Which of the following is NOT a reason to include comments in programs?

a. Comments help the computer decide whether certain components of a program
are important.

b .Comments help programmers debug issues in their own code

c. Comments help document how code was written for other programmers to use

d. Comments enable programmers to track their work throughout the development
process

Answers

Answer 1

Answer:

A Would be correct!

Explanation:

The reason for this is because in a code when you use the comment out the compiler will skip over it and will not do anything and will skip it. So the comment can help the computer do anything!

HOPE THIS HELPED MAKE ME THE BRAINLIST!

Answer 2

Using programming concepts, the option that is NOT a reason to include comments in a code is:

a. Comments help the computer decide whether certain components of a program  are important.

-------------------------

Usually, codes are very long, and each person is responsible for a part of the problem. The parts have to be intervened with each other, and thus, sometimes a programmer will have to look at another part of the code, not coded by him. Thus, for the programmer and other people working in the project to understand, comments are important.Additionally, the comments are used to help the programmers debug their own code, as they can go part by part and see what is done in each part, also helping them work throughout the development process.In a program, there may be some components that end up not being necessary, but this is not decided by comments, and thus, option A is not a reason to include comments in programs.

A similar problem is given at https://brainly.com/question/13527834


Related Questions

When you build a computer from parts, you usually start by deciding which processor and motherboard you will use.
True or false

Answers

Answer:

True, your motherboard and processor are the main parts of a computer. Everything else only supports them

the most popular input device for computer game is called?

Answers

Answer:

joystick

Explanation:

A joystick is an input device that monitors and transmits motion input to the Processor. It monitors any minute changes in direction using a central pivot, then transmits this input to be analyzed and generally operates another device. A joystick is a type of input device which is often utilized to operate gaming programs or graphics programs. A joystick is often used to control a device or a character in a computer software. It is used to operate videogames and may be used to play games designed for gaming platforms or computer games. A joystick is an input device with a pivoting center handle that communicates the angle and direction to the device it is controlling. It helps to engage with your games and has several real-world applications.

True
Question # 21
Dropdown

You shouldn’t use more than ____ fonts on a slide.

Answers

Answer:

You should use no more than two fonts on a slide.

Answer:

Well the correct answer is 3 or less, but for this question its not an answer so the correct answer for this is 2

Explanation:

The primary purpose of a use case diagram is
Select one:
a. to uncover additional details such as attributes and methods of a class
b. to show the users interaction with the system
c. model the interaction between the system and its environment

Answers

The primary purpose of a use case diagram is to model the interaction between the system and its environment. Use case diagrams depict the functionality of a system from the user's perspective, focusing on the system's behavior as it responds to requests from the users or other external actors. They show the different use cases or scenarios that users can perform with the system and the actors that participate in these interactions. Use case diagrams are often used in requirements analysis and software design to help clarify and communicate the system's purpose and behavior. Option (c) correctly explains the primary purpose of a use case diagram.

Answer:

b. to show the users interaction with the system

Explanation:

A use case diagram is a type of UML diagram that shows the interactions between a system and the actors that use it. It is used to model the behavior of a system from the perspective of the users. A use case diagram does not show the internal details of the system, but only the interactions between the system and the actors.

The other options are incorrect.

Option a is incorrect because a use case diagram does not show the attributes and methods of a class. Option c is incorrect because a use case diagram does not model the interaction between the system and its environment.

hat characteristic of Python subprograms sets them apart from those of other languages?
One characteristic of Python functions that sets them apart from the functions of other common programming languages is that function def statements are executable. When a def statement is executed, it assigns the given name to the given function body. Until a function's def has been executed, the function cannot be called. Consider the following skeletal example:
if . . .
def fun(. . .):
. . .
else
def fun(. . .):
. . .

Answers

The statement for the characteristics of Python subprograms sets them apart from those of other languages is true.

What is def statement?

Python subprograms can be written with def statement to define a function. Def statement is a user-defined function and this function is provided by the user.

