Answer:
Rom
mellisa
Explanation:
pls mark me BRAINLIAST
What do you do when you have computer problems? Check all that apply. PLEASE HELP
Answer:
I ask my parents or call someone
Which of the following is NOT a correct variable assignment?
O test = 98
Oname = "Ada"
O x = x + 1
O 5+ y = x
Variables are simply the names given to memory location.
The incorrect variable assignment is (d) 5 + y = x
To assign a value to a variable, we make use of the following syntax:
variable = expression/value
The above syntax means that:
The variable will be on the left-hand side, while the values or the expressions will be on the right-hand side
Using the above highlights as a guide, we can conclude that:
(d) 5 + y = x is not a correct variable assignment
This is so because, it does not conform to the syntax of variable assignment
Read more about variable assignments at:
https://brainly.com/question/18522561
Which best describes what happens when a formula is copied from one cell to another?
The cell references in the formula remain the same to match the cell that the formula is pasted into.
The cell references in the formula remain the same as they were in the original cell.
The cell references in the formula change to match the cell that the formula was copied from.
O The cell references in the formula change to match the cell that the formula is pasted into.
Hurry up
Answer:
b 2
Explanation:
b2
Which of this isn't one of the three types of cryptograph?
A. Vegenere
B. Symmetric
C. Asymmetric
D. Hashing
Answer:
A. Vegenere
Explanation:
I think it's spelled Vigenère, I might be wrong.
The three types of cryptograph are:
Symmetric Key Cryptography (Private/Secret Key Cryptography)
Asymmetric Key Cryptography (Public Key Cryptography)
Hash Function
Choose all items that represent essential features of excellent navigation menu design.
uses clearly and simply labeled links
is consistently styled and located
contains a link to a site map
is intuitive and easy to use is available on all pages
in the site employs a drop-down list
Answer:
A,B,D,E
Explanation:
Answer:
A- uses clearly and simply labeled links
B- is consistently styled and located
D- is intuitive and easy to use
E- is available on all pages in the site
What is the purpose of the ISOWEEKNUM function?
determines how many workdays are in a certain week
determines how many workdays are in a certain month
determines what day of the year that date is
determines what week of the year that date is
ANSWER IS D
Answer:
d
Explanation:
just took the Q edge
Elias is writing poems and is formatting several to fit on a page that has been divided into columns. Which column break would allow him to end one poem and start the next poem on the same page?
Question 6 options:
next page
sequential
text wrap
continuous
Answer:
Explanation:
Column break continous
Write a program that asks the p34won to enter their grade, and then prints GRADE is a fun grade. Your program should repeat these steps until the user inputs I graduated
Answer:
Following are the code to this question:
def fun():#defining a method fun
while True:#defining a while loop
g = input("Enter your grade: (I graduated) ")#defining variable g for input value
if g == "I graduated":#defining if block to check string value
return 0#return
print("{} is a fun grade".format(g))#use print method to print string value
fun()#calling the method
Output:
Enter your grade: (I graduated) 1st
1st is a fun grade
Enter your grade: (I graduated) 2nd
2nd is a fun grade
Enter your grade: (I graduated) I graduated
Explanation:
In the given python code, a method "fun" is defined, and inside the method, a while loop is defined, which uses a variable "g" for input value from the user-end.
In the next step, if block is defined to check string a value and return a value 0, and use the print method to print the given value, and call the above method fun.
What is the MINIMUM number of paths that would need to be broken to prevent Computing Device A from connecting with Computing Device E? a) 1 b) 2 c) 3 d) 4
Answer:
The answer is "Option c".
Explanation:
In the given question the device A is connected by 3 wires, contributing all of them, which also includes several connector paths. When all the wires of A are broken down, and if all of this leaves no routes that can be used. Even so, if it is done to E, it's also linked to four different routes. Its solution would've been C because its value will be the MINIMUM.
Answer:
c
Explanation:
any song recommendations, pls dont say 6ix9ine or lil pump
I actually do have one tho. Try Megan Tha Stallion.
Answer:
smash mouth "all star" is my fave or Imagine Dragons "Whatever it Takes"
Explanation:
Do you guys know if there's a way for me to find a Google doc that I typed but forgot to save if you do it for points i will report please don't make me
Answer:
Usually, Google Docs save automatically. If you remember some keywords that you typed, try searching for it. For example, if you typed up a report about dogs, search "dogs" when you're on the Google Docs home screen.
Explanation:
If this doesn't help, leave a comment and I'll try to help more!
Answer:
if you remeber the name of the doc you wrote you can just search for it in google doc. google doc saves what you write so it should be in there
Explanation:
Software licensed as proprietary
is usually free of cost often has lower quality than other types.
does not permit source code changes.
is rare in today's marketplace.
can be redistributed by the user at will.
Answer:
Does not permit source code changes.
Explanation:
Answer:
does not permit source code changes.
Explanation:
anybody wana play 2k21
Answer:
no
Explanation:
no
Answer:I’ll play
Explanation:
The fireworks were a lantern in the sky
Answer:
So your saying thst when a firework blows then it is a big lantern in the sky???
Write a C++ program that reads n integer values and stores them in an array of maximum 20 integers. Read from the user a valid value of n (n should not exceed 20). After reading the n array elements find and display the maximum and minimum elements.
Answer:
Following are the code to this question:
#include<iostream>//defining header file
using namespace std;
int main ()//defining main method
{
int x[20], n, i, maximum, minimum;//defining an integer array x and another integer variable
cout <<"Enter the number of element you want to insert: ";//print message
cin >>n;//input size value from user end
if(n>20)//defining if block that check n is greater then 20
{
cout <<"The size of array should not exceed 20 element";//print message
return 0;//return 0
}
else//defining else block
{
cout<<"Enter array value: ";//print message
for(i=0;i<n;i++)//defining for loop
cin>>x[i];//defining for loop for input array value
maximum =x[0];//defining maximum variable that hold array value
for (i=0;i<n;i++)//defining for loop for check value
{
if(maximum<x[i])//defining if block to check maximum value
{
maximum=x[i];//hold maximum value
}
}
minimum=x[0];//use minimum variable to hold array value
for (i=0;i<n;i++)//defining for loop to hold minimum value
{
if (minimum>x[i])//defining if block to check minimum value
minimum =x[i];//hold minimum value
}
cout << "Maximum element : " << maximum ;//print maximum value
cout << "Minimum element : " << minimum ;//print minimum value
return 0;
}
}
Output:
Enter the number of element you want to insert: 7
Enter array value:
8
6
22
13
98
554
3
Maximum element : 554
Minimum element : 3
Explanation:
In the above-given program, an integer array "x", and four integer variable "n, i, maximum, and minimum" is defined, which uses the if block to check the size of the array.
In the else block, it inputs the array value from the user end and after input value, it uses the conditional statement to check the "maximum and minimum" value in its variable and print its value.
Write a program that inputs a filename from the user and prints to the terminal a report of the wages paid to the employees for the given period. The report should be in tabular format with the appropriate header. Each line should contain an employee’s name, the hours worked, and the wages paid for that period.
Answer:
filename = input("Enter file name: ")
file = open("filename", "r")
while file:
line = file.readline()
print(line)
file.close()
Explanation:
The python source code prompts the user for a file name (file extension included), opens the file and reads the content of the file to the end, one line at a time, and prints it.
Note that the file is closed at the end of the program to avoid leakage.
The program illustrates the use of file manipulation.
File manipulations are used to read from a file, and also write into it.
The program in Python, where comments are used to explain each line is as follows:
#This gets the file name
fname = input('Enter input file name: ')
#This prints the output header
print('Name\t\tHours\t\tTotal Pay')
#This iterates through each line of the file
for line in open(fname):
#This gets the text on the current line
cline = line.strip()
#If the text is not empty,
if cline != '':
#This gets the name, wage and time worked on that line
(name, wage, time) = cline.split()
#This converts the time to integer
time = int(time)
#This calculates the total pay
totalpay = float(wage) * time
#This prints the employee details
print(name,'\t\t', time,'\t\t' totalpay))
Read more about file manipulations at:
https://brainly.in/question/10211834
Focusing on the general characteristics of a problem or object, while ignoring the details, is a technique called
O refinement
O abstraction
O decomposition
O pattern recognition
Answer:
Abstraction
Explanation:
In computer science, abstraction has a similar definition. It is a simplified version of something technical, such as a function or an object in a program. The goal of "abstracting" data is to reduce complexity by removing unnecessary information. At some level, we all think of computers in abstract terms.
_________ is the primary measurement used to gauge your typing ability
Answer:
Words per minute
Explanation:
define operator precedence ? explain with an example.
Answer:
Operator precedence determines which operator is performed first in an expression with more than one operators with different precedence. ... For example: '*' and '/' have same precedence and their associativity is Left to Right, so the expression “100 / 10 * 10” is treated as “(100 / 10) * 10”.
this might help,
your welcome arooja
which of the following statements represents the pros and cons of being a broadcast technician?
Answer:
Regulatory practices provide more security for the consumer but may create monopolies in the industry, reducing consumer choice.
Explanation:
just did it
What refers to the way players get personally involved in a game, with the ability to influence the outcome?
ludonarrative
interactive fiction
participant observation
player agency
Answer:
player agency
Explanation:
Answer:
I think it's player agency
Explanation:
Player Agency: The player's ability to impact the story through the game design or gameplay
Rayna wants to create an organizational chart in her document. Which of the following commands should she click in the Illustrations group?
Chart
Media
Screenshot
SmartArt
Answer: Your real answer is SmartArt
Explanation:
Under fair use laws students can use as much digital content as they want as long as it is for educational purposes
Answer:
Is this a question you need help with or is it a fact that everyone should know?
Explanation:
PLS help im in the middle of this test
If someone enjoys the technical aspects of production but does not enjoy working with a large number of people, which career option might be best?
photojournalist
videographer
camera operator
print journalist
Answer:
Videographer
Explanation:
They work with a small grade while the other have to have good people skills
Please Help!
Choose all items that are characteristics of placing nested elements on a new line, using indentation.
A) makes HTML errors difficult to find
B) not required by a web browser
C) can cause web page display errors
D) makes HTML analysis and repair easier
E) done automatically by HTML authoring software
Answer:
Its B,D,E
Explanation:
Got it right on e2020
Answer:
B). not required by a web browser
D). makes HTML analysis and repair easier
E). done automatically by HTML authoring software
Btw cause this class can be a pain here are the answers to the rest of the assignment.
Slide 7/12:
The missing element is
C). <p></p>
Slide 9/12:
The missing tag is:
B). an end (closing) a tag
Slide 12/12:
The missing character is
D). an angle bracket
Explanation:
I just did the Part 3 on EDGE2022 and it's 200% correct!
Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)
What is the purpose of an End User License Agreement?
Answer: An End User License Agreement, or EULA for short, is a set of conditions under which a licensor gives a licensee permission to use a piece of intellectual property in the form of proprietary software. The licensor is the person or business that designed or developed the software.
Explanation:
NEED HELP ASAP!!!!!!!!!!
Which of the following demonstrates the difference between disk copying and disk imaging?
A) Disk copying moves the entire contents of one disk to another whereas disk imaging creates a compressed file for backup
B) Disk copying creates a compressed wile for backup whereas disk imagine moves the entire contents of one disk to another
C) Disk copying only records and stores
another disks auditory data whereas disk imaging only records and stores another disk's
VISUS data
D) Disk copying only records and stores another disks visual data whereas diskirmaging only records and stores another disk's
auditory data
Answer:
A
Disk copying moves the entire contents of one disk to another whereas disk imaging creates a compressed file for backup
Explanation:
Which of the following BEST describes the relationship between the Boston Marathon bombing and biometrics?
Answer:
Because of the newly developed biometric technology, the FBI was able to
quickly identify two suspects.
The blurry photos released by the FBI after the bombing prompted
researchers to improve their early biometric software.
Because biometric technology was unavailable at the time, the Boston
Marathon bomber remains at large.
The Boston Marathon bombing made researchers aware of how biometric
technology is sometimes useless and ineffective.
Explanation:
who when and why developed python
Explanation:
Python was conceived in the late 1980s by Guido van Rossum at Centrum Wiskunde & Informatica (CWI) in the Netherlands as a successor to the ABC language (itself inspired by SETL), capable of exception handling and interfacing with the Amoeba operating system. Its implementation began in December 1989.
PLEASE ILL MARK BRAINLIEST
A ____ is a distinctive characteristic of a virus or virus family.
(this is computer stuff)
Answer:
it is a capsid