Consider this function comment. Which of the following options is recommended in your textbook? Computes the area of a cuboid. eparaml width the width of the cuboid eparam2 height the height of the cuboid eparam3 length the length of the cuboid ereturn the area of the cuboid double area(double width, double height, double length) double result - width +height 1ength; return result: A. The comments are adequate to describe the function. B. The lines need to end with semicolons like other C++ statements. C. The parameters should be described more completely. D. The eparaml, eparam2, eparam3 should be just eparam.

Answers

Answer 1

Answer:

A. The comments are adequate to describe the function.

Explanation:

C++ programming language comments starts with two forward-slash ("//") and can be written above a code statement or at the right-hand side of the code statements

The comments of the area() function with three parameters width, height, and length are adequate to describe the function as it does not need to end with a semi-colon.


Related Questions

4.8 code practice question 2 edhesive

Answers

Answer:

for y in range(88, 43, -4):

   print(y, end=" ")

Explanation:

yw

The code practice is an illustration of loops;

Loops are program statements that are used to perform iterative operations

The complete program in Python

The program in Python, where comments are used to explain each action is as follows:

#This iterates from 88 to 42, with a difference of -4

for i in range(88, 43, -4):

#This prints the numbers on a single line

   print(i, end=" ")

Read more about loops at:

https://brainly.com/question/24833629

#SPJ2

Consider a distributed denial of service (DDOS) attack, Assume the attacker has compromised a number of broadband connected computers to use as zombie systems. If the ISP provides a maximum uplink data rate of 512 Kbps in ADSL, what is the maximum number of 512-byte ICMP echo request (ping) packets a single zombie computer can send per second? How many such zombie systems would the attacker need to flood a target server in an organization that has
a. A Fast Ethernet.
b. A Gigabit Ethernet.

Answers

Answer:

A ) 200 Zombie systems

B ) 200 Zombie systems

Explanation:

maximum uplink data rate : 512 kbps = 512 * 1000 * 8  = 4096000 bits/sec

Determine the number of 512 byte  ICMP echo packets = 512 * 8 = 4096 bits

hence the maximum number of 512-byte ICMP echo request (ping) packets a single zombie computer can send per second = 400 packets/sec

i.e. for 512kbps = 400 packets/sec

Determine the number of Zombie systems that the attacker will need to flood a target server

A) For a fast ethernet

A fast ethernet = 100 mbps

The number of Zombie systems needed = 1 zombie system * 200

and 1 zombie system = 512 kbps

therefore for a Fast ethernet the number of zombies systems needed = 200

B) For A Gigabit Ethernet

same as a fast ethernet system i.e. = 200

How can we tell the computer what to put on the web page, and how to organize it?​

Answers

Answer:

[tex]\boxed {\boxed {\sf Code}}[/tex]

Explanation:

Humans communicate with computers through code.

For web pages, HTML (HyperText Markup Language) is used.

A person writes the code to tell a computer what to display and how to structure the displayed information. You can create webpages with any information, add pictures, links, headings, paragraphs, change fonts, and more, all through the use of code.

When a called function completes its task, it normally:_________a. logs its results b. terminates program execution normally c. aborts program execution d. returns to the calling function

Answers

Answer:

sorry this is tought

Explanation:

no idea

What are the three categories of managerial decisions?

Answers

                                Top 3 levels of management

Strategic Production Planning

Technology decision

Capacity decisions

Assume a branch instruction bne $t1, $t2, Label is located in 0x00001840 in the instruction memory. The 16-bits branch address is 0x000C, If the branch is taken, what will be the new Program Counter (PC) value?

a. 0x00001844
b. 0x00001850
c. 0x00001870
d. 0x00001874

Answers

Answer:

a. 0x00001844

Explanation:

When the branch is takes the new program counter value is increased by 1. The value of existing memory is labelled with number sets and then next instruction is accepted in sequence. The new value is the increase in the current labelled value.

Which of the following are reasons why it is important to write readable code?
Choose all that apply.

Readable code is easier to maintain.

Readable code is easier to modify.

Readable code is fun to write.

Writing readable code saves time in the long run.

Answers

Answer:

Readable code is easier to maintain.

Writing readable code saves time in the long run.

Readable code is easier to modify.

Readable code is fun to write.

Explanation:

Readability of a code means that how easy it is to read the code even if any person other than programmer reads the code. Different techniques like line breaks and indentation are used to make the code readable. the program follows an indentation pattern so it is easy and fun to write.

Hence,

it can be concluded that the true statements are:

Readable code is easier to maintain.

