Answer:
Question 1:
Ans: index
Index is a unique position to identify a particular value in an array.
Question 2:
Ans: Element
Element is the individual value present in the array. An array is used to store one or more element.
Question 3
Ans: String
We can find from the question that the value is enclosed within "" (double quotes). So, the value added to the array is string. Any value that is enclosed within double quotes are termed as string.
Question 4:
Indexes are always int. Array index are never float. This is because, it represent the position.
Question 5:
The output will be 3. The reason is there are 3 values appended to the array "stuff" in the given piece of program.
Question 6:
The given code is an example of initializer list. Price is a list variable where the values are initialized.
Explanation:
6. Find the volume of the figure. Round your answers to the nearest
hundredth, if necessary.
20 in
20 in
Answer:
[tex]V=314.15\ ft^3[/tex]
Explanation:
The attached figure shows the cone.
Radius of cone, r = 5 ft
Height of the cone, h = 12 ft
We need to find the volume of the figure. The volume of a cone is given by :
[tex]V=\dfrac{1}{3}\pi r^2 h\\\\V=\dfrac{1}{3}\pi \times 5^2 \times 12\\\\V=314.15\ ft^3[/tex]
So, the volume of the figure is [tex]314.15\ ft^3[/tex].
Which of the following are ways to improve the sound quality of voice recordings? (Choose all that apply)
1. Noise Reduction
2. Normalization
3. Equalization
4. Distortion
Answer: 1, 2, and 3
Explanation:
The ways to improve the sound quality of voice recordings are noise reduction, normalization, and equalization. The correct options are 1, 2, and 3.
What is voice recording?All of the voices in a phone conversation are recorded during voice recording. This capability, which is frequently offered on business phone systems, is also known as call recording or voice logging.
One of the key steps in the creation of music is sound recording. It's a technique for recording musical performances so that they can be put together into compositions and polished into professional recordings.
Technology used to record or recreate audio signals, which are then translated into sound, is referred to as audio. It is an audio media that transmits audio-encoded signals by means of airborne sound vibrations.
Noise reduction, normalisation, and equalisation are techniques for enhancing the audio quality of speech recordings.
Thus, 1, 2, and 3 are correct options.
For more details regarding voice recording, visit:
https://brainly.com/question/12112707
#SPJ2
Complete the statement below using the correct term.
__________is rampant with bugs and shortcomings because most programmers do not know how or do not take the time to incorporate security into their applications.
answer quickly pls
Answer:
bugs?
Explanation:
..........................
.....
..
what is the cell name for the 237th row and 10th column
Answer:
is there a picture you can attach to show the cell, row, and column?
Explanation:
Answer:
an 237+10 row 247 row column
Which two items define a person's online identity? (choose two)
O Social media profiles
O User login name
O Passwords
O Posts made to blogs and social media sites
Can someone help with this please Thankyou
Drag the system component on the left to the device or program that fits with the system component.
Answer:
A. Back up software - Utility software
B. Printer - Device drivers
C. Camera - Firmware
D. Television - Firmware
E. Games console - Firmware
F. Antivirus software - Utility software
G. Disk Cleaner - Utility software
H. Video Card - Device drivers
Explanation:
Computer system components are the physical or hardware and software parts of the device. It is a combination of system software like utility software, device drivers and firmware, application software, and the hardware components and kernel.
Which one of the following is not word processing software?
A) Notepad
B) Microsoft Excel
C) Wordpad
D) Microsoft Word
Answer:
option a. notepad.
................
Lol lets make a new trend on here,
░░░░░█▐▓▓░████▄▄▄█▀▄▓▓▓▌█ Help
░░░░░▄█▌▀▄▓▓▄▄▄▄▀▀▀▄▓▓▓▓▓▌█ Doge
░░░▄█▀▀▄▓█▓▓▓▓▓▓▓▓▓▓▓▓▀░▓▌█ Take
░░█▀▄▓▓▓███▓▓▓███▓▓▓▄░░▄▓▐█▌ Over
░█▌▓▓▓▀▀▓▓▓▓███▓▓▓▓▓▓▓▄▀▓▓▐█ Brainly
▐█▐██▐░▄▓▓▓▓▓▀▄░▀▓▓▓▓▓▓▓▓▓▌█▌ Copy
█▌███▓▓▓▓▓▓▓▓▐░░▄▓▓███▓▓▓▄▀▐█ And
█▐█▓▀░░▀▓▓▓▓▓▓▓▓▓██████▓▓▓▓▐█ Paste
▌▓▄▌▀░▀░▐▀█▄▓▓██████████▓▓▓▌█▌
▌▓▓▓▄▄▀▀▓▓▓▀▓▓▓▓▓▓▓▓█▓█▓█▓▓▌█▌DO IT.
