answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Nitella [24]
2 years ago
9

A large software development company employs 100 computer programmers. Of them, 45 areproficient in Java, 30 in C, 20 in Python,

6 in C and Java, 1 in Java and Python, 5 in C andPython, and just 1 programmer is proficient in all three languages above. Determine the numberof computer programmers that are not proficient in any of these three languages.
Computers and Technology
1 answer:
melisa1 [442]2 years ago
4 0

Answer:

18, 13, 19

Explanation:

Number of computer programmers proficient only in Java = 45 - ( 1+1+6) = 37

Number of computer programmers proficient only in C++ = 30 - (6+1+5) = 18

Number of computer programmers proficient only in python = 20 - ( 1+1+5) = 13

Number of computer programmers are not proficient in any of these three languages = 100 - ( 37 + 18 + 13 + 1+ 1+ 5+ 6 ) = 100 - 81 = 19

You might be interested in
The Windows ________ is a hierarchical database that stores system configuration information. It maintains files used to control
Diano4ka-milaya [45]

Answer:

Registry

Explanation:

Windows Registry is used to store the configuration and setting information for hardware and software program which is critical for Windows operation. The registries are structured in hierarchical database model.  

Basically, hierarchical database model is akin to a tree format which consist of the parent nodes and their child nodes.  For example, a node named as HKEY_LOCAL_MACHINE can possess child nodes HARDWARE, SOFTWARE AND SYSTEM.

The node in the tree is also termed as a key.

8 0
2 years ago
What protocol communicates data between routers representing the edges of autonomous systems?Distance-vectorLink stateInterior g
Nata [24]

Explanation:

Exterior gateway protocol are the routing protocols that are used on the internet for exchanging routing information among the autonomous system. These autonomous systems can be gateway protocol, vector routing protocol.

8 0
2 years ago
The technique where a system clock generates interrupts, and at each clock interrupt the OS regains control and assigns the proc
Misha Larkins [42]

Answer: Time slicing

Explanation:

 Time slicing is one of the technique that basically implement the multitasking in the operating system. It basically generate the interrupt and at the each clock of the interrupt in the operating system basically regain  control and then assign that particular system or processor to the another user.

Time slice are typically work in milliseconds. By using the multi users system, the time slice is the total amount of the processing time for the each user get assigned.

7 0
2 years ago
Leah is now in the Backstage view. Which option should she use to access a blank presentation? Info New Open Options
nekit [7.7K]

Answer:

She Should use New

7 0
2 years ago
Which of the following describes an executive information system (EIS)?
rjkz [21]
I think the answer is b

hope this helps :)
3 0
2 years ago
Other questions:
  • What are the possible consequences if you fail to identify system requirements correctly and completely?
    9·1 answer
  • What is the argument in this function =AVERAGE(F3:F26)
    15·1 answer
  • Which option describes wearable technology?
    5·2 answers
  • Haley is helping to choose members for a customer satisfaction team. Which of the following employees demonstrate skill in focus
    13·1 answer
  • What is a typical grace period for a credit card...
    15·2 answers
  • When workers demonstrate patience, are able to manage there emotions, and get along with other employees, which skills are being
    11·2 answers
  • In the lab, you discovered that the server you scanned (10.20.1.2) was vulnerable to the WannaCry ransomeware attack. What ports
    15·1 answer
  • What ""old fashioned"" features of checking accounts is p2p replacing
    9·1 answer
  • During the boot process, what does the processor do after the computer circuits receive power?
    13·1 answer
  • What does NOT match with Agile Manifesto?
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!