Fill in the blanks

1. A group of computers connected with each other, make a ____________ .
2. A computer or a device connected to a network is called __________ .​

Answers

Answer 1

Answer:

1.Local Area Network

2.network host

Answer 2
Fitst one is Local area network

And the second it could be network host

Related Questions

Gabby is creating a game in which users must create shapes before the clock runs out. Which Python module should Gabby use to create shapes on the screen? a Design Graphics b Math Module c Turtle Graphics d Video Module



ANSWER QUICKLY

Answers

uhh i think the answer is A

Answer:

The answer is "Turtle Graphics"

Explanation:

I took the test and got it right.

write a program to ask 10 numbers and find out total even and odd numbers

Answers

A program in Python that asks the user for 10 numbers and determines the total count of even and odd numbers is given below.

Program:

even_count = 0

odd_count = 0

for i in range(10):

   number = int(input("Enter number: "))

   if number % 2 == 0:  # Check if the number is even

       even_count += 1

   else:

       odd_count += 1

print("Total even numbers:", even_count)

print("Total odd numbers:", odd_count)

In this program, we use a for loop to iterate 10 times, asking the user to enter a number in each iteration.

We then check whether the number is even by using the modulo operator % to check if the remainder of dividing the number by 2 is zero. If it is, we increment the even_count variable; otherwise, we increment the odd_count variable.

After the loop completes, we print the total count of even and odd numbers.

For more questions on Python

https://brainly.com/question/26497128

#SPJ8

Using complete sentences post a detailed response to the following.

Instead of placing CSS code in a separate file, your friend places it in the same file as the HTML. Your teacher says that that is okay as long as it is surrounded by style tags. Which option do you think is better? Why?

Answers

Answer:

Using an external style sheet is always better for readability and maintainability.

External style sheets can be referenced and reused by many different pages. A local <style> tag could be used on each .html document, but this would mean that any CSS changes made would need to be updated within each style tag, on each .html document. By putting it onto an external style sheet, you only need to update the CSS in one location for it to be used throughout the website.

identify the primary keys and foreign keys in the three tables by dropping the correct column name or names into the table. if there is no primary or foreign key then drop none as your answer.

Answers

In a relational database, a primary key is a unique identifier for each record in a table. It ensures that each record can be identified uniquely and that there are no duplicates. On the other hand, a foreign key is a field in one table that refers to the primary key in another table. It establishes a link between the two tables.

To identify the primary keys and foreign keys in three tables, we first need to examine the structure of each table. We can then determine which columns in each table are the primary keys and foreign keys.

Table 1: Customers
- Primary Key: CustomerID
- Foreign Key: None

Table 2: Orders
- Primary Key: OrderID
- Foreign Key: CustomerID

Table 3: OrderDetails
- Primary Key: OrderDetailID
- Foreign Key: OrderID

In Table 1, the primary key is CustomerID, which is a unique identifier for each customer record. Since there are no references to this column in any other tables, it is not a foreign key.

In Table 2, the primary key is OrderID, which is a unique identifier for each order record. The foreign key is CustomerID since it refers to the primary key in the Customers table.

In Table 3, the primary key is OrderDetailID, which is a unique identifier for each order detail record. The foreign key is OrderID since it refers to the primary key in the Orders table.

Overall, understanding primary and foreign keys is essential for creating and maintaining a well-designed database. By using primary and foreign keys appropriately, we can ensure that data is organized efficiently and accurately.

To learn more about foreign key: https://brainly.com/question/13437799

#SPJ11

create an apex class that returns an array (or list) of strings.

Answers

Below is an example of an Apex class that returns an array (or list) of strings.

public class StringArrayExample {

   public static List<String> getStringArray() {

       List<String> strings = new List<String>();

       strings.add("Hello");

       strings.add("World");

       strings.add("OpenAI");

       return strings;

   }

}

The given example demonstrates an Apex class named StringArrayExample that contains a method called getStringArray(). This method returns a list of strings (List<String>).

Within the method, a new list of strings is created using the List<String> data type. Three strings, "Hello", "World", and "OpenAI", are added to the list using the add() method. Finally, the list of strings is returned using the return statement.

To utilize this class and retrieve the array of strings, you can instantiate the StringArrayExample class and call the getStringArray() method. This will return a list containing the strings "Hello", "World", and "OpenAI". You can then use this list in your Apex code as needed.

Learn more about Apex class here:

https://brainly.com/question/30457320

#SPJ11

which key helps us exit from the current window​

Answers

Answer:

Control + F4 : it closes the current window

what is PowerPoint?
uses of PowerPoint.
pros and cons of PowerPoint.
feature of PowerPoint.
steps to open PowerPoint.​

Answers

Answer:

Explanation:

PowerPoint is a presentation software developed by Microsoft. It allows users to create slideshows with text, images, videos, and other multimedia elements.

Uses of PowerPoint PowerPoint is commonly used in business, education, and other fields to create presentations for meetings, lectures, and conferences.

Pros and Cons of PowerPoint Pros:

Easy to use

Offers a wide range of design templates and themes

Allows users to add multimedia elements

Can be used to create engaging and interactive presentations

Cons:

Overuse of PowerPoint can lead to boredom and disengagement

Poorly designed presentations can be distracting and ineffective

Can be time-consuming to create a high-quality presentation

Features of PowerPoint

Design templates and themes

Multimedia support

Animations and transitions

Collaboration tools

Presenter view

Customizable slide layouts

Steps to Open PowerPoint

Click on the Windows Start button

Type "PowerPoint" in the search bar

Click on "Microsoft PowerPoint" in the search results

The PowerPoint application will open

Explanation:

1 a software package designed to create electronic presentations consisting of a series of separate pages or slides

2 Create presentations from scratch or a template.

Add text, images, art, and videos.

Select a professional design with PowerPoint Designer.

Add transitions, animations, and cinematic motion.

Save to OneDrive, to get to your presentations from your computer, tablet, or phone.

Share your work and work with others, wherever they are.

3 The best and easy to download, makes presentations easy because slides are easy to customize, it's ability to print each slide directly.

4 Animations, designs, being able to add images and videos, and also editing those images and videos

5 Click on the start button

Then choose “All Programs”

Next step is to select “MS Office”

Under MS Office, click on the “MS PowerPoint”

A blank presentation is open on the screen. According to the requirement, a person can modify the template for a presentation and start using the program

Draw the logic diagram showing the implementation of the following Boolean equation using "NAND" gates a) F=AB(CA). b) F=(D.A)+(C.B) c) F=XZ+Y ′
Z+X ′
YZ - Draw the logic diagram of the following Boolean equations using NOR gates. a) F=(A+B)(CD+A) b) F=(ABC+D)C c) F=(X+Z)(Y ′
+Z)(X ′
+Y+Z)

Answers

The logic diagram showing the implementation of the following Boolean equation using "NAND" gates is in the explanation part below.

A logic diagram is a graphical depiction of a digital circuit that employs logic gates to execute Boolean operations on input signals in order to generate output signals.

It illustrates the flow of logic and communication between circuit components graphically.

The circle at the output of the logic diagram symbolises the complement (negation) of the signal. Inverting a signal is as simple as connecting the output of a NAND gate to both of its inputs.

Thus, for F = AB(CA), F = (D.A) + (C.B), and F = XZ + Y'Z + X'YZ diagram of logic using NAND gates is attached below as image.

For more details regarding logic diagram, visit:

https://brainly.com/question/33183853

#SPJ4

Draw the logic diagram showing the implementation of the following Boolean equation using "NAND" gates
Draw the logic diagram showing the implementation of the following Boolean equation using "NAND" gates
Draw the logic diagram showing the implementation of the following Boolean equation using "NAND" gates

The term __________ is often used in relation to the hardware of computers

Answers

Answer;

Software

Explanation;

The term hardware refers to the physical components of the computer system (as opposed to the software**). ... The primary component of the computer is the motherboard (also called the main circuit board, main logic board, mainboard, or systemboard).

**

Opposite of hardware, which describes the physical aspects of a computer, software is a generic term used to refer to applications, scripts and programs that run on a device. Software can be thought of as the variable part of a computer, and hardware the invariable part.

if involved in a boating accident causing serious bodily injury or death while boating under the influence, the operator has committed a _____.

Answers

Answer:

a felony.

Explanation:

Got u brother :)

Please Help! (Language=Java) This is due really soon and is from a beginner's computer science class!
Assignment details:
CHALLENGES
Prior to completing a challenge, insert a COMMENT with the appropriate number.

1) Get an integer from the keyboard, and print all the factors of that number. Example, using the number 24:

Factors of 24 >>> 1 2 3 4 6 8 12 24
2) A "cool number" is a number that has a remainder of 1 when divided by 3, 4, 5, and 6. Get an integer n from the keyboard and write the code to determine how many cool numbers exist from 1 to n. Use concatenation when printing the answer (shown for n of 5000).

There are 84 cool numbers up to 5000
3) Copy your code from the challenge above, then modify it to use a while loop instead of a for loop.

5) A "perfect number" is a number that equals the sum of its divisors (not including the number itself). For example, 6 is a perfect number (its divisors are 1, 2, and 3 >>> 1 + 2 + 3 == 6). Get an integer from the keyboard and write the code to determine if it is a perfect number.

6) Copy your code from the challenge above, then modify it to use a do-while loop instead of a for loop.

Answers

Answer:

For challenge 1:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int num = scanner.nextInt();

       // Print all the factors of the integer

       System.out.print("Factors of " + num + " >>> ");

       for (int i = 1; i <= num; i++) {

           if (num % i == 0) {

               System.out.print(i + " ");

           }

       }

   }

}

For challenge 2:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int n = scanner.nextInt();

       // Count the number of cool numbers from 1 to n

       int coolCount = 0;

       for (int i = 1; i <= n; i++) {

           if (i % 3 == 1 && i % 4 == 1 && i % 5 == 1 && i % 6 == 1) {

               coolCount++;

           }

       }

       // Print the result using concatenation

       System.out.println("There are " + coolCount + " cool numbers up to " + n);

   }

}

For challenge 3:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int n = scanner.nextInt();

       // Count the number of cool numbers from 1 to n using a while loop

       int coolCount = 0;

       int i = 1;

       while (i <= n) {

           if (i % 3 == 1 && i % 4 == 1 && i % 5 == 1 && i % 6 == 1) {

               coolCount++;

           }

           i++;

       }

       // Print the result using concatenation

       System.out.println("There are " + coolCount + " cool numbers up to " + n);

   }

}

For challenge 5:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int num = scanner.nextInt();

       // Determine if the integer is a perfect number

       int sum = 0;

       for (int i = 1; i < num; i++) {

           if (num % i == 0) {

               sum += i;

           }

       }

       if (sum == num) {

           System.out.println(num + " is a perfect number.");

       } else {

           System.out.println(num + " is not a perfect number.");

       }

   }

}

For challenge 6:

import java.util.Scanner;

public class Main {

   public static void main(String[] args) {

       // Get an integer from the keyboard

       Scanner scanner = new Scanner(System.in);

       System.out.print("Enter an integer: ");

       int num = scanner.nextInt();

       // Determine if the integer is a perfect number using a do-while loop

       int sum = 0;

       int i = 1;

       do {

           if (num % i == 0) {

               sum += i;

           }

           i++;

       } while (i < num);

       if (sum == num) {

           System.out.println(num + " is a perfect number.");

       } else {

           System.out.println(num + " is not a perfect number.");

       }

   }

}

write an avr c program that reads debounced switch presses, and display results to two digit seven-segment displays connected to port a (lower digit) and port c (upper digit). your program should display the switch number to the lower digit display when you pressed a switch and shift the previous displayed value to the left (upper digit). for example if you press 5, 2, 3 in sequence, your display will change from 00 to 05, 52, and 23 in sequence.

Answers

When you push a switch, your application ought to shift the value that was previously displayed to the left (upper digit display) and display the switch number to the bottom digit display.

What is programming in AVR C?

The AVR-GCC compiler converts high-level C code into a binary source file that can be loaded into an AVR microcontroller. As a result, AVR-GCC could be thought of as a cross-compiler for 'C' that produces AVR code.

What language is AVR written in?

As C is the high-level language most frequently used with AVR microcontrollers, this document will concentrate on C programming. The code samples in this article are developed in accordance with the ANSI C coding standard to ensure compatibility with the majority of AVR C compilers.

To know more about avr c program visit:-

https://brainly.com/question/14964585

#SPJ4

Which task can be completed using both the Shape Fill and Shape Outline panes of PowerPoint?
O adding color
O adding weight
O adding texture
O adding a picture

Answers

Answer:

A.) adding color

Explanation:

just did it on edg 2021

Answer:

A. Adding color

Explanation: Just did it and got it right on Edg 2021

In centos 7, what command will allow you to access the man pages for the grep command?

Answers

You may retrieve the grep tool's man pages using the man grep command in Centos 7.

