Answer:
Easy-to-use virtual robotics and STEM platform tailored to serve every student at every level!
CoderZ is a powerful, award-winning online platform.
Explanation:
CoderZ is a powerful, award-winning online platform through which students learn valuable STEM skills such as coding, robotics, and physical computing. CoderZ is highly flexible and designed for use in the classroom or through a wide range of remote learning environments. Computers and technology are everywhere. Studying science, technology, engineering and math gives kids valuable skills for the future and develop life-skills like computational thinking, critical thinking and problem-solving as well.
STEM and CS education focuses on how to approach complex problems, break down the challenges into small pieces and approach resolving them in a logical manner – critical skills for any career path.
Pig Latin is ______ and fits very naturally in the pipeline paradigm while SQL is instead declarative.
a) functional
b) procedural
c) declarative
d) all of the above
Answer:
Option b) is correct
Explanation:
Pig Latin is a language game in which English words are altered either by adding a suffix or such kind of suffix can be created by adding a syllable (vocalic). For example, ''hello'' becomes ''ello-hay''.
Pig Latin is procedural and fits very naturally in the pipeline paradigm while SQL is instead declarative.
8. Write the examples of freeware and Shareware softwares ?
Explanation:
People use freeware software because it is available free of cost and it can be distributed free of cost, that is why it is called FREEware.
Freeware software:
Adobe PDF
yahoo messenger
Go.ogle Talk
MSN messenger
People use shareware software because it helps them to know about the product more before buying it and this software is available free of cost.
Shareware software:
Adobe acrobat 8 professional
Winzip
Getright
A method used to return the value of one of the attributes of an object is called a/an:________
a. retriever (finder)
b. constructor (maker)
c. accessor (getter)
d. mutator (setter)
Answer:
a. retriever (finder)
Explanation:
In Macintosh computers, the Finder or retriever is a desktop interface. It can be used to find, navigate, open, delete, copy or move files and can open files or folders around the desktop. When the Finder is relaunched, it simply starts the application. It is a method used to return the value of one attributes of an object. It is also called as retriever.
The question is in the photo
Answer:
a
the most suitable answer
Suppose an application generates chunks 60 bytes of data every 200msec. Assume that each chunk gets put into a TCP packet (using a standard header with no options) and that the TCP packet gets put into an IP packets. What is the % of overhead that is added in because of TCP and IP combines?
1) 40%
2) 10%
3) 20%
4) 70%
Answer:
1) 40%
Explanation:
Given the data size = 60 byte
data traversed through TSP then IP
Header size of TCP = 20 bytes to 60 bytes
Header size of IP = 20 bytes to 60 bytes
Calculating overhead:
By default minimum header size is taken into consideration hence TCP header size = 20 bytes and IP header size = 20 bytes
Hence, the correct answer is option 1 = 40%
Unless otherwise specified, entire arrays are passed __________ and individual array elements are passed __________.
Answer:
By reference ; by value
Explanation:
An array is defined as the arrangement of a certain item in a well orderly manner/ fashion.
Unless otherwise specified, entire arrays are usually passed by reference and individual array elements are passed by value which is the standard norm in the mode of operations.
If a computer reboots itself on its own, the computer might have a(n) access problem. hardware problem. Internet problem. software problem.
Answer:
D) Software problem
Explanation:
plz give me brainliest
D
edge2021 YWWWWWWWWWWWWWWWWWWWWW
MVC stands for Model-View-Controller. Where is business data and logic mainly kept?
Views
Controllers
Models
None of the above
Answer:
Controllers
Explanation:
Business Logic goes to Model part in MVC . Role of Model is to contain data and business logic. Controller on the other hand is responsible to receive user input and decide what to do. A Business Rule is part of Business Logic .
