write the definition of a class player containing: an instance variable name of type string, initialized to the empty string. an instance variable score of type int, initialized to zero.

Answers

Answer 1

A class player is a blueprint for creating objects that represent individual players in a game or sports event. This class contains two instance variables, name and score, that are initialized to the empty string and zero respectively.

The name instance variable is of type string, which means it can store a sequence of characters such as letters, numbers, and symbols. This variable is used to store the name of the player, which can be set and accessed using methods defined in the class.The score instance variable is of type int, which means it can store integer values. This variable is used to store the score of the player, which can be incremented or decremented depending on the performance of the player. Methods defined in the class can be used to update the score of the player.Both the name and score instance variables are initialized to their respective default values, which are the empty string and zero. This means that when a new player object is created using the player class, these instance variables will be automatically set to these default values until they are modified using the methods defined in the class.

For such more questions on class player

https://brainly.com/question/13576491

#SPJ11


Related Questions

What is the computer system cycle called?

Answers

Answer:

he fetch–decode–execute cycle, or simply the fetch-execute cycle

mark me brainliestt :))

2.
Consider the following class definition.
public class WhatsIt {
private int length;
private int width;
public int getArea () {
// implementation not shown
}
private int getPerimeter () {
// implementation not shown
}
}
A child class Thingy that extends WhatsIt would have access to:
getArea()
getPerimeter()
width, length, getPerimeter()
width, length, getArea()
all of the above
Questions 3-5 pertain to the following class, Point:
public class Point {
private double x;
private double y;
public Point() {
this (0, 0);
}
public Point(double a, double b) {
/* missing code */
}
// ... other methods not shown

Answers

The various doors Quantity, area, and wallType will be included with the help of the java language. This will be formed with SameRoom.

In a certain programming language, a collection of commands or a collection of rules are referred to as computer code. It's also the name given to the source code just after the translator has prepared it for computer execution.

The code will be :

//checkSameRoom() method check two rooms are same or not

  //it accept room object as a parameter  

  public void checkSameRoom(Room obj)

  {

      //both rooms are same if given fields for both rooms are equal or not

   if (this.doorsQuantity==obj.doorsQuantity&&this.area==obj.area&&this.wallType==obj.wallType)

      {

         System.out.println("Both rooms are the same");

      }

      else

     {

        System.out.println("Both rooms are not the same");

      }

  }

Learn more about code, Here:

brainly.com/question/20712703

#SPJ1

The question is incomplete, the complete question will be :

JAVA CODE

public class Room {

  private String type;

  private int doors quantity, length, width, area;

  private String wallType;

  public Room(String type, int doorsQuantity, int length, int width, String wallType) {

      this.type = type;

      this.doorsQuantity = doorsQuantity;

      this.length = length;

      this.width = width;

      this.wallType = wallType;

      area = length * width;

  }

}

Now you need to add two methods in this class

1st Method: for checking if two rooms are same based on the following field

1) doorsQuantity

2) area

3) wallType

How long is mail forwarded after change of address?.

Answers

When you move to a new address, you can arrange for your mail to be forwarded to your new address by completing a Change of Address (COA) request with the United States Postal Service (USPS). The USPS will forward your mail to your new address for a specified period of time. Here are the steps involved in the process:

Step 1: Submit a Change of Address (COA) request

You can submit a COA request either online or in person at your local post office. You will need to provide your old address, new address, and the date when you want your mail to start being forwarded. You will also need to pay a fee for this service.

Step 2: USPS verifies your identity

To protect your privacy, the USPS will verify your identity before processing your COA request. They will ask you some questions to verify that you are the person who submitted the request.

Step 3: USPS starts forwarding your mail

Once your identity is verified, the USPS will start forwarding your mail to your new address. Mail that is addressed to your old address will be forwarded to your new address for the specified period of time.

Step 4: USPS sends a confirmation letter

The USPS will send a confirmation letter to your old address and your new address to confirm that your mail forwarding request has been processed.

Step 5: Mail forwarding period ends

The mail forwarding period is typically six months, but it can be extended for up to a year. After the specified period of time, your mail will no longer be forwarded to your new address.

In conclusion, the length of time that mail is forwarded after a change of address depends on the specified period of time in the COA request. The USPS typically forwards mail for six months, but this can be extended for up to a year. Once the specified period of time has ended, your mail will no longer be forwarded and will be returned to the sender with a notice indicating your new address.

To know more about mail forwarded visit:

https://brainly.com/question/29764542

#SPJ11

3. a unix file system is installed on a disk with 1024 byte logical blocks. (logical blocks can be increased in size by combining physical blocks.) every i-node in the system has 10 block addresses, one indirect block address and one double indirect block address. a. if 24 bit block addresses are used what is the maximum size of a file? b. if the block size is increased to 4096, then what is the maximum file size?

Answers

In a UNIX file system with 24-bit block addresses and 1024-byte logical blocks, the maximum file size is of 14 * 1024 bytes, or 14336 bytes. If the block size is increased to 4096 bytes, the maximum file size can be determined by multiplying the number of block addresses by the new block size. Therefore, the maximum file size would be 14 * 4096 bytes, which equals 57344 bytes.

a. Each block address in a UNIX file system with 24-bit block addresses can represent up to 224 (16,777,216) logical blocks. 12 direct block addresses, 1 indirect block address, and 1 double indirect block address are all used by the file system. The indirect block address points to a block that contains additional block addresses, whereas the direct block addresses can directly reference 12 blocks. A block containing block addresses of indirect blocks is the target of the double indirect block address. It follows that the maximum file size is (12 + 1 + 1) * 1024 bytes, or 14336 bytes.

b. The maximum file size is determined similarly if the block size is increased to 4096 bytes. Now, each block address can represent two blocks of size 4096 (224 = 16,777,216). Therefore, the maximum file size would be (12 + 1 + 1) * 4096 bytes, which equals 14 * 4096 bytes, or 57344 bytes.

To learn more about UNIX file system, refer:

brainly.com/question/31765789

#SPJ11

A beam of light travels in air and then passes through a piece of glass at an angle of 45 degrees to the normal. As the light passes from the air into the piece of glass, the light ray is bent, what is the angle of refraction measured from the normal?

Answers

Answer:

The angle of refraction measured from the normal is approximately 28.13°

Explanation:

The angle of refraction is the angle made by the refracted ray and the normal line drawn at the point where the ray passes through the interface of the two mediums

According to Snell's law, we have;

\(_1 n_2 = \dfrac{n_1}{n_2} = \dfrac{sin \, \theta _2}{sin \, \theta _1}\)

n₁·sin (θ₁) = n₂·sin(θ₂)

Where;

₁n₂ = The refractive index of air to glass = 1.5

n₁ = The refractive index of air = 1

n₂ = The refractive index of glass ≈ 1.5

θ₁ = The angle of incidence = 45°

θ₂ = The angle of refraction measured from the normal

Therefore, we have;

1/1.5 = sin(θ₂)/sin(45°)

sin(θ₂) = sin(45°)/1.5 = (√2)/2/(3/2) = (√2)/3

∴ θ₂ = arcsin((√2)/3) ≈ 28.13°

The angle of refraction measured from the normal = θ₂ ≈ 28.13°.

how and why Steve Jobs left Apple Computer.

Answers

Answer:

Jobs was forced out of Apple in 1985 after a long power struggle with the company's board and its then-CEO John Sculley. ... He was largely responsible for helping revive Apple, which had been on the verge of bankruptcy.

Explanation:

What type of software problem is it when a particular program on the pc works for a short time but then suddenly terminates and its not hardware related

Answers

When a particular program on a PC works for a short time but then suddenly terminates, it is likely a software problem related to the program itself or the operating system. There could be several reasons for this issue, including:

Software bugs: The program may have a coding error that causes it to crash after running for a short time. This could be due to a memory leak, infinite loop, or other programming errors.Compatibility issues: The program may not be compatible with the operating system or other software on the PC, causing it to crash.Corrupted files: The program files may have become corrupted, which can cause the program to crash.Insufficient resources: The program may require more system resources than are available, causing it to crash.To resolve this issue, users can try several solutions, such as updating the program, reinstalling it, running a virus scan to ensure that the PC is not infected with malware, and checking for any conflicts with other software or hardware. If the issue persists, users may need to seek help from the software developer or a technical support professional.

To learn more about operating system click the link below:

brainly.com/question/6689423

#SPJ4

1. List deep NLP models
2. Explain concept of vanishing gradient over fitting
computational load

Answers

Deep NLP models are Recursive neural network (RNN), Convolutional neural network (CNN), Long-short-term memory (LSTM), Gated recurrent unit (GRU), Autoencoder (AE). The connection between vanishing gradient and overfitting lies in the ability of deep neural networks to learn complex representations.

a. Recursive Neural Network (RNN):

RNNs are a type of neural network that can process sequential data by maintaining hidden states that capture information from previous inputs.They are commonly used in tasks like natural language understanding, sentiment analysis, and machine translation.

b. Convolutional Neural Network (CNN):

CNNs, originally designed for image processing, have been adapted for NLP tasks as well. In NLP, CNNs are often applied to tasks such as text classification and sentiment analysis, where they can capture local patterns and learn hierarchical representations of text.

c. Long Short-Term Memory (LSTM):

LSTMs are a type of RNN that addresses the vanishing gradient problem by introducing memory cells. They are effective in capturing long-term dependencies in sequential data and have been widely used in various NLP tasks, including language modeling, machine translation, and named entity recognition.

d. Gated Recurrent Unit (GRU):

GRUs are another type of RNN that simplifies the architecture compared to LSTM while still maintaining effectiveness. GRUs have gating mechanisms that control the flow of information, allowing them to capture dependencies over long sequences. They are commonly used in tasks like text generation and speech recognition.

e. Autoencoder (AE):

Autoencoders are unsupervised learning models that aim to reconstruct their input data. In NLP, autoencoders have been used for tasks such as text generation, text summarization, and feature learning. By learning a compressed representation of the input, autoencoders can capture salient features and generate meaningful output.

2.

If the gradients vanish too quickly, the network may struggle to learn meaningful representations, which can hinder its generalization ability. On the other hand, if the gradients explode, it may lead to unstable training and difficulty in finding an optimal solution.

Both vanishing gradient and overfitting can increase computational load during training.

To address these issues, techniques such as gradient clipping, weight initialization strategies, regularization (e.g., dropout, L1/L2 regularization), and architectural modifications (e.g., residual connections) are employed to stabilize training, encourage better generalization, and reduce computational load.

To learn more about overfititing: https://brainly.com/question/5008113

#SPJ11

Word indicates the size of the table by ____ at the top of the grid when dragging the pointer across a selection

Answers

When dragging the pointer across a selection in Word, the size of the table is indicated by a highlight box at the top of the grid.

The box shows the number of rows and columns that are being selected as the pointer moves over the cells. Once the desired size of the table is highlighted, the user can release the mouse button to create the table with the selected dimensions. This feature is useful for creating tables with specific sizes quickly and accurately. Additionally, Word provides options to adjust the size of the table after it has been created, such as adding or removing rows and columns or changing the width and height of individual cells.

Find out more about Words

brainly.com/question/14905545

#SPJ4

EASY POINTS what favorate food
so easy

Answers

Answer:

ramen

Explanation:

Answer:

Pizza and RAMEN

Explanation:

Select the correct answer.
Michelle performs certain administrative tasks on her computer. But she does have permission to make all system updates. What kind of user is
Michelle?
OA
administrator
OB.
power user
О с.
guest
D.
standard user

Answers

Answer:

administrator

Explanation:

An administrator user is one that has certain privileges that a guest, standard or power user does not have. Such a person can modify system data, view properties, and perform other administrative tasks on the computer.

Therefore, Michelle is an administrative user because she has permission to make all system updates

(Markov matrix)
An n by n matrix is called a positive Markov matrix if each element is positive and the sum of the elements in each column is 1. Write the following function to check whether a matrix is a Markov matrix.
const int SIZE = 3;
bool isMarkovMatrix(const double m[][SIZE]);
Write a test program that prompts the user to enter a 3 by 3 matrix of double values and tests whether it is a Markov matrix. Here are sample runs:
Sample Run 1
Enter a 3-by-3 matrix row by row:
0.15 0.875 0.375
0.55 0.005 0.225
0.30 0.12 0.4
It is a Markov matrix
Sample Run 2
Enter a 3-by-3 matrix row by row:
0.95 -0.875 0.375
0.65 0.005 0.225
0.30 0.22 -0.4
It is not a Markov matrix

Answers

The program checks if a given matrix is a Markov matrix by verifying if each element is positive and if the sum of the elements in each column is equal to 1. It provides a function `isMarkovMatrix` and a test program to validate the user-entered matrix.

What does the provided program do and how does it check if a matrix is a Markov matrix?

The given program code defines a function `isMarkovMatrix` that takes a 2D array `m` of double values and checks whether it is a Markov matrix.

The function checks if each element is positive and if the sum of the elements in each column is equal to 1. It returns a boolean value indicating whether the matrix is a Markov matrix.

The test program prompts the user to enter a 3 by 3 matrix and calls the `isMarkovMatrix` function to check if it is a Markov matrix.

Based on the result, it displays whether the entered matrix is a Markov matrix or not.

It provides sample runs to illustrate the program's functionality, where the user can input a matrix and see if it satisfies the conditions of a Markov matrix.

Learn more about Markov matrix

brainly.com/question/31255566

#SPJ11

Berapakah keluaran dari kode berikut ini
int sum = 0;
for (int i = 0; i < 10; ++i)
sum += i;
System.out.println(sum);
10
20
45

Answers

What is the output of the following code snippet?

```java
int sum = 0;
for (int i = 0; i < 10; ++i)
 sum += i;
System.out.println(sum);
```
The possible outputs are: 10, 20, or 45.


1. Declare and initialize an integer variable `sum` with the value of 0.
2. Run a for loop with an integer variable `i` starting at 0, and incrementing by 1 each iteration until it reaches 10 (excluding 10).
3. In each iteration, add the value of `i` to the `sum`.
4. After the loop finishes, use the `println` method to print the value of `sum`.

Let's calculate the value of `sum`:

- i = 0: sum = 0 + 0 = 0
- i = 1: sum = 0 + 1 = 1
- i = 2: sum = 1 + 2 = 3
- i = 3: sum = 3 + 3 = 6
- i = 4: sum = 6 + 4 = 10
- i = 5: sum = 10 + 5 = 15
- i = 6: sum = 15 + 6 = 21
- i = 7: sum = 21 + 7 = 28
- i = 8: sum = 28 + 8 = 36
- i = 9: sum = 36 + 9 = 45

After the loop, the value of `sum` is 45. Therefore, the output of the code snippet is 45. Your answer: 45.

Learn more about iteration here:

https://brainly.com/question/30890374

#SPJ11

under linux filename conventions, the ____ represents the root directory.

Answers

Under Linux filename conventions, the forward slash (/) represents the root directory.

The root directory is the top-level directory in the Linux file system hierarchy and serves as the starting point for navigating the file system.

In Linux, directories are organized in a hierarchical structure, with the root directory at the top. All other directories and files are located within the root directory or its subdirectories.

When specifying file paths in Linux, the root directory is denoted by a single forward slash (/). For example, the path /home/user/file.txt refers to the file.txt located in the user's home directory.

The root directory is often referred to as the "root of the file system" and is represented by the forward slash to indicate its position at the highest level in the directory structure. It contains important system files, configuration directories, and other essential components of the Linux operating system.

To learn more about Linux visit : https://brainly.com/question/12853667

#SPJ11

A simple machine increases the distance that a force needs to be applied from 3 meters to 27 meters, and the work done is 216 joules. How much force is applied?.

Answers

The work done is 216 joules, and a simple machine extends the distance over which a force must be exerted from 3 meters to 27 meters. The applied force is 8N.

By shifting the direction in which the force must be applied, the output force can be divided by the input force. 3N  W=△E  8N

A physical system known as a machine uses power to apply forces, regulate movement, and carry out an action. In addition to naturally occurring biological macromolecules like molecular machines, the phrase is frequently used to describe artificial devices that use engines or motors. Machines can be propelled by humans, animals, and natural forces like wind and water. They can also be propelled by chemical, thermal, or electrical energy. These machines typically have a system of mechanisms that shape the actuator input to produce a particular application of output forces and movement. They can also contain mechanical systems, which are generally referred to as computers and sensors that track performance and coordinate movement.

The six basic mechanisms that move a load were named by Renaissance natural philosophers as simple machines.

Learn more about machine here:

https://brainly.com/question/15197944

#SPJ4

In IPv4 addressing, a node with an IP address of 168.34.88.29 belongs to a Class ____ network.
a. A
b. B
c. C
d. D

Answers

A node with the IP address 168.34.88.29 is a Class B network member in IPv4 addressing.

What are the names of the two parts an IPv4 address?The IPv4 address consists of two components. The host identifier, also known as host ID, comes in two parts: the first is the network identifier, also known as network ID. that which comes before an IP address. The network can be located using its network ID.On a specific workstation, the ipconfig /all utility will show the current TCP/IP setup, including the default gateway, DNS settings, and current IP address.Application, Transport, Network, and Link layers are the foundational building blocks of the TCP/IP Protocol Stack. The TCP/IP protocol stack contains several layers, each of which serves a particular purpose.

To Learn more About IPv4 addressing refer To:

https://brainly.com/question/29441092

#SPJ4

Which of the following actions is most likely to result from a company exploiting value-enhancing opportunities across the value chain? Select one: A. Increasing the amount of inventory carried during the fiscal period B. Increasing the number of processes involved in producing a product C. Decreasing the number of suppliers relied upon for delivering input products and services D. Reducing the quality of the product or service provided

Answers

Exploiting value-enhancing opportunities across the value chain is most likely to result in decreasing the number of suppliers relied upon for delivering input products and services.

The correct answer is option C: Decreasing the number of suppliers relied upon for delivering input products and services. When a company identifies value-enhancing opportunities across the value chain, it aims to optimize its operations and increase efficiency to create more value for customers and stakeholders.

By decreasing the number of suppliers relied upon, the company can streamline its supply chain and build stronger relationships with a select group of suppliers. This can result in several benefits. Firstly, it can lead to better negotiation power and potentially lower costs through bulk purchasing or long-term contracts. Secondly, it can reduce supply chain complexity and improve coordination, communication, and collaboration with a smaller set of suppliers. This simplification can lead to increased operational efficiency and a more seamless flow of inputs throughout the value chain.

Furthermore, by working closely with a reduced number of suppliers, the company can develop stronger partnerships, fostering trust and enabling joint efforts for continuous improvement and innovation. This, in turn, can contribute to enhancing the quality of products or services provided, as the company can focus on building expertise and delivering higher value through a more concentrated supplier network.

In summary, exploiting value-enhancing opportunities across the value chain is likely to result in decreasing the number of suppliers relied upon for delivering input products and services. This strategic move can help optimize the supply chain, improve operational efficiency, and foster stronger partnerships, ultimately leading to better quality and value for customers.

Learn more about value-enhancing here:

https://brainly.com/question/29841941

#SPJ11

If a driver update creates a problem, you can __________________ the driver update if the previous drivers were working.

Answers

Answer:

rollback the driver update if the previous drivers were working

Harry is the cloud administrator for a company that stores object-based data in a public cloud. Because of regulatory restrictions on user access to sensitive security data, what type of access control would you suggest he implement to meet his company's security policies?

Answers

Answer:

The correct answer will be "Mandatory access control".

Explanation:

MAC seems to be a security standard protocols limited by the designation, initialization including verification of the systems. These policies and configurations are implemented through one centralized controller and therefore are accessible to the system admin.MAC establishes and maintains a centralized implementation of sensitive requirements in information security.

What is the default layout position for images added to a Word 2016 document? square, where the text wraps around an image around a square border through, where the text wraps around an image with irregular borders in front of the text, where the image is placed over the text in-line, with the text where the text stays with the image

Answers

Answer: in- line, with the text where the text stays with the image

Explanation:

Answer:

D: in-line, with the text where the text stays with the image

Explanation:

Just did it on edge :D hope this helps

when designing a security-in-depth strategy, firewalls and vpns would be examples of what type of control?

Answers

When a security-in-depth strategy is being designed for an information system (IS), firewalls and virtual private networks (VPNs) are classified as examples of: network access.

What is a security-in-depth strategy?

A security-in-depth strategy is also referred to as a defense-in-depth strategy and it can be defined as an approach (technique) in cybersecurity that typically involves the use of multiple layers of security in order to holistically protect a network.

Hence, a security-in-depth strategy is designed and developed with similarity to an onion and as such if one security layer fails to protect a network from an attack, another layer would definitely protect it.

In a security-in-depth strategy, network access determine the authenticity of a user credentials and then decides whether or not to grant access to the user. Some examples of network access control include:

FirewallsVirtual private networks (VPNs)

Read more on cybersecurity here: https://brainly.com/question/24112967

When delivering digital technologies to clients, what is a best practice to make those solutions sustainable?

Answers

When delivering digital technologies to clients, a best practice to make those solutions sustainable is: A. Recommend the client spread out their data centers to distribute energy usage globally.

What is a computational sustainability?

Computational sustainability can be defined as a process through which societal, economic, ecological and societal resources are balanced for the future well-being of humanity, especially by developing computational models and using mathematical and information science techniques.

In this context, we can infer and logically deduce that a best practice to make solutions sustainable is recommending that client should spread out their data centers to distribute energy usage globally when delivering digital technologies to clients.

Read more on computational sustainability here: https://brainly.com/question/25719495

#SPJ1

Complete Question:

When delivering digital technologies to clients, what is a best practice to make those solutions sustainable?

A. Recommend the client spread out their data centers to distribute energy usage globally.

B. Sign non-disclosure agreements when a solution will have a negative environmental impact.

C. Incorporate sustainability into the design and build of the solution from the beginning.

D. Review the solution after building and look for ways to improve sustainability.

A report has a column of totals, with each total adding to the cell above it. What kind of calculated figure is this?

a percentage

a sum

a grand total

a running sum

Answers

Answer:

The kind of calculated figure is;

A running sum

Explanation:

A running sum is the sequence of the partial sums of numbers which is formed by adding the value of any new number to the value of the previous running total to create a new updated running total

With the use of running totals, cash register are able to display the totals sum in the register thereby easing the task finding the sum of all entries at each point the sum total is requested

The running sum creates data input savings where the the sum of the entries rather than the individual entries are of interest.

Answer:

d

Explanation:

the order of activities in system implementation projects is determined by the implementation team according to the organization’s needs and resources.TrueFalse

Answers

True. The order of activities in system implementation projects is usually determined by the implementation team based on the specific needs and available resources of the organization.

This includes tasks such as project planning, requirements gathering, design, development, testing, training, and deployment. The team will need to consider factors such as timelines, budget, staffing, and risk management when determining the order of these activities.

To know more about system refer https://brainly.com/question/27927692

#SPJ11

A database opened in ________ mode allows only one user at a time the ability to open and edit the database

Answers

Answer:

A database opened in exclusive mode allows only one user at a time the ability to open and edit the database.

A garments manufacturing company buys various types of natural and synthetic materials to produce clothes. Which material is a synthetic material?

A. cotton
B. nylon
C. jute
D. silk
E. linen

I need this answer please!! 20 points

Answers

a is the correct answer of the question

Answer: A.