Writing readable code saves time in the long run.

Readable code is easier to modify.

Readable code is fun to write.

Answer:

for short answer it is a,b and D

Explanation:

Before radio, many minority musicians were severely limited by the prejudice of the era. true o rfalse

Answers

Answer:

True

Explanation:

Minoritys have always faced prejudice

different between input and output device​

Answers

Answer:

An input device is something you connect to a computer that sends information into the computer. An output device is something you connect to a computer that has information sent to it.

Explanation:

What is the minimum size of a data type, in bytes, to be impacted by system endianness. (Whole numbers only)?

Answers

Answer:

30

Explanation:

A data type must be at least 2 bytes in size to be affected by the endianness system.

What is endianness system?

Endianness in computing refers to the arrangement of bytes inside a word of digital data stored in a computer's memory.

Big-endian or little-endian are the two main ways that endianness is stated.

The least significant byte in a word is kept at the largest memory location and the most significant byte is kept at the smallest address in a big-endian system.

The term "endianness" refers to the arrangement of bytes as they are stored in computer memory. Endianness is classified as big or little depending on which value is stored first.

Thus, for the endianness system to apply, a data type must be at least 2 bytes in size.

For more details regarding endianness system, visit:

https://brainly.com/question/14488920

#SPJ6

We wish to produce a graphic that is pleasing and easily readable. Suppose we
make the background color pink. What color text font should we use to make
the text most readable? Justify your answer.Assume that the color Pink is obtained by mixing equal amounts of Red and White. Use the RGB color model and assume that the amount of each primary color in the model is described in the interval [0 255]. Describe the color of the text font you would choose using these conventions.

Answers

Answer:

light color

Explanation:

When we will mix equal amounts or equal quantities of the color red and the color white, we will get the color reddish pink. It is popularly called as the SOFT RED and the color code of this color is RGB (255, 128, 128).

Since, red color + white color = 0.5 RGB(255, 0, 0) + 0.5RGB(255, 255, 255)

                                                 = RGB (255, 128, 128)

According to me, the color white will best suit as the text color that can be used for a background having RGB(255, 128, 128). Because the color looks more red and not that pink, so it wise to use a light tone color for the natural reading purpose. Hence, it will not give strain to the eyes.

Python rephactor

1. Write code that swaps the first and last elements in a list called my_list. Assume that the list has already been created and contains at least one element.

2.Write code that creates a Python set containing each unique character in a string named my_string. For example, if the string is 'hello', the set would be {'h', 'e', 'l', 'o'} (in any order). Assign the set to a variable named my_set. Assume that my_string has already been initialized.

Answers

1.

my_list = ([1,2,3,4,5])

h = my_list[-1]

my_list[-1] = my_list[0]

my_list[0] = h

print(my_list)

2.

my_string = "hello"

my_set = set(my_string)

print(my_set)

The list has already been created and contains one element. The python set of my string has been already initiated.

What is python set?

Python set is defined as a data type for unordered collections that is iterable, changeable, and lacks duplication of elements. There are essentially two sorts of sets in Python. the frozenset and the set. Whether the frozenset is changeable or not depends on the set type. On a set, we can use add(), remove(), and other operations of this nature; however, frozenset does not support these actions.

The program is

your list = ([1,2,3,4,5])

my list[-1] = h

MyList[-1] equals MyList[0]

h print(my list, "my list");

"hello" is my string

set(my string) my set

print(my set)

Thus, the list has already been created and contains one element. The python set of my string has been already initiated.

To learn more about python set, refer to the link below:

https://brainly.com/question/14936500

#SPJ5

When you pass a double variable to a method, the method receives ______.a) a copy of the memory addressb) the reference of the variablec) the length of the variabled) a copy of the variablee) the binary memory address

Answers

Answer:

The answer is "Option d".

Explanation:

In this question the choice d, that is "a copy of the variable" is correct because the method takes a reference value or a copy of the variable in its parameter, the example of this question can be defined as follows:

void me2(double x)//defining a method me2 with a double parameter

{

//method body

 }

double x = 35.655;//defining a double variable x

me2(x);//calling a method with passing the copy of th e variable

What are some areas in Computer Science that make use of multivariate statistical testing or MCM methods? Explain why they are used.

Answers

Explanation:

Computational modeling is one of the areas of Computer Science that uses mathematical systems to perform multivariate statistical tests to solve highly complex problems in multidisciplinary areas, such as medicine, engineering, science, etc.

An example of the use of multivariate statistical tests is social development research in social science, which uses multiple variables to find more hypotheses and greater coverage between variables.

Multivariate statistical tests have the benefit of making research more effective and providing a more systematic and real view of the study.

in the middle of the iteration, how should a team handle requirement changes from the customer

Answers

Answer:

Team may take up the changes in flight after discussing the overall impact with the Product owner

Explanation:

In the middle of the iteration, one of the best ways a team should handle requirement changes from the customer is to take up the changes in flight after discussing the overall impact with the Product owner.

This will make the customer well aware of the advantages and disadvantages that come with changes in the requirement, such that, the customer will be surprised about the final outcome of the iteration.

Why is content knowledge as important as generalized critical thinking for Web Analytics and Web Intelligence reporting and insights? A) Because it's very difficult for students to apply critical thinking skills learned in one subject to another, even between different fields of science. B) It is said that content is king and that having up to date content knowledge of Web Analytics is crucial in order to be an effective Analyst C) Everything is changing so fast that you need to keep up to date with the changes in the platforms that you use or are considering using for personal or organizational deployment. D) Content knowledge of Web Analytics is important because in a field like emerging technology that Web Analytics is still considered to be, new features of a Web Analytics platform can have a major impact on the ability to do the project and deliver value from it.

Answers

Answer:

B) It is said that content is king and that having up to date content knowledge of Web Analytics is crucial in order to be an effective Analyst

Explanation:

The answer is option B. A good knowledge of content is very important and crucial due to the fact that knowledge stands at the center or the most important thing in the business sector.

Web analytics is a method of measuring, analysing and reporting web usage data. Content knowledge is a good understanding of the subject area. To understand web analytics, a going knowledge of the facts, theories and concepts are important if one wants to be an effective analyst.

Therefore b is the answer to this question.

Question 1 (1 point)
What is an advantage of the wireless option for peripheral?

Answers

I am not sure let me search it

Why would a programmer use a flow chart? (Edge2020 Coding Critical Thinking Questions)

Answers

Answer:

As a visual representation of data flow, flowcharts are useful in writing a program or algorithm and explaining it to others or collaborating with them on it. You can use a flowchart to spell out the logic behind a program before ever starting to code the automated process.

Explanation:

Answer: I answered yo can give the other guy brainliest yw

Explanation:

solve the system of equations and choose the correct ordered pair.

4x+5y=22
2x+3y = 12

Answers

Answer:

(3,2) x = 3, y = 2

Explanation:

A Python programmer is writing a function definition. What syntax should be used?
def( statement ): functionName
argument1
argument2
argument3
def functionName( arguments ):
statement1
statement2
statement3
def functionName( statement ):
argument1
argument2
argument3
def( arguments ): functionName
statement1
statement2
statement3

Answers

Answer:

Python - Functions

Advertisements

A function is a block of orgaof code that is used to perform a single, related action. Functions provide better modularity for your application and a high degree ofAdvertisement

As you already know, Python gives you many built-in functions like print(), etc. but you can also create your own functions. These functions are called user-defined functions.

Defining a Function

You can define functions to provide the required functionality. Here are simple rules to define a function in Python.

Function blocks begin with the keyword def followed by the function name and parentheses ( ( ) ).

Any input parameters or arguments should be placed within these parentheses. You can also define parameters inside these parentheses.

The first statement of a function can be an optional statement - the documentation string of the function or docstring.

The code block within every function starts with a colon (:) and is indented.

The statement return [expression] exits a function, optionally passing back an expression to the caller. A return statement with no arguments is the same as return None.

Answer:

def functionName( arguments ):

statement1

statement2

statement3

Explanation:

A user creates a GPO. What do you need to do for that user to manage his or her GPO that he or she created?

Answers

Answer: Nothing should be done.

Explanation:

Group Policy helps in the provision of a centralized management of operating systems, and applications. It should be noted that a group policy object (GPO) is simply referred to as the configurations involving the group policy.

Nothing should be done to manage the GPO created. When the permission to create a GPO has been given to someone, it means that they can also manage the GPO therefore, nothing needs to be done anymore.

Which of the following online activities seem appropriate for the workplace? (select all that apply) A.watching a webinar to learn new job skills
B.watching TV online
C. seeking donations to support your election to the Senate
D. reading press releases from your company's competitors
E. sharing career advice with your peers
F. sharing company secrets in a public forum​

Answers

Answer:

A, D, and E

watching a webinar to learn new job skills

reading press releases from your company’s competitors

sharing career advice with your peers

Explanation:

got it right on edge2020

The online activities that seem appropriate for the workplace  is sharing career advice with your peers.

What are virtual activities?

