[tex] \: \: \: \: \: [/tex]
1. how did the prototype help you think about your idea?
it can clarifies the things about the products as well as the user flow.2. what was frustrating about making a prototype?
There may be too much variation in requirements.hope it helps[tex] \: \: \: \: \: \: [/tex]
Write a function that will receive 5 numbers from a user (inputted one at a time-- use reassignment!) and will count then print how many of the numbers are odd.
The program is an illustration of loops.
Loops are used to perform repetitive operations
The function in Python where comments are used to explain each line is as follows:
#This defines the function
def count_odd(mylist):
#This initializes the count variable to 0
count = 0
#This iterates through the list
for i in mylist:
#This checks if the current list element is not even
if not i%2 == 0:
#If yes, this increments the count variable by 1
count+=1
#This returns the count of odd numbers
return(count)
Read more about similar programs at:
https://brainly.com/question/18269390
The ___________ method returns the length of an array.
append
input
add
len
Answer:
d
Explanation:
The length() method returns the number of characters present in the string.
Imagine that your parents were starting a small business, and they wanted to upgrade their data storage. Would you recommend a fileserver, network
attached storage, or the cloud?
Why?
What are some possible disadvantages of your recommendation that they should be aware of?
Answer:
I would recommend the cloud because they can access their data on every single device. There are virtually no disadvantages to the cloud.
Explanation:
Hope this helps.
what is the average gradient of the slope along the straight line CD
Answer:
is there a graph to go with this?
Explanation:
The average gradient of the slope along the straight-line CD is 0.05.
What is the average gradient?The gradient of the straight line that passes through any two points on a curve is the average gradient between any two points. This is the curve's average gradient between points A and C.
The gradient between lines C and D.
Here, the horizontal distance between points C and D is 2 miles.
Difference in elevation is = 1500 -1000 = 500 ft.
Hence, the gradient is = change in vertical elevation / horizontal distance= 500/2 = 250 ft./mile
or we can take both as the same unit in feet, 1 mile is = 5280 feet. So 2 miles is = 5280 x 2 = 10560 ft.
Gradient is = 500/10560 = .05
Therefore, the graph's slope along the straight CD line has an average gradient of 0.05.
To learn more about average gradient, refer to the link:
https://brainly.com/question/29531399
#SPJ2
The question is incomplete. Your most probably complete question is given below: the graph is added.
what was your first pokemon game
if you have not played one just comment don't answer
Answer:
FireRed & LeafGreen
Explanation:
A health care provider approaches Accenture to help them increase their efficiency through an advanced data science platform.What is the first step Accenture could take?
Accelerating output and hence, growth of an enterprise is one of the core functions of Accenture. Hence, the first step to be taken by Accenture is to design an Enterprise analytic strategy assessment.
Data science leverages the power of collected data combined with simple and complex machine learning algorithm in other to draw pattern and trends from data. Since, the healthcare provider is a large enterprise, the first step that should be followed would be to design a strategy to the assess the data available to the organization or enterpriseHence, the first step is to develop an enterprise analytic strategy assessment.
Learn more : https://brainly.com/question/25602226
which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization
Answer:
Confidential Information
Explanation:
It is predicated on the idea that a person who receives information in confidence should not use or divulge that knowledge without permission. Unauthorized use or disclosure of confidential information may lead to a breach of trust suit.
Confidentiality clauses, often known as "NDA's", are intended to protect and consider important business information. Like as production processes, proprietary formulas, client lists, know-how, concepts, business strategies, and technical information.The unauthorized revelation of this type of material could reasonably be expected to harm our national security.Therefore, the final answer is "Confidential Information".
Learn more about types of information:
brainly.com/question/13079191
Source ________ contains instructions written by a programmer specifying the actions to be performed by computer software.
Source code contains instructions written by a programmer specifying the actions to be performed by computer softwa
Which of the following developed technologies has NOT greatly increased the speed of information dissemination? A. Smartphones B. E-mail C. Typewriter D. Teleconferencing.
Answer:Email
Explanation:
Answer:
The answer would be C
Explanation:
What are five don’ts of using a computer
Answer:
Do not eat or drink near technology
Do not open unexpected or unknown email attachments
Do not install unknown programs
Do not forget about updating apps
Do not force anything closed
Do not get it dirty or wet
Do not wash your computer
Do not punch your computer
Which objects appear on the slide after she clicks ok? Check all that apply.
Answer:
A table with sample values
A chart with sample values
Explanation:
Answer:
I don’t know I just need points
Explanation:
what is thisssssssss please answer
Answer:
first of all, are you a snake? And also that is a spotlight.
Explanation:
the envelope method, notebook and pencil, and online software are all methods of ______.
Answer:
tracking your spending.
The envelope method, notebook and pencil, and online software are all methods of tracking your spending as per the given situation. The correct option is C.
What is software?A set of instructions, data, or programs used to operate computers and carry out specific tasks is referred to as software. It is the inverse of hardware, which describes the physical characteristics of a computer.
Inner needs to track spending in personal and business activities in order to know financial status and budget effectively with available funds.
Without tracking spending, there is a risk of waste and overspending on unimportant items.
The envelop method entails putting money in different envelops for each category of spending. At the end of the period, you can check the envelops to see how much money was spent in each category.
Keeping track of expenses requires a notebook and a pencil.
