The first code block has a syntax error due to the misspelling of "For" which should be lowercase "for". The corrected code block would look like this:
int sum = 0;
for (int k=1; k<=3; k++) {
sum += k * 3;
}
cout << "the value of sum is = " << sum;
The output of this code block would be:
the value of sum is = 18
The second code block has a syntax error in the ternary operator. The condition (x > y) is followed by only one expression instead of two. The corrected code block would look like this:
int x, y, z, x=6;
y=10;
x = x+2;
z = (x > y) ? x : y;
cout << x << " " << y << " " << "Z= " << z << endl;
The output of this code block would be:
Learn more about code here:
https://brainly.com/question/31228987
#SPJ11
8. Circle the odd one out from the following.
1. DOS
Windows
MBR
Mac
Answer:
MBR (Master Boot Record) is the correct answer. The other answers are all operating systems.
What is the primary purpose of endnotes?
to provide information on a source used to create a document
to identify the sources on each page of a document in the form of links
to provide additional information that does not fit in the main body of the text
to mark a location in a document to make it easier to navigate to that location
Answer:
They acknowledge the source of a quotation, paraphrase, or summary; and (2) They provide explanatory comments that would interrupt the flow of the main text.so its B
Answer:
A. to provide information on a source used to create a document
Explanation:
EDGE 2021 :)
how do i get around a school related block
Answer:
try putting "uk-" or "us-" depending on where you are, you could also go through your settings and try to allow everything.
Answer:
Some schools have the option to block only on regular tabs, try going into settings and disabling the block to go on incognito tabs.
Another option would be to use a different web browser, something less known but good enough that it works and isnt blocked.
You can also find certain things on online where it tells you what websites to go to, then copy a link and paste it down into the search bar where the page will come up unblocked.
I hope this helped!
PS: If you go into certain websites, block third party cookies. ;)
Will mark brainliest! What does this code do? What kind of code is this called?
Code:
for i in range(0, len(sVal)):
sum += int(sVal[i])
return sum
Answer:
lol u can barly call this a code
Explanation:
its just a type error code i think
A scatter plot can be used with both numerical and non numerical values. True or False?
Answer:
true
Explanation:
Please help me with coding!
Answer:
key code space
Explanation:
the transformation
Which occurs when private details of a class are hidden from other classes or parts of the program that uses instances of the class?
inheritance
polymorphism
encapsulation
operation overloading
Answer:
Encapsulation
Explanation: got it right
Answer:
Encapsulation
Explanation:
I took the quiz.
Which of the following makes Super Mario Run unique?
A.
It is only controlled using one finger.
B.
It has the most advanced obstacles of any video game created.
C.
It features hand-drawn graphics.
D.
It uses a soundtrack that has won multiple awards.
The most advanced obstacles of any video game were created to make the Super Mario Run unique.
What is the main purpose of video games?
Their lives are made more purposeful by playing video games. Games could be played for relaxation, control, enjoyment, creativity, social interaction, boredom prevention, challenge, and achievement.
What is a Super Mario Run?
Nintendo created and released Super Mario Run in 2016 for iOS and later Android platforms. It is the first mobile game from Nintendo that is a part of one of the studio's well-known and long-running brands.
Therefore, the Super Mario Run game is unique as it has the most advanced obstacles of any video game created.
To learn more about the Video game from the given link
https://brainly.com/question/908343
#SPJ1
SOMEONE PLEASE HELP ME FAST PLEASE PLEASE !!!!
Answer:
what
Explanation:
i don't know this oustion ?
a database administrator uses which two sql statements to view and then modify existing customer balances with a late fee?
To view and modify existing customer balances with a late fee, a database administrator uses the SQL SELECT and UPDATE statements.
SQL SELECT statement is used to extract information from a database, whereas the SQL UPDATE statement is used to modify the existing data records present in the database table. In this scenario, the database administrator uses SQL SELECT statement to view the existing customer balances with a late fee.
The SQL SELECT statement retrieves data from one or more tables in a database. For instance, the administrator may use the following query to view the balances of all customers with a late fee SELECT * FROM customer WHERE late fee > 0;The above query retrieves all columns from the customer table where the late fee is greater than 0.The database administrator uses SQL UPDATE statement to modify the existing customer balances with a late fee.
The SQL UPDATE statement changes the data present in one or more existing database records. For instance, the administrator may use the following query to update the balance of a customer with a late fee: UPDATE customer SET balance = balance + late fee WHERE customer id = '12345';The above query updates the balance column of the customer with customer id '12345' by adding the late fee to the existing balance. This statement is used to update the balance of all customers with a late fee in the same way.
To Know more about SQL SELECT visit:
https://brainly.com/question/29607101
#SPJ11
What are good components to preorder a PC with that are cheep? It would be my first PC by the way.
Answer:
Good Components
.CPU AMD Threadripper 3960X Amazon
.CPU cooler NZXT Kraken X63 (280mm AIO liquid cooler) Overclockers
.GPU Zotac Gaming GeForce GTX 1660 6GB CCLonline
.Memory 32GB Corsair Dominator Platinum RGB 3200MHz Scan
Explanation:
Select the correct answer from each drop-down menu.
Jeff writes a blog on digital photography. His most recent post was about visual artifacts. Identify the visual artifacts in the sentences below.
. A visual artifact of digital projectors is called
An inappropriate color difference in an image is called
Answer:
Screen-door effect
Explanation:
Answer:
An inappropriate color difference in an image is called: image noise
A visual artifact of digital projectors is called: fixed-pattern noise
Explanation:
trust me
which multiple monitor display mode should you select when you are using each monitor for different tasks?
Extended multiple monitor display mode should you select when you are using each monitor for different tasks.
Define monitor?A computer monitor is an output device that displays information in the form of images or text. A discrete monitor is made up of a visual display, supporting electronics, a power supply, a housing, electrical connectors, and external user controls.A monitor is also known as a VDU (Visual Display Unit) (VDU).A computer system's monitoring is just as important as the system itself. Monitoring enables proactive response, data security and data collection, and overall system health. While monitoring does not solve problems, it does make computer systems more stable and reliable.A monitor consists of circuitry, a screen, a power supply, buttons for changing screen settings, and a casing that houses all of these components.To learn more about monitor refer to:
https://brainly.com/question/25802316
#SPJ4
when you boot a linux system, the _____ filesystem is mounted as part of the initialization process.
The root filesystem is mounted as part of the initialization process. The root filesystem contains all of the essential files and directories that are used to boot and run the system.
What is filesystem ?
A filesystem is a type of database that is used to store and organize the different files and directories on a computer system. It provides a way for the operating system to store, access, and manage the system's files and directories. Filesystems can be either local or remote, and are used to store and organize data on a computer system in a hierarchical structure. Filesystems provide an efficient way to store and access data, allowing a user to easily locate and access the data they need. They also provide an organized method for data storage, allowing for more efficient use of space on the system. Additionally, filesystems can provide security measures such as access control lists and encryption to protect their data.
To learn more about filesystem
https://brainly.com/question/28528609
#SPJ4
You want to connect an external hard drive for backups. Which is the fastest connection used by current external hard drives
Answer:
thunderbold proly
Explanation:
Unscramble the following words and write them correctly in the
blanks.
1. EllC:
2. RMULAFO:
3.CTIONFUN:
4.COUMNL:
Answer:
1. icie?
2. formula
3. function
4. column
Explanation:
I'm not sure about #1.
what do you mean by automation and diligence with respect to a computer??
Answer:
Delegince computer without any motion resists
The expression if ( num != 65 ) cannot be replaced by:
The expression `if ( num != 65 )` cannot be replaced by `if ( num <> 65 )`. It is because the `<>` operator is no longer used in C++ programming language. Instead, the `!=` operator is used to represent "not equal to". When it comes to syntax, both the `!=` and `<>` operators check for operator .
The expression `if ( num != 65 )` checks if `num` is not equal to `65`. If `num` is equal to `65`, then the condition would evaluate to false, and the statements inside the if statement block would not execute. If `num` is not equal to `65`, the if statement block would execute.
Apart from `!=`, there are other operators used to compare numbers in C++. The following table lists some of the common comparison operators that are used in C++ programming language.
To know more about operator visit:
https://brainly.com/question/29949119
#SPJ11
What does music mean to you? Is it a big part of your life, or is it just "there". Answer in at least two complete sentences.
Answer:
Music means a lot to almost everyone and plays a significant role in most people's lives. With all of the different genres, music encompasses a wide range of moods and emotions, and there is something for almost everyone.
Answer:
Music plays a crucial role in several people's lives. There is proof that music has helped benefit people's lives to be more positive, and some studies show that students that listened to music and meditated with music during school, had anxiety levels less than students who didn't get such an opportunity.
Explanation:
(I've read a paper somewhere for school for a health project abt stress and anxiety)
How are computer networks connected?
Answer:Computer networks connect nodes like computers, routers, and switches using cables, fiber optics, or wireless signals. These connections allow devices in a network to communicate and share information and resources. Networks follow protocols, which define how communications are sent and received.
Explanation.
hope this helped you find what your looking for
Suppose you run a query, and a dialog box appears asking you to enter a date. You are most likely working with a ________ query.
answer choices
dialog
date & time
parameter
totals
Let's say you run a query and a dialog box prompting you to input a date displays. Most likely, you are using a Parameter query.
Which query, when executed, shows a dialog box asking the user to provide one or more criteria values?When a PARAMETER QUERY is executed, a dialog box that asks the user to enter one or more values is displayed. Calculated queries apply arithmetic operations to a set of records using aggregate functions.
What are the four different types of queries?they are: SQL queries, crosstab queries, parameter queries, action queries, and select queries are all examples of inquiries.
To know more about Parameter query visit:-
https://brainly.com/question/29841441
#SPJ4
Which of the following Big O notations is appropriate for the complexity of a search algorithm?
00 (1²)
OO (logn)
O (1)
O O(n)
Answer:
In our previous articles on Analysis of Algorithms, we had discussed asymptotic notations, their worst and best case performance, etc. in brief. In this article, we discuss the analysis of the algorithm using Big – O asymptotic notation in complete detail.
Explanation:
Introduction. Big O notation is used to describe the complexity of an algorithm when measuring its efficiency, which in this case means how well the algorithm scales with the size of the dataset.
We can express algorithmic complexity using the big-O notation. For a problem of size N:
A constant-time function/method is “order 1” : O(1)
A linear-time function/method is “order N” : O(N)
A quadratic-time function/method is “order N squared” : O(N 2 )
Definition: Let g and f be functions from the set of natural numbers to itself. The function f is said to be O(g) (read big-oh of g), if there is a constant c > 0 and a natural number n0 such that f (n) ≤ cg(n) for all n >= n0 .
Note: O(g) is a set!
Claire wants to use a conditional statement in JavaScript that provides a block of statement to be executed if the condition is false. Which conditional statement should she use?
A.
while statement
B.
do …..while statement
C.
for statement
D.
if else statement
Write a sub program to find the factors of a supplied number
Answer:
There are two options I can think of for you,
(Qbasic Code)
To Find the Factors of Given Number:
CLS
INPUT "Enter any number"; n
FOR i = 1 TO n
x = n MOD i
IF x = 0 THEN
PRINT i;
END IF
NEXT i
END
To Find the Factors of Given Number Using COMMON SHARED:
DECLARE SUB factor ()
COMMON SHARED n
CLS
CALL factor
END
SUB factor
INPUT "Enter any number"; n
FOR i = 1 TO n
x = n MOD i
IF x = 0 THEN
PRINT i;
END IF
NEXT i
END SUB
Which of the following is hardware or software that monitors and controls network traffic to prevent security breaches?
O trojan horse
O firewall
O anti-malware
O keylogger
Need answer now!!!!!
Answer:
Firewall
Explanation:
A trojan horse and keylogger are types of malware. While an anti-malware software may come with a firewall built in, the firewall is still the thing monitoring network traffic.
in a signature-based monitoring environment, network traffic is analyzed for predetermined attack patterns. true or false?
True.
In a signature-based monitoring environment, network traffic is analyzed for predetermined attack patterns, also known as signatures. Signature-based monitoring is a technique used in intrusion detection and prevention systems to identify known attacks and malicious behavior by matching the network traffic against a database of predefined signatures. The signatures are typically based on specific patterns, behaviors, or characteristics of known attacks, such as network port numbers, protocol types, payload content, or other indicators of malicious activity.
Signature-based monitoring is effective in detecting known attacks, as long as the signature database is up-to-date and comprehensive. However, it may be less effective in detecting new or unknown attacks that do not match any known signature or that use techniques designed to evade detection. To overcome this limitation, other techniques, such as anomaly detection and behavioral analysis, can be used in conjunction with signature-based monitoring to provide a more comprehensive approach to network security.
Learn more about network security here:
https://brainly.com/question/14407522
#SPJ11
Which two statements show cultural effects of computers and the Internet?
O A. Melissa says "LOL" instead of laughing at a joke her friend told.
B. Jake uses the Internet to meet people from other countries online,
C. A city's traffic lights are controlled by a computer algorithm to
help improve traffic
D. A company uses servers instead of paper databases to store
sales data
Answer:
I think it is A, Melissa says "LOL" instead of laughing at a joke her friend told.
Jake uses the Internet to meet people from other countries online, and a city's traffic lights are controlled by a computer algorithm to help improve traffic are the statements that show cultural effects of computers and the Internet. The correct options are B and C.
What is internet?The internet is a worldwide network of interconnected computers and servers that allows users to share, exchange, and communicate with one another.
Jake uses the Internet to connect with people from other countries: The internet has facilitated communication and the exchange of ideas between people from various cultures, leading to a greater understanding and appreciation of different cultures.
A computer algorithm controls traffic lights in a city to help improve traffic flow: This is an example of how technology is being used to make daily life more efficient and sustainable.
Thus, the correct options are B and C.
For more details regarding internet, visit:
https://brainly.com/question/13308791
#SPJ7
Explain the expression below
volume = 3.14 * (radius ** 2) * height
Answer:
Explanation:
Cylinder base area:
A = π·R²
Cylinder volume:
V = π·R²·h
π = 3.14
R - Cylinder base radius
h - Cylinder height
What are some common options to sort a Mail Merge Recipient list? Check all that apply. by age, by city, by ZIP code, by education, by last name
I hope this is right if not i will remove this but I think you can sort by last name and and by city
Answer:
by city
by ZIP code
by last name
An operating system is an interface between human operators and application software
It is true that an operating system is an interface between human operators and application software.
What is a software?Software is a collection of instructions, data, or computer programmes that are used to run machines and carry out particular activities.
Hardware, on the other hand, refers to a computer's external components. Applications, scripts, and programmes that operate on a device are collectively referred to as "software."
An operating system is a piece of software that serves as a conduit between the user and the hardware of a computer and manages the execution of all different kinds of programmes.
An operating system (OS) is system software that manages computer hardware, software resources, and provides common services for computer programs.
Thus, the given statement is true.
For more details regarding software, visit:
https://brainly.com/question/985406
#SPJ9