Using the Multiple-Alternative IFTHENELSE Control structure write the pseudocode to solve the following problem to prepare a contract labor report for heavy equipment operators: The input will contain the employee name, job performed, hours worked per day, and a code. Journeyman employees have a code of J, apprentices a code of A, and casual labor a code of C. The output consists of the employee name, job performed, hours worked, and calculated pay. Journeyman employees receive $20.00 per hour. Apprentices receive $15.00 per hour. Casual Labor receives $10.00 per hour.

Answers

Answer 1

Answer:

The pseudo-code to this question can be defined as follows:

Explanation:

START //start process

//set all the given value  

SET Pay to 0 //use pay variable that sets a value 0

SET Journeyman_Pay_Rate  to 20//use Journeyman_Pay_Rate variable to sets the value 20

SET Apprentices_Pay_Rate to 15//use Apprentices_Pay_Rate variable to sets the value 15  

SET Casual_Pay_Rate to 10//use Casual_Pay_Rate variable to set the value 10

READ name//input value

READ job//input value

READ hours//input value

READ code//input value

IF code is 'J' THEN//use if to check code is 'j'  

  COMPUTE pay AS hours * JOURNEYMAN_PAY_RATE//calculate the value

IF code is 'A' THEN//use if to check code is 'A'

  COMPUTE pay AS hours * APPRENTICES_PAY_RATE//calculate the value

IF code is 'C' THEN//use if to check code is 'C'

  COMPUTE pay AS hours * CASUAL_PAY_RATE//calculate the value

END//end conditions

PRINT name//print value

PRINT job//print value

PRINT code//print value

PRINT Pay//print value

END//end process


Related Questions

James uses a database to track his school's football team. Which feature in a database allows James to find a specific player by name?

Grid
Filter
Search
Sort

Answers

Search if he knows the players name

Answer:

search

Explanation:

IT professionals have a responsibility to find and use wireless devices that have which of the following features? Check all of the boxes that apply.

compatibility

ability to work well with other wireless devices

ability to communicate wirelessly with other devices, such as a printer and laptop

preloaded with the latest apps

Answers

Answer:

a b c

Explanation:

Answer:

compatibility

ability to work well with other wireless devices

ability to communicate wirelessly with other devices, such as a printer and laptop

Explain why you have to import JOptionPane but not the Math class​

Answers

Answer:

To provide standard dialog boxes such as message dialog box, confirm dialog box and input dialog box.

In Java, the import statement is used to include classes or packages from outside sources in your code. This lets you access and use the features of those classes or packages.

What is the JOptionPane

To do the above, You need to import JOptionPane in Java because it belongs to a different package from the Math class.

The Math class is a part of the java. lang package, which is automatically included in Java. This package has important classes and interfaces that are used in Java programs. Because the Math class is already included in this package, you don't have to import it separately.

Read more about  JOptionPane here:

https://brainly.com/question/13101293

#SPJ2

describe how to get started on a formal business document by using word processing software

Answers

Answer:Click the Microsoft Office button.

Select New. The New Document dialog box appears.

Select Blank document under the Blank and recent section. It will be highlighted by default.

Click Create. A new blank document appears in the Word window.

Explanation:

How many components does a network have ?

Answers

Answer:

There are three primary components to understanding networks: 1. Physical Connections; 2. Network Operating System; and 3. Application Component. Hope this helps!

Explanation:

what is Service Operations in ITIL​

Answers

Explanation:

the objective of ITIL service operations is to make sure that IT services are delivered effectively and efficiently. the service operation life cycle stage includes the fulfilling of user requests, resolving service failure fixing problems and also carrying out routine operational tasks

For this assignment, you will create flowchart usingFlowgorithm and Pseudocode for the following program example:You are to design a program for Alexander’s Coffee Shopproviding customer research data. When a customer places an order,the clerk asks the customer for their zip code and age. The clerkenters this data as well as the number of items purchased. Theprogram should operate continuously until the clerk enters a 0 forthe zip code at the end of the day. If the clerk enters an invalidage (defined as less than 10 or more than 100), an error message isdisplayed and the program re-prompts the clerk continuously toenter a valid age. At the end of the program, display the averagecustomer age as well as counts of the number of items ordered bycustomers under the age of 25 and customers 25 and older.

