Answer:
True or False
Explanation:
Boolean logic refers to a theory of mathematics developed by the prominent British mathematician, called George Boole. In Boolean logic, all variables are either true or false and are denoted by the number "1" or "0" respectively; True = 1 or False = 0.
Additionally, Boolean logic allow users to combine keywords with Boolean operators (quotes, AND, OR, near/n) to give a more personalized and relevant search results.
Hence, a Boolean expression is one that is either True or False and it is also known as logical expression.
write c++ program from 1to 100 to find prime numbers using statement.
please help me
Answer:
int count;
for (int i = 1; i <= 100; i++){
count = 0;
for (int j = 1; j <=i; j++)
if (i%j==0) count ++;
if (count == 2) cout << i << " ";
}
Question # 6
Dropdown
Choose the line of code that completes this program.
Output:
dog named Tiger
class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName
def __str__(self):
return self.species + " named " + self.petName
def changeName(self, newName):
self.petName = newName
# main program
myPetA = pet('dog', 'Spot')
print(myPetA)
Answer:
myPetA.changeName('Tiger') should be it
Explanation:
Answer:
myPetA.changeName('Tiger')
Explanation:
Correct answer edge 2020
While gaming online, Julian receives several insulting comments from another player. This is an example of
O denigration
O cyberstalking
harassment
O outing
Answer:
cyberstalking harassment
Explanation:
since Julian is being harrased or bullied online by someone
Should the security researcher have published exploit code that affects every version of Windows and cannot be patched
Answer:
No.
Explanation:
This is because there is probably the risk of malicious attackers grabbing the published exploit code that affects every window and then utilizes it for dubious purposes. Such as stealing vital information after gaining access.
The most ideal way for the security researcher to go about the exploit code that affects every version of the window is to meet the windows manufacturers, discuss the negative issues of windows software with them and eventually assist them in the software update to troubleshoot the patch.
Hiya people. I am a game developer and I need an idea for a new game. If you have any ideas, pls feel free to tell me. Best idea gets brainliest.
Answer:
A better RPG game all the one that are existing are the same dull thing
Explanation:
Answer:
There are many ideas you can get for games but now-a-days action games are getting more fame than others such as fortnite, freefire, pubg etc. I prefer you to make a game that is relatated to action or adventure. You can make it related to zombie hunting, or online fighting games, or some adventurous games like tomb raider.
8.3.9 Text to Binary Python
Using the knowledge in computational language in python it is possible to write a code that write the binary code
Writting the code:
#function that will convert the text to binary
def text_to_binary(text):
#variable to store the converted binary value
binary_text = ""
#iterate for each character in the text
for i in text:
#get the ASCII value of that character
ascii = ord(i)
#call the function to get the value of the
#current ascii number and append it to the
#binary_text
binary_text += decimal_to_binary(ascii)
#return the final converted binary value
return binary_text
def decimal_to_binary(decimal_value):
binary_base = 2
num_bits_desired = 8
binary_value = str(bin(decimal_value))[2:]
while len(binary_value) < num_bits_desired:
binary_value = "0" + binary_value
return binary_value
text = input("Input the string you would like to encode: ")
binary = text_to_binary(text)
print(binary)
See more about python at brainly.com/question/18502436
#SPJ1
assembly language uses _____ coder for programming.
Answer:
Assembly language uses alphabetic codes in place of binary numbers used in machine language. assembly language code is converted into executable machine code by a utility program referred as assembler.
list down four ways to start word 2010
Database are pranized in
consist of a series of
which consist of a senes of
Answer:
fields and records I guess is the answer
Which of these is an example of collective voice?
A. He hopes to make the world better for his children.
B. I have always dreamed of a kinder and better world.
C. We are here to make a better world for our children.
D. Your purpose is to make the world a better place.
Answer:
option C
hope it helps! please mark me brainliest..
Merry Christmas good day
Answer:
c
Explanation:
PLZ PLZ PLZ PLZ HELP I ONLY HAVE 5 MINUTES IT SAYS THE SUBJECT IS COMPUTERS AND TECHNOLOGY BUT ITS ACTUALLY MEDIA LIT
Answer:
B
Explanation:
I think that is the right answer
a clearly stated objective that how program should work and how it respond to a error is called??
Answer:
A Problem statement
Explanation:
I hope this is right
Is there anyone to awnser Tech questions
Answer:
yes
Explanation:
yes please i know the answer
You are designing an internet router that will need to save it's settings between reboots. Which type of memory should be used to save these settings?
a. Disk
b. Does not matter
c. SRAM
d. Flash
e. DRAM
Answer:
d. Flash
Explanation:
A flash memory can be defined as an electronic non-volatile memory chip (storage medium) that is typically used on computer systems and other digital devices such as routers, USB flash drives, switches, digital cameras, mp3 players etc. A flash memory is an electronically erasable programmable read only memory (EEPROM) and as such data saved (written) on it can be erased electronically. Also, a flash memory do not require a source of power (electricity) to save or retain data through the use of a floating gate MOSFET (FGMOS) or floating gate transistor.
In this scenario, you are designing an internet router that will need to save it's settings between reboots. The type of memory that should be used to save these settings is a flash memory because it does not require power to write or save data.
The User Datagram Protocol (UDP) is called the connectionless protocol because: It does not attempt to fix bad packets but resends lost packets. It attempts to fix bad packets but does not resend lost packets. It does not attempt to fix bad packets or resend lost packets. It fixes bad packets and resends lost packets.
Answer:
The User Datagram Protocol (UDP) is called the connectionless protocol because:
It does not attempt to fix bad packets or resend lost packets.
Explanation:
Ports are openings or entrance doors through which data packages have access to a PC or server. TCP and UDP are transport protocols with port numbers. TCP means Transmission Control Protocol. They are used to connect two devices over the internet and other networks. UDP means User Datagram Protocol. They are used to connect applications and to speed the transfer of data. Comparatively, UDP is faster, simpler, and more efficient than TCP. TCP enables retransmission of lost data packets, which UDP cannot do.
Vehicle identification number, color, weight, and horsepower best exemplify: A. data markers. B. attributes. C. entities. D. entity types. E. identifiers.
Answer:
The appropriate alternative is option B (attributes).
Explanation:
An attributes or attribute seems to be a key cornerstone of good governance provided to individuals, a community, as well as something else. Your greatest trait may be individuals ability to support others besides such as stopping traffic such that the duck or a bird community will further drive down the path.Other options really aren't connected to something like the situation in question. So the choice above would be right.
africans are unique people they are rich culture and a glorious history
Explanation:
In Africa art including crafts and culture, mythology and faith, clothes, lifestyle, music and tongues, African pixel is influenced. In Africa, social identities are plentiful, with vast quantities of multiculturalism being discovered not only through various continents, as well as within individual nations.
What is included in a linked list node?
I a reference to the next node
II an array reference
III a data element
Answer: I a reference to the next node
III a data element
Explanation:
A linked list is simply referred to as a linear data structure, whereby the elements would not be stored at memory locations that are together in the sequence.
In simple words, we can simply say that a linked list is made up of nodes in which, every node has a data element and also a link or reference to the next node that is in the list.
Therefore, based on the explanation above, the correct option will be:
I. a reference to the next node
III a data element
A document template is a___
preformatted structure for a document
read-only document
type of reference for a document
passcode assigned to access a hidden document
To specify your preferred colors, fonts, and effects for a document, which of the following should be done?
1.Create custom theme fonts
2.Create custom theme
3.Create a custom paragraph style
4.Create a custom character style
Answer: crest custom theme
Explanation:
Answer:
crest custom theme
Explanation:
Which steps can you take to remove all the data you've just typed from a cell?
Click the cell, then press Delete.
Click Undo on the Quick Access Toolbar.
Click Cut on the Clipboard group.
Press Ctrl+Z.
Press Ctrl+Shift.
Explanation:
Ctrl+Z
Click and press Delete
Click Undo
Design an algorithm that takes in a stream z1, . . . , zM of M integers in [n] and at any time t can output a uniformly random element in z1, . . . , zt . Your algorithm may use at most polynomial in log n and log M space. Prove the correctness and analyze the space complexity of your algorithm. Y
Answer:
import random
def rand_select(*args):
selected = random.choice(args)
print( selected)
rand_select(12,32,43,54,2,34,65,2,64,74,97)
The space complexity of this program is O(1)
Explanation:
The list of arguments to the function is assigned to the variable "args" and the random's choice method randomly picks an item and assigns it to the variable "selected", then the variable is printed out on the screen. The memory used is 1 + 1 = 2, which is a constant, therefore making the space complexity to be O(1).
Which sentence indicates that Jeff is mentioning the visual synopsis in his proposal while planning a media project?
In the proposal, Jeff states the reason to create the project. He also explains how his project will conclude with a perfect takeaway point. Jeff describes how he is going to tell the story through photography. He then mentions various strategies to engage his audience and describes plans to make sure that the project reaches his intended audience.
Answer:
I believe its the last question
Explanation:
Answer:
I would say describes plans to make sure that the project reaches his intended audience
Explanation:
none needed
How is opera diffrerent from blues,gospel,and country music?
Answer: Opera has its roots in Europe; the other styles are American
Explanation:
Write a Java program that launches 1000 threads. Each thread adds 1 to a variable sum that initially is 0. You need to pass sum by reference to each thread. In order to pass it by reference, define an Integer wrapper object to hold sum. Run the program with and without synchronization to see its effect.
The Internet began when a large company wanted to sell products online.
True
or
False
Answer:
True
Explanation:
Answer:
It would be true
Explanation:
A graph shows the relationship between two or more variables that?
a. can be represented by any of these
b. are represented by circles
c. are represented by dots
d. are represented by bars
Please Answer I really would like to know!!!
Answer:
A. can be represented by any of these
Explanation:
the acronym PC stands of
Answer:
personal computer
Explanation:
It stands for personal computer
Cyberbullying can negatively impact a victim’s
well-being.
Answer:
whats the questions
Explanation:
Answer:
Physical
Explanation:
took the test
Hoda wants to create a new presentation in PowerPoint with existing graphics and designs. What is the easiest and fastest way for her to do this? Use an existing template. Design a new theme for the presentation. Create a custom template for the presentation. Search for a design template online.
Answer:
The answer is A
Explanation:
Edge 2020