In Scratch, when you want to add an if statement, you know that you must also add what type of block? A. if/then B. control C. loop D. forever

Answers

Answer 1

In Scratch, when you want to add an if statement, you know that you must also add what type of block is option B. control.

What does a Scratch if statement accomplish?

If the condition is satisfied, the blocks included therein will execute, and the script in question will then proceed. In contrast to the If () Then, Else block, if the condition is false, the block's code will be ignored and the script will continue.

Note that  One of Scratch's nine building blocks, control blocks' job is to restrict the movement of the sprite in particular circumstances. To do this, conditional statements, loops, repeats, and causes can be inserted.

Learn more about Scratch from

https://brainly.com/question/27820529
#SPJ1


Related Questions

Some automated troubleshooting programs identify certain keywords in the customer’s query to provide potential solutions to the query. For example, ‘There is no display on my mobile phone screen.’ The keywords ‘display’ and ‘phone’ would link to common problems with a phone display. Analyse the requirements for this system and design, develop, test and evaluate a program to identify keywords in a query typed in by the user and provide a linked solution to common problems related to a mobile device from a selection stored in a text file or database. You will need to identify appropriate keywords that can be linked to general advice related problems. You need to account for variations in the form of the user input e.g. one user may query ‘There is no display on my mobile phone’, another user may query ‘My phone screen is blank.’

Answers

We may group all terms into four basic types of intent when conducting research to determine a user's motivations for conducting a search: commercial, transactional, informational, and navigational.

What is navigate?

The term navigate is a field of study that concentrates on the process of observing and controlling the movement of a trades or vehicle from one place to another field of navigation includes four general collections: land navigation, marine navigation, aeronautic navigation, and space navigation

A database table's records are retrieved using a SQL SELECT statement in accordance with clauses (such as FROM and WHERE) that define criteria. As for the syntax: the following query: SELECT column1, column2 FROM table1, table2 WHERE column2='value';

Therefore, a user's motivations for conducting a search: commercial, transactional, informational, and navigational.

Learn more about navigating here:

https://brainly.com/question/8888625

#SPJ1

The great Debators movie

Answers

Answer:

Mr. Tolson was a teacher at Wiley College and the head debate coach. He was very passionate about his students and debate. In the movie, The Great Debaters, Mr. Tolson was portrayed as a tough but loving teacher. He pushed his students to be the best they could be and believed in them even when they didn't believe in themselves.

How do you use the fill handle to copy the formula in cell b11 to cells C11 and D11?

Answers

Cell C11 contains the formula you want to copy. Observe the fill handle located in the lower-right corner. Place your mouse over the fill handle, until the arrow becomes a black cross. Drag the fill handle across the cells D11 and E11 and then release the mouse button.

What is MS-Excel?

Microsoft's spreadsheet program Excel is a part of the Office family of products used for commercial applications. Users of Microsoft Excel can format, arrange, and calculate data in a spreadsheet.

What is spreadsheet?

A spreadsheet is a piece of software that can store, display, and edit data that has been organized into rows and columns. One of the most used tools for personal computers is the spreadsheet. In general, a spreadsheet is made to store numerical data and short text strings.

To fill handle to copy the formula in cell b11 to cell c11 and D11:

Select the range B8:E8.Choose Fill from the Edit menu, and from the Fill submenu choose Right.Select cell C11 and enter the formula =B11*1.02.Select the range C11:C13 and choose Fill from the Edit menu, and from the Fill submenu choose Down.

Learn more about MS Excel click on this:

https://brainly.com/question/24749457

#SPJ4

computers and robots can perform a wide range of routine physical work activities better, cheaper, faster, and more safely than humans. true false

Answers

It is true, robots and computers can not only perform a range of routine physical work activities better and more cheaply than humans.

What is the difference between robots and humans?

According to the neuroscientist, that's exactly what it is, the difference between the value and price of personal experiences – what differentiates us from robots. “Human experiences have another level of complexity and many of them cannot be replaced in depth by any machine”, he adds.

In addition to repetition, robots help humans with their precision, which is far superior in all aspects. If built correctly, it can perform millimeter movements without any deviation, something beyond most people's capabilities.

See more about robots at brainly.com/question/15561225

#SPJ1

what is the first priority while serving customers at pick-up

Answers

Answer:

Your priority at Pick-up is to acknowledge and serve all customers promptly. Remember, pickup is often our only chance to delight a customer. Equally important to promptly serving all customers is how we do them.

Explanation:

At Pick-up, promptly acknowledging and serving every customer is your first concern. Remember that Pick-up is frequently our only opportunity to please a customer. The way we serve our customers is just as important as doing so promptly.

How do you acknowledge the concern of a customer?

Managing a business involves responding to client complaints about subpar products, bad service, and other issues. Here's how your business may transform these complaints into chances to strengthen your brand and win over new clients.

Consumer Complaints:

Consumer complaints are grumblings from clients about anything involving your business, like a faulty product or poor client service. By paying attention to the customer's concerns, you can successfully address the issue and satisfy their complaint.

Your Brand and Customer Loyalty:

Your business's ability to respond professionally also has a big impact on whether you retain clients or lose them. Maintaining your company's reputation and brand health should be one of your primary business objectives.

By offering subpar customer service, it's simple to lose clients. Some customers won't bring their complaints to your customer service team, but others won't think twice about spreading negative feedback online or on social media. Customer loyalty is severely harmed when subpar products and poor customer service are combined.

Know more about acknowledgement of customer concern click here:

https://brainly.com/question/21042698

#SPJ4

When can fraction turned to decimal form and vise versa be useful in our daily activities?

Answers

Answer:

Explanation:

We use decimals all the time when dealing with money, weight, length, and so on. Decimal numbers are used when greater precision is required than whole numbers can provide. For example, when we weigh ourselves on the scale, we do not always find that the weight equals a whole number. To determine our exact weight, we must first comprehend what the decimal value on the scale means

In baking, fractions indicate how much of an ingredient to use. Time is told using fractions; each minute is a fraction of an hour. , when there is a sale, fractions are used to determine discounts. Me, as an electrician I use to use fractions when determining the length of a pipe for bending

What are uses of Spreadsheet

Answers

Answer: The three most common general uses for spreadsheet software are to create budgets, produce graphs and charts, and for storing and sorting data. Within business spreadsheet software is used to forecast future performance, calculate tax, completing basic payroll, producing charts and calculating revenues.

Explanation:

Answer: You can use it to storing and sorting data and to produce graphs  , it also has other uses.

when blogging for business, you can write without using proper grammatical conventions, as long as you write with an authentic voice. True or False

Answers

The given statement is false because, when you write blogs for business, you cannot write without using proper grammatical conventions, just only with an authentic voice.

A business blog is a regular feature representing part of an online publication that generally relates to a particular, service, product, or topic. A business blog consists of personal commentary and articles by one or multiple authors. The business blog is usually appearing on a company’s website; some business blogs may feature on an independent commentator’s site.

Whenever a business blog is written it is ensured that the author makes it error-free if there are any grammatical or spelling errors. For this purpose, the author requires to make use of proper grammatical conventions with an authentic voice.

You can leran more about blogging at

https://brainly.com/question/10893702

#SPJ4

Which excel feature allows you to select all cells in the column with inconsistent formulas.

Answers

CTRL + D is used to fill the formula column down

What is the feature?

Hold down the SHIFT key while pressing one of your arrow keys, selecting the cell containing the erroneous formula, and then releasing the SHIFT key. This will select all the cells, including the one that is inconsistent. then choose one of these: To fill the formula down, press CTRL+D while selecting the cells below.

Excel's Go To Special Function[1] enables you to quickly choose all cells that match a set of requirements, such as cells that contain: Formulas (numbers, text, locals, errors) (numbers, text, locals, errors) Constants (text, numbers, logic, and mistakes)

Hence to conclude that CTRL+D excel feature allows you to select all cells in the column with inconsistent formulas.

To know more about the ctrl+D option and excel features follow this link

https://brainly.com/question/24749457

#SPJ4

a netbios suffix may identify a computer or server being enumerated as a domain controller. why do hackers often exert more effort to attack computers identified as domain controllers?

Answers

Hackers frequently expend more effort attacking domain controllers because they provide more information, such as logon names for user accounts and network resources.

What is Domain controllers?

On computer networks, a domain controller is a server that responds to authentication requests and verifies users. Domains are a hierarchical method of organizing users and computers that share a network. The domain controller organizes and secures all of that data

The domain controller (DC) is the box that houses the kingdom's keys—Activ Directory (AD). While attackers can use a variety of techniques to gain elevated access to networks, including attacking the DC itself, you can not only protect your DCs from attackers, but also use them to detect cyberattacks in progress.

To learn more about Domain controllers, visit: https://brainly.com/question/25664001

#SPJ1

listen to exam instructions a user calls the help desk. each time he creates a new text file, permissions of 640 are applied to the file, and he must use chmod to set them to 644. what command should you enter in the user's profile to set the default permission for newly created files to 644?

Answers

umask 0022 is the command that should be entered in the user's profile to set the default permission for newly created files to 644.

Mention any ten LINUX commands.

ls - The most frequently used command in Linux to list directories.pwd - Print working directory command in Linux.cd - Linux command to navigate through directories.mkdir - Command used to create directories in Linux.mv - Move or rename files in Linux.cp - Similar usage as mv but for copying files in Linux.rm - Delete files or directories.touch - Create blank/empty files.ln - Create symbolic links (shortcuts) to other files.cat - Display file contents on the terminal.

To learn more about LINUX commands, use the link given
https://brainly.com/question/28331559
#SPJ4

What is the benefit of password policy?

Answers

Answer:

Passwords provide the first line of defense against unauthorized access to your computer and personal information. The stronger your password, the more protected your computer will be from hackers and malicious software. You should maintain strong passwords for all accounts on your computer. While you may not be able to control user's activities 100%, it enables you to guide them for their own safety.A password strength rule is a rule to which a password must conform. For example, password strength rules might specify that the minimum number of characters of a password must be 5.

The standards for judging whether a new password is secure are set forth in a password policy.

For instance, password strength guidelines can mandate that a password have a minimum of five characters.

What is IBM® Security Privileged?

Privilege credential and access management, application identity management, and session recording are all provided by an appliance-based solution known as the IBM® Security Privileged Identity Manager.

A password policy specifies the requirements that passwords for a service must meet, including the minimum length and character types that are acceptable and unacceptable. The password policy may further specify that if a word is in a dictionary of objectionable words, it is prohibited from being entered. Before selecting this option in the user interface, you must first load a dictionary.ldif file into the IBM® Security Privileged Identity Manager.

The following standards and other guidelines for passwords are available to you:

The shortest and longest lengthslimitations on charactersReusing passwords frequentlyUser IDs or names that are not permittedSet a password's minimum age.

Establishing password guidelines:

An administrator can create a password policy to be used with one or more services. A rule that states that a character can only be used three times in a password, for instance, could be established in your password policy.

Making a rule for password policies:

As an administrator, you can add a rule to an existing password policy. For example, you could create a rule that requires a minimum number of digits in a password.

Altering the password guidelines:

An administrator can change a password policy to conform to your company's password requirements. For instance, you could change a password policy to state the required minimum and maximum number of characters.

Altering a password policy stipulation:

A password policy rule may be modified by an administrator. You may, for instance, modify or eliminate the settings for an existing rule.

A password policy being deleted:

A password policy that is no longer required to regulate password entries can be deleted by an administrator.

Individual password guidelines:

The IBM Security Privileged Identity Manager server allows you to include special logic for password generation. The logic can be added using a particular rule, a customized generator, or a mix of the two.

Learn more about password policy click here:

https://brainly.com/question/28389547

#SPJ4

(30) write a multithreaded program (using posix pthreads) that calculates various statistical values for a list of numbers. this program will be passed a series of numbers on the command line and will then create five separate worker threads. one thread will determine the average of the numbers, the second will determine the maximum value, the third will determine the minimum value, the fourth thread will determine the median value, and the fifth thread will determine the standard deviation. for example, suppose your program is passed the integers 90 81 78 95 79 72 85 the program will report the average value is 82.86 the minimum value is 72.00 the maximum value is 95.00 the median value is 81.00 the standard deviation is 7.77 the variables representing the average, minimum, maximum, median, and standard deviation values will be stored globally. the worker threads will set these values, and the parent thread will output the values once the workers have exited. comment your code and submit it in a file named numstats.cpp

Answers

Programming multiple, concurrent execution threads is known as multithreading.

