Answer:
I would pick A.
Explanation:
Letting yourself know that making mistakes is a good way to let yourself know you won't completely fail.
Answer:
A) He can remind himself that making mistakes is a natural part of learning.
Explanation:
i just answered it :3
fill in the blank: when ux designers and collaborators want a better idea of the final state of a website or app, they can review .
Reviewing a website or app for mockup will provide UX designers and other team members a better sense of the final product.
Which UX design position prioritizes establishing seamless page transitions in apps or websites 1 point?Interaction designers provide answers to issues like what transpires when a user presses a button or when a mobile app changes pages. They put a lot of emphasis on things like page transitions, loading indicators, and animations.
Which design strategy should a UX designer take into account for visitors who are just beginning their website navigation journey?The user is the center of user-centered design. UX designers need to comprehend, specify, create, and assess when working on a project in order to achieve this.
To know more about UX designers visit :-
https://brainly.com/question/898119
#SPJ4
What would be an ideal scenario for using edge computing solutions?
An ideal scenario for using edge computing solutions will be a school computer lab with workstations connected to a local network. The correct option is C.
What is edge computing?The most typical places to find edge computing are in the transportation, industrial, energy, and even retail sectors.
The performant and scalable implementation model used by Akamai ensures that data and computation are not constrained by latency problems, which can negatively affect digital experiences.
Thanks to EdgeWorkers and EdgeKV, development teams can now focus on creating cutting-edge services and manage Akamai as code as a part of their digital infrastructure.
Thus, the correct option is C.
For more details regarding edge computing, visit:
https://brainly.com/question/28256857
#SPJ1
Which of the following would be considered unethical for a programmer to do? (5 points)
Create software used to protect users from identity theft
Ignore errors in programming code that could cause security issues
Protect users from unauthorized access to their personal information
Use someone else's code with the original developer's permission
One thing that would be onsidered unethical for a programmer to do is B. Ignore errors in programming code that could cause security issues
Why would this be unethical for a programmer ?Creating software designed to protect users from identity theft stands as a commendable and ethical endeavor, demonstrating the programmer's commitment to safeguarding user information and thwarting identity theft.
Engaging in such behavior would be considered unethical since it undermines the security and integrity of the software, potentially exposing users to vulnerabilities and compromising their sensitive data. Respecting intellectual property rights and obtaining proper authorization reflects adherence to ethical and legal standards.
Find out more on programmers at https://brainly.com/question/13341308
#SPJ1
What is the quickest way to switch between application windows on a computer
Answer:
Press and hold the [Alt] key > Click the [Tab] key once. ...
Keep the [Alt] key pressed down and press the [Tab] key or arrows to switch between open applications.
Release the [Alt] key to open the selected application.
Explanation:
1.
can be used to mark the beginning and the end of the process *
(2 Points)
The start/End shape
The processing shape
The decision shape
The input/output shape
whats the answer pls
WILL MARK BRAINILY!!
Muriel's program is supposed to show flashing lights to test the user's vision, but the lights don't flash for the right
amount of time. What should Muriel do?
O assess the program
O edit the program
O debug the program
O renew the program
Answer: He/she should debug the program
Explanation: If it's not right, it's edit or renew the program.
Answer:
he should edit the program
The position of a runner in a race is a type of analog data. The runner’s position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?
The statement that best describes how the position of the runner is represented digitally is as follows:
The position of the runner is sampled at regular intervals to approximate the real-world position, and a sequence of bits is used to represent each sample.What is the explanation for this question?The explanation of this question relies on the position of the runner which is detected by sensors in a race. It is very difficult to keep track of every racer's position manually therefore computer programs are significantly utilized in order to keep exact recordings.
According to the context of this question, the data is sometimes recorded manually and is in the analog form which is converted into digital form for varieties of uses and applications.
Therefore, the position of the runner is sampled at regular intervals to approximate the real-world position, and a sequence of bits is used to represent each sample.
To learn more about Analog data, refer to the link:
https://brainly.com/question/26307469
#SPJ1
Your question seems incomplete. The most probable complete question is as follows:
The position of a runner in a race is a type of analog data. The runner’s position is tracked using sensors. Which of the following best describes how the position of the runner is represented digitally?
The position of the runner is determined by calculating the time difference between the start and the end of the race and making an estimation based on the runner’s average speed.The position of the runner is measured and rounded to either 0 or 1 depending on whether the runner is closer to the starting line or closer to the finish line.The position of the runner is predicted using a model based on performance data captured from previous races.The position of the runner is sampled at regular intervals to approximate the real-word position, and a sequence of bits is used to represent each sampleLearning Management Systems (LMS) allow students to interact with each other, but NOT their teachers.
Answer:
what do you mean friend not for teacher
Answer:
Explanation:
Communication outside the classroom can be facilitated through discussion forums, real-time messaging, video-conferencing, email and announcement posts.
hurry plz What module do you need to import in order to use a pseudo-random number in your game? random guesser guess randomizer
Answer:
import random
Explanation:
if it's python try import random
Answer:
ramdom C
Explanation:
It is not possible for an array to hold an array.
True or false
Answer:
False
Explanation:
i just tested it
Part 1:
In a group, with a friend, or with family members, identify a problem in your community. Describe the problem and work through the steps of problem solving to come to one potential solution. If you can, implement the solution and evaluate the results. If you cannot, propose what may happen if you implemented the solution. Make sure to include all of the steps.
Part 2:
Ask five people for an example of a conflict they have experienced. Look over the approaches to conflict resolution that are listed in the lesson. For each situation, select the approach that you feel would work best. Describe why you selected the approach.
Describe your results for both parts of the project in an essay of at least 300 words.
Long Text (essay)
Submit your 300- word essay that: 1) identifies a problem in your community and works through problem solving steps to provide a solution, and 2) analyzes five conflicts through the conflict resolution approaches and explains an appropriate resolution for each conflict.
The problem in my community is lack of pipe borne water.
What are the issues of water supply?Africa is known to be a content that has some poverish nation. My community is known to lack good water and that is a key issue i would love to address.
What i can do is to write to the government and other private organizations for help or i will take the project upon myself to construct bore holes for the community. A lot of people do not have access to water during the dry season and this will solve the problem.
What are the steps to write an essay?An essay can be written by following the steps below:
First know the type of Essay you want to write.You introduce the Topic of the essay.State the problem or reasons for writing. Write the body of the writeup.End with a Conclusion.
Note that a good essay is one that that communicate the right message to anyone reading it.
Learn more about water from
https://brainly.com/question/5060579
Which of the following errors would a copyeditor fix? (Select all that apply).
spelling and punctuation
content
sentence fluency
grammar
Answer:
The stage in which you polish your writing and fix grammar, spelling, and punctuation errors.
A LinkedIn profile is required to be able to share your work experience and qualifications with potential employers.
True
False
Answer:
False
Explanation:
A LinkedIn profile is not required.
I need help finishing this coding section, I am lost on what I am being asked.
Answer:
when cmd is open tell me
Explanation:
use cmd for better explanatios
CEO of Entertainment Inc. wants to keep track of performance of engagement that the company has engaged. For each customer and agent, he wants to know total number of contracts by month, and monthly contract success ratio (calculated by total number of contracts expired each month divided by total amount of contract price each month). In addition, for each customer and agent he wants to know total numbers of contracts expired each week, and total number of contracts still active each week.
Required:
Provide 4-step dimensional model in the SQL and create data warehouse solution in SQL for the dimensional model that you propose.
Answer:
How do you know how to make a dimensional model?
..........................
Answer:
there is no question write the question for an answer
List and Explain the programming Languages required to start working in Apple.
Answer:
JavaScript, Java, and C++ are obvious additions. Mastering these programming languages can help you land a secured job at Apple. If you pay attention to the popularity of programming language skills, Python is an immensely popular generalist programming language across all leading tech companies
a really excellent way of getting you started on setting up a workbook to perform a useful function.
Templates a really excellent way of getting you started on setting up a workbook to perform a useful function.
What is the workbook about?One excellent way to get started on setting up a workbook to perform a useful function is to begin by defining the problem you are trying to solve or the goal you want to achieve. This will help you determine the necessary inputs, outputs, and calculations required to accomplish your objective.
Once you have a clear understanding of your goal, you can start designing your workbook by creating a plan and organizing your data into logical categories.
Next, you can start building the necessary formulas and functions to perform the required calculations and operations. This might involve using built-in functions such as SUM, AVERAGE, or IF, or creating custom formulas to perform more complex calculations.
Read more about workbook here:
https://brainly.com/question/27960083
#SPJ1
I am in dire need of answers on the subject slither.io! what are the strats that will get me to the top of the leaderboard?
The strats that will get you to the top of the leaderboard is that You should only accelerate when you can clearly see it. Never enter a busy area in a hurry. If you anticipate being imprisoned, move quickly enough to avoid the trap.
What makes a good leaderboard?In order to be effective, a leaderboard must mix competence, relatedness, and autonomy without leaving the player feeling powerless, alienated, or coerced.
Therefore, In Slither.io, one of the players must move briefly parallel to the other players in order to kill more opponents. Avoid doing that for too long or they'll figure out what you're up to. Simply move head-to-head for a little period of time, then feint away in the opposite direction before turning right and moving up.
Learn more about Gaming from
https://brainly.com/question/28031867
#SPJ1
Write a program equals.cpp the implements the function bool equals(int a[], int a_size, int b[], int b_size) that checks whether two arrays with integer elements have the same elements in the same order. Assume that the user will enter a maximum of 100 integers. Also, you may NOT use any other headers besides and .
Answer:
The program is as follows:
#include<iostream>
using namespace std;
bool equals(int a[], int a_size, int b[], int b_size){
bool chk = true;
for(int i =0; i<a_size;i++){
if(a[i] != b[i]){
chk = false; break; } }
return chk;
}
int main(){
int a_size,b_size;
cin>>a_size;
b_size = a_size;
int a[a_size],b[b_size];
for(int i =0; i<a_size;i++){ cin>>a[i]; }
for(int i =0; i<a_size;i++){ cin>>b[i]; }
cout<<equals(a,a_size, b, b_size);
return 0;
}
Explanation:
See attachment for source file where comments are used to explain some lines
1. Software that is designed to intentionally cause harm to a device, server, or network is A. outware B.loggerware C.
attackware D. malware Answer:
2. Some examples of malware include: A. robots, viruses, and worms B. trojans, worms, and bots C. computerware,
worms, and robots D.worms, system kits, and loggerware Answer:
3. Viruses and worms can affect a system by A. deleting hard drives B. slowing down the system C. improving system
functions D. producing fake applications Answer:
4. One tool that hackers use to get sensitive information from victims is/are A. loggerware B. keyloggers C.robots D.
phishing Answer:
5. One key feature of malware is that it A. can only work individually B. can only work on certain operating systems C.
can work jointly with other malware types D. can always be stopped by anti-malware software Answer:
6. One vulnerability that makes computers susceptible to malware is A. using anti-malware software B. using password
protection C. using old versions of software D. using encryption on sensitive files Answer:
7. Malware could A. cause a system to display annoying pop-up messages B. be utilized for identity theft by gathering
personal information C. give an attacker full control over a system D. all of the above Answer: -
8. Malware is a combination of which two words? A malevolent and software B. malignant and software C.
maladapted and software D. malicious and software Answer:
9. The most common way that malware is delivered to a system is through the use of A USB sticks B. damaged
hardware C. emails/attachments D.updated software Answer:
10. Mobile malware is A. malware that moves from one device to another B. malware that moves to different areas in
one system C. malware that deactivates after a period of time D. malware that infects smartphones and tablets
Answer:
Answer:
Explanation:
1. D Malware causes harm, the other answers seem irrevelant.
2. B Because they all can cause harm to a server, device or network. (trojan for device, worm for device and bots for networks)
3. B I haven't heard of viruses deleting hard drives, but lots of viruses do slow
down your computer.
4. D Phishing is a way to obtain data so yes.
5. ? This one is wierd... We can rule out D because that's not always true but you have to decide this on your own.
6. Obviously C? Using old versions can make your computer more
susceptible to malware.
7. D Because all of those can be uses.
8. D Malicous software
9. This is a hard one... Not D, Most likely not B and C is probably more
common.
10. D It's MOBILE malware
1.21 LAB: Divide by x
Write a program using integers user_num and x as input, and output user_num divided by x three times.
Answer:
Explanation:
The following code is written in Python. It is a function called divide_by_x and takes the user inputs as described. It then raises x to the third power and divides user_num by that number. This gives the same result as user_num divided by x three times. The answer is saved in the variable answer which is then returned to the user.
def divide_by_x(user_num, x):
answer = user_num / (x**3)
return answer
The program is an illustration of the division arithmetic operation.
The program in Python, where comments are used to explain each line is as follows:
#This gets input for user_num
user_num = int(input())
#This gets input for x
x = int(input())
This loop is repeated three times
for i in range(1,4):
#This divides user_num by x, each time
user_num /= x
#This prints the required output
print(user_num)
At the end of the program, user_num is divided three times by x and then printed.
Read more about similar programs at:
https://brainly.com/question/17277570
25 POINTS! PLEASE ANSWER! Karrie would like to draw attention to some short statements in her document. What is the best way to draw the readers deeper into the text? A. insert pull quotes B. change the text color C. use a large font D. highlight the text
Answer: I would say D. because it is highlighted text draws the attention of the reader
Explanation:
Answer:
D. highlight the text
Explanation:
if your were trying to grab a readers attention highlighting the text is the most noticeble.
a. Draw the hierarchy chart and then plan the logic for a program needed by Hometown Bank. The program determines a monthly checking account fee. Input includes an account balance and the number of times the account was overdrawn. The output is the fee, which is 1 percent of the balance minus 5 dollars for each time the account was overdrawn. Use three modules. The main program declares global variables and calls housekeeping, detail, and end-of-job modules. The housekeeping module prompts for and accepts a balances. The detail module prompts for and accepts the number of overdrafts, computes the fee, and displays the result. The end-of-job module displays the message Thanks for using this program.
b. Revise the banking program so that it runs continuously for any number of accounts. The detail loop executes continuously while the balance entered is not negative; in addition to calculating the fee, it prompts the user for and gets the balance for the next account. The end-of-job module executes after a number less than 0 is entered for the account balance.
Hierarchy chart and pseudocode required
The Hierarchy Chart for the program needed by Hometown Bank is given below:
Main Program
|
-------------
| |
Housekeeping module Detail module
| |
Prompts for balance Computes fee
and accepts input and displays result
|
-----------------
| |
End-of-job module Detail loop (while balance >= 0)
|
Displays message "Thanks for using this program"
Pseudocode for Main Program:Declare global variables
Call Housekeeping module
Call Detail module
Call End-of-job module
Pseudocode for Housekeeping Module:
Prompt for balance
Accept input for balance
Pseudocode for Detail Module:
Detail loop:
while (balance >= 0)
Prompt for number of overdrafts
Accept input for number of overdrafts
Compute fee: 1 percent of balance - 5 dollars * number of overdrafts
Display result
Prompt for balance
Accept input for balance
Pseudocode for End-of-job Module:
Display message "Thanks for using this program"
Read more about pseudocode here:
https://brainly.com/question/24953880
#SPJ1
hat characteristic of Python subprograms sets them apart from those of other languages?
