What paradigm is this code based on? How do you know?
What does the number 16 mean in this code? How do you know?
Imagine you wanted to tweak the project so that the list produced by the program included teachers and kept track of how many years they have been working at the school. Using the principles of inheritance and overriding, explain how you could take this code and quickly create the new programs.
How could you apply some of the ideas, principles, or structures of coding to fields of study, industries, or tasks outside of creating computer programs? Propose at least one way to use “coding” or creating programs outside of computer science and explain how it uses coding-related concepts.
Imagine that you were programming without an IDE. What problems might you encounter?

Answers

Answer 1

Answer:

I Don't Know

Explanation:

nsjskdoeowowokskdnekmek biien

Related Questions

instances. a(n) refers to the area in the code of the cooperating processes that requests access to the shared data.

Answers

Specific instance refer to the number of times a particular process or module is executed in a program.

In the context of shared data, "a(n)" would likely refer to a specific instance of a process or module that is requesting access to the shared data. This area in the code where the request for shared data is made is often called a critical section or a mutex, and it is important to ensure that only one instance at a time is able to access and modify the shared data to prevent conflicts and ensure data integrity.

In programming, a specific instance refers to an individual occurrence of an object or class that has been instantiated. An instance is a unique copy of a class with its own set of properties and methods.

Learn more about Specific instance: https://brainly.com/question/30252714

#SPJ11

Cuando se introduce una fórmula en una celda primero que hay que introducir es

Answers

Answer:

El signo =.

Explanation:

La pregunta refiere a las fórmulas que se utilizan en el programa Excel. Esta es una hoja de cálculo desarrollada por Microsoft para computadoras que utilizan el sistema operativo Windows. Es, con mucho, la hoja de cálculo más utilizada para estas plataformas. Microsoft Excel se utiliza como hoja de cálculo y para analizar datos, así como para crear una base para la toma de decisiones. En Excel, se pueden realizar cálculos, configurar tablas, crear informes y analizar volúmenes de datos.

Además, dentro de sus celdas existe la posibilidad de realizar fórmulas, que emulan las fórmulas matemáticas y realizan cálculos específicos entre distintas celdas.

What is the role of multimedia in entertainment ? ​

Answers

Answer:

Multimedia is heavily used in the entertainment industry, especially to develop special effects in movies and animations (VFX, 3D animation, etc.). Multimedia games are a popular pastime and are software programs available either as CD-ROMs or online.

What are the most important reasons for using sensors rather than humans to collect data in a given situation? Select three options.
A The location where the data are collected is impossible for humans to access.
B The data are in a foreign language that nobody in the given situation speaks.
C Humans would interrupt the process being monitored.
D the data are collected only occasionally.
E humans are too error prone.
F the location where that data are collected is too dangerous for humans. (Please help. My grades are kinda low ;-; )

Answers

Answer:

B, C, and E

Explanation:

Answer: C, F, A

Explanation: I took the quiz

To delete a database object, press and hold or right-click the object in the Navigation Pane and then tap or click ____ on the shortcut menu.

Answers

Answer:To delete a database object, press and hold or right-click the object in the Navigation Pane and then tap or click Delete on the shortcut menu.

Explanation:

Hope I could help. Have a nice time there.


Fill is the inside color of a shape.
O
a. True
B. False

Answers

Answer:

True.

Explanation:

Fill describes the color of the area inside a designated shape. This statement is true.

the correct answer is true

how to make your phone flash when you get a notification

Answers

Answer:

If your talking about it turning on then go to notifications in the settings and turn on badges. If your talking about the flashlight on ur phone not possible.

Explanation:

How can the effectiveness of e-mail advertising campaigns be measured directly?.

Answers

Email advertising campaigns can be measured in various ways. One can know the success of the email campaign by calculating the email open rate, click-through rate, conversion rate, and the overall return on investment.


Open rates: Email open rates refer to the number of recipients who open an email. A high open rate signifies that the email's subject line is captivating and relevant to the recipient. An average open rate varies from one industry to another.

Return on investment: ROI is the ultimate metric for determining the success of an email campaign. The ROI is determined by the cost of sending the email and the revenue generated from the campaign. The email marketing campaign's ROI can be calculated by taking the total revenue generated and dividing it by the total cost of the campaign.

To know more about success visit:

https://brainly.com/question/32281314

#SPJ11

Write a program to enter the price and display discount percentage using ELSEIF statement. (5) If price>=5000, 20% discount If price>=3000, 15% discount If price>=2000, 10% discount If price>=1000, 5% discount

Answers

Answer:

Explanation:

The following code is written in Python and creates a function that takes in the price as a parameter and then returns the discount amount to the user as well as printing it to the screen.

def discountAmount(price):

   discount = 0

   if price >= 5000:

       discount = 20

   elif price >= 3000:

       discount = 15

   elif price >= 2000:

       discount = 10

   elif price >= 1000:

       discount = 5

   else:

       discount = 0

   print("Your total discount is " + str(discount) + "%")

   return discount

question 1: do all of the packets in your sent messages always follow the same path? if not, describe at least two different paths packets took.

Answers

No, not all packets in your sent messages always follow the same path. Packets take different paths based on the network topology and traffic conditions. Two different paths packets took are direct path and indirect path.

1. Direct Path:

If the recipient is connected directly to the sender's network, then the packets will travel directly to the recipient's network. This is the simplest and most efficient path for the packets to take. For example, if you send a message to a colleague on the same local network, the packets will travel directly to their device.

2. Indirect Path:

If the recipient is not connected directly to the sender's network, then the packets will travel through multiple routers and switches to reach the recipient's network. The packets take this indirect path to sent message because it is the only available path. The packets might have to travel through different networks and even different countries before reaching the recipient.

To learn more about packet: https://brainly.com/question/28180161

#SPJ11

Jack decides to apply a style to the vocabulary terms in his report. In the first section, he includes the vocabulary word "telescope.” The James Webb Telescope The James Webb Telescope, called Webb or JWST, is more powerful than the Hubble Space Telescope. A telescope is a tool used to view faraway objects. The Webb will have the ability to look at the first galaxies that formed the universe. It will also be able to look into dust clouds and observe how stars and planetary systems form. Which style did Jack use on the vocabulary words in his report?
strong
intense strong
emphasis
intense emphasis

Answers

Answer:

intense emphasis

Explanation:

I got it right

Answer:

D. intense emphasis

Explanation:

I just answered the question

edge 2021

I'll give brainlyist
Identify data types
13.5
-6
“18 Mingle Lane”
False
-20.4
“Bonjour”
12345

Answers

Answer:

1. Float

2. Integer

3. String

4. Boolean

5. Float

6. String

7. Integer

Explanation:

To identify data types, we need to understand the following concepts.

Data types are categorised into 2.

1. Numeric data types

2. Non numeric data types

The numeric data types are represented by numbers and is subdivided into 2.

i. Integer: Numbers without decimals (could be positive or negative)

ii. Float or Real: Numbers with decimals (could also be positive or negative)

Going by the above illustration,

13.5 and -20.4 are float data types

-6 and 12345 are integer

2. Non numeric data types: These are data that are different from numbers or digits. They could be images, string & character, boolean, dates, etc.

I'll limit my explanation to the scope of this assignment.

String are texts and are denoted by open and close quotes ("...") i.e. data that are present with quotes are strings

Boolean are data with true or false values

So, by this explanation:

"18 Mingle Lane" and "Bonjour" are strings variables

And

False is boolean

Answer:

Float, Integer, String, Boolean, Float, String, Integer.  

Explanation:

What are the steps when it comes to making a video game? What do you need to do to plan it, and when it comes to developing it?

Answers

Video game planning, preproduction, production, testing, pre-launch, launch, and post-launch are the seven stages of game development.

How is computer science used in game development?

Utilizing programming languages, creating software, and utilizing artificial intelligence are all aspects of computer science that are used in game development. The ideal degree type for learning Computer Science and Game Development and Design is a Game Development or Game Design emphasis within a Computer Science degree.

The foundations of computer science and programming are used in the creation of video games. To create realistic effects, video games' modern graphics rendering frequently makes use of cutting-edge methods like ray tracing.

