programming is necessary when the software needed to accomplish a task is not available.T/F

Answers

Answer 1

TrueProgramming is necessary when the software needed to accomplish a task is not available. The software may not be available because the task may be too specific or there may not be enough demand for it to justify the development costs.

As a result, a programmer must create a software solution that will be tailored to the user's requirements. Custom software development is the process of creating software applications that are specifically designed to meet the needs of a specific business, user, or organization. Custom software development can be used for a variety of purposes, such as automating tasks, improving workflow, and integrating existing systems.

To know more about software visit:

https://brainly.com/question/32393976

#SPJ11


Related Questions

Who is famous for his three laws of robotics?

Answers

Answer:

The Correct answer is Isaac Asimov

Explanation:

Science fiction already envisioned this problem and has suggested various potential solutions. They were designed to prevent robots harming humans.

Most job applications are online. True Fals

Answers

Answer:

True

Explanation: In this day and age everyone uses the computer to find jobs. Newspaper job ads are not really a thing anymore that most people use.

Answer:

A. True

Explanation:

________ are programs that attach themselves to legitimate programs. Group of answer choices Direct-propagation worms Worms Payloads Viruses

Answers

Answer:

Worms / Viruses / Trojan Horse Virus

Explanation:

A worm is a standalone program that can self-replicate and spread over a network. Unlike a virus, a worm spreads by exploiting a vulnerability in the infected system or through email as an attachment masquerading as a legitimate file.

Under the fair use doctrine, which group of people are allowed to use certain
portions of copyrighted material without permission?
O A. Web developers
OB. Teachers
C. Entrepreneurs
OD. Producers

Answers

Answer:

the answer is b fair use lets people teachers use some copy right materials since this is instruction

Hope This Helps!!!

What action should you take when using removable media in a sensitive compartmented information.

Answers

The action should be taken when using removable media in a sensitive compartmented information is retrieved classified documents promptly from printers.

What is sensitive compartmented information facility?

The sensitive compartmented information facility (SCIF) is the location where, the sensitive cognition is discussed to maintain the privacy of it.

When using removable media in a sensitive compartmented information is retrieved, classified documents promptly from printers.This action is taken to make the imformation more secure and prevent it to leak.

Thus, the action should be taken when using removable media in a sensitive compartmented information is retrieved classified documents promptly from printers.

Learn more about the sensitive compartmented information here;

https://brainly.com/question/25194168

#SPJ1

Which tab contains the Spell Check feature?

1. View
2. Review
3. Page Layout
4. Insert

Answers

Answer:

In excel, the review tab, answer no 2

The tab that contains the spell check feature is 2. Review

Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as ________. All of the answer choices are correct. editor reader subject matter expert

Answers

People or web do wants their privacy. Large wikis do protect the quality and accuracy of their information by assigning users roles such as Reader, Subject Expert and editor.

What is website quality?

Website quality is one that is said to be based on the quality of the software and output. Website Quality or say the Quality of Websites are said to be often measured from two views.

That is the Programmers, and End-users. The various aspects of website quality ranges from programmers who are based on the extent of Maintainability, Security, Functionality and others.

learn more about protection of quality  from

https://brainly.com/question/13171394

What happens if a computer lags too much?

Answers

Answer: Hope This Helps!

Explanation:

This mainly happens when your OS is trying to update or send data to the data center and installed software is downloading or uploading data in the background. Also, it can be the hard disk is probably just too old. You can replace an old hard drive. In fact, it’s recommended before lagging is replaced by the blue screen of death. A new hard disk drive won’t cost a lot of money. Also, it can be that you touched a notification that popped up on your computer and it downloaded a virus which you have to go to a tech to fix if you dont have anti virus protector. And if it keeps going that means it can overheat or just breakdown and never work again.

ap computer science principles practice quiz unit 9 What is data?I. Computer readable informationII. Information collected about the physical worldIII. Programs that process imagesIV. Graphs and charts

Answers

Data refers to computer-readable information that can be used for various purposes, including analysis and decision-making. It is typically collected from various sources, including human input, sensors, and automated systems. This information can be stored and processed by computer programs to generate insights and inform actions.



The scope of data is vast and includes information collected about the physical world, such as environmental conditions, and information about human behavior, such as social media usage patterns. It can also include programs that process images, such as facial recognition software or satellite imagery analysis.

Data can be represented in various ways, including graphs and charts, which can help to visualize complex information and make it easier to understand. These visualizations can be used to identify patterns, trends, and relationships between different data points, and inform decision-making in various fields, including business, healthcare, and government.

To learn more about, analysis

https://brainly.com/question/19671930

#SPJ11

When should students practice netiquette in an online course? Check all that apply.

Answers

Answer:

when sending emails to classmates

when participating in online discussion boards

when collaborating as part of digital team

Explanation:

i just took the test

Answer:

A B C E

Explanation:

Netiquettes are the etiquette on internet while doing online conversations on email, blogs, chats, social media sites interactions etc.

While doing the interaction, one should know that the other side to whom he is talking is also a human and any bad word or lose talk can hurt his feelings.

One should also respect others time and space. So good netiquettes include option A, B, C and E which are: Identify yourself in a post or email ,Writing short concise messages to others, Valuing others opinions and cultures and keeping personal information private.

Choose the correct option. i) An object thrown from a moving bus is on example of
(A) Uniform circular motion
(B) Rectilinear motion
(C) Projectile motion
(D) Motion in one dimension​
age

Answers

PROJECTILE MOTION

The answer is option C: "Projectile motion."

Projectile motion refers to the motion of an object that is thrown or launched into the air and follows a parabolic path under the influence of gravity. An object thrown from a moving bus is an example of projectile motion because it is launched into the air and follows a curved path due to the force of gravity.

Option A: "Uniform circular motion" refers to the motion of an object moving in a circular path at a constant speed.

Option B: "Rectilinear motion" refers to the motion of an object moving in a straight line.

Option D: "Motion in one dimension" refers to motion that occurs along a single straight line, rather than in two or three dimensions.

Hope This Helps You!

what is Mainframe computer​

Answers

Answer:

A Mainframe computer, informally called an mainframe or big iron, is a computer used primarily by large organizations for critical applications, bulk data processing such as the census and industry and consumer statistics.

A reference variable stores a(n) ________. Group of answer choices binary encoded decimal memory address object string

Answers

A reference variable stores a memory address. In programming, a reference variable is a type of variable that stores the memory address of another object rather than its actual value.

It refers to an object or a location in memory where the object is stored. When we use a reference variable, we can access and manipulate the object it refers to by using the reference variable itself. The reference variable acts as a pointer to the memory location where the object resides. This allows us to pass objects by reference, share objects between different parts of the program, and perform operations on the actual object rather than creating a copy of it.

To learn more about  variable  click on the link below:

brainly.com/question/31957407

#SPJ11

You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?.

Answers

WPA3 if available, WPA2-AES if not available

Disabling SSID broadcast is the greatest practice to take to increase security for wireless networks.

What is network?

a chain, group, or system that is interconnected or associated in some way. a system of interconnected computers and devices that can communicate with one another. 4. a collection of radio or television stations connected by a radio relay or wire.

The best method to implement to add security for wireless network is disabled SSID broadcast.

By turning off the SSID broadcast, the router stops broadcasting the name of the wireless network, rendering it undetectable to users.

This only prevents the name from appearing on device lists for neighboring networks, though. Since users still require the network, it is still in existence.

Hence, disabled SSID broadcast is correct option.

To know more about Network on:

https://brainly.com/question/15002514

#SPJ12

who are your favorite You tubers mine are the Dobre Brothers

Answers

Answer:

mine are H2O delerious and Lazar beam

Explanation:

I enjoy watching watching whatever comes up on my recommended page   :)

What is the origin of the name “breadboard”?

Answers

Answer:

Originally the word referred to a literal bread board, a polished piece of wood used for slicing bread. In the 1970s the solderless breadboard ( a.k.a. plugboard, a terminal array board) became available and nowadays the term "breadboard" is commonly used to refer to these.

Why would you choose to use Word Art rather than a colored font when creating a Google Slides presentation? There are more fonts in Word Art Word Art has fewer graphical features Because color is always distracting Word Art lets you customize the look more

Answers

Answer:

D. Word Art helps you customize the look more.

Explanation:

Word Art is a design feature in Microsoft Word that helps users design creative texts. A placeholder text appears in the working area and instructs the user to enter his own text there. The size of the text can be adjusted according to the need of the user. A user can enter a simple sentence or a complete paragraph in the text and can customize the look according to his needs.

