Gaining consensus/agreement on user requirements is NOT a managerial challenge typically associated with developing global systems.
True
False

Answers

Answer 1

False; a managerial difficulty that is frequently connected to the creation of international systems.

What is one of the main problems the world economy is currently facing?

Many nations established assistance measures in response to the economic slowdown in order to limit economic damage; once again, many are being forced to adopt the required steps in order to restore their economies.

What is the main challenge that globalization presents?

One benefit of globalization for firms is a more diversified workforce. Other benefits include larger client bases and new revenue streams. Globalization does, however, also bring with it some extremely difficult challenges, including problems with worker exploitation, environmental degradation, and legal compliance.

To know more about managerial visit:-

https://brainly.com/question/13208649

#SPJ4


Related Questions

Use incremental development to write a function called hypotenuse that returns the length of the hypotenuse of a right triangle given the lengths of the other two legs as arguments. Record each stage of the development process as you go. (Downey, 2015)


After the final stage of development, print the output of hypotenuse(3, 4) and two other calls to hypotenuse with different arguments.

Include all of the following in your Learning Journal:

An explanation of each stage of development, including code and any test input and output.
The output of hypotenuse(3,4).
The output of two additional calls to hypotenuse with different arguments.

Answers

Incremental development is a method of writing function codes that avoids lengthy debugging sessions by writing each line of complete code and executing it so that before moving on to the next stage of development, the previous stage has been successfully executed.

What is Incremental development?

The process methodology of incremental development in software engineering emphasizes the benefits of moving slowly toward a goal.

In contrast to the waterfall model of software development, where a functioning system is made available only during the final stages of the project, incremental development starts with a small, functional system that is gradually enhanced and expanded.

The Python function hypotenuse() is provided below:

Stage 1:Creating the skeleton of the function and testing the function code

def hypotenuse(base, per):

  return 0.0

print(hypotenuse(3, 4))

Output:

0.0

Stage 2:Insert the hypotenuse calculation expression and output the result to the console.

import math

def hypotenuse(base, per):

h=math.sqrt(base ** 2 + per ** 2)

print(h)

hypotenuse(3, 4)

Output:

5

Stage 3:Finally, finish the function by adding the return expression.

import math

def hypotenuse(base, per):

h=math.sqrt(base ** 2 + per ** 2)

return h

print(hypotenuse(3, 4))

Output:

5

Stage 4:The function is called with the additional two arguments:

import math

def hypotenuse(base, per):

   h=math.sqrt(base ** 2 + per ** 2)

   return h

print("The hypotaneous is: "+str(hypotenuse(3, 4)))

print("The hypotaneous is: "+str(hypotenuse(12, 5)))

print("The hypotaneous is: "+str(hypotenuse(6, 8)))

Output:

The hypotaneous is: 5.0

The hypotaneous is: 13.0

The hypotaneous is: 10.0

Learn more about  incremental development

https://brainly.com/question/25310031

#SPJ1

Which of the following digital certificates are self-signed and do not depend on the higher-level certificate authority (CA) for authentication?A. Root digital certificates B. Intermediate digital certificates C. User digital certificates D. Domain digital certificates

Answers

Correct answer is A. Root digital certificates

What is a Root Digital Certificate?

A root digital certificate is self-signed and does not depend on a higher-level certificate authority (CA) for authentication.

A root digital certificate is the topmost certificate in a certificate hierarchy, and it is used to issue intermediate and end-user certificates. Because it is self-signed, a root certificate is not dependent on any other certificate for authentication, and it is considered to be the most trusted certificate in the hierarchy.

Other types of digital certificates, such as intermediate, user, and domain certificates, are typically issued by a higher-level CA and are not self-signed.

To Know More About Root Digital Certificate, Check Out

https://brainly.com/question/24487815

#SPJ1

As the system engineer for a large financial institution, you have decided to implement a backup system on all the Windows 11 laptops used by the financial consultants to ensure that critical customer data is securely stored. Your requirements for the backup system include: Only customer data files created by the financial consultants need to be backed up. Data backed up to a flash drive.
Backed up files must be uncompressed.
Include contact lists and desktop preferences.
Which of the following backup solutions BEST meets your requirements?

Answers

File History is the best backup solution that meets all of the criteria outlined here.

File history, first introduced in Windows 8, is a method of automatically storing backup versions of local files. You have the option of backing up to a network-attached storage device or a local external USB disk drives.

