the items below describe different elements of a hypertext link as it appears in html. which are especially true about the link's highlighted text, as opposed to other elements of the link? select all that apply.

Answers

Answer 1

The options that are especially true about the link's highlighted text, as opposed to other elements of the link are options A and C:

A. Click on the text and the browser follows the link.

C. Not inside the "a" tag in the HTML; instead, it is surrounded by the "a" tag and its "end" tag

What is it called when you click on a link?

In order to access another website, you can or need to click on a text or icon that is marked as a hyperlink. As a point of connection between one page and other pages on the internet, the link is one which is typically blue and underlined is one that acts as a reference. It is known as the anchor text that is the text that is linked.

Note that Angle brackets ( >) must always be used around tags. Element and attribute combinations make up tags. An element is something that appears on a page, like a heading, paragraph, or image, and attributes are characteristics that are used to describe that element. Normal tag movement involves pairs.

Therefore, in the context of the question, The element is one of many HTML elements that lacks any content. The term "empty element" refers to these components. The end tag is absent from empty elements.

Learn more about HTML from

https://brainly.com/question/4056554
#SPJ1

See full question below

The items below describe different elements of a hypertext link as it appears in HTML. Which are especially true about the link's highlighted text, as opposed to other elements of the link? Multiple Choice

A. Click on the text and the browser follows the link.

B. The text is not displayed when the browser displays the page.

C. Not inside the "a" tag in the HTML; instead, it is surrounded by the "a" tag and its "end" tag

D. Contains the URL


Related Questions

A company wants to create highly available datacenters. Which of the following will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down?
A. Load balancer
B. VRRP
C. OSPF
D. BGP

Answers

A company wants to create highly available datacenters. BGP will allow the company to continue to maintain an Internet presence at all sites in the event that a WAN circuit at one site goes down.

About BGP

BGP (Border Gateway Protocol) is a type of routing protocol that functions to exchange information between Autonomous Systems (AS). This BGP is a Dynamic Routing and on the proxy itself there are several kinds of dynamic routing features other than BGP such as OSPF and RIP. To exchange information, BGP utilizes the TCP protocol so that there is no need to use other types of protocols to handle fragmentation, retransmission, acknowledgment and sequencing.

Characteristics Of BGP Using distance vector routing algorithm. Distance vector routing algorithm periodically copies the routing table from router to router. Changes to the routing table are updated between interconnected routers when a topology change occurs. Used between ISPs with ISPs and clients. Used to route internet traffic between autonomous systems. BGP is Path Vector routing protocol. In the process of determining the best routes, it always refers to the best and selected path that it gets from other BGP routers. BGP routers establish and maintain peer-to-peer connections using port number 179. Inter-peer connections are maintained using periodic keepalive signals. The metrics (attributes) for determining the best route are complex and can be modified flexibly. BGP has its own routing table which usually contains the routing prefixes it receives from other BGP routers

Learn more about BGP at https://brainly.com/question/9257367.

#SPJ4

(fill in the blank) this service may be the most important service on the internet, because many people who have no other use for the internet use it.

Answers

Email is the service may be the most important service on the internet, because many people who have no other use for the internet use it.

What is Email?

Electronic mail, abbreviated "email," is a method of communication that uses electronic devices to deliver messages across computer networks. The term "email" refers to both the delivery system and the individual messages sent and received.

Email has existed in some form since the 1970s, when programmer Ray Tomlinson devised a method to send messages between computer systems connected to the Advanced Research Projects Agency Network (ARPANET). With the development of email client software (e.g., Outl_ook) and web browsers, modern forms of email became widely available for public use, allowing users to send and receive messages over the world wide web using web-based email clients (e.g. G_mail).

To learn more about Email, visit: https://brainly.com/question/553980

#SPJ4

which mode specifier will erase the contents of a file if it already exists and create the file if it does not already exist?

Answers

The pop() method can be used to delete particular list items. The element at the specified index is removed by the pop() method, which takes the index value as an argument.

a string TrimEnd creates a new string object by removing characters from the end of a string. The characters to be eliminated are specified in an array of characters that is supplied to this procedure. When a class instance is created, the __init__ special method is immediately called. Another name for it is class constructor. For binary files, the line terminator is always b'n'; for text files, the newline parameter to open() can be used to choose the recognized line terminator(s).

Learn more about array here-

https://brainly.com/question/19570024

#SPJ4

while kari was searching the internet, her computer was infected by a virus. what problem can kari expect as a result?