The letter A shows the different designs that can be applied by the user. Also, symbols can be inserted in the text. So, when creating a Google Slides Presentation, Word Art would be a preferred choice because of the ease in customizing.

Hailey was working on a multimedia presentation that included both video and audio files. The file was huge, and she wanted to send it to her coworker in another office. She needed to reduce the size of the file so that it could be transmitted faster. The utility she used to do this was _____.

Answers

Answer:

a compression software such as WinRar

Explanation:

The utility she used to do this would have been a compression software such as WinRar. This software compresses large files or various files into a single ZIP or RAR file. This compressed file is much smaller than the original files that it contains, which is accomplished through a compression algorithm. This can also be encrypted with a password so that only specific individuals with access can open the file. Once unzipped or extracted, the original files are obtained in its original size.

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me

How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st

Answers

Answer:

Try using vinegar or baking soda and water. There's also products for your problem.

which type of computer/it architecture is limited to a central computer system?

Answers

Mainframe computer is limited to a central computer system. it is also called "Centralized Architecture".

A mainframe computer is a specific type of computer built to handle significant and sophisticated computing tasks, often in a centralized architecture. It is a high-performance computer system that big businesses and government organizations use to process vast volumes of data and support essential business operations.

The security, scalability, and dependability of mainframes are well known. For large-scale transaction processing, data management, and scientific computing applications, they are well suited since they are built to offer a high level of processing power, memory, and storage capacity. To manage the resources and applications running on the system, mainframe systems often require specialized operating systems, programming languages, and middleware.

To know more about mainframe computer

brainly.com/question/14191803

#SPJ4

what type of attack are stateless packet filters particularly vulnerable to?

Answers

Stateless packet filters are generally vulnerable to attacks and exploits that take advantage of problems within the TCP/IP specification and protocol stack.

Hello can someone help me with this, please
1) What kinds of siding does the house from “Up” have?
2) What type of roof does our house have?
3) How many gables/hips does the roof have? :
4) Look at the following styles of houses. What style home do you think the house from up is?

5) How do you know?

Hello can someone help me with this, please1) What kinds of siding does the house from Up have?2) What
Hello can someone help me with this, please1) What kinds of siding does the house from Up have?2) What
Hello can someone help me with this, please1) What kinds of siding does the house from Up have?2) What
Hello can someone help me with this, please1) What kinds of siding does the house from Up have?2) What
Hello can someone help me with this, please1) What kinds of siding does the house from Up have?2) What

Answers

The house from "Up" has clapboard siding, which is a type of wooden siding that consists of long, narrow boards that overlap each other horizontally.

How to explain information regarding the house

The house from "Up" appears to be a Victorian-style house with elements of Queen Anne style.

There are several characteristics of the house from "Up" that suggest it is a Victorian-style home. First, the house has a steeply pitched roof with multiple gables and dormer windows, which is a common feature of Victorian architecture.

The house also has a wrap-around porch with decorative railing, another hallmark of Victorian design. Additionally, the use of ornate detailing and vibrant colors, such as the elaborate trim work and bold purple paint, is typical of the Queen Anne style of Victorian architecture.

Learn more about house on:

brainly.com/question/23241042

#SPJ1

ssuming 'req' is the variable name used as the handler for the request object, which method or property can be used to return the request url string?

Answers

The req.url property returns the URL of the requested resource in an HTTP request.

Assuming that req is the variable name used as the handler for the request object, the req.url property can be used to return the request URL string. The req.url property returns the URL of the requested resource as a string. This string can be used to access information about the requested resource, such as the path, query string, and fragment identifier.

The req.url property is a commonly used property in web development, particularly in server-side applications that handle HTTP requests. It represents the URL of the requested resource and is part of the request object that is passed to the server as part of an HTTP request. The request object contains information about the incoming request, including the URL, headers, and body.

In web development, the req.url property is often used to route requests to different parts of an application based on the requested resource. For example, a server-side application might use the URL to determine which file to serve to the client, or which data to return in response to an API request.

In addition to its routing use case, the req.url property can also be used to extract information from the URL, such as query string parameters or the path to the requested resource. This information can be used to implement features such as pagination or filtering of data, or to dynamically generate content based on the requested resource.