Explain the multithreading ?On a single CPU, multithreading creates the appearance of parallel processing. The processor actually switches by utilizing a scheduling technique. Alternately, it may flip in response to a mix of outside inputs (interrupts) and the order in which the threads were prioritized.True parallel computing involves multithreading on many processor cores. Together, several microprocessors may provide the desired outcome more quickly. There are several concurrent, simultaneous tasks going on at once.Teams working on development projects nowadays value multithreading. And as technology advances, it will still be crucial.More operations are being conducted on several processor cores as we approach the limitations of what can be done on a single CPU. For AI, this is very crucial.

Learn more about multithreading refer :

https://brainly.com/question/15062443

#SPJ1

consider the following indicators in the ir process. no incident response plan no recording of commands failure to control access to digital info failure to report what best describes this status?

Answers

A phrase which best describes the aforementioned status in an incident response (IR) process is common forensic mistakes.

What is incident management?

Incident management can be defined as a strategic process through which a business organization (company or firm) identifies, analyzes, and correct hazards and potential problems, in order to ensure that normal service operation is restored as quickly as possible to its end users after a disruption, as well as to prevent a re-occurrence of these hazards and mistakes in the future.

Generally speaking, some examples of common forensic mistakes (indicators) in an incident response (IR) process include the following:

"No incident response plan.""No recording of commands." "Failure to control access to digital info.""Failure to report.""Underestimating the scope of an incident."

Read more on incident management here: brainly.com/question/11595883

#SPJ1

What is strong password policy?

Answers

A strong password policy states that a secure password must have at least 8 characters for your computer or computer network. Any of your private information, such as your real name, username, or business name, should not be included. It ought to differ significantly from the passwords you've previously used. It shouldn't contain any words that are completely spelled.

What is Cybercrime?

Cybercrimes are crimes committed via a computer or computer network. Either the computer was the target of the crime or it was employed in its commission.

Cybercrime is an illegal action that either targets or makes use of a computer, computer network, or networked device. It may compromise someone's security or financial stability.

Most cybercrimes are performed by hackers or cybercriminals who are motivated by financial gain. Both individuals and organizations are capable of committing cybercrime. Some cybercriminals are well-organized, employ cutting-edge methods to hack your computer network, and possess exceptional technical proficiency. Some hackers are amateurs.

To learn more about Cybercrime, use the link given
https://brainly.com/question/13109173
#SPJ4

there are two commands that we can use to save new configuration changes that we apply to the switch. what are these two commands?

Answers

end & 'Ctrl + Z' are the two commands that we can use in this case

What are the two commands used?

Type the end command or press the CTRL+Z keys simultaneously on the keyboard to exit any prompt, even the privileged EXEC mode.

The following are the uses for ctrl+z and exec mode:

1) Undo the operation

2)end helps you to get back to the one you are searching for

configuration changes:

When you alter component data that is subject to change control, a configuration change happens. Specific component fields and classification attributes are subject to change control. Configuration information refers to the fields and attributes you choose to use for change control.

Hence to conclude ctrl + z and end are the two commands we need

To know more on keys follow this link below:

https://brainly.com/question/24847632

#SPJ4

identify the device or body pain computer

Answers

A computer is the gadget I'm using. I am not experiencing any body pain at the moment.

What is computer?

A computer is a digital electrical machine that may be programmed to automatically perform arithmetic or logical operations (computation). Programs are generic sets of operations which modern computers are capable of performing. These programmes allow computers to do a variety of jobs. A computer system is a "complete" computer which includes the necessary hardware, operating system (primary software), and peripheral equipment for "full" functioning. This term can also refer to a group of computers that are linked and collaborate, such as a computer network or even a computer cluster.

To learn more about computer
https://brainly.com/question/21474169

#SPJ1

string comparisons are made from left to right.
a. true
b. false

Answers

Answer:

A) True

I hope this helped!! Please like this!

A.true explanation: allows the use of logical restrictions on its inquiries such as OR, AND, and NOT. The conditional LIKE must be used in conjunction with wildcard characters.

To decompress a file using the gzip command, which parameter do you need to use?.

Answers

Gzip has compression levels ranging from 1 to 9, with 9 providing the highest compression but the slowest performance.

A nice balance between speed and compression ratio can be found in the default compression level of 6, which is 6. HTTP compression, a method for accelerating the transmission of HTML and other content on the World Wide Web, uses the gzip format. According to RFC 2616, it is one of the three accepted formats for HTTP compression. We may use gunzip with filename as an input to recover our original, uncompressed file. 7. Gzip cannot be used to uncompress files. Utilizing the gzip function is quite easy. You only need to type "gzip" and the file's name to compress it.

Learn more about compression here-

https://brainly.com/question/13707757

#SPJ4

we are going to revisit our course assignment. however, there is going to be some changes. stop when and only when the user has exactly five courses. whenever the user must add courses, accept a comma-separated list of courses, and add each of them. o before adding the course, remove any whitespace around its name, and correct its capitalization. whenever the user must drop courses, accept a comma-separated list of courses, and delete each of them. o treat the names the same way as you add them and the comparisons will be easy. o you need to check for, and ignore, courses the user is trying to drop courses they are not taking!

Answers

Using the knowledge in computational language in python it is possible to write a code that comma-separated list of courses, and delete each of them.

Writting the code:

def printCourses(l):

   if len(l)==0:

       print("You aren't currently taking any courses.")

   else:

       print('You are currently taking these courses:')

       for i in range(len(l)):

           print(str(i+1)+': '+l[i])

#main

l=[]

printCourses(l)

while(len(l)!=5):

   if len(l)<5:

       s=input('What courses would you like to take? ')

       s = s.split(',')

       for i in s:

           l.append(i.strip().capitalize())

   else:

       s=input('What courses would you like to drop? ')

       s = s.split(',')

       for i in s:

           if i.strip().capitalize() in l:

               l.pop(l.index(i.strip().capitalize()))

   printCourses(l)

See more about python at brainly.com/question/12975450

#SPJ1

Select the statement XXX that will correctly swap the values in smallArray[0] and smallArray[2].
int temp;
int smallArray[] = {5, 12, 16};
XXX

Answers

The statement XXX that will correctly swap the values in smallArray[0] and smallArray[2] are:

temp = smallArray[0];

smallArray[0] = smallArray[2];

smallArray[2] = temp;

What is a statement in coding?

A statement is a grammatical unit of an imperative computer language that expresses some action to be performed. A program developed in this language is made up of a series of one or more statements.

A program code can contain a variety of statements that regulate the input and output of the tasks that the program is supposed to do.

A coding instruction that is used to compare data, express and make judgments. A conditional statement instructs a program to do action based on whether a condition is true or false. It's frequently expressed as an if-then or if-then-else expression.

Learn more about statements:
https://brainly.com/question/13735734
#SPJ1

create a traffic light control program that will do the following things: 1. remove the traffic control logic from the main program. 2. add methods to the traffic light objects that will (1) allow them to talk to each and (2) control how they display green / yellow / red.

Answers

The color of the traffic light, Red indicates a stop or a danger sign, yellow indicates caution, and green indicates you may start walking with caution. Typically, red lights contain some shades of orange, and green lights contain some shades of blue.

Traffic light explanation

Each installation of a traffic light aims to have one or more of the following functions: to obtain an orderly traffic movement, to increase the traffic capacity at crossroads, to reduce the frequency of certain types of accidents. The whole world must use the same traffic lights in terms of colors, namely red, yellow and green.

Learn more about traffic lights:

brainly.com/question/28033780

#SPJ4

Kayla is on-location shooting a wedding while her other employees will be holding down the office and taking care of any walk-ins. Kayla left them written reminders and instructions for some things that they need to take care of in her absence. How did Kayla MOST LIKELY leave these instructions?


in shot lists being created for upcoming events


in purchase orders for equipment that needs to be ordered


in memos she wrote prior to leaving


by telling the models who would be photographed that day

Answers

Kayla most likely leaves these instructions in short lists being created for upcoming events. The correct option is A.

What are the instructions?

Instructions are the things that a person tells other people or groups of people to do. These are compulsory things that are told to do. Shortlists are made to give instruction in a revision tone.

Kayla is leaving the place, so she is making reminder notes top tell her colleagues what to do in her absence. So, short noes are good options.

Therefore, the correct option is A. in shot lists being created for upcoming events.

To learn more about instructions, refer to the link:

https://brainly.com/question/2601676

#SPJ1

implement map using open addressing with linear probing. hint: you must create a new concrete class that implements mymap using open addressing with linear probing, as described on p. 989. see the lecture on linear probing. for simplicity, use f(key)

Answers

Here is the sample how to implement Mymap in Java programming

public class Exercise {

public static void main(String[] args) {

 // Create a map

 MyMap<String, Integer> map = new MyHashMap<>();

 map.put("Sebastian", 35);

   map.put("Andre", 37);

 map.put("Luke", 25);

 map.put("Caroline", 25);

 map.put("Thomas", 23);

 map.put("Makaela", 23);

 map.put("Shayne", 56);

 map.put("Will", 24);

 System.out.println("Entries in map: " + map);

 System.out.println("The age of Luke is " +

  map.get("Luke"));

 System.out.println("The age of Will is " +

  map.get("Will"));

 System.out.println("Is Shayne in the map? " +

  map.containsKey("Shayne"));

 System.out.println("Is Jack in the map? " +

  map.containsKey("Jack"));

 System.out.println("Is age 37 in the map? " +

  map.containsValue(37));

 System.out.println("Is age 35 in the map? " +

  map.containsValue(35));

 System.out.print("Keys in map: ");

 for (String key : map.keySet()) {

  System.out.print(key + " ");

 }

 System.out.println();

 System.out.print("Values in map: ");

 for (int value : map.values()) {

  System.out.print(value + " ");

 }

 System.out.println();

 map.remove("Shayne");

 System.out.println("Entries in map " + map);

 map.clear();

 System.out.println("Entries in map " + map);

}

}

Learn more about Java Programming here:

https://brainly.com/question/12972062

#SPJ4

given that integer array x has elements 5, 10, 15, 20, what is the output?

Answers

Note that where the integer array x has elements 5, 10, 15, 20 the output will be "Error: Invalid access" (Option D)

What is an integer Array?

An integer array is a collection of integers or "whole numbers" that may be used for a variety of computations. An integer is a number that has no fractions. Integers are entire integers that may be both positive and negative, such as zero, one, and a negative one.

In mathematics, integer arrays are often utilized. The array might be specified within parenthesis for use in a computation or equation. The array can be as big or small as needed. The array is a commonly used mathematical concept in computer programming.

Arrays use a single identifier to represent numerous data components of the same kind. The index number makes it simple to access or search for an element in an array. An array may be simply accessed by incrementing the index by one.

Learn more about Integer Array:
https://brainly.com/question/15048840
#SPJ1

Full Question:

Given that integer array x has elements 5, 10, 15, 20, what is the output?

int i;

for (i = 0; i < 4; ++i) {

System.out.print(x[i] + x[i + 1]);

}

Question options:

A) 10, 15, 20, 5

B) 15, 25, 35, 25

C) 15, 25, 35, 20

D) Error: Invalid access

Before you use a plugin, you have to know all but one of the following. Which one is it?

a. the options that it provides
b. the HTML that it requires
c. the methods that it provides
d. how its CSS works

Answers

Answer:

d. how its CSS works

Explanation:

A JavaScript utility called PostCSS converts your CSS code into an abstract syntax tree (AST) and then offers an API (application programming interface) for JavaScript plugins to analyze and change it. It offers a wide range of plugins to carry out various tasks, like linting, minifying, inserting vendor prefixes, and many other things.

Postcss-import is one of the most fundamental and crucial plugins to utilize. We can import CSS files into other files using it. Visit src/style.css in the postcss-tutorial repository to see how to utilize this plugin.

Click here to learn more about CSS here

https://styleguide.brainly.com/220.4.0/docs/

#SPJ4

create a phone book program that enables users to enter names and phone numbers of friends and acquaintances. create a structure to hold contact information, and use calloc() to reserve the first memory segment. the user should be able to add or modify phone book entries through a menu. use the realloc() function to add contiguous memory segments to the original memory block when a user adds a new phone book entry.

