Answer:
Creating smartphone apps
Explanation:
Took the test, got 100, read the lesson on slide 3 towards the bottom
These are usually ignored in code because it is rarely possible to do anything about them (System out of memory, stack overflow, JVM crash). a. Checked Exceptions b. UnChecked Exceptions c. Errors
These something that usually ignored in code because it is rarely possible to do anything about them is: c) Errors.
Errors are typically not handled in code because they represent severe problems that the application cannot recover from. Errors refer to any deviation or mistake that occurs during the execution of a program or operation. Errors can be caused by a variety of factors, such as incorrect syntax, incorrect data input, system failures, hardware problems, or even human errors.
Syntax errors occur when the programmer makes a mistake in the code, such as using incorrect syntax, misspelling a keyword, or omitting a necessary element. So the answer is C. Errors.
Learn more about errors:https://brainly.com/question/30360094
#SPJ11
Mark works at a Media Production company that uses MacOS. He lends his Hard drive to his colleague Kinsey to share a large 200 GBs movie. Kinsey is using a Windows Machine. Explain why she wasn't able to use Mark's Hard drive.
What settings are available in the Properties dialog box of a message? Check all that apply.
delivery options
internet settings
wireless settings
sensitivity settings
importance settings
voting and tracking options
delivery options and sensitivity settings, importance settings are available for dilouge box of messege.
What is Dialouge box?A dialog box, often known as a dialog or a conversation box, is a typical form of window in an operating system's graphical user interface (GUI). In addition to displaying more details, the dialog box also prompts the user for input.
For instance, you interact with the "File Open" dialog box when you want to open a file while using a software.
The Properties dialog box appears in Microsoft Windows when you right-click a file and select Properties.
Therefore, delivery options and sensitivity settings, importance settings are available for dilouge box of messege.
To learn more about Dilouge box, refer to the link:
https://brainly.com/question/8053622
#SPJ1
Answer:
A). delivery options
D). sensitivity settings
E). importance settings
F). voting and tracking options
Explanation:
I just did the Instruction on EDGE2022 and it's 200% correct!
Also, heart and rate if you found this answer helpful!! :) (P.S It makes me feel good to know I helped someone today!!)
Create a new program in python that:
Defines a function called cities()
Ask the user how many cities they are in England and store their response in a variable called answer
Check if their answer was equal to 51
If it was, output well done!
else, output incorrect!
Calls the cities() function at the end to run it.
Answer:
here
Explanation:
If you want to display something on screen you can use the print() function. ... An example of code that will ask the user to enter their name and display it on ... stores it in a variable called city city = input("What is the capital city of England ... If you want to perform a format check in Python you will need to make use of a library.
Write a program code in the python programming language to find simple interest given the
formula SI = (P*R*T)/100.
Read P(Principal), R (Rate), T (Time) from the keyboard and Calculate Simple Interest (SI).
Answer:
p = float(input('Principal: '))
r = float(input('Rate: '))
t = float(input('Time: '))
si = (p * r * t) / 100
print(si)
The "float" before the input in the first 3 lines is so you're able to input decimals. If you're not using decimals, you can switch the "float" to "int". However, if you input a decimal number after you switched to int, you will receive an error
Briefly explain the purpose of the design process
Answer:
When you want to create something or if you want to solve a problem or if you have been assigned a task but the steps towards the results are not clear yet. The purpose of a design-process is to shape and guide your work and thoughts to improve the outcome.
Explanation:
all of the following are taken into account by the relational query optimizer to do its job, except _____.
"data types." The relational query optimizer takes into account various factors such as query structure, available indexes, table statistics, and join algorithms to optimize query execution.
However, data types are not directly considered by the optimizer. Data types define the characteristics and representation of the data stored in the database but do not influence the optimization process itself. The optimizer focuses on analyzing the query and available metadata to determine the most efficient execution plan, aiming to minimize resource usage and improve query performance. Data types are relevant for ensuring data integrity and performing accurate comparisons and calculations but are not part of the optimizer's decision-making process.
Learn more about algorithms here:
https://brainly.com/question/21172316
#SPJ11
Mr. Prasad is a high school English teacher. He weighs different essays and assignments differently while calculating final grades. Therefore, he has made an Excel worksheet showing how different classwork weighs into a final grade. He would like to distribute an electronic file to his students, but he wants everyone to be able to read it regardless of whether or not they have Microsoft Office Suite.
What can Mr. Prasad do to best distribute the file?
use “Save As” to save it as an Adobe PDF file
use “Save As” to save it as an Excel 97-2003 workbook
paste the material into an Adobe PDF file
paste material into an Excel 97-2003 workbook
Mr. Prasad should use “Save As” to save it as an Adobe PDF file. The correct option is A.
