what is the largest number tha can be loaded into the w register in a pic18 micro controller

Answers

Answer 1

PIC18 micro controller is a member of the PIC microcontroller family, developed by Microchip Technology. It consists of flash memory, a central processing unit (CPU), and other peripherals.

The microcontroller can be programmed in various programming languages, including assembly language, C, and BASIC. In PIC18 microcontroller, the W register is an 8-bit register that is used as an accumulator register. It is used to store data during calculations. The largest number that can be loaded into the W register in a PIC18 microcontroller is 0xFF (255 in decimal). This is because the W register is an 8-bit register, and the maximum value that an 8-bit register can hold is 0xFF. The largest number that can be loaded into the W register in a PIC18 microcontroller is 0xFF. This is because the W register is an 8-bit register, and the maximum value that an 8-bit register can hold is 0xFF.

To learn more about micro controller, visit:

https://brainly.com/question/30893766

#SPJ11


Related Questions

BlackBerry uses its own proprietary operating system, BlackBerry 10. It is based on the __________ operating system.

Answers

BlackBerry 10 operating system is based on the QNX operating system. QNX is a real-time operating system that is designed for use in embedded systems.

It has been used in a variety of applications such as automotive systems, medical equipment, and industrial control systems. BlackBerry acquired QNX Software Systems in 2010 and has since used the QNX operating system as the foundation for its BlackBerry 10 operating system. BlackBerry 10 is a proprietary operating system developed by BlackBerry Limited, a Canadian multinational company that specializes in enterprise software and services. The BlackBerry 10 operating system is based on the QNX operating system, which is a real-time operating system designed for use in embedded systems.

To know more about operating system,

https://brainly.com/question/31551584

#SPJ11

The program counter, is one of the 32 registers that can be
accessed directly and keeps track of the memory address of the
currently executing instruction. (True/False)

Answers

The statement, "The program counter, is one of the 32 registers that can be accessed directly and keeps track of the memory address of the currently executing instruction" is true. This statement is true because the program counter is used to keep track of the currently executing instruction in the central processing unit (CPU).

A computer processor's programme counter (PC) is a register that stores the memory address of the subsequent instruction to be executed.. The program counter is also known as the instruction pointer (IP) in a computer's instruction cycle, which is the period between when the instructions are being fetched and executed.

The program counter is a hardware component that is used to store the memory address of the next instruction to be executed in the CPU. The program counter is used to determine the location of the next instruction in the program's memory address space. The program counter increments after each instruction is executed to point to the next instruction's memory location.

Learn more about program counter visit:

https://brainly.com/question/19588177

#SPJ11

While loop project
Reference codeacademy lesson called loops
Need help writing this code
Create a program that
1) outputs the name priya 100 times (all on different lines)
2) output the name priya 100 times (10 on 10 lines)
3) output the sum of numbers from 1 to 1000
4) output the product of numbers from 1-8
5) list all the numbers from 100 down to 1
Complet in this order

Answers

Answer: Change this however you'd like :)

Explanation:

for n in range(100):

   print("priya")

print()

for n in range(10):

   for i in range(10):

       print("priya", end= " ")

   print()

print()

tempList = []

for n in range(1, 1001):

   tempList.append(n)

print(sum(tempList))

print()

for n in range(1, 9):

   for i in range(1, 9):

       print(n*i)

print()

x = 100

while x != 0:

   print(x)

   x -= 1

write code that combines the following variables so that the sentence "you are doing a great job, keep it up!" is assigned to the variable message. do not edit the values assigned to by, az, io, or qy.

Answers

A code which combines the given variables so that the sentence "you are doing a great job, keep it up!" is assigned to the variable message is as follows:

by = "You are"az = "doing a great "io = "job"qy = "keep it up!"message = by+" "+az+io+", "+qy

What is a variable?

A variable can be defined as a specific name which refers to a location in computer memory and it is typically used for storing a value such as an integer.

This ultimately implies that, a variable refers to a named location that is used to store data in the memory of a computer. Also, it is helpful to think of variables as a container which holds data that can be changed in the future.

In Computer technology, there are two (2) main methods for assigning or passing variables to functions and these include the following:

Pass-by-value.Pass-by-reference.

