Use the drop-down menus to complete these sentences.

The running of a set of programming instructions multiple times is called
.

If a sequence of code is repeated multiple times, it is referred to as
.

One set of coding instructions processing many different sets of data and eliminating multiple lines of code is an example of

Answers

Answer 1

Answer:

The running of a set of programming instructions multiple times is called iteration.

If a sequence of code is repeated multiple times, it is referred to as a loop.

One set of coding instructions processing many different sets of data and eliminating multiple lines of code is an example of Iteration value.

Explanation:

Answers are correct. I got them right.

Answer 2

The running of a set of programming instructions multiple times is called iteration, If a sequence of code is repeated multiple times, it is referred to as loop, One set of coding instructions processing many different sets of data and eliminating multiple lines of code is an example of value of iteration.

What is Iteration?

Iteration refers to repeating a certain number of steps continuously until a particular condition is met successfully.

The iterations can be an infinite number of times or an infinite number of times. It all depends on the program in which we are performing the iterations.

Iteration is the repetition of a process in a computer program, usually done with the help of loops.

When the first set of instructions is executed again, it is called an iteration. When a sequence of instructions is executed in a repeated manner, it is called a loop.

Therefore, The running of a set of programming instructions multiple times is called iteration, If a sequence of code is repeated multiple times, it is referred to as loop, One set of coding instructions processing many different sets of data and eliminating multiple lines of code is an example of value of iteration

Learn more about Iteration, here:

https://brainly.com/question/14969794

#SPJ3


Related Questions

nadine is the systems administrator for a network with a single subnet. The subnet uses 192.168.1.0 with a mask of 255.255.255.0. The network has 10 servers running Windows Server. Srv1 currently provides both DHCP and DNS services. Nadine wants to increase the fault tolerance for her DHCP servers. She installs a new server, Srv11, and configures it for DHCP. She configures a scope on Srv11 to match the scope on Srv1 and then excludes half of the addresses in the scope on Srv1 and the other half of the addresses on the Srv11. Nadine decides to test her solution and shuts down Srv1. As a test, she forces a workstation to release its IP address and request a new one. She finds that the workstation has the IP address 169.254.0.15 with a mask of 255.255.0.0. What should Nadine do to fix the problem?

Answers

Answer:

Authorize Srv11

Explanation:

In order to fix this problem, Nadine should Authorize Srv11. The problem is most likely being caused due to failure of authorization of the server. This would prevent this server from being on the same scope as Srv1 and therefore, it is why the IPaddress being given is different. DHCP is an automatic protocol and would not be able to provide an IP address in the same scope if the server is not Authorized to do so.

HURRY GUYS I GOT 3 QUESTIONS LEFT
IM TIMED!!!!!

Which element should be used only when the content simply references the element
a. nav
b. figure
c. hgroup
d. article

Answers

the answer is b i believe

The element that should be used only when the content simply references the element is figure. The correct option is B.

What is element of referencing?

The four components of the author, date, source, and title are all included in reference list entries.

There are four referencing conventions that are frequently used. They go by the names of the Modern Languages Association (MLA), American Psychological Association (APA), Harvard, and Modern Humanities Research Association (MHRA) systems.

In computer programming, a reference is a value that allows a program to access a particular piece of data indirectly, such as the value of a variable or a record, in the computer's memory or in another storage location.

As a result, accessing the data is referred to as dereferencing the reference, and the data is referred to as the reference's referent.

Thus, the correct option is B.

For more details regarding elements of referencing, visit:

https://brainly.com/question/28270502

#SPJ2

im timed!!!!!!!!!!!!!!!!!!

I NEED HELP ASAP
THANK YOU SO MUCH

Answers

Answer:

C.

Explanation:

Which line of code will create an instance of the pet class?

class pet:
def __init__(self,strSpecies,strName):
self.species = strSpecies
self.petName = strName

myPetA = pet('dog', 'Spot'), myPetA = pet(self, 'dog', 'Spot'), myPetA = new pet('dog', 'Spot'), myPetA .pet() = 'dog', 'Spot'

Answers

Answer:

myPetA = pet(self, 'dog', 'Spot')

Explanation:

I mite be wrong

The line of code that will create an instance of the pet class is myPetA = pet (self, 'dog', 'Spot'). Option B is correct.

What is code?

Computer code, or a set of instructions or a system of rules defined in a specific programming language, is a term used in computer programming (i.e., the source code). It is also the name given to the source code after a compiler has prepared it for computer execution.

Code, often known as source code, refers to text that a computer programmer has created in a programming language. Programming languages like C, C#, C++, Java, Perl, and PHP are examples.

Another less formal term for text produced in markup or style languages, such as HTML and CSS, is code (Cascading Style Sheets)

Therefore Option B is correct.

Learn more about code:

https://brainly.com/question/17204194

#SPJ2

For enterprise servers, or servers accessed around the clock, SATA disks are preferred over SAS disks. True or False

Answers

False, sas is hold more then sata disks do

The given statement is false that, SAS disks are preferable over SATA disks for business systems or servers accessed continuously.

What is the SATA disks?

The majority of desktop and laptop hard drives use the SATA (or Serial Advanced Technology Attachment) interface, which was first introduced in 2003. Despite being rotary hard drives with spinning platters and a moving needle that writes data to successive sectors on each platter, they are known as SATA hard drives.

Serial ATA (Serial Advanced Technology Attachment, or SATA) is a command and transport protocol that outlines how data is transferred between a computer's motherboard and these types of mass storage devices (SSDs).

Therefore, it is false.

Learn more about the SAS disks, refer to:

https://brainly.com/question/28310028

#SPJ2

9.6 Code Practice
Instructions
1
Declare a 4x 5 array called N

Please helppp

Answers

Answer:

See Explanation

Explanation:

The question lacks so many details, as the array type and the programming language is not stated.

Assume that, it is Java:

The rule to follow is:

Data-Type[][]Array-Name = new Data-type[rows][columns]

If the given information is for an array of type integer, the code will be;

int[][] N = new int[4][5]

Where

N = Array-Name

int = Data-type

4 and 5 are the dimensions of the array

This tool lets you insert text anywhere in your document. O Cut О сору O Drag O Paste​

Answers

Answer:

Drag or paste (im not 100% sure tho)

Explanation:

Write a pseudo code to complete the factorial of 5 recursively and print the value on the screen. I’ll mark brianliest

Answers

Answer:

number = int(input('Enter number: '))  

factorial = 1

for i in range(1, number + 1):

   factorial = factorial * i

print(factorial)

You will need to input 5 when you run the code. Or you can add change the "number" to "number = 5"

In order to multitask, a computer must have two or more processors. True or False

Answers

Answer:

False

Explanation:

:) brainliest pls

Answer:

True

Explanation:

ASKING AGAIN CAUSE I GOT A WEIRD LINK

HTML5 allows web pages authors to place a/an _________ element around a block-level element that contains child elements
a. nav
b. div
c. h1
d. a

Answers

Answer:

A. Nav

Explanation:

....,..........

You use a Windows system that is a member of a domain. The computer is used by several different users belonging to different groups. You have a custom application on the computer, and you want to configure the firewall as follows: Allow a specific port used by the application. Open the port only for members of the Sales group. Using Windows Firewall with Advanced Security, what should you do to configure the firewall with the least effort possible

Answers

Answer:

Explanation:

Windows Firewall with Advanced Security (WFAS) is a management tool in windows which allows for precise confiuration and control of the Windows Firewall System. It allows for certain rules to be created and modified which dictate to the firewall how it must run.

The easiest way to configure the WFAS to achieve the goal stated in the question is to open the app and use the New Rule function.

To do this, one must:

Calling up the Windows Firewall with Advanced Security (WFAS) Click on the inbound rules on the top left corner of the interfaceRight clickon the rule and modify accordingly

Cheers

Bernard is creating an inventory of his comic book collection. He has documented the title, publisher name, production year, and
series number for each comic in his collection. He creates a spreadsheet of this information. Typically, each one of these
categories, such as production year, would be contained in:
A: a formula bar.
B: a cell.
C: a row.
D: a column.

Answers

Answer:

D: a column.

Explanation:

Since in the question it is mentioned that Bernard wants to develop an inventory. Now he created a spreadsheet of the given information

The categories like production year, publisher name, etc would be contained in a column as it represent the heading under these the year, name of the publisher are written

Therefore the option d is correct

Answer:

D: a column

Explanation:

Typically, each one of these

categories, such as production year, would be contained in a column.

A system that connects computers throughout the world is a

Answers

Answer:

Wide Area Network (WAN)

Explanation:

the Internet is the most basic example of a WAN, connecting all computers together around the world. Because of a WAN's vast reach, it is typically owned and maintained by multiple administrators or the public.

The technical information section of Carmine's GDD is fairly brief because his team has included a separate document that explains all the technical information in far greater detail. What is this separate document referred to as?

tech addendum
technical debriefing
amendment to the technical
technical bible​

Answers

Answer: tech addendum

Explanation:

The separate document that explains all the technical information in far greater detail is referred to as the technical addendum.

An addendum simply refers to an attachment that modifies the conditions of a contract or gives more information about the contract.

In this scenario, since the technical information section of Carmine's GDD is fairly brief, the tech addendum will explain all the technical information in far greater detail.

Ellie is conducting formal research for a new design project and wants to find demographic information. What source is considered most credible to use for her research?

Wikipedia articles

competitor websites

government data

magazine opinion pieces

Answers

may be wikipedia i’m sorry if it’s wrong ☹️

Answer:

Its governmental data

Explanation:

what is the name of first electroechanical computer​

Answers

Explanation:

hope it is helpful to you

what is the main reason for adding somebody into the BCC list for an email?​

Answers

Answer:

protecting email address privacy

Explanation:

for securing and privacy reasons and it is for the best

2. Which of the following is not one of the guidelines for using instant messaging?A.You can use in place of all face-to-face communication.
B.Keep messages short.
C.Never text or send an instant message when you are angry.
D.Use it for casual conversations.​

Answers

Answer:

A. You can use in place of all face-to-face communication.

Explanation:

Hope this helps

C++

Assume the existence of a Window class with integer data members width and height. Overload the << operator for the Window class-- i.e., write a nonmember ostream-returning function that accepts a reference to an ostream object and a constant reference to a Window object and sends the following to the ostream: 'a (width x height) window' (without the quotes and with width and height replaced by the actual width and height of the window. Thus for example, if the window had width=80 and height=20, << would send 'a (80 x 20) window' to the ostream object.) Don't forget to have the function return the proper value as well. Assume the operator has been declared a friend in the Window class.

Answers

Answer:

Following are the code to the given question:

#include <iostream>//header file

using namespace std;

class Window //defining a class Window

{

private:

int width, height;//defining integer variable

public:

friend ostream& operator << (ostream& stm, Window& width)//defining a friend function that takes two parameters

{

return stm<<"a ("<<width.width<<" x "<<width.height<<") window"; //use return keyword that return its values

}  

Window(int width, int height): width(width), height(height)//defining parameterized constructor that inherit width and height in its parameters  

{}

};

int main() //Main method

{

Window w(80,90);//calling class constructor

cout<<w;//print object value

return 0;

}

Output:

a (80 x 90) window

Explanation:

In the above code, a class "Window" is defined that uses a friend function "ostream& operator" is declared that uses the "ostrea&" as a data type to hold two-variable "stm and w" in its parameter, and declared the parameterized constructor to hold value by inheriting width and height in its parameters.

Inside the main method, a class object is created that calls the constructor and uses the print method to print object value.

Write a program that accepts an integer value called multiplier as user input. Create an array of integers with ARRAY_SIZE elements. This constant has been declared for you in main, and you should leave it in main. Set each array element to the value i*multiplier, where i is the element's index. Next create two functions, called PrintForward() and PrintBackward(), that each accept two parameters: (a) the array to print, (b) the size of the array. The PrintForward() function should print each integer in the array, beginning with index 0. The PrintBackward() function should print the array in reverse order, beginning with the last element in the array and concluding with the element at index 0. (Hint: for help passing an array as a function parameter, see zybooks section 6.23) As output, print the array once forward and once backward.

Answers

Answer:

The program in C++ is as follows:

#include <iostream>

using namespace std;

void PrintForward(int myarray[], int size){

   for(int i = 0; i<size;i++){        cout<<myarray[i]<<" ";    }

}

void PrintBackward(int myarray[], int size){

   for(int i = size-1; i>=0;i--){        cout<<myarray[i]<<" ";    }

}

int main(){

   const int ARRAY_SIZE = 12;

   int multiplier;

   cout<<"Multiplier: ";

   cin>>multiplier;

   int myarray [ARRAY_SIZE];

   for(int i = 0; i<ARRAY_SIZE;i++){        myarray[i] = i * multiplier;    }

   PrintForward(myarray,ARRAY_SIZE);

   PrintBackward(myarray,ARRAY_SIZE);

   return 0;}

Explanation:

The PrintForward function begins here

void PrintForward(int myarray[], int size){

This iterates through the array in ascending order and print each array element

   for(int i = 0; i<size;i++){        cout<<myarray[i]<<" ";    }

}

The PrintBackward function begins here

void PrintBackward(int myarray[], int size){

This iterates through the array in descending order and print each array element

   for(int i = size-1; i>=0;i--){        cout<<myarray[i]<<" ";    }

}

The main begins here

int main(){

This declares and initializes the array size

   const int ARRAY_SIZE = 12;

This declares the multiplier as an integer

   int multiplier;

This gets input for the multiplier

   cout<<"Multiplier: ";    cin>>multiplier;

This declares the array

   int myarray [ARRAY_SIZE];

This iterates through the array and populate the array by i * multiplier

   for(int i = 0; i<ARRAY_SIZE;i++){        myarray[i] = i * multiplier;    }

This calls the PrintForward method

   PrintForward(myarray,ARRAY_SIZE);

This calls the PrintBackward method

   PrintBackward(myarray,ARRAY_SIZE);

   return 0;}

Hawaii and japan are examples of islands made by? You have to write it.

Answers

Answer:

Volcanic activity

You are a part-time manager for The Mobile Vegan, a food truck catering to vegan diners in Portland, Oregon. Jessica Rosen, the owner of the business, wants to expand by adding other food trucks in Portland and the surrounding area. Whether she purchases new trucks or takes over an existing food truck business with an established clientele, she needs a loan to cover the cost of the trucks. She has asked for your help updating the workbook she created to analyze the loan information and forecast sales. Switch to the Loan Scenarios worksheet, and then calculate the monthly payment for the Add 1 Truck scenario as follows:
a. In cell D11, enter a formula using the PMT function to calculate the monthly payment for a loan.
b. Use the inputs listed under the Add 1 Truck loan scenario in cells D5, D7, and D9. (Hint: The result will be displayed as a negative number to reflect the negative cash flow of a loan payment.)

Answers

Answer:

i acc dont know

Explanation:

srry

Select the correct answer from each drop-down menu.
Nancy suffers from Repetitive Strain Injury (RSI), a condition that results from repetitive hand movement on a computer. What can help Nancy to reduce the strain from RSI?

To reduce the strain from RSI, Nancy can use___
and ___ regularly.

Answers

The right way that goes left

Answer:

To reduce the strain from RSI, Nancy can use an ergonomically designed keyboard and exercise regularly.

Explanation:

Just makes the most sense dude.

Write a program that will have Tracy draw a stretched out slinky. The slinky should have: Five rings Each circle should have a radius of 35 Tracy should move forward 40 pixels after every circle

Answers

Solution :

The Tracy commands :

main.py

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

   circle(35)

   forward(40)

What do fair use and copyright laws help you understand ?

Answers

Explanation:

we can understand about the systematic laws and surely we can be aware of such things also it promotes the correct use of our technology and innovations.

In its most general sense, a fair use is any copying of copyrighted material done for a limited and “transformative” purpose, such as to comment upon, criticize, or parody a copyrighted work. ... In other words, fair use is a defense against a claim of copyright infringement.

Heres a survey
What's your fav food
What do you do for a living
What do you do for fun
Are you a boy or girl
What's your fav color
And last what kind of pet do you have if you dont have a pet then whats ypu fav game to play

Answers

food.

I'm a child of God snatching lost souls out of Hell

bake

I go to church

some is to much information to give thx and have a blessed day

Answer:

My favourite food is pizza.

I have food, I drink water and stay neat to live.

I play indoor games, read books and plays social media for fun.

I am a girl.

My favourite colour is black and white.

I have a dog name Freddie and a cat called Jacky. My favourite game is football and badminton

HELPPPPPPPP


what helps users focus on the key messages that draw peoples attention to key areas of a site

a. site content
b. visual hierarchy
c. wireframe
d. group block

Answers

The answer is visual hierarchy :)
I believe the answer is B

Which of the following best explains how messages are typically transmitted over the Internet? The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. The message is broken into packets that are transmitted in a specified order. Each packet must be received in the order it was sent for the message to be correctly reassembled by the recipient’s device. A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. B The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. The message is broken into two packets. One packet contains the data to be transmitted and the other packet contains metadata for routing the data to the recipient’s device. C The message is transmitted as a single file and received in whole by the recipient’s device.

Answers

Answer:

A The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient’s device.

Explanation:

Network packets are used to send data across a network. These can be routed in any order independently of one another as they will all eventually reach their destination device.

Which of the following refers to the informal rules for how to behave online?​

Answers

Answer:

Question: Where is the following?

Uhhhhhhhhhh picture??

What is computer task bar

Answers

Answer:

It is a bar where you can see all of your tasks or pinned items.

Explanation:

it is the small bar across the bottom of your computer screen with pinned apps or tabs, usually white
Other Questions
What challenges did the New France government face? what ways do we use patterns of classification in science? give examples Five less than the quotient of a number and 3 is 13. What is the number? Let n be the unknown number. In what phase does the water molecules have greater freedom of movement. Find the solution to the following: *Enter your solution in the following format x = solution. (Ex: x = 5)8x+10=2(4x+5)Find the solution to the following: *Enter your solution in the following format x = solution. (Ex: x = 5)3x-8=2(x-4) Joseph learned in his physics class that centimeter is a smaller unit of length and a hundred centimeters group to form a larger unit of length called a meter. Joseph recollected that in computer science, a bit is the smallest unit of data storage and a group of eight bits forms a larger unit. Which term refers to a group of eight binary digits? A. bit B. byte O C. kilobyte D. megabyte How do you rationalize the tension being used in Tennis Racket strings using the concept of impulse and momentum? Write a scary story thank you Solve for y:5y+2-2y=8y-4-2y what type of sentence is this?Plants consume carbon dioxide and emit oxygen.*simple, compound, complex, and compound-complex.* There are multiple lines of evidence that provide support for common ancestry and evolution. Write 3-4 paragraphs describing at least three of them in detail. Provide at least one example for each line of evidence.(I need the full three to four paragraphs ASAP please please please) A spherical stone in the courtyard of the National Museum of Costa Rica has thediameter of about 8 feet. Find the volume of the spherical stone. Round to the nearesttenth. Leave your answer in terms of .A. 682.7 cubic feetB. 85.3 cubic feetC. 10.7 cubic feetD. 683.0 cubic feet The senior classes at Portland High School and Biddeford High School planned separatetrips to New York City. The senior class at Portland High School rented and filled 1 vanand 6 buses with 372 students. Biddeford High School rented and filled 4 vans and 12buses with 780 students. Each van and each bus carried the same number of students. Howmany students can a van carry? How many students can a bus carry? 12. Why do you think Scout accompanies Jem to Mrs. Dubose's house, even though she is not being punished? Is this right? Please help me MULTIPLE CHOICE QUESTION PLS HELP ME Find the distance between the points (2, 4) and (8,-8) on a coordinate plane, to the nearest whole number. Phoebe owns a business making birdhouses. The profit can be represented by p = 62 126 + 250, where p represents profit and brepresents the number of birdhouses she sells. How many birdhouses would she have to sell to make a profit of $263? 2Which sentence from the selection helps explain why Ride was selected to theastronaut corps?Unlawful to photocopy or project without peF She was one of thirty-five people, including just six women, selected to theastronaut corps in 1978.G It was the first time that women were allowed to apply to the astronautprogram.H After high school, she attended Stanford University, where she earnedbachelor's, master's, and doctorate degrees in physics.J These tasks include using the robotic arm, going on spacewalks, and doingscience experiments. Solve for the unknown value