Answer:
numInsects = 16
while numInsects < 200:
print(str(numInsects) + " ", end="")
numInsects *= 2
Explanation:
*The code is in Python.
Set the numInsects as 16
Create a while loop that iterates while numInsects is smaller than 200. Inside the loop, print the value of numInsects followed by a space. Then, multiply the numInsects by 2.
Answer:
// here is code in C++(bmi.cpp).
#include <bits/stdc++.h>
using namespace std;
// main function
int main()
{
// variables
float weight,height;
cout<<"enter the weight(in kilograms):";
//read the weight
cin>>weight;
cout<<"enter the height(in meters):";
//read the height
cin>>height;
// calculate the bmi
float bmi=weight/(pow(height,2));
// print the body-mass index with two decimal places
cout<<"BMI is: "<<fixed<<setprecision(2)<<bmi<<endl;
return 0;
}
Explanation:
Read the weight from user and assign it to variable "weight",read height and assign it to variable "height".Then find the body-mass index as (weight/height^2).Here weight should be in kilograms and height should be in meters.
Output:
enter the weight(in kilograms):75
enter the height(in meters):1.8
BMI is: 23.15
Answer:
void showValues(int [<em>maximum</em><em> </em><em>volume</em>],int);
Answer:
Check the explanation
Explanation:
in order to make sure that the built into the new systems, the below input and output levels of security control have to be considered for personal trainers staff.
There are:
Network Security
Application security
Physical security
User security
File security
Procedural security
These securities levels are consistent and advantage in building the decisions regarding system security.
There are the following policies applied to each control:
Network Security: Network interface and traffic controlling, encryption of data.
Application Security: Verification of data input/output and update of software proceedings.
Physical Security: Security to servers, computers and physical environment.
User Security: Protection passwords and identify management skills.
File Security: Access Permission allocated to users and editing authorizations given to users.
Procedural Security: Certify safety protection to perform decision-making activities and document shredders.
Finally, consider another main point is depends the new system performance are system response time, throughput, bandwidth time and turnaround time.
Answer:
B. blocking I/O
Explanation:
Most of the input and output request placed to the computer considers the blocking request. It means that the controls given cannot be returned to the given application until and unless the input/output is complete.
Thus, blocking the input/output does not return till the input and output is complete.
With a blocking I/O, the process is moved to a wait queue when the I/O request is made, and it moved backs to the ready queue as soon as the request is complete, thereby allowing the other processes to run in the meantime.
Thus (B) blocking I/O is the answer.