3. Write the qbasic program for following:
[10]
a) To find square of 3.
b) To print and display square and cube of 4.
c) To print and display simple interest where principle is 4000 rs, time is 2 years and
rate is 5%.
d) To find sum, subtract, product and division of 8 and 4
e) To find and print sum and product of two input numbers.


it's a really important assignment and I will need all the answer. I will follow, give 5 star and a heart for the first person who gives the answer. please be quick. it is important​

Answers

Answer 1

Answer:

Hi there!!!

I hope it helps you...

3. Write The Qbasic Program For Following:[10]a) To Find Square Of 3.b) To Print And Display Square And
3. Write The Qbasic Program For Following:[10]a) To Find Square Of 3.b) To Print And Display Square And
3. Write The Qbasic Program For Following:[10]a) To Find Square Of 3.b) To Print And Display Square And
3. Write The Qbasic Program For Following:[10]a) To Find Square Of 3.b) To Print And Display Square And

Related Questions

Ryan is creating a website for an automobile company. He wants to include media files on the web page and make the page appealing to the viewers.
​Ryan wants a particular embedded media clip to automatically restart when it has finished playing. Which of the following HTML audio and video element attributes must Ryan include in his code to accomplish this?
A. ​src
B. ​loop
C. ​controls
D. ​preload

Answers

Answer:

I think it's preload :P

Explanation:

But just be sure with some sources ok ! :♡

write some Drawbacks of the internet

Answers

Explanation:

Computer Virus can spread.

Data can be hacked.

It has made peoples lazy

It cannot work about electricity and mobile and computer like devices

..

Thank me if you like.. and follow me..

The internet is like a double-edged sword. It can be used as a study tool, and is full of an endless amount of information. Additionally, programs such as email allow the communication of ideas to be faster than ever before. The internet has increased globalization by a large amount. However, the internet can also be a huge distraction. Social media and games can make the younger generations more self conscious and wanting more instant gratification. Nonetheless, the internet is something that has forever changed both society as a whole and the way each person sees the world.

Instead of using the automatic toString() method with your classes, it is usually more useful to write your own ____ version of the toString()method that displays some or all of the data field values for the object with which you use it.
a. overloaded
b. static
c. protected
d. condensed

Answers

Answer:

The answer is "Option a"

Explanation:

The overloading is the most essential aspect in the java programming This function can achieve different features with the same method term. To obtain the required information fields or entity type, the toString() function is overloaded, and the wrong choice can be defined as follows:

In option b, It is wrong because it is a keyword.In option c, It is wrong because it is an access modifier.In option d, It is wrong because it is a type of programming.

GuardIN is an IT security firm. It deals with highly secure data for a wide variety of software and e-commerce agreements, trademark licenses, and patent licenses. GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself. The cloud also needs to be designed in such a way that all users of the organization can access it without any lag. Which of the following cloud computing options would be most suitable for GuardIN?
A) A public cloud
B) A community cloud
C) A hybrid cloud
D) A private cloud

Answers

Answer:

D) A private cloud

Explanation:

Note we are told that GuardIN needs a cloud computing option that would allow it to purchase and maintain the software and infrastructure itself.

Thus, to be able to manage the cloud infrastructure itself; it implies buying it's own hardware equipments, which means it is best to use a private cloud computing option.

Doing so would give GuardIN the opportunity to design the cloud storage in a way that all users of the organization can access it without any lag.

Computer security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.
a) true
b) false

Answers

The correct answer is True

Explanation:

Computer security is a branch of security that focuses on the security of computer systems. This includes preventing cyber attacks that could steal the information or damage the software (programming code), as well as, preventing physical attacks or damage, this includes stopping unauthorized personnel from accessing the computers or devices and limiting the damages that might occur in situations such as fires, floods, etc. Additionally, computer security is now an important factor in most companies and organizations as relevant information is saved in computers, also, many functions rely on the use of computer systems.

According to this, the statement about computer security is true because this comprises the protection of hardware, software, and information in cases such as natural disasters, intrusions, etc.

Which of the following statements is true? A. Ethernet connections allow the most mobility for users. B. Maximum advertised connection speeds are for Wi-Fi connections only. C. Every computer user can expect the same Internet connection speed. D. The actual speed of a network can differ from the maximum advertised speeds. E. Wi-Fi is the best option for intensive Internet users who have high data

Answers

Answer:

A

Explanation:

Ethernet connections allow the most mobility for users

Employees often have more than one laptop-so one or both of them are always handheld. For this cause, companies turn to the versatility and scalability of wireless networks. It is convenient to grant workers connectivity through a wireless network, which they can use to connect several devices. Tablets, smartphones and laptops can all be connected to the network, which enables employees to access

Answer: D. The actual speed of a network can differ from the maximum advertised speeds



Explanation:

just got it correct on the test

Which of the following statements is false? a. The Java API consists of packages. b. The Java API helps programmers avoid "reinventing the wheel." c. The Java API consists of import declarations. d. None of the above.

Answers

Answer:

The answer is "Option c".

Explanation:

In Java programming, the API stands for "application programming interface", which is also known as the lists of all classes in the JDK. It contains all packages, classes, and interfaces, with their techniques, fields. It is a built-in class, which gives the programmer a great deal of usability, and correct choices can be described as follows:

In option a, It is correct because it imports the package to use API. In option b, It allows you to "re-invent the wheel" by developers, that's why it is correct.

Tom walks into the accounting department and walks into a mess! User A can't access the Internet, User B has forgotten her password, User C's system is overheating to the point of smoking and the administrator is worried there might be a virus on all the systems. Whose system should he address first

Answers

Answer:

User C.

Explanation:

As per the given details, the problem of user C's system must be addressed first due to the seriousness of his case. His computer is excessively overheating up to the smoking point and if his problem is not addressed soon, it will damage the vital parts of the computer or may also explode. The other users having the problem of inability to access the internet or issue of forgotten password can be addressed later as these are minor problems that do not have as such consequences. Thus, user C is the correct answer.

How do I make my kali Linux faster in my virtual box?

Answers

Answer:

If you run any operating system as a VM, it is going to be slower than if you were to run it as a native OS. You can, however, make a VM run faster by allocating more CPU cores and RAM to it in your hypervisor's (such as Virtualbox or VMWare) settings menu for your VM.

does that make sense?

What VM are you using? if your using virual box then try adding more RAM to it. I use VMware player 16 and its REALLY fast so try that. Also, go on online and look up this guy called network chuck.

A systems administrator is designing a directory architecture to support Linux servers using Lightweight Directory Access Protocol (LDAP). The directory needs to be able to make changes to directory objects securely. Which of these common operations supports these requirements?

Answers

The options available are:

Search, modify.

StartTLS, delete.

Bind, modify.

Bind, add.

Answer:

StartTLS, delete

Explanation:

StartTLS is a computer networking term for email protocol command, in which a system administrator buses it to command an email server that an email client running in a web browser, wants to turn an existing insecure connection into a secure one. Thus, during this process, StartTLS permits a client to communicate securely using LDAPv3 over TLS.

On the other hand, the DELETE operation can make a change to a directory object.

According to the given question, the common operations that supports requirements where directory needs to be able to make changes to directory objects securely are;

Bind, addSearch, modifyBind, modifyStartTLS, delet

According to the question, we are to discuss the common operations that supports some requirements as regards the changing of directory objects securely.

As a result of this we can see that making use of  StartTLS, delete can serve this purpose and other function as well.

Therefore, common operations that supports requirements where directory needs to be able to make changes to directory objects securely is Search and modify.

Learn more about directory architecture at:

https://brainly.com/question/13171394

A user receives an email containing a co-workers birth date and social security number. The email was not requested and it had not been encrypted when sent. What policy does the information in the email violate

Answers

Answer:

PII

Explanation:

The information in the email violates the PII. That is Personally identifiable information. PII, are nothing but any data that could potentially be used to identify a person. Examples of which can be  a full name, Social Security number, driver's license number, bank account number, passport number, and email address, etc.

Other than hard discs and flash discs, identify other three different storage media

Answers

Answer:

A storage media is any media that can store data.

1. USB flash memory

2. Memory stick

3. Floppy disk

Thanks to the availability of computers, mobile devices and ISs, information flowing through companies is almost always available to executives, managers, and workers who no longer struggle to find information they need to make sound decisions or do their jobs.
a. True
b. False

Answers

Answer:

False

Explanation:

The advent of computers, mobile devices and ISs, information flowing through companies is almost always available to executives, managers, and workers who no longer struggle to find information they need to make sound decisions or do their jobs.

It has made information flowing through companies to be readily available to executives, managers and workers. It helps workers to make sound decisions and discharge their duties effectively.

A binary search function is searching for a value that is stored in the middle element of an array. How many times will the function read an element in the array before finding the value?

Answers

Answer: 1 time.

Explanation:

A binary function is also known as a half-interval search is a search algorithm to find the position of a given element x within a well-sorted array []. Binary search compares the target value to the middle element of the array.It ignores half of the elements just after one comparison. it compares x with the middle element.

So, the function read an element one time in the array before finding the value.

What is a path and how do you know that it is filled and selected

Answers

Explanation:

A path represents a selected editing area of an image, this feature is typically available when using Adobe Photoshop software.

For example, a photographer may select the entire face area of his subject as his path (work path). To know when it is filled the photographer observes to see when the colour changes or other changes are applied to the background layer of the selected path.

Assume the existence of a BankAccount class with a method, getAvailable that returns the amount of available funds in the account (as an integer), and a subclass, OverdraftedAccount, with two integer instance variables:

Answers

Answer: This is hard but I will research ok

Explanation:

B. Imagine yourself to be a tube light. Write a short paragraph about your life. (50 to 80 words)
plese help me​

Answers

Do you know LED light- I mean the tubelight that people perch and switch it on. It is used in offices, homes, schools and anywhere there are tube lights but I am something different. I am that light that shines on children’s head.

Ok, it is not actually a light in children’s head. It’s when they think of an idea so they are switching me on and they spread that means they are allowing me to shine. My head means the base is the brain that tells me that this idea is there so I shout and spread it.

Like that I was also a light in a boys head his name was Rahul. Rahul was a boy that when his mind is on studies he can top in his class but he was not understanding that he was only focusing on his sports.

One day in the classroom didi said that there is a problem that in our school there is a problem that out toilets are stinking and we need help from you children. All the lights around me were flickering because all the children were thinking of ideas. I was the only one of them who was not flickering. Rahul switched me on and let me shine, he spread it. I also know that he is not going to shatter me into pieces. He is going to persevere and he did it.

From that day, it was my daily life..on off..on off..on off..

Write a program that takes in a positive integer as input, and outputs a string of 1's and 0's representing the integer in binary. For an integer x, the algorithm is: As long as x is greater than 0 Output x modulo 2 (remainder is either 0 or 1) Assign x with x divided by 2

Answers

Answer:

Following are the code to this question:

def binarynumber(num):#defining a method binarynumber that accepts a parameter num

   x=""#defining a string variable x

   if (num!=0):#defining if condition to check number not equal to 0

       while (num>=1):#defining a loop that check value is grater then equal to one

           if (num %2==0):#defining if condition to check num is even

               x=x+"0" #add string value 0 in num variable

               num=num/2 #divide the value by 2

           else:#defining else block

               x=x+"1"#add string value 1 in num variable

               num=(num-1)/2#first subtract 1 into num variable then divide the value by 2

   else:

       x="0"#assign string value 0 in num variable  

   return "".join(reversed(x))#return value

num = int (input ("Enter any number: "))#defining num variable that input the integer value

print (binarynumber(num))#using print method to call method binarynumber with passing num parameter

Output:

Enter any number: 12

1100

Explanation:

In the above python code a method "binarynumber" is declared, in which the "num" variable passes as the parameter inside the method a string variable "x" is declared that stores all converted values. Inside the method and if the block is declared that checks number value is not equal to 0 if this condition is false then it will add string value and reverse its value. Or if the condition is true it defines a while loop that calculates the given number binary digits and returns its value. At the last step, the num variable is declared that inputs the integer value from the user end and calls the method by using the print method.    

MULTIPLE CHOICE When you log in to a browser, such as Google Chrome, you are accessing a profile that you can save and use on many different devices. What are some of the personal preferences you can save to your user profile for a browser? Select all that apply.

Answers

Answer:

The personal preferences that can be saved are

A. Customize your bookmark bar

C Change your home page

D Enable safe browsing in your privacy setting

Explanation:

The Bookmark manager can be used for personal customization of the bookmarks in chrome

The Bookmark manager is located within the customization button located at the top right hand corner of the browser under bookmarks

The personally preferred homepage can be selected under appearance category in the settings menu

The enable safe browsing preferences can be found under privacy and security sub menu within the settings menu window.

if a person walks 10 metres due to south in 10 seconds 10 due east in the next 10 seconds and transmitted you're not in the next 10 seconds then he has Dash velocity​

Answers

Answer:

[tex]\frac{1}{3}\ m/s[/tex]

Explanation:

The computation of the velocity by using the following formula is

As we know that

[tex]Velocity = \frac{Displacement}{Total\ time\ taken}[/tex]

where,

Displacement is 10 meters

Total time taken is 30 seconds

Now placing these values to the above formula

So, the velocity of Dash is

[tex]= \frac{10\ meters}{30\ seconds}[/tex]

[tex]= \frac{1}{3}\ m/s[/tex]

We simply applied the above formula so that we can get the velocity and the same is to be considered

The variable dp is to refer to an array of double. Assuming the integer variable n has been assigned a value, declare dp appropriately, allocate an array of n doubles and assign the resulting pointer to dp.

