What would provide structured content that would indicate what the code is describing ?
A.XML
B.DHTML
C.WYSIWYG
D.HTML

Answers

Answer 1

Answer: The answer is a.

Explanation:


Related Questions

Write a function named printPattern that takes three arguments: a character and two integers. The character is to be printed. The first integer specifies the number of times that the character is to be printed on a line (repetitions), and the second integer specifies the number of lines that are to be printed. Also, your function must return an integer indicating the number of lines multiplied by the number of repetitions. Write a program that makes use of this function. That is in the main function you must read the inputs from the user (the character, and the two integers) and then call your function to do the printing.

Answers

Answer:

import java.util.Scanner;

public class Main

{

public static void main(String[] args) {

    Scanner input = new Scanner(System.in);

    char c;

    int n1, n2;

   

 System.out.print("Enter the character: ");

 c = input.next().charAt(0);

 System.out.print("Enter the number of times that the character is to be printed on a line: ");

 n1 = input.nextInt();

 System.out.print("Enter the number of lines that are to be printed: ");

 n2 = input.nextInt();

 

 printPattern(c, n1, n2);

}

public static int printPattern(char c, int n1, int n2){

    for (int i=0; i<n2; i++){

        for (int j=0; j<n1; j++){

            System.out.print(c);

        }

        System.out.println();

    }

    return n1 * n2;

}

}

Explanation:

*The code is in Java.

Create a function named printPattern that takes one character c, and two integers n1, n2 as parameters

Inside the function:

Create a nested for loop. Since n2 represents the number of lines, the outer loop needs to iterate n2 times. Since n1 represents the number of times that the character is to be printed, the inner loop iterates n1 times. Inside the inner loop, print the c. Also, to have a new line after the character is printed n1 times on a line, we need to write a print statement after the inner loop.

Return the n1 * n2

Inside the main:

Declare the variables

Ask the user to enter the values for c, n1 and n2

Call the function with these values

Write a recursive method called lengthOfLongestSubsequence(a, b) that calculates the length of the longest common subsequence (lcs) of two strings. For example, given the two strings aaacommonbbb and xxxcommonzzz the lcs is common which is 6 characters long so your function would return 6. The length of the lcs of two strings a

Answers

Answer:

Explanation:

The following code is written in Java and creates the recursive function to find the longest common substring as requested.

 static int lengthOfLongestSubsequence(String X, String Y) {

       int m = X.length();

       int n = Y.length();

       if (m == 0 || n == 0) {

           return 0;

       }

       if (X.charAt(m - 1) == Y.charAt(n - 1)) {

           return 1 + lengthOfLongestSubsequence(X, Y);

       } else {

           return Math.max(lengthOfLongestSubsequence(X, Y),

                   lengthOfLongestSubsequence(X, Y));

       }

   }

Write a method, public static int insertSort(ArrayList list), which implements a insertion sort on the ArrayList of Integer objects list. In addition your insertSort method should return an int which represents a statement execution count recording how many times two elements from the ArrayList are compared. For example, if the parameter list prints as [3, 7, 2, 9, 1, 7] before a call to insertSort, it should print as [1, 2, 3, 7, 7, 9] after the method call. This call should return the value 10 since 10 values need to be compared to implement an insertion sort on this array.

Answers

Answer:

Here is the basics of insertionSort performed on an array of integers, this should get you started:

/**

* The insertionSort method performs an insertion sort on an int array. The

* array is sorted in ascending order.

*

* param array The array to sort.

*/

public static void insertionSort(int[] array) {

int unsortedValue;

int scan;

for (int index = 1; index < array.length; index++) {

unsortedValue = array[index];

scan = index;

while (scan > 0 && array[scan - 1] > unsortedValue) {

array[scan] = array[scan - 1];

scan--;

}

array[scan] = unsortedValue;

}

}

how to do GCD on small basic?​

Answers

The other person is right

Netscape browser is one of Microsoft products
o true
o false

Answers

Answer:

FALSE. Netscape navigator web browser was developed by Netscape Communications Corporation, a former subsidiary of AOL.

What are well known AI (Artificial Intelligence) Tools and Platform?​

Answers

Answer:

Thi s is your answer

Explanation:

Scikit Learn.

TensorFlow.

