Which programming paradigm does the programming language JavaScript follow?
A. procedural programming
B. object-oriented programming
C. functional programming
D. Imperative programming​

Answers

Answer 1

Its not functional programming (sorry)

Answer 2

Answer:

Object-oriented programming

Explanation:

Just took the test and got it right

Happy to help !!

 Which Programming Paradigm Does The Programming Language JavaScript Follow? A. Procedural Programming

Related Questions

Assignment: Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Risk Management and Information Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Answers

Answer:

Following are the response to the given question:

Explanation:

They are already talking business to business collects in which we are calling the client for collecting whenever the products which we have purchased are overdue and overdue inside 30 days. About business criteria, we should ensure no other websites mostly on agent acting open up so that nobody can misuse it; we also have to know the correct revising and trying to run off all systems and therefore all apps are organ systems because then the critical business work time has would not get out of the way. This is about the security of information. The agents also are adequately taught in IT policy according to the demand of the company.

They soon come towards the area of risk, experience, and skill. All agents ought to have proper refresh sessions to fulfill GAP knowledge but also improve their abilities for 100 percent cent accuracy on TAT on every appeal. Your Agency's response.

There ought to be a right party connect. We must keep up with 80-20 RULE which means that we can easily acquire the bigger amount earlier than somehow investing whatever money for future production if we concentrate on TOP 20 Overdue Current Passengers.

When we add up the current sum owing as well as the amount due by both the end of the month, so we will subtract all promises that were made by the end of each month. You can readily deduce how long and how much money will be received by the end of each month, and how long this will be due by the end of each month.

The total danger which we imagine to be cash flow issues is when a company is close to collapse or even has a money problem, they are few risks that any company has.

To solve this RISK to money flow clients, we have to provide them a payment plan so that we could at the very least invest some cash in additional production. Besides offering customers a pay system, you truly cannot help.

Another key potential risk is the unrequired quantity on the accounts of the consumer. Underneath the U.S. government, it'll be a direct responsibility of the government if there is an unclear and unapplied amount which has lied to an account for even more than 4 years.

Therefore it does have to do about risk, skills, knowledge the safety of information. All above theory helps explain everything which enables the execution of operations as well as, as project manager, we have to track input and output information. we need to charge, past due, credits, debits, PD percent every week and month, seeing the company's pattern, and also transform policies as to how the trend or even the forecast can enhance.

write a program to input 100 students marks and find the highest marks among the them​

Answers

Answer:

Explanation:

The following code is a Python program that allows you to input 100 marks. You can input the value -1 to exit the loop early. Once all the marks are entered the program prints out the highest mark among all of them. The output can be seen in the attached picture below with a test of a couple of marks.

marks = []

for x in range(100):

   mark = int(input("Enter a mark: "))

   if mark == -1:

       break

   else:

       marks.append(mark)

print("Max value: " + str(max(marks)))

In this code, there's a Person class that has an attribute name, which gets set when constructing the object. Fill in the blanks so that 1) when an instance of the class is created, the attribute gets set correctly, and 2) when the greeting() method is called, the greeting states the assigned name. mtino 1-class Person: 2 - def __init__(self, name): self.name = def greeting(self): # Should return "hi, my name is " followed by the name of the Person. return Run 8 # Create a new instance with a name of your choice 9 some_person = 10 # Call the greeting method 11 print (some_person. ) 12 Press ESC to exit the code block at any time

Answers

Answer:

Explanation:

The following code is written in Python. It creates a Person class and creates the constructor which takes in the name of the person for that instance, as well as a greeting method which outputs the desired "Hi, my name is" string with the name of that person. The output of the code can be seen in the attached picture below. I have created a person object called John and called the greeting method so that you can see the output.

class Person:

   name = ''

   def __init__(self, name):

       self.name = name

   def greeting(self):

       print('Hi, my name is ' + self.name)

The code containing the Person class definition and the greeting is found in the attached image

The Person class has a single instance field name that stores the name of the person.

The instance initializer, __init__, accepts an argument, name, and saves the value in the name attribute of the Person class.

The Person class also has a greeting method that is called by the main code segment. The main code segment creates a Person object, and calls it in the print function to display the greeting with the person's name.

Learn more about classes in Python here https://brainly.com/question/21065208

17.8.1: Writing a recursive math function. Write code to complete raise_to_power(). Note: This example is for practicing recursion; a non-recursive function, or using the built-in function math.pow(), would be more common.

Answers

Answer:

The recursion function is as follows:

def raise_to_power(num, power):

if power == 0:

 return 1

elif power == 1:

 return num

else:

 return (num*raise_to_power(num, power-1))

Explanation:

This defines the function

def raise_to_power(num, power):

If power is 0, this returns 1

if power == 0:

 return 1

If power is 1, this returns num

elif power == 1:

 return num

If otherwise, it calculates the power recursively

else:

 return (num*raise_to_power(num, power-1))

. Write the advantages and disadvantages of CLI?

Answers

If you know the commands, a CLI can be a lot faster and efficient than any other type of interface. ...A CLI requires less memory to use in comparison to other interfaces. ...A CLI doesn't require Windows and a low-resolution monitor can be used

How to open an image by using the command prompt? I need the explanation step by step. Please Help.

Answers

Open a file from Windows Terminal

In a command prompt window, type cd followed by the path of the file that you wish to open. After the path matches with the one in the search result. Enter the file name of the file and press Enter. It will launch the file instantly.

1. Which of the following is a new
generation optical storage device?
CD
DVD
Blu-ray disc
Pen drive

Answers

Answer:

CD or CD Rom

fhiykkoojnddeyui

Write a program that grades arithmetic quizzes as follows: Ask the user how many questions are in the quiz. Ask the user to enter the key (that is, the correct answers). There should be one answer for each question in the quiz, and each answer should be an integer. They can be entered on a single line, e.g., 34 7 13 100 81 3 9 10 321 12 might be the key for a 10-question quiz. You will need to store the key in an array. Ask the user to enter the answers for the quiz to be graded. As for the key, these can be entered on a single line. Again there needs to be one for each question. Note that these answers do not need to be stored; each answer can simply be compared to the key as it is entered. When the user has entered all of the answers to be graded, print the number correct and the percent correct.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

int main(){

   int questions, answer;

   cout<<"Questions: ";

   cin>>questions;

   int answerkey[questions];

   cout<<"Enter answer keys: ";

   for(int i = 0; i< questions; i++){

       cin>>answerkey[i];    }

   int correct = 0;

   cout<<"Enter answers: ";

   for(int i = 0; i< questions; i++){

       cin>>answer;

       if(answer == answerkey[i]){

           correct++;        }    }

   cout<<"Correct answers: "<<correct<<endl;

   cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";

   return 0;

}

Explanation:

This declares the number of questions and the answers submitted to each equation

   int questions, answer;

Prompt to get the number of questions

   cout<<"Questions: ";

This gets input for the number of questions

   cin>>questions;

This declares the answerkey as an array

   int answerkey[questions];

Prompt to get the answer key

   cout<<"Enter answer keys: ";

This iteration gets the answer key for each question

   for(int i = 0; i< questions; i++){

       cin>>answerkey[i];    }

This initializes the number of correct answers to 0

   int correct = 0;

Prompt to get the enter the answers

   cout<<"Enter answers: ";

This iterates through the answer keys

   for(int i = 0; i< questions; i++){

This gets the answer to each question

       cin>>answer;

This compares the answer to the answer key of the question

       if(answer == answerkey[i]){

If they are the same, correct is incremented by 1

           correct++;        }    }

Print the number of correct answers

   cout<<"Correct answers: "<<correct<<endl;

Print the percentage of correct answers

   cout<<"Percentage correct : "<<(100 * correct)/questions<<"%";

Create a new Java program called Flip. Write code that creates and populates an array of size 25 with random numbers between 1-50. Print the original array. Print array in reverse.

Answers

Use the website code .org to help you

Match each code snippet to its appropriate markup language name. XML CSS HTML XHTML


Answers

Answer:

Please find the complete solution in the attached file.

Explanation:

answer:

<p>line break</p><br/>  : XHTML

<Address>24, North Block</Address> : XML

<P>New paragraph</P> : HTML

<h2 style=“color:red;font-size:12px;”>Heading in red color.</h2> : CSS

just truuust

1. ¿Qué es un cursograma?

Answers

Answer:

Un cursograma permite representar gráficamente procedimientos administrativos. Constituyen instrumentos importantes para la visualización global y esquemática del conjunto de tareas administrativas.

Un cursograma permite representar gráficamente procedimientos administrativos. Constituyen instrumentos importantes para la visualización global y esquemática del conjunto de tareas administrativas.

Ojalá te ayude !:)

Justin Kace is promoting the metric system and wants people to be able to convert miles to kilometers and kilometers to miles. Develop a program that asks the user for a number of miles and converts miles to kilometers (multiplying miles by 1.609), and then asks for a number of kilometers and converts kilometers to miles (multiplying kilometers by 0.6214).

Answers

Solution :

//Program heading

Display "Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program"

//Get [tex]$\text{Miles}$[/tex]

Display "Enter the [tex]$\text{miles}$[/tex]: "

Input [tex]$\text{miles}$[/tex]

//Convert [tex]$\text{miles}$[/tex] to kilometers and display result

converted_km =[tex]$\text{miles}$[/tex] x 1.609

Display "Converted kilometers = " + converted_km

//Get Kilometers

Display "Enter the kilometers: "

Input km

 

//Convert kilometers to [tex]$\text{miles}$[/tex] and display result

converted_[tex]$\text{miles}$[/tex] = km x 0.6214

Display "Converted [tex]$\text{miles}$[/tex] = " + converted_[tex]$\text{miles}$[/tex]

//Thank the user for using this program

Display "Thank you for using this program. Good-bye!"

Stop

Sample Output:

Kilometers to [tex]$\text{Miles}$[/tex] and [tex]$\text{Miles}$[/tex] to Kilometers Conversion Program

Enter the [tex]$\text{miles}$[/tex]: 10

Converted kilometers = 16.09

Enter the kilometers: 10

Converted [tex]$\text{miles}$[/tex] = 6.214

Thank you for using this program. Good-bye!

Write a function definition for a function which takes one parameter and returns twice that parameter

Answers

Answer:

The function in python is as follows:

def twice(num):

   return 2 * num

Explanation:

This defines the function; The function receives num as its parameter

def twice(num):

This returns twice of num

   return 2 * num

What can be viewed in the Tasks folder? Check all that apply

Answers

Answer: task details; appointments; to do list

Explanation:

Task folders, simply allows an individual organize their tasks in a logical manner. It performs an identical function just like a file directory.

Folders can be created in the root folder. Once can also create them as subfolder in the other files. The task details, appointments and the to do list can be viewed in the task folder.

What is wrong with a MOV BL, CX instruction?

Answers

Answer:

The MOV bl , cx instruction is wrong because the contents of cx are to big for bl .

I think this is the answer.

Declare a typedef struct named jumper_t that will have four parts: character array name that is 16 in length, double array of tries that is N_TRIES in length, double best_jump, double deviation 2. Write one line to declare an array variable, named jlist of the above struct type, with a length of ten. No initialization required.

Answers

Answer:

The typedef struct is as follows:

typedef struct jumper_t {

  char name[16];

  double tries[N_TRIES];

  double best_jump;

  double deviation;

} jumper_t;

The declaration of jlist is:

jumper_t jlist[10];

Explanation:

This defines  the typedef structure

typedef struct jumper_t {

The following declares the variables as stated in the question

  char name[16];

  double tries[N_TRIES];

  double best_jump;

  double deviation;

}

This ends the typedef definition

jumper_t;

(b) The declaration of array jlist is:

jumper_t jlist[10];

List 2 end to end test commands.

Will mark Brainliest!!

Answers

Answer:

ibm pll

Explanation:

In theory, a hacker with a small but powerful directional antenna could access a wireless network from more than one mile away. In a real-world situation, what is the more likely range involved

Answers

100 miles i assume since the avarge antanna cover 5-50 miles

Please help it’s timed

Answers

Answer:

you are proooooooooooooooooooo

Explanation:

A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a:

Answers

Answer:

True. A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a: Direct-action virus.

Explanation:

A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.

What is Direct-action virus?

A direct action computer virus is known to be a virus class that is said to be self-multiplying malware that is known to be attached to any executable file.

Therefore, Note that A virus that loads itself onto the target system's memory, infects other files, and then unloads itself is called a Direct-action virus.

Learn more about virus from

https://brainly.com/question/26128220

#SPJ2

explain 5 important of using a word processor​

Answers

Answer:

Spelling

Word processors contain an electronic spell checker. The student writer has immediate feedback about misspelled words. Student must discern which of the computer-generated spellings is correct for the context. Teachers no longer have to red-ink spelling errors. They can focus on the few exceptions the spellchecker does not catch.

Security

Teachers and students gain a sense of security about losing assignments. When the student saves her work, she avoids the possibility of the assignment being lost or misplaced. If an assignment is ever misplaced, a replacement can be easily printed.

Legibility

Teachers benefit by receiving a readable copy that is easy to grade. Students with poor handwriting can increase their scores with better looking papers. Students should be instructed to turn in copies of work in a readable font.

Publishing

Work done on a word processor can easily published on a bulletin board. Teachers can create electronic anthologies of their students' writings. Each student can receive an electronic copy of published works with no printing costs.

Mobility

Work done on a word processor and saved on the Internet is highly portable and accessible from any computer with Internet access. Dogs do not eat papers in cyberspace. "I forgot it at home" is irrelevant. Just log onto the nearest computer and your work appears on the screen.

Explanation:

Answer:

1. they are faster creation of document.

2.document can be stored for future use.

3. quality document are created.

4. it has access to higher variation.

5. tiredness Is greatly reduced.

any computer and technology experts?


1. what is a file
2. what is a folder
3. what is a subfolder
4. how files are organized in folders and subfolders
5. what is a file extension
6. types of file extensions
7.the importance of file extensions

Answers

Answer:

file is the common storage unit in a computer, and all programs and data are "written" into a file and "read" from a file. A folder holds one or more files, and a folder can be empty until it is filled. A folder can also contain other folders, and there can be many levels of folders within folders.

a subfolder is an organizational folder on a computer that is located within another folder

Explanation:

sorry i dont know all

Define a method calcPyramidVolume with double data type parameters baseLength, baseWidth, and pyramidHeight, that returns as a double the volume of a pyramid with a rectangular base. calcPyramidVolume() calls the given calcBaseArea() method in the calculation.

Answers

Answer:

The method in C++ is as follows:

double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

   double baseArea = calcBaseArea(baseLength, baseWidth);

   double volume = baseArea * pyramidHeight;

   return volume;    

}

Explanation:

This defines the calcPyramidVolume method

double calcPyramidVolume(double baseLength, double baseWidth, double pyramidHeight){

This calls the calcBaseArea method to calculate the base area of the pyramid

   double baseArea = calcBaseArea(baseLength, baseWidth);

This calculates the volume

   double volume = baseArea * pyramidHeight;

This returns the volume

   return volume;  

}

See attachment for complete program that include all methods that is required for the program to function.

LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed
a. print

b. random

c. else

d. while

Answers

Question:

LaToya is creating a program that will teach young children to type. What keyword should be used to create a loop that will print “try again” until the correct letter is typed

Answer:

d. while ✓

Explanation:

The while loop is used to repeat a section of code an unknown number of times until a specific condition is met.

[tex] \\ \\ [/tex]

Hope it helps

-------☆゚.・。゚ᵴɒƙυᴚᴀ_ƨȶäᴎ❀

The length of a list can be determined through the index function

True

False

Answers

Answer:

false

Explanation:

Write a program to sort the (name, age, score) tuples by descending order where name is string, age and score are numbers. The sort criteria is: 1: Sort based on name 2: Then sort based on age 3: Then sort by score The priority is that name < age < score. If the following tuples are given as input to the program: [('John', '20', '91'), ('Jason', '21', '85'), ('Jony', '17', '91'), ('Johny', '17', '93'), ('Tom', '19', '80')]\

Answers

Answer:

The program in Python is as follows:

from operator import itemgetter

m = int(input("Number of records: "))

print("Name, Age, Score")

my_list =[]

for i in range(m):

   user_details = input()

   my_list.append(tuple((user_details.split(","))))

my_list.sort(key =  itemgetter(0, 1, 2))        

print("Sorted: ", my_list)

Explanation:

This imports the operator function from itemgetter

from operator import itemgetter

This gets the number of records, m

m = int(input("Number of records: "))

This prints the format of input

print("Name, Age, Score")

This initializes the list of tuples

my_list =[]

This iterates through m

for i in range(m):

This gets the details of each person

   user_details = input()

This appends the details to the tuple

   my_list.append(tuple((user_details.split(","))))

This sorts the tuple

my_list.sort(key =  itemgetter(0, 1, 2))        

This prints the sorted tuple

print("Sorted: ", my_list)

They need network security skills to know how to perform tasks such as:

A. Testing software before launching.
B. maintaining databases.
C. investigating virus attacks​

Answers

B) maintaining databases

Answer:

Your answer should be C

because in they will protect the data base from virus.

Question # 4
Fill in the Blank
Complete the following sentence.
The first email was sent in
.

Answers

Answer:

1971

Explanation:

If there is more detail needed i'm sorry

Answer:

1971

Explanation:

#Nova

Have a great day!

:)

User account
2. The system allows user to register and create the account
3. Users allowed by system to edit & modify the account
4. System allows users to view products
5. System allows users to comment on product
6. Perform sentiment analysis
7. Use APS to connect to product
8. Review website to collect comment of product
9. System dynamically analyze command of users
10. Matching keyword in database
11. system allots rank to product as good, bad and ugly
12. view product review
13. users can use system to view product
14. manage users account
15. all users account allowed to be added or modified , and deleted by administrator


Non Functional Requirements:

1. Efficiency

2. Interoperable

3. Portability

4. Security

Part A: Answer the following questions prefer to the previous requirements?

Question :

Three Use-Case Narrative. Choose one major use-case for each player (Customer, Shop Owner, and Administrator).

Answers

Numa máquina térmica uma parte da energia térmica fornecida ao sistema(Q1) é transformada em trabalho mecânico (τ) e o restante (Q2) é dissipado, perdido para o ambiente.



sendo:

τ: trabalho realizado (J) [Joule]
Q1: energia fornecida (J)
Q2: energia dissipada (J)


temos: τ = Q1 - Q2

O rendimento (η) é a razão do trabalho realizado pela energia fornecida:

η= τ/Q1

Exercícior resolvido:
Uma máquina térmica cíclica recebe 5000 J de calor de uma fonte quente e realiza trabalho de 3500 J. Calcule o rendimento dessa máquina térmica.

solução:

τ=3500 J
Q1=5000J

η= τ/Q1
η= 3500/5000
η= 0,7 ou seja 70%

Energia dissipada será:



τ = Q1 - Q2
Q2 = Q1- τ

Q2=5000-3500
Q2= 1500 J

Exercicio: Qual seria o rendimento se a máquina do exercicio anterior realizasse 4000J de trabalho com a mesma quantidade de calor fornecida ? Quanta energia seria dissipada agora?



obs: Entregar foto da resolução ou o cálculo passo a passo na mensagem

which data type uses %i as a format specifier​

Answers

Answer:

A decimal integer

Explanation:

Hope this helps!

