3
Drag each tile to the correct box.
Put the sequence of steps involved in software design in proper order.
Consolidate data elements.
Develop an operational timeline.
Define the interface.
Take into account concurrency and real-
time considerations.

Answers

Answer 1

The correct steps to be taken for software design are:

Define the interface.Consolidate data elements.Take into account concurrency and real-time considerations.Develop an operational timeline.

The correct succession of methods necessary for software design is shown below:

To begin, establishing the interface is essential because it delineates how the software will interact with either the user or any other related software assets.

Subsequently, assembling all necessary data elements is imperative to guarantee that the software can process and regulate data correctly.

Considering both concurrency and immediate conditions is also requisite to make sure the software works proficiently and instantly responds to user input when under strain.

And lastly, introducing an operational timeline permits timely delivery of the program and keeps costs within estimation.

Read more about software design here:

https://brainly.com/question/26135704

#SPJ1


Related Questions

List the name and purpose of twenty (20) different C++ commands.

Answers

Answer:

Drivers and help a new program to run

Red Clay's Customer relations and Marketing departments use big data analytics applications when analyzing company data for decision making. The employees doing data analytics often have no need to see the customers’ names and full account numbers. Identifiers are not needed for many Big Data applications, so the benefits of analytics can be achieved while reducing the privacy and security risks. This is an example of which Fair Information Privacy Practice?

Question 25 options:

De-identification

Collection Limitation

Data Minimization

Use Limitation

Answers

This is an example of this Fair Information Privacy Practice are Data Minimization.

What is the  Data Minimization?

Data minimization is the practice of limiting the amount of personal data collected from individuals to only that which is necessary for the specific purpose(s) for which it is being processed. By collecting and storing only the data necessary for the specific purpose, the risk of data breaches, misuse, and unauthorized access is reduced. Data minimization also helps protect individuals’ privacy and autonomy, as it limits the amount of personal data that can be used to identify, profile, or contact them.

To learn more about Data Minimization.

https://brainly.com/question/15557382

#SPJ1

Someone who expects other team members to work long hours is possibly from a _________ culture.

Participative
Competitive
Cooperative

Answers

Answer:

I'm pretty sure cooperative is the answer.

I hope this helps...

Have a nice day <3

Description:
Read integer inCount from input as the number of integers to be read next. Use a loop to read the remaining integers from input. Output all integers on the same line, and surround each integer with curly braces. Lastly, end with a newline.

Ex: If the input is:

2
55 75
then the output is:

{55}{75}

Code:
#include
using namespace std;

int main() {
int inCount;

return 0;
}

Description:Read integer inCount from input as the number of integers to be read next. Use a loop to

Answers

Here's the modified code that includes the requested functionality:

#include <iostream>

using namespace std;

int main() {

   int inCount;

   cin >> inCount;

   for (int i = 0; i < inCount; i++) {

       int num;

       cin >> num;

       cout << "{" << num << "}"; }

  cout << "\n";

   return 0;}

In this code, we first read the integer inCount from the input, which represents the number of integers to be read next. Then, using a loop, we read each of the remaining integers from the input and output them surrounded by curly braces {}. Finally, we print a newline character to end the line of output.

Learn more about integer loop, here:

https://brainly.com/question/31493384

#SPJ1

Discuss and compare the course of the American, the French, and the Chinese
revolutions and analyze the reasons for and significance of the different outcomes
of these three revolutions?

Answers

The American, the French, and the Chinese revolutions have different outcomes.

Freedom from British rule inspired the American Revolution, whilst abolishing the French Monarchy inspired the French Revolution. Economic tensions and progressive ideas drove the American and French Revolutions in the eighteenth century.

The French Revolution, which took place within French boundaries, posed a direct danger to the French monarchy. The Chinese Revolution was brought on by the communists' defense of the peasants and the assassination of a political party.

Both the American and French Revolutions were heavily influenced by ideas of liberty and equality. Both countries want to be free. America was making an effort to become independent of British laws and taxation.

1917 saw the Russian Revolution, and there was just one year between then and the end of World War II.

To know more about American revolution, check out:

brainly.com/question/18317211

#SPJ1

ProjectSTEM CS Python Fundamentals - Lesson 3.3 Question 2 - RGB Value:

Test 6: Using 256 for all inputs, this test case checks that your program has no output. / Examine the upper condition for each color.

