___________ is what we use to communicate day to day.
Group of answer choices

Algorithms

Formal Language

Code

Natural Language

Answers

Answer 1

Formal Language is what we use to communicate day to day. The correct option is b

What is formal language?

In comparison to the informal language, formal language is less personal. When writing for business or academic purposes, such as for university assignments, it is used. Colloquialisms, contractions, and first-person pronouns like "I" or "We" are not used in formal language.

Informal speech is more relaxed and unplanned. We primarily communicate using verbal, nonverbal, written, and visual means on a daily basis. It's best to actively listen, observe, and empathize when using any of these communication styles.

Therefore, the correct option is b, Formal Language.

To learn more about formal language, refer to the below link:

https://brainly.com/question/24222916

#SPJ1


Related Questions

java allows you to create objects of this class in the same way you would create primitive variables. group of answer choices scanner random printwriter string

Answers

Java allows you to create objects of string class in the same way you would create primitive variables.

What does Java's String class do?

Character strings are represented by the String class. Java applications implement all string literals as objects of this class, including "abc." Strings are immutable; once they are generated, their characteristics cannot be altered. Mutable strings are supported via string buffers. Since string objects cannot be changed, they may be shared.

What purposes serve the string class?

Strings are collections of characters that are often used in Java programming. Items in the programming language called Java include strings. The String class is provided by the Java platform for producing and modifying strings.

To know more about Java class visit

brainly.com/question/13949269

#SPJ4

Consider the following class definition
class rectangleType
{
public:
void setLengthWidth(double x, double y);
//Postcondition: length = x; width = y;
void print() const;
//Output length and width;
double area();
//Calculate and return the area of the rectangle;
double perimeter();
//Calculate and return the parameter;
rectangleType();
//Postcondition: length = 0; width = 0;
rectangleType(double x, double y);
//Postcondition: length = x; width = y;
private:
double length;
double width;
};
and the object declaration
rectangleType bigRect(14,10);
Which of the following statements is correct?
(Points : 4)bigRect.setLengthWidth();
bigRect.setLengthWidth(3.0, 2.0);
bigRect.length = 2.0;
bigRect.length = bigRect.width;

Answers

bigRect.setLengthWidth(3.0, 2.0); is the correct declaration of the class variable.

What is a class variable?

Class variables, also known as static variables, are declared using the static keyword within a class but outside of a method, constructor, or block. Regardless of how many objects are created from it, each class variable would only have one copy.

Instance variables are declared within a class but outside of a method. When heap space is allocated to an object, a slot is created for each instance variable value. Instance variables store values that must be referenced by multiple methods, constructors, or blocks, as well as essential parts of an object's state that must be present throughout the class.

Local variables are declared within methods, constructors, or blocks. Local variables are created when the method, constructor, or block is entered, and they are destroyed when the method, constructor, or block is exited.

To know more about Variable, visit: https://brainly.com/question/28463178

#SPJ4

To add drop-down lists to your worksheet with predetermined options for each city name, you decide to use _____

Answers

To add drop-down lists to your worksheet with predetermined options for each city name, you decide to use Data validation.

What is worksheet?

In the original sense of the word, a worksheet refers to a piece of paper used for work. They take many different forms, but are most frequently connected to tax forms, accounting, and other business settings. The worksheet made of paper is increasingly being replaced by software.

It might be a printed page that a kid fills out with a writing implement. There is no requirement for additional supplies. It is "a piece of paper used to record work schedules, working hours, special instructions, etc. a piece of paper used to jot down problems, ideas, or the like in a rough form." A worksheet used in education might contain questions for students and spaces for them to record their responses.

Learn more about worksheet

https://brainly.com/question/25130975

#SPJ4

44.7.1: unit testing. add two more statements to main() to test inputs 3 and -1. use print statements similar to the existing one (don't use assert).

Answers

To add two more statements to main() to test inputs 3 and -1, check the given code.

What is statements?

A list of directives for a computer to follow constitutes a computer programme. These instructions for programming are referred to as statements in a programming language.

The parts of programmes called C++ statements govern the order and flow of execution of other programmes. Statements may either be one line of code with a semicolon ; at the end or a block of code enclosed in curly braces.

There are several different types of statement in C++.

Labeled statementsExpression statementsCompound statementsSelection statementsIteration statementsJump statementsTry-Catch blocksDeclaration statements

//CPDE//

cout << "3,

expecting 27,

got: " << CubeNum(3) << endl;

cout << "-1,

expecting -1,

got: " << CubeNum(-1) << endl;

Learn more about statements

https://brainly.com/question/14467883

#SPJ4

In the optimistic approach, during the phase, a transaction scans the database, executes the needed computations, and makes the updates to a private copy of the database values.
a. read b. validation
c. write d. shared

Answers

The correct answer for this problem is a. read

Why does it uses read phase?

In the optimistic approach to concurrency control in database systems, during the read phase, a transaction scans the database and reads the values it needs in order to execute the necessary computations.

This is often referred to as the "read" phase.

If the values have been modified by another transaction, the current transaction may need to abort and retry the process from the beginning. This ensures that transactions are able to execute without conflicting with one another and helps to maintain the integrity of the database.

To Know More About database, Check Out

https://brainly.com/question/29774533

#SPJ4

TRUE OR FALSE it is important to know if a computer is byte or word addressable because we need to know how many addresses are contained in main memory, cache, and in each block when doing cache mapping.

Answers

TRUE Since we need to know how several addresses are included in main memory, cache, and each block when executing cache mapping, it is crucial to understand if a computer is bytes or word addressable.

Cache: What is it?

In a computing setting, a cache is a piece of hardware or program that is used to temporarily store something, typically data. To improve the speed of recently or often accessed data, a small quantity of quicker, more expensive memory is employed. Data that has been cached is transiently kept on a local storage medium that is available to the cache clients and unrelated to the main storage. Its central processing unit (CPU), programmes, web browsers, and operating systems all frequently use cache.

To know more about Cache
https://brainly.com/question/15276918
#SPJ4

create a view called IBM_InvoiceData that will retrieve columns and rows from the Invoices table for the vendor named IBM.

Answers

Here is an example of a SQL query that can be used to create a view called IBM_InvoiceData that will retrieve columns and rows from the Invoices table for the vendor named IBM:

CREATE VIEW IBM_InvoiceData AS
SELECT * FROM Invoices
WHERE VendorName = 'IBM';

This query creates a view that selects all columns (*) from the Invoices table where the VendorName column is equal to 'IBM'. The view can then be used in subsequent queries to access the invoice data for the vendor named IBM without having to specify the vendor name in each query. For example, the following query can be used to retrieve the total amount of invoices for IBM:

SELECT SUM(InvoiceAmount) AS TotalInvoices FROM IBM_InvoiceData;

This query uses the IBM_InvoiceData view to select the sum of the InvoiceAmount column, and assigns the result to a column named TotalInvoices. The resulting query would return a single row with the total amount of invoices for IBM.

when producing a map in arcgis to emphasize the results of a suitability analysis, the largest element on the page should be: question 25 options: the location map the map legend the map frame containing the symbolized suitability feature class. the north arrow all these elements should be the same size

Answers

Making indicators for habitat suitability. The two main methods used to produce HSIs are as follows: Data-driven techniques ecological niche modeling This usually entails a statistical study of information about a species' present distribution. The so-called "environmental envelope" strategy is one of the easiest methods.

How do you determine whether a place is appropriate for GIS?

To identify appropriate locations for a project, use the ArcGIS Spatial Analyst extension. There are two approaches to locate appropriate places. To find places that meet your requirements, one method is to query your data. The second method involves creating a suitability map by merging datasets to determine each location's acceptability in the region.

What does the appropriateness test intend to achieve?

