3- It is an Information page that is displayed through one of the Internet browsers, it can be saved along htm, html page.
a. Dynamic website
f. Static website
b. Ecommerce site
c. Social media sites​

Answers

Answer 1

Answer:

f. Static website

Explanation:

HTML stands for hypertext markup language. It is the standard markup language for web pages that define the structure of the content. These elements are the building blocks of any website.

HTML (Hypertext Markup Language) is the code that is used to structure a web page and its content. For example, content could be structured within a set of paragraphs, a list of bulleted points, or using images and data tables.

Static web pages are often HTML documents stored as files in the file system and made available by the web server over HTTP (nevertheless URLs ending with ". ... Static web pages are suitable for content that never or rarely needs to be updated, though modern web template systems are changing this.

Answer 2
Static website
Hope this will help.

Related Questions

PROJECT RISK MANAGEMENT: CASE STUDY Roy and his team identified some risks during the first month of the My R & R Intranet Project. However, all they did was document the risks in a list. They never ranked the risks or developed any response strategies. Because the project has had several problems, such as key team members leaving the company, users being uncooperative, and team members not providing good status information, Roy has decided to be more proactive in managing risks. He also wants to address positive risks as well as negative risks ASSIGNMENT INSTRUCTIONS 1. Read the Case Study 2. Create a risk register for the project using the Risk Register Excel template attached. Identify six potential risks, including risks related to the problems described in the Case above. Include both negative and positive risks. 3. Plot the six risks on a probability/impact matrix using the template attached. Also, assign a numeric value for the probability and impact of each risk on meeting the main project objective. Use a scale of 1 to 10 in assigning the values, with 1 representing the lowest values. For a simple risk factor calculation, multiply the probability score and the impact score. Add a column called Risk Score to your risk register to the right of the impact column. Enter the new data in the risk register. Copy your impact matrix and new risk register to a word document and write your rationale for how you determined the scores for one of the negative risks and one of the positive risks. 4. Develop a response strategy for one of the negative risks and one of the positive risks. Enter the information in the risk register. Copy your risk register and impact matrix to your word document with your rationale, response strategy, and a separate paragraph describing what specific tasks would be required to implement the strategy. Include time and cost estimates for each strategy as well

Answers

A risk response strategy for negative risks typically involves mitigating, avoiding, transferring, or accepting the risk, while for positive risks, strategies often include exploiting, enhancing, sharing, or accepting the risk.

1. Risk Register:

- Create a table with columns such as Risk ID, Risk Description, Risk Category, Probability, Impact, Risk Score, and Response Strategy.

- Identify six potential risks related to the problems mentioned in the case study. Consider risks such as key team members leaving, uncooperative users, lack of status information, etc. Make sure to include both negative and positive risks.

- Fill in the risk register with the identified risks and their respective details.

2. Probability/Impact Matrix:

- Create a 2x2 matrix with the X-axis representing the probability and the Y-axis representing the impact.

- Assign a numeric value (ranging from 1 to 10) for the probability and impact of each risk. The higher the value, the greater the probability or impact.

- Multiply the probability score by the impact score to calculate the Risk Score. Enter this value in the Risk Score column of the risk register.

- Copy the impact matrix and the updated risk register to a Word document.

3. Rationale:

- Select one negative risk and one positive risk from your risk register for which you'll provide the rationale.

- In your Word document, explain how you determined the scores for the selected risks. Consider factors such as the likelihood of occurrence, potential consequences, historical data, expert judgment, etc.

4. Response Strategy:

- Choose one negative risk and one positive risk to develop response strategies.

- In the risk register, add a column for Response Strategy and fill in the appropriate response for each risk.

- In your Word document, describe the response strategies chosen and explain why they are appropriate for mitigating the risks.

- Additionally, outline the specific tasks required to implement each strategy, along with time and cost estimates for each task.

Remember, a risk response strategy for negative risks typically involves mitigating, avoiding, transferring, or accepting the risk, while for positive risks, strategies often include exploiting, enhancing, sharing, or accepting the risk.

