Answer:
import java.util.*;
public class DemoStack {
public static void convert(int n, int base) {
Stack<Integer> st = new Stack<Integer>();
int temp = n ;
while(n !=0) {
st.push(n % base);
n = n / base ;
}
System.out.printf("The number %d in base %d : ", temp, base);
while(!st.isEmpty()) {
System.out.print(st.pop());
}
}
public static void main(String{} args) {
Scanner sc = new Scanner(System.in);
System.out.print("Enter number : ");
int n = sc.nextInt();
System.out.print("Enter base : ");
int base = sc.nextInt();
convert(n, base);
}
}
Explanation:
Code is written in JAVA.
This code displays:
1) Enter number : 'x'
2) Enter base : 'y'
3) The number 'x' in base 'y' : abcdefg
Assignment 3: Chatbot
What the code for assignment 3: chatbot Edhesive.
Answer:
name1=input("What is your first name? ")
name2=input("What is your last name? ")
print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")
print("How old are you?")
age = int(input(" "))
print(str(age) + " is a good age.")
if(age >= 16):
print("You are old enough to drive. \n")
else:
print("Still taking the bus, I see. \n")
print("So, " + name1 + ", how are you today?")
feel=input("")
print("You are " + feel),
if(feel== "Happy"):
print("That is good to hear.")
elif(feel == "Sad"):
print("I'm sorry to hear that. ")
else:
print("Oh my!")
print("Tell me more. \n")
next=input("")
import random
r = random.randint(1, 3)
if(r==1):
print("Sounds interesting. \n")
elif(r==2):
print("That's good to hear. \n")
else:
print("How unusual. \n")
print("Well, " + name1 + ", it has been nice chatting with you.")
Explanation:
This worked for me.
In this exercise we have to use the knowledge of computational language in python to describe a code, like this:
The code can be found in the attached image.
To make it easier the code can be found below as:
name1=input("What is your first name? ")
name2=input("What is your last name? ")
print("Hi there, "+ name1+" "+name2 +" ,nice to meet you!")
print("How old are you?")
age = int(input(" "))
print(str(age) + " is a good age.")
if(age >= 16):
print("You are old enough to drive. \n")
else:
print("Still taking the bus, I see. \n")
print("So, " + name1 + ", how are you today?")
feel=input("")
print("You are " + feel),
if(feel== "Happy"):
print("That is good to hear.")
elif(feel == "Sad"):
print("I'm sorry to hear that. ")
else:
print("Oh my!")
print("Tell me more. \n")
See more about python at brainly.com/question/26104476
List five principles for an effective writing style in formal business documents.
Website managers use
every day.
Answer:
Explanation:
hsjsjwjwwjajakakaka
Since its inception, the Apple App Store has had 30___
downloads
Million
Billion
Trillion
Thousand
Answer:
Billion
Explanation:
Describe the mechanisms of ROT Cipher and Columnar Transposition. What can you do to break these ciphers?
The ROT cipher is a Caeser cipher where each letter is changed to its numerical value plus a pre-chosen number. This can be easily cracked using frequency analysis to determine how far the most common letters (like T or S or H) are being shifted. Columnar transposition can also be broken with a statistical method, but is much harder.
what are the three component parts
of floating point number
Answer:
IEEE floating point numbers have three basic components: the sign, the exponent, and the mantissa. The mantissa is composed of the fraction and an implicit leading digit (explained below).Explanation:
[tex]hii[/tex]hope this helps you ✌️Functions can: A. Be used as building blocks to create new programs. B. Return a result to the caller function. C. Be reused any number of times. D. Do all of the above.
Answer:
D. Do all of the above.
Explanation:
Function: In computer science, the term "function" is described as a process in which it executes, then returns a specific value, and lastly resumes a particular program where the function has been called or initiated. Thus, in the "programming system," a specific named section associated with a program is present that is responsible for performing some specified tasks and is denoted as a "function". In other words, the function is referred to as a kind of routine or procedure.
In the question above, the correct answer is option-D.
Data becomes _______________ when it is presented in a context so that it can answer a question or support decision making.