What is pdf?The abbreviation PDF stands for Portable Document Format. It's a versatile file format developed by Adobe that allows people to easily present and exchange documents.
It is basically regardless of the software, hardware, or operating systems used by anyone who views the document.
As Mr. Prasad wants to distribute the files regardless of the students having Microsoft Office or not, he can save it as pdf, so it can be readable with all.
Thus, the correct option is A.
For more details regarding pdf, visit:
https://brainly.com/question/13300718
#SPJ1
Given two strings, find the number of times the second string occurs in the first string, whether continuous or discontinuous.
Given two strings, we need to find the number of times the second string occurs in the first string, whether continuous or discontinuous. For example, let's consider the two strings "abcabcd" and "abc". The second string "abc" occurs twice in the first string "abcabcd".One of the most straightforward ways to solve this problem is by using a sliding window technique.
We can slide a window of size equal to the length of the second string over the first string and check whether the substring in the window is equal to the second string or not. We can then count the number of times the second string occurs.
Here is the implementation of the sliding window technique in Python:
```def count_substring(s1, s2): count = 0 for i in range(len(s1) - len(s2) + 1): if s1[i:i+len(s2)] == s2: count += 1 return count```In the above code, `s1` represents the first string and `s2` represents the second string. We initialize a counter variable `count` to 0, and then slide a window of size `len(s2)` over the first string `s1`.
We check whether the substring in the window is equal to the second string `s2` or not. If it is, we increment the counter `count`. Finally, we return the counter `count`, which represents the number of times the second string occurs in the first string. This implementation has a time complexity of O(n * m), where n is the length of the first string and m is the length of the second string.
To know more about complexity visit :
https://brainly.com/question/31836111
#SPJ11
Explain the expression below
volume = 3.14 * (radius ** 2) * height
Answer:
Explanation:
Cylinder base area:
A = π·R²
Cylinder volume:
V = π·R²·h
π = 3.14
R - Cylinder base radius
h - Cylinder height
log the 'age' property of the 'person' object
Answer:
vauwnwkwiauauwiajhwbwbw
What is the possible output of the following?
r = random.random() + 1
print(r)
Group of answer choices
1.0 <= r < 2.0
1.0 <= r <= 2.0
1.0 < r <= 2.0
1.0 < r < 2.0
Considering the definition of the python function random, a possible output for the following code is:
1.0 <= r <= 2.0.
What is the possible output for the given code?The calculation of the value of r is given as follows:
r = random.random() + 1
The command random.random() returns a random value between 0 and 1, inclusive.
Then, the number one is added to the value stored at variable r.
The minimum value that can be stored at r is of 1, when the function random.random() returns it's minimum value of 0, then r = 0 + 1 = 1.The maximum value that can be stored at r is of 2, when the function random.random() returns it's maximum value of 1, then r = 1 + 1 = 2.Then the interval that represents the possible outputs for the function is:
1.0 <= r <= 2.0.
More can be learned about python functions at https://brainly.com/question/15185464
#SPJ1
Phishing is not often responsible for PII data breaches
The correct answer is Phishing This data controller has been a victim of phishing. Since the compromised email account holds personal data, there has been a personal data breach since the data.
The following security guidelines are specified by DOL internal policy for the protection of PII and other sensitive data: It is the user's obligation to safeguard any data they have access to. Users are required to follow the guidelines outlined in relevant Systems Security Plans, DOL policies, and agency directives. Threat actors can access accounts containing sensitive data by using stolen credentials obtained through phishing. Phishing is a technique used to get into email accounts so that corporate email compromise attacks may be carried out. Data from Verizon shows that 41% of BEC attempts utilised phishing to get credentials.
To learn more about Phishing click the link below:
brainly.com/question/24156548
#SPJ4
Select the correct answer from each drop-down menu.
Identify the technology from the given description.
___ are small independent computers that are capable of ___
display, sensing, and wireless communication.
1.
A. Haptics
B. Siftables
C. White boards
2.
A. Graphics
B. Audio
C. Visuals
Please i need this ugently! 15 points! Please dont answer if you dont know it.
Answer:
Siftable are small independent computer that are capable of BLANK (graphics audio video)
Answer:
I think its Siftables and Graphics
Explanation:
What is the error if I want to assign a value to that same index? i.e. var_str[5] = “r”
PLEASE QUICK
The program would not generate an error if the var_str list have up to 5 elements
How to determine the error?
The operation is given as:
Assign a value to that same index
This is represented as:
var_str[5] = "r"
The representations from the above code segment are
List = var_strIndex = 5Value = "r"When a value is assigned to an index, the value at the index is updated to the new value, provided that the index exists in the list.
This means that the program would not generate an error if the var_str list have up to 5 elements
Read more about list at:
https://brainly.com/question/27094056
#SPJ1
Which of these is an.optical medium of storage?
Which of the following is a definition of conventions?
A: the ideas readers absorb while reading a text
B: rules that help readers understand the meaning of texts
C: the meaning of texts understood through symbols
D: questions you ask to understand a texts meaning
Answer: B: rules that help readers understand the meaning of texts
Explanation:
The statement that represents a definition of conventions is ruled that help readers understand the meaning of texts. Thus, the correct option for this question is B.
What is Convention?A convention may be defined as an assembly of persons that intentionally met for a common purpose in order to facilitate a common work and methodology. It is generally an assembly or conference of a set of people.
In this assembly or conference, the motive is to understand the actual meaning of the texts with respect to rules and regulations. It represents a way through which something is accomplished or done.
In literature, conventions are the defining characteristics, or must-haves, of a given genre. Any aspiring gumshoe worth their weight in magnifying glasses will convey to you that detectives, suspects, and a hearty dose of all conventions of the mystery genre.
Therefore, the statement that represents a definition of conventions is ruled that helps readers understand the meaning of texts. Thus, the correct option for this question is B.
To learn more about Conventions, refer to the link:
https://brainly.com/question/24147773
#SPJ2
Which of the following statements are true about the growth of technology? Select 3 options. A. Individuals in the United States currently own an average of three connected devices. B. The general public began connecting to the Internet when the World Wide Web was introduced in 1991. C. By 1995, almost half of the world’s population was connected to the Internet. D. Currently, 67% of people on earth use at least one mobile device. E. The number of devices connected to the Internet of Things is expected to triple between 2018 and 2023.
Answer:
b
Explanation:
the general public began connecting to the internet when the world wide web was introduced
Answer:
The general public began connecting to the Internet when the World Wide Web was introduced in 1991.
By 1995, almost half of the world’s population was connected to the Internet.
Currently, 67% of people on earth use at least one mobile device.
Explanation:
which of the following are best practices for creating data frames? select all that apply.
a. Rows should be named
b. Each column should contain the same number of data items
c. Columns should be named
d. All data stored should be the same type
The best practices for creating data frames are:
a. Rows should be named
c. Columns should be named
d. All data stored should be the same type
When creating data frames, it is important to follow best practices to ensure the accuracy and consistency of the data. Rows should be named to identify each observation in the data frame. Columns should also be named to describe the data being stored in each column. Additionally, all data stored in a column should be of the same data type to avoid any potential errors or inconsistencies in the data. However, it is not necessary for each column to contain the same number of data items.
Options a, c, and d are the correct answers.
You can learn more about data frames at
https://brainly.com/question/30783930
#SPJ11
My sister told me an extremely funny joke. what is the direct object for this sentence ?
Answer:
Explanation:
If there is an int/integer in a array, and the same int/integer comes at the same spot, does it cancel each other out or does it reassing the value? (Java)
Answer:
The answer to this question is given below in the explanation section.
Explanation:
When you use an array in the program, it occupies the memory where to store the data. However, it is noted that the other array cannot store the variable value where the first array has to store its variable value.
however, when you reassign the value their index position of the array, the values are reassigned. But it also depends on the CPU, because sometimes when you release the memory from the array, maybe some other programs get to occupy that location where the first array values were stored.
However, In Java, it is possible that the same int/integer comes at the same spot of the existing integer in an array, then the value at that particular index is reassigned.
6. relate how windows server active directory and the configuration of access controls achieve cia for departmental lans, departmental folders, and data.
To relate how Windows Server Active Directory and the configuration of access controls achieve CIA (Confidentiality, Integrity, and Availability) for departmental LANs, departmental folders, and data, follow these steps:
1. Implement Active Directory (AD): AD is a directory service provided by Windows Server for organizing, managing, and securing resources within a network. It centralizes the management of users, computers, and other resources, ensuring consistent security settings and access controls across the entire environment.
2. Organize resources into Organizational Units (OUs): Within AD, create OUs to represent different departments or functional areas. This allows for the efficient application of security policies and access controls based on departmental requirements.
3. Create user accounts and groups: In AD, create user accounts for each employee and assign them to appropriate departmental groups. This allows for the management of access rights and permissions based on group membership, ensuring that users only have access to the resources required for their roles.
4. Configure access controls: Apply access control lists (ACLs) to departmental LANs, folders, and data. ACLs define the permissions that users or groups have on specific resources, ensuring confidentiality by restricting unauthorized access.
5. Implement Group Policy Objects (GPOs): Use GPOs to enforce security policies and settings across the entire network. This ensures consistent security configurations, such as password policies and software restrictions, contributing to the integrity of the environment.
6. Monitor and audit: Regularly review security logs and reports to identify potential security breaches or unauthorized access attempts. This allows for prompt remediation and ensures the ongoing availability of resources to authorized users.
