To design an application that generates 12 numbers in the range of 11-19, saves them to a file, computes their average, appends the average to the same file, and writes the 10 numbers in reverse order to the same file.
The application will involve generating random numbers, performing calculations, and file handling operations. In C++, you can use libraries like <fstream> for file operations and <cstdlib> for generating random numbers. In Python, you can use the random module for generating random numbers and file handling operations.
In C++, you can start by including the necessary header files and creating a file stream object to handle file operations. Use a loop to generate 12 random numbers within the specified range and save them to the file. Calculate the average of these numbers and append it to the file. Finally, read the numbers from the file, store them in an array, and write the 10 numbers in reverse order back to the file.
In Python, you can start by importing the random module and opening the file in write mode to save the generated numbers. Use a loop to generate 12 random numbers and write them to the file. Calculate the average using the generated numbers and append it to the file. To reverse the order, read the numbers from the file, store them in a list, reverse the list, and write the reversed list back to the file.
To know more about file handling click here: brainly.com/question/32536520
#SPJ11
Write the output of the following:
DECLARE FUNCTION
program
SUM (A, B)
Answer:
#include<studio.h>
Int main()
{
Int a=10, b= 20, sum;
Sum =a+b;
Printf(“ sum = %d”, sum );
Return 0;
}
Explanation:
Let's Assume A = 10 and B = 20
A small tab at the bottom of a workbook that allows you to move to multiple budgets,information or other things within a workbook.Sometimes reffered to as a tab.What is it?
Answer:
Sheet.
Explanation:
Generally, workbooks are known as Microsoft Excel files. Excel workbook can be defined as a collection of one or more charts and worksheets (spreadsheets) used for data entry and storage in an excel file. In order to create a project on Excel you will have to use a workbook.
A spreadsheet can be defined as a file or document which comprises of cells in a tabulated format (rows and columns) typically used for formatting, arranging, analyzing, storing, calculating and sorting data on computer software applications such as Microsoft Excel.
A sheet refers to a small tab at the bottom of a workbook that allows you to move to have multiple budgets, information or other things within a workbook. A sheet is also referred to as a tab.
Basically, any worksheet an end user is currently editing would be displayed through a sheet. Thus, when an end user wishes to navigate (move) through the various worksheets he or she is working on, they should click on the sheet.
The programmer on the right did not end the first sentence with a newline. What effect did that omission have
The omission of a newline character after the first sentence by the programmer on the right would result in the second sentence being printed on the same line as the first one, in the absence of any formatting or intervening elements, creating a sentence that is challenging to read and understand.
This might also make it difficult for the reader to identify the sentence's conclusion.Therefore, it is essential to use newline characters properly in coding as they aid in making the code more readable, which reduces errors and makes it easier to understand. Using newline characters in coding aids in identifying and distinguishing one block of code from another, making it more straightforward to read and understand. This is critical in coding, as even a small mistake in code can cause significant issues and lead to the code's failure, making the code difficult to debug and repair.
In programming languages like C, Java, and Python, it is standard to use newline characters to indicate the end of a statement. When we write code, newline characters aid in indicating that the current statement is over and that the next line is the start of a new one. Furthermore, newlines make the code more human-readable, making it easier for other programmers to read and interpret it.
To know more about programmer visit:
https://brainly.com/question/31217497
#SPJ11
Which symbol is at the beginning and end of a multiline comment block? &&& """ %%% ###
Answer:
#
Explanation:
I have notes on it we learned it in 8th
###
the other guy was correct.
James entered into a public cloud computing arrangement without reviewing the standard contract carefully. What problem is he most likely to face as a result?
a) Unexpected cloud downtime
b) Insufficient storage capacity
c) Inadequate data security
d) Inflexible pricing structure
Unexpected cloud downtime is the most likely to face as a result.
Thus, A disruption in cloud-based services is known as cloud downtime. The migration of more businesses to the cloud means that any disruption in cloud services might be expensive.
According to Gartner, the average cost of cloud downtime is $300,000 per hour. Major cloud service companies appear to routinely report disruptions. These interruptions can endure for a few hours or several days. Three outages affected AWS in a single month in 2021.
An outage of any length can have a negative impact on the bottom line for businesses that are still working to incorporate cloud technology into their business strategy.
Thus, Unexpected cloud downtime is the most likely to face as a result.
Learn more about Downtime, refer to the link:
https://brainly.com/question/28334501
#SPJ4
A person who is good with numbers and problem solving has which type of learning preference?
a) hands-on
b) verbal
c) logical
d) visual
Answer:
I believe it is logical.
Answer: c) logical
Explanation:
:)
If the manufacturers chosen by Brad, Danny, and Sam use a specific algorithm to identify how much and how often inventory should be ordered, they are likely to be using:
If the manufacturers chosen by Brad, Danny and Sam are using a specific algorithm they are likely to be using an economic order quantity (EOQ).
The economic order quantity can be described as the maximum or the optimal quantity that would help a company to reduce its total costs in terms of ordering and receiving inventory
The question says that the three persons are using an algorithm to know the quantity of inventory that they are to order.
Read more on https://brainly.com/question/25075133?referrer=searchResults
Problem Statement You have been asked to write a program for a retail store that will allow them to calculate discounts for their employees when they buy items. Discounts are based on number of years worked as well as if the employee is a manager or hourly employee. They are also allowed no discount once they have received $200 in discounts for the year.
Answer:
The code has been written in C
Explanation:
//input libraries fist, the code is in C
#include<stdio.h>
#include<string.h>
void
main ()
{
int years, ch = 1;
float i, s, previous, day, discount, ytd, bef, disct, total, summation = 0, totalb =
0, totala = 0;
char a[10], b[3];
do
{
l1:printf ("Input number of Years Employed");
scanf ("%d", &years);
if (years < 0)
{
printf ("invalid Please Re-Input");
goto l1;
}
l2:printf ("Input Totalal Previousious Purchases Before Discount");
scanf ("%f", &previous);
if (previous < 0)
{
printf ("Previousious Purchases cant be bellow zero");
goto l2;
}
printf ("Input Employee Status");
scanf ("%s", a);
l3:printf ("Input Days Purchase");
scanf ("%f", &day);
if (day < 0)
{
printf ("Purchases Cannot be minor than zero");
goto l3;
}
if (strcmp (a, "MANAGER") == 0)
{
if (previous >= 200)
{
discount = 0;
ytd = previous;
bef = previous;
disct = 0;
total = day;
summation += day;
totalb += day;
totala += day;
}
else
{
if (years >= 1 && years <= 3)
discount = 0.2;
else if (years >= 4 && years <= 6)
discount = 0.24;
else if (years >= 7 && years <= 10)
discount = 0.3;
else if (years >= 11 && years <= 15)
discount = 0.35;
else
discount = 0.4;
ytd = previous * discount;
bef = 200 - ytd;
s = day * discount;
i = (bef - s);
if (i < 0)
{
bef = previous;
disct = bef;
total = day - disct;
summation += total;
totalb += day;
totala += total;
}
else
{
bef = previous;
disct = i;
total = day - disct;
summation += total;
totalb += day;
totala += total;
}
}
}
else
{
if (previous >= 200)
{
discount = 0;
ytd = previous;
bef = previous;
disct = 0;
total = day;
summation += day;
totalb += day;
totala += day;
}
else
{
if (years >= 1 && years <= 3)
discount = 0.1;
else if (years >= 4 && years <= 6)
discount = .14;
else if (years >= 7 && years <= 10)
discount = 0.2;
else if (years >= 11 && years <= 15)
discount = 0.25;
else
discount = 0.3;
ytd = previous * discount;
bef = 200 - ytd;
s = day * discount;
i = (bef - s);
if (i < 0)
{
bef = previous;
disct = bef;
total = day - disct;
summation += total;
totalb += day;
totala += total;
}
else
{
bef = previous;
disct = i;
total = day - disct;
summation += total;
totalb += day;
totala += total;
}
}
}
printf (" Discount =%f\n", discount);
printf ("= YTD=%f\n", ytd);
printf ("Employees Purchase Before Discount=%f\n", bef);
printf ("Employees Discount Day = %f\n", disct);
printf ("Employees Total Purchase=%f\n", total);
printf ("Continue Input YES if OK");
scanf ("%s", b);
if (strcmp (b, "YES") != 0)
ch = -1;
}
while (ch == 1);
printf ("total of Purchases Day = %f\n", summation);
printf ("Total of Before Discounts Day = %f\n", totalb);
printf ("Totalal of Discounts day = %f\n", totala);
}
OUTPUT
Input number of Years Employed2
Input Totalal Previousious Purchases Before Discount3
Input Employee Status4
Input Days Purchase5
Employee Discount =0.100000
Employees YTD=0.300000
Employees Purchase Before Discount=3.000000
Employyes Discount Day = 199.199997
Employees Totalal Purchase=-194.199997
Do you Wish to Continue Input YES if OK
in chapter 8, you modified the rentaldemo program for sammy's seashore supplies to accept and display data for an array of three rental objects. now, modify the program to use an array of eight rental objects. prompt the user to choose an option to sort rentals in ascending order by contract number, price, or equipment type. display the sorted list, and continue to prompt the user for sorting options until the user enters a sentinel value. save the file as rentaldemo.java.
