1. ERICUS Company sells Ghacem cement at 30.0 Ghana Cedis per bag. The company however gives discount of 15% for customers that buy 100 or more bags, and 0% for customers that buy less than 100 bags. Write a pseudocode.

Answers

Answer 1

See Comment for complete question

Answer:

Input Bags

Discount = 0%

If Bags >= 100 Then

Discount = 15%

End If

Print Discount

Stop

Explanation:

This gets the number of bags bought

Input Bags

This initializes the discount to 0%

Discount = 0%

If the bags of cement bought is 100 or above

If Bags >= 100 Then

This discount becomes 15%

Discount = 15%

This ends the if statment

End If

This prints the discount percentage

Print Discount

This ends the pseudocode

Stop


Related Questions

What are best DevOps automation solutions in 2023?

What are best DevOps automation solutions in 2023?

Answers

In 2021 and 2022, DevOps automation solutions will include Jenkins, GitLab, and Ansible. These tools will probably still be extensively utilised in 2023.

Which well-known DevOps solution in the cloud is employed to automate source code management version control and team collaboration?

Building and testing code, managing dependencies, and deploying applications are just a few of the many processes that can be automated with Gradle. Gradle can help to increase the effectiveness of DevOps workflows by automating certain tasks.

What automation tool will be popular in 2021?

The most widely used open-source framework for automating mobile tests for native, hybrid, and mobile web apps is called Appium. To drive native, mobile testing, Appium makes advantage of the Selenium JSON wire protocol's mobile extension.

To know more about DevOps automation visit:-

https://brainly.com/question/25134072

#SPJ1

How can I get more views on my you tube channel "Braeden Eischen" without paying anything
P.S. this is for media-tech so don't report me

Answers

I’m just post video and there

And office now has a total of 35 employees 11 were added last year the year prior there was a 500% increase in staff how many staff members were in the office before the increase

Answers

There were 5 staff members in the office before the increase.

To find the number of staff members in the office before the increase, we can work backward from the given information.

Let's start with the current total of 35 employees. It is stated that 11 employees were added last year.

Therefore, if we subtract 11 from the current total, we can determine the number of employees before the addition: 35 - 11 = 24.

Moving on to the information about the year prior, it states that there was a 500% increase in staff.

To calculate this, we need to find the original number of employees and then determine what 500% of that number is.

Let's assume the original number of employees before the increase was x.

If we had a 500% increase, it means the number of employees multiplied by 5. So, we can write the equation:

5 * x = 24

Dividing both sides of the equation by 5, we find:

x = 24 / 5 = 4.8

However, the number of employees cannot be a fraction or a decimal, so we round it to the nearest whole number.

Thus, before the increase, there were 5 employees in the office.

For more questions on staff members

https://brainly.com/question/30298095

#SPJ8

Considering all of the time and effort that is put into creating an online business, it is in a merchant’s best interest to make sure that as many people as possible make it to the merchant’s website. A good way to do this is to ensure search engine optimization. Describe three different steps you can take to ensure search engine optimization, and briefly explain what makes them effective.

Answers

Search engine optimization will help increase the number of clicks on the business' website and help to drive the sales by targeting the appropriate audience for buying the products.

What is search engine optimization?

Search engine optimization, or SEO, is one of the most important functions of the generation of organic clicks on the website for an online ecommerce business.

It helps in creating a brand awareness, the costs of advertising are much lower, and also helps in improving the experience of the customers of ecommerce site.

Hence, the uses of search engine optimization in online business are as aforementioned.

Learn more about Search Engine Optimization here:

https://brainly.com/question/14850803

#SPJ1

Which tab will you use to format data in cells?

Answers

Answer:

Right Click and select Format Cells (CTRL + 1)

Explanation:

To format cells in Excel, you select the cell(s) you want to format, right click, and in the dialogue box that appears select 'Format Cells'.

