QUESTION 48 Which loop statement does not contain an increment statement but automatically increments the counter at the end of each iteration?

Answers

Answer 1

The loop statement that does not contain an increment statement but automatically increments the counter at the end of each iteration is the "for" loop.

How does the "for" loop automatically increment the counter?

The "for" loop is a control flow statement in programming languages that allows for executing a block of code repeatedly based on a specified condition. It consists of three components: initialization, condition, and increment. However, the increment component is optional, and it is not necessary to include an explicit increment statement within the loop body.

In a typical "for" loop, the initialization sets an initial value for the loop counter, the condition specifies the termination condition, and the increment updates the loop counter after each iteration. However, if the increment is omitted, the loop still automatically increments the counter at the end of each iteration.

This behavior is inherent in the design of the "for" loop. After executing the loop body, the loop counter is automatically incremented, allowing the loop to proceed to the next iteration.

The absence of an explicit increment statement simplifies the loop syntax and is useful in cases where the loop counter needs to be incremented in a specific manner or in a different part of the loop body.In summary, the "for" loop automatically increments the counter at the end of each iteration, even if an explicit increment statement is not included.

Learn more about loop

brainly.com/question/28259508

#SPJ11


Related Questions

Apply the Fill - Teal, Accent 4, Soft Bevel text effect (the 5th

option in the 1st row) to all of the text in the lower-right text

box.

Answers

Answer:

TU

Explanation:

1.
The correct way to use a seat belt is

Answers

Answer:

4 steps

Explanation:

Step 1: Pull belt across body

Sit in any of your vehicle's seats and secure the three-point harness in its buckle by pulling it across your body.

If the seatbelt is too short, consider an aftermarket restraint and extender. Make sure they meet federal safety standards and are installed professionally.

Step 2: Adjust lower belt

Adjust the lower belt snuggly across your lap and pelvis area – never your stomach.

Pregnant women should wear the lap belt below their belly, not on or above it.

Step 3: Adjust shoulder belt

Adjust the shoulder belt to fit comfortably across the collarbone and chest. It should never rub on your neck or face. Never put the shoulder belt behind your back or under your arm.

Step 4: Check before driving

Check that the belt is secure before driving.

Answer: across your hips, and across your body over your collar bone

Explanation:

that’s how a seat belt should be worn

Which special network area is used to provide added protection by isolating publicly accessible servers?
A. Internet
B. Intranet
C. VLAN
D. DMZ

Answers

The special network area is used to provide added protection by isolating publicly accessible servers DMZ. The correct option is d.

What is DMZ?

In computer security, a DMZ or demilitarized zone is a physical or logical subnetwork that contains and exposes an organization's external-facing services to an untrusted, usually larger, network such as the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN): an external network node can access only what is exposed in the DMZ, while the rest of the organization's network is protected behind a firewall.

The DMZ functions as a small, isolated network positioned between the Internet and the private network.

Learn more about DMZ, here:

https://brainly.com/question/2920815

#SPJ1

A cheetah has a mass of 50kg and can accelerate at 10 m/s2. This is equal to 500 Newtons which is the force the cheetah creates to run. Let's calculate how much work the cheetah does and how much power it generates when it runs 50 meters in 3 seconds.

Step 1: Determine how much work is done (measured in joules).

Multiply the force by the distance 500N×50meters= _______ joules



Step 2: Determine the power (measured in Watts).

Divide the work by the time it took to do the work 25,000joules÷3s.= _______ watts

Answers

Answer:

often, work done= Force<<* distance

so work done=500N * 50m

work done=25000J

also, Power=work done/Time taken

Power=25000J/3sec

Power=8333.333.....

Adjust the code you wrote for the last problem to allow for sponsored Olympic events. Add an amount of prize money for Olympians who won an event as a sponsored athlete.

The

Get_Winnings(m, s)
function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Here's my answer for question 1 please adjust it thanks!

def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

Answers

Answer:def Get_Winnings(m):

if m == "1": return 75000

elif m == "2":

return 150000

elif m == "3":

return 225000

elif m == "4":

return 300000

elif m == "5":

return 375000

else:

return "Invalid"

MAIN

medals = input("Enter Gold Medals Won: ")

num = Get_Winnings(medals)

print("Your prize money is: " + str(num))

exp: looking through this this anwser seemes without flaws and i dont follow

if you can provide what you are not understanding ican an help

________ applications are software in which the vendor hosts the software online over the internet and you do not to install the software on your computer.

