The Fibonacci numbers are 0, 1, 1, 2, 3, 5, 8, 13, ......., where each number is the sum of the two preceding numbers. Write a program that declares an array of length 15 and fills the array with the first 15 Fibonacci numbers. Print the array to check if the array elements are correct. Use the sizeofoperator instead of 15 whenever you need to use the array length.

Answers

Answer 1
0,1,1,2,3,5,8,13,21,34,55,89,144,233,377,610,987,1597

Related Questions

describe email etiquette and netiquette when communicating electronically.

Answers

Answer:

Email etiquette refers to the principles of behavior that one should use when writing or answering email messages. It is also known as the code of conduct for email communication. Email etiquette depends upon to whom we are writing- Friends & Relatives, Partners, Customers, Superior or Subordinates

Difference Between Etiquette and Netiquette is that Etiquette is the simple requirements needs for social behavior while Netiquette, is the code of acceptable behaviors users should follow while on the Internet.

9. Lael wants to determine several totals and averages for active students. In cell Q8, enter a formula using the COUNTIF function and structured references to count the number of students who have been elected to offices in student organizations.

Answers

Let understand that a spreadsheet perform function such as getting the sum, subtraction, averages, counting of numbers on the sheet rows and columns.

Also, the image to the question have been attached as picture.

Here, Lael wants to count the number of students who have been elected to offices in student organizations.

Lael will used the COUNTIF Function in the Spreadsheet to achieve the count because function helps to count cells that contain numbers.

In conclusion, the formulae that Lael should use on the Spreadsheet to count the number of students who are elected is "Q8 = COUNTIF(M2:M31, "Elected")"

Learn more about Excel function here

brainly.com/question/24826456/

Suppose you have the following search space:

State
next
cost

A
B
4

A
C
1

B
D
3

B
E
8

C
C
0

C
D
2

C
F
6

D
C
2

D
E
4

E
G
2

F
G
8

Draw the state space of this problem.

Assume that the initial state is A and the goal state is G. Show how each of the following search strategies would create a search tree to find a path from the initial state to the goal state:
Breadth-first search
Depth-first search
Uniform cost search

Answers

Breadth

Depth

Uniform

U

Use the drop-down menus to describe how to add a data bar to a report.
1. Open the table in view.
2. Click the column of the desired numerical field.
3. Click the conditional tab Format, then .
4. In the Rules Manager dialog box, click .
5. Select to “compare to other records,” and determine whether you want the value and bar to show at the same time.
6. Adjust the desired length of the bar and the color. Click OK.
7. Once satisfied with your rule, click and then OK.

Answers

Answer:

1. layout

3. conditional formatting

4. new rule

7. apply

Explanation:

just did it on edge

Information Technology​

Answers

Answer:

information technologies

Explanation:

Information technology is the study, design, development, implementation, support or management of computer-based information systems—particularly software applications and computer hardware. IT workers help ensure that computers work well for people.

Nearly every company, from a software design firm, to the biggest manufacturer, to the smallest “mom & pop” store, needs information technology workers to keep their businesses running smoothly, according to industry experts.

Most information technology jobs fall into four broad categories: computer scientists, computer engineers, systems analysts and computer programmers. HR managers responsible for recruiting IT employees increasingly must become familiar with the function and titles of the myriad job titles in demand today.

Some of them are listed below:

Database administration associate

Information systems operator/analyst

Interactive digital media specialist

Network specialist

Programmer/analyst

Software engineer

Technical support representative

Answer:

Information technology is the use of computers to store, retrieve, transmit and manipulate data, or information, often in the context of business or other enterpise

How was the first computer reprogrammed

Answers

Answer:

the first programs were meticulously written in raw machine code, and everything was built up from there. The idea is called bootstrapping. ... Eventually, someone wrote the first simple assembler in machine code.

Explanation:

What are the purposes of a good web page design? The purpose of a good web page design is to make it and .

Answers

Answer:

responsiveness and intuitive

Explanation:

The two main purposes of a good web page design is responsiveness and intuitive. A webpage needs to be designed in such a way that the individual using it can easily find what they are looking for and understand what each function in the webpage does without having to ask for help or go through an extensive tutorial. They need to be able to use the website for the first time and immediately be able to use it as if they have used it countless times before. The webpage also needs to be designed with responsiveness in mind. So much so that the webpage runs fluently, loads images fast, and scales to the size of the monitor correctly. As a rule the webpage should not take longer than 2 seconds to load.