Answers

Answer:

The flowchart is attached

Oredered accordinly with the flowcahrt number

Write a C program to prform simple C aritlimetic calculations. The user is to enter a simple expression(integer operaior integer) such as 15+30=45. The program is to exlract the 2 operands and the operator, perform the indicated calculation and display the result. For examole15 + 30 = 45. Operators should includc t, -, * , l, and %'.Operands are prcsitive integers, no sign. Use getchar to input the cxpression. Allow for variable spacing before the first operand and between operators and operands.

Answers

Answer:

Here is the C program:

#include <stdio.h>  //to use input output functions

//functions prototype

unsigned int mod(unsigned int a, unsigned int b);  

unsigned int mul(unsigned int a, unsigned int b);  

unsigned int sub( unsigned int a,unsigned int b);

float divide(unsigned int a,unsigned int b);  

unsigned int add( unsigned int a,unsigned int b);  

int main()  {  //start of main method

unsigned int a, b;   //declare variables to store the operands

char d;  //declare variable to store the operator

printf("Enter an operator:  ");   //prompts user to enter an operator

scanf("%c",&d);  //reads the operator from use

getchar();  //gets a character

while (d!='q')   { //keeps iterating until user enters q to quit

printf("Enter 1st operand: ");   //prompts user to enter first operand

scanf("%d",&a);   //reads first operand from user

getchar();  //reads character

printf("Enter 2nd operand: ");   //prompts user to enter second operand

scanf("%d",&b);   //reads second operand from user

getchar();  

if (d=='%')  {   //if the character of operator is a mod

printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = ");  //displays =

mod(a,b);  }  //displays computed modulo of two input operands

if (d=='*')   //if the input character is for multiplication operator

{printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = ");  //displays =

mul(a,b); }  //displays computed multiplication

if (d=='+')  {  //if the input character is for addition operator

printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = "); // displays =

add(a,b);  }   //displays computed addition

if (d=='/')  {  //if the input character is for division operator

printf("%d",a); // prints operand 1

putchar(d);  //displays operator

printf("%d",b);  //displays operand 2

printf(" = ");  //displays =

divide(a,b);  }   //displays computed division

if (d=='-')  {  //if the input character is for subtraction operator

printf("%d",a);  //prints operand 1

putchar(d);  //displays operator

printf("%d",b); // displays operand 2

printf(" = ");  //displays =

sub(a,b);  }  //displays computed subtraction

printf("Enter an operator: ");   //asks again to enter an operator

scanf("%c",&d);  //reads operator from user

getchar();  }  }   //gets character

unsigned int mod( unsigned int a, unsigned int b){  //function to compute modulo of two integers with no sign

     int c = a%b;  //computes mod

    printf("%d",c);  }  //displays mod result

unsigned int add(unsigned int a, unsigned int b){     // function to compute addition of two integers

    int c = a+b; //computes addition

    printf("%d\n",c);  } //displays result of addition

unsigned int mul(unsigned int a, unsigned int b){       //function to compute multiplication of two integers

    int c = a*b;  //multiplies two integers

   printf("%d\n",c); }  //displays result of multiplication

float divide(unsigned int a, unsigned int b){   //function to compute division of two integers

    float c = a/b;  //divides two integers and stores result in floating point variable c

    printf("%f\n",c);  } //displays result of division

unsigned int sub(unsigned int a, unsigned int b){       //function to compute subtraction of two integers

    int c = a-b;  //subtracts two integers

    printf("%d\n",c);  }  //displays result of subtraction

Explanation:

The program is well explained in the comments mentioned with each line of the program. The program uses while loop that keeps asking user to select an operator and two operands to perform arithmetic calculations. The if conditions are used to check what arithmetic calculation is to be performed based on user choice of operand and calls the relevant function to perform calculation. There are five functions that perform addition, modulo, subtraction, division and multiplication and display the result of computation. The screenshot of output is attached.

How does asymmetric encryption work?
A.
It uses only one key to encrypt and decrypt a message.
B.
A private key is used to encrypt the message and the public key is used to decrypt the message.
C.
Either the public key or the private key can be used to encrypt and decrypt a message.
D.
Public key is used to encrypt the message and private key is used to decrypt the message.

