Answer: lma o
Explanation:
I NEED THIS ASAP!!! I"LL GIVE 30 PTS.!!!
2 things are required to make a loop: a. ______________ b. _____________
Answer:
(not quite sure what the question is asking seems you need, but bare minimum is)
an initial value and an increment or decrement
a condition where the loop stops
Explanation:
assuming you have the structure for the loop, depending on the language it could be a for, while or until command. You will always need the initial value for the variable your looping on, how it changes (increment or decrement) and then a condition when the looping in to stop.
e.g. say you want to add up the numbers from 1 to 10, inclusive
sum = 0
for I is 1 to 10 incremented by 1
sum=sum+I
end of loop
Which term describes the gallery that allows you to customize and format text as a graphic?
Pull Quote
Text Box
WordArt
Drop Cap
Answer:
Word Art
sWord art as the ability to be custom designed and formatted as a graphic
Answer:
Word Art
Explanation:
Which code segment results in "true" being returned if a number is even? Replace "MISSING CONDITION" with the correct code segment.
function isEven(num){
if(MISSING CONDITION){
return true;
} else {
return false;
}
}
A. num % 2 == 0;
B. num % 0 == 2;
C. num % 1 == 0;
D. num % 1 == 2;
Answer:
The answer is "Choice A".
Explanation:
In this code, a method "isEven" is declared that accepts the "num" variable in its parameter, and inside the method and if block is declared that checks the even number condition if it is true it will return a value that is "true" otherwise it will go to else block that will return "false" value, that's why other choices are wrong.
The correct code segment that tests if a number is even is num % 2 == 0
When a number is divided by 2, and the remainder after the division is 0, then it means that the number is an even number.
Assume the variable that represents the number is num
The condition that tests for even number would be num % 2 == 0
Hence, the correct code segment that tests if a number is even is (a) num % 2 == 0
Read more about boolean statements at:
https://brainly.com/question/2467366
What’s ur guys rank of all 3D Mario games (all of these are great games btw)? These are my opinions I’d rly enjoy hearing yours. I’d say mine is
8. Super Mario 64
(sorry guys just all the bottomless pits were an issue and sometimes I was frustrated like with tryna shoot the cannon getting all those coins in the first level and the little corner parts in front of the pyramid but overall rly important and still fun)
8.5/10
7. Super Mario Sunshine
(it’s like Mario 64 but less frustrating without the bottomless pits and have to start all the way over but still has the issue of having to climb all the way up from high areas but those are the only issues with these two and how they have to )
8.8/10
6. Super Mario 3D Land
(not as mind blowing as 3D World or as big as it but still fun)
9/10
5. Bowsers Fury (actual power ups and it’s one interconnected world with a giant bowser and most of it is platforming challenge after platforming challenge which I like in my 3D Mario games)
9.3
4. Super Mario Odyssey (it’s great and not a lot of bottomless pits but the moons don’t feel super worth because of how many there are sometimes I stumble onto them)
9.5/10
3. Super Mario 3D World (I’ve had it since kindergarten ok? Its basically 3D Land but even better with tons of platforming challenges and even tho the first 6 or 7 worlds are a cakewalk the later parts get harder and harder and it’s super fun with friends)
9.9/10
1 & 2 tie Mario Galaxy 1 & 2 (I’ve had the first since I’ve existed and I recently got the second and I somehow feel so nostalgic towards it even tho I’ve never played it before this year (a lot of games from around 2009-2011 I feel nostolgic for even tho I’ve never played them) these two games are basically perfect with the only bad level being cleaning up trash for that robot but with the gravity mechanics and super fun platforming challenges while also being super original they are going to stand the test of time I’m sure of it)
10/10
Answer:
super mario galaxy best of all time
Explanation:
Which conditional tab would you use to add a quick style to a form or report? Arrange Design Format Page Setup
Answer:Format
Explanation:
(14) Click on the
sloping forwards
button to change the selected text to appear
(Bold Italic)
Click on which button to change the selected text to appear sloping forward: Mouse button
What are the functions of a mouse?To give you an idea of all the mouse capabilities, here is a list of all the computer mouse functions and options.
Move the mouse pointer on the screen - The primary function is to move the mouse pointer on the screen.
Point - After moving the mouse, you can point something out to another user or a digital object. In a game, for example, you can use the mouse to point a gun in the direction you want to shoot.
Open or run a programme - After pointing to an icon, folder, or other object, clicking or double-clicking that object opens the document or runs the programme. Some programmes even allow you to triple-click. For more information on, please visit our click page.
To know more about Mouse, click on the link :
https://brainly.com/question/14399800
#SPJ1
Which of these is a compound morphology?
A.
bookkeeper = book + keeper
B.
happiness = happy + ness
C.
books = book + s
D.
banker = bank + er
Answer:
D.
Explanation:
yarn po answer ko po eh
because bank +er =banker
2) Some graphics have usage restrictions on them. What are some copyright laws out there that affect usage of images, graphics, and photos?
(I don’t really understand what they’re asking, any help is appreciated!)
Explanation:
Ok what is Copyright The copy of something without using credit
Why do computers use binary code?
Answer:
To make sense of complicated data, your computer has to encode it in binary. Binary is a base 2 number system. Base 2 means there are only two digits—1 and 0—which correspond to the on and off states your computer can understand
Answer:
It has two clearly distinct states that provide a safety range for reliability and the least amount of necessary circuitry, which results in the least amount of space, energy consumption, and cost.
Does anyone know what episode Hinata threatens useless sakura?
Answer:
it was in 367 or in the 400 it was a dream that ten ten had
Explanation:
Give five examples of physical networking.
Answer:
Fully connected Network Topolgy, Common Bus Topolgy, Mesh Network Topolgy, Star Network Topolgy, and Ring Network Topolgy.
Explanation:
:what is the most important part of a computer
:what are the modern processors called
:what is the most important part of a computer
:what is the engine that drives every computer
goodluck :)
Answer:
a
Explanation:
True or False A safety data sheet (SDS) is a technical document or bulletin that summarizes the health and safety information available about a controlled product.
Answer:
True.
Explanation:
The Occupational Safety and Health Administration (OSHA) is a federal agency saddled with the responsibility of assuring and ensuring safe and healthy working conditions for employees by setting and enforcing standards, providing education, trainings and assistance to various organizations.
According to the Occupational Safety and Health Administration (OSHA), trainings on the adoption and application of safety precautions (tools) such as wearing a personal protective equipment e.g masks (respirators), ear plugs, safety boots, gloves, helmet, etc. are very important and are essentially to be used by employees (workers) while working in a hazard prone environment or industries. Therefore, all employers of labor are required to provide work tools and ensure that their employees properly use those tools, as well as abide by other safety precautions and standards highlighted in the safety data sheet.
A Safety Data Sheet (SDS) can be defined as a text-based document or bulletin that provides information with respect to the chemical and physical properties such as flammability, temperature, radioactivity, etc., of a substance or equipment. Also, it contains information on the potential health hazards and safety precautions for proper use (handling), storage and transportation of such substance or equipment.
Hence, a safety data sheet (SDS) is a technical document or bulletin that summarizes the health and safety information available about a controlled product such as toxic chemicals, radioactive elements, weapons or ammunition, etc.
is this even possible
Answer:
yes
Explanation:
The fastest WPM was 216 wpm
Answer:
Yes it is
Explanation: Because the 96 is how fast you typed and the 100 is what words you typed correctly.
Describe an example of organisms with different niches in an ecosystem.
Explanation:
Organism seems to have its own bearable environments for many ecological parameters and blends into an ecological system in its own unique way. A aquatic species' niche, for particular, can be characterized in particular by the salt content or saltiness, pH, and surrounding temperature it can absorb, and also the kinds of food it can consume.
5.10.4: Snake Eyes
My code:
var SENTINEL = 1;
function start(){
var diceOne;
var diceTwo;
while(true) {
println("" + diceOne + "," + diceTwo);
diceOne = Randomizer.nextInt(1,6);
diceTwo = Randomizer.nextInt(1,6);
if (diceOne && diceTwo == SENTINEL){
println("" + diceOne + "," + diceTwo);
break;
}
}
}
What am I doing wrong here?
Answer:
You didn't specify what the function actually does. BTW, good luck coding, I love coding and it is lots of fun, just stick with it!
Explanation:
What protects your computer so that it doesn't get a computer virus?
Answer:
an anti-virus program such as avg
What strategies do businesses use to protect their networks from internal threats?
select all that apply
-having employees change their passwords regularly
-requiring a login to access the network
-using dial-up connections to access the Internet
-implementing peer-to-peer networking
-providing employees with access privileges
Answer:
I think the answers would most definitely be requiring a login to access the network because if businesses had a network with no login, anyone could get into it. Others would be providing employees with access privileges so that way ONLY employees may get into certain things, and possibly having employees change their passwords regularly so that way, anyone who has the employees previous password can't log in at any time to steal anything cause it's changed.
Hope this helped! Have a great day! - Olli :]
List three tasks that fall under the banner of MAM, and define their purpose.
Answer:
focus on device activation
enrollment and provisioning
licensing, configuration and maintenance
Explanation:
En la historia del Computador porque se caracteriza la primera generación? *
1 punto
a.Por que se reemplazo el ábaco
b.ninguna de las anteriores
c.Por la implementación del calculo
d.Por el uso de tubos de vacío
D. Por el uso de tubos de vacio.
How does computer science play a role in art?
Answer:
Many artists now learn to code; computer scientists develop algorithms with aesthetics as the goal. Projects such as Deep Dream, a program that uses neural networks to produce new visuals, let anyone use AI approaches to generate, ostensibly, art.
Match the word with the correct statement: "A decision made in a program where it decides to move on, based on an event" Program Conditions Boolean logic Selection Value Iteration
Answer:
Conditions
Explanation:
im right
How does cybercrime impact the economy? Select 3 options,
People lose their job
Intellectual property is stolen,
It stimulates the economy.
Businesses are ruined,
Opportunities are created.
Answer:
People lose their jobs.
Intellectual property is stolen.
Businesses are ruined.
Explanation:
got it right on edge
Cybercrime impact the economy by:
People lose their jobs.Intellectual property is stolen.Businesses are ruined.What is the effect of cybercrime in the economy?The growing rate of cybercrime issues is one that has lead to high cost in the economy of the world and it has also lead to global losses.
Conclusively, a lot of business has closed up due to cybercrime and the government now spends resources that can be used for other purposes to fight cybercrime.
Learn more about Cybercrime from
https://brainly.com/question/25157310
Which activity can produce bugs that are harmful to the security of a Web server?
Answer:
A. Software updates
Explanation:
Updating the software of something can affect how the hardware works, which can lead to making the server easier to access. A good example is the US government using at max win 7 (in some cases, XP) due to possible security issues with Win 10.
3. Choose the statement that best describes a ray. A ray extends forever in both directions. B ray is a part of a line with two endpoints. C ray is an exact location. D ray has one endpoint and continues forever in the opposite direction.
Answer:
Ray is part of a line that starts at one point and extends forever in one direction.
Explanation:
In geometry, a ray can be defined as a part of a line that has a fixed starting point but no end-point. It can extend infinitely in one direction. On its way to infinity, a ray may pass through more than one point. The vertex of the angles is the starting point of the rays.
Extra
B. A part of a line with two endpoints?
line segment
A line segment has two endpoints. It contains these endpoints and all the points of the line between them. You can measure the length of a segment, but not of a line. A segment is named by its two endpoints, for example, ¯AB.
Answer:
Ray is part of a line that starts at one point and extends forever in one direction.
Explanation:
According to programming best practices, how should you handle code that needs to be repeated several times in a program?
Store the code on a website and reference the website when it is needed.
O Store the code only in a code library, not in the actual app's code.
Have the code appear only once in the program and reference it when it is needed.
O Copy the code as many times as needed so that each usage is separate.
Explanation:
Copy the code as many times as needed so that each usage is separate.
Which of the following best describes what a long-term goal is?
Ashton assigned a string value to a variable. Which program statement should he use?
1myAge = "thirteen"
my age = "thirteen"
myAge = "thirteen"
myAge! = "thirteen"
Answer: c because there cant be numbers or simboles also nooooooo spaces
Explanation:
brainlyist plz
Answer:
myAge = "thirteen"
Explanation:
A summer camp offers a morning session and an afternoon session. The list morningList contains the names of all children attending the morning session, and the list afternoonList contains the names of all children attending the afternoon session.
Only children who attend both sessions eat lunch at the camp. The camp director wants to create lunchList, which will contain the names of children attending both sessions.
The following code segment is intended to create lunchList, which is initially empty.
It uses the procedure IsFound (list, name), which returns true if name is found in list and returns false otherwise.
FOR EACH child IN morningList
{
}
Which of the following could replace so that the code segment works as intended?
(A)
IF (IsFound (afternoonList, child))
{
APPEND (lunchList, child)
}
(B)
IF (IsFound (lunchList, child))
{
APPEND (afternoonList, child)
}
(C)
IF (IsFound (morningList, child))
{
APPEND (lunchList, child)
}
(D)
IF ((IsFound (morningList, child)) OR
(IsFound (afternoonList, child)))
{
APPEND (lunchList, child)
}
Answer:
The answer is "Option A".
Explanation:
In this question, the choice "A" is correct because in this a conditional if block statement is used that that use "IsFound" method that takes two parameters "afternoonList and Child" in its parameter and use the append method that takes "lunchList and child" in parameter and add values, that's why other choices are wrong.
Leah wants to add an image to her updated presentation, so she wants to access the Help interface. What should Leah do to access the interface?
Answer: 0
Explanation: 1/2
Answer:
a
Explanation: