hi I legit hate coding idk y

Answers

Answer 1
Don’t worry dude I don’t either lol

Related Questions

14. The heart of a computer is
a CPU
b. Memory
c. I/O Unit
d. Disks

Answers

Answer:

CPU

I dont know a whole ton about computers. But I'm confident this is correct. Without the CPU the other options on this list wouldnt work so the CPU would be the "heart".

a table of contents does not _____ automatically [customize table of contents]

Answers

Answer:

update

Explanation:

a table of contents does not update itself automatically.

HELP ME OUT PLEASE!!!!!

Location, such as indoor versus outdoor, is an important consideration when taking photographs.

True False​

Answers

Answer:

I'd say true

Explanation:

Because you can't do all the different techniques and styles if you're indoor instead of outdoor or vice versa. There is also lighting to consider

Answer:

true

Explanation:

Have good day

The following equation estimates the average calories burned for a person when exercising, which is based on a scientific journal article (source): Calories = ( (Age x 0.2757) + (Weight x 0.03295) + (Heart Rate x 1.0781) — 75.4991 ) x Time / 8.368 Write a program using inputs age (years), weight (pounds), heart rate (beats per minute), and time (minutes), respectively. Output the average calories burned for a person. Output each floating-point value with two digits after the decimal point, which can be achieved as follows: print('Calories: {:.2f} calories'.format(calories))

Answers

A Python program that calculates the average calories burned based on the provided equation is given below.

Code:

def calculate_calories(age, weight, heart_rate, time):

   calories = ((age * 0.2757) + (weight * 0.03295) + (heart_rate * 1.0781) - 75.4991) * time / 8.368

   return calories

# Taking inputs from the user

age = float(input("Enter age in years: "))

weight = float(input("Enter weight in pounds: "))

heart_rate = float(input("Enter heart rate in beats per minute: "))

time = float(input("Enter time in minutes: "))

# Calculate and print the average calories burned

calories = calculate_calories(age, weight, heart_rate, time)

print('Calories: {:.2f} calories'.format(calories))

In this program, the calculate_calories function takes the inputs (age, weight, heart rate, and time) and applies the given formula to calculate the average calories burned.

The calculated calories are then returned from the function.

The program prompts the user to enter the required values (age, weight, heart rate, and time) using the input function.

The float function is used to convert the input values from strings to floating-point numbers.

Finally, the program calls the calculate_calories function with the provided inputs and prints the calculated average calories burned using the print function.

The '{:.2f}'.format(calories) syntax is used to format the floating-point value with two digits after the decimal point.

For more questions on Python program

https://brainly.com/question/26497128

#SPJ8

Question 8 (3 points) Which of the following is an external factor that affects the price of a product? Choose the answer.
sales salaries
marketing strategy
competition
production cost​

Answers

Answer: tax

Explanation: could effect the cost of items because the tax makes the price higher

oh sorry i did not see the whole question

this is the wrong awnser

Answer is competition

System testing – During this stage, the software design is realized as a set of programs units. Unit testing involves verifying that each unit meets its specificatio

Answers

System testing is a crucial stage where the software design is implemented as a collection of program units.

What is Unit testing?

Unit testing plays a vital role during this phase as it focuses on validating each unit's compliance with its specifications. Unit testing entails testing individual units or components of the software to ensure their functionality, reliability, and correctness.

It involves executing test cases, evaluating inputs and outputs, and verifying if the units perform as expected. By conducting unit testing, developers can identify and rectify any defects or issues within individual units before integrating them into the larger system, promoting overall software quality.

Read more about System testing here:

https://brainly.com/question/29511803

#SPJ1

Given two complex numbers, find the sum of the complex numbers using operator overloading. Write an operator overloading function ProblemSolution operator + (ProblemSolution const &P) which adds two ProblemSolution objects and returns a new ProblemSolution object.