Read more on variable here: https://brainly.com/question/12978415

#SPJ1

You have been using an app on your mobile device for a 30-day trial period. Now that the 30 days have expired, the app is requesting that you to pay to continue accessing your data. What are your next steps? What steps could you have taken to preserve your data before the trial period expired?

Answers

Answer: Is there anyone choices A,B,C or D?

IF theres not. the answer is you could have canceled your trial early. Screenshots

not much i can help without choices

Explain what will happen if we continue to use fossil fuels at the rate we are now and what impacts it will have on the planet.

Answers

Answer:

At the point when non-renewable energy sources are singed, they discharge carbon dioxide and other ozone depleting substances, which thusly trap heat in our air, making them the essential supporters of an Earth-wide temperature boost and environmental change. At the point when we consume oil, coal, and gas, we don't simply meet our vitality needs—we drive the current an unnatural weather change emergency also. Non-renewable energy sources produce huge amounts of carbon dioxide when consumed. Carbon discharges trap heat in the air and lead to environmental change.

5 evaluation criteria

Answers

Answer:

relevance, efficiency, effectiveness, impact and sustainability. 

1100111010,10 cơ số 2 sang bao nhiêu cơ số 16

Answers

Explanation:

Nhân phân số đã cho (trong cơ số 10) với 16.

Viết phần thực và phần nhỏ của kết quả thu được một cách riêng biệt.

Nhân phần phân số với 16.

Viết phần thực và phân số

in the 1960s and 1970s, the existing telephone network was used for computer-to-computer communication beyond the local area. why was the telephone network not well suited for supporting computer traffic? be specific.

Answers

A group of computers that share resources on or provided by network nodes is referred to as a computer network.

What is  computer network ? In order to communicate with one another, the computers use standard communication protocols through digital networks. These linkages are made up of telecommunication network technologies, based on physically wired, optical, and wireless radio-frequency means that may be organized in a number of  computer network. Among the nodes of a computer network are laptops, servers, networking equipment, and other specialized or general-purpose hosts. In addition to having hostnames, they are recognized by network addresses. Hostnames act as distinctive designations for the nodes and are hardly ever modified after first assignment. For communication protocols like the Internet Protocol to locate and identify the nodes, network addresses are used.Computer networks can be categorized using a variety of factors, such as the signal-transmission medium, bandwidth, communications protocols used to manage network traffic, network size, topology, traffic-control mechanism, and organizational goals.Internet connectivity, digital video and audio, the shared use of application and storage servers, printers, fax machines, and email and instant messaging software are just a few of the many applications and services supported by computer networks.

To Learn more About computer network refer to:

https://brainly.com/question/1167985

#SPJ4

explain with example how does delay marriage help for population management​

Answers

Answer:

Explanation:

The population in western richer countries is decreasing but the population in some poorer developing countries is increasing and normally in the poorer communities where education is minimal or not encouraged then men and women tend to get married young and have many children. Population management is not necessary because when men and women are educated and have good standard of living with a good social system of caring for the old then married couples will tend to have one or two kids or none at all. Population control was practised by PrC and it managed to alleviate 60% of the people out if poverty and reduced the population by implementing one child policy. Now China has more male than female creating social problems of finding a wife. In the West with good social system to care for the elderly more couples are not having children. In the west where living conditions and educational level are better the Caucasian race is not having that many children as the other races in developing countries. Education and financial independence of women will encourage married women to have one or two kids so that they can still pursue their career after marriage. With modern contraception you can delay having children until you are ready for them. The concept of delaying marriage to reduce population does not hold true. However the whites’ population is decreasing every year as compared to the other non white races. The reason is that in the poorer non white countries the population is higher because of subservient position of the women who have no say in birth control

Which type of operating system is usually used in personal computers?
А _____operating system is usually used in personal computers. This allows
_______ to perform multiple
tasks simultaneously.

Number 1:

Multi-user/multitasking

Single-user/multitasking

Single-user/single-tasking

Number 2:

Two user

A user

Multiple users

Answers

Answer

1st one is :multi-user/multi-tasking

2nd one is:two users

Explanation:

multi-user/multi-tasking

two users

you manage a network with two locations (portland and seattle). both locations are connected to the internet. the computers in both locations are configured to use ipv6. you'd like to implement an ipv6 solution to meet the following requirements: hosts in each location should be able to use ipv6 to communicate with hosts in the other location through the ipv4 internet. you want to use a site-to-site tunneling method instead of a host-to-host tunneling method. which ipv6 solution should you use? answer isatap 4to6 tunneling 6to4 tunneling teredo tunneling

Answers

In this situation, 6to4 tunnelling is the appropriate IPv6 approach. Site-to-site tunnelling is possible with 6to4 tunnelling, which may be used to link IPv6 networks via an IPv4 infrastructure.