The Red Hat Enterprise Linux source code was used to create the CentOS Linux distribution, which is a reliable, predictable, managed, and repeatable platform (RHEL). The resources other communities will require to unite and be able to develop on the CentOS Linux platform will be created as part of our current effort to build on that. And as we begin the procedure today, we're presenting a clear governance model along with enhanced accessibility. We plan to provide our own roadmap in the next weeks, which will feature several versions of the fundamental CentOS Linux operating system.

Since March 2004, CentOS Linux has been a community-supported distribution created from Red Hat's open-source code. CentOS Linux intends to be functionally equivalent to RHEL as a result. To remove upstream, we mostly alter packages.

Learn more about CentOS here:

https://brainly.com/question/29807785

#SPJ4

examples of softcopy output devices​

Answers

Softcopy output devices are devices that produce digital or electronic outputs that can be viewed on a screen or display.

Here are some examples of softcopy output devices:

1. Computer monitors: These are the most common softcopy output devices that display digital information on a screen. They come in various sizes and resolutions.

2. Projectors: Projectors display digital information onto a large screen or wall and are commonly used for presentations in conference rooms and classrooms.

3. E-readers: These are devices used for reading digital books, articles, and other publications.

4. Smartphones and tablets: These devices display digital information on their screens and are commonly used for communication, entertainment, and browsing the internet.

5. Digital cameras: These devices display digital images on a screen and allow for easy viewing and editing of photos and videos.

6. Virtual reality headsets: These devices display digital environments in a 3D format, allowing for immersive experiences.

Overall, softcopy output devices are essential for displaying digital information and can be found in various electronic devices.

For more such questions on softcopy, click on:

https://brainly.com/question/24073304

#SPJ11

Complete the method/function so that it converts dash/underscore delimited words into camel casing. The first word within the output should be capitalized only if the original word was capitalized. Specifications Challenge.toCamelCase(str) given a string with dashes and underscore, convert to camel case Parameters str: String - String to be converted Return Value String - String without dashes/underscores and camel cased Examples str Return Value "the-stealth-warrior" "theStealthWarrior" "A-B-C" "ABC"

Answers

Answer:

I am writing a Python program. Let me know if you want the program in some other programming language.

def toCamelCase(str):  

   string = str.replace("-", " ").replace("_", " ")  

   string = string.split()

   if len(str) == 0:

       return str

   return string[0] + ''.join(i.capitalize() for i in string[1:])

   

print(toCamelCase("the-stealth-warrior"))

Explanation:

I will explain the code line by line. First line is the definition of  toCamelCase() method with str as an argument. str is basically a string of characters that is to be converted to camel casing in this method.

string = str.replace("-", " ").replace("_", " ") . This statement means the underscore or dash in the entire are removed. After removing the dash and underscore in the string (str), the rest of the string is stored in string variable.  

Next the string = string.split()  uses split() method that splits or breaks the rest of the string in string variable to a list of all words in this variable.

if len(str) == 0 means if the length of the input string is 0 then return str as it is.

If the length of the str string is not 0 then return string[0] + ''.join(i.capitalize() for i in string[1:])  will execute. Lets take an example of a str to show the working of this statement.

Lets say we have str = "the-stealth-warrior". Now after removal of dash in by replace() method the value stored in string variable becomes the stealth warrior. Now the split() method splits this string into list of three words the, stealth, warrior.

Next return string[0] + ''.join(i.capitalize() for i in string[1:])  has string[0] which is the word. Here join() method is used to join all the items or words in the string together.

Now i variable moves through the string from index 1 and onward and keeps capitalizing the first character of the list of every word present in string variable from that index position to the end.  capitalize() method is used for this purpose.

So this means first each first character of each word in the string starting from index position 1 to the end of the string is capitalized and then all the items/words in string are joined by join() method. This means the S of stealth and W of warrior are capitalized and joined as StealthWarrior and added to string[0] = the which returns theStealthWarrior in the output.

Complete the method/function so that it converts dash/underscore delimited words into camel casing. The

Write the field for the table "BOOK" with its field type and also write the primary key for the table.

Answers

Answer:

Fields are the components that provide structure for a table. Fields in a table store the same category of data in the same data type. For example, if you have a NAME field in a table of customers, the entries for this field are all customer names and are stored as text.

A primary key is a field or set of fields with values that are unique throughout a table. Values of the key can be used to refer to entire records, because each record has a different value for the key. Each table can only have one

primary key.

The primary key of this table is the ISBN, which uniquely identifies a book. The title column relates to the book; this is the title of the book. Each row of this table is about one book.

8.6 Code Practice: Question 2

Instructions

Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.


After your program has prompted the user for how many values should be in the array, generated those values, and printed the whole list, create and call a new function named sumArray. In this method, accept the array as the parameter. Inside, you should sum together all values and then return that value back to the original method call. Finally, print that sum of values.


Sample Run

How many values to add to the array:

8

[17, 99, 54, 88, 55, 47, 11, 97]

Total 468

Answers

Answer:

import random

def buildArray(a, n):

   for i in range (n):

      a.append(random.randint(10,99))

     

arr = []

def sumArray(a):

   tot = 0

   for i in range(len(a)):

       tot = tot + a [i]

   return tot

       

   

arr = []

numbers = int(input("How many values to add to the array:\n"))

buildArray(arr, numbers)

print(arr)

print("Total " + str(sumArray(arr)) )

Explanation:

The program is an illustration of lists

Lists

Lists are variables that are used to hold multiple values in one variable name

Python Program

The program in Python, where comments are used to explain each line is as follows:

#This gets the number of inputs to the array

n = int(input("How many values to add to the array: "))

#This initializes the sum to 0

sumArray = 0

#This initializes a list

myList = []

#This iterates through n

for i in range(n):

   #This gets input for the list elements

   num = int(input())

   #This appends the input to the list

   myList.Append(num)

   #This calculates the sum

   sumArray+=num

#This prints the list elements

print(myList)

#This prints the sum of the list elements

print("Total",sumArray)

Read more about lists at:

https://brainly.com/question/24941798

FILL IN THE BLANK. an ___ card is often used as a catchall phrase for any expansion card that enhances the system, allowing it to interface with devices that offer input to the system, output from the system, or both.

Answers

An expansion card is often used as a catchall phrase for any expansion card that enhances the system, allowing it to interface with devices that offer input to the system, output from the system, or both.

Using Expansion Cards to Enhance Computer Systems

An expansion card is a type of computer hardware that adds additional features or functions to a computer system. It is typically used to add additional ports, such as USB, Ethernet, or audio, or to add additional features such as a graphics card or network card. Expansion cards are an essential part of making a computer system work, as they allow for the system to interface with devices that offer input, output, or both.

Learn more about Hardware: https://brainly.com/question/24032221

#SPJ4

how to connect jumper cables to a 2017 ford escape ?

Answers

Place a clamp on the red positive (+) cable's battery terminal for the disabled car. The booster vehicle's red positive (+) battery terminal should be connected to the other end of the red positive (+) cable.

What is the right way to connect jumper cables?

Here is how to arrange your jumper cables properly: Connect the red clip to the positive wire of your dead battery (RED to DEAD). DONOR to RED The functional battery from the donor car should have the red clip connected to the positive terminal.

When attaching jumper cables Which hue belongs where?

One red cable should first be clamped to the battery's positive side if it won't start. The other red clamp should then be connected to the positive side of the operational battery.

To know more about battery terminal visit :-

https://brainly.com/question/13995478

#SPJ4

you have set up a smart house in packet tracer with many iot devices including a garage door and indoor lights. what happens if you position the cursor on the garage door and select alt click?

Answers

When one has set up a smart house in packet tracer with many IoT devices including a garage door and indoor lights. When one positions the cursor on the garage door and selects alt-click, " The garage door will open"

What is IoT?

The Internet of Things, or IoT, refers to the collective network of linked objects and the technology that enables the communication between devices and the cloud, as well as between devices.

The Internet of Things refers to physical items equipped with sensors, processing power, software, and other technologies that communicate and share data with other devices and systems over the Internet or other communication networks.

IoT is used in a variety of industries, including resource optimization using sensors in the industrial industry, real-timecorp and water resource monitoring in agriculture, and IoT equipment in healthcare. Setting security guidelines is critical for controlling the negative consequences of IoT applications.

Learn more about IoT:
https://brainly.com/question/19995128
#SPJ1

Full Question:

You have set up a smart house in packet tracer with many iot devices including a garage door and indoor lights. what happens if you position the cursor on the garage door and select alt-click?

A) The specifications of the garage door will display

B) The garage door will be removed

C) The garage door will open

D) The garage door will be associated with the home gateway

File Transfer Protocol (FTP) is used to transmit e-mail messages across the Internet. true or false

Answers

The statement is false. File Transfer Protocol (FTP) is not used to transmit e-mail messages across the Internet. FTP is a standard protocol used to transfer files between servers and clients over the Internet.

Explanation:

FTP is a standard protocol used to transfer files between servers and clients over the Internet. It allows users to upload and download files from remote servers using a client-server model. FTP is commonly used by web developers to transfer files to web servers or by businesses to exchange files with partners and clients.

Email messages, on the other hand, are transmitted using protocols such as SMTP, POP, and IMAP. SMTP is used to send emails from a client to a server or between servers, while POP and IMAP are used to retrieve emails from a server to a client.

In summary, the statement that FTP is used to transmit e-mail messages across the Internet is false. FTP is a standard protocol used to transfer files between servers and clients over the Internet, while email messages are transmitted using protocols such as SMTP, POP, and IMAP. Understanding the differences between these protocols is important for effective communication and file transfer over the Internet.

To learn more about transmitted click here, brainly.com/question/14702323

#SPJ11

Which mode would you use to take a photograph inside a cave in dim light?
A.
program mode
B.
aperture priority mode
C.
auto mode
D.
night mode
E.
sports mode

Answers

Answer:

I think B or A because when you go in a dark place you can use this

Answer:

D. Night Mode.

Explanation:

I am not 100% sure but it seems like since you are in a cave in dim light it would be like at night with the moon.

In Python, which comparison operator means "less than or equal to"?
<=
>
==
!=

Answers

Answer:

<=

Explanation:

Pretty much the same as in maths

Answer:

a: < would be ur answer! :)

Explanation:

think it as the alligator eats the left first then eats the right. if that doesnt make sense just comment in the comment section. :)

have a great day! (stay safe)!

Which of the following are advantages of coding manually? Check all of the boxes that apply.

You can see what rendered code looks like as you type.

You can view source code to figure out HTML structure and behavior.

You can learn how HTML works.

You do not need a lot of HTML knowledge to create complex web pages.

Answers

Answer: Answer B

Explanation: My point of view this answer is correct because when we write any code then we have observed the lines of code to check whether they meet the conditions or not  

Keith has been using a software application for a year on his home computer. A new version of the application was recently released. Keith’s license has a term of two years and entitles Keith to upgrade his application to a new version within the term. What type of license does the application have? A.  perpetual license B.  site license C.  Creative Commons Attribution (CC BY) license D.  license with maintenance​

Answers

Answer:

D license with maintenance.

Explanation:

I just took the test :))

Answer:

D :)

Explanation:

Which of the following are considerations in e-commerce and e-government Internet sites? Check all of the boxes that apply.

security

what time of day you are online

protection of sensitive information

from which location you are accessing the site

Answers

Answer:

protection of sensitive information

Explanation:

Answer:

a c baka baddies

Explanation:

According to the video, what kinds of projects would Computer Programmers be most likely to work on? Check all that apply.

educational software
financial planning software
computer hardware
games
installing networks

Answers

Answer:

educational software

financial planning software

and games

Explanation:

The kind of projects that would Computer Programmers be most likely to work on are educational software, financial planning software, and games The correct options are a, b, and d.

What are computer programmers?

A computer programmer designs computer codes for websites, while an Information Support Specialist oversees the design and maintenance of websites. Computer programming has a close relationship with mathematics.

Code and scripts are written by computer programmers, modified, and tested to ensure that software and applications work as intended. They convert the blueprints made by engineers and software developers into computer-readable instructions.

Therefore, the correct option is

a. educational software

b. financial planning software

d. games

To learn more about computer programmers, refer to the link:

https://brainly.com/question/30307771

#SPJ6

where would I put a semicolon in a line of javascript code

Answers

When writing code in JavaScript, it is common to use semicolons as a means of dividing individual statements.

How to add the semicolon?

Usually, to end a statement in programming, one would use a semicolon at the completion of a line of code. JavaScript has a mechanism known as automatic semicolon insertion (ASI) that allows for the omission of semicolons under specific circumstances, as the interpreter will add them automatically.

If you want to ensure correct syntax and make your code more readable, you can place a semicolon at the end of each line.

An example:

var x = 5;

console.log(x);

In this case, the semicolon is placed after the assignment statement var x = 5; and after the console.log(x); statement.

Read more about javascript here:

https://brainly.com/question/16698901

#SPJ1

Choose all of the items that represent operating systems largely derived from UNIX. GNU/Linux, Mac OS X, IBM, OS/360, BSD, Windows

Answers

Answer:

GNU/Linux

Mac OS X

BSD

Explanation:

Answer:

ITS A, B, AND D

Explanation:

Other Questions
Actor who played michael corleone in the godfather. For this problem, carry at least four digits after the decimal in your calculations. Answers may vary slightly due to rounding.A random sample of 5751 physicians in Colorado showed that 2954 provided at least some charity care (i.e., treated poor people at no cost).(a) Let p represent the proportion of all Colorado physicians who provide some charity care. Find a point estimate for p. (Round your answer to four decimal places.)(b) Find a 99% confidence interval for p. (Round your answers to three decimal places.)lower limitupper limitGive a brief explanation of the meaning of your answer in the context of this problem.1% of all confidence intervals would include the true proportion of Colorado physicians providing at least some charity care. 1% of the confidence intervals created using this method would include the true proportion of Colorado physicians providing at least some charity care. 99% of all confidence intervals would include the true proportion of Colorado physicians providing at least some charity care. 99% of the confidence intervals created using this method would include the true proportion of Colorado physicians providing at least some charity care.(c) Is the normal approximation to the binomial justified in this problem? Explain.No; np < 5 and nq > 5. Yes; np < 5 and nq < 5. No; np > 5 and nq < 5. Yes; np > 5 and nq > 5. which type of renewable energy technology involves focusing heat using mirrors? group of answer choices biomass hydropower photovoltaic thermal solar wind power Symbolism means: 1. the practice of investing things with arbitrary meaning2. Something done or paid in expiation of a wrong3. The act of decreasing or reducing something 4. Discord that splits a group which of the following human activities does not contribute to bacterial resistance to antibiotics a)purchasing meats treated with antibiotics b) not completing a course of antibiotics c)the use of hand sanitizer d)taking antibiotics for viral infections. Umm can someone help me lol How to print an exception in Python 3? a boy's sexual desires for his mother and feelings of hostility toward his father constitute what freud called Math 120 Fall 2021 Prof. LeNasima Sultani sHomework:= HomeworkSection 2.2Question 17, 2.2.87Part 1 of 2HW Score: 26.67%, 5.33 of 20 pointsScore: 0 of 1SaveExpress the gross salary G of Jackie, who earns $14 per hour as a function of the number of hours worked, h. Determine the gross salary of Jackie if sheworks 24 hours. That is, find G(24).C.Express the gross salary G of Jackie, who earns $14 per hour as a function of the number of hours worked, h.G(h) = (Do not include the $ symbol in your answer.)Enter your answer in the answer box and then click Check Answer.Help Me Solve ThisVideoGet More HelpClear AllSkill BuilderCheck AnswermPreviousNevt.5:41 PM An employee works 52 hours (52 - 40 were overtime hours) during a workweek in December of 2021. He earns $11,000/month, with his employer paying 1.5 times the regular rate of pay for overtime hours. To date, he has earned $144,200 during the year. He has requested that his employer withhold 8% of gross pay, which is to be contributed to a 401(k) plan. compare and contrast the three types of expansion diffusion Solve the proportion. Start fraction 42 over 15 end fraction equals start fraction lower p over 10 end fraction A. P = 37 B. P = 28 C. P = 26 D. P = 24 Assume that you are attempting to fund a $50,000,000 liability associated with the clean-up of an environmental site that will be due in seven years. If you don't meet the liability you will be out of business. You have an amount of money to invest today that you feel will be sufficient. How might you manage a bond portfolio to ensure that it will be enough at the time you need it? Give two alternatives. Be sure you explain how the alternatives work so that even a government regulator could understand it. As part of your answer be sure to discuss the two risks that bond holders are exposed to because of changing interest rates over time. For 31 hours of work, you are paid $237.15. How much would you receive for 36 hours? You would receive $? (Round to the nearest cent as needed.) In an election, Mr. Jones received 70% of the 1,500 votes cast. How many votes did Mr. Jones receive?Votes Cast10%10%10%10%10%10%10%10%10%10%9001,0501,1251,200 Work out size of angle x . if a check correctly written and paid by the bank for $405 is incorrectly recorded on the company's books for $455, the appropriate treatment on the bank reconciliation would be to What is the slope of a line that is perpendicular to the line y = 1/6x + 4The slope of the line is please help me please How do you think John L. Sullivan felt aboutProhibition? Give an example from the passage tosupport your answer. Click here.DONE