█▐▓▓▓▓▓▓▄▄▄▓▓▓▓▓▓█▓█▓█▓█▓▓▓▐
Answer: 9k
Explanation:
Answer:
LESSSSSSS GOOOOOOOOOOOOOOOOOOOO I will do the trend and give u credit too (can i have brainlest plz? :D )
Explanation:
.Choose the extention of Scratch Project
.sb2
jpeg
.exls
Answer:
I know about .sb3, and it similar to .sb2
that might be your answer.
Explanation:
jpeg is for pictures and .exls is Microsoft's excel
extension.
75 pts. Conduct online research about 10 of the most famous and dangerous computer viruses that threatened computer networks around the globe. Create a timeline of these viruses, and discuss how each of them worked and spread.
Answer:
Y2K - Y2K is a type of macro virus that targets those files that are created using programs such as Word, Excel, etc. Discovered - 1991
CMJ - These viruses install themselves as a part of the operating system.
Trivial.88.D - This is also a type of File infector virus that attacks a file and deletes the information it may contain.
Vienna virus - Is a type of Direct Action Viruses that can be found in the root directory of a hard disk.
Brain Virus - It is a Boot Infector Virus that often attack the master boot record of a hard disk.
Sweeper - It is a malware designed to appear as an anti-virus program. It's also known as 'Rouge'.
Trojan Horse - It imitates the appearance of a regular software and it attacks the computer system by deleting and sometimes re-creating the system files.
Spyware - It is a type of malware that operates to infringe upon the user's privacy.
Worms - It is a malicious program that replicate themselves from one system to another, through a network like worms.
Hope it helps :)
9 NIMDA.
8 SQL SLAMMER.
6 SIRCAM.
5 MELISSA.
4 CODE RED.
3 CONFLICKER.
2 SOBIG. Sobig appeared in 2003 as another worm, just like Mydoom.
1 MYDOOM. The Mydoom outbreak is the worst virus attack ever to happen.
Please mark me brainliestI WILL MARK BRAINLIEST
Create a concept for a new social media service based on new technologies. The service must include functions or features that require using rich media and geolocation or some other location-sharing technology that you have researched.
Submit your plan using both text and visual elements (graphics or drawings).
These are some key points you need to cover in your concept document:
What type of social media service is it?
What is the purpose of the service?
List the functions that the service provides.
List the features that the service provides
What makes the service unique?
Who is the target audience?
What type of layout did you use for the service?
Answer:... what are the answers u got
Explanation:
I need help, I can't send documents by mail, does anyone know why this happens?
Answer:
no, not really, but maybe its because your mail is full, or youre sending a too big attachment?
Explanation:
Which programming language is often used for embedded programs in electronic devices?
SQL
Microsoft Excel
Python
HTML
I think the answer is Python
Answer:
Python is the only option listed that is used for embedded programs.
Explanation:
Common languages for embedded systems are C, C++, JavaScript, and Python.
SQL is used to gather data from a site or database. HTML is a markup language used for designing many things. Microsoft Exel isn't a coding language it's a spreadsheet software.
Geraldo would like to compare two areas of text, Text1 and Text2, to each other. What steps should he take?
od
select Text1, hit F1, click. "Compare to another selection," select Text2
select Text1, hold Shift+F1, click "Compare to another selection," select Text2
hold Shift+F1, select Text1, hold Shift+F1 again, select Text2
Ohit F1, select Text1, hit F1 again, select Text2
Emma is writing a program to encrypt text entered by a user. Only letters, spaces and punctuation marks can be encrypted. Each letter in the text is replaced by the letter three places further down the alphabet. A is replaced by D, b by e, … Y by B, z by c. Spaces and punctuation marks are not changed.
Complete the test plan below by stating, for each input data and expected outcome, the type of test and a reason for the test.
Answer:
,
Explanation:
Which command group on the Slide Master tab is used to add headers, footers, and other placeholders to the slide
layouts and masters?
Edit Master
O Master Layout
Edit Theme
O Background
Answer:
its B
Explanation:
did it on edg
Answer:
Master Layout
Explanation:
FIRST ANSWER GETS BRAINLIEST IM GIVING 30 POINTS!!!! Select the correct answer. Emma's project team has to create an application within a short period of time. After a few considerations, the team decided to go ahead with the RAD model. How does the RAD model decrease development time? A. by using automated tools and reusing existing code B. by gathering all requirments in the first phase of the project C.by testing at the end of the life cycle D. by producing detailed documentation
Answer:
RAD model enables rapid delivery as it reduces the overall development time due to the reusability of the components and parallel development. ... Iteration time can be short with use of powerful RAD tools. Productivity with fewer people in a short time. Reduced development time.
The RAD model decreases development time by using automated tools and reusing existing code. which is the correct answer would be option (A).
