(amt);

             this.name = name;

             this.expiration = expiration;

             this.creditcard = creditcard;

      }

         public void paymentDetails( )

        {

           System.out.println("The credit card payment amount is " + getPayment( ));

           System.out.println("The name on the card is: " + name);

           System.out.println("The expiration date is: " + expiration);

           System.out.println("The credit card number is: " + creditcard);

      }

}

class Question1Payment

{

      public static void main(String[ ] args)

       {

         CashPayment cash1 = new CashPayment(50.5), cash2 = new CashPayment(20.45);

         CreditCardPayment credit1 = new CreditCardPayment(10.5, "Fred", "10/5/2010",

                                                                                                "123456789");

         CreditCardPayment credit2 = new CreditCardPayment(100, "Barney", "11/15/2009",

                                                                                                 "987654321");

         System.out.println("Cash 1 details:");

         cash1.paymentDetails( );

         System.out.println( );

         System.out.println("Cash 2 details:");

         cash2.paymentDetails( );

          System.out.println( );

         System.out.println("Credit 1 details:");

         credit1.paymentDetails( );

         System.out.println( );

         System.out.println("Credit 2 details:");

         credit2.paymentDetails( );

         System.out.println( );

       }

}

Output:

What will be the pseudo code for this

Answers

Answer:

Now, it has been a while since I have written any sort of pseudocode. So please take this answer with a grain of salt. Essentially pseudocode is a methodology used by programmers to represent the implementation of an algorithm.

create a variable(userInput) that stores the input value.

create a variable(celsius) that takes userInput and applies the Fahrenheit to Celsius formula to it

Fahrenheit to Celsius algorithm is (userInput - 32) * (5/9)

Actual python code:

def main():

   userInput = int(input("Fahrenheit to Celsius: "))

   celsius = (userInput - 32) * (5/9)

   print(str(celsius))

main()

Explanation:

I hope this helped :) If it didn't tell me what went wrong so I can make sure not to make that mistake again on any question.    

Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the DigiFirm Investigation Company. Chris, your team leader, explains that your biggest client, Major Corporation, is evaluating how they back up their data. Chris needs you to write a report that compares traditional backup methods to those provided by a cloud service provider, including the security of cloud services versus traditional forms of on-site and off-site backup. For this assignment: 1. Research both traditional and cloud data backup methods. 2. Write a paper that compares the two. Make sure that you include the security of cloud services versus traditional forms of on-site and off-site backup. Required Resources Course textbook Internet Submission Requirements Format: Microsoft Word Font: Arial, size 12, double-space Citation Style: Follow your school's preferred style guide Length: 1-2 pages If-Assessment Checklist I researched both traditional and cloud data backup methods. I wrote a report that compares the two. I included the security of cloud services versus traditional forms of on-site and off-site backup. I organized the information appropriately and clearly. . I created a professional, well-developed report with proper documentation, grammar, spelling, and nunctuation

Answers

Answer:

Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules. 

Security Risk Scoring

Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.

 Operational Security

Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.

Database Activity Monitoring

Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.

Only by covering both of these areas can organizations have defense in depth and effectively control risk.

What values are in the vector named pressures after the following code is executed? vector pressures; pressures.push_back(32.4); pressures.push_back(33.5); pressures.insert(pressures.begin(), 34.2); int index = 2; pressures.insert(pressures.begin() + index, 31.8); pressures.push_back(33.3); index = 1; pressures.erase(pressures.begin() + index); a. 34.2, 31.8, 33.3 b. 34.2, 33.5, 31.8, 33.3 c. 34.2, 33.5, 33.3 d. 34.2, 31.8, 33.5, 33.3

Answers

Answer:

Hence the correct option is A that is "34.2 31.8 33.5 33.3".

Explanation:  

Program:-  

#include <iostream>

#include<vector>  

using namespace std;  

int main()

{

int count =0;

vector<double> pressures;

pressures.push_back(32.4);

pressures.push_back(33.5);

pressures.insert(pressures.begin(), 34.2);

int index = 2;

pressures.insert(pressures.begin() + index, 31.8);

pressures.push_back(33.3);

index = 1;

pressures.erase(pressures.begin() + index);

for (auto it = pressures.begin(); it != pressures.end(); ++it)

cout << ' ' << *it;

return 0;

}

What hardware architectures are not supported by Red Hat?

Answers

It should be Macintosh I hope this help let me know if you have any questions

What type of program allows a user to copy or back up selected files or an entire hard disk to another storage medium?

Answers

Answer:

backup utility

Explanation:

An engineer is writing above the HTML page that currently displays a title message in large text at the top of the page . The engineer wants to add a subtitle directly underneath that is smaller than the title but still longer than most of the text on page

Answers

<!DOCTYPE html>

<html>

<body>

<h1>Heading or Title</h1>

<h2>Sub heading or sub title</h2>

</body>

</html>

This will be the html code for the given problem.