Other Questions
if y=4x what does m equal Hart Attorney at Law experienced the follwoing transactions in 2016, the first year of operations:1. Accepted $36,000 on 4/1/16, as a retainer for services to be performed evenly over the next 12 months (2) Performed legal services for cash of $54,000 (3) Purchased $2,800 of office suppies on account (4) Paid $2,400 of the amount due on accounts payable (5) Paid a cahs dividend to the stockholders of $5,000 (6) Paid cash for operationg expenses of $31,000 (7) Determined that at the end of the accounting period $200 of office supplies remained on hand (8) On 12/31/16, recognized the revenue that had been earned for services performed in accordance with Transaction 1Problem: Show the effects of the events on the fianncial statements using a horizontal statement model. Phyllis Schlafly a ran for President in 1972 b created the Special Olympics c considered the defeat of the ERA as a victory for women's rights. d fought diligently for the passage of the ERA. I need help!!!!!!!!!!!!!!!!!!!!!!!!!!!!! PLEASE HELP. I NEED ASAP WILL GIVE BRAINLIEST. WORTH A LOT OF POINTSRonald was given the pair of equations shown below, which are in slope-intercept form (y = mx + b):y = 3x 2y = 5x 6Part A: Ronald does not know how to solve the system of equations. Help him by writing the slope (m) and y-intercept (b) for each equation, and in your own words, explain how you can solve the pair of equations graphically.Part B: Now that you have helped get Ronald started, solve the system and write the solution to the pair of equations in (x, y) format so Ronald can check his work and answer. What is the main problem with this introduction paragraph? We're your parents wishing for a boy or a girl when they were expecting you? Many forms of recreation have been unfairly classified as for boys or for girls This is a shame because it makes both boys and girls afraid to try activities that they could really enjoy. Boys and girls should be allowed to participate in any activities they enjoy and should be supported by friends and family in doing so. (BTW THIS IS LANGUAGE ARTS LOL) What is taxes? What is Texas' tax rate? Simplify for ez points! Expand and combine like terms.(4b^2+ 3) (4b^2- 3) =1SEE ANSWER PLZ HELP PLZ PLZ ILL MARK AS BRAINLIESTT!! based on the graph below, which statement Sandhill Co. purchased machinery that cost $2800000 on January 4, 2019. The entire cost was recorded as an expense. The machinery has a 9-year life and a $180000 residual value. The error was discovered on December 20, 2021. Ignore income tax considerations.Before the correction was made, and before the books were closed on December 31, 2013, retained earnings was understated by:____. If the U.S. engages in free trade and the international price of skateboards is $75, it would import _____ skateboards from the rest of the world. Is this an alpha or beta decay? Which country is not the origin of Latinos? Spain Guatemala Chile Brazil Solve for x algebraically x/4 6 Assignment: Provide a reflection paper of 500 words minimum (2 pages double spaced) of how the knowledge, skills, or theories of Risk Management and Information Security have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.Requirements: Provide a 500 word (or 2 pages double spaced) minimum reflection. Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. Share a personal connection that identifies specific knowledge and theories from this course. Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. You should NOT provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. Which of the following is not a nonmetal: sulfur, oxygen, silicon, or nitrogen? What happens when magma moves the tectonic plates and pressure builds up The coordinates of the vertices of BEA are B(1,2), E(-5,3), and A(-6,-3). Prove that BEA is isosceles. State the coordinates of point R such that quadrilateral BEAR is a square. Prove that your quadrilateral BEAR is a square.