Answers

The phone book program that enables users to enter names will be:

#include<stdio.h>

#include<stdlib.h>

struct phonebook{

char name[10];

double phoneno;

};

int main()

{

int t,i,total;

typedef struct phonebook phone;

phone *arr;

arr = (phone *)calloc(1,sizeof(phone));

printf("want to add a phone number:(0/1)\t");

scanf("%d",&t);

i = 1;

while(t!=0)

{

printf("enter name:\t");

scanf("%s",arr[i-1].name);

printf("enter phoneno:\t");

scanf("%lf",&arr[i-1].phoneno);

printf("want to add a phone number:(0/1)\t");

scanf("%d",&t);

i++;

arr = (phone *)realloc(arr,i*sizeof(phone));

}

total = i;

for(i=0;i<total-1;i++)

{

printf("name:\t%s",arr[i].name);

printf("\tphoneno:\t%.0lf\n",arr[i].phoneno);

}

What is a computer program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software includes computer programs as well as documentation and other intangible components.

Source code refers to a computer program in its human-readable form. The program based on the information is illustrated above.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

what are desirable characteristics for a hash function? you can select multiple answers. group of answer choices uniformly distributed output avoids clustering deterministic output 0 to size-1 fast

Answers

The following are the desirable characteristics of a hash function

What are the desirable characteristics of a hash function?

The purpose of a hash function is to fit a set of inputs of any size into a table or other data structure with fixed-size elements.

Qualities of a Good Hashing Function. A strong hash function has the following four qualities:

1) The data being hashed entirely determines the value of the hash.

2) The input data are all used by the hash function.

3) The hash function "uniformly" disperses the data among all conceivable hash values.

A message or file can be used as a variable-length input for the hash function, which produces a fixed-length output that is typically much shorter than most input values.

Hence to conclude above are the desirable characteristics of hash function

To know more on hash function please follow this link

https://brainly.com/question/13149862

#SPJ4

select one or more: group of answer choices it is best practice to create one maintenance plan to support all databases for an instance a database user needs to be a part of the sysadmin role in order to execute sql server agent jobs database maintenance plans do not require sql server agent sql server job schedules can be attached to multiple sql server agent jobs or none at all sql server agent jobs cannot be run simply based on cpu idle time; a specific start time is required each sql server instance has its own sql server agent process database maintenance plans help automate many standard dba maintenance tasks.

Answers

A database maintenance plan is a list of specified, preventative actions that must be taken on a regular basis to maintain the performance and availability of databases.

Open the SQL Server Enterprise Manager, then go to your server using the hierarchy. Expand the Management folder under the server. To launch the Database Maintenance Plan Wizard, right-click Database Maintenance Plans under Management and choose New Maintenance Plan. To guarantee the availability and performance of the database, you must monitor and improve the database server. Updating statistics, tracking database, server, and space usage, and organizing backup and recovery plans are all part of maintaining DB2 and Oracle databases.

Learn more about database here-

https://brainly.com/question/6447559

#SPJ4

In HTML, write a short paragraph describing something from a book or movie (two or three sentences). Be sure to mention the book or movie title in the paragraph, and format appropriately.

Answers

To write in HTML, you need to understand the format of the HTML itself. This is an example how to write a paragraph in HTML.

<html>

   <head>

       Black Adam

   </head>

   <body>

       <p>Black Adam is one of DC movies that airs in 2022.</p>

       <p>Directed by Jaume Collet-Serra, and featuring Dwayne Johnson as Black Adam.</p>

       <p>Black Adam is rated for PG 13.</p>

   </body>

</html>

First, you need to define what language you want to write in this case, it's HTML so write <html> and don't forget to complete with </html> at the end.Next, there is two part in html which is head and body. Head or header is intended for the name of the website, in this case it's the movie name. While body is intended for the content of the website, or in this case it's the paragraph.Next, you need to write the sentence to make a paragraph. In order to to that, you need to write <p> follows by the sentence and complete with </p>.

Learn more about HTML here

https://brainly.com/question/7169423

#SPJ1

Other Questions
please answer correctly for brainly:) Put the following equation of a line into slope-intercept form, simplifying all fractions. 9y3x= 54 what should I eat for lunch? 24) The cost in millions of dollars for a company to manufacture x thousand automobiles is given bythe function C(x) = 3x^2 - 30x + 200. Find the number of automobiles that must be produced tominimize the cost.A) 15 thousand automobilesC) 5 thousand automobilesB) 125 thousand automobilesD) 10 thousand automobiles why is it unlikely that a patient would have symptoms of low cardiac output with accelerated junctional rhythm? Help me solve this please many business decisions are made in hopes of improving a firm's bottom line. which of the following financial statements will reveal a firm's bottom line?A. income statementB. trial balanceC. statement of cash flowsD. balance sheet A certain element has a half-life of approximately 15 hours. How long would it take for 500 grams of the element to decay to 299 grams? Leave your answer as an integer or simplified expression. Please answer this question 20 PTS!!(first one to answer CORRECTLY gets a brainly)Critical ReadingThe following question is based on the haiku by Basho.Which of the following best explains why haiku poems are enriched by their poetic form?a. Nature is best described by using words that do not rhyme.b. The fewer the words, the stronger the poem.c. The disciplined use of language calls forth deep thoughts and emotions.d. Poems that rhyme cannot be deeply expressive.(edge) 121x1064909-6-5-4-3-2-12- 2 3 4 5 6 xJ-8--10BhWhich statement is true regarding the functions on thegraph?Of(6) = g(3)Of(3) = g(3)Of(3) = g(6)Of(6) = g(6) A 2-pint bucket of paint costs $11.08. What is the price per cup? a radio can be tuned into a particular station frequency by adjusting the capacitance in an l-c circuit. suppose that the minimum capacitance of a variable capacitor in a radio is 4.14 pfpf . part a what is the inductance lll of a coil connected to this capacitor if the oscillation frequency of the l-c circuit is 1.67 mhzmhz , corresponding to one end of the am radio broadcast band, when the capacitor is set to its minimum capacitance? express your answer in henrys to three significant figures. Imagine you have a chocolate cake that weighs two pounds. If you slice the cake into ten slices, what will be the weight of all the slices put together? Maria is renting kayaks from a local shop that charges a $10 fee, plus an hourly rate of $7. 50. For how long can maria rent the kayak if she pays a total of $70?. How well did the animals work together? Why do you think so? On average, a banana will last 6 days from the time it is purchased in the store to the time it is too rotten to eat. Is the mean time to spoil less if the banana is hung from the ceiling? The data show results of an experiment with 15 bananas that are hung from the ceiling. Assume that that distribution of the population is normal.6.3, 3.5, 5.6, 4.2, 4.4, 3.9, 4.5, 5.5, 7.1, 5.6, 6.6, 6.1, 6.3, 7.2, 4What can be concluded at the the = 0.01 level of significance level of significance? For this study, we should use t-test for a population meanThe null and alternative hypotheses would be: H0:?Select an answerH1:?Select an answerThe test statistic ? = (please show your answer to 3 decimal places.)The p-value = (Please show your answer to 4 decimal places.)The p-value is ?Based on this, we should Select an answer the null hypothesis.Thus, the final conclusion is that ...The data suggest that the population mean time that it takes for bananas to spoil if they are hung from the ceiling is not significantly less than 6 at = 0.01, so there is statistically insignificant evidence to conclude that the population mean time that it takes for bananas to spoil if they are hung from the ceiling is less than 6.The data suggest the population mean is not significantly less than 6 at = 0.01, so there is statistically insignificant evidence to conclude that the population mean time that it takes for bananas to spoil if they are hung from the ceiling is equal to 6.The data suggest the populaton mean is significantly less than 6 at = 0.01, so there is statistically significant evidence to conclude that the population mean time that it takes for bananas to spoil if they are hung from the ceiling is less than 6. After leaving Bowman's space, the filtrate, which contains electrolytes and wastes such as urea, enters:(a) the endothelial cells.(b) Bowman's capsule.(c) the glomerulus.(d) the proximal convoluted tubule. What literacy element is used in the passage American born Chinese evaluate the extent to which the election of andrew jackson fostered a change in politics during the period of 1800-1830 leq