Question #1 Mutiple Select Which features are important when you plan a program? Select 4 options. Knowing what you want the program to do. Knowing how to find the result needed. Knowing what the user needs the program to accomplish. Knowing now many lines of code you are allowed to use Knowing what information is needed to find the result.​

Answers

Answer 1

Answer:

In planning a program, the following features are important.

- Knowing what you want the program to do.

- Knowing how to find the result needed.

- Knowing what the user needs the program to accomplish

- Knowing what information is needed to find the result

You start out by planning on what you want to create. Then you think of what programming language to use. The features to be included and then the task you want this program to accomplish

Answer 2

Answer:A,C,D,E

Explanation:


Related Questions

is anyone a robIox creator?
me and some of my friends are going to work on a robIox game and we need someone to help us build and script it.
anyone wanna help?

Answers

Well, I am now getting into making Robl. games, so I would be able to help.

But the only downside is that my computer isn't working at the moment and may take a while to fix. But i'm sure when i am done with it, I could help.

Write a Java program that launches 1000 threads. Each thread adds 1 to a variable sum that initially is 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect.

Answers

Java is a 3D mental breakdown in the sim game and he has to play the game and play it with the same thing he has been doing wrong and he is a queen and he is

Suppose you have n classes that you want to schedule in rooms. Each class has a fixed time interval at which it is offered, and classes whose times overlap cannot be scheduled in the same room. There are enough rooms to schedule all the classes. Design a O(n log n) time algorithm to find an assignment of classes to rooms that minimizes the total number of rooms used.

Answers

Answer:

Function schedule( list of tuple of start and end times, class available)

   class_list = create list of class from class available

   for items in time_list:

       if items is not same range as time_list[-1]:

           newdict[items] = class_list[0]

           print class time: class venue

       elif items is same range as time_list[-1]:

           used_class = newdict.values

           index = class_list.index(used_class[-1])

           new_dict[items] = class_list[index + 1 ]

           print class time: class venue

Explanation:

The algorithm above describe a program with a time complexity of O(n log n). The function defined accepts two parameters, an array of start and end time tuple and the number of class available for use. The algorithm uses a quick sort to compare the time interval of the items in the list and schedule new classes for classes that overlaps with others.

FIRST TO ANSWER RIGHT GETS BRAINLIEST!!!!! Which of the following sets of data would be represented best in a histogram?

A. the number of toys sold in five price ranges

B. the average monthly sales for the Big Toy Company

C. the number of each type of candy sold last month

D. the temperature at which hard candy melts

Answers

Answer:

b

Explanation:

I think it would be B. The average monthly sales for the big toy company because its giving data over history

Spanning Tree Protocol (STP) is a loop-prevention mechanism used in modern networks. STP is, however, vulnerable to misconfiguration. Which protections accompany STP

Answers

Answer:

Any of the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

Explanation:

Given that STP an acronym of Spanning Tree Protocol, and its major purpose is to stop the bridge loops and the broadcast radiation that emanates from its topology.

Cisco carried out three instruments or tools to protect the STP topology. These protection tools accompany the STP, and they are the following:

1. Root Guard

2. BPDU Guard

3. BPDU Filtering

. What is a one-dimensional basic component in art and geometry

Answers

Answer:

a straight line

Explanation:

Anything one dimensional can only be a line

An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as what type of attack

Answers

Answer:

An attempt to generate a large number of session IDs and have a server process them as part of a session hijack attempt is known as

TCP Session Hijacking.

Explanation:

TCP Session Hijacking is a cyber-attack in which illegitimate access is acquired to a client's server in the network.  The attacker then hijacks the TCP/IP session by reading and modifying transmitted data packets and also sending requests to the addressee's server.  To achieve this attack effectively, the hacker generates a large number of session IDs, thereby confusing the client's server to process them as a part of the users' sessions. Sessions (a series of interactions between two communication end points) are used by applications to store user parameters and, they remain alive until the user logs off.

fill in the blanks y'all-

-------- is a pictorial representation of a step-by-step algorithm

I will give brainliest, just answer quick :) ​
k I don't need it anymore

Answers

Answer:

Flowchart

Explanation:

Flowchart is a pictorial representation of a step-by-step algorithm.

It comprises of the various steps involved in a process which are usually well arranged in an orderly and sequential manner.

It is also referred to how algorithms are diagrammatical put up for better analysis .

list down four ways to start word 2010​

Answers

1Locate the Word icon on the Start button's All Programs menu. Don't click to start Word now!
2Right-click the Microsoft Word 2010 menu item. A pop-up menu appears.
3Choose Send To→Desktop (Create Shortcut).
4Press the Esc key to hide the Start button menu and view the desktop.

What character, when used at the beginning of the constructor name in a class, makes the class variables have a scope limited to the function?

* (an asterisk)

# (a pound sign)

$ (a dollar sign)

_ (an underscore)

Answers

Answer:

_ (an underscore)

Explanation:

The underscore character.

__init_ and __str__ have double underscore characters at the beginning and end of the function name.

Correct answer edge 2020

Answer:

The answer to your question is _ (an underscore).

I hope this helps you out and I hope that you have a wonderful day.<3<3<3

Explanation:

A cloud is an example of

Answers

soft and squishy looking

Answer:

1st one.

Explanation:

what type of file is created when you save your word processing document

Answers

Answer:

When documents are saved in a word processing program they are typically saved in the word processing program's default proprietary file format. For example, Open Office documents are saved in . odf format and WordPerfect documents are saved in the . wpd format.

I hope this helps! :}

Explanation:

write c++ program to find maximum number for three variables using statement ?​

Answers

Answer:

#include<iostream>

using namespace std;

int main(){

int n1, n2, n3;

cout<<"Enter any three numbers: ";

cin>>n1>>n2>>n3;

if(n1>=n2 && n1>=n3){

cout<<n1<<" is the maximum";}

else if(n2>=n1 && n2>=n3){

cout<<n2<<" is the maximum";}

else{

cout<<n3<<" is the maximum";}

return 0;

}

Explanation:

The program is written in C++ and to write this program, I assumed the three variables are integers. You can change from integer to double or float, if you wish.

This line declares n1, n2 and n3 as integers

int n1, n2, n3;

This line prompts user for three numbers

cout<<"Enter any three numbers: ";

This line gets user input for the three numbers

cin>>n1>>n2>>n3;

This if condition checks if n1 is the maximum and prints n1 as the maximum, if true

if(n1>=n2 && n1>=n3){

cout<<n1<<" is the maximum";}

This else if condition checks if n2 is the maximum and prints n2 as the maximum, if true

else if(n2>=n1 && n2>=n3){

cout<<n2<<" is the maximum";}

If the above conditions are false, then n3 is the maximum and this condition prints n3 as the maximum

else{

cout<<n3<<" is the maximum";}

return 0;

The development methodology where each part of a project is done in order after each other is called:

Answers

Bruh this a duplicate

What is a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide, complete with transitions and captions?

Screenshot feature
Photo Album feature
Online Pictures command
Format command

Answers

Answer:

B

Explanation:

Photo Album feature s a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide.

What is Photo album feature?

Slideshows are excellent for many types of presentations than simply professional ones. To make a memorable performance, use Microsoft PowerPoint to make a photo album and add music or visual effects.

Let's look at how to construct a photo book in PowerPoint for personal presentations of special occasions like weddings and anniversaries or even slideshows for organizations where the major focus is photographs.

Open PowerPoint and either start from scratch or use an existing presentation. PowerPoint automatically adds the photo album to a new slideshow when you create it.

Therefore, Photo Album feature s a new option in PowerPoint 2016 that provides the ability to add multiple pictures into a slide.

To learn more about Photo album feature, refer to the link:

https://brainly.com/question/20719259

#SPJ3

Which form of data does the image represent? (10 points)
A. Analog data
B. Digital data

Answers

The image in the photograph is representing A. Analog Data. Analog data is data that is represented in a physical way. Where digital data is a set of individual symbols, analog data is stored in physical media, whether that's the surface grooves on a vinyl record, the magnetic tape of a VCR cassette, or other non-digital media. Analog and digital signals are different types which are mainly used to carry the data from one apparatus to another. Analog signals are continuous wave signals that change with time period whereas digital is a discrete signal is a nature. Examples of analog technology: photocopiers. old land-line telephones. audio tapes. old televisions (intensity and color information per scan line). Analog and digital signals are the types of signals carrying information. The major difference between both signals is that the analog signals that have continuous electrical signals, while digital signals have non-continuous electrical signals.

Match the examples on the left with the categories on the right

Answers

I think the answer is 3,1,2

Suppose that L is a sorted list of 1,000,000 elements. To determine whether the x item is in L, the average number of comparisons executed by the sequential search algorithm is _____.

Answers

Answer:

≅500,000 comparisons.

Explanation:

The sequential search algorithm is, as its name express, a comparison method to search for a specific value in a list, sorted or not.

It starts with the first element in the list, compares the element with the searched value, if it is a match it stops, otherwise it moves to the next element and repeats.

In general, if the list size is X, the average number of comparisons is:

[tex]\frac{X+1}{2}[/tex]

Solving for X=1,000,000, the result is ≅500,000 comparisons.

types of libraries in operating system​

Answers

Answer:

Academic, Public, National & Special Library

Explanation:

Typically you will not find biometric devices in _________ security buildings. Low High Minimal Medium

Answers

Answer:

Low

Explanation:

Biometrics security systems are hardware scanners that are useful for capturing the biometric of individuals as a means of verifying identity. These scans would be matched against the saved database and in turn access would be approved or denied to the system. In other words, biometric security gives the human body the “key” to unlock your access into buildings.

You will not find such devices in low security buildings.

In which program structure does the processor verify the mentioned condition only after executing the dependent statements once?

A. Switch Case Structure
B. Do While Structure
C. If Else Structure
D. For Structure
E. While Structure​

Answers

B. because you have to do it while in structure.
The answer is B , do while structure.

g The method of mapping where each memory locationis mapped to exactly one location in the cache is

Answers

Answer:

Direct Mapped Cache

Explanation:

Given that a Direct Mapped Cache is a form of mapping whereby each main memory address is mapped into precisely one cache block.

It is considered cheaper compared to the associative method of cache mapping, and it is faster when searching through it. This is because it utilizes a tag field only.

Hence, The method of mapping where each memory location is mapped to exactly one location in the cache is "Direct Mapped Cache"

africans are unique people they are rich culture and a glorious history​

Answers

Explanation:

In Africa art including crafts and culture, mythology and faith, clothes, lifestyle, music and tongues, African pixel is influenced. In Africa, social identities are plentiful, with vast quantities of multiculturalism being discovered not only through various continents, as well as within individual nations.

59. When analyzing the IDS logs, the system administrator noticed an alert was logged when the external router was accessed from the administrator's Computer to update the router configuration. What type of an alert is this

Answers

Answer:

False Positive

Explanation:

A false positive or false positive error may be defined as a result which indicated that the given conditions seems to exists when it actually does not. It is classified as a type I error. It tests a check for a single condition and then falsely provides a positive or affirmative decision.

In the context, a false positive type of error occurred when the external router of the system administrator was accessed from the computer of the administrator that was used to update the configuration of the router.

im trying to call the keys in a dictionary I have called "planet_dict". in order for them to be included in the for loop, the values of the keys have to be within a range of
273 <= x <= 373
I understand how to do this with certain values, but idk how to call them from a dictionary.

Answers

You can do something like this. My code iterates through the dictionary keys and then we use that key to get a value. We check if the value is between 273 and 373 and if it is, it's a water planet. My code is just a general idea of what to do. Instead of printing, you could add the key to a list and then print the contents of the list.

Discuss two (2) methods for combining multiple anomaly detection methods to improve the identification of anomalous objects. You must consider both supervised and unsupervised cases in your discussion.

Answers

Answer:

Supervised anomaly detection is a process in data mining that uses a historic dataset of dependent variables and labeled independent variables to detect outliers or anomalies in the data been mined.

Unsupervised anomaly detection method uses unsupervised algorithms of unlabeled clusters to label and predicts and rule-out outliers or anomalies.

Explanation:

Anomaly detection is a method of identifying data or observations with high deviation or spread from other grouped data. Supervised and unsupervised machine learning algorithms are used to predict and detect abnormal datasets or outliers during data mining.

The supervised anomaly detection algorithm trains the model with a dataset, for the algorithm to derive a function it could use to predict outlier or anomalies. The unsupervised detection algorithm is able to cluster and label normal and abnormal data in the dataset, using this function to detect anomalies in future datasets.

What is included in a linked list node?

I a reference to the next node
II an array reference
III a data element

Answers

Answer: I a reference to the next node

III a data element

Explanation:

A linked list is simply referred to as a linear data structure, whereby the elements would not be stored at memory locations that are together in the sequence.

In simple words, we can simply say that a linked list is made up of nodes in which, every node has a data element and also a link or reference to the next node that is in the list.

