TrueProgramming is necessary when the software needed to accomplish a task is not available. The software may not be available because the task may be too specific or there may not be enough demand for it to justify the development costs.
As a result, a programmer must create a software solution that will be tailored to the user's requirements. Custom software development is the process of creating software applications that are specifically designed to meet the needs of a specific business, user, or organization. Custom software development can be used for a variety of purposes, such as automating tasks, improving workflow, and integrating existing systems.
To know more about software visit:
https://brainly.com/question/32393976
#SPJ11
Who is famous for his three laws of robotics?
Answer:
The Correct answer is Isaac Asimov
Explanation:
Science fiction already envisioned this problem and has suggested various potential solutions. They were designed to prevent robots harming humans.
Most job applications are online. True Fals
Answer:
True
Explanation: In this day and age everyone uses the computer to find jobs. Newspaper job ads are not really a thing anymore that most people use.
Answer:
A. True
Explanation:
________ are programs that attach themselves to legitimate programs. Group of answer choices Direct-propagation worms Worms Payloads Viruses
Answer:
Worms / Viruses / Trojan Horse Virus
Explanation:
A worm is a standalone program that can self-replicate and spread over a network. Unlike a virus, a worm spreads by exploiting a vulnerability in the infected system or through email as an attachment masquerading as a legitimate file.
Under the fair use doctrine, which group of people are allowed to use certain
portions of copyrighted material without permission?
O A. Web developers
OB. Teachers
C. Entrepreneurs
OD. Producers
Answer:
the answer is b fair use lets people teachers use some copy right materials since this is instruction
Hope This Helps!!!
What action should you take when using removable media in a sensitive compartmented information.
The action should be taken when using removable media in a sensitive compartmented information is retrieved classified documents promptly from printers.
What is sensitive compartmented information facility?
The sensitive compartmented information facility (SCIF) is the location where, the sensitive cognition is discussed to maintain the privacy of it.
When using removable media in a sensitive compartmented information is retrieved, classified documents promptly from printers.This action is taken to make the imformation more secure and prevent it to leak.Thus, the action should be taken when using removable media in a sensitive compartmented information is retrieved classified documents promptly from printers.
Learn more about the sensitive compartmented information here;
https://brainly.com/question/25194168
#SPJ1
Which tab contains the Spell Check feature?
1. View
2. Review
3. Page Layout
4. Insert
Answer:
In excel, the review tab, answer no 2
Large wikis, such as Wikipedia, can protect the quality and accuracy of their information by assigning users roles such as ________. All of the answer choices are correct. editor reader subject matter expert
People or web do wants their privacy. Large wikis do protect the quality and accuracy of their information by assigning users roles such as Reader, Subject Expert and editor.
What is website quality?Website quality is one that is said to be based on the quality of the software and output. Website Quality or say the Quality of Websites are said to be often measured from two views.
That is the Programmers, and End-users. The various aspects of website quality ranges from programmers who are based on the extent of Maintainability, Security, Functionality and others.
learn more about protection of quality from
https://brainly.com/question/13171394
What happens if a computer lags too much?
Answer: Hope This Helps!
Explanation:
This mainly happens when your OS is trying to update or send data to the data center and installed software is downloading or uploading data in the background. Also, it can be the hard disk is probably just too old. You can replace an old hard drive. In fact, it’s recommended before lagging is replaced by the blue screen of death. A new hard disk drive won’t cost a lot of money. Also, it can be that you touched a notification that popped up on your computer and it downloaded a virus which you have to go to a tech to fix if you dont have anti virus protector. And if it keeps going that means it can overheat or just breakdown and never work again.
ap computer science principles practice quiz unit 9 What is data?I. Computer readable informationII. Information collected about the physical worldIII. Programs that process imagesIV. Graphs and charts
Data refers to computer-readable information that can be used for various purposes, including analysis and decision-making. It is typically collected from various sources, including human input, sensors, and automated systems. This information can be stored and processed by computer programs to generate insights and inform actions.
The scope of data is vast and includes information collected about the physical world, such as environmental conditions, and information about human behavior, such as social media usage patterns. It can also include programs that process images, such as facial recognition software or satellite imagery analysis.
Data can be represented in various ways, including graphs and charts, which can help to visualize complex information and make it easier to understand. These visualizations can be used to identify patterns, trends, and relationships between different data points, and inform decision-making in various fields, including business, healthcare, and government.
