An array is called vanilla if all its elements are made up of the same digit. For example {1, 1,
11, 1111, 1111111} is a vanilla array because all its elements use only the digit 1.
However, the array {11, 101, 1111, 11111} is not a vanilla array because its elements
use the digits 0 and 1.
Write a program that reads a string from a user that represent array and check if its a vanilla
array. Otherwise it will print message as in the sample run shown below and should continue to
allow the user to enter values. The program will terminate only if the user press the "Enter" key
without entering any value. For example the '{1}' is a vanilla array since all elements use the
same digit. Where '{11, 22, 13, 34, 125}' array is not vanilla array becuase elements used 5
different digits.

Answers

Answer 1

Using the knowledge in computational language in JAVA it is possible to write the code that An array is called vanilla if all its elements are made up of the same digit.

Writting the code:

import java.util.Scanner;  

public class Main

{

public static void main(String[] args) {

   

   

   

    int n;  

Scanner sc=new Scanner(System.in);  

System.out.print("Enter the number of elements you want to store: ");  

//reading the number of elements from the that we want to enter  

n=sc.nextInt();  

//creates an array in the memory of length 10  

int[] array = new int[10];  

System.out.println("Enter the elements of the array: ");  

for(int i=0; i<n; i++)  

{  

//reading array elements from the user  

array[i]=sc.nextInt();  

}

System.out.println("Array elements is: ");  

for(int i=0; i<n; i++)  

{  

   System.out.print(array[i]+" ");  

} System.out.println("\n");  

int res=0;  

int t;

int k;

for(int i=0; i<n; i++)  

{  

  t=array[i];

  while(t>0)

  {

      k=t%10;

      t=t/10;

      if(k==0)

      {

          res=1;

          break;

      }

  }if(res==1)

  {System.out.println("False it is not vanilla array");  

      break;

  }

 

}if(res==0)

{

   System.out.println("True it is  vanilla array");  

}

See more about JAVA at brainly.com/question/12975450

#SPJ1

An Array Is Called Vanilla If All Its Elements Are Made Up Of The Same Digit. For Example {1, 1,11, 1111,

Related Questions

Find advert in magazines or websites of working desktop computer systems or laptop as well as a monitor, keyboard and software you will also need additional devices such as mouse or printer. Reports outlines and explaining the details of the advertising

Answers

Because of our independence, you have complete control over your data. Your information is your information. Independent, open platform. MRC-accredited metrics Increase the effectiveness of advertising.

How do you write outlines for reports and explain the details of advertising?

Analyze market position information for the product and explain how that position is expected to change. Make a list of suggestions to improve your next advertisement.

Typically, advertising campaigns promote a product or service. A national automaker, for example, may launch a new vehicle model through print advertisements in newspapers and magazines. To reach the vehicle's target market, the company may also place graphics-rich ads on websites. This combined media blitz produces more desirable results than isolated advertisements without a central strategy.

This automobile manufacturer, or any business selling a product or service, evaluates its campaign's effectiveness based on defined criteria. A written report provides an objective campaign analysis, highlights favorable results and identifies areas in which advertising strategy adjustments are appropriate.

To learn more about details of advertising refer to:https://brainly.com/question/1658517

#SPJ1

This is related to coding. I just have no idea how to do this coding project.

Answers

class brainly

{

public String repeatString(String str, int n)

{

for(n=1;n<=3;n++)

{

System.out.print(str);

}

}

}

Using the knowledge of the computational language in JAVA it is possible to write a code that write a method that takes a string and a int and return to the string.

Writting the code:

public String repeatString(String str, int n)

{

 String text = "";

 

 for (int i = 0; i < n; i++)

     {

       text = text + str;

     }

     

   return text;

}

See more about JAVA at brainly.com/question/18502436

#SPJ1

What hardware component is the main brain of the computer system that is responsible for all the activities of the processor stage of the IPOS cycle

Answers

Answer:

It is the Central Processing Unit (CPU)

GAME DESIGN
If you are designing a video game that will primarily be played on a smartphone or tablet, what considerations about the operation or control methods should you keep in mind?

Answers

If you are designing a video game that will primarily be played on a smartphone or tablet, the considerations about the operation or control methods that you should  keep in mind are:

The Orientation of the device; The processing power of the device; andThe size of the device in relation to the spacing of the controlls.

What are video games?

