The two main causes of firearm accidents are Ignorance & _____________?

Answers

Answer 1

Answer:

Carelessness

Explanation:

Answer 2
The two main causes of firearm accidents are Ignorance & carelessness

Because it might harm someone if you do not understand how to safely operate (power tools) fire arm

Related Questions

Write a program that prompts the user for their age and determines if they are a teenager. Someone is a teenager if their age is greater than or equal to 13 and less than or equal to 19.

Answers

Using the knowledge in computational language in python it is possible to write a code that  prompts the user for their age and determines if they are a teenager.

Writting the code:

from datetime import date

todayDate = date.today();

DOB = input("Please enter your Date of Birth: ");

currentYear = todayDate.year;

age = (int(currentYear) - int(DOB));

print(f'Your current age is: {age}');

print ("\n")

if age <= 5:

   print("You are a baby.")

elif age >= 5 and age < 13:

   print("You are a toddler")

elif age >= 13 and age < 18:

   print("You are an teenager")

elif age >= 18 and age < 60:

   print("You are an adult.")    

elif age >= 60:

   print("You are a senior Citizen")

See more about python at brainly.com/question/18502436

#SPJ1

When do you use while loop instead of a for loop?
Group of answer choices

1: To loop exactly 10 times

2: To perform number calculations

3: To loop until a certain condition is reached

4: To make sure a correct number is entered

Answers

A while loop is used until a certain condition is reached unknown number of times.

Option 3

What is the difference between a while loop and a for loop?

Both the for loop and the while loop is used to execute the statements repeatedly while the program is running. The main distinction between the for loop and the while loop is that the for loop is used when the number of iterations is known, whereas the while loop executes until the statement in the program is proven incorrect.

Iteration refers to a single execution of the loop body. In the preceding example, the loop iterates three times.

If i++ were not present in the preceding example, the loop would (in theory) continue indefinitely. In practice, the browser provides methods to stop such loops, and we can kill the process in server-side JavaScript.

Any expression or variable, not just comparisons, can be used as a loop condition: while evaluating the condition and converting it to a boolean.

Hence to conclude use a while loop instead of a for loop, To loop until a certain condition is reached

To know more on loops follow this link

https://brainly.com/question/26098908

#SPJ1

How can you add pictures to your presentation?

Group of answer choices

Select the Effect Options command.

Select the Picture icon on your slide.

Select the Text Box option.

Select the Variants group in the Picture tab.

Answers

The way that you add pictures to your presentation is by option C: Select the Text Box option.

How may images be added to a presentation?

After clicking the image, select the Format Picture tab. Select Picture Effects, then point to a certain effect type before selecting the desired effect. Click Options at the bottom of any effect menu to customize the effect.

Therefore, One can also do so by:

Choose a spot on the slide and click to insert the image there.Select Pictures from the Images group on the Insert tab, then select This Device.Navigate to the image you wish to insert, click it in the dialog box that appears, and then select Insert.

Learn more about presentation  from

https://brainly.com/question/24653274
#SPJ1

What is the contribution of 5G and Edge computing to society

Answers

5G increases speeds by up to ten times that of 4G, whereas mobile edge computing reduces latency by bringing compute capabilities into the network, closer to the end user.

Mark as Certified Brainly for more genuine answer.
5G will unlock a broad range of opportunities, including the optimization of service delivery, decision-making, and end-user experience. This will result in $13.2 trillion in global economic value by 2035, generating 22.3 million jobs in the 5G global value chain alone.

Could some help me please

Design a program to determine if a student is entitled to an incentive granted upon payment of his/her Boarding Fee in full. Accept the boarding fee and the amount paid. Output a message stating whether the incentive will be granted. (Required: IPO Chart)​

Answers

The program to determine if a student is entitled to an incentive is illustrated below:

#include <stdio.h>

int main() {

int num;

printf("Enter an integer: ");

scanf("%d", &num);

// true if num is perfectly divisible by 2

if(num % 2 == 0)

printf("%d is even.", num);

else

printf("%d is odd.", num);

return 0;

}

python program.

num = int(input("Enter a number: "))

if (num % 2) == 0:

print("{0} is Even".format(num))

else:

print("{0} is Odd".format(num))

Pseudocode:

0. Start

1. Print "Enter Any Number to Check, Even or Odd"

2. Read input of a number

3. If number mod = 0

4. Print "Number is Even"

5. Else

6. Print "Number is Odd"

7. End

What is a computer program?

