Tamara is writing a program to organize students in a class and needs to use operators to organize student grades, then compare the results of that to each other. What kinds of operators does Tamara need to use for each step?
Tamara needs to use
operators to organize the students' grades, then
operators to compare the results.

Answers

Answer 1

Answer:   you said "Tamara needs to use

operators to organize the students' grades, then

operators to compare the results."

i think your right

Explanation:

sounds right.


Related Questions

The implementation stage of the SDLC is when the system is moved into operation where it can be used. What stage PRECEDES the implementation stage and what happens in this preceding stage

Answers

The stage that precedes the implementation stage of SDLC is testing and it involves checking the functionality of the system.

System design involves the process of determining an overall system architecture, which typically comprises the following:

Hardware.End users.Physical processing components.Software.Communication channel.

Generally, there are seven (7) main stages in the systems development life cycle (SDLC) model and these include:

1. Planning.

2. Analysis.

3. Design.

4. Development.

5. Testing.

6. Implementation.

7. Maintenance.

From the above, we can deduce that the stage which precedes the implementation stage of SDLC is testing.

During the testing stage of SDLC, a quality assurance (QA) expert checks the system to determine whether or not it is functioning properly before it is deployed for operation, which is where the system can be used.

Read more: https://brainly.com/question/20813142

How to remove link color and underline in html.

Answers

Answer:

To remove the underline from all hyperlinks on a page, follow these steps:

Open the page that you want to modify.

Click the Codetab.

Put the following HTML code before the <BODY> tag: <STYLE>A {text-decoration: none;} </STYLE>

Click the Designtab. Your hyperlinks no longer contain underlines.

I recorded a video on my windows PC, but when i tried to play it i got this message:

Windows Media Player cannot play the file. The Player might not support the file type or might not support the codec that was used to compress the file

is there a free online way i can fix this

Answers

Answer:

rename the file then type ".MP4" at the end and it should work

by the way big warriors fan as well

Explanation:

________ software consists of operating systems, utilities, device drivers, and language translators.

Answers

Answer:

"System"

Explanation:

System software consists of operating systems, utilities, device drivers, and language translators.

(not much explanation as it was a fill in the blank which explains itself haha)

Have a nice day!

    I hope this is what you are looking for, but if not - comment! I will edit and update my answer accordingly. (ノ^∇^)

- Heather

Why do
ve need to add movies in our slide?

Answers

Answer:

movies are awesome! LOL but i dont understand your question...sadly.

Explanation:

Pedestrians, bicyclists, and skateboarders _____ the rules of right-of-way when they use the road.

Answers

Pedestrians, bicyclists, and skateboarders must follow the rules of right-of-way when they use the road.

Until 2016, the popular song _____ was covered by copyright law, unusually long after it was written in 1893.

A.
Happy Birthday

B.
Merry Christmas, Everyone

C.
Hava Nagila

D.
Auld Lang Syne

Answers

Answer: Happy Birthday

Explanation:

Answer is A. Happy Birthday

In object-oriented programming, a data member plays the role of _________. a. an attribute b. a behavior c. either a or b d. neither a nor b

Answers

In object-oriented programming, the object consist of both the data and the functions that operate on the data. In object-oriented programming, a data member plays the role of neither A nor B.

Objects are the product of abstract data types that has inside of it both data and function altogether.

A data member often has different classes. They can be private or public.

Object-oriented programming (OOP) is simply known as a computer programming model that put together software design around data, or objects.

Learn more from

https://brainly.com/question/12342989

A file ____ shows the location of a file or folder

Answers

Answer:

Path

Explanation:

correct answer: Path

(Hope this helps can I pls have brainlist (crown)☺️)

AI is not embraced everywhere in every industry because _______.

Answers

Answer:

See below:

Explanation:

AI is not embraced in every industry because of the type of industry and what it requires. In some situations, a human is needed since an AI cannot determine what to do and can sometimes even cause death.

AI isn't embraced everywhere because for some things we need a person, lets say for example, we need an AI to respond to 911 calls, that simply won't work due to the many situations and training the bot too will be a nightmare. For example, if a caller says a word that normal humans can understand, or a "code word" that every human knows but they haven't bothered to tell the bot, that will be the end of the line for them.

There are mutliple reasons to not use AI depending on the situation whether its life and death or just plain impractical.

Angular when to use reactiveformsmodule.

Answers

Answer:

Image result for Angular when to use reactiveformsmodule.

In summaries, if forms are very important for your app, or reactive pattern are used in your app, you should use reactive forms. Otherwise your app have basic and simple requirement for forms such as sign in, you should use template-driven forms

Explanation:

Each form has a state that can be updated by many different interactions and its up to the application developer to manage that state and prevent it from getting corrupted. This can get hard to do for very large forms and can introduce a category of potential bugs

5G can support more users simultaneously than LTE, but it may not provide any improvements in terms of data rates. True or False

Answers

It looks like it should be true because I learned it from my dad

3 out of 5 citizens were eligible to vote 180 actually voted

Answers

Answer:

What is the question.

Explanation:

Answers:

Either 108/180

or 180/300

Depending on question since I dont know what ur asking

The Sales team uses the /sales directory to store documents related to sales, contacts, and orders. Currently, permissions on the directory only allow the user and group owners to view the contents of the directory. Users who are not part of the group owner are unable to list the contents of the directory.

As part of a new company policy to increase teamwork, you want to allow all users to be able to see the /sales directory and list its contents. You also want to let all users open, but not change, any document inside that directory.

Task:

Allow the other group to browse the /sales directory.

Modify permissions on all files in the /sales directory to allow members of the other group to view but not change the file.
Type:

chmod o+rx /sales

Answers

Answer:

it should be d

Explanation:

please mark this as brainlists i could really use it

File permissions are often set or changed using “Change Mode.” o+ Add permission for “others” with – (remove) r (other possible options include u (user) and g (group)). Permission is read. Implement permission (other possible values include w – write permission)

What is main function of the chmod?

What permission—read (r), write (w), or execute—is third? (x). You would enter chmod o+rx [filename] to add world read and execute permission to a file using symbolic mode. You would type chmod o-r [filename] to make a file world read-only.

— rw-r—r— (644) — Group members and others can only read; only the user has read and write access. — rwx——— (700) — Reading, writing, and executing are all restricted to the user.

Therefore, RWXRXRX (755) — Only the user and the group and others can read and execute; the user has read, write, and execute permissions.

Learn more about chmod here:

https://brainly.com/question/14187643

#SPJ2

I am malala how one girl stood up for education and changed the world pdf.

Answers

Answer:

what?

Explanation:

A customer reached out via Twitter Direct Message to your company, looking for support with a complex issue. A co-worker was already helping that user but is away on vacation. Which Hootsuite feature would be best to respond with?

Answers

The Hootsuite platform provides tools that enable a person to manage his social media activities in one spot. The Hootsuite feature that would be best to respond with given the above scenario is;

Hootsuite inbox

Using the Hootsuite inbox, a user can access the private and public conversations between a former user and a client.

You can see the post that prompted the customer to speak with the organization's representative.

After reading through the conversations, you can reply the client and take any step that is required of you.

Learn more here:

https://brainly.com/question/15321261

what are foundations of any game systems that control what the players can or cannot do in the game, as well as the penalties, reward, and other consequences that result from the players actions?

rules

feedback

tasks

algotithms

Answers

Answer:

A. Rules

Explanation:

Rules can determine what can be done and what cannot be done... giving it restrictions, or RULES in a video game among-st a player

If you want to share information with individuals who are internal to your organization, which type of network would you want to use

Answers

it is globe because I want a successful the all people

Select the correct text in the passage.
Which three phrases describe a wireframe?

Tracy uses a (pictorial summary of an entire website) in her team meeting. It is a (two-dimensional illustration) of how (each web page on a website will look.) Known as a workflow diagram, this (explains how pages in a website connect to one another.) It is a (design tool), and it (shows the overall framework of a website.) It is a (visual representation of how much space each element on a page should take.)

Answers

Answer:

A B D

Explanation:

If, in a recursive solution, function A calls function B which calls function C, this is called ________ recursion. indirect three function call direct continuous

Answers

If, in a recursive solution, function A calls function B which calls function C, this is called Indirect recursion.

A recursive algorithm is said to be recursive if such an algorithm calls itself with smaller input values and get current result for implementing basic operations on those simple inputs.

Indirect recursion occurs when a function A invokes another function B which in turn makes it the original function and calls another function C.

Learn more about recursion here:

https://brainly.com/question/3169485?referrer=searchResults

_______________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.

Answers

Answer:

______HUMAN- COMPUTER INTERACTION_________ is research in the design and the use of computer technology, which focuses on the interfaces between people and computers.

Explanation:

HOPE ITS HELP

What is an IF statement used for?

Answers

The IF statement is a decision-making statement that guides a program to make decisions based on specified criteria. The IF statement executes one set of code if a specified condition is met (TRUE) or another set of code evaluates to FALSE.

In a complex formula, how does excel determine which calculation to perform first?.

Answers

In a complex formula, the way excel determines which calculation to perform first is that; It follows the order of operations.

When carrying out calculations in excel, if we don't bracket certain operations, excel will use the order of operation called BODMAS to determine which operation to carry out first.

For example, if excel wants to solve 3 × 4 + 7 - 2;

The acronyms in BODMAS stand for;

B - Brackets

O - Orders (powers/indices or roots)

D - Division

M - Multiplication

A - Addition

S - Subtraction

Now, it means that the first action it will perform is Bracket while the last will be subtraction.

In our example, excel will first use the multiplication sign to get;

(3 * 4) = 12

Then addition; 12 + 7 = 19

Then subtraction; 19 - 2 = 17

Read more on BODMAS at; https://brainly.com/question/16788360

Write any four causes of cyber crime

Answers

A Lack of Empathy
The Victim Deserves It
Self-loathing
It Becomes an Addiction

In older languages, you could leave a selection or loop before it was complete by using a ____ statement

Answers

Answer:

D) go to

Explanation:

A) next

B) go next

C) loop

D) go to

D) go to is correct answer

(Hope this helps can I pls have brainlist (crown)☺️)

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. True False

Answers

Answer:

False

Explanation:

The DES encryption standard is believed to be weakened by the American government by containing shortened key lengths and 'S-boxes' of unknown origin.

A technology ____ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.

Answers

Answer:

A technology __cycle __ begins with the birth of a new technology and ends when that technology reaches its limits and dies as it is replaced by a newer, substantially better technology.

Explanation:

Hope its help

What color object would reflect more light?
O Red
O Black
O Blue
o White

Answers

Answer:

White

Explanation:

Red absorbs all light except red light, which it reflects

Black absorbs all light

Blue absorbs all light except blue light, which it reflects

White reflects all light because it has all colors except black.

Hope you do well!

Bob has started a company and registered its name with the government as a private corporation. He tries to create a domain name using that registered name along with his country code. The name has already been registered by someone else. What should Bob do

Answers

Answer:

bobo

Explanation:

A common attack in which a client's cookies, security tokens, or other personal information is obtained and used to impersonate the user is referred to as

Answers

Answer:

Identity Theft. i hope this helps :D

Other Questions
Where would an investigator mark a collected bullet with their own initials?A .on the sideB .on the basearound the bulletC .a bullet should never be markedD .a bullet should never be marked Find the accumulated value of an investment of $2000 at 8% compounded continuously for 4 years Find the distance between the points (13, 20) and (18, 8).13711 -4 ( x -2 ) = -2 ( x -17/2 ) how many solutions does it have? No need to solve, just how many solutions does it have Hey everyone! Can you help me out with this(for those wondering, these are test corrections, I plan to do half today and half tomorrow) State whether the following relation is a function. Which group of people was one o fthe first to spread hte idea of worshipping only one god?. What does sign mean?A. Evidence of a disease that can be seen by others such as a skin rash or cough B. A feeling or physical change experienced by the patient such as pain We have seen in earlier readings how to determine the speed of a wave on a string. What will happen to the wavelength of a sinusoidal wave on a string if the tension in the string is increased (assuming we keep the frequency of the wave the same) so how many eyes do a dog and cat have how have astronomers interpreted the unexpectedly fast rotation of galaxies Why might more and more people be using clean energy instead of fossil fuels ? Use evidence from the text to support your answer . which expression means the same as subtract from 7 and then multipy by 4 Jonte has such a extreme fear of flying that she almost never gets home to see family in Georgia, ever since she took a job in New Jersey. Her excessive, distressing, and persistent fear is considered a/an I need help with this please Review the map.Which state has between 1,001 and 2,000 identified human trafficking victims?OregonGeorgiaTexasMontana Psych- Causal attribution theories generally try to explain how we:1) are influenced by others 2) predict how others will behave based on their attitudes3) change our attitudes toward other people4) determine the causes of others' behavior5) relate to and interact with other people Find the domain of the function.f(x) = -5x + 3 Why are professional associations interested in keeping professional standards high?A few dishonest professionals can hurt the entire profession.B. They can charge more for higher standards.C. Professional associations get paid based on customer reviews.D. Professional associations are forced by law to keep standards high. A key contribution of ________ was the identification of the major functions of management which are planning, leading, organizing, and controlling. total quality management administrative management the behavioral viewpoint contingency theory Q. What phase change occurs at letter A?