2. The Warren Commission investigated the assassination of President _______________________ in 1964.
Answer:
President Kennedy
Explanation:
John F. Kennedy was the 35th President of US. He was assassinated in 1963 in Dallas
Suppose that a t-shirt comes in five sizes: S, M, L, XL, XXL. Each size comes in four colors. How many possible t-shirts are there?
Answer:
120
Explanation:
This question is basically asking how many ways can we arrange 5 sizes of shirts if they come in 4 colors.
5 permutation of 4
To find permutation, we use the formula
P(n, r) = n! / (n - r)!
Where
n is the size of the shirts available, 5
r is the color of each shirt available, 4
P(5, 4) = 5! / (5 - 4)!
P(5, 4) = (5 * 4 * 3 * 2 * 1) / 1!
P(5, 4) = 120 / 1
P(5, 4) = 120
Therefore, the total number of shirts available is 120
Write a program that takes two decimal numbers as input and print the largest. If the numbers are equal, print one of them.
print(max(float(input("Enter a decimal number: ")),float(input("Enter a decimal number: "))))
This would be the simplest way to do it. Best of luck.
Which Cisco IOS command will permit the engineer to modify the current configuration of the switch while it is powered on?
Write one kid-friendly paragraph about a Software Developer's salary,.
Write a Python program to keep track of data for the following information in a medical clinic: doctors, patients, and patient_visits
Patients and Doctors have an ID, first name, and last name as common attributes. Doctors have these additional attributes: specialty (e.g. heart surgeon, ear-nose-throat specialist, or dermatologist), total hours worked, and hourly pay. Further, doctors keep track of the patient_visits. A patient_visit has the following attributes, number_of_visits to the clinic, the patient who is visiting, the doctor requested to be visited, and the number of hours needed for consultation. Based on the number of consultation hours, the doctor will get paid.
The following functions are required:
1. addVisit: this function adds a patient_visit to the doctor. A new visit will NOT be added if the doctor has already completed 40 hours or more of consultation. If this happens, an error is thrown mentioning that the doctor cannot have more visits this week.
2. calculatePay: this function calculates the payment for the doctor using the following logic: Each hour is worth AED 150 for the first two visits of the patient and all further visits are billed at AED 50.
3. calculateBill: this function calculates the bill for the patient, which displays the doctor's details, patient details, and payment details. An additional 5% of the total is added as VAT.
The student is required to identify classes, related attributes, and behaviors. Students are free to add as many attributes as required. The appropriate access modifiers (private, public, or protected) must be used while implementing class relationships. Proper documentation of code is mandatory. The student must also test the code, by creating at-least three objects. All classes must have a display function, and the program must have the functionality to print the current state of the objects.
an event handler is..
a. a word that is open for interpretation.
b. a sentence that provides information.
c. a procedure that occurs as a result of a users action or another source.
Answer:
The correct answer is:
Option c. a procedure that occurs as a result of a users action or another source.
Explanation:
First of all, let us define what an event is.
An occurrence that is caused by any external user or entity towards a software or a website is called an event i.e. click from mouse, key pressed from keyboard.
When an event occurs, the software or functionality of the website has to respond to the event. An event handler is a function or procedure that contains the code which has to be run when the event occurs.
When the event occurs, the event handler for particular event is executed.
So from the given options,
The correct answer is:
Option c. a procedure that occurs as a result of a users action or another source.
Designing the right elements for the tasks that the user is attempting to perform is called ________.
Answer:
Interface design
Explanation:
INTERFACE DESIGN are design that are carried out on either a computer or a mobile phone or other devices that will suit the users by designing the style of the devices and how the device will look like which will inturn enable the user to easily carried out or performed any tasks they are want to perform with easy and without any lapses which is why it is important for INTERFACE DESIGN to be design with the right tools that the user can easily understand in order to access and perform their tasks effectively.
What is the main reason for assigning roles to members of a group?
So that people with strengths in different areas can work on what they do best, plus it divides the workload.
