Which statement is true about the location-sharing site Gowalla?

Answers

Answer 1

Answer:

a user gets a newbie badge for their first check-in into gowalla.

Explanation:

Answer 2

A user gets a newbie badge for their first check-in into gowalla.

What is Gowalla?

On the location-based social networking site Gowalla, members can check-in to broadcast their whereabouts. The undirected friendship network, which has 196,591 nodes and 950,327 edges, was compiled using their open API.

Longtime readers of TechCrunch will probably remember the startup as an ambitious consumer social app that first caught the attention of Silicon Valley investors but ultimately failed to gain traction.

It appeared that the tale would end there, founder Josh Williams tells TechCrunch that he has made the decision to bring back the Gowalla name and advance its original intent by relying on augmented reality technology.

Therefore, A user gets a newbie badge for their first check-in into gowalla.

To learn more about Gowalla, refer to the link:

https://brainly.com/question/12028030

#SPJ2


Related Questions

Which of the following would be the most appropriate way to define a method that calculates and returns the final price, after tax and tip, for a passed in price, assuming tip is always 15% and tax is always 8%?

a. public double getFinalPricel double tips, double tax).
b. public double getFinal Price double tax)
c. public double getFinalPrice/double basePrice, double tips)
d. public double getFinalPrice double basePrice, double tips, double tax)

Answers


D. I hope it helped

A combination of the three main services in cloud computing

Answers

Answer:

: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS).

Explanation:

Cloud computing can be broken up into three main services: Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS) and Software-as-a-Service (SaaS). These three services make up what Rackspace calls the Cloud Computing Stack, with SaaS on top, PaaS in the middle, and IaaS on the bottom.

the security rule requires that covered entities and business associates implement which type of safeguard to protect electronic data?
administrative,
technical,
physical safeguards
Access control

Answers

According to the Security Rule, covered businesses must keep adequate administrative, technical, and physical safeguards to protect e-PHI.

What considerations are permitted by the security regulation for covered businesses and business partners?

The Covered Entity or Business Associate must consider its size, complexity, and capabilities, as well as its technological infrastructure, hardware, and software security capabilities, when determining what security measures to implement. the price tag on security measures.

What kinds of security measures are there?

These include firewalls, virus scanners, software log monitoring, version control, operating system logs, and document disposition certification. Particularly sensitive personal health information must be stored and sent using encryption.

To know more about e-PHI visit:-

https://brainly.com/question/14866844

#SPJ4

Creating a method object. Define the method object inc_num_kids() for Personinfo. inc_num_kids increments the member data num_kids. Sample output for the given program with one call to inc_num kids(): Kids: 0 New baby, kids now: 1 1 test 1 class PersonInfo: definit__(self): self.num_kids = 0 passed Al tests DO NO # FIXME: Write inc_num_kids(self) ***Your solution goes here 9 person1 - Person Info() 1e 11 print('Kids:', person1.num_kids) 12 person1.inc num kids() 13 print('New baby, kids now!', personi.num_kids)!

Answers

method object  of inc_num_kids() for PersonInfo. inc_num_kids increments the member data num_kids. Sample output for the given program with one call to inc_num_kids(): Kids: 0 New baby, kids now: 1 can be write as follows:

Program:

#define class.

class PersonInfo:

  def __init__(self):  #constructor

      self.num_kids = 0

  def inc_num_kids(self):   #define function inc_num_kids()

      self.num_kids = self.num_kids + 1  

      return self.num_kids  #return value.

p= PersonInfo()      # creating object  

print('Kids:', p.num_kids)  #print value

p.inc_num_kids() #call function

print('New baby, kids now:', p.num_kids) #print value

Output:

Kids: 0

New baby, kids now: 1

The program begins by defining the PersonInfo class. This class defines a constructor that def __init__() and a function that def inc_num_kids().

The constructor is called automatically when the class object is created. This constructor takes self as a parameter that is used to access variables belonging to the class.

In the constructor, define a variable 'num_kids'. Assign a value to a variable that is '0' and use self to keep a reference to the variable.

Then define the function. This function increments the value of the variable by 1 and returns the value.

Then create a class object that is p, call the function, and print its value.

learn more about method object at https://brainly.com/question/13928668

#SPJ4

an obstacle or barrier that may prevent you from accomplishing your goal is called

Answers

Answer:

a roadblock

Explanation:

A roadblock because it is

What is the default setting Excel shows when Insert is clicked?

shift cells right
shift cells down
entire row
entire column

Answers

Answer:

B. shift cell down

The default setting Excel that shows when Insert is clicked is shift cells down. The correct option is B.

What is Excel?

Microsoft's Excel spreadsheet program is a part of the Office family of business software programs.

Users of Microsoft Excel may format, arrange, and compute data in a spreadsheet.

Large volumes of data are stored, examined, and reported using Excel. It can be used by any expert to manage lengthy and awkward datasets, although accounting teams frequently utilize it for financial analysis.

Making the first decision that will be made automatically is setting something as default. Shift cells down is the default setting Excel displays when Insert is clicked.

Thus, the correct option is B.

For more details regarding excel, visit:

https://brainly.com/question/3441128

#SPJ2

How did scientists make the discovery that brains change when they learn new things? Please, if possible can you answer in four complete sentences?

Answers

Scientists have discovered that the brain changes when people learn new things through the use of neuroimaging techniques, such as MRI scans, EEG, and PET scans.

These technologies allow researchers to monitor changes in brain activity and connectivity as people engage in learning and other cognitive activities.

Neuroimaging studies have shown that when people learn new skills or information, specific regions of the brain become more active or form new connections with other regions. For example, learning a new language can lead to changes in the size and connectivity of the brain's language centers.

Additionally, neuroplasticity, the brain's ability to adapt and reorganize itself in response to new experiences and learning, plays a crucial role in these changes. Through repeated practice and exposure, the brain can create new neural pathways and strengthen existing ones, leading to lasting changes in cognition and behavior.

Overall, the use of neuroimaging technologies has greatly enhanced our understanding of how the brain changes when people learn new things and has opened up new avenues for research into neuroplasticity and cognitive development.

For more questions on MRI scans:

https://brainly.com/question/3184951

#SPJ11

Type or paste question here
PURPOSE
The purpose of this assignment is to enhance learners’
ability to assess the challenges faced by firms
venturing into foreign markets.
REQUIREMENT
Assume that Pro

Answers

The assignment focuses on assessing the challenges faced by firms entering foreign markets. The specific requirement is to assume the role of Profirst, a fictional company, and analyze the challenges it may encounter when venturing into foreign markets.

In this assignment, learners are tasked with taking on the perspective of Profirst, a company venturing into foreign markets, and assessing the challenges it may face. This exercise aims to enhance learners' understanding of the complexities and obstacles involved in international business expansion.

To fulfill the requirement, learners will need to conduct a comprehensive analysis of the potential challenges that Profirst may encounter. This analysis may include factors such as cultural differences, regulatory frameworks, political stability, competitive landscapes, economic conditions, and market entry barriers. By considering these factors, learners will gain insights into the unique challenges and risks associated with entering foreign markets.

The assignment provides an opportunity for learners to apply their knowledge of international business concepts and frameworks to a practical scenario. They will need to critically evaluate the challenges and devise strategies or recommendations to overcome or mitigate them. This exercise fosters analytical thinking, problem-solving skills, and a deeper understanding of the complexities of operating in global markets.

Learn more about global markets here:- brainly.com/question/31787182

#SPJ11

Which of the following is most likely to be a complement to coffee? a) decal coffee b) baked beans c) tea d) creamer.

Answers

Creamer among the  following is most likely to be a complement to coffee. Creamer comes in many different flavors, including organic, non-dairy, and flavored varieties

Option D is correct.

Creamer: What is it?

Coffee and tea's flavor and texture are enhanced with creamer, a type of dairy product. It typically consists of cow's milk and vegetable oils like soybean or coconut oil, making it a thicker liquid than milk. Cream, sugar, and a variety of flavorings can also be used to make creamer. It gives drinks a velvety, creamy texture and is typically used sparingly. Creamer comes in many different flavors, including organic, non-dairy, and flavored varieties. Cappuccinos, lattes, and other popular coffee drinks can all be made with it.

Learn more about creamer:

brainly.com/question/451835

#SPJ4.

