If-then-else and switch (expr) { case value: statements ;} do not have a loop when expressed in syntax graphs.
Command is a directive given to a computer program or operating system to carry out a specific operation. Command can be described as direct with special authority or prerogative; order. A command is a directive to a computer program to perform a specific task, in computing, a command is a directive to a computer program to perform a specific task.
A command is a directive or instruction given to a computer or computer software to perform a specific task. Commands are typically entered into a command line interface, such as a terminal or command prompt, by a user. In a GUI (graphical user interface), commands may also be initiated by selecting options from menus or clicking buttons.
The specific syntax and set of commands can vary depending on the operating system or software being used. Some examples of common commands include copying or moving files, changing directories, and installing or uninstalling software.
Here is the complete question:
Which commands (constructs) do NOT have a loop when expressed in syntax graphs? Select all that apply Group of answer choices if-then-else switch (expr) { case value: statements ;} for ( ; ; ) {} while (condition) do {statements;}
Learn more about command: https://brainly.com/question/30319932
#SPJ4
Which of these is not a potential cause of data loss?
using the ARP protocol
firewall
human error
network congestion
Answer:
Using the ARP protocol
Explanation:
Edgenuity and i got it right
Answer:
ARP
Explanation:
EDJ 2020
Which special network area is used to provide added protection by isolating publicly accessible servers?
A demilitarized zone (DMZ) is an area of the network where extra security is placed to protect the internal network from publicly accessible servers like web servers and email servers.
The most crucial action to take to stop console access to the router is which of the following?One needs to keep a router in a locked, secure area if they want to prevent outsiders from accessing its console and taking control of it. The router's console can only be accessed by those who have been given permission.A screened subnet, or triple-homed firewall, refers to a network architecture where a single firewall is used with three network interfaces. It provides additional protection from outside cyber attacks by adding a perimeter network to isolate or separate the internal network from the public-facing internet.A demilitarized zone (DMZ) is an area of the network where extra security is placed to protect the internal network from publicly accessible servers like web servers and email servers.To learn more about network refer to:
https://brainly.com/question/1326000
#SPJ4
Culinary Arts simply means the art of
(7 Letters)
Answer:
I believe it means C-o-o-k-i-n-g (7 letters)
Explanation:
Answer:
C-O-O-K-I-N-G
Explanation: I got this one correct pls mark as brainliest
When an application has multiple uses what is it known as?
A. Minimum Features
B. Full Featured
C. Limited Features
D. Maximum Features
It is necessary to determine what individual or organization is responsible for a web site in order to determine its _____
It is necessary to know the person or organization in charge of a website to determine its'; Website Designer
Who is a website Designer?A website designer is defined as individual or organization that is responsible for the organization and appearance of a Web site.
Now, these website designers create the visual aspects of websites. They do this by meeting with clients, online or in person, in order to get a clear picture of the message that need.
Thereafter, these Web Designers create and build websites and web pages by combining any number of visual design elements including text, photos, graphics, animations and videos.
Finally, a Web Designer could either be responsible for creating a brand new website or simply making updates to the design and layout of existing pages.
Read more about Websites at; https://brainly.com/question/1382377
How are game designers linked with game players?
A.
In order to be a game player, you must be a game designer.
B.
In order to be a game designer, you must have extensive experience playing video games.
C.
Game designers must survey potential game players before creating a new game.
D.
Game designers create a narrative that game players can shape and become personally involved in.
The way in which game designers linked with game players is that: D. Game designers create a narrative that game players can shape and become personally involved in.
What is a game development tool?A game development tool can be defined as a set of specialized software programs that are used by game developers (programmers) for the design and development of a game such as the following:
EmulatorGame engineModeling toolLevel editorScripting toolAdditionally, the four (4) team responsibilities that are required to create a game include the following:
The game designer create the rules and characters.The programmer writes an executable set of instructions (code).The artist choose colors and design each characters.The game designers create a narrative that game players can shape.Read more on game development here: https://brainly.com/question/13956559
#SPJ1
A occurs when you reset a mobile device but retain your installed applications and personal settings
Answer:
Soft Reset
Explanation:
A Soft Reset is a type of reset in which a gadget such as smartphones, PC, or other related gadgets undergo to refresh or reset the device or makes certain applications work or function well without user data, settings and applications.
Hence, a SOFT RESET occurs when you reset a mobile device but retain your installed applications and personal settings
Answer:
Soft Reset
Explanation:
What is the difference between an open network and a secure network?
An open network is a network that allows any device to connect to it without any restrictions or authentication, while a secure network is a network that has some level of security measures in place to prevent unauthorized access.
An open network is convenient because it allows anyone to easily connect to it, but it can also be vulnerable to security risks because it lacks any protection against unauthorized access. In contrast, a secure network uses various security measures such as encryption, authentication, and access controls to prevent unauthorized access and protect the data transmitted over the network. As a result, secure networks are generally more secure than open networks, but they may require additional setup and configuration.
how to use function in python
Answer:
Use the keyword def to declare the function and follow this up with the function name.
Add parameters to the function: they should be within the parentheses of the function. ...
Add statements that the functions should execute.
Which of these jobs would be most appropriate for someone who majors in information systems? A. Managing a group of programers B. Creating a cloud based customer service application app C. Providing telephone tech support D. Designing a database for an online retailer.
Answer:
B. Creating a cloud based customer service application app
Explanation:
Information Systems is described as an "academic study of various systems encompassing a particular reference associated with the complementary networks and information of the software and hardware that different organizations and people use to collect, create, process, distribute, and filter data.
The information system includes an integrated pair of different components for storing, collecting, and processing data, along with this, it is utilized for providing knowledge, information, and digital products.
In the question above, the correct answer is option-B.
What's not an computer characteristic ??
Answer:
A computer is an electrical machine
The computer cannot think at its own
The computer processes information error-free
The computer can hold data for any length of time
Explanation:
The computer is an electrical machine is not a computer characteristic option (A) a computer characteristic is correct.
What is a computer?A computer is a digital electronic appliance that may be programmed to automatically perform a series of logical or mathematical operations. Programs are generic sequences of operations that can be carried out by modern computers. These apps give computers the capacity to carry out a broad range of tasks.
The question is incomplete.
The complete question is:
What's not a computer characteristic?
A computer is an electrical machineThe computer cannot think on its ownThe computer processes information error-freeThe computer can hold data for any length of timeAs we know,
The characteristics of a computer are:
The computer is unable to think for itself.
Information is processed by the computer without error.
The computer has unlimited storage capacity for data.
Thus, the computer is an electrical machine is not a computer characteristic option (A) a computer characteristic is correct.
Learn more about computers here:
https://brainly.com/question/21080395
#SPJ2
Draw a flowchart to check whether a given number is an Armstrong number. An
Armstrong number of three digits is an integer such that the sum of the cubes of its
digits is equal to the number itself. For example, 371 is an Armstrong number since
3**3 + 7**3 + 1**3 = 371.
hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!hello!
in the formula =subtotal(102,[paid]), what does the 102 represent?
In the formula "=SUBTOTAL(102, [paid])", the number 102 represents the function code for the specific type of subtotal calculation to be performed.
The SUBTOTAL function is used to calculate various types of subtotals within a range of data. It can perform different calculations, depending on the function code provided as the first argument. In this case, the function code 102 corresponds to the calculation for the count of values in the range specified by [paid]. It will count the number of cells in the range [paid] that contain numeric values (excluding blank cells and cells containing text or errors). So, the formula "=SUBTOTAL(102, [paid])" will calculate the count of numeric values in the range specified by [paid].
Learn more about SUBTOTAL function here: brainly.com/question/31038082
#SPJ11
Tom walks into the accounting department and walks into a mess! User A can't access the Internet, User B has forgotten her password, User C's system is overheating to the point of smoking and the administrator is worried there might be a virus on all the systems. Whose system should he address first
Answer:
User C.
Explanation:
As per the given details, the problem of user C's system must be addressed first due to the seriousness of his case. His computer is excessively overheating up to the smoking point and if his problem is not addressed soon, it will damage the vital parts of the computer or may also explode. The other users having the problem of inability to access the internet or issue of forgotten password can be addressed later as these are minor problems that do not have as such consequences. Thus, user C is the correct answer.
Write a program that asks the user to enter a city name, and then prints Oh! CITY is a cool spot. Your program should repeat these steps until the user inputs Nope.
A program that the user to enter a city name, and then prints Oh! CITY is a cool spot as follows:
City_name = input("Please enter a name or type Nope to terminate the program: ")
while( user_name != "Nope" ):
print("Oh! CITY is a cool spot" , City name)
City name = input("Please enter a name or type Nope to terminate the program: ")
What is a Computer Program?A computer program may be defined as a series or set of instructions in a programming language that are utilized by the computer to execute successfully.
The variable "City_name" is used to store the input of the user. He might input his name or "NOPE" to terminate. Then we used a while loop to check if the user input NOPE. Then, we print Oh! CITY is a cool spot for "users input".
Therefore, a program that the user to enter a city name, and then prints Oh! CITY is a cool spot is well-described above.
To learn more about Computer programs, refer to the link:
https://brainly.com/question/1538272
#SPJ1
If you have an on-premise system and you use AWS Cloud to mirror data or replicate data from your on-premise system, which architectural pattern are you using?
Select one:
a.
Fully Working Low-Capacity Standby
b.
Pilot Light
c.
Multi-Site Active-Active
d.
Backup and Restore
The architectural pattern that corresponds to using AWS Cloud to mirror or replicate data from an on-premise system is the Multi-Site Active-Active pattern. By using the Multi-Site Active-Active pattern, organizations can achieve increased scalability, resilience, and disaster recovery capabilities.
In the Multi-Site Active-Active pattern, both the on-premise system and the AWS Cloud infrastructure are active and operational simultaneously. The on-premise system serves as one site, while the AWS Cloud serves as another site. Data is replicated or mirrored between these two sites, ensuring that both systems are synchronized and up-to-date.
This pattern allows for high availability and fault tolerance. In case of a failure or disruption in one site, the other site can seamlessly take over and continue serving the workload. The data replication ensures that the systems stay synchronized, minimizing any potential data loss.
It allows them to leverage the flexibility and scalability of the AWS Cloud while maintaining the on-premise system for certain specific requirements or to distribute the workload across multiple locations.
Learn more about data here:
https://brainly.com/question/21927058
#SPJ11
when data is collected and turned into information, it is called
Answer:
its called data processing
Explanation:
...
Explanation:
When data is collected and turned into information, it is called program .
please answer correctly,
Python Project Worksheet
Print | Save
Output: Your goal
You will write a program that asks a user to fill in a story. Store each response in a variable, then print the story based on the responses.
Part 1: Plan and Write the Pseudocode
Use the following guidelines to write your pseudocode for a fill-in story program.
Decide on a list of items the program will ask the user to input.
Your program should include at least four interactive prompts.
Input from the user should be assigned to variables and used in the story.
Use concatenation to join strings together in the story.
Print the story for the user to read.
Write your pseudocode here:
Part 2: Code the Program
Use the following guidelines to code your program.
Use the Python IDLE to write your program.
Using comments, type a heading that includes your name, today’s date, and a short description.
Set up your def main(): statement. (Don’t forget the parentheses and colon.)
Conclude the program with the main() statement.
Include at least two print statements and two variables.
Include at least four input prompts.
Use concatenation to join strings.
Follow the Python style conventions regarding indentation in your program.
Run your program to ensure it is working properly. Fix any errors you may observe.
Example of expected output: The output below is an example of a “Favorite Animal” message. Your specific results will vary depending on the choices you make about your message.
Output
The kangaroo is the cutest of all. It has 5 toes and a beautiful heart. It loves to eat chips and salsa, although it will eat pretty much anything. It lives in New York, and you must be super sweet to it, or you may end up as its meal!
When you've completed writing your program code, save your work by selecting 'Save' in the Python IDLE. When you submit your assignment, you will attach this Python file separately.
Part 3: Post Mortem Review (PMR)
Using complete sentences, respond to all the questions in the PMR chart.
Review Question Response
What was the purpose of your program?
How could your program be useful in the real world?
What is a problem you ran into, and how did you fix it?
Describe one thing you would do differently the next time you write a program.
Part 4: Save Your Work
Don't forget to save this worksheet. You will submit it for your assessment.
Answer:
import sys
import time
from time import sleep
hello_user = "Hello what is your name\n"
for char in hello_user:
time.sleep(0.05)
sys.stdout.write(char)
sys.stdout.flush()
Explanation:
Which of these is a biotic factor in a forest?
Will
O A. Climate
O O
O B. Terrain
O C. Trees
O D. Water
Answer: trees
Explanation:
Write a program. Please write a program that asks the user to input an integer that corresponds to a triangle height and then generates an ASCII art triangle with the width equals to its height. For example, if the input is 4 the program output looks like this:
Here's a Python program that generates an ASCII art triangle based on user input for the height:
height = int(input("Enter the height of the triangle: "))
for i in range(1, height+1):
print(' '*(height-i)+'*'*(2*i-1))
First, the program prompts the user to input an integer corresponding to the height of the triangle, which is then stored in the variable height.
Then, a for loop is used to iterate from 1 to height.
Inside the loop, we print two concatenated strings. The first string ' '*(height-i) prints spaces based on the current row number. For example, on the first row, there are height-1 spaces, on the second row there are height-2 spaces, and so on.
The second string '*'*(2*i-1) prints asterisks based on the current row number. On the first row, there is only one asterisk, on the second row there are three asterisks, and so on. The formula used to calculate the number of asterisks is (2*i-1).
The print function with end='\n' is used to print the concatenated strings on a new line.
Output for height = 4:
*
***
*****
*******
To learn more about Python program
https://brainly.com/question/26497128
#SPJ11
excel provides _____ so that you can easily create a professional, consistent worksheet appearance.
Excel provides a wide range of formatting options and tools so that you can easily create a professional, consistent worksheet appearance. You can customize fonts, colors, borders, and styles to make your data stand out and look visually appealing.
Excel also offers a variety of pre-built templates and themes that you can use to quickly create a polished worksheet design. In addition, you can add graphics, charts, and tables to your worksheet to further enhance its visual impact. Excel's conditional formatting feature allows you to apply formatting rules based on the values in your data, making it easy to highlight important information or trends. With all of these formatting options at your fingertips, you can create worksheets that not only convey your data accurately but also look professional and visually engaging. By taking the time to format your worksheets correctly, you can make them easier to read and understand, which can help you to make better decisions and communicate more effectively with others.
Learn more about Excel here:
https://brainly.com/question/3441128
#SPJ11
URGENT!! Will give brainliest :)
Why might you use this kind of graph?
A. To show the relationship between two variables
B. To compare data from different groups or categories
C. To show the relationship between sets of data
D. To show parts of a whole
Answer: b
Explanation:
To compare data from different groups or categories
hope this helps
Answer:
B. To compare data from different groups or categories
draw an er diagram for an airline reservation system. this system holds information of airports, airplane types, airplanes, flights, flight legs, and seats reserved for a flight leg. the system handles information such as:
A diagram for an airline reservation system and this system holds information of airports Airport: airportID, airportName, airportLocation
Airplane Types: typeID, typeName
Airplanes: planeID, planeTypeID
Flights: flightID, originAirportID, destAirportID, departureTime, arrivalTime
Flight Legs: flightLegID, flightID, planeID
Seats Reserved: seatReservationID, flightLegID, seatNumber
What uses System Information?displays the operating system configuration, security information, product ID, and hardware properties (such as RAM, disk space, and network cards) in detail about a computer and its operating system.
What kinds of information systems exist?An organization's data collection, transfer, organization, and storage are all supported by a variety of information technology systems, including computers, software, databases, communication systems, the internet, and other devices.
Learn more about information system:
brainly.com/question/24944623
#SPJ4
ten(10) examples of wearables or wearable technologies?