Investing firms conduct a suitability test to assess whether a client's investment goals, financial situation, knowledge, and experience are compatible with a particular portfolio management service or investment counseling service.

To know more about ArcGIS visit;

https://brainly.com/question/13431205

#SPJ4

Whether you purchase online or by standing in line, the system-level transaction details are essentially the same and they require the same basic database structures and relationships.True
False

Answers

The system-level transaction details are essentially the same whether you make a purchase online or in person, and both scenarios call for the same fundamental database structures and relationships. This assertion is accurate.

An online transaction is what?

Online transactions are used by consumers to pay for the goods or services they purchase.

What happens in the online transaction first?

Registration: Registration for online purchases is the initial step. The customer must register on a website like Flipkart or Amazon in this phase. He must submit his email address, name, address, and other similar facts in order to register; the website keeps and uses these details solely.

To learn more about transaction visit:

brainly.com/question/24730931

#SPJ4

which of the following statements is true of firewalls? answer unselected they are placed all over the internet. unselected they are frequently used to prevent unauthorized internet users from accessing private networks connected to the internet. unselected they completely prevent network penetration by outsiders and therefore should be viewed as the sole element required for the overall security plan. unselected they are implemented in hardware but not software.

Answers

Answer:

They are used to prevent unauthorized internet users accessing private networks.

Explanation:

Determine all cache accesses and the state of the data cache at any given time. From this you can determine any additional cycles from data cache misses. You must calculate the number of bits for the offset, index, and tag, determine the number of hits and misses, show the contents of the cache, and use the number of misses to determine any additional clock cycles required. The total clock cycles would be the total cycles for all iterations from Part 2 plus any additional memory access cycles from cache misses from Part 3.

Answers

The smallest and fastest part of a computer system's memory is the cache. The registers, which make up a very minor portion of the computer CPU, are quick storage components.

Why does the cache memory access time take less time than the main memory access time?

Cache memory must be substantially smaller than main memory in order to be situated near to the CPU. As a result, it has less room for storage. Due to the increased performance of the more complicated chip, it is also more expensive than main memory.

What distinguishes Level 1 from Level 2 and Level 3 cache benefits?

Since it is the smallest and nearest to the CPU, Level 1 (L1) cache memory is the quickest type. On the processor chip, Level 2 (L2) has a larger capacity but a slower speed. The computer that uses the L2 cache has the biggest capacity Level 3 (L3) cache memory.

To know more about Cache memory visit:-

https://brainly.com/question/16091648

#SPJ4

while performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. the user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share.

Answers

Note that the incidence that best describes the above situation regarding Disk and file maintenenace is "The principle of least privilege was not followed."

What is the principle of least privilege?

The principle of least privilege (PoLP) is a concept in information security that states that a person or entity should only have access to the data, resources, and programs required to execute a task.

The routine modifications, updating, copying, transferring, or deleting of files on a computer is known as disk and file maintenance. File maintenance is often conducted on computers or servers that serve a large number of files.

Files and folders on a computer's hard disk defragment or break down over time and with continuous use. Computer files that have been fractured are chaotic. As a result, the Operating System (OS) operates slowly and identifies processing issues, according to Support.

Learn more about the Principle of least privilege:
https://brainly.com/question/29793574
#SPJ1

Full Question:

While performing disk and file maintenance on the company file server, you determine a user in the accounting department has been accidentally saving documents to all shared folders on the file server. the user's computer was recently passed to her from another user in the company, and according to company policy, the user should have access only to the accounting share.

What best describes this situation?

match each ad fs authentication factor on the left with the appropriate description on the right. each authentication factor may be used once, more than once, or not at all.

Answers

1. A secret string of characters- password 2. A biometric authentication using fingerprint scanning, 3. A smart card, a tangible token 4. Multi-Factor Authentication - Authentication needs to be verified by many factors.

Describe biometrics.

