Define a function createPhonebook that accepts three arguments: A list of first names A list of last names A list of phone numbers All three arguments will have the same number of items. createPhonebook should return a dictionary where the keys are full names (first name then last name) and the values are phone numbers. For example: firstNames

Answers

Answer 1

Answer:

def createPhonebook(firsts, lasts, numbers):

   d = {}

   for i in range(len(firsts)):

       k = firsts[i] + " " + lasts[i]

       d[k] = numbers[i]

   

   return d

Explanation:

Create a function named createPhonebook that takes three arguments, firsts, lasts, numbers

Initialize an empty dictionary, d

Create a for loop that iterates the length of the firsts times(Since all the arguments have same length, you may use any of them). Inside the loop, set the key as the item from firsts, a space, and item from lasts (If the name is "Ted" and last name is "Mosby", then the key will be "Ted Mosby"). Set the value of the key as the corresponding item in the numbers list.

When the loop is done, return the d


Related Questions

________________________ is an information system that stores user data in many different geographical locations and makes that data available on demand.

Answers

Answer:

CDN(content delivery network)

Explanation:

Content delivery network(CDN) which can as well be regarded as Content Distribution Network helps in acheiving high website performance, it essential in reduction of latency, through making the time a request is made using a website to when the website is fully loaded to be short and Minimal. It important in a situation whereby there is traffic loads from the users as well as server. It should be noted that CDN

is an information system that stores user data in many different geographical locations and makes that data available on demand. CDN's usefulness is also found in Cloud computing network such as Software as a service(SaaS). Google doc is an example.

what is the interpretation of this statement " Life is not a grand harmony, conflict exist. we much learn how to live it, use it constructively and minimize it's destructive aspect"

Answers

Answer:

Thats true but thats why we should never give up so we may strive to change the world even if it's a little bit.

Explanation:

Hope this helps! :)

Works in the public domain have copyright that are expired or abandoned true or false

Answers

Answer:

False

Explanation:

Only one of the two are true. Works in the public domain have a copyright that has expired only. E.g. Works of classical music artist, are almost always expired, in accorance with American Copyright law. Abandoning a copyright doesn't do anything because so long the copyright has remained unexpired, the copyright remains. Thats why it can take decades for a new movie in a series to release, like "IT" by Stephen King. The copyright hasn't expired but rather was 'abandoned'. Before "IT" 2017 was relasesed, the copyright was abandoned.

Compare the ufw status verbose command output with Windows Firewall with the Advanced Security Windows Firewall Properties you investigated in an earlier lab. Describe the major similarities that you observe.

Answers

Answer:

Following are the solution to this question:

Explanation:

Its common factor between both the ufw state glib collection consisted of times more likely Protection View Firewall Property is that they demonstrate the status of the network. So, the consumer sees that path could go to next.

The following are the command which is defined in the attached file.

I prefer a job where I am praise for good performance or I am accountable for results

Answers

Answer:

What?

Explanation:

Order the steps for accessing the junk email options in outlook 2016

Answers

Answer:

1 Select a message

2 Locate the delete group on the ribbon

3 Click the junk button

4 Select junk email options

5 Choose one of the protection levels

Explanation:  

Correct on Edg 2021

Answer:

In this Order:

Select Message, Locate delete group, click the junk, choose one of the...

Explanation:

Edg 2021 just took test

What are the negative impacts of cloud computing? Answer this question using examples, in at least 6-8 full sentences.

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

There are many benefits of cloud computing, but despite having benefits, there are many negative impacts of cloud computing.

The most known negative impact of cloud computing are given below:

Data confidentiality risk:

when you are using cloud computing services, that means you are handing over your all information over the internet. There is a risk of data confidentiality in this context, your data's security is totally dependent on the service provider. If your service provider security breaches, then your business reputation will also get impacted because your confidential data is managed and controlled by the service provider whose security is breached by someone or hackers.

Depend on internet connection:

Another disadvantage is that if you are working in a developing or under-developed country and you are using cloud computing services. Then your all business managing is relying on the internet. As you know, in developing countries internet speed does matter 24/7 and it is not as fast as required to use cloud computing services for your business.

Data mobility Issue:

Data mobility refers to sharing data between cloud services and in case if the user terminates their services of cloud computing then how you can handle such a situation.

Live help Issue:

some cloud service providers provide you the services online and help you online if you find any error in your services, imagine if in your company 24/7 IT staffs are working on a project, then how you can handle if an error occurs in your cloud computing services and online help also not available. so in this case cloud computing impact negatively your project and organization.  

what is an instruction set architecture​

Answers

Answer:

Instruction set architecture is the abstract model of a computer and is the part of the processor that is visible to the programmer or compiler writer

Explanation:

In computer science, an instruction set architecture (ISA) is an abstract model of a computer. It is also referred to as architecture or computer architecture. A realization of an ISA, such as a central processing unit (CPU), is called an implementation.

Network in which every computer is capable of playing the role of the client, server or both at the same time is called *


local area network

dedicated server network

peer-to-peer

wide area network

Answers

Answer:

peer to peer

Explanation:

Here, we want to select which of the options best answer the question.

The answer is peer to peer

The peer to peer network configuration is a type in which each computer can work as a client, a server or both

Thus , in a peer to peer network configuration, we can have the computer systems on this network having the possibility of working as either the client, the server or both of them simultaneously

Assume you are using an array-based queue and have just instantiated a queue of capacity 10. You enqueue 5 elements, dequeue 5 elements, and then enqueue 1 more element. Which index of the internal array elements holds the value of that last element you enqueued

Answers

Answer:

The answer is "5".

Explanation:

In the queue based-array, it follows the FIFO method, and in the question, it is declared that a queue has a capacity of 10 elements, and insert the 5 elements in the queue and after inserting it enqueue 5 elements and at the last, it inserts an element 1 more element on the queue and indexing of array always start from 0, that's why its last element index value is 5.

Explain why it is not necessary for a program to be completely free of defects before it is delivered to its customers?

Answers

Answer:

Testing is done to show that a program is capable of performing all of its functions and also it is done to detect defects.

It is not always possible to deliver a 100 percent defect free program

A program should not be completely free of all defects before they are delivered if:

1. The remaining defects are not really something that can be taken as serious that may cause the system to be corrupt

2. The remaining defects are recoverable and there is an available recovery function that would bring about minimum disruption when in use.

3. The benefits to the customer are more than the issues that may come up as a result of the remaining defects in the system.

Which of the following best describes open-source code software?
O A. a type of software that is open to the public and can be modified
B. a type of software that is free to download, but cannot be modified
C. a type of software that is locked, but can be modified
D. a type of software that has already been modified

Answers

Answer:

A. a type of software that is open to the public and can be modified.

Explanation:

Open-source refers to anything that is released under a license in which the original owner grants others the right to change, use, and distribute the material for any purpose.

Open-source code software is described as a type of software that is open to the public and can be modified. The correct option is A.

What is open-source code?

Open-source software is computer software that is distributed under a licence that allows users to use, study, change, and distribute the software and its source code to anyone and for any purpose.

Open-source software can be created collaboratively and publicly. Open-source refers to anything that is released under a licence that allows others to change, use, and distribute the material for any purpose.

Therefore, open-source code software is defined as software that is freely available to the public and can be modified. A is the correct answer.

To know more about open-source code follow

https://brainly.com/question/15039221

#SPJ6

Thomas has decided to key an agenda for the FBLA meeting using a column format. What is recommended to guide the reader’s eye and control the left to right flow or text?

Answers

Incomplete question. The full question reads;

Q. Thomas has decided to key an agenda for the FBLA meeting using a column format. What is recommended to guide the reader's eye and control the left-to-right flow of text?

Answer choices:

table featuredot leader tableft alignment tooldouble space

Answer:

dot leader tab

Explanation:

Indeed, Thomas could use the dot leader tab on MS word to guide the reader's eye and control the left-to-right flow of the text so the reader can note the agenda.

