If you want the words “My puppy is a poodle” to appear in the interpreter. What code should you use?
A.
create "My puppy is a poodle"
B.
execute ("My puppy is a poodle")
C.
print("My puppy is a poodle")
D.
print "My puppy is a poodle"
Answer: Probably C
(also, C and D say the same thing)
What does a loop statement do?
It causes a section of code to be repeated a certain number of times.
It causes a section of code to be executed one time only.
It causes a section of code to end.
It causes a section of code to be repeated infinitely.
Answer:
It causes a section of code to be repeated infinitely
Answer:
It causes a section of code to be repeated a certain number of times.
Explanation:
A choice function will choose a value at random from a float.
A.
True
B.
False
Digital and analog audio recordings have pros and cons. Do you think the pros of digital recordings outweigh the cons and therefore prefer digital audio recordings? Or, do you think the cons outweigh the pros and therefore you prefer analog audio recordings? Explain. ( USE C.E.R *Claim, Evidence, Reasoning* )
I think the pros of digital recordings outweigh the cons! I prefer digital audio recordings over analog audio recordings because analog recordings require more financing and preservation. Compared to digital recordings, analog recording equipment is more expensive and the tape deteriorates over time. Which to me personally, doesn't seem to be worth the amount of effort since it's such a process to go through. You can possibly go into debt due to that. Digital recording equipment, on the other hand, is more affordable. It's less time-consuming and although it does have its disadvantages, they're minor. Digital recordings can be stored online. Its data get corrupted? You can get it back! It won't cost you anything.
Explain how to create a constant variable. Give an example of creating a speed constant that does not include a decimal.
Answer:
You use the Const statement to declare a constant and set its value. By declaring a constant, you assign a meaningful name to a value. Once a constant is declared, it cannot be modified or assigned a new value. You declare a constant within a procedure or in the declarations section of a module, class, or structure.
Explanation:
https://docs.microsoft.com/en-us/dotnet/visual-basic/programming-guide/language-features/constants-enums/how-to-declare-a-constant
Have a bless day <3 lve yall
Answer:
https://docs.microsoft.com/en-us/dotnet/visual-basic/programming-guide/language-features/constants-enums/how-to-declare-a-constant
Here's a link for the answer
Explanation:
One student will be stationed near you in a coffee shop. The other student will be located two miles away from your school. You will need to communicate with one another as you coordinate this event. Pretend you have been given $650 to develop this hunt.
Research the costs of various mobile computing devices.
Write, in a report of at least 250 words, your mobile device purchase recommendations that will best suit the student communication needs of your assignment.
Upload a 250-word report about the geocache treasure hunt that includes the following:
In light of your budget, which device is the best buy for communicating with your fellow student in the coffee shop?
Which device is the best choice for communicating with your fellow student located at your school?
What trade-offs do you need to consider, such as the size of the device vs. features?
Answer:
A LG K92 5G titan Gray that also uses cricket wireless network
Explanation:
It cost 160 bucks plus tacks.
Describe the disadvantages, threats, or problems associated with using message boards.
Answer:
Text-based online discussion necessarily excludes some people
The lack of physical cues in online forums may lead to miscommunication
Busy online discussion forums may cause information overload
Participants may accidentally go off-topic within a particular discussion thread
Hope this helps!
i) State the two types of storage media.
ii) Give three important features of storage media.
iii) State two ways to protect storage media.
Please no links and false answers.
Your new apartment is too small for your stuff.
(A.) WHAT DO YOU WANT TO DO?
RENT A STORAGE UNIT ($45)
(B.) HAVE A YARD SALE
(C.) ASK A FRIEND TO STORE IT
ps my BALANCE is only $240
Answer:
B, it would be good to get rid of some stuff also your getting extra cash .
Vocabulary List
precipitate
descent
ascent
maneuver
contemplate
enveloped
nucleus
exertion
perilous
manifestly
perpendicular
predicament
.sjjejekeiwiwkkskskdidieiiei
4.5.4 Correct Portion is complicated can you help
Answer:
Explanation:
# Amount of food and number of people
tons_of_food = 0.07
num_people = 25
# Determine how much food each person gets
tons_of_food_per_person =round(tons_of_food)/ round(num_people)
print(tons_of_food_per_person)
# Ask the user how much food they took
tons_taken = float(input("How many tons of food did you take? "))
if round(tons_taken, 5) == round(tons_of_food_per_person, 5):
print ("Good job, you took the right amount of food!")
else:
print ("You took the wrong amount of food!")
Pls answer will give brainlest dont answer if you dont know
Upload your 300-word essay containing the following: the definition of methane an explanation of how it is produced a description of how methane can be used as an energy source an explanation of how farmers are using methane from farm animals as an energy source a specific example of an actual farm where this system is being used
Methane is often written as (CH4). It is known to be a part of the hydrocarbon family.
What is a methane known for?Methane is known to be a type of natural gas that is said to be odorless, and flammable in nature. It is used in the making of fuel.
Conclusively, it is known to be a a primary aspect of natural gas and it is also a greenhouse gas. Methane is said to be often emitted from a lot of of human-affected substance and natural sources.
Learn more about methane from
https://brainly.com/question/25649765
Which is a primary principle of the Rapid Application Development methodology?
One of the primary principles of the Rapid Application Development methodology is early prototyping of the [ BLANK, WRITE ANSWER HERE ] in the development cycle.
Which type of cyber crime offender requires the highest percentage of risk management in terms of computer monitoring?
A) Sex offenders
B) Identity thieves
C) Low-Risk offenders
D) hackers
Answer: D
Explanation: Hackers are the only type of cyber criminal that monitors your computer
Jaime has been hired as a consultant for a company. His task is to help the company spend less time and money writing code. Jaime notices that, even for very complicated programs, the programmers at this company start programming without an overall plan for the development of the code. What might Jaime suggest that they do instead?
A.
begin by writing the final lines of the program instead of the first lines
B.
program in C++ instead of in Python
C.
begin by creating a pseudocode
D.
spend more time debugging
Answer:
C
Explanation:
i had to answer this question on a test and ended up getting it right, hope this helps!! :D
What is the name given to the parts of a computer that you can actually
touch?
Software
Computer Parts
Computer Case
Hardware
Answer:
Hardware
Explanation:
Hardware, is the parts of the computer that you can physically touch. Examples include, the keyboard and mouse.
Hope this helps. <3
Hardware is the name given to the parts of a computer that you can actually touch.
What is Hardware?
The physical components of a computer, such as its chassis, CPU, RAM, monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers, and motherboard, are referred to as computer hardware.
Software, on the other hand, is a collection of instructions that may be stored and executed by hardware. Software is referred to as "soft" because it is flexible, but hardware is referred to as "hard" because it is rigid in terms of modifications.
Software often instructs hardware to carry out any command or instruction. A useful computer system is one that combines hardware and software, while there are also systems that use simply hardware.
Therefore, Hardware is the name given to the parts of a computer that you can actually touch.
To learn more about Hardware, refer to the link:
https://brainly.com/question/15232088
#SPJ5
Gn guys have an Amazing day!
Sleep well!
Also, Thank god everyday for waking u up!!
Have an amazing weekend after tmm lol!
<3 :) <3 <3
I have a crush what should I do!!
what???
just admit it
When the prompt function is used in JavaScript, _____ appears.
A.
an error message
B.
a pop-up box
C.
a data warning
D.
a password request
Answer:
B
Explanation:
instructs the browser to display a dialog with an optional message prompting the user to input some text, and to wait until the user either submits the text or cancels the dialog
How do you code things to make shapes out of them and add color
Answer:
go to KhanAcademy and search "Coloring with code" and it should be the first thing at the top
I need help with doing a debate for ela. The debate topic is "do you think we are to dependable on our laptops/cellphones. My teacher assigned me to the group that think we are not to dependent on our electronics when i dont even support that side sooo i need help coming up with topics that help support the side that im on. ( that probably did not make any sense)
Answer:
I think we are so this is hard lol
Explanation:
we are not too dependable
things that show this is library are still open, school sports teams still flourish(if we were too depending on them they wouldnt) they help us plan ways to interact in person if we were too dependent businesses would struggle more and only be online
this is hard if I can think of any others I'll come back I'm sorry if this isn't any help
Create pseudocode to compute the volume of a sphere. Use the formula: V= (4/3)* π r3 where π is equal to 3.1416 approximately, where r is the radius. Display the result.
HELP PLZ
Answer:
In geometry, the area enclosed by a circle of radius r is πr2. Here the Greek letter π represents a constant, approximately equal to 3.14159, which is equal to the ratio of the circumference of any circle to its diameter.
