There are two circular grounds Ground-A and Ground-B. Ground-A is having diameter of 15 meters and Ground-B is having diameter of 20 meters. Mohsin is running in Ground-A and Neetesh is running in Ground-B. Write a program in C++ that asks the user to input the time taken, in seconds, to complete one compete round of the ground by both the friends and displays who is running faster.

Answers

Answer 1

Answer:

A

Explanation:

b/c the round of 'A' is less than ruond of'B'


Related Questions

Write a program that takes a date as input and outputs the date's season. The input is an integer to represent the month and an integer to represent the day. Ex: If the input is: 4 11 the output is: spring In addition, check if both integers are valid (an actual month and day). Ex: If the input is: 14 65 the output is: invalid The dates for each season are: spring: March 20 - June 20 summer: June 21 - September 21 autumn: September 22 - December 20 winter: December 21 - March 19

Answers

Answer:

Explanation:

The following program is written in Java. It is a function that takes in the two parameters, combines them as a String, turns the combined String back into an integer, and uses a series of IF statements to check the parameters and determine which season it belongs to. Then it prints the season to the screen. The code has been tested with the example provided in the question and the output can be seen in the attached image below.

class Brainly {

   public static void main(String[] args) {

       getSeason(4, 65);

       getSeason(4, 11);

   }

   public static void getSeason(int month, int day) {

       String combined = String.valueOf(month) + String.valueOf(day);

       int combinedInt = Integer.parseInt(combined);

       if ((month > 0 && month < 12) && (day > 0 && day < 31)) {

           if ((combinedInt >= 320) && (combinedInt <= 620)) {

               System.out.println("The Season is Spring");

           } else if ((combinedInt >= 621) && (combinedInt <= 921)) {

               System.out.println("The Season is Summer");

           } else if ((combinedInt >= 922) && (combinedInt <= 1220)) {

               System.out.println("The season is Autumn");

           } else {

               System.out.println("The Season is Winter");

           }

       } else {

           System.out.println("Invalid date");

       }

   }

}

if you want to present slides to fellow students or co workers, which productivity software should you use

Answers

Answer:

Power point is a good software to use for slides

Select the pseudo-code that corresponds to the following assembly code. Assume that the variables a, b, c, and d are initialized elsewhere in the program. You may want to review the usage of EAX, AH, and AL (IA32 registers). Also recall that the inequality a > b is equivalent to b < a. i.e. If A is greater than B, that's equivalent to saying that B is less than A.
.data
; General purpose variables
a DWORD ?
b DWORD ?
c BYTE ?
d BYTE ?
upperLevel DWORD 18
lowerLevel DWORD 3
; Strings
yes BYTE "Yes",0
no BYTE "No",0
maybe BYTE "Maybe",0
code
main PROC
mov eax, 1
cmp AH, c
jg option1
jmp option3
option1:
mov edx, OFFSET yes
call WriteString
jmp endOfProgram
option2:
mov edx, OFFSET no
call WriteString
jmp endOfProgram
option3:
mov edx, OFFSET maybe
call WriteString
endOfProgram:
exit
main ENDP
END main
a) if (c > 0)
print (yes);
else
print (maybe);
b) if (c < 0)
print (yes);
else
print (maybe);
c) if (c < 1)
print (yes);
else
print (maybe);
d) if (c > 1)
print (yes);
else
print (maybe);

Answers

Answer:

ae

Explanation:

The pseudo-code that corresponds to the given assembly code is:

b) if (c < 0)

print (yes);

else

print (maybe);

What is the pseudo-code

In assembly code, the command cmp AH, c checks if the high byte of the EAX register (AH) has the same value as the variable c. Then, if the value in AH is more than the value in c, the instruction jg option1 will move to option1.

Therefore, In the pseudo-code, one can check if c is smaller than 0. If it happens, we say "yes". If not, we say "maybe"

Read more about   pseudo-code here:

https://brainly.com/question/24953880

#SPJ2

Which one of the following does not contain information?
1) A weather report
2) A time table
3) A price list displayed in a supermarket
4) An unlabeled chart

Answers

Answer:4




Explanation: common sense

Answer:

4

Explanation:

4 is the ans as weather;timtable and price list display information

A technology company starts a program dedicated to training high school students in the use of the latest computer programming languages. How can the company justify creating and funding such a program since it is not about its primary products

Answers

Answer:

The answer is "Spending the money can improve the company's reputation and attract new personnel with the necessary abilities".

Explanation:

In many cases, companies engage in activities tangential to their principal service or brand. As more than just a result, the purpose is to boost the company's reputation and at the same time raising societal awareness.

To strengthen its very own business reputation and to create future employees by teaching necessary skills, a technology organization may be established throughout the given case.

Every one of these initiatives helps to boost the brand's reputation & image, as well as the customer's confidence.

1. Open the start file EX2019-ChallengeYourself-9-3. The file will be renamed automatically to include your name. Change the project file name if directed to do so by your instructor, and save it.
2. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the top of the workbook so you can modify the workbook.
3. Use Consolidate to create a summary of real estate sales for all property types. Place the consolidated data on the Summary worksheet in cells B3: C15. Use the Average function to consolidate the data from cells B2: C14 in the Condo, Townhouse, and Single Family worksheets. Include links to the source data.
4. Import individual sales data from the tab-delimited text file Select Sales Data 2019-2020. Import the data as a table in cell A1 of the Select Sales worksheet.
5. Remove the data connection when the import is complete.
6. In the Select Sales worksheet, add data validation to restrict values in the House Type columns (cells B2: B139) to the values in the cell range named PropertyTypes. Include a drop-down list of values in the cells to assist in data correction.
7. Add the following input message to cells B2:B139: Select a property type from the list.
8. Add the following error alert to cells B2:B139: Not a valid property type.
9. Apply data validation circles to any values that violate the data validation rules you just created.
10. Add a comment to cell B1 in the Select Sales worksheet that reads: This needs to be fixed.
11. Add a hyperlink from cell B1 in the Select Sales worksheet to link to the named range (defined name) PropertyTypes. Test the link.
12. Use Flash Fill to add a new column of data to the Select Sales worksheet to display the number of bedrooms/the number of bathrooms.
a. In the Select Sales worksheet, cell F1, type the heading: BR/BA
b. Complete the column of data using this pattern in cell F2: 1 BR/1 BA
You will need to enter at least two samples in order for Flash Fill to suggest the correct autofill data. Check your work carefully.
Sales Summary 2019-2020
Number of Sales Average Selling Price
1
2
3 One BR, One BA
4 One BR, Two BA +
5 Two BR, One BA
6 Two BR, Two BA
7 Two BR, Two BA +
8 Three BR, One BA
9 Three BR, Two BA
10 Three BR, Three BA +
11 Four BR, One BA
12 Four BR, Two BA
13 Four BR, Three BA+
14 Five BR-. One BA
15 Five BR+ Two BA+
16
17
18
19
20
21
22
23
24

Answers

Answer:

Omg what is this

soooo long questionn

i am fainted

what rubbish you written how long the question is of which subject

what's your name

Explain the purpose of the open() and close() operations.

Answers

Answer:

The open() operation notifies the system that the named file is about to become active. The close() operation notifies the system that the named file is no longer in active use by the user who issued the close operation.

how can I order the prices negatively affect other producers of goods and services​

Answers

Scarcity of availability causes producers to either charge
higher prices or to produce more goods and services (like energy
production, cars, paper, etc.)

Create a function, return type: char parameters: int *, int * Inside the function, ask for two integers. Set the user responses to the int * parameters. Prompt the user for a character. Get their response as a single character and return that from the function. In main Define three variables and call your function. Print values of your variables

Answers

Answer and Explanation:

In C programming language:

char fun(int*a, int*b){

printf("enter two integers: ");

scanf("%d%d",a,b);

int e;

printf("please enter a character: ");

e=getchar();

return e;

}

int main(int argc, char *argv[]) {

int d;

int f;

int g;

fun();

printf("%d%d%d", d, f, g);

}

We have declared a function fun type char above and called it in main. Note how he use the getchar function in c which reads the next available character(after the user inputs with printf()) and returns it as an integer. We then return the variable e holding the integer value as char fun() return value.

_________ are standard devices, such as switches and routers, that have small onboard computers to monitor traffic flows through the device as well as the status of the device and other devices connected to it

Answers

Answer:

Managed devices

Explanation:

hope it helps u

Compare and contrast traditional and cloud data backup methods. Assignment Requirements You are an experienced employee of the DigiFirm Investigation Company. Chris, your team leader, explains that your biggest client, Major Corporation, is evaluating how they back up their data. Chris needs you to write a report that compares traditional backup methods to those provided by a cloud service provider, including the security of cloud services versus traditional forms of on-site and off-site backup. For this assignment: 1. Research both traditional and cloud data backup methods. 2. Write a paper that compares the two. Make sure that you include the security of cloud services versus traditional forms of on-site and off-site backup. Required Resources Course textbook Internet Submission Requirements Format: Microsoft Word Font: Arial, size 12, double-space Citation Style: Follow your school's preferred style guide Length: 1-2 pages If-Assessment Checklist I researched both traditional and cloud data backup methods. I wrote a report that compares the two. I included the security of cloud services versus traditional forms of on-site and off-site backup. I organized the information appropriately and clearly. . I created a professional, well-developed report with proper documentation, grammar, spelling, and nunctuation

Answers

Answer:

Ensures all database elements are known and secured through inventory and security protocols. Catalogs databases, backups, users, and accesses as well as checks permissioning, data sovereignty, encryption, and security rules. 

Security Risk Scoring

Proprietary Risk Assessment relays the security posture of an organization's databases at-a-glance through risk scores.

 Operational Security

Discovers and mitigates internal and external threats in real time through Database Activity Monitoring plus alerting and reporting. Identifies and tracks behavior while looking for anomalous activity internally and externally.

Database Activity Monitoring

Monitors 1 to 1,000+ databases simultaneously, synthesizing internal and external activity into a unified console.

Only by covering both of these areas can organizations have defense in depth and effectively control risk.

How do i connect WiFi on windows xp without icon?

Answers

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

Answer:

Right click anywhere on your taskbar, and then click Properties. Step 2: Find and click the Notification Area tab on the top bar, and then find the section labeled with System icons, check the checkbox for Network. Last, click OK to finish it.

Hello everybody,
For the quiz questions, I tried using the circular method, but got a numeric, period or comma error?
So I tried using the solver to find the same solution I got, but when I entered it in the answer box, he always said incorrectly.
Any help would be highly appreciated and write the results here, why do I have to read the solution quiz because I was wrong? thank you.


The bisection method is being used to calculate the zero of the following function between x = 0 and x = 1.
What is the midpoint for the 3rd iteration? (The midpoint for the 1st iteration is 0.5.) Provide your answer rounded to the thousandths place.

Answers

Answer:

i don't know the answer please tell me

1. Write an application that throws and catches an ArithmeticException when you attempt to take the square root of a negative value. Prompt the user for an input value and try the Math.sqrt() method on it. The application either displays the square root or catches the thrown Exception and displays an appropriate message. Save the file as SqrtException.java.
2. Create a ProductException class whose constructor receives a String that
consists of a product number and price. Save the file as ProductException.java.
Create a Product class with two fields, productNum and price. The Product
constructor requires values for both fields. Upon construction, throw a
ProductException if the product number does not consist of three digits, if the
price is less than $0.01, or if the price is over $1,000. Save the class as Product.java.
Write an application that establishes at least four Product objects with valid and invalid values. Display an appropriate message when a Product object is created
successfully and when one is not. Save the file as ThrowProductException.java.

Answers

Answer:

Hence the answer is given as follows,

Given a constant named size with a value of 5, which statement can you use to define and initialize an array of doubles named gallons with 5 elements? a. double gallons[size] = { 12.75, 14.87, 9.74, 6.99, 15.48 }; b. double gallons[size] { 12.75, 14.87, 9.74, 6.99, 15.48 }; c. double gallons[] { 12.75, 14.87, 9.74, 6.99, 15.48 }; d. all of the above e. a and b only

Answers

Answer:

all of the above

If you were driving the blue Prius in the situation pictured above, explain why the red Mustang should be given right-of-way at this intersection.

Answers

Answer:

The red Mustang should be given the right-of-way at this intersection because:

The red Mustang arrived first before the blue Prius and is closer to the stop sign before the arrival of the blue Prius.  This implies that the red Mustang must have waited for its turn, unlike the blue Prius that just arrived at the intersection.