Answers

Answer:

i choose choice D

Explanation:

reason as to my answer public keys are simply input keys used to encrypt data into either a computer or any electrical device as private keys are out put used to either erase or edit

is the core of an operating system that controls its basic functions.
O Freeware
O Kernel
Tweaker
O Open source

Answers

Answer:

Explanation:

Tweaker

ANSWER

Its Kernel

Explanation:

i got a 100%

write a program that calculates the total grade for N classroom exerices as a perfentage. the user should input the value for N followed by each of the N scores and totals.

Answers

Answer:

earned = 0

total = 0

exercises = int(input("Enter the number of exercises: "))

for i in range(exercises):

   score = int(input("Enter score" + str(i+1) + ": "))

   total_score = int(input("Enter total score for exercise " + str(i+1) + ": "))

   

   earned += score

   total += total_score

print("The total is %" + str(earned/total * 100))

Explanation:

*The code is in Python.

Set the earned and total as 0

Ask the user to enter the number of exercises

Create a for loop that iterates number of exercises times. For each exercise;

Ask the user to enter the score earned and total score of that exercise

Add the score to the earned (cumulative sum)

Add the total_score to the total (cumulative sum)

When the loop is done, calculate the percentage, divide earned by the total and multiply the result by 100, and print it

what are the example of malware spreads

a. social network
b. pirated software
c.removable media
d. all of the above​

Answers

The answer has to be
D. All of the above

Examples of malware spreads include all of the options mentioned: social networks, pirated software, and removable media.

The correct option is d.

a. Social networks: Malware can spread through social networks via malicious links or infected attachments shared within messages, posts, or comments. Users may unknowingly click on these links or download infected files, which can then propagate the malware to their devices or their contacts.

b. Pirated software: Malicious actors often distribute malware-infected versions of popular software through illegitimate channels. Users who download and install pirated software are at risk of unknowingly introducing malware onto their systems, as these versions may be modified to include malicious code.

c. Removable media: Malware can also spread through removable media such as USB drives, external hard drives, or even CDs/DVDs. If an infected device or media is connected to a computer, the malware can transfer onto the system, potentially infecting files and spreading further.

Therefore, all of the options (a, b, and c) are examples of how malware can spread, highlighting the importance of practicing safe online habits, avoiding pirated software, being cautious with links and attachments, and regularly scanning removable media to mitigate the risk of malware infections.

To learn more about malware spreads;

https://brainly.com/question/31115061

#SPJ2

Which part of the formula is the argument?

=COUNTIF(A1:E59, "Greene City")

=

()

COUNTIF

A1:E59

Answers

Answer:

e on edege

Explanation:

just took the question on edge

Answer:

Guy above is right!

Explanation:

Main topics: Basic Java program
Programmatic output
Arithmetic Expressions
User input
Program Specification:
Write a Java program that calculates and outputs a baseball pitcher’s ERA in a reasonable report format. "ERA" is an acronym for "earned run average" and is computed using the following equation: number of earned runs multiplied by 9 and divided by number of innings pitched Your program must do the following: • Prompt the user for the first and last name of the pitcher and store them in two variables of type String • Prompt the user for the pitcher’s number of earned runs and store it in a variable of type int • Prompt the user for the pitcher’s number of innings pitched and store it in a variable of type int • Compute and output the pitcher’s ERA, which should be a (double) floating point number Sample run(s): Pitcher’s first name: Josh Pitcher’s last name: Hader Number of earned runs: 22 Number of innings pitched: 81 Josh Hader has an ERA of 2.4444444444444446

Answers

Answer:

Explanation:

import java.util.Scanner;

public class pitcherValues {

   public static void main(String[] args) {

       String firstName, lastName;

       int earnedRuns, inningsPitched;

       double ERA;

      Scanner in = new Scanner(System.in);

     System.out.println("Pitchers First Name is?");

     firstName = in.nextLine();

     System.out.println("Pitchers Last Name is?");

     lastName = in.nextLine();

     System.out.println("How many runs did the Pitcher earn?");

     earnedRuns = in.nextInt();

     System.out.println("How many innings did the Pitcher Pitch?");

     inningsPitched = in.nextInt();

     ERA = (earnedRuns * 9) / inningsPitched;

     System.out.println(firstName + " " + lastName + " has an ERA of " + ERA);

   }

}

Wrire a code that display elements at indices 1 and 4 in the follwoing array.

var userArray = [1, 6, 41, 8, 24, 4];

Answers

Answer:

Console.log(userArray[1]);

Console.log(userArray[4]);

Explanation:

The programming language was not stated; however, the variable declaration implies JavaScript.

