Answer:
Violation of city Statute
Answer:
B
Explanation:
what feature is available to add a suggestion in the margin of someone else's document?
Answer:
The correct answer to this question is given below in the explanation section.
Explanation:
The correct question is:
what feature is available to add a suggestion in the margin of someone else's document. The given features in this question are:
AnnotationCommentsHighlight and BookmarkThe correct answer to this question is the Comments.
Because you can add comments in someone else's document and only Comments features in word document allow you add comments on the someone else's document.
While the other options are not correct because:
The Annotation works with grammar or writing, Highlight feature allows you to mark important information or text in your document. while Bookmark allows you to save your space in a document.
What characteristics do mentally healthy people exhibit? Check all that apply.
exercise 30 minutes a day
make their own decisions
are comfortable with other people
get overwhelmed by emotions
handle problems when they arise
make the best out of every situation
Answer:
make their own decisions
are comfortable with other people
handle problems when they arise
make the best out of every situation
Explanation:
When it comes to cyberbullying, “power imbalance” is the term used for
Answer:
no
Explanation:
because
Answer:
intimidating someone online with threats
Explanation:
Just did the quiz on edg
Assume you use Bubble Sort to sort a list with 15 elements (i.e.n= 9). Exactly howmany comparisons do you use (in the worst case)?
Answer:
Worst case is 55 but it really does depend on the numbers
Explanation:
1/2n squared -1
So that would be 7.5 squared -1
Most IT security threats originate with hackers.
Question 3 options:
True
False
A merge field can be used multiple times in the same document.
A. True
B. False
Write a program that will read in id numbers and place them in an array.The array is dynamically allocated large enough to hold the number of id numbers given by the user. The program will then input an id and call a function to search for that id in the array. It will print whether the id is in the array or not.
Answer:
#include <stdio.h>
#include <stdlib.h>
int main() {
int n, i, *p, s;
scanf("%d", n);
p = (int*) malloc(n * sizeof(int));
if(p == NULL) {
printf("\nError! memory not allocated.");
exit(0);
}
printf("\nEnter elements of array : ");
for(i = 0; i < n; ++i) {
scanf("%d", p + i);
}
scanf("Enter Id to be searched: %d", s);
for(j = 0; j < n; ++j) {
if (s == *(p+j)){
printf("ID number is in the array at position %d", j);
}else{
printf("Error: ID number does not exist.");
}
}
return 0;
Explanation:
The C program source code inputs integer values to dynamic array size, and the search variable is looked for in the array using a for loop. If the search term exists, then the index position is printed on the screen, else an error message is displayed on the screen.
Where can a user find the set of tools used for adjusting the magnification of a slide
At the top left corner 6 small spots down, you can find it. (Highlighted Orange)
( Marking me Brainlyst will help my rank <3 )
What are the oop concept of java
Answer: OOP concepts in Java are the main ideas behind Java’s Object Oriented Programming. They are abstraction, encapsulation, inheritance, and polymorphism. Grasping them is key to understanding how Java works. Basically, Java OOP concepts let us create working methods and variables, then re-use all or part of them without compromising security.
HOPE THIS HELPED IS NOT SORRY.
OOP stands for Object Oriented Programming. In Java, we create classes to represent different things. For instance:
public class MyClass {
public static void main(String args[]) {
Car cr = new Car();
cr.createCar("Ford", "Green", 2000);
cr.printInfo();
}
}
class Car{
private String model, color;
private int year;
void createCar(String md, String cl, int yr){
model = md;
color = cl;
year = yr;
}
void printInfo(){
System.out.println("Car Info:");
System.out.println("Model: "+model);
System.out.println("Color: "+color);
System.out.println("Year: "+year);
}
}
We create a car object derived from the Car class with whatever properties we want and then we can display the properties of our car with the printInfo() method.
This is just one example of the OOP concept of Java.
Execution speed of a program on a computer processor varies with the language a programmer uses to code it. Select the correct option that
compares machine language with other languages.
The execution speed of machine language is
[___] than the execution speed of other languages.
Options:
slower
no different
faster
Answer:
faster
Explanation:
i took the test
Answer:
The answer is FASTER.
Explanation:
From PLATO!
What is one advantage of using object-oriented programming?
A.
increases coding time
B.
makes debugging the code easier
C.
takes longer to plan
D.
has a longer learning curve
E.
creates single file code
One advantage of using object-oriented programming makes debugging the code easier. The correct option is B.