Learn more about Risk Register here:

https://brainly.com/question/31942299

#SPJ11

Shadow and highlight create depth (3D).
TRUE OR FALSE

Answers

Answer:

true because then it would be like not popping out

What list of numbers is created by the following code:

range(9)

Group of answer choices

0 1 2 3 4 5 6 7 8

1 2 3 4 5 6 7 8 9

1 2 3 4 5 6 7 8

0 1 2 3 4 5 6 7 8 9

Answers

Answer:

0 1 2 3 4 5 6 7 8

Awake() is called after Start() (T/F):

Answers

The given statement "Awake() is called after Start()" is False because in Unity, Awake() and Start() are both initialization functions, but they are called in a specific order.

Awake() is called first when a script is initialized, even before the game starts. This function is used to set up references between scripts, initialize variables, or perform any other setup tasks that need to be done before the game begins. Awake() is called only once per script instance during its lifetime.

On the other hand, Start() is called after Awake() and just before the first frame update. Start() is also used for initialization tasks, but it is mainly meant for tasks that depend on other scripts having already been initialized. Like Awake(), Start() is called only once per script instance during its lifetime.

In summary, Awake() is called before Start() in the Unity scripting execution order, and both functions serve different purposes in setting up the initial state of game objects and their components.

You can learn more about function at: brainly.com/question/30721594

#SPJ11

3. Bob is arguing that if you use output feedback (OFB) mode twice in a row to encrypt a long message, M, using the same key each time, it will be more secure. Explain why Bob is wrong, no matter what encryption algorithm he is using for block encryption (15 points).

Answers

Answer:

Bob was wrong in his argument because from the cipher text C₂ only the initialization vector is encrypted two times and XOR with plain text M.

Also it will not provide a better security than the first because it's encryption was done only on initialization vector and not the plain text.

Explanation:

Solution

From the given question, in the output feedback mode (OFB) the following Encryption Algorithm is stated as follows:

Where,

V₀ = vector initialization

V₁ = Ek (Vi-₁)

Ek = The encryption algorithm

C₁ =V₁⊕ M₁

Here,

C₁ = this is the cipher text

M₁ = Plain text  for it^th session

Thus

The Decryption Algorithm is shown below:

M₁=V₁⊕ C₁

In this case,  when bob encrypt the message M for the first time in the OFB method, the cipher text is

C₁ =V₁⊕ M₁

So,

C₁ =Ek (V₀) ⊕ M

Hence the Cipher text C₁ the initialization vector only is encrypted

Thus,

When Bob does a second encryption, the Cipher text will be

C₂ =Ek (V₁) ⊕ C₁

C₂ = Ek (Ek (V₀)) ⊕ Ek (V₀) ⊕ M

Finally, from the cipher text C₂ only the initialization vector encrypted twice and XOR with plain text M. so it will not provide a better security than the first because it's encryption was carried out on initialization vector without the plain text.

A 1000 elements array is used to store integers ascending order . The array is used to search binary search algorithm for the integers 5215 and 7282. How many elements of the array would be examined by the algorithm to locate A). the integers 5215 stored in element 499 B.) the integers in 7282 stored

in element 686.

Answers

Answer:

The overview of the given scenario is described in the explanation section below.

Explanation:

BTS (Binary search tree) tends to be a tree with several nodes noting that perhaps the left sub-tree, along with its leaf, tends to have a key which is less than or equal to anything like the parental node value. The do-tree, including its leaf, seems to have a value greater than those of the key from it's own parent node.Binary search algorithm finds a general vicinity in the collection of O(log n) time complexity items whereby n represents the number of elements in the array.

So the provided has never been the binary search trees of its algorithm.

A. 249

B. 342

he Get_Winnings(m, s) function should take two parameters — a string for the number of gold medals and an integer for the sponsored dollar amount. It will return either an integer for the money won or a string Invalid, if the amount is invalid. Olympians can win more than one medal per day.