JavaScript prints using the following syntax:

Console.log(print-name);

Since, the code is to print some elements of array userArray.

First, we need to determine the index of the elements.

The indices are given as 1 and 4.

So, the code to print these elements is as follows:

Console.log(userArray[1]);

Console.log(userArray[4]);

(1) Prompt the user to enter a string of their choosing. Output the string.
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself.
(2) Complete the GetNumOfCharacters() function, which returns the number of characters in the user's string. Use a for loop in this function for practice. (2 pts)
(3) In main(), call the GetNumOfCharacters() function and then output the returned result. (1 pt) (4) Implement the OutputWithoutWhitespace() function. OutputWithoutWhitespace() outputs the string's characters except for whitespace (spaces, tabs). Note: A tab is '\t'. Call the OutputWithoutWhitespace() function in main(). (2 pts)
Ex: Enter a sentence or phrase: The only thing we have to fear is fear itself. You entered: The only thing we have to fear is fear itself. Number of characters: 46 String with no whitespace: The only thing we have to fear is fear itself.

Answers

Answer:

The solution is given in the explanation section

See comments for detailed explanation of each step

Explanation:

import java.util.Scanner;

class Main {

 public static void main(String[] args) {

   //Prompting the User to enter a String

   System.out.println("Enter a sentence or phrase: ");

   //Receiving the string entered with the Scanner Object

   Scanner in = new Scanner (System.in);

   String user_word = in.nextLine();

   //OutPuting User entered string

   System.out.println("You entered: "+user_word);

   //Calling the GetNumOfCharacters Method

   System.out.println("Number of characters: "+ GetNumOfCharacters(user_word));

   //Calling the OutputWithoutWhitespace Mehtod

   System.out.println("String with no whitespace: "+OutputWithoutWhitespace(user_word));

   }

   //Creating the function GetNumOfCharacters()

   //This function will return the number of characters

 // in the string entered by the user_word

 public static int GetNumOfCharacters (String word) {

   int noOfCharacters = 0;

   for(int i = 0; i< word.length(); i++){

     noOfCharacters++;

   }

   return noOfCharacters;

 }

 //Creating the OutputWithoutWhitespace() method

 //This method will remove all tabs and spaces from the original string

 public static String OutputWithoutWhitespace(String word){

   //Use the replaceAll all method of strings to replace all whitespaces with no space.

   String new_string = word.replaceAll(" ","");

   return new_string;

 }

}

The government of a country wants to know how much inbound tourism (number of tourists visiting from other countries) is contributing to the country’s economic prosperity. The research firm hired to conduct this study surveys 10,000 residents on their favorite spots to visit in the country and how much money they spend on leisurely activities

a. How could the use of a sample like this threaten the value of the study’s outcomes?

b. How might the flawed sample affect the usefulness of the results?

Answers

Answer and Explanation:

A. The study by the research team may not reflect the purpose of the research which is to know how much inbound tourism is contributing to the economy. They are sampling the population on their favorite spots to visit( which may be too narrow here) and what their leisure activities are (which are not the only things tourists spend on). Also 10000 residents may be too small as a sample to reflect more accurate study outcome representative of the population.

2. A flawed sample which is a sampling error would not represent the population as the results from sample would contradict population results

help me plzz thank you if your right I will mark brainiest

Answers

Answer:

the 1,2, and 3 are the second circle thingy and the fourth question is the first circle thing and dont know the last one hope this helps

Explanation:

Answer in this order.
B, B, B, B, A. I’m 80% sure these are the right answers.

CPU BENCHMARKS are measurements used to compare performance between processors

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

CPU benchmarks are used to picking the best CPU. If you want to pick the best CPU for the kind of work you do is easier if you research some performance benchmarks.