Answers

Answer:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Explanation:

According to the given question, the relevant data provided is as follows

Variable dp = Array of double

Based on the above information,

The allocation of an array for doubling n and assigned it to dp is here below:

double × dp = NULL ;

int n;

n = <some value> ;

dp = new double[n]

Hence, the above is the answer

"PindCart, an online retailer, places a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site. The company uses this file to generate a personalized welcome message to its visitors. This small file is called a ______."

Answers

Answer:  cookie

Explanation:

A cookie is a small welcome file contains the information in the form og letters and numbers.It is downloaded on to a computer when a website is visited.

Hence, if a company uses a small file on the computer hard drive of its visitors to recognize them when they revisit their Web site to generate a personalized welcome message to its visitors. This small file is called a cookie.

1. Who is the head of the family of the Lhops?​

Answers

This question is incomplete, here´s the complete question.  

Read 'Untrodden World of Lhops', by John Michael Chiramal

Who is the head of the family of the Lhops?​

Answer: the maternal uncle

Explanation:

The Lhops or Doyas are one of the smaller communities of Bhutan, isolated from the conventional rules of the Bhutanese society, they have the maternal uncle as the head of the family.  

Not only he has complete authority over the family´s everyday life, but he´s also in charge of the children´s upbringing and providing them with an inheritance of his property.

What is the best use of a line chart? (A.)to show parts of a whole while emphasizing specific data,(B.)to compare and contrast discrete categories of data,(C.)to display data that changes over time(D.)to display data points that are unconnected and distinct

Answers

I think the answer to the question is C

Justify the statement "The same job title can have different job roles and different qualification criteria in different organizations." Compare job titles and their respective roles and qualifications from at least two organizations in different industries, and write a short essay explaining your reasoning.

Answers

Answer:

Below is an executive summary of this particular issue.

Explanation:

Each organization has differential requirements and preferences. This same employment opportunities rely heavily on either the structure of the company and indeed the amount of equipment that it possesses. Hence, whenever they recruit an individual on a specific job, their work description can differ based on the organization's needs including growth.

Answer:

In the classified section of a local newspaper, I came across job openings for the post of a network engineer in two different companies. One was from the airline industry, while the other was from the food and beverage industry.

The airline company required an applicant to have a bachelor's degree in network administration. The job posting specified that applicants with supporting CCENT or CompTIA Security+ certifications would be preferred. The company was willing to consider candidates with no prior experience. The job responsibilities included: maintaining security, DNS, IP routing, firewalls, and troubleshooting IT-related problems. The role also required skills to manage multi-site network operations, operating systems, and other software applications in public as well as private facilities. Another responsibility was to complete the time logs in the company's records to facilitate timely and accurate billing.

For the role of a network engineer in the food and beverage industry, the required qualification was any bachelor's degree in computer science with a minimum of one year of relevant experience. Certifications were an added advantage, but they were not a necessity. The job role required skills to troubleshoot network glitches, monitor network usage, install software and hardware infrastructure, provide technical assistance to users, and suggest improvements in the system.

Explanation:

Does anyone know how to fix this problem My kali Linux is getting stuck on the failed to send host log message the first time I run it but when I reset it it gets fixed but I wanna stop it from freezing and getting stuck on that error message

Answers

Update it, or just get a new Linux

Answer:

Is

Explanation:

You should check with a person repairing computers or call him and ask him Wats the problem with your pc or laptop or computer. This is just a suggestion. U can also get what to do from sites in the internet.

Hope this helps....

Have a nice day!!!!

Using a material on the internet for your assignment without acknowledging the source is known as A. Plagiarism B. Piracy C. Ethical D. Copyright

Answers

Answer:

A. Plagiarism

Explanation:

Plagiarism is simply the act of representing an author's thoughts , ideas , expression , writings as one's own.

The ___________ button represents the start of a hyperlink in Table of contents.

Answers

Answer:

An LS button

Explanation:

It appears on the (structure line 3)on the structure line, place your cursor in the white field to the right of the E button (Recall that the E button represent the entry test).

A user calls the helpdesk and states that they are receiving an IP conflict error on their computer. The user is on a company network that uses DHCP. The technician verifies the PC is using DHCP to obtain TCP/IP settings. Which of the following commands should the helpdesk technician use to resolve this issue? (Select two.)
A. IPCONFIG /REGISTERDNS
B. IPCONFIG /FLUSHDNS
C. IPCONFIG /RELEASE
D. IPCONFIG /RENEW
E. IPCONFIG /ALL

Answers

Answer:

a

Explanation:

none

can a 0.90 GB storage left android phone download an app of 28 MB plsssss fast I will give you brainliest why and why not?