Using 6to4 tunnelling, it is feasible to connect IPv6 networks over an IPv4 infrastructure and perform site-to-site tunnelling. In order to allow IPv6 hosts to interact across an IPv4 network, it works by enclosing IPv6 packets inside IPv4 packets. The best IPv6 solution in this scenario is 6to4 tunnelling. Using 6to4 tunnelling, it is feasible to connect IPv6 networks over an IPv4 infrastructure and perform site-to-site tunnelling. ISATAP or Teredo tunnelling are two options for host-to-host communication over the IPv4 internet. 6to4 tunnelling is the best choice in this scenario because it fits the requirement of allowing hosts in one area to communicate with hosts in the other location over the IPv4 internet.

learn more about IPv6 here:

https://brainly.com/question/15733937

#SPJ4

Given two sorted arrays, write a method to merge these arrays and return the merged sorted array .

Answers

To merge two sorted arrays, we can use a simple algorithm that iterates over both arrays and compares their elements.

We start with two pointers, one for each array, and initialize a new empty array to store the merged result. At each iteration, we compare the values pointed to by the two pointers and add the smaller value to the merged array. We then move the pointer for the array from which we took the smaller value to the next position. We repeat this process until we have processed all the elements in both arrays. Finally, we return the merged sorted array. This algorithm has a time complexity of O(n), where n is the total number of elements in both arrays.

To learn more about arrays click on the link below:

brainly.com/question/30597938

#SPJ11

What are some reasons a person might choose to remain anonymous on the Internet?

Answers

Answer:

There would be a lot for reasons, to get out of their real world as maybe they are getting abused, hurt, bullied and many other reasons. Also, people don't like their identity so they try cover themselves up too. Another reason is because they would be able to do and say anything without having problems and consequences.

Explanation:

1) People are afraid of self revelation to people they don’t know.

2) They are afraid of showing strangers what they really feel and their own lack of knowledge.

3) They fear that someone, who takes offense at what they say could do, or say, “something” to hurt them or their families

Etc...

You have just installed a new network-based IDS system that uses signature recognition. What should you do on a regular basis?

Answers

Installing a new network-based IDS system that uses signature recognition is just the beginning of securing your network. The network-based IDS system that uses signature recognition relies on known patterns of malicious code that have been identified and analyzed.Signature recognition network-based IDS systems can detect the most common attacks, but they have limitations in detecting zero-day vulnerabilities.


As a result, to keep the network-based IDS system up to date, signature updates must be installed on a regular basis.Intrusion detection systems (IDS) must be maintained and updated on a regular basis to ensure that they are effective in detecting threats.
The IDS must be connected to the network to monitor all network traffic, and the alerts must be checked on a regular basis. The administrator must configure the IDS to report alerts to a centralized server. This will help in analyzing the data collected by the IDS and detecting network intrusions.
In addition, the administrator must be familiar with the signature updates to the IDS to ensure that the IDS is up to date with the latest threat information. The administrator must also perform regular IDS scans to ensure that the system is operating correctly.


Learn more about signature recognition here,
https://brainly.com/question/30019715

#SPJ11

What are the steps for inserting an internal link?
1. Type into a cell.
2. Then, select the that includes the cell you wish to link to.
3. Next, click the cell you wish to reference.
4. Finally, press .

Answers

Answer:

=

Worksheet

Ctrl + Enter

Explanation:

Answer:

=, worksheet, Ctrl+Enter

Explanation:

of the following choices, which would permanently remove data from media so that it is unrecoverable? you must empty the recycle bin to permanently delete data data is accessible until it is overwritten by other content to the same physical location reformatting the hard drive is the only way to fully delete data data is no longer accessible once it is deleted

Answers

Answer:

I am not sure

Explanation:

but it depends on what media you are on or device but deleting the data is no good because the device you use is still memorizing the data you put in

social networking can be traced back to online services, such as compuserve, prodigy, and america online.truefalse

Answers

'The given statement  "social networking can be traced back to online services, such as compuserve, prodigy, and america online " is true' because these were some of the earliest online services that provided users with the ability to communicate with each other through rooms, email, and instant messaging.

CompuServe, for example, was launched in 1969 and was one of the first online services to offer real-time services. Prodigy, launched in the 1980s, allowed users to create personal profiles and interact with each other through bulletin boards and email.

America Online, or AOL, was launched in the early 1990s and quickly became popular for its instant messaging feature, which allowed users in real-time with each other.
These early online services laid the groundwork for social networking as we know it today. They paved the way for the development of websites like Friendster, MySpace, and eventually , which revolutionized the way we connect with each other online.
In conclusion, social networking can be traced back to online services like CompuServe, Prodigy, and America Online, which were some of the earliest platforms to facilitate communication and interaction between users.

For more such questions on online services:

https://brainly.com/question/27960093

#SPJ11

what is the working principle of computer?​

Answers

Answer:

input, process, output, storage

Is Microsoft Publisher a desktop publishing app?

Answers

Answer:

yes

Explanation:

Publisher is a desktop publishing application that helps you create visually rich, professional-looking publications. With Publisher on your PC, you can: Lay out content for a print or online publication in a variety of pre-designed templates.

Microsoft Publisher is a desktop publishing application. In contrast to Microsoft Word, where the focus is on text composition and proofing, Microsoft Publisher is focused on the design and layout of pages

Pls mark me brainliest

a technique that lures prey into revealing passwords and other private data by providing a convincing offer is called a. mining. b. data trapping. c. ultra-collecting. d. phishing.

Answers

Phishing is a method of tricking victims into divulging passwords and other sensitive information by making a compelling offer.

What is a trick used to get victims to reveal passwords?

The term "phishing" (also known as "spoofing") refers to the practise of online con artists utilising increasingly sophisticated lures to "fish" for user password and financial information.

What is the trolling method?

A fishing technique called trolling involves drawing one or more fishing lines through the water while they are baited with lures or bait fish. This can be accomplished by casting a line behind a moving boat, slowly winding it in when casting from a stationary location, or even sweeping the line from side to side, as might be the case when casting from a pier.

To know more about Phishing visit:-

https://brainly.com/question/24156548

#SPJ1

Lab6B: Pick a number between 1 and 1000 For this lab, make sure to please use a while loop. Many programming languages have a library for a Random Number Generator (RNG). Whenever this RNG is used it will output one "random number back to the user. Applications of such a generator can including something like the lottery. Please keep in mind that the RNG will generate a random floating-point value between 0.0 and 1.0 and to adjust the range of the random numbers you need to either multiply or add to the result For example, if want the range to be from 0.0 to 50.0 we would multiply the result by 50. If wanted to move the range to 2.0 to 52.0 we would add 2 to the result. Re-read this passage and try to think about this a bit more deeply, it will click and make sense. In this lab exercise, please write a program that asks the user to pick an integer number between 1 and 1000; please use a while loop to verify that what was entered by the user is between the range specified earlier. If the input is within range, please have an RNG (please ask your lab instructor for details on how to create one some details shown below) that should keep randomly generating numbers until it generates one matching the number entered by the user. Also, please make sure that the program keeps track of how many guesses it takes. Have the program displays each guess and after than display the total guess count. Please refer to the sample output below. Disclaimer: When using the RNG you are going to have to store the generated number as a double or a float. Please make sure to round up the generated number to the nearest ones digit in order to avoid an infinite loop. Remember, the class name should be Lab6B The user input is indicated in bold. Java import java.util. Random public class generate Random public static void main(String args) Random rand - new Random(); // Generate random Integers in range o to 9 int rand_intl - rand.nextInt (10) ;)) C# public class generateRandom public static void main(String args[]) Random Ind-new Random() Generate random Integer in Tanto int example rnd. Next (10) ) ) Sample output: 1 Enter a number between 1 and 1000: 42 My guess was 56 My guess was 198 My guess was 239 My guess was 2 My guess was 5 My guess was 920 My guess was 42 I guessed the number was 42 and it only took me 231 guesses

Answers

Here is an example of a Java program that implements the functionality described in the prompt:

import java.util.Random;

import java.util.Scanner;

public class Lab6B {

   public static void main(String[] args) {

       Scanner scanner = new Scanner(System.in);

       Random rand = new Random();

       int userNum, guessCount = 0;

       // Ask user for a number between 1 and 1000

       System.out.print("Enter a number between 1 and 1000: ");

       userNum = scanner.nextInt();

       // Verify that the user input is within range

       while (userNum < 1 || userNum > 1000) {

           System.out.println("Invalid input. Please enter a number between 1 and 1000: ");

           userNum = scanner.nextInt();

       }

       // Keep generating random numbers until a match is found

       int randNum = rand.nextInt(1000) + 1;

       while (randNum != userNum) {

           guessCount++;

           System.out.println("My guess was " + randNum);

           randNum = rand.nextInt(1000) + 1;

       }

       // Display the total number of guesses

       System.out.println("I guessed the number " + userNum + " and it only took me " + guessCount + " guesses.");

   }

}

In this program, I use a Scanner to get input from the user and a Random object to generate random numbers. I use a while loop to verify that the user input is within the range of 1 to 1000. Then I keep generating random numbers using the nextInt(1000) + 1 method until a match is found with the user input. I also keep track of the number of guesses using the guessCount variable and display it after the match is found.

Learn more about code, here https://brainly.com/question/497311

#SPJ4

Lab6B: Pick a number between 1 and 1000 For this lab, make sure to please use a while loop. Many programming
Lab6B: Pick a number between 1 and 1000 For this lab, make sure to please use a while loop. Many programming

Say you are a stock investor. You are considering to invest in PFIZER. To that end, you download the stocks' historical price data given in "Computer_Exercise 2.xlsx". More precisely, you analyze the daily market-closing stock prices (or bid-ask averages in case of no trade on that day) from July 3,2000 to December 31, 2020. Please answer the following questions. 1. To start, you want to get an idea of the daily return that you could have obtained by buying on one trading day and selling on the next (assuming that there are no dividends). Compute the daily net return. Express the net return in terms of the percentage change in prices. 2. Now you want to know on how many of the total trading days in your sample you would have made a net return greater than or equal to 0.55%. What is the number of days on which your net return would have been above or equal 0.55% ? 3. You decided that you want to invest in PFIZER. Say that the outcome of your "experiment" (i.e. your investment) that you are interested in is whether you will win a net return larger than or equal to 0.55% on the first day or not. That is, you define a Bernoulli random variable, x, that can take on values 1 (net return >=0.55% on first day), and 0 (net return <0.55% on first day). Since you don't know how to otherwise approach the question (you are a first-time investor), you decide that the likelihood of successes in the past should be an indication of the future probability of success. Hence, what is the probability of success (i.e. net return >=0.55% ) based on the 2000-2020 sample? 4. What is the expected value/population mean of your Bernoulli variable X ? 5. What are the (population) variance and standard deviation of X ? Having computed the latter, comment on how good your "guess" for X (i.e. the expected value in 4.) really is. 6. Is the distribution of X symmetric about its mean? Why or why not? 7. Instead, now assume that your investment horizon is 14 trading days, where on each day you either can gain a net return larger than or equal to 0.55%(X 1

=1) or a net return <0.55%(X=0). Assume that the random variables X 6

i=1,2,…,14, are independent. The probability of success is still the same as in question 3 . above, and it is the same for all i. What is the probability that you will make a net return >=0.55% on 9 (out of the in total 14) following trading days? 8. Under the same assumptions as in question 7. above, what is the probability that you will make a net return above or equal 0.55% on more than 10 (out of the in total 14 ) following trading days?

Answers

1. The daily net return for investing in Pfizer is computed by calculating the percentage change in prices from one trading day to the next, assuming no dividends. This provides an idea of the daily return that could have been obtained by buying and selling the stock consecutively.

2. The number of trading days in the sample period where the net return would have been greater than or equal to 0.55% is determined to assess the frequency of favorable returns.

3. Based on the historical data, the probability of success, defined as obtaining a net return larger than or equal to 0.55% on the first day of investment, is determined by considering the likelihood of past successes as an indication of future success.

4. The expected value or population mean of the Bernoulli random variable X, representing the net return being larger than or equal to 0.55% on the first day, is calculated to determine the average outcome of the investment.

5. The population variance and standard deviation of X are computed to measure the variability and dispersion of the outcomes. This analysis provides insight into the reliability of the expected value.