What is the RAD model?The RAD model stands for Rapid Application Development. It is an implementation of an incremental model. The components or functions of the RAD model are created in concurrently as if they were mini-projects. The developments are timed, delivered, and then integrated into a functional prototype.
Because of component reusability and simultaneous development, the RAD approach offers quick delivery. Iteration time can be reduced by using strong RAD tools. Productivity with fewer individuals in a short period of time. Development time has been decreased.
Thus, the RAD model decrease development time by using automated tools and reusing existing code.
Hence, the correct answer would be option (A).
To learn more about the RAD model click here:
https://brainly.com/question/28903361
#SPJ2
Please Help!!!!!!
describe in paragraph/essay
form the computer skills you have learned in BIM1 and how those skills make you the best candidate for the position with their company.
Answer:Here are some examples of computer skills you can include on your resume to show you are good with computers:
Proficient in HTML coding.
Proficient with Microsoft Word, Excel and PowerPoint.
Thorough understanding of social media and social media analytics.
Knowledge of SEO techniques.
Skilled in website troubleshooting
Explanation:
If the ___________ cable damages the entire system/network will fail. * 1 point Drop Line Terminator Backbone None of the above
Answer:
The answer is "Backbone".
Explanation:
The backbone cables crossover connectors, intermediate and main interconnections, electrical inductions and bug fix cables, and jumping wires are used for cross-connecting the backbone with the backbone. Cabling between buildings also involves backbone cables. This interconnection of rooms, entry facilities, equipment rooms, or buildings, that's why its entire system/network would then fail if the backbone cord harms it.
Shelby is organizing information for a report about an American fitness expert named Jack LaLanne. Which sentence fits best in the box containing the question mark?
Incomplete question. Answered based on available information.
The missing options read;
A. Handcuffed, Jack swam from Alcatraz to Fisherman's Wharf in San Francisco in 1955.
B. Jack LaLanne received a star on the Hollywood Walk of Fame in 2002.
C. In 1954, Jack set a world record by swimming the length of the Golden Gate Bridge.
D. In 1950, Jack started inventing many of the first exercise machines.
Answer:
D. In 1950, Jack started inventing many of the first exercise machines.
Explanation:
In the English language, one of the main use of the question mark symbol is to solicit or make a query about a particular action, subject or thing.
In the sentences above, we notice that saying, "In 1950, Jack started inventing many of the first exercise machines" best fits the box containing the question mark.
I don't understand any of this please try your best and help if you can.
What does a driver do?
8. What do you believe: should husbands make decisions for their wives.
Suggest three reasons.
wives or not? Give reasons for your answer.
Answer:
No.
Explanation:
Because wives should make decisions for their life themselves.It helps them be self dependent so that they won't have to depend on their husbands. By letting them make decisions themselves they can get a successful career on their own effort and decisions.
What is variable? What are the rules followed for naming a variable?
The rules and conventions for naming can be summarized as follows: Variables names are case-sensitive. A variable's can be any legal identifier -an unlimited-length sequence of Unicode letters and digits, beginning with a letter, the dollar sign "$", or the underscore character "_".
PLEASE I NEED HELP!!!!! ASAP! Carly was given a writing assignment. In three to five sentences, give her some advice to help her plan and organize her writing.
Explanation:
She should take care of grammar for this she should have a dictionary,a plan on how to solve the assignment i.e ,which question she should write first and Which one at the last.
Hey should I get a r()blox gift card if so what amount 5 dollars 10 or 100
Answer:
yes you should get a 10 bc it not to much and u can still get something cool
Tuple in Python code help pleaseee!!! And of course I'll make you as Branlist
Question 9:
The correct answer would be either (b) or (d).
Question 10:
The correct answer would be (b).
Hope it helps. :)
Describe what a Bank Run is.
Answer:
Explanation:
A bank run occurs when a large number of customers of a bank or other financial institution withdraw their deposits simultaneously over concerns of the bank's solvency. As more people withdraw their funds, the probability of default increases, prompting more people to withdraw their deposits.
1. What does JDK stand for?
2. What does IDE stand for?
3. Are tools like Netbeans and Eclipse different languages from Java, or are
they tools or extensions of Java?
4. What is a keyword? List some Java keywords.
5. Is Java case sensitive? What is the case for Java keywords?
6. What is a comment? Is the comment ignored by the compiler? How do
you denote a comment line and a comment paragraph?
7. What is the statement to display a string on the console?
8. Show the output of the following code:
public class Test {
public static void main(String[] args) {
System.out.println("3.5 * 4 / 2 - 2.5 is ");
System.out.println(3.5 * 4 / 2 - 2.5);
}
}
Answer:
4. super Refers to superclass (parent) objects
5. Java source code is case sensitive. Java keywords are always in lowercas
Explanation: