Answer:
Explanation: Make sure its not broken
Go to a technichan
Why is sequencing important?
(A). It allows the programmer to test the code.
(B). It allows the user to understand the code.
(C). It ensures the program works correctly.
(D). It makes sure the code is easy to understand.
Answer:
C
Explanation:
If it wasn't in order then the code would fail
Answer:
C is the right answer because................
Explanation:
can anyone help me make a code in code.org
At least 2 different images per webpage.
At least 3 headers per webpage
At least 3 paragraphs per web page.
A nav bar properly hyperlinking one web page to another (the secondary web page should have a "Home" or "Return to main page" hyperlink.
A background color that is NOT white.
Two CSS Classes per webpage altering elements in some way.
active cell is indentifed by its thick border true or false
Answer: It's identifed by its thick border so its true
Normally used for small digital displays
Answer:
LCD screens would be used for students using smaller devices in the classroom, like iPads or handheld touchscreens
which of the following operating system does not implement multitasking truly?a.MS DOS b.Windows NT c.Windows 10 d.Windows XP e.Windows 98
Answer:
I believe it's A. MS DOS.
Data analytics benefits both financial services consumers and providers by helping create a more accurate picture of credit risk.
True
False
Answer:
True
Explanation:
Alyssa Steiner volunteers at an animal shelter and helps with their fundraising efforts. She has shot a video of the animals and wants to post it on the web to encourage donations. However, the video she shot is a huge MOV file. What can Alyssa do to reduce the size of the video to about 20 MB so it loads quickly on the shelter’s webpage?
Answer:
See Explanation
Explanation:
Required
What to do, to upload a large video on a webpage
Alyssa has several options to pick from, one of which is to divide the videos into various segments and then upload each segment separately or to compress the huge MOV file and then upload.
Of the two options I highlighted in the first paragraph, the best is to compress the video using a video compressor software and then upload the compressed video.
Also; MOV files are always huge files, she could convert the video file from MOV file format to mp4 or other compatible video formats. However, this will reduce the video quality (though the reduction may not be visible).
Ok who tryna play zombs royale
Answer:
you are
Explanation:
Answer:
Ay yoooo wsp
need help will give brainiest
Danika has a checklist of things she’s using to make sure that her research sources are valid. She already knows that she needs to confirm the facts claimed by a source and check the sources they use. What else does she need to do?
A.
classify the style of writing
B.
confirm if another classmate has used them
C.
research the author of each piece
D.
understand the genre the piece belongs to
Danika has a checklist of things she’s using to make sure that her research sources are valid. She needs to do is researching the author of each piece. The correct option is C.
What is research?Research is a systematic inquiry process that includes data collection, documentation of important information, analysis, and interpretation of that data and information in accordance with appropriate methodologies established by particular academic and professional disciplines.
Action-informing research is its goal. As a result, your study should attempt to place its findings in the context of the wider body of knowledge.
Therefore, the correct option is C. research the author of each piece.
To learn more about research, refer to the below link:
https://brainly.com/question/18723483
#SPJ1
Digital exclusion also known as the digital divide separates
The digital exclusion is being conceptualized as a state in which an individual is deprived of the use of information technologies, either due to insufficient means of access, lack of knowledge or lack of interest.
What are the main causes of the digital divide?Long-felt inequalities between the rich and entering the digital age tend to expand with the same and new technologies. Pierre Lévy, French philosopher, thinker of technology and society, stated that: “every new technology creates its excluded”.
The digital divide is a term that refers to the gap between demographics and regions that have access to modern information and communications technology (ICT), and those that don't or have restricted access. This technology can include the telephone, television, personal computers and internet connectivity.
See more about digital exclusion at brainly.com/question/14485114
#SPJ1
Write a program that lets the user enter the total rainfall for each of 12 months into a vector of doubles. The program will also have a vector of 12 strings to hold the names of the months. The program should calculate and display the total rainfall for the year, the average monthly rainfall, and the months with the highest and lowest amounts.