Explanation:
Pseudocodes are simply false codes that are used as program prototype or models
The pseudocodeThe pseudocodes to compute the sphere volume is as follows:
StartInput rCalculate Volume, V = (4/3) * 3.1416 * r^3Display Volume VStopRead more about pseudocode at:
https://brainly.com/question/24953880
#SPJ9
Guys I really need help,
- how do I change my age on a webtoon account -
I'm 13 but I still have a children's privacy policy.
I put in 100 points, pleasssssseeee help, me!!!!!!!!!!!!!!
Answer:
You may have to make a new account. Im not actually sure if you can change your age. It might help if you ask on the websites help centre.
Answer:
you might have to get a new account or delete it and get it again
Explanation:
REAL ANSWERS ONLY!!! BRAINLLIEST AND 50 POINTS FOR BEST ANSWER
(I made this up teehee) what anime is katski bakugo from
explain the history of computing of mechanical era
Answer:The Mechanical Era
Created a machine that could add and subtract numbers. Dials were used to enter the numbers. ... Designed a machine called the Analytical Engine. The design had all the basic components of a modern day computer. In addition, it was designed to be programmable using punched cards.
Explanation:Hope this helped
Walt needs to ensure that messages from a colleague in another organization are never incorrectly identified as spam. What should he do?
A.Configure a safe recipient.
B.Configure a blocked sender.
C.Configure a safe sender.
D.Do nothing.
Answer:
C. Configure a safe sender
Explanation:
It’s dabest thing to do
As per the given scenario, Walt should need to configure a safe sender. The correct option is C.
What is configuration?A system's configuration in communications or computer systems refers to how each of its functional elements is organised in relation to their nature, number, and distinguishing features.
Configuration frequently involves picking the right hardware, software, firmware, and documentation.
A person, group, or organisation that starts the communication is known as the sender. The success of the message stems primarily from this source.
The communication is influenced by the sender's experiences, attitudes, knowledge, competence, perspectives, and culture.
Walt must take care to prevent messages from a colleague in a different organisation from ever being mistakenly classified as spam. He ought to set up a secure sender.
Thus the correct option is C.
For more details regarding configuration, visit:
https://brainly.com/question/13410673
#SPJ2
What is the use of an NDP?
A). identifying pointers at the other end of a network
B). sending an error message if a packet gets lost due to a bad connection
C). finding other computers on the network
D). taking an IP address from a network layer and identifying the associated MAC address
Answer:
Taking an IP address from a network layer and identifying the associated MAC address
Explanation:
Option D
In a minimum of 250 words, discuss the technological problems that can occur when consumers emphasize on speed over security.
Explanation:
--> used brainly simplify :D
Consumers prioritizing speed over security can lead to several technological problems. This includes vulnerabilities and breaches where attackers can exploit weaknesses in software or systems. Malware and phishing attacks become more likely when security measures are overlooked. Weak or simplified authentication and authorization methods can make it easier for unauthorized users to gain access. Neglecting updates and patches leaves devices and systems vulnerable to known threats. Lastly, rushing through secure development practices may result in the inclusion of vulnerabilities in the software itself. To address these issues, consumers should use strong passwords, update their software regularly, and be cautious of suspicious links or emails. Service providers and developers should prioritize security by conducting thorough security assessments and promptly addressing vulnerabilities. Striking a balance between speed and security is crucial for a safe and efficient technological environment.
How do solar ovens track the sun as it moves during the day?
Answer:
A sort of solar thermal collector is a solar cooker. It "collects" and retains the thermal (heat) energy of the Sun. When high frequency light (visible and ultraviolet) is transformed into low frequency infrared radiation, heat is created.
Explanation:
Is a Megabit bigger than a Megabyte? If so, explain.
Answer:
No
Explanation:
Hello There!
Here is some basic information about megabits and megabytes
Megabytes: Generally used to measure the size of a game. For example when downloading a game on a console or a mobile device the size of the game will be measured in bytes (megabytes). Ex: The game "Among Us" has a size of 250 megabytes
Megabits: Generally used to measure the speed internet is. To be more specific the speed of the download in progress. So when downloading "Among Us" the speed at which its downloading at is measured in megabits
Having a general idea of each measure lets look back at the question
Is a megabit bigger than a megabyte.
The answer would be No
According to many sources 1 megabit is the equivalent of only an eighth of a megabyte. Therefore the answer would be no.