Answer:
8 Questions You Should Absolutely Ask An Interviewer
QUESTION #1: What do the day-to-day responsibilities of the role look like? ...
QUESTION #2: What are the company's values? ...
QUESTION #3: What's your favorite part about working at the company? ...
QUESTION #4: What does success look like in this position, and how do you measure it?
Explanation:
I hope this answer is Wright ,So please mark as brainlist answers
Alice just wrote a new app using Python. She tested her code and noticed some of her lines of code are out of order. Which principal of programing should Alice review?
Answer:
sequencing
Explanation:
from flvs
Answer:
Sequencing
Explanation:
(d) Assume charArray is a character array with 20 elements stored in memory and its starting memory address is in $t5. What is the memory address for element charArray[5]?
Answer:
$t5 + 5
Explanation:
Given that ;
A character array defines as :
charArray
Number of elements in charArray = 20
Starting memory address is in $t5
The memory address for element charArray[5]
Memory address for charArray[5] will be :
Starting memory address + 5 :
$t5 + 5
the company has finished designing a software program but users aren't sure how to use it
Answer:
The company should go back into the company and make it a little more easier to use or the company should put out an announcement or something so the people trying to use it know how
Explanation:
Mark me the brainliest please and rate me
Answer:
Several people in the human resources department need new software installed. An employee has an idea for a software program that can save the company time, but doesn't know how to write it.
Explanation:
Type the correct answer in the box
in which phishing technique are URLs of the spoofed organization misspelled?
anon
is a phishing technique in which URLs of the spoofed organization are misspelled
Answer: Link manipulation
Explanation:
Answer:
Typo Squatting
Explanation:
To create a public key signature, you would use the ______ key.
Answer:
To create a public key signature, you would use the _private_ key.
Explanation:
To create a public key signature, a private key is essential to enable authorization.
A private key uses one key to make data unreadable by intruders and for the data to be accessed the same key would be needed to do so.
The login details and some important credentials to access user data contains both the user's public key data and private key data. Both private key and public key are two keys that work together to accomplish security goals.
The public key uses different keys to make data readable and unreadable.
The public key is important to verify authorization to access encrypted data by making sure the access authorization came from someone who has the private key. In other words, it's a system put in place to cross-check the holder of the private key by providing the public key of the encrypted data that needed to be accessed. Though, it depends on the key used to encrypt the data as data encrypted with a public key would require a private key for the data to be readable.
Which of the following best describes open-source code software?
O A. a type of software that is open to the public and can be modified
B. a type of software that is free to download, but cannot be modified
C. a type of software that is locked, but can be modified
D. a type of software that has already been modified
Answer:
A. a type of software that is open to the public and can be modified.
Explanation:
Open-source refers to anything that is released under a license in which the original owner grants others the right to change, use, and distribute the material for any purpose.
Open-source code software is described as a type of software that is open to the public and can be modified. The correct option is A.
What is open-source code?Open-source software is computer software that is distributed under a licence that allows users to use, study, change, and distribute the software and its source code to anyone and for any purpose.
Open-source software can be created collaboratively and publicly. Open-source refers to anything that is released under a licence that allows others to change, use, and distribute the material for any purpose.
Therefore, open-source code software is defined as software that is freely available to the public and can be modified. A is the correct answer.
To know more about open-source code follow
https://brainly.com/question/15039221
#SPJ6
Which of the following documents has a template available in the online templates for your use?
letters
resumés
reports
all of the above
Answer:
The answer is all of the above.
Explanation:
Works in the public domain have copyright that are expired or abandoned true or false
Answer:
False
Explanation:
Only one of the two are true. Works in the public domain have a copyright that has expired only. E.g. Works of classical music artist, are almost always expired, in accorance with American Copyright law. Abandoning a copyright doesn't do anything because so long the copyright has remained unexpired, the copyright remains. Thats why it can take decades for a new movie in a series to release, like "IT" by Stephen King. The copyright hasn't expired but rather was 'abandoned'. Before "IT" 2017 was relasesed, the copyright was abandoned.
The reading element punctuation relates to the ability to
pause or stop while reading.
emphasize important words.
read quickly yet accurately.
understand word definitions.
Answer:
A
Explanation:
Punctations are a pause or halt in sentences. the first one is the answer so do not mind the explanation.
semi colons, colons, periods, exclamation points, and question Mark's halt the sentence
most commas act as a pause
Answer: (A) pause or stop while reading.
Explanation:
Write a method called min that takes three integers as parameters and returns the smallest of the three values, such that a call of min(3, -2, 7) would return -2, and a call of min(19, 27, 6) would return 6. Use Math.min to write your solution.
Answer:
public class Main
{
public static void main(String[] args) {
System.out.println(min(3, -2, 7));
}
public static int min(int n1, int n2, int n3){
int smallest = Math.min(Math.min(n1, n2), n3);
return smallest;
}
}
Explanation:
*The code is in Java.
Create a method named min that takes three parameters, n1, n2, and n3
Inside the method:
Call the method Math.min() to find the smallest among n1 and n2. Then, pass the result of this method to Math.min() again with n3 to find the min among three of them and return it. Note that Math.min() returns the smallest number among two parameters.
In the main:
Call the method with parameters given in the example and print the result
Methods are named program statements that are executed when called/invoked.
The method in Python, where comments are used to explain each line is as follows:
#This defines the method
def mmin(a,b,c):
#This calculates the smallest of the three values using math.min
minNum = min(a,b,c)
#This prints the smallest value
return minNum
Read more about methods at:
https://brainly.com/question/14284563
You want to look up colleges but exclude private schools. Including punctuation, what would you
type?
O nonprofit college
O college -private
O private -college
O nonprofit -college
You want to look up colleges but exclude private schools. Including punctuation, The type is private -college. The correct option is c.
What are institutions of higher studies?The institutions for higher studies are those institutions that provide education after schooling. They are colleges and universities. Universities, colleges, and professional schools that offer training in subjects like law, theology, medicine, business, music, and art are all considered higher education institutions.
Junior colleges, institutes of technology, and schools for future teachers are also considered to be part of higher education. There are different types of colleges, like government colleges and private colleges. Private colleges are those which are funded by private institutions.
Therefore, the correct option is c. private -college.
To learn more about excluding, refer to the link:
https://brainly.com/question/27246973
#SPJ2
The state way of grading drivers is called what?
*
Custom function definitions:________.
A. Must be written before they are called by another part of your program
B. Must declare a name for the function
C. Must include information regarding any arguments (if any) that will be passed to the function
D. all of the above
Answer:
D. all of the above
Explanation:
A option is correct and function definition must be written before they are called by another part of your program. But in languages such as C++ you can write the prototype of the function before it is called anywhere in the program and later write the complete function implementation. I will give an example in Python:
def addition(a,b): #this is the definition of function addition
c = a + b
return c
print(addition(1,3)) #this is where the function is called
B option is correct and function definition must declare a name for the function. If you see the above given function, its name is declared as addition
C option is correct and function definition must include information regarding any arguments (if any) that will be passed to the function. In the above given example the arguments are a and b. If we define the above function in C++ it becomes: int addition( int a, int b)
This gives information that the two variables a and b that are parameters of the function addition are of type int so they can hold integer values only.
Hence option D is the correct answer. All of the above options are correct.
Write a program that computes and display the n! for any n in the range1...100
Answer:
const BigNumber = require('bignumber.js');
var f = new BigNumber("1");
for (let i=1; i <= 100; i++) {
f = f.times(i);
console.log(`${i}! = ${f.toFixed()}`);
}
Explanation:
Above is a solution in javascript. You will need a bignumber library to display the numbers in full precision.