Answer: well it’s not “There is no output due to a runtime error”
Explanation: Put that and I got it wrong
The Answer Is 1.
Edge 2020.
One technique to find the "things" that need to be included in the new system begins by starting with a user and the use cases and then try to identify the necessary informational "things." This technique is called the _______. a. check list technique b. domain analysis technique c. noun technique d. brainstorming technique
Answer:
Coding is a skill where you take instructions (the steps in a task) and translate it into a languaage.
Explanation:
Coding is a skill where you take instructions (the steps in a task) and translate it into a language the computer understands since computers do not communicate like humans. They communicate in a language called BINARY and
Describa las características más importantes de cada procedimiento,difencias entre si Procedimiento Bessemer Procedimiento Siemens Martin Procedimiento Horno Electrico
Answer:
A continuación se explican cada una de las características más importantes de cada horno:
Explanation:
Procedimiento Bessemer:
En este horno el oxígeno del aire quema el silicio y el manganeso que se encuentra en la masa fundida y los convierte en óxidos., luego el oxígeno comienza a oxidar el carbono.Luego finalmente el hierro se oxida,ya en este punto sin haber oxígeno ahora se añade a esa masa hierro carbono y finalmente manganeso.
Procedimiento Siemens Martin:
A 1800 º C funde la chatarra y lingotes de arrabio solidificado bajo la llama producida en la combustión; se eliminan las impurezas y se consiguen aceros de una gran calidad para fabricar piezas de maquinaria. Este tipo de horno tiene una gran uso en el mercado ya que pueden fundir latones, bronces, aleaciones de aluminio, fundiciones y acero.
Procedimiento Horno electrico:
Trabaja a una temperatura de 1930 °C, se puede controlar eléctricamente, pueden contener hasta 270 toneladas de material fundido. También en estos hornos se inyecta oxígeno puro por medio de una lanza.
What output is generated by this for loop?
String str = "";
for (int i = 0; i <= str.length() - 1; i++)
{
System.out.println(str.charAt(i) + "-");
}
Group of answer choices
---
No output is generated.
--
-
Answer:
No output is generated
Explanation:
(1) The first line initialized an empty string, str
(2) The for loop attempts to iterate through the empty string. Since it is an empty string, no iteration will be done.
This implies that, the print statement within the loop block will not be executed.
Hence:
No output is generated
a(n) ________ refers to a memory tool to encode difficult-to-remember information in a way that is much easier to remember.
A mnemonic refers to a memory tool used to encode difficult-to-remember information in a way that is easier to remember. Mnemonics can be in the form of acronyms, visualizations, rhymes, or other mnemonic devices that help individuals retain and recall information more effectively.
A mnemonic is a memory aid or technique used to encode complex or hard-to-remember information in a more easily recallable format. They help individuals by providing a mental structure or pattern that connects new information with existing knowledge or familiar concepts.
By leveraging these memory aids, individuals can enhance their ability to retain and retrieve information, especially when faced with challenging or voluminous material.
Mnemonics are widely utilized in education, language learning, memorization tasks, and other contexts where effective information recall is essential.
To learn more about remember: https://brainly.com/question/29874885
#SPJ11
Topic: Looking around: D&S Theory as Evidenced in a Pandemic News Article Description: In this reflection you are to find a news article from the pandemic on the web that has some connection to Canada. The goal will be to analyse the change in demand and/or supply of a good/service during the pandemic. Read the article and address the following questions/discussion points: 1. Briefly summarize the article and make note about how your article connects with the theory of supply and demand. 2. Based on the article, what kind of shift or movement along the demand and/or supply curve would be expected? Make sure to explain your reasoning and draw a Demand and Supply graph with the changes shown. Also, address the change in equilibrium price and quantity. 3. How, in the limited amount of economics we have covered thus far, has your perspective on how the economy works changed? Include either a copy of your article in your submission, or a hyperlink embedded in your submission for your professor to access the article. Your reflection should be between 250 and 300 words or one page double spaced, 11 or 12 pt font.
Article summaryThe article “Canadian small business owners frustrated with customers refusing to wear masks” by Karen Pauls published in CBC News on August 14, 2020.
The article shows how small business owners are grappling with the balance between health and safety for their customers and workers and the economic impact of the pandemic on their businesses. The article connects with the theory of supply and demand as it highlights how the change in demand for products and services offered by small businesses is influenced by changes in customer behaviour and attitudes towards the mandatory use of masks.2. Shift or movement along the demand and/or supply curve
The mandatory use of masks by customers in small businesses would lead to a decrease in demand for products and services offered by the small businesses, resulting in a leftward shift of the demand curve. The decrease in demand would lead to a decrease in the equilibrium price and quantity of products and services. For instance, in the case of small businesses, this would mean a decrease in the quantity of products sold and the price charged for the products.
To know more about article visit:
https://brainly.com/question/32624772
#SPJ11
Which describes a design theme in PowerPoint?
Why do you think they added the wait .5 seconds block?
Answer:
Satisfaction
Explanation:
People enjoy the sensation of the computer doing something and the feeling that the program is advanced.
One part of a development team has completed an algorithm. Why is it important to share it with others on the team? Choose all that apply. If it is easy to understand, no one will dispute what is included in the algorithm. It will give everyone else an opportunity to comment on the process described in the algorithm. It will serve as the starting point for all future activity. It communicates the consecutive instructions of the solution.
Answer: B,C,D
Explanation:
Answer:
the answer is B,C,D
Explanation:
which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?
The correct response is d. Slide Sorter. You may easily rearrange or divide your slides into sections by dragging and dropping them around the grid-like display of your slides thanks to the slide sorter.
You can see and sort the presentation slides in PowerPoint using the Slide Sorter view. Click the "Slide Sorter" button in the presentation view buttons in the Status Bar to enter the Slide Sorter view. The "Slide Sorter" button in the "Presentation Views" button group on the "View" tab of the Ribbon is another option. The presentation slides can be added to, removed from, and copied using the Slide Sorter view. The visual flow of the presentation is also displayed in PowerPoint's Slide Sorter view. Additionally, you may add and observe a slide transition animation here. All of the presentation slides in PowerPoint's Slide Sorter mode are displayed as thumbnails. The slide's content cannot be changed in this view. However, many of the functions available in PowerPoint's Slide Sorter view are also available in the Normal view's slide thumbnails pane. Click a slide thumbnail in the Slide Sorter window to choose a slide. Click and drag the slide thumbnails in this view, then release them where you want them to be. This will reorder the order of the slides in your presentation. The selected slide opens in Normal View, where you can edit its content, if you double-click a slide thumbnail in PowerPoint's Slide Sorter view or if you choose a slide thumbnail and then press the "Enter" key on your keyboard. In the Slide Sorter window, click the desired slide thumbnail to choose it for deletion. Then, use your keyboard's "Delete" key. Alternatively, you can erase the slide by doing a right-click. then from the pop-up menu, choose the "Delete Slide" option.
Learn more about Slide Sorter here
https://brainly.com/question/16910023
#SPJ4
Which view do you choose if you want to see a thumbnail of each slide in a presentation arranged in a grid?
a. Normal
b. Outline
c. Slide Show
d. Slide Sorter
a school uses the array to call an attendance register every morning
A school uses an array to call an attendance register every morning. In this context, the array is a data structure that organizes and stores the names of students in a fixed-size format. This enables the school to efficiently keep track of attendance and ensure all students are accounted for.
In computer programming, an array is a data structure that stores a collection of elements of the same data type in a contiguous block of memory. Each element in an array is identified by an index or a subscript, which is an integer value that represents its position within the array.
Arrays can be used to store and manipulate data in many different ways, such as storing a list of numbers, a collection of strings, or a matrix of values. They are often used in algorithms and data processing applications, where efficient access to and manipulation of large amounts of data is required.
To learn more about Array Here:
https://brainly.com/question/31605219
#SPJ11
how can you send and share a message information through a phone
Answer:
Through text message
Explanation:
Go to messages and select the text you want to share and save it to your clipboard then go to the person you want to send it to then hit the clipboard button and your text will be there.