Theano.

Caffe.

MxNet.

Keras.

PyTorch.

CNTK.

A drunkard in a grid of streets randomly picks one of four directions and stumbles to the next intersection, then again randomly picks one of four directions, and so on. You might think that on average the drunkard doesn’t move very far because the choices cancel each other out, but that is actually not the case. Represent locations as integer pairs (x, y). Implement the drunkard’s walk over 100 intersections, starting at (0, 0), and print the ending location.

Answers

Answer:

its c so its c

Explanation:

what is the address of the first SFR (I/O Register)​

Answers

Answer:

The Special Function Register (SFR) is the upper area of addressable memory, from address 0x80 to 0xFF.

Explanation:

The Special Function Register (SFR) is the upper area of addressable memory, from address 0x80 to 0xFF.

Reason -

A Special Function Register (or Special Purpose Register, or simply Special Register) is a register within a microprocessor, which controls or monitors various aspects of the microprocessor's function.

Do you think that dealing with big data demands high ethical regulations, accountability, and responsibility of the person as well as the company? Why​

Answers

Answer:

i will help you waiting

Explanation:

Yes dealing with big data demands high ethical regulations, accountability and responsibility.

The answer is Yes because while dealing with big data, ethical regulations, accountability and responsibility must be strictly followed. Some of the principles that have to be followed are:

Confidentiality: The information contained in the data must be treated as highly confidential. Information must not be let out to a third party.Responsibility: The people responsible for handling the data must be good in analyzing big data. They should also have the required skills that are needed.Accountability: The service that is being provided has to be very good. This is due to the need to keep a positive work relationship.

In conclusion, ethical guidelines and moral guidelines have to be followed while dealing with big data.

Read more at https://brainly.com/question/24284924?referrer=searchResults

why is an increase in tax rate not necessarily increase government revenue​

Answers

Answer:

An increase in tax rate raises more revenue than is lost to offsetting worker and investor behavior

Explanation:

Increasing rates beyond T* however would cause people not to work as much or not at all, thereby reducing total tax revenue

A sensitive manufacturing facility has recently noticed an abnormal number of assembly-line robot failures. Upon intensive investigation, the facility discovers many of the SCADA controllers have been infected by a new strain of malware that uses a zero-day flaw in the operating system. Which of the following types of malicious actors is MOST likely behind this attack?
A. A nation-state.
B. A political hacktivist.
C. An insider threat.
D. A competitor.

Answers

Answer:

A. A nation-state.

Explanation:

Given that a nation-state attack if successful is about having access to the different sector or industries of networks, then followed it by compromising, defrauding, altering (often for fraud purpose, or destroy information

Therefore, in this case, considering the information giving above, the type of malicious actor that is MOST likely behind this attack is "a Nation-State."

Hello! I am a new coder, so this is a simple question. But I am trying to create a code where you enter a number, then another number, and it divides then multiply the numbers. I put both numbers as a string, and as result when i tried to multiply/divide the numbers that were entered, an error occurred. How can i fix this?

using System;

namespace Percentage_of_a_number
{
class Program
{
static object Main(string[] args)
{
Console.WriteLine("Enter percentage here");
string Percentage = Console.ReadLine();


Console.WriteLine("Enter your number here");
string Number = Console.ReadLine();

String Result = Percentage / 100 * Number;


}
}
}

Answers

no longer returns an error but your math seems to have something wrong with it, always returns 0

Console.WriteLine("Enter a percentage here");

   int Percent = int.Parse(Console.ReadLine());

   Console.WriteLine("Enter your number here");

   int Number = int.Parse(Console.ReadLine());

   int result = Percent / 100 * Number;

)Assume passwords are limited to the use of the 95 printable ASCII characters and that all passwords are 10 characters in length. Assume a password cracker with an encryption rate of 6.4 million encryptions per second. How long will it take to test exhaustively all possible passwords on a UNIX system

Answers

Answer:

296653 years

Explanation:

The length of password = 10

To get possible password:

95 printable password raised to power 10

= 95¹⁰

Then we calculate time it would take to break password

95¹⁰/6.4million

95¹⁰/6400000

= 9355264675599.67 seconds

From here we get minutes it would take. 60 secs = 1 min

= 9355264675599.67/60

= 155921077927 minutes

From here we get number of hours it would take 1 hr = 60 mins

155921077927/60

= 2598684632 hours

From here we calculate number of days it would take. 24 hrs = 1 day

2598684632/24

= 108278526 days

From here we calculate number of years it would take. 365 days = 1 ye

= 108278526/365

= 296653 years

It would take this number of years to test all possible passwords

Consider the following code: x = 9 y = -3 z = 2 print ((x + y) * z) What is output?

Answers

The answer will be 3

An External Style Sheet uses the ________ file extension.

Answers

Answer:

css file extension

Explanation:

The question is straightforward and requires a direct answer.

In web design and development, style sheets are written in css.

This implies that they are saved in .css file extension.

Hence, fill in the gap with css

Which of the following is step two of the Five-Step Worksheet Creation Process?

Answers

Answer:

Add Labels.

As far as i remember.

Explanation:

Hope i helped, brainliest would be appreciated.

Have a great day!

   ~Aadi x

Add Labels is step two of the Five-Step Worksheet Creation Process. It helps in inserting the data and values in the worksheet.

What is label worksheet in Excel?

A label in a spreadsheet application like Microsoft Excel is text that offers information in the rows or columns around it. 3. Any writing placed above a part of a chart that provides extra details about the value of the chart is referred to as a label.

Thus, it is Add Labels

For more details about label worksheet in Excel, click here:

https://brainly.com/question/14719484

#SPJ2

is amazon a e-commerce website
o true
o false

Answers

Answer:

It is an online shopping website.

It’s online shopping.. so ig

Victoria turned in a rough draft of a research paper. Her teacher commented that the organization of the paper needs work.

Which best describes what Victoria should do to improve the organization of her paper?

think of a different topic
try to change the tone of her paper
clarify her topic and make it relevant to her audience
organize her ideas logically from least important to most important

Answers

Answer:

D

Explanation:

D would be correct

EDGE 2021

Suppose you attend a party. To be sociable, you will shake hands with everyone else. Write the algorithm that will compute the total number of handshakes that occur. (Hint: Upon arrival, each person shakes hands with everyone who is already there. Use the loop to find the total number of handshakes as each person arrives.)

Answers

Answer:

Following are the flowchart to the given question:

Explanation:

Under which command group will you find the options to configure Outlook rules?
O Move
O New
O Quick Steps
O Respond

Answers

Answer:

Move

Explanation:

I hope that helps :)

Answer:

a). move

Explanation:

edge 2021 <3

What is the effective address generated by the following instructions? Every instruction is

Independent of others. Initially

BX=0x0100, num1=0x1001, [num1]=0x0000, and SI=0x0100

a. mov ax, [bx+12]

b. mov ax, [bx+num1]

c. mov ax, [num1+bx]

d. mov ax, [bx+si]​

Answers

D. Mov ax, [bx+si] is your answer

Write a SELECT statement that returns these columns from the Orders table: The CardNumber column The length of the CardNumber column The last four digits of the CardNumber columnWhen you get that working right, add the column that follows to the result set. This is more difficult because the column requires the use of functions within functions. A column that displays the last four digits of the CardNumber column in this format: XXXX-XXXX-XXXX-1234. In other words, use Xs for the first 12 digits of the card number and actual numbers for the last four digits of the number.selectCardNumber,len(CardNumber) as CardNumberLegnth,right(CardNumber, 4) as LastFourDigits,'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumberfrom Orders

Answers

Answer:

SELECT

CardNumber,

len(CardNumber) as CardNumberLength,

right(CardNumber, 4) as LastFourDigits,

'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumber

from Orders

Explanation:

The question you posted contains the answer (See answer section). So, I will only help in providing an explanation

Given

Table name: Orders

Records to select: CardNumber, length of CardNumber, last 4 digits of CardNumber

From the question, we understand that the last four digits should display the first 12 digits as X while the last 4 digits are displayed.

