Answer:
false
Explanation:
the parenthesis contains 2 true statements (5 is greater than 4 and 10 is greater than or equal to 10)
outside the parenthesis is the not, so the true parenthesis is negated to false
this means the value of a is false
Design a flowchart or pseudocode for a program that accepts two numbers from a user and displays one of the following messages: First is larger, Second is larger, Numbers are equal?
The pseudocode of the program will ask of two numbers form the user, compare the numbers and print out statements depending on the result of the comparison.
What is a pseudocode?
Pseudocode is an informal way of programming description that does not require any strict programming language syntax. The pseudocode describes how the code will be written and structured.
Therefore, the pseudocode follows the structure below
Ask the user for two numbersUse the greater than and equals to operator to check if any number is greater than the other or they are the sameFinally, we print the statements: First is larger, second is larger or numbers are equal depending on your result in comparison of the numbers.learn more on pseudocode here: https://brainly.com/question/14101532
#SPJ1
Which method can be used for making a robot perform a different set of functions?
a. changing a robot's sensors
b. dismantling a robot
c. creating a new robot
d. rewriting software
Answer:
D. Because rewriting it can make it preform new functions.
Explanation:
I need the answer with c++
The question : Implement the class "Rectangle" with sides parallel to the coordinate axes. 1.Provide for the possibility of moving rectangles on the plane. 2.Provide for the possibility of changing sizes. 3.Provide for the possibility of constructing the smallest rectangle containing two given rectangles. 4.Provide for the possibility of constructing the rectangle that is a common part (intersection) of two rectangles. 5.Provide for the possibility of calculating the length of half the diagonal of a rectangle.
Using the knowledge of computational language in C++ code we found that this code can be written as:
The code can be found in the attached image.
How to writte the C++ code ?So from the c++ code you can write the geometric figure as
#include <bits/stdc++.h>
struct Point {
int x, y;
};
bool doOverlap(Point l1, Point r1, Point l2, Point r2)
{
if (l1.x > r2.x || l2.x > r1.x)
return false;
if (r1.y > l2.y || r2.y > l1.y)
return false;
return true;
}
/* Driver program to test above function */
int main()
{
Point l1 = { 0, 10 }, r1 = { 10, 0 };
Point l2 = { 5, 5 }, r2 = { 15, 0 };
if (doOverlap(l1, r1, l2, r2))
printf("Rectangles Overlap");
else
printf("Rectangles Don't Overlap");
return 0;
}
See more about C++ at brainly.com/question/19705654
#SPJ1
A message in your code that explains what is going on in your program (Known by seeing // before the message)
Answer:
comment
Explanation:
Comments just comment on the code.
Comments could be helpful when someone else has to read your code.
Comments just comment on the code. Comments could be helpful when someone else has to read your code.
What is Comments?
An explanation or annotation in a computer program's source code that can be viewed by programmers is known as a remark.
Compilers and interpreters typically ignore them because they were introduced to make the source code simpler for humans to understand. The syntax of comments differs significantly among programming languages.
Sometimes, comments are also handled in a variety of ways by documentation generators to provide documentation separate from the source code itself, or they are used to integrate with source code management systems and other types of external programming tools.
Therefore, Comments just comment on the code. Comments could be helpful when someone else has to read your code.
To learn more about comments, refer to the link:
https://brainly.com/question/30318947
#SPJ3
Which type of device would be used on a laptop to verify
the identity of a user
Answer:
A biometric identification device
Explanation:
As biometric identification devices, laptops commonly use a fingerprint scanner or, for facial recognition, a camera.
In java language I want the code
Answer:
code was too long to paste here, attached below
Explain the stages of the evolution of the idea of IDS and its importance of security, military and examine the importance of intrusion detection systems and categories classifications, and where can put IDS to reduce the risk to the network.
Intrusion detection systems (IDS) is a software type that is used to check for violations of policy or any other malicious activity. IDS detects and prevents unauthorized activities.
What is IDS?Intrusion detection systems (IDS) is the technological system that is built to check for any suspicious and unauthorized activities. They detect the network system and the system logs.
The unauthorized and suspicious things are scanned and made an alert. It is very crucial in many fields as many documented and private items are needed to be protected.
Therefore, IDS can be of various types like host, network, perimeter, and VM.
Learn more about IDS here:
https://brainly.com/question/20709626
#SPJ1
What are the common operations performed on character strings?
•concatenation
• scanning
• substringing
• translation
• verification
if you want to remember means csstv;-)In Exercises 1–4 construct the dual graph for the map shown.
Then find the number of colors needed to color the map so
that no two adjacent regions have the same color.
Answer:
10.8 Graph Coloring
A coloring of a simple graph is the assignment of a color to each vertex of the graph so that no
two adjacent vertices are assigned the same color.
Chromatic number
The chromatic number of a graph is the least number of colors needed for a coloring of this graph.
The Four Color Theorem
The chromatic number of a planar graph is no greater than four.
10.8 pg. 733 # 3
Construct the dual graph for the map shown. Then find the number of colors needed to color the
map so that no two adjacent regions have the same color.
a
b c d e
f
At least three colors are needed to color the
graph because of triangle 4abc exists in the
graph.
10.8 pg. 733 # 7
Find the chromatic number of the given graph.
a
b
c
d
Since this graph forms two triangles, 4abd and
4bcd, we can color this graph with at least 3
colors where a and c are the same colors.
a
b
c
d
10.8 pg. 733 # 9
Find the chromatic number of the given graph.
1
ICS 241: Discrete Mathematics II (Spring 2015)
a
e
b
c
d
This graph can be colored with two colors like
shown.
a
e
b
c
d
10.8 pg. 734 # 19
The mathematics department has six committees, each meeting once a month. How many different
meeting times must be used to ensure that no member is scheduled to attend two meetings at the
same time if the committees are C1 = {Arlinghaus, Brand, Zaslavsky}, C2 = {Brand, Lee, Rosen},
C3 = {Arlinghaus, Rosen, Zaslavsky}, C4 = {Lee, Rosen, Zaslavsky}, C5 = {Arlinghaus, Brand},
and C6 = {Brand, Rosen, Zaslavsky}?
We will first draw the intersection graph of the given sets.
C1 C2
C3
C5 C4
C6
From here, it is easy to see that we need at least 5 colors like so:
C1 C2
C3
C5 C4
C6
Therefore, 5 meeting times are needed. Committees C4 and C5 can meet at the same time.
Explanation:
done-_-
.....................................................
Answer:
i think its, a. sequence
Explanation:
i could be wrong, if i am, i am sorry
Which of the following types of promotion includes a two-way conversation?
Explain three of the the features of the word processing to document.
Word processing software may be used to create, edit, save, and print documents, among other things. Text within a document may be copied, pasted, moved, and deleted. Text formatting includes font selection, bolding, underlining, and italicizing.
Select the correct answer.
What statement best describes fault isolation?
The statement that best describes fault isolation is that Fault Isolation is known to be the area of knowing the cause of an issue.
What is fault isolation?Fault Isolation is also known to be the way or method use in knowing the cause of an issue.
It is also known as fault diagnosis as it helps to deals with a lot of methods that can help one to be able to isolate the component or the device that is causing or leading to the error.
Learn more about isolation from
https://brainly.com/question/27507161
#SPJ1