Answers

Answer:

Following are the program to this question:

#include<iostream>

using namespace std;

class Complex_number // defining a class Complex_number

{

private:      

int r1, i1; //defining private integer variable

public:    

Complex_number(int r= 0, int i =0) //defining parameterized constructor     {  

    r1 = r;  //holding value  

    i1 = i;  //holding value

 }  

   // using + operator overloading function

Complex_number operator + (Complex_number const &obc) //uing Complex_number class to add values  

 {      

   Complex_number total;//defining class variable

        total.r1 = r1 + obc.r1; //add real values  

       total.i1 = i1 + obc.i1; //add imagnary values  

      return total;//return total

}

void show() //defining method show  

{    

cout << r1 << " + i" << i1 << endl;//print value

}

};

 int main()//defining main method

{

  int real, imaginary; //defining integer variable  

 cout << "Enter the real number \n"; //print message  

cin >> real; //input real value  

cout << "Enter the imaginary number\n"; //print message    

cin >> imaginary;//input imaginary value  

  Complex_number ox(real, imaginary); // creating Complex_number object ox that accepts parameter to call constructor  

  cout << "Enter the real number\n";//print message    

cin >> real;//input real value  

cout << "Enter the imaginary number\n";//print message

  cin >> imaginary;//input imaginary value    

Complex_number oxa(real, imaginary);// creating Complex_number object oxa that accepts parameter to call constructor    

Complex_number oxb = ox + oxa; // creating another object of Complex_number that adds first and second input value     oxb.show();//calling show method

}

Output:

Enter the real number  1

Enter the imaginary number

1

Enter the real number

2

Enter the imaginary number

2

3 + i3  

Explanation:

for explanation please find attachment.

Given two complex numbers, find the sum of the complex numbers using operator overloading. Write an operator

Which attribute would allow you to style two or more versions of the same element? ​

Which attribute would allow you to style two or more versions of the same element?

Answers

Answer:

The answer is "class".

Explanation:

The class attribute specifies for a particular element one or even more class names. The class attribute is being used often in a style sheet to indicate its class. It's indeed possible, nevertheless, it implements adjustments to Html pages in the particular category by either JavaScript. The class attribute enables to design of the very same component with several or more versions, and the wrong choice can be defined as follows:

The img tag is used to add an image to the Html page, that's why it is wrong. The src is used to add an image to the Html page, that's why it is wrong.The p tag is used to add txt in the Html page, that's why it is wrong.

Does putting a glue stick on your touchpad make it stop working pls help

Answers

no, just peel it off it’ll be fine

in the situation above, what ict trend andy used to connect with his friends and relatives​

Answers

The ICT trend that Andy can use to connect with his friends and relatives​ such that they can maintain face-to-face communication is video Conferencing.

What are ICT trends?

ICT trends refer to those innovations that allow us to communicate and interact with people on a wide scale. There are different situations that would require a person to use ICT trends for interactions.

If Andy has family and friends abroad and wants to keep in touch with them, video conferencing would give him the desired effect.

Learn more about ICT trends here:

https://brainly.com/question/13724249

#SPJ1

As you know computer system stores all types of data as stream of binary digits (0 and 1). This also includes the numbers having fractional values, where placement of radix point is also incorporated along with the binary representation of the value. There are different approaches available in the literature to store the numbers having fractional part. One such method, called Floating-point notation is discussed in your week 03 lessons. The floating point representation need to incorporate three things:
• Sign
• Mantissa
• Exponent

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-
point notation.
B. Determine the smallest (lowest) negative value which can be
incorporated/represented using the 8-bit floating point notation.
C. Determine the largest (highest) positive value which can be
incorporated/represented using the 8- bit floating point notation.

Answers

Answer:

A. Encode the (negative) decimal fraction -9/2 to binary using the 8-bit floating-point notation.

First, let's convert -9/2 to a decimal number: -9/2 = -4.5

Now, let's encode -4.5 using the 8-bit floating-point notation. We'll use the following format for 8-bit floating-point representation:

1 bit for the sign (S), 3 bits for the exponent (E), and 4 bits for the mantissa (M): SEEE MMMM

Sign bit: Since the number is negative, the sign bit is 1: 1

Mantissa and exponent: Convert -4.5 into binary and normalize it:

-4.5 in binary is -100.1. Normalize it to get the mantissa and exponent: -1.001 * 2^2

Mantissa (M): 001 (ignoring the leading 1 and taking the next 4 bits)

Exponent (E): To store the exponent (2) in 3 bits with a bias of 3, add the bias to the exponent: 2 + 3 = 5. Now, convert 5 to binary: 101

Now, put the sign, exponent, and mantissa together: 1101 0010

So, the 8-bit floating-point representation of -9/2 (-4.5) is 1101 0010.

B. Determine the smallest (lowest) negative value which can be incorporated/represented using the 8-bit floating-point notation.

To get the smallest negative value, we'll set the sign bit to 1 (negative), use the smallest possible exponent (excluding subnormal numbers), and the smallest mantissa:

Sign bit: 1

Exponent: Smallest exponent is 001 (biased by 3, so the actual exponent is -2)

Mantissa: Smallest mantissa is 0000

The 8-bit representation is 1001 0000. Converting this to decimal:

-1 * 2^{-2} * 1.0000 which is -0.25.

The smallest (lowest) negative value that can be represented using the 8-bit floating-point notation is -0.25.

C. Determine the largest (highest) positive value which can be incorporated/represented using the 8-bit floating-point notation.

To get the largest positive value, we'll set the sign bit to 0 (positive), use the largest possible exponent (excluding infinity), and the largest mantissa:

Sign bit: 0

Exponent: Largest exponent is 110 (biased by 3, so the actual exponent is 3)

Mantissa: Largest mantissa is 1111

The 8-bit representation is 0110 1111. Converting this to decimal:

1 * 2^3 * 1.1111 which is approximately 1 * 8 * 1.9375 = 15.5.

The largest (highest) positive value that can be represented using the 8-bit floating-point notation is 15.5.

Explanation:

What happens when QuickBooks Online doesn't find a rule that applies to a transaction?

Answers

QuickBooks employs the Uncategorized Income, Uncategorized Expense, or Uncategorized Asset accounts to hold transactions that it is unable to categorize. These accounts cannot be used to establish bank policies.

What is QuickBooks Online?

A cloud-based financial management tool is QuickBooks Online. By assisting you with things like: Creating quotes and invoices, it is intended to reduce the amount of time you spend handling your company's money. monitoring the cash flow and sales.

While QuickBooks Online is a cloud-based accounting program you access online, QuickBooks Desktop is more conventional accounting software that you download and install on your computer.

QuickBooks is an accounting program created by Intuit whose products offer desktop, internet, and cloud-based accounting programs that can process invoices and business payments. The majority of QuickBooks' customers are medium-sized and small enterprises.

Thus, QuickBooks employs the Uncategorized Income.

For more information about QuickBooks Online, click here:

https://brainly.com/question/20734390

#SPJ1

What can toxic substances do to your body?
Select all that apply.

Answers

Answer:

burn you, affect your whole body

Explanation:

hope this helps :) !!!

Your company has been assigned the 194.10.0.0/24 network for use at one of its sites. You need to calculate a subnet mask that will accommodate 60 hosts per subnet while maximizing the number of available subnets. What subnet mask will you use in CIDR notation?

Answers

To accommodate 60 hosts per subnet while maximizing the number of available subnets, we need to use a subnet mask that provides enough host bits and subnet bits.

How to calculate

To calculate the subnet mask, we determine the number of host bits required to accommodate 60 hosts: 2^6 = 64. Therefore, we need 6 host bits.

Subsequently, we determine the optimal quantity of subnet bits needed to increase the quantity of accessible subnets: the formula 2^n >= the amount of subnets is used. To account for multiple subnets, the value of n is set to 2, resulting in a total of 4 subnets.

Therefore, we need 2 subnet bits.

Combining the host bits (6) and subnet bits (2), we get a subnet mask of /28 in CIDR notation.