What is Data Backup ?

Backup safeguards data against a variety of threats, including hardware failures, human error, cyber attacks, data corruption, and natural disasters.

It is critical to protect data from any possible problem so that an organization is not caught off guard when something goes wrong.

A good data backup platform will allow the user to go back to the last known good point in time before the problem occurred.

In an ideal world, your backup should result in the quick recovery of at least mission-critical data.

To know more about Data Backup, visit: https://brainly.com/question/29453587

#SPJ4

A stored procedure is a module of logic normally written in a traditional programming language like C++ and stored in the application program.

Answers

The above statement is correct.

What is stored procedure?

A stored procedure is a piece of logic written in a programming language and stored in a database.

It is typically used to perform specific tasks, such as retrieving or updating data in the database. Because the stored procedure is stored in the database, it can be accessed and executed by multiple applications and users, allowing for efficient and consistent data management.

Stored procedures can improve the performance of database-driven applications, as they allow for pre-compiled, reusable code that can be executed quickly and efficiently.

To Know More About Database, Check Out

https://brainly.com/question/13262352

#SPJ1

Which data types go through floating data types? (a) int (c) long (b) byte (d) double​

Answers

Answer:

(d) double​

Explanation:

floating data types are data types that can represent numbers with decimal places, such as 3.14 or 2.718. The double data type is a floating data type that can represent very large or very small numbers with a high degree of precision, and is often used in scientific and engineering applications.

I need an alternative analysis for outrigger hotels and resorts.

Answers

Outrigger Hotels and Resorts is currently diversifying geographically and by product. The company expands its operations around the Pacific Ocean and diversifies its product portfolio by adding condominiums, resorts, and OHANA hotels.

What is Outrigger Hotels and Resorts’ strategic position?

Their strategic position is to provide a leisure experience for guests who have come to our hotel to enjoy their vacation.

The firm's CSF include strengthening electronic relationships with distributors, improving trademark hospitality and customer service, better managing inventory yield, and better integrating its international properties, all of which are critical stepping stones to the firm's continued success.

It reduces Outrigger's human costs by automating many of the human jobs; increases revenue due to the large number of online reservation guests; and improves work efficiency.

They collect data down to individual guest folios for analysis and send thank you letters to recurring guests to increase their loyalty to Outrigger.

Learn more about Outrigger

https://brainly.com/question/13934348

#SPJ1

Using Super Karel commands, create a code so that you have worlds with no balls in any corner.
Ending World

Answers

Using the knowledge in computational language in python it is possible to write a code that Super Karel commands, create a code so that you have worlds with no balls in any corner.

Writting the code:

from karel import *

# go to square (3, 1) and turn north"

move()

move()

turn_left()

# go to square (3, 3) and turn east

move()

move()

turn_right()

# go to square (5, 3) and turn south

move()

move()

turn_right()

# come to square (5, 2) and take the ball

move()

pick_ball()

# turn north

turn_left()

turn_left()

See more about python at brainly.com/question/18502436

#SPJ1

Virtual private networks make it just as secure to send information across a public network as it is on a secure private network.A. TrueB. False

Answers

It is a true statement because virtual private networks make it as secure to send information across a public network as it is on a secure private network.

Virtual private network or VPN describes the opportunity to establish a protected network connection when using public networks. Virtual private networks encrypt internet traffic and disguise online identity. As a result, this makes it more difficult for third parties to track the online activities of users and steal data. This encryption takes place in real time.  Virtual private network hides the user's IP address by letting the network redirect it through a specially configured remote server run by a  virtual private network host, making it as a secure private network.

You can learn more about Virtual Private Network at

https://brainly.com/question/14122821

#SPJ4

Use 3 collections like HashMap, ArrayList and Vector to insert the key values. Note the duration, required to
insert those key & values to those collections separately. For ArrayList (and for Vector) you may use two instance;
one for key and one for value.

Answers

3 collections like HashMap, ArrayList and Vector to insert the key values are=

HashMap: A HashMap is an unordered collection that stores key-value pairs, where each key is unique. It provides

constant-time complexity for insertion of key-value pairs, which is O(1).

ArrayList: An ArrayList is an ordered collection that stores values. It has constant-time complexity for insertion of

values, which is O(1). However, if the key needs to be associated with the value, then two ArrayLists must be used in

order to store the key and value separately. This means that the insertion of a key-value pair would take O(2).