Learn more about API here:

https://brainly.com/question/27852304

#SPJ4

Assignment: Blues Progression
Blues is a sub-genre of jazz that follows some specific guidelines: specifically, the Blues scale and the Blues chord progression.
In this assignment, you’ll write out a 12-bar Blues chord progression. This assignment is a MuseScore assignment. Do not turn in this document for grading.

Directions:

1. Create a new document in MuseScore
a. For the title, write “MuseScore Assignment: Blues”.
b. For the composer, write your name., then click "next".
c. Under "general", choose “Grand Staff”, then click “Next”.
d. Choose G major for your key signature (1 sharp), then click next.
e. Choose “Piano” (in the Keyboards section) for your instrument. (This step may or may not show for you. It's ok either way!)
f. Choose 4/4 for your Time Signature and 12 measures for number of measure.
g. Click “Finish”.

2. In the Bass Clef, write out a 12-bar Blues Chord Progression.
a. Use whole notes for your chords
b. I – I – I – I – IV – IV – I – I – V7 – IV – I – V7

Save your assignment (with your name!) and submit it to the Composition: Blues Progression Dropbox basket. Turn in the MuseScore file only.

Answers

Explanation:

I can provide you with the 12-bar Blues chord progression as you requested:

In the key of G major:

I (G) – I (G) – I (G) – I (G)

IV (C) – IV (C) – I (G) – I (G)

V7 (D7) – IV (C) – I (G) – V7 (D7)

The Roman numerals in parentheses represent the chords to play in each measure, and the chord names outside the parentheses indicate the actual chords to play in the key of G major.

The Java library’s ........ interface defines functionality related to determining whether one object is greater than, less than, or equal to another object.
Any class that implements the Comparable interface must provide a ........ method
What does it mean for a class’s equals and compareTo methods to be "consistent"?
The size of a list is a fixed value, i.e., it does not change over time.
An ....... mechanism allows us to move through the elements of a data structure one at a time in a given sequence
The binary search algorithm can be implemented recursively. true or false
The binary search algorithm is O(log 2N), where N is the size of the list. true or false

Answers

The Java library’s Comparable interface defines functionality related to determining whether one object is greater than, less than, or equal to another object.

What is the role of a java library?

Any class that implements the Comparable interface must provide a compareTo method.

For a class's equals and compareTo methods to be "consistent", they must return the same results when comparing objects. That is, if two objects are considered equal according to the equals method, they must also be considered equal according to the compareTo method.

The size of a list is not necessarily a fixed value, as it can change over time with the addition or removal of elements.

An iterator mechanism allows us to move through the elements of a data structure one at a time in a given sequence.

The binary search algorithm can be implemented recursively. (True)

The binary search algorithm is O(log 2N), where N is the size of the list. (True)

Find out more on Java library here: https://brainly.com/question/25653505

#SPJ1

What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible by ten: " + counter); counter++; } else { System.out.println("Counter is not divisible by ten: " + counter); counter++; }

Answers

Answer:

The correct code to the given question is

if ((counter % 10) == 0)  // check the condition

{

System.out.println("Counter is divisible by ten: " + counter);  // display

}

else  // check the condition

{

System.out.println("Counter is not divisible by ten: "  +counter); // display the //value

}

counter++; // increment the value of counter

Explanation:

Following are the description of code

In the given question we have to check the condition that the given number is divisible by 10 or not .In the if block if the number is divisible by 10 then it print the value of number and increment the value of counter .In the else block if the number is not divisible by 10 then it print the value of number and increment the value of counter .It means the value of counter is increases in the if block as well as in the else block .So we have to remove the counter statement from there and place outside the if and else block .

what is the probable order of complexity of nested loops the outer loop of iterations and the inner loop of up to iterations that decrease by for each loop

Answers

The probable order of complexity of nested loops with an outer loop of N iterations and an inner loop with up to M that decrease by P for each loop depends on the number of iterations in each loop.

Let's assume the outer loop has "N" iterations and the inner loop has "M" iterations that decrease by "k" for each loop.