Answer:

b

Explanation:

trust me

Write a program that will prompt the user for the number of dozens (12 cookies in a dozen) that they use.
Calculate and print the cost to buy from Otis Spunkmeyer, the cost to buy from Crazy About Cookies, and which option is the least expensive (conditional statement).
There are four formulas and each is worth
Use relational operators in your formulas for the calculations. 1
Use two conditional execution (if/else if)
One for Otis cost (if dozen is less than or equal to 250 for example)
One that compares which costs less
Appropriate execution and output: print a complete sentence with correct results (see sample output below)
As always, use proper naming of your variables and correct types. 1
Comments: your name, purpose of the program and major parts of the program.
Spelling and grammar
Your algorithm flowchart or pseudocode

Pricing for Otis Spunkmeyer
Number of Dozens Cost Per Dozen
First 100 $4.59
Next 150 $3.99
Each additional dozen over 250 $3.59

Pricing for Crazy About Cookies
Each dozen cost $4.09

Answers

Python that asks the user for the quantity of dozens and figures out the price for Crazy About Cookies and Otis Spunkmeyer.

How is Otis Spunkmeyer baked?

Set oven to 325 degrees Fahrenheit. Take the pre-formed cookie dough by Otis Spunkmeyer out of the freezer. On a cookie sheet that has not been greased, space each cookie 1 1/2 inches apart. Bake for 18 to 20 minutes, or until the edges are golden (temperature and baking time may vary by oven).

Cookie Cost Calculator # Software # Author: [Your Name]

# Ask the user how many dozens there are.

"Enter the number of dozens you want to purchase:" num dozens = int

# If num dozens = 100, calculate the cost for Otis Spunkmeyer:

If num dozens is greater than 250, otis cost is equal to 100. otis cost = 100 if *4.59 + (num dozens - 100)*3.99 (num dozens - 250) * 4.59 * 150 * 3.99 * 3.59

# Determine the price for Crazy About Cookies

insane price equals num dozens * 4.09 # Choose the more affordable choice if otis cost > crazy cost:

(otis cost, num dozens) print("Buying from Otis Spunkmeyer is cheaper at $%.2f for%d dozens.")

If not, print ((crazy cost, num dozens)) "Buying from Crazy About Cookies is cheaper at $%.2f for%d dozens."

To know more about Python visit:-

https://brainly.com/question/30427047

#SPJ1

can the charger of my laptop get infected with viruses also when it was connected to it?​

Answers

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

Drag the tiles to the correct boxes to complete the pairs.
Match the elements of a network to their descriptions.

Drag the tiles to the correct boxes to complete the pairs.Match the elements of a network to their descriptions.

Answers

Answer:

software

client devices

hardware

Explanation:

Plzzzzzzzzzzzzz give me brainiest

The person who Oversee the direct work of employees and is responsible for the day-to-day tasks the employees complete is likely

Answers

Answer: Operational Manager

Answer: operational manager

Explanation: APEX

what number am i. i am less than 10 i am not a multiple of 2 i am a coposite

Answers

Answer: 9 is less than 10, it is odd (not a multiple of 2), and it is composite (since it has factors other than 1 and itself, namely 3). Therefore, the answer is 9.

The answer is nine because if you write all the numbers that are under ten you can see that 2, 4, 6, and, 8 are multiples of 2 so you can’t do that so then you gotta see which ones are composite which is nine because 1, 5, and 7 don’t have any more factors than for example 7 and 1.

1. Which one of the following is an HTML5-based interface that allows you to log directly in to the ESXi host? a) vSphere client b) ESXCLI c) VMware Host Client d) DCUI

Answers

The HTML5-based interface that allows you to log directly into the ESXi host is **c) VMware Host Client**.

The VMware Host Client provides a web-based management interface that allows users to log in directly to the ESXi host. It is built using HTML5 technology, making it accessible from web browsers without the need for any additional client applications or plugins. The VMware Host Client allows administrators to perform various management tasks, such as configuring network settings, monitoring system resources, managing virtual machines, and accessing logs and performance data.

The VMware Host Client offers a user-friendly and intuitive interface for managing ESXi hosts, providing convenient remote access to the host's configuration and management capabilities. It simplifies the administration process by eliminating the need for separate client software installations and provides a streamlined experience for managing ESXi hosts in HTML5-compatible web browsers.

For more such answers on HTML5

https://brainly.com/question/28994257

#SPJ8

Question: 9
What should be the primary focus of keeping information secure?
O
O
O
O
Educating users on the dangers of phishing
attempts
Encrypting all personal data
Ensuring the confidentiality, integrity, and
availability of data
Implementing a strong password policy
Question: 10

Question: 9What should be the primary focus of keeping information secure?OOOOEducating users on the

Answers

The primary focus of keeping information secure should be ensuring the confidentiality, integrity, and availability of data.  Hence option C is correct.

What is information security about?

This involves implementing various security measures such as encryption, access control, backup and disaster recovery, and following industry standards and regulations to protect sensitive information from unauthorized access, alteration, or loss.

Therefore,  Educating users on the dangers of phishing attempts and implementing a strong password policy are also important steps in ensuring information security.

Learn more about information security from

https://brainly.com/question/25226643

#SPJ1

100 point question, with Brainliest and ratings promised if a correct answer is recieved.
Irrelevant answers will be blocked, reported, deleted and points extracted.

I have an Ipad Mini 4, and a friend of mine recently changed its' password ( they knew what the old password was ). Today, when I tried to login to it, my friend claimed they forgot the password but they could remember a few distinct details :

- It had the numbers 2,6,9,8,4, and 2 ( not all of them, but these are the only possible numbers used )
- It's a six digit password
- It definitely isn't 269842
- It definitely has a double 6 or a double 9

I have already tried 26642 and 29942 and my Ipad is currently locked. I cannot guarantee a recent backup, so I cannot reset it as I have very important files on it and lots of memories. It was purchased for me by someone very dear to me. My question is, what are the password combinations?

I have already asked this before and recieved combinations, however none of them have been correct so far.

Help is very much appreciated. Thank you for your time!

Answers

Based on the information provided, we can start generating possible six-digit password combinations by considering the following:

   The password contains one or more of the numbers 2, 6, 9, 8, and 4.

   The password has a double 6 or a double 9.

   The password does not include 269842.

One approach to generating the password combinations is to create a list of all possible combinations of the five relevant numbers and then add the double 6 and double 9 combinations to the list. Then, we can eliminate any combinations that include 269842.

Using this method, we can generate the following list of possible password combinations:

669846

969846

669842

969842

628496

928496

628492

928492

624896

924896

624892

924892

648296

948296

648292

948292

Note that this list includes all possible combinations of the relevant numbers with a double 6 or a double 9. However, it is still possible that the password is something completely different.

Part 2 Graduate Students Only Architectural simulation is widely used in computer architecture studies because it allows us to estimate the performance impact of new designs. In this part of the project, you are asked to implement a pseudo-LRU (least recently used) cache replacement policy and report its performance impact. For highly associative caches, the implementation cost of true LRU replacement policy might be too high because it needs to keep tracking the access order of all blocks within a set. A pseudoLRU replacement policy that has much lower implementation cost and performs well in practice works as follows: when a replacement is needed, it will replace a random block other than the MRU (most recently used) one. You are asked to implement this pseudo-LRU policy and compare its performance with that of the true LRU policy. For the experiments, please use the default configuration as Question 3 of Project Part 1, fastforward the first 1000 million instructions and then collect detailed statistics on the next 500 million instructions. Please also vary the associativity of L2 cache from 4 to 8 and 16 (the L2 size should be kept as 256KB). Compare the performance of the pseudo-LRU and true-LRU in terms of L2 cache miss rates and IPC values. Based on your experimental results, what is your recommendation on cache associativity and replacement policy? Please include your experimental results and source code (the part that has been modified) in your report. Hint: The major changes of your code would be in cache.c.

Answers

The  outline that a person can use to implement as well as compare the pseudo-LRU and that of the  true-LRU cache replacement policies is given below

What is the code  about?

First, one need to make changes the cache replacement policy that can be see in the cache.c file of a person's code.

Thereafter one need to Run simulations with the use of the already modified  or changed code via the use of the default configuration as said in Question 3 of Project Part 1.

Therefore, one can take detailed statistics, such as L2 cache miss rates and IPC (Instructions Per Cycle) values, for all of the next 500 million instructions.  etc.

Learn more about code  from

https://brainly.com/question/26134656

#SPJ1

Give me some information about Shakira because I need to do a project

Answers

Answer:Summary : She's a Columbian pop singer who's sold more than 70 million albums sold worldwide. Her best known songs are "Hips Don't Lie" and " Whenever, Where ever".

Explanation: Born on February 2, 1977 in Barranquilla, Colombia. Her full name is Shakira Isabel Merabarak Ripoll. She wrote her first song on May 11, 1985. On October 1st she had her first successful album. On September 21, 1998 her album was sold worldwide

Answer:

Shakira's hips don't lie.

How do you print a document?

Select Print from the Start menu.

Click on Print in the system tray.

Click on the Print icon at the top of the screen.

select Print from the File menu.

Answers

Answer:

Select "Print" from the File menu

Explanation:

In Microsoft Office products, the fastest way to print other than CTRL+P is to navigate to the File menu on the software. Under this dropdown, there will be a variety of options including the "Save," "Save As," and "Print" functions.

Answer: C and D

This is 100% correct

Explanation:

How do technologies such as virtual machines and containers help improve
operational efficient?

Answers

Answer:

Through the distribution of energy usage across various sites, virtual machines and containers help to improve operational efficiency. A single server can accommodate numerous applications, negating the need for additional servers and the resulting increase in hardware and energy consumption.

Hope this helps! :)

The new restaurant struggled to attract patrons

Answers

The words that which when inserted in the sentence to replace the blank or blanks best fits the meaning of the sentence is: Purvey (Option A).

Hence the full sentence is:

"The new restaurant struggled to attract patrons; it was the first to Purvey its type of cuisine to the neighborhood, and many people were unfamiliar with it.

What is the meaning of the word Purvey?

Purvey means:

to offer for sale food, services, or information as a business orto to make available for sale goods or services as a business, or to provide information.

It can also mean to offer for sale goods and services to those who need them and or who are willing and capable of purchasing them.

Other examples of the use of the word "Purvey" are:

They purvey very wrong images and slogans, appeal to emotional vulnerabilities, and foster biased expectations, rather than convey useful information about artificial intelligence.

On the other hand, the concept that 'real' fulfillment in life is found for women in the 'private', loving connections of home and family is still commonly held and "purveyed."

Learn more about words that best fit:
https://brainly.com/question/1493725
#SPJ1

Full Question:

Chose the word or words that, when inserted in the sentence to replace the blank or blanks best fits the meaning of the sentence

The new restaurant struggled to attract patrons; it was the first to ………… its type of cuisine to the neighborhood, and many people were unfamiliar with it.

1.Purvey

2.Asperse

3.Immure

4.Consort

5.coalesce

add the function max as an abstract function to the class arraylisttype to return the largest element of the list. also, write the definition of the function max in the class unorderedarraylisttype and write a program to test this function.

Answers

To add the function max as an abstract function to the class arraylisttype to return the largest element of the list, check the code given below.

What is element?

A smaller component of a larger system is referred to as an element in computing.