Vector: A Vector is an ordered collection that stores values. It has constant-time complexity for insertion of

values, which is O(1). However, if the key needs to be associated with the value, then two Vectors must be used in

order to store the key and value separately. This means that the insertion of a key-value pair would take O(2).


What is collection?

Collection is a term used to describe a group of items or objects that have been gathered together. It is a term that is commonly used in many different areas such as art, literature, music, fashion and even biology. In art, a collection could refer to a group of paintings or sculptures, while in literature it could refer to a group of books or manuscripts. In music, a collection could refer to a group of songs or albums. In fashion, a collection could refer to a range of clothing or accessories. In biology, a collection could refer to a group of specimens or organisms.

To learn more about collection
https://brainly.com/question/14566220
#SPJ1

discuss the advantages and disadvantages of different methods you could use to help minimise the health problems of using the computer​

Answers

Advantages

If you use a screen filter/blue glasses eye strain is reducedIf LCD/TFT screens are used then eye strain is reducedIf my eye is level with the top of the screen it will reduce eye strain/neck acheIf I take breaks from excessive clicking on the mouse/keyboard this reduces RSIUsing voice activated systems reduces RSIIf I use a wrist rest/an ergonomic mouse it will reduce RSIIf I use an ergonomic chair it will reduce back acheIf I do not use the computer for long periods of time this will reduceRSI/back ache/eye strain/Carpel syndrome/Cubital syndrome/Neck pain/DVTDisadvantages

Turning the screen can reduce your ability to see clearly on the screenLaptops can be difficult to ensure the screen is 90 degrees as the whole unit needs to be movedThe cost of safety equipment can be expensiveUsing voice activated systems can be prone to many errors which may increase RSI correcting themUsers can become over-reliant on equipmentWith laptops/screens it can be difficult to position it so the eye level is at the top of the screenTaking breaks every hour can increase the work timeA mark can be awarded for a reasoned conclusion

Which tool uses images and other visual elements to provide artistic
inspiration to programmers who are designing a program?
OA. A prototype
OB. A mood board
A flowchart
OD. Pseudocode
C.
SUBMIT
B is the answer

Answers

Answer:

Flowchart

Explanation:

This is because flowchart uses different symbol to convey the message of the programmer which is easier to interpret.

Answer: A mood board

Explanation:

Suppose a file has been allocated 25 disk blocks (numbered 0..24). If block 15 is to be deleted, determine the number of read/write operations on blocks assuming:
(i) Contiguous allocation
(ii) Linked allocation
(iii) Indexed allocation (where the index was already loaded in main memory).

Answers

The number of contiguous allocation read/write operations on blocks.

How are disk blocks assigned for files?

In OS, there are 5 different types of file allocation mechanisms. the File Allocation Table (FAT), Inode, Linked File Allocation, Contiguous File Allocation, and Indexed File Allocation. When a block is allocated for a contiguous file, all of the allocated blocks on the hard disk are contiguous (adjacent).

Which algorithm is employed for disk block allocation?

The next available block in the super block list is allocated when the kernel has to allocate a block from a file system (algorithm alloc). The block cannot be redistributed once it has been completed until it is free.

To know more sbout blocks visit:-

https://brainly.com/question/3580092

#SPJ4

This is JAVA
A local grocery store has asked you to design a method to verify if their produce is okay to put on the shelves. The method takes an array of ints which represent the ages of various produce items. If an item is less than 4 days old, or more than 24, it should not be put on the shelves, and the method should return false. Otherwise, it should return true.
Examples:
verifyProduce({5,7,14,20,24}) -> true
verifyProduce({16,3,12,13}) -> false
verifyProduce({14,20,23,26}) -> false
1
public boolean verifyProduce(int[] ages) {
2
3
}

Answers

To implement the method described in the question, you could use the following code:

public boolean verifyProduce(int[] ages) {
for (int age : ages) {
if (age < 4 || age > 24) {
return false;
}
}
return true;
}
This code iterates over each element in the ages array and checks if its value is less than 4 or greater than 24. If any of the ages meet this condition, the method returns false immediately. Otherwise, the method returns true after all elements in the array have been checked.

Here is an example of how this method might be used in a Java program:

public class Main {
public static void main(String[] args) {
int[] ages1 = {5, 7, 14, 20, 24};
int[] ages2 = {16, 3, 12, 13};
int[] ages3 = {14, 20, 23, 26};

System.out.println(verifyProduce(ages1)); // outputs: true
System.out.println(verifyProduce(ages2)); // outputs: false
System.out.println(verifyProduce(ages3)); // outputs: false
}

public static boolean verifyProduce(int[] ages) {

project execution resources, such as office space, computers, and communications equipment, are acquired during the phase of the project life cycle.

Answers

The phase in the project life cycle when the work is performed, and everything in the project plan is put into action.

What exactly are project resources?

The people, capital, and/or material products necessary for the proper execution and completion of a project are referred to as project resources. In a word, project resources are what you rely on to complete tasks. The project management life cycle is often divided into four stages: planning, execution, and closing. These phases form the road that leads your project from start to finish.

The first stage of a project’s lifespan is initiation. This is where the project’s worth and viability are determined. Initiating, Planning, Executing, Monitoring/Controlling, and Closing are the steps in the process. The Project Lifecycle is divided into seven stages: intake, commencement, planning, product selection, execution, monitoring and control, and closing. These phases comprise the course that your project will travel from start to conclusion.

To learn more about project execution refer:

https://brainly.com/question/16927451

#SPJ4

Answer

Explanation

The PHP method used to get information from a database is which of the following (including all necessary arguments):
a. mysql_query(query, database name)
b. mysql_connect(query, database name)
c. mysql_query(query, connection)
d. mysql_connect(query, connection)

Answers

Answer:

mysql_query(query, connection)

Explanation:

explain Impact of HTML, CSS, and JS code on maintainability of website

Answers

Answer:

Following HTML best practices will help you build performant websites and web apps. Learning them is critical for web development.

Explanation:

Suppose you wish to write a method that returns the sum of the elements in the partially filled array myArray. Which is a reasonable method header?
public static int sum(int[] values)
public static int sum()
public static int sum(int[] values, int currSize)
public static int sum(int[] values, int size, int currSize)

Answers

A suitable method header is public static int sum(int[] values, int currSize).

Which approach will give you the array's total number of elements?

To determine the total number of entries in the chosen dimension of the array, use the GetLength(Int32) method.

What kind of object does the () method return?

Every method in the Function class has a getReturnType() method that determines the return type, which can be void, int, double, string, or any other datatype. The return type stated in the method at the time of generating the method is represented by a Class object by the getReturnType() function of the Method class.

To know more about header visit:-

https://brainly.com/question/15163026

#SPJ4

Write a docstring for this function

Answers

Answer:

def average_color(image):

   """

   Calculate the average color of an image.

   Args:

       image (Image): The image to be analyzed.

   Returns:

       float: The average color of the image.

   """

   sum_col = 0

   num_of_pixels = 0

   for row in image.pixels:

       for pixel in row:

           num_of_pixels += 1

           sum_col += (pixel.green + pixel.red + pixel.blue) / 3

   return sum_col / num_of_pixels

The integrity of a program's output is only as good as the integrity of its input. For this reason the program should discard input that is invalid and prompt the user to enter correct data. (true or false)
Most studied answer

Answers

This is a true statement because the integrity of the output of a program is only as good as the integrity of its input. For this reason, the program should discard input that is invalid and prompt the user to enter the correct data.

The given statement is true in that a program carries out input data integrity before proceeding to obtain the output. Input integrity refers to the process of checking the data that has been entered into a program to ensure it is valid, accurate, and complete before any computation performs to get output. Since the output of the program is completely dependence on the accuracy of the data entered as input.

Therefore, the given statement is true which states that a program's output data integrity depends on its input data integrity, for this reason, the program discards invalid input and promots the user to input accurate and valid data.

You can learn more about data integrity at:

https://brainly.com/question/14898034

#SPJ4

True

The integrity of a program's output heavily depends on its input's integrity. The program may produce incorrect or unexpected results if the input is invalid or incorrect. Therefore, it is often important for a program to validate its input and discard invalid data. This can help ensure that the program produces reliable and accurate output.

However, there may be situations where it is not practical or necessary to validate all input or where the consequences of invalid input are not significant. In these cases, discarding invalid input may not be necessary and prompt the user to enter the correct data. It is important to consider the specific requirements and constraints of the program and the potential impact of invalid input on the program's output.

read more about this at https://brainly.com/question/14282557

#SPJ4

What is the name of the method in the following code segment?
class Fruit :
def getColor(self) :
return self._color
a.) _color
b.) Fruit
c.) getColor
d.) self

Answers

The appropriate response to the preceding query is type.

What is the name of the method in the following code segment?The instance variable is defined in the constructor of the class using the self keyword, but the class variable is a variable that is defined in the class.Although the instance variable is only invoked with the aid of objects, the class variable is utilized as the static variable.Because "_type" is declared in the class, the aforementioned program only contains one instance of it. If a value is assigned to an instance variable in either its declaration or every constructor in the class, the variable can be final.A final instance variable may not be assigned a value outside of a constructor.Java instance variables are non-static variables that are defined outside of any methods, constructors, or blocks in a class.That variable exists independently in each instantiation instance of the class.To a class an instance variable belongs.

To learn more about instance variable refer

https://brainly.com/question/29556149

#SPJ4

What is Virtual Storage Configuration and Management, as well as Virtual Machine Management?

Please offer complete details and examples to back up the question.

Answers

Answer:

Virtual storage configuration and management refers to the process of configuring and managing the storage resources of a virtualized environment. This typically involves creating and configuring virtual disks, assigning storage space to virtual machines, and managing the allocation of storage resources among different virtual machines.

Virtual machine management, on the other hand, refers to the process of managing the virtual machines in a virtualized environment. This typically involves creating and configuring virtual machines, installing and configuring operating systems and applications on the virtual machines, and managing the allocation of computing resources such as CPU, memory, and network bandwidth among different virtual machines.

An example of virtual storage configuration and management would be creating a virtual disk with a specified size and assigning it to a virtual machine to use as its primary storage. An example of virtual machine management would be creating a new virtual machine with a specified operating system and allocated resources, and then installing and configuring applications on it.

Both virtual storage configuration and management and virtual machine management are important tasks in a virtualized environment, as they help to ensure that the virtual machines have access to the necessary storage and computing resources to function properly. These tasks are typically performed by system administrators or other IT professionals who have expertise in virtualization and IT infrastructure management.

how many ways are there to permute the letters in each of the following words? (a) number (b) discrete (c) subsets

Answers

The permutations for each word are:

(a) number - 8! = 40,320(b) discrete - 8! = 40,320(c) subsets - 6! = 720

Understanding Permutations: A Guide to Counting Possible Combinations

Permutations are a powerful tool for calculating the number of possible arrangements of a given set of items. Whether it is a set of letters, numbers, or other objects, understanding how to calculate the number of possible permutations can help to solve a variety of problems. This essay will provide a guide to understanding and calculating permutations, focusing on the three examples given above.

To begin, permutations involve rearranging a set of items in different combinations, or orders. This rearrangement is done without replacement, meaning that each item can only be used once in each permutation. For example, when permuting the letters in the word "number," each letter can only be used once, and it cannot be repeated. To calculate the number of permutations, the formula n! (where n is the number of items in the set) is used. Applying this formula to the three examples given produces the results shown above.

Learn more about Permutations :

https://brainly.com/question/1216161

#SPJ4

Which one of the following techniques would you use in ArcGIS PRO if you wanted to exchange the current selection in a layer with the unselected features in the same layer? A. EraseB. ExportC. Switch selectionD. Definition query

Answers

Answer:

Switch selection

. At the current rate of increase, what are the clock rates now projected to be in 2025? What has limited the rate of growth of the clock rate, and what are architects doing with the extra transistors now to increase performance?

Answers

Answer:

The clock rate is now projected to be 10 GHz in 2025. The rate of growth of the clock rate has been limited by the fact that the speed of light is the ultimate limit on the speed of electrical signals. Architects are using the extra transistors to increase performance by adding more cores to the processor.

when analyzing cyber attacks, a cyber analyst could use ____ to understand the different stages of the cyber attack and to map used tactics and techniques.

Answers

Phishing. Attack with SQL Injection. Denial of Service caused by Cross-Site Scripting (XSS) (DoS).

What phases make in a cyberattack?

They choose their initial target, get the information needed to weaponize it, send phishing emails, start bogus websites, and use malware as they wait for someone to submit the information so they can install a backdoor to ensure ongoing network access.

What are the cybersecurity lifecycle's five stages?

The Cybersecurity Lifecycle's phases. The five functions of the cybersecurity framework—Identify, Protect, Detect, Respond, and Recover—as outlined by the National Institute of Standards and Technology (NIST)—are constructed upon the model's constituent parts.

Learn more about URL here:

https://brainly.com/question/19463374

#SPJ4

Selena types “bod?” for the Find command. Which words would be found in the search? Check all that apply.

body
boat
bodkin
bode
bog
bodice

Answers

Since Selena types “bod?” for the Find command. The words that would be found in the search is options A, C, D and F

bodybodkinbodebodiceWhat the find command does?

When dealing with the hundreds of thousands of files and directories on a modern computer, the locate command is one of the most helpful Linux commands. Find, as the name suggests, aids in finding items other than by filename.

The command-line tool find is used in Unix-like and some other operating systems to identify files based on user-specified criteria and either prints the pathname of each found object or, if some action is required, executes that action on each matched object.

The "find" command has three associated attributes: [path]: This specifies the directory from which to start a search. [options]: It outlines the filtering criteria, such as looking for a file or folder by name, permission, time, or date. [expression]:

Since the word is BOD, likely words that start with BOD will show up.

Learn more about Find command from

https://brainly.com/question/26807210
#SPJ1

To show the symbol for the Euro instead of the dollar sign, change the ______ property for the field whose data type is Currency.
answer choices
Field Size
Format
Description
Caption

Answers

To show the symbol for the Euro instead of the dollar sign, change the Format property for the field whose data type is Currency. This correct option is B 'Format'.

The Format property in MS Access uses different settings for different types of data. For example, for control, you can set this property in the control's property sheet. and for a field, you can set this property in the table Design view  Format property allows you can use to customize the way numbers,  text, dates, and times are displayed. For example, to change a symbol form Euro to Dollar sign it is the format property that needs to be changed fro the field containing Currency data type.

You can learn more about Format property at:

https://brainly.com/question/1306721

#SPJ4

Given an array of words and an array of sentences, determine which words are anagrams of each other. Calculate how many sentences can be created by replacing any word with one of its anagrams, Example wordSet = ['listen' 'silent, 'it', 'is'] sentence = "listen it is silent Determine that listen is an anagram of silent. Those two words can be replaced with their anagrams. The four sentences that can be created are: • listen it is silent • listen it is listen • silent it is silent • silent it is listen​

Answers

The four sentences that can be created using array : 1.listen it is silent  2. listen it is listen  3. silent it is silent  4.  silent it is listen​.

What is an Array?It is simpler to determine the position of each element in an array by simply adding an offset to a base value, which is the memory location of the first element in the array. An array is a collection of items of the same data type stored at adjacent memory regions (generally denoted by the name of the array). An array is a striking display or range of a specific kind of stuff. Arrays are one of the most often used data structures, without which any programming arrangement is lacking. The base value is index 0, and the difference between the two indices is the offset. Arrays excel in situations requiring sorted data layout due to their practical working method. The lengthy programming process benefits immensely from the organised list of components.

To learn more about Array refer to:

https://brainly.com/question/28061186

#SPJ4

Create the logic for a program that continuously prompts the user for a number of dollars until the user enters 0. Pass each entered amount to a conversion method that returns a breakdown of the passed amount into the fewest bills. Display the bills in the main program.

The bills are 100-dollar bills, 50-dollar bills, 20-dollar bills, 10-dollar bills, 5-dollar bills, and 1-dollar bills.

if the number of dollars is 37 then the function returns 1 20-dollar bill, 1 10-dollar bill, 1 5-dollar bill, and 2 1-dollars bills.

if the number of dollars is 98 then the function returns 1 50-dollar bill, 2 20-dollar bills, 1 5-dollar bill, and 3 1-dollar bills.

Suppose the number of bills is 186. What will your function return?

Answers

Using the knowledge in computational language in C++ it is possible to write a code that Create the logic for a program that continuously prompts the user for a number of dollars until the user enters 0.

Writting the code:

#include<iostream>

using namespace std;

void displayBills(int dollars)

{

int ones,fives,tens,twenties,temp;

twenties = dollars / 20;

temp = dollars % 20;

tens = temp / 10;

temp = temp % 10;

fives = temp / 5;

ones = temp % 5;

cout<< "\nThe dollar amount of ", dollars, " can be represented by the following monetary denominations\n";

cout<<"twenties: "<<twenties<<"\ntens: "<<tens<<"\nfives: "<<fives<<"\nones: "<<ones;

}

int main()

{

int dollars;

cout<<"Please enter the a whole dollar amount (no cents!). Input 0 to terminate: ";

cin>>dollars;

while(dollars!=0)

{

displayBills(dollars);

cout<<"\nPlease enter the a whole dollar amount (no cents!). Input 0 to terminate: ";

cin>>dollars;

}

return 0;

}

See more about C++ at brainly.com/question/18502436

#SPJ1

Write a program that keeps track of a simple inventory for a store. While there are still items left in the inventory, ask the user how many items they would like to buy. Then print out how many are left in inventory after the purchase. You should use a while loop for this problem.
We have 20 items in inventory. How many would you like to buy? 4 Now we have 16 left. We have 16 items in inventory. How many would you 11 like to buy? 2 Now we have 14 left. We have 14 items in inventory. How many would you like to buy? 8 Now we have 6 left. We have 6 items in inventory. How many would you like to buy? 5 Now we have 1 left. We have 1 items in inventory. How many would you like to buy? 1 A]l out!

Answers

Answer:

inventory = 20

while inventory > 0:

   print("We have", inventory, "items in inventory.")

   buy = int(input("How many would you like to buy? "))

   inventory -= buy

   if inventory != 0:

       print("Now we have", inventory, "left.")

   else:

       break

print("All out!")

Other Questions
why is acculturation a pressure to second generation immigrantsI need a good quote as well please help Im stressing Given: C is the midpoint of DA and FE bisects LAED. List three congruence statements and reasons based onthe given information. Anderson, an artist, had first (4) ......... up with some 12 years earlier. A. BROUGHT B. COME C. CAUGHT D. GOT which one???? pls help Lawmakers in new zealand will vote on whether the country should lower the voting age to. ?. Unbalanced forces have no change in motion and ______ equal zerojust need the answer that fills the blank space plsss In what ways is her newfound friendship with Mai so important to Willow? What does Mai get in return? why is scout surprised that her teacher hates hitler? how is miss gates similar in this regard to the ladies in the missionary circle from chapter twenty-four? 34. Which of the following is NOT a result of the Columbian Exchange? A. Cultural DiffusionB. Death by DiseaseC. Decreased ExplorationD. Increased Slavery in act iv scene i how does gertrude respond to hamlet's request that she perpetuate the notion of his madness to claudius An architect built a scale modelof a sports stadium using a scale in which 2 inches represents 30 feet.The height of the sport stadium is 180 feet.What is the height of the scale model in inches? What does the point (0,0) represent? Select all that apply. Zeno jumped 8 meters. Then he jumped half as far again (4 meters). Then he jumped half as far again ( 2 meters). So after 3 jumps, he was 8+4+2=14 meters from his starting place.a) Zeno kept jumping half as far again. How far would he be after 4 jumps? 5 jumps? 6 jumps?b) Before he started jumping, Zeno put a mark on the floor that was exactly 16 meters from his starting place. How close can Zeno get to the mark if he keeps jumping half as far again? f(x) = 3x + 4x - 2x + 8 and g(x) = 2x+3x+5x+2. Find f(x) + g(x) Describe what matter and energy cycling is, and why they are important for the Earth as a system and for living things. find using distributive property.{[7]\frac{x}{y}[/5]([-3]\frac{x}{y}[/12])}{[7]\frac{x}{y}[/5][5]\frac{x}{y}[/12] Phoebe had $14.27. Then she earned $8.75 for raking her neighbor's leaves.How much money does she have now? based on this map, which of the following countries would be described as having the greatest degree of democratization? (4 points) a algeria b panama c vietnam d mexico The starting salary for a new employee is 25,000. The salary for this employee increases by 8% per year. what is the salary after 1 year? The 2010 Supreme Court decision in Citizens United v. FEC allowsa. corporations, unions, and individuals to donate unlimited funds to presidential campaignsb. corporations, unions, and individuals to donate unlimited funds to entities that are "independent" of the candidatesc. corporations, unions, and individuals to donate unlimited funds to political partiesd. political parties to create special funds to donate to candidates from federal monies.e. options A and B are true. 4 divide 5/6 as a mixed number ??