Through text messages
Go to messages and select the text you want to share and save it to your clipboard then go to the person you want to send it to then hit the clipboard button and your text will be there!
What is a graphics card?
Answer:
a printed circuit board that controls the output to a display screen.
makes ya games or other things look pog
Explanation:
why is preserving the integrity of data, information, and systems an important cybersecurity goal?
Additionally, data and information that is not properly protected can be vulnerable to corruption, tampering, or deletion, which can lead to significant data loss or system downtime.
What is vulnerable ?Vulnerability is the state of being exposed to potential harm or loss. It is the susceptibility of an individual, group, system, or country to physical, social, economic, or environmental harm or risks. Vulnerability can arise from a variety of factors, including poverty, social exclusion, discrimination, insecurity, climate change, and natural disasters. It can also be caused by a lack of access to resources, services, or infrastructure that can protect people from harm. Vulnerability can lead to losses in health,
To learn more about vulnerable
https://brainly.com/question/13138322
#SPJ4
a Python program to process a set of integers, using functions, including a main function. The main function will be set up to take care of the following bulleted items inside a loop:
The integers are entered by the user at the keyboard, one integer at a time
Make a call to a function that checks if the current integer is positive or negative
Make a call to another function that checks if the current integer to see if it's divisible by 2 or not
The above steps are to be repeated, and once an integer equal to 0 is entered, then exit the loop and report each of the counts and sums, one per line, and each along with an appropriate message
NOTE 1: Determining whether the number is positive or negative will be done within a function; and then a call to that function will be made from within the main function. The following is what you are to do within that function: if an integer is positive, add that integer to the Positive_sum increment the Positive_count by one If the integer is negative add that integer to the Negative_sum increment the Negative_count by one
NOTE 2: Determining whether the number is divisible by 2 or not will be done within a second function; and then a call to that function will be made from within the main function. The following is what you are to do within that function: if the integer is divisible by 2 increment the Divby2_count by one if the integer is not divisible by 2 increment the Not_Divby2_count by on
NOTE 3: It's your responsibility to decide how to set up the bold-faced items under NOTE 1 and NOTE 2. That is, you will decide to set them up as function arguments, or as global variables, etc.
Here's an example Python program that processes a set of integers entered by the user and determines if each integer is positive/negative and divisible by 2 or not, using functions:
The Python Programdef check_positive_negative(number, positive_sum, positive_count, negative_sum, negative_count):
if number > 0:
positive_sum += number
positive_count += 1
elif number < 0:
negative_sum += number
negative_count += 1
return positive_sum, positive_count, negative_sum, negative_count
def check_divisible_by_2(number, divby2_count, not_divby2_count):
if number % 2 == 0:
divby2_count += 1
else:
not_divby2_count += 1
return divby2_count, not_divby2_count
def main():
positive_sum = 0
positive_count = 0
negative_sum = 0
negative_count = 0
divby2_count = 0
not_divby2_count = 0
while True:
number = int(input("Enter an integer: "))
positive_sum, positive_count, negative_sum, negative_count = check_positive_negative(
number, positive_sum, positive_count, negative_sum, negative_count)
divby2_count, not_divby2_count = check_divisible_by_2(number, divby2_count, not_divby2_count)
if number == 0:
break
print("Positive count:", positive_count)
print("Positive sum:", positive_sum)
print("Negative count:", negative_count)
print("Negative sum:", negative_sum)
print("Divisible by 2 count:", divby2_count)
print("Not divisible by 2 count:", not_divby2_count)
if __name__ == "__main__":
main()
The check_positive_negative() function takes the current integer, and the sum and count of positive and negative integers seen so far, and returns updated values of the positive and negative sums and counts based on whether the current integer is positive or negative.
The check_divisible_by_2() function takes the current integer and the count of numbers seen so far that are divisible by 2 or not, and returns updated counts of numbers divisible by 2 and not divisible by 2.
The main() function initializes the counters for positive and negative integers and for numbers divisible by 2 or not, and then loops indefinitely, prompting the user for integers until a 0 is entered. For each integer entered, it calls the check_positive_negative() and check_divisible_by_2() functions to update the counters appropriately. Once a 0 is entered, it prints out the final counts and sums for positive and negative integers, and for numbers divisible by 2 or not.
Read more about python programs here:
https://brainly.com/question/26497128
#SPJ1
Which of the following are results of technological advancements and increased automation?
Increased labor demand
Decreased productivity
Increased cost
Increased productivity
Answer:
increased productivity
Explanation:
sorry if i am not correct
Help please answer the question 1 2 3 4 5 6
Answer:1. A 2. C 3. B
Explanation: just did it
Write a while loop that prints from 1 to user_num, increasing by 1 each time. Sample output with input: 4 1 2 3 4
To solve the problem of printing numbers from 1 to a user-specified number using a while loop, we need to understand the basic structure of a while loop and how it can be used to achieve this task.
A while loop is a type of loop that executes a block of code repeatedly as long as a specified condition is true. In this case, we want to print numbers from 1 to user_num, so we can use a while loop to repeat this process until we reach the specified number.
To do this, we first need to prompt the user to input the desired number. We can then use a variable to keep track of the current number we are printing, and loop through each number from 1 to the user-specified number using a while loop.
Here's the code to achieve this:
user_num = int(input("Enter a number: ")) # prompt the user for input
i = 1 # set the starting number to 1
while i <= user_num: # loop through each number until we reach the user-specified number
print(i) # print the current number
i += 1 # increment the number by 1 for the next iteration
In conclusion, we have used a while loop to print numbers from 1 to a user-specified number. The code prompts the user for input, initializes a variable to keep track of the current number, and then uses a while loop to loop through each number and print it.
To learn more about while loop, visit:
https://brainly.com/question/15690925
#SPJ11
What actions can you take from the Go To tab? Check all that apply.
O moving to a specific page
O moving to a specific line
moving a file to a new folder
moving a specific number of pages ahead of the current position
moving to a new document
Moving to a specific page and moving to a specific line as the moving a specific number of pages ahead of the current position.
When is the use of file?When you need to move a file from the document folder to the new folder you just created can be done by different methods and when you click right button of mouse there is a list pop up in which many options flashes you should choose either cut or copy from the list.
1)Choose 'cut' then paste it in the new folder. If you choose cut the file it will be removed from the document folder.
2)Choose 'copy' then paste it in the new folder. If you choose copy the file the file will remain in the document folder and also in the new folder.
An encrypted connection between user devices and one or more servers is established by a virtual private network (VPN), a service that provides Internet security. A VPN can safely link a user to the internal network of a business or to the Internet at large. Businesses frequently use a VPN to provide remote workers with access to internal software and data or to establish a single shared network among numerous office locations.
Therefore, Moving to a specific page and moving to a specific line as the moving a specific number of pages ahead of the current position.
Learn more about VPN on:
https://brainly.com/question/29432190
#SPJ2
define Microsoft Excel 2010
Answer:
a very very old Microsoft application that only people on old pc's use now
Explanation:
Answer:
Microsoft Excel is a Microsoft software program that allows users to organize, format, and calculates data using the formulas of a tablet.
This program is part of the Microsoft Office Suite and supports other Office Suite applications. Microsoft Excel can now be purchased on subscription via cloud via office 365, as can other Microsoft Office products.
Explanation:
In Excel, entering a value column and clicking on a cell in the low sheet below allows the cell to add all of the numbers entered above to the "auto sum" button. This takes place in the manual leader counts, which before the development of the modern table were a labor-intensive part of the business.
Microsoft Excel is also a key user technology, useful in training and professional development, in various types of simple case applications. MS Excel has been included in basic corporate computer graduation training for several years, and temporary employment agencies may examine individuals for a wide variety of clerical duties on their skills with Microsoft Word and Microsoft Excel.
The data visualization principle has changed the Microsoft Excel usage cases. Where companies have used Microsoft Excel for, say, hundreds of records in the past, most business cases today involve tablets containing less than a dozen values for each particular project.
when the growth of a small network is being planned, which design element will include the physical and logical topology of the network?
A network's overall design, including its physical and logical topology, communication channels, network protocols, and hardware and software components, is referred to as its architecture.