Answers

Answer:

The virus will attach itself to the computer's RAM, then attach itself to executable files in RAM.

Explanation:

if a vim user wants to use a command that is similar to the windows copy command, what command should they use?

Answers

If a vim user wants to use a command that is similar to the windows copy command, they will choose command "y".

What is Vim command?An improved version of the Vi editor, Vim, is a text editor that is more compatible with Vi. Vi editors are most frequently used to create new files, modify existing files, or just read files. When editing various types of plain text, the Vim editor is more beneficial. More editing software uses this command.The Vi editor has undergone numerous improvements, including the ability to open multiple windows at once, multi-level undo options, buffers, syntax highlighting, filename completion, command-line editing, online help, and many others.Linux code implementation and fundamental Vim commands.

To learn more about command, refer to

https://brainly.com/question/25480553

#SPJ4

maria turns on a computer and it doesn't boot up properly. from inside the case, she hears a series of beeps. which of the following actions will maria perform to resolve this problem?

Answers

Maria should start by inspecting for any loose internal connections. Then, she should determine if any of the parts, including the RAM, CPU, or video card, are broken.

Describe RAM.

A type of computer memory called random-access memory, which can be read and updated in any sequence, is often used to store operational data and programme code. In contrast to other direct-access data storage media (such as hard discs, CD-RWs, DVD-RWs, and the elderly magnetic media and drum recollection), random-access memory devices allow data to be peruse or written in almost the same length of time regardless of the physical place of data inside the memory.

To know more about RAM
https://brainly.com/question/3279822
#SPJ4

which type of internet connection can provide an unshared connection over regular telephone lines operating with at least 1 mbps of bandwidth?

Answers

DSL internet connection can provide an unshared connection over regular telephone lines operating with at least 1 mbps of bandwidth.

What is a DSL?

DSL internet is high-speed internet that you connect to via Wi-Fi or an ethernet cable via a modem. DSL is an abbreviation for Digital Subscriber Line/Loop, which is a data transmission medium that uses a copper telephone landline to receive data. (If you arrived here while looking for information on domain specific languages, also known as DSL, you should leave now.)

DSL is the most common type of broadband internet access, and it uses existing phone wiring to transmit data via a DSL modem, making the internet available to everyone.

To know more about DSL, visit: https://brainly.com/question/27961481?referrer=searchResults

#SPJ4

A computer randomly generates numbers 1 through 100 for a lottery game. Every lottery ticket has 7 numbers on it. Identify the correct experiment, trial, and outcome below: Select all that apply: The experiment is the computer randomly generating a number The experiment is the computer randomly generating a number less than 10. A trial is one number generated. The trial is identifying the number generated. An outcome is the number 2 being generated. The outcome is the number being randomly generated.

Answers

Answer:

it were be a diffent number :

You have decided to establish a VoIP system in your home. Which of the following devices is necessary to connect your analog telephone to your VoIP server? a. Codec b. IP-PBX c. Softphone d. ATA

Answers

The device which is necessary to connect the analog telephone to the VoIP server is d. ATA

ATA is an abbreviation for analog telephone adapter which is used to connect a standard telephone to a network or computer so that the user can make calls over the Internet.

Analog telephone adapters create a physical connection between a phone and a network device or computer; some ATA perform analog-to-digital conversion and connect directly to a VoIP server, while some ATA uses software for either or both of these tasks.

The simplest type of ATA consists of one or more RJ-11 jacks to plug a telephone into and a USB connector that plugs into the user's laptop, computer, or handheld device. This ATA often works in conjunction with some type of software (generally a softphone program). The software serves as an intermediary between the VoIP server and a telephone, digitizing voice data so that it can be transmitted over the Internet.

To learn more about analog telephones; click here:

https://brainly.com/question/10988503

#SPJ4

A bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. Which of the following BEST addresses this need? A. Guards B. Bollards C. Motion sensors D. Access control vestibule

Answers

Since the bank would like to enhance building security in order to prevent vehicles from driving into the building while also maintaining easy access for customers. The BEST term that addresses this need is option C. Motion sensors.

What is a motion sensor, exactly?

A motion sensor is seen as a gadget that tracks actual movement on a thing or in the surroundings. It has the capacity to instantly recognize and record kinetic and/or physical actions. A motion detector is another name for a motion sensor.

Therefore,  Since the bank wants to know before hand, the use of a motion sensor, sometimes known as a motion detector, is a piece of technology that use a sensor to find nearby individuals or objects. Any security system needs motion sensors as a crucial part. A sensor will alert your security system and, with newer systems, your cell phone when it senses motion. Hence, it is the best.