For example, below is a typical way the dot leader tab would look like on a document:

............... Agenda 1

............... Agenda 2

............... Agenda 3

Which of the following may be stored in an
e-mail address book? Check all of the boxes that
apply.
names
e-mail addresses
physical addresses
subjects of e-mails
fax numbers

Answers

Answer:

names, email addresses, subjects of e-mails

Explanation:

Answer:

names

e-mail addresses

physical addresses

fax numbers

Explanation:

correct answers

This assignment requires you to write a program to analyze a web page HTML file. Your program will read one character at a time from the file specifying the web page, count various attributes in the code for the page, and print a report to the console window giving information about the coding of the page.
Note that a search engine like Google uses at least one technique along similar lines. To calculate how popular (frequently visited or cited) a web page is, one technique is to look at as many other worldwide web pages as possible which are relevant, and count how many links the world's web pages contain back to the target page.
Learning Objectives
To utilize looping structures for the first time in a C++ program
To develop more sophisticated control structures using a combination of selection and looping
To read data from an input file
To gain more experience using manipulators to format output in C++
To consider examples of very simple hypertext markup language (HTML)
Use UNIX commands to obtain the text data files and be able to read from them
Problem Statement
Your program will analyze a few things about the way in which a web page is encoded. The program will ask the user for the name of a file containing a web page description. This input file must be stored in the correct folder with your program files, as discussed in class, and it must be encoded using hypertext markup language, or HTML. The analysis requires that you find the values of the following items for the page:
number of lines (every line ends with the EOLN marker; there will be an EOLN in front of the EOF)
number of tags (includes links and comments)
number of links
number of comments in the file
number of characters in the file (note that blanks and EOLNs do count)
number of characters inside tags
percentage of characters which occur inside tags, out of the total
Here is an example of a very simple HTML file:

Course Web Page
This course is about programming in C++.
Click here You may assume that the HTML files you must analyze use a very limited subset of basic HTML, which includes only the following "special" items: tag always starts with '<' and ends with > link always starts with " comment always starts with "" You may assume that a less-than symbol (<) ALWAYS indicates the start of a tag. A tag in HTML denotes an item that is not displayed on the web page, and often gives instructions to the web browser. For example, indicates that the next item is the overall title of the document, and indicates the end of that section. In tags, both upper and lowercase letters can be used. Note on links and comments: to identify a link, you may just look for an 'a' or 'A' which occurs just after a '<'. To identify a comment, you may just look for a '!' which follows just after a '' (that is, you do not have to check for the two hyphens). You may assume that these are the only HTML language elements you need to recognize, and that the HTML files you process contain absolutely no HTML syntax errors. Note: it is both good style because readability is increased, and convenient, to declare named constants for characters that are meaningful, for example const char TAG OPEN = ' Sample Input Files Program input is to be read from a text file. Your program must ask the user for interactive input of the file name. You can declare a variable to store the file name and read the user's response Miscellaneous Tips and Information You should not read the file more than once to perform the analysis. Reading the file more than once is very inefficient. The simplest, most reliable and consistent way to check for an end of file condition on a loop is by checking for the fail state, as shown in lectures. The eof function is not as reliable or consistent and is simply deemed "flaky" by many programmers as it can behave inconsistently for different input files and on different platforms. You may use only while loops on this project if you wish; you are not required to choose amongst while, do while and/or for loops until project 4 and all projects thereafter. Do not create any functions other than main() for this program. Do not use data structures such as arrays. You may only have ONE return statement and NO exit statements in your code. You may only use break statements inside a switch statement in the manner demonstrated in class; do not use break or continue statements inside loops. #include // used for interactive console I/O #include // used to format output #include // used to retrieve data from file #include // used to convert data to uppercase to simplify comparisons #include 11 for string class functions int main() { 1 //constants for analysing HTML attributes const char EOLN = '\n'; const char COMMENT_MARK = '!'; const char LINK='A'; //constants to format the output const int PAGEWIDTH = 70; const char UNDERLINE = '='; const char SPACE = const int PCT_WIDTH = 5; const int PCT_PRECISION = 2;

Answers

Answer:

bro it is a question what is this

Explanation:

please follow me

What questions would you ask an employer at a job interview?

Answers

Answer:

8 Questions You Should Absolutely Ask An Interviewer

QUESTION #1: What do the day-to-day responsibilities of the role look like? ...

QUESTION #2: What are the company's values? ...

QUESTION #3: What's your favorite part about working at the company? ...

QUESTION #4: What does success look like in this position, and how do you measure it?

Explanation:

I hope this answer is Wright ,So please mark as brainlist answers

What was the main reason IPv6 was created?
A. To improve the system
B. They needed a faster network
C.they were running out of addresses
D. To include more countries

Answers

Answer:

C.

Explanation:

I think the answer is C. because one of the main problems were that 'the primary function of IPv6 is to allow for more unique TCP/IP address identifiers to be created, now that we've run out of the 4.3 billion created with IPv4.'

When investigators find evidentiary items that aren't specified in a warrant or under probable cause what type of doctrine applies

Answers

search it up and it’ll tell you what doctrines it applies too

What are the disadvantages of batch operation system

Answers

The computer operators should be well known with batch systems.

Batch systems are hard to debug.

It is sometime costly.

The other jobs will have to wait for an unknown time if any job fails.

Explanation:

Answer:

Disadvantages of Batch Operating System:

The computer operators should be well known with batch systems.Batch systems are hard to debug.It is sometime costly.The other jobs will have to wait for an unknown time if any job fails.

Cable television systems originated with the invention of a particular component. What was this component called?​

Answers

Answer:

Cable television is a system of delivering television programming to consumers via radio frequency (RF) signals transmitted through coaxial cables, or in more recent systems, light pulses through fibre-optic cables. This contrasts with broadcast television (also known as terrestrial television), in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television; or satellite television, in which the television signal is transmitted by a communications satellite orbiting the Earth and received by a satellite dish on the roof. FM radio programming, high-speed Internet, telephone services, and similar non-television services may also be provided through these cables. Analog television was standard in the 20th century, but since the 2000s, cable systems have been upgraded to digital cable operation.

Explanation:

[tex]hii[/tex]have a nice day ✌️✌️

Cable television systems originated with the invention of a particular component. The component is a coaxial cable. The correct option is A.

What is a cable television system?

Radiofrequency (RF) signals are transferred through coaxial cables, or in more current systems, light pulses are transmitted through fiber-optic cables, to deliver television programming to viewers via cable television networks.

This is in contrast to satellite television, which transmits the television signal via a communications satellite orbiting the Earth and receives it via a satellite dish.

It broadcast television, in which the television signal is transmitted over the air by radio waves and received by a television antenna attached to the television.

Therefore, the correct option is A. coaxial cable.

To learn more about the cable television system, refer to the link:

https://brainly.com/question/29059599

#SPJ2

The question is incomplete. Your most probably complete question is given below:

A. coaxial cable

B. analog transmission

C. digital transmission

D. community antenna

the company has finished designing a software program but users aren't sure how to use it​

Answers

Answer:

The company should go back into the company and make it a little more easier to use or the company should put out an announcement or something so the people trying to use it know how

Explanation:

Mark me the brainliest please and rate me

Answer:

Several people in the human resources department need new software installed. An employee has an idea for a software program that can save the company time, but doesn't know how to write it.

Explanation:

Defining the components of the system and how these components are related to each other is part of the:____________.a. architectural design phase.b. detailed design phase.c. requirements phase.d. All of these are correct

Answers

Answer:

a. architectural design phase.

Explanation:

Architectural design phase basically deals with the interaction between the very important and essential modules of the software system that is to be developed.

Hence, defining the components of the system and how these components are related to each other is part of the architectural design phase. These components include the input, process, and output, they are linked to their respective interface in order to establish the functionality and framework of the software system.

Write an if statement that assigns 20 to the variable y, and assigns 40 to the variable z if the variable x is greater than 100. python

Answers

Answer:

if x > 100:

    y = 20

    z = 40

Explanation:

This line checks if variable x is greater than 100

if x > 100:

This line assigns 20 to y

    y = 20

This line assigns 40 to z

    z = 40

The if statement that assigns 20 to the variable y, and assigns 40 to the variable z if the variable x is greater than 100 is as follows:

x = int(input("input an integer number: "))

if x > 100:

   y = 20

   z = 40

   print(y)

   print(z)

The first code we ask the user to input an integer number and stored it in the

variable x.

If the user input is greater than x, then y is assigned to 20 and z is assigned to 40.

We print the assigned value of y and z if the user entered an input greater

than 100.

learn more: https://brainly.com/question/19036769?referrer=searchResults

Language: C
Introduction
For this assignment you will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The cipher you will write will use a pair of numbers corresponding to each letter in the text. The first number denotes the position of a word in the key text (starting at 0), and the second number denotes the position of the letter in the word (also starting at 0). For instance, given the following key text (the numbers correspond to the index of the first word in the line):
[0] 'Twas brillig, and the slithy toves Did gyre and gimble in the wabe;
[13] All mimsy were the borogoves, And the mome raths outgrabe.
[23] "Beware the Jabberwock, my son! The jaws that bite, the claws that catch!
[36] Beware the Jubjub bird, and shun The frumious Bandersnatch!"
[45] He took his vorpal sword in hand: Long time the manxome foe he sought—
The word "computer" can be encoded with the following pairs of numbers:
35,0 catch
5,1 toves
42,3 frumious
48,3 vorpal
22,1 outgrabe
34,3 that
23,5 Beware
7,2 gyre

Answers

The .cpp code is avaiable bellow

Code:

#include <stdio.h>

#include <string.h>

int main()

{

    char **kW;

    char *fN;

    int nW = 0;

    kW = malloc(5000 * sizeof(char*));

    for (int i = 0; i<5000; i++)

    {

         kW[i] = (char *)malloc(15);

    }

    fN = (char*)malloc(25);

    int choice;

    while (1)

    {

         printf("1) File text to use as cipher\n");

         printf("2) Make a cipher with the input text file and save result as output file\n");

         printf("3) Decode existing cipher\n");

         printf("4) Exit.\n");

         printf("Enter choice: ");

         scanf("%d", &choice);

         if (choice == 1)

         {

             nW = readFile(kW, fN);

         }

         else if (choice == 2)

         {

             encode(kW, fN, nW);

         }

         else

         {

             Exit();

         }

         printf("\n");

    }

    return 0;

}

int readFile(char** words, char *fN)

{

    FILE *read;

    printf("Enter the name of a cipher text file:");

    scanf("%s", fN);

    read = fopen(fN, "r");

    if (read == NULL)

    {

         puts("Error: Couldn't open file");

         fN = NULL;

         return;

    }

    char line[1000];

    int word = 0;

    while (fgets(line, sizeof line, read) != NULL)

    {

         int i = 0;

         int j = 0;

         while (line[i] != '\0')

         {

             if (line[i] != ' ')

             {

                  if (line[i] >= 65 && line[i] <= 90)

                  {

                       words[word][j] = line[i]; +32;

                  }

                  else

                  {

                       words[word][j] = line[i];

                  }

                  j++;

             }

             else

             {

                  words[word][j] = '\n';

                  j = 0;

                  word++;

             }

             i++;

         }

         words[word][j] = '\n';

         word++;

    }

    return word;

}

void encode(char** words, char *fN, int nwords)

{

    char line[50];

    char result[100];

    if (strcmp(fN, "") == 0)

    {

         nwords = readFile(words, fN);

    }

    getchar();

    printf("Enter a secret message(and press enter): ");

    gets(line);    

    int i = 0, j = 0;

    int w = 0, k = 0;

    while (line[i] != '\0')

    {        

         if (line[i] >= 65 && line[i] <= 90)

         {

             line[i] = line[i] + 32;

         }

         w = 0;

         int found = 0;

         while (w<nwords)

         {

             j = 0;

             while (words[w][j] != '\0')

             {

                  if (line[i] == words[w][j])

                  {

                       printf("%c -> %d,%d \n", line[i], w, j);

                       found = 1;

                       break;

                  }

                  j++;

             }

             if (found == 1)

                  break;

             w++;

         }

         i++;

    }

    result[k] = '\n';

}

void Exit()

{

    exit(0);

}

What is a malicious actor essentially looking for when attempting a network attack?

Answers

Answer:

information of personnel

Explanation:

The malicious actor that is essentially looked for when attempting a network attack is information of personnel.

Who are malicious actors?


An entity that is partially or completely accountable for an occurrence. It has an impact on or the potential to have an impact on the security of an organization and is referred to as a threat actor, also known as a malicious actor or bad actor.

Actors are typically divided into three categories in threat intelligence: partner, internal, and external. Any individual or group that wreaking havoc online is referred to as a threat actor, also known as a malevolent actor.

They carry out disruptive assaults on people or organizations by taking advantage of holes in computers, networks, and other systems.

Therefore, when attempting a network attack, personnel information is the main harmful actor that is sought after.

To learn more about malicious factors, refer to the link:

https://brainly.com/question/29848232

#SPJ2

Research an organization that is using supercomputing, grid computing or both. Describe these uses and the advantages they offer. Are they a source of competitive advantage? Why or why not? Please be sure to include your reference(s).

Answers

Answer:

Procter and Gamble is an organization that uses supercomputing.

Explanation:

Supercomputing refers to the use of high-performance computers in the development and production of items. Procter and Gamble is a company known for the production of many household items and personal care products. Uses and advantages of supercomputing to this company include;

1. Testing virtual prototypes of substances used in production: This is a faster way of developing products that are sustainable because many prototypes can be examined with the help of computers and the best chosen for production.

2. Developing unique designs of products: Supercomputers allow for the development of high-quality designs which include the internal and external designs of products.

3. Simulation of many molecules: Molecules such as those involved in the production of surfactants can be analyzed to understand how they work with the aid of supercomputers.

4. Computational fluid dynamics: This helps the scientists to understand how fluid works using numerical analysis and the structure of compounds.

The designs and products obtained through supercomputing are a source of competitive advantage because the company can make high-quality and unique products that appeal to customers and meet the latest trends. This would increase their marketability and give them an advantage over companies that do not have access to these computers.

Reference:   The Department of Energy. (2009) High-Performance Computing Case Study. Procter & Gamble's Story of Suds, Soaps, Simulations, and Supercomputers

Student Generated Code Assignments Option 1: Write a program that will read in 3 grades from the keyboard and will print the average (to 2 decimal places) of those grades to the screen. It should include good prompts and labeled output. Use the examples from the earlier labs to help you. You will want to begin with a design. The Lesson Set 1 Pre-lab Reading Assignment gave an introduction for a design similar to this problem. Notice in the sample run that the answer is stored in fixed point notation with two decimal points of precision. Sample run: Option 2: The Woody furniture company sells the following three styles of chairs: Style Price Per Chair American Colonial $ 85.00 Modern $ 57.50 French Classical $127.75 Write a program that will input the amount of chairs sold for each style. It will print the total dollar sales of each style as well as the total sales of all chairs in fixed point notation with two decimal places.
Sample run:
Please input the first grade 97
Please Input the second grade 98.3
Please Input the third grade 95
The average of the three grades is 96.77

Answers

In python:

first_grade = float(input("Please input the first grade "))

second_grade = float(input("Please input the second grade "))

third_grade = float(input("Please input the third grade "))

print("The average of the three grades is {}".format( round((first_grade + second_grade + third_grade) / 3,2)))

First_ grade = float(input("Please input the first grade ")) and second_ grade = float(input("Please input the second grade ")), third_ grade = float(input("Please input the third grade.

What is Program?