6. The symmetry of the distribution of X about its mean is evaluated to understand whether the net return on the first day is equally likely to be above or below 0.55%. This impacts the overall risk assessment of the investment.

7. Assuming a 14-day investment horizon with independent random variables, the probability of achieving a net return greater than or equal to 0.55% on nine out of the 14 following trading days is calculated to assess the likelihood of sustained favorable returns.

8. Similarly, the probability of obtaining a net return above or equal to 0.55% on more than 10 out of the 14 following trading days is determined to gauge the probability of consistently positive returns within the specified investment period.

1. To calculate the daily net return, we need to compute the percentage change in prices using the historical stock prices data. This provides insights into the potential returns obtained by buying on one day and selling on the next, assuming no dividends.

2. By analyzing the net return values, we can determine the number of trading days where the net return exceeds or equals 0.55%. This helps understand the frequency of favorable returns during the sample period.

3. The probability of success is derived from the historical data, considering the past successes as an indication of the likelihood of future success. By calculating the proportion of days with a net return larger than or equal to 0.55% on the first day, we can estimate the probability.

4. The expected value or population mean of the Bernoulli variable X is calculated by summing the products of the possible outcomes (1 or 0) and their respective probabilities. This provides the average net return expected from the investment.

5. The population variance and standard deviation of X are computed to assess the spread or variability of the net return outcomes. By measuring the dispersion around the expected value, we can evaluate the consistency of the investment performance.

6. The symmetry of the distribution of X is assessed by examining whether the probabilities of net return being above or below 0.55% on the first day are equal. This provides insights into the potential biases or tendencies of the investment outcomes.

7. By assuming independent random variables X for each trading day, we can calculate the probability of obtaining a net return greater than or equal to 0.55% on nine out of the 14 following trading days. This evaluates the likelihood of sustained favorable returns within the specified investment period.

8. Similarly, we determine the probability of achieving a net return above or equal to 0.55% on more than 10 out of the 14 following trading days. This helps gauge the probability of consistently positive returns over the specified investment horizon.

Learn more about net return

brainly.com/question/32621258

#SPJ11

How did tribes profit most from cattle drives that passed through their land?
A.
by successfully collecting taxes from every drover who used their lands
B.
by buying cattle from ranchers to keep for themselves
C.
by selling cattle that would be taken to Texas ranches
D.
by leasing grazing land to ranchers and drovers from Texas

Answers

The way that the tribes profit most from cattle drives that passed through their land is option D. By leasing grazing land to ranchers and drovers from Texas.

How did Native Americans gain from the long cattle drives?

When Oklahoma became a state in 1907, the reservation system there was essentially abolished. In Indian Territory, cattle were and are the dominant economic driver.

Tolls on moving livestock, exporting their own animals, and leasing their territory for grazing were all sources of income for the tribes.

There were several cattle drives between 1867 and 1893. Cattle drives were conducted to supply the demand for beef in the east and to provide the cattlemen with a means of livelihood after the Civil War when the great cities in the northeast lacked livestock.

Lastly, Abolishing Cattle Drives: Soon after the Civil War, it began, and after the railroads reached Texas, it came to an end.

Learn more about cattle drives from

https://brainly.com/question/16118067
#SPJ1

WD9102 Apply a shape style.

Answers

If you want to apply a shape style, you must require to tap on the Format tab followed by clicking the More drop-down arrow in the Shape Styles group.

How to know the actual or real style of shape?

To know the actual or real style of shape, go to the Drawing Tools menu in the ribbon. Then, Click on the Format tab. Observe the Shape Styles grouping of commands. Here, you will see three icons on the right side, they are Shape Fill, Shape Outline, and Shape Effects.

After clicking the More drop-down arrow in the Shape Styles group, a complete menu of styles will appear in front of you on the screen. Choose the style you want to use. The shape will appear in the selected style.

Therefore, the process of applying shape style is well described above.

To learn more about Word Shape styles, refer to the link:

https://brainly.com/question/938171

#SPJ1

Source code is one particular representation of a software system. It highlights some details and hides others. This is a good example of:

Answers

A nice example of abstraction is when a source code shows some details while hiding others.

What exactly is computer source code?

A programmer's text editor or visual programming tool-created programming statements that are later saved in a file are known as source code. The output, a compiled file, that results from the compilation of the source code using a C compiler is referred to as object code in most contexts.

How is the source code concealed?

Really, there is no method to conceal the source code for languages used on the web. Everyone has access to it if the browser can see it. Obfuscating it is one way to try to make it more difficult. Given enough time, one can still make sense of it.

To know more about abstraction visit :-

https://brainly.com/question/19419456

#SPJ4

What is output? Select all that apply. c = 3 while (c < 10): c = c + 2 print (c)

Answers

Answer:

5, 7, 9, 11

Explanation:

its on quizlet

how do you display hyperlinks without an underline?

Answers

You can display hyperlinks without an underline by using the CSS "text-decoration: none" property. You can add this to the link's CSS selector

a {

  text-decoration: none;

}

What is Hyperlinks?
Hyperlinks are pieces of code that allow users to click on text or images, and be taken to a different webpage or document. They are often used to navigate between different webpages within a website, as well as to link to other websites. Hyperlinks can also be used to link to files such as PDFs, Word documents, or even images. Hyperlinks are created using HTML code, which is a type of programming language used to create websites.

To know more about Hyperlinks
https://brainly.com/question/23413848
#SPJ4

it important to have media images reflective of diverse communities? Why, or why not?

Answers

Answer:

Yes.

It is important because a POC would want to believe that they can achieve a goal in life because they set it, so by seeing themselves represented gives them confident.

Peer collaboration helps develop critical-thinking skills, which is the ability to

focus on multiple subjects at once.
criticize the thoughts of others.
examine a subject more closely.
focus on a single opinion or perspective.

Answers

Answer:

its c

Explanation:

after a few googel searches this is the answer

Answer:examine a subject more closely.

Explanation:

i just finshed the test

Other Questions
Will someone please answer this and show me how you got it 7 + 8p - 2r3terms:coefficients: describe the diverse roles of protein in membrane The cost of rent in a instrument is 65$ for the first month, it cost $30 for each additional month x that the instrument is rented which expression Represents the total cost of renting an instrument B) What will be the value of the destination operand after each of the following instructions execute in sequence?mov ax,var2 ; a.mov ax,[var2+4] ; b.mov ax,var3 ; c.mov ax,[var3-2] ; d. A goalie make 12 saves in 3 games. What is the rate of saves per game? Which of the following structures widens the geographic range of a species and is an agent of dispersal?a. seedb. flowerc. leafd. root Universal Principles of UX: 100 Timeless Ways to Create Positive Interactions between People and Technology pdf Entries for Bank Reconciliation The following data were accumulated for use in reconciling the bank account of Creative Design Co. for August 20Y6: Cash balance according to the company's records at August 31, $14,990. Cash balance according to the bank statement at August 31, $15,990. Checks outstanding, $3,040. Deposit in transit not recorded by bank, $2,440. A check for $270 in payment of an account was erroneously recorded in the check register as $720. Bank debit memo for service charges, $50. Journalize the entries that should be made by the company that (a) increase cash and (b) decrease cash. part A which statement best identifies the central idea of the text, in the story who gets to be president.The statements are :A. The system that determines the US president includes the voice of the American public but it also includes several intricacies that are uniquely American.B. The complex system in which the president is selected protects the American peoples rights to choose their president.C. From the beginning the founding fathers greatest concern was protecting the rights and choices of the American people.D. The vice president has only slightly for fewer duties in the president meaning he or she is the first in line if the president is unable to fulfill his or her duties. need it for resources(duh) A change in the language is ______when people disagree about its correctness What adjective form or position is the italicized word or phrase? the beautiful girl is smiling. subjunctive indicative imperative A triangle has side lenghts that measure 12 inch 14 inch and 20 inch , is it a right teiangle? Explain Find the change in the density rho of a substance, when the temperature changes by t . assume t1 .Express your answer in terms of the variables , p, and t What element is represented by the following electron configuration? Frida and the CameraRead this on-line writing relating to photographic infuences to Frida Kahlo's self-portrait paintings.1. How did photography influence Frida's self-portraits? Can you site any specific examples?2. Do you have anything that you would like to add to the discussion. I need help with German words How do u say Hello,whats ur name in german? In addition to the current prime rate, other factors that can affect and individual's mortgage amounts and interest rates include which of the following?A. Your incomeB. Your credit ratingC. Both A and BD. None of the above What exactly is the war in Ukraine about?