//CODE//

#include <iostream>

using namespace std;

class arrayListType

{

public:

   bool isEmpty() const;  

   bool isFull() const;  

   int listSize() const;

   int maxListSize() const;  

   void print() const;  

   bool isItemAtEqual(int location, int item) const;  

   virtual void insertAt(int location, int insertItem) = 0;

   //F

   virtual void insertEnd(int insertItem) = 0;  

   void removeAt(int location);

   void retrieveAt(int location, int& retItem) const;

   virtual void replaceAt(int location, int repItem) = 0;

   void clearList();    

   virtual int seqSearch(int searchItem) const = 0;  

   virtual void remove(int removeItem) = 0;      

   virtual int max() = 0;

   arrayListType(int size = 100);

   arrayListType(const arrayListType& otherList);

   virtual ~arrayListType();

protected:

   int *list; //array to hold the list elements

   int length; //variable to store the length of the list

   int maxSize; //variable to store the maximum

   //size of the list

};

#endif

//UNORDEREDARRAYLIST:

#ifndef H_unorderedArrayListType

#define H_unorderedArrayListType

#include "arrayListType.h"

arrayListType::arrayListType(int size)

{

   list = new int[size];

   length = 0;

   maxSize = size;

}

arrayListType::arrayListType(const arrayListType& otherList)

{

   if (list)

       delete[] list;

   list = new int[otherList.maxSize];

   length = otherList.length;

   for (int i = 0;i < length;i++)

   {

       list[i] = otherList.list[i];

   }

}

arrayListType::~arrayListType()

{

   if (list)

       delete[] list;

   list = nullptr;

}

void arrayListType::clearList()

{

   for (int i = 0;i < length;i++)

       list[i] = 0;

   length = 0;

}

void arrayListType::removeAt(int location)

{

   for (int i = location;i < length - 1;i++)

   {

       list[i] = list[i + 1];

   }

   length--;

}

void arrayListType::retrieveAt(int location, int& retItem) const

{

   if (location >= length)

       return;

   retItem = list[location];

}

bool arrayListType::isEmpty() const

{

   return length == 0;

}

bool arrayListType::isFull() const

{

   return (length == maxSize);

}

int arrayListType::listSize() const

{

   return length;

}

int arrayListType::maxListSize() const

{

   return maxSize;

}

void arrayListType::print() const

{

   cout << endl;

   for (int i = 0;i < length;i++)

       cout << list[i] << "  ";

}

bool arrayListType::isItemAtEqual(int location, int item) const

{

   if (location >= length)

       return false;

   return list[location] == item;

}

class unorderedArrayListType : public arrayListType

{

public:

   void insertAt(int location, int insertItem);

   void insertEnd(int insertItem);

   void replaceAt(int location, int repItem);

   int seqSearch(int searchItem) const;

   void remove(int removeItem);

   // Add the function max

   int max();

   unorderedArrayListType(int size = 100);

   //Constructor

};

#endif

//UNODERERD ARRAYLISTLMP :

#include <iostream>

#include "unorderedArrayListType.h"

using namespace std;

void unorderedArrayListType::insertAt(int location,

   int insertItem)

{

   if (location < 0 || location >= maxSize)

       cout << "The position of the item to be inserted "

       << "is out of range." << endl;

   else if (length >= maxSize) //list is full

       cout << "Cannot insert in a full list" << endl;

   else

   {

       for (int i = length; i > location; i--)

           list[i] = list[i - 1];   //move the elements down

       list[location] = insertItem; //insert the item at

       //the specified position

       length++;   //increment the length

   }

} //end insertAt

void unorderedArrayListType::insertEnd(int insertItem)

{

   if (length >= maxSize) //the list is full

       cout << "Cannot insert in a full list." << endl;

   else

   {

       list[length] = insertItem; //insert the item at the end

       length++; //increment the length

   }

} //end insertEnd

int unorderedArrayListType::seqSearch(int searchItem) const

{

   int loc;

   bool found = false;

   loc = 0;

   while (loc < length && !found)

       if (list[loc] == searchItem)

           found = true;

       else

           loc++;

   if (found)

       return loc;

   else

       return -1;

} //end seqSearch

void unorderedArrayListType::remove(int removeItem)

{

   int loc;

   if (length == 0)

       cout << "Cannot delete from an empty list." << endl;

   else

   {

       loc = seqSearch(removeItem);

       if (loc != -1)

           removeAt(loc);

       else

           cout << "The item to be deleted is not in the list."

