Write a program using integers userNum and x as input, and output userNum divided by x four times. Ex: If the input is 2000 2, the output is: 1000 500 250 125 Note: In Coral, integer division discards fractions. Ex: 6 / 4 is 1 (the 0.5 is discarded).this must be written in Coral Language

Answers

Answer 1

Answer:

integer userNum

integer x

integer i

put "Enter the user number: "

userNum = Get next input

put "Enter the x value: "

x = Get next input

for i = 0; i < 4; i = i + 1

            put userNum/x to output

Explanation:

Coral Programming language is an ultra-simple programming language for learning programming. The first three rows of the code block declare the variables 'userNum', 'x', and 'i'. The "Get next input" and the "Put 'output_value' to output" are used by the program to get input from the user and output a value to the screen respectively.


Related Questions

Display all the lines in unixPasswd that contain at least 10 consecutive lowercase letters. How many names are there in total that meets this criteria?

Answers

Answer and Explanation:

To display 10 consecutive lower case letters in Unix, we make use of the commands below. The first command finds the letters in the file and the second command counts them line by line.

$ grep '[a-z]\{10,\}' /unixPasswd/passwd

# this command displays lines with at least 10 consecutive lowercase letters or more than 10 consecutive lowercase letters

$ grep '[a-z]\{10,\}' /unixPasswd/passwd | wc -l

# this command counts the number of lines that has at least 10 consecutive lower case letters or more than 10 consecutive lowercase letters

Note: the unixPasswd is a file in passwd file. The # is used when we want to add comments, is optional here. The $ is a prompt on the terminal that begins a new command.

Using a third-party package of your choice, write a program that reads the contents of a csv file and saves it to an Excel file. The program should take two arguments. The name of the input file and the name of the output file.

Answers

Answer:

import pandas as pd

df = pd.read_csv("file_csv")

df.to_excel("file.xlsx", sheet_name = "name_of_sheet")

# or use: with df.ExcelWriter("file.xlsx", mode='a') as file,

#df.to_excel(file, sheet_name= "sheet name")

Explanation:

This python source code uses the pandas package to read csv (comma separated values) file and converts it to an excel file (xlsx) using the read_csv and ExcelWriter methods respectively.

An 8-bit ADC has an input range of 0 to 10 volts and an output range of 0 to 255 (called straight binary). What digital value will be returned when an input of 7.5 volts is sampled?

Answers

Answer:

converting 191.25 to Binary 110011

Explanation:

Input range = 0 to 10volts

output range = 0 to 255

first we have to determine the resolution

= output range / input range

= 255 -0 / 10 - 0

= 25.5

when an input value of 7.5 volts is sampled

digital equivalent o/p voltage = 7.5 * 25.5

                               = 191.25

converting 191.25 to Binary 110011

which of the following file formats cannot be imported using Get & Transform?

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

In this question, the given options are:

A.) Access Data table

B.)CVS

C.)HTML

D.)MP3

The correct option to this question is D- MP3.

Because all other options can be imported using the Get statement and can be further transformed into meaningful information. But MP3 can not be imported using the GET statement and for further Transformation.

As you know that the GET statement is used to get data from the file and do further processing and transformation.

Java: Programming Question: Reverse OrderWrite a program that reads ten integers into an array; define another array to save those ten numbers in the reverse order. Display the original array and new array. Then define two separate methods to compute the maximum number and minimum number of the array.Sample Run:Please enter 10 numbers: 1 3 5 8 2 -7 6 100 34 20The new array is: 20 34 100 6 -7 2 8 5 3 1The maximum is: 100The minimum is: -7Bonus: Determine how many numbers are above or equal to the average and how many numbers are below the average.

Answers

import java.util.Scanner;

import java.util.Arrays;

public class JavaApplication47 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.print("Please enter 10 numbers: ");

       String [] nums = scan.nextLine().split(" ");

       int newNums[] = new int [nums.length];

       int w = 0, total = 0, above = 0, below = 0;

       for (int i=(nums.length-1); i>=0;i--){

           newNums[w] = Integer.parseInt(nums[i]);

           w++;

       }

       System.out.println("The old array is: "+Arrays.toString(nums));

       System.out.println("The new array is: "+Arrays.toString(newNums));

       Arrays.sort(newNums);

       System.out.println("The maximum is: "+newNums[9] + "\nThe minimum is: "+newNums[0]);

       for (int i : newNums ){

           total += i;

       }

       total = total / 10;

       for (int i : newNums){

           if (i >= total){

               above += 1;

           }

           else{

               below += 1;

           }

       }

       System.out.println("There are "+above+" numbers above or equal to the average.");

       System.out.println("There are "+below+" numbers below the average.");

   }

   

}

I hope this helps!

Which IDS/IPS detection method uses previously gained connection attributes to match traffic against predetermined profiles

Answers

Answer:

Stateful protocol analysis detection.

Explanation:

IDS and IPS are acronym for intrusion detection system and intrusion prevention system respectively. IDS is a security system which monitors the network traffic and notifies the engineer when there's a malicious activity. IPS is a security system which monitors the network traffic and blocks malicious activity as well as keeping logs.

Generally, the detection methods used by the Intrusion Prevention Systems (IPS) are;

1. Statistical anomaly-based detection.

2. Signature-based detection.

3. Stateful protocol analysis detection.

Stateful protocol analysis detection is an IDS/IPS detection method that uses previously gained connection attributes to match traffic against predetermined profiles.

Basically, these predetermined profiles comprises of benign activities and suspicious activities that have been developed by industry leaders and vendors as abnormal systems or network behaviors.

Identify at least three different tools or commands that can be used to determine the ports open on a computer. Explain what can be identified by these tools or commands and what can be done to protect against exploitation from these tools or commands.

Answers

Answer:

COMPUTERkdkwenfjknwejfkjbNT at G--

Explanation:

Disregarding any references or pointers in data elements, i.e., the info components, how many null pointers are there in a properly maintained circular linked list that is not empty

Answers

Answer:

There are no null pointers.

Explanation:

Each element in a circular linked list points to exactly one other element, thus closing the loop and making it "circular".

Write a public static method named evens that takes in 1 argument int a, and returns a String containing all positive even numbers with each separated by a comma from O up to that number inclusive if it is also even
Remember if the argument is odd not to include it in the output
Remember there should be no trailing comma after the values
If the argument a is negative return a String that says "NONE!
(Do not print the String)
Example evens(5) String returned by method. 0.2.4
Example evens(8) String returned by method. 0.2.4,6,8
Example evens (9) String returned by method 0.246,8
Example evens(-5), String returned by method: NONE
Example evens(O) String retumed by method 0
Example evens(1) String returned by method 0

Answers

public class JavaApplication48 {

   public static String evens(int a){

       String txt = "";

       if (a < 0){

           return "NONE!";

       }

       else if(a%2 == 1){

           a -= 1;

       }

       for (int i = 0; i <= a; i+=2){

           if (i < a){

               txt += i+",";

                       }

           else{

               txt += i;

           }

       }

       return txt;

   }

   public static void main(String[] args) {

       System.out.println(evens(1));

   }

   

}

I hope this helps!

The public static method named evens that takes in 1 argument int a, and returns a String containing all positive even numbers with each separated by a comma is in explanation part.

What is programming?

The process of creating a set of instructions that tells a computer how to perform a task is known as programming.

Here's a possible implementation in Java:

public static String evens(int a) {

   if (a < 0) {

       return "NONE!";

   }

   StringBuilder result = new StringBuilder();

   for (int i = 0; i <= a; i += 2) {

       if (i > 0) {

           result.append(",");

       }

       result.append(i);

   }

   return result.toString();

}

Thus, this method first checks if the argument is negative, and if so, returns the String "NONE!".

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

descriptive paragraph about a forest beside a lake

Answers

Luscious green leaves of the forest blew in the lukewarm winds of the day. The crystal waters of the lake just beside me reflected the forest in all its glory. The lake feel frigid, but the forest made me feel warm again. A sight to see, and a wonderful place to be was that gorgeous forest by the lake.

Select all of the tips you should follow when creating a newsletter.

1. Make key text stand out with underlining or bolding.
2. Leave some white space or open space. Don't overcrowd the page.
3. Use one column for text.
4. Choose fancy fonts.
5. Select good quality graphics.
6. Know your audience.
7. Get to the point quickly. Be clear and concise.

Answers

Answer:

1. Make key text stand out with underlining or bolding.

2. Leave some white space or open space. Don't overcrowd the page.

5. Select good quality graphics.

6. Know your audience.

7. Get to the point quickly. Be clear and concise.

Answer:

1. Make key text stand out with underlining or bolding.

2. Leave some white space or open space. Don't overcrowd the page.

5. Select good quality graphics.

6. Know your audience.

7. Get to the point quickly. Be clear and concise.

what is the meaning of wonderful with affixes?​

Answers

An affix is a set of letters generally added to the beginning or end of a root word to modify its meaning.

what social media application that affect our day to day activities, and how did it improve our skill

Answers

Answer:

Instagram

it improved persons photoshop skills to put out better quality photos and videos and it can be an outlet for creative persons    

Select the statement which most accurately describes the benefits and drawbacks of working from home and telecommuting.

A) Workers can become more effective office managers but may make communication difficult.
B) Workers can work longer days than office workers but may set their own hours.
C) Workers can develop serious health issues but may eliminate their commutes.
D) Workers can collaborate over long distances but may become isolated.

Answers

Answer:

A one

Explanation:

A because workers may get hesitated in front of everyone but at home they will feel free

Answer:

Its probably D

Explanation:

It ask for a benefit and a drawback and the first one just does not make since but tell me if I'm wrong

If you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a/an -- application.

Answers

Answer:

Software as a Service (SaaS)

Explanation:

Cloud computing can be defined as a type of computing that requires shared computing resources such as cloud storage (data storage), servers, computer power, and software over the internet rather than local servers and hard drives.

Generally, cloud computing offers individuals and businesses a fast, effective and efficient way of providing services.

Cloud computing comprises of three (3) service models and these are;

1. Platform as a Service (PaaS).

2. Infrastructure as a Service (IaaS).

3. Software as a Service (SaaS).

Software as a Service (SaaS) can be defined as a cloud computing delivery model which involves the process of making licensed softwares available over the internet for end users on a subscription basis through a third-party or by centrally hosting it.

Hence, Software as a Service (SaaS) is an example of a cloud computing environment that provides users with a web based email service. Therefore, if you pay a subscription fee to use an application via the internet rather than purchasing the software outright, the app is called a Software as a Service (SaaS) application.

Some examples of SaaS applications are Salesforce, Google apps, Bigcommerce, Dropbox, Slack etc.

Write a function named cube that accepts a number as an argument and returns the cube of that number. Write Python statement(s) that passes 3 to this function and prints returned value.​

Answers

def cube(num):

   return num*num*num

for the number 3:

def cube():

    return 3*3*3

Suppose that you have been asked to create an information system for a manufacturing plant that produces nuts and bolts of many shapes, sizes, and functions. What questions would you ask, and how would the answers affect the database design

Answers

Answer:

Following are the solution to this question:

Explanation:

In essence, both issues (relevant) were addressed, that form the design of the system, and all of the information collected and during initial analysis along with all subsequent stages will, in turn, affect the design of the system. Being aware, that perhaps the data is obtained to establish the entities, attributes, or relations. In particular, partnerships, clearly outline, or cardinal-ties are shaped by company policies derived from the creator's information. Example problems and the probable effects on the layout may be:

It will create the file concurrently for all depts, or would like to build and execute the database simultaneously with one dept?  