What is the name of a network's logical or physical layout?The physical and logical configuration of a network's nodes and links is known as its topology. Typically, nodes contain switches, routers, and software with switch and router functions. A graph is a common way to represent network topologies.
What distinguishes logical from physical network design?Using physical elements like ports, cables, racks, and more, a physical network diagram shows the topology of the network. On the other hand, a logical network diagram displays the "invisible" components and connections that pass through the network's physical objects.
To know more about network's visit:-
https://brainly.com/question/14276789
#SPJ4
what powershell cmdlet can be used to add a static route?
The PowerShell cmdlet used to add a static route is "New-NetRoute". The New-NetRoute cmdlet allows you to create a new static route entry in the routing table of a Windows computer.
It provides flexibility in defining the destination network, next hop, and other properties of the route.Here's an example of how to use the New-NetRoute cmdlet to add a static route:New-NetRoute -DestinationPrefix 192.168.10.0/24 -InterfaceIndex 2 -NextHop 192.168.1.1
In this example, the static route is being added for the destination network "192.168.10.0/24" with the next hop IP address "192.168.1.1". The "InterfaceIndex" parameter specifies the index number of the network interface through which the traffic should be routed.
You can customize the command based on your specific requirements, such as modifying the destination network, next hop, or interface index.
Please note that adding routes usually requires administrative privileges. Therefore, make sure to run the PowerShell command prompt as an administrator before using the New-NetRoute cmdlet.
Learn more about Windows here
https://brainly.com/question/29892306
#SPJ11
who is springtrap from five night at freddy 3
Answer:
Purple Guy (or William Afton).
Explanation:
(The man behind the slaughter.)
Answer:
well i believe that is william afton
Explanation: he killed the kids and then after that the crying childs scared him into the room with the spring bonnie costume then he put it on and then boom the gears killed him and springtrap was born
you need to connect a router to a subnet. the subnet uses the ip address 192.168.12.0/26. you are instructed to assign the last ip address on the subnet to the router. which ip address will you use?
The IP address 192.168.12.62 can be used as per the given scenario.
What is IP address?IP stands for "Internet Protocol," which is a set of rules that governs the format of data sent over the internet or a local network.
In essence, IP addresses are the identifiers that allow information to be sent between devices on a network: they contain location information and make devices available for communication.
The broadcast address is the last IP address in a subnet. You can calculate it by taking the network address (the first address in the subnet), adding the number of addresses in the subnet, and then subtracting one.
Thus, as per the above method, the IP address that can be used is 192.168.12.62.
For more details regarding IP address, visit:
https://brainly.com/question/16011753
#SPJ1
Why are digital signals a reliable way to create, store, and transmit information?
Answer:
Digital signals are a more reliable form of transmitting information because an error in the amplitude or frequency value would have to be very large in order to cause a jump to a different value. Signals are composed of infinite possible values. Signals are composed of only two possible values
How globalization is related to communication technology?
Answer:
hey mate there is your answer
For this challenge you will need to write a program that will produce the display for the individual frames, given the user inputting the number of pins knocked down in each frame of bowling.
Rules:
• The game of bowling consists of 10 frames, where a player gets 2 attempts to knock down 10 pins.
• If the player knocks down all 10 pins on the first roll, that should be displayed as X, and the next number will be the first roll of the next frame.
• If the player doesn't knock down any pins, that should be displayed as -
• If the player gets a spare (knocks down the remaining pins on the second roll of the frame, that should be displayed as /
The user will input integers tha represent the number of pins that have been kncked down on each roll. The list is not a fixed size, as bowling a perfect game requires only 12 rolls, while most games would use more rolls. Use anvil to make this and send the link.
This method takes a list of numbers that represent how many pins were knocked down on each roll and outputs a string that displays the separate frames in accordance with bowling rules.