Learn more about Motion sensors from

https://brainly.com/question/28027581

#SPJ1

Ask the user to guess a number between 1 and 100 using a loop. Have them keep guessing the answer until it is correct. If the answer the user gives is too low, have it print "Guess higher". If the answer is too high, have it print "Guess lower." Use random function to make the number the user has to guess, and ask the player if they would like to play again. Print "Congrats" when the player guesses correctly.

Answers

The python program using the random function to make the number the user has to guess is as detailed below.

How to create a Python Program?

Python is a programming language widely used for developing websites and software, data analysis, data visualization and task automation.

The python program for the given question is;

import random

the_number = random.randint(1, 4)

guess = 0

print(the_number)

minPossible = 0

maxPossible = 100

while guess != the_number:

   guess = int(input("Please enter a number: "))

   if guess > the_number:

       print("Player, guess lower...\n")

       if guess < maxPossible:

           maxPossible = guess - 1

   elif guess < the_number:

       print("Player, guess higher...\n")

       if guess > minPossible:

           minPossible = guess + 1

   else:

       print("Game Over! The number was", the_number, "Congrats!")

       break

   guess = random.randint(minPossible, maxPossible)

   if guess > the_number:

       print("Computer, guess lower...\n")

       maxPossible = guess - 1

   elif guess < the_number:

       print("Computer, guess higher...\n")

       minPossible = guess + 1

   else:

       print("Game Over! The number was", the_number,"The Computer wins!")

print("Thank you for playing")

Read more about Python Program at; https://brainly.com/question/26497128

#SPJ1

which of the approaches is used to determine the password of a system account or a user account? (choose two.)

Answers

Using a Trojan horse, an approach is used to discover the password for a user or system account.

Explain about the Trojan horse?

A application that has been downloaded and installed on a computer but is actually dangerous in nature is known as a Trojan horse. Strong signs that a Trojan is present on a computer include unexpected changes to its settings and odd activity, even when it should be idle.

Trojan malware is so named because it imitates the method used to infect computers in the ancient tale of the Trojan horse. A Trojan will conceal itself among apps that appear to be safe to use, or it will try to fool you into installing it. Trojans don't spread themselves through infecting other files or systems like viruses do. A Trojan is a computer program that targets your data or network in order to injure, interfere with, steal from, or otherwise cause harm.

To learn more about Trojan horse refer to:

https://brainly.com/question/29590559

#SPJ4

the set of methods that can be used to acquire, organize, store, manipulate, and transmit information is known as .

Answers

Information technology is the umbrella term for a collection of processes that can be used to collect, arrange, organize, store, alter, and transfer data.

Technology: What Is It?

Technology is the systematic and repeatable body of scientific to achieve practical objectives. The result of such an effort is sometimes known as technology. The use of tech is pervasive in many areas, including daily life, science, industry, communication, and transportation. Both real things like the machines or the utensils and intangible tools like software are considered technologies. Computer technology (IT) is indeed the practice of creating, processing, storing, retrieving, and exchanging various types of data and information using computers. Technology used for information and communications includes IT.

To know more about Technology
https://brainly.com/question/7788080
#SPJ4

5. [4 pts] two stations running tcp/ip are engaged in transferring a file. this file is 100mb long, the payload size is 100 kb, and the negotiated congestion window size is 300 kb. the sender receives an ack 1200 from the receiver. (2 points each) a. which bytes will be sent next? b. what is the last byte number that can be sent without an ack being sent by the receiver?

Answers

On the internet, network devices are connected via a set of protocols referred to as TCP/IP, or Transmission Control Protocol/Internet Protocol.

What stations running TCP/IP are engaged in a file?

In the transport layer, TCP coexists with other protocols like UDP. Except for UDP, which has less robust error checking, protocols in this layer guarantee error-free data transfer to the source.

A connection between the destination computer and the source sending computer. One of the two primary methods of data transmission in a TCP/IP network is TCP.

Therefore,  Additionally, a private computer network uses TCP/IP as its communication mechanism (an intranet or extranet).

Learn more about TCP/IP here:

https://brainly.com/question/27742993

#SPJ1

In the short-run, if P < ATC, a perfectly competitive firm should increase production to the output level at which P = ATC. continue producing at a loss. shut down. continue producing at a profit. There is not enough information to answer the question.