Answer:read
Explanation:
airpods
headphones
earbuds
AirPods pro
watch
fitbit (type of watch that counts your miles) &you can say workout watch&
VR set
technology bracelet
smart glasses
Smart ring
Describe, with examples, the way in which a defect in software can cause harm to a person, to the environment, or to a company
Answer:
Losing jobs. Fire. Destruction of property.
Explanation:
Having a company shut down due to lack of protection and having people testify products unsafe. If software blows up it could cause desturction of property therefore causing the effect of many people losing their jobs.
Transferring data from a remote computer to a local computer is .....
The answer is uploading
How will you search for your preferred data in a long list by applying filtering. In MCS exel
WHAT ARE THE MOST USED AND POPULAR PROCESSOR
Answer:
i3 processor, i5 processor, AMD Athlon 64
while t >= 1 for i 2:length(t) =
T_ppc (i) (T water T cork (i- = - 1)) (exp (cst_1*t)) + T cork (i-1);
T cork (i) (T_ppc (i) - T pet (i- = 1)) (exp (cst_2*t)) + T_pet (i-1);
T_pet (i) (T cork (i)
=
T_air) (exp (cst_3*t)) + T_air;
end
T final ppc = T_ppc (t);
disp (newline + "The temperature of the water at + num2str(t) + "seconds is:" + newline + T_final_ppc + " Kelvin" + newline + "or" + newline +num2str(T_final_ppc-273) + degrees Celsius" + newline newline);
ansl = input (prompt, 's');
switch ansl case 'Yes', 'yes'} Z = input (IntroText); continue case {'No', 'no'} break otherwise error ('Please type "Yes" or "No"')
end
end
The given code describes a temperature change model that predicts the final temperature of water based on various input parameters such as the temperatures of cork, pet, and air.
It appears that you are providing a code snippet written in MATLAB or a similar programming language. The code seems to involve a temperature calculation involving variables such as T_ppc, T_water, T_cork, T_pet, and T_air. The calculations involve exponential functions and iterative updates based on previous values.
The model uses a set of equations to calculate the temperature changes for each component.
The equations used in the model are as follows:
T_ppc(i) = (T_water – T_cork(i-1)) * (exp(cst_1 * t)) + T_cork(i-1)T_cork(i) = (T_ppc(i) – T_pet(i-1)) * (exp(cst_2 * t)) + T_pet(i-1)T_pet(i) = (T_cork(i) – T_air) * (exp(cst_3 * t)) + T_airThese equations are implemented within a for loop, where the input variables t, T_water, T_cork, T_pet, cst_1, cst_2, cst_3 are provided, and the output variable T_final_ppc represents the final temperature of the water after the temperature change.
Additionally, the code includes a prompt that allows the user to enter "Yes" or "No." Choosing "Yes" continues the execution of the code, while selecting "No" stops the code.
Overall, the code simulates and predicts the temperature changes of water based on the given inputs and equations, and offers the option to continue or terminate the execution based on user input.
Learn more about MATLAB: https://brainly.com/question/13715760
#SPJ11
What is a network?
A. The software only that connects electronic devices so they can
communicate with each other
B. The hardware only that connects electronic devices so they can
communicate with each other
C. The hardware and software that prevents electronic devices from
communicating with each other
D. The hardware and software connecting electronic devices so they
can communicate with each other
Answer: For a network to exist, both the hardware and software of a computer must be able to communicate with other computers, so the answer is D.
The hardware and software connecting electronic devices so they can communicate with each other.
What is Network?An interconnected system of nodes that can send, receive, and exchange data, voice, and video traffic is known as a computer network, sometimes known as a data network. Servers or modems are two examples of nodes in a network. Endpoint users frequently use computer networks to exchange resources and communicate.
They frequently appear everywhere, including in buildings like homes, offices, and government agencies. Computer networks can be used to share information and get around geographical restrictions.
Several protocols and algorithms are used by network devices to define the precise transmission and reception of data by endpoints. For instance.
Therefore, The hardware and software connecting electronic devices so they can communicate with each other.
To learn more about Network, refer to the link:
https://brainly.com/question/15002514
#SPJ7