In the modified version of the "rentaldemo" program for Sammy's Seashore Supplies, the program now works with an array of eight rental objects.
It prompts the user to choose an option to sort the rentals in ascending order based on contract number, price, or equipment type. The program then displays the sorted list and continues to prompt the user for sorting options until a sentinel value is entered. The updated program is saved as "rentaldemo.java" and provides enhanced functionality for managing and sorting rental objects.
The modified "rentaldemo" program expands its functionality to handle an array of eight rental objects. It includes a user prompt to select the sorting option: contract number, price, or equipment type. Depending on the user's choice, the program performs the corresponding sorting operation in ascending order.
After sorting the rentals, the program displays the sorted list to the user. It then continues to prompt the user for further sorting options until a sentinel value is entered, indicating the termination of the program.
By incorporating this enhanced functionality, the updated "rentaldemo.java" program offers improved management and sorting capabilities for the rental objects, providing a more efficient and user-friendly experience for Sammy's Seashore Supplies.
To learn more about array; -brainly.com/question/33609476
#SPJ11
Explain how Steve Jobs created and introduced the iPhone and iPad.
Answer:Today, we're introducing three revolutionary products. The first one is a widescreen iPod with touch controls. The second is a revolutionary mobile phone. And the third is a breakthrough Internet communications device. So, three things: a widescreen iPod with touch controls, a revolutionary mobile phone, and a breakthrough Internet communications device. An iPod, a phone, and an Internet communicator. An iPod, a phone...are you getting it? These are not three separate devices. This is one device. And we are calling it iPhone. Today, Apple is going to reinvent the phone.
Late last year, former Apple engineer Andy Grignon, who was in charge of the radios on the original iPhone, gave behind-the-scenes look at how Apple patched together demos for the introduction, with Steve Jobs showing off developmental devices full of buggy software and hardware issues. The iPhone team knew that everything had to go just right for the live iPhone demos to succeed, and they did, turning the smartphone industry on its head even as Apple continue to scramble to finish work on the iPhone.
Apple had actually been interested first in developing a tablet known as "Safari Pad", but as noted by a number of sources including Steve Jobs himself, the company shifted gears once it became clear how revolutionary the multi-touch interface developed for the tablet could be for a smartphone. Apple's tablet wouldn't surface until the launch of the iPad in 2010, three years after the introduction of the iPhone.
Seven years after the famous Macworld 2007 keynote, the iPhone has seen significant enhancements in every area, but the original iPhone remains recognizable as Apple has maintained the overall look of a sleek design with a larger touchscreen and a single round home button on the face of the device.
Explanation:
A directory that is created in the root file system and is used to access a separate file system located on a different partition is called a _____
A directory that is created in the root file system and is used to access a separate file system located on a different partition is called a "Mount Point".
What is a mount point?A mount point is a term used to describe a directory where a separate file system is mounted. It is a directory that serves as the location where you mount other file systems. A directory on a file system is made into a mount point by using the mount command. You may mount the new file system on a directory that already exists. The mount point serves as a bridge or connection between the two file systems. As a result, the user may interact with files and directories located on a separate file system, as if they were located on the same file system. To access files on a separate file system, you must mount it. After you've mounted the file system, it will appear as a folder inside the mount point. In addition, a single directory may act as a mount point for a variety of different file systems. A mount point is required in the root file system to access a separate file system located on a different partition.
Learn more about Mount point here,Temporary mount point for regular filesystems is:
https://brainly.com/question/31845530
#SPJ11
Write a program that calculates what coins to give out for any amount of change between 1 to 99 cents. a. Write a function called int getChangeAmount() which will prompt for an integer input for the change amount. Validate if the entered value falls in between the range of 1 to 99. If not, the function will prompt for a new value until a valid one is entered. The valid value will be returned. User input can be any content. b. Write a function called printChangeCoin(int money) which will calculate and print out number of coins to give out for each of quarter, nickel, dime and penny. The function will have one parameter for the change amount. c. Use a constant variable for each coin to declare the fixed value as an integer. For example, const int NICKEL = 5. d. Division and the mod function should be used for the calculation.
The constant variables in the program are used to declare the fixed value for each coin as an integer.
What is the purpose of the constant variables in the program?This program calculates the number of coins to give out for any amount of change between 1 to 99 cents.
The program consists of two functions: getChangeAmount() and printChangeCoin(int money).
The getChangeAmount() function prompts the user to enter an integer input for the change amount and validates if the entered value falls in between the range of 1 to 99.
If the value is not valid, it prompts for a new value until a valid one is entered. The function returns the valid value.
The printChangeCoin(int money) function calculates and prints out the number of coins to give out for each of quarter, nickel, dime and penny, using a constant variable for each coin to declare the fixed value as an integer.
Division and mod functions are used for the calculation.
Learn more about program
brainly.com/question/3224396
#SPJ11
Check ALL of the correct answers.
What would the following for loop print?
for i in range(2, 4):
print(i)
2
2
3
4.
1
Help now please
Answer:
2,3,4
Explanation:
Starts at two, goes to four. Thus it prints 2,3,4
what is hardware ? Name the four functional hardware of a computer system Define each of them with the help of a diagram
Answer:
There are four main computer hardware components that this blog post will cover: input devices, processing devices, output devices and memory (storage) devices. Collectively, these hardware components make up the computer system.
PLS, PLS, PLS, HELP! I RLY NEED THIS. PLSSSSS
A guest has requested to host a special event in the main dining room, and you've been asked to help with the planning. You need to order helium balloons from your local Party Center, but you are trying to keep costs down. Each balloon costs $1.00 but if you buy more you get a great discount. Here is the cost for balloons at the Party Center:
Up to 50 balloons - $1.00 each
Over 50 and up to 100 - $0.50 each additional balloon
Over 100 - $0.25 each additional balloon
For example, if you buy 150 balloons, it will cost you:
First 50 = $50
Next 50 = $25
Next 50 = $12.50
--------------------------
Total 150 balloons = $87.50
Write a program that prompts for the number of balloons and then calculate and display the total cost for the balloons for your party.
It's pretty hard but I think it is 1,350
You can change the desktop through the Appearance Settings options of the
Hm....
I don't really get the question, but if you want to change your desktop's appearance, you would have to go to personalization in your settings.
After that, there should be many options for what you can do. Change your wallpaper, light or dark mode, the color of the mouse, etc.
How do I fix Java Lang StackOverflowError?
Answer:
A StackOverflowError in Java is usually caused by a recursive method that calls itself indefinitely or by an excessively deep call stack.
Explanation:
To fix this error, you can try the following:
Check your code for any recursive calls that may be causing the error and modify them to avoid infinite recursion.Increase the stack size of your JVM by adding the "-Xss" option when running your application. For example, you can use the command "java -Xss2m MyClass" to increase the stack size to 2MB.Simplify your code or optimize it to reduce the depth of the call stack.If none of the above solutions work, you may need to consider refactoring your code or using a different approach to solve the problem.PLEASE can someone give me some examples of activities I can put on a resume presentation?
I'm a freshman and I didn't really play any sports other than 8th grade volleyball. I really need some examples
Answer:
list down extracurriculars (e.x. maybe you attend piano lessons, or you attend an art class during the weekend, or you play football outside of school, etc.)
you can also list any volunteering you do on the side (e.x. maybe you volunteer at your local church or at the local animal shelter), whatever you think counts.
why are computer important these days?write in short
Which network protocol allows administrators to access a remote computer in a secure way?
SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network.
What is Secure Shell ?The Secure Shell Protocol (SSH) is a cryptographic network protocol that allows network services to be operated securely over an unsecured network. Remote login and command-line execution are two of its most notable applications. SSH applications use a client-server architecture to connect an SSH client to an SSH server.
SSH is a layered protocol suite that consists of three major hierarchical components: the transport layer provides server authentication, confidentiality, and integrity; the user authentication protocol validates the user to the server; and the connection protocol multiplexes the encrypted tunnel into multiple logical communication channels.
SSH was created on Unix-like operating systems to replace Telnet and unsecured remote Unix shell protocols like the Berkeley Remote Shell and the related rlogin and rexec protocols, which all use insecure, plaintext authentication token transmission.
To learn more about Secure Shell refer :
https://brainly.com/question/17465910
#SPJ1
3. Rajat wants to assign green colour to a paragraph. Write the code that will help him in completing the task
Answer fast , will mark branliest .
Explanation:
use the style attribute
A screen on Evelyn's cell phone can hold an odd or an even number of apps. If she has an odd number of apps, how can she arrange them on 2 screens?
To arrange an odd number of apps on two screens, Evelyn can put (N-1)/2 apps on one screen and 1 app on the other.
When Evelyn has an odd number of apps on her cell phone, she may encounter a challenge when trying to arrange them on two screens evenly. However, with a little creativity and strategic placement, she can find a solution.
Let's assume Evelyn has N apps, where N is an odd number. She can begin by placing (N-1)/2 apps on one screen. This screen will hold the majority of the apps, as it can accommodate an even number of them. Now, Evelyn is left with one app to place.
To address this, she can choose one of the apps from the first screen and move it to the second screen, making it uneven. This action leaves her with (N-1)/2 - 1 apps on the first screen and 1 app on the second screen. While this setup is not perfectly even, it ensures that all the apps are accounted for on both screens.
Alternatively, if Evelyn desires a more balanced arrangement, she can distribute the apps differently. She can place (N+1)/2 apps on one screen and (N-1)/2 apps on the second screen. This configuration ensures that the number of apps on each screen differs by only one.
In either case, Evelyn can prioritize her most frequently used or essential apps on the first screen, making them easily accessible. The second screen can hold less frequently used or secondary apps.
By employing these strategies, Evelyn can overcome the challenge of arranging an odd number of apps on two screens, allowing for efficient organization and easy access to all her applications.
Learn more about Odd Apps
brainly.com/question/32284707
#SPJ11
Rachel is the network administrator for a network that runs Microsoft Windows Server 2016. Rachel is responsible for managing and maintaining all DHCP servers in the organization. She needs to create a test lab that represents the current production environment. The lab network needs to be completely isolated from the rest of the production network. Rachel needs to recreate the current production DHCP server configuration in the test lab as quickly as possible. What should she do?
Answer:
Back up the current DHCP database and restore it to the DHCP in the test lab.
Explanation:
What is the average running time of searching an element in a single linked list?
If the single linked list is sorted, we can use binary search to reduce the average running time to O(log n). But if the linked list is not sorted, we have to traverse the entire list to find the element.
The average running time of searching an element in a single linked list is O(n), where n is the number of elements in the list. This is because in a single linked list, the elements are not stored in contiguous memory locations like in an array, so there is no direct access to elements based on their index. To search for an element in a single linked list, we need to traverse the list from the beginning until we find the desired element or reach the end of the list. The time complexity of this operation is proportional to the length of the list, making it O(n).
Learn more about single linked list here:
https://brainly.com/question/31087546
#SPJ11
When using MakeCode Arcade, what is the easiest way to make modules?
A. By incorporating an if-then statement
B. By creating functions
C. By adding an event handler
D. By directing a new control structure
When using MakeCode Arcade, the easiest way to make modules is: B. By creating functions.
What is a MakeCode Arcade?A MakeCode Arcade can be defined as a web-based code editor that is designed and developed by Microsoft Inc., in order to avail its end users an ability to create retro-arcade games for dedicated computer hardware and the web.
Generally, software developers that code on MakeCode Arcade can either use JavaScript or modules (blocks) to build their software program (game) in a web browser while using a grand total of eight (8) buttons such as:
Four (4) direction buttons.A buttonB buttonMenu buttonReset buttonWhat are modules?Modules are also referred to as blocks and they can be defined as buttons, sprite or shakes that snap into each other to define the set of executable codes (program) that an Arcade will run.
In MakeCode Arcade, the easiest way to make modules is by creating functions because they reduce redundancy within the games.
Read more on functions here: https://brainly.com/question/15352352
Imagine you have borrowed your friend's computer to work on a class project. Checking
the computer out, you notice they've left their web browser open and are signed in to
their email account. Would it be considered a computer crime to read their email, even
though you didn't "hack" their password? What if they had left a text file on their
desktop that included personal information, like their social security number, banking
and credit card information, passwords for sites, etc., but didn't have it password
protected-would accessing that file be a computer crime, even though there was no
password protection on it? Explain your answers
Answer:
Yes.It would be considered as a computer Crime.
Explanation:
This is because you are an unauthorised user
It would be considered a computer crime when one accesses unauthorized information.
What are computer crimes?Computer crimes are also known as cyber crimes. It ranges from accessing information illegally, committing fraud, phishing, identity theft, and so on.
When a user of a computer accesses information that is unauthorized on the computer, such a user has committed a computer crime. It does not matter whether the accessed information is password-protected or otherwise. If it is not stated categorically that such information can be freely accessed, then accessing it is illegal.
More on cyber crimes can be found here: https://brainly.com/question/24182813
#SPJ2
What is a valid method of spelling and capitalizing your userid on the logon screen?: tsoid01 tsoid01 tsoid01
Answer:
Explanation:
A valid method of spelling and capitalizing your userid on the logon screen would be to type it exactly as it was provided to you, without any additional spaces or capitalization changes.
In this case, the userid "tsoid01" should be entered as "tsoid01" without any changes to the capitalization or spacing. It is important to enter the userid accurately to ensure that you are able to log in successfully.
cache make_lines make sets make cache coding a cache using c
Sure! So, when it comes to creating a cache using C, there are a few steps involved. First, you'll need to determine the cache's size and set up the appropriate data structures to store the cache's contents. This will likely involve defining structures for cache lines, sets, and the cache itself.
Once you have your data structures in place, you can start coding the logic for handling cache accesses. This will involve implementing functions for checking whether a given memory address is present in the cache, as well as functions for adding and removing cache lines as necessary.One important concept to keep in mind when coding a cache is the idea of "sets." In a cache, sets are groups of cache lines that correspond to a particular range of memory addresses. By dividing the cache into sets, you can reduce the amount of time needed to search the cache for a given address.Overall, coding a cache can be a complex process, but with careful planning and attention to detail, you can create an efficient and effective cache implementation in C. It sounds like you're asking about creating a cache system using sets in C programming while coding. In this context, "coding" refers to writing the source code in the C programming language, while "sets" are a data structure used to store unique elements.When creating a cache system, the "make_lines" and "make_sets" functions are likely used to initialize the cache lines and sets. The cache is designed to temporarily store frequently accessed data for faster retrieval. Sets help in organizing this data in a structured manner to improve the efficiency of the cache system.To code a cache using C, you would define the structure for cache lines and sets, implement the "make_lines" and "make_sets" functions, and create appropriate algorithms for cache management, such as the Least Recently Used (LRU) algorithm.
To learn more about involved click on the link below:
brainly.com/question/31114911
#SPJ11
Which of these protocol retrieves email and then deletes the email and its attachments?
O SMTP
O HTTP
O IMAP
OPOP 3
Answer: POP 3
Explanation: I just did it. It says its POP3
Answer:
POP 3Explanation:
Dill give brainliest whoever does this fsteset.
an array has been created which stores names. write an algorithm which saves each name on a new line in a text file called student.txt.
names["jane", "Humayun" , "Cora" , " Astrid" , "Goran"]
The algorithm which saves each name on a new line in a text file called student.txt is given as follows:
names = ["jane", "Humayun", "Cora", "Astrid", "Goran"]
with open("student.txt", "w") as file:
for name in names:
file.write(name + "\n")
What is the rationale for the above response?Open the file student.txt in write mode.
Loop through each name in the array names:
a. Write the current name to the file followed by a newline character.
Close the file.
This will create a new text file called student.txt (or overwrite it if it already exists) and write each name from the names array on a new line in the file. The "\n" character at the end of each name ensures that each name is written to a new line in the file.
Learn more about algorithm at:
https://brainly.com/question/22984934
#SPJ1