Explanation:

1)Write a Q-Basic program that takes length & breadth and find the area of rectangle.​

Answers

Answer:

CLS

INPUT "Enter the length of the rectangle: ", L

INPUT "Enter the breadth of the rectangle: ", B

A = L * B

PRINT "The area of the rectangle is "; A

END

Explanation:

Here's a QBasic program that takes the length and breadth of a rectangle as input and calculates its area:

---------------------------------------

CLS

INPUT "Enter the length of the rectangle: ", L

INPUT "Enter the breadth of the rectangle: ", B

A = L * B

PRINT "The area of the rectangle is "; A

END

------------------------------------------

The CLS statement clears the screen before the program starts running. The INPUT statements prompt the user to enter the length and breadth of the rectangle, which are stored in variables L and B, respectively. The area of the rectangle is then calculated by multiplying L and B and stored in the variable A. Finally, the PRINT statement displays the area of the rectangle. The END statement ends the program.

Describe in 2–3 sentences how you would use the autosum shortcut.

Answers

Autosum is an easy and fast way to add values in the Excel sheet. This feature is used in MS office.

A list of numbers when given for adding the values, we used to use addition function or Autosum shortcut in the Ms Excel.

When this Autosum shortcut is not in use, user can find the addition of values by using equal sign following by the addition process.

Or we can say, = Row 1 + Row 2.

Autosum can be available in the Home or formula tabs.

The shortcut for using an Autosum feature in Excel is Alt+=.

To learn more about the Autosum,

https://brainly.com/question/14313040

Answer:

Explanation:

Adding values to an Excel sheet is simple and quick with autosum.

The Home or Formula tabs may both contain this.

Alt+= is the keyboard shortcut for Excel's aAutosum feature.

two different numbers and find the sum, p and difference of the numbers. Draw a flowchart to find the greater number among two input Draw a flowchart to print the odd numbers from 1 to 21 and sum. Write an algorithm and draw the flowchart to print the odd numbers from 1 to 99 and also find their sum. ​

Answers

This prompt requires 4 different algorithms. See the algorithms given below.

What is an algorithm?

An algorithm is a step-by-step technique that outlines a series of instructions that must be followed in a precise order in order to generate the intended outcome.

To find the sum, p, and difference of two different numbers, you can use the following algorithm:

Input two numbers a and b

Set sum = a + b

Set p = a * b

Set difference = a - b

Output sum, p, and difference

The Flow chart is as follows;

start

   -> input a

   -> input b

   -> sum = a + b

   -> p = a * b

   -> difference = a - b

   -> output sum, p, and difference

end

2. To find the greater number among two inputs, you can use the following algorithm:

Input two numbers a and b

If a is greater than b

   Set greaterNumber = a

Else

   Set greaterNumber = b

Output greaterNumber

The flow chart is as follows:

Input two numbers a and b

|

V

Is a greater than b?

|

V

No--------Yes

|          |

V          V

Set greaterNumber = b     Set greaterNumber = a

|

V

Output greaterNumber


3. To print the odd numbers from 1 to 21 and find their sum, you can use the following algorithm:

Set sum = 0

For i = 1 to 21

   If i is odd

       Print i

       Set sum = sum + i

Output sum


Here is the flowchart for the above:

Start

Set sum = 0

For i = 1 to 21

   If i is odd

       

       Print i

       Set sum = sum + i

   End If

End For

Output sum

End


4. To print the odd numbers from 1 to 99 and find their sum, you can use the following algorithm:

Set sum = 0

For i = 1 to 99

   If i is odd

       Print i

       Set sum = sum + i

Output sum

┌───────────┐

│ Set sum = 0│

└──────┬────┘

      │

      ▼

┌───────────┐

│  Set i = 1│

└──────┬────┘

      │

      ▼

┌───────────┐

│ if i is odd│

│ Print i   │

│ Set sum = │

│ sum + i   │

└──────┬────┘

      │

      ▼

┌───────────┐

│   Set i = │

│ i + 1     │

└──────┬────┘

      │

      ▼

┌───────────┐

│if i <= 99 │

└──────┬────┘

      │

      ▼

┌───────────┐

│ Output sum│

└───────────┘

Learn more about algorithms:
https://brainly.com/question/28724722
#SPJ1

What are the design elements in the B-2 bomber than the video says reduces its radio signature?

Answers

Answer:

Manufacturer: Northrop Grumman Corp.

Power Plant: Four General Electric F118-GE-100 engines

Speed: High subsonic

Range: Intercontinental

Ceiling: 50,000 feet (15,240 meters)

Armament: Conventional or nuclear weapons

Crew: Two pilots

Payload: 40,000 pounds

Explanation:

Designed during the Cold War as the world’s first low-observable or “stealth” strategic bomber, the B-2 Spirit harkens back to the designs of revalutionary engineer Jack Northrop. His “flying wing” design first debuted in 1949 as the YB-49 but was not adopted by the Air Force at the time. The B-2 Spirit is a multi-role bomber capable of delivering both conventional and nuclear munitions. The bomber represents a major milestone in the U.S. bomber modernization program and brings massive firepower to bear anywhere on the globe through previously impenetrable defenses.

Other Questions
What was the purpose of the several pavilions likely to be found as part of a nobleman or high-ranking individuals house and compound?. Mr. Wilson and Miss Krietz have homerooms with the same perimeter. Miss Krietz's homeroom has a length 1 1/4 times the length of Mr. Wilson's homeroom. What is the width, w, of Miss Krietz's homeroom? bananas are to be cooled from 24 to 13 c at a rate of 215 kg/h by a refrigeration system. the power input to the refrigerator is 1.4 kw. determine the rate of cooling, in kj/min and the cop of the refrigerator. the specific heat of a banana above freezing is 3.35 kj/kg c When Law Enforcement finds a driver's normal faculties are impaired, they can issue a DUIA. only if the person is well above the legal limit.B. even if the person is under the legal limit.C. only if the person Is at the legal limit or above. just wrote it in order please 6th grade work due today helppppppppp how calculate ratio product reactants given inital concentration and percent forward backward reaction Marcus and his family are planning a vacation that involves horse back riding. Horseshoe Ranch charges a $12.95 ranch entrance fee plus a $14.95 an hour to rent horses for horse back riding. Mary is going to rent a horse for 3 hours, how much will she spend? Rhetoric is ________ a. the study of persuasion in its various forms. b. a formerly important element of a liberal arts education that is unimportant today. c. an approach to communication that devalues critical thinking. d. the ability to discern the speaker's intentions and biases. e. the ability to talk in a way that obscures the real issue. WILL GIVE BRAINLIESTBRAINLIESTBRAINLIESThelp with number one please y = 5.27 3x 2y = -12 What does SDS stand for and what does it tell you? Draw a plant cell and animal cell in cytokinesis (or include pictures) Indicate they key structure that separate the dividing cells during the end of telophase during cytokinesis for plant and animal cells. Compare the length of time (from lab) that it takes a plant versus an animal Help Please!Solve the inequality and graph its solution. 3. would the acceleration have been different if the atwood machine had been started with an initial velocity? QuestionWhich statement is true based on the information presenting in the graph below100 POINTS + BRAINLIEST as milee transitions from middle childhood to adolescence, she will likely add several new dimensions of self-evaluation, such as A(n) ________ does not coincide with a presidential election. Peters teacher says he may have his report card percentage based on either the mean or the median and he can drop one test score if he chooses.84%, 71%, 64%, 90%, 75%, 44%, 98%Which measure of center should Peter choose so he can have the highest percentage possible?Peter should choose the mean after dropping one test score.Peter should choose the mean without dropping one test score.Peter should choose the median after dropping one test score.Peter should choose the median without dropping one test score. PLEASE HELP ASAPI think its supposed to be an arithmetic series or sequence. Kaydence is saving for an RRSP. She saved $100 the first year, $200 the second year, $300 the third year, and so on. If she put $100 away on January 1, 2014, $200 away on January 1, 2015, and continued to put money away on the first of each year, how much money would Kaydence have saved by the end of the day on January 1, 2050? A female originally from Haiti who comes to work at Verizon in the United States is likely to have which of the following reactions to the culture of the company? She is likely to feel that her thoughts and opinions are valued within the organization.