Answer:
The answer is B
Explanation:
select all the correct answers
which two programming languages are most commonly used to write web based software programs?
1. Python
2. C
3. PHP
3. Ada
Answer:
PythonPHPExplanation:
Plato Correct!
The two programming languages most commonly used to create software for websites are Python and PHP.
We have,
Python is known for being easy to understand and read, which makes it popular for building web applications.
It has tools and frameworks that help developers create websites quickly.
PHP is a language specifically designed for web development.
It is used to write code that runs on the server and helps create interactive websites.
Many popular websites and content management systems, like WordPress, are built with PHP.
While the C language can also be used for web development, it is not as commonly used as Python and PHP in this context.
Ada is a programming language mainly used in specialized industries like aerospace and defense.
It is not commonly used for creating websites.
Thus,
The two programming languages most commonly used to create software for websites are Python and PHP.
Learn more about programming languages here:
https://brainly.com/question/23959041
#SPJ4
PLEASE HELP ME!!! Please don't answer if you're just going to guess.
In this line from a data file, what do you call the comma?
dog, 23, 15
The comma is _____
-Choices-
a BOL set of characters,
an EOL set of characters,
a delimiter.
Answer:
a
Explanation:
Answer:
BOL
Explanation:
technically a coding question utilizing python how would one calculate a square root
Answer:
import math
math.sqrt( x )
Explanation:
The basic code that can be written to calculate the square root of a number is as follows
import math
math.sqrt( x )
Prompt Using complete sentences post a detailed response to the following. Give one example of digital art that you have seen today and where you saw it. Where do you most frequently see digital art? What does it say about our culture?
Answer:
Digital art forms can be frequently seen in film, television and video games
Explanation:
There are various forms of digital arts such as Fractal/Algorithmic Art, Dynamic Painting, Pixel Art, computer graphics, etc. I have seen computer graphic in a movie today.
Most of the digital art forms are used as a conceptual drawing in film, television and video games
Kevin is scanning old images from his college library. He might use these scanned images in the college magazine. He might also use them on the college website. What is the best practice for Kevin to follow when scanning the images?
A.
scan the images with 72 DPI
B.
scan only the images that are ideal for a website
C.
scan the images with 150 DPI
D.
scan the images with 600 DPI
E.
scan the images that are ideal for a magazine
Answer: D. Scan the images with 600 DPI
Explanation:
Answer: D. Scan the images with 600 DPI
Explanation: Correct for Plato/Edmentum
Rob is planning his housewarming party. He wants to design an invitation and personalize it for each invitee. He needs to create a list of invitees, design the card, and personalize the card. How should he complete the tasks? a. Use mail merge for steps 1 and 2 and a word processor for step 3. b. Use a graphics software for step 1, mail merge for step 2, and a word processor for step 3. c. Use a word processor for steps 1 and 2 and a graphics software for step 3. d. Use a word processor for step 1, graphics software for step 2, and a mail merge for step 3.
Answer:
1: Word Processor
2: Graphics Software
3: Mail Merge
Explanation:
Given
1. Create a list of invitees
2. Design an invitation card
3. Personalize the card
Creating a list of invitees is a task that requires basic activities such as typing, using of numbers and bullets; these activities can be achieved using word processing software programs such as Microsoft Word, WordPerfect, amongst others.
So task 1 requires a word processor
An invitation card is a piece of graphics that can be perfectly handled by graphics software programs such as CorelDraw, Adobe Photoshop, etc.
So task 1 requires a graphics software
Task 3 can be achieved using mail merge and this is because mail merge can be used either to print or to mail recipients. While mailing the recipients, one can easily personalize each letter (or in this case, an invitation card) to suit the recipient it is being directed to.
write examples of hacking in internet?
Answer:
Although hacking is very bad, it can be found everywhere and anywhere.
Examples: Phishing, password checking, and keyloggers
Explanation:
Explanation:
Hacking is an attempt to exploit a computer system or a private network inside a computer. Simply put, it is the unauthorised access to or control over computer network security systems for some illicit purpose.