Biometrics are measurements of the body and computations of human traits. In computer science, access control and identity is achieved by biometric security, also known as real authentication. It is also used to locate individuals in groups that are being monitored. The distinct, quantifiable traits that are used to identify and classify people are called biometric identifiers. Biological traits connected to a person's physical attributes, such as body form, are frequently characterized as biometric identifiers. Examples include fingerprinting, veins in the palms, face recognition, DNA, handprints, hand geometry, iris identification, retina, and odor/scent.

To know more about biometrics
https://brainly.com/question/20318111
#SPJ4

after roughly how many seconds does the amount of information in immediate memory begin to drop off precipitously? type your numeric answer and submit numeric answer - type your numeric answer and submit

Answers

After 3 seconds the amount of information in immediate memory begins to drop off precipitously.

What exactly do you mean by instant memory?

a sort or stage of memory when a person can recall details that were recently presented, like a street address or phone number, even though those details might be forgotten after being used right away. A common test to determine IQ or neurological damage is the immediate memory test.

What purposes serve IQ tests?

A person's short-term and long-term memory is measured as the first step of an IQ test to determine their level of intelligence. It evaluates how quickly people can do these tasks as well as how effectively they can solve puzzles or recall information they have heard.

To know more about IQ visit:

https://brainly.com/question/29035691

#SPJ4

which of the following components forms the foundation of every computer-based information system and includes resources such as hardware, software, and data center facilities?

Answers

Every computer-based information system is built upon components of the technological infrastructure.

What exactly does "technology infrastructure" mean?

To support the applications and information management needs of the business, the technological infrastructure consists of hardware and software components. Infrastructure for technology has these parts. devices for computers. computer programs. Networking and communication systems.

Why does technology matter going forward?

It can provide a sense of belonging, access, knowledge, and empowerment. As we develop the technologies for the future, we might attempt to create a better world over time. This might mean many things because technology affects every part of our lives.

To know more about technological infrastructure visit:

https://brainly.com/question/13101365

#SPJ4

Wayne and Garth are engaged in XP and are writing code while sitting at one terminal. In XP terminology, they are engaged in:
A) Scrumming.
B) Refactoring.
C) Pair programming.
D) Time boxing.

Answers

While seated at one terminal, Wayne as well as Garth are playing with XP and creating code. Pair programming is what they are doing, to use XP lingo.

What are examples and code?

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Python, Perl, as well as PHP are examples. Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code (Cascading Style Sheets).

Why is a code referred to?

Informally known as a "code," the word refers to a patient experiencing a cardiopulmonary arrest in a hospital or clinic and necessitating the quick arrival of a team of medical professionals (also known as a "code team") to start resuscitative measures.

To know more about Code visit:

https://brainly.com/question/17493537

#SPJ4

one of your customers wants you to build a personal server that he can use in his home. one of his concerns is making sure that he has at least one data backup stored on the server in the event that a disk fails. you have decided to back up his data using raid. since this server is for personal use only, the customer wants to keep costs down. therefore, he would like to keep the number of drives to a minimum. which of the following raid systems would best meet the customer's specifications? RAID 0 RAID 1 RAID 5 RAID 10

Answers

The customer's requirements would be best met by raid systems is Raid 1

Explain about the raid systems?

In order to protect data in the event of a drive failure, RAID (redundant array of independent discs) stores the same data in various locations on numerous hard discs or solid-state drives (SSDs).

Multiple hard drives are combined in RAID, which stands for Redundant Array of Independent Disks, to increase efficiency. RAID can speed up your computer while also offering you a single drive with a sizable capacity, depending on how it is set up. The reliability of RAIDs can also be improved.

Unlike RAID 0 and RAID 1, RAID 5 requires at least three disc drives to operate, making it one of the most popular RAID configurations.

To learn more about raid systems refer to:

https://brainly.com/question/9305378

#SPJ4

to assign a value to a global variable in a function, the global variable must be first declared in the function. T/F

Answers

False. Value can to assigned to a global variable in the function even if we dont declare it before.

How assigning the value of global variable is possible?

Any variable that has to be used inside the function but is declared outside the function is referred to as a global variable. When you need to declare a global variable inside of a function, you use the word global. Normal variables only have a scope that extends to the function's conclusion when they are declared inside.

Utilize the global keyword when declaring the variable if you wish to use it outside of the function as well.

In JavaScript, there are two scopes: local and global. When a variable is assigned directly without being declared, it becomes a global property of the window object.

To know moe about global variables refer:

https://brainly.com/question/29607031

#SPJ4

the confidence that we can have in user authentication depends on the strength of the initial registration process.

Answers

The quality of the first registration procedure determines how confident we may be in user authentication.

What is Biometrics?

For each particular website and service, create secure and distinctive passwords or passphrases in accordance with the most recent accessible recommendations. Three categories of authentication factors exist. Password or personal identification number. something you are aware of. A token, like a bank card, is something you possess. Biometrics, like voice and fingerprint recognition, are something you are. Authentication assists users and organisations in defending against malicious parties trying to access systems and steal sensitive data. Computer systems, networks, gadgets, websites, databases, and other software and services are examples of these .

To learn more about distinctive from given link

https://brainly.com/question/13235869

#SPJ4

Rewards systems that reinforce the core values of the organization and contribute to organizational cohesiveness are the least effective type. T/F

Answers

False: The least successful form of rewards systems are those that promote organizational cohesion and reaffirm the essential values of the organization.

How does reinforcement work?

Reinforcement is a technique used in behavioral psychology to strengthen an individual's future behavior if that behavior is preceded by a certain form an important. This strengthening effect may be quantified as increased behavior (e.g., drawing a lever more frequently), increased length (example - pushing a lever for an prolonged period of time), increased magnitude (e.g., pulling a lever more firmly), or reduced latency (example - pulling a lever more quickly than following the antecedent stimulus). Self-awareness, self-reflection, and self-regulation are the three key principles of the soul paradigm of human nature. Historically, incentives have correlated with self-regulation.

To know more about reinforcement
https://brainly.com/question/5162646
#SPJ4

To select adjacent worksheet tabs, click the first tab, press down and hold down this key, and then click the last tab.Shift

Answers

To select the adjacent worksheet tabs, click the first tab, press down and hold down the shift key and then click the last tab.

What is Microsoft Word?

Microsoft Word is a word processor that may be used to create papers, letters, reports, and other types of writing of a professional calibre. It includes sophisticated capabilities that give you the best formatting and editing options for your files and projects.

What are examples of MS Word?

Application software that enables you to create, edit, and save any documents is an example of Microsoft Word. It was first developed by software engineers Richard Brodie and Charles Simoyi in 1983 and is now owned by Microsoft.

To know more about word processors visit:

https://brainly.com/question/14103516

#SPJ4

You want to know which files are large files (at least 0.1MB) in your data directory, but you do not want to go through them one by one. So you decide to design a regular expression to help with this. Locate the rule under the p1 target in your Makefile. This rule uses the Is command to list the contents of the data directory in your current folder. The -I option produces the long listing for these contents, which includes their size in bytes. The output of this is command is then piped as input into grep command. The-E option for the grep command allows searching through this text with a regular expression. Replace the regular expression in this grep command to search for any 6 digit number. Since the size of these files are displayed in bytes, the smallest possible six digit number: 100000 corresponds to 0.1MB. When this regular expression is correct, running "make p1" should display the three large files that can be found within the provided data directory. Tip: Start by composing a regex that matches any single digit, and test this to make sure that it works as expected. If you encounter trouble with one specific way of matching single digits, like \d, then please try to find another way that works with grep - E. Once this is working, look for a way to extend this pattern so that it must be repeated exactly six times to be matched.

Answers

You must pipe the command's output through grep in order to utilize grep as a filter. " | " is the symbol for pipe.

Explain about the grep?

The full line containing the matched string is displayed by default when using grep. To display only the matched pattern, change this setting. Using the -o option, we may instruct grep to show only the matching string. Using grep -n, output should be displayed together with the line number: To display the file's line number where the matching line was found.

Within collections of files, the grep command can look for a string. It outputs the name of the file, a colon, the line that matches the pattern, and the pattern when it discovers a pattern that matches in more than one file.

Instead of putting a filename at the end of a grep command, use an asterisk to search all files in the current directory.

To learn more about string refer to:

https://brainly.com/question/16397908

#SPJ4

in organisations that generate large number of transactions,.............are often a top priority in database designa. relationships among entitiesb.naming conventionsc.logical design standardsd.high processing speeds

Answers

In businesses that produce a lot of transactions, high processing speeds are frequently given top importance in database design.

Can I have ADHD if my processing speed is fast?

No matter what researcher A or B chooses to name it—sluggish cognitive tempo, pure inattentive ADHD, whatever—you can still be highly intelligent. High processing speeds are even possible.

What is Processor Speed and Why Is It Important?

When comparing computers, one of the most crucial factors to take into account is the processor speed (CPU speed). The CPU is frequently referred to as "the brain" of your computer, thus keeping it in good working order is crucial to the durability and functionality of your machine.

To know more Database design visit :-

https://brainly.com/question/14274993

#SPJ4

assuming a 1-kb page size, what are the page numbers and offsets for the following address references (provided as decimal numbers)? (a) 21205 (b) 164250 (c) 121357 (d) 16479315 (e) 27253187

Answers

Note that the Page numbers and offsets for the following address references given a 1-kb page size are:

a) Address: 21205 → Page number: 20, Offset: 905

b) Address: 164250 → Page number: 161, Offset: 202

c) Address: 121357 → Page number: 119, Offset: 333

d) Address: 16479315 → Page number: 16093, Offset: 659

e) Address: 27253187 → Page number: 26708, Offset: 963.

What is an offset and an address reference?

Note that an offset is a numerical value that represents the distance of a particular location within a file, block of memory, or other data structure from a reference point. It is often used to specify the location of a particular piece of data within a larger structure.

An address reference is a value that represents the location of a specific piece of data within a computer's memory.

To determine the page numbers and offsets for the given address references, you will need to divide the address by the page size. The page number will be the result of the division, and the offset will be the remainder.

Thus, for a:
Address: 21205 → Page number: 21205 / 1024 = 20,

Offset: 21205 % 1024 = 905

for b,
Address: 164250 → Page number: 164250 / 1024 = 161, Offset: 164250 % 1024 = 202


for c,
Address: 121357 → Page number: 121357 / 1024 = 119,

Offset: 121357 % 1024 = 333

for d,

Address: 16479315 => Page number: 16479315 / 1024 = 16093,

Offset: 16479315 % 1024 = 659

for e,

Address: 27253187 => Page number: 27253187 / 1024 = 26708,

Offset: 27253187 % 1024 = 963

In conclusion,

a) Address: 21205 → Page number: 20, Offset: 905

b) Address: 164250 → Page number: 161, Offset: 202

c) Address: 121357 → Page number: 119, Offset: 333

d) Address: 16479315 → Page number: 16093, Offset: 659

e) Address: 27253187 → Page number: 26708, Offset: 963.

Learn more about Address References:
https://brainly.com/question/2342795
#SPJ1

create a logical model identify entities and attributes input the data into the tables database create a conceptual model implement the database

Answers

A logical model includes depictions of entities, properties, relationships, special identifiers, sub types, and super types, as well as restrictions on how relationships can be formed.

What is  data model?

A logical model may also reference one or more domain or glossary models or include objects from a domain model. Relational data models, network data models, and hierarchical data models are three examples of this sort of data model. Data are represented as relations, or tables, in the relational model. System for managing orders simply. This is a conceptual data model for a straightforward wholesale retail order management system. Even though some consumers might not have sent any orders yet, customers send orders to the store. Each order item for a product is one of many order items that make up the order.

To learn more about  data model from given link

brainly.com/question/10686043

#SPJ4

The ____ command saves your work, turns off the computer fans and hard disk, and then places the computer in a lower-power state. shut down.

Answers

The sleep command stores your work, disables the hard drive and computer fans, and then switches the computer to a lower-power mode. closing down.

What is Sleep mode?Electronic devices like computers, televisions, and remote control devices can operate in a low power mode called sleep mode (or suspend to RAM). These modes allow users to resume operations without having to issue new commands or wait for a machine to reboot, and they significantly reduce electrical consumption compared to leaving a device fully on.The computer goes into a lower-power state when the sleep command caches your work, turns off the hard disk and computer fans. Many gadgets use an LED power light that pulses or is red to indicate this power mode.In order to keep the RAM running and be ready to respond to a wake-up event, a computer needs to use some energy even when it is dormant. In several nations, standby power for a sleeping computer is regulated. For instance, the One Watt Initiative in the United States places restrictions on this power.

Hence, The sleep command stores your work, disables the hard drive and computer fans, and then switches the computer to a lower-power mode. closing down.

To learn more Sleep mode refer to:

https://brainly.com/question/27583320

#SPJ4

which of the following would be considered an input device? cpu cpu microsoft word microsoft word keyboard keyboard printer

Answers

A keyboard is regarded as an input device. Examples of input devices include scanners, mice, joysticks, and digital cameras.

Which of the following statements—that an output device provides information to the computer and an input device receives it—is true?

A computer's output device transmits information to an input device, and the other way around. The computer provides information to an input device, which receives it, and the other way around. Both assertions are false.

What kind of hardware is used in computers?

Computer hardware refers to the actual physical components of a computer, such as the chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, and speakers.

To know more about input device visit :-

https://brainly.com/question/13014455

#SPJ4

Which of the following blocks would most likely be used to create a string constant from scanned code?

Question 15 options:

{ append_scan(yytext); return TOKEN_STRING; }


{ return TOKEN_STRING; }


{ append_scan(yytext); return TOKEN_STRING; }


{ $$ = createLiteral(scanned_text); }

Answers

The blocks that would most likely be used to create a string constant from scanned code is { append_scan(yytext); return TOKEN_STRING; }. The correct option is c.

What is scanned code?

Code scanning makes it possible to find vulnerabilities and fix them before they are released into production, removing the cybersecurity risks they present.

When scanning a string, the literal "EOL" means "end of the line." When Python encounters an EOL error, it means that it has reached the end of a line in a string. You might have done this by forgetting the closing quotes or by trying to make a string span more than one line. Single or double quotes around strings.

Therefore, the correct option is c, { append_scan(yytext); return TOKEN_STRING; }.

To learn more about scanned code, refer to the below link:

https://brainly.com/question/15098539

#SPJ1

6. Which of the following statements are true regarding cloud services? (Choose two.)
A. Cloud services use a "pay-as-you-go" payment scheme.
B. Cloud services are always less expensive than in-house hosted solutions.
C. Cloud data storage is less secure than storing data locally.
D. Cloud services can be provisioned quickly.

Answers

Quick provisioning of cloud services is possible. Regarding cloud services, the claims are accurate.

Regarding cloud computing, which of the following statements is accurate?

Cloud computing is the term used to describe on-demand internet access to computer resources, including software, servers (both physical and virtual), data storage, development tools, networking capabilities, and more, that are kept at a distant data centre run by a cloud services provider (or CSP).

Regarding cloud computing, which of the following is false?

This is not true for cloud computing, which only permits users to use the programmes that are installed on their PCs. All programmes are available to consumers thanks to cloud computing. Users have access to all applications.

To know more about  cloud services visit :-

https://brainly.com/question/13468612

#SPJ1

Zach believes someone is trying to log in to a computer system in order to gain access to the company's network. He wants to use Windows to determine if that is the case.Where can Zach go to check the security logs?a. Event Viewer

Answers

One of your computer's most underused features is definitely Event Viewer, and it surprises me how few even competent experts use this straight forward tool to provide such straightforward answers. Event Viewer is tricky since you have to set it up correctly.

What kind of software does a computer utilize to be controlled?

A computer's operating system is a piece of software that manages and organizes the hardware components as well as runs other programs and applications. It is the primary component of the system software, and a computer cannot operate without it.

What three categories of system software exist?

Application programs, device drivers, and operating systems are the three main categories of software that make up your system.

To know more about Event Viewer visit :-

https://brainly.com/question/14166392

#SPJ1

Other Questions
True/ False. 1.A profit maximizing monopolist facing no entry threat will operate on the elastic portion of the market demand curve. Select the correct answer. Solve the following inequality. 21 -3(x 4) < 30 A. -3 x < 6 B. -10 < x -3 C. 28 x < 37 D. -6 < x -3 What role did the administration of George HW Bush play in bringing democracy to South Africa a mutation that inserts or deletes one or two nucleotides is usually more harmful than a mutation that substitutes one base for another because the nurse teaches the client that the presence of crystals in the synovial fluid obtained from arthrocentesis confirms which disease process? Thoroughly explain the concept, causes, blessings and curses of globalization. Select the correct texts in the passage.Which detail best develops the character of Demetrio Macias in the cultural setting?adapted from The Underdogsby Mariano AzuelaEverything was still swathed in shadows as Demetrio Macias began his descent to the bottom of the ravine. Between rocks striped with huge erodedracks, and a squarely cut wall, with the river flowing below, a narrow ledge along the steep incline served as a mountaln trail.*Theyll surely find me now," he mused. "It's a good thing they know nothing about the trails and paths up here.But if they got someone fromMoyahua to guide them .* He left the thought unfinished. *All the men from Limon or Santa Rosa or the other nearby ranches are on our side: theywouldn't try to trail us. That cacique who's chased and run me ragged over these hills, is at Mohayua now; he'd give his eyeteeth to capture me."AI dawn, he approached the pit of the canyon. Here, he laythe rocks and fell asleep. closed-loop supply chains are:multiple choiceare a strategic, cross-functional initiative.are a strategic, cross-functional initiative and require the cooperation of suppliers.are a strategic, cross-functional initiative, require the cooperation of suppliers and require reverse logistics capabilities. how are atp and nadph produced during the light reactions? what is an electron transport chain (etc)? g when people are in financial difficulty an advisor will usually recommend establishing a budget for spending. one reason is that a budget will act to discipline behavior if people psychologically are subject to . question 13 options: bounded rationality mental accounts segregated gains the halo effect g the diameters of bolts produced by a certain machine are normally distributed with a population mean of 20.00 milimeters (mm) and a population standard deviation of 0.2 mm. what is the probability that a randomly selected bolt will have a diameter greater than 20.329 mm? use 4 decimal places in answering. what is the formal charge on phosphorus in a lewis structure for the phosphate ion that satisfies the octet rule? How would malvina reynolds most likely feel about the role conformity and consumerism had on society and culture of the United States in the 1950s A newspaper article citing student input about the growing popularity of caffeinated energy drinks on college campuses would be considered a ________________ information source.scholarlyprimarysecondarytertiary when you look at a single slit diffraction pattern produced on a screen by light of a single wavelength, you see a bright central maximum and a number of maxima on either side, their intensity decreasing with distance from the central maximum. if the wavelength of the light is increased:_____. regard to behavior modification, instrumental values are those that are core to the meaning of our life.true 6. It is impossible for human beings tomaintain a sense of objectivity; thus,therapists who attempt to maintainobjectivity are fooling themselvesTRUE or FALSE does anyone have the answer During the Golden Age in China, which of thefollowing was true in regards to serving in themilitary?A. Service was required of every female citizen.B. Service was a profession that offered a salary.C. Service was required of every male citizen. Which process is shown in the plant cell below?