The virtual activities are known to be any kind of online activities that is often done by people to make sure they have good and continued collaboration with other people.

Conclusively, Note that the use of online activities in the workplace should be the one that will help you and your peers to grow such as  sharing career advice with your peers.

Learn more about  online activities  from

https://brainly.com/question/13171394

Return-from-trap instruction returns into the calling user program while simultaneously reducing the privilege level back to ________ Select one: a. User mode b. Kernel mode c. OS mode d. CPU mode

Answers

Answer:

A. user mode

Explanation:

A computer system is a machine that is run by a series of programs that connect the virtual parts (software) to the hardware or electronic parts. The kernel is a computer program that connects the software and hardware of a computer system.

The kernel-mode has several privileges like I/O, interrupts and traps, etc. This mode is tapped by root or administrators to utilize these privileges. Unlike the kernel mode, the user-mode does not have these functions, so a return from the trap instruction (kernel) reduces the privileges back to the user mode.

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.

Answers

Answer:

Define a function pyramid_volume with parameters base_length, base_width, and pyramid_height, that returns the volume of a pyramid with a rectangular base.

Explanation:

thats all you said

In python 3.8:

def pyramid_volume(base_length, base_width, pyramid_height):

   return round((base_length*base_width*pyramid_height)/3,2)

print(pyramid_volume(1,1,2))

I used the round function to round the volume to 2 decimal places. You can change this if you need more or less precision. I hope this helps!

A Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with one of the nation’s largest

A)retail sellers of computers and related accessories.
B)in-store computer repair and service companies.
C)developers of computer operating systems.
D)makers of computer networking equipment.

Answers

Answer:

C

Explanation:

This job will have the largest amount of 1. computer programmers, 2. like-minded coworkers, and 3. a large number of like-minded coworkers.

Please give Brainliest if accurate!

The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.

What is  the term like-minded?

The Definition of the term like-minded is known to be when two or more people like or have the same purpose, habit or thought.

Therefore we can say that The Computer Programmer who wants to be surrounded by a large number of like-minded coworkers should take a job with developers of computer operating systems.

Learn more about Programmer from

https://brainly.com/question/23275071

#SPJ2

One of the systems analysts on the project team thought that he did a good job of designing the company’s tech support webpage, but his supervisor isn’t so sure. His supervisor is concerned that the design is very similar to a page used by the company’s major competitor, and she asked him whether he had used any HTML code from that site in his design. Although the analyst didn’t copy any of the code, he did examine it in his web browser to see how they handled some design issues. The supervisor asked the analyst to investigate webpage copyright issues and report back to her. In his research, the analyst learned that outright copying would be a copyright violation, but merely viewing other sites to get design ideas would be permissible. What is not so clear is the gray area in the middle. The analyst asked you, as a friend, for your opinion on this question: Even if no actual copying is involved, are there ethical constraints on how far you should go in using the creative work of others? How would you answer?

Answers

Explanation:

Although the system analyst only viewed the HTML code as a major competitor not outrightly copying their code, however, since there are relatively few legal frameworks on this matter, it important to note some ethical issues or constraints that may arise:

Copying the design pattern of the competitors' webpage may result in legal fillings by the competitors which may claim the other company stole its intellectual designs without permission.Such actions may result in other competitors carrying out the same strategy on the company.

The task of handling how active processes are making efficient use of the CPU processing cycles is called_______?

Answers

Answer:

Scheduling.

Explanation:

A scheduling computer system refers to an ability of the computer that typically allows one process to use the central processing unit (CPU) while another process is waiting for input-output (I/O), thus making a complete usage of any lost central processing unit (CPU) cycles in order to prevent redundancy.

Hence, the task of handling how active processes are making efficient use of the central processing unit (CPU) processing cycles is called scheduling.

In terms of the scheduling metrics of a central processing unit (CPU), the time at which a job completes or is executed minus the time at which the job arrived in the system is known as turnaround time.

Generally, it is one of the scheduling metrics to select for optimum performance of the central processing unit (CPU).

What feature allows you to access previous copies of a document on OneDrive?

File storage
Recover file
Stored work
Version history

Answers

Version history feature

OneDrive's Version history feature allows you to view older versions of an Office Online document. If you find a version you want, you can then restore it, moving it to the top of the list as the latest version of the file.

Answer:

Version history

Explanation:

PLEASE HELPP
Why do you think it is important to write your high school plan in middle school? Explain your answer in 3-4 well written sentences.

Answers

Answer:

Es muy importante que escriba su plan para la escuela secundaria antes de llegar a la escuela secundaria. Te da algo a lo que admirar cuando llegas a la escuela secundaria. Cuando lo complete, sabrá que hizo algo bien. Entonces puede establecer sus metas cada vez más altas, dándole la oportunidad de una buena vida.

can be referred to as a universal network of interrelated computers which delivers a very wide variety of information and communications facilities to organizations and individual users.

A)Global Communication


B)Social Media Platform


C)Internet


D)Technological Advancement

Answers

Answer:

Internet

Explanation:

just took the test and got A

Other Questions
Using the equations2 CH (l) + 15 O (g) 12 CO (g) + 6 HO (g)H = -6271 kJ/mol2 H (g) + O (g) 2 HO (g) H = -483.6 kJ/molC (s) + O (g) CO (g) H = -393.5 kJ/molDetermine the enthalpy (in kJ/mol) for the reaction6 C (s) + 3 H (g) CH (l). How did the Treaty of Paris and the end of the French and Indian War impact the future of the US? how long should an argumentative essay be? Solve for x.-18x + 21 > -15 OR 20x 13 >27 help please #16 already found x cant figure out y A florist delivers flowers to anywhere in town. D is the distance from the delivery address to the florist shop in miles. The cost to deliver flowers, based on the distance d, is given by C(d) = 0.04d^3 - 0.65d^2 + 3.5d + 9. Evaluate C(d) for d = 6 and d = 11, and describe what the values of the function represent Suppose the owner of a local apple orchard has 4 half-bushels of apples to sell. He loads them on his truck, and drives his route, stopping at stores along the way attempting to sells the apples. Suppose:- Each half-bushel is sold for $40.- It will cost $15 of gas to drive the route.Historically, the orchard owner knows he will have a 40% chance of making no sales, a 30% chance of selling 1 half-bushel, a 10% chance of selling 2 half-bushels, and a 10% chance of selling 3 half-bushels.(a) Calculate the orchard owners expected profit from driving the route.(b) Calculate the standard deviation of the profit from driving the route. What type of mood is created in this excerpt from "The Raven" by Edgar Allan Poe?Back into the chamber turning, all my soul within me burning,Soon again I heard a tapping something louder than before."Surely," said I, "surely that is something at my window lattice;Let me see, then, what thereat is and this mystery exploreLet my heart be still a moment and this mystery explore;-Tis the wind and nothing more.O mysterioustragicO O O O Ohopelesslonelyfearful PLEASE HELP NEED IN 10 MINUTES Students in Ms. Castillo's art classes could choose to make a sculpture or paint a picture as theirfinal project. The ratio of those who chose to make a sculpture to those that chose to paint apicture was 3 to 7. There were 24 students who chose to make a sculpture. Let p be the numberof students who chose to paint a picture. Set up a proportion that will allow you to solve for thevalue of p. What comes between 1/2 and 2/3 The coldest temperature last December was 18.24 degrees. The difference between this and the highest recorded temperature was 56.24 degrees. What was the highest recorded temperature? Examples of ovoviviparous animal Check the box labeled Show Segment Parallel to BC. Notice that DE intersects two sides of triangle ABC creating a smaller triangle, triangle ADE. How is triangle ADE related triangle ABC to ? How do you know? In a paternity testing case, a child's DNA was collected to see if it matched both parents' DNA. Which type of genetic material can be used for the DNA fingerprinting?A. Coding DNAB. Noncoding DNAC. RNA 3Select all the correct answers.Which two statements describe outcomes of the Latin American revolutions?Spain continued to control Mexico because its people spoke Spanish.Many new nations in Latin America struggled to create a government and a stable economy.James Monroe supported the independence movements and warned European nations to stayawayAll South American nations permanently united into a single nation led by Simn Bolvar.ResetNext Why can you use cross products to solve the proportion StartFraction 18 over 5 EndFraction = StartFraction x over 100 EndFraction for x? Which stage in the life cycle of a movement is marked by much broader acceptance of the movement's ideas or attitudes?declinecoalescenceemergencebureaucratization Increased amounts of carbon in Earths atmosphere may lead to global warming.what might global warming then lead to A building was purchased for $68,000. The asset has an expected useful life of eight years and depreciation expense each year is $5,000 using the straight-line method. What is the residual value of the building?A. $13,625 B. $8,625 C. $37,000. Two marathon runners run the full distance of the marathon, approximately 26 miles, in 4 hours.Part AAbout how many miles did they run in 1 hour?Enter the correct answer in the box. Part BWhat percent of the full distance have they run in 1 hour?Enter the correct answer in the box.