In summary, Windows Server Active Directory and the configuration of access controls achieve CIA for departmental LANs, departmental folders, and data by centralizing the management of resources, implementing access controls based on user roles, and enforcing consistent security policies across the environment.
Learn more about Windows Server: https://brainly.com/question/30985170
#SPJ11
Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as ________. All of the answer choices are correct. editor reader subject matter expert
People or web do wants their privacy. Large wikis do protect the quality and accuracy of their information by assigning users roles such as Reader, Subject Expert and editor.
What is website quality?Website quality is one that is said to be based on the quality of the software and output. Website Quality or say the Quality of Websites are said to be often measured from two views.
That is the Programmers, and End-users. The various aspects of website quality ranges from programmers who are based on the extent of Maintainability, Security, Functionality and others.
learn more about protection of quality from
https://brainly.com/question/13171394
What is greywater? A. waste water contaminated by human waste such as feces B. fresh water running out of taps and sinks C. waste water unpolluted by human waste such as feces D. salty water running out of taps and sinks E. purified water used for drinking purposes
Answer:
B. fresh water running out of taps and sinks
Explanation:
Greywater is simply the water that is created from activities such as showering, bathing or doing laundry.
most current displays are a type of ______ display.
Most current displays are a type of flat-panel display.
What is the displaysMost screens today are either LCD (Liquid Crystal Display) or LED (Light Emitting Diode). These tools are commonly used in many gadgets, like TVs, computer screens, phones, tablets, and other electronics.
LCD displays light up a layer of liquid to make pictures on the screen. LED displays use a lot of tiny lights called light-emitting diodes to produce the image. There are two different kinds of LED displays: LED-backlit LCD displays and OLED displays.
Learn more about displays from
https://brainly.com/question/28116270
#SPJ4
6. (01.02 LC)
The programming language C: uses a series of 1s and Os to communicate with the computer. (5 points)
O True
False
Answer:
False
Explanation:
In a computer network, a _____ is an expansion card located within the system unit that connects the computer to a network.
Answer:
Explanation:
Technically, a NIC is a physical card that connects to an expansion slot in a computer. Many computers and wireless devices now include an integrated networking component called a network adapter. This may be an Ethernet controller and port attached to the edge of a motherboard or a small wireless networking chip located on the motherboard.
Which slide should you change so that it reflects on all the slides?
Any change you can make to a slide in Normal view can be made to the slide master so the change will be reflected on all slides in the presentation.
A presentation's theme and slide layouts, including the background color, typefaces, effects, placeholder sizes, and positioning, are stored on the top slide, known as the "slide master."
To save the image you wish to add to your computer, click it with your right mouse button. After selecting the View tab, choose the Slide Master command. Any modification you make to a slide in the presentation's Normal view also affects the slide master, which updates all other slides.
The slide whose arrangement you want to change should be selected. Select Home > Layout. A preferred configuration should be chosen. The layouts can contain text, video, pictures, charts, shapes, clip art, backgrounds, and other elements.
To learn more about Slide Master click here:
brainly.com/question/7868891
#SPJ4
Look in the nec® index and find uses permitted for ac cable. the code reference for this is ___.
If one Look in the nec® index and find uses permitted for ac cable. the code reference for this is installed in wet locations.
Where is the index located in the NEC?The index is known to be one that is seen or located in the back of the NEC and this is known to be one that is said to be organized in alphabetical order ranging from keywords seen within the electrical code.
Note that The index is seen to be the best reference for knowing multiple occurrences of a particular words and phases inside a lot of articles and sections of code.
Hence, If one Look in the nec® index and find uses permitted for ac cable. the code reference for this is installed in wet locations.
Learn more about code reference from
https://brainly.com/question/25817628
#SPJ1
when examining the permissions on a file in linux you find the the first four bits are -rwx. what does this mean
The first four bits in the permissions on a file in Linux represent the file's permissions for the owner of the file.
In this case, the "r" stands for read, the "w" stands for write, and the "x" stands for execute. So, "-rwx" means that the owner of the file has permission to read, write, and execute the file.
A family of open-source Unix-like operating systems known as Linux are based on the Linux kernel, which Linus Torvalds initially made available on September 17, 1991.
Because it is less vulnerable to viruses and malware than Windows, Linux is seen as being more secure than Windows. Since Windows is the most widely used operating system worldwide, it is a more frequent target for cyberattacks.
Microsoft is a for-profit operating system, whereas Linux is an open-source operating system. Linux enables users to have access to the operating system's source code and grants them permission to modify it as they see fit. Windows users, on the other hand, lack these rights.
To know more about linux , click here:
https://brainly.com/question/30176895
#SPJ11