The most effective leaders treat everyone alike. True True False

Answers

Answer:

you have to have evidence they do that and on the question theirs no evidence so the answer would be false (as long as theirs no evidence)

Explanation:

Answer:

True

Explanation:

describe a new custom encoding that uses fewer bits to represent each color in the image. what is your encoding for each color?

Answers

Using a colour quantization algorithm to limit the number of colours in the image to a smaller set and then representing each colour with fewer bits is one potential custom encoding method.

How many bits do colour images typically utilise to represent them?

The normal bit depth for a colour image is from 8 to 24 or higher. Three groups of eight bits are frequently used in a 24-bit image: eight bits for red, eight bits for green, and eight bits for blue. Other hues are represented by combining those bits.

Why must each pixel be represented by at least two bits?

The range of colours depends on the amount of bits.

To know more about algorithm visit:-

https://brainly.com/question/22984934

#SPJ1

what are the main features cyber law of Nepal​

Answers

Answer:

What are the provisions of cyber law in Nepal?

Provision of cyber law of NEPAL

It provides legal status to digital signatures and electronic records which in turn are used in electronic banking, shopping and commerce. It provides laws for formation of judicial system that operates only for crimes related to computer (internet and cyber space).

Hope this helps Have a good day

Select the correct answer from each drop-down menu.

Rachel Is explaining the storage of variables and constants in computer memory to her classmates. Choose the correct options In her

description.

* are the names given to memory locations where the processor stores varying values, and

v are permanent

values stored In computer memory.

Answers

Variables are the names given to memory locations where the processor stores varying values, and constants are permanent values stored in computer memory.

What is the distinction between variables and constants in computer memory storage?

In her description,

ˣ Variables are the names given to memory locations where the processor stores varying values, and

ˣ Constants are permanent values stored in computer memory.

Variables are used to store varying or changing values in memory.

They can be assigned different values during program execution.

On the other hand, constants are values that remain fixed and do not change during program execution.

They are stored in memory as permanent values.

Learn more about memory locations

brainly.com/question/14447346

#SPJ11

Which type of join is used to show all the entries in the table containing the primary key regardless of whether that
ID has an entry in the second table?

O left outer join
O right outer join
O Inner join
O self join

Answers

Which type of join is used to show all the entries in the table containing the primary key regardless of whether that ID has an entry in the second table

left outer join

Which is an organizational unit that is useful for collecting and aggregating similar data on separate forms

Tab pages

Barbara is enabling password protection on a database. Which option is not a secure password

apples

Which file type is used when forwarding a contact as a business card to another user to share their information

VCF

Which statement accurately describes the Clutter feature in Outlook 2016

It analyzes a user’s interaction with particular messages to provide a more focused inbox.

Cleo finds herself frequently searching for messages from particular senders or with specific subjects. What should she create to increase efficiency for these searches

Search folder

Which term refers to the use of expressions to check consistency in relation to other fields in the same record

record validation

Which statement best describes the Tell Me feature in PowerPoint 2016?

It is primarily used to locate options in the menu.

Which option is created specifically for giving a slide presentation in front of an audience and works when the speaker is utilizing multiple monitors or a projector

presenter view

Which type of query should be used to select fields from one or more related tables in a database

simple

Which command group on the Format tab of the SmartArt Tools contextual tab allows a user to change the fill and outline of SmartArt shapes

Shape and style

Michael needs to ensure that those items that are automatically archived are still easily accessible within Outlook. Which option should he configure

Show archive folder in folder list

Which option should Gina click to edit the text contained in a text box on a slide in her presentation

text box

Which feature refers to a combination of colors, fonts, and effects that a user can define and apply to slides, slide masters, and slide layouts

custom theme

Which option is used to collaborate with other authors by comparing different versions of the same document

Revisions

An Access table contains rows of table data that contain a complete set of data for a single entity. Which term is used for a row of table data

record

Which sensitivity level is not a default available in Outlook 2016

Company Only

Which option is used to determine whether information that should remain private is included in the final version of a PowerPoint presentation

Document Inspector dialog box

Which option is the easiest way to configure macros in Access 2016

Use the Macro Builder.

Which tab on the ribbon is used to access the global Access 2016 options

Database Tools

Which option in PowerPoint allows users to configure the number of columns and rows manually, using numerical values

Insert Table dialog box

Which feature should be used prior to finalizing a presentation to ensure that audience members with disabilities will be able to understand the message that a presenter is trying to get across

Accessibility Checker

Which tab group is used to modify the background of a chart that is contained in a PowerPoint presentation

Chart styles

Which type of control has its source of data found in a field in a table or query

bound

Shantel is trying to implement the use of data bars on a report that she created. She has selected the Conditional Formatting Rules Manager dialog box. What should she do next

Create a rule.

Lynn would like to insert a hyperlink into an email message without using the ribbon. What is the keyboard shortcut to do so

Control k

Dennis would like to include a video in a presentation. The source of the video is on the internet, but he would like to ensure that the video will play even if an internet connection is not active during the presentation. What should he do

Use the Video from my PC command in the Media group.

Which gallery will allow a user to access a variety of preconfigured formatting styles for images that are added to a PowerPoint presentation

Picture Styles gallery

Hoda is creating a report in Access using the Report Wizard. Which option is not available for adding fields using the wizard

reports

What is a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide, complete with transitions and captions

Photo Album feature

Which type of VBA code is common for grouping statements that perform a certain task

procedure

Kathy would like to export a report that she created into an easy-to-use file format that is supported on multiple platforms and will retain the image quality of the report. Which option should she choose

PDF

Instead of manually moving an item on a slide, which command on the Shape Options tab can be used to determine location on the slide

Size and properties

Janis needs to select all the text in a single bullet point. Which action describes the easiest method to perform this task

Triple-click the text in the bulleted item

What is a placeholder for a piece of information that can change is called?

Answers

Answer:

Variable.

Explanation:

A placeholder for a piece of information that can change is called variable.

In Computer programming, a variable stores information which is passed from the location of the method call directly to the method that is called by the program.

For example, they can serve as a model for a function; when used as an input, such as for passing a value to a function and when used as an output, such as for retrieving a value from the same function.

Hence, when you create variables in a function, you can can set the values for their parameters.

For instance, to pass a class to a family of classes use the code;

\\parameter Name as Type (Keywords) = value;

\\procedure XorSwap (var a,b :integer) = "myvalue";

A host is on the 192.168.146.0 network that has a subnet mask of 255.255.255.0. The binary value of the host portion is 11010101. What is the decimal value of the host portion of the address?

Answers

Answer:

213

Explanation:

The given parameters are;

The network on which the host is on = 192.168.146.0

The subnet mast = 255.255.255.0

The binary value of the host portion = 11010101

To convert the binary value to decimal value, we proceed by multiplying each of the digits of the binary value by the corresponding power of 2, from the left to right, starting from a power of 0, and sum the result, as follows;

(11010101)₂ = (1×2⁷ + 1×2⁶ + 0×2⁵ + 1×2⁴ + 0×2³ + 1×2² + 0×2¹ + 1×2⁰)₁₀

1×2⁷+1×2⁶+0×2⁵+1×2⁴+0×2³+1×2²+0×2¹+1×2⁰= 128+64+0+16+4+1 = 213

∴ (11010101)₂ = (213)₁₀

The decimal value of 11010101 is 213.

for the ip address, 10.10.40.2/19, what is its subnet address and subnet mask in decimal?

Answers

To find the subnet address and subnet mask in decimal for the IP address 10.10.40.2/19, please follow these steps:

1. Convert the prefix length (/19) to a binary subnet mask:
  The prefix length of 19 means that the first 19 bits are set to 1, and the remaining bits are set to 0. The binary subnet mask will look like this: 11111111.11111111.11100000.00000000

2. Convert the binary subnet mask to decimal:
  11111111.11111111.11100000.00000000 in decimal is 255.255.224.0. This is the subnet mask.

3. Perform a bitwise AND operation between the IP address and the subnet mask to find the subnet address:
  IP address (in binary): 00001010.00001010.00101000.00000010
  Subnet mask (in binary): 11111111.11111111.11100000.00000000
  Subnet address (in binary): 00001010.00001010.00100000.00000000

4. Convert the binary subnet address to decimal:
  00001010.00001010.00100000.00000000 in decimal is 10.10.32.0. This is the subnet address.

Your answer: For the IP address 10.10.40.2/19, its subnet address is 10.10.32.0, and its subnet mask in decimal is 255.255.224.0.

Learn more about subnets here:

https://brainly.com/question/30995993

#SPJ11

Consider the following class definition.
public class BoolTest
{
private int one;
public BoolTest(int newOne)
{
one = newOne;
}
public int getOne()
{
return one;
}
public boolean isGreater(BoolTest other)
{
/ missing code /
}
}
The isGreater method is intended to return true if the value of one for this BoolTest object is greater than the value of one for the BoolTest parameter other, and false otherwise. The following code segments have been proposed to replace / missing code /.
return one > other.one;
return one > other.getOne();
return getOne() > other.one;
Which of the following replacements for / missing code / can be used so that isGreater will work as intended?
A.
I only
B.
II only
C.
III only
D.
I and II only
E.
I, II and III

Answers

The replacements for / missing code / can be used so that is Greater will work as intended are I, II and III.

Which statement best sums up what the arrayMethod() function performs to the array nums?The array method call will now result in a run-time error because it tries to access a character at index 7 in a string whose final element is at index 6, even though it used to function without a problem.The fetch, decode, execute cycle is the order in which a CPU runs code. When a chunk of code is placed into RAM, the CPU reads its individual components one at a time, converts them into binary using the assembler, and then runs the code.The replacements for / missing code / can be used so that is Greater will work as intended are I, II and III.

To learn more about arrayMethod() refer to:

https://brainly.com/question/21685427

#SPJ4

Two computer programs that are carefully joined together so that they appear to be a single program with a single user interface

Answers

In Computers and technology, a seamless interface is a technology in which two (2) computer programs are joined together carefully, in order to make them appear as a single software program that has a single interface for end users.

A seamless interface can be defined as a technology in mobile cloud computing (MCC) through which two (2) computer programs are carefully meshed or joined together, so as to make them appear as a single computer program with a single interface for end users.

This ultimately implies that, a seamless interface is used in providing end users a uniform interface for two or more different computer programs.

Consequently, two or more users are able to use and enjoy a two or more different computer programs through the design and development of a seamless interface without any form of obtrusiveness.

In conclusion, a seamless interface carefully joins two (2) computer programs together, so that appear as a single software program that has a single interface for end users.

Read more: https://brainly.com/question/20379777

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip), which of the following becomes even more essential to the assurance of the network? a. boundary routing b. classless inter-domain routing (cidr) c. internet protocol (ip) routing lookups d. deterministic routing

Answers

if the wide area network (wan) is supporting converged applications like voice over internet protocol (voip) internet protocol (ip) routing lookups will be even more essential to the assurance of the network.

Understanding WAN

WAN stands for Wide Area Network is a network that is used as a network that connects between local networks.  Local computer networks are not only physically adjacent to each other, but share the same group of IP addresses.  

The local network can be one room, one office or even one city.  While the WAN itself is a network that connects these local networks within a city, province or even between countries.  The difference between WAN and LAN networks is in the type of media used.  Generally local networks or LANs use similar network media.

While the WAN is connected to devices with different transmission media and protocols.  The WAN coverage area is also very wide, but unites the network as if it were in one room.  WAN networks have lower data transfer rates than local networks or LANs. WAN network technology relies on companies providing long-distance telecommunications services.  WAN networks use many kinds of network technologies with a mix of analog and digital signals for data transmission.  Of course this is different from a local network or LAN which uses a connection between computers that are physically connected to each other with the same protocol and transmission media.  The components in the WAN and their functions will be discussed later.

Learn more about WAN at https://brainly.com/question/14793460.

#SPJ4.

Name: Shabab Student ID: 27210005 Number of questions: 6 Full Score: 100.0 examination time: 2022-05-13 14:00 to 2022-05-13 15:00 1. Short 1. Short answer questions (6 questions in total, 100.0 points) 6. (Short answer, 15.0 points) (Game: scissor, rock, paper) Write a program that plays the popular scissor-rockpaper game. (A scissor can cut a paper, a rock can knock a scissot, and a paper can wrap a rock.) The program randomly generates a number 0, 1, or 2 representing scissor, rock, and paper. The program prompts the user to enter a number 0, 1, or 2 and displays a message indicating whether the user or the computer wins, loses, or draws. Here are sample runs: scissor (0). rock (1). paper (2): 1 The computer is scissor. You are rock. You won.

Answers

The program you need is a simple implementation of the scissor-rock-paper game. It generates a random number (0, 1, or 2) to represent the computer's choice, and prompts the user to enter their choice.

Based on the user's input and the computer's choice, the program determines the winner and displays the result.

To achieve this, you can use a combination of conditional statements and random number generation. Here's an example of how the program could be implemented in Python:

\begin{verbatim}

import random

# Display the options for the game

print("scissor (0), rock (1), paper (2)")

# Prompt the user for their choice

user_choice = int(input("Enter your choice: "))

# Generate the computer's choice randomly

computer_choice = random.randint(0, 2)

# Determine the winner

if user_choice == computer_choice:

   result = "It's a draw."

elif (user_choice == 0 and computer_choice == 2) or (user_choice == 1 and computer_choice == 0) or (user_choice == 2 and computer_choice == 1):

   result = "You won."

else:

   result = "You lost."

# Display the result

print("The computer chose", computer_choice)

print("You chose", user_choice)

print(result)

\end{verbatim}

In this program, the random module is imported to generate a random number between 0 and 2 for the computer's choice. The user is prompted to enter their choice, which is stored in the `user_choice` variable. The program then uses conditional statements to determine the winner based on the combination of choices. Finally, the result is displayed along with the choices made by the user and the computer.

To learn more about implementation refer:

https://brainly.com/question/29439008

#SPJ11

System software cannot handle technical details without user intervention.a. Trueb. False

Answers

System software cannot handle technical aspects without user interaction. when a single physical computer runs a specialised programme called virtualization software.

The system software is it used by the user?

Photo of Without user input, system software cannot handle technical details. The components of a computer system's user interface that enable user interaction. A user interface, sometimes referred to as a human-computer interface, is made up of both hardware and software elements. It manages communications between users and the system.

What do you describe a type of computer application that routinely executes additional tasks without user input while running in the background?

A background process is a computer operation that runs automatically without user involvement. These applications frequently handle activities related to logging, system monitoring, scheduling, and user notification.

To know more about system software visit:-

https://brainly.com/question/12908197

#SPJ4

Atieno is a musician who records music on her computer. Which devices do you think she would need the most?

Answers

Answer:

Midi Synthesizer, Mic,Boom Mic, Laptop

Explanation:

At the end of the day a keyboard and a pc is all you need as the keyboard alone can cover nearly any instrument.

Answer:

speaker and microphone

Explanation:

speaker to hear her music and microphone to record

Write a C program mywho whose behavior that closely resembles the system command who . To decide what information in what format mywho should display, run the standard who command on your computer:
​$ who
stan console Sep 17 08:59
stan ttys000 Sep 24 09:21
mywho is not expected to accept any command line arguments.

Answers

In order to create a C program called mywho that behaves similarly to the system command who, we will need to first understand what information and format the who command displays. Running the who command on our computer shows us a list of users currently logged in, along with their terminal/console and the time they logged in.

To create our mywho program, we will need to use system calls to access this information and display it in the same format as the who command. Specifically, we will use the getutent() function to access the utmpx database, which contains information about current users and their login sessions.

Our mywho program will need to loop through the entries in the utmpx database and print out the relevant information for each user in the same format as the who command. This includes the user's name, terminal/console, and login time.

Since the mywho program is not expected to accept any command line arguments, we will need to hardcode the functionality to access the utmpx database and display the information in the correct format.

Overall, the behavior of our mywho program will closely resemble the system command who by displaying information about current users and their login sessions in the same format.

Learn more about C program here:

https://brainly.com/question/30905580

#SPJ11

Check the devices that are external peripheral devices:

Check the devices that are external peripheral devices:

Answers

Answer:

Mouse, and keyboard

Explanation:

Common Sense

Using a post-test while loop, write a program that lets users enter N floating point numbers and then calculates and displays their product. The value of N must be given by the user in the beginning of the program. Python CodeHs

Answers

a = int(input("Input an integer : "))

n1 = int( "%s" % a )

n2 = int( "%s%s" % (a,a) )

n3 = int( "%s%s%s" % (a,a,a) )

print (n1+n2+n3)

is this what you want?

pls answer fast ........​

pls answer fast ........

Answers

Answer:

1,048,576 rows on MS excel worksheet

Question #2
Dropdown
Complete the sentence.
When you use
you display intermediate results to trace the program flow.

Answers

Answer:

print debugging

Explanation:

Answer:

print debugging

Explanation:

got it right

monitor is hard copy output device??
false
true​

Answers

Answer:

false

Explanation:

monitor is an output device but not hard copy. Hard copy is paper

39
1. The following situation uses a robot in a grid of squares. The robot is represented by a triangle which
is initially in the top right square and facing left. The robot may not travel through the black squares.
L
Create a solution that would enable the robot to be in the position found below using at least 2
loops.

391. The following situation uses a robot in a grid of squares. The robot is represented by a triangle

Answers

A solution that would enable the robot to be in the position found below using at least 2 loops is given below:

The Program

PROCEDURE moveRobot

{

IF (CAN_MOVE (forward))

{

ROTATE_LEFT()

}

ELSE

{

ROTATE_RIGHT ()

}
{

MOVE_FORWARD ()

}

}

The given command helps enable the robot to move in different directions, provided it can move forward, so it would be able to rotate left and right.

Read more about programming here:

https://brainly.com/question/20119860

#SPJ1

Other Questions
QUESTION 7 7.1 The fifth term of an arithmetic sequence is zero and the thirteenth term is equal to 16. Determine: the common difference In its original meaning, a ________ was a full-scale preliminary drawing executed on paper for projects such as frescoes, stained glass, oil paintings, or tapestries.Cartoon Write an inequality and then solve.9. A freight elevator can safely hold no morethan 2200 pounds. An elevator operator musttake 60-pound boxes to a storage area. If theoperator weighs 155 pounds, how many boxescan be safely moved at one time? Baseball hats are on sale for 12% off the original price of the sale price is $12.50 what was the original price? round the answer to the nearest cent why do i keep dreaming about the same person romantically On your birthday your rich uncle gave you $19000. You would like to invest at least $9500 of the money in municipal bonds yielding 3 % and no more than $4000 in Treasury bills yielding 6 %. How much should be placed in each Investment in order to maximize the interest earned in one year? Assume simple interest applies. Let x represent the amount of money in municipal bonds and y represent the amount of money in Treasury bills.Maximum income of $ = ____Maximum income at = ____ A conclusion reached on the basis of evidence and reasoning is a(n)... A) conclusion B) hypothesis C) theory D) inference Question 3 of 8Which choices are common factors of the numerator and denominator of thefraction below? Check all that apply.624A. 12B. 1C.4D.2E.3F.6 Please please need help with this one having a hard time with it. Read the following conversation and answer the questions provided below.John :" "Sam :"Please, stop day-dreaming and get back to work."What does John probably say?1Hello, Sam. How are you?2I wish I had a time machine.3I would like to invite you for dinner.4I want to get something to eat.5I hope my son gets better soon. Using PEP or PrEP can reduce the chances of becoming infected for a person exposed to HIV.TRUE OR FALSE Which of the following messages is most clearly stated?A. Please be here around 7:00 tomorrow.B. Please be here around 7:00 amC. Please be here at 7:00 am. tomorrow.D. Please be here tomorrow.Please select the best answer from the choices provided. B How do you modify WordArt? Give specific details and stepsNEED THIS ASAP |-15-7|= simply the expression What impact does the extended dog metaphor have on the tone of "Reunion"? Use evidence from the text to supportyour response. Your response should be at least one paragraph.Answer. IType your answer here. Brainliest to the correct answer :) why is the trabsitioon to parenthood difficult when compared to other adult roles such as spouse or worker what two ions are central to the arrhenius definitions of acids and bases? express your answers as ions separated by a comma. was john a hero or a murderer or both ? (jhon brown) 1859 Various financial data for Year 1 and Year 2 follow. Calculate the total productivity measure and the partial productivity measures for labor, capital, and raw materials for this company for both years. What do these measures tell you about this company? Last year This yearOutput Sales $200,000 $220,000Input Labor 30,000 40,000 Raw Materials 35,000 45,000 Energy 5,000 6,000 Capital 50,000 50,000 Other 2,000 3,000