           << endl;

   }

} //end remove

// Add the definition for the function max

int unorderedArrayListType::max()

{

   int maxValue = INT_MIN;

   for (int i = 0;i < length;i++)

   {

       if (list[i] > maxValue)

           maxValue = list[i];

   }

   return maxValue;

}

void unorderedArrayListType::replaceAt(int location, int repItem)

{

   if (location < 0 || location >= length)

       cout << "The location of the item to be "

       << "replaced is out of range." << endl;

   else

       list[location] = repItem;

} //end replaceAt

unorderedArrayListType::unorderedArrayListType(int size)

   : arrayListType(size)

{

} //end constructor

int main()

{

   unorderedArrayListType list;

   list.insertEnd(1);

   list.insertEnd(-1);

   list.insertEnd(10);

   list.insertEnd(2);

   list.insertEnd(5);

   cout << "Max Value : " << list.max();

   return 0;

}

Learn more about elements

https://brainly.com/question/28565733

#SPJ4

A CPU scheduler that assigns higher priority to the I/O-bound processes than the CPU-bound processes causes:

Answers

Answer:

Low CPU utilization and high I/O utilization

Explanation:

Describe two methods by which viruses can spread.

Answers

Answer:

the two methods that can spread viruses are touching and breathing

Explanation:

When there are viruses being spread breathing near another person can caused it to spread because viruses can travel through air. if the viruse is in your systems coming out through the mouth is one way it can travel to another person. That's why wearing a mask is helpful

The other was is touching. Viruses can travel through physical contact. Is hands arent being wash regularly after eating brushing teeth etc it leaves germs and bacteria which is some of the ways and sometimes the main reason as to how viruses are made or created. That's why washing hands are important

Hope's this helps

How can you compute, the depth value Z(x,y) in
z-buffer algorithm. Using incremental calculations
find out the depth value Z(x+1, y) and Z (x, y+1).
(2)

Answers

The Depth-buffer approach, usually referred to as Z-buffer, is one of the methods frequently used to find buried surfaces. It is a method in image space and pixel.

Thus, The pixel to be drawn in 2D is the foundation of image space approaches and Z buffer. The running time complexity for these approaches equals the product of the number of objects and pixels.

Additionally, because two arrays of pixels are needed—one for the frame buffer and the other for the depth buffer—the space complexity is twice the amount of pixels.

Surface depths are compared using the Z-buffer approach at each pixel location on the projection plane.

Thus, The Depth-buffer approach, usually referred to as Z-buffer, is one of the methods frequently used to find buried surfaces. It is a method in image space and pixel.

Learn more about Z buffer, refer to the link:

https://brainly.com/question/12972628

#SPJ1

Write code that outputs variable numTickets. End with a new line (Java) output 2 and 5

Answers

Answer:

public class Main {

public static void main(String[] args) {

int numTickets = 2;

System.out.println(numTickets);

numTickets = 5;

System.out.println(numTickets);

}

}

USB is _____ memory device. a. Temporary b. primary c. main d. secondary

Answers

Answer:

d secondary

Explanation:

In which of the following scenarios would it be best to use a for loop?
1. When you need to stop looping based on input from the user
2. When you need to check that a user's input is valid.
3. When you want to ask the user for 10 numbers
4. When you need to be able to use the block of code in many places in your program

In which of the following scenarios would it be best to use a for loop?1. When you need to stop looping

Answers

Answer:

I would say 3 is the most likely answer ("When you want to ask the user for 10 numbers").

You use for loops to perform a task x times usually.

Write an acronym for the following set of information. The pieces of information can be remembered in any order. Your
acronym can be a real word or a nonsense word you are able to pronounce.
Native American Tribes: Apache, Comanche, Pequot, Sioux
Save and Exit
Next
Submit

Answers

ACOPS stands for "Apache, Comanche, Pequot, Sioux," representing four Native American tribes. Each tribe has a rich cultural heritage and historical significance.

What is the Apache tribe known for?

The Apache tribe is known for their resilience and warrior tradition, while the Comanche tribe is recognized for their horsemanship and dominance in the Great Plains.

The Pequot tribe has a notable history in the northeastern region, particularly their interactions with European settlers.

The Sioux tribe encompasses various subgroups, such as the Lakota, Dakota, and Nakota, and played a significant role in the history of the American West. ACOPS provides a concise acronym to remember these diverse Native American tribes.

Read more about Native American tribes here:

https://brainly.com/question/3271247

#SPJ1

Witch of the following are true of email communications when compared to
Phone or face to face communications

Answers

The statements which are true of e-mail communications when compared to phone or face-to-face communications is that communications via e-mail are:

more difficult to determine tone or inflection.easily shared.absent of visual cues.

What is communication?

Communication can be defined as a strategic process which involves the transfer of information (messages) from one person (sender) to another (recipient or receiver), especially through the use of semiotics, symbols, signs and network channel.

What is an e-mail?

An e-mail is an abbreviation for electronic mail and it can be defined as a software application (program) that is designed and developed to enable users exchange (send and receive) both texts and multimedia messages (electronic messages) over the Internet.

In this context, we can reasonably infer and logically deduce that in an electronic mail (e-mail) it would be more difficult to determine a person's tone or inflection in comparison with phone or face-to-face communications.

Read more on e-mail here: brainly.com/question/15291965

#SPJ1

Complete Question:

Which of the following are true of e-mail communications when compared to phone or face-to-face communications?

Communications via e-mail are _____.

absent of visual cues

more precise and accurate

limited in efficiency

less likely to be saved

easily shared

more difficult to determine tone or inflection

What is a Ram and what does it doe to youre computer

Answers

Answer:

it may help you!

Explanation:

Computer random access memory (RAM) is one of the most important components in determining your system's performance. RAM gives applications a place to store and access data on a short-term basis

Fill the formula in F15 down to F16:F44

Answers

If you want to fill the formula in F15 down to F16:F44, you must be required to select the cell with the formula and the adjacent cells you want to fill.

How do you Autofill the formula down?

Fill the desired formula into adjacent cells by selecting the cell with the formula and the adjacent cells you want to fill. Click Home > Fill, and choose either Down, Right, Up, or Left.

Apart from this, you can use the Keyboard shortcut: by pressing Ctrl+D to fill the formula down in a column, or Ctrl+R to fill the formula to the right in a row. Put the specific function of getting the formula in F15.

To learn more about Formula fill, refer to the link:

https://brainly.com/question/28662997

#SPJ1

Write a program PrintLeapYear.java that prints a table of leap years.
 Define a method call isLeapYear that will take any year as parameter, then return true if
that year is leap year and return false if the year is not leap year. Leap year is every 4
years but not every 100 years, then again every 400 years.
 Program will take user input for the start year (integer)
 Print out the leap year table from the start year going forward 120 years using control
structure and the isLeapYear method

Answers

Let's break down the task and build the Java program step by step.

1. First, we need to create a method called `isLeapYear` that takes a year as a parameter and returns true if the year is a leap year and false otherwise. We need to check if the year is divisible by 4 but not divisible by 100, or if the year is divisible by 400. This logic is based on the rule that a year is a leap year if it is evenly divisible by 4, except for years that are divisible by 100. However, years divisible by 400 are also leap years.

2. Next, we need to take an input from the user for the start year.

3. We will then use a loop to print the leap years for the next 120 years, starting from the input year.

Here is the Java program:

```

import java.util.Scanner;

public class PrintLeapYear {

   public static void main(String[] args) {

       // Step 2: Take user input for start year

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter the start year: ");

       int startYear = scanner.nextInt();

       // Step 3: Print the leap year table

       System.out.println("Leap years from " + startYear + " to " + (startYear + 120) + ":");

       for (int year = startYear; year <= startYear + 120; year++) {

           // Use the isLeapYear method

           if (isLeapYear(year)) {

               System.out.println(year);

           }

       }

   }

   // Step 1: Define isLeapYear method

   public static boolean isLeapYear(int year) {

       return (year % 4 == 0 && year % 100 != 0) || (year % 400 == 0);

   }

}

```

Let me explain what each part of the code does:

1. `import java.util.Scanner;` - We import the Scanner class which we will use to get input from the user.

