Build the Photo Liker app, using your activity guide to help you plan. When you’re done, submit your work. (Unit 4, Lesson 4 code. Org)

Answers

Answer 1

The steps a person can use in building a photo liker application are:

Decide on the platform to use it onSet out the featuresMake the user interfaceImplement the code for itTest the applicationGive out the application

What are the steps in  building a photo liker?

In the aspect of finding out the platform, one can note that their app be made for iOS, Android, as well as web-based. By taking note of this, they can be able to know the programming language as well as development tools that they will need for the application building.

Lastly, in terms of defining the features, one need to know about the functionality that they will need in their  app have such as the need of users be able to go through photos, like etc.

Learn more about application  from

https://brainly.com/question/27359435

#SPJ1


Related Questions

Complete the static method stringSearch, which returns a String that tells where the first occurrence of the characters (chr) were found ("The characters were found at ____ index.") or it says, "Those characters could not be found." The String to be searched (phrase) and the characters that are being looked for (chr) are passed in as arguments. (9 points) public static String stringSearch (String phrase, String chr) { ** Complete the code ** }

Answers

Well can't do it for you but try using that phrase argument with string compare functionality

Select the correct answer.
Which letter will be uppercase in the below sentence?

she will have exams next week.

A.
s in she
B.
h in have
C.
e in exams
D.
w in week
E.
n in next

Select the correct answer.Which letter will be uppercase in the below sentence?she will have exams next

Answers

Answer:D

Explanation:

4.Use the nslookup command tot determine the name of the authoritative name server for the iit.ac.in domain. What is the name

Answers

To use the nslookup command to determine the name of the authoritative name server for the iit.ac.in domain, you need to follow the steps below:Step 1: Click the start button, and search for the command prompt.

Step 2: Launch the command prompt, and type nslookup and press the enter button.Step 3: Then type "set type=ns" (without quotes) and press enter. This sets the query type to Name Server (NS).Step 4: Type the domain name, i.e., iit.ac.in and press enter.

Step 5: The response will show the authoritative name server for the domain. The authoritative name server for the iit.ac.in domain is dns2.iitd.ernet.in.So, the name of the authoritative name server for the iit.ac.in domain is dns2.iitd.ernet.in.

To know more about nslookup command visit:

https://brainly.com/question/32106470

#SPJ11

1. what is the internet infrastructure stack? what is the relevance of this technological concept to marketers? what is the significance of cloud computing in relationship to the internet infrastructure? who is the leader in cloud computing for third parties by revenue, cisco, ibm, , or amazon?

Answers

The correct answer is Internet infrastructure stack are sets of hardware and services combined together which helps in making the data and information available on the web page.

Any hardware component that is housed inside a computer. a set of guidelines or software that instructs a computer on what to do or how to carry out a certain task (computer software runs on hardware). a computer application that gives users the resources they need to do a certain task. any hardware component that is housed inside a computer. a set of guidelines or software that instructs a computer on what to do or how to carry out a certain task (computer software runs on hardware). a computer application that gives users the resources they need to do a certain task.

To learn more about hardware  click on the link below:

brainly.com/question/15232088

#SPJ4

lab 6 write a program to input names and addresses that are in alphabetic order and output the names and addresses in zip code order. you could assume maximum of 50 names. the program should be modalized and well documented. you must: 1. use a structure for names and address information 2. allocate storage dynamically for each structure (dynamic memory allocation) 3. use input/output redirection 4. use an array of pointers to structures; do not use an array of structures 5. use multiple file format; header file, multiple .c files 6. sort the zip codes in ascending order 7. use the data file assigned

Answers

Implementing this program requires detailed coding, handling file input/output, dynamic memory allocation, sorting algorithms, and proper error handling. It's recommended to consult programming resources, documentation, or seek guidance from a programming instructor or community to ensure accurate implementation.

