Xcode, Swift, and Appy Pie are all tools for doing what? A: Writing code in Java. B: Creating smartphone apps. C: Creating apps to run on a desktop or laptop. D: Writing code in C#​

Answers

Answer 1

Answer:

Creating smartphone apps

Explanation:

Took the test, got 100, read the lesson on slide 3 towards the bottom


Related Questions

These are usually ignored in code because it is rarely possible to do anything about them (System out of memory, stack overflow, JVM crash). a. Checked Exceptions b. UnChecked Exceptions c. Errors

Answers

These something that usually ignored in code because it is rarely possible to do anything about them is: c) Errors.

Errors are typically not handled in code because they represent severe problems that the application cannot recover from. Errors refer to any deviation or mistake that occurs during the execution of a program or operation. Errors can be caused by a variety of factors, such as incorrect syntax, incorrect data input, system failures, hardware problems, or even human errors.

Syntax errors occur when the programmer makes a mistake in the code, such as using incorrect syntax, misspelling a keyword, or omitting a necessary element. So the answer is C. Errors.

Learn more about errors:https://brainly.com/question/30360094

#SPJ11

Mark works at a Media Production company that uses MacOS. He lends his Hard drive to his colleague Kinsey to share a large 200 GBs movie. Kinsey is using a Windows Machine. Explain why she wasn't able to use Mark's Hard drive.

Answers

Hard drives that are from different machines that operate with different systems aren't compatible.

What settings are available in the Properties dialog box of a message? Check all that apply.

delivery options
internet settings
wireless settings
sensitivity settings
importance settings
voting and tracking options

Answers

delivery options and sensitivity settings, importance settings are available for dilouge box of messege.

What is Dialouge box?

A dialog box, often known as a dialog or a conversation box, is a typical form of window in an operating system's graphical user interface (GUI). In addition to displaying more details, the dialog box also prompts the user for input.

For instance, you interact with the "File Open" dialog box when you want to open a file while using a software.

The Properties dialog box appears in Microsoft Windows when you right-click a file and select Properties.

Therefore, delivery options and sensitivity settings, importance settings are available for dilouge box of messege.

To learn more about Dilouge box, refer to the link:

https://brainly.com/question/8053622

#SPJ1

Answer:

A). delivery options

D). sensitivity settings

E). importance settings

F). voting and tracking options

Explanation:

I just did the Instruction on EDGE2022 and it's 200% correct!

Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)

What settings are available in the Properties dialog box of a message? Check all that apply.delivery

Create a new program in python that:

Defines a function called cities()

Ask the user how many cities they are in England and store their response in a variable called answer

Check if their answer was equal to 51

If it was, output well done!

else, output incorrect!

Calls the cities() function at the end to run it.

Answers

Answer:

here

Explanation:

If you want to display something on screen you can use the print() function. ... An example of code that will ask the user to enter their name and display it on ... stores it in a variable called city city = input("What is the capital city of England ... If you want to perform a format check in Python you will need to make use of a library.

Write a program code in the python programming language to find simple interest given the
formula SI = (P*R*T)/100.
Read P(Principal), R (Rate), T (Time) from the keyboard and Calculate Simple Interest (SI).

Answers

Answer:

p = float(input('Principal: '))

r = float(input('Rate: '))

t = float(input('Time: '))

si = (p * r * t) / 100

print(si)

The "float" before the input in the first 3 lines is so you're able to input decimals. If you're not using decimals, you can switch the "float" to "int". However, if you input a decimal number after you switched to int, you will receive an error

Briefly explain the purpose of the design process

Answers

Answer:

When you want to create something or if you want to solve a problem or if you have been assigned a task but the steps towards the results are not clear yet. The purpose of a design-process is to shape and guide your work and thoughts to improve the outcome.

Explanation:

all of the following are taken into account by the relational query optimizer to do its job, except _____.

Answers

"data types." The relational query optimizer takes into account various factors such as query structure, available indexes, table statistics, and join algorithms to optimize query execution.

However, data types are not directly considered by the optimizer. Data types define the characteristics and representation of the data stored in the database but do not influence the optimization process itself. The optimizer focuses on analyzing the query and available metadata to determine the most efficient execution plan, aiming to minimize resource usage and improve query performance. Data types are relevant for ensuring data integrity and performing accurate comparisons and calculations but are not part of the optimizer's decision-making process.

Learn more about algorithms here:

https://brainly.com/question/21172316

#SPJ11

Mr. Prasad is a high school English teacher. He weighs different essays and assignments differently while calculating final grades. Therefore, he has made an Excel worksheet showing how different classwork weighs into a final grade. He would like to distribute an electronic file to his students, but he wants everyone to be able to read it regardless of whether or not they have Microsoft Office Suite.

What can Mr. Prasad do to best distribute the file?

use “Save As” to save it as an Adobe PDF file
use “Save As” to save it as an Excel 97-2003 workbook
paste the material into an Adobe PDF file
paste material into an Excel 97-2003 workbook

Answers

Mr. Prasad should use “Save As” to save it as an Adobe PDF file. The correct option is A.

What is pdf?

The abbreviation PDF stands for Portable Document Format. It's a versatile file format developed by Adobe that allows people to easily present and exchange documents.

It is basically regardless of the software, hardware, or operating systems used by anyone who views the document.

As Mr. Prasad wants to distribute the files regardless of the students having Microsoft Office or not, he can save it as pdf, so it can be readable with all.

Thus, the correct option is A.

For more details regarding pdf, visit:

https://brainly.com/question/13300718

#SPJ1

Given two strings, find the number of times the second string occurs in the first string, whether continuous or discontinuous.

Answers

Given two strings, we need to find the number of times the second string occurs in the first string, whether continuous or discontinuous. For example, let's consider the two strings "abcabcd" and "abc". The second string "abc" occurs twice in the first string "abcabcd".One of the most straightforward ways to solve this problem is by using a sliding window technique.

We can slide a window of size equal to the length of the second string over the first string and check whether the substring in the window is equal to the second string or not. We can then count the number of times the second string occurs.