Read more about subnet mask here:

https://brainly.com/question/28390252

#SPJ1

Write a program in JavaScript to display all the Odd number from 1 to 1.​

Answers

Answer:

for (let i = 1; i <= 10; i++) {

 if (i % 2 !== 0) {

   console.log(i);

 }

}

Explanation:

This program uses a for loop to iterate over the numbers from 1 to 10. The if statement checks if the current number is odd by using the modulo operator % to check if the remainder of dividing by 2 is not equal to 0. If the number is odd, it is printed to the console using the console.log function.

You can adjust the program to display odd numbers up to a different limit by changing the upper limit of the for loop. For example, to display odd numbers up to 20, you could change the loop to:

for (let i = 1; i <= 20; i++) {

 if (i % 2 !== 0) {

   console.log(i);

 }

}

which of the following is the most appropriate way to write css style for the font family property in html

Answers

Answer:

The answer is c your welcome

How will you respond to a basher criticizing that 2,500 sample size for a survey conducted by SWS?
(Basher is telling you, 2,500 is too small compared to 67 million, hence the result is biased)

Answers

The best way to respond to a basher saying that the sample size is too small is to tell them that 2,500 is a good sample size for the population according to established norms of sample proportions.

What are recommended norms of sample proportion?

When a population is less than 10,000 then a good sample size can be 10% but if the population is above 10,000 then a sample limit of 1,000 is fine.

This is because increasing the sample will not necessarily change the accuracy if the same sampling method is used.

Seeing as the population here is 67 million which is more than 10,000, a sample of 2,500 people is more than enough.

Find out more on sampling methods at https://brainly.com/question/16587013.

Use the drop-down menus to complete statements about how to use the database documenter

options for 2: Home crate external data database tools

options for 3: reports analyze relationships documentation

options for 5: end finish ok run

Use the drop-down menus to complete statements about how to use the database documenteroptions for 2:

Answers

To use the database documenter, follow these steps -

2: Select "Database Tools" from   the dropdown menu.3: Choose "Analyze"   from the dropdown menu.5: Click on   "OK" to run the documenter and generate the desired reports and documentation.

How is this so?

This is the suggested sequence of steps to use the database documenter based on the given options.

By selecting "Database Tools" (2), choosing "Analyze" (3), and clicking on "OK" (5), you can initiate the documenter and generate the desired reports and documentation. Following these steps will help you utilize the database documenter effectively and efficiently.

Learn more about database documenter at:

https://brainly.com/question/31450253

#SPJ1

Question: 9
What should be the primary focus of keeping information secure?
O
O
O
O
Educating users on the dangers of phishing
attempts
Encrypting all personal data
Ensuring the confidentiality, integrity, and
availability of data
Implementing a strong password policy
Question: 10

Question: 9What should be the primary focus of keeping information secure?OOOOEducating users on the

Answers

The primary focus of keeping information secure should be ensuring the confidentiality, integrity, and availability of data.  Hence option C is correct.

What is information security about?

This involves implementing various security measures such as encryption, access control, backup and disaster recovery, and following industry standards and regulations to protect sensitive information from unauthorized access, alteration, or loss.

Therefore,  Educating users on the dangers of phishing attempts and implementing a strong password policy are also important steps in ensuring information security.

Learn more about information security from

https://brainly.com/question/25226643

#SPJ1

Which 802.11 standard works best in this situation?

Answers

You are helping a client create a wireless network. The network must be able to handle at least 54Mbps of data rate for your client. The ideal standards to use in this case are 802.11n and 802.11a.

Which 802.11 protocol functions the best in this circumstance?

For this client, 802.11n is the best option. The client's wireless phone system will experience interference from 802.11b and 802.11g because they both operate in the 2.4 to 2.4835 GHz band.

What purposes serve 802.11 standards?

The collection of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer communication are specified in IEEE 802.11, a standard that is a component of the IEEE 802 series of LAN technical standards.

To know more about wireless network visit :-

https://brainly.com/question/28141205

#SPJ1

Which type of photographer documents plants and weather in their natural habitat?

a
Portrait

b
Nature

c
Product

d
Scientific

Answers

B, plants and weather are part pf nature.

Describe what the 4th I.R. Means; and List the 4 most Important Variables of the How the 4th I.R. will change the lives of how we would Live and Work?

Answers

Answer:

The Fourth Industrial Revolution (4IR) is the ongoing transformation of the traditional manufacturing and industrial sectors through the integration of advanced technologies such as artificial intelligence, the Internet of Things (IoT), robotics, big data, and automation.

The four most important variables that will change the way we live and work in the 4IR are:

Automation: The increased use of robotics and automation will revolutionize the manufacturing industry and lead to more efficient and cost-effective production processes. This could lead to significant job displacement, but it could also create new opportunities for workers with new skills.

Big Data: The collection and analysis of massive amounts of data will allow businesses to gain new insights into customer behavior, supply chain efficiency, and product performance. This could lead to more personalized and efficient services, but also raise concerns around privacy and data security.

Artificial Intelligence: The use of advanced algorithms and machine learning will enable machines to perform complex tasks previously thought to require human intelligence. This could lead to more efficient and effective decision-making, but also raise concerns around the impact on jobs and the ethical implications of AI decision-making.

Internet of Things: The proliferation of connected devices will enable the automation and integration of various systems and processes, leading to more efficient and effective resource utilization. This could lead to significant improvements in healthcare, transportation, and energy management, but also raise concerns around privacy and security risks.

Overall, the 4IR is expected to bring significant changes to our economy, society, and daily lives, with both opportunities and challenges that we will need to navigate as we move forward.

Which of the following answers is incorrect regarding the Naive Bayes algorithm?

Select the best answer (as an incorrect claim)

Select one:

A.
The algorithm uses the conditional probability of the feature given by the class.

B.
The features can be discrete, but can also be continuous.

C.
Because we want to prevent underflow, we calculate a sum of logs of the probabilities instead of their multiplication .


D.
We prefer features with high dependency to get better prediction.

Answers

Answer:

B. The features can be discrete, but can also be continuous.

Explanation:

Each continuous attribute can be discretized and the continuous attribute value replaced with the matching discrete interval.

The different languages that follow specific RULES. These languages use commands
and logic statements to make the computer accomplish its intended purpose.

A.Software

B.Programs

C.Syntax

D.Binary

Answers

Answer:

C. Syntax.

Explanation:

I got it correct after a fews try's on the test.

Is it possible to beat the final level of Halo Reach?

Answers

It is impossible to beat this level no matter how skilled the player is.

What is lossy compression

A. It is a technique that results in the loss of all files on a computer.

B. It is a technique that reduces the file size by permanently removing some data

C. It is a method of combining the memories of the ram and the rom

D. It is a method that stores data dynamically requiring more power

Answers

Answer:

B. It is a technique that reduces the file size by permanently removing some data

Answer:

B. It is a technique that reduces the file size by permanently removing some data

Explanation:

website is a collection of (a)audio files(b) image files (c) video files (d)HTML files​

Answers

Website is a collection of (b) image files (c) video files and  (d)HTML files​

What is website

Many websites feature a variety of pictures to improve aesthetic appeal and provide visual substance. The formats available for these image files may include JPEG, PNG, GIF, or SVG.

To enhance user engagement, websites can also introduce video content in their files. Web pages have the capability to display video files either by embedding them or by providing links, thereby enabling viewers to watch videos without leaving the site. Various formats such as MP4, AVI and WebM can be utilized for video files.

Learn more about  website  from

https://brainly.com/question/28431103

#SPJ1

Which of the following is considered a basic task in the context of computer operations? a. Connecting to the Internet b. Natural language processing c. Word processing d. Logical operations

Answers

Answer:

The answer is "Option d".

Explanation:

The performing function into the computer is made up of three basic functions, that are: logical, arithmetical, and memory processes, in which the logical process or function is a particular symbol or expression, that links two or more knowledge sentences, and the incorrect choices can be explained  as follows:

In Option a, It is wrong because it can't provide the basic tasks.In Option b, It an algorithm, that's why it is incorrect.In Option c, It is a software, which is used to provide editing on text, that's why it is incorrect.

