Answer:
The correct options are;
The code is easy to test and debug
It creates programs made of modules that can be called when needed
It uses logic flow
The code is easier to follow
The code is easier to modify
Explanation:
The approach of structural programming is one such that the problem is well understood and the solution is economical
Features of structural programming includes;
Error debugging are facilitated by structural programs and as such testing to debugStructural program creates program modules that are reusableStructural programs can be easily modified hence maintainedStructural program emphasizes on logicThe structural program code is easily read and understood, and therefore, it is easier to followAnswer:
A.B.D.E.F.
Explanation:
pretty much everything except C.
:)
state the function of font group in the home tab
Explanation:
This group provides access to all the Character Formatting commands.
Create a class called Date that includes three pieces of information as data members -- a month (type int), a day (type int) and a year (type int). Your class should have a constructor with three parameters that uses the parameters to initialize the three data members. For the purpose of this exercise, assume that the values provided for the year and day are correct, but ensure that the month value is in the range 1-12; if it isn't, set the month to 1. Provide a set and a get function for each data member. Provide a member function displayDate that displays the month, day and year separated by forward slashes (/).
Answer:
please mark me brainlist
Explanation:
What do you mean by Bandwidth? Pls give full explanation
Answer:
In computing, bandwidth is the maximum rate of data transfer across a given path. It can be characterized as network bandwidth, data bandwidth, or digital bandwidth.
Explanation:
what is network and also how many types of network are there as well
Answer:
Summary:
Type of computer networks can categorize according to their size as well as their purpose
PAN is a computer network which generally consists of a computer, mobile, or personal digital assistant
LAN ( local area network) is a group of computer and peripheral devices which are connected in a limited area
WAN (Wide Area Network) is another important computer network that which is spread across a large geographical area
A metropolitan area network or MAN is consisting of a computer network across an entire city, college campus, or a small region
WLAN is a wireless local area network that helps you to link single or multiple devices using. It uses wireless communication within a limited area like home, school, or office building.
SAN is a storage area network is a type of network which allows consolidated, block-level data storage
System area network offers high-speed connection in server-to-server applications, storage area networks, and processor-to-processor applications
POLAN is a networking technology which helps you to integrate into structured cabling
Home network (HAN) is a always built using two or more interconnected computers to form a local area network (LAN) within the home
Enterprise private network (EPN) networks are build and owned by businesses that want to securely connect various locations
Campus area network (CAN) is made up of an interconnection of LANs in a specific geographical area
A VPN is a private network which uses a public network to connect remote sites or users together
Explanation:
Answer: Network is what is making you ask these questions.
Explanation: There are many different types of networks, like wifi, something like Verizon or Sprint, stuff like that. There are so many types of networks
please help me to solve this Question
Answer:
SHOPKEEPER$ = "Chocolate"
Explanation:
As an IT technician, you are responsible for maintaining your company's laser printers. Recently, you read that laser printers have a cleaning phase. Another IT technician explains that you do not need to clean a laser printer because of this phase. However, you do not agree. What actually occurs during this phase
Answer:
When the drums revolution is completed, the toner still remaining on the photoreceptor drum is cleaned by a plastic blade that is made of soft electrically neutral material which then deposits waste toner into a toner reservoir in the printer. The drum is then charged to become uniformly negatively charge by a rolling charger to prepare the drum for the beam from the laser.
Explanation:
what is full meaning of CIOS in ict
Answer: mark me as a brainlist i really need this plz plz plz
Explanation:
A chief information officer (CIO) is the company executive responsible for the management, implementation, and usability of information and computer technologies.
why my answer was deleted??