One characteristic of Python functions that sets them apart from the functions of other common programming languages is that function def statements are executable. When a def statement is executed, it assigns the given name to the given function body. Until a function's def has been executed, the function cannot be called. Consider the following skeletal example:
if . . .
def fun(. . .):
. . .
else
def fun(. . .):
. . .
The statement for the characteristics of Python subprograms sets them apart from those of other languages is true.
What is def statement?Python subprograms can be written with def statement to define a function. Def statement is a user-defined function and this function is provided by the user.
Def statement is a function of code that contains the logical unit of the sequence of statements. Difference from the other language, def statement function will execute before the function can be available to be called.
Thus the given statement about subprograms sets of python is true.
Your question is incomplete, but most probably your full question was
True/false. One characteristic of Python functions that sets them apart from the functions of other common programming languages is that function def statements are executable. When a def statement is executed, it assigns the given name to the given function body. Until a function def has been executed, the function cannot be called. Consider the following skeletal example:
if . . .
def fun(. . .):
. . .
else
def fun(. . .):
. . .
Learn more about def statement here:
brainly.com/question/13259727
#SPJ4
Fritz is a big fan of the racerville rockets. unfortunate;y, the team has been accused of cheating during their games. Fritz reads many articles and posts about this developing news story. His social media algorithms have "learned" that he's a fan of the team, so his feed doesnt show him any articles that argue the accusations are true. From this, Fritz decides his favorite team must be innocent of all cheating charges. Fritz is now in
A. a filter bubble
B. A third party
C. A subculture
D. an echo chamber
Option(D) is the correct answer. Fritz is now in an echo chamber.
Fritz's situation aligns with the concept of an echo chamber. An echo chamber refers to an environment, such as social media, where individuals are exposed to information and opinions that reinforce their existing beliefs and perspectives.
In this case, Fritz's social media algorithms have filtered out articles that present arguments in favor of the cheating accusations, creating an echo chamber that only confirms his preconceived notion of the team's innocence.
As a result, Fritz is insulated from diverse viewpoints and alternative perspectives, which can hinder critical thinking and a comprehensive understanding of the situation.
for similar questions on Fritz.
https://brainly.com/question/5100081
#SPJ8
What is an online payment gateway?
Answer:
it is the key component of the electronic payment processing system, or through which type of payment you are giving through.
Explanation:
brainiliest
PLEASE ANSWER SOON I NEED IT TODAY
If you plan on operating several applications at a time, the amount of RAM should be considered when purchasing a computer.
a. True
b. False
Answer:
true
Explanation:
true because the more ram the more efficient the computer can run, but also depends on what applications you're running.
If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least
If you buy $1000 bicycle, the credit payoff strategy that will result in your paying the least is option c) Pay $250 per month until it's paid off.
Which credit card ought to I settle first?You can lower the total amount of interest you will pay over the course of your credit cards by paying off the one with the highest APR first, then moving on to the one with the next highest APR.
The ways to Pay Off Debt More Quickly are:
Pay more than the required minimum.more than once per month.Your most expensive loan should be paid off first.Think about the snowball approach to debt repayment.Keep track of your bills so you can pay them faster.Learn more about credit payoff strategy from
https://brainly.com/question/20391521
#SPJ1
See full question below
If you buy $1000 bicycle, which credit payoff strategy will result in your paying the least
a) Pay off the bicycleas slowly as possible
b) Pay $100 per month for 10 months
c) Pay $250 per month until it's paid off
9
Select the correct answer.
What is the purpose of flowcharts?
OA.
О в.
O C.
to depict objects and classes
to show the flow of data between functions
to show the relationships between data entities
O D. to provide a high-level description of code
O E. to represent algorithms graphically
Undo
Next
Edmentum/ Plato