Here is the implementation of the sliding window technique in Python:

```def count_substring(s1, s2):    count = 0    for i in range(len(s1) - len(s2) + 1):        if s1[i:i+len(s2)] == s2:            count += 1    return count```In the above code, `s1` represents the first string and `s2` represents the second string. We initialize a counter variable `count` to 0, and then slide a window of size `len(s2)` over the first string `s1`.

We check whether the substring in the window is equal to the second string `s2` or not. If it is, we increment the counter `count`. Finally, we return the counter `count`, which represents the number of times the second string occurs in the first string. This implementation has a time complexity of O(n * m), where n is the length of the first string and m is the length of the second string.

To know more about complexity visit :

https://brainly.com/question/31836111

#SPJ11

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

log the 'age' property of the 'person' object

log the 'age' property of the 'person' object

Answers

Answer:

vauwnwkwiauauwiajhwbwbw

What is the possible output of the following?

r = random.random() + 1

print(r)

Group of answer choices

1.0 <= r < 2.0

1.0 <= r <= 2.0

1.0 < r <= 2.0

1.0 < r < 2.0

Answers

Considering the definition of the python function random, a possible output for the following code is:

1.0 <= r <= 2.0.

What is the possible output for the given code?

The calculation of the value of r is given as follows:

r = random.random() + 1

The command random.random() returns a random value between 0 and 1, inclusive.

Then, the number one is added to the value stored at variable r.

The minimum value that can be stored at r is of 1, when the function random.random() returns it's minimum value of 0, then r = 0 + 1 = 1.The maximum value that can be stored at r is of 2, when the function random.random() returns it's maximum value of 1, then r = 1 + 1 = 2.

Then the interval that represents the possible outputs for the function is:

1.0 <= r <= 2.0.

More can be learned about python functions at https://brainly.com/question/15185464

#SPJ1

Phishing is not often responsible for PII data breaches

Answers

The correct answer is Phishing This data controller has been a victim of phishing. Since the compromised email account holds personal data, there has been a personal data breach since the data.

The following security guidelines are specified by DOL internal policy for the protection of PII and other sensitive data: It is the user's obligation to safeguard any data they have access to. Users are required to follow the guidelines outlined in relevant Systems Security Plans, DOL policies, and agency directives. Threat actors can access accounts containing sensitive data by using stolen credentials obtained through phishing. Phishing is a technique used to get into email accounts so that corporate email compromise attacks may be carried out. Data from Verizon shows that 41% of BEC attempts utilised phishing to get credentials.

To learn more about Phishing click the link below:

brainly.com/question/24156548

#SPJ4

Select the correct answer from each drop-down menu.

Identify the technology from the given description.

___ are small independent computers that are capable of ___
display, sensing, and wireless communication.

1.
A. Haptics
B. Siftables
C. White boards

2.
A. Graphics
B. Audio
C. Visuals

Please i need this ugently! 15 points! Please dont answer if you dont know it.

Answers

Answer:

Siftable are small independent computer that are capable of BLANK (graphics audio video)

Answer:

I think its Siftables and Graphics

Explanation:

What is the error if I want to assign a value to that same index? i.e. var_str[5] = “r”

PLEASE QUICK

Answers

The program would not generate an error if the var_str list have up to 5 elements

How to determine the error?

The operation is given as:

Assign a value to that same index

This is represented as:

var_str[5] = "r"

The representations from the above code segment are

List = var_strIndex = 5Value = "r"

When a value is assigned to an index, the value at the index is updated to the new value, provided that the index exists in the list.

This means that the program would not generate an error if the var_str list have up to 5 elements

Read more about list at:

https://brainly.com/question/27094056

#SPJ1

Which of these is an.optical medium of storage?

Answers

Do you have some answer choices?

Which of the following is a definition of conventions?
A: the ideas readers absorb while reading a text
B: rules that help readers understand the meaning of texts
C: the meaning of texts understood through symbols
D: questions you ask to understand a texts meaning

Answers

Answer: B: rules that help readers understand the meaning of texts 

Explanation:

The statement that represents a definition of conventions is ruled that help readers understand the meaning of texts. Thus, the correct option for this question is B.

What is Convention?

A convention may be defined as an assembly of persons that intentionally met for a common purpose in order to facilitate a common work and methodology. It is generally an assembly or conference of a set of people.

In this assembly or conference, the motive is to understand the actual meaning of the texts with respect to rules and regulations. It represents a way through which something is accomplished or done.

In literature, conventions are the defining characteristics, or must-haves, of a given genre. Any aspiring gumshoe worth their weight in magnifying glasses will convey to you that detectives, suspects, and a hearty dose of all conventions of the mystery genre.

Therefore, the statement that represents a definition of conventions is ruled that helps readers understand the meaning of texts. Thus, the correct option for this question is B.

To learn more about Conventions, refer to the link:

https://brainly.com/question/24147773

#SPJ2

Which of the following statements are true about the growth of technology? Select 3 options. A. Individuals in the United States currently own an average of three connected devices. B. The general public began connecting to the Internet when the World Wide Web was introduced in 1991. C. By 1995, almost half of the world’s population was connected to the Internet. D. Currently, 67% of people on earth use at least one mobile device. E. The number of devices connected to the Internet of Things is expected to triple between 2018 and 2023.

Answers

Answer:

b

Explanation:

the general public began connecting to the internet when the world wide web was introduced

Answer:

The general public began connecting to the Internet when the World Wide Web was introduced in 1991.

By 1995, almost half of the world’s population was connected to the Internet.

Currently, 67% of people on earth use at least one mobile device.