Ann, a customer, purchased a pedometer and created an account or the manufacturer's website to keep track of her progress. Which of the following technologies will Ann MOST likely use to connect the pedometer to her desktop to transfer her information to the website?

a. Bluetooth
b. Infared
c. NFC
d. Tethering

Answers

Answer:

The technologies that Ann will MOST likely use to connect the pedometer to her desktop to transfer her information to the website are:

a. Bluetooth

and

c. NFC

Explanation:

Bluetooth and NFC (Near Field Communication) are wireless technologies that enable the exchange of data between different devices.  Bluetooth operates on wavelength.  NFC operates on high frequency.  The security of NFC over Bluetooth makes it a better tool of choice.  NFC also operates on a shorter range than Bluetooth, enabling a more stable connection. NFC also enjoys a shorter set-up time than Bluetooth.  It also functions better than Bluetooth in crowded areas.  Tethering requires the use of physical connectors.  Infrared is not a connecting technology but wave radiation.

Give examples of applications that access files by each of the following methods:
+ Sequentially.
+ Random.

Answers

Answer:

Explanation:

Usually, applications would have the capability of using either one of these options. But for the sake of the question here are some that usually prefer one method over the other.

Any program that targets an API usually uses Sequential access. This is because API's contain all of the data as objects. Therefore, you need to access that object and sequentially navigate that object to the desired information in order to access the data required.

A music application would have access to an entire folder of music. If the user chooses to set the application to randomly play music from that folder, then the application will use a Random Access method to randomly choose the music file to load every time that a song finishes.

What is meant by usability and what characteristics of an interface are used to assess a system’s usability?

Answers

Answer:

The answer is below

Explanation:

Usability is a term that describes the assessment of the performance of a system in assisting the task of the user, or how effective a certain product system or design supports the task of a user in accomplishing a set out objective as desired.

The characteristics of an interface that are used to assess a system’s usability are:

1. Effectiveness

2. Efficiency

3. Error Tolerance

4. Engagement

5. Ease of Learning and Navigation

Programming languages categorize data into different types. Identify the characteristics that match each of the following data types.

a. Can store fractions and numbers with decimal positions
b. Is limited to values that are either true or false (represented internally as one and zero).
c. Is limited to whole numbers (counting numbers 1, 2, 3, ...)

Answers

Answer:

a) Integer data type.

b) Real data type.

c) Boolean data type.

Explanation:

a) Integer data type is limited to whole numbers (counting numbers 1, 2, 3…….).

b) Real data type can store fractions and numbers with decimal positions (such as dollar values like $10.95).

c) Boolean data type is limited to values that are either true or false (represented internally as 1 and 0 respectively).

(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term ergonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop​

Answers

Answer:

1.similarity:

they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

.a click is pressing and releasing the left mouse button onceright click is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selectiondouble click is pressing the left button twice in rapid successiondrag and drop is where by the user drags an icon or item from one location on the screen to another.

Khi thu nhập giảm, các yếu tố khác không đổi, giá cả và sản lượng cân bằng mới của hàng hóa thông thường sẽ:

Answers

Answer:

thấp hơn

Explanation:

Write a c program that asks the user
to enter distance in KM and Petrol Price in Rs.
Program should compute estimated budget for
the travel distance (Assume your car covers 100
KM in 8 Liters of fuel). Program should run in a
loop and ask the user “Do you want to
continue?”. If user enters ‘y’ or ‘Y’ program
should repeat otherwise terminate.

Answers

Answer:

#include <stdio.h>

int main()  

{

int x;

float y;

printf("Input total distance in km: ");

scanf("%d",&x);

printf("Input total fuel spent in liters: ");

scanf("%f", &y);

printf("Average consumption (km/lt) %.3f ",x/y);

printf("\n");

return 0;

}

explain how data structures and algorithms are useful to the use of computer in data management

Answers

Answer:

programmers who are competent  in data  structures and algorithms  can easily perform the tasks related  to data processing ,automated reasoning ,or calculations . data structure and algorithms  is significant  for developers  as it shows their problems solving abilities amongst the prospective employers .

Write a program which will create an array of size 10. Fill the array with random numbers from 0 - 100. (use a loop and random number generator rand) Once you are done with this, you will then write a loop which will go through each element of the array, display the contents of that element and tell if that element is an even number or odd number. Go through all the elements again and this time tell me how many are even and odd.

Answers

Answer:

Explanation:

The following code is written in Java. It randomly generates 10 integers and adds them to an integer array called myArr. Then it loops through the array calculating if each number is even or odd. If it is even it adds 1 to the evenCount variable and prints out the number saying that it is even. Otherwise it adds 1 to the oddCount variable and prints the number saying that it is odd. The program was tested and the output can be seen in the attached image below.

import java.util.*;

class Brainly {

   // Main Method

   public static void main(String[] args) {

       Random rand = new Random();

       int[] myArr = new int[10];

       for (int i = 0; i<10; i++) {

           int n = rand.nextInt(101);

           myArr[i] = n;

       }

       int evenCount = 0;

       int oddCount = 0;

       for (int x : myArr) {

           if ((x % 2) == 0) {

               evenCount += 1;

               System.out.println(x + " is Even");

           } else {

               oddCount +=1;

               System.out.println(x + " is Odd");

           }

       }

       System.out.println("The Array has a total: ");

       System.out.println(evenCount + " Even Numbers");

       System.out.println(oddCount + " Odd Numbers");

   }

}

Mario is giving an informative presentation about methods for analyzing big datasets. He starts with the very basics, like what a big dataset is and why researchers would want to analyze them. The problem is that his audience consists primarily of researchers who have worked with big data before, so this information isn’t useful to them. Which key issue mentioned in the textbook did Mario fail to consider?

Answers

Answer:

Audience knowledge level

Explanation:

The Key issue that Mario failed to consider when preparing for her presentation is known as Audience knowledge level.  

Because Audience knowledge level comprises educating your audience with extensive information about the topic been presented. she actually tried in doing this but she was educating/presenting to the wrong audience ( People who are more knowledgeable than her on the topic ). she should have considered presenting a topic slightly different in order to motivate the audience.

#Write a function called find_median. find_median #should take as input a string representing a filename. #The file corresponding to that filename will be a list #of integers, one integer per line. find_median should #return the medi

Answers

Answer:

Explanation:

The following is written in Python. It takes in a file, it then reads all of the elements in the file and adds them to a list called myList. Then it sorts the list and uses the elements in that list to calculate the median. Once the median is calculated it returns it to the user. The code has been tested and the output can be seen in the image below.

def find_median(file):

   file = open(file, 'r')

   mylist = []

   for number in file:

       mylist.append(int(number))

   numOfElements = len(mylist)

   mylist.sort()

   print(mylist)

   if numOfElements % 2 == 0:

       m1 = numOfElements / 2

       m2 = (numOfElements / 2) + 1

       m1 = int(m1) - 1

       m2 = int(m2) - 1

       median = (mylist[m1] + mylist[m2]) / 2

   else:

       m = (numOfElements + 1) / 2

       m = int(m) - 1

       median = mylist[m]

   return median

print("Median: " + str(find_median('file1.txt')))

Which Windows installation method requires the use of Windows deployment services (WDS)?
1. Network Installation
2. Repair Installation
3. Bootable flash drive installation
4. Unattended installation​

Answers

Answer:

1. Network Installation

Explanation:

Given

Options (1) to (4)

Required

Which requires WDS for installation

WDS are used for remote installations where users do not have to be physically present before installations can be done; in other words, it is necessary for network based installations.

Of all the given options, (a) is correct because without WDS, network installation cannot be done.

a computer cannot store the data and information for your future use true or false​

Answers

The answer would be false

what is a computer memory

Answers

Answer:

it is your answer

Explanation:

it is the storage space where data is kept.

Which of the following computer component facilitates internet connection?
A. Utility system
B. Operating system
C. Application system
D. Performance system

Answers

Answer:

it should be operating system

Explanation:

I hope this right have an great day

The computer component that facilitates internet connection is the operating system. The correct option is B.

What is an internet connection?

Internet connection is the connection of different computers together. This connection is wireless. Internet connects different computer system together and provides and transfer information. We use the internet for many uses. Today students used this for learning, with the internet companies from far countries can join together.

The operating system of the computer is the main part of the computer that operates all its functions. The operating system manages computer software, hardware, and resources.

The internet connection is also operated by the operating system for the computer. Internet is connected by a router of WiFi, and the wired internet has connected to a wire in the CPU.

Thus, the correct option is B. Operating system.

To learn more about internet connection, refer to the link:

https://brainly.com/question/28110846

#SPJ2

PartnerServer is a Windows Server 2012 server that holds the primary copy of the PartnerNet.org domain. The server is in a demilitarized zone (DMZ) and provides name resolution for the domain for Internet hosts.
i. True
ii. False

Answers

Answer:

i. True

Explanation:

A Domain Name System (DNS) can be defined as a naming database in which internet domain names (website URLs) are stored and translated into their respective internet protocol (IP) address.

This ultimately implies that, a DNS is used to connect uniform resource locator (URL) or web address with their internet protocol (IP) address.