Explanation:

Traffic laws, regulations, and IPDE defensive driving strategy require that drivers always give way to the vehicle that arrived before them at an intersection.   Assuming that multiple vehicles reach the intersection simultaneously, then the vehicle must be given the right-of-way.  Alternatively, the traffic lights at the intersection should be obeyed and be allowed to regulate the movement of vehicles.  IPDE defensive driving strategy requires drivers to be watchful of their driving spaces to determine the appropriate time to move.

when was first generation of computer invented? ​

Answers

Introduction: 1946-1959 is the period of first generation computer. J.P.Eckert and J.W. Mauchy invented the first successful electronic computer called ENIAC, ENIAC stands for “Electronic Numeric Integrated And Calculator”.

Chất xơ có nhiều trong thực phẩm nào?

Answers

Answer:

Quả lê Quả lê là một loại trái cây phổ biến vừa ngon vừa bổ dưỡng. ...

Quả dâu tây. Dâu tây là loại quả cực kỳ ngon. ...

Quả bơ Quả bơ khác hơn so với hầu hết các loại trái cây. ...

Quả táo. ...

Quả mâm xôi. ...

Quả chuối. ...

Cà rốt. ...

Củ cải đường.

Convert the following denary numbers into
binary (using both methods):
a 41
b 67
C 86
d 100
e 111
f 127
g 144
h 189
i 200
j 255

Answers

Answer:

101001

1000011

1010110

1100100

1101111

1111111

10010000

10111101

11001000

11111111

Write an algorithm to find the sum of the following series:
a) 1+x+x^2+x^3+...+x^20
b) 1-x+x^2-x^3+...+x^20
c) 1+x/2+(x²)/3+(x^3)/4+...+(x^20)/21

Answers

Answer:

The algorithm is as follows:

Input x

sum_a = 0

sum_b = 0

sum_c = 0

for i = 0 to 20

   sum_a = sum_a + x^i

   sum_b = sum_b + (-x)^i

   sum_c = sum_c + x^i/(i+1)

print sum_a, sum_b, sum_c

Explanation:

Required

An algorithm to solve (a), (b) and (c)

For Series (a):

This series is a geometric progression and the common ratio is x

i.e.

[tex]r = x/1 = x^2/x = ...... = x^{n+1}/x^n =x[/tex]

So, the sum of the series is:

Sum = Previous Sums + x^i --- where i is between 0 and 20 (inclusive)

For Series (b):

This series is a geometric progression and the common ratio is -x

i.e.

[tex]r = -x/1 = -x^2/x = ...... = -(x^{n+1}/x^n) = -x[/tex]

So, the sum of the series is:

Sum = Previous Sums + (-x^i) --- where i is between 0 and 20 (inclusive)

For Series (c):

This series is a neither arithmetic nor geometric progression.

It obeys the following rule:

[tex]\frac{x^i}{1+i}[/tex]  --- where i is between 0 and 20 (inclusive)

So, the sum of the series is:

Sum = Previous Sums + [tex]\frac{x^i}{1+i}[/tex]

Write a game that performs the roll of two dice randomly. The game should first ask for a target sum. Everytime the player enters r, the program should repeatedly print the side of the dice on a separate line. The game should stop prompting if one of these two events occur: -The sum of the two sides is equal to the target sum. -The player enters q.

Answers

Answer:

Explanation:

The following program was written in Java. It asks the user to first enter the target sum. Then it creates a while loop that continues asking the user to either roll dice or quit. If they decide to roll, it rolls the dice and prints out both values. If the target sum was hit, it prints that out and exits the program otherwise it loops again. The code has been tested and can be seen in the attached image below.

import java.util.Random;

import java.util.Scanner;

class Brainly {

   public static void main(String[] args) {

       Random rand = new Random();

       Scanner in = new Scanner(System.in);

       System.out.print("Enter Target Sum: ");

       int targetSum = in.nextInt();

       while (true) {

           System.out.println("r: Roll Again");

           System.out.println("q: Quit");

           String choice = in.next();

           char choiceModified = choice.toLowerCase().charAt(0);

           if (choiceModified == 'r') {

               int roll1 = rand.nextInt(6) + 1;

               int roll2 = rand.nextInt(6) + 1;

               int total = roll1 + roll2;

               System.out.println("Dice 1: " + roll1);

               System.out.println("Dice 2: " + roll2);

               if (total == targetSum) {

                   System.out.println("Target Sum of " + targetSum + " hit.");

                   break;

               }

           } else if (choiceModified =='q') {

               break;

           } else {

               System.out.println("Wrong choice");

           }

       }

   }

}

If x=3.123, then int(x) will give ?