A computer program is a set of instructions written in a programming language that a computer can execute. Software includes computer programs as well as documentation and other intangible components.

Source code refers to a computer program in its human-readable form. In this case, the program to determine if a student is entitled to an incentive granted upon payment of his/her boarding fee in full is given.

Learn more about programs on:

https://brainly.com/question/1538272

#SPJ1

What type of attack is occurring when a counterfeit card reader is in use

Answers

Answer:

skimming

Explanation:

skimming is the term that means to capture credit card info from a counterfeit card reader.

The index of a book is found in one of these parts of the

Answers

Answer: Located in the back of the book, an index helps a reader locate key terms, concepts, and ideas that were referenced in the contents of your book. Each term or concept has a corresponding page number.

Explanation:

Research statistics related to your use of the Internet. Compare your usage with the general statistics.
Explain the insight and knowledge gained from digitally processed data by developing graphic (table, diagram, chart) to communicate your information.
Add informational notes to your graphic so that they describe the computations shown in your visualization with accurate and precise language or notations, as well as explain the results of your research within its correct context.
The statistics and research you analyzed are not accomplished in isolation. The Internet allows for information and data to be shared and analyzed by individuals at different locations.
Write an essay to explain the research behind the graphic you develop. In that essay, explain how individuals collaborated when processing information to gain insight and knowledge.

Answers

By providing it with a visual context via maps or graphs, data visualization helps us understand what the information means.

What is a map?

The term map is having been described as they have a scale in It's as we call the longitude and latitude as well as we see there are different types of things are being different things are also in it as we see there are different things are being there in it as we see the oceans are there the roads and in it.

In the US, 84% of adults between the ages of 18 and 29, 81% between the ages of 30-49, 73% between the ages of 60 and 64, and 45% between the ages of 65 and above use social media regularly. On average, users use social media for two hours and 25 minutes each day.

Therefore, In a visual context maps or graphs, and data visualization helps us understand what the information means.

Learn more about the map here:

https://brainly.com/question/1565784

#SPJ1

Write a program that asks the user for a string, then searches the alice.txt file and returns the number of times that string occurs in the file. We're keeping this one simple and just looking for the *string sequence*, so if you searched for "Bob", then "Bob", "Bobby" and "SpongeBob" would each be counted. The search is case sensitive!

This can be done with a short, simple function if you read in the whole file. No loops!

Make sure your code looks like mine:
```
Enter a string to count: to
The sequence appears 60 times.
```

Answers

Using the knowledge in computational language in python  it is possible to write a code that  asks the user for a string, then searches the alice.txt file and returns the number of times that string occurs in the file.

Writting the code:

def count_letter(content, letter):

 """ Count the number of times `letter` appears in `content`."""

 if (not isinstance(letter, str)) or len(letter) != 1:

   raise ValueError('`letter` must be a single character string.')

 return len([char for char in content if char == letter])

def count_letter(content, letter):

 """Count the number of times `letter` appears in `content`.

 Args:

   content (str): The string to search.

   letter (str): The letter to search for.

 """

 if (not isinstance(letter, str)) or len(letter) != 1:

   raise ValueError('`letter` must be a single character string.')

 return len([char for char in content if char == letter])

See more about python at  brainly.com/question/18502436

#SPJ1

A compound conditional is a type of selection that uses statements with ____________ or more logical conditions.

Answers

A compound conditional is a type of selection that uses statements with control or more logical conditions.

What are the applications of compound conditional statements?