In bowling, how many pins are there?At the start of each frame, ten pins are placed at the end of the bowling lane. With the triangle's point towards the bowler, they are positioned in a triangle arrangement.
function score(display frames):
body num = 1
0 for roll num
Result: ""
range(len(scores)) for I
If roll num = 3 and frame num = 10:
break
If roll num = 1 and scores[i] = 10:
result += "X "
frame num plus one
if roll num == 1, then
score(s[i]) + output += str(i) + " "
roll num plus one
else:
if scores[i-1] plus scores[i] equal 10, then
result += "/ "
else:
score(s[i]) + output += str(i) + " "
frame num plus one
0 for roll num
bring back output.strip ()
# A sample of usage
Result = [10, 7, 3, 9, 0, 10, 0, 8, 8, 2, 0, 6, 10, 10, 10, 8, 1]
print(display frames(scores)) # Results: X 7/9 - X 0/8 - X X/X/X 8 1
To know more about outputs visit:-
https://brainly.com/question/19088371
#SPJ1
What do you understand by the following malicious programs (i) computer virus (ii) worm (iii) trojan horse (iv) sweeper (v) malware (vi) spyware.
Answer:
Computer virus- A computer virus is a type of malware that attaches to another program (like a document), which can replicate and spread after a person first runs it on their system. For instance, you could receive an email with a malicious attachment, open the file unknowingly, and then the computer virus runs on your computer.
Worm virus- A computer worm virus is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers.
Trojan horse virus- A Trojan Horse (Trojan) virus is a type of malware that disguises itself as legitimate code or software. Once inside the network, attackers are able to carry out any action that a legitimate user could perform, such as exporting files, modifying data, deleting files or otherwise altering the contents of the device.
Sweeper virus- Sweeper virus is a fake anti-spyware program known to be an updated version of the rogue anti-spyware program Virus Doctor. Virus Sweeper is a program that when it is installed starts to perform actions such as scanning your computer without your permission.
Malware- Malware is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's computer security and privacy.
Spyware- Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission. Spyware is a kind of malware that secretly gathers information about a person or organization and relays this data to other parties.
which of the following best describes a bastion host? group of answer choices a host with two or more network interfaces a computer on the perimeter network that is highly protected a computer running a standard os that also has proxy software installed a computer running only embedded firmware
A bastion host is best described as a computer on the perimeter network that is highly protected. The correct answer B.
It is often used as a gateway between an internal network and the internet, and is designed to withstand attacks from outside the network. It is typically configured with additional security measures, such as firewalls and intrusion detection systems, to protect the internal network from potential threats.
The purpose of a bastion host is to provide secure access from the internet to specific resources on the internal network, while also protecting the internal network from potential threats. To achieve this, a bastion host is typically configured with additional security measures, such as firewalls and intrusion detection systems, to prevent unauthorized access. The correct answer B.
Learn more about bastion host:
https://brainly.com/question/6582462
#SPJ11
readfiles: this command should read the historical price data from the two files. the command takes 2 arguments, the pathname of the mrna data file and the pathname of the pfe data file.
The "readfiles" command reads historical price data from two files, using the mrna data file and the pfe data file as arguments.
The "readfiles" command is designed to retrieve historical price data from two separate files. It requires two arguments: the first argument is the pathname (file path) of the mrna data file, and the second argument is the pathname of the pfe data file. By providing the correct file paths, the command will access the specified files and extract the historical price data from them. This data can then be used for analysis, comparison, or any other relevant purposes.
For more information on command visit: brainly.com/question/32674229
#SPJ11
-Create a module in Excel
-Use an input box to ask for a phrase of at least 10 characters For now, don’t worry about checking it if it has 10 characters
-Display messages to user (not in immediate window):
-number of characters in the
-phrase
-First 4 characters
-Last 6 characters
-Character number 5
-All but the first and last characters
Creating a module in Excel is pretty simple. Before starting, you should know that a module is a component of Excel that stores functions or procedures that you have built-in Visual Basic for Applications.
In other words, a module is a collection of macros, which you can run from various Microsoft Office programs, such as Excel, PowerPoint, and Word, among others. Here are the steps you need to follow to create a module in Excel: Step 1: First, open Microsoft Excel.
Note that each of these functions returns a string that contains the message you want to display to the user. You can call these functions from a button or a macro in Excel. I hope this helps! Let me know if you have any questions.
To know more about display visit:
https://brainly.com/question/33443880
#SPJ11