How would the work be to design affect the development process? In other terms, determine the range of the system as well  

as its limits about the bottom-up, centralized, or decentralized.

Do you want, and would you like an integrated framework to develop a single module? (Inventory, production, shipping, billing, etc.)  

Would you like a product code, output change, and form of controlling the bolts and bolts and dept? Impact: design of the logical and physical server.  

Perhaps you'd like to monitor the sources of every lot a raw resources for the nuts and bolts manufacturing? Impact: design of the logical and physical server. Model E-R.  

Perhaps you'd like to monitor consumers receiving shipments of bolts and nuts? Impact: design of the logical and physical database. ER model.  

Its documents will you demand, or to whom can these documents be transmitted? What specific reporting requirements?  

Reactions to such concerns relate to the design, execution, testing, or subsequent functioning of the logical and physical system.

In programming languages, ____ is used as a mnemonic representation for the program instruction’s memory address.

Answers

Answer:

Assembly language

Explanation:

Assembly language writes instructions in human letters. Every machine language instruction has a corresponding assembly language instruction that means exactly the same thing. Assembly language uses a symbolic form of a program which are capable of:

- readable by human beings (+/-)

- constants, addresses, and names of symbolic instructions

- arithmetic during assembly - calculations of addresses, constants

- synthetic instructions (not supported by our assembler)

- expansion of macroinstructions (not supported by our

assembler)

- assembly instructions (pseudo-instructions)

• memory allocation

• memory initialization

• conditional assembly (not supported by our assembler)

The sensitivity range for an objective function coefficient is the range of values over which the current __________________ remains the same.

Answers

Answer:

Optimal solution point

Explanation:

The sensitivity range for an objective function coefficient is the range of values over which the current optimal solution point remains the same.

Additionally, the range of optimality can be defined as the optimality range with respect to an objective coefficient that comprises of the range of values over which a current optimal solution point will always remain optimal.

Hence, the managers supervising various production lines are saddled with the responsibility of focusing on the objective function coefficient for optimal level of output or productivity.

examples of operating system from different families​

Answers

Answer:

windows from Microsoft Mac OS from Apple Ubuntu from chronicle

Hello.

So I have been using this online therapist bot named Dr. Sbaitso, but recently his program has been very slow. Are there any alternatives for online therapists? I don't feel comfortable with video calling therapists or having a meeting with them, so that's why I am looking for a bot therapist thats free.

Answers

Answer:

:P

Explanation:

❤*: .。. o(≧▽≦)o .。.:*❤

Suppose that the host with IP address 10.0.1.19 sends an IP datagram destined to host 128.119.160.183. The source port is 3324, and the destination port is 80. I. Consider the datagram at step 1, after it has been sent by the host but before it has reached the NATted router. What are the source and destination IP addresses for this datagram

Answers

Answer:

The source and destination IP addresses are 10.0.1.19 and 10.0.1.25

Explanation:

NAT or network address translation is a network protocol is used by private networks to access the internet by assigning or mapping a public IP address to the private addresses.

The host with IP address 10.0.1.19 searches for the actual destination IP address 128.119.160.183 in its private network and when it does not find it, it sends the packet to the default gateway IP address 10.0.1.25, which is where the private IP address is NATted and sent to the destination.

Write a for loop to print the numbers 88, 84, 80, ...44 on one line. Expected Output 88 84 80 76 72 68 64 60 56 52 48 44

Answers

The solution in python is:

for x in range(88, 43, -4):

   print(x, end=" ")

I hope this helps!

What is a contact position ?

Answers

Answer:

the poses that connect the extremes in motion

Explanation:

plsss help me

1)give 2 examples of systems that you use or see in your day-to-day life​

Answers

Answer:

The modern world has numerous kinds of systems that influence daily life. Some examples include transport systems; solar systems; telephone systems; the Dewey Decimal System; weapons systems; ecological systems; space systems; etc.

Write a program that asks the user to input their first and last names. The first prompt should state:

Please input your first name:
The second prompt should state:

Please input your last name:
After accepting the inputs, your program should output the input in the form last name, first name.

Hint: Remember that you can concatenate (add) two phrases by using the + symbol. Don't forget that you'll need to add a comma as well and that the comma must be followed by a space.

Answers

first = input("Please input your first name: ")

last = input("Please input your last name: ")

print(last+", "+first)

I hope this helps!

Write a Python program string_functions.py that defines several functions. Each function re-implements Python's built-in string methods.1. my_compare(str1, str2): Takes two strings as parameters (str1, str2) and 
returns a -1 if str1 is alphabetically less than str2, returns a 0 if str1 is alphabetically equal to str2, and returns a 1 if str1 is alphabetically greater than str2. 
2. is_char_in(string, char): Takes a string and a character as parameters and returns True if the character is in the string or False if it is not.3. is_char_not_in(string, char): Takes a string and a character as parameters and returns True if the character is NOT in the string or False if it is.4. my_count(string, char): Takes a string and a character as parameters and returns an integer count for each occurrence of the character. For example, if the function takes in 'abracadabra' and 'a', the function should return 5.5. my_endswith(string, char): Takes a string and a character as parameters and returns True if the character is the last character in the string or False if it is not. For example, if the function takes in 'quartz' and 'z', the function should return True. If the function takes in 'quartz' and 'q', the function should return False.6. my_find(string, char): Takes a string and a character as parameters and returns the first index from the left where the character is found. If it does not find the character, return -1. For example, if the function takes in ‘programming’ and ‘g’, it should return 3. Do not use str.find() for this.7. my_replace(string, char1, char2): Takes a string and two characters (char1 and char2) as parameters and returns a string with all occurrences of char1 replaced by char2. 
For example, if the string is ‘bamboozle’ and char1 is ‘b’ and char2 is ‘t’ then your function should return ‘tamtoozle’.8. my_upper(string): Takes a string as a parameter and returns it as a string in all uppercase. For example, 'victory' would be 'VICTORY'. Hint: Use the ord(c) function to get the ASCII / Unicode code-point. For example, ord('a') returns the integer 97. Use chr(i) function to convert an integer back to a character. For example, chr(97) returns the string 'a'. You cannot use the built-in string function str.upper() for this.9. my_lower(string): Takes a string as a parameter and returns it as a string in all lowercase. Hint: Similar to the previous item, use ord() and chr(). Do not use str.lower() for this. 
Extra Credit (10 points): my_title(string): Takes a string and returns a string with the first character capitalized for every word. For example, if the input to the function is "I like Python a lot", the function should return the string "I Like Python A Lot".Note- You may not use Python's built-in string methods - e.g., str.find(), str.replace(), str.lower(), lstrip(), startswith(), endswith(), join() … - to implement yours. However, you *should* use them to test your functions to see if they produce the same results. You can do this in the main or in another defined function which is called by the main. You can use all other Python functions.

Answers

Answer:

def my_compare(str1, str2):

   mylist = sorted([str1, str2])

   if str1 == str2:

       return 0

   elif str1 == mylist[0]:

       return -1

   elif str1 == mylist[1]:

       return 1

def is_char_in(string, char):

   if char in string:

       return True

   return False

def is_char_not_in(string, char):

   if char not in string:

       return True

   return False

def my_count(string, char):

   return string.count(char)

def my_endswith(string, char):

   return string.endswith(char)

def my_find(string, char):

   if char in string:

       return string.index(char)

   else:

       return -1

def my_replace(string, char1, char2):

   lst = [i for i in string]

   print(lst)

   for i, v in enumerate(lst):

       if v==char1:

           lst[i] = char2

   return "".join(lst)

Explanation:

Above are defined functions similar to the string built-in functions in python. To use them, type in the function name and pass in the required arguments. Save the file name as "string_functions" with a ".py" file extension and use the functions in other files by importing all the function as "import string_functions" or import individual functions with "from string_function import 'function_name' ".

hey yall wanna send me some just ask for my phone #

Answers

Answer:

Send you some what?

Explanation:

the answer is 12

Write a loop that fills an array int values[10] with ten random numbers between 1 and 100. Write code for two nested loops that fill values with ten different random numbers between 1 and 100.

Answers

Answer:

#include <iostream>

#include <cstdlib>

using namespace std;

int main() {

   int[] array = new int[10];

   int index = 0;

   while(index < array.size()){

           int number = (rand() % 100) + 1;

           for (int i = 0; i < 1; i++) {

               array[index] = number;

               cout<< "Position "<< index << "of the array = "<< number << endl;

               ++index;

           }

     }

}

Explanation:

The while loop in the source code loops over a set of code ten times, The for loop only loops once to add the generated random number between 1 and 100 to the array of size 10. At the end of the for loop, the index location and the item of the array is printed out on the screen. The random number is generated from the 'rand()' function of the C++ standard library.

Hellpppp please I need it!

Answers

Answer:

1 you can transfer photos or files from one device to another

2 you can store photos or files so you save space on a device

3 not sure lol

Explanation:

Other Questions
how to write an appeal letter for construction of community center? If a man with a mass of 75 kg, standing still, throws an object with a mass of 5 kg at 30 m/s, what will be the recoil velocity of the man, assuming he is standing on a frictionless surface? Help MeemEMeeee i have 4 BraiIncecellss 1/8 divided by ? = 1/40fill in the question mark Why were newspapers started in the colonies the distributive property of 27+60 ?? Was the Sherman Antitrust Act successful? Why or why not? Meteorites are of three kinds: stones, irons, and stony irons. Eachcorresponds to a different part of planet formation. The stones resemblepieces of planetary crust and mantle, the irons the planet cores, and thestony irons the transitional area between core and mantle. In some stonyirons, translucent crystalline structures interpenetrate with opaque mantlerock Collectors sometimes cut stony irons into thin slices and illuminatethem from one side for a gorgeous stained glass effect. Only one per centof all meteorites are stony irons. Five per cent are irons, and the remainingninety-four per cent are stones. The main function of the paragraph is to:identify the three kinds of meteorites and provide information about each kind,describe the chemical structure of the different types of rock found within themeteorites classified as stonesexplain why some meteorites contain both crystalline structures and opaque mantlerocklist common ways collectors display pieces of meteorites. A single die is rolled twice. Find the probability of rolling an odd number the first time and a number greater than 4 the second time. Which of the following is a way that anorexia nervosa is different from bulimia nervosa? Anorexia is associated with binge eating, and bulimia is associated with starvation. Anorexia is associated with starvation, and bulimia is associated with binge eating. More men than women suffer from anorexia. More men than women suffer from bulimia. Algebra 1 TestNav answers What is the central idea in the article "Joy Harjo is the first Native American Poet Laureate?" What is the value of x2 + (2y) (2w) + 3z for w = 2, x = 5, y = 8, and z = 3? 3 kg of carrots cost 1.35 5kg of carrots and 2kg of potatoes cost a total of 4.15 find the cost of 1 kg of potatoes which region adapted paternalism A platinan bar measure 5.0cm long, 40cmwide and 1.5 cm thick. if has a mass of 700.0grams.Calculate the volume of platinum bar.I need help :( Plz help me Help Plzzz!Convert 122lbs to Kilograms and plz show how you got the answer!!!!!! If Haiti had more political stability, it is most likely that it would also havemore effective US intervention.a constitutional government.a stronger economy.more independent territories.ANSWER RIGHT AND I WILL GIVE BRAINLEST!!!!!!!!!!!!!! A common misconception people have is that sugar is energy and energy is sugar but you know better. Give me ideas of a clear explanation that could be used to clear up this misconception, please?????!!!!!! Give me a 2-3 sentence summary of ernstine catastrophe queen?