Answers

In the short-run, if P < ATC, a perfectly competitive firm should option B: There is not enough information to answer the question since we do not know the firm's AVC.

What Is Perfect Competition?

According to economic theory, perfect competition exists when all businesses sell the same goods, market share has no bearing on prices, businesses can enter or quit the market without any obstacles, consumers have perfect or complete information, and businesses are unable to set prices.

Note that a perfect market, also known as an atomistic market, is defined by various idealizing conditions, which are together referred to as perfect competition, or atomistic competition, in economics, specifically general equilibrium theory.

Because competing firms pressure them to accept the market's current equilibrium price, a perfectly competitive firm is referred to as a price taker.

Therefore, from the question, you can see that some data are missing and as such, one cannot make any reasonable conclusion. Hence, option B is correct.

Learn more about perfectly competitive firm from

https://brainly.com/question/1748396

#SPJ1

Explanation:

function of the organelle in question 4.

Using the diagram and your knowledge of biology, identify the following:

a. Organelle A_____

b. Substance A_____

c. Substance B_____function of the organelle in question 4.

Using the diagram and your knowledge of biology, identify the following:

a. Organelle A_____

b. Substance A_____

c. Substance B_____

RT 2: Regents Review!

ections: Recall what you learned in unit 1 about designing an experiment to answer the ientist is interested in the effect that the amount of glucose given to a mitochondria n unt of carbon dioxide that is produced.

scientist sets up three containers: Container 1 holds 20 mitochondria and a 0.5 %cor ainer 2 holds 20 mitochondria and a 1.0 % concentration of glucose; and Container 3 hondria and a 5.0 % concentration of glucose. 0.5 % concentration of glucose

function of the organelle in question 4.

Using the diagram and your knowledge of biology, identify the following:

a. Organelle A_____

b. Substance A_____

c. Substance B_____

RT 2: Regents Review!

ections: Recall what you learned in unit 1 about designing an experiment to answer the ientist is interested in the effect that the amount of glucose given to a mitochondria n unt of carbon dioxide that is produced.

scientist sets up three containers: Container 1 holds 20 mitochondria and a 0.5 %cor ainer 2 holds 20 mitochondria and a 1.0 % concentration of glucose; and Container 3 hondria and a 5.0 % concentration of glucose. 0.5 % concentration of glucose

RT 2: Regents Review!

ections: Recall what you learned in unit 1 about designing an experiment to answer the ientist is interested in the effect that the amount of glucose given to a mitochondria n unt of carbon dioxide that is produced.

scientist sets up three containers: Container 1 holds 20 mitochondria and a 0.5 %cor ainer 2 holds 20 mitochondria and a 1.0 % concentration of glucose; and Container 3 hondria and a 5.0 % concentration of glucose. 0.5 % concentration of glucose

The three main parts of a computer are the cpu, memory, and motherboard. Imagine you are explaining what a computer is to a kindergarten student. What analogy would you use to explain the hardware parts of a computer?.

Answers

I will use analogy like if these components, like a human body, work together to enable us to go about our daily lives. The computer and thus CPU functions similarly to the brain, performing some tasks and directing other parts, such as how the brain sends signals to our legs to cause us to walk.

Analogy Explanation:

Memory is similar to our body's memory. It records everything that has occurred as well as all calculations. There are various types of memory, but they all store information and data in the same way that we store fun events and memories in our brains to remember and possibly use later.

When we study for a test, our memory stores all of the information for us to use on the test. This is analogous to computer memory. The motherboard is analogous to our physical bodies and skin. It holds all of our organs inside and allows them to work together. The motherboard on a computer connects all of the computer's major components.

To know more about computer memory, visit: https://brainly.com/question/13196228

#SPJ4

which method of verification should be included in the two-step customer identification program (cip) process?

Answers

Driver's licences, state-issued ID cards, passports, and military IDs are among the most widely used forms of documentary identification for people.

Explain about the two steps in CIP process?

For confirming each customer's identity, it must also include appropriate and workable risk-based methods. The CIP is, at its core, a two-part procedure, the first step of which is to gather identifying data, and the second of which is to confirm that the data collected actually identifies the client.

The CIP needs to outline the identifying data that will be gathered from each consumer opening an account. Name, address, date of birth (if applicable), and identity number of the consumer are required to be included.

The CIP specifies the basic criteria for financial institutions and their customers regarding ,the identity of the customer that shall apply in connection with the establishment of an account at. a financial institution.

To learn more about  CIP process refer to:

https://brainly.com/question/14381298

#SPJ4

What type of malicious software is designed to replicate itself to other computers?.

Answers

So, a computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.

What is Computer worm?

When you think of the word "worm," you could have a few ideas in mind. You might envision sweet, chewy, soft sweets with a hint of sourness. You might also picture the wriggling, cold-blooded invertebrate creatures that live on the surface of the Earth. And if you're thinking in terms of computers, malware might come to mind.

Computer worms, like real worms, frequently rely on deception to infect their hosts, thus you could argue they don't have much of a backbone. They can be ruthlessly destructive, which may give them the appearance of being a little cold-blooded. Learn more about them now.

To know more about computer worm, visit: https://brainly.com/question/14772903?referrer=searchResults

#SPJ4

Ethan is working on two related tables in Access as shown in the diagram below.


When Ethan tries to delete row 7, an error message appears on the screen stating that the record cannot be deleted or changed. Which conclusion is best supported by the information provided?


a. The relationship between the tables was not saved for Product 0006.

b. The tables do not share a one-to-one relationship for Product 0006.

c. Referential Integrity is enabled, and row 7 includes related records.

d. Cascade Delete Related Records is enabled for row 7.

Answers

The option conclusion that is best supported by the information provided is c. Referential Integrity is enabled, and row 7 includes related records.

What happens in Excel when a row is deleted?

Other rows or columns automatically move up or to the left when you delete rows or columns. To delete fields, columns, or records, simply open the table in Datasheet view, make your selections, and then press the DELETE key.

You simply use the function deleteRow after advancing the cursor to the desired row. Make sure you are viewing in "Normal" mode. To verify, click the sheet tab where the problem occurs, select the View tab from the ribbon, and verify that "Normal" is chosen in the Workbook Views group. Try once again inserting or deleting rows and columns.

Note that Referential integrity describes how the tables relate to one another. Every table in a database needs to have a primary key, which can appear in other tables because of its connection to the data in those other tables. It is referred to as a foreign key when the primary key from one table appears in another table.

Learn more about Referential Integrity from

https://brainly.com/question/17128955
#SPJ1

what is a data model used to analyze and communicate data needs at the individual project or application level using graphical symbols to identify data entities and relationships.

Answers

An entity–relationship model describes interrelated things of interest in a specific domain of knowledge.

What is entity relationship diagram?An entity-relationship model illustrates how several topics of interest relate to one another in a particular field of knowledge. An ER model's foundational components are entity types and interactions between entity types. An entity relationship model (ERM), also referred to as an entity relationship diagram (ERD), is a graphical representation that shows the connections between individuals, things, locations, ideas, or events inside an information technology (IT) system. In order to define the relationship between the database entities, it serves as a framework built using specific symbols. Entities, attributes, and relationships are the three main building blocks used to make ER diagrams. One or more of a school management system's entities include a department, administration, courses, teachers, students, and buildings.

To learn more about entity relationship diagram refer to:

https://brainly.com/question/14424264

#SPJ4

which two phases of the instruction cycle are always executed during the execution of an instruction? group of answer choices

Answers

The CPU does a cycle for each of these instructions before carrying them out.

Each instruction cycle in a simple computer includes the following stages: the memory to get the instruction. Decipher the directive. The fetch stage, the decode stage, and the execute stage are the three primary stages that make up this process. An instruction cycle is the sequence of steps the CPU must take in order to retrieve and carry out an instruction. It is made up of fetch and cycle execution. The stages between instruction fetch and instruction decode will be broken down by the 2-stage pipelined CPU as indicated by the red dotted line in the diagram.

Learn more about instruction here-

https://brainly.com/question/19570737

#SPJ4

identify the key players in the case and describe their respective roles. are these the right roles? what roles in particular should be modified? how might such role modifications be accomplished? 2. focus on the role of the software vendor- unitrak software corporation. was it an appropriate role? did unitrak act responsibly

Answers

Wallingford, Lassiter, Kovecki, and Hedges are the major players. The MSCC's president, Wallingford, turned the group into a forceful advocate for the business community. Also, as a software vendor Unitrak Software Corporation played an acceptable role.

While the majority of the main players' roles were suitable at the time, MSCC would have benefited from some changes to better suit their IS requirements. Since Jeff Hedges already oversaw the Public Finance and lacked much computer experience, his post was not fit.

i. He was too preoccupied with the finance section to have time to manage the expanding computer operations.

ii. Hedges' position should be changed to remove his responsibility for computer operations and transfer it to someone with more knowledge of and interest in the organization's operations.