To learn more about, analysis
https://brainly.com/question/19671930
#SPJ11
When should students practice netiquette in an online course? Check all that apply.
Answer:
when sending emails to classmates
when participating in online discussion boards
when collaborating as part of digital team
Explanation:
i just took the test
Answer:
A B C E
Explanation:
Netiquettes are the etiquette on internet while doing online conversations on email, blogs, chats, social media sites interactions etc.
While doing the interaction, one should know that the other side to whom he is talking is also a human and any bad word or lose talk can hurt his feelings.
One should also respect others time and space. So good netiquettes include option A, B, C and E which are: Identify yourself in a post or email ,Writing short concise messages to others, Valuing others opinions and cultures and keeping personal information private.
Choose the correct option. i) An object thrown from a moving bus is on example of
(A) Uniform circular motion
(B) Rectilinear motion
(C) Projectile motion
(D) Motion in one dimension
age
The answer is option C: "Projectile motion."
Projectile motion refers to the motion of an object that is thrown or launched into the air and follows a parabolic path under the influence of gravity. An object thrown from a moving bus is an example of projectile motion because it is launched into the air and follows a curved path due to the force of gravity.
Option A: "Uniform circular motion" refers to the motion of an object moving in a circular path at a constant speed.
Option B: "Rectilinear motion" refers to the motion of an object moving in a straight line.
Option D: "Motion in one dimension" refers to motion that occurs along a single straight line, rather than in two or three dimensions.
Hope This Helps You!
what is Mainframe computer
Answer:
A Mainframe computer, informally called an mainframe or big iron, is a computer used primarily by large organizations for critical applications, bulk data processing such as the census and industry and consumer statistics.
A reference variable stores a(n) ________. Group of answer choices binary encoded decimal memory address object string
A reference variable stores a memory address. In programming, a reference variable is a type of variable that stores the memory address of another object rather than its actual value.
It refers to an object or a location in memory where the object is stored. When we use a reference variable, we can access and manipulate the object it refers to by using the reference variable itself. The reference variable acts as a pointer to the memory location where the object resides. This allows us to pass objects by reference, share objects between different parts of the program, and perform operations on the actual object rather than creating a copy of it.
To learn more about variable click on the link below:
brainly.com/question/31957407
#SPJ11
You need to add security for your wireless network. You would like to use the most secure method. Which method should you implement?.
Disabling SSID broadcast is the greatest practice to take to increase security for wireless networks.
What is network?a chain, group, or system that is interconnected or associated in some way. a system of interconnected computers and devices that can communicate with one another. 4. a collection of radio or television stations connected by a radio relay or wire.
The best method to implement to add security for wireless network is disabled SSID broadcast.
By turning off the SSID broadcast, the router stops broadcasting the name of the wireless network, rendering it undetectable to users.
This only prevents the name from appearing on device lists for neighboring networks, though. Since users still require the network, it is still in existence.
Hence, disabled SSID broadcast is correct option.
To know more about Network on:
https://brainly.com/question/15002514
#SPJ12
who are your favorite You tubers mine are the Dobre Brothers
Answer:
mine are H2O delerious and Lazar beam
Explanation:
I enjoy watching watching whatever comes up on my recommended page :)
What is the origin of the name “breadboard”?
Answer:
Originally the word referred to a literal bread board, a polished piece of wood used for slicing bread. In the 1970s the solderless breadboard ( a.k.a. plugboard, a terminal array board) became available and nowadays the term "breadboard" is commonly used to refer to these.
Why would you choose to use Word Art rather than a colored font when creating a Google Slides presentation? There are more fonts in Word Art Word Art has fewer graphical features Because color is always distracting Word Art lets you customize the look more
Answer:
D. Word Art helps you customize the look more.
Explanation:
Word Art is a design feature in Microsoft Word that helps users design creative texts. A placeholder text appears in the working area and instructs the user to enter his own text there. The size of the text can be adjusted according to the need of the user. A user can enter a simple sentence or a complete paragraph in the text and can customize the look according to his needs.
The letter A shows the different designs that can be applied by the user. Also, symbols can be inserted in the text. So, when creating a Google Slides Presentation, Word Art would be a preferred choice because of the ease in customizing.
Hailey was working on a multimedia presentation that included both video and audio files. The file was huge, and she wanted to send it to her coworker in another office. She needed to reduce the size of the file so that it could be transmitted faster. The utility she used to do this was _____.
