Answer:
Software is a collection of instructions and data that tell a computer how to work. This is in contrast to hardware, from which the system is built and actually performs the work.Explanation:
HOPE IT HELPAnswer:
software is the collection of programs which makes computer work.
An array stores data using multiple variable names.
True
False
Answer: False
Explanation:
It is false that an array stores data using multiple variable names, as it may not as, for starters, an Array cannot store multiple types of variable values. A container object that holds a fixed number of single-type values is known as an array.
What is an array?A data structure that stores a collection of elements of the same data type under a single variable name is known as an array.
The index number, which is an integer value that represents the element's position within the array, is used to access it.
In other words, an array stores multiple values of the same data type in contiguous memory locations using a single variable name.
For starters, we cannot store multiple types of variable values in an Array. An array is a container object that holds a fixed number of single-type values.
Thus, the given statement is false.
For more details regarding an array, visit:
https://brainly.com/question/19570024
#SPJ3
Evaluate the following information that shows the projected change in employment from 2014-2024: How can job seekers use the chart? Add data to a résumé and cover letter Gain awareness of how growth trends can impact career plans Research which careers match current skills Talk to community members in a knowledgeable manner You must check the box below prior to submitting your exam! Check this box to indicate you are ready to submit your exam Submit Exam FDK191.10
Answer:
Answer is B.
Gain awareness of how growth trends can impact career plans
Explanation:
9.6 code practice edhesive
Answer: i got 50% for this I don’t know what to fix
Explanation:
Answer:
def printIt(ar):
for row in range(len(ar)):
for col in range(len(ar[0])):
print(ar[row][col], end=" ")
print("")
N= []
for r in range(4):
N.append([])
for r in range(len(N)):
value = 1
for c in range(5):
N[r].append(value)
value = value +1
printIt(N)
print("")
newValue = 1
for r in range(len(N)):
for c in range(len(N[0])):
N[r][c] = newValue
newValue = newValue + 1
printIt(N)
Explanation: Ez clap
PLZZ HELP!!!
Select the correct text in the passage.
Dan is working with a team that is integrating an application with a database system. Which of these statements are true with regard to database systems?
1.The testing phase of the SDLC creates databases.
2.Selection of a DBMS occurs during the designing phase of the SDLC.
3.Database development also has a life cycle, with phases similar to those of the SDLC.
4.All compilers intrinsically support database creation.
5.Databases use query language to perform operations.
Answer:
I don't know
Explanation:
with data you can access all things in the world
HELPPPPPP How is does technology impact the career of your choice? Write 5-6 sentences about how technology impacts the career of your choice.
Answer:
Explanation:
Summary. Technology has had a dramatic impact on the nature of work itself, individual applicants and employees, employers, and career counselors. It has changed the nature of work and the types of jobs that people do today. It has altered the knowledge and skills individuals need to be effective workers.
to be useful for most household applications, DC voltage is?please
Answer: To be useful for most household applications, DC voltage is passed through a step-down transformer.
Explanation: Voltage coming through AC or DC outlets is typically far too high for most household appliances to handle, so the current is passed through a step-down transformer to reduce the voltage to a usable level.
The number of P/E cycles that a solid-state drive can support may vary, within what range?
o
1 to 100
1,000 to 100,000
10,000 to 10 million
10 billion to 10 trillion
Answer:
C. 10,000 To 10 Million
Explanation:
Got It Right On Edge
Answer:
the answer is C. 10,000 to 10 million
Explanation:
i took the test on edge
HELP PLZZZZZZZZ!!!!!!!!!!!
Type the correct answer in the box. Spell all words correctly.
Before a new email application could be released to the public, it was released for a few days to some account holders of a website. The project team then collected feedback from this limited number of users and later made the email application available for public use. What type of testing did the project team use?
The project team used_____________testing for the email application.
Answer:
Its either business format franchise or business brokers
The aim of this activity is to implement an algorithm that returns the union of elements in a collection. Although working with sets is quick and easy in Python, sometimes we might want to find the union between two lists. Create a function called unite_lists, which uses a loop to go through both lists and return common elements. Do not use the built-in set function.
Answer:
The function in Python is as follows:
def unite_lists(A, B):
union = []
for elem in A:
if elem in B:
union.append(elem)
return union
Explanation:
This defines the function
def unite_lists(A, B):
This initializes an empty list for the union list
union = []
This iterates through list A
for elem in A:
This checks if the item in list A is in list B
if elem in B:
If it is present, the item is appended to the union list
union.append(elem)
This returns the union of the two lists
return union
Justify any FOUR significant factors to remember when installing your motherboard
Answer:
The answer is below
Explanation:
When a computer system is being assembled by individuals or to provide a repair. There are factors to remember when installing your motherboard. Some of them include:
1. RAM (Random Acess Memory) support: Ensure the RAM of the PC supports the motherboard capacity.
2. Main Use of the PC: The motherboard to be installed on a PC should be based on the regular usage of the PC.
3. Compatibility with the operating system of the PC is essential. This will allow you to check if it will work well with PC without a glitch
4. Cost of the motherboard: it is advisable to go for a motherboard that can deliver value even if it is somehow expensive.
What information will you find in the 16-bit field in an IP datagram?
Answer: This 16-bit field defines the entire packet size in bytes, including header and data. The minimum size is 20 bytes (header without data) and the maximum is 65,535 bytes. All hosts are required to be able to reassemble datagrams of size up to 576 bytes, but most modern hosts handle much larger packets.
Explanation: Hopefully this helps you with what ever u are doing.
An information which you will find in the 16-bit field in an IP datagram is: the total length of the datagram it's attached to.
An IP address is an abbreviation of internet protocol address and it can be defined as a unique number assigned to a computer or other network devices such as routers, switches, etc., in order to differentiate each device from one another in an active network system. Thus, an IP address is typically used to uniquely identify each computer or network device connected to the internet or an interconnected network.
In Computer networking, IP address are classified into two (2) main categories and these are;
Local (internal) IP address.Global (external) IP address.An IP datagram can be defined as the standard format of data that an internet protocol (IP) recognizes.
Generally, an IP datagram comprises two (2) main components and these include:
1. The header: it is used for sending messages on a computer to the protocol in the same layer of a destination (recipient) computer.
2. The data: this is a set of information that is transmitted from one computer to another over an interconnected network.
On a related note, an IP datagram contain three (3) fields which are typically used for the transmission of data;
Header length.IP version.Total length.The Total length is a field that is used to specify the total length of an IP datagram and it is typically 16-bits in size.
In conclusion, an information which is found in the 16-bit field in an IP datagram is the total length of the datagram it's attached to.
Find more information here: https://brainly.com/question/19204809
Which option is used to determine whether information that should remain private is included in the final version of a PowerPoint presentation?
Compatibility Check
Grammar Checker
Document Inspector dialog box
Trust Center
Answer:
Im pretty sure you should put a document inspector dialog box
Answer:
Document Inspector dialog box
Explanation:
edge 2022
Edna needs a safer car to drive. She likes to travel a lot, so she is looking for a small SUV. She is trying to decide between buying a new or used car. After doing some research, she finds out that most cars lose value each year by a process known as depreciation. You may have heard before that a new car loses a large part of its value in the first 2 or 3 years and continues to lose its value, but more gradually, over time. That is because the car does not lose the same amount of value each year, but it loses approximately the same percentage of its value each year. What kind of model would be most useful for calculating the value of a car over time?
Answer: Buy a new car
Explanation: If its a used car its breaks will be worn out and more likely the breaks will stop working in 6 months and you have to change them. May the forse be with you.
5) Write a program to read text to end-of-file, and print a count of word lengths, i.e. the total number of words of length 1 which occurred, the number of length 2, and so on. Define a word to be a sequence of alphabetic characters. You should allow for word lengths up to 25 letters. A typical output should be like this: length 1 : 10 occurrences length 2 : 19 occurrences length 3 : 127 occurrences length 4 : 0 occurrences length 5 : 18 occurrences
Answer:
Explanation:
The following code is written in Python. It is a function that takes in the name of the file to be read and the size of the word. Then the function reads the file, removes whitespace and commas, splits the text into words, and scans the words for all the words that have the same length as the number passed. It counts all those words and prints out the number of occurrences of words of that length.
def countOccurrences(file_name, word_size):
f = open(file_name, 'r')
text = f.read()
text = text.replace(',', '')
split_text = text.split(' ')
occurrences = 0
for word in split_text:
if len(word) == word_size:
occurrences += 1
print("Length 1: " + str(occurrences) + " occurrences")
Can someone plz answer these questions plz
Answer:
ñbyte I'm pretty sure, sorry if u get it wrong you should do more research about the question if i get it wrong!!
A digital footprint is .
Your digital footprint is the trail of 'electronic breadcrumbs' you leave behind when you use the internet. It can include the websites you visit, the photos you upload and your interactions with other people on social networks.
Answer: is something you must manage
All of the following are problem-solving steps except:
A. taking action.
B. defining the problem.
c. doing the first solution that comes to mind.
D. creating possible solutions.
Answer:
C. Doing the first solution that comes to mind.
Explanation:
Lets break this down a bit.
A is a great problem solving step, so we can mark that off.
We can do the same for B.
However, for C, I am hesitant about this one, so I wont mark it off quite yet.
Finally, for D, it is definitely a step, so I can mark that off.
You should never do the first solution that comes to mind, since you haven't done enough brainstorming about other ideas.
Hope this helps!
"Wake up to reality! Nothing ever goes as planned in this world. The longer you live, the more you realize that in this reality only pain, suffering and futility exist.
Where is this quote from
Answer:
Naruto Shippuden and from madara uchiha
Explanation:
Answer:
Madara to Obito in Naruto Shippuden after Obito regains conscious from passing out under the rock from the third graet ninja war
Explanation:
PLZZZ HELP!!!
Select the correct answer.
A testing team has a new software application to test. While writing the test plan, the team enters some functions that are out of scope for the current phase of testing. In which section of the test plan will you find these functions?
A.
Introduction
B.
Features not to Test
C.
Deliverables
D.
Dependencies
Answer:
D the answer is D or c one of those 2
the process of preparing and setting up a software on a computer is called
Answer:
installation
Explanation:
Installation (or setup) of a computer program (including device drivers and plugins), is the act of making the program ready for execution.
Consider the following relation with functional dependencies as shown below.R{sno,sname,age,cno,cname,group}
R(A,B,C,D,E,F)
A-B,C
C-F
D-E
which normal form is the relation R is in?
Answer:
First Normal Form
Explanation:
The correct answer is - First Normal Form
Reason -
Given that,
A-B,C
C-F
D-E
Here the key is AD
The two partial Functional dependencies are -
A-B,C
D-E
So,
They are not in Second Normal Form, but they are in First Normal Form.
Is this correct? I say its B, but my friend says its D.
Click this link to view O*NET’s Work Contexts section for Librarians.
It describes the physical and social elements common to this work. Note that common contexts are listed toward the top, and less common contexts are listed toward the bottom. According to O*NET, what are common work contexts for Librarians? Check all that apply.
face-to-face discussions
pace determined by speed of equipment
cramped work space, awkward positions
indoors, environmentally controlled
telephone and electronic mail
freedom to make decisions
Answer:
1. b,d,f 2. a,b,c,f 3. b,c,e,f 4. a,c 5. a,b,c,e 6. a,b,c
7. d,e,f 8. a,b,e,f 9. a,c,d 10. b,d,f 11. c,e,f 12. a,c,e,f
Explanation:
all the answers to Finance Workplaces and Tasks Assignment 100%
Answer:
1, 4, 5, 6
Explanation:
the only options that are on the website
In python please!!! Write the definition of a function named countPos that reads integer values from standard input until there are none left and returns the number that are positive. The function must not use a loop of any kind.
Answer:Here is the method countPos
static int countPos(Scanner input){ //method that takes a reference to a Scanner object
int counter=0; // to count the positive integers
int number; //to store each integer value
if(input.hasNextInt()){ //checks if next token in this scanner input is an integer value
number=input.nextInt(); //nextInt() method of a Scanner object reads in a string of digits and converts them into an int type and stores it into number variable
counter=countPos(input); //calls method by passing the Scanner object and stores it in counter variable
if(number>0) //if the value is a positive number
counter++; } //adds 1 to the counter variable each time a positive input value is enountered
else { //if value is not a positive integer
return counter; } //returns the value of counter
return counter; } //returns the total count of the positive numbers
Explanation:
Here is the complete program:
import java.util.Scanner; //to take input from user
public class Main { //class name
//comments with each line of method below are given in Answer section
static int countPos(Scanner input){
int counter=0;
int number;
if(input.hasNextInt()){
number=input.nextInt();
counter=countPos(input);
if(number>0)
counter++; }
else {
return counter; }
return counter; }
public static void main(String[] args) { //start of main function
System.out.println("Number of positive integers: " + countPos(new Scanner(System.in))); } } //prints the number of positive integers by calling countPos method and passing Scanner object to it
The program uses hasNextInt method that returns the next token (next input value) and if condition checks using this method if the input value is an integer. nextInt() keeps scanning the next token of the input as an integer. If the input number is a positive number then the counter variable is incremented to 1 otherwise not. If the use enters anything other than an integer value then the program stops and returns the total number of positive integers input by the user. This technique is used in order to avoid using any loop. The program and its output is attached
Explanation:
Aspire is a test you take to prepare for the
A. PSAT
B. SAT
C. ACT
D. FAFSA
Answer:
ACT
Explanation:
"ACT Aspire is a powerful tool to help students and their parents monitor progress toward a successful ACT test from third grade through tenth grade. The Aspire test assess students' readiness in five areas covered by the ACT test: English, math, reading, science and writing." - https://greentestprep.com/resources/act-prep/act-aspire-test/
Aspire is a test you take to prepare for the ACT. Thus, option C is correct.
What is ACT?"ACT Aspire is a powerful tool to help students and their parents monitor progress toward a successful ACT test from third grade through tenth grade. The Aspire test assess students' readiness in five areas covered by the ACT test: English, math, reading, science and writing.Aspire is a test people take as a preparation for both ACT a d SAT.
Aspire is a valuable tool to help students and their parents monitor progress towards a good ACT exam from 3rd to 10th grade. The Aspire test assesses student performance in five areas covered by the ACT exam: English, math, reading, science and writing. Aspire Test is offered in the spring and fall seasons, the cost of the assessment tool depends on how many subjects you would like to measure and how often you want your student to be tested.
Learn more about Aspire Test on:
https://brainly.com/question/4469429
#SPJ7
PLZZZ HELP
Select the correct answer.
A company utilizes a specific design methodology in the software design process. They utilize concepts of encapsulation in design. Which design methodology would they be using?
A.
structured design
B.
modular design
C.
object-oriented design
D.
rapid application development
E.
use-case design
Answer:
C is object-oriented design
. What is piracy? ???????????????????
Answer: a practice similar to piracy but in other contexts, especially hijacking.
"air piracy"
the unauthorized use or reproduction of another's work.
Explanation:
who was the first inventor of computer
Answer:
Explanation:
English mathematician and inventor Charles Babbage is credited with having conceived the first automatic digital computer. During the mid-1830s Babbage developed plans for the Analytical Engine.
Answer:
Charles Babage is the first inventor of computer.
PLZZZ HELP
Select the correct answer.
Ed is the manager of a software design team. He needs to call a design review meeting. Who should he call for this meeting?
A.
only the stakeholders and external reviewer
B.
stakeholders and technical team
C.
the technical team and external reviewer
D.
only the technical team
E.
only the external reviewer and stakeholders
Answer:
C: the technical team and external reviewer
Explanation:
Plato/Edmentum
Create a program that: Provides access to a rolodex (list of names and contact information). Have the program accept a name to lookup and that prints the contact information of the matching name. Use an array for names and an array for email address and another array for phone numbers. Make sure that all three arrays contain corresponding information.
Answer:
Explanation:
The following code is written in Java, it asks the user for a name and looks that name up in the names array. If it finds it prints out all the values in that same index within every array to get the name, email, and phone number. If the name is not found it prints out that the client is not found.
//The code is attached in the text file below and picture shows the output of the working code.