¿por que la toria de lamarck sobre el alargamiento del cuello de las jirafas por el esfuerzo continuado no pasara a sus descendientes? Porfa es ciencia y ambiente estoy en el peru
Respuesta: Los caracteres adquiridos no se transmiten genéticamente porque no modifican el ADN de los organismos
Explicación:
Jean-Baptiste Lamarck al igual que Charles Darwin, propuso una teoría sobre la evolución que explicaba cambios en los organismos a través del tiempo. La teoría de Lamarck se enfocaba en condiciones en el ambiente que propiciaban cambios en los organismos. Un ejemplo de esto son las jirafas, que de acurdo a Lamarck tenían cuellos largos debido al esfuerzo continuado para comer hojas de árboles altos. Esto significa que la característica de cuello largo era adquirido por las jirafas durante su vida y según Lamarck se transmitiría a sus descendientes.
Sin embargo, se ha comprobado que los caracteres adquiridos no modifican el ADN de los organismos, por ejemplo las cirugías estéticas no cambian el ADN de una persona y por esta razón no son transmitidos a sus descendientes. Por el contrario, en las poblaciones de organismos ciertas características prevalencen en el tiempo debido a la selección natural. Esto significa que el cuello de las jirafas es el resultado que el cuello largo sea una característica beneficiosa que ha prevalecido debido a la selección natural y no de características adquiridas que son transmitidas a descendientes.
how do i put pinned app to thr main screen
Answer:
Go to the screen you want to pin.
Swipe up to the middle of your screen. ...
At the top of the image, tap the app's icon.
Tap the Pin .
The CPU is responsible for?
The CPU (Central Processing Unit) is the part of a computer system that is commonly referred to as the "brains" of a computer. The CPU is also known as the processor or microprocessor. The CPU is responsible for executing a sequence of stored instructions called a program .
how can i earn money?
Answer:
You could get a job.
Explanation:
I know that it is sometimes impossible to get a job, because you are unable to get to anywhere, maybe because your family does not own a car, and it is too far to walk, so you could ask your neighbors if they need anything done, and they might pay you. If these don't work, then you could see if you could get a friend to drive you, and get a job, and see if they will be your taxi, but you pay them money for gas.
Hope that helps.
Answer:
maybe babysit
Explanation:
i earned a lot of money
Question 19 :A user needs the video capability in his computer upgraded to support a new graphics application. The computer includes an onboard video card. You install a new video card in the computer. You need to disable the onboard video card. Where should this card be disabled
Answer:
The onboard video card should be disabled in the BIOS. After you disable the onboard video card in the BIOS, it will no longer function.
Explanation:
Since in the question a user wants to upgrade for new graphics application and also the computer involves the onboard video card and a new video card is installed in the computer now you want to disabled it
So this can be done in the BIOS i.e basic input output system which is to be used for rebooting the computer system
And after disabled it, you cannot used.
A device is a program that must be installed in order for the peripheral device to be able to
work with the computer or laptop.
O prompter
O connector
O driver
O assister
In most cases; for a peripheral to work properly, a software must be installed on the computer, the peripheral is to be connected to.
The software is called (c) device driver
Some peripherals (such as mouse, keyboards, external Bluetooth, joysticks etc.) require that the user of the computer installs device driver on the host system.
Without the device driver installed, the following are the possible effects
The peripheral will not work at allThe peripheral will not function properlyThe peripheral causes the computer not to function optimallyHence, (c) driver is correct
Read more about device drivers at:
https://brainly.com/question/14308161
A user has multiple web pages open and is using email. Which layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) model is responsible for sorting the data to send email and web pages to the appropriate location
Answer: Transport layer
Explanation: The Transmission Control Protocol / Internet Protocol both combine to aid aod transmission of data through the internet. While the Transmission control protocol handles the establishment and Maintainace of network connection through applications , the Internet Protocol handles how the established data is being sent. The Transmission Control Protocol is forms a part of the transport layer which aids in the data transmission m ensuring that data is sent to the correct source. The transport layer is able to avoid errors as it ensures that established c is nnectio is maintained until data exchange is complete.
Identify characteristics of top-down programming design. Choose all that apply.
It assumes the problem has a simple solution.
It is good for running simple calculations.
It is simple to modify if steps change.
It is made of one or more modules.
It breaks a task into simpler and simpler steps.
Answer:
The correct option is;
It is made of one or more modules.
It breaks a task into simpler and simpler steps.
Explanation:
The implementation of top-down programming approach begins from the system defining basic modules and progresses by putting in place intermediate modules that take charge of more detailed and complex activities and processes. The intermediate modules are further streamlined into more specific programming
Therefore, the top-down programming is made of one or more modules that breaks a task into simpler and simpler steps.
Answer:
A, B, D and E
Explanation:
(Rocks Mineral
When limestone undergoes several changes, it forms
2
(marblelse
PA
For
the
are underground natural resources.
3. Metals are extracted from their
4. Molten rock inside the earth is called
5.
is used in making glass.
L
(magmalla
(Limestone/Sla
Yo
# Science-5
Answer:
TENDRIAS QUE PONER LA PREGUNTA MEJOR
Explanation:
What type of edge does UML use to denote interface implementation? Group of answer choices A dotted arrow from the interface to the class terminated with a triangular tip. A dotted arrow from the interface to the class terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with an open arrow tip. A dotted arrow from the class to the interface terminated with a triangular tip.
Answer:
A. A dotted arrow from the class to the interface terminated with a triangular tip
Explanation:
are teaching a class on computer hardware to new IT technicians. You are discussing the component on an Advanced Technology eXtended (ATX) motherboard that supports communication between the central processing unit (CPU) and random access memory (RAM). Which component provides this functionality
Answer:
The chipset of the motherboard.
Explanation:
The chipset that is on the motherboard handles all the data flow management of the system. This includes all communications that will occur on the motherboard including communication between the CPU and the RAM.
The chipsets themselves are designd by the companies that create the CPUs but are integrated on the motherboards created by third-party vendors.
Hope this helps.
Cheers.
write a program in python to make the figure:-
*
**
****
********
****************
********************************
The first and correct answer will be marked as brainliest......
Answer:
Halo mateeeee
look it will be hard to explain the code and steps to you so just refer this video. .
it will help a lott
( *cries* Serena left Ash In pokemon s19 with a k I s s)
https://youtu.be/rUy_Nq9DHTs
How are the waterfall and agile methods of software development similar?
Both methods allow project teams to complete small portions of the entire project in small sprints and work on different steps simultaneously.
Both methods focus on development rather than planning, in order for project teams to work more quickly.
Both methods have project teams work on one step at a time and move on when the previous step is completed and approved.
Both methods require documentation so project teams stay on track and keep control over what version of the project they are working on.
Answer:
In the question "first and last", that is "option 1 and 4" is correct.
Explanation:
In the given question the numbering of the choices is missing. if we numbering the choices, then the first choice is on the 1 number, the second choice is in 2 and so on, in which the correct and the wrong choice can be defined as follows:
In point 1, Both method, it divides the project into small parts, at it the working is easy, that's why it is correct. In point 4, Both method, it requires the documentation, that's why it tracks the project. In point 2 and 3, both were wrong because it focuses on both development and planning, and in Waterfall when one part is complete then it will go on the next part, but in the Agile, it does not use this technique.Question 1 : Mercury Technical Solutions has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, the new IT manager wants to use stronger security than SSL can offer. Which of the following protocols is similar to SSL but offers the ability to use additional security protocols? This task contains the radio buttons and checkboxes for options. The shortcut keys to perform this task are A to H and alt+1 to alt+9.
Answer:
The answer is "TLS and the DBMS".
Explanation:
In given- question there are two questions were included, which can be defined as follows:
The term, Transportation Layer Security is used as "TLS", that is an SSL security protocol that allows other security procedures should be used. It is an upgraded version of SSL, that works in very much the same way of SSL, and by encrypting information and data transfer.
The DBMS is used to store, access and handle data like layout or domain name and record and file structure of the database, it meets in the business requirements, consumers can create their respective databases including DBMS.
Write the features of Mark-I.
Answer:
mark- I was enormous in size,measuring 8 feet high,51 feet long and 3 feet deep it weighs tons used , 530 miles of wire and 730,000 separated plant.
Why is access to equipment so important to the education of an A/V technician? (Select all that apply).
A. A/V technicians have to learn how to use many different types of devices.
B. A/V technicians must become familiar with many different software programs.
C. A/V technicians for large companies often have to buy their own equipment.
D. A/V technicians are not always provided the equipment they need by their employers.
Answer:
The correct option is;
A. A/V technicians have to learn how to use many different types of devices
Explanation:
Sound recording, mixing boards, video monitors, projectors, speakers, and microphone equipment are set up and operated by audiovisual (A/V) technicians during concerts, live sport games, business meetings and conventions, TV and radio outdoors shoots and for on location assignments as well as equipment maintenance for universities and other organization. As such A/V it is essential for A/V technicians to develop manual dexterity on a wide variety of audiovisual equipment.
Answer:
For this one it is A: A/V Technicians have to learn how to use many different types of devices
but it may be worded differently, and if so its:
D:They need to learn how to use a wide variety of different types of equipment.
Explanation:
edg2021
A(n) ________ backup backs up only the files on a computer that have changed since the last time a backup was performed.
Answer:
incremental
Explanation:
An incremental backup backs up only the files on a computer that have changed since the last time a backup was performed.
An IP subnetting design requires 200 subnets and 120 hosts/subnet for the largest subnets, and requires that a single mask be used throughout the one private IP network that will be used. The design also requires planning for 20 percent growth in the number of subnets and number of hosts/subnet in the largest subnet. Which of the following answers lists a private IP network and mask that, if chosen, would meet the requirements?a. 10.0.0.0/25b. 10.0.0.0/22c. 172.16.0.0/23d. 192.168.7.0/24
Answer:
b. 10.0.0.0/22
Explanation:
Variable length subnet masking is a concept in networking that helps minimize wasting of Ipv4 ( IP version 4) network addressing. It takes a networking address and splits it to variable length.
The question above requires 120 hosts and a future host update of 20%, which is 144 hosts and a subnet of the same address of 200 to 240 in update. The host octet of the network address is totally used, which gives 254 hosts, that is extract 110 hosts. This can be further subnetted.
The two bits from the third octet is used for subnetting to give over 240 subnet mask.
Which function will add a grade to a student's list of grades in Python? add() append() print() sort()
Answer:
It will be add()
Answer:
A
Explanation:
Group of programs are software
Answer:
No
Explanation:
a single program or application is a software
Answer:
False
Software categories are groups of software. They allow software to be understood in terms of those categories, instead of the particularities of each package.
Write a Java program to compute the sum of the upper-rounded value of the number 4.2 and the square of 25. Display all the three values to the user on different lines, without any assignment operation in the entire program.
please answer.
Answer:
how do expect someone to write an entire java script code for you
Explanation:
You are a trainer for your company and often teach courses in a classroom located on-campus or in a hotel conference room. In your office, which is separate from the classroom, you have two external monitors connected to your laptop, and you are able to display different content on each monitor. However, when teaching, you only have your laptop and a projection unit. To make teaching easier, you want the same content to show on both the laptop monitor and the projection screen.
Which of the following multiple display options would be BEST to select when teaching?
A. Show only on 1.
B. Extend these displays.
C. Show only on 2.
D. Duplicate these displays.
Answer:
Duplicate these displays.
Explanation:
A. Show only on 1 displays only the first screen and disconnects the second one
B. Extend these displays displays two different outputs on the same computer
C. Show only on 2. displays only the second screen and disconnects the first one
D. Duplicate these displays. displays the same output for both screen
Answer:d. Duplicate these displays
Explanation:
write the steps to insert date and time in a cell
Answer:
Do one of the following:
To insert the current date, press Ctrl+; (semi-colon).
To insert the current time, press Ctrl+Shift+; (semi-colon).
To insert the current date and time, press Ctrl+; (semi-colon), then press Space, and then press Ctrl+Shift+; (semi-colon).