A computer utilizes a program, which is a collection of instructions, to carry out a particular task. A program is like a computer's recipe, to use an analogy.

It has a list of components (known as variables, which can stand for text, graphics, or numeric data) and a list of instructions (known as statements), which instruct the computer on how to carry out a certain operation.

Programming languages with particular syntax, like C++, Python, and Ruby, are used to develop programs. These high level programming languages are writing and readable by humans.

Therefore, First_ grade = float(input("Please input the first grade ")) and second_ grade = float(input("Please input the second grade ")), third_ grade = float(input("Please input the third grade.

To learn more Programming, refer to the link:

https://brainly.com/question/11023419

#SPJ2

In ____________, a large IP address block could be divided into several contiguous groups and each group be assigned to smaller networks.

Answers

There are no answers given in this question

You've been hired by Maple Marvels to write a C++ console application that displays information about the number of leaves that fell in September, October, and November. Prompt for and get from the user three integer leaf counts, one for each month. If any value is less than zero, print an error message and do nothing else. The condition to test for negative values may be done with one compound condition. If all values are at least zero, calculate the total leaf drop, the average leaf drop per month, and the months with the highest and lowest drop counts. The conditions to test for high and low values may each be done with two compound conditions. Use formatted output manipulators (setw, left/right) to print the following rows:________.
September leaf drop
October leaf drop
November leaf drop
Total leaf drop
Average leaf drop per month
Month with highest leaf drop
Month with lowest leaf drop
And two columns:
A left-justified label.
A right-justified value.
Define constants for the number of months and column widths. Format all real numbers to three decimal places. The output should look like this for invalid and valid input:
Welcome to Maple Marvels
------------------------
Enter the leaf drop for September: 40
Enter the leaf drop for October: -100
Enter the leaf drop for November: 24
Error: all leaf counts must be at least zero.
End of Maple Marvels
Welcome to Maple Marvels
------------------------
Enter the leaf drop for September: 155
Enter the leaf drop for October: 290
Enter the leaf drop for November: 64
September leaf drop: 155
October leaf drop: 290
November leaf drop: 64
Total drop: 509
Average drop: 169.667
Highest drop: October
Lowest drop: November
End of Maple Marvels

Answers

Answer:

#include <iostream>

#iclude <iomanip>

#include <algorithm>

using namespace std;

int main(){

int num1, num2, num3,

int sum, maxDrop, minDrop = 0;

float avg;

string end = "\n";

cout << " Enter the leaf drop for September: ";

cin >> num1 >> endl = end;

cout << "Enter the leaf drop for October: ";

cin >> num2 >> endl = end;

cout << "Enter the leaf drop for November: ";

cin >> num3 >> endl = end;

int numbers[3] = {num1, num2, num3} ;

string month[3] = { "September", "October", "November"}

for ( int i =0; i < 3; i++) {

 if (numbers[i] < 0) {

   cout << "Error: all leaf counts must be at least zero\n";

   cout << "End of Maple Marvels\n";

   cout << "Welcome to Maple Marvels";

   break;

 } else if (number[i] >= 0 ) {

     sum += number[i] ;

   }

}

for (int i = 0; i < 3; i++){

 cout << month[i] << " leaf drop: " << numbers[i] << endl = end;

}

cout << "Total drop: " << sum << endl = end;

cout << setprecision(3) << fixed;

cout << "Average drop: " << sum / 3<< endl = end;

maxDrop = max( num1, num2, num3);

minDrop = min(num1, num2, num3);

int n = sizeof(numbers)/sizeof(numbers[0]);

auto itr = find(number, number + n, maxDrop);

cout << "Highest drop: "<< month[ distance(numbers, itr) ] << endl = end;

auto itr1 = find(number, number + n, minDrop);

cout << "Lowest drop: " << month[ distance(numbers, itr1) ] << endl = end;

cout << "End of Maple Marvels";

Explanation:

The C++ soucre code above receives three integer user input and calculates the total number, average, minimum and maximum number of leaf drop per month, if the input isn't less than zero.