Certainly! Here's a step-by-step explanation for implementing the program you described:

Define a structure to hold the name and address information, including the zip code.Use dynamic memory allocation to allocate memory for each structure as names and addresses are inputted from the file.Read the names and addresses from the input file, storing them in the dynamically allocated structures.Create an array of pointers to the structures, with each pointer pointing to a structure.Implement a sorting algorithm (such as bubble sort or merge sort) to sort the array of pointers based on the zip codes in ascending order.Use input/output redirection to read from the input file and write to the output file.Create separate header and source files for modularization, placing the structure definition, function prototypes, and shared constants in the header file, and the function implementations in separate .c files.Open the assigned data file, call the necessary functions to perform the sorting and outputting, and then close the files.

Remember to include appropriate error handling, such as checking file openings and memory allocations, to ensure the program runs smoothly and handles potential errors gracefully.

For more such question on dynamic memory allocation

https://brainly.in/question/55000065

#SPJ8

dlp/dcm plug and play devices can be identified by

Answers

dlp/dcm plug and play devices can be identified by Device classes.

The most prevalent kind, dilated cardiomyopathy (DCM), primarily affects adults under the age of 50. It affects the bottom and upper chambers of the heart, the ventricles and atria.

The left ventricle, the heart's primary pumping chamber, is where the disease frequently develops first. The heart muscle starts to widen, stretch, and get a little bit thinner. The interior of the chamber therefore grows. The right ventricle is frequently affected before the atria.

Low to moderate seismicity level in Norway; almost exclusive use of DCL (non-dissipative structures); capacity-design inherent in DCM, but not a common design approach.

To know more about DCM:

https://brainly.com/question/29869389

#SPJ4

int sum = 0; for(int i = 10; i > 0; i -= 3) { sum = i; } .println(sum); what value does the preceding fragment display?

Answers

The preceding code fragment will display the value "1". The code initializes a variable sum to 0.

It then enters a loop where it starts with i equal to 10 and decrements i by 3 in each iteration (i -= 3). Inside the loop, the value of i is assigned to the variable sum (sum = i). The loop will exec te for three iterations: i = 10, sum is assigned the value 10. i = 7, sum is assigned the value 7  Therefore, when System. out println(sum) is executed, it will display the value "1" on the console.

Learn more about fragment here;

https://brainly.com/question/10596402

#SPJ11

define business systems​

Answers

A business system is a group of interdependent elements or tasks that meet a business objective. You should document every step for each business process or activity. Business activities consistently produce results. Strategizing how you complete these tasks can help streamline daily operations.

An algorithm must have?

Answers

Answer:

Precision – the steps are precisely stated(defined).

Uniqueness – results of each step are uniquely defined and only depend on the input and the result of the preceding steps.

Finiteness – the algorithm stops after a finite number of instructions are executed.

Also:

Input specified.

Output specified.

Definiteness.

Effectiveness.

Finiteness.

Explain the function of cpu what are work done by cu ,alu,and mu

Answers

Answer:

The CPU processes instructions it receives in the process of decoding data.

An arithmetic logic unit (ALU) is a digital circuit used to perform arithmetic and logic operations. It represents the fundamental building block of the central processing unit (CPU) of a computer. Modern CPUs contain very powerful and complex ALUs. In addition to ALUs, modern CPUs contain a control unit (CU). While the memory unit (MU), is the primary memory for holding data. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to a program's instructions.

Hope this helps! :)

What is the result of adding 1234.5674 and
45.67843 if you round to the nearest thousandth BEFORE the addition?

A. 1280.24543

B. 1280.246

C. 1280.245

D. 1280.24

Answers

Answer:

C. 1280.245

Explanation:

1234.567 + 45.678 = 1280.245

Why are smartphones and tablets capable of handling rich content and interactivity?

Answers

Answer:

Explanation:

With the advance in technology, smartphones, and tablets are built to meet the ever-increasing needs of users.

Smartphones are mobile phones that also have internet connectivity, they can be used to make calls and perform many tasks just like the conventional desktop. Smartphones and tablets are indeed considered computers because they also process inputs in form of commands and they produce outputs.

Smartphones and tablets are capable of handling rich content and interactivity because:

1. Wireless synchronization with other devices: Just like desktops, laptops, they can interact with other devices, and can receive and also send information doesn't matter the distance.

2. They have Internet connectivity.

3. They have strong hardware, good storage capacity.

4. They have inbuilt software and are capable of accepting other software and programs.

5. They are built with an appealing user interface.

6. Just as computers have processors, smartphones and tablets also have processors to ensure their speed at processing informations.

Write a for loop that uses the print function to display the integers from 10 down to 1 (including 10 & 1) in decreasing order

Answers

Answer:

ill do this in Java, C# and C++

Java:

       for(int i = 10; i >=1; i--)

       {

           System.out.println(i);

       }

C#:

       for(int i = 10; i >=1; i--)

       {

           Console.WriteLine(i);

       }

C++:

       for(int i = 10; i >=1; i--)

       {

           cout << i << endl;

       }

A workstation at work is found to be unsecured. The account used on the computer does not have a password, the data is not encrypted, and the computer itself is located in an area with easy access. This particular workstation contains personal information about its customers. In regards to the regulation of data, which is being compromised?
A) PII
B) PHI
C) PCI
D) GDPR

Answers

PII is being compromised Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means.

What is meant by Encryption of data?Data encryption is a technique for converting plaintext (unencrypted) data to ciphertext (encrypted). The use of an encryption key and a decryption key allows users to access encrypted and decrypted data, respectively. Significant volumes of private data are managed and kept online, either on servers connected to the cloud. Sensitive information should be protected from hackers via encryption, which is a key strategy for both individuals and businesses. Websites that transmit credit card and bank account details, for instance, encrypt sensitive data to guard against fraud and identity theft. Data encryption changes plaintext data from a readable format to ciphertext, an unreadable format. Only once the data has been decrypted may users and processes read and use it. The decryption key needs to be secured against unwanted access because it is confidential.

To learn more about PII  refer to:

https://brainly.com/question/29829548

#SPJ4

a company is considering a cloud environment to improve the operating efficiency for their data and applications. the company is part of an industry where strict security and data privacy issues are of the highest importance. which type of cloud would be a good choice? group of answer choices application cloud

Answers

A company is considering a cloud environment to improve the operating efficiency of its data and applications. The company is part of an industry where strict security and data privacy issues are of the highest priority.  The kind of cloud that would be a good choice for the company is "Private Cloud".

What is a private cloud?

A private cloud is a specialized cloud computing environment for a single user. Many of the advantages of cloud computing are combined with the security and management of on-premises IT infrastructure.

A virtual private cloud is an on-demand adjustable pool of shared resources assigned inside a public cloud environment that provides some amount of separation between the companies that use the resources.

Many businesses prefer private cloud to public cloud (cloud computing services offered on an infrastructure shared by several customers) because private cloud is a more convenient (or the only) way to fulfill regulatory compliance requirements.

Learn more about the private cloud:
https://brainly.com/question/27108963
#SPJ1

1. Word Module 2 SAM Textbook Project

2. Word Module 2 SAM Training

3. Word Module 2 SAM End of Module Project 1

4. Word Module 2 SAM End of Module Project 2

5. Word Module 2 SAM Project A

6. Word Module 2 SAM Project B

Answers

The raise To Power Module of the program's calling error can be found in the real and integer values of the argument variables.

String should be spelled Sting. The set Double Module instead of returning an integer, does such. Access to local variables declared in the Main module is restricted to that module only. The raise To Power Module of the program's calling argument variables' real and integer values can be used to pinpoint the issue. Although the arguments for the raise To Power Module (Real value and Integer power) have been defined. The integer power is represented as "1.5," and the real value is supplied as "2." A real number, on the other hand, is a number with a fractional part. thus, a number without a fraction is considered an integer. 1.5 is a real number, whereas 2 is an integer. The parameters' contents when invoking raise To Power.

Learn more about The raise To Power Module here:

https://brainly.com/question/14866595

#SPJ4

anti-malware software fails to detect a ransomware attack that is supposed to be within its capabilities of detecting. what is this an example of?

Answers

When anti-malware software fails to detect a ransomware attack that is supposed to be within its capabilities of detecting, it is an example of a False Negative.The term false negative refers to the error that arises when a test result suggests that a condition is absent when it is actually present.

It is most often used in medical diagnosis, but it can also apply to other fields where testing is done, such as computer security.The occurrence of false negatives in computer security is undesirable. It means that malicious software is able to bypass the computer's security defenses. False negatives may result from the anti-malware program being outdated, misconfigured, or simply not recognizing a new or uncommon type of malware.To reduce the likelihood of false negatives, it is recommended that anti-malware software be kept up to date with the most recent signatures and definitions. In addition, a multi-layered approach to security, combining several tools and techniques, can help to minimize the risk of a single tool failing to detect a threat.The minimum length of the answer should be 100 words. The above answer consists of 150 words.

To know more about anti-malware visit:

https://brainly.com/question/29064342

#SPJ11

What type of loop allows you to indicate the starting value for the loop control variable, the test condition that controls loop entry, and the expression that alters the loop control variable, all in one convenient place

Answers

Answer:

I think it's a for loop.

A for loop looks like:

for (starting statement; condition that is true; condition applied to iteration)

Explanation:

8.3 Lesson practice question 4

Answers

Answer:

WHERE'S THE QUESTION....

Explanation:

SORRY I CANNOT ANSWER IT RIGHT NOW DOES'NT HAVE A QUESTION THANK YOU

Mark and Anthony are business partners of a franchised bakery. They have reached the end of the current financial year, and they assume that they must pay taxes. Since they have a partnership agreement, what must they submit?
A.
income tax return
B.
information return
C.
IRS tax claim
D.
article of organization

Answers

B. Information Return

Which one is called the Information Super Highway? a. E-mail b. Mobile phone c. Internet d. Land phone

class 6 ​

Which one is called the Information Super Highway? a. E-mail b. Mobile phone c. Internet d. Land phoneclass

Answers

Answer:

c

Explanation:

Answer C
Explanation:

AAA DRIVER'S ED has anyone done this before??? and they know the answer?? bc its not working

AAA DRIVER'S ED has anyone done this before??? and they know the answer?? bc its not working

Answers

The correct sequence for the driver's ED test is:

Check gaugeStart engineRelease keyCheck lightsLet engine idleCheck if gear is in parkCheck parking brakeFoot on brake pedal

What is a Driving Test?

This refers to the official test of how competent a driver is to ride on the highway and must be passed in order to get a driving license.

Hence, we can see that when taking a driver's test, you would be tested on your knowledge of starting a car, checking the gauges and parking brakes, and the correct sequence of doing it.

Read more about driving test here:

https://brainly.com/question/2666433

#SPJ1

Answer: Mine was not working either, it said it was wrong even though i did it correctly, here is the proper sequences:

Explanation:

AAA DRIVER'S ED has anyone done this before??? and they know the answer?? bc its not working

The first time a user launches the PowerPoint program, which view is shown allowing the user to access recent

presentations or create new presentations based on templates?

Answers

Answer:Click file, go to NEW then you can choose the template you would like to use to create your presenation.

Explanation:

Answer:

It might be edit view

Explanation:

which of the following was the first full-length film to be done completely in 3-D imaging

*star wars
* toy story
*tron
*wall-e

Answers

Toy story I believe is the answer

Answer: toy story

Explanation:Toy Story (1995) is the first completely computer-generated, animated feature film. The visuals were entirely generated from computers. creating a wonderfully-realistic 3-D world with lighting, shading, and textures.


Please I need help
How does a hyperlink function in an Outlook message?
When the hyperlink is selected, a web page opens inside the message.
When the hyperlink is selected, a web page opens in the default browser.
When the message is opened, the hyperlink automatically opens a web page
When the message is opened, a web page displays in a special preview window

Answers

Answer:

The way hyperlinks function in an Outlook message is;

When the hyperlink is selected, a web page opens in the default browser

Explanation:

An hyperlink connects a user to another object

When an hyperlink is selected in an Outlook message, the window currently viewed changes from Microsoft Outlook message reading pane to the default browser or application that handles the information type to which the hyperlink address is pointing in the operating system

In Windows 10, the default browser is Microsoft Edge, and the default mail application is Windows Mail. Therefore, clicking an hyperlink in Outlook that links to a web page opens the default browser which is Microsoft Edge, while clicking on an email link in an Outlook message opens Windows Mail

A software program that allows you to create professional looking multimedia presentations. Question 1 options: Excel 365 Word 365 Access 365 PowerPoint 365.

Answers

Powerpoint is a program that allows  us to create professional looking multimedia presentations.

What is Multimedia presentations?

A multimedia presentation is a way of communication where we use audio,vedio,arts,drawings and other various ways to present communcations.

Why Ms-PowerPoint ?

Ms-PowerPoint consists of some simple and understandable features to make notes through slides create vedio and vedio editing, Coral Draws Audio editing etc.

We can create banners,record vedios,draw and design with the help of tools provided by powerpoint.

Powerpoint also helps to transform boring presentation to an eye catching presentation.

Learn more about PowerPoint here:https://brainly.com/question/10117380

The ____ phase is the next logical step in the project. The assessment includes an analysis of what technology is in use

Answers

The project plan is put into action and the project work is completed during the third phase, the implementation phase.

During implementation, it is critical to maintain control and communicate as needed. The Initiation Phase is the stage of the project lifecycle in which the project proposal is defined, assessed, and then approved for implementation by the Project Sponsor and the Vice Chancellor/Chief Information Officer. Each kid contributes to the representation of what he or she is learning, and each child can work at his or her own level in terms of basic skills, building, drawing, music, and dramatic play.

Learn more about information here-

https://brainly.com/question/15709585

#SPJ4

Mike is watching his calories. He is also interested in tracking his daily physical activity and how it affects his weight loss. What might help him do this

Answers

To track his daily physical activity and weight loss progress, Mike can use a fitness tracker or a mobile app.

To help Mike track his daily physical activity and its impact on his weight loss, he can consider using a fitness tracker or a mobile app. These tools typically have features that allow users to input their daily calorie intake, track their physical activities, and monitor their weight loss progress.

1. Fitness trackers and mobile apps offer features that allow users to input their daily calorie intake, track their physical activities, and monitor their weight loss progress. This helps individuals like Mike keep a record of their activities and understand how it affects their weight loss goals.
2. By utilizing a fitness tracker or mobile app, Mike can easily track his daily physical activity and monitor its impact on his weight loss journey. This information can provide valuable insights and help him make informed decisions to achieve his calorie and weight loss goals.

Learn more about physical activity visit:

https://brainly.com/question/14338730

#SPJ11

I use the wrap text feature in Excel daily. What is the difference in how this behaves or is used in Excel versus Word? Please explain in detail the differences and similarities.

Answers

The wrap text feature is an essential tool used to format text, particularly long texts or data within a cell in Microsoft Excel. In this question, we need to explain the difference between how wrap text behaves in Microsoft Excel versus how it is used in Microsoft Word.

Wrap Text in Microsoft Excel: Wrap text in Excel is a formatting option that is used to adjust text or data within a cell. When the text entered exceeds the size of the cell, it can be hard to read, and this is where wrap text comes in handy. Wrap text in Excel automatically formats the data within the cell and adjusts the text size to fit the cell's width. If a cell contains too much data to fit in the column, the cell's text wraps to the next line within the same cell.

To wrap text in Excel, follow these simple steps:

Select the cell or range of cells containing the text that needs wrapping. Right-click on the selected cell and click Format Cells. In the Format Cells dialog box, click on the Alignment tab. Click the Wrap text option and then click OK.

Wrap Text in Microsoft Word: In Microsoft Word, the Wrap Text feature is used to format text around images and graphics. It is used to change the way the text flows around the image, allowing users to position images and graphics in the document. Wrap Text in Microsoft Word does not adjust the font size of the text to fit the width of the cell like in Excel.

To wrap text in Microsoft Word, follow these simple steps:

Insert the image in the document. Select the image and go to the Picture Format tab. Click on Wrap Text, and you can choose how you want the text to wrap around the image.

The main difference between the use of Wrap Text in Microsoft Excel and Microsoft Word is that Wrap Text in Excel is used to format long data and adjust text size to fit the width of the cell while Wrap Text in Microsoft Word is used to format text around images and graphics.

To learn more about wrap text, visit:

https://brainly.com/question/27962229

#SPJ11

Similarities between Off-site and On-site

Answers

Answer:

As adjectives the difference between onsite and offsite

is that onsite is on or at a site while offsite is away from a main location; in a place not owned by a particular organisation.

Other Questions
If m=5 and n = 2, find the value of 3mn Calculate the exhaust diameter (in metres) we would expect from the ideal ramjet at a mass flow of 0.0435 kg 5-1 Mach = 4, at Tatm = 216.65 K and Patm = 7505 Pa if the combustion chamber is at To=2400 K. P y=7/3x - 11/8 in standard form sketch a diploid cell with two chromosomes in prophase 1 He catalyst is the moment in a story when the protagonist faces the major obstacle. true false 1-Insulin functions to __________.Select one:a. stimulate uptake of glucose by cellsb. Stimulate glucose release from cellsc. lower the blood glucose level by stimulating liver, fat andmuscle find area of the circle using 3 as pi Assume that you have three one-gallon containers filled with sand, silt, and clay, respectively.Which of the filled containers will hold the most water? What year was Mohandas Gandhi born? What is the answer? please brenna's mom videotapes her hunting for eggs in the yard every easter. in the circumplex model of family interaction, this tradition that this family consistently celebrates is most likely to be measured as a function of Chapter 7: "This Is It, Boys" Reflection Question: Humor seems to have played a big part inLouie's experiences in life, no matter how difficult those experiences were. Why might humorand practical jokes be something that Louie would do even as he faced (very) dangerous wartimesituations? which action will the nurse take when caring for a client with a chest tube in place after a thoracotomy? select all that apply. one, some, or all responses may be correct. The members of the Smithtown baseball team sell $5 raffle tickets and $20 raffletickets for a fundraiser. Emilio sells a total of 50 tickets and has collected $400.The graph of the system of equations that represents this scenario is shown below. Find the value of N if, Kn has 120 distinct Hamilton circuits Bobs employer covers 23% of his familys annual health insurance premium. The balance of the premium is deducted in equal amounts from Bobs paycheck 26 times over the calendar year. If $185. 30 is withheld from each of Bobs paychecks, what is his familys annual health insurance premium? a. $805. 65 b. $4,817. 80 c. $6,256. 88 d. $20,946. 96 Please select the best answer from the choices provided A B C D. Robert Rauschenberg called his work ___________ paintings, or assemblage, because they used oil, cloth, pencil, newspaper, and other materials. A solution of 0.0470 M HCl is used to titrate 26.0 mL of an ammonia solution of unknown concentration. The equivalence point is reached when 16.0 mL HCl solution have been added. (Assume KW = 1.01 e14.)What was the pH at the equivalence point? what is the circular flow of income The report was prepared by the director of parts and ordering. does the preceding sentence use the active or the passive voice? active passive