Def statement is a function of code that contains the logical unit of the sequence of statements. Difference from the other language, def statement function will execute before the function can be available to be called.

Thus the given statement about subprograms sets of python is true.

Your question is incomplete, but most probably your full question was

True/false. One characteristic of Python functions that sets them apart from the functions of other common programming languages is that function def statements are executable. When a def statement is executed, it assigns the given name to the given function body. Until a function def has been executed, the function cannot be called. Consider the following skeletal example:

if . . .

def fun(. . .):

. . .

else

def fun(. . .):

. . .

Learn more about def statement here:

brainly.com/question/13259727

#SPJ4

What feature allows a person to key on the new lines without tapping the return or enter key

Answers

The feature that allows a person to key on new lines without tapping the return or enter key is called word wrap

How to determine the feature

When the current line is full with text, word wrap automatically shifts the pointer to a new line, removing the need to manually press the return or enter key.

In apps like word processors, text editors, and messaging services, it makes sure that text flows naturally within the available space.

This function allows for continued typing without the interruption of line breaks, which is very helpful when writing large paragraphs or dealing with a little amount of screen space.

Learn more about word wrap at: https://brainly.com/question/26721412

#SPJ1

What Should be the first step when troubleshooting

Answers

The first step in troubleshooting is to identify and define the problem. This involves gathering information about the issue, understanding its symptoms, and determining its scope and impact.

By clearly defining the problem, you can focus your troubleshooting efforts and develop an effective plan to resolve it.

To begin, gather as much information as possible about the problem. This may involve talking to the person experiencing the issue, observing the behavior firsthand, or reviewing any error messages or logs associated with the problem. Ask questions to clarify the symptoms, when they started, and any recent changes or events that may be related.Next, analyze the gathered information to gain a better understanding of the problem. Look for patterns, commonalities, or any specific conditions that trigger the issue. This analysis will help you narrow down the potential causes and determine the appropriate troubleshooting steps to take.

By accurately identifying and defining the problem, you lay a solid foundation for the troubleshooting process, enabling you to effectively address the root cause and find a resolution.

For more questions on troubleshooting

https://brainly.com/question/29736842

#SPJ8

what is computers machain?

Answers

Answer:

the electronic device which take data process it and give meaningful results is called computer machine

11. is a feature in Windows that can help you stay in control of your computer by informing you when a program makes a change that requires administrator-level permission.​

Answers

Answer:

User Account Control (UAC) is a feature of Windows that can help you stay in control of your computer by informing you when a program makes a change that requires administrator-level permission.

How could these same commands be used on a computer or network operating system?

Answers

Answer:

To manipulate data into information

What would game programmers do when decomposing a task in a modular program?

Answers

When game programmers decompose a task in a modular program, they would typically break down the task into smaller, more manageable modules or functions. Here are some steps they might take during the decomposition process:

1. Identify the overall task or feature: Game programmers start by identifying the larger task or feature they want to implement, such as player movement, enemy AI, or collision detection.

2. Analyze the task: They analyze the task to understand its requirements, inputs, and desired outputs. This helps them determine the necessary functionality and behavior.

3. Identify subtasks or components: They identify the subtasks or components that make up the larger task. For example, in the case of player movement, this could involve input handling, character animation, physics simulation, and rendering.

4. Break down the subtasks further: Each subtask can be further decomposed into smaller, more specific functions or modules. For example, input handling might involve separate functions for keyboard input, mouse input, or touch input.

5. Define interfaces: They define clear interfaces between the modules, specifying how they interact and communicate with each other. This helps ensure modularity and maintainability of the code.

6. Implement and test modules: Game programmers then proceed to implement each module or function, focusing on their specific responsibilities. They can test and iterate on these smaller units of functionality independently.

7. Integrate and test the modules: Finally, they integrate the modules together, ensuring they work harmoniously and produce the desired outcome. Thorough testing is conducted to verify that the overall task or feature functions correctly.

By decomposing tasks in this manner, game programmers can effectively manage the complexity of game development, promote code reusability, enhance collaboration, and facilitate the maintenance and future expansion of the game.

When decomposing a task in a modular program, game programmers follow a structured approach to break down the task into smaller, more manageable components.

This process is crucial for code organization, maintainability, and reusability. Here's an outline of what game programmers typically do:

1. Identify the task: The programmer begins by understanding the task at hand, whether it's implementing a specific game feature, optimizing performance, or fixing a bug.

2. Break it down: The task is broken down into smaller subtasks or functions that can be handled independently. Each subtask focuses on a specific aspect of the overall goal.

3. Determine dependencies: The programmer analyzes the dependencies between different subtasks and identifies any order or logical flow required.

4. Design modules: Modules are created for each subtask, encapsulating related code and functionality. These modules should have well-defined interfaces and be independent of each other to ensure reusability.

5. Implement and test: The programmer then implements the modules by writing the necessary code and tests their functionality to ensure they work correctly.

6. Integrate modules: Once individual modules are tested and verified, they are integrated into the larger game program, ensuring that they work together seamlessly.

By decomposing tasks into modules, game programmers promote code organization, readability, and ease of maintenance. It also enables parallel development by allowing different team members to work on separate modules simultaneously, fostering efficient collaboration.

For more such questions on programmers,click on

https://brainly.com/question/30130277

#SPJ8

how computer user interact with an application programs​

Answers

Answer:

From the help of graphic user interface

Explanation:

A graphical user interface, or GUI, is used in almost all software programmes. This indicates that the software contains graphical functions that the user can manipulate using a any input device like mouse or keyboard. A software configuration program's graphical user interface (GUI) contains a menu bar, toolbar, tabs, controls, as well as other functions.

Which 802.11 standard works best in this situation?

Answers

You are helping a client create a wireless network. The network must be able to handle at least 54Mbps of data rate for your client. The ideal standards to use in this case are 802.11n and 802.11a.

Which 802.11 protocol functions the best in this circumstance?

For this client, 802.11n is the best option. The client's wireless phone system will experience interference from 802.11b and 802.11g because they both operate in the 2.4 to 2.4835 GHz band.

What purposes serve 802.11 standards?

The collection of media access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer communication are specified in IEEE 802.11, a standard that is a component of the IEEE 802 series of LAN technical standards.

To know more about wireless network visit :-

https://brainly.com/question/28141205

#SPJ1

pls i need the answer rightnow pls pls pls im begging you pls​

pls i need the answer rightnow pls pls pls im begging you pls

Answers

scan
conduct
subject line
malwares
black
scams
firewalls
blocker
links
confidential

Answer:

1.  scan

2. conduct

3.  subject lines

4. firewalls

5. black

6. malware

7. scams

8. blocker

9. links

10. confidential

user intent refers to what the user was trying to accomplish by issuing the query

Answers

Answer:

: User intent is a major factor in search engine optimisation and conversation optimisation. Most of them talk about customer intent ,however is focused on SEO not CRO

Explanation:

Select the correct answer from each drop-down menu.
Which two components help input data in a computer and select options from the screen, respectively?
✓inputs data into computers in the form of text, numbers, and commands. However, a
commands from the screen.
A
Reset
Next
✓selects options and

Answers

Which two components help input data in a computer and select options from the screen, respectively?

✓ Keyboard inputs data into computers in the form of text, numbers, and commands. However, a

✓ Mouse selects options and commands from the screen.

A

Reset

Next

To know more about input data refer here

https://brainly.com/question/30256586#

#SPJ11

In Scheme, the form (symbol-length? 'James) will return: Group of answer choices 0 5 6 error message

Answers

Answer:

an error message

Explanation:

The return value is the value which is sent back by the function to a place in the code from where the \(\text{function}\) was called from. Its main work is to return a value form the function.

In the context, the form of  "(symbol-length? 'James)" in Scheme will return the  value --- ' an error message'.