Answer:
Explanation:
#include<iostream>
#include<iomanip>
#include<vector>
using namespace std;
double getAverage(const vector<double> amounts)
{
double sum = 0.0;
for (int i = 0; i < amounts.size(); i++)
sum += amounts[i];
return(sum / (double)amounts.size());
}
int getMinimum(const vector<double> amounts)
{
double min = amounts[0];
int minIndex = 0;
for (int i = 0; i < amounts.size(); i++)
{
if (amounts[i] < min)
{
min = amounts[i];
minIndex = i;
}
}
return minIndex;
}
int getMaximum(const vector<double> amounts)
{
double max = amounts[0];
int maxIndex = 0;
for (int i = 0; i < amounts.size(); i++)
{
if (amounts[i] > max)
{
max = amounts[i];
maxIndex = i;
}
}
return maxIndex;
}
int main()
{
vector<string> months;
vector<double> rainfalls;
months.push_back("January");
months.push_back("February");
months.push_back("March");
months.push_back("April");
months.push_back("May");
months.push_back("June");
months.push_back("July");
months.push_back("August");
months.push_back("September");
months.push_back("October");
months.push_back("November");
months.push_back("December");
cout << "Input 12 rainfall amounts for each month:\n";
for (int i = 0; i < 12; i++)
{
double amt;
cin >> amt;
rainfalls.push_back(amt);
}
cout << "\nMONTHLY RAINFALL AMOUNTS\n";
cout << setprecision(2) << fixed << showpoint;
for (int i = 0; i < 12; i++)
cout << left << setw(11) << months[i] << right << setw(5) << rainfalls[i] << endl;
cout << "\nAVERAGE RAINFALL FOR THE YEAR\n" << "Average: " << getAverage(rainfalls) << endl;
int minIndex = getMinimum(rainfalls);
int maxIndex = getMaximum(rainfalls);
cout << "\nMONTH AND AMOUNT FOR MINIMUM RAINFALL FOR THE YEAR\n";
cout << months[minIndex] << " " << rainfalls[minIndex] << endl;
cout << "\nMONTH AND AMOUNT FOR MAXIMUM RAINFALL FOR THE YEAR\n";
cout << months[maxIndex] << " " << rainfalls[maxIndex] << endl;
return 0;
}
StateChart Based Testing:
The following StateCart represent the behavior of the Wiper of the winshield wiper case study.
Wiper 0 wipes/minute InState(Int) InState(Off) 6 wipes/minute InState(2) InState(1) InState(1),( InState(2)12 wipes/minute InState(3) InState(2) InState(3) 20 wips/minute InState(Low) InState Int) 30 wipes/minute InState(High) InState Low) 60 wipes/minute
a) Design test cases based on the segment of the StateChart shown below. Your test cases
should cover all state transitions shown in the given state diagram. Represent your test
cases in a table.
b) Implement Junit test cases to implement your test cases designed above (a)
c) Use case based testing: Consider the following usage scenario.
i.) Design test cases to test the scenario given.
ii.) Implement Junit test cases to implement your test cases designed above (c)
Assume that when lever and dial changes, they do not need to follow any sequential order. For
example, dial can go from 1 to 3 without staying at level 2.
Models have been shown to be useful in a number of software engineering activities, although model-driven development still faces a lot of opposition.
This essay examines a particular facet of the overall issue. It discusses the results of testing class clusters with state-dependent behavior using statecharts. It details a controlled experiment that looked into their effects on evaluating fault-detection efficiency. Statechart-based testing and code-based structural testing are contrasted, and their software is examined to see if they work better together. The effectiveness of the two test procedures in detecting faults is not significantly different, according to the results, but when combined, they are significantly more effective. This suggests that a cost-effective approach would specify statechart-based test cases in advance, run them once the source code is available, and then finish them with test cases based on code coverage analysis.
Know more about software here:
https://brainly.com/question/1022352
#SPJ4
Which type of threat is a simple packet filtering firewall effective at protecting?
Answer:
A simple packet filtering firewall is effective at protecting against network-based threats such as denial of service (DoS) attacks, port scans, and other types of malicious traffic that target specific ports or IP addresses. It is not as effective at protecting against more sophisticated threats such as malware or phishing attacks, which require a different type of protection.
Packet Filter Firewall is the type of threat is a simple packet filtering firewall effective at protecting.
What is simple packet filtering?
A simple packet filtering firewall has been effective at protecting against network-based threats which are such as the denial of the service (DoS) attacks, or the port scans, and other types of the malicious traffic that has the target specific ports or the IP addresses.
It has no effect such as it has meant there at protecting against more sophisticated threats such as malware or phishing attacks, which require a different type of protection.
Packet Filtering Firewall has been responsible for the filtering the packets which is based on the IP addresses as well as the source and destination, source and destination port the numbers and also the source and the destination protocols. These firewalls has been operate at the junctions such as the switches and the routers.
Therefore, Packet Filter Firewall is the type of threat is a simple packet filtering firewall effective at protecting.
Learn more about Packet Filter Firewall on:
https://brainly.com/question/13098598
#SPJ2
In the above question options are missing, so the expected options are
Application layer firewall
stateful firewall
packet filter firewall
MAC filter firewall
Are AWS Cloud Consulting Services Worth The Investment?
AWS consulting services can help you with everything from developing a cloud migration strategy to optimizing your use of AWS once you're up and running.
And because AWS is constantly innovating, these services can help you keep up with the latest changes and ensure that you're getting the most out of your investment.
AWS consulting services let your business journey into the cloud seamlessly with certified AWS consultants. With decades worth of experience in designing and implementing robust solutions, they can help you define your needs while executing on them with expert execution from start to finish! AWS Cloud Implementation Strategy.
The goal of AWS consulting is to assist in planning AWS migration, design and aid in the implementation of AWS-based apps, as well as to avoid redundant cloud development and tenancy costs. Project feasibility assessment backed with the reports on anticipated Total Cost of Ownership and Return on Investment.
Learn more about AWS consulting, here:https://brainly.com/question/29708909
#SPJ1
The first phase of setting up an IPsec tunnel is called ___________
Answer:
Internet Key Exchange
Explanation:
The first phase, setting up an IPsec tunnel, is called IKE phase 1. There are two types of setting up an IPsec tunnel.
What is an IPsec tunnel?Phase 1 and Phase 2 of VPN discussions are separate stages. Phase 1's primary goal is to establish a safe, encrypted channel for Phase 2 negotiations between the two peers. When Phase 1 is successfully completed, the peers immediately begin Phase 2 negotiations.
When two dedicated routers are deployed in IPsec tunnel mode, each router serves as one end of a fictitious "tunnel" over a public network. In IPsec tunnel mode, in addition to the packet content, the original IP header containing the packet's final destination is also encrypted.
Therefore, the first phase, setting up an IPsec tunnel, is called IKE phase 1.
To learn more about IPsec tunnel, refer to the link:
https://brainly.com/question/14364468
#SPJ5
HI can someone help me write a code.
Products.csv contains the below data.
product,color,price
suit,black,250
suit,gray,275
shoes,brown,75
shoes,blue,68
shoes,tan,65
Write a function that creates a list of dictionaries from the file; each dictionary includes a product
(one line of data). For example, the dictionary for the first data line would be:
{'product': 'suit', 'color': 'black', 'price': '250'}
Print the list of dictionaries. Use “products.csv” included with this assignment
Using the knowledge in computational language in python it is possible to write a code that write a function that creates a list of dictionaries from the file; each dictionary includes a product.
Writting the code:import pandas
import json
def listOfDictFromCSV(filename):
# reading the CSV file
# csvFile is a data frame returned by read_csv() method of pandas
csvFile = pandas.read_csv(filename)
#Column or Field Names
#['product','color','price']
fieldNames = []
#columns return the column names in first row of the csvFile
for column in csvFile.columns:
fieldNames.append(column)
#Open the output file with given name in write mode
output_file = open('products.txt','w')
#number of columns in the csvFile
numberOfColumns = len(csvFile.columns)
#number of actual data rows in the csvFile
numberOfRows = len(csvFile)
#List of dictionaries which is required to print in output file
listOfDict = []
#Iterate over each row
for index in range(numberOfRows):
#Declare an empty dictionary
dict = {}
#Iterate first two elements ,will iterate last element outside this for loop because it's value is of numpy INT64 type which needs to converted into python 'int' type
for rowElement in range(numberOfColumns-1):
#product and color keys and their corresponding values will be added in the dict
dict[fieldNames[rowElement]] = csvFile.iloc[index,rowElement]
#price will be converted to python 'int' type and then added to dictionary
dict[fieldNames[numberOfColumns-1]] = int(csvFile.iloc[index,numberOfColumns-1])
#Updated dictionary with data of one row as key,value pairs is appended to the final list
listOfDict.append(dict)
#Just print the list as it is to show in the terminal what will be printed in the output file line by line
print(listOfDict)
#Iterate the list of dictionaries and print line by line after converting dictionary/json type to string using json.dumps()
for dictElement in listOfDict:
output_file.write(json.dumps(dictElement))
output_file.write('\n')
listOfDictFromCSV('Products.csv')
See more about python at brainly.com/question/19705654
#SPJ1
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Addresses and hosts, what does she scan next on the target's network to see if any are open
After a Hacker has selects her target, the thing she scan next on the target's network to see if any are open System Ports.
How do hackers scan ports?In port scan, hackers often send a message to all the port, once at a time. The response they tend to receive from each port will help them to known if it's being used and reveals the various weaknesses.
Security techs often conduct port scanning for a lot of network inventory and to show any possible security vulnerabilities.
Learn more about Hacker from
https://brainly.com/question/23294592
Who is the father of television?