Answer:
Information
Explanation:
Data becomes information when it is presented in a context so that it can answer a question or support decision making.
Data comes in raw forms which is as a result of studying a particular behavior or pattern over time.
By processing data, we are trying to get appropriate meaning from the raw forms that we have.
When we arrive at a conclusion based on these raw data, then we primarily have deduced information from the data
It is thus information that helps answer a question or appropriately support making of decisions
Which of the following projects is most likely be used in STEM education to learn technology concepts?
test different sandbag materials that can help prevent flooding
analyze cleaning products to determine which ones are eco-friendly
investigate search engine criteria to improve search results
conduct a scavenger hunt to see who can find the most geometric shapes
Answer:
C.)
investigate search engine criteria to improve search results
Explanation:
I go to a STEM school, though the others are good options and are stuff we may do, they wouldn't help to teach technology concepts.
please help me out
Write an if structure that will determine if the character ch is neither a new line, space, nor a tab character.
In Java:
if (!Character.isWhitespace(ch)){
System.out.println("ch is neither a new line, space, nor a tab character");
}
else {
System.out.println("ch is a new line, space, or a tab character.");
}
Just put this if block wherever you need it.
Are their ethical issues to consider when planning a database? For example, should personal data, such as medical information be stored in the same DBMS that manages employee salary and benefits data? Why or why not?
Answer:
Yes
Explanation:
When planning a database, we must actually consider legal implications.
Let's say, a database of salary and all benefits of every worker in a company. Every one who is a worker in this company, either senior or junior worker can access this information in this database.
But in a case of more personal information like medical information, it would be wrong to make it accessible to all who have access to the database. Because it may cause issues like misuse of personal informations of others. Such an information in the hands of a wrong person may be used against someone with serious health conditions.
If information are stored separately, then it won't be accessible by just anyone and it would be better for all workers as no one would possess any information he or she is not supposed to have.
Xbox or Playstation? I wanna know why with a valid reason {:^)
Why do schools block literally evrything?
Answer:
I'm wondering the same thing because I'm a pro at cool math games but don't know how to a arithmetic sequence
Which of the following best describes the purpose of an IP address?
Answer:
IP addresses provide a unique number for identifying devices that send and receive information on the internet
Explanation:
The IP address that best describes the purpose of an IP address is IP addresses provides a unique number for identifying devices that send and receive information on the Internet. The correct option is A.
What is an IP address?An IP address is an address of the network of computers connected to the internet. The address is a sequence of numbers that are provided by the internet servers.
The full form of the IP address is internet protocol. It is the online address that is provided by the internet provider, The address will easily recognize if the person is using the internet. This address will be connected to the computers.
Therefore, the correct option is A. IP addresses provide a unique number for identifying devices that send and receive information on the Internet.
To learn more about IP addresses, visit here:
https://brainly.com/question/18722788
#SPJ6
The question is incomplete. Your most probably complete question is given below:
IP addresses provide a unique number for identifying devices that send and receive information on the Internet
IP addresses assist in the reconstruction of a message that has been divided into many packets
IP addresses indicate the location where an internet-connected computing device was manufactured
IP addresses indicate how many times an individual packet has been requested by a router
Write the definition of a function that take one number, that represents a temperature in Fahrenheit and prints the equivalent temperature in degrees Celsius.
Answer:
Follows are the method definition to this question:
def Temperature(f):#defining a method Temperature that accept a variable f
c= 5*(f-32)/9#use formula to convert Fahrenheit into Celsius
print(c,"degree Celsius")#print Celsius value
f=float(input("Enter Temperature in Fahrenheit: "))#defining f variable for input the value
Temperatures(f)#calling the method
Output:
Enter Temperature in Fahrenheit: 104
40.0 degree Celsius
Explanation:
In the above-given code, a method "Temperature" is declared, that accepts an "f" variable in its parameter, and inside the method, a formula is used that converts a Fahrenheit into degree Celsius and use the print method to print its calculated value.
In the next step, an "f" variable is defined, which uses the input method to take value from the user and pass the value into the method.
how can i hide my browsing history from internet service provider??? for free:)
There are several technologies to hide your browsing history from an internet service provider. The most private is the Tor Network. You can install it from the Tor Project (just search the web to find it). Alternatively, you can try a VPN (will probably cost money) or a proxy (many are free, but often poorer quality).
Please mark as Brainliest!
answer:
yes! use any mobile vpn app (there are about 4 free ones) & that should block anyone including your internet service provider from knowing your location or what you do on your phone!
explanation:
hope this helped!
i answered your question & hope you have a great day!
pls give me brainliest <3
What is the purpose of a macro in a word processor?
A.
to display keyboard shortcuts
B.
to determine typing speed
C.
to determine error rate
D.
to provide spelling suggestion
Answer:
B. to determine Typing speed
Explanation:
Macros are a program that detects patterns and sequences can can be used to reproduce them. For example how frequently keys are clicked. They store these type of information. Hope this helps!
What theme is featured in Machiavelli's the prince
3.8) BEST ANSWER BRAINLIEST
your answer will be reported if it is ridiculousWhich answer represents the highest layer that network engineers are mainly concerned with?
Transport Layer
OSI Layer
Application Layer
Network Layer
Answer:
Transport Layer
Explanation:
Transport layer
Explanation:
I can Guarantee the answer is transport layer on edge I just took the lesson
According to Get2 College, which of the following can you receive text messages about as a high school senior?
Answer:
A scholarship
Explanation:
Write a program to compute the area of a circle some 'n' times. You must accept n and r from the user. Area is calculated using (22/7.0)*r*r - where r is the radius. Implement using value-returning functions. Hint: create a function to calculate area taking r as a parameter. In the main() function, ask for n and create a loop where you input r and invoke the area function n times.
In python:
def calculateRadius(r):
return (22 / 7) * r * r
def main():
quantity = int(input("How many times do you want to calculate the are? "))
radius = float(input("What's the radius of your circle? "))
i = 0
while i < quantity:
calculateRadius(radius)
i += 1
if __name__ == "__main__":
main()
I hope this helps!
What area of the SP 800-100 management maintenance model addresses the actions of the content filter described here?
Answer:
Security planning, risk management, change management and configuration management.
Explanation:
Note: This question is not complete. The complete question is therefore provided before answering the question. See the attached pdf for the complete question.
The explanation of the answer is now given as follows:
Management maintenance model is a model that assist in the successful management of operations. It is a model with techniques and clear guidelines meant to be employed for attaining the aim of the organization.
SP 800-100 maintenance model is a model that handles the 13th information security areas like security planning, configuration management, governance of information security, incidence response, performance measures, change management, risk management, and among others.
The area of the SP 800-100 management maintenance model which addresses the actions of the content filter described in the question are:
a. Security planning: The security measures put in place is the email content filter which helps to prevent the executable files from attaching to emails. It should be noted that the function of the Security Planning section of SP 800-100 is to serve as a strategic plan that employed to give support to the IT plans and objectives of Sequential Label and Supply Company (SLS).
b. Risk Management: This is because the SLS greatly assist in reducing an accidental execution of dangerous software due to its prevention of executable email attachments.
c. Change management: This monitors the performance of the system continuously without stopping.
It should be noted that there is a need for the configuration of the system to meet the security requirement and also the needs of the user at the same time in such a way that the performance of either of the two is not compromised.
The configuration should meet both security and user needs without compromising the performance of either.
A station on a LAN that includes an attached bridge sends out a frame to a device that is not present on any of the segments of the total netowork. What does the bridge do with this frame
Answer:
Throughout the clarification portion following, the definition of the concern is mentioned.
Explanation:
You should conceive including its forwarding database as either a filtering application throughout the sense of a two-port network. A bridge recognizes the sequence number of a frame as well as chooses either to proceed or to filter. When another bridge decides that perhaps the intermediate node is on a whole other particular network, every frame is forwarded to a certain segment. The bridge filters the frame unless the destination mac address contributes to almost the same section as that of the destination host. The bridge maintains a scanning database of established MAC addresses as well as respective coordinates mostly on the platform, as nodes transfer data throughout the bridge. To decide whether such a document should be transmitted as well as filtered, the connection with the implementation existing filtering database.For which equation would x = 12 be a solution?
x + 12 = 30
15 + x = 15
x + 5 = 18
12 + x = 24
Answer:
12+x=24
Explanation:
Move 12 to the other side. 24-12=12
x=12
What is the best pokemon game?
Answer:
all of them
Explanation:
Answer:
i had the most fun playing omega ruby
Explanation:
Create an IF function in which the logical_test argument determines if there are 8 or more seats. Use Yes for the value_if_true argument. Use No for the value_if_false argument. (If you type the formula, enclose the text arguments within quotation marks.)
Answer:
See explanation
Explanation:
To answer this question, I'll assume the following.
The application package is Microsoft Excel and the column with the seats is A1 (could be anything)
Hence: The IF Function is as follows;
=IF(A1 >= 8, "YES","NO")
Analyzing the above, we have:
=IF( --- This specifies the function
A1 >= 8, --- This states the logical test
"YES", --- This represents the condition if true
"NO" --- This represents the condition if false
The IF function in Microsoft Office Excel is used to perform conditional operations.
The required IF function is: =IF(A1 >= 8, "Yes","No")
The syntax of an IF function is:
=IF([logical_expression],[value_if_true],[value_if_false])
Where
logical_expression represents the expression to comparevalue_if_true and value_if_false are the values that will be returned if the condition is true or falseFrom the question, we have:
The logical_expression is: A1 >= 8The value_if_true is "Yes"The value_if_false is "No"Hence, the IF function is: =IF(A1 >= 8, "Yes","No")
Read more about Microsoft Excel formulas at:
https://brainly.com/question/2198360
Sum of three integers stored in the memory (a) Specify memory location using: [ la ] (b) Load immediate integer-1 to register: [ $t1 ] (c) Load immediate integer-2 to register: [ $t2 ] (d) Load Immediate integer-3 to
Answer:
#a) Specify the memory location [la]
la $s0, 0xFFFF0010
#b) Load immediate Integer-1 to register
li $t1, 1
#c) Load immediate Integer-2 to register
li $t2, 2
#d) Load immediate Integer-3 to register
li $t3, 3
#e) Store Integer-1 to memory
sw $t1, ($s0)
#f) Store Integer-2 to memory
sw $t2, 4($s0)
#g) Store Integer-3 to memory
sw $t3, 8($s0)
#h) Load Integer-1 from memory to Register
move $t4,$t1
#i) Load Integer-2 from memory to Register
move $t5,$t2
#j) Load Integer-3 from memory to Register
move $t6,$t3
#k) add the three numbers
add $t7,$t4,$t5
add $t7,$t7,$t6
#l) store the result of the addition again to memory
sw $t7, 12($s0)
#m) Load the result of the addition to register
move $t8,$t7
#sum
li $v0, 1
move $a0,$t8
syscall
Explanation:
Run the above code and you will get your perfect output.
Calculate the difference between the birthdate entered in cell C4 and the current date in cell C6. Insert this calculation in cell C14.
Answer:
In cell C14, input '= C6 - C4' formula to get the difference.
Explanation:
Spreadsheet applications are tools used for data analysis and collection. It has numbered rows or records, and columns or fields labelled alphabetically.
To get a location or a cell of information, the rows and columns label are used, like A1, B4, C7, etc. Formulas can be used in a cell, preceded by an equal sign.
List the name and purpose of twenty (20) different C++ commands.
Answer:
Drivers and help a new program to run
Assume you have a data definition class called Account. You wish to create a specific type of account, called MoneyMarketAccount. Write the first line of code that will declare the MoneyMarketAccount class.
Answer:
It depends on the code that has to be used, but in general C++ and python are shown below.
Explanation:
for a .cpp code we have:
class MoneyMarketAccount: public Account
in a .py code in the console, the following part has to be added
class MoneyMarketAccount(Account)