Answers

The function "Get_Winnings(m, s)" takes a string for the number of gold medals and an integer for the sponsored dollar amount, returning the money won as an integer or "Invalid" if the amount is invalid.

The function "Get_Winnings(m, s)" takes two parameters: a string "m" representing the number of gold medals and an integer "s" representing the sponsored dollar amount. Here's a step-by-step explanation of the function.

Check if the input values are valid. If the "m" parameter is not a string or the "s" parameter is not an integer, return the string "Invalid".Convert the string "m" to an integer to calculate the total winnings based on the number of gold medals won.Calculate the money won by multiplying the number of gold medals with the sponsored dollar amount.Return the calculated winnings as an integer.

If the input values are not valid or cannot be converted, the function will return the string "Invalid" to indicate an invalid amount. Otherwise, it will return the calculated money won as an integer.

For more such question on Integer

https://brainly.com/question/30030325

#SPJ8  

2
ng and Upgrading Computers: Mastery Test
Select the correct answer.
Which of the following can computer maintenance software determine?
O A.
O B.
O C.
O D.
whether your hard drive is about to fail
whether your monitor or screen is drawing too much power
the humidity inside your desktop computer
the amount of dust inside your laptop
Reset
Next

Answers

whether your hard drive is about to fail can computer maintenance software determine.

What is computer maintenance software ?

Software that centralises maintenance data and streamlines maintenance operations is known as a computerised maintenance management system, or CMMS. It aids in maximising the use and accessibility of tangible assets like machines, transportation, communications, plant infrastructures, and other assets. CMMS systems, also known as computerised maintenance management information systems (CMMIS), are used in the manufacturing, energy, transportation, building, and other sectors where physical infrastructure is essential.

A CMMS's database is its fundamental component. The information regarding the assets that a maintenance organisation is responsible for maintaining, as well as the tools, supplies, and other resources needed to do so, are organised using a data model.

Read more about computer maintenance software:

https://brainly.com/question/28561690

#SPJ1

How can I learn programming in mobile?​

Answers

Answer:

You sadly cannot use your coding knowledge to complete things on mobile, but you can learn through YouTuube and Gooogle and such, and simple type it out in Gooogle docs or something. There are sadly no mobile friendly coding websites.

Hope This Helped!

What is the keyboard shortcut to show formulas in a worksheet (as opposed to the value)? OCTRL+S OCTRL + Z CTRL- There is no shortcut for showing formulas

Answers

CTRL +  (tilde) is a keyboard shortcut to show formulas instead of values in Excel spreadsheets. It can be found in the upper-left corner of most keyboards, below the Escape key or just left of the 1 key.

The keyboard shortcut to show formulas in a worksheet (as opposed to the value) is `CTRL + ~` (tilde).When working with Excel spreadsheets, you might want to display the formulas instead of the values in your cells. This could be done by using the "Show Formulas" button. But, if you're doing this frequently, it's easier to use a keyboard shortcut. To do this, press `CTRL + ~` (tilde) and it will show all of the formulas in your spreadsheet instead of the values.

The tilde symbol, ~, can be found in the upper-left corner of most keyboards. It is usually located below the Escape key or just left of the 1 key. It's worth noting that pressing the `CTRL + ~` (tilde) keyboard shortcut again will switch back to displaying the values.

To know more about Excel spreadsheets Visit:

https://brainly.com/question/10541795

#SPJ11

What was the name of the first computer, developed by charles babbage?.

Answers

Answer: Analytical Engine

Explanation:

Answer:

analytical engine - 1837

What is a good way to become a game developer without spending a lot of money?

Answers

Answer:

Codes

Explanation:

learn the codes first. when you're already expert, you'll find ways from there.

Write a program to roll a pair of die a random number of times between 1,000 and 10,000 times. Track the sum of the faces of the die for each of the possible sums. Print the results of each pair of die and the sum tallies (possible sums: 2, 3, 4,...12).