Answers

Answer:

Software as a Service

Explanation:

hope it helps

9.4 Code Practice: Your task is to determine whether each item in the array above is divisible

by 3 or not. If an item is divisible by 3, then leave that value as-is in the

array, but if it is not divisible by 3, then replace that value in the array with a

o. Remember that you will need to use modular division from Unit 2 to

determine if a value is divisible by 3. Finally, print out the array in the

format as seen in the sample run below.

(Can someone please help me?)

Answers

Answer:

Explanation:

The following Python code is a function that takes in an array as a parameter, it then loops through the array determining if the element is divisible by 3. If it is it leaves it alone, otherwise it changes it to a 0. Then ouputs the array. A test case is shown in the attached image below using a sample array.

def divisible_by_three(array):

   for x in array:

       if x % 3 == 0:

           pass

       else:

           array[array.index(x)] = 0

   return array

9.4 Code Practice: Your task is to determine whether each item in the array above is divisibleby 3 or

In this exercise we have to use the knowledge of computational language in python to describe the code, like this:

We can find the code in the attached image.

What is an array for?

After wondering what an array is, you might wonder what it's for. The main purpose is to store information in an orderly way, that is, for each line, one piece of information. An example of an array is when storing names of people present in a classroom.

The code can be written more simply as:

def divisible_by_three(array):

  for x in array:

      if x % 3 == 0:

          pass

      else:

          array[array.index(x)] = 0

  return array

See more about python at brainly.com/question/26104476

9.4 Code Practice: Your task is to determine whether each item in the array above is divisibleby 3 or

which of the following statements are true for an image formed by a plane mirror when the object is placed in front of the mirror? check all that apply. which of the following statements are true for an image formed by a plane mirror when the object is placed in front of the mirror?check all that apply. the image always appears to be located the same distance behind the mirror as the object is located in front of the mirror. the image formed by a plane mirror is always a real image. the image formed by a plane mirror is always an upright image. the image formed by a plane mirror is always a virtual image. the image is always larger than the object. the image formed by a plane mirror is always an inverted image.

Answers

The correct answer is the options:

a. the image always appears to be located the same distance behind the mirror as the object is located in front of the mirror.c. the image formed by a plane mirror is always a virtual image.

Images Formed by Plane Mirrors

The image always appears to be located the same distance behind the mirror as the object is located in front of the mirror because the light rays reflected by the mirror appear to originate from behind the mirror. This is because the angle between the incident light ray and the reflected light ray is the same as the angle between the reflected light ray and the mirror.

The image formed by a plane mirror is always a virtual image because the light rays reflected by the mirror do not actually converge. Instead, they appear to originate from behind the mirror.

Learn more about Mirrors at: https://brainly.com/question/2027981

#SPJ4

plz help im timed
An artist posted a picture of a painting on his website in order to sell it. Another business copied the picture and used it as a background on a website without giving credit to the artist. This action is most strongly related to which aspect of life?

culture

society

ethics

economy

Answers

Answer:

i believe C. Ethic

Explanation:

Ethics or moral philosophy is a branch of philosophy that "involves systematizing, defending, and recommending concepts of correct and wrong behavior". The field of ethics, along with aesthetics, concerns matters of value, and thus comprises the branch of philosophy called axiology.

A ___________is a rotary device intended to pull energy from a fluid and use it in a functional process.

Question 11 options:

turbine


machine


piston


thermal equilibrium

Answers

Answer: Turbine

Explanation:

I will say the answer to this question is Turbine. If I am wrong, I am sorry; it has been a long time since I learned this!

The following loop draws 3 circles on the screen. If I wanted to alter this loop to draw 10 circles, how many lines would my code be?





1 line


3 lines


10 lines


30 lines

Answers

Answer:

B). 3 lines

Explanation:

In order to modify the loop is drawn using three circles to make it drawn employing ten circles, the code must be comprised of three lines. The execution of line 1 includes 3 as the value of x while y remains undefined. Line 2 would employ the same value of x i.e. 3 and the introductory value of y(5 = 3 + 2) where x + 2 is being executed. In the third line, 10 circles can be drawn in total in the loop as {2(previous value) * 5 = 10}, y's updated value.

Answer:

3 lines is the answer

Explanation:

if the other person tries to compete when you want to collaborate, you should

Answers

Answer: You should not collaborate with that person.

Sorry if it’s wrong.

Answer:

By following ways:

Create a virtual enterprise.Look for niche strategic partnerships.Think big.Shake hands with the competition.Seek complementary partnerships.Consider a business merger.

Is brainly allowed because you don't Really learn from this..?

Answers

Explanation:

I don't know it's some time good and some times bad

Answer:

i bet ur like that one kid who tells the teacher that she forgot to collect the homework even tho u aint even do it

True or False

Explanation:

A square has a perimeter of 12y + 36 units. Write in terms of y represent the side length of the square​

Answers

The perimeter of a square is given by the formula P = 4s, where P is the perimeter and s is the side length of the square. In this case, the perimeter is given as 12y + 36 units.

So, we can equate the given perimeter to the formula for the perimeter of a square: 12y + 36 = 4s To find the side length (s) of the square in terms of y, we need to isolate s. Dividing both sides of the equation by 4, we get: (12y + 36) / 4 = s Simplifying the right side, we have: 3y + 9 = sTherefore, the side length of the square can be represented as 3y + 9 units.


learn more about perimeter here :

https://brainly.com/question/7486523

#SPJ11

anything you want to do in hootsuite can be found in the , with the main workspace in the ?

Answers

Everything on Hootsuite may be accessed in the Header or the Sidebar, with the primary workspace in the center. The sidebar has links to essential Hootsuite features such as Streams, Inbox, Planner, Analytics, and the App Directory.

What is a workspace?

Workspaces are groups of windows on your desktop. You may set up numerous workspaces, which function similarly to virtual desktops.

Workspaces are intended to decrease clutter and make the desktop more navigable. Workspaces can help you arrange your tasks.

Learn more about Hootsuite:
https://brainly.com/question/19721837
#SPJ1

team_id INT NOT NULL AUTO_INCREMENT,

team_name VARCHAR(50),

team_rank INT NOT NULL DEFAULT 0

Refer to code example 5-1.) What are the values of the team_id, team_name, and team_rank columns after the following statement is executed, assuming that the Teams table has one row in it with a team_id of 1?

Answers

After executing the given statement, the values in the columns would be as follows: team_id = 2, team_name = NULL, team_rank = 0.

The statement mentioned does not provide any explicit values for the columns team_name and team_rank. Therefore, the default values will be assigned. For the team_id column, the AUTO_INCREMENT attribute is set, which means it will automatically generate a new unique value for each new row inserted.

Since the Teams table already has one row with a team_id of 1, executing the statement will insert a new row. The team_id column, being AUTO_INCREMENT, will generate the next unique value, which is 2. So, team_id will be 2 for the new row.

As for team_name, no value is provided in the statement, so it will be set to NULL by default.

Similarly, team_rank column does not have a value specified in the statement, and it has a DEFAULT constraint set to 0. Hence, the team_rank will be assigned the default value of 0.

In conclusion, after executing the statement, the values in the columns will be: team_id = 2, team_name = NULL, and team_rank = 0.

learn more about statement here:

https://brainly.com/question/17238106

#SPJ11

44. What are the different types of one-time passwords and how do they work?

Answers

One-time passwords (OTPs) are a form of authentication that is used for a single session or transaction, and cannot be reused for subsequent logins or transactions.

There are several different types of OTPs, including:

1. Time-based One-time Passwords (TOTP): TOTP uses a time-based algorithm to generate a unique, temporary password that changes every 30 seconds. The algorithm is based on a secret key that is shared between the user and the service provider, and a counter that increments every 30 seconds. The password is generated by hashing the secret key and the counter together, and then truncating the result to a fixed length.

2. Event-based One-time Passwords (HOTP): HOTP is similar to TOTP, but instead of using a time-based algorithm, it uses an event-based algorithm. This means that the password is only generated when a specific event occurs, such as a user attempting to log in. The password is generated by hashing the secret key and the event counter together.

3. Challenge-Response One-time Passwords: In this method, the server sends a challenge to the user, and the user responds with a one-time password that is generated using a secret key and the challenge.

4. SMS One-time Passwords: In this method, the service provider sends a one-time password to the user's mobile phone via SMS. The user then enters the password into the service provider's website or application to complete the authentication process.

5. Hardware One-time Passwords: In this method, the user carries a hardware device that generates one-time passwords. The device may use a time-based or event-based algorithm to generate the password.

Learn more about authentication here:https://brainly.com/question/31525598

#SPJ11

in a multipoint circuit configuration, each computer has a dedicated circuit between itself and each of the other computers in the network. group of answer choices true false

Answers

In a multipoint circuit configuration, each computer has a dedicated circuit between itself and each of the other computers in the network it is false.

In a multipoint circuit configuration, multiple  computer can use the circuit at the same time. An intercom is an example of half-duplex transmission. The amount of time intercom takes to switch between sending and receiving a message  in half-duplex transmission is called the propagation delay.

Multipoint circuits are designed for data transmission so that they can link up to 12 outstations to a single central station at a point of time . They are typically used to link computer sites. Circuits comprise of main links, local ends and branching points.

The advantages of a multipoint connection over a point-to-point connection is that they are easy  for  installation ,had a low cost, and  are reliable. A point to point connection are usually used for connecting 2 devices, whereas in a multipoint connection are used to connect more than 2 devices share the communication link.

Learn more about circuit  here:-

brainly.com/question/12608491

#SPJ4

you are using two tables in your query: customers and orders. you want to view all of the orders each customer has placed. you must include the customer id field to display your information correctly. from which source should the customer id field be added to your query?

Answers

The customer id field is necessary to link the customer to their orders, so it should be added from the customers table.

The customer id field should be added from the customers table.

The customer id field is necessary to properly link each order to the corresponding customer. Without this field, it would be impossible to accurately determine which orders belong to which customer. To ensure the accuracy of the query results, the customer id field should be added from the customers table. This allows the query to use the customer id to properly connect each order to the customer who placed it.

Learn more about customer id field: https://brainly.com/question/30265815

#SPJ4

using even parity, a normal byte, for example, 1010 0011, would:

Answers

Using even parity, a normal byte 1010 0011 would be represented as 1101 0011.

What is even parity?

Parity refers to the process of checking data for errors. When transmitting binary data over a communication channel, it is possible for bits to become flipped due to electrical noise or other factors

. Parity is a method of detecting such errors, allowing the receiver to know when the data has been corrupted.Even parity is one form of parity checking. In even parity, an extra bit is added to each byte of data.

This extra bit is set to 0 or 1 in such a way that the total number of 1s in the byte, including the extra bit, is always an even number. In this way, if a single bit gets flipped during transmission, the receiver can detect the error and request that the data be resent.

Here, the normal byte given is 1010 0011

Learn more about data transmission at

https://brainly.com/question/32198002

#SPJ11

What is an example of a manufactured product ?
A. A shirt purchased at a store
B. Cotton in a field
C. Wood on a sheep’s back
D. Silk made from a worm

Answers

A shirt purchased in a store

Answer:

A shirt purchased at a store

Explanation:

Nina is 12 years old. She has just changed her password and wants to make sure she has it in case of emergency.

With whom should she share her password? i need hellllpp plsss

Answers

Answer:

she shouldn't share her password, what she should do is write it down somewhere to remember. Golden RULE: never share your password

Explanation:

but seeing the options her mother is the best and only choice to share your password with.

common sense you know?

Answer:

what are the options?....

Explanation:

and I'd say her parents

What is programmer?​

Answers

a programmer is a person who scripts otherwise known as “coding”

Answer:

a programmer is a person who writes down computer programs

a programmer is a device that that controls the operation according to the instructions in the program

Complete the definition of the functions that operate on a n-ary Tree type. You must use folds/maps on the list structure that stores the child nodes of an interior node.
data NTree a = Nil | Tree a [NTree a] deriving Show
-- Returns the sum of all values stored in the nodes in the input tree
sumElements :: NTree Int -> Int
???
-- Returns height of input tree (height=length of longest path from root to leaf)
heightNTree :: NTree Int -> Int
???
-- Returns a list of all the values stored in the tree in pre-order
preOrder :: NTree Int -> [Int]
???
The following are 3 examples of n-ary trees:
t1 = Nil
t2 = Tree 10 []
t3 = Tree 10 [ Tree 20 [],
Tree 30 [ Tree 60 [],
Tree 70 []
],
Tree 40 [ Tree 80 [ Tree 90 [Tree 95 []],
Tree 100 []
]
],
Tree 50 []
]

Answers

Functions using folds/maps to operate on an n-ary tree: sum of elements, height, and pre-order traversal.

To define the required functions for the N-ary tree data type, we can utilize folds and maps on the list structure that stores the child nodes of an interior node.

For the 'sumElements' function, we can use a fold that recursively sums the values stored in each node of the tree.

The base case is an empty tree, represented by 'Nil'.

For a non-empty tree, represented by 'Tree a ts', where 'a' is the value stored in the node and 'ts' is a list of child trees, we use the fold to sum 'a' with the recursive sum of each child tree.

For the 'heightNTree' function, we can use a map to recursively compute the height of each child tree and then take the maximum height plus one, to account for the root node.

The base case is again an empty tree.

For a non-empty tree, we map the 'heightNTree' function over each child tree in the list and take the maximum value.

We then add one to this maximum value to obtain the height of the current tree.

For the 'preOrder' function, we can use a fold to construct a list of all the values stored in the tree in pre-order traversal.

The base case is again an empty tree.

For a non-empty tree, we recursively concatenate the value stored in the current node with the pre-order lists of each child tree in the list.

We can achieve this by folding over the child tree list with a function that concatenates the pre-order list of each child tree with the accumulator list.

With these functions, we can compute the desired properties of any N-ary tree.

For more such questions on Functions:

https://brainly.com/question/179886

#SPJ11

Here are the implementations of the functions sumElements, heightNTree, and preOrder using folds/maps on the list structure that stores the child nodes of an interior node:

data NTree a = Nil | Tree a [NTree a] deriving Show

-- Returns the sum of all values stored in the nodes in the input tree

sumElements :: NTree Int -> Int

sumElements Nil = 0

sumElements (Tree x ts) = x + sum (map sumElements ts)

-- Returns height of input tree (height=length of longest path from root to leaf)

heightNTree :: NTree Int -> Int

heightNTree Nil = 0

heightNTree (Tree _ []) = 1

heightNTree (Tree _ ts) = 1 + maximum (map heightNTree ts)

-- Returns a list of all the values stored in the tree in pre-order

preOrder :: NTree Int -> [Int]

preOrder Nil = []

preOrder (Tree x ts) = x : concatMap preOrder ts

Example usage:

less

Copy code

t1 = Nil

t2 = Tree 10 []

t3 = Tree 10 [ Tree 20 [],

              Tree 30 [ Tree 60 [],

                        Tree 70 []

                      ],

              Tree 40 [ Tree 80 [ Tree 90 [Tree 95 []],

                                   Tree 100 []

                                 ]

                      ],

              Tree 50 []

            ]

sumElements t1 -- Output: 0

sumElements t2 -- Output: 10

sumElements t3 -- Output: 605

heightNTree t1 -- Output: 0

heightNTree t2 -- Output: 1

heightNTree t3 -- Output: 5

preOrder t1 -- Output: []

preOrder t2 -- Output: [10]

preOrder t3 -- Output: [10,20,30,60,70,40,80,90,95,100,50]

Learn more about structure here:

https://brainly.com/question/30000720

#SPJ11

Write a program in Python. Your program needs to allow the user to create a shopping list from scratch, or read a shopping list from an external file.
The initial concept should be to ask the user if they wish to read the list, or create a list.
If create a list option is chosen, you should then allow them to enter in all the items into the list and have them write those items to a file. Once the file is generated you should be able to print the items to the screen to show that the items were stored successfully to your file.

Answers

Answer: Your welcome!

Explanation:

If read a list is chosen, you should then allow the user to enter in the file name they wish to read and print the items contained in that file to the screen.

# Program to Create/Read Shopping List

# Create an empty list to store items

shopping_list = []

# Ask the user if they wish to read a list or create a list

action = input("Do you wish to create a list or read a list? (create/read): ")

# Check the user's input

if action.lower() == "create":

   item = input("Enter an item to add to your list (enter 'done' when finished): ")

   # Loop until the user enters 'done'

   while item.lower() != "done":

       # Add the item to the shopping list

       shopping_list.append(item)

       # Ask the user for the next item

       item = input("Enter an item to add to your list (enter 'done' when finished): ")

   # Open a file to write the list to

   file = open("shopping_list.txt","w")

   # Loop through the list and write each item to the file

   for item in shopping_list:

       file.write(item + "\n")

   # Close the file

   file.close()

   print("Your shopping list has been saved.")

   print("Items in your list:")

   # Print the list to the screen

   for item in shopping_list:

       print(item)

elif action.lower() == "read":

   # Ask the user for the file name

   filename = input("Enter the file name: ")

   # Open the file

   file = open(filename,"r")

   # Read the contents of the file

   contents = file.read()

   # Close the file

   file.close()

   print("Items in your list:")

   # Print the contents of the file to the screen

   print(contents)

else:

   print("Invalid input.")

sam wants the browser to load a background image and repeat the image in both the vertical and horizontal directions until the background is filled. this process is known as _____.

Answers

Sam wants the browser to load a background image and repeat the image in both the vertical and horizontal directions until the background is filled. This process is known as tiling.

A tiled background is when a background image repeats in both the horizontal and vertical directions. It means that the image is replicated horizontally and vertically to cover the full area of the web page or the full element of the web page. Tiling is used to create a seamless background image that covers the entire screen or element. This is done to fill the background of the screen or element with the desired background image, by tiling or repeating it.

Tiling is an important technique in web development. It is often used to improve the visual appeal of a website by adding seamless background images. This technique is achieved using the CSS background-repeat property.

To know more about  tiling visit:-

https://brainly.com/question/32029674

#SPJ11

float('3.66') converts the string "3.5" to a float. Which statement is true? You need to import the float() method from the math module. When you first open IDLE, you can use the float() function. You need to import float() from the random module. There is no float() function. You need to write your own.

Answers

Answer:

When you first open IDLE, you can use the float() function

Explanation:

i bellive this is the rigtht anser but i am not 100%

If AL contains +127 and you add 3 to AL, the Overflow flag will be set. true/false

Answers

True. When AL contains +127, it is the largest positive value that can be represented in a signed 8-bit binary number system.

Adding 3 to AL will result in a value of +130, which cannot be represented using 8 bits and therefore causes an overflow. The overflow flag is set when an arithmetic operation results in a value that is too large (positive overflow) or too small (negative overflow) to be represented in the given number of bits. The overflow flag is used to detect errors in arithmetic operations and is often checked by programs to ensure that calculations are accurate. It is important to note that the overflow flag is only set for signed numbers and does not apply to unsigned numbers.

Learn more on  8-bit binary here:

https://brainly.com/question/31664512

#SPJ11

which item is an auditor least likely to review during a system controls audit?

Answers

In a system controls audit, an auditor is least likely to review physical inventory counts.

The primary focus of a system controls audit is to assess the reliability and effectiveness of an organization's information technology systems and related controls. This includes evaluating security measures, data integrity, software applications, and IT governance processes.

Physical inventory counts, on the other hand, pertain to the verification of tangible assets, such as raw materials, work-in-progress, and finished goods. This task is more relevant to a financial or operational audit, which assesses the accuracy of financial statements and the efficiency of business operations.

During a system controls audit, an auditor typically reviews system access controls, segregation of duties, data backup procedures, disaster recovery plans, and software change management processes. By analyzing these aspects, the auditor aims to identify potential risks and vulnerabilities that could compromise the organization's IT infrastructure and data.

know more about system controls here:

https://brainly.com/question/31197309

#SPJ11

Using the house program we started in the 6.5 lesson, make additions to the house such as windows, doors,
and a roof to personalize it with different colors and fills. the expectation is to add at least one door, two
windows, and a roof to earn credit.

Answers

Discuss the style of home that have chosen as well as your options for windows and doors styles on the back of the mounted piece of coloured paper.

What is an example of a computer programme?

Computer programmes include MS Office, MS Excel, Adobe, Browser, Chrome, etc. To production experience and special effects for movies, computer applications are used.

What do programmes on computers do?

A series of instructions written in a programming languages for a computer to follow is referred to as a computer programme. Software, which also contains documentation and other immaterial components, comprises computer programmes as one of its components.

To know more about programs visit:

#SPJ4

Other Questions
1 ptsmost pathogens that gain access through the skingroup of answer choicesmust be injected.just infect the skin itself.enter through hair follicles and sweat ducts.can penetrate intact skin.must adhere first while their invasive factors allow them to penetrate. efforts to combat transnational organized crime are typically in the hands of federal agencies. true or false Bipolar disorder is characterized by mood disturbances that may range from major depression to mania. However, the treatment for bipolar focuses on ________ rather than ________. What is Thoreau's first thought upon being imprisoned in Civil Disobedience he is concerned about how long he will be there? Un trozo de 5 kg de hierro se encuentra con una temperatura inicial de 300 C. Calcula su temperatura final si se sabe que pierde 5 kcal de calor. If, when hearing that I have been stilled at last, they stand at the door,Watching the full-starred heavens that winter sees,Will this thought rise on those who will meet my face no more,He was one who had an eye for such mysteries?Afterwards,Thomas HardyRead the passage. What is the meaning of the euphemism "I have been stilled?I am speechless.I have died.I have been abandoned.I am lonely. Find the perimeter of a triangle with vertices A(-3,5), B(-3, 2), and C(1, 2). Analyze the following two DNA sequences Sequence 1 GTT GCA GTA CTA Sequence 2 GTT GAA GTA CTA What is the difference between the two? What type of mutation is this? three years ago, a homeowner purchased a home for 350,000 with a 25% down payment. the homeowner accquired a second mortgage for 15,00 20 months later. this secondd mortgage is considered? Who was the commissioner of public safety in birmingham in the late 1950s and early 1960s?. Describe the three kinds of particles found in atoms. Where are they located in the atom and what are their charges? in addition to being the second-largest moon in the solar system, saturn's moon titan is PLEASE HELPPPP ME :OOOOOOIn this project, you will research sickle cell anemia in Africa and how it relates to malaria. Write a 350 word report on the description of the disease sickle cell anemia and how it protects those that carry the gene against malaria. Include information such as which populations are most affected and how the environment determines whether the disease is beneficial or harmful. Marcus bought r movie posters for $6 each. Write an algebraic expression for total amount Marcus spent. Select the correct answer.Which statement best expresses Brutus's conflicting motivations?.Brutus is motivated by his friendship with Cassius, but he also wants to support Caesar as leader of Rome.OB.Brutus is motivated by his commitment to Rome and his friendship with Cassius.Brutus is torn between his friendship with Caesar and his commitment to what's best for Rome..ODBrutus is torn between motivations for his friendship with both Caesar and Cassius. Consider a system that may be unoccupied with energy zero or occupied by one particle in either of two states, one of energy zero and one of energy e. Find the Gibbs sum for this system [use fugacity 1 = exp(Bu) to express the Gibbs sum]. Note that the system can hold a maximum of one particle. 2-b. Find the thermal average occupancy of the system (N) in terms of 1 and Gibbs sum. 2-c. Find the thermal average occupancy of the state at energy E. 2-d. Find the expression for the thermal average energy of the system. 2-e. Allow the possibility that the orbitals at energy 0 and may be occupied each by one particle at the same time. Then show that Gibbs sum = 1 + 1 + 1 exp(-E/T) + 12 exp(-/T) = (1 + 1) [1 + 1 exp(-4/1)] Here, because the Gibbs sum can be factored as shown, we have in effect two independent systems. We can educate people from the ecological footprint that the 3 main factors of the footprint are transportation, housing and food decisions. A large home improvement store is considering expanding its selection of moving products, such as cardboard boxes and packing tape. the store constructs a 90% confidence interval to estimate the proportion of all customers who have moved houses at least once in the last five years. in the random sample of 620 customers, 201 (32.4%) replied that they had moved at least once in the last five years. the sample yielded the 90% confidence interval (0.293, 0.355) for the proportion of all customers who have moved in the past five years. what is the correct interpretation of this confidence interval? a. the store can be 90% confident that a proportion of 0.324 of all customers of this store have moved in the past five years. tb. there is a 90% probability that between 29.3% and 35.5% of all customers of this store have moved in the past five years.c. there is a 10% chance that less than 29.3% or more than 35.5% of all customers of this store have moved in the past five years. d. the store can be 90% confident that the interval from 0.293 to 0.355 captures the proportion of all customers of this store who have moved in the past five years. Tell me the answer please 1+2-3+4-5+6-7+8-9= the haines position is outdated because it does not protect the spine. T/F