Answer:
program by LET statement
Explanation:
CLS
REM to find the area of rectangle
LET L=40
LET B=20
LET AOR=L*B
PRINT "AOR=";AOR
END
Press F5
output
AOR=800
Sami needs to decide how the fonts, colors, and images will look on her new web site. Which will help her pian her design?
O Mockup
Rough draft
O Sketchbook
Storyboard
Answer:
Your answer is D Storyboard
Explanation:
Storyboarding is a process where you plan how things will look on your website just as described.
which of the following is not a storage medium?
a.microphone
b.floppy disk
c.hard disk
d.pen drive
Answer:
microphone
Explanation:
when you are using a microphone once it stop it done
RELIGION QUESTION
What is the meaning of prayers of adoration and thanksgiving:
Answer:
prayer is to give thanks to god for everything he has done for you, so is thanksgiving and adoration
Explanation:
What do you use the Pygame library for?
Answer:
Pygame is a cross-platform set of Python modules designed for writing video games. It includes computer graphics and sound libraries designed to be used with the Python programming language.
The mapping of a logical address to a physical address is done in hardware by the ________. A. memory address register B. memory-management-unit (MMU) C. relocation register D. dynamic loading register
Answer:
b. Memory-Management Unit
Explanation:
The hardware device called Memory-Management Unit is used for mapping logical address to its corresponding physical address.
When using the “rule of thirds,” where should focal points be placed?
Answer: When using the “rule of thirds” you should place focal points along a vertical or horizontal line and at a point of intersection.
Have a nice day!
[Plato] In A Soccer Game, You Want To Finish The First Half In Five Minutes. So, You Set The Match Duration To Ten Minutes. This Is An Example Of What Kind
Of Time Element?
A)Altered
B)Variable
C)Authentic
D)Player Adjusted
Answer: D. Player Adjusted
Explanation: The reason why the answer is player adjusted is because a player in the game is changing the time to 10 minutes.
Have a nice day!
Match the elements used in web searches to their functions.
1. row
2. column
3. cell
4. worksheet
where data and formulas can be entered
a grid of rows and columns
a horizontal set of cells
a vertical set of cells
Answer:
where data and formulas can be entered - Cells
A grid of rows and columns - Worksheet
A horizontal set of cells - Row
A vertical set of cells - Column
Explanation:
I got it right on the Edmentum test.
What is a named bit of programming instructions?
Answer:
Function: A named bit of programming instructions. Top Down Design: a problem solving approach (also known as stepwise design) in which you break down a system to gain insight into the sub-systems that make it up.
The first field of an Internet Control Message Protocol (ICMP) packet specifies the message type. Which choices represent message type examples? Check all that apply.
Answer: destination unreachable
time exceeded
Explanation:
You didn't give the options to the question but based on a similar question there I got online, the answer will be destination unreachable and time exceeded.
The Internet Control Message Protocol (ICMP) refers to a protocol that is used in the communication of problems with regards to the transmission of data. Based on the information given, the choices that represent message type examples are:
• destination unreachable
• time exceeded
A(n) ________ cloud does not free an organization from the issues associated with managing the cloud infrastructure, but it does give the organization a high degree of customizability, flexibility, and control over their data and applications. Group of answer choices
Answer:
Private.
Explanation:
The private cloud is a computing service offering a proprietary environment to a single organization. In simple terms, it is a single-tenant environment, which means that the organization (the tenant) can use it without sharing its resources with others. It is also known as internal cloud or corporate cloud.
Therefore, it is a private cloud computing system that gives the organization a great level of customizability, flexibility, and control ability over data and applications.
Thus, a private cloud is a correct answer.
Arrange the code so that the numbers are swapped.
Second part
savec
First part
C=D
Third part
D= save
Answer:
Following are the correct code for swapping:
save=C
C=D
D=save
Explanation:
Please find the attached file of the program with output.
In the above, we let that the three integer variable "save, C, and D" is declared that in which the variable "C and D" holds a value and "save" variable is used to hold "C" variable value.
At this the "C" variable is empty. so, it holds a "D" variable value and when it is empty it holds a save value. At this, we perform the swapping.
________ security provides perimeter security, access control, smoke and fire detection, fire suppression, some environmental protection, and usually surveillance systems, alarms, and guards.
Answer:
Premises
On-premise security refers to the hardware and software solutions that protect businesses data from outside and inside threats.
Q5: Which two sensors would be used in an outdoor intruder safety light system?
Pressure sensor. Or motion sensor best answer shakl get brainliest
Answer:
Motion sensor.
Explanation:
I think it is easy to track the intruder with a motion sensor rather than with a pressure sensor
Consider the LIBRARY relational database schema description provided below which is used to keep track of books, borrowers, and book loans. The relations are: • BOOK (BookID, Title, PublisherName) • BOOK_AUTHORS (BookID, AuthorName) • PUBLISHER (Name, Address, Phone) • BOOK_COPIES (BookID, BranchID, NumberOfCopies) • BOOK_LOANS (BookID, BranchID, CardNumber, DateOut, DueDate) • LIBRARY_BRANCH (BranchID, BranchName, Address) • BORROWER (CardNumber, Name, Address, Phone) 1. Consider the schema given above: (a) (5 points) Give a primary key for each relation. Are there any relations for which there is an alternate candidate key that you have not chosen as the primary key? If yes, mention the relations, candidate keys and the reason (if any) for your choice of the primary key. (b) (10 points) State all referential integrity constraints that should hold on these relations.
Answer:
1) Yes, Publisher relation should have a publisherID primary key.
2) NOT NULL and UNIQUE for the BookID, BranchID, CardNumber and name of the borrower in the Book, Book_Copies, Library_branch, and Borrower relations respectively. The DueDate field of the book_loan relation must be a time constraint. The BookID of the Book relation must be serial number for automatic addition and update of bookid across the database.
Explanation:
The Publisher relation should have primary key publisherID which should replace the publisherName in the Book relation to easily make a join query and attain a third-level database model.
What will the computer do in response to a line of code reading # name = input("What is your name?")
Answer:
it would show What is your name? on the screen and you would be able to input your name
Explanation:
in python write a code to find power (2 & -2)
Explanation:
b) (c) ... Want to see the step-by-step answer ? ... Q: Write a python program with comments
When you assign a value of one data type to a variable of another data type, Visual Basic attempts to perform ________ type conversion. Group of answer choices
Answer: implicit
Explanation:
When a value of one data type is assigned to a variable of another data type, then Visual Basic attempts to perform an implicit type conversion.
Implicit type conversion, simply refers to when one data type is converted automatically by Python to another data type. It should be noted that no user involvement is needed.
pls pls pls helppp!! I NEED SOMEONE WHO IS A PRO AT COMPUTER SCIENCE CODING LIKE PYTHON AND STUFF TO CREATE A ZOOM AND HELP ME WITH SOMETHING!! :))) PLEASEEE
Answer:
?
Explanation:
Your cousin, a senior in high school, asks you to play a Jeopardy-style game with her to help prepare for her computer science exam next week. She gives you these two clues about a type of relational database key: No column values may be NULL, and columns may be combined to create a unique primary key. Which type of key is she referring to
Answer:
She is referring to composite primary key
Explanation:
Composite primary key comprises of several columns with each having column having its own individual uniqueness.
In a composite primary, all columns need to have some value as none of them can be null. Also, these individual columns are grouped to get a unique value.
A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?
Answer: “When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.”
pls help me pass my finals!!
Answer:
(a): power(2&-2)
The code is as follows:
power = 2**-2
print(power)
(b): Largest and smallest in a list
The code is as follows:
num = [33,6,11,100,456,109,-4,366]
smallest= min(num)
largest= max(num)
print(smallest)
print(largest)
(c): Loop in Python
(i) Loop are instructions that are repeated until a certain condition is met;
(ii) For loop, in python are used to iterate over a sequence or through a certain range;
The syntax is:
for loop_element in range(iterating_range):
The following is an illustration of for loop that iterates 5 times
for i in range(5):
Explanation:
(a): power(2&-2)
The ** is used to calculate power.
So, 2**-2 represents 2 raise to power -2
power = 2**-2
This prints the calculated power
print(power)
(b): Largest and smallest in a list
This initializes the list
num = [33,6,11,100,456,109,-4,366]
This calculates the smallest using min() function
smallest= min(num)
This calculates the largest using max() function
largest= max(num)
This prints the smallest and the largest
print(smallest)
print(largest)
(c): See answer section
What is the error in the following line: (1)
age=int(input("Enter your age:")
Answer:
14
Explanation:
Pixar is a company that creates a huge amount of images, audio recordings, and videos, and they need to decide what compression algorithms to use on all those files. When would Pixar most likely use lossless compression
feels like im getting outta touch, maybe im juust staying inside too much, lately its getting harder to pretend i can do this alone without my friends
Fruits, stones and other organic pigments are examples of what?
O Natural materials
O Synthetic materials
O Cultural materials
O Modern art supplies
How will future space flights be different for NASA?
Answer:
Explanation:
NASA's future will continue to be a story of human exploration, technology, and science. NASA will continue to be a global leader in scientific discovery, fostering opportunities to turn new knowledge into things that improve life here on Earth. ... Artist's concept, NASA's gateway in lunar orbit.
Answer:
NASA's future will continue to be a story of human exploration, technology, and ... changes on the global land surface at a scale where we can separate human ... Exploring deep space and three-year missions to Mars pose new challenges: ...
Explanation:
NASA's Artemis program aims to land another man and the first woman on the moon by 2024 and eventually establish sustainable space travel by 2028. The Artemis program is NASA's stepping stone to their ultimate goal of landing on Mars.
Select all the correct answers.
Which THREE of the following are spreadsheets typically used for?
budgeting
scientific analysis
creating presentations
number formatting
computer programming
Answer:
number formatting,
scientific analysis computer programming
Answer number formatting,
scientific analysis computer programming
Explanation: its right
Kerry is debugging a program. She identifies a line of code to begin execution and a line of code to end execution so that she is only running part of the computer program. Which is she using
Answer:
breakpoints.
Explanation:
A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;
1. Planning.
2. Analysis.
3. Design.
4. Development (coding).
5. Testing.
6. Implementation and execution.
7. Debugging and maintenance.
In this scenario, Kerry is debugging a program and identifies a line of code to begin execution and another line of code to end execution so that she is only running part of the computer program. Thus, Kerry is using breakpoints.
Basically, one of the fundamental debugging techniques used by software developers and programmers are breakpoints. They are generally set at any point where a pause debug-ger execution or an execution of a code is required based on certain conditions.
At every breakpoint address, a debug-ger temporarily stores a set of instruction and overwrites it with another special instruction.
Answer:
C for Edge
Explanation:
____ feet is used when the width of the material is not a factor. (6 letters)
Answer:
footin dhhdhdn bsbsbdb
A swimmer covers 180m in 20 seconds. How many metres does she swim in one second?
Answer:
9 meters per second
Explanation:
180/20= 9