Consider the following program:

def test_1():
test_3()
print("A")

def test_2():
print("B")
test_1()

def test_3():
print("C")
What is output by the following line of code?

test_1()

C

A
B
C

A
C

C
A

Answers

Answer:

this would be answer D

Explanation:

In this exercise we have to use the knowledge of computational language in python to write the code.

We have the code in the attached image.

The code in python can be found as:

def test_1():

test_3()

print("A")

def test_3():

print("C")

Back to test_1()

print("A")

What is program?

A computer can run multiple programs simultaneously, and each program can be in a different state. There are three states a program can be in: running, blocked, and ready. If a program is running, it means that it is currently using the computer's resources, such as the processor, memory, and I/O devices, to perform its tasks.

On the other hand, if a program is blocked, it means that it is waiting for a resource to become available, such as a file, network connection, or input from the user. In the scenario you mentioned, "Program A" is in the running state, meaning it is actively using the computer's resources.

Therefore, Program B" is in the blocked state, meaning it is waiting for a resource to become available so it can continue to run.

Learn more about program on:

https://brainly.com/question/30613605

#SPJ3

examples of pop in computer​

Answers

Answer:

Short for Post Office Protocol, POP or POP mail is one of the most commonly used protocols used to receive e-mail on many e-mail clients. There are two different versions of POP: POP2 and POP3. POP2was an early standard of POP that was only capable of receiving e-mail and required SMTP to send e-mail. POP3 is the latest standard and can send and receive e-mail only using POP, but can also be used to receive e-mail and then use SMTP to send e-mail.

Discuss with illustrations the
types and benefits of enterprise storage systems.

Answers

Answer:

An Enterprise Storage System is a centralized repository for business information. It provides a common resource for data sharing, management and protection via connections to other computer systems.

Enterprise storage systems are designed to process heavy workloads of business-critical information.

Benefits

High availability

Reliable backup and disaster recovery

Convenient data sharing

Centralized administration

Remote support.

A medium-sized highway construction company CST has chosen to constrain its investment in computing resources to laptop and desktop computers and the necessary networking hardware and software to access the Internet efficiently. All of CST's data is to be stored off-site through an Internet-enabled storage provider that is used by many different companies and organizations. The service model employed for the data storage capability of only CST is:

Answers

Answer:

The service model employed for the data storage capability of only CST is:

SaaS (Software as a Service).

Explanation:

The three cloud computing categories are Infrastructure as a Service (IaaS), Software as a Service (SaaS), and Platform as a Service (PaaS).  The three cloud computing services provide different virtual computing resources.  In the case of CST, it utilizes only the data storage software of a provider, who provides the data storage infrastructure, including cloud-based servers, while CST uses its own "laptop and desktop computers and other networking hardware and software to access the Internet efficiently."

1 There are several applications to assist you to surf through the internet, mention
three (3 marks)​

Answers

Email
Web browsing
Peer-to-peer services

Which range of values would result in 10 elements stored in an array?

1-11

0-9

0-10

2-12

Answers

Answer:

0-9

Explanation:

count 0 as 1

len(0,1,2,3,4,5,6,7,8,9)=10

In java I need help on this specific code for this lab.


Problem 1:


Create a Class named Array2D with two instance methods:


public double[] rowAvg(int[][] array)


This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per row of the 2D array argument.


The method will adjust automatically to different sizes of rectangular 2D arrays.


Example: Using the following array for testing:


int [][] testArray =

{

{ 1, 2, 3, 4, 6},

{ 6, 7, 8, 9, 11},

{11, 12, 13, 14, 16}

};

must yield the following results:


Averages per row 1 : 3.20

Averages per row 2 : 8.20

Averages per row 3 : 13.20

While using this other array:


double[][] testArray =

{

{1, 2},

{4, 5},

{7, 8},

{3, 4}

};


must yield the following results:


Averages per row 1 : 1.50

Averages per row 2 : 4.50

Averages per row 3 : 7.50

Averages per row 4 : 3.50

public double[] colAvg(int[][] array)


This method will receive a 2D array of integers, and will return a 1D array of doubles containing the average per column of the 2D array argument.


The method will adjust automatically to different sizes of rectangular 2D arrays.


Example: Using the following array for testing:


int [][] testArray =

{

{ 1, 2, 3, 4, 6},

{ 6, 7, 8, 9, 11},

{11, 12, 13, 14, 16}

};

must yield the following results:


Averages per column 1: 6.00

Averages per column 2: 7.00

Averages per column 3: 8.00

Averages per column 4: 9.00

Averages per column 5: 11.00

While using this other array:


double[][] testArray =

{

{1, 2},

{4, 5},

{7, 8},

{3, 4}

};


must yield the following results:


Averages per column 1: 3.75

Averages per column 2: 4.75



My code is:


public class ArrayDemo2dd

{


public static void main(String[] args)

{

int [][] testArray1 =

{

{1, 2, 3, 4, 6},

{6, 7, 8, 9, 11},

{11, 12, 13, 14, 16}

};

int[][] testArray2 =

{

{1, 2 },

{4, 5},

{7, 8},

{3,4}

};


// The outer loop drives through the array row by row

// testArray1.length has the number of rows or the array

for (int row =0; row < testArray1.length; row++)

{

double sum =0;

// The inner loop uses the same row, then traverses all the columns of that row.

// testArray1[row].length has the number of columns of each row.

for(int col =0 ; col < testArray1[row].length; col++)

{

// An accumulator adds all the elements of each row

sum = sum + testArray1[row][col];

}

//The average per row is calculated dividing the total by the number of columns

System.out.println(sum/testArray1[row].length);

}

} // end of main()


}// end of class


However, it says there's an error... I'm not sure how to exactly do this type of code... So from my understanding do we convert it?

Answers

Answer:

Explanation:

The following code is written in Java and creates the two methods as requested each returning the desired double[] array with the averages. Both have been tested as seen in the example below and output the correct output as per the example in the question. they simply need to be added to whatever code you want.

public static double[] rowAvg(int[][] array) {

       double result[] = new double[array.length];

     for (int x = 0; x < array.length; x++) {

         double average = 0;

         for (int y = 0; y < array[x].length; y++) {

             average += array[x][y];

         }

         average = average / array[x].length;

         result[x] = average;

     }

     return result;

   }

   public static double[] colAvg(int[][] array) {

       double result[] = new double[array[0].length];

       for (int x = 0; x < array[x].length; x++) {

           double average = 0;

           for (int y = 0; y < array.length; y++) {

               average += array[y][x];

           }

           average = average / array.length;

           result[x] = average;

       }

 

       return result;

   }

What is the command to launch each of the following tools? Local Group Policy Local Security Policy Computer Management console Local Users and Groups console Resultant Set of Policy (RSoP)

Answers

Answer:

The command for

Local Group Policy  is GPedit.msc

Local Security Policy is SecPol.msc

Computer Management console is Compmgmt.msc

Local Users and Groups console is Lusrmgr.msc

Resultant Set of Policy is RSOP.msc

Explanation:

The command for

Local Group Policy  is GPedit.msc

Local Security Policy is SecPol.msc

Computer Management console is Compmgmt.msc

Local Users and Groups console is Lusrmgr.msc

Resultant Set of Policy is RSOP.msc

RAM IS often referred
to as
1 SECONDARY STORAGE
2 . READ ONLY MEMORY
3. RATIO ACTIVE MEMORY
4. PRIMARY STORAGE

Answers

Answer:

ratio active memory

Explanation:

ratio active memory because the rule of computer

What is the benefit of making an archive folder visible in the Outlook folder list?

This makes the folder available on the Office 365 website.
The folder can be password protected to increase security.
Archived items in the folder are accessible within the Outlook client.
Archived items in the folder can be shared with other Outlook users.

Answers

Answer:

a

Explanation:

he is trying to find information on the internet first he navigated to a search engine entered the keywords database administrator and clicked on search the results did not show what it was looking for​

Answers

Answer:

b

Explanation:

b

Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. Many individuals and organizations are choosing cloud storage for their important files. Discuss the pros and cons of cloud storage for both personal files and business files. What inputs and outputs are needed to support the storage environment

Answers

Answer:

Pros of cloud storage

Files can be accessed remotely without having to be connected to a company's intranetSecurity and file backups are managed by the cloud storage company, frees up employees time applying updates and other maintenance tasks.Usually billed monthly which allows for a lower initial startup cost

Cons of cloud storage

File security relies upon trust in the cloud storage providerLong term cost could be higher than storing files yourselfRequires an internet connection to access files

Write the mostValuableNeighbor method, which compares the item in row r and column c to the items to its left and to its right. The method determines which of the three items has the greatest value and returns its name. If more than one of the values have a value that is greatest, then any of their names can be returned. If the item has no item to its left, it is compared only to the item to its right. If the item has no item to its right, it is compared only to the item to its left.

