Answer:
We use SQL Not Equal comparison operator (<>) to compare two expressions. For example, 10<>11 comparison operation uses SQL Not Equal operator (<>) between two expressions 10 and 11
Explanation:
<> operator is used to signify that a value is not equal to another value , Option A is the correct answer.
What are Comparison Operators ?An operator used to compare or relate the value of two number or string is called a Comparison operator.
The value of 0 or 1 is returned on using Comparison Operators.
<> , Not equal to operator signifies that the value are either greater than or less than the other value but not equal in any case.
Therefore <> operator is used to signify that a value is not equal to another value.
To know more about Comparison Operators
https://brainly.com/question/15260168
#SPJ2
Choose the type of collection created with each assignment statement
____ collection A = {5:2}
Options: tuple, dictionary, list
____ collection B = (5,2)
Options: tuple, dictionary, list
____ collection C = [5,2]
Options: tuple, dictionary, list
Answer:
dictionary
tuple
list
Explanation:
Match the stages of the desktop publishing process with the corresponding actions.
(Design, Setup, Prepress, Printing, and Content)
enter text and images
create an initial outline or draft of the artwork
choose a specific document template with appropriate DTP software
perform the tasks to get the artwork ready for printing
choose either to print or publish the product online
Answer:
Enter text and images - Content
Create an initial outline or draft of the artwork - Design
Choose a specific document template with appropriate DTP software - Setup
Preform the tasks to get the artwork ready for printing - Prepress
Choose either to print or publish the product online - Printing
--------------
Explanation:
Write a list comprehension statement to generate a list of all pairs of odd posi
Answer:
Print([(a,b) for a in range(10) for b in range(10) if (a < b and a%2 == 1 and b%2 == 1)])
Explanation:
Here, we declared a range of value for a and b using a for loop and the range function. The values are the first 10 numeric digits. The we used the if statement to establish our constraints;
In other to ensure that ;
Lower digit is written first ; (a < b) ;
Only odd numbers are considered,
a%2 == 1 ; b%2 == 1 (remainder when a and b are divided by 2 is 1.
Both a and b are declared as a tuple in other to obtain a pair of odd values.
What are the top ten famous games in the U.S.
Why? cause I wanna know :D
Minecraft
Fortnite
Rob.lox
GTA V
Rocket league
League of legends
Mario bros
GTA
Among us
Call Of Duty
What is the correct term for a piece of malware that hides inside a legitimate software program or file from trusted sources
Answer: Trojan horse
Explanation:
Based on the Greek legend of how Greek soldiers hid in a Trojan horse to infiltrate and destroy Troy from within, Trojan horse malware mirrors this attack when attacking software.
It hides inside and disguises itself as a legitimate software program or a file from a trusted source and then when clicked on, it works to infect the software.
Can you sort by reading the string in reverse in python?
Explanation:
# Let our string is brainlycom
Main = "brainlycom"
# First we will print the original string.
print("The original string : " + str(Main))
#Now Reverse Sort a String
Reverse_Sort= ''.join(sorted(Main, reverse=True))
print("String after reverse sorting : " + str(Reverse_Sort))
After running the above code you will get the result:
The original string : brainlycom
String after reverse sorting : yronmlicba
Give an example of an occasion when you used logic to solve a problem
Which is an example of a technology that has changed the safety of humans?
A) a bicycle
B) a window
C) a rope
D) a baseball bat
Answer:
B
Explanation:
because they have added more protection from breaking window to keep people safe such as if there were a lot of layers of city
Question 57 Which type of application attack would include User denies performing an operation, attacker exploits an application without trace, and attacker covers her tracks
Answer:
Auditing and logging
Explanation:
Auditing and logging is a form of application threats and attacks that an application security is susceptible to. It involves a user denies performing an operation; attacker exploits an application without trace, and at the same time attacker covers his or her tracks.
To prevent this, an Auditing and logging countermeasure should be put in place of application security to guide against such aforelisted threats and attacks before its actual occurrence.
Therefore, in this case, the correct answer is "Auditing and logging."
please help me
Match the technology with the appropriate task.
1. graphics software
2. word processor
3. CAD
4. laptop
5. GPS
Complete Question:
Match the technology with the appropriate task.
Column A
1. Graphics software
2. Word processor
3. CAD
4. Laptop
5. GPS
Column B
A. Create a company logo.
B. Get directions to a customer’s office.
C. Type a report.
D. Complete many types of tasks on a computer away from the office.
E. Design a building.
Answer:
1. A
2. C
3. E
4. D
5. B
Explanation:
1. Graphics software: it can be used to create a company logo. Some examples of software applications or programs are Adobe photoshop, Core-draw, illustrator etc.
2. Word processor: it is typically used for typing a text-based document. For instance, type a report. Some examples are notepad, Microsoft Word, etc.
3. CAD: design a building. CAD is an acronym for computer aided design used for designing the graphical representation of a building plan. An example is Auto-CAD.
4. Laptop: complete many types of tasks on a computer away from the office. A laptop is compact and movable, so it can be easily used in any location.
5. GPS: directions to a customer’s office. GPS is an acronym for global positioning system and it is typically used for locating points and directions of a place.
Answer:
1. A
2. C
3. E
4. D
5. B
Which of these method of ArrayList class is used to obtain present size of an object/
a. size()
b. length()
c. index()
d. capacity()
Answer:
The method of ArrayList class which is used to obtain the present size of an object is:
a. size()
Explanation:
In ArrayList, the size() method provides the number of objects available in the collection, array, or list. In Java programming, ArrayList forms a part of the collection framework and has a set of methods to access elements and modify them. An ArrayList does not have a fixed-size data structure, unlike an Array, but continues to expand in size.
The ________ contains links to folders and files that Windows determines you access frequently or links that you have added.
Answer:
Quick access list
Explanation:
Normally in computers, quick access list is usually the first node in the navigation pane and it contains links to folders and files that you access frequently plus the ones that you add by yourself. Windows detects them.
what type of device is a projector ?
a. input
b. memory
c. output
d. storage
Answer:
output
Explanation:
if I'm wrong sorryyy
Answer:
Output
Explanation:
:D
WHat is 100 digits of pi?
Answer:
3.1415926535 8979323846 2643383279 5028841971 6939937510 5820974944 5923078164 0628620899 8628034825 3421170679
Answer:
And now
AsapSCIENCE presents-
100 digits of π
3.14159, this is π
Followed by 2-6-5-3-5-8-9
Circumference over diameter
7-9, then 3-2-3
OMG! Can't you see?
8-4-6-2-6-4-3
And now we're on a spree
38 and 32, now we're blue
Oh, who knew?
7, 950 and then a two
88 and 41, so much fun
Now a run
9-7-1-6-9-3-9-9
Then 3-7, 51
Half way done!
0-5-8, now don't be late
2-0-9, where's the wine?
7-4, it's on the floor
Then 9-4-4-5-9
2-3-0, we gotta go
7-8, we can't wait
1-6-4-0-6-2-8
We're almost near the end, keep going
62, we're getting through
0-8-9-9, on time
8-6-2-8-0-3-4
There's only a few more!
8-2, then 5-3
42, 11, 7-0 and 67
We're done! Was that fun?
Learning random digits
So that you can brag to your friends
Explanation:
The programming interface for a legacy motor controller accepts commands as binary strings of variable lengths.
a. True
b. False
Answer:
The answer is "Option a"
Explanation:
The given question is incomplete, that's why its correct solution can be defined as follows:
The above-given question is the part of the Binary Autocomplete, in which this Autocomplete function would be a full word or sentence after just a few other letters were entered into the system. It approach improves text taking appropriate on smartphone devices of particular because every letter should not be written in such a single phrase.