It is possible to test two conditions with compound conditionals in a single sentence. In Blockly, there are two methods to complete this using just one block! You can check to see if a statement's two criteria are true or simply the first one.

Therefore, When defining a constraint, compound logic operators like AND, NOT, and OR are utilized to connect expressions. For instance: Item C is required by (Condition A AND Condition B). Boolean operators are another name for compound logic operators.

Learn more about compound conditional from

https://brainly.com/question/28060852
#SPJ1

3.6 Consider the following variable declarations.
boolean a = true, b = false;
int k = 7;
In which expression will short-circuiting occur?

Answers

Answer:

Explanation:

Necessary:

var a, b : boolean;

        k : integer;

 begin

   a := true;

   b := false;

   k := 7;

 end.

Modify the following program to display the sales tax with two digits after the
decimal point.

Answers

Using the knowledge in computational language in python  it is possible to write a code that  modify the following program to display the sales tax with two digits after the decimal point.

Writting the code:

county_tax_rate = 0.02

state_tax_rate = 0.04

tax_rate = county_tax_rate + state_tax_rate

item_price = float(input("Please enter the price of your item: "))

item_price = int(100 * item_price) # Item price in cents

total_price = item_price * (1 + tax_rate) # Total price in cents

print("Your Total Sales Cost is ${:0.2f}".format(total_price / 100.0))

print("Your Purchase Amount was ${:0.2f}".format(item_price / 100.0))

print("Your County Tax Rate was {}%".format(int(county_tax_rate * 100)))

print("Your State Tax Rate was {}%".format(int(state_tax_rate * 100)))

print("Your Total Tax Rate was {}%".format(int(tax_rate * 100)))

See more about python at brainly.com/question/18502436

#SPJ1

Workers at a particular company have won a 7.6% pay increase retroactive for six months. Write a program that takes an
employee's previous annual salary as input, and outputs the amount of retroactive pay due the employee, the new annual
salary, and the new monthly salary. For example:

Answers

The C++ code for the program in question will be as follows:

#include <iostream>

using namespace std;

int main()

{

double oldSalary, retroSalary, newSalary, increaseSalary, newMonthlySalary;

const double payIncrease = .076;

 

cout << "Enter your old annual salary." << endl;

cin >> oldSalary;

newSalary = (oldSalary * .076) + oldSalary;

increaseSalary = newSalary - oldSalary;

newMonthlySalary = newSalary / 12;

retroSalary = (oldSalary / 2) * payIncrease;

cout << endl;

cout << "Your new annual salary is: $" << newSalary << endl;

cout << "You received a $" << increaseSalary << " increase in salary." << endl;

cout << "You will receive $" << retroSalary << " in retroactive salary." << endl;

cout << "Your new monthly salary is: $" << newMonthlySalary << endl;

return 0;

}

What is C++ programming? Why is it useful?

Applications with great performance can be made using the cross-platform language C++. As a C language extension, it was created by Bjarne Stroustrup. With C++, programmers have extensive control over memory and system resources.

Given that C++ is among the most widely used programming languages in use today and is used in embedded devices, operating systems, and graphical user interfaces, it is helpful. C++ is portable and may be used to create applications that can be converted to other platforms since it is an object-oriented programming language, which gives programs a clear structure and allows code to be reused, reducing development costs.

To learn more about C++, use the link given
https://brainly.com/question/24802096
#SPJ1

i need like 2 sentences for each

Explain the characteristics of the Internet and the systems built on it.
Explain the abstractions in the Internet and how the Internet functions.
Explain how the characteristics of the Internet influence the systems built on it.

Answers

Accessibility. The Internet is a service that is available to everyone worldwide.

Participation in Other Media.

What is the internet?

The Internet, sometimes known as "the Net," is a global system of computer networks. It is a network of networks that allows users at any one computer to obtain information from any other computer with permission (and sometimes talk directly to users at other computers).

A vast network of specialized computers known as routers makes up the Internet. Knowing how to move packets from their source to their destination is the responsibility of each router. During its journey, a packet will have passed through numerous routers. A hop occurs when a packet passes from one router to the next.