Answers

Answer:

Yes

Explanation:

0.9 GB = 900 MB. That is a plenty of space for a 28 MB app.

Other Questions
Read the scenario about a formal discussion. Malia and her colleagues are discussing ways to improve hiring practices. Malia thinks that their company does not do a very good job at recruiting or interviewing skilled candidates, so she has researched effective hiring practices and has brought lots of ideas with her. Malia offers the information she has brought with her. She listens carefully to her colleagues concerns and answers questions. She uses new terminology she learned in her research. Which statement best describes what kind of presenter Malia is? Malia is an ineffective presenter because the language she uses is not appropriate or accessible for the audience and topic. Malia is an ineffective presenter because she is critical of the companys hiring practices, and does not respond properly. Malia is an effective presenter because she shares ideas supported by research, and she listens and responds to other members. Malia is an effective presenter because she shares her opinions and challenges the companys current hiring practices. Mi pobre madre est muy enferma y no puede trabajar hoy. Su mejor amiga va a trabajar ________ ella. para por All of the following are effector responses that increase body temperature SOMEONE PLEASE HELP ME!!! I REALLY NEED SOME HELP!!!Which of the following points is a solution of the inequality y < - lxl?A. (1, -2) B. (1, -1) C. (1, 0) A magnetic field is entering into a coil of wire with radius of 2(mm) and 200 turns. The direction of magnetic field makes an angle 25 in respect to normal to surface of coil. The magnetic field entering coil varies 0.02 (T) in every 2 seconds. The two ends of coil are connected to a resistor of 20 ().A) Calculate Emf induced in coil B) Calculate the current in resistor C) Calculate the power delivered to resistor by Emf Please answer this in two minutes Find the slope of the line passing through the points (-3, -8) and (4,6). A point charge +Q is located on the x axis at x = a, and a second point charge Q is located on the x axis at x = a. A Gaussian surface with radius r = 2a is centered at the origin. The flux through this Gaussian surface is Can someone please help me? The surface area of a cube is represented by the expression below, where s is the side length of the cube. Find the surface area of a cube-shaped jewelry gift box with a side length of 10 centimeters. A. 600 square centimeters B. 900 square centimeters C. 300 square centimeters D. 2,000 square centimeters Two different radioactive isotopes decay to 10% of their respective original amounts. Isotope A does this in 33 days, while isotope B does this in 43 days. What is the approximate difference in the half-lives of the isotopes? symptoms of fatigue, heads ache, joint pain, indigestion, insomnia, dizziness, respiratory disorders and memory difficulties are known as what type of illness? An employee is paid a salary of \$73,840 per year, plus benefits and overtime (time and a half) on hours worked over 40 per week, working as a civil servant. What is the regular time hourly rate of pay for this employee, and what is her total income in a month where she works 40 hours, 44 hours, 43.5 hours, and 40 hours, weekly, in the month? A.$37.00/hr and \$6,336.25 in total income B. $35.50/hr and \$6,079.38 in total income C.$37.50/hr and \$6,421.88 in total income D.$36.00/hr and \$6,165.00 in total income If there is a decrease in the short-run aggregate supply curve and no changes in fiscal policy are implemented, the economy over time will Group of answer choices Remain at the new price and output level Experience a leftward shift in the aggregate demand curve Return to the original output and price level Experience increasing nominal wages Continue to have rising prices and decreasing Real GDP Match each property of a liquid to what it indicates about the relative strength of the intermolecular forces in that liquid.Strong intermolecular forcesWeak intermolecular forces I really need help with this question, and I would really appreciate it! I will mark brainliest! Do you know what this is in English? Which image demonstrates a situation in which it is safe to deliver an electric shock with an AED? a. A woman with her hand on a man while using the A E D. b. A bottle of water spilled on a man's leg while a woman uses an A E D. c. A woman with her hand on her lap while using the A E D. Why do you think that the massacre in Tulsa, Oklahoma was largely forgotten, evenby those living in the states? The dot plots below show the scores for a group of students for two rounds of a quiz:Round 12453ScoreRound 2: :..+12453ScoreWhich of the following inferences can be made using the dot plots?O The range of round 2 is greater than the round 1 range,O Round 2 scores are higher than round 1 scoresO Round 1 scores are lower than round 2 scoresThere is no overlap between the data.