A task which is considered as a basic task in the context of computer operations is: D. Logical operations.

What is a computer?

A computer can be defined as an electronic device that is designed and developed to receive data in its raw form as an input and processes these data into an output (information) that could be used by an end user.

In Computer technology, the basic task in the context of computer operations are broadly classified into three (3) categories and these include the following:

Arithmetical operations.Memory processes.Logical operations.

Read more on computer here: brainly.com/question/959479

full meaning of XP in computer​

Answers

Answer → eXPerience

a triangular number is a number that is the sum of the integers from 1 to some integer n. thus 1 is a triangular number because it is the sum of the integers from 1 to 1; 6 is a triangular number because 1 + 2 + 3 = 6.given the non-negative integer n, create a list of the first n triangular numbers. thus if n was 5, the list would be: {1, 3, 6, 10, 15}.assign the list to variable traingulars

Answers

Answer:

def triangular_numbers(n):

triangulars = []

sum = 0

for i in range(1, n+1):

sum += i

triangulars.append(sum)

return triangulars

# Test the function

print(triangular_numbers(5)) # Output: [1, 3, 6, 10, 15]

Explanation:

To create a list of the first n triangular numbers, you can use a for loop to iterate from 1 to n, and for each iteration, add the current number to the sum of the previous numbers.

This function will create a list of the first n triangular numbers and return it. You can then assign the returned list to the variable triangulars.

Other Questions
Use the Laplace transform to solve the given initial-value problem. y'' + y = (t 6) + (t 8), y(0) = 1, y'(0) = 0 true or false: the strategic profit model (spm) shows how income and balance sheet data are interrelated. Which of the following should not appear in a thesis statement for a problem and solution essay? A possible solution or solutions Specific research and facts from sources The problem Who or what is affectedHurry up btw-Ill give a hundred and the brainy thing if yall get it right ig Which of the following packages let you manage the execution stack (choose all that apply)? what type of device does susan b anthony employ in her speech when she asks ''are woman persons'' Ways by which nitrogen is lost What area in the US would be similar to the Fertile Crescent? Explain your answer. I NEED IT AS FAST AS POSSIBLE ITS DUE IN 2 HOURS thank you!! Which of the following is a scientific question you could ask about shoes?A. Are modern sandals similar to sandals from the 1960s?B. What shoes will be popular next summer?C. What is my favorite shoe color?D. Are there any running shoes that help people run faster? Persons who have been given access to an installation can be counted on to be of no threat. Which number is irrational? Is the word in bold letters an adjective, predicate adjective, or adverb?The overworked machinist was very tired this morning. Please help me I really don't know how to do this so please. (BUT it might be easy for u) Consider that you performed ABC inventory analysis for the logistics company you work for. Your boss asks you come up with inventory policies for the A items, B items, and C items.a) Which inventory policy would you use for A items? Fixed order quantity or fixed order interval? Why? the recommended sites for taking a pulse are points located along the ________ arteries. what can we know about past After reading the paragraph below, choose the most appropriate topic sentence.John Milton was imprisoned for his support of the Commonwealth. He had difficultiessupporting his large family, and yet wrote a brilliant epic. In the same way, John Bunyan wasimprisoned, became impoverished, and yet was strengthened to write a great allegory.John Milton was poor, but wrote a great epic.John Bunyan was poor, but wrote a great allegory.The writers John Milton and John Bunyan had much in common.The writers John Milton and John Bunyan had very little in common. why doesn't my mom love me .M1. AJKME ALKM2.sSSSSS congruena Find the gradient of the line y=4x-7 Examine the graph of global human population growth from the pre-industrial stage to the post-industrial stage.Why did the population decrease in the post-industrial stage based on the graph?The birth rate dropped below the death rate.The birth rate increased.The death rate increased.Disease spread through the population.