Therefore, based on the explanation above, the correct option will be:

I. a reference to the next node

III a data element

PLEASE ANSWER ASAP! THANKSSSSS

Answers

That is hard .....……

Which sentence indicates that Jeff is mentioning the visual synopsis in his proposal while planning a media project?

In the proposal, Jeff states the reason to create the project. He also explains how his project will conclude with a perfect takeaway point. Jeff describes how he is going to tell the story through photography. He then mentions various strategies to engage his audience and describes plans to make sure that the project reaches his intended audience.

Answers

Answer:

I believe its the last question

Explanation:

Answer:

I would say describes plans to make sure that the project reaches his intended audience

Explanation:

none needed

Which hard drive type would be best to use by the army when writing operational data while traveling in a jeep in rough terrain?

Answers

Answer:

They should use an SSD.

Explanation:

The fact that the writing operation takes place in a jeep in rough terrain suggests that they should be using an SSD (Solid State Drive) which unlike HDD's, don't have a spinning disk and a head that writes data on it. So there are no moving parts in an SSD,  and they have about 30 times more resistance to shock/vibration damage which is really helpful in this situation.

I hope this answer helps.

Other Questions
Jamaal converted the following conic equation from general form to standard form.amaal converted the following conic equation from general form to standard form.4x2 + 4y2 16x + 24y 12 = 04x2 16x + 4y2 + 24y = 124(x2 4x) + 4(y2 + 6y) = 124(x2 4x + 4) + 4(y2 + 6y + 9) = 12 + 4 + 94(x 2)2 + 4(y + 3)2 = 25Jamaal identifies the center of the circle as(2, 3) and the radius as r = Five-halves.What error, if any, did Jamaal make ?Jamaal misidentified the center. The center should be at the point (2, 3).Jamaal did not complete the square correctly; he should have added 16 and 36 inside the parentheses in step 4. The radius is r = StartRoot 55 EndRoot.Jamaal added 4 and 9 to the right hand side in step 4; he should have added 16 and 36. The radius is r = 8.Jamaal did not make an error. ayee someone help pleasee Cl2 +NaBrwhats this answer?! A bag contains 120 marbles. Some are red and the rest are black. There are 19 red marbles for every black marble. How many red marbles are in the bag? If 6 grams of a hydrocarbon gas have a volume of4.8 cubic decimeter, what would be theapproximate molecular mass of this gas?A 30 gramsB 40 gramsC 20 gramsD 48 grams Anybody know the answer to these Isabella is making a bracelet for her friend. She has to decide which type of band to use, either leather or Siver. She also plans on picking two charms for thebracelet. One of the charms will be of an animal, either a cat or a dog. The other charm will be of a sport, either basketbal, baseball, or soccer. How manydifferent bracelet combinations does Isabella have to choose from?O 307O 8O 12 Complete the following sentence.One effective reading strategy involves reading difficult or detailed material in the morning when well- __________. How does the process of migration work? . Scientists know that animals migrate to find food. They also migrate to give birth. The best way to combine these sentences:1. Scientists know that animals migrate to find food, they also migrate to give birth2. Scientists know that to find food and migrate, animals give birth.3. Scientists know this, animals migrate to find food and give birth.4. Scientists know that animals migrate to find food or give birth. List at least 2 weaknesses of the Articles of Confederation. The $40 million lottery payment that you have just won actually pays $2 A survey asks a random sample of 1500 adults in Ohio if they support an increase in the state sales tax from 5% to 6%, with the additional revenue going to education. Let ^ p denote the proportion in the sample who say they support the increase. Suppose that 13% of all adults in Ohio support the increase. The standard deviation of the sampling distribution is which of these ideas were influenced by judeo-christians and principles of government check all that apply. Why do you think most Americans in 1776 wanted a weak central government? write net ionic equations for the reaction, if any, that occurs when aqueous solutions of the following are mixed. a. ammonium sulfate and barium nitrate Please help!!Read this sentence from paragraph 3.He did not like, however, to speak of this; only at times, whensome one asked him whose hand that could be, he pointedmysteriously to the Polar Star, and said, "It comes from thatplace."Which point of view is reflected in Skavinski's statement?belief that there are people living on a planet other than earthfaith in the idea that people will be okay no matter what happensbelief in something larger than oneself controlling peoples' ivesfaith that all people have a combination of good and bad luck What raises your heart rate and makes you sweat more? Cardio or weights? PLEASE HELP crimes that people did to the tainos add explanation where's wally? i need to know!!! Theres an old man needed your help but you are soo late in your work.What would you do?explain it briefly.