Therefore,  . The Internet is a service that is available to everyone worldwide.

Learn more about the internet here:

https://brainly.com/question/13308791

#SPJ1

Importance of page break in Ms word

Answers

Answer:

Page breaks are used to end a page without filling it with text. To make sure the title page of your thesis/dissertation is separate from the signature page, for example, insert a page break after the graduation date on the title page.

PLEASE GIVE BRAINLIEST THANK YOU!!!

you have just configured the password policy and set the minimum password age to 10. what is the effect of this configuration?

Answers

Answer:

User cannot change the password for 10 days.

Which activities would Full Screen Reading View be most helpful for? Check all that apply.
editing a document
removing text from a document
reading a document
Dwriting a document
looking at the layout of a document

Answers

Reading a document and looking at the layout of a document are the activities for which Full Screen Reading View is quite helpful.

What exactly is a Document?

A document is a type of information that may be useful to one or more users. This data can be in both digital and nondigital formats. As a result, a document can be digital or nondigital. Digital and nondigital documents are stored using various methods and layouts.

A nondigital or paper document can be physically stored in a file cabinet, whereas an electronic or digital document is stored as one or more files in a computer. A database can also include digital documents. Electronic document management software is used to manage, store, and secure electronic documents.

To learn more about Document, visit: https://brainly.com/question/28578338

#SPJ9

What method would you use to search a number in an organized array of number​

Answers

The method that can be used to search a number in an organized array of numbers would be the "sequential search algorithm."

What is an array? What is it used for?

A collection of elements, each of which is identified by at least one index or key, is referred to as an array in computer science. Each element of an array is recorded such that a mathematical formula can be used to determine its position from its index tuple.

When several variables of the same type must be used, arrays are employed. It is used to hold a collection of data, although it is more helpful to see an array as a group of variables of the same type. You can declare and use arrays. The types and quantity of items that must be included for an array must be specified by the programmer.

Solution Explained:

The sequential search algorithm is the simplest method to search for a number in an organized array since the function checks each element in the array, starting from the first and ending with the last one, to see if it matches the desired value. As soon as a match is discovered, the function returns the index of the element whose value corresponds to the desired value.

To learn more about an array, use the link given
https://brainly.com/question/28061186
#SPJ1

#For this check-in, your goal is to write an agent that can

#play tic-tac-toe.

#

#How do you code an agent that plays tic-tac-toe? Well, you

#code an agent that plays a single move in a tic-tac-toe game.

#Then, we run a game, passing the board back and forth between

#your agent and an opponent.

#

#So, all you need to do is write a function called move. move

#should have one parameter, a list of lists. The parameter

#will always be a 3x3 list of characters. Every item in the

#3x3 list will be either a space (empty), U (Us), or T (Them).

#We're using U and T instead of X and O so that your agent

#doesn't have to worry about whether it's playing as X or O:

#you always play as U.

#

#Your move function should always return a tuple with two

#integer representing the coordinate where you want to play, row

#then column. For example, returning (0, 0) would play in the

#top left. Returning (0, 2) would play in the top right (row 0,

#column 2). Returning (2, 0) would play in the bottom left (row

#2, column 0). Returning (2, 2) would play in the bottom right

#(row 2, column 2).

#

#Remember, you're only coding an agent to play a single move

#in a tic-tac-toe game; it's given a board and it returns a

#single move. The board it receives might be empty, it might

#be partially-played, or it might have only a single possible

#move remaining. You may assume that the game board is valid

#(e.g. no one has yet won the game).

#

#In order to pass this check-in, all you have to do is write

#an agent that can play a move in any valid board: it never

#tries to play in a spot that has already been played or to

#play a move out of range. Beyond that, it does not matter if

#your agent wins or loses, or how it selects the move to play.



#Add your move() function here!

Please help me, I've been working on this for HOURS and about to cry

Answers

Using knowledge in computational language in python it is possible to write a code that play the game tic tac toe that code an agent that plays a single move in a tic-tac-toe game.

Writting the code:

# tic_tac_toe/logic/models.py

import enum

import re

from dataclasses import dataclass

from functools import cached_property

# ...

dataclass(frozen=True)

class Grid:

   cells: str = " " * 9

   def __post_init__(self) -> None:

       if not re.match(r"^[\sXO]{9}$", self.cells):

           raise ValueError("Must contain 9 cells of: X, O, or space")

   def x_count(self) -> int:

       return self.cells.count("X")

    def o_count(self) -> int:

       return self.cells.count("O")

   def empty_count(self) -> int:

       return self.cells.count(" ")

See more about python at brainly.com/question/18502436

#SPJ1

Write a C++ program, which can ask user for login credentials, using Nested If-else
Statement. (Note: Code must have more than one Username support), also ask user for
another entry using do-while loop.

Answers

Using the knowledge in computational language in C++ it is possible to write a code that write a program that ask user for login credentials, using Nested If-else Statement.

Writting the code:

#include <iostream>

#include <cctype>

#include <string>

#include<fstream>

using namespace std;

/*Implements a method to validata the password*/

bool validatePasswordProcess(char passwordValidate[]);

/*main program*/

int main()

{

/*declares the varibles*/

const int SIZEVAL = 7;

char passwordValidate[SIZEVAL];

string UserName,lineFile;

/*declares the file variable*/

ifstream userFile;

/*opens the file*/

userFile.open ("users.txt");

/*Entering the user name*/

cout<<"Enter UserName:";

/*Getting the user Name*/

cin>>UserName;

/*checks whether the file is open*/

if(userFile.is_open())

{

/*getting the lines*/

while(getline(userFile,lineFile))

{

/*printing the data in the file*/

//cout<<lineFile<<endl;

}

/*checks the end of file*/

while(!userFile.eof())

{

/*compares the username*/

if(UserName.compare(lineFile)==0)

{

/*prints the message*/

cout<<"UserName is available";

}

}

}

/*else statement*/

else

{

/*prints the message*/

cout<<"UserName not found";

exit(1);

}

/*Getting the password for validation*/

cout << "PLEASE ENTER A PASSWORDVALIDATE THAT'S 8 CHARACTERS LONG " << endl;

cout << "AND AT LEAST ONE UPPER AND LOWERCASE LETTER " << endl;

cout << "AND ALSO AT LEAST ONE DIGIT " << endl;

/*Getting the password*/

cin >> passwordValidate;

/*checks the password Length*/

if (strlen(passwordValidate) < 8)

{

/*password validation message*/

cout << "PASSWORD NOT LONG ENOUGH, PLEASE TRY AGAIN";

cin >> passwordValidate;

}

/*calls the validatePassword function*/

if (validatePasswordProcess(passwordValidate))

cout << "THAT'S A VALID PASSWORDVALIDATE";

/*closing the file*/

userFile.close();

return 0;

}

/*Implements the nethod for validating the password*/

bool validatePasswordProcess(char passwordValidate[])

{

/*Declares the variables*/

int countValue;

int upperCase = 0;

int lowerCase = 0;

int digitCompute = 0;

/*loop to check through each of the validation*/

for (countValue = 0; countValue < 6; countValue++)

{

/*checks isUpper case*/

if (isupper(passwordValidate[countValue]))

{

upperCase++;

}

/*checks islowercase*/

else if (islower(passwordValidate[countValue]))

{

lowerCase++;

}

/*checks whether it is digit or not*/

else if (isdigit(passwordValidate[countValue]))

{

digitCompute++;

}

}

/*validates the upper case*/

if (upperCase == 0)

{

cout << "NO UPPERCASE CASE, PLEASE TRY AGAIN ";

cin >> passwordValidate;

}

/*check the lower case*/

else if (lowerCase == 0)

{

cout << "NO LOWERCASE CASE, PLEASE TRY AGAIN ";

cin >> passwordValidate;

}

/*checks whether it is a digit*/

else if (digitCompute == 0)

{

cout << "NO DIGITE, PLEASE TRY AGAIN ";

cin >> passwordValidate;

}

See more about C++ at brainly.com/question/29225072

#SPJ1

31
What is the different between Diaster.
and data inters integrity.

Answers

A disaster is a catastrophic event, typically one that is sudden and damaging.The accuracy and completeness of data are defined as data integrity.

What do you mean by Data integrity?
Data integrity
is a crucial component of the design, implementation, and use of any system that stores, processes, or retrieves data. It is the preservation and assurance of data accuracy and consistency over the course of its full life-cycle. The phrase has a wide range of applications and can signify quite different things depending on the situation, even within the same broad computing context. Data integrity requires data validation, which is sometimes used as a stand-in for data quality. The opposite of data corruption is data integrity. Any data integrity technique has the same main goal: to make sure data is recorded exactly as intended. Additionally, make sure the information is accurate when it is later retrieved.

To learn more about Data integrity
https://brainly.com/question/14127696
#SPJ1

In computer science, decomposition is breaking a problem down into sub-problems and smaller parts.
TRUE OR FALSE

Answers

Answer:

!TRUE!

Explanation:

It involves breaking down a complex problem or system into smaller parts that are more manageable and easier to understand. The smaller parts can then be examined and solved, or designed individually, as they are simpler to work with.

Which phrase best describes the hardware layer of computing abstraction?
A. The physical components of a computing system
B. The interface that allows users to run programs
C. The programs that give computers instructions
D. The system that manages a device's resources

Answers

Answer:

A. The physical components of a computing system

Explanation:

think of hardware like the hard, physical, tangible parts of your computer. hope this helped!!

"Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), random access memory (RAM), monitor, mouse, etc..."

1. Identify at least 3 security vulnerabilities on the HQ LAN.

Answers

There are numerous types of network vulnerabilities, but the following are the most prevalent and The three security vulnerabilities of the LAN are Malware, Outdated or unpatched software and Misconfigured firewalls.

Common LAN Network Security Issues :

Internal Security Threats: Human error accounts for more than 90% of cyberattacks. Instances of this include phishing scams, hasty decisions, using unsecure passwords, and more.

Distributed Denial-Of-Service (DDoS) Attacks: Websites that are subjected to DDoS attacks frequently crash, have technical difficulties, or load slowly. Cybercriminals infect internet-connected devices (such as computers, smartphones, and other devices) in these situations, turning them into bots. The bots are sent to a victim's IP address by hackers.

Malware: Malware are malicious software applications that are used to gather data on victims from infected devices. After successful deployments, hackers can mine devices for sensitive data (such as email addresses, bank account numbers, and passwords) and use it for identity theft, extortion, or other damaging business practices.

To know more about LAN, visit: https://brainly.com/question/8118353

#SPJ9

The hardware components that write data to storage media storage devices true or false

Answers

Answer:

True

Explanation:

i think i am right computer forever

A teacher has five students who have taken four tests. The ten her uses the following grading scale to assign a letter grade to a student, based on the average of his or her four test scores:
Write a class that uses a string array to hold the five students' names, an array of five characters to hold the five students' letter grades, and five arrays of four doubles each to hold each student's set of test scores. The class should have methods that return a specific student's name, the average test score, and a letter grade based on the average.
Demonstrate the class in a program that allows the user to enter each student's name and his or her four test scores. It should then display each student's average test score and letter grade.
Input Validation: Do not accept test scores less than zero or greater than 100.

Answers

The program for the class will be:

import java.util.Scanner;

class Gradecalculator

{

static String [] names=new String[5];

static char [] grades=new char[5];

static double [][] testscore=new double[5][4];

protected char[] calculate(double [][] testscore)

{

double total[]=new double[5];

for(int i=0;i<5;i++)

{

for(int j=0;j<4;j++)

{

total[i]=0;

}

}

for(int i=0;i<5;i++)

{

for(int j=0;j<4;j++)

{

total[i]=total[i]+testscore[i][j];

}

}

for(int i=0;i<5;i++)

{

total[i]=total[i]/4;

}

for(int i=0;i<5;i++)

{

if(total[i]>=90&&total[i]<=100)

grades[i]='A';

else if(total[i]>=80&&total[i]<90)

grades[i]='B';

else if(total[i]>=70&&total[i]<80)

grades[i]='C';

else if(total[i]>=60&&total[i]<70)

grades[i]='D';

else

grades[i]='F';

}

return(grades);

}

}

public class Grade extends Gradecalculator {

public static void main(String[] args) {

Scanner sc=new Scanner(System.in);

Grade ob=new Grade();

System.out.println("enter the name of students");

for(int i=0;i<5;i++)

{

System.out.println((i+1)+"student");

names[i]= sc.nextLine();

}

System.out.println("enter the test scores of students");

for(int i=0;i<5;i++)

{

System.out.println("STUDENT "+(i+1));

for(int j=0;j<4;j++)

{

System.out.println("TEST "+(j+1));

testscore[i][j]=sc.nextDouble();

if(testscore[i][j]>100)

{

System.out.println("in appropriate value TRY AGAIN");

j--;

continue;

}

}

}

System.out.println

("OK INPUT COMPLETE WANT TO KNOW THE FULL RESULTS Y/N");

String resp=sc.next();

ob.calculate(testscore);

if(resp.equals("Y"))

{

System.out.println("------------DISPLAYING RESULTS-----------") ;

System.out.println("STUDENT NAME \t\t GRADES");

for(int i=0;i<5;i++)

{

System.out.println(names[i]+"\t\t"+grades[i]);

}

System.out.println("want to check individual scores \n enter the student number");

int n=sc.nextInt();

try

{

System.out.println("STUDENT NAME "+names[n-1]+" GRADES "+grades[n-1]);

System.out.println("INDIVIDUAL TEST SCORES");

for(int i=0;i<4;i++)

{

System.out.println(testscore[n-1][i]);

}

}

catch(Exception e)

{

System.out.println("this student does not exist");

}

}

else

{

System.out.println("CLOSING");

}

}

}

What is a program?

A computer program is a set of instructions written in a programming language that a computer can execute.

Software includes computer programs as well as documentation and other intangible components. Source code refers to a computer program in its human-readable form.

In this case, the class in a program that allows the user to enter each student's name and his or her four test scores is illustrated.

Learn more about program on:

https://brainly.com/question/26642771

#SPJ1

Write a program to input student's
name,marks obtained in four different
subjects, find the total and average marks in Qbasic

Answers

The program to input the student's name and marks obtained in four different subjects, find the total and average marks in Qbasic:

CLS

INPUT " Student Name ";  S

INPUT " English Marks ";  EM

INPUT " Maths Marks "; MM

INPUT " History Marks "; HM

INPUT " Geography Marks "; GM

INPUT " Marks in Total "; MT

LET TMS = EM + MM + HM + GM

LET p = TMS / MT * 100

PRINT " Student name is "; S

PRINT " Total "; TMS

PRINT " Percentage " ; p

END

What is QBasic?

QBasic is an integrated programming environment and interpreter for a number of QuickBASIC-based BASIC dialects. When code is entered into the IDE, it is first compiled into an intermediate representation (IR), which the IDE then executes on demand.

QBasic is incredibly simple to learn, use, and can construct corporate applications, games, and even basic databases. It provides commands like SET, CIRCLE, LINE, and others that let programmers draw using Qbasic.

To learn more about QBasic, use the link given
https://brainly.com/question/20702575
#SPJ1

HELP

Patents, trademarks, and copyrights protect _____.
a) women
b) waivers
c) intellectual property
d) netiquette

Answers

Answer: C) Intellectual Property

Answer:

THE ANSWER IS C

Explanation:

Write an algorithm program to accepts two students score and print out who save the greater score

Answers

An algorithm is a set of clear instructions for solving a specific problem in computer programming. It generates the desired output from a set of inputs. And here the desired inputs are the scores of two students.

Algorithm to print greater score:

START

Take input Score from Student1 and assign it to Score1.

Take input Score from Student1 and assign it to Score2.

Compare the Score1 and Score2.

Assign the larger score value to Max_Score

Print Max_Score

END

What is Algorithm?

An algorithm is a set of instructions, or a set of rules to adhere to, for carrying out a particular task or resolving a particular issue. In the ninth century, the term algorithm was first used. There are algorithms all around us.

For example,

An algorithm to add two numbers:

Take two number inputs

Add numbers using the + operator

Display the result

To know more about Algorithm, visit: https://brainly.com/question/13800096

#SPJ9

Which of the following statements is false? a javascript identifier

a is case-sensitive
b. can start with a $ sign
c. can start with a number
d. can be more than 128 characters long

Answers

The statement that is false about javascript identifier is option C: can start with a number

What makes an identifier in JavaScript valid?

A variable, function, or property's identifier is a string of characters in the code. Identifiers in JavaScript can contain Unicode letters, $, _, and digits (0–9) but cannot begin with a digit. They are also case-sensitive. 20

Therefore, Generally speaking, a JavaScript identifier begins with a letter, an underscore (_), or a dollar symbol ($). The following characters may also be numbers ( 0 – 9 ). Because of the case sensitivity of JavaScript, letters consist of the characters A through.

Learn more about javascript identifier from

https://brainly.com/question/28822900
#SPJ1

Other Questions
1. A mineral sample is found to have a density of3.0 grams per cubic centimeter. It is then brokeninto two pieces, with one piece twice as large asthe other. The smaller of the two pieces willhave a density of(1) 1.0 g/cm(2) 1.5 g/cm(3) 3.0 g/cm(4) 6.0 g/cm who is the secretary of state? Why were militarist and fascist leaders able to rise to power after wwi and in the years leading up to wwii? At which stage of friendship do people begin to think of themselves as friends and their communication becomes more personal? How many people participate in the Macys Thanksgiving Day Parade each year? When the Pilgrims landed, they knew they needed to keep order.The was a formal document that set up agovernment. The people of Plymouth governed themselves, andbecame part of the colony called .. The slogans "coolest jeans" and "worlds best subs" are examples of ________blank, which is the legal exaggeration of praise lavished on a product that stops just short of deception. If h(x) = -2x + 10, what is the value of x when h(x) = 2 The big surprise about the first planet discovered around another regular star was that it. How do you think global terrorim affected Ilam a a religion in the eye of the world? Why do you think Meg feels like an oddball? ( In a wrinkle in time ) suppose that $36,000 is deposited in an account and the balance increases to $39,786.15 after 2.5 years. how long will it take for the account to grow to $51,806.67? Assume continous compoundingIt will take about _ years for $36,000 to grow to $51,806.67 The atomic models after Daltons time included ideas about the atomic structure. Find the exact value of the expression. Do not use a calculator.sin 79-cos 11I got 0. I'm not sure if that's right. 4. Some people with spinal cord injuries do not sweat below the area of injury. Without the ability to sweat, the human body temperature begins to rise. Which statement would best describe this situation?A) Feedback mechanisms regulate blood sugar levels.B) Genetic mutations increase.C) ATP energy is not available.D) The dynamic equilibrium is broken. what are the functions of the federal reserve To what extent did the Fall of Rome impact the culture of medieval Europe?(NEED HELP QUICKLY!!!) PLEASE HELPPPPPIn the novel Dracula, how did Bram Stoker explore the intersection between religion and science? According to freud, when martin accidentally said, "nice to beat you" while being introduced to his friends acquaintance on the opposing soccer team instead of "nice to meet you," martins unconscious desires were revealed. This is called a/an. Which of the following sentences contains synecdoche?Will you please get me a Band-aid for my cut?I cannot make it to the meeting, so will you go and be my eyes and ears?The police are going to be investigating the crime.All of the choices are correct.