Answer:
a compression software such as WinRar
Explanation:
The utility she used to do this would have been a compression software such as WinRar. This software compresses large files or various files into a single ZIP or RAR file. This compressed file is much smaller than the original files that it contains, which is accomplished through a compression algorithm. This can also be encrypted with a password so that only specific individuals with access can open the file. Once unzipped or extracted, the original files are obtained in its original size.
How can get a cup stain off my Chromebook top? Like I tried everything. And I start school on the 1st of September. Plz help me
Answer:
Try using vinegar or baking soda and water. There's also products for your problem.
which type of computer/it architecture is limited to a central computer system?
Mainframe computer is limited to a central computer system. it is also called "Centralized Architecture".
A mainframe computer is a specific type of computer built to handle significant and sophisticated computing tasks, often in a centralized architecture. It is a high-performance computer system that big businesses and government organizations use to process vast volumes of data and support essential business operations.
The security, scalability, and dependability of mainframes are well known. For large-scale transaction processing, data management, and scientific computing applications, they are well suited since they are built to offer a high level of processing power, memory, and storage capacity. To manage the resources and applications running on the system, mainframe systems often require specialized operating systems, programming languages, and middleware.
To know more about mainframe computer
brainly.com/question/14191803
#SPJ4
what type of attack are stateless packet filters particularly vulnerable to?
Hello can someone help me with this, please
1) What kinds of siding does the house from “Up” have?
2) What type of roof does our house have?
3) How many gables/hips does the roof have? :
4) Look at the following styles of houses. What style home do you think the house from up is?
5) How do you know?
The house from "Up" has clapboard siding, which is a type of wooden siding that consists of long, narrow boards that overlap each other horizontally.
How to explain information regarding the houseThe house from "Up" appears to be a Victorian-style house with elements of Queen Anne style.
There are several characteristics of the house from "Up" that suggest it is a Victorian-style home. First, the house has a steeply pitched roof with multiple gables and dormer windows, which is a common feature of Victorian architecture.
The house also has a wrap-around porch with decorative railing, another hallmark of Victorian design. Additionally, the use of ornate detailing and vibrant colors, such as the elaborate trim work and bold purple paint, is typical of the Queen Anne style of Victorian architecture.
Learn more about house on:
brainly.com/question/23241042
#SPJ1
ssuming 'req' is the variable name used as the handler for the request object, which method or property can be used to return the request url string?
The req.url property returns the URL of the requested resource in an HTTP request.
Assuming that req is the variable name used as the handler for the request object, the req.url property can be used to return the request URL string. The req.url property returns the URL of the requested resource as a string. This string can be used to access information about the requested resource, such as the path, query string, and fragment identifier.
The req.url property is a commonly used property in web development, particularly in server-side applications that handle HTTP requests. It represents the URL of the requested resource and is part of the request object that is passed to the server as part of an HTTP request. The request object contains information about the incoming request, including the URL, headers, and body.
In web development, the req.url property is often used to route requests to different parts of an application based on the requested resource. For example, a server-side application might use the URL to determine which file to serve to the client, or which data to return in response to an API request.
In addition to its routing use case, the req.url property can also be used to extract information from the URL, such as query string parameters or the path to the requested resource. This information can be used to implement features such as pagination or filtering of data, or to dynamically generate content based on the requested resource.
Learn more about API here:
https://brainly.com/question/27852304
#SPJ4
Assignment: Blues Progression
Blues is a sub-genre of jazz that follows some specific guidelines: specifically, the Blues scale and the Blues chord progression.
In this assignment, you’ll write out a 12-bar Blues chord progression. This assignment is a MuseScore assignment. Do not turn in this document for grading.
Directions:
1. Create a new document in MuseScore
a. For the title, write “MuseScore Assignment: Blues”.
b. For the composer, write your name., then click "next".
c. Under "general", choose “Grand Staff”, then click “Next”.
d. Choose G major for your key signature (1 sharp), then click next.
e. Choose “Piano” (in the Keyboards section) for your instrument. (This step may or may not show for you. It's ok either way!)
f. Choose 4/4 for your Time Signature and 12 measures for number of measure.
g. Click “Finish”.
2. In the Bass Clef, write out a 12-bar Blues Chord Progression.
a. Use whole notes for your chords
b. I – I – I – I – IV – IV – I – I – V7 – IV – I – V7
Save your assignment (with your name!) and submit it to the Composition: Blues Progression Dropbox basket. Turn in the MuseScore file only.
Explanation:
I can provide you with the 12-bar Blues chord progression as you requested:
In the key of G major:
I (G) – I (G) – I (G) – I (G)
IV (C) – IV (C) – I (G) – I (G)
V7 (D7) – IV (C) – I (G) – V7 (D7)
The Roman numerals in parentheses represent the chords to play in each measure, and the chord names outside the parentheses indicate the actual chords to play in the key of G major.
The Java library’s ........ interface defines functionality related to determining whether one object is greater than, less than, or equal to another object.
Any class that implements the Comparable interface must provide a ........ method
What does it mean for a class’s equals and compareTo methods to be "consistent"?
The size of a list is a fixed value, i.e., it does not change over time.
An ....... mechanism allows us to move through the elements of a data structure one at a time in a given sequence
The binary search algorithm can be implemented recursively. true or false
The binary search algorithm is O(log 2N), where N is the size of the list. true or false
The Java library’s Comparable interface defines functionality related to determining whether one object is greater than, less than, or equal to another object.
What is the role of a java library?Any class that implements the Comparable interface must provide a compareTo method.
For a class's equals and compareTo methods to be "consistent", they must return the same results when comparing objects. That is, if two objects are considered equal according to the equals method, they must also be considered equal according to the compareTo method.
The size of a list is not necessarily a fixed value, as it can change over time with the addition or removal of elements.
An iterator mechanism allows us to move through the elements of a data structure one at a time in a given sequence.
The binary search algorithm can be implemented recursively. (True)
The binary search algorithm is O(log 2N), where N is the size of the list. (True)
Find out more on Java library here: https://brainly.com/question/25653505
#SPJ1
What is the best way to improve the following code fragment? if ((counter % 10) == 0) { System.out.println("Counter is divisible by ten: " + counter); counter++; } else { System.out.println("Counter is not divisible by ten: " + counter); counter++; }
Answer:
The correct code to the given question is
if ((counter % 10) == 0) // check the condition
{
System.out.println("Counter is divisible by ten: " + counter); // display
}
else // check the condition
{
System.out.println("Counter is not divisible by ten: " +counter); // display the //value
}
counter++; // increment the value of counter
Explanation:
Following are the description of code
In the given question we have to check the condition that the given number is divisible by 10 or not .In the if block if the number is divisible by 10 then it print the value of number and increment the value of counter .In the else block if the number is not divisible by 10 then it print the value of number and increment the value of counter .It means the value of counter is increases in the if block as well as in the else block .So we have to remove the counter statement from there and place outside the if and else block .what is the probable order of complexity of nested loops the outer loop of iterations and the inner loop of up to iterations that decrease by for each loop
The probable order of complexity of nested loops with an outer loop of N iterations and an inner loop with up to M that decrease by P for each loop depends on the number of iterations in each loop.
Let's assume the outer loop has "N" iterations and the inner loop has "M" iterations that decrease by "k" for each loop.
1. Start by analyzing the inner loop. Since it decreases by P for each iteration, the number of operations it performs can be represented as M/P, assuming that M is divisible by P.
2. Now, consider the outer loop with N iterations. For each outer loop iteration, the inner loop is executed M/P times.
3. To find the overall complexity, multiply the number of iterations in the outer loop by the number of operations performed by the inner circle. This results in a complexity of N * (M/P).
4. Simplify the expression to obtain the order of complexity. In this case, the order of complexity is O(N * (M/P)).
So, the probable order of complexity of the nested loops you described is O(N * (M/P)).
To know more about nested loops visit: https://brainly.com/question/31921749
#SPJ11
Sistema binario, realizar el pasaje de binario a decimal; 00110011 11101100 11100001 11001100 10010101 11001111 10000001 10001100 11111111 01111110 11110101 00101000 11111100 00000011 00001111 11100000 11000011 10000000 11111000 00111100
Explanation:
MULTIPLY EACH OF THE NUMBER WITH 2 THEN RAISE TO THE POWER OF THE NUMBER'S POSITION
EXAMPLE: 1 X 2'5
Explain the expression below
volume = 3.14 * (radius ** 2) * height
Answer:
Explanation:
Cylinder base area:
A = π·R²
Cylinder volume:
V = π·R²·h
π = 3.14
R - Cylinder base radius
h - Cylinder height
which will touch the ground first an elephant or a rock?
Answer:
rock!
Explanation:
the rock is lighter so it will fall faster, hope this helps :)
Answer: Elephant.
Explanation:
A rock is lighter so it won't fall as easily!