What are the steps In order that Jonah needs to follow to view the renaissance report ?

Answers

Incomplete question. The full question reads;

Jonah needs to add a list of the websites he used to his report. He opens the "Websites" document and copies the information. He now needs to change his view to the "Renaissance" report to add the information before saving his report.

What are the steps, in order, that Jonah needs to follow to view the "Renaissance" report?

Click on the View tab.

Go to the ribbon area.

Click on the "Renaissance" report.

Click on the Switch Windows tab.

Explanation:

Step 1.

Jonah should⇒ Go to the ribbon area

Step 2.

At the ribbon area, he should find and⇒ Click on the View tab.

Step 3.

Next⇒ Click on the Switch Windows tab.

Step 4.

Lastly, he can then⇒ Click on the "Renaissance" report.

Other Questions
The length of a rectangle is 5 cm more than 2 times its width. The perimeter of the rectangle is 34. Define variables to find both length and width. Write an equation to find the perimeter of the rectangle. What are the dimensions of the rectangle? how did ancient china's government influence the lives of people in this civilization? What is the displacement of the red ball between 0 s and 24 s You deposited a check for $1,200 into your checking account that had a balance of $625 and it "bounced". You had written checks for $450, $225, $215, and $187. Your bank will pay the largest check that you wrote first. Your account is overdrawn, and the remaining checks written to pay monthly bills did not clear. Your bank charged you a $35 overdraft fee and each of the remaining creditors receiving bounced checks charged you a $25 late payment fee. What did the $1,200 check that "bounced" on you cost you? Solve the following expression when a=5 4^2+5a-2a please help me with this!!!!! Which details does Keeler use to support the claim It was their way to give freely to those who had nothing? Check all that apply.American Indians had experienced slave traders.American Indians were wary of new people.Giving was believed to be a way to earn respect.Giving results in everyone having enough.Today people buy everything and do not give. Europeans knew Suleyman as Suleyman the magnificent What information is missing from this introduction to arhetorical analysis essay?the rhetorical strategies used by the writersthe content of the original text being analyzedthe claim regarding whether the strategies used areeffectivethe rhetorical situation regarding the text beinganalyzed Why do scientists use a single system of units?A. Scientists use a single system to prevent miscommunication.B. Scientists have their favorite forms of units.C. One scientists might have a better measurement than the other.D. Scientists don't make enough measurements to need more then one system. If a person has treated you terribly or deeply wronged you in some way, and that person apologizes to you, what should you do? If you accept someones apology, does that mean you are being weak? Explain using real-world examples. Must be no less than 10 complete sentences. Which of the following shows the prime factorization of 50?A.5 10B.2 25C.2 2 5D.2 5 5 Which of the following distinguishes the Hebrews from other ancient peoples?PolytheismTheir trading practices0 0Oral TraditionsMonotheism help please and tysm to whoever does!! You read 9.75 pages in your science book and 24.5 pages of a play for English classIt takes you 1.2 minutes to read each page of science and 0.8 of a minute to read each page of the play. How much time do you spend reading? joshna how r you ?????? When three numbers are added two at a time, the sums are 29, 46, 53. What is the sum of all three numbers? In "A Soldier for the Crown," as the boat leaves, the narrator goes:Attempt due: Se34 Minutes,tionYou know you are fortunate to be on board. Now that the Continental Army is victorious,blacks who fought for the crown are struggling desperately to leave on His Majesty's shipsdeparting from New York harbor. Even as your boat eased away from the harbor, someleaped from the docks into the water, swimming toward the ship for this last chance toescape slavery. Seeing them, you'd thought, That might have been me. But it wasn't: you'vealways been lucky that way, at taking risks.This description creates a mood of:GrawNote: Mood is how the text make you feel.o desperationO hope.sadness.O surprise. The Cyrillic Alphabet is an example of cultural diffusion becauseThe Russians adopted it from the Byzantines.The Russians created it without outside influence.The Russians used it in their churches.The Russians spread it to the Mongols. Find the missing side using the pythagorean theorem.9 in12 inx =