So, the solution is as follows:

SELECT ----> This implies that the query is to perform a select operation

CardNumber, ---> This represents a column to read

len(CardNumber) as CardNumberLength, -----> len(CardNumber) means that the length of card number is to be calculated.

as CardNumberLength implies that an CardNumberLength is used as an alias to represent the calculated length

right(CardNumber, 4) as LastFourDigits, --> This reads the 4 rightmost digit of column CardNumber

'XXXX-XXXX-XXXX-' + right(CardNumber, 4) as FormattedNumber --> This concatenates the prefix XXXX-XXXX-XXXX to the 4 rightmost digit of column CardNumber

as FormattedNumber implies that an FormattedNumber is used as an alias to represent record

from Orders --> This represents the table where the record is being read.

A signal has a wavelength of 1 11m in air. How far can the front of the wave travel during 1000 periods?

Answers

Answer:

A signal has a wavelength of 1 μm in air

Explanation:

looked it up

17. Ano ang tawag sa pahina ng Excel?
a. Column
b. Columnar
c. Sheet page
d. Spread sheet​

Answers

D

Explanation:

D.spread sheet

........,,............:-)

What techniques overcome resistance and improve the credibility of a product? Check all that apply.
Including performance tests, polls, or awards
Listing names of satisfied users
Sending unwanted merchandise
Using a celebrity name without authorization

Answers

Answer: Including performance tests, polls, or awards.

Listing names of satisfied users

Explanation:

For every business, it is important to build ones credibility as this is vital on keeping ones customers and clients. A credible organization is trusted and respected.

The techniques that can be used to overcome resistance and improve the credibility of a product include having performance tests, polls, or awards and also listing the names of satisfied users.

Sending unwanted merchandise and also using a celebrity name without authorization is bad for one's business as it will have a negative effect on the business credibility.

what does command do

Answers

The command key’s purpose is to allow the user to enter keyboard commands in applications and in the system.

Lists and Procedures Pseudocode Practice For each situation, provide a pseudocoded algorithm that would accomplish the task. Make sure to indent where appropriate. Situation A Write a program that: Takes the list lotsOfNumbers and uses a loop to find the sum of all of the odd numbers in the list (hint: use Mod). Displays the sum. Situation B Write a procedure that takes

Answers

Answer:

The pseudocoded algorithm is as follows:

Procedure sumOdd(lotsOfNumbers):

    oddSum = 0

    len = length(lotsOfNumbers)

    for i = 0 to len - 1

         if lotsOfNumbers[i] Mod 2 != 0:

              OddSum = OddSum + lotsOfNumbers[i]

Print(OddSum)

Explanation:

This defines the procedure

Procedure sumOdd(lotsOfNumbers):

This initializes the oddSum to 0

    oddSum = 0

This calculates the length of the list

    len = length(lotsOfNumbers)

This iterates through the list

    for i = 0 to len-1

This checks if current list item is odd

         if lotsOfNumbers[i] Mod 2 != 0:

If yes, the number is added to OddSum

              OddSum = OddSum + lotsOfNumbers[i]

This prints the calculated sum

Print(OddSum)

Explain 2 ways in which data can be protected in a home computer??

Answers

Answer:

The cloud provides a viable backup option. ...

Anti-malware protection is a must. ...

Make your old computers' hard drives unreadable. ...

Install operating system updates. ...

Define and use in your program the following functions to make your code more modular: convert_str_to_numeric_list - takes an input string, splits it into tokens, and returns the tokens stored in a list only if all tokens were numeric; otherwise, returns an empty list. get_avg - if the input list is not empty and stores only numerical values, returns the average value of the elements; otherwise, returns None. get_min - if the input list is not empty and stores only numerical values, returns the minimum value in the list; otherwise, returns None. get_max - if the input list is not empty and stores only numerical values, returns the maximum value in the list; otherwise, returns None.

Answers

Answer:

In Python:

def convert_str_to_numeric_list(teststr):

   nums = []

   res = teststr.split()

   for x in res:

       if x.isdecimal():

           nums.append(int(x))

       else:

           nums = []

           break;

   return nums

def get_avg(mylist):

   if not len(mylist) == 0:

       total = 0

       for i in mylist:

           total+=i

       ave = total/len(mylist)

   else:

       ave = "None"

   return ave

def get_min(mylist):

   if not len(mylist) == 0:

       minm = min(mylist)

   else:

       minm = "None"

   return minm

def get_max(mylist):

   if not len(mylist) == 0:

       maxm = max(mylist)

   else:

       maxm = "None"

   return maxm

mystr = input("Enter a string: ")

mylist = convert_str_to_numeric_list(mystr)

print("List: "+str(mylist))

print("Average: "+str(get_avg(mylist)))

print("Minimum: "+str(get_min(mylist)))

print("Maximum: "+str(get_max(mylist)))

Explanation:

See attachment for complete program where I use comment for line by line explanation

The Payroll Department keeps a list of employee information for each pay period in a text file. The format of each line of the file is the following: Write a program that inputs a filename from the user and prints to the terminal a report of the wages paid to the employees for the given period. The report should be in tabular forma

Answers

Answer:

In Python:

fname = input("Filename: ")

a_file = open(fname)

lines = a_file.readlines()

print("Name\t\tHours\t\tTotal Pay")

for line in lines:

eachline = line.rstrip(" ")

for cont in eachline:

 print(cont,end="\t")

print()

Explanation:

This prompts the user for file name

fname = input("Filename: ")

This opens the file

a_file = open(fname)

This reads the lines of the file

lines = a_file.readlines()

This prints the header of the report

print("Name\t\tHours\t\tTotal Pay")

This iterates through the content of each line

for line in lines:

This splits each line into tokens

eachline = line.rstrip(" ")

This iterates through the token and print the content of the file

for cont in eachline:

 print(cont,end="\t")

print()

Other Questions
Describe the term differentiation, and the role it plays in the development of the fetus. plz help me How did China's geography affect the people living there Mr thompson!! Please help me sir! The processes involved with reproduction and nurturing a growing zygoterequire energy use beyond normal maintenance. What is the best way certainorganisms reduce the energy costs of reproduction?A. The parents each take turns nurturing the offspring.B. They reproduce asexually.C. They have multiple offspring in one pregnancy.D. They reduce their gestation period. How many solutions does -2 + 5p + 10 = 10 + 3p have? Time running out plzz hurry!!!!!! The Silk Road isA. a nickname for a smooth easy road.B. a main road in every major city covered with red silk.C. a road to the farm where they grow silk worms.D. a net of trading routes from China to other parts of Asia and Europe. Please helpppppp-3x-42>3And show work i NEED HELP PLZ HELPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPPP PLZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZZ IIIIIIIIIIIIIIIIIIIIIIIIIIIII NEEDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD HELPPPPPPPPPPPPPPPPPPPPPPPP PLZZZZZZZZZZZZZZZZZZZZZZZ 8.12394 rational or irrational Helpppp idfk whats an irrational number out of these HELP PLEASE!! GIVING BRAINLIEST!! If you answer this correctly ill answer some of your questions you have posted! (18pts) In a recent year, a hospital had 4310 births. Find the mean number of births per day, then use that result and the Poisson Distribution to find the probability that in a day there are 13 births. Leon got a reduction of $40 on a Geometry setwhich was marked $480.(a) What fraction was the reduction?(b) What percentage was the reduction?(c) What percentage of the cost did Leonpay for the Geometry set? 24 km10 kmWhat is the length of the hypotenuse? Where is f of x equals the quotient of x plus 5 and the quantity x squared plus 9 times x plus 20 discontinuous?A. -4B. 5C. f(x) is continuous everywhereD. -5, -4 Find the area of each figure. Round to the nearest tenth if necessary what is the m 3. Read the following passage from Why We Oppose Votes for Men by Alice Duer Miller before you choose your answer."Why we oppose votes for men because men are too emotional to vote. Their conduct at baseball games and political conventions shows this, while their innate tendency to appealto force renders them particularly unfit for tiye task of government."The rhetorical purpose of this satirical passage is to (5 points)A. depict men as more capable of controlling their emotions in all situationsB. reveal that men should not have the ability to vote because they can be violentC. assert that those who support suffrage are narrow-minded and overly emotionalD. reveal that objections to suffrage are based upon unfair stereotypes of women Michael starts a website for people in his town to share news and photos. Before launching the website, he has his friends and family sign up. Then, he uses the equation shown to estimate the number of users, y, who will have signed up x weeks after he officially launches the website. y = 82 ( 1.045 ) x What is the rate of growth Michael expects each week after launching the website? A. 104.5% B. 95.5% C. 4.5% D. 0.045%