The loop that divides user number by 9 is assign and the loop is said to be java while loop.
What is java loop?
Java loop is a statement which has controlled by a flow statement that allows code which has to be executed continuosly which has been based on a condition which is boolean. The while loop is said to be repeating according to statement.
Java loop comes in use when we required a continuosly execute statements in blocks. The while loop is said to be repeating according to statement. In case when Iterations statement has not been fixed , in such case while loop is recommended to use.
Therefore, The loop that divides user number by 9 is assign and the loop is said to be java while loop.
Learn more about java loop here:
https://brainly.com/question/14577420
#SPJ1
Which of the following is NOT an example of troubleshooting?
Contacting the manufacturer's customer support.
Making sure cables are connected properly.
O Purchasing a new device.
O Searching the Internet for a solution.
Answer:
O Purchasing a new device.
Explanation:
SUPPOSE A PIECE OF CODE FROM AN APPLICATION IS GIVEN TO YOU, AND YOU RECOGNIZE THAT IT IS TRYING TO ORDER THE DATA BY SWAPPING ADJACENT DATA POINTS ALL THE WAY THROUGH THE LIST. WHAT ALGORITHM DOES THIS REPRESENT?
A: QUICK SORT
B: BINARY SEARCH
C: MERGE SORT
D: BUBBLE SORT
Based on the above, the The algorithm represent what we call the Bubble Sort.
What is bubble sort program?The simple sorting algorithm bubble sort in C checks and switches elements if they are not in the desired order. It determines which of two nearby elements is greater or less by comparing them, then shifts the elements based on the condition until the element is located at its final location.
Therefore, Based on the above, the The algorithm represent what we call the Bubble Sort.
Learn more about Bubble Sort from
https://brainly.com/question/13161938
#SPJ1
The currency number format allows you to add a dollar sign symbol and decimal places for data true or false
decimal places for data is false
What kind of software would I be able to build with functional programming language?
Answer:
Functional programming languages are specially designed to handle symbolic computation and list processing applications. Functional programming is based on mathematical functions. Some of the popular functional programming languages include: Lisp, Python, Erlang, Haskell, Clojure, etc.
Explain security interdependence among components in a computing environment.Give three examples demonstrating security interdependence in an information system.
When a catastrophic risk faced by one firm is partially determined by the behavior of other firms, and when this behavior influences the incentives of the first firm to limit its exposure to the risk, security issues become interdependent.
What is security independence in a computing environment?Because security is a component that requires the integration of several system parts, such as from the authentication and authorization segment where users are authenticated and granted access, and security is established using the encrypted part of the program or system, security interdependence can be seen in the various components of the information system or the computing environment. Security is dependent on the system as a whole, including the link layer security, transport layer security, any encryption methods utilized, and secure data transfer.
The use of link layer security, transport layer security, and encryption techniques are three examples of how security is interdependent.
To get more information about Security Independence :
https://brainly.com/question/28149669
#SPJ1
Describe a present-day computing environment that might use each of the memory allocation schemes (single user, fixed, dynamic, and relocatable dynamic) described in the chapter. Defend your answer by describing the advantages and disadvantages of the scheme in each case.
The single user, fixed, dynamic, and relocatable dynamic is further explained below.
How to illustrate the information?1. Single user memory allocation scheme
The complete program is loaded into memory, and it allots as much contiguous space there as it requires. Programs or jobs are processed in this single user system in a sequential manner. The memory manager needs to put in the least amount of effort under this system. A register is used to hold the base address, while an accumulator measures the size of the program
Fixed partitions
The primary memory is divided into this fixed segment. Multiprogramming is possible. The partition's size doesn't change until the system is shut down, configured, or restarted. The memory size of the job, the appropriate job size, and the partition size must all be protected.
Dynamic partition
Only the amount of memory requested by each work is put into the memory, and the available memory is preserved in contiguous blocks.
Learn more about computer on:
https://brainly.com/question/24540334
#SPJ1
What is wrong with this text message:
USPS: Tracking Number:
US3896901185421. Dear
customer we have problems with
your shipping address, please
update your information. Check
Here: https://usps.nom.co/vf9
The Link is saying that there was an error and that you had a faulty link that was not secure.
The Connection is informing you that there was a mistake and that your link was broken and insecure.
What are tracking numbers?Once you receive your tracking number, tracking your package is simple. The USPS Tracking page only requires the tracking number to be entered.
Along with additional tracking details, such as delivery and/or attempted delivery information, you'll receive the item's current status. The majority of domestic services, like USPS Priority Mail, have tracking numbers that begin with a series of numbers, like 9400.
However, the USPS's overseas tracking numbers start with a series of letters.
Therefore, the Connection is informing you that there was a mistake and that your link was broken and insecure.
To learn more about tracking numbers, refer to the link:
https://brainly.com/question/27640701
#SPJ5
A student used material that was copyrighted but without penalty. Although age is not a guarantee, at what age is most material in the public domain?
It must be ---- years old.
a 10
b 25
c 50
d 100
Answer:
c
Explanation:
Whst addresses do not change if you copy them to a different cell?
The type of addresses that do not change if you copy them to a different cell is Absolute references.
What are absolute references?There are known to be two types of cell references which are: relative and absolute.
Note that Relative and absolute references can work differently if copied and filled to other cells. The Absolute references, is one that often remain constant, no matter where a person may have copied them to.
Therefore, The type of addresses that do not change if you copy them to a different cell is Absolute references.
Learn more about Absolute references from
https://brainly.com/question/11764922
#SPJ1
When following the user-centered design approach, what should a designer do after completing initial user research to better understand the user?
• Test the design solution with real people
• Determine who your user is
• Build on previous designs and make tweaks
• Determine the most important user problem to solve
which option is correct answer
Following the user-centered design approach, after completing initial user research to better understand the user they should go for determining who the user is. The correct option is B.
What is user-centered design approach?Design is founded on a clear understanding of users, tasks, and environments; it is guided and refined by user-centered evaluation; and it addresses the entire user experience.
The iterative process involves users throughout the design and development process.
UCD is an iterative design process in which designers focus on the users and their needs throughout the design process.
UCD design teams use a variety of research and design techniques to involve users throughout the design process in order to create highly usable and accessible products for them.
Following the user-centered design approach, they should determine who the user is after conducting preliminary user research to better understand the user.
Thus, the correct option is B.
For more details regarding user-centered design approach, visit:
https://brainly.com/question/28379376
#SPJ1
What are considered best practices to reduce our reliance on EUCs?
The best practices to reduce our reliance on EUCs are:
Access Control Change Control.Input Control. Security in the archiving and backups folders, etc.What qualifies as an EUC?End-user computing (EUC) is known to be a term used to describe computer platforms and systems that assist non-programmers in the creation of applications.
However, EUC and the linked virtual desktop infrastructure (VDI), which tends to runs desktop environments on a central server, are said to be much more than that.
Therefore, The best practices to reduce our reliance on EUCs are:
Access Control Change Control.Input Control. Security in the archiving and backups folders, etc.Learn more about End user computing from
https://brainly.com/question/13176736
#SPJ1
Why was the department of homeland security created
Answer: To stop terrorist
Explanation: After the attack on 9/11 the Department Homeland Security was created to stop terrorist. :)
Group dynamics differ according to the size of the group.
True
False
1
A problem that can be solved through
technological design has been identified. A
brief has been written. What is the next step
in the design process?
O Specification writing
O To conduct background research
O To identify barriers and constraints
The design of different potential solutions
The next step in the design process will be the design of different potential solutions. The correct option is D.
What is technological design?Technological design is a distinct process with several distinguishing characteristics: it is purposeful, based on specific requirements, iterative, creative, and systematic.
A good technical design is one that requires the least amount of effort and money while meeting your business requirements, particularly in terms of development speed and turn-around time, maintenance cost, deployment complexity, scalability, or security requirements.
A problem has been identified that can be solved through technological design. A synopsis has been written. The design of various potential solutions will be the next step in the design process.
Thus, the correct option is D.
For more details regarding technological design, visit:
https://brainly.com/question/26663360
#SPJ1
Question 1 of 4
OSHA requires which of the following trenches to have a protective system installed?
Select the best option.
O
A trench 1 foot deep.
A trench 3 feet deep.
A trench 14 feet deep.
Answer:
These are all wrong. OSHA requires a trench to have a protective system starting at 5 feet.
Explanation:
OSHA's own rules state this, unless it is in stable rock. If it is under 5 feet, it isn't required and can be decided by someone qualified.
What conflict control method are you exhibiting if you deal with people in a way that does not offend them?
Answer: A
Explanation:
Question 3: Which of the following is NOT one of the basic functions of malware?
O Gathering personal information about you
O Launching a denial of service attack
O Aggressive advertising
O Tracking your surfing habits
Question 1
Which of the following is NOT a picture format command?
O Remove background
O Theme
O Crop
O Arrange
The "Theme" command is NOT a picture format command. (Option B)
How are the others a picture format command?The other options listed – "Remove background," "Crop," and "Arrange" – are picture format commands that are typically found in image editing or presentation software.
"Theme" is usually related to the overall design style or appearance of a document or presentation, rather than a specific picture format manipulation.
It's important to note that your provided context is slightly unclear, and without additional details, this answer is based on common understanding of these terms in the context of image editing or presentation software.
Learn more about picture format at:
https://brainly.com/question/32510553
#SPJ2
In 25 words or fewer, explain how u can help maintain a productive work environment while on the job
I would ensure side attractions like gisting or surfing the internet while I am supposed to be working are eliminated while also personalizing my space.
Given the 4 ways companies try to manage their impact on the environment, write an essay (no more than 200 words) describing how a car manufacturer can improve their impact on the environment (come up with improvement initiatives on all 4 categories).
The 4 ways companies try to manage their impact on the environment are:
Do Measure as well as examine Greenhouse Gas Emissions.Lower Energy Consumption.Provide Renewable Energies. Lower Waste And Fight Obsolescence·How can businesses lessen their negative effects on the environment?This can be done through the Use of recycle. Businesses may address and lessen their influence on the environment by recycling. Whether it's recycling paper in an office or glass and food waste in the hospitality industry, it can be a simple action to incorporate into routine operational culture.
Note that companies can mae use of less gasoline, buy as well as keep fuel-efficient automobiles, take in fuel-efficient driving practices, taking public transit and carpooling, recycling used materials, and others.
Therefore, The 4 ways companies try to manage their impact on the environment are:
Do Measure as well as examine Greenhouse Gas Emissions.Lower Energy Consumption.Provide Renewable Energies. Lower Waste And Fight Obsolescence·Learn more about Greenhouse Gas Emissions from
https://brainly.com/question/9912932
#SPJ1
Is it true that all office programs include the capability to incorporate feedback called online collaboration across the internet or a company network
It is true that all office programs include the capability to incorporate feedback called online collaboration across the internet or a company network.
What is online collaboration?The process of connecting users digitally to communicate in an online space is known as online collaboration. A software system that allows team members to communicate using video, audio, and text is usually used to supplement online collaboration.
It is primarily used by businesses to improve communication and project efficiency.
All Office programs include the ability to incorporate feedback via the internet or a company network, which is known as online collaboration.
Thus, the given statement is true.
For more details regarding online collaboration, visit:
https://brainly.com/question/19191600
#SPJ1
students in your class publish a list online that ranks all the students in your grade from most attractive to least attractive. It gets forwarded and shared across social media.
How could you respond to this situation? List as many responses as you can think
Since there was an online ranking of all the students in your grade from most attractive to least attractive, my response will be that it is unethical.
That some student whose name may be in the lowest point can see it and be sad as well as laugh at which may make them to have low self esteem and can even make them to stop going to school so that they would not be laugh at and as such, such things should be removed as the cons are more that the pros.
What are Unethical behavior?Unethical behavior is known to be a term that can be defined as any kind of actions that are known to be done against social norms.
Note that they can be seen as any kind of acts that are found to be unacceptable to the public.
Therefore, Since there was an online ranking of all the students in your grade from most attractive to least attractive, my response will be that it is unethical. That some student whose name may be in the lowest point can see it and be sad as well as laugh at which may make them to have low self esteem and can even make them to stop going to school so that they would not be laugh at and as such, such things should be removed as the cons are more that the pros.