As you know, CPU benchmarks are measurements used to compare performance between processors. These benchmarks are the measure to know the performance of CPU.

These CPU Benchmarks are generated by running software programs specifically designed to push the limits of CPU performance.

In __________ write, the data are stored in the cache, and control returns to the caller. Select one: a. a synchronous b. a buffered c. an asynchronous d. a non-buffered

Answers

Answer:

The correct answer to the question is option C (an asynchronous)

Explanation:

Computer store files in its temporary data storage space so as to facilitate easy retrievals when needed. Cache memory is in the temporary data storage space of the computer, faster than any other system memory so that when the processor requests information from the computer memory after a user place a command, the cache memory makes the information available in a short time when the data are required eliminating delay when ram will have to take time to fetch the data to provide to the processor.

In an asynchronous write, the data are stored in the cache to enable easy retrieval by the computer processor just as the cache is explained above, it allows writing data to the cluster. Asynchronous write also allows control returns to the caller.

Create an interface called Runner. The interface has an abstract method called run() that displays a message describing the meaning of run to the class. Create classes called Machine, Athlete, and PoliticalCandidate that all implement Runner.
The run() should print the following in each class:
Machine - When a machine is running, it is operating.
Athlete - An athlete might run in a race, or in a game like soccer.
PoliticalCandidate - A political candidate runs for office.
----------------------------------------------------------------------------------------------------
public class Athlete implements Runner
{
public void run()
{
// write your code here
}
}
--------------------------------------------------------------------------------------
public class DemoRunners
{
public static void main(String[] args)
{
Machine runner1 = new Machine();
Athlete runner2 = new Athlete();
PoliticalCandidate runner3 = new PoliticalCandidate();
runner1.run();
runner2.run();
runner3.run();
}
}
------------------------------------------------------------------------------------------
public class Machine implements Runner
{
public void run()
{
// write your code here
}
}
----------------------------------------------------------------------------------------------------
public class PoliticalCandidate implements Runner
{
public void run()
{
// write your code here
}
}
----------------------------------------------------------------------------------------------------
public interface Runner
{
// write your code here
}
----------------------------------------------------------------------------------------------------

Answers

Answer:

Here is the interface Runner:

public interface Runner  {  //interface Runner

public abstract void run();  } //abstract method run that displays a message describing the meaning of run to the class

/*Here Runner is the interface which is an abstract class. It is used to group related methods such as here is run method with empty body. An abstract method run() does not have a body. The body is provided by the sub classes Machine, Athlete, and PoliticalCandidate that all implement Runner.  */

Explanation:

Here is the Athlete class:

public class Athlete implements Runner  {  //class that implements Runner interface

public void run()  {  //interface method accessed by Athlete to provide its body according to describe the meaning of run to the class

    System.out.println("An athlete might run in a race, or in a game like soccer.");  } }    //prints this message

Here is the Machine class:

public class Machine implements Runner  {

public void run()  {

System.out.println("When a machine is running, it is operating.");  }}

Here is the PoliticalCandidate class:

public class PoliticalCandidate implements Runner  {

public void run()  {

System.out.println("A political candidate runs for office.");  } }

/*To access the interface Runner method run(), the Runner must be "implemented" by Machine, Athlete, and PoliticalCandidate classes with the implements keyword. The body of the interface method run() is provided by the "implement" class */      

Here is the DemoRunners class:

public class DemoRunners {  //class name

public static void main(String[] args)  {  //start of main method

Machine runner1 = new Machine();  //creates object of Machine class

Athlete runner2 = new Athlete();  //creates object of Athlete class

PoliticalCandidate runner3 = new PoliticalCandidate();  //creates object of PoliticalCandidate class

runner1.run();  //uses object of Machine class to call run method

runner2.run();  //uses object of Athlete class to call run method

runner3.run();  } } //uses object of PoliticalCandidate class to call run method

When runner1.run() is called it invokes the run() method of class Machine which displays the message:

When a machine is running, it is operating.

When runner2.run() is called it invokes the run() method of class Athlete which displays the message:

An athlete might run in a race, or in a game like soccer.  