Write a program using for loop (use days of the week as a sequence) to ask the user to enter the number of miles ran for each day of the week.

How many miles for Mon?

How many miles for Tues?

.................................

Count and display the number of days the user

1) ran less than 5 miles.

2) Ran between 5 and 10 miles ==> inclusive

3) Ran over 10 miles

Answers

Answer:

Explanation: ll[

2. How does the internet give us the ability to communicate?

Answers

Answer:

It makes communication a lot easier especially during a time like this. It is cost effective and it increases productivity.

Explanation:

FILL IN THE BLANK. a __ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives. select the two correct answers, then click done.

Answers

For redundancy, RAID 10 writes the same data on two or more disks via logical mirroring. There is a mirrored image of the data kept on another disk in case one drive dies.

Block-level striping is another technique the array employs to distribute data across various devices. Disk mirroring, a RAID 1 technique, writes data simultaneously to two identical hard disks. Interoperability between systems and organizations is reflected in technology. The emphasis is on computers and communications, but it also considers system technical capabilities and the resulting mission compatibility with coalition partner systems and data. For redundancy, RAID 10 writes the same data on two or more disks via logical mirroring. There is a mirrored image of the data kept on another disk in case one drive dies.

Learn more about array here-

https://brainly.com/question/13261246

#SPJ4

Please don't answer if you don't know Type the correct answer in the box
. Spell all words correctly. How does SQA differ from SQC? SQA involves activities to evaluate software processes, and SQC involves activities that ensure quality software.

Answers

Software Quality Assurance (SQA) and Software Quality Control (SQC) are two distinct aspects of quality management in software development, each with its own focus and activities.

How different are they?

SQA encompasses efforts directed toward assessing and enhancing the procedures of software development at every stage. The main emphasis is on guaranteeing that appropriate techniques, norms, and protocols are adhered to in order to create software of superior quality. SQA encompasses various tasks, including scrutinizing requirements, conducting process audits, and administering quality control procedures.

Conversely, SQC pertains to actions that prioritize assuring the quality of the actual software product. This involves employing methods such as testing, inspections, and reviews in order to detect flaws and guarantee that the software satisfies the stated demands and standards. The goal of SQC is to identify and rectify any shortcomings or irregularities within the software product.

To put it succinctly, SQA focuses on assessing and enhancing the manner in which software is developed, while SQC is primarily focused on verifying the excellence of the resulting software product. SQC and SQA both play a vital role in attaining an optimum level of software quality.

Read more about software here:

https://brainly.com/question/28224061

#SPJ1

What is unit testing? a. Checking that the integer values of a function use proper units (yards, meters, etc.) b. Ensuring a program is not one large function but rather consists of numerous smaller functions (units) c. Dividing larger function parameters into several smaller parameters known as units d. Individually testing a small part (or unit) of a program, typically a function, using a separate program called a test harness

Answers

Answer:

d. Individually testing a small part (or unit) of a program, typically a function, using a separate program called a test harness.

Explanation:

A software development life cycle (SDLC) can be defined as a strategic process or methodology that defines the key steps or stages for creating and implementing high quality software applications. There are seven (7) main stages in the creation of a software and these are;

1. Planning.

2. Analysis.

3. Design.

4. Development (coding).

5. Testing.

6. Implementation and execution.

7. Maintenance.

Unit testing can be defined as a software development procedure that involves the process of individually testing a small part (or unit) of a program, typically a function, using a separate program called a test harness.

This ultimately implies that, if the observed behavior of the small part of a software program is consistent with the expectations, then the unit test is considered a pass. Otherwise, the unit test failed.

solution Please write a sample query to look at data by week for the created_at date, where you're summing revenue by country and state.

Answers

SELECT QUERY is used for the MySQL database fetching. It chooses is planned to return 1 or more rows from the database tables which meet a given criterion. It could be used for PHP, Ruby, and you can execute them via the command prompt inside the scripting language, and further queries can be defined as follows:

Following are the complete Query to this question:

SELECT  DATEPART(week, created_at) AS Week,  Sum(revenue) AS Revenue  FROM country  WHERE '20180101' <= created_at  AND created_at < '20190101'  GROUP BY DATEPART(week, created_at)  ORDER BY DATEPART(week, created_at);

Learn more:

brainly.com/question/22044117

brainly.com/question/11771506

A security professional is responsible for ensuring that company servers are configured to securely store, maintain, and retain SPII. These responsibilities belong to what security domain?

Security and risk management

Security architecture and engineering

Communication and network security

Asset security

Answers

The responsibilities of a  security professional described above belong to the security domain of option D: "Asset security."

What is the servers?

Asset safety focuses on identifying, classifying, and defending an organization's valuable assets, containing sensitive personally capable of being traced information (SPII) stored on guest servers.

This domain encompasses the secure management, storage, memory, and disposal of sensitive dossier, ensuring that appropriate controls are in place to safeguard the secrecy, integrity, and availability of property.

Learn more about servers  from

https://brainly.com/question/29490350

#SPJ1

Who designed the Apple I computer in 1976

Answers

Answer:

Steve Wozniak

Explanation:

Answer:

Steve Wozniak i believe

In reinforcement learning, an episode:

Answers

In reinforcement learning, an episode refers to a sequence of interactions between an agent and its environment. It represents a complete task or a single run of the learning process.

The reinforcement learning

During an episode, the agent takes actions in the environment based on its current state. The environment then transitions to a new state, and the agent receives a reward signal that indicates how well it performed in that state. The agent's objective is to learn a policy or a strategy that maximizes the cumulative reward it receives over multiple episodes.

The concept of episodes is particularly relevant in episodic tasks, where each episode has a clear start and end point.

Read more on reinforcement learning here:https://brainly.com/question/21328677

#SPJ1

When should programmers use variables to store numeric data?

Answers

Programmers should use variables to store numeric data when they need to reference and use the same data multiple times throughout a program.

What is program?

A program is a set of instructions that can be executed by a computer to perform a specified task. It can be written in any of a number of programming languages, such as C, Java, Python or Visual Basic. Programs can range from simple scripts that automate a task, to complex applications with many features. Programs are designed to solve a particular problem or provide a specific benefit to the user.

Variables are a convenient way to store and access data that may be needed in multiple different places.

To learn more about program
https://brainly.com/question/28028491
#SPJ1

management has reason to believe that someone internal to the organization is committing fraud. to confirm their suspicion, and to collect evidence, they need to set up a system to capture the events taking place. evaluate which option will best fit the organization's needs. group of answer choices

Answers

The option that will best fit for organization's needs is honeypot.

What is honeypot?

Honeypot is a system for computer security mechanism to detect, deflect, or counteract the attackers or unauthorized use of internal system including internal fraud, malpractice, and snooping. Honeypot will be placed in current network.

Honeynet is a decoy network which is can be actual network or simulated to trap attackers or unauthorized use of internal system.

Exploitation framework is to running intrusive scanning for uses the vulnerabilities of identified by a scanner. Metasploit is one of exploit framework.

You question is incomplete, but most probably your full question was

Management has reason to believe that someone internal to the organization is committing fraud. In order to confirm their suspicion, and to collect evidence, they need to set up a system to capture the events taking place. evaluate which option will best fit the organization's needs.

Option answer is

HoneynetHoneypotExploitation frameworkMetasploit

Learn more about exploitation framework here:

brainly.com/question/22371817

#SPJ4

Write a program that receives a series of numbers from the user and allows the user to press the enter key to indicate that he or she is finished providing inputs. After the user presses the enter key, the program should print the sum of the numbers and their average.

Answers

The program that receives a series of numbers from the user is:

theSum = 0.0

# stores the number of terms entered by the user

n = 0

# loop until user presses the enter key

# infinite loop

while True:

# get user input from user

data = input("Enter a number or press Enter to quit: ")

# if user presses enter

if data == '':

# break out of the loop

break

# convert data into float using float()

number = float(data)

# add the entered number to theSum

theSum += number

# increase the number of terms

n += 1

print()

print("The sum is", theSum)

# if numbers of terms entered are greater than 0

if n > 0:

# calculate average

average = theSum / n

print('The average is', average)

# if no terms are entered

else:

print('Average : undefined (as the number of terms entered are 0)')

What is a program?

A computer program is a set of instructions written in a programming language that a computer is supposed to obey.

Computer programs are one of the intangible components of the software, which also includes documentation and other components. The version of a computer program that humans can read is called the source code.

Learn more about program on;

https://brainly.com/question/23275071

#SPJ1

Write a program that receives a series of numbers from the user and allows the user to press the enter

Create a program that allows the user to pick and enter a low and a high number. Your program should generate 10 random numbers between the low and high numbers picked by the user. Store these 10 random numbers in a 10 element array and output to the screen.
In java code please.

Answers

Answer:

import java.util.Scanner;

import java.util.Arrays;

import java.util.Random;

public class Main {

 public static void main(String[] args) {

   Scanner scan = new Scanner(System.in);

   System.out.print("Enter low: ");

   int low = scan.nextInt();

   System.out.print("Enter high: ");

   int high  = scan.nextInt();

   scan.close();

   int rndnumbers[] = new int[10];

   Random r = new Random();

   for(int i=0; i<rndnumbers.length; i++) {

     rndnumbers[i] = r.nextInt(high-low+1) + low;

   }

   for(int i=0; i<rndnumbers.length; i++) {

     System.out.printf("%d: %d\n", i, rndnumbers[i]);

   }

 }

}

Other Questions
LAST ATTEMPT MARKING AS BRAINLIEST!! ( write a rule to describe each transformation) Which of the following is NOT a reason people choose to move from rural to urban areas?low salariesvacationjobsnatural disasters 4 preguntas formales incluyendo la palabra Usted 1. Bertrand Competition with Capacity Choices (20 marks)In Bertrand competition with identical firms we have assumed thatfirms do not havecapacity constraints. That is, each firm can serve the whol substances decrease in size on __ (heating/ cooling) and contract. john believes he passed his test in statistics because of his enormous capacity for that subject, but he believes that he did not perform as well in english because his instructor is not very good. he is exhibiting Please help How can you describe the graph of the equation y= mx + b? Explain 18 times the quantity g plus 5 An investor starts off owning the market portfolio. She then identifies a stock with positive alpha and decides to add some of it to her portfolio. Adding a small amount of the stock is guaranteed to:A. Increase the portfolios Sharpe Ratio.B. Decrease the portfolios Sharpe Ratio.C. Increase the portfolios variance.D. Without knowing the correlation between this stock and the market portfolio, we dont know whether it increases the portfolios Sharpe Ratio or not.Please provide the answer with an explanation ________ was the colony where over half the population was made up of black people in 1740 More than half of the population is engaged in agriculture in all of the following regions except A. China B. Western Europe C. India D. Africa Please select the best answer from the choices provided. write a letter to your assembly man or woman suggesting three ways by which sanitation in your area can be improved Simplify and write the following complex number in standard form. (-321)(-6+81) Select one: O a. 3+20i O b. -12i O c. 18-161 O d. 34 121 O e. -9+ 61 If you have [tex]3^{n-1} *\frac{n(n+1)}{2} = 20412[/tex]whats the process for solving n? when a glacier melts back, sediment deposited along internal meltwater channels form long, sinuous ridges called _______. 1. a patient arrives with an order for external fetal monitoring. the practitioner is unable to determine fetal presentation and suspects a breech presentation. which interventions should be performed? How to to avoid the interviewer choosing the wrong candidate? Develop your answer? Why is vinegar stored in a plastic or glass container, rather than a metal one? Chloe ate 34 burrito. Lucy ate 3 burrito. How much moreburrito did Chloe eat than Lucy? Show your work and explainNo g(x)=g(4)x63x + 10?