Answers

Answer:

Explanation:

The following method is written in Java, using the Item class and ItemGrid class found online we can use this method to grab the 2-dimensional array and compare the three neighbors in the same row. It saves the position of the neighbor with the greatest value in the variable greatest and then uses that position to call the getName() method from the object in that position to get the name of that Neighbor and returns the name.

public String mostValuableNeighbor(ItemGrid grid, int r, int c) {

       int greatest = grid[r][c];

      if (grid[r][c+1].getValue() > greatest.getValue()) {

          greatest = grid[r][c+1];

      }

       if (grid[r][c-1].getValue() > greatest.getValue()) {

           greatest = grid[r][c-1];

       }

       

      return greatest.getName();

   }

In this exercise we have to use the knowledge of computational language in JAVA to write the code.

We have the code in the attached image.

The code in Java can be found as:

public String mostValuableNeighbor(ItemGrid grid, int r, int c) {

      int greatest = grid[r][c];

     if (grid[r][c+1].getValue() > greatest.getValue()) {

         greatest = grid[r][c+1];

     }

      if (grid[r][c-1].getValue() > greatest.getValue()) {

          greatest = grid[r][c-1];

      }

     return greatest.getName();

  }

See more about JAVA at brainly.com/question/26104476

Explain the paging concept and main disadvantages of pipelined
approaches? Compare the superscalar and super pipelined approaches
with block diagram?

Answers

Answer:

PAGINACIÓN En la gestión de memoria con intercambio, cuando ... Debido a que es posible separar los módulos, se hace más fácil la modificación de los mismos. ... Ventajas y Desventajas de la segmentación paginada

Explanation:

What is the creative strategy for music application.​

Answers

Answer:

The City of Vancouver has allocated $300,000 to support the growth and development of the Vancouver Music Strategy, developed to address current gaps in the music ecosystem that support: Creating a sustainable, resilient, and vibrant music industry.

Explanation:

What is a foreign key? a security key to a database that stores foreign data a security key to a database located in another country a field in a table that uniquely identifies a record in a relational database a field in a table that links it to other tables in a relational database

Answers

Answer: a field in a table that links it to other tables in a relational database

A - a security key to a database that stores foreign data

Think of an aspect of HTML that you found challenging to master. Why is that aspect of HTML important? What are some future situations that you could use it in?

Answers

Answer:

html is a thing that u can to create an website business that u can make money on it

(Hours, minutes, and seconds) Write a method that returns a string in the form of hour:minute:second for a given total seconds using the following header:
public static String format(long seconds)
Here is a sample run:

Enter total seconds: 342324
The hours, minutes, and seconds for total seconds 342324 is 23:05:24

Note that a zero is padded to hour, minute, and second if any of these values is a single digit.

Answers

Answer:

Answered below.

Explanation:

class Convert {

public static String format(long seconds) {

Scanner sc = new Scanner(System.in);

System.out.print("Enter total seconds: ");

int secs = sc.nextInt();

int hours = secs / 3600;

int minutes = (secs % 3600) / 60;

int seconds = (secs % 3600) % 60;

String timeFormat = hours + ":" + minutes + ":" + seconds;

return timeFormat;

}

}

Parts arrive at a two-machine system according to an exponential interarrival distribution with mean 20 minutes. Upon arrival, the parts are sent to Machine 1 and processed. The processing-time distribution is TRIA (4.5, 9.3, 11) minutes. The parts are then processed at Machine 2 with a processing-time distribution as TRIA (16.4, 19.1, 20.8) minutes. The parts from Machine 2 are directed back to Machine 1 to be processed a second time (same processing-time distribution but an independent draw from it). The completed parts then exit the system. Run the simulation for a single replication of 20,000 minutes to observe the average number in the machine queues and the average part cycle time with Arena Model

Answers

Answer:

I really don’t know computer science but I give u good luck in finding an answer to this question.

Explanation:

Before hard disk drives were available, computer information was stored on:

Floppy Disks

Cassette Tapes

Punch Cards

All of the Above

Answers

floppy disks . is the answer

Read the 4 entities below and assume that customer_id is the key common to all tables.
Customer: An entity that describes a customer. An instance occurs for unique customers only using name, date of birth, and login name as customer_id primary key.
Online: An entity that describes a customer purchasing activity online. An instance occurs when the customer completes the transaction. Customers can purchase more than once.
Visits: An entity that describes a customer purchase in a physical store. An instance occurs if a customer makes or purchase or checks-in using an app. Customers can visit more than once per day.
Satisfaction: An entity that represents data from a recent customer satisfaction survey. An instance occurs when a customer takes the Survey. A customer is tracked by login name and can only take the survey one time.
Use the information to match the following relationships. Answers can be reused more than once.
1. The relationship between Customer and Online.
2. The relationship between Customer and Satisfaction.
3. The relationship between Online and Visits.
4. The relationship between Visits and Satisfaction
A. prototype
B. one-to-one
C. Zero-sum
D. one-to-many
E. TOO many
F. many-to-many

Answers

Answer:

1. The relationship between Customer and Online - One to One

2. The relationship between Customer and Satisfaction - Many to Many

3. The relationship between Online and Visits - Zero sum

4. The relationship between Visits and Satisfaction - Prototype

Explanation:

The relationship between customers and satisfaction is important for any business. One disappointed customer will make a business to loose 10 new customers. The customer satisfaction is most important for any business and it is necessary to get feedback from customers in order to know whether the business service is adequate to satisfy a customer positively.

When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This adjustment can be done by normalizing to values between 0 and 1, or throwing away outliers.
For this program, adjust the values by dividing all values by the largest value. The input begins with an integer indicating the number of floating-point values that follow.
Output each floating-point value with two digits after the decimal point, which can be achieved as follows:
print('{:.2f}'.format(your_value))
Ex: If the input is:
5 30.0 50.0 10.0 100.0 65.0
the output is:
0.30 0.50 0.10 1.00 0.65
The 5 indicates that there are five floating-point values in the list, namely 30.0, 50.0, 10.0, 100.0, and 65.0. 100.0 is the largest value in the list, so each value is divided by 100.0.
For coding simplicity, follow every output value by a space, including the last one
1 #include
2 #include
3 #include
4 using namespace std;
5
6 int main() {
7
8 /* Type your code here. */
9
10 return 0;
11 }
12

Answers

Answer:

5.23 LAB: Adjust values in a list by normalizing When analyzing data sets, such as data for human heights or for human weights, a common step is to adjust the data. This can be done by normalizing to values between 0 and 1, or throwing away outliers.

Explanation:

Write a line of code that declares a variable called shipName and set it equal to the string SpaceX3000.

Answers

Answer:

shipName = "SpaceX3000"

Explanation:

Other Questions
suppose we have two reactions, ab and bc. you can isolate b, and it is stable. What impacts resulted from the Federal Art Project? HELP ME PLEASE : Math is a bit different at the North Pole. Can you solve this math with Christmas symbols problem? What does the poet do in the night answer? Please help !!!!!!!! How do you prove you cant do sedentary work? TRUE/FALSE. the basic idea of a natural monopoly is that there is one producer, and new sellers are discouraged from entering the market because the current producer is facing a rise in costs due to natural increases in the prices of inputs. the current producer has a patent on its product. there would be legal barriers against entering the market. they would have significantly higher marginal costs than the existing seller in the market. A checking account with $500 is: O more liquid than a person's new car. O less liquid than a checking account with $1000. O equally liquid as a stock share with a $500 value O less liquid than a home with a market value of $250,000. What are the steps to solving 5x 3 13? Can you testify to what you heard someone say? What types of cases does the US District Courts have? if the court allows someone with a first operating under the influence (oui) conviction to complete an alcohol education course , what happens to the license suspension ? Can PACs contribute directly to candidates? What do you think would be some of the challenges in collecting and preserving impressions? why? CHALLENGE ACTIVITY 3.14.1: String library functions. Assign the size of userinput to stringsize. Ex: if userinput is "Hello", output is: Size of user Input: 5 1 test passed 372454.2108722.q33zqy7 1 #include 2 #include 3 4 int main(void) { 5 char userInput[50]; 6 int stringSize; 7 scanf("%s", user Input); All tests 00 8 9 printf("Size of user Input: %d\n", stringSize); 10 11 12 13 14 15 } return 0; Run Cumulative algorithm can only be used with primitive data types O True O False Was slavery the cause of the war? What are the 5 influences of the English language? Question 1 of 10What is the slope formula?OA. -,Y/-1/OB. -X-XO c. 2-X-1/D. +Y/+1/SUBMIT Which of the following answers lists 2 items owned by a debtor either at the time of or prior to the bankruptcy filing that would most likely be included in the bankruptcy estate?a. The debtor's home and a vintage Ford car that the debtor gave to his sister 3 weeks prior to the debtor's filing bankruptcy.b. The debtor's retirement IRA accounts and the debtor's car worth $25,000.c. Ring worth $100,000 (the amount over $25,000) and life insurance proceeds received by the debtor within 90 days after the debtor filed for bankruptcy.d. The debtor's cash payment made to a creditor 2 years ago who would have received nothing in the bankruptcy and the debtor's furniture.