A computer program checks to see if the user of a software program has clicked on a photo. This is an example of a requirement that can be evaluated in
a string statement.
a goto statement.
a global statement.
a conditional statement.

Answers

Answer 1

Answer:

A conditional statement

Explanation:

I just took the review and got it right

Answer 2

Answer:

A conditional statement

Explanation:

I took the test


Related Questions

Which method accepts a function that combines all the elements in the array and then returns the resulting value?
a. filter()
b. reduce()
c. map()
d. forEach()

Answers

Answer:

The method that accepts a function that combines all the elements in an array and then returns the resulting values is map() method.

Explanation:

map()  method creates a new array with the results of calling a provided  function for every array element. map() element calls function for each array element to compute value.

Computer programmers are responsible for writing code that tells computers commands to follow.

True
False

Answers

True is the correct answer.

Answer:

True

Explanation:

the answer is true

Write a program to simulate a simple calculator. In your program ask the user to enter an operation selected from the menu, ask for two operands. Calculate the result and display it on the screen. Here is a sample run

Answers

Answer:

Written in Python:

opcode = input("Enter operator: +,-,*,/")

operand1 = float(input("Operand 1: "))

operand2 = float(input("Operand 2: "))

if opcode == "+":

    print(operand1 + operand2)

elif opcode == "-":

    print(operand1 - operand2)

elif opcode == "*":

    print(operand1 * operand2)

elif opcode == "/":

    print(operand1 / operand2)

else:

    print("Invalid Operator")

Explanation:

This prompts user for operator

opcode = input("Enter operator: +,-,*,/")

The next two lines prompt user for two operands

operand1 = float(input("Operand 1: "))

operand2 = float(input("Operand 2: "))

This performs + operation if operator is +

if opcode == "+":

    print(operand1 + operand2)

This performs - operation if operator is -

elif opcode == "-":

    print(operand1 - operand2)

This performs * operation if operator is *

elif opcode == "*":

    print(operand1 * operand2)

This performs / operation if operator is /

elif opcode == "/":

    print(operand1 / operand2)

This displays invailid operator if input operator is not +,-,* or /

else:

    print("Invalid Operator")

What is the best way to create a pseudocode plan within your program?

Use a flowchart in a file.

Use comments in IDLE.

Use comments in a file.

Use a flowchart in IDLE.

Answers

The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

What is a pseudocode?

Programmers can be set up or design their coding logic using pseudocode to organize and outline it. Learning about pseudocode can aid your development process if you create software.

The term pseudocode is one that often go through some of its fundamental building blocks.

Note that in IDLE or a file, you cannot be able to add flowchart shapes. In IDLE, you could build a pseudocode plan with comments, but you couldn't go back and add lines of code where they were missing.

Therefore, Making a file enables you to plan out your pseudocode using comments, and then fill it in with the actual code.

Hence, The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

Learn more about pseudocode plan from

https://brainly.com/question/27646993
#SPJ1

Answer:

Comments in a file

Explanation:

Write a single statement that prints outsideTemperature with a or - sign. End with newline. Sample output with input 103.5: 103.500000

Answers

Answer:

Written in C Language

#include <stdio.h>

int main() {

   float temp;

   printf("Temperature: ");

   scanf("%f",&temp);

   temp-=(temp + temp);

   printf("%.6f", temp);

    return 0;

}

Explanation:

This line declares temp as float

   float temp;

This line prompts user for input

   printf("Temperature: ");

This line gets user input

   scanf("%f",&temp);

This line negates the user input

   temp-=(temp + temp);

This line prints out the required output with a - sign

   printf("%.6f", temp);

3.7) BEST ANSWER BRAINLIEST

your answer will be reported if it is ridiculous


Which is NOT a question that might help a network engineer isolate which layer in a network has a problem?



Is the user operating the software correctly?


Is everything plugged in?


Are messages arriving in a timely manner?


Are the data displaying in a garbled manner?

Answers

Explanation:

i think it is are messages ariving in a timely manner?

Answer:

Is the user operating the software correctly?

Explanation:

Thats the correct one for edge

Write a class named TestScores. The class constructor should accept an array of test scores as its argument. The class should have a method that returns the average of the test scores. If any test score in the array is negative or greater than 100, the class should throw an IllegalArgumentException. Demonstrate the class in a program.

Answers

import java.util.Arrays;

public class TestScores {

   public static float getAverage(float arr[]){

       float total = 0;

       for (float x : arr){

           if (x < 0 || x > 100){

               throw new IllegalArgumentException();

           }

           else{

               total += x;

           }

           

       }

       return (total / arr.length);

   }

   

   public static void main(String [] args){

       float arr[] = {1,100,0,43,-1};

       System.out.println(getAverage(arr));

   }

}

In the main method we test our getAverage method with the arr array. You can replace the values in the arr array and test your own values. I hope this helps!

The code example of the implementation of the TestScores class in Java is shown below:

What is the class?

java

import java.util.Arrays;

public class TestScores {

   private int[] scores;

   public TestScores(int[] scores) {

       this.scores = scores;

   }

   public double getAverage() {

       int sum = 0;

       for (int score : scores) {

           if (score < 0 || score > 100) {

               throw new IllegalArgumentException("Invalid test score: " + score);

           }

           sum += score;

       }

       return (double) sum / scores.length;

   }

   public static void main(String[] args) {

       int[] scores = {85, 90, 92, 88, 95};

       TestScores testScores = new TestScores(scores);

       try {

           double average = testScores.getAverage();

           System.out.println("Average test score: " + average);

       } catch (IllegalArgumentException e) {

           System.out.println("Error: " + e.getMessage());

       }

   }

}

Read more about  class  here:

https://brainly.com/question/26580965

#SPJ2

Give a recursive algorithm that takes as input two positive integers x and y and returns the product of x and y. The only arithmetic operations your algorithm can perform are addition or subtraction. Furthermore, your algorithm should have no loops.

Answers

Answer:

#include <stdio.h>

int product(int x,int y)

(

 if(y==1)

    return x;

 else

    return (x+product(x,y-1));

)

int main()

(

 int a,b;

 scanf("%d %d",&a,&b);

 printf("%d\n*,product(a,b));

return 0;

)

Explanation:

See above code as explanatory enough.

__________consist of two or more computer-controlled machines or robots linked by automated handling devices such as transfer machines, conveyors, and transport systems.

Answers

Answer:

Flexible manufacturing systems

Explanation:

Flexible manufacturing systems which can be written in short form as (FMS) is the combination of more two or more machines which are controlled by computer.

The overall performance of the system is directed by computers thereby directing each work to the appropriate route where the needed activity will be carried out.

Infrastructure as a Service (IaaS) replaces the _________ of the computer hierarchy with an Internet-based infrastructure.A. digital logic level through user levelsB. digital logic level through high-level language levelsC. system software level through high-level language levelsD. digital logic level through machine levels

Answers

Answer:

D. digital logic level through machine levels

Explanation:

In Computer science, the modern computer systems are basically organized in levels and this is known as computer hierarchy. The three levels in a chronological order are operating system level, machine language level and digital (hardware) logic level.

A digital logic level is the most fundamental level of a computer and can be defined as a level of the computer hierarchy which typically comprises of wires and gates. In digital circuits, the two (2) main logic level of the binary logic state are logical low and logical high which is typically denoted by the number 0 and 1 respectively.

In Computer science, the Infrastructure as a Service (IaaS) replaces the digital logic level through machine levels of the computer hierarchy with an Internet-based infrastructure. This is what enables various users to access resources that are available over the internet through the use of cloud storage.

summarize how to write well-organized paragraphs

Answers

Decide on a controlling idea and create a topic sentence. ...
Explain the controlling idea. ...
Give an example (or multiple examples) ...
Explain the example(s) ...
Complete the paragraph's idea or transition into the next paragraph.

Tessa heard that a hacker recently broke into her friend’s e-mail account. Tessa uses her home computer to manage her personal business and wants to make sure her information and online accounts are protected from hackers.

What steps should Tessa take to protect her accounts? Check all that apply.

change passwords frequently
review privacy settings
change current screen name
purchase another computer
adjust safety settings

Answers

Answer:
Adjust privacy settings
Change passwords frequently
Adjust safety settings
Explanation:
Hope that helped

The steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Given that Tessa want to protect her accounts from the hackers,

We need to provide the steps to do the same,

To protect her accounts from hackers, Tessa should take the following steps:

a) Change passwords frequently: Regularly changing passwords for her online accounts can help prevent unauthorized access.

Strong, unique passwords that include a combination of letters, numbers, and symbols should be used.

b) Review privacy settings: Tessa should review the privacy settings on her online accounts and ensure that they are set to the appropriate level of security.

This includes adjusting who can see her personal information, posts, and photos.

c) Adjust safety settings: Tessa should check the safety settings on her computer and enable features like firewalls and antivirus software to protect against malware and other threats.

d) Change current screen name: If Tessa is using a screen name that can be easily linked to her personal information, it's advisable to change it to something less identifiable to reduce the risk of targeted attacks.

e) Purchase another computer: While purchasing another computer may be an option in certain cases, it's not a necessary step for general account protection.

However, if Tessa's current computer is outdated or lacks essential security features, upgrading to a more secure device could be beneficial.

Therefore, the steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Learn more about Hacking click;

https://brainly.com/question/28311147

#SPJ2

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

Answers

Complete Question:

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

In other words, your program will keep asking for a new number until the number that the user inputs is within the range of the <firstParameter> and <secondParameter>.

The method should present a message asking for the value within the range as:

Please enter a number within the range of (<firstParameter> and <secondParameter>):

Note that <firstParameter> should be changed by the value received as that parameter and <secondParameter> as well.

If the user inputs a value that it is lower than the first value, the program will show the message:

The input number is lower than <firstParameter>

Note that <firstParameter> should be changed by the value received as that parameter

If the user inputs a value that it is greater than the first value, the program will show the message:

The input number is greater than <secondParameter>

Note that <secondParameter> should be changed by the value received as that parameter.

You do not need to modify anything in the main method, you just need to write the missing parts of your new getIntVal method.

Answer:

#include<iostream>

using namespace std;

void getIntVal(int num1, int num2) {

int num;

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

while(num<num1 || num>num2) {

if(num<num1) {

cout<<"The input number is lower than "<<num1<<endl;

}

if(num>num2) {

cout<<"The input number is greater than "<<num2<<endl;

}

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

}

cout<<"Output: "<<num;

}

int main() {

int num1,num2;

cout<<"Enter lower bound: ";

cin>>num1;

cout<<"Enter upper bound: ";

cin>>num2;

getIntVal(num1, num2);

return 0;

}

Explanation:

Programming Language is not stated, So, I answered using C++

I've added the full source code as an attachment where I use comments to explain difficult lines

is check payable a liability ?​

Answers

Answer:

Yes

Explanation:

Accounts payable (AP) is money owed by a business to its suppliers shown as a liability on a company's balance sheet.

A pay check is a liability

Which is an algorithmic form of a procedure?
A.
function calc_area
B.
area=length*breadth
C.
call function calc_area
D.
return area to the main function
E.
end function calc_area

Answers

Answer:

b

Explanation:

im doing the test right now

Answer:

B is correct!

Explanation:

What do type in?
What are the HR tags
What are the h3 headings

Answers

Answer:

HR tags are horizontal breaks in a document.

Your code should look like this:

<html>

<head>

</head>

<body>

<h1>

first heading

</h1>

<h3>

other headings

</h3>

</body>

</html>

<style>

body {

   background-color: #505693;

   color: #FFFFFF;

}

hr {

   background-color: #6A5ACD;

}

</style>

The formula to convert Fahrenheit (F) temperature to Celsius (C) is C=F-32/1.8 which line of code will accomplish this conversion?

O Celsius = (Fahrenheit - 32) / 1.8

O Celsius = (Fahrenheit - 32) * 1.8

O Celsius = Fahrenheit - 32 * 1.8

O Celsius = Fahrenheit - 32 /* 1.8

Answers

I think it might be the first option

The formula code that coverts the temperature unit of Fahrenheit to Celsius is Celsius = (Fahrenheit - 32) / 18. Therefore, option A is correct.

What are the units of measuring temperature?

Temperature is given as the unit of measuring the hotness or coolness of a body. The SI unit of measuring temperature is Kelvin. The equivalent converts the temperature unit between Kelvin, Celsius, and Fahrenheit.

The code of line that helps in accomplishing the conversion of Fahrenheit to Celsius is,

Celsius = (Fahrenheit - 32) / 18.

Thus, option A is correct.

Learn more about Celsius to Fahrenheit, here:

https://brainly.com/question/14272282

#SPJ2

The best way to make sure text stand out in eNotes would be to
A. resize it.
B. printit it
C. bold it
D. strike-through​

Answers

The answer is C.Bold it

Answer: (D) bold it.

Explanation:

. Because Maya knows that the most important part of an e-mail message is the subject line, she ________.