Answer:
Philo Farnsworth
Explanation:
American inventor Philo Farnsworth, full name Philo Taylor Farnsworth II, was born on August 19, 1906 in Beaver, Utah, and passed away on March 11, 1971 in Salt Lake City, Utah. He created the first all-electronic television system.
"Documentation written for programmers should include text and program flowcharts, ________, and sample output as well as system flowcharts.
A) Pseudocode
B) Logic errors
C) Program listings
D) Syntax errors"
Documentation written for programmers should include text and program flowcharts, Program listings, and sample output as well as system flowcharts. Thus, the correct option is option C.
What is program flowchart?The program flowchart is a data flow that depicts the data flow while writing a program or algorithm. When working with others, it enables the user to quickly explain the process. These flowcharts for programming also examine the reasoning behind the program to process the programming code.
The use of programming flowcharts is varied. For instance, they can examine, visualize, and work with the codes. In order to understand how a user uses a tool, they can also assist in determining the structure of the application.
The condition and effectiveness of work are improved by the use of programming flowcharts. The device has four fundamental symbols with programming code written on them.
Learn more about flowchart
https://brainly.com/question/6532130
#SPJ1
Which of these are tools used to diagnose and test code? Check all of the boxes that apply.
debugging software
creating data sets
compiler software
error messages
Answer:
A C D
Explanation:
Answer:
Correct
Explanation:
Which of the following is part of the process of publishing a website?
O advertising a website on a search engine
O printing a copy of all website pages
O uploading its web pages to the host directory
Ocreating web pages using templates
Calendar exceptions can be used for all of the following variations from a workweek, except:
Calendar exceptions can be used for all of the variations mentioned except multiple days with working times that vary from day to day
What is the Calendar exceptions?Calendar exceptions are a way to define specific dates or ranges of dates that differ from the normal work schedule, and can be used to represent holidays, company-wide meetings, non-working periods such as factory maintenance, or multiple days with working times that vary from day to day.
Therefore, By using calendar exceptions, you can ensure that the schedule accurately reflects the actual availability of resources and avoids scheduling conflicts.
Read more about Calendar exceptions here:
https://brainly.com/question/21852427
#SPJ1
Calendar exceptions can be used for all of the following variations from a workweek, except:
Select an answer:
multiple days with working times that vary from day to day
a multi-day non-working period such as factory maintenance
a recurring event such as a company-wide meeting
a holiday
I need help please!!
Answer:
d is the answer
in tabular form differentiate the first four generations of computer
Answer:
Explanation:
See attachment.
Flowchart in programming
Answer:
?
Explanation:
For a given gate, tPHL = 0.05 ns and tPLH = 0.10 ns. Suppose that an inertial delay model is to be developed from this information for typical gate-delay behavior.
Assuming a positive output pulse (LHL), what would the propagation
delay and rejection time be?
The rejection time (time for the output to remain stable at low after input changes from high to low) is also 0.05 ns.
How to determine the delaysPropagation Delay:
The propagation delay (tPHL) is given as 0.05 ns (nanoseconds).
This represents the time it takes for the output to transition from a high to a low level after the input changes from a high to a low level.
Propagation Delay (tPHL) = 0.05 ns
Rejection Time:
The rejection time (tRHL) is the minimum time required for the output to remain stable at a low level after the input changes from a high to a low level before the output starts to transition.
Rejection Time (tRHL) = tPHL
Hence = 0.05 ns
Therefore, for the given gate and assuming a positive output pulse (LHL):
Read more on delay model here https://brainly.com/question/30929004
#SPJ1
Maya and Darius are using the software development life cycle to develop a career interest app. They wrote the program pseudocode and have a mock-up of how the software will look and how it should run. All their work at this step has been recorded in a design document. What should the team do next?
Analyze the scope of the project
Design the program by editing pseudocode
Identify bugs and document changes
Write the program code
Answer:
write the program code
Explanation:
What is the function of tab?
Answer:
The function of the tab is used to advance the cursor to the next tab key.
Can you provide an example of how computer programming is applied in real-
world situations?
An example of how computer programming is applied in real world situations is the use of traffic lights.
How is this so?
The traffic flow data is processed by the computer to establish the right sequence for the lights at junctions or ramps. The sequencing information is sent from the computer to the signals via communications equipment.
INRIX Signal Analytics is the first cloud-based solution that harnesses big data from linked automobiles to assist traffic experts in identifying and understanding excessive delays at signalized junctions throughout the country — with no hardware or fieldwork required.
Learn more about computer programming:
https://brainly.com/question/14618533
#SPJ1
Most of the indentured servants in the American colonies were born in. A. Africa B. Asia OC. South America OD. Europe
Answer:Europe
Explanation: Just took it