Since his division was responsible for the majority of the organization's financial development, Leon Lassiter had a greater awareness of the need for a stronger system to satisfy MSCC's requirements.

His engagement increased his awareness of the potential financial risk if an upgrade was not completed on schedule. Since he is more qualified than (Hedges) and has the will to satisfy the needs of a better IS, Lassiter would be a superior choice to oversee computer operations.

The software vendor, Unitrak Software Corporation played an acceptable role. However, MSCC made the error of choosing software that wasn't appropriate for their purpose.

To learn more about software vendor click here:

brainly.com/question/28250377

#SPJ4

1.3-2 Packet switching versus circuit switching (1). Which of the characteristics below are associated with the technique of packet switching? Please select all correct choices. Note: Each wrong answer carries 33.33% penalty! Select one or more: Reserves resources needed for a call from source to destination. Resources are used on demand, not reserved in advance. Data may be queued before being transmitted due to other user's data that's also queueing for transmission. Frequency Division Multiplexing (FDM) and Time Division Multiplexing (TDM) are two approaches for implementing this technique. Congestion loss and variable end-end delays are possible with this technique. 그 그 This technique is used in the Internet. This technique was the basis for the telephone call switching during the 20th century and into the beginning of this current century.

Answers

Two methods for putting this technique into practice are frequency division multiplexing (FDM) and time division multiplexing (TDM).

Multiple data streams can be transmitted over a single channel using TDM. where each signal has a fixed-length time slot for it. In contrast, FDM divides the overall bandwidth into a number of non-overlapping frequency bands, each of which transmits a different signal.

In FDM, separate signals are given their own channels, each of which occupies a different frequency band, and the time is divided into multiple fixed duration slots that are allotted to the signals in a round-robin fashion.

The entire frequency band that is available in TDM is used on a time-sharing basis, whereas in FDM the entire frequency band is divided into multiple channels, each of which is separated by a space.

To know more about FDM click here:

https://brainly.com/question/14615704

#SPJ4

which of the following specifications replaces wep with a stronger security standard that features changing encryption keys? group of answer choices O vpn O utm O aup O wpa2 O tlsAnswer: WPA2

Answers

The specifications that replaces wep with a stronger security standard that features changing encryption keys is option C: WPA2.

What is WPA2 (Wi-Fi Protected Access 2)?

The encrypted security technology known as WPA2 (Wi-Fi Protected Access 2) guards internet traffic on wireless networks. The Wi-Fi Protected Access security protocol's second iteration, WPA2, fixes earlier issues and provides stronger encryption.

Note that the purpose of security standards is to increase the security of information technology.  Hence, one can say that a security standard is "a published specification that establishes a common language, contains a technical specification or other precise criteria and is designed to be used consistently, as a rule, a guideline, or a definition."

Learn more about security standard fromhttps://brainly.com/question/14559510
#SPJ1

c write the code that creates an object of type rectangle named box1 using a no argument constructor.

Answers

Answer:

JAVA

Rectangle box1 = new Rectangle();

write code that completes the celestialbody class. each celestialbody instance has an integer orbitlength (in days) and a integer dayssincediscovered attribute (which is initially 0). using these, write the orbit(int numberoftimes) method that adds numberoftimes * orbitlength to dayssincediscovered (e.g., if planet x has done two orbits with an orbit length of 12 days, it was discovered 24 days ago. if it then orbits another three times, it was discovered 60 days ago). also, fix the two errors in the class.

Answers

Using knowledge in computational language in python it is possible to write a code that celestialbody instance has an integer orbitlength and a integer dayssincediscovered attribute.

Writting the code:

import numpy as np          #IMPORTING numpy library for array operations

import math

'''Base Class CelestialBody is implemented'''

class CelestialBody:

   def __init__(self,name,position,mass,radius):

       self.name=name;

       self.position=position

       self.mass=mass

       self.radius=radius

   def volume(self):

       return (88/21)*(self.radius)*self.radius*self.radius #volume =  (4*pi*(radius^3))/3

   def density(self):

       vol=self.volume()       #volume is calculated using volume method

       return self.mass/vol       #density is mass/volume

   def delta_r(self,other):

       return np.subtract(other.position,self.position)#numpy subtract method is used to find difference vector

   def distance(self,other):

       dist = np.subtract(other.position,self.position)

       return math.sqrt(np.dot(dist,dist))#dot product is used to find distance between vector