Use the drop-down tool to select the phrase that completes each sentence,
In Windows, deleted files go to the
If you want to see the most information about a file, you can view them in
A file manager can help you
DONE
I
Answer:
1. recycle bin
2. details view
3. move a file
Explanation:
i did the assignment on edge. and got it right
Answer:
In Windows, deleted files go to the
✔ Recycle Bin
If you want to see the most information about a file, you can view them in
✔ details view
A file manager can help you
✔ move a file
Explanation: Hope it helps ^w^
The National Vulnerability Database (NVD) is responsible for actively performing vulnerability testing for every company's software and hardware infrastructure. Is this statement true or false?A. TrueB. False
Answer:
False
Explanation:
The answer to this question is false. This is because the NVD doesn't perform such tests on their own. Instead they they rely on third-party vendors, software researchers, etc to get such reports and do the assignment of CVSS scores for softwares
The National Vulnerability Database (NVD) is the United State governments leading resource for software vulnerability
1. Normal view
the place where information for handouts can be added
2. Notes view
provide rows of icons to perform different tasks
3. Slide pane
the working window of a presentation
4. Title bar
displays thumbnails
5. toolbars
provides filename and Minimize icon
Match the feature to its function.
Answer:
1.- display thumbnails, 2.-the place where info can be put, 3.- working window of presentation 4.- provides file name, 5.- rows of icons to perform task ... I'm not sure if these are correct but I tried
1. Normal view
the working window of a presentation
2. Notes view
the place where information for handouts can be added
3. Slide pane
displays thumbnails
4. Title bar
provides filename and Minimize icon
5. Toolbar
provide rows of icons to perform different tasks
On line two, you take a string, word, as input. Then, using that string...
1. In the first line of your output, print the third character of this string.
2. In the second line, print the second to last character of this string.
3. In the third line, print the first five characters of this string.
4. In the fourth line, print all but the last two characters of this string.
5. In the fifth line, print all the characters of this string with even indices
(remember indexing starts at 0, so the characters are displayed starting
with the first)
6. In the sixth line, print all the characters of this string with odd indices
(1.e. starting with the second character in the string).
7. In the seventh line, print all the characters of the string in reverse order.
8. In the eighth line, print every second character of the string in reverse
order starting from the last one.
9. In the ninth line, print the length of the given string,
Answer:
7
Explanation:
This one obtains results that the others in particular do not have, whether it is even one more word or another initial sentence
Relatively simple CRUD (create, read, update, delete) web applications development can be facilitated with: _________.
a. HTTP
b. HTTPS
c. Web Application Frameworks
d. Cascading Style Sheets (CSS)
e. Document Object Model (DOM)
Answer:
c. Web Application Frameworks
Explanation:
Web Application Frameworks is a form of a software framework that is made to perform support for the building of web applications such as web services, web resources, and web APIs. Web frameworks.
Also, Web Application Frameworks automatically perform the function of primary activities carried out in web development such as create, read, update, delete.
Hence, in this case, the correct answer is Web Application Framework.
What is the best use of network in homes
Answer:
Spectrem
Explanation:
What is the purpose of a Hyperlink
Can you answer both
Answer:
Number 16 is A Or B And Number 17 is B I think
Explanation:
Assume the clock for a 4-bit binary counter is 80 kHz. The output frequency of the fourth stage (Q3) is
Answer:
5kHz
Explanation:
There are four stages so N = 2⁴ = 16.
The frequency at nth stage is given by
[tex]f_n = \frac{f_{clk}}{N} = \frac{80kHz}{16} = 5kHz[/tex]
The output frequency of the fourth stage (Q3) is 5kHz. Thus the correct option is A.
What is a 4-bit binary counter?On each clock cycle, the 4-bit synchronous counter successively counts up from 0 (0000) to 15 as outputs ( 1111 ). It is also known as a 4-bit Synchronous Up Counter as result.
