How do libraries let you write programs at a higher level? Why is testing important when building and sharing libraries?
Answer:
libraries do this so that you dx chae
Explanation:
Nano technology uses include...
A: Tennis racquets (high strength to weight)
B: Self-cleaning fabrics
C. Antibacterial fabrics
D: All of the above
Which of the following is NOT an acceptable way to create a color?
A) O "cyan"
B) O "#ff2341"
C) blue
D) "RGB (0, 15, 234)"
The option that is not an acceptable way to create a color is blue.
How can I create a color?There are a lot of ways to create some unique color such as the additions of colors together. An example is the addition of purple, orange, and green together.
Note that blue on its own cannot create another color and as such, The option that is not an acceptable way to create a color is blue.
Learn more about color from
https://brainly.com/question/4431200
#SPJ2
can someone help me answer this, I can’t fail tysm :)
Even though data travels at the speed of light, networks can be slow. What affects the download speed of the network? Check all of the boxes that apply.
Answer:
bandwidth and internet connection
Explanation:
Answer: bandwidth and internet connection
Explanation:
Imagine you are playing a video game like Super Mario or Sonic and you lose your last life. What are THREE distinct things that will happen once your lives become 0? Give three examples. Then put on your programmer's hat. Describe your examples using pseudocode; in other words, you don't have to use the exact language Scratch blocks would, as long as you write out each step in such a way that it's clear what the code would do.
Answer:
Three distinct things that would happen are
1) There would be a death animation played
2) GAME OVER text would appear
3) The game would most likely start over at the first level
Explanation:
The pseudocode:
1) Play death animation and music
2)Stop animation and music
3) Display Game over text
4) Remove game over text
5) Reset level
6) Open on beginning screen/level
Some Tiny College staff employees are information technology (IT) personnel.
Some IT personnel provide technology support for academic programs, some provide technology infrastructure support, and some provide support for both.
IT personnel are not professors; they are required to take periodic training to retain their technical expertise.
Tiny College tracks all IT personnel training by date, type, and results (completed versus not completed).
Given that information, create the complete ERD that contains all primary keys, foreign keys, and main attributes.
Why is it a good practice to use functions in programming? Select the best answer.
A.It is faster to run the code using functions.
B.Functions allow us to reuse common code.
C.All of these are correct.
D.It is easier to debug the code using functions.
Answer:
C. All of these are correct answer from the options for the question that u have given...
The good practice to use functions in programming is all of these are correct. The correct option is C.
What are functions in programming?The repetitious codes are removed by breaking a program down into functions, which not only reduces the size of the program but also improves its effectiveness. If there were repetitive codes, we would need to alter the program from several locations rather than just one.
As a result, organizing programs into functions aid in good administration and shortens programs by removing repeated code. A functional programming language is a particular kind of language that allows for the creation and application of pure mathematical functions, along with the use of conditional expressions and recursion to carry out various computations.
Therefore, the correct option is C. All of these are correct.
To learn more about functions in programming, refer to the link:
https://brainly.com/question/24297344
#SPJ6
What are the differences between linear algorithm and iterative algorithm
Answer:
For example Tower of Hannoi algorithm is made easy by recursion while iterations are widely used, efficient and popular. Recursive vs Iterative Algorithms: Approach: In recursive approach, the function calls itself until the condition is met, whereas, in iterative approach, a function repeats until the condition fails.
Why Should You Love Your Job?
Answer:
I think you should love your job because if you get good grades in high school and collage you get to pick your job and it will be amazing for you in life!
Hope that helped :)
1. The structural framework for greenhouses is typically made of
A. metal or plastic tubing.
B. wooden slats
C. glass beams
D. All of the above
If y varies inversely as x, and y =23 when x=8, find y when x=4 .
WILL MARK BRAINLIEST!!! Practice working with diagrams, shapes, and graphic text using this document. Complete each sentence. Steps 2, 4, and 6 involve using ___ under the Insert tab. The blue box is ___ in Step 7. The handle used to rotate the arrow in Step 8 is ___. To complete Step 13, the ___ tab needed to be used. Then, the WordArt options could be found under ___.
Answer:smart art
Enlarged
Green
Insert
Text
Explanation:
Live Preview, found in the Font group, uses which method for seeing different font sizes without committing to them.
double-clicking the sizes on the Size drop-down list
pointing the mouse pointer to the sizes on the Size drop-down list
right-clicking the cell and clicking Preview Size on the drop-down list
clicking the sizes on the Size drop-down list
Answer:
B- pointing the mouse pointer to the sizes on the Size drop-down list
Explanation:
Answer:
B
Explanation:
got it right on edge
Can someone tell me 5 facts about Registers and RAM, please?
[tex]\int\limits^a_b {x} \, dx \left \{ {{y=2} \atop {x=2}} \right. \lim_{n \to \infty} a_n \neq \neq \geq[/tex]Answer:
A register is a temporary storage area built into a CPU. ... The instruction register fetches instructions from the program counter (PC) and holds each instruction as it is executed by the processor. The memory registers are used to pass data from memory to the processor.
PLS MARK BRAINLIEST!!!
PLEASE
:
future quirk ideas! for bnha
What responsibilities does the film editor have? (Select all that apply).
Answer:
“Revising the script”, “reading the script”, and “manipulating graphics, plot, sound, and score”
Explanation:
Elliott is trying to normalize a database that he has designed. Which is not one of the elements of 1NF or 2NF?
Each cell of a table must contain a single value.
The table must not contain repeating groups.
Each table must depend on the entire primary key.
Each table must depend on the entire foreign key.
Answer: I think it’s D
Explanation: the rest apply to the the rules of 1NF and 2NF
Which is the hanging indent on the ruler?
A
B
C
D
Choose all items that are true about the two example of HTML shown on the right.
A. Example 1 will display differently than example 2 in a web browser.
B. They are styled differently, but will look the same in a web browser.
C. Example 2 is easier to analyze and repair.
D. The styling in example 2 is required by modern web browsers.
Answer:
“They are styled differently, but will look the same in a web browser” & “The styling in example 2 is required by modern web browsers”.
Explanation:
Answer:
B and C
Explanation:
Lin wants to play an online game with her friends. She read the description of the game and knows it contains several features with addictive design, including rewards for completing levels and long game times with penalties for quitting early. She likes the game but doesn’t want to get sucked in and skip her homework (which has happened before)! Name two guidelines Lin should set for herself before playing the game.
Answer:
Set a time limit for herself. Ask her parents for help monitering her app usage.
how many people in the world
Answer:
Around seven billion people
A “drone” is:
A. A helicopter with four propellers.
B. Any vehicle used on a seek-and-destroy mission.
C. Any experimental test vehicle.
D. An unmanned aircraft.
True or false: Machine learning lets computers
learn how to do things they weren't
specifically programmed to do.
Answer:
True
Explanation:
PLEASE ANSWER ASAP! 10 POINTS!
I really need help with this question, I can’t fail this please :) tysm
Answer:
i think its the third one, i hope this helps
Explanation:
Which securities protects networks from intruders? *
Application security
Network security
Information security
Operational security
Answer:
I think it is network security
Explanation:
Heard in an ad before :T
Answer:
Use Kika Clipboard to make paste easypneumonoultramicroscopicsilicovolcanoconiosis
if you hard working right now go to this EASY question
#BRAINLY and I will give you brainlist something I forgot what's it called for your hard work
You have been given an assignment to create a webpage that has a calming effect on the viewer. Which of these is most likely to achieve that goal?A.multiple font sizes B.a textured background C.rotating elements D.use of blues and greens
Answer:
The answer should be D.
Explanation: Cool colors make someone feel calm,mainly blue and green
Answer:
“Use of blues and greens”
Explanation:
What is the Denary representation of this 8 bit number > 01001111 ?
The Denary representation of this 8 bit number 01001111 is 79.
Decimal numberA binary number is a number expressed in the base-2 numeral system or binary numeral system. Binary numbers are either 0 or 1.
The decimal numeral system is the standard system for denoting numbers. Decimals are a set of numbers lying between integers on a number line.
Converting the number 01001111 to decimal:
01001111 = (0 * 2)⁷ + (1 * 2)⁶ + (0 * 2)⁵ + (0 * 2)⁴ + (1 * 2)³ + (1 * 2)² + (1 * 2)¹ + (1 * 2)⁰ = 79
The Denary representation of this 8 bit number 01001111 is 79.
Find out more on Decimal number at: https://brainly.com/question/1827193