Answer: Applications for desktop or laptop computers are sometimes called desktop applications, while those for mobile devices are called mobile apps. When you open an application, it runs inside the operating system until you close it
Explanation:
To gain access to the functions and variables of a library module, use a(n) _________ statement. A. import B. export C. global D. library
Answer: import
Explanation:
Which of the following applies to a trademark?
o belongs to just one company or organization
O always shown on the outside of a garment
O a way for people to copy a pattern
0 a mark that represents a product's "sold"
status
Answer:
a
Explanation:
Answer:
belongs to just one company or organization
Explanation:
edge 2021
What do you mean by Data Types? Give Examples.
Ms Access question
Answer:
This answer is quite late, but data types are basically categories that differentiate stuff in python.
A few examples would be:
String - Anything that has single or double-quotes around it. The input( ) function automatically returns a string, unless changed.
Int - An integer. Any whole number.
Float - Any decimal number.
List - a variable in which you can store multiple different elements. (Strings, integers, floats, tuples, lists, etc...)
Also, sorry if my English isn't perfect. English isn't my first language.
Explanation:
Don't know. Just some stuff I remember from my python class. ∞
What is precipitation ????
Answer:
Precipitation has 2 meanings
In chemistry it is the action or process of precipitating a substance from a solution
But in general it is the common term for rain, snow, sleet or hail that falls to the ground
Explanation:
Just look the definition up
Answer:
weather
Explanation:
the service you are attempting to use is restricted
Services can be restricted due to different factors. If when an individual have received calls on their cell phone and the device's caller ID shows "Unavailable" or "Restricted," It can be due to a lot of factors.
Note that caller ID designations are brought about by the settings on the caller's end or network restrictions and not the phone's settings.
When a Cell phone calls designated shows "Unavailable" on a phone's caller ID, it means that the placed from an area or region is, is where the wireless service provider or phone company cannot be able to retrieve that phone number.
A "Restricted" phone call is said to be a call from a caller who has blocked one's phone so that you cannot identify their number.
Learn more about restricted from
https://brainly.com/question/15870692
Find the error in the following code fragment. int a: System.out.print(a):
Answer:
If your using java, then its supposed to be "System.out.print("a")"
Explanation:
its supposed to have quotations
What is the interface of an app?
a storyboard software
the part the user sees
a sketch of your idea
a testing environment
Explanation:
An application interface or user interface ,is the set of features an application provides so that user may supply input to and recieve output from,the program.
James works on history for 9/10 of an hour he works on English for 3/10 of an hour how much longer does James work on history than on English
how does digital and hybrid computers differ in portability
Answer:
Digital computers perform functions like mathimatical,compex calculations. while hybrid computers work with the duo combinations like analog and tempature.
Explanation:
I passed the class A+
yourwelcome :)
thank me if it was correct for you too.
imagery functions as a coding system to help individuals acquire movement patterns. this describes
Answer:
Imagery can be used to develop qualities in yourself you'd like to have — it's like emotional body-building — and using a technique called “Evocative Imagery” you can cultivate courage, patience, tolerance, humor, concentration, self-confidence or any other quality you'd like to embody.
What is the output for the following program?
numA = 4
while numA <12:
numA = numA + 3
print(numA)
Output:
Answer:
13
Explanation:
int numA = 4;
whilie (numA < 12){
numA += 3;
}
System.out.print(numA);
numA numA < 12
4 true ⇒ numA increases by 3, loop continues
7 true ⇒ numA increases by 3, loop continues
10 true ⇒ numA increases by 3, loop continues
13 false ⇒ loop stops, program them prints out value of numA
when demonstrating 2022 altima’s parking assistance, what steering feature should you mention when pointing out how easy the vehicle is to steer at low speeds?
Based on automobile technology, when demonstrating 2022 Altima's parking assistance, the steering feature one should mention when pointing how easy the vehicle is to steer at speed is "the Cruise Control w/Steering Wheel Controls."
What is Cruise Control w/Steering Wheel Controls?The Cruise Control w/Steering Wheel Controls allow the driver or the user to adjust the car's speed to the present rate, either lower or higher.
The Cruise Control feature assists in providing additional time and distance between the car and another one in front when parking or highway.
Hence, in this case, it is concluded that the correct is "the Cruise Control w/Steering Wheel Controls."
Learn more about the same parking assistance in an automobile here: https://brainly.com/question/4447914
URGENTT 2 SIMPLE EASY QUESTIONS PLZZ HELP ION UNDERSTAND COMPUTERR ILL GIVE U BRAINLEST
Answer:
I'll happy to help
Explanation:
Please make your clear. I couldn't understand!
write the feature of ms-dos ?
Answer:
Here you go
Explanation:
Features of MS Word :
Home
This has options like font colour, font size, font style, alignment, bullets, line spacing, etc. All the basic elements which one may need to edit their document is available under the Home option.
Insert
Tables, shapes, images, charts, graphs, header, footer, page number, etc. can all be entered in the document. They are included in the “Insert” category.
Design
The template or the design in which you want your document to be created can be selected under the Design tab. Choosing an appropriate tab will enhance the appearance of your document.
Page Layout
Under the Page Layout tab comes options like margins, orientation, columns, lines, indentation, spacing, etc.
References
This tab is the most useful for those who are creating a thesis or writing books or lengthy documents. Options like citation, footnote, table of contents, caption, bibliography, etc. can be found under this tab.
Review
Spell check, grammar, Thesaurus, word count, language, translation, comments, etc. can all be tracked under the review tab. This acts as an advantage for those who get their documents reviewed on MS Word.
Source: https://byjus.com/govt-exams/microsoft-word/
A numeric test score is to be converted to a letter grade of A, B, or C according to the following rules: A score greater than 90 is considered an A; a score between 80 and 90, inclusive, is considered a B; and any other score is considered a C. What code segments will assign the correct letter grade to grade based on the value of the variable score?
The code segment makes use of conditional statements.
Conditional statements in programming are used to make decisions
The code segment in C++ is as follows
if (score > 90) {
grade = 'A';
}
else if (score >= 80 && score < =90) {
grade = 'B';
}
else {
grade = 'C';
}
The above code segments take the score, make comparison, and then determine the appropriate letter grade.
Read more about code segments at:
https://brainly.com/question/20475581
II and III
Explanation:If it is the test i think it is
I is incorrect because it is saying that automatically it is set as C but if the score is over 90 then you get an A if it's anything else then it's a B. This is false because then your outcome will never be C. It would only be A or B.
II is correct because it starts off by saying that if the score is greater than 90 then you'll get an A if else then if your score is equal to or greater or equal to than 80 then you get B and then if anything else then it's a C. This incoorporates everything.
III is also true because it start off by saying if anything is below an 80 then you automatically get a C. If it's anything over than 80 then if it's equal to or less than 90 then you get a b and if it's anything else then you get an A. This also checks out which means it's true.
So the answer is II and III
A facility that is pre-wired for necessary telecommunications and computer equipment, but doesn't have equipment installed, is known as a
Answer:
hot site
Explanation:
You are creating a program that can add up the amount of money the user spent that day. Right down to the penny! What kind of variables should you create? a default variable a user variable an integer variable a float variable
Answer:A. A default Variable
Explanation:
Answer:
A
Explanation:
Did it on a Test
Two primary disadvantages to the ______ BN type are that the routers in the network impose time delays, and routers are typically more expensive and require more management than switches. Group of answer choices
Answer: Routed backbone disadvantages are time delays and more expensive than switches
Explanation:
define the term malicious program
Aliaa and Zhang Li are tennis-playing robots. Aliaa is 715\,\text{cm}715cm715, start text, c, m, end text from Zhang Li and 2{,}200\,\text{cm}2,200cm2, comma, 200, start text, c, m, end text from the far corner. Zhang Li measures an 91\degree91°91, degree angle between Aliaa and the far corner, as shown.
From Aliaa's viewpoint, what is the angle between Zhang Li and the far corner?
Do not round during your calculations. Round your final answer to the nearest degree.
Answer:
70
Explanation:
Law of Sines.
sin(91)/12 = sin(x)/715
x=19
180-91-19=70
How does the computer help me with school work
Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users
A type of wireless attack that is typically designed and developed to capture wireless transmissions coming from legitimate end users is referred to evil twin.
An evil twin can be defined as an illegitimate and fraudulent that is usually set up to capture wireless transmissions, especially by eavesdropping on the information transmitted by legitimate end users.
In Cybersecurity, an evil twin is an equivalent of phishing on a local area network (LAN).
Basically, an evil twin is a rogue wireless access point (AP) that is typically designed and developed to capture wireless transmissions and sensitive information coming from legitimate end users.
In conclusion, an evil twin is used by an attacker or hacker to gain an unauthorized access to sensitive information from legitimate end users.
Read more: https://brainly.com/question/5660386
If your company uses a non-price competition strategy what should you focus on
A. lowering prices
B. differentiation
C. creating direct competitors
D. the public sector
B- differentiation
nonprice competition strategy refers to strategy to win a business competition that does not involved lowering price of the product.
Businesses mostly do this using differentiation strategy, which is increasing the different variety of product that they sell in the market.
can some one make me a pandora account and give me the email and the password to it please
Answer:
Ill do it but you do know someone can see the information right?
Explanation:
A ____ is a rectangular object you can click; when you do, its appearance usually changes to look pressed.
Answer:
button
Explanation:
goal of any user-friendly game should be to create a good what for the player?
A.
user experience (UX)
B.
user-interface (UI)
C.
user intuition (UIT)
D.
user skill (US).
Middle school question edmentum please add pic or just give answer
Answer:
with me being a gamer i know for a fact i love getting a good experience but also using my own thoughts into the game to help make decisions. so for the sake of your question its gonna be C; UIT
Answer:
A
Explanation:
User Experience is what makes a use friendly game accessible and enjoyable
Which of these problems is correct if the numbers are binary numbers?
Group of answer choices
1 + 1 = 2
1 + 1 = 10
0 + 0 = 1
1 + 0 = 10
Answer:
1 + 1 = 10
Explanation:
2 does not occur in the binary "alphabet"
0 + 0 = 0 in any base, so also in binary
1 + 0 = 1 in any base, so also in binary
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.
Answer: bastion host
Explanation:
what will the computer do in response to a line of code reading # name = input("What is your name?") print “What is your name?” print “name =” nothing return a syntax error
The computer will do nothing in response to the instruction # name = input("What is your name?")
The instruction is given as:
# name = input("What is your name?")
The above instruction is a Python instruction.
In Python, lines that begin with # are not executed, because they are treated as comments.
This means that, the computer will not do anything when it comes across the instruction
Read more about Python instructions at:
https://brainly.com/question/19344465
codes 7.2.8: Listed Greeting python
pls help i have no idea on how to fix this
The listed greetings program is an illustration of Python functions.
The error in the program is that the program is not properly indented.
Python program uses indents to identify blocks of code.
So, the fix to the program is to properly indent the code, and the fix (without the comments) is as follows:
def greetings(s):
x = s.split()
print("Hello, "+x[0]+"! I also enjoy "+x[1]+"!")
Read more about Python programs at:
https://brainly.com/question/16240699