1. Start by analyzing the inner loop. Since it decreases by P for each iteration, the number of operations it performs can be represented as M/P, assuming that M is divisible by P.
2. Now, consider the outer loop with N iterations. For each outer loop iteration, the inner loop is executed M/P times.
3. To find the overall complexity, multiply the number of iterations in the outer loop by the number of operations performed by the inner circle. This results in a complexity of N * (M/P).
4. Simplify the expression to obtain the order of complexity. In this case, the order of complexity is O(N * (M/P)).

So, the probable order of complexity of the nested loops you described is O(N * (M/P)).

To know more about nested loops visit: https://brainly.com/question/31921749

#SPJ11

Sistema binario, realizar el pasaje de binario a decimal; 00110011 11101100 11100001 11001100 10010101 11001111 10000001 10001100 11111111 01111110 11110101 00101000 11111100 00000011 00001111 11100000 11000011 10000000 11111000 00111100

Answers

Explanation:

MULTIPLY EACH OF THE NUMBER WITH 2 THEN RAISE TO THE POWER OF THE NUMBER'S POSITION

EXAMPLE: 1 X 2'5

Explain the expression below
volume = 3.14 * (radius ** 2) * height

Answers

Answer:

Explanation:

Cylinder base area:

A = π·R²

Cylinder volume:

V = π·R²·h

π = 3.14

R - Cylinder base radius

h - Cylinder height

which will touch the ground first an elephant or a rock?

Answers

Answer:

rock!

Explanation:

the rock is lighter so it will fall faster, hope this helps :)

Answer: Elephant.

Explanation:

A rock is lighter so it won't fall as easily!

Other Questions
Ryan works for a delivery service. The function f(n) is used to calculate his daily pay, in dollars, on a day when he makes n deliveries. which of the options below defines a non-excludable good? question 2 options: consumption by one person does not diminish the quantity of consumption by others. consumption by one person diminishes the quantity of consumption by others. it is difficult (or very costly) to prevent consumption by those who do not pay for the good. it is easy (or relatively costless) to prevent consumption by those who do not pay for the good. how a character changes interacts with a setting can reveal important character traits and information True or false your luxury gym is considering upgrading its swimming pool. it last upgraded 2 years ago, when it spent $115 million on equipment with an assumed life of 5 years and an assumed salvage value of $15 million for tax purposes. the firm uses straight-line depreciation. (you have to depreciate the cost of the swimming pool to the salvage value over these 5 year.) the old equipment can be sold today for $80 million. if the gym sells the equipment today, what is the net profit (after-tax cash flow) from the sale? assume the firm's tax rate is 30.0 percent. answer in millions of dollars with 2 decimals. a mechanic has the length of a hole 6 feet long what is the length after two inches is cut off? Solve for q in terms of r, s, and t please help, tysm :) The name given to entering transaction data in the journal is:a. chronicling.b. listing.c. posting.d. journalizing. solve consult limit n(e^-n) In the first chapter of the novel, Hinton introduces the characters. What part of the plot structure is this?the rising actionthe falling actionthe expositionthe climax Calculate the number of moles in 11.0 grams of NaOH . Please show your work to receive credit. Which expression is equivalent to 6(p + 1)? which political leaders election to a fourth term brought about concerns that his election threatened the system of checks and balances? The problem Audit needs to be conducted with everycne in the company in order to make sure that we have all the necessary information we need to identify the problem. a. TRUE b. FALSE What is the solubility of calcium phosphate in ppm?Previous questions:At 25C, the molar solubility of calcium phosphate in water is 1.1 * 10^-7 M. Calculate the solubility in grams per liter.3.41*10^4 LHow many liters of water are required to dissolve 1 gram of calcium phosphate? All of the following statements are characteristics of the role of C-reactive protein (CRP) except?A) activates complementB) binds with factor H to initiate alternate complement pathwayC) exhibits pro-inflammatory characteristicsD) initiates opsonization if (a+1/2)=4find the value of a^3+1/a^3 I need help with this math Does anyone have any dorm room designs for the walls? I have a pink comforter with grey on the flip side, 2 big pink and flip grey sham pillows, and a fluffy white one. I need something girly and as many ideas as you can give me!Will give brainliest! Thank you! :) Fifty-eight percent of the fish in a large pond are minnows. Imagine scooping out a simple random sample of 20 fish from the pond and observing the sample proportion of minnows. What is the standard deviation of the sampling distribution