I need help writing this program , urgent help

Answers

#include <iostream>

#include <ctime>

#include <iomanip>

int main(int argc, char* argv[]) {

   

   std::cout << " 1st\t  2nd\t Tot.\t   Ave.\n+-------------------------------+\n";

   

   double first, _first=0, second, _second=0;

   srand(time(NULL));

   int amount = (rand() % 10000)+1000;

   int _amount = amount;

   while(amount>0) {

       first = (rand() % 6)+1;

       _first+=first;

       second = (rand() % 6)+1;

       _second+=second;

       std::cout << "  " << int(first) << "\t   " << int(second) << "\t  " << int(first+second)

                 << "\t   " << std::fixed << std::setprecision(2) << (first+second)/2 << std::endl;

       amount--;

   }

   std::cout << "\n\nFirst Average: " << _first/double(_amount) << "\nSecond Average: " << _second/_amount

             << "\nAverage Total: " << (_first+_second)/double(_amount)<< "\nTotal Attempts: " << _amount << std::endl;

   return 0;

}

Write a program to roll a pair of die a random number of times between 1,000 and 10,000 times. Track
Write a program to roll a pair of die a random number of times between 1,000 and 10,000 times. Track

The distance between two towns on the map is 4cm now use a scale of 1:50000 to determine the real distance on the ground (in km)​

Answers

The real distance on the ground (in km)​ is 0.8 km.

Calculation of real distance on Map

1 cm on the map is equal to 50000 cm on the ground.

Therefore, 4 cm on the map is equal to 200000 cm on the ground,

which is equal to 2 km.

Since 2 km is equal to 4 cm on the map, 1 cm on the map is equal to 0.5 km on the ground.

Therefore, 4 cm on the map is equal to 2 km on the ground, which is equal to 0.8 km.

Map reading is the practice of reading and interpreting maps to gain information about an area, such as its terrain, waterways, roads, and other features. It is an important skill for hikers, navigators, and travelers of all kinds.

Learn more about map reading here:

https://brainly.com/question/27759455

#SPJ1

Consider the following code:


values = []


for i in range(5):

values.append(int(input("Next number: ")))


print(values)


If the line print(len(values)) is appended to this code, what is output by that print(len(values)) line?

Answers

Answer:

5

Explanation:

The output of the line print(len(values)) would be 5, since the for loop iterates 5 times and adds 5 values to the values list using the append() method.

What is coding?

Coding, also known as computer programming, is the method by which we communicate with computers.

Code tells a computer what to do, and writing code is similar to writing a set of instructions. You can tell computers what to do or how to behave much more quickly if you learn to write code.

The output of the print(len(values)) line is 5.

This is due to the fact that the values list is initially defined as empty []. The for loop then iterates five times, prompting the user to enter a number, which is then appended to the values list using the append() method. When the loop is finished, the length of the values list will be 5.

Therefore, when print(len(values)) is executed, it will print the length of the list, which is 5.

For more details regarding coding, visit:

https://brainly.com/question/17204194

#SPJ3

Are operating systems like Windows and macOS are single user single task OSS?

Answers

The answer is that Apple MacOS is a single-user operating system as well. The macOS operating system allows for multitasking, just like Microsoft Windows does, although only one user can multitask at once.

What is an OS for a single user, single task?

Operating systems that support single-user single-tasking let a single user run just one programme at a time. This operating system was created with wireless phones and two-way messaging specifically in mind. Several features, such printing a document

Which operating system supports a single user?

Ms-DOS is the best example of a single-user operating system, which is an operating system that only allows one user to use the computer system at once.

To know more about operating system visit:-

https://brainly.com/question/24760752

#SPJ4

an operation that a user performs against a database that retrieves or alters the data in the database should adhere to a set of properties. the consistency property states that:

Answers

The consistency property in a database system ensures that once a transaction is committed, the database is left in a consistent state.

This means that the data is accurate and reflects all changes made during the transaction. The consistency property is crucial for maintaining data integrity and preventing inconsistencies that can occur due to concurrent transactions or system failures.
To adhere to the consistency property, all operations performed against the database must follow a set of rules or protocols. For example, if a user wants to retrieve data from the database, they must ensure that the data is not being modified by any other transaction at the same time. Similarly, if a user wants to update data in the database, they must ensure that the data is not being read or modified by any other transaction.
In summary, the consistency property is a fundamental principle of database systems that ensures data accuracy and integrity.

To know more about database visit:

https://brainly.com/question/30163202

#SPJ11

WILL GIVE BRAINLYEST You would like to implement the rule of thirds to present high-resolution images in an IT scrapbook. The scrapbook includes images of computer and other IT devices. How can you do this for the scrapbook?
You can implement the rule of thirds by placing the ____(Key, Larger, Smaller)
part of the image along ____ (Central, Intersecting, margin) the
lines.

Answers

Answer:

key              margin

Explanation:

kid rally have a explantions

counseling is considered urgent crisis counseling

Answers

Answer:

yes

Explanation:

the master distribution center in bend, oregon houses 42 employees, including 22 people using windows 7 professional and 20 people using windows 8.1. the distribution center is slated to upgrade its computers to windows 10 pro. what preliminary steps should be taken before starting the upgrades on these computers? in general, are there any problems involved in upgrading to windows 10 from each of these oss?

Answers

Before starting the upgrades on the computers in the master distribution center in Bend, Oregon, the following preliminary steps should be taken:Backing up essential data: Back up all necessary data to ensure that it is not lost in the event of a system failure during the upgrade.

This can be accomplished using a cloud backup service, an external hard drive, or an internal hard drive. Verifying hardware compatibility: The system's hardware should be evaluated to ensure that it is compatible with Windows 10 Pro before upgrading. Identifying driver requirements: The hardware manufacturers' websites should be consulted to identify which drivers are required for each device. Installing the latest security patches and updates: Before upgrading to Windows 10, the latest security patches and updates should be installed on the current OS.In general, there may be problems associated with upgrading from Windows 7 Professional and Windows 8.1 to Windows 10 Pro, including:Hardware and software incompatibility issues: Some hardware and software may not be compatible with Windows 10 Pro, necessitating the purchase of new hardware or software to ensure compatibility. License issues: Some programs may require a new license to operate on Windows 10 Pro. Reinstalling applications: All installed applications may need to be reinstalled after the upgrade. Compatibility issues: Some applications may not be compatible with the new operating system, necessitating their replacement. However, these problems can be minimized with careful planning and execution of the upgrade process.

for more such question on software

https://brainly.com/question/28224061

#SPJ11

Does somebody know how to this. This is what I got so far
import java.io.*;
import java.util.Scanner;


public class Lab33bst
{

public static void main (String args[]) throws IOException
{



Scanner input = new Scanner(System.in);

System.out.print("Enter the degree of the polynomial --> ");
int degree = input.nextInt();
System.out.println();

PolyNode p = null;
PolyNode temp = null;
PolyNode front = null;

System.out.print("Enter the coefficent x^" + degree + " if no term exist, enter 0 --> ");
int coefficent = input.nextInt();
front = new PolyNode(coefficent,degree,null);
temp = front;
int tempDegree = degree;
//System.out.println(front.getCoeff() + " " + front.getDegree());
for (int k = 1; k <= degree; k++)
{
tempDegree--;
System.out.print("Enter the coefficent x^" + tempDegree + " if no term exist, enter 0 --> ");
coefficent = input.nextInt();
p = new PolyNode(coefficent,tempDegree,null);
temp.setNext(p);
temp = p;
}
System.out.println();

p = front;
while (p != null)
{

System.out.println(p.getCoeff() + "^" + p.getDegree() + "+" );
p = p.getNext();


}
System.out.println();
}


}

class PolyNode
{

private int coeff; // coefficient of each term
private int degree; // degree of each term
private PolyNode next; // link to the next term node

public PolyNode (int c, int d, PolyNode initNext)
{
coeff = c;
degree = d;
next = initNext;
}

public int getCoeff()
{
return coeff;
}

public int getDegree()
{
return degree;
}

public PolyNode getNext()
{
return next;
}

public void setCoeff (int newCoeff)
{
coeff = newCoeff;
}

public void setDegree (int newDegree)
{
degree = newDegree;
}

public void setNext (PolyNode newNext)
{
next = newNext;
}

}



This is the instructions for the lab. Somebody please help. I need to complete this or I'm going fail the class please help me.
Write a program that will evaluate polynomial functions of the following type:

Y = a1Xn + a2Xn-1 + a3Xn-2 + . . . an-1X2 + anX1 + a0X0 where X, the coefficients ai, and n are to be given.

