Comments should:
a) give the reader the background of the programmer.
b) be written for every line of code.
c) communicate the purpose of the code that follows it.
d) give information about how many hours it took to write the code.

Answers

Answer 1
Option C is correct............
Answer 2

Answer:

c.

Explanation:


Related Questions

. Electricians will sometimes call ______ "disconnects" or a "disconnecting means."
A) SwitchesB) Three-pronged plugsC) Two-pronged plugsD) Electrical cords

Answers

Answer: A: Switches

Explanation:

Answer:

A) Switches

Explanation:

The colors of the pixels in a digital image are often represented by red, green, and blue values
between 0 and 255 (an RGB triplet). A photographer is manipulating a digital image to lighten it
because all of the RGB values in the image are less than 100, making it very dark. He does this
by adding 20 to the R, G, and B values of each pixel, then overwriting the original image. What
type of transformation is the photographer using on the digital image? plz help !!

Answers

Answer:

Lossless Transformation

Explanation:

The iterative process allows you to make changes to your pseudocode and code as you develop it.

a
True

b
False

Answers

The iterative process allows you to make changes to your pseudocode and code as you develop it: False.

What is an iterative process?

An iterative process can be defined as a process through which a set of sequential instructions (code) are repeated in a program until a specific end result is achieved by the software developer.

This ultimately implies that, an iterative process can only be used to repeat a sequence of instructions (code) without making any changes to your pseudocode and code as you develop it.

Read more on iterative process here: https://brainly.com/question/10714151

When you send a tracked email, you receive a notification every time the email is opened. You can receive these notifications in all of the following ways EXCEPT: An instant notification on your computer, if you're using the Chrome or Outlook extension

Answers

You can receive these notifications in all of the following ways except for instant notification on your computer if you're using the Chrome or Outlook extension.

What do you mean by a browser extension?
A browser's extension gives it new features and capabilities. The familiar web-based technologies HTML, CSS, and JavaScript were used to construct it. An extension has access to its own set of JavaScript APIs in addition to the web APIs that JavaScript on a web page can use.

In the event that a browser's built-in features might not be exactly what you need. An extension for your browser can let you personalize your browsing in certain circumstances.

To learn more about a browser extension, use the link given
https://brainly.com/question/4116298
#SPJ4

X = 10
y =
20
х» у
print("if statement")
print("else statement")

Answers

Answer:

"else statement"

Explanation:

Given

The above code segment

Required

The output of the program

Analyzing the program line by line, we have:

x = 10 ----> Initialize x to 10

y = 20 ----> Initialize y to 20

if x > y ----> check if x is greater than y

    print("if statement") ----> Execute this line if the condition is true

The condition is false because 10 is less than 20, so: the statement will not be executed. Automatically, the else condition will be executed

else

   print("else statement")

"else statement" without the quotes will be printed because the if condition is false

Which devices store a track log of physical locations automatically?
A.CDMA
B.GSM
C.iDEN
D.GPS
E.Prepaid

Answers

The device that stores a track log of physical locations automatically is GPS, or Global Positioning System i.e., Option D is the correct answer.

GPS devices use a network of satellites to determine the device's precise location on the Earth's surface. As the user moves, the GPS device continuously updates its location and stores this information in a track log. This track log typically includes information such as latitude, longitude, altitude, and time, which can be used to track the device's movements over time.

GPS technology is commonly used in a variety of applications, such as navigation systems, fitness trackers, and geolocation services. While GPS is a valuable tool for many purposes, it can also raise privacy concerns when location data is collected and stored without the user's knowledge or consent.

To learn more about GPS devices, visit:

https://brainly.com/question/3956420

#SPJ11

true or false: more than one leed rating system may apply to a project, in which case a 3rd party certifier must decide the appropriate rating system the team should pursue.

Answers

More than one LEED rating system may apply to a project, in which case a 3rd party certifier must decide the appropriate rating system the team should pursue.LEED (Leadership in Energy and Environmental Design) rating systems are used to evaluate the environmental performance of a building or community. Each LEED rating system is tailored to a specific project type.

For example, the LEED for New Construction rating system is used to assess the environmental performance of new construction projects, while the LEED for Existing Buildings rating system is used to evaluate the environmental performance of existing buildings.There are several LEED rating systems available, and in some cases, more than one rating system may be applicable to a project.

In these situations, a third-party certifier must decide which rating system the project team should pursue. The certifier will take into account the project type, the project location, and other factors when making this decision.

TO know more about that appropriate visit:

https://brainly.com/question/29866021

#SPJ11

If you have an idea to improve a complex software process at work, what is the most effective way to communicate this idea?

Answers

The most effective way to communicate an idea to improve a complex software process at work is to present it in a clear, concise, and well-organized manner. This can be achieved by:

Clearly stating the problem that the current process is facing, and how your idea addresses it.Providing evidence and data to support your idea, such as by using metrics or case studies from similar projects.Outlining the potential benefits of your idea, including any cost savings, increased efficiency, or improved performance.Presenting a detailed plan of how your idea will be implemented, including any resources that will be required and potential obstacles that may need to be overcome.Being open to feedback and willing to revise your proposal as necessary to address any concerns that may be raised.

It's also important to present the idea to the right people, your manager, or the team leader who is responsible for the process and has the authority to make changes.

Overall, effective communication of your idea is key to getting it implemented, and this will require a clear and well-supported proposal, presented in a professional and persuasive manner.

Learn more about software here https://brainly.com/question/985406

#SPJ4

What are two significant risks that can be understood from the program board? (Choose two.)
1.) A Feature has an excess of dependencies and risks associated with it
2.) Team work in process (WIP) limits are being ignored
3.) Teams do not understand their Features and Epics
4.) No work is planned for the Innovation and Planning (IP) Iteration
5.) Features are being delivered at the end of the last Iteration

Answers

The two significant risks that can be understood from the program board are Features with too many dependencies may fail or experience delays. 2. Ignoring WIP limitations might result in resource overload and missed deadlines.

1.) Too many dependencies in a feature can cause the program's delivery to be delayed or to fail altogether. This is so because dependencies may result in problems such a lack of tools, information, or communication. When features have too many dependencies, it might be challenging to keep the timetable on track because each dependence must be managed, recorded, and taken care of individually.

2. Ignoring WIP limitations might result in resource overload and missed deadlines. This is because a team is less likely to give each task the attention it requires if they are working on too many activities at once. This may cause things to take longer than they should or to be finished with lesser quality than planned. Teams are also more likely to miss deadlines when WIP limitations are disregarded because of the volume of work that needs to be done.

Learn more about program here-

brainly.com/question/11023419

#SPJ4

Thanks for asking me to ask a ques !!

Answers

Answer:

I'm not sure what this means by Hope you have a great day :)

Answer:

An important role to follow when learning is to ask questions.

assuming you have an images module object named i, what method can you use to change the pixel at coordinate 238, 590 to red?

Answers

To change the pixel at coordinate (238, 590) to red using the images module, you can use the following method:

i.putpixel((238, 590), (255, 0, 0))

This method putpixel allows you to specify the coordinates of the pixel and the desired color. In this case, the RGB values (255, 0, 0) represent the color red.

Know more about pixel here:

https://brainly.com/question/15189307

#SPJ11

Choose the term that best completes each sentence.

abstraction hides the details about a specific piece of information.

abstraction hides the details about a specific process.

data
procedural

Answers

Answer:

The answer to the above questions is given in explanation section:

Explanation:

abstraction hides the details about a specific piece of information.

The suitable match for this is Data

Because the word "Piece of information " can only be referred to data not to process.

Now look at the second

abstraction hides the details about a specific process

The suitable match here is procedural.

because specific process can only be referred to procedure not to data.

Answer:

The suitable match for this is Data

Because the word "Piece of information " can only be referred to data not to process.

Now look at the second

abstraction hides the details about a specific process

The suitable match here is procedural.

because specific process can only be referred to procedure not to data.

1) Assume you are adding an item 'F' to the end of this list (enqueue('F')). You have created a new linear node called temp that contains a pointer to 'F'. Also assume that in the queue linked list implementation, we use the variable numNodes to keep track of the number of elements in the queue.

Answers

When a new item 'F' is added to the end of the queue list (enqueue('F')), a new linear node is created called temp that contains a pointer to the new element. In a queue linked list implementation, the variable numNodes is used to keep track of the number of elements in the queue.

As a result, we increment the numNodes variable by 1 since a new item has been added to the queue list. The pointer at the tail of the queue is then updated to the newly added node temp. We can do this by assigning the new node temp to the current node that is being referenced by the tail pointer.

Next, if the queue was previously empty, then we set both the head and tail pointers to temp. If the queue wasn't empty, we leave the head pointer unmodified, since the element added is being added to the end of the queue. We then return the updated queue list with the newly added item 'F'.In summary, when adding a new item 'F' to the end of a queue list implementation, we first create a new node that points to the new element.

To know more about mplementation visit:

https://brainly.com/question/32092603

#SPJ11

Complete the sentence.
According to programming best practices, _ would be a good name for a variable that holds a credit card number.

Answers

Explanation:

According to programming best practices, "creditCardNumber" would be a good name for a variable that holds a credit card number.

Using descriptive names for variables makes code more readable and easier to understand. In this case, "creditCardNumber" clearly conveys the purpose of the variable and makes it easy for other developers to understand what it contains. It's important to use meaningful variable names in order to write clear, maintainable code.

All of the following relate to securing assets EXCEPT:O Access to networksO Access to end-user devicesO How third-party vendors ensure securityO The ease with which the system runs after a failure is correctedO Access to servers

Answers

Developed as a more secure alternative because of DES's small key length. 3DES or Triple DES was built upon DES to improve security. it is only considered secure if three separate keys are used.

There are three different types of software  security of the software itself, security of data handled by the software and security of networked connections with other systems. Confidentiality,  and availability are the three key elements that make up the  triad, a model for information security. A fundamental goal of information security is represented by each component. Any data, device, or other element of the environment that supports information-related activities is referred to in the security of information, computers, and networks as an asset.

To know more about secure alternative please click on below link.

https://brainly.com/question/10710308

#SPJ4

excel functions are prebuilt formulas within excel.

Answers

Formulas are mathematical equations that integrate cell references, excel  values, and operators to compute results. It is not necessary to write the underlying formula when using functions because they are prebuilt formulas that can be rapidly fed values.

What do Excel's functions and formulas mean?

Functions are pre-written formulas that perform calculations using specific variables, also known as inputs, in a predetermined order or structure. Functions can be used to do calculations of any complexity. The Formulas tab on the Ribbon contains the syntax for all of Excel's functions.

What is the name of the pre-written formulas in Excel?

An already written formula is a function. A function performs an operation on a value (or values), then returns a new value (or values.)

To know more about excel  visit:-

https://brainly.com/question/3441128

#SPJ4

Situation: You have been asked to compare and contrast the concepts of http:// and file:///. Write a few sentences comparing these concepts.

Answers

Answer:

the file isnt coming up

Explanation:

Python help!
Input a grade level (Freshman, Sophomore, Junior, or Senior) and print the corresponding grade number [9-12]. If it is not one of those grade levels, print Not in High School.
Hint: Since this lesson uses else-if statements, remember to use at least one else-if statement in your answer to receive full credit
Sample Run 1
What year of high school are you in? Freshman
Sample Output 1
You are in grade: 9
Sample Run 2
What year of high school are you in?
Kindergarten
Sample Output 2
Not in High School

Answers

Answer:

print("What year of high school are you in?")

grade = input()

grade = grade.lower()

if grade == "freshman":

   print("You are in grade: 9")

elif grade == "sophomore":

   print("You are in grade: 10")

elif grade == "junior":

   print("You are in grade: 11")

elif grade == "senior":

   print("You are in grade: 12")

else:

   print("Not in high school")

Explanation:

The first line prints the question. "grade = input()" stores the answer the user will type in the terminal into the variable 'grade'.

grade.lower():

The third line lowercases the entire string ("FreshMan" would turn to "freshman"). Python is case-sensitive.

Then, test the string to see if it matches freshman, sophomore, junior, or senior. If the input string matches print the statement inside the if block. The last statement is the else. It prints if nothing else matches.

studying computer science is really worth it for future?​

Answers

Yes, a computer science degree is worth it for many student also they make 74,762 annual salary
Yes, it is a vital job and they make very good money

The following loop draws 3 circles on the screen. If I wanted to alter this loop to draw 10 circles, how many lines would my code be?





1 line


3 lines


10 lines


30 lines

Answers

Answer:

B). 3 lines

Explanation:

In order to modify the loop is drawn using three circles to make it drawn employing ten circles, the code must be comprised of three lines. The execution of line 1 includes 3 as the value of x while y remains undefined. Line 2 would employ the same value of x i.e. 3 and the introductory value of y(5 = 3 + 2) where x + 2 is being executed. In the third line, 10 circles can be drawn in total in the loop as {2(previous value) * 5 = 10}, y's updated value.

Answer:

3 lines is the answer

Explanation:

https://www.bing.com/videos/search?q=dancing+aaron+smith+1+hour&view=detail&mid=C6C28AF3C0CEC1E4AEE3C6C28AF3C0CEC1E4AEE3&FORM=VIRE
enjoy.

Answers

I’m scared bye I’m gonna copy link and see

Answer:

Interesting

Explanation:

Dancing???

4.2 Lesson Practice Edhisive

4.2 Lesson Practice Edhisive

Answers

Answer:

10

Explanation:

When a specific garment, like the bell-bottom jean, comes into style and then disappears again it's called a ___________. (5 Letters)

Answers

When a specific garment, like the bell-bottom jean, comes into style and then disappears again it's called a fad. A fad is a temporary,

short-lived craze or trend that becomes very popular among a particular group of people within a brief period.

A fad can be a piece of clothing or a way of dressing, hairstyle, a dance, a toy, or even a word or phrase. However, after a while, it loses its popularity, and people move on to something else. Fads can be caused by various factors like media exposure, peer influence, and marketing.

In conclusion, fads are temporary trends or crazes that are popular for a short period and then disappear, making way for a new trend to emerge.

To know more about specific visit:

https://brainly.com/question/27900839

#SPJ11

Write a filter function named strip that removes C++ com- ments from input, sending the uncommented portion of the program to output. Your program should work with both single line (//) comments, and multi-line (/* */) comments. Please follow all instructions, I do not want to waste a question!

Answers

Sure, here's the `strip` function that removes C++ comments from the input:

```python
def strip(commented_input):
"""
Removes C++ comments from input and returns the uncommented portion of the program.
Works with both single-line (//) and multi-line (/* */) comments.
"""
uncommented_output = ''
i = 0
in_comment = False
while i < len(commented_input):
if not in_comment and commented_input[i:i+2] == '//':
# Single-line comment found, skip to end of line
eol = commented_input.find('\n', i)
i = eol if eol != -1 else len(commented_input)
elif not in_comment and commented_input[i:i+2] == '/*':
# Multi-line comment start found, skip to end of comment
in_comment = True
i += 2
elif in_comment and commented_input[i:i+2] == '*/':
# Multi-line comment end found, continue with input after comment
in_comment = False
i += 2
elif not in_comment:
# Not in a comment, add current character to output
uncommented_output += commented_input[i]
i += 1
else:
# In a comment, skip current character
i += 1

return uncommented_output
```

What is climate and how is it formed? What can cause climate change.

Answers

Answer: Climate is the weather and conditions over time (at least a year).

The things that start climate change are burning fossil fuels and tearing down forests to start construction.

Answer:

climate can be defined as weather.

I will mark you as brainlist

I will mark you as brainlist

Answers

Answer:

download it

Explanation:

because if u upload it will not save .

Answer:

If you would like to view a document that is now yours you would have to upload it. If someone wants to see your document you have to download it first and then send it to the person who is going to read it, and no you don't have to use word however you can if you want to.

the answer to the question would be download

Explanation:

Write a do. While loop that displays the squared value of a number from 2 to 4. Assume your variable is initialized to 2. Choose your own variable names. The output should look something like this: the squared value of 2 is 4the squared value of 3 is 9the squared value of 4 is 16 g

Answers

Here's an example of a do-while loop in Java that displays the squared value of a number from 2 to 4.

public class SquareValues {

   public static void main(String[] args) {

       int number = 2; // Starting number

       do {

           int squaredValue = number * number;

           System.out.println("The squared value of " + number + " is " + squaredValue);

           number++;

       } while (number <= 4);

   }

}

Output:

The squared value of 2 is 4

The squared value of 3 is 9

The squared value of 4 is 16

In this example, the loop starts with number initialized to 2. It calculates the squared value of the current number, prints it using System.out.println(), and then increments the number by 1. The loop continues until the number reaches 4.

To know more about do-while loop, visit:

brainly.com/question/32273362

#SPJ11

name the three basic storage device of a computer​

Answers

Hard disk Drive, random access memory, USB flash memory
SSD, Hard Drive, and RAM

what is the difference between univariate data and bivariateâ data?

Answers

Univariate facts summarize solely one variable at a time. Bivariate records examine two variables. Multivariate information evaluate greater than two variables.

What is the distinction between univariate and bivariate examples?

When you behavior a learn about that appears at a single variable, that learn about involves univariate data. For example, you would possibly find out about a team of university students to find out their average SAT rankings or you may learn about a crew of diabetic patients to locate their weights. Bivariate facts is when you are analyzing two variables.

What is the difference between univariate statistics and bivariate data?

Univariate data measure the fee of a single variable for every man or woman in the study. Bivariate facts measure values of two variables for every individual.

Learn  more about bivariateâ data here;

https://brainly.com/question/23254769

#SPJ4

adding timestamp to a record to indicate when the row is valid/applicable is an example of .

Answers

Adding a timestamp to a record to indicate when the row is valid/applicable is an example of temporal database design.

Temporal database design is the process of organizing and managing data in a way that takes into account the time dimension of the data. This involves adding time-related attributes to the data model, such as timestamps or interval values, to indicate when a record is valid or applicable. By including these temporal attributes, it is possible to store and query historical versions of the data, as well as track changes and updates over time.