We required four Flip Flops to create a 4-bit counter, as indicated by the number 4 Flip Flops. The counter also has a reset pin, which enables it to enter an all-zero mode in which its output is "0."
The Q output of the previous flip-flop triggers the CLK input in the 4-bit counter above, as opposed to the Q output as in the up counter configuration, where the output of each flip-flop changes state on the rising edge.
There are four stages so N = 2⁴ = 16.
The 4-bit binary counter is 80 kHz.
In order to calculate the output frequency the 4-bit binary counter is divided by 16 which is equal to 5kHz.
Therefore, option A is appropriate.
Learn more about the 4-bit binary counter, here:
https://brainly.com/question/29894384
#SPJ5
The complete question is Probably
Assume the clock for a 4-bit binary counter is 80 kHz The output frequency of the fourth stage (Q3) is. a) 5kHz. b) 10 kHz. c) 20 kHz. d) 320 kHz.
Always place the smallest dimensions ____ the object, with ____ the object.
Question 2 options:
A) closest to; progressively smaller dimensions outward from
B) closest to; progressively larger dimensions outward from
C) farthest from; progressively smaller dimensions above
D) farthest from; progressively larger dimensions above
E) none of the above
Write a static method that implements a recursive formula for factorials. Place this method in a test program that allows the user to enter values for n until signaling an end to execution.
Answer:
Written in Java
import java.util.*;
public class Main {
public static int fact(int n) {
if (n == 1)
return n;
else
return n * fact(n - 1);
}
public static void main(String[] args) {
int num;
Scanner input = new Scanner(System.in);
char tryagain = 'y';
while(tryagain == 'y'){
System.out.print("Number: ");
num = input.nextInt();
System.out.println(num+"! = "+ fact(num));
System.out.print("Try another input? y/n : ");
tryagain = input.next().charAt(0);
}
}
}
Explanation:
The static method is defines here
public static int fact(int n) {
This checks if n is 1. If yes, it returns 1
if (n == 1)
return n;
If otherwise, it returns the factorial of n, recursively
else
return n * fact(n - 1);
}
The main method starts here. Where the user can continue executing different values of n. The program keep prompting user to try again for another number until user signals for stoppage
public static void main(String[] args) {
This declares num as integer
int num;
Scanner input = new Scanner(System.in);
This initializes tryagain as y
char tryagain = 'y';
This checks if user wants to check the factorial of a number
while(tryagain == 'y'){
This prompts user for input
System.out.print("Number: ");
This gets user input
num = input.nextInt();
This passes user input to the function and also prints the result
System.out.println(num+"! = "+ fact(num));
This prompts user to try again for another value
System.out.print("Try another input? y/n : ");
This gets user response
tryagain = input.next().charAt(0);
}
What is better to use for start Python or Java?
Answer:
here is your answer ......
hope it helps......
Answer:
python is better
Explanation:
because its my favourite
What is the name for non-paid active links returned by an Internet search engine in the search results?
O sponsored links
O organic links
O dead links
O relevant links
Answer: b
Explanation:
What is the missing line of code?
>>> phrase = "You are amazing!"
>>> _____
'u a'
phrase[3:6]
phrase[2:6]
phrase[3:5]
phrase[2:5]
Answer:
phrase[2:5]
Explanation:
Given:
The above code segment
Required
Which instruction returns 'u a'
First, we need to get the index of u in the phrase:
u is at the third position but in programming, index starts at 0.
So, u is at index 2
Next, we need to get the index of a in the phrase:
a is at index 4
One of the ways to return a sub string from a string in python is [tex]string[start:stop+1][/tex]
Where:
[tex]start = 2[/tex] ----- index of u
[tex]stop = 4[/tex] ----- index of a
phrase ---- The string variable
So, the instruction that returns 'u a' is: [tex]phrase[2:5][/tex]
Where 5 = 4 + 1
Answer:
phrase[2:5]
Explanation: got it right on edgen