2. `public class PrintLeapYear { ... }` - Defines a class named `PrintLeapYear`.

3. Inside the main method:

   - We create a Scanner object to read the input from the user.

   - We ask the user to enter the start year and store it in the variable `startYear`.

   - We print a header for the leap year table.

   - We use a for loop to iterate through each year from the start year to 120 years ahead. Inside the loop, we use the `isLeapYear` method to check if the year is a leap year. If it is, we print the year.

4. The `isLeapYear` method takes an integer `year` as a parameter and returns true if it's a leap year based on the conditions described above (divisible by 4, not divisible by 100 unless divisible by 400).

To run the program, save it as `PrintLeapYear.java`, and then compile it using the command `javac PrintLeapYear.java`. After compiling, you can run the program with the command `java PrintLeapYear`, and it will ask you to enter the start year and then print the leap years for the next 120 years.

Other Questions
1. Believed that God adopted the man Jesus to be His Son2. Views Jesus as just another prophet3. Greek for word4. A Gnostic5. Jewish-Christian sect6. Taught that Christ did not possess a human spirit7. Believed Christ did not have a human body8. Confessed the true identity of Christ9. Sound doctrine let a, b, and c be any finite sets. give a concise description for which elements from a, b, and c are in a b c. candy that costs 31 cents per pound is mixed with candy that costs 46 cents per pound to obtain 50 pounds of candy that costs 40 cents per pound. How many pounds of each of the two types of candy are in the mix? Please Help! Will Give Brainlest! All else equal, what happens to the federal funds rate the following scenarios? a. The federal funds rate is 3%, and the Federal Reserve raises IOR from 1% to 2%. Support your answer with a graph. b. The federal funds rate is 2%, and the Federal Reserve raises IOR from 2% to 2.5%. Support your answer with a graph. what type of religion was strengthened in north africa by islam? how does brown adipose tissue disrupt oxidative phosphorylation Planning and the Marketing Mix Mission Goals unachievedNetProfit of at least $1500$-1,320.00 1 turn remaining to completethis challenge. #18) Consider the following scenario: A bond has a price of $95 (Par Value 100). It matures in 7 years and pays coupons semi-annually. Find the coupon rate of the bond (in annual terms) that would yield a duration of 5.5. What is 35% of 28, rounded to two decimal places? HELP ASAP!!!!!!!!! what is the measure of angle x? In most large cities, suburban commuters might benefit from the use of light rail systems for commuting. In most cities, if commuters switched from driving to rail commuting, they wouldA) arrive at their destinations in half the time.B) need to travel nearly twice the distance to get to their jobs.C) spend more money on commuting.D) use fewer natural resources, especially fossil fuels. I need help, please u will get 20 points 5nsweredut of 1.00questionWhich class of medications has a national registry to keep track of fetal malformations inpregnant patients?Select one:O AntiepilepticsO AntifungalsO AntihypertensivesAntiinflammatories Mention and briefly explain the 4 categories of the primarymortgage market What expression is equal to -8(4y) If x + 2y = -6 and 5x + 9y = 7 are true equations, what would be the value of-4x 7y? Identify the graph of the compound inequality (-2 Sarah was transferred from Fort Wayne to Houston. She sold her Fort Wayne residence (adjusted basis of $180,000) for a realized loss of $40,000 and purchased a new residence in Houston for $225,000. Sarah's recognized loss on the sale of the Fort Wayne residence is $40,000.TrueFalseFalse Maribel y yo_____ in Castillo de arena Fill in the blank Irregular Preterite Spanish