Answer:
c
Explanation:
NEED THIS ASAP!!) What makes open source software different from closed source software? A It is made specifically for the Linux operating system. B It allows users to view the underlying code. C It is always developed by teams of professional programmers. D It is programmed directly in 1s and 0s instead of using a programming language.
Answer: B
Explanation: Open Source software is "open" by nature, meaning collaborative. Developers share code, knowledge, and related insight in order to for others to use it and innovate together over time. It is differentiated from commercial software, which is not "open" or generally free to use.
Which statement is true?
An employee list can give the departments and job titles of employees.
A product list can include names and addresses of buyers of the product.
A medical record can include consumer buying behaviors of prescriptions.
A market research report can give names of employees of a company.
Answer:
An employee list can give the departments and job titles of employees.
Explanation:
Well you have to your employees age birth certificate and stuff like that on file and there department and title would bee in that file.
Answer:
A
Explanation:
Makes the most sense
Gottfried semper said that a people, their technology, and their aesthetics were all connected. according to him, the four basic kinds of technology available are: (select all that apply)
They reflected the values, traditions, and craftsmanship of a particular civilization.
What are the four basic kinds of technology according to Gottfried Semper?Gottfried Semper believed that the four basic kinds of technology available are:
Tectonic: Refers to the construction and assembly of buildings and structures using materials like wood, stone, and metal. It involves the principles of structural engineering and architectural design.Ceramic: Involves the use of fired clay or pottery for various purposes such as pottery vessels, bricks, tiles, and decorative objects. It includes techniques like pottery wheel throwing, molding, and glazing.Textile: Relates to the production of fabrics and textiles using techniques like weaving, knitting, and embroidery. It encompasses the creation of clothing, tapestries, carpets, and other textile-based products.Composite: Involves the combination of different materials to create new materials with enhanced properties. It includes practices such as laminating, layering, and bonding materials together.Semper believed that these four types of technology were interconnected and influenced by a people's culture, aesthetics, and society.
Learn more about craftsmanship
brainly.com/question/30107694
#SPJ11
which tab and group on the ribbon holds the command to change the font of the text of the cells of a worksheet?
In Microsoft Excel, the "Home" tab of the ribbon is normally where you can find the "Font" command, which enables you to alter the font of the text in the worksheet's cells.
A typeface is a collection of graphic characters that have a similar design and appearance and are used in computing. In digital documents and user interfaces, fonts are used to style and format text, and they have a significant impact on the content's readability and attractiveness. Serif, sans-serif, script, and ornamental font types are only a few of the many variations that are available. To accommodate various uses and design requirements, they can be modified in terms of size, weight, and colour. Font options are available through the ribbon interface in software programmes like Microsoft Excel, enabling users to quickly and simply change the appearance of the content of their spreadsheets.
Learn more about "Font" here:
https://brainly.com/question/29662656
#SPJ4
6) -------- is not used in evaluating the size of the software?
The correct answer is The size of a module is not taken into account when calculating the software's size.
The dimension of a vector space, which determines its size, is generalised to include the length of a module in abstract algebra. Particularly, only modules that were formed at a certain point in time may be of a limited length. The length of the longest chain of submodules is how it is defined. It must be succinct and direct; if it is lengthier, gamification or significant interaction are required. Usually between 2 and 5 minutes, but if it's interesting, it could go on longer. A separate group of parts that may be easily added, deleted, or replaced in a larger system is called a module. A module typically cannot work by itself. A module in computer hardware is a part that is intended to be changed out quickly.
To learn more about size of a module click the link below:
brainly.com/question/28524802
#SPJ4
WILL GIVE BRAINLIEST!!!!!!!
In a series circuit, electricity flows along more than one path.
True
False
A group of developers for a startup company store their source code and binary files on a shared open-source repository platform which is publicly accessible over the internet. They have embarked on a new project in which their client requires high confidentiality and security on all development assets. What AWS service can the developers use to meet the requirement
Answer: AWS CodeCommit
Explanation:
The AWS service that the developers can use to meet the requirements that are illustrated in the question is the AWS CodeCommit.
The AWS CodeCommit is refered to as a fully-managed source control service which can be used in the hosting of Git-based repositories which are secure.
AWS CodeCommit makes it easy for the collaboration on code for teams in a secure ecosystem. CodeCommit can securely store binaries, source code etc.
The service AWS CodeCommit could be used to meet the requirements by the development companies, and the further discussion can be defined as follows:
It is a safe, highly scaleable, controlled source that hosts private Git repositories that enables you to increase your developmental cycle speed and frequency.It is being used to eliminate this need you to handle or to magnitude one's source control system, instead of the entire application, this could transfer incremental changes.The CodeCommit can be used for any storage from code to binaries and maintains its repositories near your AWS cloud building, stage, and production environments.Therefore, the final answer is "AWS CodeCommit".
Learn more:
brainly.com/question/17718130
A loop must return to the ____ question at some later point in a structure.
A) master loop
B) loop-controlling
C) start loop
D) continue loop
A loop must come back to the loop-controlling issue at some point in the structure.
A loop is a set of instructions that are repeatedly carried out until a particular condition is met in computer programming. Typically, a certain action is taken, such as receiving and modifying a piece of data, and then a condition is checked, such as whether a counter has reached a specific value. The next instruction in the series is a directive to go back to the first instruction in the sequence and repeat it if it hasn't. The following instruction "falls through" to the following sequential instruction or branches outside of the loop if the condition has been met. A loop is a fundamental concept in programming that is frequently utilized while creating programs. A loop that never ends is said to be infinite.
Learn more about loop here:
https://brainly.com/question/13090212
#SPJ4
There are two main types of hard drive available to a computer. State what they are and describe their use.
(best answer gets to be the brainliest!)
Answer:
Hard disk drives (HDD), which use one or more rotating discs and rely on magnetic storage, and solid-state drives (SSD), which have no moving mechanical parts, but use flash memory like the kind found in USB flash drives.
Explanation:
After saving the changes she made, Sally notices that she used the word "home” too many times in her paragraph. She decides to make her paragraph more interesting by replacing "home” with "shelter” in a few places in the paragraph. How should Sally accomplish this task?
Answer:
c or a there both correct
Explanation:
7.2.7: Part 1, Replace a Letter
"Write a function named replace_at_index that takes a string and an integer. The function should return a new string that is the same as the old string, EXCEPT with a dash in place of whatever character was at the index indicated by the integer.
Call your function on the word eggplant and the index 3, like this:
s = replace_at_index("eggplant", 3)
You should then print the value of s, which should display:
egg-lant"
Answer:
def replace_at_index(string, index):
return string[0:index]+"-"+string[index+1:]
replaced_word = replace_at_index("house", 0)
print(replaced_word)
Explanation:
simpler version
The Function that is used to name replace_at_index that takes a string and an integer is as follows:
def replace_at_index(string, index):return string[0:index]+"-"+string[index+1:]
replaced_word = replace_at_index("house", 0)
print(replaced_word).
What is the significance of the programming function?The significance of the programming function is determined by the fact that it sanctions programmers in order to breach or disintegrate a problem into smaller chunks. Each of these smaller chunks usually performs a particular task.
Functions are specifically utilized by the user in order to execute certain actions, and they are important for reusing code. They usually define the code once and use it multiple times with the same efficacy and accuracy. These collections of codes develop a function.
Therefore, the function that is used to name replace_at_index that takes a string and an integer is well described above.
To learn more about Computer's functions, refer to the link:
https://brainly.com/question/179886
#SPJ3
Adnan is creating a presentation about engineers using geometric shapes in bridge construction. He wants to insert
an illustration of a bridge saved in a folder on his computer.
How can he access the folder using the images command group?
After choosing the illustration he wants to add, which button should he click?
Add
Insert
OK
Done
Intro
Answer:Click Pictures, Insert
Explanation:
Got it right
Answer:
A. A
B. B
Explanation:
If you quote an author from a website in a paper, it will be important to create a _____ in your writing to give them credit for their work.
caption
citation
macro
merge
Answer:
citation
Explanation
you are supposed to cite the author, so it would be citation
How do u set up a Wi-Fi network on Android
Answer:
These are some way I know
Scenario You are doing a fantastic job at Chada Tech in your new role as a junior developer, and you exceeded expectations in your last assignment for Airgead Banking. Since your team is impressed with your work, they have given you another, more complex assignment. Some of the code for this project has already been completed by a senior developer on your team. Because this work will require you to use both C++ and Python, the senior developer has given you the code to begin linking between C++ and Python. Your task is to build an item-tracking program for the Corner Grocer, which should incorporate all of their requested functionality. The Corner Grocer needs a program that analyzes the text records they generate throughout the day. These records list items purchased in chronological order from the time the store opens to the time it closes. They are interested in rearranging their produce section and need to know how often items are purchased so they can create the most effective layout for their customers. The program that the Corner Grocer is asking you to create should address the following three requirements for a given text-based input file that contains a list of purchased items for a single day: Produce a list of all items purchased in a given day along with the number of times each item was purchased. Produce a number representing how many times a specific item was purchased in a given day. Produce a text-based histogram listing all items purchased in a given day, along with a representation of the number of times each item was purchased. As you complete this work, your manager at Chada Tech is interested to see your thought process regarding how you use the different programming languages, C++ and Python. To help explain your rationale, you will also complete a written explanation of your code’s design and functionality. Directions One of Python's strengths is its ability to search through text and process large amounts of data, so that programming language will be used to manage internal functions of the program you create. Alternatively, C++ will be used to interface with users who are interested in using the prototype tracking program. Grocery Tracking Program Begin with a Visual Studio project file that has been set up correctly to work with both C++ and Python, as you have done in a previous module. Remember to be sure you are working in Release mode, rather than Debug mode. Then add the CS210_Starter_CPP_Code and CS210_Starter_PY_Code files, linked in the Supporting Materials section, to their appropriate tabs within the project file so that C++ and Python will be able to effectively communicate with one another. After you have begun to code, you will also wish to access the CS210_Project_Three_Input_File, linked in the Supporting Materials section, to check the functionality and output of your work. As you work, continue checking your code’s syntax to ensure your code will run. Note that when you compile your code, you will be able to tell if this is successful overall because it will produce an error message for any issues regarding syntax. Some common syntax errors are missing a semicolon, calling a function that does not exist, not closing an open bracket, or using double quotes and not closing them in a string, among others.
Create code to determine the frequency of a specific item. Here you will be addressing the second requirement from the scenario to produce a number representing how many times a specific item was purchased in a given day. Remember an item is represented by a word and its frequency is the number of times that word appears in the input file. Reference the following to help guide how you can break down the coding work.
Use C++ to validate user input for option 2 in the menu. Prompt a user to input the item, or word, they wish to look for. Write a C++ function to take the user’s input and pass it to Python.
Write Python code to return the frequency of a specific word. It will be useful to build off the code you just wrote to address the first requirement. You can use the logic you wrote but modify it to return just one value; this should be a fairly simple change (about one line). Next, instead of displaying the result on the screen from Python, return a numeric value for the frequency of the specific word to C++.
Write a C++ function to display the value returned from Python. Remember, this should be displayed on the screen in C++. We recommend reviewing the C++ functions that have already been provided to you for this work.
One approach is to use the Python/C API to write a C++ function that passes user input to Python, which then uses a dictionary to count the frequency of each word in the text file and returns the frequency of the specific word.
How can you use C++ and Python together to determine the frequency of a specific item in a text file?To address the second requirement from the scenario and create code to determine the frequency of a specific item, you can follow these steps:
Learn more about Python
brainly.com/question/30427047
#SPJ11
Which concept, when applied in an algorithm, allows the computer to make
decisions?
A. Sequencing
B. Storage
C. Selection
D. Iteration
The data and statistical analyses used by algorithmic or automated decision systems are classified as individuals to estimate their entitlement to benefit or penalty.
They are used also in the public sector, such as the delivery, sentence, and parole judgments in criminal justice.It is the limited series of well-defined instructions for computers implementation, generally for solving a class or completing a calculation of specific issues. Algorithms are always unambiguous and are used as computations, processing data, automated simplification as well as other duties.A sequencing notion allows a computer to pass judgment if implemented in an algorithm.Therefore, the final answer is "Option A".
Learn more:
brainly.com/question/19565052
Answer:
C. Selection
Explanation:
had to learn the hard way
Write a pseudocode algorithm that uses the For Each loop to display all of the
values in the following array:
Constant Integer SIZE = 10
Declare Integer values[SIZE] = 1, 2, 3, 4, 5, 6, 7, 8, 9, 10
Here is a pseudocode algorithm that uses the For Each loop to display all of the values in the given array:
```
declare a constant integer named SIZE and set its value to 10
declare an integer array named values with SIZE elements and initialize it with the values 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10
for each integer value in values do
display the value
end for
```
This algorithm first declares a constant integer `SIZE` and an integer array `values` with `SIZE` elements, initialized with the given values. It then uses a For Each loop to iterate through each value in the `values` array and display it. The loop will execute 10 times, once for each element in the `values` array.
learning components of radiography program? radr 1303
The radiography program is the use of technology is crucial to the practice of radiology. As a result, radiologists and technologists must comprehend the science behind the equipment as well as the physical laws that govern its benefits, drawbacks, and dangers.
Basic X-ray beam production equipment can be found in the typical radiography room, including the collimator, generator, beam filtration system, tube, and tube housing. A radiography degree will instruct you in the science, philosophy, and practice of medical imaging as well as radiographic research techniques and statistics. It will also educate you on subject-specific skills in anatomy, physiology, and pathology. The X-ray beam originates from the X-ray tube. The cathode, anode, rotor, envelope, tube port, cable sockets, and tube housing are the basic parts of the X-ray tube.
Learn more about radiography here:-
https://brainly.com/question/17943258
#SPJ4
1. Readability, navigation, consistency, layout and typography are all factors which
influence the usability of web pages. Briefly describe each of these factors.
Answer:
1) Readability is the ease with which a reader can understand a written text. Readability is more than simply legibility—which is a measure of how easily a reader can distinguish individual letters or characters from each other.
2) Navigation is a field of study that focuses on the process of monitoring and controlling the movement of a craft or vehicle from one place to another. The field of navigation includes four general categories: land navigation, marine navigation, aeronautic navigation, and space navigation. It is also the term of art used for the specialized knowledge used by navigators to perform navigation tasks.
3) In classical deductive logic, a consistent theory is one that does not entail a contradiction. The lack of contradiction can be defined in either semantic or syntactic terms. The semantic definition states that a theory is consistent if it has a model, i.e., there exists an interpretation under which all formulas in the theory are true. This is the sense used in traditional Aristotelian logic, although in contemporary mathematical logic the term satisfiable is used instead.
4) The way in which the parts of something are arranged or laid out.
5) Typography is the art and technique of arranging type to make written language legible, readable and appealing when displayed. The arrangement of type involves selecting typefaces, point sizes, line lengths, line-spacing (leading), and letter-spacing (tracking), and adjusting the space between pairs of letters (kerning ).
Explanation:
Hope it helps :)
Choose the best answer in each of the drop-down menus.
Answer:
whata r in the windows pls list them
Explanation:
If you were in charge of search engine optimization for a client who was a personal trainer, what would you recommend that they do?
The practice of using optimizations to raise your website's position in search results is known as SEO.
Why is SEO so important?Search engine optimization (SEO) will help you reach more customers and assist them in becoming healthier. The practice of using optimizations to raise your website's position in search results is known as SEO. It makes your website more visible to those looking for a personal trainer.Good SEO techniques also enhance a website's usability and user experience, thus SEO is not just about search engines. Users trust search engines, therefore having a website appear in the top results for the user's search terms builds user trust.The most crucial elements of SEO are content and user experience because they make up your website.To learn more about SEO refer,
https://brainly.com/question/14097391
#SPJ1
If you want to open the Navigation pane to do a Find, what should you first click on the Home tab? Paragraph, Editing, Styles, or View
Answer:
You would first click view.
Explanation:
hope this helps
Answer:
editing (b)
Explanation:
Please help, thanks! (simple question) I'm doing a project and need to ask two people what they think is the highest contributor to global warming. my phone is dead. What do you think is one of the greatest contributors to global warming? I have to make an app about the two things.
A short-range wireless network is called:
cable modem
cell site
wi fi
personal digital assistant
Answer:
WiFi
Explanation:
WiFi can be defined as a wireless local area network that allows network devices such as access points (APs), computers (both laptops and desktops), smartphones, smart televisions, etc., to communicate with each other wirelessly over a short-ranged network. It is a standard communication network that uses radio waves to establish a channel (medium) between multiple network devices.
This ultimately implies that, the network range or distance covered by WiFi is largely dependent on transmission power and frequency. The standard range or distance covered by WiFi is about 50 meters (160 feet).
Hence, a short-range wireless network is called WiFi.
In a university database that contains data on students,
professors, and courses: What views would be useful for a
professor? For a student? For an academic counselor?
In university database the views that would be useful for a professor is Course Roster View, Gradebook View, Course Schedule View. For student it would be Course Catalog View, Class Schedule View, Grades View. For academic counselor it would be Student Profile View, Degree Audit View, Academic Advising Notes View.
For a professor:
Course Roster View: A view that displays the list of students enrolled in the professor's courses. This view can provide essential information about the enrolled students, such as their names, contact details, and academic performance.Gradebook View: A view that allows the professor to access and update the grades of their students. This view can provide a convenient way for professors to track and manage student performance throughout the semester.Course Schedule View: A view that shows the professor's teaching schedule, including the dates, times, and locations of their classes. This view helps professors stay organized and plan their daily activities accordingly.For a student:
Course Catalog View: A view that provides information about available courses, including their titles, descriptions, prerequisites, and instructors. This view helps students explore and select courses for registration.Class Schedule View: A view that displays the student's schedule for the current semester, showing the dates, times, and locations of their enrolled classes. This view allows students to keep track of their class timetable and avoid scheduling conflicts.Grades View: A view that shows the student's grades and academic performance in each course they have taken. This view helps students monitor their progress, identify areas of improvement, and calculate their GPA.For an academic counselor:
Student Profile View: A view that presents comprehensive information about a specific student, including their personal details, academic history, enrolled courses, and any relevant notes or comments. Degree Audit View: A view that displays the student's progress towards completing their degree requirements. This view shows the courses the student has completed, the ones in progress, and the ones remaining. Academic Advising Notes View: A view that allows counselors to add and access notes or comments regarding their interactions and discussions with students. This view helps counselors maintain a record of important conversations and track the progress of their advising sessions.To learn more about database: https://brainly.com/question/518894
#SPJ11
What refers to the way players get personally involved in a game, with the ability to influence the outcome?
ludonarrative
interactive fiction
participant observation
player agency
Answer:
player agency
Explanation:
Answer:
I think it's player agency
Explanation:
Player Agency: The player's ability to impact the story through the game design or gameplay
For what type of image is a megapixel a unit of measurement?
film
cligital
print
Answer:
answer number 1
Explanation:
tamara is behind on her work as an analyst and decides she needs to do some work at home tonight. she copies the files she has been working on (which contain phi) to a flash drive and drops the flash drive in her purse for later use. when tamara gets home, the flash drive is missing. is this a security breach?
On the way home from work, Tamara who works as an analyst decides she needs to do some advanced work at home tonight. The files that he had copied and worked on at the office were stored on the flash drive, but when he got home the flash drive was gone. The incident that Tamara experienced was not a security breach.
What is security breach?A security breach is any incident or occurrence that results in unauthorized access to data on a computer, on an application, on a network, or on a device. This will result in information being accessed without involving authorization. This leads to unauthorized access to information.
Learn more about serious security breach occurred in your organization here https://brainly.com/question/23077661
#SPJ4
What security trade-offs or options should an administrator consider when confronted with a potentially extraneous service, such as FTP or SMTP, running on a web server? *
FTP or File Transfer Protocol was never designed to be hack-safe. Files exchanged using FTP are not encrypted. Hence, this service is susceptible to various kinds of security risks such as spoofing, sniffing, etc.
What tradeoff must the Administrator consider when using FTP?Although the FTP is insecure, it is a very fast way of transferring files.
When the connection is lost during file transfer, it is possible to resume such a transfer.
It also allows for queuing, scheduling, uploading, and downloading of files.
The full meaning of SMTP is Simple Email Transfer Protocol.
Learn more about FTP and SMTP at:
https://brainly.com/question/17506968
https://brainly.com/question/14396938
listen to exam instructions you just deployed a new cisco router that connects several network segments in your organization. the router is physically located in a server room that requires an id card for access. you backed up the router configuration to a remote location with an encrypted file. you access the router configuration interface from your notebook computer using a telnet client with the username admin and the password admin. you used the md5 hashing algorithm to protect the password. what else should you do to increase the security of this device? (select two.)
While working with a router, that connects various network segments in your organization, there are two measures you can take to enhance its security:
Changing the password frequently;Setting up a user account for a telnet session, other than the one currently in use.About the measurement to enhance the securityThe following are two measures you can take to enhance the security of this device:
Changing the password frequentlyIt is always a good idea to modify your password frequently.
When passwords aren't changed often enough, they can become vulnerable to malicious hacking activities, and your router may be exposed to unauthorized access. You can even put a reminder to yourself to modify the password every few months, in addition to making it more complicated.
Setting up a user account for a telnet session, other than the one currently in use.The method you're using to connect to the router now is through the admin account. Admin accounts are intended for special system duties and not for regular use.
As a result, it's not a good idea to connect to the router using the admin account. You should create a separate user account with limited permissions, which should be used only for accessing the router. This practice will help you to keep your router and network infrastructure safe from unauthorized access.
Learn more about router at
https://brainly.com/question/29869351
#SPJ11