Test 10: This test case sets the input for blue beyond the limit, while red and green are below. It checks if your program's output contains “Blue number is not correct”, but not “Red number is not correct”, or “Green number is not correct” / Check that you output the correct phrase when the number is outside the range. Make sure that only the incorrect color phrases are output.

ProjectSTEM CS Python Fundamentals - Lesson 3.3 Question 2 - RGB Value: Test 6: Using 256 for all inputs,

Answers

While CMYK is frequently used to print out colors, RGB is utilized when the colors need to be presented on a computer monitor (such as a website).Make the variable "alien color" and give it the values "green," "yellow," or "red." To determine whether the alien is green, create an if statement.

How does Python find the RGB color?Colors can only be stored in Python as 3-Tuples of (Red, Green, Blue). 255,0,0 for red, 0 for green, and 255,0 for blue (0,0,255) Numerous libraries use them. Of course, you may also create your own functions to use with them.The rgb to hex() function, which takes three RGB values, is defined in line 1.The ":X" formatter, which automatically converts decimal data to hex values, is used in line 2 to construct the hex values. The outcome is then returned.Line 4 is where we finally call the function and supply the RGB values.Verify the accuracy of the RGB color code provided. While CMYK is frequently used to print out colors, RGB is utilized when the colors need to be presented on a computer monitor (such as a website).

To learn more about Python refer to:

https://brainly.com/question/26497128

#SPJ1

Casey is researching the American Revolution and needs to create a short PowerPoint presentation about the major events of the war. Two websites have all the necessary information, but there are several things that Casey should check besides the information on the sites. What are some things that the website should have before Casey uses it for the project? Provide at least three different things.

Answers

Credible website? Can be one

Which feature enables you to make changes to all the slides of your presentation at the same time?
O A. Themes
• B. Slide Master
O C. Animations
O D. Background

Answers

Answer:

B

Explanation:

In PowerPoint, Slide Master allows you to modify all of your slides at the same time.

your manager asks you to set up a secure network connection at a remote site to move over some backups which protocol would you ues?

Answers

The protocol that should be used for establishing a secure network connection is SSH.  

The following information is to be considered:  

SFTP is secure also it is a protocol for file transferring that applied SSH. IP, FTP, and DHCP should not be for safety purposes as they are not secure. SSH is a secured connection for the remote sites so here the SSH protocol should be used.

Therefore we can conclude that The protocol that should be used for establishing a secure network connection is SSH.

Assuming int numbers[SIZE]; is initialized somehow, write a function counter() that you can send the array to, plus an extra integer, and the function will return the number of times that value is found in the array. For example, if the array of SIZE 7 contains {1,2,3,2,3,3,3}then the call
x=counter(numbers,SIZE,3); will put 4 into x.

Answers

Answer:

Explanation:

The following function is written in Java and takes in three parameters the array, its size, and the chosenNumber that will be counted. The function then creates an instance variable called Counter and loops through the given array looking for the chosenNumber. Every time that the number is found in the array it adds 1 to the counter. Once the loop is done it returns the total value of the counter variable.

 public static int counter(int[] numbers, int Size, int chosenNumber) {

       int counter = 0;

       for (int x = 0; x < Size; x++) {

           if(numbers[x] == chosenNumber) {

               counter++;

           }

       }

       return counter;

   }

9. Computer 1 on network A, with IP address of 10.1.1.10, wants to send a packet to Computer 2, with IP address of
172.16.1.64. Which of the following has the correct IP datagram information for the fields: Version, minimum
Header Length, Source IP, and Destination IP?

Answers

Answer:

Based on the given information, the IP datagram information for the fields would be as follows:

Version: IPv4 (IP version 4)

Minimum Header Length: 20 bytes (Since there are no additional options)

Source IP: 10.1.1.10 (IP address of Computer 1 on network A)

Destination IP: 172.16.1.64 (IP address of Computer 2)

So the correct IP datagram information would be:

Version: IPv4

Minimum Header Length: 20 bytes

Source IP: 10.1.1.10

Destination IP: 172.16.1.64

What is the HIE? What is its purpose?

Answers

Answer:

Electronic health information exchange (HIE) allows doctors, nurses, pharmacists, other health care providers and patients to appropriately access and securely share a patient's vital medical information electronically—improving the speed, quality, safety and cost of patient care.

Explanation:

Answer:

HIE is a system that helps tansport patients when it becomes overwhelmed.

Explanation:

At the point when medical services suppliers approach total and exact data, patients get better clinical consideration. Electronic wellbeing records (EHRs) can improve the capacity to analyze illnesses and lessen risks. Doing this helps patients get timely care. More severe cases can be treated quickly.

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least

Answers

The epa requires spray guns used in the automotive refinishing process to have transfer efficiency of at least  65 percent transfer efficiency.

What is the transfer efficiency

EPA lacks transfer efficiency requirement for auto refinishing spray guns. The EPA regulates auto refinishing emissions and impact with rules. NESHAP regulates paint stripping and coating operations for air pollutants.

This rule limits VOCs and HAPs emissions in automotive refinishing. When it comes to reducing overspray and minimizing wasted paint or coating material, transfer efficiency is crucial. "More efficiency, less waste with higher transfer rate."

Learn more about transfer efficiency  from

https://brainly.com/question/29355652

#SPJ1

Discuss the differences between dimensionality reduction based on aggregation and dimensionality reduction based on techniques such as PCA and SVD.

Answers

Answer:

Following are the difference to this question can be defined as follows:

Explanation:

In terms of projections of information into a reduced dimension group, we can consider the dimension structure of PCA and SVD technologies.  In cases of a change in the length, based on consolidation, there's also a unit with dimensions. When we consider that the days have been aggregated by days or the trade of a commodity can be aggregated to both the area of the dimension, accumulation can be seen with a variance of dimension.

Dimensionality reduction based on aggregation involves selection of important character and variable from a large variable and dimensionality reduction based on techniques with the use of PCA and SVD.

What is dimensionality?

Dimensionality involves reducing features that have been written or identified or constructing less features from a pool of important features.

Principal components analysis(PCA) and Single value decomposition(SVD) is a form or analysis that can be used to reduce some character that are not important to an information and can also help to select important variables from among many variables.

Therefore, dimensionality reduction based on aggregation involves selection of important character and variable from a large variable and dimensionality reduction based on techniques with PCA and SVD.

Learn more on dimensional analysis here,

https://brainly.com/question/24514347

Why is it important to use correct syntax?

ANSWER: D) to ensure the programs run properly and return expected results

Answers

Answer: True

Explanation:

Answer:

D

Explanation:

If your options are

a) to demonstrate a sophisticated programming style

b) to demonstrate a flexible programming style

c)to ensure that programs will work on any computer platform

d) to ensure that programs run properly and return expected results

Then yes this is very much correct!

FELLING GENEROUS GIVING AWAY POINTS:)


Who plays Lol btw (league of legends)
ADD me ign : Davidoxkiller (euw server)

Answers

Answer:

thanksssssssss

Consider the following table used for grading assignments.
Score in points Grade
90-100 A
80-89 B
70-79 C
60-69 D
59 and below F
Your task is to test a course assessment utility that uses the criteria given above. List the valid and invalid equivalent partitions and give the test cases for each. Your test cases are required to incorporate boundary value testing.

Answers

Answer:

We can use if-else statements to implement the given problem.

C++ Code:

#include <iostream>

using namespace std;

int main()

{

   int marks;

   cout<<"Enter the marks"<<endl;

   cin>>marks;

  if (marks>=90 && marks<=100)

  {

cout<<"Grade: A"<<endl;

  }

else if (marks>=80 && marks<=89)

{

cout<<"Grade: B"<<endl;

}

else if (marks>=70 && marks<=79)

{

cout<<"Grade: C"<<endl;

}

else if (marks>=60 && marks<=69)

{

cout<<"Grade: D"<<endl;

}

else if (marks>=0 && marks<=59 )

{

cout<<"Grade: F"<<endl;

}

else

{

cout<<"Invalid marks!"<<endl;

}

   return 0;

}

Test results:

Enter the marks

100

Grade: A

Enter the marks

90

Grade: A

Enter the marks

89

Grade: B

Enter the marks

80

Grade: B

Enter the marks

79

Grade: C

Enter the marks

70

Grade: C

Enter the marks

69

Grade: D

Enter the marks

60

Grade: D

Enter the marks

59

Grade: F

Enter the marks

45

Grade: F

Enter the marks

105

Invalid marks!

Enter the marks

-6

Invalid marks!

Hence all the cases are working fine!

Consider the following table used for grading assignments. Score in points Grade 90-100 A 80-89 B 70-79
Consider the following table used for grading assignments. Score in points Grade 90-100 A 80-89 B 70-79
Consider the following table used for grading assignments. Score in points Grade 90-100 A 80-89 B 70-79
Consider the following table used for grading assignments. Score in points Grade 90-100 A 80-89 B 70-79

If anyone doesn't mind, please help me. Thank you!

If anyone doesn't mind, please help me. Thank you!

Answers

Master will print infinitely since we are never changing the value of x.

given 2,4,3,-1 as input, what is the output for the following program:total_product = 1 user_value = int(input()) while user_value > 0: total_product = total_product * user_value user_value = int(input()) print('Product:', total_product, end='')

Answers

The python program for any of the given values is as written below.

How to run a Program in Python?

We are told to use input for the python program as;

2, 4, 3, -1

Now, the python program using 2 as user value and 1 as total product gives us the program as;

total_product = 1

user_value = (input(1)) #while user_value > 0:

total_product = total_product * user_value

user_value = (input(2))

print('Product:2', total_product, end='2')

Read more about Python Program at; https://brainly.com/question/26497128

#SPJ1

State three modules in HansaWorld and briefly describe what each is used for. (6)
2. With an example, explain what settings are used for. (3)
3. What is Personal Desktop and why is it good to use? Mention two ways in which an
entry can be deleted from the personal desktop. (6)
4. Describe how you invalidate a record in HansaWorld (3)
5. Briefly explain what specification, paste special and report windows are used for. (6)
6. How many reports can you have on the screen at once? How many reports does
HansaWorld have? (4)
7. Describe any two views of the Calendar and how you can open them (4)
8. Describe three (3) ways in which records can be attached to Mails. (6)
9. Describe the basic SALES PROCESS where there is no stock involved and how the
same is implemented in HansaWorld. (12)

Answers

1. We can see here that the three modules in HansaWorld and their brief descriptions:

AccountingInventoryCRM

2. We can deduce that settings are actually used in HansaWorld for used for configuring the system to meet specific business requirements.

What is HansaWorld?

It is important for us to understand what HansaWorld is all about. We can see here that HansaWorld is actually known to be an enterprise resource planning (ERP) system that provides integrated software solutions for businesses.

3. Personal Desktop is actually known to be a feature in HansaWorld. It allows users to create a personalized workspace within the system.

It can help users to increase their productivity and efficiency.

4. To actually invalidate a record in HansaWorld, there steps to take.

5. We can deduce here that specification, paste special and report windows help users to actually manage data and generate report.

6. There are factors that play in in determining the amount of reports generated.

7. The Calendar on HansaWorld is used to view upcoming events. There is the Day View and there is the Month View.

8. We can see that in attaching records, HansaWorld allows you to:

Drag and drop.Insert linkUse the Mail Merge Function

Learn more about report on https://brainly.com/question/26177190

#SPJ1

What is the difference between password protection and encryption? please answer quick, i cant pass this test for the life of me

Answers

Answer:Password protection is like locking something in a safe-deposit. It means no one can get to the locked content without knowing the right combination. This method is used on separate documents, folders, and other data the computer's user may want to protect from other people who might have access to the device. The problem is, if someone interested in such content obtains the password or finds a way to open it without it, the content might be revealed despite the owner's efforts to keep it hidden. Unfortunately, there are a lot of ways hackers could obtain the password or hack in without it. For example, it could be obtained with the help of malware, or it might be guessed if the user chooses a weak password. Not to mention, when it comes to PDF documents, the passwords placed on them can be removed using the CMD window or specific.

Password encryption is a step up from password protection. The term can be a tad confusing because, in fact, you cannot encrypt the password itself. Instead, by setting up "password encryption" you are creating a password AND encrypting the contents of the file. In our example (see instructions below), the contents of the user's PDF document are not only password protected, but also encrypted. It is a process during which the content one wishes to keep secret is altered to make it unrecognizable. For example, if it is a text document, letters of each word might be shuffled with additional characters so the words would no longer make any sense. The reverse process is only available if the person who wants to decrypt this data can provide a specific decryption key or a password. In other words, even if the password is removed no one could read the hidden content as it still would need to be decrypted. Of course, it is important to realize you might be unable to retrieve it too if you lose the decryption key, aka, the password.



PLS MARK ME AS BRAINLIEST.

Password protection restricts access to a resource, while encryption secures the actual content of that resource by transforming it into an unreadable form.

Ask about the difference between password protection and encryption.

Now, Password protection and encryption serve different purposes when it comes to securing data.

Password protection is a method of restricting access to a device, system, or specific files by requiring users to enter a password. It acts as a barrier to prevent unauthorized individuals from accessing the protected resource.

The password is typically a combination of characters that only authorized users should know.

Encryption, on the other hand, is a technique used to convert plain text or data into an unreadable format, called ciphertext, using an encryption algorithm.

The ciphertext can only be decrypted back to its original form by someone possessing the decryption key.

Encryption ensures that even if someone gains unauthorized access to the data, they will not be able to read or understand it without the decryption key

Hence, Both measures are commonly used together to enhance data security.

To learn more about password protection visit:

https://brainly.com/question/32167725

#SPJ3

Case Project 1-2: Upgrading to Windows 10: Gigantic Life Insurance has 4,000 users spread over five locations in North America. They have called you as a consultant to discuss different options for deploying Windows 10 to the desktops in their organization.

Most of the existing desktop computers are a mix of Windows 7 Pro and Windows 8.1 Pro, but one office is running Windows 8 Enterprise. They have System Center Configuration Manager to control the deployment process automatically. They want to begin distributing applications by using App-V.

Can you identify any issues that need to be resolved before the project begins? Which edition of Windows 10 should they use? Which type of activation should they use?

Answers

The best approach for deploying Windows to the desktops at Gigantic Life Insurance will depend on several factors, including the number of desktops, existing hardware.

How much storage is recommended for Windows?

While 256GB of storage space is appropriate for many people, gaming enthusiasts will need a lot more. Most experts recommend that you get a minimum of 512GB if you're going to load a few games, but you'll need 1TB of storage if you're planning to load several AAA games.

What are 3 types of installation methods for Windows 10?

The three most common installation methods of Windows are DVD Boot installation, Distribution share installation , image based installation

To know more about  Windows visit:-

https://brainly.com/question/28847407

#SPJ1

Justin bought some yarn from his favorite craft store. He can make 1 scarf with 3/5 of a ball of yarn. If he purchases 15 balls of yarn, how many scarves can he make?



9


8


5


25

Answers

Answer:

25 scarves.

Explanation:

Given the following data;

Number of yarns purchased = 15

1 scarf = 3/5 ball of yarn

x scarf = 15 ball of yarn

Cross-multiplying, we have;

3/5*x = 15*1

3x/5 = 15

3x = 15 * 5

3x = 75

x = 75/3

x = 25 scarves.

Therefore, Justin can make 25 scarves.

1. Design a DC power supply for the Fan which have a rating of 12V/1A

Answers

To design a DC power supply for a fan with a rating of 12V/1A, you would need to follow these steps:

1. Determine the power requirements: The fan has a rating of 12V/1A, which means it requires a voltage of 12V and a current of 1A to operate.

2. Choose a transformer: Start by selecting a transformer that can provide the desired output voltage of 12V. Look for a transformer with a suitable secondary voltage rating of 12V.

3. Select a rectifier: To convert the AC voltage from the transformer to DC voltage, you need a rectifier. A commonly used rectifier is a bridge rectifier, which converts AC to pulsating DC.

4. Add a smoothing capacitor: Connect a smoothing capacitor across the output of the rectifier to reduce the ripple voltage and obtain a more stable DC output.

5. Regulate the voltage: If necessary, add a voltage regulator to ensure a constant output voltage of 12V. A popular choice is a linear voltage regulator such as the LM7812, which regulates the voltage to a fixed 12V.

6. Include current limiting: To prevent excessive current draw and protect the fan, you can add a current-limiting circuit using a resistor or a current-limiting IC.

7. Assemble the circuit: Connect the transformer, rectifier, smoothing capacitor, voltage regulator, and current-limiting circuitry according to the chosen design.

8. Test and troubleshoot: Once the circuit is assembled, test it with appropriate load conditions to ensure it provides a stable 12V output at 1A. Troubleshoot any issues that may arise during testing.

Note: It is essential to consider safety precautions when designing and building a power supply. Ensure proper insulation, grounding, and protection against short circuits or overloads.

For more such answers on design

https://brainly.com/question/29989001

#SPJ8

Explain how the entity relationship (ER) model helped produce a more structured
relational database design environment.

Answers

The way that the entity relationship (ER) model helped produce a more structured relational database design environment is that

A database's primary entities and their relationships can be determined with the aid of an entity relationship model, or ERM. The role of the ERM components is easier to comprehend because they are graphically portrayed.

It is simple to translate the ERM to the tables and attributes of the relational database model using the ER diagram. The full set of needed database structures is generated by this mapping procedure, follows a set of clearly defined processes which are:

uses clearly defined images and rules to represent reality.the theoretical basisbeneficial for communicationTranslate to any DBMS type

How does the ER model aid in relational database design?

A visual representation of relational databases is an entity relationship diagram (ERD). Relational databases are modeled and designed using ERDs.

The Entity Relationship Model (ERM), which enables designers to perceive entities and connections visually, contributed to the creation of a more structured relational database design environment.

Therefore, Instead of defining the structures in the text, it is easier to understand them graphically.

Learn more about entity relationship (ER) model from

https://brainly.com/question/14424264
#SPJ1

Copy and paste your code from the previous code practice. If you did not successfully complete it yet, please do that first before completing this code practice.

After your program has prompted the user for how many values should be in the list, generated those values, and printed the whole list, create and call a new function named diffList. In this method, accept the list as the parameter. Inside, you should add up the negatives of all the values in the list and then return the result back to the original method call. Finally, print that difference of values.

Sample Run
How many values to add to the list:
8
[117, 199, 154, 188, 155, 147, 111, 197]
Total -1268

Answers

To write the code for this exercise, we must be familiar with Python's computational language.

Is Python a programming language used to create computer programmes?

Python is a well-known programming language for computers that is used to build websites and applications, automate procedures, and analyse data. Since Python is a general-purpose language, it may be used to create a wide range of applications and isn't specifically designed to address any particular problems.

import arbitrary

totalNegatives = 0 for the value in myList in the definition of diffList(myList):

If value is less than zero, totalNegatives plus value should return totalNegatives.

listLength is equal to int(input("How many values to add to the list: n")).

for I in range(listLength), myList = []

random.randint(100, 200) myList.append

print(myList)

sum and total (myList)

diffList = diff (myList)

print(f"Total + Difference")

To know more about Python's visit:-

https://brainly.com/question/30427047

#SPJ1

A help desk technician determines that a user's issue is caused by a corrupt file on their computer. What is the fastest way to transfer a good file to the computer?

Answers

The fastest way to transfer a good file to the computer is Use the C$ administrative share to copy the file.

How do I copy a file?

To copy a file, right-click on the desired file and select Copy. Alternatively, you can use the keyboard shortcut. To copy the item: click Ctrl+C. Navigate to the folder you want to move or copy the item to and click Ctrl+V or right-click and select paste.

To automatically paste the text, you will be inserting the copied content, which is in the clipboard to the desired location by the user, since such an operation only works if something has previously been copied or cut.

See more about copy a file at brainly.com/question/18241798

#SPJ1

What should you do when you are working on an unclassified system and receive a classified attachment?

Answers

If a classified attachment is sent to you while you are working on an unclassified system, call your security point of contact immediately.

What is the meaning of classified documents?

Material that a government agency deems to be sensitive information that needs to be protected is classified information. Laws and regulations limit access to specific groups of people with the required security clearance and need to know, and improper handling of the information can result in criminal penalties.

What is the meaning of unclassified information?

Official information that does not require the assignment of Confidential, Secret, or Top Secret markings but is not publicly-releasable without permission is classified as unclassified.

To know more about unclassified information, check out:

https://brainly.com/question/28302335

#SPJ1

need help with this python question

need help with this python question

Answers

The command to give in python if you want to draw a circle that has a diameter of 100 is:

from turtle import *

import turtle as tur  

tur.circle(90)

What is Programming?

This refers to the set of commands that are given to a computer that it executes and gives an output,

Hence, we can see that the relationship between radius and diameter is a circle's radius is half the length of its diameter

Therefore, the command to give in python if you want to draw a circle that has a diameter of 100 is:

from turtle import *

import turtle as tur  

tur.circle(90)

Read more about python programming here:

https://brainly.com/question/27666303

#SPJ1

3.13 LAB: Poem (HTML)
Create a webpage that displays the poem below.
Use 2 paragraph tags for the stanzas and
tags where necessary to keep the correct formatting.
• Use a 3rd paragraph for the author and date, and enclose the author and date in a tag.
I'm Nobody! Who are you?
Are you
Nobody - Too?
Then there's a pair of us!
Don't tell! They'd banish us - you know!
How dreary to be Somebody!
How public like a
To tell one's name
To an admiring Bog!
Frog -
the livelong June -
By Emily Dickinson (1891)

3.13 LAB: Poem (HTML)Create a webpage that displays the poem below.Use 2 paragraph tags for the stanzas

Answers

Answer:

<!DOCTYPE html>

<html>

<head>

<title>Emily Dickinson Poem</title>

</head>

<body>

<p>I'm Nobody! Who are you?<br>

Are you<br>

Nobody - Too?<br>

Then there's a pair of us!<br>

Don't tell! They'd banish us - you know!</p>

<p>How dreary to be Somebody!<br>

How public like a<br>

Frog -<br>

To tell one's name<br>

To an admiring Bog!</p>

<p>By <em>Emily Dickinson</em> (1891)</p>

</body>

</html>

Other Questions
please help me! ASAP explain for brainlist. Oliver spends a lot of time on social media, where he works hard to come across as the witty, personable, and dependable young man he is. Which basic social need does this best represent Which system of government has the advantage of keeping government leaders highly accountable to voters?. HURRRY PLEASE the equation of a line is 3/5x+1/3y=1/15 what is the x and y-intercept A rock lies in a river bed in a warm and wet climate. Which factor would speed up its weathering? O A. The rock is buried a few feet under the ground. B. The precipitation in the area decreases. O c. The flow of the water slows down considerably. O D. The temperature of the water increases. Reset Next Tara looks up hotel room prices for a holiday. A hotel has a 25% off sale on its prices. A VAT charge of 20% must be added on at the end of the transaction after any discount. If the regular price of a room is 80 per night, how much will Tara pay for 7 nights? Which statement best describes a mixed economy Mcq?Private ownership of the factors of production and regulation of businesses by governmentMarket exchanges answer all three of the big economic questionsFamily customs and traditions determine what and how to produce a goodGovernment answers all three of the big economic questions If each integer occupies one 64-bit memory cell and is stored using sign/magnitude notation, what are the largest (in terms of absolute value) positive and negative integers that can be stored? Given the function h (x) = 2x + 4, for which value of x does h (x) = 18? Can I please have help Read the passage.Lisa looked over her shoulder again. She turned the corner & ducked into a back alley. It was then she realized that she was being followed. A) rising conflict B) conflict C) resolution D) character 6. The code of loyalty that the samurai would pledge was known as1. bushido2. chivalry3. feudalism4. Shinto raul is using a computer model to investigate meiosis. he directs the model to show a nondisjunction of chromosome 21 during meiosis i. how many copies of chromosome 21 should the model display in each gamete that is produced? What is the most important design consideration? what is the product of 58 and 1000 Which one of the following actions would improve cash flow? HIGHIGHT ANSWER Select one answers: A Adopt Just in Time stock control B Pay shareholders higher dividends C Increase the number of days you expect your customers to pay in D An increase in interest rates 3. jam keeps up to three weeks in therefrigerator, but it spoils quickly at roomtemperature.(Food) The scope of variation among living organisms is to weigh a fish, a person hangs a tackle box of mass 3.5 kilograms and a cooler of mass 5 kilograms from the ends of a uniform rigid pole that is suspended by a rope attached to its center. the system balances when the fish hangs at a point 1/4 of the rod's length from the tackle box. what is the mass of the fish? Factor completely 4x2 36x 81. (2x 9)(2x 9) (2x 9)(2x 9) (4x 9)(4x 9) (4x 9)(4x 9).