PLEASE HURRY!!!
Look at the image below!

PLEASE HURRY!!!Look At The Image Below!

Answers

Answer 1

The first, third, and last are correct.


Related Questions

What is the best way to create a pseudocode plan within your program?

Use a flowchart in a file.

Use comments in IDLE.

Use comments in a file.

Use a flowchart in IDLE.

Answers

The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

What is a pseudocode?

Programmers can be set up or design their coding logic using pseudocode to organize and outline it. Learning about pseudocode can aid your development process if you create software.

The term pseudocode is one that often go through some of its fundamental building blocks.

Note that in IDLE or a file, you cannot be able to add flowchart shapes. In IDLE, you could build a pseudocode plan with comments, but you couldn't go back and add lines of code where they were missing.

Therefore, Making a file enables you to plan out your pseudocode using comments, and then fill it in with the actual code.

Hence, The  best way to create a pseudocode plan within your program is option c: Use comments in a file.

Learn more about pseudocode plan from

https://brainly.com/question/27646993
#SPJ1

Answer:

Comments in a file

Explanation:

What do type in?
What are the HR tags
What are the h3 headings

Answers

Answer:

HR tags are horizontal breaks in a document.

Your code should look like this:

<html>

<head>

</head>

<body>

<h1>

first heading

</h1>

<h3>

other headings

</h3>

</body>

</html>

<style>

body {

   background-color: #505693;

   color: #FFFFFF;

}

hr {

   background-color: #6A5ACD;

}

</style>

Problem1: How Much Snow? Snow is falling at the rate of 0.8 inch per hour. Evaporation occurs at the rate of 2% per hour. Complete program HowMuchSnow.java to calculate how many inches of snow are on the ground after snowing a number of hours.

answer in coding on j creator

Answers

public class HowMuchSnow{

    public static void main(String []args){

       System.out.println("Hello World");

       System.out.println("There are "+ SnowFall(3) + " inches of snow on the ground.");

    }

    public static float SnowFall(float hours){

        float falling = 0.8f - (0.8f * 0.02f);

        return falling * hours;

    }

}

I hope this helps!

The formula to convert Fahrenheit (F) temperature to Celsius (C) is C=F-32/1.8 which line of code will accomplish this conversion?

O Celsius = (Fahrenheit - 32) / 1.8

O Celsius = (Fahrenheit - 32) * 1.8

O Celsius = Fahrenheit - 32 * 1.8

O Celsius = Fahrenheit - 32 /* 1.8

Answers

I think it might be the first option

The formula code that coverts the temperature unit of Fahrenheit to Celsius is Celsius = (Fahrenheit - 32) / 18. Therefore, option A is correct.

What are the units of measuring temperature?

Temperature is given as the unit of measuring the hotness or coolness of a body. The SI unit of measuring temperature is Kelvin. The equivalent converts the temperature unit between Kelvin, Celsius, and Fahrenheit.

The code of line that helps in accomplishing the conversion of Fahrenheit to Celsius is,

Celsius = (Fahrenheit - 32) / 18.

Thus, option A is correct.

Learn more about Celsius to Fahrenheit, here:

https://brainly.com/question/14272282

#SPJ2

What type of cipher takes one character and replaces it with one character, working one character at a time

Answers

Answer: An algorithm

Explanation: ​An asymmetric encryption key that does have to be protected. ​An algorithm that takes one character and replaces it with one character.

. Because Maya knows that the most important part of an e-mail message is the subject line, she ________.

Answers

Answer:

adjust the subject line if the topic changes after repeated replies

Explanation:

E-mail (electronic mail) message is usually reffered to as a text, usually informal which can be sent electronically or received through a computer network. e-mail message is usually brief but at same time some do contains attachment which allows sending of images as well as spreadsheet. One of the important part of Email message is the Subject Line which serves as the introduction that gives the intent of the message, it is this Subject Line that will show when the recipient is going through the list of emails in his/her inbox. It allows the recipient to know what is conveyed in the body of the message.There are usually action information as well as dates at the end of the email message as well as closing thought.In the case of Maya from the question, Because Maya knows that the most important part of an e-mail message is the subject line, she adjust the subject line if the topic changes after repeated replies, since the subject line convey the information in the body text, so the subject line need to be adjusted to fit the topic as it changes.