To better describe hacking, one needs to first understand hackers. One can easily assume them to be intelligent and highly skilled in computers. In fact, breaking a security system requires more intelligence and expertise than actually creating one. There are no hard and fast rules whereby we can categorize hackers into neat compartments. However, in general computer parlance, we call them white hats, black hats and grey hats. White hat professionals hack to check their own security systems to make it more hack-proof. In most cases, they are part of the same organisation. Black hat hackers hack to take control over the system for personal gains. They can destroy, steal or even prevent authorized users from accessing the system. They do this by finding loopholes and weaknesses in the system. Some computer experts call them crackers instead of hackers. Grey hat hackers comprise curious people who have just about enough computer language skills to enable them to hack a system to locate potential loopholes in the network security system. Grey hats differ from black hats in the sense that the former notify the admin of the network system about the weaknesses discovered in the system, whereas the latter is only looking for personal gains. All kinds of hacking are considered illegal barring the work done by white hat hackers.
adassadad saflalfaklfajfklajfalkfjalkfjalkfalkf
Answer:
this belongs on r/ihadastroke
Explanation:
Answer: ok
Explanation:
what is the best wi-fi name you have ever seen?
Answer:
bill wi the science fi
Explanation:
Which of the following is the term for a device (usually external to a computer) that is plugged into a computer's communication
port or connected wirelessly?
An attachment
A peripheral
A flash drive
A plug-in
A device, usually external to a computer that is plugged into a computer's communication port or is connected wirelessly. Common peripherals are keyboards, mice, monitors, speakers, and printers
The term for a device (usually external to a computer) that is plugged into a computer's communication port or connected wirelessly is:
B. A peripheralAccording to the given question, we are asked to find the correct term for a device which is plugged to a computer's communication port wirelessly
As a result of this, we can see that a peripheral device is used to connect to a computer wirelessly and some common examples include a keyboard, mouse, joystick, etc.
Therefore, the correct answer is option B
Read more here:
https://brainly.com/question/20488785
What would you classify anti-malware software as?
SaaS
enterprising
cloud
security
Answer:
enterpriseing is the answer
the advantages and disadvantages of internet
What are good components to preorder a PC with that are cheep? It would be my first PC by the way.
Answer:
Good Components
.CPU AMD Threadripper 3960X Amazon
.CPU cooler NZXT Kraken X63 (280mm AIO liquid cooler) Overclockers
.GPU Zotac Gaming GeForce GTX 1660 6GB CCLonline
.Memory 32GB Corsair Dominator Platinum RGB 3200MHz Scan
Explanation:
PLZ HELP FAST
The third party which is authorized to make a final decision in a dispute is called the ______.
a.
Mediator
b.
Arbiter
c.
Supervisor
d.
Manager
Please select the best answer from the choices provided
A
B
C
D
Answer:
This is called an Arbiter!
Explanation:
A somehow similar task belongs to the mediator, that is to help in solving of the conflict, but the mediator does not have the power of making a final decision. The Arbiter however takes the final decision and all the parties are expected to accept this decision.
one day when rahul went to his computer lab and saw that all the computers were connected to a single printer and whoever is giving a command to print, the print out comes from that printer. can you name the concept of communication? class 8 computer one word answer..
Explanation:
you can connect multiple PCs to the wireless printer and print your documents from each one of them as long as the printer can be connected to the same network . You need the disc that came with the wireless printer to install the correct drivers on your computers and laptops.
hope it helps ( brainleist please )
Select the factors that a network engineer is most likely to consider when designing a computer network. the ways in which employees share business documents the number of hours employees work the number of networked computers the type of work done at networked computers the number of employees using each computer the rate of pay for networked employees
Answer:
the number of employees using each computer
the number of networked computers
the type of work done at networked computers
the ways in which employees share business documents
Explanation:
these are all correct on odyssey :)
What programs are always running when your computer is turned on? Enter the names of the programs in the space provided. Click the Submit button when you are finished to view the suggested response.
Answer:
open your task manager
Explanation
right click the toolbar below and click on task manager and you will see what programs are running on your pc
Answer:
Items commonly found in the system tray include antivirus settings; battery status; and volume. Sometimes e-mail programs, printers, or faxes are also present. Your computer may have other items in the system tray too.
Explanation:
I just took a test on edguenity and that was the correct answer hope this helps
This isn't academic, but what do I do if HI-REZ won't let me sign into an existing account. “Something went wrong” keeps popping up when I type in the correct info
Answer:
contact their support
Explanation:
I’ll mark brainliest if correct
Select the correct answer.
Derek works in the software quality assurance department. Which tools or process should Derek use to monitor and measure changes?
A.software engineering process
B.software quality metrics
C. SQA audits
D.reviews
Answer:
A.
Explanation:
Have a Nice Day
Answer:
answer: software quality metrics
Complete the sentence.
You might create algorithms and flowcharts during the ______ phase of software development.
Release
Planning
Design
Coding
You might create algorithms and flowcharts during the Design phase of software development.
What is the algorithms about?In software development, the Design phase is a crucial step in which the developers plan and determine how the software will be built. This involves breaking down the requirements and specifications into smaller, manageable components and then figuring out how these components will work together.
Therefore, to accomplish this, developers often create diagrams, such as flowcharts or algorithms, to help visualize the software's logic and structure. These diagrams can then be used to guide the development of the software, ensuring that all parts of the project are aligned and working towards the same goals.
Learn more about algorithms from
https://brainly.com/question/20543449
#SPJ1
Select the correct answer from each drop-down menu.
Complete the following sentences.
_________ effort is an important and necessary factor for the success of any project. In software development projects,
_______team members carry out several tasks to ensure the quality of the process and the final product.
Options for the first box are: managers, A teams, an individuals
Options for the second box are:internal, specific, external
Answer:
First, A teams, Second ,Specific
Explanation:
Lorann sends messages to Aiden that always go into Aiden’s Junk E-mail folder. Which process would best correct this problem so that Lorann’s messages no longer go into Aiden’s Junk E-mail folder?
A. adding Aiden to the Safe Senders list
B. adding Aiden to the Safe Recipients list
C. adding Lorann to the Safe Senders list
D. adding Lorann to the Safe Recipients list
Answer:
b
Explanation:
(WEB DESIGN FINAL QUESTION) PLEASE HELP
what is a trademark?
Answer:
a trade mark is something where someone owns the rights to something in a specific country
You are working on a ticketing system. A ticket costs $10. The office is running a discount campaign: each group of 5 people is getting a discount, which is determined by the age of the youngest person in the group. You need to create a program that takes the ages of all 5 people as input and outputs the total price of the tickets. Sample input: 55 28 15 38 63 sample output: 42.5 the youngest age is 15, so the group gets a 15% discount from the total price, which is $50 - 15% = $42.5
Answer:
Explanation:
The following program is written in Java. It takes 5 inputs of int values for the ages of each member in the group. Then it loops through all of the ages and chooses the youngest age. Finally, it applies that age as a discount to the final price which would be $50, outputting the final discounted price. The output for the test case provided can be seen in the attached picture below in red.
import java.util.Scanner;
class Brainly
{
public static void main(String[] args) {
Scanner in = new Scanner(System.in);
int[] person = new int[5];
System.out.println("Enter age of individual 1: ");
person[0] = in.nextInt();
System.out.println("Enter age of individual 2: ");
person[1] = in.nextInt();
System.out.println("Enter age of individual 3: ");
person[2] = in.nextInt();
System.out.println("Enter age of individual 4: ");
person[3] = in.nextInt();
System.out.println("Enter age of individual 5: ");
person[4] = in.nextInt();
int youngest = person[0];
for (int x = 0; x < person.length; x++) {
if (person[x] < youngest) {
youngest = person[x];
}
}
double discount = 1 - (((double)youngest) / 100);
double output = 50 * discount;
System.out.println("Total Price: " + output + " the youngest is " + youngest);
}
}
Construct :
4 input NOR Gate Truth Table.
9514 1404 393
Answer:
see attached
Explanation:
The output is always 0, except for the case where all 4 inputs are 0.
What is the web page path on the web server for the URL:
http://www.mydomain.com/main/index.html?
O http://
O www.mydomain
O main/index.html
O index.html
Answer:
C: main/index.html
Explanation:
Fatima has 3 packs of batteries. Each pack contains 4 batteries. She gives her brother 8 batteries to put in his toy robot. Let b represent the number of batteries Fatima has left. Which equation could be used to find the value of b?
Answer: See explanation
Explanation:
Let b represent the number of batteries Fatima has left.
The equation that can be used to find the value of b goes thus:
(3 × 4) = b + 8
12 = b + 8
b = 12 - 8
Therefore, based on the above equation, the number of batteries that Fatima has left will be 4.
Which of the following images illustrates safe driving?
Answer:
bottom left
Explanation:
Answer:
keep your eyes on the road!!!!
select the correct answer
which sentence correctly describes a low-level language?
A. programs are written in source code
B. programs are written in hexadecimal or binary code
C. programs are translated to machine code by a complier
D. programs can be easily written and debugged
A low-level language are known to be programs that can be easily written and debugged.
What are program written in a low level language?A low-level programming language is known to be a kind of programming language that helps one to have some amount or no abstraction from a computer's instruction defined architecture.
They are known as commands or functions in the language map that are said to be structurally almost the same to processor's instructions. They are easy to write and also debug.
Learn more about low level language from
https://brainly.com/question/23275071
HELPPP ME PLEASEEE!!