Windows Server 2012 is a Microsoft Windows Server operating system and it was released to the general public on the 4th of September, 2012, as the sixth version of the Windows Server operating system and the Windows NT family.

PartnerServer is a Windows Server 2012 server that was designed and developed to hold the primary copy of the PartnerNet dot org domain.

Typically, the server is configured to reside in a demilitarized zone (DMZ) while providing name resolution for the domain of various Internet hosts.

In order to prevent a cyber attack on a private network, end users make use of a demilitarized zone (DMZ).

A demilitarized zone (DMZ) is a cyber security technique that interacts directly with external networks, so as to enable it protect a private network.

Is" Python programming Language" really
worth studying? If yes? Give at least 10 reasons.

Answers

1. Python is a particularly lucrative programming language

2. Python is used in machine learning & artificial intelligence, fields at the cutting-edge of tech

3. Python is simply structured and easy to learn

4. Python has a really cool best friend: data science dilemma.

5. Python is versatile in terms of platform and purpose

6. Python is growing in job market demand

7. Python dives into deep learning

8. Python creates amazing graphics

9. Python supports testing in tech and has a pretty sweet library

10. There are countless free resources available to Python newbies

Write a C++ function using recursion that returns the Greatest Common Divisor of two integers. The greatest common divisor (gcd) of two integers, which are not zero, is the largest positive integer that divides each of the integers. For example, the god of 8 and 12 is 4.

Answers

Answer:

The function is as follows:

int gcd(int num1, int num2){

   if (num2 != 0){

      return gcd(num2, num1 % num2);}

   else {

      return num1;}

}

Explanation:

This defines the function

int gcd(int num1, int num2){

This is repeated while num2 is not 2

   if (num2 != 0){

This calls the function recursively

      return gcd(num2, num1 % num2);}

When num2 is 0

   else {

This returns the num1 as the gcd

      return num1;}

}

The uses of computer in the field of education are; ​

Answers

Answer: One of the most common applications of computers in education today involves the ongoing use of educational software and programs that facilitate personalized online instruction for students. Programs like Ready use computers to assess students in reading and math.

Explanation:

Other Questions
Find the missing side round to the nearest tenth which physical property of the gas molecules gives the measurement of temperature what are the function, duties and powers of the distict assembly? The Griswold v. Connecticut case involved using, selling, or providing information about birth control. It was about the right to a lawyer. protection from illegal search and seizure. the right to privacy. protection from unfair trial. Which of the following statements is true of the function ? Question 2 options: A) g(x) can be graphed by translating the basic rational function (x) 1x right by 3 units and downward by 5 units. B) g(x) can be graphed by translating the basic rational function (x) 1x left by 3 units and downward by 5 units. C) g(x) can be graphed by translating the basic rational function (x) 1x right by 3 units and downward by 5 units. D) g(x) can be graphed by translating the basic rational function (x) 1x left by 5 units and downward by 3 units. If only the height of a pyramid is doubled its volume is Also doubled true or false 4. Calculate the standard deviation for the following data set: Foundations of Technology Engineering byDesi OITEEA . . Data Set = 4, 14, 6, 2, 7, 12 217 , Find the value of the constant m 150 - 12m + 54 = 0 Find the missing side lengths Please anyone help me??? Purpose of the writer what's the term? A mixture of argon and neon gases at a total pressure of 874 mm Hg contains argon at a partial pressure of 662 mm Hg. If the gasmixture contains 12.0 grams of argon, how many grams of neon are present? Two trains leave towns 1542 kilometers apart at the same time and travel toward each other. one train travels 11 km/h slower than the other. if they meet in 6 hours, what is the rate of each train?Rate of the slower train:Rate of the faster train: 1. Ten times the sum of -270 and a number gives -20. Why would a researcher use a primary source instead of a secondary source when analyzing a a historical event Dawson Electronic Services had revenues of $80,000 and expenses of $50,000 for the year. Its assets at the beginning of the year were $400,000. At the end of the year assets were worth $450,000. Calculate its return on assets. Helpppppp pls brainly does not have any answers to radicals 4. What question can help you decide where to break the lines in your poem?-How wide is the page where the poem will appear?-Which words should be read as a unified group?-What words will create rhyme if placed at the end of lines?-Where do I want readers to stop, think, and reread part of the poem? In an action by the plaintiff against the defendant, one of the issues is whether the defendant is a licensed physical therapist. Normally, the names of all licensed physical therapists are registered with the office of the state Department of Professional Registrations. The plaintiff wishes to introduce a certified document, signed by the chief registrar of the department (who cannot be located), stating that an examination of the department's rolls does not disclose the defendant's name. Should the document be admitted Solve the following, where 0 < < 360.If cos =2/3 and tan