This program has to be written, such that each term of the polynomial is stored in a linked list node.
You are expected to create nodes for each polynomial term and store the term information. These nodes need to be linked to each previously created node. The result is that the linked list will access in a LIFO sequence. When you display the polynomial, it will be displayed in reverse order from the keyboard entry sequence.

Make the display follow mathematical conventions and do not display terms with zero coefficients, nor powers of 1 or 0. For example the polynomial Y = 1X^0 + 0X^1 + 0X^2 + 1X^3 is not concerned with normal mathematical appearance, don’t display it like that. It is shown again as it should appear. Y = 1 + X^3

Normal polynomials should work with real number coefficients. For the sake of this program, assume that you are strictly dealing with integers and that the result of the polynomial is an integer as well. You will be provided with a special PolyNode class. The PolyNode class is very similar to the ListNode class that you learned about in chapter 33 and in class. The ListNode class is more general and works with object data members. Such a class is very practical for many different situations. For this assignment, early in your linked list learning, a class has been created strictly for working with a linked list that will store the coefficient and the degree of each term in the polynomial.

class PolyNode
{
private int coeff; // coefficient of each term
private int degree; // degree of each term
private PolyNode next; // link to the next term node

public PolyNode (int c, int d, PolyNode initNext)
{
coeff = c;
degree = d;
next = initNext;
}

public int getCoeff()
{
return coeff;
}

public int getDegree()
{
return degree;
}

public PolyNode getNext()
{
return next;
}

public void setCoeff (int newCoeff)
{
coeff = newCoeff;
}

public void setDegree (int newDegree)
{
degree = newDegree;
}

public void setNext (PolyNode newNext)
{
next = newNext;
}
}

You are expected to add various methods that are not provided in the student version. The sample execution will indicate which methods you need to write. Everything could be finished in the main method of the program, but hopefully you realize by now that such an approach is rather poor program design.

Answers

I have a solution for you but Brainly doesn't let me paste code in here.

On what basis computer can be classified into different categories?

Please answer these question and you will get 16 points​

Answers

Computers are classified into 4 different sizes:

- Mini Computers

- Micro Computers

- Super Computers

- Mainframe Computers

Micro Computers are small computers that are usually called PCs, or personal computers. They complete general purpose tasks and can be from $400 home computers to $15000 workstations. These are the most common types of computers, and most people have them in the forms of desktop computers to laptop computers. Even phones and tablets are considered micro computers because they meet the basic criteria of having local storage, a processor, a graphics coprocessor, and a compatible operating system.

Mini Computers are smaller than Micro Computers and are usually thin clients (which are computers that have a neural connection to a server / mainframe). They are usually employed by businesses becuase they are cheap and they have the processing power to tackle word processing, spreadsheet production, and presentation creation. Mainframe computers are in charge of providing this data at extremely high speeds through cloud networking, or through running an ethernet cable for speeds exceeding 50 GBps.

Super Computers are the fastest computer on the planet, and are usually lined up in rows that take up large rooms. These computers are usually stored like servers: on racks where they link up to other servers in order to quantify large amounts of data at extremely high speeds. These have lots of storage, but since storage isn't their primary use case, it isn't as much as a minframe computer, whose sole purpose is in fact storage and data networking.

Mainframe Computers are servers, and they hold data that is utilized by thin clients and and personnel at a business, or they are used to store massive amounts of data. Servers also act as a checkpoint, espeically networking / internet servers, where if you want to access a website, the website's servers need to access the search request for the specific URL and send you the output (the webpage). Mainframe computers do not have as much processing power as Super Computers, but they provide massive data storage options, which is their main purpose.

