Consider the following pseudocode:

Get the Sqrt of 9.
This pseudocode is an example of what?

A
An event that contains a parameter

B
A function that contains an argument

C
An object that contains a parameter

D
A class that contains an argument

Answers

Answer 1

Answer: sorry I couldn’t help but Pseudocode is an artificial and informal language that helps programmers develop algorithms. Pseudocode is a "text-based" detail (algorithmic) design tool. The rules of Pseudocode are reasonably straightforward. All statements showing "dependency" are to be indented. These include while, do, for, if, switch.

Explanation:


Related Questions

Excel

Please explain why we use charts and what charts help us to identify.
Please explain why it is important to select the correct data when creating a chart.

Answers

1) We use chart for Visual representation, Data analysis, Effective communication and Decision-making.

2. It is important to select the correct data when creating a chart Accuracy, Credibility, Clarity and Relevance.

Why is necessary to select the correct data in chart creation?

Accuracy: Selecting the right data ensures that the chart accurately represents the information you want to convey. Incorrect data can lead to misleading or incorrect conclusions.

Relevance: Choosing the appropriate data ensures that your chart focuses on the relevant variables and relationships, making it more useful for analysis and decision-making.

Clarity: Including unnecessary or irrelevant data can clutter the chart and make it difficult to interpret. Selecting the correct data helps to maintain clarity and simplicity in the chart's presentation.

Credibility: Using accurate and relevant data in your charts helps to establish credibility and trust with your audience, as it demonstrates a thorough understanding of the subject matter and attention to detail.

Find more exercises related to charts;

https://brainly.com/question/26501836

#SPJ1

consider the following code segment. int a = 10; int b = 5 * 2; system.out.print(a == b); what is printed as a result of executing the code segment?

Answers

Answer:

true

Explanation:

can the charger of my laptop get infected with viruses also when it was connected to it?​

Answers

Answer:

Technically… yes. Because if the charging port is the same as a USB/etc connector port, then it can travel over that.

Explanation:

Which of the following factors is least likely to result in delivery delays?

Answers

There are different factors that leads to delay in deliver. The most common factors that leads to delayed delivery are known as Misspelt, incomplete or outdated address.

What causes delay in delivery?

There are Mistakes that leads to delay in delivery process. Example is a misspelled address, incorrectly details in forms that has been filled, and also incomplete information.

The above are known to be key factors or reasons for inaccurate or late deliveries.

Learn more about delay in delivery from

https://brainly.com/question/12938965

Which of these are examples of an access control system? Select all that apply.

Answers

Some examples of access control systems are: Card-based access control systems, Biometric access control systems, Keypad access control systems, Proximity access control systems

Access control systems are used to limit or control access to certain areas or resources by determining who or what is authorized to enter or exit. In modern-day society, access control systems are widely used in both commercial and residential settings to enhance security and safety. Some examples of access control systems are discussed below.

1. Card-based access control systems- These are the most common types of access control systems. In card-based systems, authorized personnel are issued an access card that contains a unique code or number. When the person swipes the card through a reader, the system checks if the card is valid and then unlocks the door.

2. Biometric access control systems- In this system, the user's unique physical characteristics are used to identify them, such as fingerprints, voice, face, or retina scans. Biometric systems are highly accurate and provide enhanced security.

3. Keypad access control systems- Keypad systems use a secret code entered through a keypad. The code can be changed frequently to prevent unauthorized access.

4. Proximity access control systems- Proximity systems use a small chip or key fob that emits a radio signal to a reader mounted near the door. When the signal is received, the door unlocks. These are just a few examples of access control systems. There are other systems like security guards, smart cards, RFID-based systems, and more.

For more such questions on Proximity access, click on:

https://brainly.com/question/30733660

#SPJ8

What was the fisrt computer?

Answers

Answer:

AtanasoffBerry Computer.  It was built by physics Professor John Vincent Atanasoff and his graduate student, Clifford Berry, in 1942 at Iowa State College, now known as Iowa State University.