Learn more about Unethical behavior from
https://brainly.com/question/24518056
#SPJ1
Which of the following uses an augmented assignment operator to multiply number by 5?
• number = 5;
• number = number * 5;
• number *= 5;
• number += 5
The option that uses an augmented assignment operator to multiply number by 5 is option b: number = number * 5;
What is the Multiplication about?Multiplication and Assignment is one that is often denoted by (*=): This operator is known to be one that uses both the functionality of multiplication as well as the assignment.
A statement where an operator takes a variable as one of its inputs and then assigns the result back to the same variable is typically replaced by an augmented assignment. x += 1,
Hence: a = a * b will be written as a *= b
Therefore, The option that uses an augmented assignment operator to multiply number by 5 is option b: number = number * 5;
Learn more about assignment operator from
https://brainly.com/question/14308529
#SPJ1
When is a worker likely to be injured
Answer:
when he isn't paying attention or drops
In _____programs and data have the same form.
In array, programs and data have the same form.
Is the data type shared by arrays?A succession of objects with successive numbers are stored in an array, which is a homogeneous data structure (all components have the same data type). The items are allocated in contiguous memory.
By utilizing its number, each object in the array can be accessed (i.e., index). You specify an array's size when you declare it.
When the array is declared as an Object, it is possible to create an array containing items of several data types. as of System. An item in an array of objects can have a reference to any other type of object because objects are the basic class for all other types. A data structure called an array can hold a fixed-size group of identically data-typed elements
Therefore, based on the above, In array, programs and data have the same form.
Learn more about array from
https://brainly.com/question/26104158
#SPJ1
Correctly discuss the third generation Considering
Answer:
Random-access memory...
Give an example of Parallel and Serial transmission and explain the process between the two.
Answer:
You can find it online at geeks to geeks
Explanation:
In Serial Transmission, 8 bits are transferred at a time having a start and stop bit. Parallel Transmission: In Parallel Transmission, many bits are flow together simultaneously from one computer to another computer. Parallel Transmission is faster than serial transmission to transmit the bits.
Which of the following fields use computers?
1. Computer Science
II. Medicine
III. Video Gaming
IV. Automotive (Cars)
I
I, III
I, II, III
I, II, III, IV
Answer:
The answer is B. l, lll
Explanation:
please correct me if I'm wrong
in python
Write an if-else statement with multiple branches.
If year is 2101 or later, print "Distant future" (without quotes). Otherwise, if year is 2001 or greater, print "21st century". Otherwise, if year is 1901 or greater, print "20th century". Else (1900 or earlier), print "Long ago".
Sample output with input: 1776
Long ago
Answer:
year = 1776
if year >= 2101:
print("Distant future")
elif year >= 2001:
print("20th century")
else:
print("Long ago")
Explanation:
Alternatively, if you wanted the user to assign a value to the "year" variable. You could replace year = 1776 with year = int(input("Enter a year: "))
Write a program that reads a list of words. Then, the program outputs those words and their frequencies. The input begins with an integer indicating the number of words that follow. Assume that the list will always contain less than 20 words.
Ex: If the input is:
5 hey hi Mark hi mark
the output is:
hey 1
hi 2
Mark 1
hi 2
mark 1
Hint: Use two arrays, one for the strings, another for the frequencies.
Your program must define and call a method:
public static int getFrequencyOfWord(String[] wordsList, int listSize, String currWord)
Note: This is a lab from a previous chapter that now requires the use of a method.
The program that reads a list of words will be:
#include <stdio.h>
#include <string.h>
int main() {
int frequency, num_words, i, j;
char words[20][10];
scanf("%d", &num_words);
for (i = 0; i < num_words; i++) {
scanf("%s", words[i]);
}
for (i = 0; i < num_words; i++) {
frequency = 0;
for (j = 0; j < num_words; j++) {
if (strcmp(words[i], words[j]) == 0) {
++frequency;
}
}
printf("%s - %d\n", words[i], frequency);
}
return 0;
}
What is a program?It should be noted that a series of instructions written in a programming language for a computer to follow is referred to as a computer program.
The source code of a computer program is the version that can be read by humans. In this case, the program that reads a list of words is illustrated above.
Learn more about program on:
https://brainly.com/question/27359435
#SPJ1