The illegal copying of program​

Answers

Answer 1

Answer:Software piracy

Explanation:


Related Questions

What is a variable?

A.a box (memory location) where you store values

B. a type of memory

C. a value that remains the same throughout a program

D. a value that loads when the program runs

Answers

Answer. D: a value that looks loads when the program runs.


Explanation:

In programming, a variable is a value that can change, depending on conditions or on information passed to the program. Typically, a program consists of instruction s that tell the computer what to do and data that the program uses when it is running.

If an insurance policy covers individual losses up to $10,000 and has a deductible of
$500, the insured will be paid how much in the event of a covered loss of $5,000?

Answers

Answer: $4500

Explanation:

The deductible is the amount that the insured that is, the policy holder will have to pay. In this case, there is a covered loss of $5000 and the insured has a deductible of $500.

Therefore, the amount that the insured will be paid will be the difference between $5000 and the deductible of $500. This will be:

= $5000 - $500

= $4500

In the graph shown here, by what percentage are the number of people in computer occupations in general projected to increase?


21%

26%

10%

12%

Answers

The number of people in computer occupations in general is projected to increase at 12%

The chart

Reading the charts, we have the following entries

Software developer applications = 26%Software developer = 21%Computer occupations = 12%Software developers, system software = 10%

Using the above entries, we can conclude that:

The number of people in computer occupations in general is projected to increase at 12%

Read more about bar charts at:

https://brainly.com/question/25069221

She can't part.....her jewels.​

Answers

Answer:

She can't part with her jewels.

Explanation:

:))))

NEED HELP 100 POINTS FOR ANSWER AND BRAINIEST!!! Which comparison operator is used to signify that a value is not equal to another value?
<>
<<
>=
=

Answers

Answer:

We use SQL Not Equal comparison operator (<>) to compare two expressions. For example, 10<>11 comparison operation uses SQL Not Equal operator (<>) between two expressions 10 and 11

Explanation:

<> operator is used to signify that a value is not equal to another value , Option A is the correct answer.

What are Comparison Operators ?

An operator used to compare or relate the value of two number or string is called a Comparison operator.

The value of 0 or 1 is returned on using Comparison Operators.

<> , Not equal to operator signifies that the value are either greater than or less than the other value but not equal in any case.

Therefore <> operator is used to signify that a value is not equal to another value.

To know more about Comparison Operators

https://brainly.com/question/15260168

#SPJ2

please help me please help me.​

Answers

Answer:

dont know man thanks for points tho

but it is 209

Explanation:

Which example can be used to perform a binary search?

Answers

Answer:

In any case, binary search can be used to solve more extensive scope of problem, for example, finding the next smallest or next-biggest element in an array comparative with the target regardless of whether it is present or missing in the array.

Explanation:

In computer science, binary search, otherwise called logarithmic search, is a search calculation that finds the position of an objective incentive inside an arranged array. Binary search compares  the  target value to the center component of the array. In the event that they are not equivalent, the half in which the value can't lie is dispensed with and the search proceeds on the other half, again taking the center value to contrast with the target value, and continues this until the target value is found. On the off chance that the search ends with the other half being empty, the target value isn't in the array.

Binary search is quicker than linear search aside from small arrays. Nonetheless, the array should be arranged first to have the option to apply  binary search. There are particular data structures intended for quick looking, for example, hash tables, that can be looked through more effectively than binary search.

What is the BCC feature used for?

to format email message text in a custom font
to format email message text in a blind font
to send a courtesy copy of an email to someone who does not need to take action
to send an email to someone without revealing that person’s email address to others on the distribution list

Answers

Answer:

to send an email to someone without revealing that person’s email address to others on the distribution list

Explanation:

BAM

To send an email to someone without revealing that person’s email address to others on the distribution list.

What is BCC?

"Blind carbon copy" is referred to as BCC. BCC is a similar method to CC for forwarding copies of an email to additional recipients. When CC is used, a list of recipients is shown; when BCC is used, a list of recipients is not visible.

Because the other receivers won't be able to see that the email has been forwarded to another person, it is known as a blind carbon copy.

Carbon copy is referred to as a "CC" in email communication. When there was no internet or email, you had to sandwich a piece of carbon paper between the paper you were writing on and the paper you wanted to use as your copy in order to make a copy of the letter you were writing.

Therefore, To send an email to someone without revealing that person’s email address to others on the distribution list.

To learn more about BCC, refer to the link:

https://brainly.com/question/29398332

#SPJ6

Which are the steps in the process of creating a database

Answers

Answer:

Determine the purpose of your database. ...

Find and organize the information required. ...

Divide the information into tables. ...

Turn information items into columns. ...

Specify primary keys. ...

Set up the table relationships. ...

Refine your design. ...

Apply the normalization rules.

Answer:

identifying fieldnames in tables

defining data types for field names

Explanation:

sorry I'm late. future Plato users this is for you

a user reports that her computer monitor will not allow her to switch back and forth between Microsoft word and internet explorer.

Answers

Answer: B. Interrupts

Explanation:

Interrupts is a feature of digital computers that enables the interruption of the process the computer is currently engaged in so that the computer can process the new command. Interrupts is the reason I am able to type this answer because interrupts is interrupting my browser to process my typing.

If a user reports that their computer monitor will not allow her or him to switch back and forth between Microsoft Word and Internet Explorer, it is possible that the interrupts function is not working effectively to enable the switch. by interrupting one of the programs.

Answer:

.....................

B. Interrupts

which of the following is not a type of operating system software?
a) windows b) linux
c)Macintosh d) Communications and organization​

Answers

Answer:

the answer is communication abd organization

The option that is not a type of operating system software is called; D: Communications and organization​

What are the types of Computer operating system?

An operating system is defined as a type of software that manages the hardware and software of a computer as well as provision of common services.

The most popular Operating Systems for computers are Windows, Linux,  Macintosh. Whereas, the popular types of operating systems for phones are iOS, Android, and Windows.

Read more about Computer Operating System at; https://brainly.com/question/1763761

#SPJ9

Complete the getOdds method so it returns a new ArrayList of Integers containing all odd Integers from the parameter ArrayList vals in the order they originally appeared. The contents of vals should not change. For example if an ArrayList containing the Integers 2, 5, 8, 6, 7, 3, 12 in that order is passed as a parameter to getOdds, it should return an ArrayList containing the Integers 5, 7, 3 in that order. Write your getOdds method in the U7_L2_Activity_Three class. Use the runner class to test your method but do not add a main method to your U7_L2_Activity_Three.java file or your code will not be scored correctly.

Answers

Answer:

Answered below

Explanation:

//Program is written in Java programming language.

public ArrayList<Integer> getOdds( ArrayList<Integer> list){

// Create variables to hold the new list and the //indexes.

int i;

ArrayList<Integer> oddList = new ArrayList<Integer>()

//Loop over the list and add every odd element // to the new list

for ( i = 0; i < list.length; I++){

if ( list[i] % 2 != 0){

oddsList.add(list[i])

}

}

return oddList;

}

The default for automatic replies in outlook is what?

Answers

Answer:

The default for automatic replies in outlook is turned off, so the user has to turn it on in order to use it.

Out.look is a program developed by Micro.soft for managing e-mails, being together with G.mail one of the most used worldwide. As in most of these programs, you can configure automatic responses in order to give a quick and generic response to certain types of messages (or even all). Now, this option is disabled by default, so the user must activate it through the configuration of the email box.

The default for automatic replies in Outlook is

disabled

It is best to

schedule  automatic replies.

Automatic replies may validate your

email  to spammers.

Automatic reply rules are for

conditional  settings like forwarding a message to a coworker.

What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources

Answers

Answer: Trojan horse

Explanation:

Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.

It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.

The motherboard

allows the different parts of a computer to communicate
helps to keep things cool inside the tower
is the memory of the computer
is where the computer is plugged into an outlet in the wall

Answers

Answer:

a:(allows the different parts of a computer to communicate)

Explanation:

The motherboard is the main command center for the whole pc which recieves your inputs and responds by sending outputs...

When we add suffix L to a integer it is called as __________​

Answers

Answer:

Long integer literal.

Explanation:

Integer literal can be defined as numbers that do not contain any decimal point or augmented part. An integer literals can be characterized as decimal, octal, or hexadecimal constant. When an integer liteal is added with prefix it tends to define its base, whereas suffix define its type.

The suffix L to an integer literal means long integer literal. The suffix can be written in any form, either upper case (L) or lower case (l).

Therefore, the correct answer is long integer literal.

Which of the following statements is true when it comes to developing a web presence for a business?

Answers

Explanation:

Customers can learn about a business by downloading a mobile app, but they can’t place an order using an app

 

Building a new website requires a large budget

Choose the type of collection created with each assignment statement

____ collection A = {5:2}
Options: tuple, dictionary, list

____ collection B = (5,2)
Options: tuple, dictionary, list

____ collection C = [5,2]
Options: tuple, dictionary, list

Answers

Answer:

dictionary

tuple

list

Explanation:

Statistics are often calculated with varying amounts of input data. Write a program that takes any number of non-negative integers as input, and outpu

Answers

Answer:

Explanation:

The following program is written in Java and is a function that asks the user for an input and keeps doing so until a negative value is entered, in which case it calculates the average and max values and prints it to the screen.

public static void average () {

                       int num;

                       int sum = 0;

                       Scanner in = new Scanner(System.in);

                       System.out.println("Enter Number");

                       num = in.nextInt();

                       int count = 0;

                       int max = 0;

                       while(num >= 0)

                       {

                               sum+=num;

                               System.out.println("Enter Number");

                               num = in.nextInt();

                               count++;

                               if(num>=max){

                                       max = num;

                               }

                       }

               System.out.println(sum/count);

               System.out.println(max);

               }

Answer:hi

Explanation:

How many minutes are there from 8:00 am to 1:00 pm?

Answers

Well it’s 5 hours so you take 5 times 60m for each hour and you get 300m

Answer:300 minutes

Explanation:

from 8 to 1 is 5 hours so you do 5*60= 300

given a number n for each integer i in the range from 1 to n inclusive print one value per line as follows fizzbuzz if __name__

Answers

Answer:

The program in Python is as follows:

def fizzBuzz(n):

    for i in range(1,n+1):

         print(i)

   

if __name__ == '__main__':

    n = int(input().strip())

    fizzBuzz(n)

Explanation:

This declares the fizzBuzz function

def fizzBuzz(n):

This iterates from 1 to n

    for i in range(1,n+1):

This prints every number in that range; one per line

         print(i)

   

The main begins here

if __name__ == '__main__':

This prompts user for input

    n = int(input().strip())

This calls the fizzBuzz function

    fizzBuzz(n)

. Else-if is good selection statement that help us to solve problems in C++,mostly times same problem of same nature can also be solved via switch statement. Which one you prefer to use and why?

Answers

Answer:

Else-If statements

Explanation:

Personally, I prefer using Else-If statements for conditional statements since you can start with and If statement and add to it if necessary. Aside from this, Else-If statements also allow you to add more than one condition to be met by using tags such as and or and not. Switch statements are better in scenarios where you have a set of possible inputs or results and need a specific event to happen for each input/result, but this is not as common of a scenario so Else-If is usually my go-to conditional statement.

we need to send 254 kbps over a noiseless channel with a bandwidth of 15 khz. how many signal levels do we need

Answers

Answer:

The level of the signal is 353.85

Explanation:

Data rate determines the speed of the data transmission.

The data rate depends on the following factors

The available bandwidthnumbers of signal levelsthe quality of the channel ( Means the level of noise )

The data is transmitted either from a noiseless channel or a noisy channel.

The given quality of the channel in the question is noiseless.

Use the following formula to calculate the signal levels

Bit rate = 2 x bandwidth x [tex]Log_{2}[/tex] ( signal level )

where

Transmitted Data = 254 kbps = 254,000 bps

Bandwidth = 15 khz = 15,000 hz

Placing values in the formula

254,000 = 2 x 15,000 x [tex]Log_{2}[/tex] ( L )

254,000 = 30,000 x [tex]Log_{2}[/tex] ( L )

254,000 / 30,000 = [tex]Log_{2}[/tex] ( L )

8.467 = [tex]Log_{2}[/tex] ( L )

L = [tex]2^{8.467}[/tex]

L = 353.85 levels

Name one characteristic of natural languages that prevents them from being used as programming languages.

Answers

Answer:

Ambiguity.

Explanation:

Natural language of human beings are believed to be ambiguous, as it often required settings punctuation, and intonation to determine certain meanings correctly.

Also is the fact that natural language sometimes has more than one meaning for the same words.

Hence, one characteristic of natural languages that prevent them from being used as programming languages is AMBIGUITY.

Recently, Walmart offered a wireless data contract based on bandwidth used, with a minimum monthly charge of $42 for up to 5 gigabytes (GB) of use. Additional GB can be purchased at the following rates: $12 for an additional 1 GB, $28 for an additional 3 GB, and $44 for a capacity of 10 GB. What is the cost for a user who is expecting to use 9 GB

Answers

Answer:

For 9GB of data the user would pay $82 monthly!

Explanation:

To start off, our end goal is 9GB. We have the equation 9 = ? We can add up to our solutions with 1GB, 3GB, and 10GB. We can immediately rule out 10GB, since 9GB ≠ 10GB. To cost the least amount of money we can add up             3GB and 1GB = 4GB + 5GB = 9GB!

So, our equation is 3GB + 1GB + 5GB = 9GB, now lets figure out the cost!

                                $28 + $12 + $42 = $82

For 9GB of data the user would pay $82 monthly!

Hope this Helps! :)

Have any questions? Ask below in the comments and I will try my best to answer.

-SGO

All of the following describes technology EXCEPT
(a) application of knowledge (b) development of skills
(c) solving of problems (d) prohibiting human capabilities

Answers

Answer: (d) prohibiting human capabilities

Explanation:

Technology can be described as application of knowledge, development of skills or solving of problems.

Technology helps in solving numerous challenges. Technology involves skills and application of knowledge. Every technology used today solves a problem in one way or the other.

Technology prohibiting human capabilities doesn't describe technology. It doesn't limit the abilities of humans but rather improves it.

A __________ is the blueprint for __________ having similar attributes and behaviors. signature, objects class, parameters header, objects signature, parameters class, objects

Answers

Answer: E. class, objects

Explanation:

A class is the blueprint for objects having similar attributes.

As much as classifying something means to define it based on the characteristics that is has that are similar to other things in that class, so also is a class here.

A class is the blueprint or rather template for making objects that have similar attributes which means that the class therefore gives the object its various attributes and its behavior.

A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by
O clicking on the View tab.
O saving a contact.
O creating an appointment.
O flagging an email.

Answers

A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.

What is a Variable Expense?‌

Business expenses can be classified as either fixed (invariable) or variable. A fixed expense does not change based on a business’s other activities. Costs like rent and administrative salaries are fixed costs, which remain the same no matter how much a business is producing. Imagine a factory that produces pencils — the cost of renting the factory building will remain the same, month after month, no matter how many pencils the company actually produces.

Variable expense ratio expresses variable expenses as a proportion of a company's sales. To calculate the variable expense ratio, simply divide the company's total variable expenses by the company's total net sales. To express the result as a percentage, simply multiply it by 100.

Therefore, A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.

Learn more about variable expense on:

https://brainly.com/question/13097236

#SPJ5

Consider a file/directory with the following info:

-rwxr-x--x 1 milk milk 1858 May 1 16:29 abc

Which of the following statement(s) is/are true for the file/directory? Pick ONE OR MORE options

a. abc is a directory.
b. The group the owner belongs to can read and execute abc.
c. All other users can execute abc.
d. The owner can not execute abc.

Answers

Answer:

The statement that is true for the file/directory is:

a. abc is a directory.

Explanation:

A file directory is a computer filing system with cataloging and referencing structure to computer files and other directories.  Also known as folders or drawers, directories are like the workbench or traditional office filing cabinet.  Information is stored in files, which are then stored in directories (folders). Directories can also store other directories to form a directory tree.

"abc" is a directory. A further explanation is below.

A file directory would be a type of computer organizing system that provides cataloging and reference architecture for computer records as well as other directories.Files have been used to hold knowledge, which would be subsequently organized into directories. Additional directories could be stored in directories just to construct its hierarchy.

Thus the above approach is right.

Learn more about the directory here:

https://brainly.com/question/7007432

What is the difference between a programming language and natural (every-day) language?

Answers

Natural languages are used for communication between people
Other Questions
PLEASE HELP: A rectangular prism has a height of 15 centimeters. The base of the prism has an area of 22 square centimeters.What is the volume of the prism What is the "price" that you pay for using less force? If an object moving at 5 m/s accelerates for 30 seconds at a rate of 2m/s^2, what is its final velocity? * math problem plz help me Need to match the pictures and the word bank is it right? 1) 8.7438how do you put this in word form please help me with history What is the measure ofRST? MARKING BRAINLIEST, MUST HAVE REASONABLE ANSWER PLASE HELP ITS DUE IN 2:15!!! I KNOW EVEYONE CAN SEE THIS ;-;LOOK AT THE IMAGE AND ANSWER THESE QUESTIONS:According to the cartoon, where did Japan go next in its search for colonies?What is happening in the cartoon?What does it represent (symbolize)?Also, explain the meaning of the cartoon in your answer. You take a taxi for a distance of 4 miles. You paid $6 for the trip Your friend uses the same taxi company to travel 10 miles , and pays 10.50. How much does the taxi company charge per mile, how much is the taxi companys initial fare?please answer its almost due :((( Geometry question What is the formula to find the surface area of a pyramid with a triangle base? Estimate the square root of 175 to the nearest integer For all the DoroHeDoro fans out there the second season is coming out in the fall 2021 and beastars season 2 is coming out in july 2021 -LucyTheDemon D In a 77-kilometer relay race each of 22 team members will run and equal distance how many kilometers will each team run? What is the value of the expression with base 2 and exponent 5 PLEASE ANSWER THE QUESTION!!!! ILL GIVE BRAINLESTThis image is what kind of art? "Multi-coloredA.)mosaicB.)paintingC.)sculptureD.)calligraphy When Nigerias civil war ended in 1970s if Olivia works 4 hours more each week than her coworker lily, if Olivia works 32 hours in 2 weeks how many hours does lily works What is the organizational structure of this text?The Battle of Gettysburg, was fought from July 1 to July 3, 1863. It is thought to be most important fights of the American Civil War. On July 1, the Confederate Army had a small fight at Union at the crossroads town of Gettysburg. The next day the fighting got worse as the Confederates attacked from the left and right. On July 3, the leader of the Confederate Army, General Lee, ordered an official attack and managed to break through enemy lines. But, by July 4th, Lee had lost so many soldiers he had to turn back. July 4th 1863 is considered an important turning point in the war. A.problem and solutionB.cause and effectC.descriptionD.chronological A boy is pulling a 150 kg crate with a force of 1150 N. If the crate experiences a frictional force of 490 N, find:a) The acceleration of the crate.b) The normal force acting on the crate.