Suppose you start with an empty queue and perform the following operations: enqueue 1, enqueue 2, dequeue, enqueue 3, enqueue 4, dequeue, enqueue 5. What are the resultant contents of the queue, from front to back?
a. 1, 2, 3, 4, 5
b. 1, 3, 5
c. 1, 2, 3
d. 3, 4, 5

Answers

Answer:

The correct answer is   d) 3 4 5

Explanation is given below  

Explanation:

A queue is FIFO data structure which means first in first out so when you perform operation enqueue 1, enqueue 2 it will add  1, 2 to queue when you perform dequeue it will remove front element which is 1 further when you perform enqueue 3 and enqueue 4 it will add 3 and 4 to queue and when you perform dequeue it will remove front element which is now 2 as 1 is already removed after that when you perform enqueue 5 it will add 5 to queue so now the queue is like 3 4 5.

According to Jonathan Zittrain, technology that cannot be modified by the user who wishes to create new uses for it is:_______

a. Sterile
b. Open
c. Generative
d. Clean

Answers

Answer:

a. Sterile

Explanation:

From a lecture that was given by jonathan zittrain, he described a sterile technology as a type of technology that will not develop. And going further he says that a y third party cannot do any sort of coding for such a technology. It works the same way always. He described it in these words 'what you see is what you get'.

Computer programmers are responsible for writing code that tells computers commands to follow.

True
False

Answers

True is the correct answer.

Answer:

True

Explanation:

the answer is true

Write a class named TestScores. The class constructor should accept an array of test scores as its argument. The class should have a method that returns the average of the test scores. If any test score in the array is negative or greater than 100, the class should throw an IllegalArgumentException. Demonstrate the class in a program.

Answers

import java.util.Arrays;

public class TestScores {

   public static float getAverage(float arr[]){

       float total = 0;

       for (float x : arr){

           if (x < 0 || x > 100){

               throw new IllegalArgumentException();

           }

           else{

               total += x;

           }

           

       }

       return (total / arr.length);

   }

   

   public static void main(String [] args){

       float arr[] = {1,100,0,43,-1};

       System.out.println(getAverage(arr));

   }

}

In the main method we test our getAverage method with the arr array. You can replace the values in the arr array and test your own values. I hope this helps!

The code example of the implementation of the TestScores class in Java is shown below:

What is the class?

java

import java.util.Arrays;

public class TestScores {

   private int[] scores;

   public TestScores(int[] scores) {

       this.scores = scores;

   }

   public double getAverage() {

       int sum = 0;

       for (int score : scores) {

           if (score < 0 || score > 100) {

               throw new IllegalArgumentException("Invalid test score: " + score);

           }

           sum += score;

       }

       return (double) sum / scores.length;

   }

   public static void main(String[] args) {

       int[] scores = {85, 90, 92, 88, 95};

       TestScores testScores = new TestScores(scores);

       try {

           double average = testScores.getAverage();

           System.out.println("Average test score: " + average);

       } catch (IllegalArgumentException e) {

           System.out.println("Error: " + e.getMessage());

       }

   }

}

Read more about  class  here:

https://brainly.com/question/26580965

#SPJ2

Which is an algorithmic form of a procedure?
A.
function calc_area
B.
area=length*breadth
C.
call function calc_area
D.
return area to the main function
E.
end function calc_area

Answers

Answer:

b

Explanation:

im doing the test right now

Answer:

B is correct!

Explanation:

__________consist of two or more computer-controlled machines or robots linked by automated handling devices such as transfer machines, conveyors, and transport systems.