Answers

Answer:

adjust the subject line if the topic changes after repeated replies

Explanation:

E-mail (electronic mail) message is usually reffered to as a text, usually informal which can be sent electronically or received through a computer network. e-mail message is usually brief but at same time some do contains attachment which allows sending of images as well as spreadsheet. One of the important part of Email message is the Subject Line which serves as the introduction that gives the intent of the message, it is this Subject Line that will show when the recipient is going through the list of emails in his/her inbox. It allows the recipient to know what is conveyed in the body of the message.There are usually action information as well as dates at the end of the email message as well as closing thought.In the case of Maya from the question, Because Maya knows that the most important part of an e-mail message is the subject line, she adjust the subject line if the topic changes after repeated replies, since the subject line convey the information in the body text, so the subject line need to be adjusted to fit the topic as it changes.

What type of cipher takes one character and replaces it with one character, working one character at a time

Answers

Answer: An algorithm

Explanation: ​An asymmetric encryption key that does have to be protected. ​An algorithm that takes one character and replaces it with one character.

How long will it take to send 1.1 million bits using the Stop and Wait ARQ protocol if each packet contains 1000 bits and the only delay is propagation delay

Answers

Answer:

1.111 second

Explanation:

We know propagation speed =  [tex]$2 \times 10^8$[/tex] m/s

                                                 =  [tex]$2 \times 10^5$[/tex] km/s

One packet size = 1000 bit

Distance between sender and the receiver = 1000 m = 1 km

The channel data rate = 1 Mbps =   [tex]$1 \times 10^6$[/tex] bits per sec

There is no transmission delays of ACKs,

The time to transmit one data packet  = [tex]$T_{trans}+2T_{prop}$[/tex]

Here, time to transmit frame = [tex]$T_{trans}$[/tex]

          propagation time = [tex]$T_{prop}$[/tex]

Therefore, [tex]$T_{trans}$[/tex] = [tex]$\frac{bits\ per\ frame}{transmission \ speed}$[/tex]

                            = [tex]$\frac{1000}{1 \times 10^6}$[/tex]      = 0.001 seconds

[tex]$T_{prop}=\frac{distance\ between\ sender\ and\ receiver}{propagation \ speed}$[/tex]

         = [tex]$\frac{1}{2 \times 10^5}$[/tex]            

         = 0.000005 seconds

Therefore, T = 0.001 +2(0.000005)

                     = 0.00101 seconds

We known, 1.1 million bits= 1100 packets

Therefore to transmit 1 million bits = 1100 x 0.00101

                                                         =  1.111 second

What is the output password=sdf345

Answers

Answer:what do you mean

Explanation:

Answer:

False

Explanation:

If you put it in python your answer would be false

The _________ contains logic for performing a communication function between the peripheral and the bus.

Answers

Answer:

I/O module

Explanation:

The I/o module is known as the input/output module. Such a module is usually connected to system on one end and and in the other end, one or more input/output devices are connected. Such a technique helps to exchange data between the processor and also the input /output device. It helps in information transfer between the internal storage and also the external storage.

This type of file is created when you save your word processing document.
access,
data,
program, or
system

Answers

Answer:

data

Explanation:

Answer:

Data

Explanation:

Files contain data and stuff you have saved to the device.

Match the correct term from the list below with the correct statement.

Answers

Answer:

self-serving bias

feedback

self-fulfilling prophecy

communication

context

Why are computers popular in education these days?

Answers

Answer:

They have unlimited information

Explanation:

Answer:

computers are popular in education these days because students of this generation prefer to learn from mobiles and computers. They can gain lots of extra knowledge than from their book from computers and internet. If they get confused in some problems, they can just search it in Google and get the answer.

According to Jonathan Zittrain, technology that cannot be modified by the user who wishes to create new uses for it is:_______

a. Sterile
b. Open
c. Generative
d. Clean

Answers

Answer:

a. Sterile

Explanation:

From a lecture that was given by jonathan zittrain, he described a sterile technology as a type of technology that will not develop. And going further he says that a y third party cannot do any sort of coding for such a technology. It works the same way always. He described it in these words 'what you see is what you get'.