How many total beats are these tied notes worth, assuming a quarter note equals 1 beat?
A. One
B. Five
C. Three
Answer:
one i think
Explanation:
NEED HELP WILL MARK BRAINLIEST AND 25 POINTS FOR ANSWER Which statement best describes a characteristic of a relational database?
It contains tables that are completely independent of one another.
It contains tables with fields that are associated with one another.
It is a feature that is primarily used to navigate databases.
It is a feature that is primarily used to add queries to tables.
The relational database has the characteristic feature of the adjoining of data with one another.
What is a relational database?The relational database is given as the interconnection of the data with the digital database management system.
The relational database is given with the characteristics of the adjoining of data tables and fields associated with one another. Thus, option B is correct.
Learn more about relational database, here:
https://brainly.com/question/13262352
#SPJ2
Review the advantages of database management systems in the Connolly textbook. Which two advantages do you think are the most important
Answer:
The two advantages of database management systems that are the most important are:
1. Data sharing: Database management systems enable data to be shared among users from different locations. It provides access to many users of the data, who can make specific data requests to meet their information needs.
2. Data consistency: Database management systems make it possible for all users to have the same data. It eliminates the problem of inconsistent data for decision making.
Explanation:
Basically, a Database Management System (DBMS) is defined as the software that enables end-users to create, read, update, delete, and access data in each database. Among the most notable advantages of Database Management System (DBMS) are improved data sharing and security, minimized data inconsistency, better data integration, improved data access, improved decision making, and increased end-user productivity.
Text refers to:
A. all forms of printed media
B. any collections of words.
C. Printed, visual, and audio media.
D. written information only.
Answer:
B
Explanation:
. Else-if is good selection statement that help us to solve problems in C++,mostly times same problem of same nature can also be solved via switch statement. Which one you prefer to use and why?
Answer:
Else-If statements
Explanation:
Personally, I prefer using Else-If statements for conditional statements since you can start with and If statement and add to it if necessary. Aside from this, Else-If statements also allow you to add more than one condition to be met by using tags such as and or and not. Switch statements are better in scenarios where you have a set of possible inputs or results and need a specific event to happen for each input/result, but this is not as common of a scenario so Else-If is usually my go-to conditional statement.
A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by
O clicking on the View tab.
O saving a contact.
O creating an appointment.
O flagging an email.
A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.
What is a Variable Expense?Business expenses can be classified as either fixed (invariable) or variable. A fixed expense does not change based on a business’s other activities. Costs like rent and administrative salaries are fixed costs, which remain the same no matter how much a business is producing. Imagine a factory that produces pencils — the cost of renting the factory building will remain the same, month after month, no matter how many pencils the company actually produces.
Variable expense ratio expresses variable expenses as a proportion of a company's sales. To calculate the variable expense ratio, simply divide the company's total variable expenses by the company's total net sales. To express the result as a percentage, simply multiply it by 100.
Therefore, A Task can be created in Outlook 2016 by clicking on the Tasks navigation item, or by clicking on the View tab. Thus, option A is correct.
Learn more about variable expense on:
https://brainly.com/question/13097236
#SPJ5
which of the following is not a type of operating system software?
a) windows b) linux
c)Macintosh d) Communications and organization
Answer:
the answer is communication abd organization
The option that is not a type of operating system software is called; D: Communications and organization
What are the types of Computer operating system?An operating system is defined as a type of software that manages the hardware and software of a computer as well as provision of common services.
The most popular Operating Systems for computers are Windows, Linux, Macintosh. Whereas, the popular types of operating systems for phones are iOS, Android, and Windows.
Read more about Computer Operating System at; https://brainly.com/question/1763761
#SPJ9
What are the three general methods for delivering content from a server to a client across a network
Answer:
Answered below.
Explanation:
The three general methods consist of unicasting, broadcasting and multicasting.
Casting implies the transfer of data from one computer (sender) to another (recipient).
Unicasting is the transfer of data from a single sender to a single recipient.
Broadcasting deals with the transfer of data from one sender to many recipients.
Multicasting defines the transfer of data from more than one sender to more than one recipients.
What happens when a string doesn’t include the separator that’s specified in the parameter of the split() method?
Answer:
Nothing
Explanation:
If a seperator value is provided as an argument within the split() method and the string does not include that value then the string will remain the same and will not be split. If no value is provided as an argument within the split() method, then the string that the method is being applied to will automatically be split in every space character (" ") that exists within it. This is the default value of split() when no argument is passed to it.
What is the output of the following program
#include
int toronto (int x)
{
int w;
if (x == 0) w = 1; else w = toronto (x-1);
return (w);
}
int main (void)
{
int a = 2;
printf ("%d", toronto (a));
return (0); }
a. 0
b. 1
c. 2
d. -1
e. none of these
Answer:
The output is 1
Explanation:
Analysing the flow of program (We start from the main method)
The main begins here
int main (void) {
This line declares a as integer and also initializes it to 2
int a = 2;
This line passes 2 to the function names toronto and also prints the result of the function
printf ("%d", toronto (a));
return (0); }
The toronto function begins here.
Note that the function receives 2 as its argument and this is saved in variable x
int toronto (int x) {
This declares w as integer
int w;
If x is 0, w equals 1
if (x == 0) w = 1;
If otherwise
else
This reduces x by 1 and performs a recursion
w = toronto (x-1);
return (w);
}
Because of the structure of the if condition in the toronto function, the function will be repeated until x is 0.
And when x = 0; w = 1
This returns w (i.e. 1) back to the main function where 1 is printed as the output
return (w);
Define a class named person that contains two instance variables of type string that stores the first name and last name of a person and appropriate accessor and mutator methods. Also create a method named displayDetails that outputs the details of a person
Answer:
Answered below
Explanation:
//Program is written using Java programming language.
Class Person {
private string firstName;
private string lastName;
void set firstName(string a){
firstName = a;
}
string getFirstName(){
return firstName;
}
void setLastname( string b){
lastName = b;
}
string getLastName( ){
return lastName;
}
void displayDetails( ) {
System.out.print(firstName);
System.out.print (lastName);
}
}
//Test program
Class Main{
public static void main(String args [] ){
Person person = new Person( )
person.setFirstName("Karen")
System.out.print(person.getFirstName)
person.displayDetails()
}
}
Select all the correct answers. Which statement will print the output 10 + 20=30
a. System.out.println("10 + 20 =30" );
b. System.out.println(10 + 20 =30);
c. System.out.println(10 + 20 =""+ (10+20));
d. System.out.println("10 + 20" =10+20);
e. System.out.println(10 + 20 ="" +10 +20);
Answer:
a
Explanation:
b will print out a boolean, true, i think
c gives an error?? i think
d seems weird
e is weird too
anyway, b,c,d,e all have bad syntax
Answer:
a
Explanation:
NEED HELP WILL MARK BRAINLIEST 25 POINTS FOR ANSWER
Which option is typically only used when utilizing self joins?
display name
alias
relationship
primary key
Answer:
relationship
Explanation:
Answer:
I agree the should be C)relationship
Explanation:
edg 2021
The plugin that changes Jenkins to use green balls instead of blue for successful builds is ________.
Answer:
The answer is below
Explanation:
Jenkins is a server used by developers to to reliably build, test, and deploy their software. Jenkins has different plugins that can be used for this testing.
Jenkin green ball plugin changes jenkins to use green balls instead of blue for successful builds. This green ball plugin is used as an alternative for blue ball builds and it does not affect the output of the XML and JSON APIs.
Which of the following variable names follows the rules for naming variables?
A. snack $
B. favorite_snack
C. lunch time
D. 15 minute snack