Explanation:

The First computer is called The Babbage Difference Engine.

I hope this is what you needed

what is a data source in OLE?​

Answers

Answer:

OLE DB Driver for SQL Server uses the term data source for the set of OLE DB interfaces used to establish a link to a data store, such as SQL Server. Creating an instance of the data source object of the provider is the first task of an OLE DB Driver for SQL Server consumer.

Explanation:

hope it helps you and give me a brainliest

What Musical Era popularized the Rondo form? *
Romantic Period
Baroque Period
Classical Period
Rock Period

Answers

Answer:

Classical

Explanation:

Für Elise written by Beethoven was in Rondo form

you are in the process of inducting new employees on the Global AssetView application. In your presentation you have to add the features of the application, which features from the list below will you include?

Answers

1. Data Visualization:  This feature allows users to view asset data in a variety of ways, such as charts, graphs, and tables. This helps users quickly get an overview of their asset portfolio and identify patterns in their asset data.

What is portfolio?

A portfolio is a collection of an individual's or organization's work, such as financial assets, investments, and other evidence of accomplishments. It is usually presented as a showcase of skills, accomplishments, and experiences to help an individual or organization stand out in the competitive job market.

2. Asset Tracking: This feature allows users to keep track of the location and status of assets, both in the physical and digital realms. It provides users with a comprehensive view of their asset portfolio and helps them identify any potential problems.

3. Automated Reporting: This feature allows users to generate reports in a variety of formats, such as PDFs and spreadsheets. Automated reporting helps users track asset performance and automate the process of reporting to stakeholders.

4. Risk Management: This feature helps users identify and manage potential risks associated with their assets. It provides users with a comprehensive overview of their asset portfolio and helps them develop strategies to reduce or mitigate risk.

5. Security: This feature provides users with a secure environment to store and manage their asset data. It helps users protect their asset data from unauthorized access and ensure their data is safe and secure.

To learn more about portfolio
https://brainly.com/question/25929259
#SPJ1

How would you suggest voice commerce technology address the language
barriers experienced in a South African context?

Answers

Voice commerce technology could include multilingual support and provide language alternatives for users to switch between multiple languages to solve language obstacles in a South African environment.

What function does voice control serve in e-commerce?

Voice commerce is a technique that lessens end users' reliance on hardware by enabling them to search for and buy things online using voice commands.

How may voice commerce be implemented?

Repeat ordering is the most popular and effective method of voice commerce implementation. Customers don't want visual confirmation of their purchase in this instance because they already know what they want to buy - it could be something they purchase every month or even every week.

To know more about Voice commerce visit:

https://brainly.com/question/31263400

#SPJ9

Which is an example of an operating system

a
Adobe Photoshop

b
Internet Explorer

c
Windows

d
Microsoft Word

Answers

Answer:

windows

Explanation:

Examples of Operating Systems

Some examples include versions of Microsoft Windows (like Windows 10, Windows 8, Windows 7, Windows Vista, and Windows XP), Apple's macOS (formerly OS X), Chrome OS, BlackBerry Tablet OS, and flavors of Linux, an open-source operating system.

1. Using the open function in python, read the file info.txt. You should use try/except for error handling. If the file is not found, show a message that says "File not found"

2. Read the data from the file using readlines method. Make sure to close the file after reading it

3. Take the data and place it into a list. The data in the list will look like the list below

['ankylosaurus\n', 'carnotaurus\n', 'spinosaurus\n', 'mosasaurus\n', ]

5. Create a function called modify_animal_names(list) and uppercase the first letter of each word.

6. Create a function called find_replace_name(list, name) that finds the word "Mosasaurus" and replace it with your name. DO NOT use the replace function. Do this manually by looping (for loop).

The words in the info.text:

ankylosaurus
carnotaurus
spinosaurus
mosasaurus

Answers

try:

   f = open('info.txt', 'r')

except:

   print('File not found')

dino_list = []

for line in f.readlines():

   dino_list.append(line)

f.close()

def modify_animal_names(list):

   for i in range(len(list)):

       list[i] = list[i].capitalize().replace('\n', '')

modify_animal_names(dino_list)

def find_replace_name(list, name):

   for i in range(len(list)):

       if list[i] == name:

           list[i] = 'NAME'

find_replace_name(dino_list, 'Ankylosaurus')

This will print out:

['Ankylosaurus', 'Carnotaurus', 'Spinosaurus', 'NAME']

(If you have any more questions, feel free to message me back)

reading is important blank areas of life A in very few B in many C only in academic D only in career​

Answers

Answer:

The answer is B. I'm pretty sure It is

Explanation:

I just took the quiz and it was right  

It is impossible to overemphasize the fact that, from the perspective of a computer, a network is a) simply another I/O device. b) just another hardware component. c) the only device without a controller. d) handled differently than all other I/O devices.

Answers

Answer:

A) Simply another I/O device

Explanation:

I just know :)

(b) Explain how implicit intents can lead to more efficient use of the mobile device and a better user experience.

Answers

The way that implicit intents can lead to more efficient use of the mobile device and a better user experience is that:

Implicit intents allow an app to request an action from another app without explicitly specifying the app that should perform the action. This can lead to more efficient use of the mobile device because the app that receives the implicit intent can choose the most appropriate app to perform the requested action, rather than the requesting app needing to know about all the available apps that can perform the action.

What is the  implicit intents about?

An example of this intent is that, if an app wants to share a piece of content with another app, it can use an implicit intent to request the action of "sharing."

The system will then determine which app is the most appropriate to handle the request, such as a messaging app or a social media app, and launch that app to handle the request.

Therefore,, using implicit intents can lead to a better user experience because it allows apps to work together and share functionality, rather than each app needing to provide all its own functionality, which can result in a fragmented and less cohesive user experience.

Learn more about mobile device from

https://brainly.com/question/917245

#SPJ1

TWO (2) negative effects of how technology use in education affects students' learning. Your response should include a minimum of FIVE (5) credible sources.​

Answers

Technological advancements have taken education to new heights, yet they have come with their fair share of drawbacks.

What is the explanation for the above response?

Two such demerits of utilising technology in classrooms are distraction and lack of retention capacity among students.

Given the myriad choices provided by tech in terms of entertainment such as social networking sites or online games, students tend to lose focus and face negative consequences such as poor academic performance.

Technology dependency poses a vulnerability that can hinder student learning outcomes.

Students whose reliance rests solely on technology may face challenges related to critical thinking and problem-solving abilities - two necessary skills for achieving academic success.

Learn more about technology  at:

https://brainly.com/question/28288301

#SPJ1

How to edit the copied formula and return to value in the 3rd column

Answers

To edit the copied formula and return to value in the 3rd column, the process is given below:

What is formula?

Formulas are mathematical expressions used to calculate values or make predictions. They are typically composed of mathematical symbols, such as numbers, variables, and operators, and can be used to solve equations or model complex systems. Formulas can be used for a variety of applications, such as predicting the outcomes of experiments, determining the cost of products, or analyzing the relationships between variables. Many formulas are based on the laws of physics, and can be used to describe the behavior of physical phenomena, such as motion or electrical current. Formulas can also be used to analyze data and draw conclusions about trends and relationships.

1. Select the cell containing the formula.

2. Right-click on the cell and select "Edit Formula" from the menu that appears.

3. Edit the formula as desired.

4. Press Enter to calculate the new value and return it to the 3rd column.

To learn more about formula

https://brainly.com/question/29605414

#SPJ1

Whitney absolutely loves animals, so she is considering a career as a National Park ranger. She clearly has the passion. Provide an example of another factor from above that she should consider and why it might be important before she makes a final decision.

Answers

One important factor that Whitney should consider before making a final decision on a career as a National Park ranger is the physical demands and challenges of the job.

What is the career about?

Working as a National Park ranger often involves spending extended periods of time in remote and rugged wilderness areas, where rangers may need to hike long distances, navigate challenging terrains, and endure harsh weather conditions. Rangers may also be required to perform physically demanding tasks such as search and rescue operations, firefighting, or wildlife management.

It's crucial for Whitney to assess her physical fitness level, endurance, and ability to handle strenuous activities before committing to a career as a National Park ranger. She should also consider any potential health conditions or limitations that may impact her ability to perform the physical requirements of the job.

Read more about career  here:

https://brainly.com/question/6947486

#SPJ1

Given a list of twenty number count the numbers among the list

Answers

Answer:

Thank you for the points<33

Which term means "the act or process of acquiring knowledge or skills?"

learning strategy
metacognitive learning
learning
cognitive theory of learning

Answers

Answer:

Learning is the term that means, "the act or process of acquiring knowledge or skills"

Answer:

the term you are looking for is learning

Explanation:

learning something means to acquire knowledge

create a program that calculates the areas of a circle, square, and triangle using user-defined functions in c language.​

Answers

A program is a set of instructions for a computer to follow. It can be written in a variety of languages, such as Java, Python, or C++. Programs are used to create software applications, websites, games, and more.

#include<stdio.h>

#include<math.h>

main(){

 int choice;

 printf("Enter

1 to find area of Triangle

2 for finding area of Square

3 for finding area of Circle

4 for finding area of Rectangle

 scanf("%d",&choice);

 switch(choice) {

    case 1: {

       int a,b,c;

       float s,area;

       printf("Enter sides of triangle

");

       scanf("%d%d %d",&a,&b,&c);

       s=(float)(a+b+c)/2;

       area=(float)(sqrt(s*(s-a)*(s-b)*(s-c)));

       printf("Area of Triangle is %f

",area);

       break;

     case 2: {

       float side,area;

       printf("Enter Sides of Square

       scanf("%f",&side);

       area=(float)side*side;

       printf("Area of Square is %f

",area);

       break;

   

 case 3: {

       float radius,area;

       printf("Enter Radius of Circle

");

       scanf("%f",&radius);

       area=(float)3.14159*radius*radius;

       printf("Area of Circle %f

",area);

       break;

    }

    case 4: {

       float len,breadth,area;

       printf("Enter Length and Breadth of Rectangle

");

       scanf("%f %f",&len,&breadth);

area=(float)len*breadth;

       printf("Area of Rectangle is %f

",area);

       break;

    }

    case 5: {

       float base,height,area;

       printf("Enter base and height of Parallelogram

");

       scanf("%f %f",&base,&height);

       area=(float)base*height;

       printf("Enter area of Parallelogram is %f

",area);

       break;

    }

    default: {

       printf("Invalid Choice

");

       break;

    }

 }

}

What do you mean by programming ?

The application of logic to enable certain computing activities and capabilities is known as programming. It can be found in one or more languages, each of which has a different programming paradigm, application, and domain. Applications are built using the syntax and semantics of programming languages. Programming thus involves familiarity with programming languages, application domains, and algorithms. Computers are operated by software and computer programs. Modern computers are little more than complex heat-generating devices without software. Your computer's operating system, browser, email, games, media player, and pretty much everything else are all powered by software.

To know more about ,programming visit

brainly.com/question/16936315

#SPJ1  

var nums = [1,1, 2, 3, 5, 8, 13, 21];
var copyNums = [1,1, 2, 3, 5, 8, 13, 21];
for(var i=0; i < copyNums.length; i++){
if(copyNums[i] == 1){
insertItem(copyNums,i,"hello");
}
}
This code will create an infinite loop. Why does it create an infinite loop?

Answers

Answer:

Explanation:

This code creates an infinite loop because it is detecting that the first value of copyNums is 1, therefore it runs the insertItem code. This code then adds the value "hello" to the array in position i which would be 0. Then moves to the next value of the array, but since the element "hello" pushed the value 1 to the next index then the code just repeats itself with the same value of 1. This continues to happen because every time the value "hello" is added it simply pushes the 1 to the next index and repeats the same code.

Answer:

\(var nums = [1,1, 2, 3, 5, 8, 13, 21];

var copyNums = [1,1, 2, 3, 5, 8, 13, 21];

for(var i=0; i < copyNums.length; i++){

if(copyNums[i] == 1){

insertItem(copyNums,i,"hello");

}

}\)

Who Uses Serverless Computing?

Who Uses Serverless Computing?

Answers

I could only put these nothing else.

Answer: Netflix, Coca-Cola, and Nordstrom.

Answer:

Companies Use Severless Computing

If images around the edges of a monitor do not look right, the computer might have a(n)

access problem.
hardware problem.
Internet problem.
software problem.

I will give brainiest to best answer

Answers

Answer:

it would be a software problem.

Explanation:

this is because when your computer crashes, the software all "explodes" and resets.

Hardware Problem

If a manufacturer damaged something, it can cause issues that the software can not interpret. For example the screen is damaged. The pixels could be damaged on the screen and most likely not the fault of a software.

Guess The Song:
What Popping Brand New Whip Just Hopped In, I Got options

Answers

WHATS POPPIN

Song by Jack Harlow

What characteristics are common among operating systems? List types of operating systems, and examples of each. How does the device affect the functionality of an operating system?

Answers

The operating system (OS) controls all of the computer's software and hardware. It manages files, memory, and processes, handles input and output, and controls peripheral devices like disk drives and printers.

What are the characteristics of OS?The fundamental software applications running on that hardware enable unauthorized users to interact with the equipment because instructions can be sent and results can be obtained.Developers provide technology that may be compatible, mismatched, or completely incompatible with several other OS categories across multiple versions of the same similar OS.The operating systems are frequently 32-Bit and 64-Bit in two different versions.Types of Operating System:

         Distributed OS .

         Batch processing OS.

         Time sharing OS.

To learn more about operating system refer to :

https://brainly.com/question/22811693

#SPJ1

discuss MIS as a technology based solution must address all the requirements across any
structure of the organization. This means particularly there are information to be
shared along the organization

Answers

MIS stands for Management Information System, which is a technology-based solution that assists organizations in making strategic decisions. It aids in the efficient organization of information, making it easier to locate, track, and manage. MIS is an essential tool that assists in the streamlining of an organization's operations, resulting in increased productivity and reduced costs.

It is critical for an MIS system to address the needs of any organization's structure. This implies that the information gathered through the MIS should be easily accessible to all levels of the organization. It must be capable of handling a wide range of activities and functions, including financial and accounting data, human resources, production, and inventory management.MIS systems must be scalable to meet the needs of a company as it expands.

The information stored in an MIS should be able to be shared across the organization, from the highest to the lowest level. This feature allows for smooth communication and collaboration among departments and employees, which leads to better decision-making and increased productivity.

Furthermore, MIS systems must provide a comprehensive overview of a company's operations. This implies that it must be capable of tracking and recording all relevant information. It should provide a real-time picture of the company's performance by gathering and analyzing data from a variety of sources. As a result, businesses can take quick action to resolve problems and capitalize on opportunities.

For more such questions on Management Information System, click on:

https://brainly.com/question/14688347

#SPJ8

Write the function which takes an arbitrary real number p , and returns true if the numeber is equals to some power of 2, i.e. p=2n for some n . Your task is to implement a recursive function power_of_2 withount using loops and library functions.

Answers

def power_of_2(p):

   if p == 2:

       return True

   elif p < 2:

       return False

   return power_of_2(p/2)

print(power_of_2(32))

The function keeps dividing the number by 2 until it is equal to 2 or the number ends up being less than 2. If at some point the number is equal to 2, it is a power of 2 otherwise it's not a power of 2.

What happens when text is added to grouped objects that is larger than an object ?

Answers

Answer:

You have to select the picture and pick the text at first.

Then press context menu key on a keyboard or right mouse button and choose group/ungroup point.

Choose group.

And finally you can select and resize the object and text simultaneously.

Why computer manufacturers constantly releasing faster computers ?

Answers

Answer:

do not copy word for word!!!!

Explanation:

The Computer manufacturers constantly releasing faster computers as in every month or in a year new technologies are discovered. ... By making the faster computers manufacturers want to earn much profit and they want to beat the competition. If the computer will be slow, it will take much time to open a file or to save a file.

Other Questions
a cultures language vocabulary emphasizes what is considered important in that culture.True or False if .163 moles of NaCI are dissolved in a 250 mL solution, what is the concentration of the NaCI solution? Identify this sequence: 12,19,26,33,40,47. The next term is___?? What's a recycling plant and how are electromagnets used there? a fence is to be built to enclose a rectangular area of 310 square feet. the fence along three sides is to be made of material that costs 5 dollars per foot, and the material for the fourth side costs 15 dollars per foot. find the dimensions of the enclosure that is most economical to construct. please help !!!!!! and yes both of them !!!! Which ordered pairs are solutions to the inequality 2y-x-6 ? a. (0,-3) b. (5,10) c. (2, -2) d. (-5, 2) TRUE OR FALSE As the human population increases, demand for natural resources will also increase. Briefly tell us about yourself and how would receiving a scholarship impact your life? Include your short term and long term goals. must be between 100-600 words. 600 max Read the following excerpt from Levitt and Dubners Freakonomics. A key fact of white-collar crime is that we hear about only the very slim fraction of people who are caught cheating. Most embezzlers lead quiet and theoretically happy lives; employees who steal company property are rarely detected. With street crime, meanwhile, that is not the case. A mugging or a burglary or a murder is usually tallied whether or not the criminal is caught. A street crime has a victim, who typically reports the crime to the police, who generate data, which in turn generate thousands of academic papers by criminologists, sociologists, and economists. But white-collar crime presents no obvious victim. In this excerpt, the authors present a comparison between various criminals. an argument in favor of reporting crime. a contrast between different types of crime. an argument against embezzlement. the sodium-potassium pump uses atp hydrolysis to pump ions against their concentration gradient. if the plasma membrane was disrupted and the ion concentration was equilibrated on either side of the membrane, how would this likely change the properties of the pump? group of answer choices this is some geometry Write 21/99 as a decimal. Do not forget to reduce to the lowest term. After graduating from college with a bachelor of businessadministration, you begin an ambitious plan to retire in 23.00years. To build up your retirement fund, you will make quarterlypayments into 10. CALCULATE: Find the amount of power used in each of the following examples. Show your calculations. a. You use a force of 10 N to move a box 100 m in 10 seconds. b. An athlete lifting weights does 900 J of work in 1 second. C. A truck does 30,000 J of work in 15 seconds. d. A fumiture mover uses a force of 150 N to push a large trunk 5 m across the floor in 5 seconds PLEASE HELP MAP IS ATTACHED The National Oceanic and Atmospheric Administration (NOAA) measures tsunami risk through a program called DART. This map shows the locations of DART tsunami monitoring devices. What do you think NOAA means when it says that DART monitors are placed in strategic locations? Given the data on the map, do you agree with this claim? Crystallized intelligence involves _____. Question 4 options:a) coming up with new words quicklyb) changing an opinionc) our amount of knowledged) reasoning on unfamiliar tasks This alkene can be synthesized from two different alkyl bromides by an elimination reaction. One of the alkyl bromides gives only this alkene product, but other one gives a mixture of alkene products. Provide the structures of the two possible starting alkyl bromides. Find the surface area of the composite figure 2 cm 2 cm 6 cm 6 cm 4cm 4 cm 5 cm 10 cm 9010 4please help me guys