In the context of adding a timestamp to a record, the timestamp serves as a temporal attribute that indicates when the record was created or last modified. This can be useful for auditing purposes, as well as for analyzing trends and patterns in the data over time. Temporal database design is particularly relevant in applications where data changes frequently or where historical data needs to be preserved for legal or regulatory reasons.

Learn more about database design here:

brainly.com/question/13266923

#SPJ11

Other Questions
Explain what it means for radioactive rays to be able to ionize matter? the total value of all goods and services produced in the south american country of dalair in the last fiscal year was 2.7% more than the previous year. this growth places dalair in a better position than most of its allies. in this scenario, the total value of all goods and services through which the economic condition of dalair was assessed is known as What were the U.S. 's 3 main goals of the war ? Susans ribbon is 3.8 metres long. What is the length of her ribbon in millimetres? A lady sells necklaces and bracelets at a state fair. She uses 120 pearls to make one necklace and 15 pearls to make one bracelet. On the night before the last day of the fair, she has less than 200 pearls left. She decided to use these to make one necklace and some bracelets. What is the greatest number of bracelets she can make? Distinguish between innate immunity and adaptive immunity.1) Innate immunity primarily uses T cells to neutralize the threat. Adaptive immunity primarily uses B cells to neutralize the threat.2) Innate immunity primarily uses B cells to neutralize the threat. Adaptive immunity primarily uses T cells to neutralize the threat.3) Innate immunity is nonspecific and does not distinguish one type of threat from another. Adaptive immunity is specific and protects against particular threats.4) Innate Immunity relies on the activity of cells to neutralize the threat. Adaptive immunity primarily relies on the activity of specific proteins, such as antibodies to neutralize the threat.5) Innate immunity is specific and protects against particular threats. Adaptive immunity is nonspecific and does not distinguish one type of threat from another. Find the distance from the point to the line. (-4,4 - 1); x = - 3+ 3t, y= -1+t, z = 1 + 2t The distance is 1. (Type an exact answer, using radicals as needed.) according to gretchen weirob, "possible" means probably or likely. true false How are Buddhist (The four noble truths) and Christian (The Sermon on the Mountain) similar? All in vain; because Death, in approaching him, had stalked with his black shadow before him, and enveloped the victimWhat kind of figurative language does the author use here? Explain. which major public insurance program was legislated in 1965? a. medicare b. medicaid c. both a and b d. neither a nor b 1. Solve the equation algebraically for 0x2. Give your answers in radians to the nearest 10th. sin() = cos(2x) 2. In triangle ABC, side a=4 cm, side b=6 cm and angle A=27. What is the measure of angle B? Give your answer(s) to the nearest 10th of a degree how can Haitis education be better? Mickey and Minnie Mouse are purchasing a new home. Their annual property taxes are estimated to be $5,467, and their homeowner's insurance policy has an annual cost of $1,440. They must also purchase flood insurance, since they live in below sea level, at an additional cost of $1,262 per year. How much will they be required to put into their escrow account each month to cover these costs? If f(x) = 3x - 1 and g(x) = x^2-4x, find f(g(x)).A) 3x-1 ____ x^2- 4xB) 3x^2-12x-1C) 3x^3-13x^2+4xD) 9x^2-18x+5 Classify each of the events according to whether the solubility of the solute increases, decreases, or stays the same. Solute solubility increases Solute solubility decreases Solute solubility stays the same Answer Bank glucose in water heating the mixture CO, in blood: body temperature rises to 103 F KCI in water warming the mixture clectrolytes in solution: a mountain climber ascends 5 km with a sports drink, atmospheric pressure drops 50% a nonbreathing patient is to receive supplemental oxygen at 6 lpm. which delivery device is most appropriate? you do two 1:5 serial dilutions on an actively growing bacterial culture broth. doing a plate count of your final serial dilution gives you 30 cfu/ml. what is your original concentration of bacterial culture broth? Answer the following two questions by making lists. When finished, submit this assignment to your teacher. 1. What traits have you inherited from your mother? List and describe them. 2. What traits have you inherited from your father? List and describe them. Let Y 1,Y 2,,Y nbe independent random variables such that each Y ihas a gamma distribution with parameters iand . That is, the distributions of the Y 's might have different 's, but all have the same value for . Prove that U=Y 1+Y 2++Y nhas a gamma distribution with parameters 1+ 2++ nand . For each Y i, the moment-generating function is m Y i(t)=. Since the Y i's are independent, the moment-generating function for U is m U(t)=() ( 1+a 2++a n), which is the moment-generating function for a gamma distribution with parameters 1+ 2++ nand .