'''planet class has same attributes as Celestial Body'''

class Planet(CelestialBody):

   pass

'''Moon class'''

class Moon(CelestialBody):

   def __init__(self,name,position,mass,radius,parent):

       CelestialBody.__init__(self,name,position,mass,radius)

       self.parent=parent

   

earth=Planet("Earth",np.array([9.978977040419635E-01, 6.586825681892025E-02, -6.320430920521123E-06]),597219e24,6371.01)

luna=Moon("Luna",np.array ([9.956768547953816E-01, 6.676030485840675E-02, 1.641093070596718E-04]),7.349e22,1737.53,earth)

mars=Planet("Mars",np.array([-1.638989837611019E+00,2.909235766064876E-01,4.607875056151672E-02]),6.4171e23,3389.92)

deimos=Moon("Deimos",np.array([-1.638943766241257E+00,2.907775944863155E-01,4.604465570526414E-02]),1.80e20,2.9,mars)

phobos=Moon("Phobos",np.array([-1.638995094538730E+00,2.909862261134459E-01,4.608601582090829E-02]),1.08e20,2.4,mars)

See more about python at brainly.com/question/12975450

#SPJ1

Tina is using the Table Analyzer. She has already moved the fields she wants from one table to another. A portion of her screen is shown.

(the image wouldnt load on this one sorry.)

What does Tina need to do before clicking Next?

a. She needs to rename Table 1.
b. She needs to delete “tblRetailers.”
c. She needs to choose a primary key for Table 1.
d. She needs to select the table to be analyzed.

Answers

The thing that Tina need to do before clicking Next is option a. She needs to rename Table 1.

Why renaming Excel table?

Select the cell or the range of data to rapidly build a table in Excel. Go to Home and click Format as Table. Select a table design. If you want the first row of the range to be the header row, check the box next to My table as headers in the Format as Table dialog box, and then click OK.

Your charts and PivotTables will update immediately when you use tables to swiftly sort and filter your data, add new records, and add records. Another one of my favorite features, "Named Ranges," is similarly handled using tables. In my Excel Intermediate course, named ranges are covered.

Therefore, You can give each table a name to make it simpler to refer to it, for instance, in a workbook with numerous tables.

Learn more about Excel table from

https://brainly.com/question/27644602
#SPJ1

which of the following types of networks would be created if a wireless access point, a microwave link, and a satellite link were combined in a mesh?

Answers

PAN WMN is the correct answer. A cloud provider hosts applications and makes them online accessible to customers as part of the software as a service (SaaS) distribution paradigm.

An RFID tag must be communicated with by a scanner using radio waves in order to be used for inventory management. The tag itself has a microprocessor software that enables the reader to read data from the tag as well as write data to it for in-place real-time updating. The Internet, sometimes known as "the Net," is a global system of computer networks. It is a network of networks that allows users at any one computer to obtain information from any other computer with permission (and sometimes talk directly to users at other computers).

Learn more about network here-

https://brainly.com/question/13992507

#SPJ4

Identify the statement that will throw an error in the following code?
class Student {
public:
void SetName(string studentName);
void Display();
private:
string name;
char grade;
int Grade();
};
void Student::Display() {
grade = Grade();
...
}
int Student::Grade(){
...
}
void SetName(string studentName) {
name = studentName;
}
int main() {
Student stu1;
stu1.Display();
...
stu1.Grade();
}
a. stu1.Grade();
b. stu1.Display();
c. int Student::Grade()
d. void Student::Display() {
grade = Grade();
}

Answers

Below is the java code with the statement that will throw an error in the following code are as follows:

Compilation failed due to following error(s).

Main.java:2: error: illegal start of type

public:

Main.java:5: error: illegal start of type

private:

 

Main.java:10: error: class, interface, or enum expected

void Student::Display() {

Main.java:12: error: class, interface, or enum expected

Main.java:19: error: class, interface, or enum expected

Main.java:22: error: class, interface, or enum expected

stu1.Display();

Main.java:23: error: class, interface, or enum expected

Main.java:25: error: class, interface, or enum expected

Main.java:27: error: class, interface, or enum expected

b. stu1.Display();

Main.java:28: error: class, interface, or enum expected

c. int Student::Grade()

Main.java:31: error: class, interface, or enum expected

11 errors

To know more about java code, visit: https://brainly.com/question/25458754

#SPJ4

when setting up a number of hosts to serve the exact same set of content via http servers, what can you confiugure as a method

Answers

We are setting up a number of hosts to serve the exact same set of content via HTTP servers. To ensure the traffic is distributed evenly, we will use a load balancer.