Explanation:

which of the following are best practices for creating data frames? select all that apply.
a. Rows should be named
b. Each column should contain the same number of data items
c. Columns should be named
d. All data stored should be the same type

Answers

The best practices for creating data frames are:

a. Rows should be named

c. Columns should be named

d. All data stored should be the same type

When creating data frames, it is important to follow best practices to ensure the accuracy and consistency of the data. Rows should be named to identify each observation in the data frame. Columns should also be named to describe the data being stored in each column. Additionally, all data stored in a column should be of the same data type to avoid any potential errors or inconsistencies in the data. However, it is not necessary for each column to contain the same number of data items.

Options  a, c, and d are the correct answers.

You can learn more about data frames at

https://brainly.com/question/30783930

#SPJ11

My sister told me an extremely funny joke. what is the direct object for this sentence ?

Answers

Answer:

Explanation:

If there is an int/integer in a array, and the same int/integer comes at the same spot, does it cancel each other out or does it reassing the value? (Java)

Answers

Answer:

The answer to this question is given below in the explanation section.

Explanation:

When you use an array in the program, it occupies the memory where to store the data. However, it is noted that the other array cannot store the variable value where the first array has to store its variable value.

however, when you reassign the value their index position of the array, the values are reassigned. But it also depends on the CPU, because sometimes when you release the memory from the array, maybe some other programs get to occupy that location where the first array values were stored.

However, In Java, it is possible that the same int/integer comes at the same spot of the existing integer in an array, then the value at that particular index is reassigned.

6. relate how windows server active directory and the configuration of access controls achieve cia for departmental lans, departmental folders, and data.

Answers

To relate how Windows Server Active Directory and the configuration of access controls achieve CIA (Confidentiality, Integrity, and Availability) for departmental LANs, departmental folders, and data, follow these steps:

1. Implement Active Directory (AD): AD is a directory service provided by Windows Server for organizing, managing, and securing resources within a network. It centralizes the management of users, computers, and other resources, ensuring consistent security settings and access controls across the entire environment.

2. Organize resources into Organizational Units (OUs): Within AD, create OUs to represent different departments or functional areas. This allows for the efficient application of security policies and access controls based on departmental requirements.

3. Create user accounts and groups: In AD, create user accounts for each employee and assign them to appropriate departmental groups. This allows for the management of access rights and permissions based on group membership, ensuring that users only have access to the resources required for their roles.

4. Configure access controls: Apply access control lists (ACLs) to departmental LANs, folders, and data. ACLs define the permissions that users or groups have on specific resources, ensuring confidentiality by restricting unauthorized access.

5. Implement Group Policy Objects (GPOs): Use GPOs to enforce security policies and settings across the entire network. This ensures consistent security configurations, such as password policies and software restrictions, contributing to the integrity of the environment.

6. Monitor and audit: Regularly review security logs and reports to identify potential security breaches or unauthorized access attempts. This allows for prompt remediation and ensures the ongoing availability of resources to authorized users.

In summary, Windows Server Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data by centralizing the management of resources, implementing access controls based on user roles, and enforcing consistent security policies across the environment.

Learn more about Windows Server: https://brainly.com/question/30985170

#SPJ11

Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as ________. All of the answer choices are correct. editor reader subject matter expert

Answers

People or web do wants their privacy. Large wikis do protect the quality and accuracy of their information by assigning users roles such as Reader, Subject Expert and editor.

What is website quality?

Website quality is one that is said to be based on the quality of the software and output. Website Quality or say the Quality of Websites are said to be often measured from two views.

That is the Programmers, and End-users. The various aspects of website quality ranges from programmers who are based on the extent of Maintainability, Security, Functionality and others.

learn more about protection of quality  from

https://brainly.com/question/13171394

What is greywater? A. waste water contaminated by human waste such as feces B. fresh water running out of taps and sinks C. waste water unpolluted by human waste such as feces D. salty water running out of taps and sinks E. purified water used for drinking purposes

Answers

Answer:

B. fresh water running out of taps and sinks

Explanation:

Greywater is simply the water that is created from activities such as showering, bathing or doing laundry.

most current displays are a type of ______ display.

Answers

Most current displays are a type of flat-panel display.

What is the displays

Most screens today are either LCD (Liquid Crystal Display) or LED (Light Emitting Diode). These tools are commonly used in many gadgets, like TVs, computer screens, phones,  tablets, and other electronics.

LCD displays light up a layer of liquid to make pictures on the screen. LED displays use a lot of tiny lights called light-emitting diodes to produce the image. There are two different kinds of LED displays: LED-backlit LCD displays and OLED displays.

Learn more about  displays from

https://brainly.com/question/28116270

#SPJ4

6. (01.02 LC)
The programming language C: uses a series of 1s and Os to communicate with the computer. (5 points)
O True
False

Answers

Answer:

False

Explanation:

In a computer network, a _____ is an expansion card located within the system unit that connects the computer to a network.

Answers

Answer:

Explanation:

Technically, a NIC is a physical card that connects to an expansion slot in a computer. Many computers and wireless devices now include an integrated networking component called a network adapter. This may be an Ethernet controller and port attached to the edge of a motherboard or a small wireless networking chip located on the motherboard.

Which slide should you change so that it reflects on all the slides?
Any change you can make to a slide in Normal view can be made to the slide master so the change will be reflected on all slides in the presentation.

Answers

A presentation's theme and slide layouts, including the background color, typefaces, effects, placeholder sizes, and positioning, are stored on the top slide, known as the "slide master."

To save the image you wish to add to your computer, click it with your right mouse button. After selecting the View tab, choose the Slide Master command. Any modification you make to a slide in the presentation's Normal view also affects the slide master, which updates all other slides.

The slide whose arrangement you want to change should be selected. Select Home > Layout. A preferred configuration should be chosen. The layouts can contain text, video, pictures, charts, shapes, clip art, backgrounds, and other elements.

To learn more about  Slide Master click here:

brainly.com/question/7868891

#SPJ4

Look in the nec® index and find uses permitted for ac cable. the code reference for this is ___.

Answers

If one Look in the nec® index and find uses permitted for ac cable. the code reference for this is installed in wet locations.

Where is the index located in the NEC?

The index is known to be one that is seen or located in the back of the NEC and this is known to be one that is said to be organized in alphabetical order ranging from keywords seen within the electrical code.

Note that The index is seen to be the best reference for knowing multiple occurrences of a particular words and phases inside  a lot of  articles and sections of code.

Hence, If one Look in the nec® index and find uses permitted for ac cable. the code reference for this is installed in wet locations.

Learn more about code reference from

https://brainly.com/question/25817628

#SPJ1

when examining the permissions on a file in linux you find the the first four bits are -rwx. what does this mean

Answers

The first four bits in the permissions on a file in Linux represent the file's permissions for the owner of the file.

In this case, the "r" stands for read, the "w" stands for write, and the "x" stands for execute. So, "-rwx" means that the owner of the file has permission to read, write, and execute the file.

A family of open-source Unix-like operating systems known as Linux are based on the Linux kernel, which Linus Torvalds initially made available on September 17, 1991.

Because it is less vulnerable to viruses and malware than Windows, Linux is seen as being more secure than Windows. Since Windows is the most widely used operating system worldwide, it is a more frequent target for cyberattacks.

Microsoft is a for-profit operating system, whereas Linux is an open-source operating system. Linux enables users to have access to the operating system's source code and grants them permission to modify it as they see fit. Windows users, on the other hand, lack these rights.

To know more about linux , click here:

https://brainly.com/question/30176895

#SPJ11

Other Questions
commercial bank reserves generally the largest liability on the central bank's balance sheet and the most important liability in determining the money supply. Is my answer correct? one of the most pervasive monetary crimes today is ________________. Recall that Leon Festinger and his colleagues conducted research at a university housing project called Westgate West. Among other things, they examined friendship formation among apartment residents. Results showed that the residents living near stairwells formed twice as many friendships with upstairs neighbors as those living in the middle apartments, which were further from the stairs. These results illustrate the impact of ________ on friendship formation.A) physical distanceB) similarityC) functional distanceD) sociometric distance What is your Average speed if you take 0.5 hour to walk 4000m? A patient with spinal stenosis at the C5-C7 level with a painful intervertebral disc displacement had a cervical discectomy, corpectomy, allograft from C5 to C7, and placement of instrumentation (a 34-mm plate from C5 to C7). A. M50. 23, M48. 02, M54. 2 B B. M48. 02, S13. 171 C C. M48. 02, M50. 23 D D. M54. 2, M50. 30 the nurse advises a client recovering from a myocardial infarction to decrease fat and sodium intake. which foods should the nurse instruct the client to avoid? select all that apply. a) Soft drinksb) Oatmealc) Pepperoni pizzad) Bacone) Apple juicef) Cheese Block 1, mass 1.00kg, slides east along a horizontal frictionless surface at 2.50m/s. It collides elastically with block 2, mass 5.00kg, which is also sliding east at 0.75m/s. Determine the final velocity of both blocks. When an atom has a positive charge, it has ____ electrons a. gained b. shared c. loss each side of the base of a square pyramid measures 10 inches. the height of each lateral face of the pyramid is also 10 inches. what is the surface area of the pyramid? pick any recent news storyThen Work backwards and type out what you think that storys outline would look like Please help!!!! need help ASAP ahhhhhhIs it possible to construct a cube with 2000interlocking cubes? Justify your answer. assad has an opportunity to enter a contest. if he wins the contest, the value of his increase in utility will be $6,000. if he loses the contest, the value of his decrease in utility will be -$300. his probability of winning is 4%. his probability of losing is 96%. what is assad's expected utility if he enters the contest? change in which of the following variables will have no directeffect on the level of domestic demand?Select one:a. Taxes.b. Domestic income.c. Government spending.d. Foreign income.e. The real Health and social care Level 2 (adult care) Identify standards regulatory requirements that influence your knowledge, understanding and skills to carry out your role? What is the volume of a cylinder, in cubic centimeters, with a height of 8 centimetersand a base diameter of 16 centimeters? Round to the nearest tenths place Im confused someone help me please. A 52 kg skateboarder is standing on the edge of a 35 m tall half-pipe. How much energy will the skateboarder have when he drops in the pipe?What will his kinetic energy be when he reaches the bottom?Calculate his speed using the energy from the question above. What is the function of nitrogen fixing bacteria A converging lens (f = 11.6 cm) is located 30.3 cm to the left of a diverging lens (f = -5.82 cm). A postage stamp is placed 38.4 cm to the left of the converging lens.(a) Locate the final image of the stamp relative to the diverging lens. (Include sign to indicate which side of the lens the image is on.)cm(b) Find the overall magnification.