When runner3.run() is called it invokes the run() method of class PoliticalCandidate which displays the message:

A political candidate runs for office.

The screenshot of the program is attached.

we cannot create a blank table true or false​

Answers

I believe that that statement is true

in your own experience,imagine if someone gained access to any of your social media accounts they could changed your account name,password and recovery data in order to lock you out and take total control. they could even go as far as pretending to be you and send out compromised messages to your contacts and this list is endless really. To help you stay safe from hackers and protect your social media accounts​

Answers

Answer: yes

Explanation: because they now have your info

Complete the sentence.
You can buy new applications at a retail store on DVD for ____.

O laptops
O smartphones
O tablets

Answers

Answer:

laptops

Explanation:

B

You can buy new applications at a retail store on DVD for laptops. Thus, option A (laptops) is correct.

What is a DVD?

A website is an accumulation of internet pages and related items that is posted on at least one server and given an unique domain name. Most blogs focus on a single subject or objective, such as reporting, education, industry, entertaining, or photo sharing.

A raster-based photograph designed for the web and publishing is stored as a JPG file. The JPG format is the default file format for image sensors and is the most widely used picture format on the web because of its universal compatibility and decompression. Portraits in both colour and black and white work brilliantly with them.

Therefore, option A (laptops) is the correct option.

Learn more about DVD, here:

https://brainly.com/question/13664390

#SPJ6

The two statements belowchar dance1[ ] = {'F','o','x','t','r','o','t'};String dance2 = new String(dance1);will generate an error message:

a. because char variables and String variable do not mix.
b. will generate an error message because char variables and String variable do not mix.
c. show that a String variable, like dance2, is an array.
d. demonstrate that a character array can be used to construct a String object.
e. prove that character variables and String variables are identical.

Answers

Answer:

D. Demonstrate that a character array can be used to construct a String object.

Explanation:

Option D answers the question.

This is so because:

The first line of the code segment creates a char array element i.e. dance1

The second line of the code segment creates a String variable, dance2.

dance2 is then initialised by concatenating the elements in dance1.

i.e. The value of dance2 is

dance2 = "Foxtrot"

Hence, option D answers the question

Which categories format cells? Check all that apply. currency percentage data month date text

Answers

Answer:

currency

percentage

date

text

Explanation:

The category of format cells are currency, percentage, data, month, date, and text. The all options are correct.

What is Format Cells dialog box?

In the Format Cells dialog box, you can configure the formatting options for your report objects.

For a row or column header and the values, you can format the number, font, alignment, border, and pattern.

The format cells command in Excel is used to change the formatting of cell numbers without changing the actual number.

We can change the number, alignment, font style, border style, fill options, and protection using the format cells. We can get to this option by right-clicking the mouse.

Currency, percentage, data, month, date, and text are examples of format cells.

Thus, all options are correct.

For more details regarding format cell, visit:

https://brainly.com/question/24139670

#SPJ2

A have a string, called "joshs_diary", that is huge (there was a lot of drama in middle school). But I don't want every one to know that this string is my diary. However, I also don't want to make copies of it (because my computer doesn't have enough memory). Which of the following lines will let me access this string via a new name, but without making any copies?

a. std::string book = joshs_diary;
b. std::string & book = joshs_diary; const
c. std::string * book = &joshs_diary;
d. std::string book(joshs_diary);
e. const std::string & book = joshs_diary;
f. const std::string * const book = &joshs_diary;
g. std::string * book = &joshs_diary;

Answers

Answer:

C and G

Explanation:

In C language, the asterisks, ' * ', and the ampersand, ' & ', are used to create pointers and references to pointers respectively. The asterisks are used with unique identifiers to declare a pointer to a variable location in memory, while the ampersand is always placed before a variable name as an r_value to the pointer declared.

What is the critical path?


Calculate the minimum overall project completion time and identify which activities are critical by filling out the chart below-forward and backward pass.

What is the maximum time to complete the projects?


Early start Early Finish late start Late finish Slack Critical path?


A
B
C
D
E
F
G
H


Please answer and thank you

Answers

Answer:

yeeeee

Explanation:yeeees quen                   HI SISTERS HI SISTERS

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. For a word count vector with indices ordered as the words appear above, what is the word count vector for a document that simply says “the wheels on the bus go round and round.”

