Answer:
Explanation:
import java.util.Scanner;
import java.io.*;
public class ArrayProcessing
{
public static void main(String[] args) throws IOException
{
Scanner kb = new Scanner(System.in);
String fileName;
System.out.print("Enter input filename: ");
fileName = kb.nextLine();
File file = new File(fileName);
if(!file.exists())
{
System.out.println("There is no input file called : " + fileName);
return;
}
int[] numbers = inputData(file);
printArray(numbers);
}
public static int[] inputData(File file) throws IOException
{
Scanner inputFile = new Scanner(file);
int index = 1;
int size = inputFile.nextInt();
int[] values = new int[size];
while(inputFile.hasNextInt() && index < values.length)
{
values[index] = inputFile.nextInt();
index++;
}
inputFile.close();
return values;
}
public static void printArray(int[] array)
{
int count = 1;
for (int ndx = 1; ndx < array.length; ndx++)
{
System.out.printf("%5.f\n", array[ndx]);
count++;
}
if(count == 10)
System.out.println("");
}
}
In this lab, you use what you have learned about parallel arrays to complete a partially completed C++ program. The program should:
Either print the name and price for a coffee add-in from the Jumpin’ Jive Coffee Shop
Or it should print the message Sorry, we do not carry that.
Read the problem description carefully before you begin. The file provided for this lab includes the necessary variable declarations and input statements. You need to write the part of the program that searches for the name of the coffee add-in(s) and either prints the name and price of the add-in or prints the error message if the add-in is not found. Comments in the code tell you where to write your statements.
Instructions
Study the prewritten code to make sure you understand it.
Write the code that searches the array for the name of the add-in ordered by the customer.
Write the code that prints the name and price of the add-in or the error message, and then write the code that prints the cost of the total order.
Execute the program by clicking the Run button at the bottom of the screen. Use the following data:
Cream
Caramel
Whiskey
chocolate
Chocolate
Cinnamon
Vanilla
A general outline of how you can approach solving this problem in C++.
Define an array of coffee add-ins with their corresponding prices. For example:
c++
const int NUM_ADD_INS = 7; // number of coffee add-ins
string addIns[NUM_ADD_INS] = {"Cream", "Caramel", "Whiskey", "chocolate", "Chocolate", "Cinnamon", "Vanilla"};
double prices[NUM_ADD_INS] = {1.50, 2.00, 2.50, 1.00, 1.00, 1.25, 1.00}
What is the program about?Read input from the user for the name of the coffee add-in ordered by the customer.
c++
string customerAddIn;
cout << "Enter the name of the coffee add-in: ";
cin >> customerAddIn;
Search for the customerAddIn in the addIns array using a loop. If found, print the name and price of the add-in. If not found, print the error message.
c++
bool found = false;
for (int i = 0; i < NUM_ADD_INS; i++) {
if (customerAddIn == addIns[i]) {
cout << "Name: " << addIns[i] << endl;
cout << "Price: $" << prices[i] << endl;
found = true;
break;
}
}
if (!found) {
cout << "Sorry, we do not carry that." << endl;
}
Calculate and print the total cost of the order by summing up the prices of all the add-ins ordered by the customer.
c++
double totalCost = 0.0;
for (int i = 0; i < NUM_ADD_INS; i++) {
if (customerAddIn == addIns[i]) {
totalCost += prices[i];
}
}
cout << "Total cost: $" << totalCost << endl;
Read more about program here:
https://brainly.com/question/26134656
#SPJ1
write a java program to accept the Age of 23 student and print
Add a column “Total Price” that will display total price calculated as Qty * Price.
Display the modified dataframe
To code to add a column “Total Price” that will display total price calculated as Qty * Price is given below
import pandas as pd
# Load the dataframe
df = pd.read_csv('data.csv')
# Add a new column "Total Price"
df['Total Price'] = df['Qty'] * df['Price']
# Display the modified dataframe
print(df)
What is coding about?The code I provided above imports the Pandas library and uses it to load a dataframe from a CSV file using the read_csv function.
The above code will add a new column to the dataframe with the total price for each row calculated as the product of the values in the "Qty" and "Price" columns.
Therefore, You can then display the modified dataframe using the print function as shown above.
Learn more about coding from
https://brainly.com/question/26134656
#SPJ1
simple machines reduce the amount of work necessary to perform a task.
true or false?
True.
Simple machines are devices that are used to make work easier. They can reduce the amount of force, or effort, required to perform a task by increasing the distance over which the force is applied, or by changing the direction of the force. Examples of simple machines include levers, pulleys, wheels and axles, inclined planes, wedges, and screws. By using simple machines, the amount of work required to perform a task can be reduced.
lolhejeksoxijxkskskxi
loobovuxuvoyuvoboh
Explanation:
onovyctvkhehehe
Answer:
jfhwvsudlanwisox
Explanation:
ummmmmm?
Your digital footprint says a lot about you, but not everything is true or accurate. When you're a high school or college student, you may not think about the impact your digital life will have on future employment. Some potential employers will search the web looking for information on job applicants.
Is it ethical for a potential employer to use the Internet this way?
Answer:
yes
Explanation:
cuz im yearz old
Why would you want to use grouping in a query? Explain.
Explanation:
Grouping in a query allows you to aggregate and summarize data based on certain criteria. This is useful when you want to analyze large amounts of data and extract meaningful insights from it. Here are some reasons why you might want to use grouping in a query:
Summarize data: Grouping allows you to calculate totals, averages, counts, and other summary statistics for data in a table. For example, you can group sales data by product, region, or time period to see how much revenue was generated by each category.
Analyze trends: Grouping data by a certain time period (e.g., day, week, month, quarter) can help you identify trends and patterns in the data. For example, you can group website traffic data by month to see if there are any seasonal trends in traffic.
Compare data: Grouping data by multiple criteria allows you to compare data across different categories. For example, you can group sales data by product and region to see which products are selling well in which regions.
Filter data: Grouping allows you to filter out irrelevant data and focus on specific subsets of data. For example, you can group customer data by age range and gender to see if there are any differences in purchasing behavior between male and female customers of different ages.
Improve performance: Grouping can improve query performance by reducing the amount of data that needs to be processed. Instead of calculating summary statistics for each individual record, grouping allows you to calculate them for each group of records, which can be faster and more efficient.
In summary, grouping in a query is a powerful tool for analyzing, summarizing, and visualizing large amounts of data. It allows you to extract meaningful insights from data and make informed business decisions based on the results.
Is It true that the technology capable of the highest transmission rate is fiber optic
Answer:
Yessir
Explanation:
Most fiber optic cables go for around $100 online, mainly because they are used to transfer graphics from your computer to another device.
Hope you have a good day!
Which vulnerability can occur if a programmer does not properly validate user input and allows an attacker to include unintended SQL input that can be passed to a database?
Answer:
SQL injection
Explanation:
SQL injection is a vulnerability in databases that occurs when user input is not properly validated. Hackers are able to input SQL query statements to bypass the use of the actual user name and password to gain access to the account.
Using placeholders in programmed SQL statements mitigates the effects of SQL injection.
Simplify the stated 5 Variable Boolean Expression using the Karnaugh Map method.
F(A,B,C,D,E)=∑▒〖(1,3,5,7,9,11,13,15,17,19,21,23,25,27,29,31)〗
With the following Don’t CareConditions
F(A,B,C,D,E)=∑▒〖(2,6,10,14,18,22,26,30)〗
To simplify the given 5-variable Boolean expression using the Karnaugh Map method, we need to create a Karnaugh Map with the variables A, B, C, D, and E.
The Karnaugh Map for a 5-variable expression would have 2^5 = 32 cells. We will represent the binary values of A, B, C, D, and E on the Karnaugh Map.
The given minterms in decimal representation are:
F(A,B,C,D,E) = ∑ (1,3,5,7,9,11,13,15,17,19,21,23,25,27,29,31)
The given don't care conditions in decimal representation are:
F(A,B,C,D,E) = ∑ (2,6,10,14,18,22,26,30)
To simplify the expression, we need to identify groups of adjacent 1s on the Karnaugh Map. The goal is to combine these groups to form simplified terms.
After mapping the given minterms and don't care conditions onto the Karnaugh Map, we can identify the following groups:
Group 1: A'CD'E' (minterms 1,3,17,19)
Group 2: A'CDE (minterms 5,7,21,23)
Group 3: AB'C'D'E' (minterms 9,11,25,27)
Group 4: ABCD'E' (minterms 13,15,29,31)
Now, we can combine these groups to simplify the expression:
F(A,B,C,D,E) = A'CD'E' + A'CDE + AB'C'D'E' + ABCD'E'
Simplifying further using Boolean algebra and simplification rules, we can simplify the expression as:
F(A,B,C,D,E) = A'CD'E' + A'CDE + AB'D'E'
Therefore, the simplified expression using the Karnaugh Map method is:
F(A,B,C,D,E) = A'CD'E' + A'CDE + AB'D'E'
For more questions on Boolean
https://brainly.com/question/30634817
#SPJ11
5. All of the following are common MS Office applications features, EXCEPT
(NOT) (choose one): *
Status Bar
Ribbon
Main stage
Backstage
The correct response to the posed query would be identified as "Main stage."
Why is this correct?To clarify, "Main stage" is not a widely employed MS Office attribute and cannot be regarded as a customary attribution of any of the various MS Office applications.
The remaining selections comprise universally utilized MS Office elements:
Precisely situated at the bottom of all windows lies the Status Bar which provides a summary of document aspects including page number, word count, and zoom level.
The Ribbon comprises of segregated tabs, arrays and orders that can be harnessed to fulfill a multitude of associated tasks within each application.
And finally, Backstage manifesting when one clicks on the File tab disseminates the user with an array of document administration tasks such as saving, forming and partial task allocation.
Read more about word processing here:
https://brainly.com/question/985406
#SPJ1
Id like for you to write it as a regular paper. Put yourself in Bill's shoes. You are starting a business at home, any
ess. What technology will you need to work from home or have a business from home? What do you need to ope
0.100
To run a business from home, the kind of technology requried would depend a lot on the nature of business that you plan to run. A fashion business would require fashion technology, and a food business would require food related equipment.
What is a business?Business is the process of earning a livelihood or earning money by manufacturing, purchasing, and selling goods. It is also defined as "any profit-making activity or enterprise."
In addition to your primary duty, you must do five core business functions. Human resources, finance, marketing, sales, and strategy are among them. These are universal functions, which implies they are required for every firm to succeed.
Learn more about business at:
https://brainly.com/question/15826604
#SPJ1
Hi!
i want to ask how to create this matrix A=[-4 2 1;2 -4 1;1 2 -4] using only eye ones and zeros .Thanks in advance!!
The matrix A=[-4 2 1;2 -4 1;1 2 -4] can be created by using the following code in Matlab/Octave:
A = -4*eye(3) + 2*(eye(3,3) - eye(3)) + (eye(3,3) - 2*eye(3))
Here, eye(3) creates an identity matrix of size 3x3 with ones on the diagonal and zeros elsewhere.
eye(3,3) - eye(3) creates a matrix of size 3x3 with ones on the off-diagonal and zeros on the diagonal.
eye(3,3) - 2*eye(3) creates a matrix of size 3x3 with -1 on the off-diagonal and zeros on the diagonal.
The code above uses the properties of the identity matrix and the properties of matrix addition and scalar multiplication to create the desired matrix A.
You can also create the matrix A by using following code:
A = [-4 2 1; 2 -4 1; 1 2 -4]
It is not necessary to create the matrix A using only ones and zeroes but this is one of the way to create this matrix.
Quick!! Im taking a timed test so pls hurry!! Ill even mark as brainliets!!
A company has two finalists in mind to run its computer network: Bill, a college graduate in computer science with little experience, and Sam, a computer science student with a decade of on-the-job training. Why might the company hire Sam? He has a positive attitude. He has a lot of experience. He is willing to be trained. He might work for less money.
-He has a positive attitude.
-He has a lot of experience.
-He is willing to be trained.
-He might work for less money.
Answer:
-He has a lot of experience.
Explanation:
Bill has little experience and Sam has a decade of on the job training. Therefore Sam is more experienced
Answer:
b
Explanation:
for 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts.
For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts: True.
What is 802.11ac?In Computer networking, 802.11ac is one of the wireless network standards which was developed by the Institute of Electrical and Electronics Engineers (IEEE) to operate on a 5 GHz microwave bandwidth (frequency) and as a result, it is faster and can transmit over a long distance.
As a general rule and generally speaking, a wireless security toolkit for 802.11 wireless networks should include all of the following features;
An ability to sniff wireless trafficAn ability to scan wireless hostsAn ability to assess the level of privacy afforded on its network.An ability to assess confidentiality afforded on its network.Read more on wireless network here: brainly.com/question/18370953
#SPJ1
Complete Question:
For 802.11 wireless networks, a wireless security toolkit should include the ability to sniff wireless traffic and scan wireless hosts. True or False
Hannah wants to write a book about how scientists and society interact, and she has generated ideas for chapters. Which chapter would be incorrect to include in her book?
Answer:
The answer is "how the water evaporates and makes snow from the rainwater".
Explanation:
In the question, the choices are missing and by searching, we find the choice that is "how the water evaporates and makes snow from the rainwater", that's why we can say that it is the correct choice.
A. Write a Python program to match key values in two dictionaries. Input: {'key1': 1, 'key2': 3, 'key3': 2}, {'key1': 1, 'key2': 2} Output: key1: 1 is present in both x and yB. Write a Python program to sort Counter by value. Input: {'Math': 81, Physics':83, 'Chemistry':87) Output: [('Chemistry', 87), ('Physics', 83), ('Math', 81)
Answer:
Please find the attachment of the code file and its output:
Explanation:
In the first code, two variable "a, b" is defined that holds dictionary value which is defined in the question, in the next step a for loop is declared that hold dictionary key and value and use a method set to check the value is available in the dictionary and use print method to print its value.
In the second code, a package counter is an import as the c for count value, in the next step a variable a is declared, that uses a counter method to hold a dictionary value in its parameter, and in the print method, it uses sort method to print its value.
Which of the following actions is NON-DESTRUCTIVE? CHOOSE TWO.
Everything in the Layer > Adjustments menu
The Clone Stamp tool
Converting to Grayscale
Changing the Opacity of a layer
Everything in the Adjustments panel
The following actions are non-destructive:
Everything in the Layer > Adjustments menu.
These adjustments can be made to a single layer without affecting the underlying layers. This means that you can edit the adjustments or remove them entirely without altering the original image data.
Changing the Opacity of a layer
When you change the opacity of a layer, it simply reduces the visibility of that layer but the original image data is still retained.
The Clone Stamp tool, which is used to copy pixels from one area of an image to another, can be destructive because it overwrites the original pixels.
Converting to Grayscale also discards the color information, which is considered a destructive action.
Everything in the Adjustments panel is not a valid option because it includes both destructive and non-destructive adjustments.
Describe two methods by which viruses can spread.
Answer:
the two methods that can spread viruses are touching and breathing
Explanation:
When there are viruses being spread breathing near another person can caused it to spread because viruses can travel through air. if the viruse is in your systems coming out through the mouth is one way it can travel to another person. That's why wearing a mask is helpful
The other was is touching. Viruses can travel through physical contact. Is hands arent being wash regularly after eating brushing teeth etc it leaves germs and bacteria which is some of the ways and sometimes the main reason as to how viruses are made or created. That's why washing hands are important
Hope's this helps
Which of the following is not typically a responsibility for a social media specialist? Choose the answer.
Question 19 options:
Monitor SEO and user engagement and suggest content optimization.
Communicate with industry professionals and influencers via social media to create a strong network.
Install computer hardware.
Manage a company's social media profiles.
Answer:
C
Explanation:
A social media specialist does not usually install computer hardware. They will do things like look at engagement data, create new posts to send out to followers, and consult on how to get more people to come into your business, but they wouldn't be doing things like installing new ram.
5. If you upgrade the RAM (Random Access Memory) of you computer, what kind of enhancements will you notice? (Pick one or more choices)
(A) My computer will become faster, if I am maxing out the computer memory usage.
(B) I will be able to store and save more data and files on the computer (Example: photos, videos, documents, movies and music)
(C) I will be able to open up and work on multiple applications and software on my computer simultaneously (without making the computer lagging and slow). I will be able to open multiple tabs on the browser.
(D) I will be able to randomly use my laptop anytime I want.
Product reviews are written by:
OA. people with specialized knowledge.
B. clever advertising copywriters.
C. consumers who may use the product.
OD. people on social networking sites.
Product reviews can be written by all of the above. People with specialized knowledge, clever advertising copywriters, consumers who may use the product and people on social networking sites can all write product reviews.
You compared each letter in the correct word to the letter guessed.
Assume the correct word is "world."
Finish the code to compare the guessed letter to the "o" in "world."
Sure, here's an example code snippet that compares a guessed letter to the "o" in "world":
The Programcorrect_word = "world"
guessed_letter = "a" # Example guessed letter
if guessed_letter == correct_word[1]:
print("The guessed letter matches the 'o' in 'world'")
else:
print("The guessed letter does not match the 'o' in 'world'")
In the above code snippet, the if statement compares the guessed letter (guessed_letter) to the "o" in "world" by checking if it is equal to the character at index 1 in the correct_word string (Python strings are 0-indexed, so index 1 corresponds to the second character in the string, which is "o" in this case).
If the guessed letter matches the "o", the code prints a message saying so; otherwise, it prints a message indicating that the guessed letter does not match the "o". You can modify the value of guessed_letter to test the code with different guessed letters.
Read more about programs here:
https://brainly.com/question/26134656
#SPJ1
Jordan uses a spreadsheet to keep track of how many hits each player on a baseball team has had in each game
throughout the season. For every game, each player's name appears in a column that Jordan has titled "Player."
Next to that, a column titled "Hits" shows the number of hits for each player in a single game.
What function should Jordan use to find the average number of hits per game for player A_Clemente?
O SUMIF(Hits, "A Clemente", Player)
O SUMIF(Player, "A Clemente". Hits)
O AVERAGEIF(Hits, "A Clemente", Player)
O AVERAGEIF(Player,"A_Clemente", Hits)
Answer:
AVERAGEIF(Player, "A_Clemente", Hits)
Explanation:
The AVERAGEIF function allows users to calcule the mean value of numerical columns while also Given certain constraints within a single function call. The AVERAGEIF takes in 3 arguments.
The first is a column which houses the range of the constraint we would like to apply on our function.
The second argument is the constraint itself which should reside within the values in the range defined in the first argument.
The third argument is the numerical column whose average is calculated based on the defined constraint.
Therefore, in the scenario above, Player is the column containing player names, which it's value will later be used as a constraint
"Clemente_A" the constraint, only values pertaining to Clemente_A will be defined.
Hits, the numeric column whose value is averaged based on the constraint given.
2. Which is not part of the Sans Institutes Audit process?
Help to translate the business needs into technical or operational needs.
O Deler a report.
O Define the audit scope and limitations.
O Feedback based on the
Answer:
Help to translate the business needs into technical or operational needs. This is not a part.
Explanation:
Capital budgeting simply refers to the process that is used by a business in order to determine the fixed asset purchases that is proposed which it should accept, or not. It's typically done in order to select the investment that's most profitable for a company.
Some of the capital budgeting processes include:
Identification and analysis of potential capital investments.
Application of capital rationing
Performing post-audits
It should be noted that developing short-term operating strategies is not part of the capital budgeting process.
Learn more about investments on:
https://brainly.com/question/15105766
#SPJ2
Suppose two coins: A and B have 5 rounds of 10 coin tosses as given below. Assume the probabilities for heads are qA=0.6 & qB=0.5.
i) Estimate No. of Heads and Tails for first toss for A and B.
ii) Compute Maximum Likelihood probabilities of first Round from coin A and B using
Binomial distribution.
estimate No. of Heads and Tails for the first toss for A and B:
For the first toss of coin A, we expect to see 6 heads and 4 tails (since qA = 0.6, and we are tossing the coin 10 times)For the first toss of coin B, we expect to see 5 heads and 5 tails (since qB = 0.5, and we are tossing the coin 10 times)What is the probabilities about?ii) Compute Maximum Likelihood probabilities of first Round from coin A and B using Binomial distribution:
To compute the maximum likelihood probability of the first round for coin A, we would use the binomial distribution formula:
P(X = k) = (n choose k) * qA^k * (1-qA)^(n-k)
where X is the number of heads, k is the number of heads observed, n is the number of tosses, and qA is the probability of heads for coin A.
To compute the maximum likelihood probability of the first round for coin B, we would use the same formula, but with qB as the probability of heads for coin B.
So we will have two different probabilities for the first round, one for coin A and one for coin B. The probabilities will be based on the observed number of heads and tails and the assumed probability of heads.
It is worth noting that this is a theoretical calculation and in practice, the coin tossing would have to be done to get the actual observations.
Learn more about Binomial distribution from
https://brainly.com/question/29163389
#SPJ1
By using ____, you can use reasonable, easy-to-remember names for methods and concentrate on their purpose rather than on memorizing different method names.
Answer:
Polymorphism
Explanation:
If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.
The information regarding the polymorphism is as follows:
The person has various attributes at the same timeFor example, a man could be a father, a husband, an entrepreneur at the same time.In this, the similar person has different types of behavior in different situations.Therefore we can conclude that If we use polymorphism so we can apply the names that could be easy to remember for the methods' purpose.
Learn more about the behavior here: brainly.com/question/9152289
Activity No.5
Project Implementation
Based on the Community Based Results, proposed programs/project to be implemented in your barangay/community
I. Title
II Project Proponents
III Implementing Proponents
IV Project Duration
V Objectives of the Project
VI Project Description
VII Methodology
VIIIDetailed Budgetary Requirements
IX Gantt Chart/ Detailed schedule of activities
In the activity related to Project Implementation, the following components are listed:
I. Title: This refers to the name or title given to the proposed program or project to be implemented in the barangay/community.
II. Project Proponents: These are the individuals or groups who are responsible for initiating and advocating for the project. They may include community leaders, organizations, or individuals involved in the project.
III. Implementing Proponents: These are the parties or organizations who will be responsible for executing and implementing the project on the ground. They may include government agencies, non-profit organizations, or community-based organizations.
IV. Project Duration: This refers to the estimated timeframe or duration within which the project is expected to be completed. It helps in setting deadlines and managing the project timeline.
V. Objectives of the Project: These are the specific goals or outcomes that the project aims to achieve. They define the purpose and desired results of the project.
VI. Project Description: This section provides a detailed explanation and overview of the project, including its background, context, and scope.
VII. Methodology: This outlines the approach, methods, and strategies that will be used to implement the project. It may include activities, processes, and resources required for successful project execution.
VIII. Detailed Budgetary Requirements: This section provides a comprehensive breakdown of the financial resources needed to implement the project. It includes estimates of costs for personnel, materials, equipment, services, and other relevant expenses.
IX. Gantt Chart/Detailed Schedule of Activities: This visual representation or detailed schedule outlines the specific activities, tasks, and milestones of the project, along with their respective timelines and dependencies.
These components collectively form a framework for planning and implementing a project, ensuring that all necessary aspects are addressed and accounted for during the execution phase.
For more questions on barangay, click on:
https://brainly.com/question/31534740
#SPJ8
which short cut command will remove selected text from a document?
MIS as a technology based solution must address all the requirements across any structure of the organization. This means particularly there are information to be shared along the organization. In connection to this, a student has complained to MIS grade recently submitted that he does not deserve C+. following the complaint, the instructor checked his record and found out that the student’s grade is B+, based on the request the Department Chair also checked the record in his office and found out the same as the Instructor. Finally, the record in the registrar office consulted and the grade found to be B+. Therefore, the problem is created during the data entry of grades of students to the registrar system. Based on the explanations provided, which of information characteristics can be identified?
Based on the given scenario, the information characteristic that can be identified is **Accuracy**.
Accuracy refers to the correctness and reliability of the information. In this case, the student's complaint about receiving a lower grade than expected indicates that there is an inconsistency or error in the recorded grade within the registrar system.
The instructor, the Department Chair, and the registrar office all independently confirmed that the student's actual grade is B+. This indicates that the recorded grade of C+ in the registrar system is incorrect and does not accurately reflect the student's performance.
To address this issue, it is important to ensure accurate data entry during the process of recording grades in the registrar system. This may involve implementing proper data validation checks, double-checking data entries for accuracy, and establishing appropriate quality control measures to prevent such errors from occurring in the future.
By maintaining accurate information within the organization's Management Information System (MIS), it can help in providing reliable and consistent data for decision-making processes, ensuring that stakeholders have access to the correct and trustworthy information.
For more such answers on Accuracy
https://brainly.com/question/3847997
#SPJ8
Answer:
Explanation: Verifiable
Information should be verifiable. That means that you can check it make sure it is correct, perhaps by checking many sources for the same information.
Verifiable details/evidence/facts the inquiry found no verifiable evidence of document or data falsification.