Answers

Answer:

Flexible manufacturing systems

Explanation:

Flexible manufacturing systems which can be written in short form as (FMS) is the combination of more two or more machines which are controlled by computer.

The overall performance of the system is directed by computers thereby directing each work to the appropriate route where the needed activity will be carried out.

3.7) BEST ANSWER BRAINLIEST

your answer will be reported if it is ridiculous


Which is NOT a question that might help a network engineer isolate which layer in a network has a problem?



Is the user operating the software correctly?


Is everything plugged in?


Are messages arriving in a timely manner?


Are the data displaying in a garbled manner?

Answers

Explanation:

i think it is are messages ariving in a timely manner?

Answer:

Is the user operating the software correctly?

Explanation:

Thats the correct one for edge

The best way to make sure text stand out in eNotes would be to
A. resize it.
B. printit it
C. bold it
D. strike-through​

Answers

The answer is C.Bold it

Answer: (D) bold it.

Explanation:

True/False: When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

Answers

Answer:

True.

Explanation:

In object-oriented programming language, a process known as encapsulation is used for the restrictions of the internal data of a software program from the outside code, therefore preventing an unauthorized direct access to the codes. This is achieved through the use of classes.

When an object's internal data is hidden from outside code and access to the data is restricted to the object's methods, the data is protected from accidental corruption.

The _________ contains logic for performing a communication function between the peripheral and the bus.

Answers

Answer:

I/O module

Explanation:

The I/o module is known as the input/output module. Such a module is usually connected to system on one end and and in the other end, one or more input/output devices are connected. Such a technique helps to exchange data between the processor and also the input /output device. It helps in information transfer between the internal storage and also the external storage.

What is the output password=sdf345

Answers

Answer:what do you mean

Explanation:

Answer:

False

Explanation:

If you put it in python your answer would be false

is check payable a liability ?​

Answers

Answer:

Yes

Explanation:

Accounts payable (AP) is money owed by a business to its suppliers shown as a liability on a company's balance sheet.

A pay check is a liability

write a calss called animak that contains a static variable called count to keep track of the number of animals created

Answers

Answer:

Follows are the code to this question:

class Animal //defining a class Animal

{

static int count = 0;//defining static integer variable count

int myCount;//defining integer variable myCount

Animal() //defining default constructor Animal

{

myCount = ++count;//use myCount to hold incrementing value of count

}

public static int getCount()//defining a static method getCount

{

return count;//return count value

}

public static void setCount(int count)//defining a static method setCount that accept a parameter

{

Animal.count = count;//use class to hold value in count variable  

}

public int getMyCount() //defining a method getMyCount

{

return myCount;//return myCount value

}

}

public class Main//defining a class Main

{

public static void main(String[] ax)//defining main method  

{

Animal a1 = new Animal();//creating animal class object

Animal a2 = new Animal();//creating animal class object

Animal a3 = new Animal();//creating animal class object

System.out.println("Number of created animals: " + Animal.getCount());//calling static method

System.out.println("Number of created animals: " + Animal.getCount());//calling static method

System.out.println("Number of created animals: " + Animal.getCount());//calling static method

System.out.println("first animal count: " + a1.getMyCount());//calling getMyCount method

System.out.println("second animal count: " + a2.getMyCount());//calling getMyCount method

System.out.println("third animal count: " + a3.getMyCount());//calling getMyCount method

}

}

Output:

please find the attached file.

Explanation:

please find the complete question in the attached file.

In the above-given code, a class "Animal" is defined, inside the class two integer variable "count and myCount" is defined, in which "count" is the static variable.

In the next step, the class constructor is defined that holds the incrementing value of count in the myCount variable, and use the get and set method to hold the value, in which set is static type.

In the main class, the "Animal" class object is created, which calls the getMyCount method to print its value and use the class name to call the set method.    

Give a recursive algorithm that takes as input two positive integers x and y and returns the product of x and y. The only arithmetic operations your algorithm can perform are addition or subtraction. Furthermore, your algorithm should have no loops.