Answers

Answer:

3

Explanation:

int(x)=3

int(x) rounds to the smallest whole number

For example,

if you say int(3.99) it is also 3

Irene llegó tarde al colegio_______________
ayúdenme


^_^^_^^_^^_^^_^^_^^_^^_^^_^​

Answers

Answer:

Explanation:

Absconding

If your organization hires a new employee, what would you do to create a user account in the Linux system and add the account to a group? What commands would you use? What configuration files would you check and modify?

Answers

Following are the responses to this question:

The user account is "olivia".In the Linux system to see the account go to the "/home directory".For the configuration file we use ".bash_logout , .bash_profile, and .bashrc" files.

Creating users:

We will use the useradd command to achieve this. Using that same command, you can create users who would log in or customers who would log in (in the case of creating a user for a software installation).

In its basic form, the command is as follows:

[Options] useradd username

Take this user olivia, for instance. Assuming that you had been to issue the command prompt:

olivia has become a user.

Users are added to the system without the need for a home directory and are unable to log on. It if we were using this rather than running the command without arguments?

sudo using useradd -m olivia

Using the command above, a new user would be created, including a home directory that corresponded to the username. That means that you might now see the name "olivia" in the directory "/home".

But what about the lockout concern that was raised earlier? Both these methods are possible. After creating the user, you can enter the following command:

Password for olivia is: sudo passwd olivia

You'll be requested to enter & verify your new password once you've completed the process. This unlocks the user profile, allowing them to log in.

This command might look like if you wanted to accomplish it in one go:

sudo useradd -m olivia -p PASSWORD

You should be using Passcodes as the login for the user olivia.

As soon as the user logs in, he or she can update their account password by using the password command to input their current password, and afterward entering/verifying their new one.

To create a user that has no personal account and cannot log in, execute the following instructions:

sudo use useradd as  the-M USERNAME ​sudo use usermod as the -L USERNAME

The user to be added is identified by USERNAME.

It establishes a user with really no root folder and prevents them from signing in with a second operation.

To add an existing user to a group on Linux, follow the instructions:

As root, log in to your accountUse the useradd instruction to add a new user (for example, useradd roman)If you'd like to log on as a new customer, type su plus that user's name.Entering the word "exit" will logout you from your account.

Another way to add a user to a group under Linux would be to use the following syntax:

Alternatively, you can use the usermod command.The name of the club should be substituted for example group in this sentence.Example username should be replaced with the name of the user you'd like added.

The following operations are performed when a new login is added to the system.

The user's home directory (/home/username by default) is now created.To set configuration files for the user's session, the following secret files are copied into another user's home directory.

.bash_logout

.bash_profile

.bashrc

/var/spool/mail/username includes the user's mail spool.The new user account is arranged in groups with the same name.

Learn more:

Linux system: brainly.com/question/13843535

During the testing phase of an ERP system, the system implementation assurers should review: Group of answer choices Program change requests Vendor contracts Error reports Configuration design specifications

Answers

Answer:

Error reports

Explanation:

ERP is a multimodal software system that integrates all business processes and the function's of the entire organizations into  single software system using a one database.

Write a c program that asks the user
to enter distance in KM and Petrol Price in Rs.
Program should compute estimated budget for
the travel distance (Assume your car covers 100
KM in 8 Liters of fuel). Program should run in a
loop and ask the user “Do you want to
continue?”. If user enters ‘y’ or ‘Y’ program
should repeat otherwise terminate.

Answers

Answer:

#include <stdio.h>

int main()  

{

int x;

float y;

printf("Input total distance in km: ");

scanf("%d",&x);

printf("Input total fuel spent in liters: ");

scanf("%f", &y);

printf("Average consumption (km/lt) %.3f ",x/y);

printf("\n");

return 0;

}

DESCRIBE THE GENERAL STRATEGY BEHIND DEALOCK PREVENTION AND GIVE A PRATICAL EXAMPLE

Answers

Answer:

........

Explanation:..........

(True/False). In an "ID" column with the data type INTEGER PRIMARY KEY, each value entered for the ID must be unique.

Answers

Answer:

The answer is "True".

Explanation:

The key to a relational database that is unique for each data record is a primary key, also called a primary keyword.This unique identifier, including a driver's license name, telephone number, or vehicle identification number. This is an identifier (VIN).There must always be the only primary key in such a relational database.This is a specific relational database field (or column combination) that identifies each table entry in a unique way.It utilized it to swiftly analyze the data within the table as a unique identifier.

(1)similarities between backspace key and delete key. (2) different between backspace key and delete key. (3) explain the term ergonomics. (4) explain the following. a click b right click c double click d triple click e drag and drop​

Answers

Answer:

1.similarity:

they are both editing keys

3.ergonomics are designed keying devices that alleviates wrist strain experienced when using ordinary keyboard for long hours

4.

.a click is pressing and releasing the left mouse button onceright click is pressing the right mouse button once to display a short cut menu with commands from which a user can make a selectiondouble click is pressing the left button twice in rapid successiondrag and drop is where by the user drags an icon or item from one location on the screen to another.

What is meant by usability and what characteristics of an interface are used to assess a system’s usability?

Answers

Answer:

The answer is below

Explanation:

Usability is a term that describes the assessment of the performance of a system in assisting the task of the user, or how effective a certain product system or design supports the task of a user in accomplishing a set out objective as desired.

The characteristics of an interface that are used to assess a system’s usability are:

1. Effectiveness

2. Efficiency

3. Error Tolerance

4. Engagement

5. Ease of Learning and Navigation

Other Questions
What is the midpoint of the segment shown below?10O A. (-1,-1)(-11, 0)O B. (-2, -3)O C. (-1, -3)- 1010(9,-1)- 10D. (-2, -1) what is the reason for being the whole world like a house. Which behavior would best describe someone who has integrity ? a) Alerting a supervisor when a coworker comes in late b) Putting off tough tasks until the last minute c) through following on a promise d) Signing in for a coworker who's running late Consider five individuals with different occupations. Allen prepares taxes wants ribs Betty does dry cleaning wants computer fixed Calvin fixes computers wants bread Diedre bakes bread wants taxes prepared Eric barbecues ribs wants dry cleaning If this economy has money a. Allen will buy from Betty b. Betty will buy from Calvin c. Eric will buy from Allen d. None of the above are correct. Find the perimeter of the following figure. What is the measure of If d= the number of dogs ,which variable expression represents the phase below? The sun of the number of dogs and the 6 cats 13. Which of the following is NOT true with regard to statistics on health risks?a. Correlation does not necessarily mean causation.b. There is a difference between statistical significance and practical significance.c. Consider base rates when evaluating probabilities.d. Large samples often lead to strong relationships of practical importance. Find the length of the missing side When the system pressures are lower than the pressure in the refrigerant tank, such as when the system has just been evacuated or if the system is out of refrigerant, refrigerant can be added to both the high and low pressure sides of the system. A. True B. False Given that the temperature of a body is 527K determine the value in degree C Using a condom consistently and correctly is 98 to 99% effective against HIV describe in detail how enzymes function using pectinase as an example A washer and a dryer cost $858 combined. The washer costs $92 less than the dryer. What is the cost of the dryer? Do force change taste of body Find the missing segment in the image below if PQR measures 75 , what is the measure of SQR Discuss the DMA process Eddie, a Mexican, is a college student at Oklahoma City. He is good in studies and finishes all his college assignments on time. His White American classmates are amused at his sincerity. They think that Eddie is an exception to all Mexicans as he is not lazy like other Mexicans. The assumption of Eddie's classmates about Mexicans represents ________. (plz help me plz plz )what does the author reveal about his background in the first paragraph ."friends of mines confess over dinner that they put spyware on their 15 year old son consider?