Please enter the vector of counts as follows: If the counts were ["the"=1, “on”=3, "and"=2, "go"=1, "round"=2, "bus"=1, "wheels"=1], enter 1321211.
1 point

Answers

Answer:

umm that is a todler song

Explanation:

umm that is a todler song that they sing to them when there crying

A country, called Simpleland, has a language with a small vocabulary of just “the”, “on”, “and”, “go”, “round”, “bus”, and “wheels”. As per the given scenario, the vector of counts will be 2111211. The correct option is C.

What are the ways to count items in a vector?

C++ has a built-in function that counts the length of the vector. Size is the function's name ().

It returns the size or total number of elements of the vector that was utilized to create it. There is no need for debate.

The number of observations (rows) includes deleted observations as well. In an SAS data collection, there can be a maximum of 2 63-1 observations, or roughly 9.2 quintillion observations. For the majority of users, going above that limit is quite rare.

The vector of counts in the above scenario will be 2111211.

Thus, the correct option is C.

For more details regarding programming, visit:

https://brainly.com/question/11023419

#SPJ2

Remove gray from RGB Summary: Given integer values for red, green, and blue, subtract the gray from each value. Computers represent color by combining the sub-colors red, green, and blue (rgb). Each sub-color's value can range from 0 to 255. Thus (255, 0, 0) is bright red, (130, 0, 130) is a medium purple, (0, 0, 0) is black, (255, 255, 255) is white, and (40, 40, 40) is a dark gray. (130, 50, 130) is a faded purple, due to the (50, 50, 50) gray part. (In other words, equal amounts of red, green, blue yield gray). Given values for red, green, and blue, remove the gray part.

Answers

Answer:  

Here is the C++ program:  

#include <iostream>   //to use input output functions    

using namespace std;   //to identify objects cin cout    

int main() {   //start of main method    

int red,green,blue,smallest;   //declare variables to store integer values of red,green, blue and to store the smallest value    

cout<<"Enter value for red: ";  //prompts user to enter value for red    

cin>>red;  //reads value for red from user    

cout<<"Enter value for green: ";  //prompts user to enter value for green  

cin>>green; //reads value for green from user    

cout<<"Enter value for blue: "; //prompts user to enter value for blue    

cin>>blue;   //reads value for blue from user    

//computes the smallest value  

if(red<green && red<blue) //if red value is less than green and blue values    

smallest=red;   //red is the smallest so assign value of red to smallest    

else if(green<blue)   //if green value is less than blue value    

smallest=green; //green is the smallest so assign value of green to smallest  

else //this means blue is the smallest    

smallest=blue;  //assign value of blue to smallest    

//removes gray part by subtracting smallest from rgb  

red=red-smallest; //subtract smallest from red    

green=green-smallest; //subtract smallest from green    

blue=blue-smallest; //subtract smallest from blue    

cout<<"red after removing gray part: "<<red<<endl;  //displays amount of red after removing gray    

cout<<"green after removing gray part: "<<green<<endl; //displays amount of green after removing gray  

cout<<"blue after removing gray part: "<<blue<<endl;  } //displays amount of blue after removing gray  

Explanation:  

I will explain the program using an example.    

Lets say user enter 130 as value for red, 50 for green and 130 for blue. So  

red = 130    

green = 50

blue = 130  

First if condition if(red<green && red<blue)   checks if value of red is less than green and blue. Since red=130 so this condition evaluate to false and the program moves to the else if part else if(green<blue) which checks if green is less than blue. This condition evaluates to true as green=50 and blue = 130 so green is less than blue. Hence the body of this else if executes which has the statement: smallest=green;  so the smallest it set to green value.    

smallest = 50    

Now the statement: red=red-smallest; becomes:    

red = 130 - 50    

red = 80    

the statement: green=green-smallest;  becomes:    

green = 50 - 50    

green = 0    

the statement: blue=blue-smallest; becomes:    

blue = 130 - 50    

blue = 80    

So the output of the entire program is:    

red after removing gray part: 80                                                                                                 green after removing gray part: 0                                                                                                blue after removing gray part: 80    

The screenshot of the program along with its output is attached.