When setting up a number of hosts to serve the exact same set of content via HTTP servers?

Use a load balancer to ensure traffic is distributed evenly between the hosts.Configure your servers for high availability so that if one host fails, the other hosts will automatically take over and serve the content.Ensure that each host has the same content by setting up a distributed version control system, such: as Git, and commit content to a central repository.Configure the servers with the same web server software, such as: Nginx or Apache, and ensure the same configuration is applied to all hosts.Use a content delivery network (CDN) to ensure the content is delivered quickly, no matter where the user is located.Monitor and log the performance of each host to ensure uptime and performance standards are met.

We will configure the servers for high availability and ensure the same content is served on all hosts by setting up a distributed version control system. The web server software will be the same across all hosts, and we will use a CDN for fast content delivery. We will also monitor and log the performance of each host to ensure uptime and performance standards are met.

Learn more about Programming: https://brainly.com/question/23275071

#SPJ4

Other Questions
Open the TotalFees query in Design View. Modify the query by creating a calculated field that sums the total of RegistrationFee, GuestFee, and WorkshopFee. Use TotalFees as the name of the calculated field. Save the query. Open the query in Datasheet View and then close it. Its graph is a parabola tangent to the x-axis at (4,0) with y-intercept 6. find the equation showing the steps Suppose that, with regard to a particular gene with two alleles, a and a, we know that 60% of the alleles in the gene pool of a particular large population are a. We observe this population for five generations, during which we know that no mutation, selection, or migration has occurred. After this period, the frequency of the a allele is expected to be _____. last time we ran our simulation we examined factors like climate (rainfall), resources (food), and boundaries (fences). think about our last two lessons.... what are two factors we can add to our simulation to determine if some factors have a bigger effect on the ecosystem? answer text what is the centralized party organization that dominates local politics by controlling elections called? Which phrase correctly completes this conversation?Susana: Prefieres la tableta o el reproductor mp3?Omar: Prefiero la tableta porque ___________ navegar en internet. A. me gusta B. no me gusta C. no me apasiona D. no puedo marcus's therapist is helping him to work on his interpersonal relationships, self-care skills, and medication management. he is also working on maintaining eye contact with people, speaking at a moderate pace, and maintaining a conversation. what form of treatment is marcus likely receiving? Arrange the following gases in order of increasing average molecular speed at 25 c. He, o2, co2, n2. What is the probability of receiving at least three e-mails during an hour (to 4 decimals)? For this question, if calculating the probability manually make sure to carry at least 4 decimal digits in your calculations. c. What is the expected number of e-mails received during minutes (to 2 decimals)? d. What is the probability that no e-mails are received during minutes (to 4 decimals)? Simplify the expression to a polynomial in standard form: (x-1)(3x^2+7x+5) (x1)(3x 2 +7x+5) The r and K - selection theory accounts for the level of parental investment early in the lives of their offspring. Which of the following BEST describes an r-selected strategy for parents?a.) a large amount of parental energy is invested in producing a small number of offspringb.) an r-selected species will assume high parental investment during juvenile stagesc.) parents expend a small amount of per capita energy to produce large numbers of offspringd.) parents expend a large amount of per capita energy feeding and caring for large offspringe.) the parents invest a small amount of energy producing a small number of offspring need help assap look at attachment I need help trying to find the area of this triangle please help. At top speed, cheetahs can run 80 miles per hour. How fast would that be in meters/second? Polyester definition 30 PTS, SHOW YOUR WORK How much carbon dioxide will you prevent from entering the atmosphere in one year, if you replace a 100-watt light bulb with a CFL bulb that uses 30 watts in a fixture that you have on 8 hours per day? (round to the hundredths place) (1.37 pounds of CO2 per kWh) In order for a nomadic society to become a unified nation with a complex government, what must happen next?. Complete the following sentence by selecting the best option from the list below. Thomas Cook Travel was one of the first tourism organizations to calculate the ___________________ of its customers. A: LoyaltyB: ExpendabilityC: ProfitabilityD: MarketabilityE: Manageability what caused the scene described in this excerpt?A. an aerial bombing of an infantry unit B. a poison gas attack on soldiers in the trenchesC. a submarine attacking a dock ship deb is frustrated because, although she assigns responsibilities to members of her staff, the human resource director makes any final decisions about staff bonuses. which aspect of situational control is causing deb's frustration?