A degree in computer science is still a good option for people trying to break into this extremely competitive industry because technical proficiency is required for positions like game developers, software testers, and audio engineers. Video game software development is known as game programming, a subset of game development.

To learn more about development refer to :

https://brainly.com/question/24251696

#SPJ1

which layer 1 troubleshooting issue can occur from not carefully ensuring compatibility with cable type and wavelength in use?

Answers

If the compatibility with the cable type and wavelength in use is not carefully checked, transmitter mismatch layer 1 troubleshooting issues may develop.

What are the initial three measures you take to resolve an Internet-related problem?

If you are having trouble with your internet signal, you should restart your modem and router right away. Do not omit this phase! Since it frequently resolves the issue, this is nearly always what tech support will advise you to try first.

What is the first and simplest action you can take to fix the majority of computer issues?

Check the cables frequently: An easy first step to take if you're experiencing issues with a particular piece of computer hardware, such your keyboard or monitor, is to make sure all linked cables are in good condition. They are suitably linked. Restart the computer: Restarting the computer is a solid option to attempt if all else fails.

To know more about layer troubleshooting visit:-

https://brainly.com/question/13041616

#SPJ4

Question:

Which Layer 1 troubleshooting issue can occur from not carefully ensuring compatibility with cable type and wavelength in use?

A) Transceiver mismatch

B) Crosstalk

C) dB loss

D) Opens and shorts

A database is an organized collection of ________ related data. group of answer choices logically badly loosely physically

Answers

A database is an organized collection of logically related data. It serves as a structured repository that allows for efficient storage, retrieval, and manipulation of information.

How is a database logically arranged?

The logical organization of a database involves designing tables, establishing relationships between them, and defining constraints to ensure data integrity.

The relationships between the tables enable users to access and query the data based on various criteria. By structuring the data logically, databases facilitate effective data management, scalability, and data consistency.

Read more about databases here:

https://brainly.com/question/518894

#SPJ4

working on a python assignment, not sure what i did wrong can anyone help?

working on a python assignment, not sure what i did wrong can anyone help?

Answers

Answer:

Explanation:

line 13 should be changed to:

print(“Item 1: “ + item1 + “ - $” + str(float(const1)))

You cannot concatenate a string to float type.

which command can an administrator execute to determine what interface a router will use to reach remot netowrks

Answers

Determine the path between two connections by using the traceroute command. A connection to another device frequently needs to pass via several routers.

How do I get my Cisco router's interface status?

Use the show interface summary command to provide a summary of the system interfaces' details. There are no arguments or keywords for this command. Use the show interface command to display the system interfaces' details. information about the redundancy management interface is displayed in full.

What router command would a system administrator enter to check whether the exit interface was operational?

The show is interface short command can be used by the network administrator to check that the interface connected to the next hop address or the exit interface is operational. To check if the next hop address is reachable, use the ping command. The routing table is displayed via the show IP route command.

to know more about routers here:

brainly.com/question/29768017

#SPJ4

An administrator at cloud kicks wants to deactivate a user who has left the company. what are two reasons that would prevent a user from being deactivated

Answers

A reason that would prevent a user from being deactivated by an administrator is assigning the user in a workflow email alert.

The role of an administrator in a cloud network.

In Cloud computing, an administrator has the privilege and express authority to either activate, deactivate or suspend the account of an end user that is registered on his or her Cloud services platform.

However, there are two (2) reasons that would prevent an administrator from deactivating an end user and these include the following:

The end user is located in a Cloud's Custom hierarchy field.The end user has been assigned in a workflow email alert.

Read more on cloud computing here: https://brainly.com/question/19057393

#SPJ1

1500 word limit including a
&b
4a) Explain the process of value creation in social media platforms. How does such a process differ from value creation in the traditional settings of manufacturing and services? In what sense are dat

Answers

Value creation is the process of creating products and services that provide utility to customers.

In social media, the value is created by the interactions between users. The process of value creation in social media is different from the traditional settings of manufacturing and services because it is not tied to physical products or services. Instead, the value is created by the content that users create and share with each other. In social media platforms, users are not just consumers but also creators of content.

The content created by users can take various forms such as images, videos, text, and other multimedia. Users share their experiences, opinions, and ideas with others, which generates value for them. Value is created through the interactions between users, which can include sharing, commenting, liking, and following. Social media platforms provide users with a platform to connect with each other, share their experiences and opinions, and engage with each other. In traditional settings of manufacturing and services, value is created by producing goods and services that meet the needs and desires of customers.

This involves a process of designing, producing, marketing, and selling products and services. Value creation in social media platforms is different because it is based on the interactions between users rather than the production of goods and services. In what sense are data and analytics important in the process of value creation in social media? Data and analytics are essential to the process of value creation in social media because they help to identify trends and patterns in user behavior. This information can be used to improve the user experience and create more value for users. Data and analytics can be used to identify the content that users are most interested in and the topics that generate the most engagement.

Learn more about data :

https://brainly.com/question/31680501

#SPJ11

what is the use of functions in Ms excel

Answers

Answer:

To perform or carry out calculation

Explanation:

Function is a special command or set out the formula in Microsoft Excel, that accomplishes calculations using specific values in a specific arrangement.

For example, in Microsoft Excel, Function can be applied to rapidly deliver or calculate outcomes such as total sum, average, count, main value, and least value for a range of cells.

Hence, in this case, the correct answer is "To perform or carry out the calculation.".

A teacher assigns the class a project where they will create an overlay so that when they go on a field trip, old photos will pop up on a smartphone screen when the phone is pointed at a certain location. Which of the following terms describes this kind of technology?
virtual reality
augmented reality
mp4
application software

Answers

Answer:

augmented reality

Explanation:

The scenario being mentioned is describing the technology known as augmented reality. This is a newer technological innovation that allows programs to interact with our real world through the device's camera. This is done with an overlay, in which the program detects real-world objects and adjusts the overlay to correctly interact with the real world object on the screen as if it was all being done in the real world. There are many such applications using this technology, from games to GPS systems.

The ? bar gives you information related to the document such as slide number, theme and whether or not the computer has found an error in the text

Answers

Answer:

Status bar

Explanation:

The status bar is a horizontal bar usually located at the bottom of the screen or window, showing information related to a document being edited such as slide number, current theme template, spelling and grammar, language, zoom, notes, comments, permissions, signatures e.t.c.

It can be used to group information by dividing into sections and also provides several View options.

hi hehehehehehehehehheeheh

Answers

Hi, how are you? I assume youre hyper?

What is it known as when an attacker manipulates the database code to take advantage of a weakness in it?

Answers

When an attacker manipulates the database code to exploit a weakness, it is known as SQL injection. SQL injection is a type of cyber attack where an attacker inserts malicious SQL code into a database query.

This allows them to manipulate the database and potentially gain unauthorized access to sensitive information or perform unauthorized actions.
Here's how SQL injection works:
1. The attacker identifies a vulnerability in the application that interacts with the database.

This vulnerability often occurs when the application fails to properly validate or sanitize user input.
2. The attacker then crafts a malicious input that includes SQL code.

This code is designed to exploit the weakness in the database code.
3. The application, unaware of the malicious intent, takes the attacker's input and constructs a database query.
4. The database, receiving the manipulated query, executes it without realizing that it includes additional, malicious instructions.
5. As a result, the attacker can perform various actions, such as retrieving sensitive data, modifying or deleting data, or even gaining administrative access to the database.
To protect against SQL injection attacks, developers should follow secure coding practices:
1. Input validation and sanitization:

Developers should validate and sanitize all user input to ensure it adheres to expected formats and is free from malicious code.
2. Parameterized queries or prepared statements:

Instead of concatenating user input directly into a query, developers should use parameterized queries or prepared statements.

This separates the query structure from the user input, preventing SQL injection.
3. Principle of least privilege:

Databases should be configured with the principle of least privilege, where database users have only the necessary permissions to perform their tasks.

This limits the potential damage an attacker can cause if they gain access to the database.
By implementing these practices, organizations can mitigate the risk of SQL injection attacks and protect the integrity and confidentiality of their databases.

To know more about database visit :

https://brainly.com/question/30163202

#SPJ11

Which of the following are characteristics of a rootkit? (Select two.)
(a) Monitors user actions and opens pop-ups based on user preferences.
(b) Uses cookies saved on the hard drive to track user preferences.
(c) Requires administrator-level privileges for installation.
(d) Resides below regular antivirus software detection.
(e) Collects various types of personal information.

Answers

The characteristics of a rootkit are requires administrator-level privileges for installation and resides below regular antivirus software detection. Option C and D is correct.

A rootkit is a type of malicious software that is designed to gain unauthorized access to a computer or network, and to conceal its presence from detection by antivirus or other security software. Rootkits typically require administrator-level privileges to install, and once installed, they can hide their presence from system administrators and security software.

Rootkits are often used to gain access to sensitive data, such as login credentials or financial information, and to control the infected system remotely. They can be difficult to detect and remove, as they are designed to remain hidden from both the user and the operating system.

Therefore, option C and D is correct.

Learn more about rootkit https://brainly.com/question/13068606

#SPJ11

Final answer:

A rootkit is a form of malicious software that needs administrator-level privileges for installation. It is able to reside undetected under regular antivirus software, operating at a more fundamental system level.

Explanation:

A rootkit is a type of malicious software (malware) that provides privileged access to a computer. It camouflages itself to evade detection from antivirus software and takes advantage of this stealth to give hackers control over your system.

From the options provided, the characteristics of a rootkit are:

Requires administrator-level privileges for installation - Rootkits typically need administrator-level access to install themselves to a system. This is because they operate at a very fundamental level of the system, right down to the operating system itself. Resides below regular antivirus software detection - A defining characteristic of a rootkit is its stealth. It operates beneath the level at which antivirus programs usually detect malware, which allows it to remain hidden on a system for a long time.

Learn more about Rootkit here:

https://brainly.com/question/32158000

Which of the following can be used to enter or display one complete row of information in a range or table without scrolling horizontally? Question 2 options: Create Home External Data Database Tools.

Answers

The one which is used to enter or display one complete row of information in a range or table without scrolling horizontally is database tool.

What is Microsoft Excel?

Microsoft Excel is the electronic sheet in which the data can be arranged and saved for the future use. This data in a Microsoft excels arranged in the rows and the column of the Microsoft Excel.

The options given in the problem are,

Create-With the help of create tool the, the user can create and control the content.Home-Home menu has many tools to perform different calculations effectively.External Data-The data, which is outside of the sheet, is called the external data. Database Tools-The database tools has the different tools associated with it, to perform the task related to administration. With tool help to enter or display one complete row of information in a range or table without scrolling horizontally is database tool.

The one which is used to enter or display one complete row of information in a range or table without scrolling horizontally is database tool.

Learn more about the Microsoft excel here;

https://brainly.com/question/1538272

Answer:

Correct answer is 'Create'

Explanation:

Took the test.

the ___ database option facilities you to create Database from scratch ​

Answers

Answer:

cookie?

Explanation:

where everything is hard saved

True or false you can add audio from flies on your own pc or record your own audio

Answers

Answer:

True

Explanation:

All you need to do is have the audio file saved, then open it whenever you need to. I hope this helps!

Answer:

True

Explanation:

Cus its and easy asnwer

define a function swapfrontend() that has an integer vector parameter passed by reference, and swaps the first and last elements of the vector parameter. the function does not return any value.

Answers

Answer:

#include <iostream>

#include <vector>

using namespace std;

void swapfrontend(vector<int> &v)

{

  int temp = v[0];

  v[0] = v[v.size() - 1];

  v[v.size() - 1] = temp;

}

int main()

{

  vector<int> v;

  int num;

  cout << "Enter numbers to be inserted in the vector, then enter -1 to stop.\n";

  cin >> num;

  while (num != -1)

  {

     v.push_back(num);

     cin >> num;

  }

  swapfrontend(v);

  cout << "Here are the values in the vector:\n";

  for (int i = 0; i < v.size(); i++)

     cout << v[i] << endl;

  return 0;

}

Data related to the inventories of Costco Medical Supply are presented below:
Surgical
Equipment
$274
164
26


Surgical
Supplies
$136
102
5


Rehab
Equipmen
$356
266
33


Irgical
Ipplies
$136
102
5


Rehab
Equipment
$356
266
33


Rehab
Supplies
$146
146
7

In applying the lower of cost or net realizable value rule, the inventory of surgical equipment would be valued at: Multiple Choice $139. $164. $216. $223.

Answers

In applying the lower of cost or net realizable value rule to the inventory of surgical equipment at Costco Medical Supply, the value would be $139.

The lower of cost or net realizable value rule states that inventory should be valued at the lower of its cost or its net realizable value. In this case, we need to compare the cost of the surgical equipment inventory with its net realizable value to determine the appropriate value.

Looking at the given data for surgical equipment, we have the following cost values: $274, $164, and $26. To find the net realizable value, we need additional information, such as the selling price or any relevant market value. However, the net realizable value data is not provided in the given information.

Since we don't have the necessary data to calculate the net realizable value, we can only consider the cost values. Among the given cost values, the lowest is $26. Therefore, according to the lower of cost or net realizable value rule, the inventory of surgical equipment would be valued at $26, which is the lowest cost value provided.

None of the multiple-choice options matches the lowest cost value, so it seems there may be an error or missing information in the question. However, based on the given data, the value of $26 would be the appropriate valuation according to the lower of cost or net realizable value rule.

To learn more about inventory visit:

brainly.com/question/30996763

#SPJ11

Other Questions
A restaurant buys a freezer in the shape of a rectangular prism.dimensions of the freezer are shown. What is the volume of the freezer36 24 1/2 72 1/2 If D1 = $1.40, g (which is constant) = 7.0%, and PO = $52, what is the stock's expected total return for the coming year? OA. 9.69% OB. 2.69% O C. 7.00% OD. 9.45% The cranial nerves are responsible for which of the following? Select all that apply.Question 4 options:TouchSmellSightRespirations Which statement describes the expression in words in N/10-2 ok real quick question how does your teacher give you a D on one of your assignments after they just signed you up for an honor class?an honor class is something that helps with your collage and could raise you up a grade but my teacher goes ahead and gives me a D she must be missing brain cells right she has to be because that is ridiculous these cases illustrate how the size of the margin of error depends on the confidence level and the sample size write a journal post with three things you might be able to do to go to college (or any other option you are considering after high school) without student loan debt? The scientist came to the conclusion that the hypothesis was incorrect. Why is the scientist's conclusion flawed? Write MATLAB program to convert from gram to kelogram using function. (every kelogram is 1000 gram) Wood member placed directly on foundation in California state law requires anchor bolts to fasten sill to foundation for earthquake safety is called? What is the maximum value of the function y = cos X - 27 A-3 B 1 ( 1 D 3 2. A transformed sine function has a maximum value of 8 and a minimum value of -2. What is the vertical translation of the function? A-3 - B 0 C 3 D 8 Catherine bought 355 shares of Trochel Office Supplies at $31.29 per share. Several months later, the price went up andshe sold them at $49.88 per share. How much profit did Catherine make?a $28,815.35b. $17,707.40C. $6,599.45d. $11,107.95 Answer now will give brainless As compared with other groups, elder participation in the labor force is _____ among nonunionized low-wage workers and _____ among professionals. how many moles of water are produced when 3 moles of hydrogen gas reacts with 2 moles of oxygen gas? Plot air volume versus cold temperature from your six trials in part E. Add a seventh data point for the volume of the air in the bottle at high temperature. (Hint: The volume corresponding to the high temperature is the total volume of the bottle from part B.) In the relationship menu, select Linear to graph a straight line. Then check the best fit box to graph the line of best fit for your data. SOMEONE ANSWER AND EXPLAIN ILL MARK BRAINLIEST A bank quotes an interest rate of 3.5% per annum with quarterly (four times a year) compounding. What is the equivalent rate with (a) continuous compounding and (b) semi annual compounding? 3. What is highest percentage of Natives that were possibly killed due to disease from Europeans? ________ are actions that individuals, groups, and organizations engage in as a result of inputs.