A software program that includes a function parameter is capable of: A. passing data to a function whenever it is called.
What is a function parameter?A function parameter can be defined as a special kind of variable which is used in a function to point to a data that is provided as input into the function.
This ultimately implies that, a software program that is coded by a software developer or programmer to include a function parameter is capable of passing data to a function as an input, whenever it is called.
Read more on function parameter here: brainly.com/question/20264183
Harry’s Shoe Store has noticed a significant increase of revenue of $123,000. The manager has also determined that the total expenses equal to $128,000. Will this business net a profit or loss? _______ How much of a profit or loss? ________
Answer: Loss by $5,000
Explanation:
As you see, the loss is greater than profit. Simply subtract loss-profit
Why is it important to enforce access controls and to keep logs regarding who has access to data closets
Answer:
To ensure that in the event of a failure or breach, there is a record of when the equipment was accessed.
Explanation:
Hope this helps:)....if it don't then sorry for wasting your time and may God bless you:)
Answer:
it is important to enforce access controls and to keep logs regarding who has access to data closests is
Explanation:
To encure that in the event of a failure or breach, there is a record of what the equipment was accessed.
A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.
Answer:
completeness
Explanation:
Information should be________to ensure more than one source provides the same factual information. a. repeated c. cross-lined b. cross-examined d. cross-checked please select the best answer from the choices provided a b c d
Information should be cross-checked to ensure more than one source provides the same factual information.
What is the source of information?
The source of information is the place, from where the data or information is generated. There are many sources of information, like internet, newspaper, television etc.
The options given in the problem regarding the information as,
a. repeated b. cross-examinedc. cross-lined d. cross-checkedThere are many feck news and nonfactual data is present over the internet and other source of information.
To get the factual information, one should always cross-checked the information from other sources.
Thus, the information should be cross-checked to ensure more than one source provides the same factual information.
Learn more about the source of information here;
https://brainly.com/question/26169752
Answer:
D
Explanation:
D
A subquery whose return value depends on the row being returned in a main query is called a(n) _____ query.
Answer:
correlated
Explanation:
A correlated subquery is a method of reading each row of a table and comparing the values in each row to related data. It's utilized when a subquery has to deliver a different result or collection of results for each candidate row that the main query considers. I hope this helps! ^-^
What is it called when a programmer includes a step in an algorithm that lets
the computer decide which group of steps to perform?
Alteration
B. Selection
OC. Sequencing
OD Storage
Selection is the step in algorithm that let's the computer decide which group of steps to perform.
What is Algorithm?This can be defined as set of instructions which are used for solving a problem or accomplishing a task.
Selection happens when there are one or more options are available in which the computer decide which group of steps to perform.
Read more about Algorithm here https://brainly.com/question/11302120
Answer:
its A
Explanation:
Who designed the apple i computer in 1976?
steve wozniak
richard stallman
paul allen
konrad zuse
Answer:
Steve Wozniak
Explanation:
It said the computer is made by apple, Which was started by Steve Jobs and Steve Wozniak,
Paul Allen helped start Microsoft
Richard stallman worked for MIT
Konrad Zuse started Zuse KG
Jennifer is moving to nashville in a few weeks and needs to find an apartment to rent. She has looked online, talked to her new coworkers about safe areas close to work, and read through nashvilleguru. Com to gather information for her decision. She has narrowed down the area she wants to live to the gulch, which is a walkable neighborhood and friendly for young urban professionals. Now she is assessing which available apartment buildings and condos in the gulch suit her wants and needs most. Jennifer is working through which part of the consumer decision-making process?.
The part of the decision-making process that Jennifer is working through is: evaluating alternatives.
What is the decision-making process?Decision-making process can be defined as a cognitive process that involves gathering information, analyzing the information, and assessing or evaluating alternatives, so as to enable the proper selection of an optimum solution (choice).
In this scenario, evaluating alternatives is the part of the decision-making process that Jennifer is working through because she is assessing all available apartment buildings.
Read more on decision-making process here: https://brainly.com/question/1249089
What is output? public class vehicle { public void drive(){ system.out.println("driving vehicle"); } }
A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim of ____.
A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim of quick start behavior.
What is Quick Start Behavior Guide?The Quick Start Behavior guide is known to be a fast introduction to the use of Class Charts behavior management software.
A user who bypasses the documentation to get a new hardware or software package operational as rapidly as possible is a victim of quick start behavior as he or she is in haste and thus did a bypass.
Learn more about documentation from
https://brainly.com/question/25534066
1. What can you say about the picture?
Answer:
What picture?
Explanation:
Where is the picture? We need the picture in order to answer your questions
How should a team have quality built into its deliverables?
Answer:
According to the question, the answer is option "A) By having a separate quality assurance team for testing the quality of deliverables". The reason for this answer is because there are many things regarding quality assurance should be taken care of, in order to make the product deliverable to customers.6 May 2019
Which networking device behaves similarly to an access point that conforms to the IEEE 802.11b standard
Answer: a Hub
Explanation: Hubs are used to combine connections with ethernet cables, typically routing with switches to IDF>MDF>ISP etc.
What is the main advantage of using templates and other presentations to create a new presentation?
A. They allow you to include more slides in a presentation.
B. They give you access to additional slide layouts that you cannot create in a blank presentation.
C. They save you time designing slides and allow you to focus more on the content.
D. They automatically fill-in content and allow you to spend more time on designing slides.
C. They save you time designing slides and allow you to focus more on the content.
hope this helps you!
Question 5 of 10
Which step might be included in an algorithm for a self-driving car?
A. Ask another driver for help
B. Analyze data from the car's external cameras.
O C. Look up directions.
D. Read a physical map of the streets.
Answer:
B.
Explanation:
What actions might contribute to recommendations you see online?
Answer: what you search up
I need help on this, need answer asap.
Answer:
int main() {
int _2dArray[32][32];
for (int i = 0; i < 32; i++) {
for (int j = 0; j < 32; j++) {
_2dArray[i][j] = j + i * 32;
}
}
return 0;
}
Explanation:
Here is a generic C/C++ 2d array traversal and main function example. The rest you'll have to figure out based on what kind of app you're making.
Good luck!
7.5.5: Contains a Vowel how do I do it?
# Ask the user for a string
word = input("Enter a string:")
# Check for lowercase vowels: a, e, i, o, or u and print
if "a" in word or "e" in word or "i" in word or "u" in word:
print "Contains a lowercase vowel!"
else;
print "Doesn't contain a lowercase vowel!"
The code that checks if a user input has a vowel can be done by looping the users input and check if the users input has a vowel in it.
x = input("kindly, input your string: ")
vowels = ['a', 'e', 'i', 'o', 'u']
length = 0
for i in x:
if i in vowels:
length += 1
if length >= 1:
print("Contains a lowercase vowel!")
else:
print("Doesn't contain a lowercase vowel!")
Code explanationThe code is written in python
The first line of code ask the user for an input.The vowels are stored ina variable called "vowels".The variable "length" is initialise to zero.Then, we loop through the value in the users input.If the users input contain any vowel the length is incremented by 1.Finally if the length is greater or equals to 1 we print a message "Contains a lowercase vowel"Else we print "Doesn't contain a lowercase vowel!"learn more on python code here: https://brainly.com/question/15114317
A user has become compromised as a result of visiting a specific web page, without clicking on any kind of content. What type of attack has occurred?.
Answer:
drive-by-download
Explanation:
how are technology and technician interrelated to each other
Answer:
the technician is the technology so connected because without the technician how can we keep the technology running
Explanation:
without the technician, nothing technological would work for a long time
PLEASE HELP, MAKE SURE IT IS THE CORRECT WAY!! 100 POINTS!!!
Joe, a project manager, calls your extension because his computer just crashed. He lets you know that his computer will not connect to the internet, that he has lost multiple files, and he needs to get things back up and running in the next hour due to an important meeting he is scheduled to host. He is irritated because he is working on an older laptop and is getting a new one next week. He says that he knew this would happen and wishes that this laptop worked for just one more week.
He is agitated and in a panic. He is afraid that he has lost all his important documents and is blaming the company’s technology. As you ask him questions to find out more about the problem, you make the rookie mistake of asking, “Have you tried restarting your computer?” Joe explodes in a rage and screams that he already told you that he did and that you are not listening to him.
You are now in a situation where you not only need to determine the cause of the problem and fix it, but you also need to calm this individual down so that you can get clearer and more accurate information.
What do you do?
which wares are the most important to a computer operator
hardware
software
humanware
A __________ constant is a name that references a value that cannot be changed while the program runs.
Answer:
Explanation:
A constant is a name that references a value that cannot be changed while the program runs
Example in Javascript:
const x = 5;
cannot be reassign x
wronged: x = 10; (will throw an error try to assign value to constant variable)
A radio is basically made of two parts:
A. A gyroscope and a vacuum tube.
B. A transmitter and a receiver.
C. A cathode and an anode.
D. A motherboard and a CPU.
Lane received a phone call from a client. The client claimed that a file he was working on the day before had disappeared from his computer along with several other files. Lane went to the client’s desk to see if she could rebuild the files from the backup done the night before. Lane found and rebuilt the files from the backed-up data. When lane called the next morning to see if everything was working, the client said that two of his files were gone again. He also noticed new files in a folder. When lane arrived, she checked to see how much free space the computer had available and found that it had 250gb less than the day before. What is the issue with the client’s computer?
a. Spam
b. Corrupt hard drive
c. Bad hard drive driver
d. Computer virus
There are different kinds of virus. The issue with the client’s computer is Computer virus.
What is computer virus?A computer virus is known to be a kind of computer program that, when used, can recopy itself by modifying other computer programs and putting its own code.
The Examples of computer viruses are:
Worms Trojans , etc.The issue with the system that Lane is working on is virus and it can be worked on by using Anti-virus.
Learn more about Computer virus from
https://brainly.com/question/20407534
Why are telephoto lenses known for creating a pincushion effect on images?
A. because the shrinking of the image decreases on the edges of the frame
B. because the magnification of the image decreases on the edges of the frame
C.
because the shrinking of the image increases on the edges of the frame
D. because the magnification of the image increases on the edges of the frame
Answer:
D is the correct answer.
Answer: d because the magnification of the image increases on the edges of the frame
Explanation:
A practice to ensure threads finish a required method before another thread starts is to use the _____ keyword in the method header.
A practice to ensure threads finish a required method before another thread starts is to use the synchronized keyword in the method header.
What is Synchronized keyword in terms of Java?This is known to be the act of giving room for only a single thread to be able to access the shared data or resource at a given timeframe.
Note that it often help users to be able to protect their data from being access by different threads and as such, a practice to ensure threads finish a required method before another thread starts is to use the synchronized keyword in the method header.
Learn more about keyword from
https://brainly.com/question/2960292
You watch a movie where a secret agent puts a small device on a telephone line so that they can
listen to conversations between two other people. This is an example of:
O snooping.
O social engineering.
O wiretapping
O data confidentiality.
Answer:
wiretapping
have a good day :)
Why do you need to put your phone on airplane mode.
Effectiveness of thicker,biodegradable plastic shopping bags
The Effectiveness of thicker, biodegradable plastic shopping bags is that they can last for a long time and still be able to carry shopping items even if they are exposed to natural environment.
What is the use of biodegradable plastic bags?Plastic bags are known to be part of modern technology. They are usually very thin and strong. They are able to carry a heavy load as a result of shopping.
Conclusively, Note that this type of plastic bags which are said to be biodegradable can last for a long time and still be able to carry shopping items even if they are exposed to natural environment.
Learn more about bags from
https://brainly.com/question/728465