QuickBooks online software can be used to track how much an individual or business has spent.
Thus, the correct option is C.
For more details regarding tracking the spend, visit:
https://brainly.com/question/14511380
#SPJ5
Your question seems incomplete, the missing options are:
estimating your unexpected expensesplanning for your futuretracking your spendingunderstanding your current expenseswhat is a drone satellite?
Answer:
A satellite that can be controlled where to go.
Explanation:
who has played pokemon red, blue, or yellow on the gameboy
Answer:
I didn't think this would be an actual question... I did- :3
I have, it gets harder near the end
John is given a laptop for official use and is on a business trip. When he arrives at his hotel, he turns on his laptop and finds a wireless accesspoint with the name of the hotel, which he connects to for sending official communications. He may become a victim of which wireless threat
Answer:
Evil Twins Attack
Explanation:
When John connects to the wireless access point with the name of the hotel, it could be a fake SSID created by a hacker. When John connects to this "evil twin" the hacker can start to steal data.
NEED HELP ASAP!!
Given that myGrade = 65, consider the conditional operator (myGrade<=65) ? myGrade+10: myGrade=myGrade+5. What is the value of myGrade after the conditional operator executes?
Answer:
75 is the answer and marke me as brainleast
From a data modeling point of view, _____ data refer to data whose values change over time and for which one must keep a history of the data changes.
Answer:
From a data modeling point of view, time-variant data refer to data whose values change over time and for which one must keep a history of the data changes.
In the design phase of the systems development life cycle (SDLC), the _____ design indicates hardware and software, such as specifying Linux servers and Windows clients. Select one:
Answer:
logical
Explanation:
People who connect one network to another within the company or even across organizations are A. central connectors. B. boundary spanners. C. external specialists. D. peripheral specialists.
People who connect one network to another within the company or even across organizations are boundary spanners.
People who serve as ambassadors to linking information and communications on informal networks within different department in an organisation and with other organisations or personnel far and near for the good of their organisation are called Boundary Spanners.
The importance of Boundary spanning in organisation includes
Exchange of expertise informationNurturing of connections with people from different part s of the world.Improved innovation in businessesSee more here: https://brainly.com/question/14728967
What are software applications?
lines of code that were written by developers
devices that you insert into the computer
files that are stored on the computer
Answer:
the person above is correct if i were you id take notes!
Explanation:
Answer:
Only A (Top answer)
Explanation:
Files do not create any software alltogether and devices pluged in are not considered software.
what are the 4 types of satellite?
Your customer said that understanding the directions is difficult. This is an aspect of
Answer:
Usability
Explanation:
The degree to which a program meets the needs of a user, including but not limited to learnability, reliability, and ease of use
more Or less?
Pick one and be rewarded!!!!!!!
Answer:
More
Explanation:
hope this is helpful
Rajesh is considering whether to use a web app to collaborate with a group of friends on a project. What is one reason he should avoid using a web app for the project
Rajesh might want to avoid the use of a web app for the project due to connectivity issues. Hence, one reason he might want to avoid using the Webb app is slow or poor internet connection.
Collaborating on a web application relies very heavily on network connectivity which is the what establishes the link ms allows the apllications to achieve optimum performance.
Therefore, slow internet connection is a major reason whuhe might want to avoid using a web app.
Learn more : https://brainly.com/question/25531734
which of these is not enumerated as a motivation to create accessible web content?
Answer:
Which of what?
Explanation:
What is the difference between Label and value in excel?
Answer:
The main difference between the label and the value is that the label is what you see within the system itself (or also on the web form if the field can be used in such a feature). ... The value, on the other hand, is what systems read as the name of a field.
Hope it help and if it its correct please give brainliest
Stay Safe And Healthy
Thank You
URGENT We use HTML5 in lightweight web pages which load faster and put less strain on web servers.
A. True
B. False
Answer:
A. true i think?
Explanation:
im not sure but i hope it help
Which insert image option allows a user to insert images from the internet?
Answer:
d. Online Pictures
Explanation: is correct
Answer:
online pictures
Explanation:
pls explain the special keys on a keyboard and their functions ...eg shift key,control key
Tab- used to advance the cursor to the next tab stop.
Shift- allows you to type capital letters and the symbols at the top of the keys
Control- enabling other keys on the keyboard to perform secondary functions
Alt- used to change (alternate) the function of other pressed keys
CapsLock- causes all letters of bicameral scripts to be generated in capital letters.
Answer:
Multiple functions
Explanation:
If you'd like an answer to the purpose of the shift key and the control key, then I'll answer those two, specifically. Tell me if you'd like any more assistance afterwards! ( :
#1: Shift key: This key's basic function is this: when you hold down on it as well as a letter key (e.g. f ), then it will automatically make that letter uppercase.
For example, in this sentence I typed F while pressing the shift key as well:
Frederick looked out the window.
While in this one, I didn't.
frederick looked out the window.
My computer automatically tells me that the spelling of Frederick I used in the second sentence is wrong, since Frederick is proper - and is the beginning of a sentence.
#2: Control key: This key allows you to to do some pretty cool things, depending on which key you click it with.
For example, ctrl + j generates a document download page, while ctrl + d opens a bookmark page? option.
I hope this was very helpful, and let me know if you need any further assistance in the future! ( :