Answers

Answer:

#include <stdio.h>

int product(int x,int y)

(

 if(y==1)

    return x;

 else

    return (x+product(x,y-1));

)

int main()

(

 int a,b;

 scanf("%d %d",&a,&b);

 printf("%d\n*,product(a,b));

return 0;

)

Explanation:

See above code as explanatory enough.

Match the correct term from the list below with the correct statement.

Answers

Answer:

self-serving bias

feedback

self-fulfilling prophecy

communication

context

Write a single statement that prints outsideTemperature with a or - sign. End with newline. Sample output with input 103.5: 103.500000

Answers

Answer:

Written in C Language

#include <stdio.h>

int main() {

   float temp;

   printf("Temperature: ");

   scanf("%f",&temp);

   temp-=(temp + temp);

   printf("%.6f", temp);

    return 0;

}

Explanation:

This line declares temp as float

   float temp;

This line prompts user for input

   printf("Temperature: ");

This line gets user input

   scanf("%f",&temp);

This line negates the user input

   temp-=(temp + temp);

This line prints out the required output with a - sign

   printf("%.6f", temp);

How long will it take to send 1.1 million bits using the Stop and Wait ARQ protocol if each packet contains 1000 bits and the only delay is propagation delay

Answers

Answer:

1.111 second

Explanation:

We know propagation speed =  [tex]$2 \times 10^8$[/tex] m/s

                                                 =  [tex]$2 \times 10^5$[/tex] km/s

One packet size = 1000 bit

Distance between sender and the receiver = 1000 m = 1 km

The channel data rate = 1 Mbps =   [tex]$1 \times 10^6$[/tex] bits per sec

There is no transmission delays of ACKs,

The time to transmit one data packet  = [tex]$T_{trans}+2T_{prop}$[/tex]

Here, time to transmit frame = [tex]$T_{trans}$[/tex]

          propagation time = [tex]$T_{prop}$[/tex]

Therefore, [tex]$T_{trans}$[/tex] = [tex]$\frac{bits\ per\ frame}{transmission \ speed}$[/tex]

                            = [tex]$\frac{1000}{1 \times 10^6}$[/tex]      = 0.001 seconds

[tex]$T_{prop}=\frac{distance\ between\ sender\ and\ receiver}{propagation \ speed}$[/tex]

         = [tex]$\frac{1}{2 \times 10^5}$[/tex]            

         = 0.000005 seconds

Therefore, T = 0.001 +2(0.000005)

                     = 0.00101 seconds

We known, 1.1 million bits= 1100 packets

Therefore to transmit 1 million bits = 1100 x 0.00101

                                                         =  1.111 second

Why are computers popular in education these days?

Answers

Answer:

They have unlimited information

Explanation:

Answer:

computers are popular in education these days because students of this generation prefer to learn from mobiles and computers. They can gain lots of extra knowledge than from their book from computers and internet. If they get confused in some problems, they can just search it in Google and get the answer.

Tessa heard that a hacker recently broke into her friend’s e-mail account. Tessa uses her home computer to manage her personal business and wants to make sure her information and online accounts are protected from hackers.

What steps should Tessa take to protect her accounts? Check all that apply.

change passwords frequently
review privacy settings
change current screen name
purchase another computer
adjust safety settings

Answers

Answer:
Adjust privacy settings
Change passwords frequently
Adjust safety settings
Explanation:
Hope that helped

The steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Given that Tessa want to protect her accounts from the hackers,

We need to provide the steps to do the same,

To protect her accounts from hackers, Tessa should take the following steps:

a) Change passwords frequently: Regularly changing passwords for her online accounts can help prevent unauthorized access.

Strong, unique passwords that include a combination of letters, numbers, and symbols should be used.

b) Review privacy settings: Tessa should review the privacy settings on her online accounts and ensure that they are set to the appropriate level of security.

This includes adjusting who can see her personal information, posts, and photos.

c) Adjust safety settings: Tessa should check the safety settings on her computer and enable features like firewalls and antivirus software to protect against malware and other threats.

d) Change current screen name: If Tessa is using a screen name that can be easily linked to her personal information, it's advisable to change it to something less identifiable to reduce the risk of targeted attacks.

e) Purchase another computer: While purchasing another computer may be an option in certain cases, it's not a necessary step for general account protection.

However, if Tessa's current computer is outdated or lacks essential security features, upgrading to a more secure device could be beneficial.

Therefore, the steps Tessa should take to protect her accounts are:

Change passwords frequently

Review privacy settings

Adjust safety settings

Change current screen name

Learn more about Hacking click;

https://brainly.com/question/28311147

#SPJ2

Infrastructure as a Service (IaaS) replaces the _________ of the computer hierarchy with an Internet-based infrastructure.A. digital logic level through user levelsB. digital logic level through high-level language levelsC. system software level through high-level language levelsD. digital logic level through machine levels

Answers

Answer:

D. digital logic level through machine levels

Explanation:

In Computer science, the modern computer systems are basically organized in levels and this is known as computer hierarchy. The three levels in a chronological order are operating system level, machine language level and digital (hardware) logic level.

A digital logic level is the most fundamental level of a computer and can be defined as a level of the computer hierarchy which typically comprises of wires and gates. In digital circuits, the two (2) main logic level of the binary logic state are logical low and logical high which is typically denoted by the number 0 and 1 respectively.

In Computer science, the Infrastructure as a Service (IaaS) replaces the digital logic level through machine levels of the computer hierarchy with an Internet-based infrastructure. This is what enables various users to access resources that are available over the internet through the use of cloud storage.

This type of file is created when you save your word processing document.
access,
data,
program, or
system

Answers

Answer:

data

Explanation:

Answer:

Data

Explanation:

Files contain data and stuff you have saved to the device.

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

Answers

Complete Question:

Write a method getIntVal that will get the correct value input as integer numbers from the user. The input will be validated based on the first two numbers received as parameters.

In other words, your program will keep asking for a new number until the number that the user inputs is within the range of the <firstParameter> and <secondParameter>.

The method should present a message asking for the value within the range as:

Please enter a number within the range of (<firstParameter> and <secondParameter>):

Note that <firstParameter> should be changed by the value received as that parameter and <secondParameter> as well.

If the user inputs a value that it is lower than the first value, the program will show the message:

The input number is lower than <firstParameter>

Note that <firstParameter> should be changed by the value received as that parameter

If the user inputs a value that it is greater than the first value, the program will show the message:

The input number is greater than <secondParameter>

Note that <secondParameter> should be changed by the value received as that parameter.

You do not need to modify anything in the main method, you just need to write the missing parts of your new getIntVal method.

Answer:

#include<iostream>

using namespace std;

void getIntVal(int num1, int num2) {

int num;

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

while(num<num1 || num>num2) {

if(num<num1) {

cout<<"The input number is lower than "<<num1<<endl;

}

if(num>num2) {

cout<<"The input number is greater than "<<num2<<endl;

}

cout<<"Please enter a number within the range of "<<num1<<" and "<<num2<<": ";

cin>>num;

}

cout<<"Output: "<<num;

}

int main() {

int num1,num2;

cout<<"Enter lower bound: ";

cin>>num1;

cout<<"Enter upper bound: ";

cin>>num2;

getIntVal(num1, num2);

return 0;

}

Explanation:

Programming Language is not stated, So, I answered using C++

I've added the full source code as an attachment where I use comments to explain difficult lines

summarize how to write well-organized paragraphs

Answers

Decide on a controlling idea and create a topic sentence. ...
Explain the controlling idea. ...
Give an example (or multiple examples) ...
Explain the example(s) ...
Complete the paragraph's idea or transition into the next paragraph.

Question #6
Multiple Choice
What will you see after on the next line?
>>> int("3.9")

O 4
O an error statement
O 3
O 3.9

Answers

Answer:

an error statement

Explanation:

just took it. have a good one!

You will see after on the next line is an error statement. The correct option is second one.

What is on error statement?

"On error statement" enables an error-handling and specifies the location of the error within a procedure. The On Error statement is used in unstructured error handling and can be used instead of structured exception handling. S

An error statement is occurred after the code entered as >>> int("3.9")

Thus, the correct option is second one.

Learn more about  on error statement.

https://brainly.com/question/13735734

#SPJ2

Other Questions
A calendar shop has 4,960 calendars. Each rack can hold 32 calendars. How many racks does the store need to use? Why and how did the French Revolution take a radical turn entailing terror at home and war with European powers?a) bread riots were mostly held by women who wanted to feed their familiesb) people invaded the royal palacec) people invaded Bastille as a means to get weaponsd) a lot of people who were suspected of going against the new republic would be beheaded 2-41.Find all missing angles in the diagrams below. Shelly spent $110 for renting a bicycle while she was on vacation. The rental consisted of a one-time payment of $20 and then $15 per day. Which number line shows the number of days, d, she rented the bicycle? How did the grandfather clause, which was enacted in southern states during Reconstruction, stop certain races of people from voting? help me.A.) at least one member of a family had to own land to vote, but many blacks did not own land. Therefore, the vote was heavily decided by white citizens.B.) the head of the household of a family had to sign up family members to vote. Many head of households of black families were illiterate, so they were unable to read the paperwork necessary to register for voting.C.) citizens had to pass literacy tests to vote, but those who had ancestors who were eligible to vote were exempt from tests. This meant many blacks could not vote because they could not read and only had ancestors who were slaves and who therefore were ineligible to vote.D.) all citizens were required to provide documentation to vote. Whites alrey had access to official documents, having been citizens since birth, while blacks had to apply for and purchase documents. This was a long and difficult process that limited their access to voting. y'all better help. This took forever to type The English created a system ofwhen they first colonized North America. Estimate 193x47 by first rounding each number so that it has only 1 nonzero digit. Which statement describes an exothermic reaction?A. Energy is absorbed by the reaction.B. Energy is released by the reaction.C. No energy is transferred by the reaction.D. Energy is created in the reaction. Complete the sentences with the Past simple formof the verbs.1 We watched (watch) an action movie last nigth2 They .... (seem) very happy at Katie's house.3 i.... (argue) with Simon yesterday.4 They .... (travel) to the island by boat.5 She .... (study) glaciers in geography last year. plz help I give crown and 15 pointsWhich type of energy is being used to cook the food in the pot on the stove? *1 pointthermal energyradiant energychemical energymechanical energy HELP!!! 10 POINTS!!! A student throws a water bottle upward into the air. It takes 1.2 seconds for the bottle to reach it'smaximum height. How much time will it take for the water bottle to return to the student's hand(from its maximum height)? What part of speech is the word in italics?Shelly's beautiful dance thoroughly captivated the *audience*. (5 points)NounVerbAdverbO Adjective pure substance grade 7 Why did the gods choose pharaoh to be the king? 3. The Cuban RevolutionO A. established Latin America's first Communist government.O B. freed Cuba from Communist rule.O C. replaced a dictatorship with a free democracy.O D. replaced a monarchy with a parliamentary system. 5. Consider a 5% coupon bond with 5 years to maturity and $1,000 face value. a. What should the price of the bond be if the yield to maturity is 10% b. Alternatively assume the price of the bond is $900. What is the yield to maturity 30 Points mark Explain physical fitness, physical activity, and exercise. How are they related To rename and save a document to OneDrive, you should use which option?A: saveB: save asI'm confused since both can let u rename but I can only pick one. Why wasnt the Cherokee Peace Treaty Conference successful? a. The new Texan Senate didnt ratify the treaty. b. The Cherokees made more demands after the Conference. c. The Texas government didnt come to an agreement at the Conference. d. The Cherokees moved out of Texas before the treaty was put in effect.