Answer:

computers can be classified into 4 types

mainframecomputer

minicomputer

supercomputer

microcomputer

please help me with this please

please help me with this please

Answers

Answer:

The 3rd answer.

Explanation:

You're welcome pa.

Answer:

Answer is C: You are using a series of commands multiple times in a ducument

Explanation:

you have a windows 10 windows image (.wim) that is mounted. you need to view the list of third-party drivers installed on the wim. what should you do?

Answers

You should Run DISM and specify the /get-drivers parameters. A significant update to Microsoft's Windows NT operating system is Windows 10.

A significant update to Microsoft's Windows NT operating system is Windows 10. It is the immediate replacement for Windows 8.1, which came out about two years earlier. On July 15, 2015, it was made available for manufacturing, and on July 29, 2015, it was on sale in stores. Microsoft released Windows 10 as a free upgrade for retail owners of Windows 8 and Windows 8.1 via the Windows Store, to Windows 7 users via Windows Update, and for download via MSDN and TechNet. In addition to additional test builds of Windows 10 that are accessible to Windows Insiders, Windows 10 receives new builds on a regular basis and is always free to users.

To know more about Windows 10 click here:

https://brainly.com/question/28847407

#SPJ4

What six things can you do with GIS?

Answers

Answer:

You can:

- Change detection

- Transport route planning

- Flood risk mapping

- Site selection

- Weed and pest management

- Koala habitat mapping

Hope this helps! :)

what is the storage of a modern hard disk drive?

Answers

Answer:

80 gigs of storage

Explanation:

it gives a bunch of room because of the calculations the vomputer

Using more than one array to store related data is called _____________ arrays.

Answers

Answer:

Using more than one array to store related data is called parallel arrays.

Explanation:

I just did it and got 100% on the quiz

Using more than one array to store related data is called parallel arrays.

What is array?

An array is a type of data structure used in computer science that holds a set of elements that are all uniquely recognised by at least one array index or key.

An array is stored in a way that allows a mathematical formula to determine each element's position given its index tuple.

In parallel arrays, a collection of data is represented by two or more arrays, where each corresponding array index represents a field that matches a particular record.

For instance, the array items at names and ages would explain the name and age of the third person if there were two arrays, one for names and one for ages.

Thus, the answer is parallel array.

For more details regarding parallel array, visit:

https://brainly.com/question/27041014

#SPJ6

a simple example of a repetition control structure is the_____command.

Answers

A simple example of a task such as repetition control structure is the if...else command.

A command is an instruction or directive given to a computer program or operating system to perform a specific task or function. It is a statement that tells a computer what to do and how to do it. It is typically entered into a command line interface or through a graphical user interface (GUI).

Commands can be used to perform a wide variety of tasks, such as managing files and directories, launching applications, configuring system settings, and performing network operations.

Learn more about commands, here:

https://brainly.com/question/29627815

#SPJ1

which of the following would not transmit signals from one point to another? a. telephone line. b. modem. c. fibre optics. d. coaxial cable​

Answers

Answer:

b

modem

Explanation:

modem is used to receive signals not transmit

two ways in which some culter views that exist may affect a relationship negatively​

Answers

Answer:

some people say different culture less they get along

Explanation: or more

Other Questions
A random sample of house sizes in major city has a sample mean of Please help me on this. a teacher surveyed his class about how many wore watches and how many wore rings. the venn diagram shows her results. if a person from the class is randomly selected, what is the probability that person wears a watch given that they wear a ring? the democratic party group of answer choices favored strict limitations on voting rights. was organized to oppose andrew jackson. was similar in policy and constituencies to the federalist party. supported both agrarian democratic principles and the continuation of southern slavery. was almost destroyed by the election of 1828 What was various aims were proposed by those involved in opposing slavery The quantity consumed of a good is relatively unresponsive to changes in price whenever demand is:________ a) unitary. b) inelastic. c) elastic. d) falling. In Hoot, who rescues Roy from the broom closet beating? How does this way of returning this favor affect the plot? PPS HELP ASAP Which option uses an intensive pronoun to complete the sentence?My science classA. is taught by Mr. Buckingham, who used to have a job creatingspecial effects for movies.O B. is at 7:30 in the morning, and I'm usually too tired to pay attentionto what's going onC. is harder than math but not as hard as Latin.D. turned out to be pretty enjoyable once I started doing experimentsmyself. Suppose you are given the following information about a particular industry: Q D =3900100PQ S =1200PC(q)=761+ 400q 2MC(q)= 4002q Market demand Market supply Firm total cost function Firm marginal cost function. Assume that all firms are identical and that the market is characterized by perfect competition. Find the equilibrium price, the equilibrium quantity, the output supplied by the firm, and the profit of each firm. The equilibrium price is $ (Enter your response rounded to two decimal places.) Patrick starts hiking at an elevation of -418 feet. He ascends to an elevation of 387 feet and then descends to an elevation 94 feet higher than where he began. He descends 132 feet. What is the elevation of where he stops hiking?. Single line text. during early diastole, there is a small pressure difference in the dastolic pressures across the atrioventricular valves, what is the result? According to reports, 30% of American adults have chronic insomnia. If 3 American adults are chosen at random, what is the probability that all 3 have chronic insomnia? Which expression is equivalent to -3(2m- 1) - m 6m- n- 36m- n+ 3-6m- n- 3-6m- n+ 3 two interior angles of a triangle each measure 34 degrees. What is the measure of the third interior angle which of the following statements concerning real gases is/are correct? 1. real gases are always liquids or solids at temperatures below 273.15 k. 2. the pressure of a real gas is higher than predicted by the ideal gas law. 3. the molecules in a real gas are attracted to each other. Ryan works at the car wash making $5.30 per hour plus tips. Last week Ryan worked 32 hours and earned $403. How much in tips did Ryan make last week? a. $86.40 b. $148.00 c. $169.60 d. $233.40 Please select the best answer from the choices provided A B C D Prompt #1:Imagine an initiative for some aspect of sustainable development (such as higher fuelefficiency standards for vehicles, a drive to promote marketing and consumption oflocally-produced vegetables, or an initiative to improve local air quality). Describe howthe five example domains of economic, social, environmental, technological, and publicpolicy are related to the initiative.Response: PLS HELP!! THIS IS THE SECOND TIME IM ASKING THIS QUESTION!! ANSWER THE ONES U KNOW PLEASEDirections: Use the textbook and your notes to identify which individual said the quotes below.1. A committee was formed to write the Declaration of Independence, but I was the primary author. I relied on ideas first published by John Locke, who said that all people are born with certain natural rights.2. I was a slave who asked my master if I could become a Patriot spy during the Revolution. With his permission, I volunteered and was sent to traitor Benedict Arnolds camp where I pretended to be a runaway slave. I gathered information and sent it back to Patriot leaders. Meanwhile, Benedict Arnold asked me to spy on the Patriots. I game him false information. Eventually, I found out that Lord Cornwallis was moving troops near Yorktown, Virginia. I got word to the Marquis de Lafayette and George Washington who defeated the British at the Battle of Yorktown the final battle of the American Revolution. After the Revolution, the Marquis de Lafayette wrote a letter recommending that I be given my freedom, which was granted in 1787.3. I gained valuable military experience during the French and Indian War and became the general of the Continental Army. I was well-loved by my men and later, the new country4. I was the King of England during the American Revolution. I taxed the colonist heavily after the French and Indian War since it cost so much money. Mr Asiedu earns an annual salary of GH6000.00. His total allowances is GH2000.00.How much tax does he pay if the rate of tax is 15% The ________ is a sensory relay station where all sensory information, except for smell, goes before being sent to other areas of the brain for further processing.a. amygdalab. hippocampusc. hypothalamus d. thalamus