Answer:
The answer is animation. This question has been answered already.
Source:
https://brainly.com/question/12414395
How to change lowercase to uppercase in excel 2010 shortcut key?.
A restaurant has an app that allows users to view the menu and order online. You have been hired to upgrade the app because it is out of date, in both style and content. What parts of the existing code could you reuse, and what might you need to design from scratch?
Answer:
You could reuse most of the code. You will need to update some of the style parameters and re-word some of the content, but the base code is there to be used. You will need to fix the items that are on the menu. (Adding new items, Deleting items that don't exist, e.g.)
You defined a shoe data type and created an instance.
class shoe:
size = 0
color = 'blue'
type = 'sandal'
myShoe = shoe()
Which statement assigns a value to the type?
type = 'sneaker'
myShoe.type( 'sneaker')
myShoe.type = 'sneaker'
NEXT QUESTION
ASK FOR HELP
Answer:
myShoe.type = 'sneaker'
Explanation:
type is a field of the class shoe. The myShoe object which is an instance of the class shoe has the field type also.
To assign a value to type filed of the object myShoe, reference the object then the field as such;
myShoe.type = "sneaker"
You defined a shoe data type and created an instance. The statement that assigns a value to the type is myShoe.type = 'sneaker'. The correct option is C.
What is data in programming?A variable's data type and the kinds of mathematical, relational, and logical operations that can be performed on it without producing an error are classified as data types in programming.
An attribute of a piece of data called a "data type" instructs a computer system on how to interpret that data's value.
type is one of the class shoe's fields. The field type is also present in the myShoe object, which is an instance of the class shoe.
Reference the object and the field as such in order to assign a value to the type field of the object myShoe;
Therefore, the correct option is C. sneaker" in myShoe.type.
To learn more about data in programming, refer to the link:
https://brainly.com/question/14581918
#SPJ2
Why online fraud rose 79% in UK after they switched to the chip and PIN system in the first three years?
Answer:
TBH I HAVE NO FREAKING IDEA BUT I NEED POINTS BC IM DOING AN EXAM AND HAVE NO MONEY SORRY
When you start an online course, what should you do to make sure you have access to college resources
As a student starting an online course, you should explore the college website to make sure you have access to college resources.
What is an online course?An online course can be defined as an education programme that typically involves the process of providing and sharing learning resources (contents) in an organized way over the Internet, so as to allow the students (users) progress in their understanding of a course or topic.
As a student starting an online course, you should do the following to make sure you have access to college resources:
Explore the college website.Bookmark links to your course.Search for information with regards to advising, degree requirements, and financial aid.Read more on online course here: https://brainly.com/question/14591988
#SPJ1
advantages and disadvantages of algorithm
Answer:
\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
Explanation:
It is easy to understand. Algorithm is a step-wise representation of a solution to a given problem. In Algorithm the problem is broken down into smaller pieces or steps hence, it is easier for the programmer to convert it into an actual program
Algorithms are time-consuming. Big tasks are difficult to put in algorithms. Difficult to show branching and looping in algorithms. Understanding complex logic through algorithms can be very difficult.
Remote workers in an organization use company-provided laptops with locally installed applications and locally stored data Users can store data on a remote server using an encrypted connection. The organization discovered data stored on a laptop had been made available to the public. Which of the following security solutions would mitigate the risk of future data disclosures?(A) FDE(B) TPM(C) HIDS(D) VPN
Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.
What is FDE in security?Full disk encryption (FDE) is known to be a kid of a security measures that is often taken so as to help in the protection of all data saved on a hard drive from any kind of unauthorized access through the use of disk-level encryption.
Therefore, Remote workers can use the security solutions that would mitigate the risk of future data disclosures via the use of FDE.
Learn more about Remote workers from
https://brainly.com/question/26512743
#SPJ1
What is the one small catch with password managers?.
Answer:
password managers can acess and autofill your passwords
Explanation:
the catch is if you loose all data from your computer or smartphone, then you loose all your passwords
When you insert a new slide in a presentation, where is it placed in relation to the existing slides?.
What report shows which types of mobile devices visited a website?.
Answer:
Technology > Network report. All traffic > Source/Medium report.
Explanation:
hope this helps
Choose the correct numbers in order to have the following output.
3 1
3 2
4 1
4 2
for numx in [3,
]:
for numy in [1,
]:
print (numx, numy)
Answer:
4, 2
Explanation:
for numx in [3, 4]:
for numy in [1, 2]:
print (numx, numy)
make sure to indent properly
The correct numbers, in order to have the following output, are 4, 2. The correct option is d.
What are the outputs of coding?A programmer may decide to incorporate outputs to keep the user updated on what is happening inside the program. Here, the user is presented with the program's data either visually (on the screen) or physically (as printouts or signals, for example).
The communication between an information processing system, such as a computer, and the outside world, which may include a human or another information processing system, is known as input and output, or I/O. The system's inputs are the signals or data it receives, and its outputs are the signals or data it sends.
for numx in [3, 4]:
for numy in [1, 2]:
print (numx, numy)
Therefore, the correct option is d. 4 2.
To learn more about the outputs of coding, refer to the link:
https://brainly.com/question/28992006
#SPJ2
What does Fees, Risk Assessment and Returns mean?
Answer:
The term return refers to income from a security after a defined period either in the form of interest, dividend, or market appreciation in security value. On the other hand, risk refers to uncertainty over the future to get this return. In simple words, it is a probability of getting return on security.
Explanation:
what is the Result obtained after data processing called?
Answer:
Output
Any information which get processed by and sent out from a computer is called output. It is the final result which we get after processing
Answer:
output
Explanation:
it'll be called output
Drag each label to the correct location on the image.
Match each item to check for while reconciling a bank account with the document to which it relates.
The matchup are:
Balancing check register has:
Interest earned.Deposit in transit.Balancing statement account has:
NFS FeesBank ErrorWhat is bank reconciliation?Bank Reconciliation is known to be a process in accounting where firms are said to match their bank statements to their various transactions that are known to be recorded in their general ledger.
A statement of account is known to be one that list all the financial transactions that took place when two or businesses make different transaction over a period of time.
Note that Balancing your checkbook is a way of verifying that the records you have matches with that of the bank's.
Learn more about bank reconciliation from
https://brainly.com/question/15525383
#SPJ1
Mack signs into his laptop and gets a message saying all his files have been encrypted and will only be released if he sends money to the attacker. what kind of software did this
Answer: Ransom-Ware
Random-Ware is a type of malware that encrypts files in hopes of the victim to give the attacker a form of currency to gain access to the files again.
Which VPN protocol provides encryption but does not support IP multicast traffic?
IPsec
PPTP
L2TP
SSL VPN
Answer:
this?
Explanation:
multiple choice?
what are backup storage device of computer ?
Describe a new career in computer science that may be created in the future
No Code / Low Code Business Analyst.
This would involve someone that goes in to make sure that the business processes of the No Code / Low Code programmers are doing their job efficiently!
1. The Forever block is present in the
......... block category.
Answer:
loop or a repeating block. I think it’s this because I like robotics and I have to know a lot of different kinds of blocks.
Explanation:
This is why.
Define special computer
Answer:
A computer designed from scratch to perform a specific function. Contrast with general-purpose computer. See ASIC.
Answer:
Special computer is the computer designed for a particular type of application only. It is defined as a stored program digital computer, whose architecture is oriented towards one or more applications.
what is full form COMPUTER????
Explanation:
The full form of the Computer is Common Operating Machine Purposely Used for Technological and Educational Research.
Explanation:
The computer full form of common opreating machine purposely used for technical educational research
I hope you helps:)
What are two benefits of defining a function?
Answer:
enhances the readability of a program.
Northern trail outfitters has the case object set to private. the support manager raised a concern the reps have a boarder view of data than expected and can see all cases on their groups dashboards. what could be causing reps to have inappropriate access to data on dashboards
The option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.
What is a Dynamic dashboards?Dynamic dashboards is known to be a tool that helps all user to be able to view the data they are known to have access to.
Note that in the case above about Northern trail outfitters, the option that could be causing reps to have inappropriate access to data on dashboards is known to be Dynamic Dashboards.
see options below
Northern Trail Outfitters has the Case object set to private. The support manager raised a concern that reps have a broader view of data than expected and can see all cases on their group's dashboards.
What could be causing reps to have inappropriate access to data on dashboards?
A. Public Dashboards
B. Dashboard Subscriptions
C. Dynamic Dashboards
D. Dashboard Filters
Learn more about Dashboards from
https://brainly.com/question/1147194
#SPJ1
The Western Siberian Plain is __________ in some places because it has poor natural draining systems.
The Western Siberian Plain is marshy in some places because it has poor natural draining systems.
What is a Drainage system?A Drainage system may be defined as the complete process to exhaust the water in the soil to improve crop production in an area. It eliminates the water through the surface of the earth.
The complete question is as follows:
The Western Siberian Plain is __________ in some places because it has poor natural draining systems.
subtropicalhumidmarshyaridTherefore, the correct option for this question is C, i.e. marshy.
To learn more about the Drainage system, refer to the link:
https://brainly.com/question/908462
#SPJ1
Which device performs the function of determining the path that messages should take through internetworks?.
Answer:
A router
Explanation:
True or False. It is OK for students to find answers to questions on the Internet and submit those answers during a test.
Strange question, but I would say false. FALSE
What two functions does tcp/ip perform?
reassemble data packets at the destination.
alert users about unsafe websites and servers.
request servers for data the user wants.
check and request for missing data packets.
The two functions does tcp/ip are:
Reassemble data packets at the destination.Request servers for data the user wants.What are the functions of TCP IP?The role of the Transmission Control Protocol is known to be the one that helps to take in and put together the Data Packets while that of IP is to send the Data Packets to the right location or destination.
Therefore, The two functions does tcp/ip are:
Reassemble data packets at the destination.Request servers for data the user wants.Learn more about tcp/ip from
https://brainly.com/question/17387945
#SPJ1
The __________ backup method is based on the philosophy that a full backup should occur at regular intervals, such as monthly or weekly
Answer:
full/incremental backup
Explanation:
I believe it's full/incremental backup.
i'll give u 16 points answer thisss
What type of hacker is primarily motivated by an ideology, epitomizing "the ends justify the means" mentality?.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism.
What type of hackers are motivated by social or political issues?Hacktivism is known to be an act of the wrong use a computer system or network for a socially or politically motivated aim or reason.
The type of hacker that is primarily moved by an ideology, epitomizing "the ends justify the means" mentality is Hacktivism and they are called hacktivist.
Learn more about Hacktivism from
https://brainly.com/question/5483494
#SPJ1