As a result, there is a growing need for mobile app development services and mobile app development companies. As a result of this demand, various smartphone app development businesses promise to provide excellent services.

Regardless of phone manufacturer improvements, there are still uses for the game design process, such as:

Feature Creep IssueNot Targeting the Correct AudienceGetting the Game NoticedManaging Security ConcernsOperating System Fragmentation.Creating the Monetization ModelUpkeep.

Learn more about video games:
https://brainly.com/question/28060919
#SPJ1

What is the method for combining permissions from different database objects?
Group of answer choices

1. database level

2. role

3. user

Answers

Database level is the method for combining permissions from different database objects.

What is database?The types of access given to particular secureables are called permissions. Permissions are given to SQL Server logins and server roles at the server level. They are assigned to database users and database roles at the database level.The three sorts of permissions that files and directories can have are read, write, and execute: A file's or directory's contents can be viewed by someone having read permission. The contents of a file can be changed by someone with write rights, including by adding, removing, or modifying file contents.The right or permission to access a named object in the recommended way, such a table access authorization. A specific user's connection to the database may be permitted by privileges.

To learn more about database refer to:

https://brainly.com/question/518894

#SPJ1

Database level is the method for combining permissions from different database objects.

What is database?Permissions are the many sorts of access that are granted to specific secureables. At the server level, permissions are assigned to SQL Server logins and server roles. At the database level, they are assigned to database users and database roles.Read, write, and execute are the three types of permissions that files and directories can have. Anyone with read permission can view the contents of a file or directory. Anyone with write access can edit, add, or remove data from a file, among other file-related operations.the capability or authorization to make a recommended access to a named object, like a table access authorization. Privileges may allow a specific user's connection to the database.

To learn more about database refer to:

brainly.com/question/518894

#SPJ1

Describe how smartphones communicate. List and describe four popular types of messages you can send with smartphones. Write one well-written paragraph and answer the above question to earn 10 points.

Answers

The way that smartphones communicate is that people connect with each other and with businesses has been changed by mobile messaging. However, users and businesses can choose from a variety of mobile messaging types.

The Kinds Of Mobile Messaging are:

SMS & MMS MessagingPush Notifications.In-App Messages.RCS.

What is the messaging about?

Brief Message Service (SMS): One of the most popular types of mobile communications is SMS. A basic text message sent via a cellular signal is known as an SMS, or short messaging service.

SMS is completely text-based and has a character restriction of 160. Users in the United States who don't have an unlimited messaging package pay cents per message.

Therefore, in Notifications through Push: It's possible that you mistakenly believe that the thing that's flashing on your cell phone's screen is a text message. Similar to SMS messages, push notifications are pop-up windows that appear while you're using your phone or on the lock screen rather than in your inbox with other texts.

Learn more about Mobile Messaging from

https://brainly.com/question/27534262
#SPJ1

uses of computer in communication​

Answers

Uses of computers in communication:

1) Transfer of data

2)Transfer of information

3) Wireless message communication

4)Video service

5)E-mail

6) Internet and Fax

What is the use of computers in communication?

The mainstay of information technology, computers are essential for communication. Early in the 1990s, the first homes began to utilize the Internet, which eventually led to the widespread use of email, websites, blogs, social networking, and Voice-Over-Internet Protocol.

Above listed ones are the uses of computers in communication.

To know more about the information about computers in communication

https://brainly.com/question/26152499

#SPJ1

You are starting a new data project. What is one of the best sources to help you begin? in excel
a, Technical Documentation
b, Queries
c, The database
d, Existing reports

Answers

Technical Documentation is one of the best sources to help you begin in excel. Thus, option A is correct.

What is excel?

Excel is a software tool for creating and distributing spreadsheets, built by Microsoft.

Data analysts and some other customers could make that information simple to examine as content is loaded or altered by grouping items employing tools like Excel.


Technical documentation is a catch-all word for the various types of data produced to explain the performance, use, or construction of a given good, platform, or application.

Therefore, option A is the correct option.

Learn more about excel, here:

https://brainly.com/question/3441128

#SPJ1

What should be entered to make the loop below print

55

60

65

x = 50

while (x < 65):

x = x + ____

print (x)

Answers

What should be entered to make the loop below print the output 55, 60, 65 is "5". Hence the complete code is:

x = 50

while (x < 65):

x = x + 5

print (x)

What is a loop in coding?

A loop is a set of instructions in computer programming that is repeatedly repeated until a given condition is met. Typically, a process is performed, such as retrieving and modifying data, and then a condition is verified, such as whether a counter has reached a predetermined number.

Loops are control structures that are used to repeat a segment of code a certain number of times or until a specific condition is fulfilled.

Learn more about loop:
https://brainly.com/question/14390367
#SPJ1

Probability Practice: Cass is interested in figuring out how many customers have applied for a home mortgage recently.

Review the data and calicut are the probability that if Cass runs into one of the financial institutions customers at random, that person has applied for a home mortgage this year.


What is the total number of customers?


How many customers applied for a home mortgage?

Answers

Answer:

Doesn't make a lot of sense. Can you be more specific.

Explanation:

the proper use of safety equipment in your vehicle has the potential to ___.

Answers

The proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.

Why safety equipment is required?

Safety equipment may be defined as a type of equipment that delivers a sense of protection that is significantly used by workers in order to avoid injuries, casualties, life-threatening situations, etc.

Safety equipment may include a set of numerous objects and things like gloves, safety glasses and shoes, earplugs or muffs, hard hats, respirators, coveralls, vests, and full-body suits. All these pieces of equipment possess a common intention behind the safety of an individual.

Therefore, the proper use of safety equipment in your vehicle has the potential to reduce the chances of injury.

To learn more about Safety equipment, refer to the link:

https://brainly.com/question/28389789

#SPJ1

Sammy’s Seashore Supplies rents beach equipment such as kayaks, canoes, beach chairs, and umbrella to tourists. Modify your Application as follows: Using Python

Modify the getinput() function that accepts the user information so that it prompts for a customer name, first name and last name. Store in two separate variables.
Add data validation to the account number so that only a 4 character string is allowed. The first character must be an A. You will need to use a while loop here because you do not know how many times the user will enter an invalid Account Number. You will have two conditions for the while loop: while the length of the account number variable does not equal 4 or while the account number variables does not start with the letter "A".
Add a phone number input to the getinput(). Make sure that the phone number is 7 digits. Use a while loop that keeps asking the user to enter the phone number until it is seven digits.
Return all values from the getinput() function -- there will be 5 of them.
Modify the main() function so that the line that calls the getinput() function stores all 5 returned values in separate variables.
Modify the main() function so that the values returned from the getinput() function are passed to the calculatefotal() function.
Modify the header of the calculatetotal() function so that is accepts 5 parameters ( the account number, the number of minutes, the first name, the last name , and the telephone number.
Modify the function that calculates the total and displays all the information, so that it displays the Contract Number, first and last names, and the Phone Number. The Phone Number should be displayed in the ###-#### format. You can the slice function to do this.




Includes comments at the top to identify file name, project and a brief description.

For further documentation, include comment for each section of code.

Sample Run:

ACCOUNT NUMBER:, A234 (program keeps prompting until a 4 character, starting with an A

Name Sally Douglass

123 – 4567 (formatted in the module that displays the result)

Minutes rented: 115
Whole hours rented: 1
Minutes remaining: 55
Rental cost: $ 80



Coupon good for 10% Off!
This is my original code base on the instruction how do I add the new code to the case

# Main function calls other functions
def main():
display()
a,x=getinput()
calculatetotal(x,a)
# function to display logo
def display():
#Display the Sammy’s logo
print("-------------------------------------------------------------")
print("+ +")
print("+ “SAMMY’S MAKES IT FUN IN THE SUN +")
print("+ +")
print("+ +")
print("-------------------------------------------------------------")
# function to receive input from user
def getinput():
# Request the minutes rented and store in variable
contract_number = (input("Enter the account number"))
rented_minutes = int(input("Enter the number of minutes it took to rent: "))
while (rented_minutes<60 or rented_minutes>7200):
rented_minutes = int(input("Try again"))
return rented_minutes,contract_number
# function to calculate hours, minutes remaining and cost
def calculatetotal(acc,mins):
# Calculate number of whole hours
whole_hours = mins//60
# Calculate the number of minutes remaining
remaining_min = mins % 60
# Calculate the cost as hours * 40 + minutes remaining times 1
#Calculation from smallest to greater by getting the smallest number
cost = whole_hours*40+ min(remaining_min*1, 40)
# >Display minutes, whole hours, minutes remaining, and cost with labels
# Print all values
print(("ACCOUNT NUMBER:"),acc)
print("Minutes Rented:",mins)
print("Whole Hours:",whole_hours)
print("Minutes Remaining:",remaining_min)

Answers

Answer:

figure it out

Explanation:

Match each benefit of participating in a professional network to the appropriate scenario.

1. building the professional network

2. preparing for interviews

3. upgrading knowledge

A. Miriam joins a group for employees of the company where she is interning.

B. Imelda reads about new technologies in the computer programming industry.

C. Rolf researches a company on a professional networking website.

Answers

Professional network                                 Scenario

1                                                                       A

2                                                                      C

3                                                                      B

How to categorize professional networks with the scenario?

Scenario: A. Miriam joins a group of employees of the company where she is interning.

Professional network: 1. building the professional network

Scenario: C. Rolf researches a company on a professional networking website.

Professional network: 3. upgrading knowledge

Scenario: B.  Imelda reads about new technologies in the computer programming industry.

Professional network: 2. preparing for interviews

Hence based on the appropriate scenario I have matched accordingly

To know more information on professional networks and related things, please follow the link below:

https://brainly.com/question/2083119

#SPJ1

Devision of floating binary
(100.0001)÷(10.1)

Answers

1.101 is the correct answer for floating-point binary (100.0001)÷(10.1).

The sign of a binary floating-point number is represented by a single bit. A 1 bit indicates a negative number, and a 0 bit indicates a positive number.

What is Binary Number System?

One of the four types of number systems is a binary number system. Binary numbers are represented in computer applications by only two symbols or digits, namely 0 (zero) and 1 (one). The binary numbers in this example are written in the base-2 numeral system. [tex]101_{2}[/tex] is an example of a binary number. In this system, each digit is referred to as a bit.

A binary number is defined in digital electronics and mathematics as a number expressed in the binary system or base 2 numeral system. It denotes numerical values with two distinct symbols: 1 (one) and 0. (zero). The positional notation with 2 as a radix is the base-2 system.

Because of its direct implementation in electronic circuits using logic gates, the binary system is used internally by almost all modern computers and computer-based devices. Every digit is known as a bit.

To know more about Binary Number, visit: https://brainly.com/question/8649831

#SPJ1

MYSQL Workbench question
Using a function, display the customer who has the highest credit limit.
. Display the customer number, customer name and credit limit.
I need my answer checked over for the question.
#Show me a list of customers who have the highest credit limit
use premier_products;
select count(*) customer_num, customer_name, credit_limit
from customers
Where credit_limit=
(Select AVG (credit_limit)
from customers)

Answers

A function that displays the customer who has the highest credit limit is given below:

The nested query to display the customer names and credit limit with a lower credit limit than the customer in Sunnyvale

SELECT Name,CREDITLIMIT FROM  CUSTOMERS

WHERE CREDITLIMIT < (SELECT CREDITLIMIT FROM CUSTOMERS

                    WHERE CITY = 'Sunnyvale')

ORDER BY CREDITLIMIT

For Multiple Customers

SELECT Name,CREDITLIMIT FROM  CUSTOMERS

WHERE CREDITLIMIT < (SELECT MAX(CREDITLIMIT) FROM CUSTOMERS

                    WHERE CITY = 'Sunnyvale')

ORDER BY CREDITLIMIT

Read more about SQL here:

https://brainly.com/question/27851066

#SPJ1

Write a loop that continually asks the user what pets the user has until the user enters stop, in which case the loop ends. It should acknowledge the user in the following format. For the first pet, it should say You have one cat. Total # of Pets: 1 if they enter cat, and so on.


Sample Run


What pet do you have? lemur
What pet do you have? parrot
What pet do you have? cat
What pet do you have? stop

Sample Output

What pet do you have? lemur
You have one lemur. Total # of Pets: 1
What pet do you have? parrot
You have one parrot. Total # of Pets: 2
What pet do you have? cat
You have one cat. Total # of Pets: 3
What pet do you have? stop

Answers

Answer:

#include <iostream>

using namespace std;

int main() {

/*

What pet do you have? lemur

parrot

What pet do you have? cat

What pet do you have? stop

*/

string pet;

int num=1;

while (pet!="stop"){

cin>>pet;

cout<<"What pet do you have?";

if (pet!="stop"){

cout<<"you have one "<< pet<<" total numof # is "<<num++<<endl;

}

else{

cout<<"stop";

}

}

}

Explanation:

you did not specify the language so i went with c++

i used while loop which will keep asking the user for an input until he/she write stop in order to break the loop

first i declared the data type of the input

used it as a conditionin the while loop

then printed the input everytime the loop runs

how does virtual memory different from main memory and secondary memory​

Answers

A secondary memory device is comparable to a spinning magnetic disk or, in modern times, an SSD. Basically, it moves slowly (even an SSD is slow compared to the main memory). Data is stored there as files.

A software can fool itself into believing it has a collection of linear address blocks that it can use as ordinary memory by creating the illusion of virtual memory.

Except in cases where the total quantity of virtual memory needed by all running processes exceeds the physical memory attached to the computer, it has nothing to do with the idea of secondary storage. In that instance, relatively unoccupied pages will be transferred to secondary storage; nevertheless, this is more of a "side effect" of secondary storage's handy proximity and size compared to main memory.

Learn more about memory at:

https://brainly.com/question/13147674

Which of the following is not used as an Internet security indicator?
A) shield icon
B) handshake icon
C) lock symbol
D) heart symbol

Answers

Internet security is not indicated by the shield icon.

What does "Internet security" mean?

A key element of cybersecurity is online security, which includes controlling risks and dangers posed by the Internet, online browsers, web apps, websites, and networks. Protecting consumers & corporate IT assets against online threats is the main objective of Online security systems.

What are the many methods of Internet security?

Access control, antivirus, security testing, network analytics, various forms of network-related safety (endpoint, online, wireless), firewalls, VPN encryption, and more are all included in network security.

To know more about Internet security visit:

https://brainly.com/question/27730901

#SPJ4

Answer:

it is A.

Explanation:

Tasia is using accrual accounting in Quickbooks and creat3ed a customer invoice. What account is debited when the invoice is created?

Answers

Since Tasia is using accrual accounting in Quickbooks and creat3ed a customer invoice. The account  that is debited when the invoice is created is option A: Accounts receivable.

When an invoice is created in QuickBooks Accrual, which account gets debited?

Quickbooks  will debit the AR account when I create an invoice, but does the account credit. Depending on whatever income account is linked to your product or service when you create an invoice, a credit will be applied to that account.

Note that Customers' outstanding debts for goods or services they have received but haven't yet paid for are referred to as accounts receivable. For instance, the amount owing when clients buy things on credit is added to the accounts receivable.

Learn more about Accounts receivable from

https://brainly.com/question/24848903
#SPJ1

See options below

Tasia is using accrual accounting in QuickBooks and created a customer invoice. Which account is debited when the invoice is created? Accounts receivable Sales of product income Owner's equity Checking account Miscellaneous income

Highlight the two complex sentences in the text below.

Are Smart Watches Worth it?

Smart watches have been around for a while now, but I’ve avoided buying one. I was never convinced having one offered any great improvements on simply owning a phone. As far as I was concerned, they would never be able to replace a phone. But were they even supposed to? After speaking to a friend who swears by his smart watch, I decided to give one a go. What did I find? It was more useful than I first anticipated. Or maybe the right word is interesting?

Answers

The complex sentences are:

Smart watches have been around for a while now, but I’ve avoided buying one. After speaking to a friend who swears by his smart watch, I decided to give one a go.

What  categories of difficult sentences are there?

All of these sample sentences are complicated because they have both an independent clause and a dependent clause, so keep that in mind.

Subordinate Clauses Three Types

Adjective clauses in dependent sentences serve as adjectives.Adverbs are used in dependent adverb clauses.Nouns are used in dependent noun clauses.

A complex sentence is one that has at least one dependent clause and one independent clause. It functions best when you need to add more details to clarify or change the main idea of your text.

Note that a complicated sentence is one that has at least one independent clause and one or more dependent clauses (sometimes called a subordinate clause). A phrase that would make sense if it were a sentence on its own is known as an independent clause.

Learn more about complex sentences from

https://brainly.com/question/14908789
#SPJ1

the difference bitween hardware and software ?​

Answers

Answer:

Hardware refers to the physical and visible components of the system such as a monitor, CPU, keyboard and mouse. Software, on the other hand, refers to a set of instructions which enable the hardware to perform a specific set of tasks.

Hardware is any physical part of the computer, like the monitor or keyboard. Software is the virtual part that tells the hardware what to do.

Identification where Information Technology causes a hindrance to business processes

Answers

Identification where Information Technology causes a hindrance to business processes is one that is  Lacking an IT Plan.

Why is planning for information technology so crucial?

The organization's strategic goals and objectives may be achieved with the aid of this planning. The strategic IT plan should take into account how each of the organization's strategic business goals relates to technology as well as any modifications that will need to be made to the organization's information and communications infrastructure.

Note that So much so that a business will find it difficult to run efficiently without fully functional computers and access to emails and data. The consequences of data loss or corruption due to hardware failure, human mistake, hacking, or malware could be disastrous for any organization, it is a basic reality.

Learn more about Technology  from

https://brainly.com/question/25110079
#SPJ1

Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.

Answers

The way to increase this title for the thesis the negative influence of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in an economy.

What does a research thesis entail?

It is a position or assertion that you will support with research. A compelling thesis statement outlines the subject to be covered, condenses the key points, and persuades the reader to keep reading.

Therefore, The major topics that will be discussed in the essay should be summarized in the thesis. Many thesis statements hint at what will be discussed in the essay in addition to stating the argument to be made.

Learn more about thesis forming from

https://brainly.com/question/876674
#SPJ1

Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.

Answers

An idea to increase the title for the thesis is the function of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in a growing economy.

What kind of thesis assertions are there?

Thesis statements that explain something; those that make an argument and Statement of an analytical thesis.

You will use your research to support an assertion, or argument. A compelling thesis statement introduces the subject of the paper, summarizes the key points, and persuades the reader to keep reading.

Hence, Many thesis statements hint at what will happen in the essay in addition to outlining the argument to be presented. In order to help readers follow the writer's idea as it is developed, this serves as a "road map" for them.

Learn more about thesis from

https://brainly.com/question/14399092
#SPJ1

You have been using your Microsoft cordless mouse for a year but it suddenly stopped
working. You did not install the mouse software (driver) from Microsoft when you got the
mouse because you did not care about using custom features. You have been using the
generic mouse software for Windows. List all of the troubleshooting steps you would do
before declaring that the mouse is defective.

Answers

A wireless mouse can be very portable and effective in our day-to-day work on the computer but can develop problems. one of the problems you might come across is that it suddenly stops working. this can be caused by either a software or hardware issue.

What are the possible issues?Possible software issuesCorrupt drivers Faulty operating system

Possible hardware issues:

Weak batteryFaulty dongleFaulty USB portsFaulty components on the mouse panel

Below are a list of troubleshooting steps

Check switchReplace batteryUninstall drivers and reinstallupdate drivers (if any available update)Reinstall OScheck dongleTry on another computer

Learn more about computer on:

https://brainly.com/question/24540334

#SPJ1

Write Java statements to declare an array that will store the total car sales values (int) for each month of the year

Answers

The Java statements to declare an array that will store the total car sales values (int) for each month of the year is given below:

The Statement

int[] months = {1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12};

This given program gives each value for each month of the year and gives them a number from 1 to 12 which signifies the 12 months of the year:

January, February, March, April, May, June, July, August, September, August, October, November, and December.

Hence, for each sale made, it is computed and the total for each month is printed, along with each individual month and listed out as output.

Read more about java programming here:

https://brainly.com/question/18554491
#SPJ1

Explain the following :Union within structure union

Answers

Answer:

union with union structure

Explanation:

What is output by the following code?

c = 1

sum = 0

while (c < 10):

c = c + 2

sum = sum + c




print (sum)

Answers

It is to be noted that the output of the code given above is Sum = 35.

What is Sum in programming?

The sum() method sums all of the elements in an iterable and returns the total.

sum = sum + inputValue; can be substituted with sum += inputValue; This sentence can be interpreted as "Add up inputValue to total." or "Increase sum by inputValue."

With regard to the above code, when a complier runs this:

c = 1

sum = 0

while (c < 10):  

c = c + 2  

sum = sum + c

print (sum)

Output: 35

The output is 35.

Learn more about codes:
https://brainly.com/question/13013054
#SPJ1

Someone gives me the idea to increase this title for my thesis MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM.

Answers

An  idea to increase this title for the thesis is the role of MULTI PURPOSE COOPERATIVE AUTOMATED LENDING MANAGEMENT SYSTEM in the GDP of a country.

What is a research thesis?

It is a position or assertion that will be supported by your study. A compelling thesis statement outlines the subject to be covered, condenses the important points, and persuades the reader to keep reading.

Note that the essential points that will be discussed in the essay should be indicated in the thesis. Many thesis statements hint at what will be discussed in the essay in addition to stating the argument that will be presented. This gives the reader a "road map" so they can follow the thought the author is developing.

Learn more about thesis formation from

https://brainly.com/question/2094985
#SPJ1

MYSQL
I need a query code I am confused with two questions
Display each classification that has a total of more than 70 parts on hand. List the classification and the total on hand as ‘More than 70’
What is the average quoted price, maximum quoted price, and minimum quoted price of all orders? Display the average as ‘Average Quoted Price’, maximum quoted price as ‘Maximum Quoted Price’, and minimum quoted price as ‘Minimum Quoted Price’. Extra decimal places are okay for now. Insert your snip of the query and resultset together here:

Answers

Using the knowledge in computational language in MYSQL it is possible to write a code that Display each classification that has a total of more than 70 parts on hand. List the classification and the total on hand as ‘More than 70’.

Writting the code:

CREATE TABLE shop (

   price   DECIMAL(16,2) DEFAULT '0.00' NOT NULL,

   PRIMARY KEY(article, dealer));

INSERT INTO shop VALUES

   (1,'A',3.45),(1,'B',3.99),(2,'A',10.99),(3,'B',1.45),

   (3,'C',1.69),(3,'D',1.25),(4,'D',19.95);

See more about MYSQL at brainly.com/question/20626226

#SPJ1

Other Questions
I Need help Plss!what was a major difference between the civil service systems in china and japan? Which of the 5 I's do you identify as the most important and why? Remember, the 5 i's are intuition, imagination, innocence, inspiration, and individualism If a sample needs to be diluted, what should be added? In a recent court case it was found that during a period of 11 years people were selected for grand jury duty and % of them were from the same ethnicity. Among the people eligible for grand jury duty, % were of this ethnicity. Use a significance level to test the claim that the selection process is biased against allowing this ethnicity to sit on the grand jury. Identify the null hypothesis, alternative hypothesis, test statistic, p-value, conclusion about the null hypothesis, and final conclusion that addresses the original claim. Use the p-value method and the normal distribution as an approximation to the binomial distribution. For what value of X is Y= 4 a solution to the equation X-2 =XY+16If x=-3 and y =2 , then x^y +xy^=? What is 10,483,190 in word form? explain the difference between the types of inference that can be made as a result of random sampling and random assignment. Am I correct? Did I do this right? the distance between two successive minima of a transverse wave is 2.76 m. five crests of the wave pass a given point along the direction of travel every 14.0 s. find (a) the frequency of the wave and (b) the wave speed. consider the market for beef. (assume that chicken and beef are not substitutes in production). if a new study is released touting supposed health benefits of chicken, what will happen to the equilibrium price and quantity of beef 4x (x + 10) + 55 = 180 After raining for 3/4 of an hour, a rain gauge 2/5 of the way full if it continued to rain at the same rate for 15 more minutes what fraction of the rain gauge will be filled I am stuck on the last part can u please help me? A person deposits $8,000 into a savings account at an interest rate of 6.5%. The interest is compounded quarterly. If no other money is deposited into the account, what will the balance be after 12 years? Round to the nearest cent. f(x)=x +6Find an equation for the tangent line to the graph of f(x) = x +6 at (5,31).y= the news of an impending recession in the economy will lead to a: (i) fall in consumption. (ii) rise in precautionary saving. (iii) rise in national saving. (iv) rise in consumption. When is fall protection required in the construction industry?Select the best option.When working at a height of four feetWhen working over dangerous machinery or equipmentOnly when working on scaffoldsIt's not required, only recommended What is the outer part (B) of an atom called? in the lichen experiment, the metal cations bound to the the lichen disk surface, and the methylene blue dye was leached into the solution question 7 options: true false hannah and chris are classmates who have gotten into a debate over whether or not the voting age should be lowered further. hannah believes that high school students have gotten more politically involved in recent years and that the voting age should be lowered to sixteen. chris disagrees and believes teenagers are more sensitive and could use more experience in the world before casting a vote, arguing that the voting age should be raised to twenty-one. which policy would chris likely agree with?