Other Questions
what is (b-8)x4? math homework:) 1. What are the three different types of citizen? A local carpenter uses the function LaTeX: f\left(x\right)=180xf ( x ) = 180 x to determine the amount earned after selling LaTeX: xx number of book cases. He has to sell between 5 and 10 bookcases each month in order to meet his sales goal. Find the domain for this situation. Group of answer choices What is a good thesis statement for the topic of abortion on argumentive essays. How does the basketball game setting relate to the theme of the story?A by showing why the narrator supports her brotherB by showing how the narrator differs from other girlsC by showing how the narrator utilizes her knowledgeD by showing where the narrator feels the most aliveExcerpt from the Peerless four The following is a partial trial balance for General Lighting Corporation as of December 31, 2021: Account Title Debits Credits Sales revenue 3,100,000 Interest revenue 95,000 Loss on sale of investments 30,000 Cost of goods sold 1,340,000 Loss on inventory write-down (obsolescence) 350,000 Selling expense 450,000 General and administrative expense 225,000 Interest expense 94,000 There were 300,000 shares of common stock outstanding throughout 2021. Income tax expense has not yet been recorded. The income tax rate is 25%. Required: 1. Prepare a single-step income statement for 2021, including EPS disclosures. 2. Prepare a multiple-step income statement for 2021, including EPS disclosures. what's the answer?? Curbs on the power of the majority to make decisions that would benefit some at the expense of other are called? 12x+8y=240 How do I solve for y ? Use the drop-down menus to decide whether a compare-and-contrast text structure would be a good choice for each type of writing.An instruction manual showing how to put something together: A newspaper article that explains why local trees are dying and how to save them: A science website that explains why certain animals went extinct: A review that discusses the book and movie versions of a story: Jody and her friends are playing a game in which the person who scores closest to zero points after three rounds wins! Jody's friend Robyn scored 5 points in the first round, lost 8 points in the second round, and scored 4 points in the third round. Jody scored 10 points in the first round and lost 4 points in the second round. What will Jody need to score in the third round to win the game? (3 points) Why do you think cells of the epithelial tissue are close together? 1. What quantity of heat is required to raise?the temperature of 450 grams of waterfrom 35C to 85C?capacity of water is 4.18 J/g C. What fallacy is illustrated by the following statement? "I'm sick of working with the public. People are just obnoxious!" A retrofitted space-heating system is being considered for a small office building. The system can be purchased and installed for $125,000, and it will save an estimated 250,000 kilowatt-hours (kWh) of electric power each year over a five-year period. A kilowatt-hour of electricity costs $0.09, and the company uses a MARR of 15% per year in its economic evaluations of refurbished systems. The market value of the system will be $7,000 at the end of five years, and additional annual operating and maintenance expenses are negligible. Required:Use the benefit-cost method to make a recommendation. graph y= -x -6 please Coweta Nutrition sells shakes for $3.39 each. They also sell tea for $2.50. If Mrs.Morgan bought 1 tea and spent $19.45 this week, not including tax, how manyshakes did she buy?* The following information pertains to Windsor Solar Panels, Inc. July 1 Sold $128,000 of solar panels to Wildhorse Company with terms 3/15, n/30. Windsor uses the gross method to record cash discounts. Windsor estimates allowances of $1,500 will be honored on this sale. 12 Sold $82,000 of solar panels to Novak Corp. with terms of 4/10, n/60. Windsor expects no allowances related to this sale. 18 Novak Corp. paid Windsor for its July 12 purchase. 20 Wildhorse calls to indicate that the panels purchased on July 1 work well, but the color is not quite right. Windsor grants a credit of $2,100 as compensation. 29 Wildhorse Company paid Windsor for its July 1 purchase. 31 Windsor expects allowances of $5,340 to be grated in the future related to solar panel sales in July. Prepare the necessary journal entries for Larkspur. (Credit account titles are automatically indented when the amount is entered. Do not indent manually. Record journal entries in the order presented in the problem. If no entry is required, select "No Entry" for the account titles and enter o for the amounts.) Date Account Titles and Explanation Credit Debit July 18 what is 6 4/9 as a impropor fraction PLEASE ANSWERR I CANT GET IT RIGHT