Problem1: How Much Snow? Snow is falling at the rate of 0.8 inch per hour. Evaporation occurs at the rate of 2% per hour. Complete program HowMuchSnow.java to calculate how many inches of snow are on the ground after snowing a number of hours.

answer in coding on j creator

Answers

public class HowMuchSnow{

    public static void main(String []args){

       System.out.println("Hello World");

       System.out.println("There are "+ SnowFall(3) + " inches of snow on the ground.");

    }

    public static float SnowFall(float hours){

        float falling = 0.8f - (0.8f * 0.02f);

        return falling * hours;

    }

}

I hope this helps!

True/False: When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

Answers

Answer:

True.

Explanation:

In object-oriented programming language, a process known as encapsulation is used for the restrictions of the internal data of a software program from the outside code, therefore preventing an unauthorized direct access to the codes. This is achieved through the use of classes.

When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

Question #6
Multiple Choice
What will you see after on the next line?
>>> int("3.9")

O 4
O an error statement
O 3
O 3.9

Answers

Answer:

an error statement

Explanation:

just took it. have a good one!

You will see after on the next line is an error statement. The correct option is second one.

What is on error statement?

"On error statement" enables an error-handling and specifies the location of the error within a procedure. The On Error statement is used in unstructured error handling and can be used instead of structured exception handling. S

An error statement is occurred after the code entered as >>> int("3.9")

Thus, the correct option is second one.

Learn more about  on error statement.

https://brainly.com/question/13735734

#SPJ2

Other Questions
what is the first step to solving multiple step equations? Write a paragraph about how the competition between the 2nd and 3rd estate caused the French Revolution what is 6units to the right of -1 is HELP I NEED AN ANSWER FASTTriangle ABC is transformed to triangle ABC, as shown below:Which equation shows the correct relationship between the measures of the angles of the two triangles? The measure of angle CAB = The measure of angle C prime B prime A prime The measure of angle BCA = The measure of angle A prime B prime C The measure of angle CAB = The measure of angle C prime A prime B prime The measure of angle BCA = The measure of angle C prime A prime B prime Joelle is a manager at a construction company, and she is interested in the chemistry behind the materials they use. She has begun studying the materials used to fill walls. She knows that to keep the temperature inside a room steady the material must be a thermal insulator, and she predicts that materials should not be acidic or else they would dissolve too easily in water.Which of these is a molecular ingredient that could be used in a wall-filling material ?C6H6Na6Ba6NeNaHCl HELP PLEASE. FIRST PERSON WHO ANSWERS CORRECTLY GETS BRAINLIEST!!!!!!!!! When serving in pickle-ball, the serve must be underhand and below the waistline. True or false? Item 18 The distance between Cleveland, Ohio, and St. Louis, Missouri, is 3 miles less than 2 times the distance between St. Louis and Chicago, Illinois. Let d be the distance between St. Louis and Chicago. Which expression can you use to represent the distance between Cleveland and St. Louis? I will give u the brinlist if the answer is right Lin read for x minutes, and Elena read for 5/8 more than that. Write an expression for the number of minutes Elena read. Only use decimals in your expression. The planet Mercury is roughly 2 5 the size of Earth. The planet Jupiter is 2.5 times the size of earth. Earth is 3,959 miles. How much larger is Jupiter than Mercury? Write your answer as a decimal. Please upload a photo of your work. A girl falls off her bike and breaks a bone in herleg. The bone can be seen poking through theskin. X-rays show that the bone is broken into twopieces. Which words best describe this kind ofbreak?simplecompoundincompletecomplete how did Virginia's owner try to attract settlers to The Colony.A- with payment of goldB- with promises of marriage C- by giving the headrightsD- by offering religious freedom To the nearest hundredth, 0.80.6 is about...Please help! Help please i am not sure bout this In which pair do both decimals represent rational numbers?O A. 2.71828182845904523536... and 0.1222O B. 3.141592653589793238... and 0.684O C. 3.141592653589793238... and 0.1222...O D. 0.684 and 0.1222... To determine the theme of a story, the reader must studyA. the first and last paragraphs of the story.B. what the characters say to each other in the story.C. the characters problem in the story and how it is resolved.D. where the action of the story takes place and why thats important. What are some things that you can do to reduce your impact on desertification? A motorcyclist started a race from START line and from rest, and accelerated with the acceleration of 2 m/s2 for 7 seconds. Then he increased the acceleration to 4 m/s2 and went with that acceleration for 8 seconds. What was the racers position from the START line after 7+8 seconds from the start of the race? Of Mice and MenCurley's wife is a prominent character in this novel. Why do you suppose she is never given a name?Use examples from the novel to explain your answer fully