What is object-oriented programming?Programming in the object-oriented (OOP) manner identifies classes of objects that are closely related to the methods (functions) with which they are associated. It also covers the concepts of attribute and method inheritance.
Objects can be used in a variety of ways. Due to its modularity, extensibility, and reusability, object-oriented programming improves software development productivity when compared to traditional procedure-based programming techniques.
Functional programming, at its most basic, employs immutable data to instruct the program exactly what to do.
Therefore, the correct option is B. makes debugging the code easier.
To learn more about object-oriented programming, visit here:
https://brainly.com/question/11023419
#SPJ2
Which Tab contains the font style attributes?
The home tab.
This tab contains the most-used Word features, such as tools for changing fonts and font attributes, customizing paragraphs, using styles, and finding and replacing text.
Select the correct navigational path to change a chart's style in an Excel worksheet.
Select the correct navigational path to change a chart’s style in an Excel worksheet.
Select the table.
Click the
✔ Design
tab on the ribbon and look in the
✔ Chart Styles
group.
Select a new style from the templates available and release
Toggle the chart. The Design, Layout, and Format tabs have been added to the Chart Tools, which are displayed. Click the arrow in the Chart Elements box under the Current Selection group on the Format tab, then click the chart element you wish to alter the formatting style for.
What navigational path to change a chart's style?Click on the chart, then press Ctrl + Shift + C to swiftly switch the type of chart you're using. By using this shortcut, you may rapidly browse between the various chart kinds to pick the one that best fits your data. 3. Click on the chart and then press Ctrl + to add a trend line to it.
Therefore, Click Move Chart in the Location group under Chart Tools on the Design tab. Choosing one of the following, Click New sheet, enter a name for the worksheet in the New sheet box, and then click the chart to transfer it to the new worksheet.
Learn more about Chart Styles here:
https://brainly.com/question/12154998
#SPJ5
08408519 kahoot code
Answer:
ill join
Explanation:
Answer:
the code 08408519 dosent work
Explanation:
PLEASE HURRY 30 POINTS
Which of the following statements describes the way networks are set up?
LANs are made up of LANs.
WANs are made up of WANs.
LANs are made up of WANs.
WANs are made up of LANs.
Answer:
WANs are made you of LANs
Explanation:
Complete the Car class by creating an attribute purchase_price (type int) and the method print_info() that outputs the car's information.
Ex:
If the input is:
2011
18000
2018
where 2011 is the car's model year, 18000 is the purchase price, and 2018 is the current year, then print_info() outputs:
Car's information:
Model year: 2011
Purchase price: 18000
Current value: 5770
Note: print_info() should use three spaces for indentation.
This is what is given
class Car:
def __init__(self):
self.model_year = 0
# TODO: Declare purchase_price attribute
self.current_value = 0
def calc_current_value(self, current_year):
depreciation_rate = 0.15
# Car depreciation formula
car_age = current_year - self.model_year
self.current_value = round(self.purchase_price * (1 - depreciation_rate) ** car_age)
# TODO: Define print_info() method to output model_year, purchase_price, and current_value
if __name__ == "__main__":
year = int(input())
price = int(input())
current_year = int(input())
my_car = Car()
my_car.model_year = year
my_car.purchase_price = price
my_car.calc_current_value(current_year)
my_car.print_info()
Answer:
Just add this and yoyr code should work.
Explanation:
def print_info(self):
print("Car's information:")
print(" Model year:", self.model_year)
print(" Purchase price:", self.purchase_price)
print(" Current value:", self.current_value)
Classes are templates used when an object is to be created while methods are functions that are executed when called or evoked
To declare the attribute purchase_price (type int), we make use of the self keyword, and we initialize the value to 0
So, the declaration of the purchase_price attribute is:
self.purchase_price = 0
To define the print_info() method, we simply evoke the model_year and the purchase_price attributes.
So, the definition of the print_info() method is:
def print_info(self):
print("Car's information:")
print(" Model year:", self.model_year)
print("Purchase price:", self.purchase_price)
Read more about class and methods at:
https://brainly.com/question/15125793
Which of the following is the strongest password?
O A. ttwEwtcaoaSm
O B. Thisismypassword
O C. 12345654321
O D. 8)oscysbydel%2
Answer:
Probably D
Explanation:
In what I have learned, I was taught that a strong password needs all of the following: Lowercase letters, Uppercase letters, Numbers, and Symbols, but the only one that has almost all of these, is D, because it has 2 numbers, 10 lowercase letters, and 1 symbol, the rest are just too obvious, (except for A) -_-
But other than that, I hope this is right, but if it is not i am very very sorry! :(
The strongest password is ttwEwtcaoaSm. The correct option is A.
What is a password?A password is a secret string of characters or symbols that is used to prove identity or gain access to a resource or computer system.
Passwords are used to safeguard sensitive data such as personal information, financial information, and online accounts.
A strong password is a difficult-to-guess or crack combination of letters, numbers, and symbols.
To maintain security, it is recommended that you use unique and complex passwords for each account and change them on a regular basis.
The strongest password is ttwEwtcaoaSm, which combines upper and lowercase letters, numbers, and special characters and is not a common phrase or word.
Thus, the correct option is A.
For more details regarding password, visit:
https://brainly.com/question/28114889
#SPJ7
uses of diodes in the society
Answer:
The application areas of diodes include communication systems as limiters, clippers, gates; computer systems as logic gates, clampers; power supply systems as rectifiers and inverters; television systems as phase detectors, limiters, clampers; radar circuits as gain control circuits, parameter amplifiers, etc.
Explanation:
Explanation:
I should understand this answer
Write a program that will input two numbers and print the larger number on the screen.
num1 = float(input("Enter the first number: "))
num2 = float(input("Enter the second number: "))
if num1 > num2:
print(num1)
else:
print(num2)
I hope this helps!
what are 3 software programs for mobile computing?
Answer:
1.Communication Devices
2.Mobile hardware
3.Mobile software and apps
(smartphones, laptop, etc)
Put the steps you would use to insert and label an endnote in order.
Answer:
2nd- step 1, 3rd- step 2, 1st- step 3, 4th- step 4
Explanation:
1. locate the reference tab
2. click the insert endnote option
3. type your endnote label
4. type the text you want the endnote to follow
Choose the function required to have the code have the output shown.
>> alist = [10, 23, 'bye', 4.6]
>>> aList.
vo
4.6
>>> aList
[10, 23, 'bye']
A) pop B)remove C) clear
The function that will be required to have the code with the output 4.6 and the aList will be [10, 23, 'bye'] is pop.
Code explanation:The code is written in python.
alist = [10, 23, 'bye', 4.6]
According to the python code, we used the variable "aList" to store a list. The list has a length of 4. It contains integers, float and string.
Using the pop function, the last value of the list will be removed.
The pop function removes the last value in a list.
alist.pop() removes 4.6 and it is printed out .
Then when we ask for our list, the list is printed out without the last value(4.6).
learn more on function here: https://brainly.com/question/15782435
Answer: pop
Explanation: got it right on edgen
Which view in the View tab of the ribbon is the easiest place to add a header or a footer? Normal view Custom Views Page Layout view Page Break Preview
Answer:
Page Layout view
Explanation:
Answer:
C. Page layout view
Explanation:
please hurry
How are computers connected to one another?
through networks
through printers
through laptops
Answer:
networks
Explanation:
internet
Answer:
i know u dont need help anymore but the guy who said networks is correct
Explanation:
e
WHAT DOES THE JEFFY SAY?
Answer:
Jeffy overhears Mario use the word and begins saying f. Mario scolds Jeffy and tells him to not say the word, but Jeffy resumes using it regardless.
Explanation:
An IT security threat is anything that might cause serious harm to a computer system, including someone stealing a laptop that contains confidential information. Question 1
True
False
Answer: True
Explanation: Anything that is an IT threat is something that can compromise the integrity of the company or software and if that someone who stole a laptop has the information on it can get the information then there is a real risk that is faced to the company that owns that information.
What did networks of the 1960s use to connect computers?
telephone lines
wireless technology
television signals
telegraph cables
Answer:
id say telephone lines or cables
Define a function hyp(leg1, leg2) that returns the length of the hypotenuse of a right triangle
Hint: number**0.5 takes the square root of a number, number**2 squares a number
I've included my code in the picture below. Best of luck.
Describe the Pointer with example?
Answer:
A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however an integer pointer holds the address of a integer variable.
Answer: A pointer is a variable that stores the address of another variable. Unlike other variables that hold values of a certain type, the pointer holds the address of a variable. For example, an integer variable holds (or you can say stores) an integer value, however, an integer pointer holds the address of an integer variable.
Explanation:
PLEASE HURRY AND BE SERIOUS
Which of the following statements describes the way networks are set up?
LANs are made up of LANs.
WANs are made up of WANs.
LANs are made up of WANs.
WANs are made up of LANs.
Answer: D: WANs are made up of LANs.
Explanation:
Answer:
answer is D WANS are made up of LANS
Explanation: